Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 22:57
Static task
static1
Behavioral task
behavioral1
Sample
3c28db7d5274460189167458e4120cc0fd607e2a63d94b0e1004f37049f63a62.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3c28db7d5274460189167458e4120cc0fd607e2a63d94b0e1004f37049f63a62.exe
Resource
win10v2004-20241007-en
General
-
Target
3c28db7d5274460189167458e4120cc0fd607e2a63d94b0e1004f37049f63a62.exe
-
Size
630KB
-
MD5
de428e3a7d4d7ef369f524d81ab63f3b
-
SHA1
175cf1088027980a6ea136487e0af8ef38d21e16
-
SHA256
3c28db7d5274460189167458e4120cc0fd607e2a63d94b0e1004f37049f63a62
-
SHA512
e46c3715e31f9c24454ccda981f1711128361e018f2dfbfe65ae0e9836f1313e52ecb6560c6d2bf84708f6a561dcdbf5a5905c788f76f48496eeb53aa52a0c21
-
SSDEEP
12288:PFUNDaM85s/AxkQ4xdv3yNIGlSYjjlrg+aaUX:PFOahs4xkQ4DvCNIGl3jjZg+XK
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Executes dropped EXE 6 IoCs
pid Process 1732 3c28db7d5274460189167458e4120cc0fd607e2a63d94b0e1004f37049f63a62.exe 2524 icsys.icn.exe 2464 explorer.exe 2428 spoolsv.exe 2800 svchost.exe 2716 spoolsv.exe -
Loads dropped DLL 6 IoCs
pid Process 3008 3c28db7d5274460189167458e4120cc0fd607e2a63d94b0e1004f37049f63a62.exe 3008 3c28db7d5274460189167458e4120cc0fd607e2a63d94b0e1004f37049f63a62.exe 2524 icsys.icn.exe 2464 explorer.exe 2428 spoolsv.exe 2800 svchost.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\Resources\tjud.exe explorer.exe File opened for modification C:\Windows\Resources\Themes\icsys.icn.exe 3c28db7d5274460189167458e4120cc0fd607e2a63d94b0e1004f37049f63a62.exe File opened for modification \??\c:\windows\resources\themes\explorer.exe icsys.icn.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3c28db7d5274460189167458e4120cc0fd607e2a63d94b0e1004f37049f63a62.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icsys.icn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2764 schtasks.exe 1348 schtasks.exe 1456 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3008 3c28db7d5274460189167458e4120cc0fd607e2a63d94b0e1004f37049f63a62.exe 3008 3c28db7d5274460189167458e4120cc0fd607e2a63d94b0e1004f37049f63a62.exe 3008 3c28db7d5274460189167458e4120cc0fd607e2a63d94b0e1004f37049f63a62.exe 3008 3c28db7d5274460189167458e4120cc0fd607e2a63d94b0e1004f37049f63a62.exe 3008 3c28db7d5274460189167458e4120cc0fd607e2a63d94b0e1004f37049f63a62.exe 3008 3c28db7d5274460189167458e4120cc0fd607e2a63d94b0e1004f37049f63a62.exe 3008 3c28db7d5274460189167458e4120cc0fd607e2a63d94b0e1004f37049f63a62.exe 3008 3c28db7d5274460189167458e4120cc0fd607e2a63d94b0e1004f37049f63a62.exe 3008 3c28db7d5274460189167458e4120cc0fd607e2a63d94b0e1004f37049f63a62.exe 3008 3c28db7d5274460189167458e4120cc0fd607e2a63d94b0e1004f37049f63a62.exe 3008 3c28db7d5274460189167458e4120cc0fd607e2a63d94b0e1004f37049f63a62.exe 3008 3c28db7d5274460189167458e4120cc0fd607e2a63d94b0e1004f37049f63a62.exe 3008 3c28db7d5274460189167458e4120cc0fd607e2a63d94b0e1004f37049f63a62.exe 3008 3c28db7d5274460189167458e4120cc0fd607e2a63d94b0e1004f37049f63a62.exe 3008 3c28db7d5274460189167458e4120cc0fd607e2a63d94b0e1004f37049f63a62.exe 3008 3c28db7d5274460189167458e4120cc0fd607e2a63d94b0e1004f37049f63a62.exe 2524 icsys.icn.exe 2524 icsys.icn.exe 2524 icsys.icn.exe 2524 icsys.icn.exe 2524 icsys.icn.exe 2524 icsys.icn.exe 2524 icsys.icn.exe 2524 icsys.icn.exe 2524 icsys.icn.exe 2524 icsys.icn.exe 2524 icsys.icn.exe 2524 icsys.icn.exe 2524 icsys.icn.exe 2524 icsys.icn.exe 2524 icsys.icn.exe 2524 icsys.icn.exe 2524 icsys.icn.exe 2464 explorer.exe 2464 explorer.exe 2464 explorer.exe 2464 explorer.exe 2464 explorer.exe 2464 explorer.exe 2464 explorer.exe 2464 explorer.exe 2464 explorer.exe 2464 explorer.exe 2464 explorer.exe 2464 explorer.exe 2464 explorer.exe 2464 explorer.exe 2464 explorer.exe 2464 explorer.exe 2800 svchost.exe 2800 svchost.exe 2800 svchost.exe 2800 svchost.exe 2800 svchost.exe 2800 svchost.exe 2800 svchost.exe 2800 svchost.exe 2800 svchost.exe 2800 svchost.exe 2800 svchost.exe 2800 svchost.exe 2800 svchost.exe 2800 svchost.exe 2800 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2464 explorer.exe 2800 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3008 3c28db7d5274460189167458e4120cc0fd607e2a63d94b0e1004f37049f63a62.exe 3008 3c28db7d5274460189167458e4120cc0fd607e2a63d94b0e1004f37049f63a62.exe 2524 icsys.icn.exe 2524 icsys.icn.exe 2464 explorer.exe 2464 explorer.exe 2428 spoolsv.exe 2428 spoolsv.exe 2800 svchost.exe 2800 svchost.exe 2716 spoolsv.exe 2716 spoolsv.exe -
Suspicious use of WriteProcessMemory 43 IoCs
description pid Process procid_target PID 3008 wrote to memory of 1732 3008 3c28db7d5274460189167458e4120cc0fd607e2a63d94b0e1004f37049f63a62.exe 30 PID 3008 wrote to memory of 1732 3008 3c28db7d5274460189167458e4120cc0fd607e2a63d94b0e1004f37049f63a62.exe 30 PID 3008 wrote to memory of 1732 3008 3c28db7d5274460189167458e4120cc0fd607e2a63d94b0e1004f37049f63a62.exe 30 PID 3008 wrote to memory of 1732 3008 3c28db7d5274460189167458e4120cc0fd607e2a63d94b0e1004f37049f63a62.exe 30 PID 3008 wrote to memory of 1732 3008 3c28db7d5274460189167458e4120cc0fd607e2a63d94b0e1004f37049f63a62.exe 30 PID 3008 wrote to memory of 1732 3008 3c28db7d5274460189167458e4120cc0fd607e2a63d94b0e1004f37049f63a62.exe 30 PID 3008 wrote to memory of 1732 3008 3c28db7d5274460189167458e4120cc0fd607e2a63d94b0e1004f37049f63a62.exe 30 PID 3008 wrote to memory of 2524 3008 3c28db7d5274460189167458e4120cc0fd607e2a63d94b0e1004f37049f63a62.exe 31 PID 3008 wrote to memory of 2524 3008 3c28db7d5274460189167458e4120cc0fd607e2a63d94b0e1004f37049f63a62.exe 31 PID 3008 wrote to memory of 2524 3008 3c28db7d5274460189167458e4120cc0fd607e2a63d94b0e1004f37049f63a62.exe 31 PID 3008 wrote to memory of 2524 3008 3c28db7d5274460189167458e4120cc0fd607e2a63d94b0e1004f37049f63a62.exe 31 PID 2524 wrote to memory of 2464 2524 icsys.icn.exe 32 PID 2524 wrote to memory of 2464 2524 icsys.icn.exe 32 PID 2524 wrote to memory of 2464 2524 icsys.icn.exe 32 PID 2524 wrote to memory of 2464 2524 icsys.icn.exe 32 PID 2464 wrote to memory of 2428 2464 explorer.exe 33 PID 2464 wrote to memory of 2428 2464 explorer.exe 33 PID 2464 wrote to memory of 2428 2464 explorer.exe 33 PID 2464 wrote to memory of 2428 2464 explorer.exe 33 PID 2428 wrote to memory of 2800 2428 spoolsv.exe 34 PID 2428 wrote to memory of 2800 2428 spoolsv.exe 34 PID 2428 wrote to memory of 2800 2428 spoolsv.exe 34 PID 2428 wrote to memory of 2800 2428 spoolsv.exe 34 PID 2800 wrote to memory of 2716 2800 svchost.exe 35 PID 2800 wrote to memory of 2716 2800 svchost.exe 35 PID 2800 wrote to memory of 2716 2800 svchost.exe 35 PID 2800 wrote to memory of 2716 2800 svchost.exe 35 PID 2464 wrote to memory of 2872 2464 explorer.exe 36 PID 2464 wrote to memory of 2872 2464 explorer.exe 36 PID 2464 wrote to memory of 2872 2464 explorer.exe 36 PID 2464 wrote to memory of 2872 2464 explorer.exe 36 PID 2800 wrote to memory of 2764 2800 svchost.exe 37 PID 2800 wrote to memory of 2764 2800 svchost.exe 37 PID 2800 wrote to memory of 2764 2800 svchost.exe 37 PID 2800 wrote to memory of 2764 2800 svchost.exe 37 PID 2800 wrote to memory of 1348 2800 svchost.exe 41 PID 2800 wrote to memory of 1348 2800 svchost.exe 41 PID 2800 wrote to memory of 1348 2800 svchost.exe 41 PID 2800 wrote to memory of 1348 2800 svchost.exe 41 PID 2800 wrote to memory of 1456 2800 svchost.exe 43 PID 2800 wrote to memory of 1456 2800 svchost.exe 43 PID 2800 wrote to memory of 1456 2800 svchost.exe 43 PID 2800 wrote to memory of 1456 2800 svchost.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\3c28db7d5274460189167458e4120cc0fd607e2a63d94b0e1004f37049f63a62.exe"C:\Users\Admin\AppData\Local\Temp\3c28db7d5274460189167458e4120cc0fd607e2a63d94b0e1004f37049f63a62.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3008 -
\??\c:\users\admin\appdata\local\temp\3c28db7d5274460189167458e4120cc0fd607e2a63d94b0e1004f37049f63a62.exec:\users\admin\appdata\local\temp\3c28db7d5274460189167458e4120cc0fd607e2a63d94b0e1004f37049f63a62.exe2⤵
- Executes dropped EXE
PID:1732
-
-
C:\Windows\Resources\Themes\icsys.icn.exeC:\Windows\Resources\Themes\icsys.icn.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2524 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe3⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2464 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2428 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe5⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2800 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2716
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 22:59 /f6⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2764
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 23:00 /f6⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1348
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 23:01 /f6⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1456
-
-
-
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe4⤵PID:2872
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135KB
MD52ef8dbd6519572164a6e44ae12ab260d
SHA1a71e07bd472f1f7fa8833ed6afc959884f398333
SHA256bea70387ce5f610f600d818256cd999759084c6dba0754639302c1e89162b0af
SHA5129c1a12508d2872cea942827193dd73705f77aa1c70579301050ac4ff0f4acd24287cf74ca05ac51149b069af9b53b6ee919204500d14b3f90da3a012fb9840f4
-
\Users\Admin\AppData\Local\Temp\3c28db7d5274460189167458e4120cc0fd607e2a63d94b0e1004f37049f63a62.exe
Filesize495KB
MD5d3205e595a423a7900ec8a368feaaafe
SHA198bf400147e6c93fe8399f7cecdfa09d4dedfc2e
SHA2569d0b92f0257a6f3b99ced38d27b2db2fc7165c1f07d2fff656a0c87313a33a9c
SHA5120732fd230c0420c987de7d54e6d5c3d79a8ccfa417c857d408dc8376d6a6e8b307cc9ed29ef15209c21addd91233155e4ed3fb203bde336aaf79cea816ede412
-
Filesize
135KB
MD53733cf8be2beaf37b512c4b4fc95e607
SHA133963c28544c7df9ffac981db215c8096f9e0217
SHA256e4ad273aab3d07096b40c228087565ecd911416735757db13e6d8b7b01619995
SHA5126cd0f30af91c38630bdeb7d8797fc961a3814dcbd09ef18db72949c7e4d22ff5af758deaa9a7a363cc8559fa414f7c84c1eb83cc8d72028cd960ab367a6aa979
-
Filesize
135KB
MD5cbf39381c3f26c71cf04a2bf58222901
SHA1096c7c04f987a72859e7d5f30e6ff33243884717
SHA25633e032de2c949831756d2172bbfcbbc94392593044af51bca9d8fa51fd9101e1
SHA51234f4e0efac1b427b81644fcb7efe7d8248c2affc8853c64dcdce38a79869eeec9e8b6f2da1a1244c299d588fca8b5afef550bbc4924c61ebb6990c97203e4291
-
Filesize
135KB
MD59b9f31ba45bb40fe75986843dc7efa9b
SHA119c387cf097b75648e8ae340bf750b29d689038c
SHA25648adaef6a7e6861c331443ffee3d61172bdb6f91326e023784d0f4bad92928a2
SHA512c85ce9de9f2c1ce2cbb6df6d81bd1ba743ab6274dacc4bd2014f6b0086fea45c19e4b8bf79604fb41655cb6e40d3d0da1aefdae8594fde4498d6f6d9218d1685