Analysis

  • max time kernel
    150s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-11-2024 03:39

General

  • Target

    bd72b3de20dc8408a601863b10f0d9cce916ee6f445fbf883749a24fd20a351e.exe

  • Size

    135KB

  • MD5

    c2b70ac803a3125ffcc5f3ac7f0097c6

  • SHA1

    c1234de17084f3150ca662f76af203b80837d917

  • SHA256

    bd72b3de20dc8408a601863b10f0d9cce916ee6f445fbf883749a24fd20a351e

  • SHA512

    a5dea0aa1c9c6819115ecc9f945b43fda143c2170d3b9a5bf882c2dc166b7eb4257046c201cc0f2eb0c4943818f2a1d2b48ef0aa839ffdffda49aaaeb1d28bcb

  • SSDEEP

    1536:UfsEqouTRcG/Mzvgf7xEuvnXNTRdUzwTekUOisZ1yDDajtXbVmu:UVqoCl/YgjxEufVU0TbTyDDalQu

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bd72b3de20dc8408a601863b10f0d9cce916ee6f445fbf883749a24fd20a351e.exe
    "C:\Users\Admin\AppData\Local\Temp\bd72b3de20dc8408a601863b10f0d9cce916ee6f445fbf883749a24fd20a351e.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4212
    • \??\c:\windows\resources\themes\explorer.exe
      c:\windows\resources\themes\explorer.exe
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4356
      • \??\c:\windows\resources\spoolsv.exe
        c:\windows\resources\spoolsv.exe SE
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1288
        • \??\c:\windows\resources\svchost.exe
          c:\windows\resources\svchost.exe
          4⤵
          • Modifies visiblity of hidden/system files in Explorer
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:864
          • \??\c:\windows\resources\spoolsv.exe
            c:\windows\resources\spoolsv.exe PR
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            PID:3044

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\Resources\Themes\explorer.exe

    Filesize

    135KB

    MD5

    5698f4acb22a26079f9a5a3e484bdc7b

    SHA1

    c6ca9fb950ce18ec4e3a8bc3aad32233e33c1cb3

    SHA256

    4c6bc6410d02e9eb073cc2c92ffc599be4f221d0c4ac7e7ca1dfecca828ac7dc

    SHA512

    7dcfb2d3d9e9fb48136e9d5afa17c3c3349711ab749527f5cf1377ad8ce854e92b7f12063bd9155d08aef92d63e1f861b1ce3b96f3fc2d9966925cc45f07b368

  • C:\Windows\Resources\spoolsv.exe

    Filesize

    135KB

    MD5

    e73c607ab0a92cf1bc35a23ce2c7922f

    SHA1

    be1ca04e22d14cfe8434185aebfac0c14dafb946

    SHA256

    78723f035dccc80227aae2137d76fd5d5f021f7f33d8edc7600ee1ff149969b6

    SHA512

    8a14d1615ccf7516bf470fd998d0f7ec6f7933dd1d11bb05bf19eb86dacd40ae9c7a7c730522041b31f878db42de18349489ac06b9083573dd57fce3bd851fc0

  • C:\Windows\Resources\svchost.exe

    Filesize

    135KB

    MD5

    6a888613391efeac7988798d1e276208

    SHA1

    27621846e62a4c19a1741ad374a6aa003c1f0445

    SHA256

    565496d0de046f5348992a51eabb226791e0989dd888e12b2e5b8028dd68438a

    SHA512

    4b06156ee619454142ea7f2d8a18265344c0511910460fb3eba996253b8f0c7f33c94a2ae784633df9135646219b4e815e85157c8c3592a40e253c0f8cce72d0

  • memory/864-36-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/1288-33-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/3044-32-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/4212-0-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/4212-34-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/4356-35-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB