Analysis
-
max time kernel
150s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 08:59
Static task
static1
Behavioral task
behavioral1
Sample
d49bc433cf5da708864084ac81fd540db14a92ed57971e4b9a45bfee15439a6e.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
d49bc433cf5da708864084ac81fd540db14a92ed57971e4b9a45bfee15439a6e.exe
Resource
win10v2004-20241007-en
General
-
Target
d49bc433cf5da708864084ac81fd540db14a92ed57971e4b9a45bfee15439a6e.exe
-
Size
135KB
-
MD5
6846d3a6156030f790645430397d3d65
-
SHA1
be370f708018d3e34ef09b0199b3c93dac8304ac
-
SHA256
d49bc433cf5da708864084ac81fd540db14a92ed57971e4b9a45bfee15439a6e
-
SHA512
9b55a1d95f8fb5316f66198e35f75d36f1026e7ad51e1ab9da3fa7e7732f58b87afeb69ad3fd6035ea7ed2ea9a7b83073c66d4ce8438646e9656e8586df6e8cb
-
SSDEEP
1536:UfsEqouTRcG/Mzvgf7xEuvnXNTRdUzwTekUOisZ1yDDajtXbVhpalY:UVqoCl/YgjxEufVU0TbTyDDalQlY
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
Processes:
svchost.exeexplorer.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
Executes dropped EXE 4 IoCs
Processes:
explorer.exespoolsv.exesvchost.exespoolsv.exepid process 3492 explorer.exe 1360 spoolsv.exe 316 svchost.exe 1316 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
explorer.exesvchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe -
Drops file in System32 directory 2 IoCs
Processes:
explorer.exesvchost.exedescription ioc process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Drops file in Windows directory 4 IoCs
Processes:
d49bc433cf5da708864084ac81fd540db14a92ed57971e4b9a45bfee15439a6e.exeexplorer.exespoolsv.exedescription ioc process File opened for modification \??\c:\windows\resources\themes\explorer.exe d49bc433cf5da708864084ac81fd540db14a92ed57971e4b9a45bfee15439a6e.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
svchost.exespoolsv.exed49bc433cf5da708864084ac81fd540db14a92ed57971e4b9a45bfee15439a6e.exeexplorer.exespoolsv.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d49bc433cf5da708864084ac81fd540db14a92ed57971e4b9a45bfee15439a6e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
d49bc433cf5da708864084ac81fd540db14a92ed57971e4b9a45bfee15439a6e.exeexplorer.exepid process 2856 d49bc433cf5da708864084ac81fd540db14a92ed57971e4b9a45bfee15439a6e.exe 2856 d49bc433cf5da708864084ac81fd540db14a92ed57971e4b9a45bfee15439a6e.exe 2856 d49bc433cf5da708864084ac81fd540db14a92ed57971e4b9a45bfee15439a6e.exe 2856 d49bc433cf5da708864084ac81fd540db14a92ed57971e4b9a45bfee15439a6e.exe 2856 d49bc433cf5da708864084ac81fd540db14a92ed57971e4b9a45bfee15439a6e.exe 2856 d49bc433cf5da708864084ac81fd540db14a92ed57971e4b9a45bfee15439a6e.exe 2856 d49bc433cf5da708864084ac81fd540db14a92ed57971e4b9a45bfee15439a6e.exe 2856 d49bc433cf5da708864084ac81fd540db14a92ed57971e4b9a45bfee15439a6e.exe 2856 d49bc433cf5da708864084ac81fd540db14a92ed57971e4b9a45bfee15439a6e.exe 2856 d49bc433cf5da708864084ac81fd540db14a92ed57971e4b9a45bfee15439a6e.exe 2856 d49bc433cf5da708864084ac81fd540db14a92ed57971e4b9a45bfee15439a6e.exe 2856 d49bc433cf5da708864084ac81fd540db14a92ed57971e4b9a45bfee15439a6e.exe 2856 d49bc433cf5da708864084ac81fd540db14a92ed57971e4b9a45bfee15439a6e.exe 2856 d49bc433cf5da708864084ac81fd540db14a92ed57971e4b9a45bfee15439a6e.exe 2856 d49bc433cf5da708864084ac81fd540db14a92ed57971e4b9a45bfee15439a6e.exe 2856 d49bc433cf5da708864084ac81fd540db14a92ed57971e4b9a45bfee15439a6e.exe 2856 d49bc433cf5da708864084ac81fd540db14a92ed57971e4b9a45bfee15439a6e.exe 2856 d49bc433cf5da708864084ac81fd540db14a92ed57971e4b9a45bfee15439a6e.exe 2856 d49bc433cf5da708864084ac81fd540db14a92ed57971e4b9a45bfee15439a6e.exe 2856 d49bc433cf5da708864084ac81fd540db14a92ed57971e4b9a45bfee15439a6e.exe 2856 d49bc433cf5da708864084ac81fd540db14a92ed57971e4b9a45bfee15439a6e.exe 2856 d49bc433cf5da708864084ac81fd540db14a92ed57971e4b9a45bfee15439a6e.exe 2856 d49bc433cf5da708864084ac81fd540db14a92ed57971e4b9a45bfee15439a6e.exe 2856 d49bc433cf5da708864084ac81fd540db14a92ed57971e4b9a45bfee15439a6e.exe 2856 d49bc433cf5da708864084ac81fd540db14a92ed57971e4b9a45bfee15439a6e.exe 2856 d49bc433cf5da708864084ac81fd540db14a92ed57971e4b9a45bfee15439a6e.exe 2856 d49bc433cf5da708864084ac81fd540db14a92ed57971e4b9a45bfee15439a6e.exe 2856 d49bc433cf5da708864084ac81fd540db14a92ed57971e4b9a45bfee15439a6e.exe 2856 d49bc433cf5da708864084ac81fd540db14a92ed57971e4b9a45bfee15439a6e.exe 2856 d49bc433cf5da708864084ac81fd540db14a92ed57971e4b9a45bfee15439a6e.exe 2856 d49bc433cf5da708864084ac81fd540db14a92ed57971e4b9a45bfee15439a6e.exe 2856 d49bc433cf5da708864084ac81fd540db14a92ed57971e4b9a45bfee15439a6e.exe 2856 d49bc433cf5da708864084ac81fd540db14a92ed57971e4b9a45bfee15439a6e.exe 2856 d49bc433cf5da708864084ac81fd540db14a92ed57971e4b9a45bfee15439a6e.exe 3492 explorer.exe 3492 explorer.exe 3492 explorer.exe 3492 explorer.exe 3492 explorer.exe 3492 explorer.exe 3492 explorer.exe 3492 explorer.exe 3492 explorer.exe 3492 explorer.exe 3492 explorer.exe 3492 explorer.exe 3492 explorer.exe 3492 explorer.exe 3492 explorer.exe 3492 explorer.exe 3492 explorer.exe 3492 explorer.exe 3492 explorer.exe 3492 explorer.exe 3492 explorer.exe 3492 explorer.exe 3492 explorer.exe 3492 explorer.exe 3492 explorer.exe 3492 explorer.exe 3492 explorer.exe 3492 explorer.exe 3492 explorer.exe 3492 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
explorer.exesvchost.exepid process 3492 explorer.exe 316 svchost.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
Processes:
d49bc433cf5da708864084ac81fd540db14a92ed57971e4b9a45bfee15439a6e.exeexplorer.exespoolsv.exesvchost.exespoolsv.exepid process 2856 d49bc433cf5da708864084ac81fd540db14a92ed57971e4b9a45bfee15439a6e.exe 2856 d49bc433cf5da708864084ac81fd540db14a92ed57971e4b9a45bfee15439a6e.exe 3492 explorer.exe 3492 explorer.exe 1360 spoolsv.exe 1360 spoolsv.exe 316 svchost.exe 316 svchost.exe 1316 spoolsv.exe 1316 spoolsv.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
d49bc433cf5da708864084ac81fd540db14a92ed57971e4b9a45bfee15439a6e.exeexplorer.exespoolsv.exesvchost.exedescription pid process target process PID 2856 wrote to memory of 3492 2856 d49bc433cf5da708864084ac81fd540db14a92ed57971e4b9a45bfee15439a6e.exe explorer.exe PID 2856 wrote to memory of 3492 2856 d49bc433cf5da708864084ac81fd540db14a92ed57971e4b9a45bfee15439a6e.exe explorer.exe PID 2856 wrote to memory of 3492 2856 d49bc433cf5da708864084ac81fd540db14a92ed57971e4b9a45bfee15439a6e.exe explorer.exe PID 3492 wrote to memory of 1360 3492 explorer.exe spoolsv.exe PID 3492 wrote to memory of 1360 3492 explorer.exe spoolsv.exe PID 3492 wrote to memory of 1360 3492 explorer.exe spoolsv.exe PID 1360 wrote to memory of 316 1360 spoolsv.exe svchost.exe PID 1360 wrote to memory of 316 1360 spoolsv.exe svchost.exe PID 1360 wrote to memory of 316 1360 spoolsv.exe svchost.exe PID 316 wrote to memory of 1316 316 svchost.exe spoolsv.exe PID 316 wrote to memory of 1316 316 svchost.exe spoolsv.exe PID 316 wrote to memory of 1316 316 svchost.exe spoolsv.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d49bc433cf5da708864084ac81fd540db14a92ed57971e4b9a45bfee15439a6e.exe"C:\Users\Admin\AppData\Local\Temp\d49bc433cf5da708864084ac81fd540db14a92ed57971e4b9a45bfee15439a6e.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2856 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3492 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1360 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:316 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1316
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135KB
MD5459fcc360b596f8c2416a89acddbb6ec
SHA1c466763acdec9c972dc39b04f62be5008fe33db2
SHA256ee25772fc956dad729ee78e488be3266f432af6876b27354ffb2d1642ea65ccd
SHA512d77706e8ef495b8d7aa56bb3a911b5ce310a4b29bdb0c610d75f96908379ea6dd4ec275548a3ad793350a9969b945f6387e59a253f959411ef9b94c61b7166c7
-
Filesize
135KB
MD5dee45538560613bd79ba059243788c67
SHA19e169abdfd4d9eb61d1107d3584793833a375ac3
SHA256fa32917933d0ec32e085c1be174366b0534c571ee66fa7633b15d436b2ceff62
SHA512b370f293258474d34ef1b9da980e10dbd54709dd5102800c55c74839892d444cf7727c7b60e890dbe780fa4c1b42ee98811db39cd50293e77624aff0c0b5a2c3
-
Filesize
135KB
MD5f0bfe25427804268216cee2a66e369e1
SHA1a2dca77c0ab0fe684f17c903644eee065b0679e2
SHA256aee0b4bd10d79081e08cbbf89afc9cd9b31e9cb0f0e5efea851804ff65fc5fd7
SHA512cf3d801aa9c9aa4b0dd1bb6e26f1cb6579d50e3f004fd2fe1f147885397ddb0cec89f3056abba14ae819c1f9de7099398ff2ee174afe17d5f6f7b350a9a482c0