Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 09:03
Static task
static1
Behavioral task
behavioral1
Sample
d49bc433cf5da708864084ac81fd540db14a92ed57971e4b9a45bfee15439a6e.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
d49bc433cf5da708864084ac81fd540db14a92ed57971e4b9a45bfee15439a6e.exe
Resource
win10v2004-20241007-en
General
-
Target
d49bc433cf5da708864084ac81fd540db14a92ed57971e4b9a45bfee15439a6e.exe
-
Size
135KB
-
MD5
6846d3a6156030f790645430397d3d65
-
SHA1
be370f708018d3e34ef09b0199b3c93dac8304ac
-
SHA256
d49bc433cf5da708864084ac81fd540db14a92ed57971e4b9a45bfee15439a6e
-
SHA512
9b55a1d95f8fb5316f66198e35f75d36f1026e7ad51e1ab9da3fa7e7732f58b87afeb69ad3fd6035ea7ed2ea9a7b83073c66d4ce8438646e9656e8586df6e8cb
-
SSDEEP
1536:UfsEqouTRcG/Mzvgf7xEuvnXNTRdUzwTekUOisZ1yDDajtXbVhpalY:UVqoCl/YgjxEufVU0TbTyDDalQlY
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
Executes dropped EXE 4 IoCs
pid Process 2340 explorer.exe 2464 spoolsv.exe 2540 svchost.exe 2912 spoolsv.exe -
Loads dropped DLL 4 IoCs
pid Process 2392 d49bc433cf5da708864084ac81fd540db14a92ed57971e4b9a45bfee15439a6e.exe 2340 explorer.exe 2464 spoolsv.exe 2540 svchost.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\Resources\tjud.exe explorer.exe File opened for modification \??\c:\windows\resources\themes\explorer.exe d49bc433cf5da708864084ac81fd540db14a92ed57971e4b9a45bfee15439a6e.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d49bc433cf5da708864084ac81fd540db14a92ed57971e4b9a45bfee15439a6e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1996 schtasks.exe 1680 schtasks.exe 2968 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2392 d49bc433cf5da708864084ac81fd540db14a92ed57971e4b9a45bfee15439a6e.exe 2392 d49bc433cf5da708864084ac81fd540db14a92ed57971e4b9a45bfee15439a6e.exe 2392 d49bc433cf5da708864084ac81fd540db14a92ed57971e4b9a45bfee15439a6e.exe 2392 d49bc433cf5da708864084ac81fd540db14a92ed57971e4b9a45bfee15439a6e.exe 2392 d49bc433cf5da708864084ac81fd540db14a92ed57971e4b9a45bfee15439a6e.exe 2392 d49bc433cf5da708864084ac81fd540db14a92ed57971e4b9a45bfee15439a6e.exe 2392 d49bc433cf5da708864084ac81fd540db14a92ed57971e4b9a45bfee15439a6e.exe 2392 d49bc433cf5da708864084ac81fd540db14a92ed57971e4b9a45bfee15439a6e.exe 2392 d49bc433cf5da708864084ac81fd540db14a92ed57971e4b9a45bfee15439a6e.exe 2392 d49bc433cf5da708864084ac81fd540db14a92ed57971e4b9a45bfee15439a6e.exe 2392 d49bc433cf5da708864084ac81fd540db14a92ed57971e4b9a45bfee15439a6e.exe 2392 d49bc433cf5da708864084ac81fd540db14a92ed57971e4b9a45bfee15439a6e.exe 2392 d49bc433cf5da708864084ac81fd540db14a92ed57971e4b9a45bfee15439a6e.exe 2392 d49bc433cf5da708864084ac81fd540db14a92ed57971e4b9a45bfee15439a6e.exe 2392 d49bc433cf5da708864084ac81fd540db14a92ed57971e4b9a45bfee15439a6e.exe 2392 d49bc433cf5da708864084ac81fd540db14a92ed57971e4b9a45bfee15439a6e.exe 2392 d49bc433cf5da708864084ac81fd540db14a92ed57971e4b9a45bfee15439a6e.exe 2340 explorer.exe 2340 explorer.exe 2340 explorer.exe 2340 explorer.exe 2340 explorer.exe 2340 explorer.exe 2340 explorer.exe 2340 explorer.exe 2340 explorer.exe 2340 explorer.exe 2340 explorer.exe 2340 explorer.exe 2340 explorer.exe 2340 explorer.exe 2340 explorer.exe 2340 explorer.exe 2540 svchost.exe 2540 svchost.exe 2540 svchost.exe 2540 svchost.exe 2540 svchost.exe 2540 svchost.exe 2540 svchost.exe 2540 svchost.exe 2540 svchost.exe 2540 svchost.exe 2540 svchost.exe 2540 svchost.exe 2540 svchost.exe 2540 svchost.exe 2540 svchost.exe 2540 svchost.exe 2340 explorer.exe 2340 explorer.exe 2340 explorer.exe 2540 svchost.exe 2540 svchost.exe 2540 svchost.exe 2340 explorer.exe 2340 explorer.exe 2540 svchost.exe 2540 svchost.exe 2340 explorer.exe 2540 svchost.exe 2340 explorer.exe 2340 explorer.exe 2540 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2340 explorer.exe 2540 svchost.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 2392 d49bc433cf5da708864084ac81fd540db14a92ed57971e4b9a45bfee15439a6e.exe 2392 d49bc433cf5da708864084ac81fd540db14a92ed57971e4b9a45bfee15439a6e.exe 2340 explorer.exe 2340 explorer.exe 2464 spoolsv.exe 2464 spoolsv.exe 2540 svchost.exe 2540 svchost.exe 2912 spoolsv.exe 2912 spoolsv.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 2392 wrote to memory of 2340 2392 d49bc433cf5da708864084ac81fd540db14a92ed57971e4b9a45bfee15439a6e.exe 31 PID 2392 wrote to memory of 2340 2392 d49bc433cf5da708864084ac81fd540db14a92ed57971e4b9a45bfee15439a6e.exe 31 PID 2392 wrote to memory of 2340 2392 d49bc433cf5da708864084ac81fd540db14a92ed57971e4b9a45bfee15439a6e.exe 31 PID 2392 wrote to memory of 2340 2392 d49bc433cf5da708864084ac81fd540db14a92ed57971e4b9a45bfee15439a6e.exe 31 PID 2340 wrote to memory of 2464 2340 explorer.exe 32 PID 2340 wrote to memory of 2464 2340 explorer.exe 32 PID 2340 wrote to memory of 2464 2340 explorer.exe 32 PID 2340 wrote to memory of 2464 2340 explorer.exe 32 PID 2464 wrote to memory of 2540 2464 spoolsv.exe 33 PID 2464 wrote to memory of 2540 2464 spoolsv.exe 33 PID 2464 wrote to memory of 2540 2464 spoolsv.exe 33 PID 2464 wrote to memory of 2540 2464 spoolsv.exe 33 PID 2540 wrote to memory of 2912 2540 svchost.exe 34 PID 2540 wrote to memory of 2912 2540 svchost.exe 34 PID 2540 wrote to memory of 2912 2540 svchost.exe 34 PID 2540 wrote to memory of 2912 2540 svchost.exe 34 PID 2340 wrote to memory of 536 2340 explorer.exe 35 PID 2340 wrote to memory of 536 2340 explorer.exe 35 PID 2340 wrote to memory of 536 2340 explorer.exe 35 PID 2340 wrote to memory of 536 2340 explorer.exe 35 PID 2540 wrote to memory of 2968 2540 svchost.exe 36 PID 2540 wrote to memory of 2968 2540 svchost.exe 36 PID 2540 wrote to memory of 2968 2540 svchost.exe 36 PID 2540 wrote to memory of 2968 2540 svchost.exe 36 PID 2540 wrote to memory of 1996 2540 svchost.exe 39 PID 2540 wrote to memory of 1996 2540 svchost.exe 39 PID 2540 wrote to memory of 1996 2540 svchost.exe 39 PID 2540 wrote to memory of 1996 2540 svchost.exe 39 PID 2540 wrote to memory of 1680 2540 svchost.exe 42 PID 2540 wrote to memory of 1680 2540 svchost.exe 42 PID 2540 wrote to memory of 1680 2540 svchost.exe 42 PID 2540 wrote to memory of 1680 2540 svchost.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\d49bc433cf5da708864084ac81fd540db14a92ed57971e4b9a45bfee15439a6e.exe"C:\Users\Admin\AppData\Local\Temp\d49bc433cf5da708864084ac81fd540db14a92ed57971e4b9a45bfee15439a6e.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2392 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2340 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2464 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2540 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2912
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 09:05 /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2968
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 09:06 /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1996
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 09:07 /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1680
-
-
-
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe3⤵PID:536
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135KB
MD55cbe3d2ceb762b3e5cf884d179ea19a3
SHA10f1f40e9f51ac921f295cd2f1fe1b382d47682c7
SHA2568f81c010fdfaa80202c15c1df7c03b3686ebad1d84f036ade3a3ea07d41a9b57
SHA512b9e97ea09bd350d7de86490200601d1d0e095744b218557558f60115b3ba24a45a99fb4d7df6786f218bfd9d569dec279d82612ecf341618357b78940797c118
-
Filesize
135KB
MD506f6e9ef41bbaa167f70ca345bce0904
SHA1bcfe6a5f7f0d9f4e537d4fb5dd9930d994c5450c
SHA25601f0033e14a4ad73d79eca023685c0a546c35a18c83aecea4af36f21472c9065
SHA5120fc05c1ab1ff0d5ec753843ea62c9584301437eb4d1028706625f32b8d7552ed24dcf52bb8e486c7382956bd09085ab07cd8d2b91127da7dc2045960ff2fd353
-
Filesize
135KB
MD5b2b26ac16d07a3511aef93a013f48745
SHA1ed92709209c5fd0ce4db23cd6832a3b85a4e9dc2
SHA256d7344ae86eab78bff52b8752365985177e094e82ac7a96beac71f1293097aef8
SHA512c7672b0161ee5279d85a946589f6d5717ed4fd946bb2c64e5d4da44d841050cf3e0ab189036dba246e96c8c8649b6dcecaaf6c88cae8f2f98797ae9e74819e95