Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 00:57
Static task
static1
Behavioral task
behavioral1
Sample
855219e8a3053596540245344f73bb6e7cf7d9f40da3caea1bc91d1a7cc0ba07.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
855219e8a3053596540245344f73bb6e7cf7d9f40da3caea1bc91d1a7cc0ba07.exe
Resource
win10v2004-20241007-en
General
-
Target
855219e8a3053596540245344f73bb6e7cf7d9f40da3caea1bc91d1a7cc0ba07.exe
-
Size
135KB
-
MD5
64f801415647679b0378ce9b29a594d8
-
SHA1
1f94aa1b85e87e6f3d9d371d646acea0beed9de6
-
SHA256
855219e8a3053596540245344f73bb6e7cf7d9f40da3caea1bc91d1a7cc0ba07
-
SHA512
044805215988321a88f3724b37a007339731a79d55e980c7208e9cde2d39d832abb84a3eb2dffb281a4321b30af7ca841778a4ce32800793c17213cf7eb1fbb6
-
SSDEEP
1536:XfsEqouTRcG/Mzvgf7xEuvnXNTRdUzwTekUOisZ1yDDajtXbgc0:XVqoCl/YgjxEufVU0TbTyDDalX0
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
Processes:
explorer.exesvchost.exedescription ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Executes dropped EXE 4 IoCs
Processes:
explorer.exespoolsv.exesvchost.exespoolsv.exepid Process 3728 explorer.exe 4004 spoolsv.exe 1852 svchost.exe 696 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
explorer.exesvchost.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe -
Drops file in System32 directory 2 IoCs
Processes:
explorer.exesvchost.exedescription ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Drops file in Windows directory 4 IoCs
Processes:
855219e8a3053596540245344f73bb6e7cf7d9f40da3caea1bc91d1a7cc0ba07.exeexplorer.exespoolsv.exedescription ioc Process File opened for modification \??\c:\windows\resources\themes\explorer.exe 855219e8a3053596540245344f73bb6e7cf7d9f40da3caea1bc91d1a7cc0ba07.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
855219e8a3053596540245344f73bb6e7cf7d9f40da3caea1bc91d1a7cc0ba07.exeexplorer.exespoolsv.exesvchost.exespoolsv.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 855219e8a3053596540245344f73bb6e7cf7d9f40da3caea1bc91d1a7cc0ba07.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
855219e8a3053596540245344f73bb6e7cf7d9f40da3caea1bc91d1a7cc0ba07.exeexplorer.exepid Process 1856 855219e8a3053596540245344f73bb6e7cf7d9f40da3caea1bc91d1a7cc0ba07.exe 1856 855219e8a3053596540245344f73bb6e7cf7d9f40da3caea1bc91d1a7cc0ba07.exe 1856 855219e8a3053596540245344f73bb6e7cf7d9f40da3caea1bc91d1a7cc0ba07.exe 1856 855219e8a3053596540245344f73bb6e7cf7d9f40da3caea1bc91d1a7cc0ba07.exe 1856 855219e8a3053596540245344f73bb6e7cf7d9f40da3caea1bc91d1a7cc0ba07.exe 1856 855219e8a3053596540245344f73bb6e7cf7d9f40da3caea1bc91d1a7cc0ba07.exe 1856 855219e8a3053596540245344f73bb6e7cf7d9f40da3caea1bc91d1a7cc0ba07.exe 1856 855219e8a3053596540245344f73bb6e7cf7d9f40da3caea1bc91d1a7cc0ba07.exe 1856 855219e8a3053596540245344f73bb6e7cf7d9f40da3caea1bc91d1a7cc0ba07.exe 1856 855219e8a3053596540245344f73bb6e7cf7d9f40da3caea1bc91d1a7cc0ba07.exe 1856 855219e8a3053596540245344f73bb6e7cf7d9f40da3caea1bc91d1a7cc0ba07.exe 1856 855219e8a3053596540245344f73bb6e7cf7d9f40da3caea1bc91d1a7cc0ba07.exe 1856 855219e8a3053596540245344f73bb6e7cf7d9f40da3caea1bc91d1a7cc0ba07.exe 1856 855219e8a3053596540245344f73bb6e7cf7d9f40da3caea1bc91d1a7cc0ba07.exe 1856 855219e8a3053596540245344f73bb6e7cf7d9f40da3caea1bc91d1a7cc0ba07.exe 1856 855219e8a3053596540245344f73bb6e7cf7d9f40da3caea1bc91d1a7cc0ba07.exe 1856 855219e8a3053596540245344f73bb6e7cf7d9f40da3caea1bc91d1a7cc0ba07.exe 1856 855219e8a3053596540245344f73bb6e7cf7d9f40da3caea1bc91d1a7cc0ba07.exe 1856 855219e8a3053596540245344f73bb6e7cf7d9f40da3caea1bc91d1a7cc0ba07.exe 1856 855219e8a3053596540245344f73bb6e7cf7d9f40da3caea1bc91d1a7cc0ba07.exe 1856 855219e8a3053596540245344f73bb6e7cf7d9f40da3caea1bc91d1a7cc0ba07.exe 1856 855219e8a3053596540245344f73bb6e7cf7d9f40da3caea1bc91d1a7cc0ba07.exe 1856 855219e8a3053596540245344f73bb6e7cf7d9f40da3caea1bc91d1a7cc0ba07.exe 1856 855219e8a3053596540245344f73bb6e7cf7d9f40da3caea1bc91d1a7cc0ba07.exe 1856 855219e8a3053596540245344f73bb6e7cf7d9f40da3caea1bc91d1a7cc0ba07.exe 1856 855219e8a3053596540245344f73bb6e7cf7d9f40da3caea1bc91d1a7cc0ba07.exe 1856 855219e8a3053596540245344f73bb6e7cf7d9f40da3caea1bc91d1a7cc0ba07.exe 1856 855219e8a3053596540245344f73bb6e7cf7d9f40da3caea1bc91d1a7cc0ba07.exe 1856 855219e8a3053596540245344f73bb6e7cf7d9f40da3caea1bc91d1a7cc0ba07.exe 1856 855219e8a3053596540245344f73bb6e7cf7d9f40da3caea1bc91d1a7cc0ba07.exe 1856 855219e8a3053596540245344f73bb6e7cf7d9f40da3caea1bc91d1a7cc0ba07.exe 1856 855219e8a3053596540245344f73bb6e7cf7d9f40da3caea1bc91d1a7cc0ba07.exe 1856 855219e8a3053596540245344f73bb6e7cf7d9f40da3caea1bc91d1a7cc0ba07.exe 1856 855219e8a3053596540245344f73bb6e7cf7d9f40da3caea1bc91d1a7cc0ba07.exe 3728 explorer.exe 3728 explorer.exe 3728 explorer.exe 3728 explorer.exe 3728 explorer.exe 3728 explorer.exe 3728 explorer.exe 3728 explorer.exe 3728 explorer.exe 3728 explorer.exe 3728 explorer.exe 3728 explorer.exe 3728 explorer.exe 3728 explorer.exe 3728 explorer.exe 3728 explorer.exe 3728 explorer.exe 3728 explorer.exe 3728 explorer.exe 3728 explorer.exe 3728 explorer.exe 3728 explorer.exe 3728 explorer.exe 3728 explorer.exe 3728 explorer.exe 3728 explorer.exe 3728 explorer.exe 3728 explorer.exe 3728 explorer.exe 3728 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
svchost.exeexplorer.exepid Process 1852 svchost.exe 3728 explorer.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
Processes:
855219e8a3053596540245344f73bb6e7cf7d9f40da3caea1bc91d1a7cc0ba07.exeexplorer.exespoolsv.exesvchost.exespoolsv.exepid Process 1856 855219e8a3053596540245344f73bb6e7cf7d9f40da3caea1bc91d1a7cc0ba07.exe 1856 855219e8a3053596540245344f73bb6e7cf7d9f40da3caea1bc91d1a7cc0ba07.exe 3728 explorer.exe 3728 explorer.exe 4004 spoolsv.exe 4004 spoolsv.exe 1852 svchost.exe 1852 svchost.exe 696 spoolsv.exe 696 spoolsv.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
855219e8a3053596540245344f73bb6e7cf7d9f40da3caea1bc91d1a7cc0ba07.exeexplorer.exespoolsv.exesvchost.exedescription pid Process procid_target PID 1856 wrote to memory of 3728 1856 855219e8a3053596540245344f73bb6e7cf7d9f40da3caea1bc91d1a7cc0ba07.exe 83 PID 1856 wrote to memory of 3728 1856 855219e8a3053596540245344f73bb6e7cf7d9f40da3caea1bc91d1a7cc0ba07.exe 83 PID 1856 wrote to memory of 3728 1856 855219e8a3053596540245344f73bb6e7cf7d9f40da3caea1bc91d1a7cc0ba07.exe 83 PID 3728 wrote to memory of 4004 3728 explorer.exe 84 PID 3728 wrote to memory of 4004 3728 explorer.exe 84 PID 3728 wrote to memory of 4004 3728 explorer.exe 84 PID 4004 wrote to memory of 1852 4004 spoolsv.exe 85 PID 4004 wrote to memory of 1852 4004 spoolsv.exe 85 PID 4004 wrote to memory of 1852 4004 spoolsv.exe 85 PID 1852 wrote to memory of 696 1852 svchost.exe 86 PID 1852 wrote to memory of 696 1852 svchost.exe 86 PID 1852 wrote to memory of 696 1852 svchost.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\855219e8a3053596540245344f73bb6e7cf7d9f40da3caea1bc91d1a7cc0ba07.exe"C:\Users\Admin\AppData\Local\Temp\855219e8a3053596540245344f73bb6e7cf7d9f40da3caea1bc91d1a7cc0ba07.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1856 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3728 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4004 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1852 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:696
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135KB
MD56876482ed4789509f928a73c8d2867f5
SHA1d8381d1b9860cb556555c17ae32fbda665f6764a
SHA256c75812f9c349026b1cb180b1af55cade10cdc8d0b4372165c9871931397cdf6c
SHA512d35ce89b4967b4ff2a4600a07181b8ea8d7123719faca5095b1d7963a6e16a0d69d570c87b0fadc24f59a9f703c759bd5b46295ab89484db474534294d9c152d
-
Filesize
135KB
MD55f3827bba526bb03e8d961d14a1cb4b7
SHA15471bfd8acfa4178ad1f83744c0e40f57b27d79c
SHA256095c70da1ca47371d5532c22cd9da8173ce14930b26e7ea13e8068552e6e4978
SHA512cf4105a7a3cd78996088b8009bf1562bf324c0fda77366ff6e924c857807c8d813c38a6780db9b2529c45781139a6e0ba88b22c72a8c440b693306bcc751c128
-
Filesize
135KB
MD5f1151dcccaf9d6f6528ab1eab60f9a7f
SHA17b08af198a8f9404ce94ba1dd82ae4241531c25e
SHA256ee98ab1a673d2a04972dbc22350b40665025b5067e5751dcbbbb6b48a05b7439
SHA512418b2138a4fb051042ed3d2ea3854d1162cf5c64a83736c1595ae1a0dbe06cd5012e54041f34312de69e2f829845cc70e356484d57b662073ec8d6f31d1c7e9d