Analysis

  • max time kernel
    30s
  • max time network
    18s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20241023-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    21-11-2024 12:02

General

  • Target

    temp.exe

  • Size

    2.7MB

  • MD5

    80e3cf78b36403d94dc167fb157241a7

  • SHA1

    990c00b029bb0006968d5ff970257793a94e5429

  • SHA256

    64be767713553d9381add65aa62e302691a86257c087ddbaccdf56f7b905cb31

  • SHA512

    7eaf50cd1a18a77737522d85084f7bca394ac7f2e6afdef96a0fbc47ba33c3d7d543d12ce8cc106203ffeb3c20bee63f099f7ca2817d9ba2ff821ae342c023ad

  • SSDEEP

    49152:smuk6Flic1CcPANlX7c8TuQsRVg+HIbHczjzXThtYJtkE:+XCKfDNlsCE

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 6 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 37 IoCs
  • Suspicious use of SendNotifyMessage 37 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\temp.exe
    "C:\Users\Admin\AppData\Local\Temp\temp.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4552
    • \??\c:\users\admin\appdata\local\temp\temp.exe 
      c:\users\admin\appdata\local\temp\temp.exe 
      2⤵
      • Executes dropped EXE
      PID:5068
    • C:\Windows\Resources\Themes\icsys.icn.exe
      C:\Windows\Resources\Themes\icsys.icn.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3468
      • \??\c:\windows\resources\themes\explorer.exe
        c:\windows\resources\themes\explorer.exe
        3⤵
        • Modifies visiblity of hidden/system files in Explorer
        • Executes dropped EXE
        • Adds Run key to start application
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1228
        • \??\c:\windows\resources\spoolsv.exe
          c:\windows\resources\spoolsv.exe SE
          4⤵
          • Executes dropped EXE
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:4400
          • \??\c:\windows\resources\svchost.exe
            c:\windows\resources\svchost.exe
            5⤵
            • Modifies visiblity of hidden/system files in Explorer
            • Executes dropped EXE
            • Adds Run key to start application
            • Drops file in System32 directory
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:5104
            • \??\c:\windows\resources\spoolsv.exe
              c:\windows\resources\spoolsv.exe PR
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of SetWindowsHookEx
              PID:4648
  • C:\Windows\system32\taskmgr.exe
    "C:\Windows\system32\taskmgr.exe" /4
    1⤵
    • Checks SCSI registry key(s)
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:3312
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:4372

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\temp.exe 

      Filesize

      2.6MB

      MD5

      f19e882a33d21b592907a8866d5a5ccc

      SHA1

      cdf3496e95505e93011d75832d756f679150fd87

      SHA256

      1b0843d77be37f4e6c54e8e0940bfe44bdd4c084c08f432b3cd4fc716f19f82a

      SHA512

      569971c96c8540d59a9cd2c472355ca2cca6be8c7cf25be531663e309ba24234b8aac4a1c8da0f631f2a785240618633c012ec87552768ccf6fe0612008cd30a

    • C:\Windows\Resources\Themes\explorer.exe

      Filesize

      135KB

      MD5

      1d0e934c1cbb3d7e9ba1d2d0bba0a134

      SHA1

      787194cc2330d0a4ae523a9502cd49cb6ebd3e69

      SHA256

      fbc5c73a91ce0f6511a776cac2345ce35edf49524cd0e842960249cd7caf91ba

      SHA512

      e7e1ce2060c4b0a07e06f58d619f2f8e587db845a5b32530915682b50863edd087a21a1198cb7691a3cab12051d57f569571ea45075d59addf52fbbe1e926f47

    • C:\Windows\Resources\Themes\icsys.icn.exe

      Filesize

      135KB

      MD5

      0df007d4164b36b476945aa3ee23b740

      SHA1

      8b8e30289b3d6878665196fdd4e5f69756323b6d

      SHA256

      54f4d8ea7768f201590f3532d6dcf1ad2d3bb0e8416a03a473dc94730db8223c

      SHA512

      c253c92e3ceec8929a7fc488df1f5f43e43aefb01febfa4aec88bd0a589bcc59690c81b5238d3e25226121eb2affab8056ecef99dd4a00de42a4a13e3eb794c9

    • C:\Windows\Resources\spoolsv.exe

      Filesize

      135KB

      MD5

      9c60b1ef6f3cd4dc8a4e1c9cb709d3fa

      SHA1

      3ac391d4b5fdb38217e763c87381391819367060

      SHA256

      7fecc45ad648202beafda47450b20165e55eb4745946497de4fbada896544b52

      SHA512

      2004fd1bfc9075df9c184cb679db48d214f5c1bff14e68da11b897f3d65450e6e98a287f475dd632aa2992b38baa1ac3afda74b1f1488d7210424599778c3e1a

    • \??\c:\windows\resources\svchost.exe

      Filesize

      135KB

      MD5

      bbfa343be23483198f490cee9034a673

      SHA1

      bd77041f56457545914b9cd79ff154df11aab51d

      SHA256

      8bc23d79307a9c38345306e181097e8ea2a97f8f670eb586c00c2947f187d7c8

      SHA512

      52aa41fe6490be42611193070512e3c705180927b5149e82cf1d016cd214d40adecc7751a21c0ccd6fcdc2d7032f542f256dbdabc51ad5a1294d7a42fd3c597a

    • memory/1228-20-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/3468-166-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/4400-72-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/4400-165-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/4552-167-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/4552-0-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/4648-109-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/5068-87-0x00007FFEA5210000-0x00007FFEA5408000-memory.dmp

      Filesize

      2.0MB

    • memory/5068-45-0x00007FFEA5210000-0x00007FFEA5408000-memory.dmp

      Filesize

      2.0MB

    • memory/5068-106-0x00007FFEA5210000-0x00007FFEA5408000-memory.dmp

      Filesize

      2.0MB

    • memory/5068-35-0x00007FFEA5210000-0x00007FFEA5408000-memory.dmp

      Filesize

      2.0MB

    • memory/5068-25-0x00007FFEA5210000-0x00007FFEA5408000-memory.dmp

      Filesize

      2.0MB

    • memory/5068-77-0x00007FFEA5210000-0x00007FFEA5408000-memory.dmp

      Filesize

      2.0MB

    • memory/5068-65-0x00007FFEA5210000-0x00007FFEA5408000-memory.dmp

      Filesize

      2.0MB

    • memory/5068-24-0x00007FFEA5210000-0x00007FFEA5408000-memory.dmp

      Filesize

      2.0MB

    • memory/5104-101-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB