Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-11-2024 03:53

General

  • Target

    bd72b3de20dc8408a601863b10f0d9cce916ee6f445fbf883749a24fd20a351e.exe

  • Size

    135KB

  • MD5

    c2b70ac803a3125ffcc5f3ac7f0097c6

  • SHA1

    c1234de17084f3150ca662f76af203b80837d917

  • SHA256

    bd72b3de20dc8408a601863b10f0d9cce916ee6f445fbf883749a24fd20a351e

  • SHA512

    a5dea0aa1c9c6819115ecc9f945b43fda143c2170d3b9a5bf882c2dc166b7eb4257046c201cc0f2eb0c4943818f2a1d2b48ef0aa839ffdffda49aaaeb1d28bcb

  • SSDEEP

    1536:UfsEqouTRcG/Mzvgf7xEuvnXNTRdUzwTekUOisZ1yDDajtXbVmu:UVqoCl/YgjxEufVU0TbTyDDalQu

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bd72b3de20dc8408a601863b10f0d9cce916ee6f445fbf883749a24fd20a351e.exe
    "C:\Users\Admin\AppData\Local\Temp\bd72b3de20dc8408a601863b10f0d9cce916ee6f445fbf883749a24fd20a351e.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3872
    • \??\c:\windows\resources\themes\explorer.exe
      c:\windows\resources\themes\explorer.exe
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4220
      • \??\c:\windows\resources\spoolsv.exe
        c:\windows\resources\spoolsv.exe SE
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4852
        • \??\c:\windows\resources\svchost.exe
          c:\windows\resources\svchost.exe
          4⤵
          • Modifies visiblity of hidden/system files in Explorer
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:4248
          • \??\c:\windows\resources\spoolsv.exe
            c:\windows\resources\spoolsv.exe PR
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            PID:2640

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\Resources\Themes\explorer.exe

    Filesize

    135KB

    MD5

    e6f4a71e52ea1b94ee015bbdd5ebe7b7

    SHA1

    74e26f2f98f4428fa23def27f0f1a706d5e62f23

    SHA256

    6f875d087f9ff1f46883e9b6778bab9e761f6cb2cbe8cf8deae052388a8a7f44

    SHA512

    dd9e7b6b6a5799d72c6255db06489c8edc6019e3f517d97329508f0845bbd58ebd68507a37a3ab0fba321c9022db7d92d27b09b8008ccc905f912c5695a4a2e7

  • C:\Windows\Resources\spoolsv.exe

    Filesize

    135KB

    MD5

    d315e9efea0d1aea0f468044155a09b6

    SHA1

    0145ec15880c9cf1620ddd11283a894fb04e292e

    SHA256

    c03f83f1385f359d6fa4c5b98fada1a90002105adc3941428647eedf94ba4970

    SHA512

    3d0e86a239be80598770321beb7b2395d603ec44d6a1fedfe9ed892e2a55df544b89f08bf7b3848cb9e8b5c4f8fac5823a7ca70d264bad85bfb5b81c38c03b33

  • C:\Windows\Resources\svchost.exe

    Filesize

    135KB

    MD5

    6d0c4bbfee340c2032628b818da3ba03

    SHA1

    c3f8cf610545712b59513718b74bb687bcd041ec

    SHA256

    88ce7f97bd413fbbea5c6381d7a93d86fac2d1c1c4b5c7ef0ecfa72b3440b99c

    SHA512

    68f47ee16969b621472e6c738e66518fba33afb90b17c09ae74708eef93866dc9bc5891b41198ef8537636214dd3f66f047fec85f31c0e9584b65cf2fb7ba18f

  • memory/2640-32-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/3872-0-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/3872-34-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/4220-35-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/4248-36-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/4852-33-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB