Analysis
-
max time kernel
19s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 09:12
Static task
static1
Behavioral task
behavioral1
Sample
d60c58e38b1de3e07ebcf36b8d8464568a9225aad58bdb438f3f14bfb3bc0f64.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d60c58e38b1de3e07ebcf36b8d8464568a9225aad58bdb438f3f14bfb3bc0f64.exe
Resource
win10v2004-20241007-en
General
-
Target
d60c58e38b1de3e07ebcf36b8d8464568a9225aad58bdb438f3f14bfb3bc0f64.exe
-
Size
135KB
-
MD5
950b8d7ea0857324d631fac44ed1e8d0
-
SHA1
60c200f453ff3dc77df5efcdc6bb50411c074645
-
SHA256
d60c58e38b1de3e07ebcf36b8d8464568a9225aad58bdb438f3f14bfb3bc0f64
-
SHA512
0511fa48f9f3437f228f98470cdf46f2ce56a63a8b8f9b38671d4161e0710b0dcb5331c1dbb5221f75e782168ecc36ca535934457fe888cb3d3bd48106eca4e2
-
SSDEEP
1536:UfsEqouTRcG/Mzvgf7xEuvnXNTRdUzwTekUOisZ1yDDajtXbVXY:UVqoCl/YgjxEufVU0TbTyDDalRY
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
Executes dropped EXE 4 IoCs
pid Process 3872 explorer.exe 676 spoolsv.exe 5044 svchost.exe 3932 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification \??\c:\windows\resources\themes\explorer.exe d60c58e38b1de3e07ebcf36b8d8464568a9225aad58bdb438f3f14bfb3bc0f64.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d60c58e38b1de3e07ebcf36b8d8464568a9225aad58bdb438f3f14bfb3bc0f64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 436 d60c58e38b1de3e07ebcf36b8d8464568a9225aad58bdb438f3f14bfb3bc0f64.exe 436 d60c58e38b1de3e07ebcf36b8d8464568a9225aad58bdb438f3f14bfb3bc0f64.exe 436 d60c58e38b1de3e07ebcf36b8d8464568a9225aad58bdb438f3f14bfb3bc0f64.exe 436 d60c58e38b1de3e07ebcf36b8d8464568a9225aad58bdb438f3f14bfb3bc0f64.exe 436 d60c58e38b1de3e07ebcf36b8d8464568a9225aad58bdb438f3f14bfb3bc0f64.exe 436 d60c58e38b1de3e07ebcf36b8d8464568a9225aad58bdb438f3f14bfb3bc0f64.exe 436 d60c58e38b1de3e07ebcf36b8d8464568a9225aad58bdb438f3f14bfb3bc0f64.exe 436 d60c58e38b1de3e07ebcf36b8d8464568a9225aad58bdb438f3f14bfb3bc0f64.exe 436 d60c58e38b1de3e07ebcf36b8d8464568a9225aad58bdb438f3f14bfb3bc0f64.exe 436 d60c58e38b1de3e07ebcf36b8d8464568a9225aad58bdb438f3f14bfb3bc0f64.exe 436 d60c58e38b1de3e07ebcf36b8d8464568a9225aad58bdb438f3f14bfb3bc0f64.exe 436 d60c58e38b1de3e07ebcf36b8d8464568a9225aad58bdb438f3f14bfb3bc0f64.exe 436 d60c58e38b1de3e07ebcf36b8d8464568a9225aad58bdb438f3f14bfb3bc0f64.exe 436 d60c58e38b1de3e07ebcf36b8d8464568a9225aad58bdb438f3f14bfb3bc0f64.exe 436 d60c58e38b1de3e07ebcf36b8d8464568a9225aad58bdb438f3f14bfb3bc0f64.exe 436 d60c58e38b1de3e07ebcf36b8d8464568a9225aad58bdb438f3f14bfb3bc0f64.exe 436 d60c58e38b1de3e07ebcf36b8d8464568a9225aad58bdb438f3f14bfb3bc0f64.exe 436 d60c58e38b1de3e07ebcf36b8d8464568a9225aad58bdb438f3f14bfb3bc0f64.exe 436 d60c58e38b1de3e07ebcf36b8d8464568a9225aad58bdb438f3f14bfb3bc0f64.exe 436 d60c58e38b1de3e07ebcf36b8d8464568a9225aad58bdb438f3f14bfb3bc0f64.exe 436 d60c58e38b1de3e07ebcf36b8d8464568a9225aad58bdb438f3f14bfb3bc0f64.exe 436 d60c58e38b1de3e07ebcf36b8d8464568a9225aad58bdb438f3f14bfb3bc0f64.exe 436 d60c58e38b1de3e07ebcf36b8d8464568a9225aad58bdb438f3f14bfb3bc0f64.exe 436 d60c58e38b1de3e07ebcf36b8d8464568a9225aad58bdb438f3f14bfb3bc0f64.exe 436 d60c58e38b1de3e07ebcf36b8d8464568a9225aad58bdb438f3f14bfb3bc0f64.exe 436 d60c58e38b1de3e07ebcf36b8d8464568a9225aad58bdb438f3f14bfb3bc0f64.exe 436 d60c58e38b1de3e07ebcf36b8d8464568a9225aad58bdb438f3f14bfb3bc0f64.exe 436 d60c58e38b1de3e07ebcf36b8d8464568a9225aad58bdb438f3f14bfb3bc0f64.exe 436 d60c58e38b1de3e07ebcf36b8d8464568a9225aad58bdb438f3f14bfb3bc0f64.exe 436 d60c58e38b1de3e07ebcf36b8d8464568a9225aad58bdb438f3f14bfb3bc0f64.exe 436 d60c58e38b1de3e07ebcf36b8d8464568a9225aad58bdb438f3f14bfb3bc0f64.exe 436 d60c58e38b1de3e07ebcf36b8d8464568a9225aad58bdb438f3f14bfb3bc0f64.exe 436 d60c58e38b1de3e07ebcf36b8d8464568a9225aad58bdb438f3f14bfb3bc0f64.exe 436 d60c58e38b1de3e07ebcf36b8d8464568a9225aad58bdb438f3f14bfb3bc0f64.exe 3872 explorer.exe 3872 explorer.exe 3872 explorer.exe 3872 explorer.exe 3872 explorer.exe 3872 explorer.exe 3872 explorer.exe 3872 explorer.exe 3872 explorer.exe 3872 explorer.exe 3872 explorer.exe 3872 explorer.exe 3872 explorer.exe 3872 explorer.exe 3872 explorer.exe 3872 explorer.exe 3872 explorer.exe 3872 explorer.exe 3872 explorer.exe 3872 explorer.exe 3872 explorer.exe 3872 explorer.exe 3872 explorer.exe 3872 explorer.exe 3872 explorer.exe 3872 explorer.exe 3872 explorer.exe 3872 explorer.exe 3872 explorer.exe 3872 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 5044 svchost.exe 3872 explorer.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 436 d60c58e38b1de3e07ebcf36b8d8464568a9225aad58bdb438f3f14bfb3bc0f64.exe 436 d60c58e38b1de3e07ebcf36b8d8464568a9225aad58bdb438f3f14bfb3bc0f64.exe 3872 explorer.exe 3872 explorer.exe 676 spoolsv.exe 676 spoolsv.exe 5044 svchost.exe 5044 svchost.exe 3932 spoolsv.exe 3932 spoolsv.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 436 wrote to memory of 3872 436 d60c58e38b1de3e07ebcf36b8d8464568a9225aad58bdb438f3f14bfb3bc0f64.exe 83 PID 436 wrote to memory of 3872 436 d60c58e38b1de3e07ebcf36b8d8464568a9225aad58bdb438f3f14bfb3bc0f64.exe 83 PID 436 wrote to memory of 3872 436 d60c58e38b1de3e07ebcf36b8d8464568a9225aad58bdb438f3f14bfb3bc0f64.exe 83 PID 3872 wrote to memory of 676 3872 explorer.exe 84 PID 3872 wrote to memory of 676 3872 explorer.exe 84 PID 3872 wrote to memory of 676 3872 explorer.exe 84 PID 676 wrote to memory of 5044 676 spoolsv.exe 85 PID 676 wrote to memory of 5044 676 spoolsv.exe 85 PID 676 wrote to memory of 5044 676 spoolsv.exe 85 PID 5044 wrote to memory of 3932 5044 svchost.exe 86 PID 5044 wrote to memory of 3932 5044 svchost.exe 86 PID 5044 wrote to memory of 3932 5044 svchost.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\d60c58e38b1de3e07ebcf36b8d8464568a9225aad58bdb438f3f14bfb3bc0f64.exe"C:\Users\Admin\AppData\Local\Temp\d60c58e38b1de3e07ebcf36b8d8464568a9225aad58bdb438f3f14bfb3bc0f64.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:436 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3872 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:676 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5044 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3932
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135KB
MD58937db4fc097da6647a8ae14b285d50b
SHA1a312768c129cd578598e55fc301ddd7b0e6063e2
SHA256521c8673b5d858dd047123d99fef988c9a1d4cd4661e18f675e449b94b325b94
SHA512ceeb461b87c1d3ca24c437cd86a38d4c67a9d376338c09cbaf75c6ed9c0110de920b282eed51a88b5685c4162b9af3cd2622455c91d53bf47431283ae350ba62
-
Filesize
135KB
MD52421c17158fdf2d0573b0d41a690aff9
SHA1fee05fd0a1e27546d138b235d99596f02247be7a
SHA256624be13e973eb3e542f4dba6587bcc43a422376ea7bfca091e9c23a03c68f9c5
SHA512ed17d444885637df59cf9a91bcd7246346268b775dc4eabdec66fe94eb1b1c990118d7e30b07173df0b8d879b56df65f9c80d1fd6652f538a0958cdceb7e8a9c
-
Filesize
135KB
MD5e20b05cad62d76432d7e19377cb4157b
SHA11ebafb45ad6faebee649ccd8104886a2b3db3f2c
SHA2560b220368be40df07a1c88059194d19771eba9c11d2a5eb014b1fb6b9a7e523c4
SHA5125f42656b2b53ead664015d54a1b06a10e9368fcc3a12d373f604778c558164d841aec5d8b832d7532f397b49b5e6b1646d663c9d58c5aef11914bf4c0ab9c9a2