Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 10:44
Static task
static1
Behavioral task
behavioral1
Sample
e74ae27eecf9fa69550fb02faa1935046cc07a0f6cd569fbce89586076b0c11d.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
e74ae27eecf9fa69550fb02faa1935046cc07a0f6cd569fbce89586076b0c11d.exe
Resource
win10v2004-20241007-en
General
-
Target
e74ae27eecf9fa69550fb02faa1935046cc07a0f6cd569fbce89586076b0c11d.exe
-
Size
135KB
-
MD5
f633dcd5ab168a91ecd4b699d0a73034
-
SHA1
1c65c881f5a14f505d58c466835492173ae96910
-
SHA256
e74ae27eecf9fa69550fb02faa1935046cc07a0f6cd569fbce89586076b0c11d
-
SHA512
3ede214b33bcbfb481062ce399f5bdd6410e7a381c0a70657c471100225db482add65d9ae919bb1c3be87d4f4712882364a3a4b25552bd03afb45da202e02a9e
-
SSDEEP
1536:UfsEqouTRcG/Mzvgf7xEuvnXNTRdUzwTekUOisZ1yDDajtXbVBl8sL:UVqoCl/YgjxEufVU0TbTyDDalPlfL
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
Processes:
explorer.exesvchost.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Executes dropped EXE 4 IoCs
Processes:
explorer.exespoolsv.exesvchost.exespoolsv.exepid process 4104 explorer.exe 3596 spoolsv.exe 404 svchost.exe 2516 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
explorer.exesvchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe -
Drops file in System32 directory 2 IoCs
Processes:
explorer.exesvchost.exedescription ioc process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Drops file in Windows directory 4 IoCs
Processes:
explorer.exee74ae27eecf9fa69550fb02faa1935046cc07a0f6cd569fbce89586076b0c11d.exespoolsv.exedescription ioc process File opened for modification C:\Windows\Resources\tjud.exe explorer.exe File opened for modification \??\c:\windows\resources\themes\explorer.exe e74ae27eecf9fa69550fb02faa1935046cc07a0f6cd569fbce89586076b0c11d.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
explorer.exespoolsv.exesvchost.exespoolsv.exee74ae27eecf9fa69550fb02faa1935046cc07a0f6cd569fbce89586076b0c11d.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e74ae27eecf9fa69550fb02faa1935046cc07a0f6cd569fbce89586076b0c11d.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
e74ae27eecf9fa69550fb02faa1935046cc07a0f6cd569fbce89586076b0c11d.exeexplorer.exepid process 4368 e74ae27eecf9fa69550fb02faa1935046cc07a0f6cd569fbce89586076b0c11d.exe 4368 e74ae27eecf9fa69550fb02faa1935046cc07a0f6cd569fbce89586076b0c11d.exe 4368 e74ae27eecf9fa69550fb02faa1935046cc07a0f6cd569fbce89586076b0c11d.exe 4368 e74ae27eecf9fa69550fb02faa1935046cc07a0f6cd569fbce89586076b0c11d.exe 4368 e74ae27eecf9fa69550fb02faa1935046cc07a0f6cd569fbce89586076b0c11d.exe 4368 e74ae27eecf9fa69550fb02faa1935046cc07a0f6cd569fbce89586076b0c11d.exe 4368 e74ae27eecf9fa69550fb02faa1935046cc07a0f6cd569fbce89586076b0c11d.exe 4368 e74ae27eecf9fa69550fb02faa1935046cc07a0f6cd569fbce89586076b0c11d.exe 4368 e74ae27eecf9fa69550fb02faa1935046cc07a0f6cd569fbce89586076b0c11d.exe 4368 e74ae27eecf9fa69550fb02faa1935046cc07a0f6cd569fbce89586076b0c11d.exe 4368 e74ae27eecf9fa69550fb02faa1935046cc07a0f6cd569fbce89586076b0c11d.exe 4368 e74ae27eecf9fa69550fb02faa1935046cc07a0f6cd569fbce89586076b0c11d.exe 4368 e74ae27eecf9fa69550fb02faa1935046cc07a0f6cd569fbce89586076b0c11d.exe 4368 e74ae27eecf9fa69550fb02faa1935046cc07a0f6cd569fbce89586076b0c11d.exe 4368 e74ae27eecf9fa69550fb02faa1935046cc07a0f6cd569fbce89586076b0c11d.exe 4368 e74ae27eecf9fa69550fb02faa1935046cc07a0f6cd569fbce89586076b0c11d.exe 4368 e74ae27eecf9fa69550fb02faa1935046cc07a0f6cd569fbce89586076b0c11d.exe 4368 e74ae27eecf9fa69550fb02faa1935046cc07a0f6cd569fbce89586076b0c11d.exe 4368 e74ae27eecf9fa69550fb02faa1935046cc07a0f6cd569fbce89586076b0c11d.exe 4368 e74ae27eecf9fa69550fb02faa1935046cc07a0f6cd569fbce89586076b0c11d.exe 4368 e74ae27eecf9fa69550fb02faa1935046cc07a0f6cd569fbce89586076b0c11d.exe 4368 e74ae27eecf9fa69550fb02faa1935046cc07a0f6cd569fbce89586076b0c11d.exe 4368 e74ae27eecf9fa69550fb02faa1935046cc07a0f6cd569fbce89586076b0c11d.exe 4368 e74ae27eecf9fa69550fb02faa1935046cc07a0f6cd569fbce89586076b0c11d.exe 4368 e74ae27eecf9fa69550fb02faa1935046cc07a0f6cd569fbce89586076b0c11d.exe 4368 e74ae27eecf9fa69550fb02faa1935046cc07a0f6cd569fbce89586076b0c11d.exe 4368 e74ae27eecf9fa69550fb02faa1935046cc07a0f6cd569fbce89586076b0c11d.exe 4368 e74ae27eecf9fa69550fb02faa1935046cc07a0f6cd569fbce89586076b0c11d.exe 4368 e74ae27eecf9fa69550fb02faa1935046cc07a0f6cd569fbce89586076b0c11d.exe 4368 e74ae27eecf9fa69550fb02faa1935046cc07a0f6cd569fbce89586076b0c11d.exe 4368 e74ae27eecf9fa69550fb02faa1935046cc07a0f6cd569fbce89586076b0c11d.exe 4368 e74ae27eecf9fa69550fb02faa1935046cc07a0f6cd569fbce89586076b0c11d.exe 4368 e74ae27eecf9fa69550fb02faa1935046cc07a0f6cd569fbce89586076b0c11d.exe 4368 e74ae27eecf9fa69550fb02faa1935046cc07a0f6cd569fbce89586076b0c11d.exe 4104 explorer.exe 4104 explorer.exe 4104 explorer.exe 4104 explorer.exe 4104 explorer.exe 4104 explorer.exe 4104 explorer.exe 4104 explorer.exe 4104 explorer.exe 4104 explorer.exe 4104 explorer.exe 4104 explorer.exe 4104 explorer.exe 4104 explorer.exe 4104 explorer.exe 4104 explorer.exe 4104 explorer.exe 4104 explorer.exe 4104 explorer.exe 4104 explorer.exe 4104 explorer.exe 4104 explorer.exe 4104 explorer.exe 4104 explorer.exe 4104 explorer.exe 4104 explorer.exe 4104 explorer.exe 4104 explorer.exe 4104 explorer.exe 4104 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
explorer.exesvchost.exepid process 4104 explorer.exe 404 svchost.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
Processes:
e74ae27eecf9fa69550fb02faa1935046cc07a0f6cd569fbce89586076b0c11d.exeexplorer.exespoolsv.exesvchost.exespoolsv.exepid process 4368 e74ae27eecf9fa69550fb02faa1935046cc07a0f6cd569fbce89586076b0c11d.exe 4368 e74ae27eecf9fa69550fb02faa1935046cc07a0f6cd569fbce89586076b0c11d.exe 4104 explorer.exe 4104 explorer.exe 3596 spoolsv.exe 3596 spoolsv.exe 404 svchost.exe 404 svchost.exe 2516 spoolsv.exe 2516 spoolsv.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
e74ae27eecf9fa69550fb02faa1935046cc07a0f6cd569fbce89586076b0c11d.exeexplorer.exespoolsv.exesvchost.exedescription pid process target process PID 4368 wrote to memory of 4104 4368 e74ae27eecf9fa69550fb02faa1935046cc07a0f6cd569fbce89586076b0c11d.exe explorer.exe PID 4368 wrote to memory of 4104 4368 e74ae27eecf9fa69550fb02faa1935046cc07a0f6cd569fbce89586076b0c11d.exe explorer.exe PID 4368 wrote to memory of 4104 4368 e74ae27eecf9fa69550fb02faa1935046cc07a0f6cd569fbce89586076b0c11d.exe explorer.exe PID 4104 wrote to memory of 3596 4104 explorer.exe spoolsv.exe PID 4104 wrote to memory of 3596 4104 explorer.exe spoolsv.exe PID 4104 wrote to memory of 3596 4104 explorer.exe spoolsv.exe PID 3596 wrote to memory of 404 3596 spoolsv.exe svchost.exe PID 3596 wrote to memory of 404 3596 spoolsv.exe svchost.exe PID 3596 wrote to memory of 404 3596 spoolsv.exe svchost.exe PID 404 wrote to memory of 2516 404 svchost.exe spoolsv.exe PID 404 wrote to memory of 2516 404 svchost.exe spoolsv.exe PID 404 wrote to memory of 2516 404 svchost.exe spoolsv.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e74ae27eecf9fa69550fb02faa1935046cc07a0f6cd569fbce89586076b0c11d.exe"C:\Users\Admin\AppData\Local\Temp\e74ae27eecf9fa69550fb02faa1935046cc07a0f6cd569fbce89586076b0c11d.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4368 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4104 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3596 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:404 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2516
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135KB
MD53bd81efb135436450e6c6228b5169023
SHA1b4219317d7835658cae3e3829f66af583dac8b0b
SHA2560528444972e7d9f387056dc731f04b13f4ec5de113da7c9d357906c93d1f04db
SHA512d54490bb6f90278bc0074be5a5e5e8aa436ad1eb4c008d8dc9556cd6a69814f1a64b1f65708c477b411145a7edb82329acb5c0ee1945456bcda9ca5b2aec4af6
-
Filesize
135KB
MD515aa5ad9695968179c8b31f65ad395a9
SHA128ed80f6c40ed56523910cd45ca97aae56fcec4a
SHA256b457847dd71341f99b65d413502a581657fc2676471b4ed205cbb2f741abbd55
SHA51285a61eebc1b0afaf99f7a0480ebe056017f8e8c29569011da1adcaf3c24ac2c915857cf705b565709e5b1ad3a3f4e5b19257d0f0c52b268491acc2f0dc0c9f2e
-
Filesize
135KB
MD542edc6340844454246b84139b0158168
SHA12919e8bbfa7ce4931834d8fa80096fa140a6ac9a
SHA2564557e55d77ffac69e0c0e6064f7ed20c2d291ecebedb51eaf5ce8ead9f880846
SHA5121cc87d56fe2db0379652c7dd378dd2fc8255ecfce816732f2e95192c87d9848189694bb757ccf5734406831608a73a5052b010f9415061ae0f9b990783340ed9