Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-11-2024 20:59

General

  • Target

    23c866ca628a16ddd4c3a0497ab76cb1413a0f09b8839b453b8556d86b204b85.exe

  • Size

    45KB

  • MD5

    d60407179c6134a465383bc6bbf6a2dd

  • SHA1

    ad21182f3d32f5b6b14b5343d7b0ade9e4cdd234

  • SHA256

    23c866ca628a16ddd4c3a0497ab76cb1413a0f09b8839b453b8556d86b204b85

  • SHA512

    d0ee8941be9652677db799d6888b73f320246b6e0050b153db9b0b3fd32df2f748d7483c97b00df8decff004799e4c722ee55a03d8c1738cdf9d92c70b680261

  • SSDEEP

    768:5qt/WXwCXV/aNOFi5XOCmg9TgEqxZihrWS9ybsvw+I9D88888888888JXn:5UWXaMU5Xvp3FrbCEnn

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 4 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 4 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 4 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 12 IoCs
  • Drops desktop.ini file(s) 2 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 14 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 30 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 20 IoCs
  • Suspicious use of WriteProcessMemory 43 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\23c866ca628a16ddd4c3a0497ab76cb1413a0f09b8839b453b8556d86b204b85.exe
    "C:\Users\Admin\AppData\Local\Temp\23c866ca628a16ddd4c3a0497ab76cb1413a0f09b8839b453b8556d86b204b85.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Drops desktop.ini file(s)
    • Enumerates connected drives
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3084
    • C:\recycled\SVCHOST.EXE
      C:\recycled\SVCHOST.EXE :agent
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Enumerates connected drives
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1720
      • C:\recycled\SVCHOST.EXE
        C:\recycled\SVCHOST.EXE :agent
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2664
      • F:\recycled\SVCHOST.EXE
        F:\recycled\SVCHOST.EXE :agent
        3⤵
        • Modifies WinLogon for persistence
        • Modifies visibility of file extensions in Explorer
        • Modifies visiblity of hidden/system files in Explorer
        • Executes dropped EXE
        • Enumerates connected drives
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4904
        • C:\recycled\SVCHOST.EXE
          C:\recycled\SVCHOST.EXE :agent
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:1384
        • F:\recycled\SVCHOST.EXE
          F:\recycled\SVCHOST.EXE :agent
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:1388
        • C:\recycled\SPOOLSV.EXE
          C:\recycled\SPOOLSV.EXE :agent
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visibility of file extensions in Explorer
          • Modifies visiblity of hidden/system files in Explorer
          • Executes dropped EXE
          • Enumerates connected drives
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1868
          • C:\recycled\SVCHOST.EXE
            C:\recycled\SVCHOST.EXE :agent
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            PID:1656
          • F:\recycled\SVCHOST.EXE
            F:\recycled\SVCHOST.EXE :agent
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            PID:2308
          • C:\recycled\SPOOLSV.EXE
            C:\recycled\SPOOLSV.EXE :agent
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            PID:5060
      • C:\recycled\SPOOLSV.EXE
        C:\recycled\SPOOLSV.EXE :agent
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:4152
      • C:\Windows\SysWOW64\userinit.exe
        C:\Windows\system32\userinit.exe
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4688
        • C:\Windows\Explorer.EXE
          C:\Windows\Explorer.EXE
          4⤵
          • Modifies registry class
          PID:4056
    • F:\recycled\SVCHOST.EXE
      F:\recycled\SVCHOST.EXE :agent
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:2452
    • C:\recycled\SPOOLSV.EXE
      C:\recycled\SPOOLSV.EXE :agent
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:4604
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\23c866ca628a16ddd4c3a0497ab76cb1413a0f09b8839b453b8556d86b204b85.doc" /o ""
      2⤵
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      PID:3472

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Recycled\SPOOLSV.EXE

    Filesize

    45KB

    MD5

    772f5b9696326e993794e8a8efff7e15

    SHA1

    d9ac3d7667890f07d190231d8cd48b30dc855717

    SHA256

    cfd48cd5ce9dfd5e3ae84f7a3c4372ad256f372de38a5a4540bbc17b71839172

    SHA512

    3f5f39f0a432b2e52e3fcd59f8dc3af67c966540e4d9ececb56823ea34197a502bc941bd8681e111dd3e3dc9416d35e4b954d620018a63ac7e38c77d1a1c2d55

  • C:\Recycled\SVCHOST.EXE

    Filesize

    45KB

    MD5

    0793e1c74f49df8baa07dc9a99e787a2

    SHA1

    d3ac8ed8ec353f2b39a3af75012e95b2c0c3ac6f

    SHA256

    1c06940e23fa4dfe20037afc79cb7b5874ca53f74af2382d5f3b0f7b2f533499

    SHA512

    547e0ca5ee3ebf01c098775a669c8712032de650d8f0fb79969be2e550f90df3c015cfc6ab59d8460ba2a1b6e7aa9cdd152f14b935747cfc38c8e9ff7ac0ab02

  • C:\Users\Admin\AppData\Local\Temp\Flu Burung.txt

    Filesize

    1KB

    MD5

    0269b6347e473980c5378044ac67aa1f

    SHA1

    c3334de50e320ad8bce8398acff95c363d039245

    SHA256

    68f5bd85c17975419bb4eacf615286d749bcb951e487813361837580b39ffee2

    SHA512

    e5c525fe688ecd3926ae634a61dc48c4837d7e56aae00b22e4f7d824df804cb536f6df077d5f6c67f63f73832ba00249ed3a75ed40ec9db6e026041b28404d7b

  • C:\Users\Admin\AppData\Local\Temp\TCDF17C.tmp\gb.xsl

    Filesize

    262KB

    MD5

    51d32ee5bc7ab811041f799652d26e04

    SHA1

    412193006aa3ef19e0a57e16acf86b830993024a

    SHA256

    6230814bf5b2d554397580613e20681752240ab87fd354ececf188c1eabe0e97

    SHA512

    5fc5d889b0c8e5ef464b76f0c4c9e61bda59b2d1205ac9417cc74d6e9f989fb73d78b4eb3044a1a1e1f2c00ce1ca1bd6d4d07eeadc4108c7b124867711c31810

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    1KB

    MD5

    80ab5630aea8969f0377707581f9d483

    SHA1

    36a705f8068047306e7429e472215d0572d0901e

    SHA256

    c1c8ba1c5be51572f82e78b57b7b8158cc6df9d38346f069c215d74185ddb657

    SHA512

    17a25602c2e3c0b499839a0820178e8d96a03c7b4ed5d0f555a191118f91364acfb6c9a646e0be32200e7dea3091fcc8e950d5c815529998bdb2c395553ffbeb

  • C:\begolu.txt

    Filesize

    2B

    MD5

    2b9d4fa85c8e82132bde46b143040142

    SHA1

    a02431cf7c501a5b368c91e41283419d8fa9fb03

    SHA256

    4658d6abbbaf7748c172ed5a3e003cdb8997648f88724834e41f75e54520e142

    SHA512

    c37f27b442d578e94db6e5d879d026b0b3457f42b99ec56a9cb6fca3161540a32e207b942ef2ddb7be01fa9245ba4d8c859978a0f9a498c1ad8aa46d0890e6be

  • F:\Recycled\SVCHOST.EXE

    Filesize

    45KB

    MD5

    849d1422a6f8cd5a54ec3348e661be16

    SHA1

    e8e99dc9a042d3208adc62d2cbb32505b6be7274

    SHA256

    756e28c903c672641cf67b4ac4e7e90bd3419e3f3ef33d186544eefe30e380b9

    SHA512

    0202557c1a82abe3af0ffd29bec8d61b9c27a3e3e9d91938f8b27c8870974dbed531c78238c5e1dd206749b71258af2cf90e77fcbb91bed55ee9240f2ca02320

  • memory/1384-38-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/1388-43-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/1656-55-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/1720-307-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/1720-17-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/1868-45-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/1868-315-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/2308-59-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/2452-72-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/2452-68-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/2664-26-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/3084-0-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/3084-76-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/3472-82-0x00007FFD60F20000-0x00007FFD60F30000-memory.dmp

    Filesize

    64KB

  • memory/3472-80-0x00007FFD63830000-0x00007FFD63840000-memory.dmp

    Filesize

    64KB

  • memory/3472-81-0x00007FFD63830000-0x00007FFD63840000-memory.dmp

    Filesize

    64KB

  • memory/3472-78-0x00007FFD63830000-0x00007FFD63840000-memory.dmp

    Filesize

    64KB

  • memory/3472-79-0x00007FFD63830000-0x00007FFD63840000-memory.dmp

    Filesize

    64KB

  • memory/3472-83-0x00007FFD60F20000-0x00007FFD60F30000-memory.dmp

    Filesize

    64KB

  • memory/3472-77-0x00007FFD63830000-0x00007FFD63840000-memory.dmp

    Filesize

    64KB

  • memory/4152-66-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/4604-75-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/4904-29-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/4904-314-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/5060-62-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB