Analysis
-
max time kernel
147s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 12:11
Static task
static1
Behavioral task
behavioral1
Sample
temp.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
temp.exe
Resource
win10v2004-20241007-en
General
-
Target
temp.exe
-
Size
2.7MB
-
MD5
80e3cf78b36403d94dc167fb157241a7
-
SHA1
990c00b029bb0006968d5ff970257793a94e5429
-
SHA256
64be767713553d9381add65aa62e302691a86257c087ddbaccdf56f7b905cb31
-
SHA512
7eaf50cd1a18a77737522d85084f7bca394ac7f2e6afdef96a0fbc47ba33c3d7d543d12ce8cc106203ffeb3c20bee63f099f7ca2817d9ba2ff821ae342c023ad
-
SSDEEP
49152:smuk6Flic1CcPANlX7c8TuQsRVg+HIbHczjzXThtYJtkE:+XCKfDNlsCE
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Executes dropped EXE 6 IoCs
pid Process 3040 temp.exe 3052 icsys.icn.exe 4820 explorer.exe 1196 spoolsv.exe 2100 svchost.exe 4016 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\Resources\Themes\icsys.icn.exe temp.exe File opened for modification \??\c:\windows\resources\themes\explorer.exe icsys.icn.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language temp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icsys.icn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2332 temp.exe 2332 temp.exe 2332 temp.exe 2332 temp.exe 2332 temp.exe 2332 temp.exe 2332 temp.exe 2332 temp.exe 2332 temp.exe 2332 temp.exe 2332 temp.exe 2332 temp.exe 2332 temp.exe 2332 temp.exe 2332 temp.exe 2332 temp.exe 2332 temp.exe 2332 temp.exe 2332 temp.exe 2332 temp.exe 2332 temp.exe 2332 temp.exe 2332 temp.exe 2332 temp.exe 2332 temp.exe 2332 temp.exe 2332 temp.exe 2332 temp.exe 2332 temp.exe 2332 temp.exe 2332 temp.exe 2332 temp.exe 3052 icsys.icn.exe 3052 icsys.icn.exe 3052 icsys.icn.exe 3052 icsys.icn.exe 3052 icsys.icn.exe 3052 icsys.icn.exe 3052 icsys.icn.exe 3052 icsys.icn.exe 3052 icsys.icn.exe 3052 icsys.icn.exe 3052 icsys.icn.exe 3052 icsys.icn.exe 3052 icsys.icn.exe 3052 icsys.icn.exe 3052 icsys.icn.exe 3052 icsys.icn.exe 3052 icsys.icn.exe 3052 icsys.icn.exe 3052 icsys.icn.exe 3052 icsys.icn.exe 3052 icsys.icn.exe 3052 icsys.icn.exe 3052 icsys.icn.exe 3052 icsys.icn.exe 3052 icsys.icn.exe 3052 icsys.icn.exe 3052 icsys.icn.exe 3052 icsys.icn.exe 3052 icsys.icn.exe 3052 icsys.icn.exe 3052 icsys.icn.exe 3052 icsys.icn.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 4820 explorer.exe 2100 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2332 temp.exe 2332 temp.exe 3052 icsys.icn.exe 3052 icsys.icn.exe 4820 explorer.exe 4820 explorer.exe 1196 spoolsv.exe 1196 spoolsv.exe 2100 svchost.exe 2100 svchost.exe 4016 spoolsv.exe 4016 spoolsv.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2332 wrote to memory of 3040 2332 temp.exe 82 PID 2332 wrote to memory of 3040 2332 temp.exe 82 PID 2332 wrote to memory of 3052 2332 temp.exe 84 PID 2332 wrote to memory of 3052 2332 temp.exe 84 PID 2332 wrote to memory of 3052 2332 temp.exe 84 PID 3052 wrote to memory of 4820 3052 icsys.icn.exe 85 PID 3052 wrote to memory of 4820 3052 icsys.icn.exe 85 PID 3052 wrote to memory of 4820 3052 icsys.icn.exe 85 PID 4820 wrote to memory of 1196 4820 explorer.exe 86 PID 4820 wrote to memory of 1196 4820 explorer.exe 86 PID 4820 wrote to memory of 1196 4820 explorer.exe 86 PID 1196 wrote to memory of 2100 1196 spoolsv.exe 87 PID 1196 wrote to memory of 2100 1196 spoolsv.exe 87 PID 1196 wrote to memory of 2100 1196 spoolsv.exe 87 PID 2100 wrote to memory of 4016 2100 svchost.exe 88 PID 2100 wrote to memory of 4016 2100 svchost.exe 88 PID 2100 wrote to memory of 4016 2100 svchost.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\temp.exe"C:\Users\Admin\AppData\Local\Temp\temp.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2332 -
\??\c:\users\admin\appdata\local\temp\temp.exec:\users\admin\appdata\local\temp\temp.exe2⤵
- Executes dropped EXE
PID:3040
-
-
C:\Windows\Resources\Themes\icsys.icn.exeC:\Windows\Resources\Themes\icsys.icn.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3052 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe3⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4820 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE4⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1196 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe5⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2100 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4016
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135KB
MD56e3625f2c270acc71f37d028535883a4
SHA1be3e5870ca4d716e739211765c41327b9be2ae5b
SHA256f0ec345cdafaf7dbd56a986a22f03fde47cbd71418173f34289f12ac6263f59e
SHA512fdfc796f1414d3d67da1e14f72d8561d995e4354a5b927ad40c460917d7b31e55b38fc7b6e8083c2204b318c6bef66643a9ba5992beb98b13f0e7e2a6bc1509a
-
Filesize
135KB
MD50df007d4164b36b476945aa3ee23b740
SHA18b8e30289b3d6878665196fdd4e5f69756323b6d
SHA25654f4d8ea7768f201590f3532d6dcf1ad2d3bb0e8416a03a473dc94730db8223c
SHA512c253c92e3ceec8929a7fc488df1f5f43e43aefb01febfa4aec88bd0a589bcc59690c81b5238d3e25226121eb2affab8056ecef99dd4a00de42a4a13e3eb794c9
-
Filesize
135KB
MD518e03fcaa381713935c6e96c9c912a40
SHA167cd7d2303c9ecaf7a3c3b8818224db38fe4d186
SHA256f98c6fe0ac661b26aea5add3b15e144b3172b5609c1ebc69335d60bcdaf3447b
SHA5124717635e2e3eb406bf82693334037eda1e17c6aacaa8b7704d0c255d08a0e639e1e9e84ccfd30f3387e82de4829ba7842ffc4b46aa27ee8dbb582c5694ac17ab
-
Filesize
135KB
MD54010770736ac8bfe7369ab467a5eab6f
SHA174ae347ef10fec1d2a7474605e8c8b498a3f8106
SHA256edef7aa4cf774a50f359984233a75a9f2e2cd5a63649203fe18592785a4541d9
SHA5127610cb6bb703d32712b91e2b92a7683cf81b050821d3fdbe76031ee4f432ec0c4870fd2c51df2d525a69995170e470e8089589614e4f3559964009043256f02d
-
Filesize
2.6MB
MD5f19e882a33d21b592907a8866d5a5ccc
SHA1cdf3496e95505e93011d75832d756f679150fd87
SHA2561b0843d77be37f4e6c54e8e0940bfe44bdd4c084c08f432b3cd4fc716f19f82a
SHA512569971c96c8540d59a9cd2c472355ca2cca6be8c7cf25be531663e309ba24234b8aac4a1c8da0f631f2a785240618633c012ec87552768ccf6fe0612008cd30a