Analysis
-
max time kernel
150s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
22-11-2024 05:03
Static task
static1
Behavioral task
behavioral1
Sample
e03b5e62ea80cff41079912cc5af436400a27f2a5a0dce7c94ace7088fb757c3.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
e03b5e62ea80cff41079912cc5af436400a27f2a5a0dce7c94ace7088fb757c3.exe
Resource
win10v2004-20241007-en
General
-
Target
e03b5e62ea80cff41079912cc5af436400a27f2a5a0dce7c94ace7088fb757c3.exe
-
Size
1.9MB
-
MD5
1bc8cda9144e1351ca43a0794a85f09c
-
SHA1
11f830cfdf67d4cb6a444259ac9f11399d53babd
-
SHA256
e03b5e62ea80cff41079912cc5af436400a27f2a5a0dce7c94ace7088fb757c3
-
SHA512
aa62c997a607f45bd258593600bb2cf7d6085fb37bd66f220f085ce995211e1d27d0280c2d061fd8551ec7ea58d65c35b9f175a976509ef6e684acaba7067a75
-
SSDEEP
49152:ISlNHydXboE+2pKWTvP6p9kB/GS0fsXCF8:ISjydNCYn0+d
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e03b5e62ea80cff41079912cc5af436400a27f2a5a0dce7c94ace7088fb757c3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorer.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ spoolsv.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ svchost.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ spoolsv.exe -
Checks BIOS information in registry 2 TTPs 10 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e03b5e62ea80cff41079912cc5af436400a27f2a5a0dce7c94ace7088fb757c3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion spoolsv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion spoolsv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e03b5e62ea80cff41079912cc5af436400a27f2a5a0dce7c94ace7088fb757c3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion spoolsv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion spoolsv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 2792 explorer.exe 2064 spoolsv.exe 2188 svchost.exe 1756 spoolsv.exe -
Identifies Wine through registry keys 2 TTPs 5 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine spoolsv.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine e03b5e62ea80cff41079912cc5af436400a27f2a5a0dce7c94ace7088fb757c3.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine explorer.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine spoolsv.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine svchost.exe -
Loads dropped DLL 8 IoCs
pid Process 3032 e03b5e62ea80cff41079912cc5af436400a27f2a5a0dce7c94ace7088fb757c3.exe 3032 e03b5e62ea80cff41079912cc5af436400a27f2a5a0dce7c94ace7088fb757c3.exe 2792 explorer.exe 2792 explorer.exe 2064 spoolsv.exe 2064 spoolsv.exe 2188 svchost.exe 2188 svchost.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
pid Process 3032 e03b5e62ea80cff41079912cc5af436400a27f2a5a0dce7c94ace7088fb757c3.exe 2792 explorer.exe 2064 spoolsv.exe 2188 svchost.exe 1756 spoolsv.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\Resources\tjud.exe explorer.exe File opened for modification \??\c:\windows\resources\themes\explorer.exe e03b5e62ea80cff41079912cc5af436400a27f2a5a0dce7c94ace7088fb757c3.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e03b5e62ea80cff41079912cc5af436400a27f2a5a0dce7c94ace7088fb757c3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2184 schtasks.exe 2112 schtasks.exe 2588 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3032 e03b5e62ea80cff41079912cc5af436400a27f2a5a0dce7c94ace7088fb757c3.exe 3032 e03b5e62ea80cff41079912cc5af436400a27f2a5a0dce7c94ace7088fb757c3.exe 3032 e03b5e62ea80cff41079912cc5af436400a27f2a5a0dce7c94ace7088fb757c3.exe 3032 e03b5e62ea80cff41079912cc5af436400a27f2a5a0dce7c94ace7088fb757c3.exe 3032 e03b5e62ea80cff41079912cc5af436400a27f2a5a0dce7c94ace7088fb757c3.exe 3032 e03b5e62ea80cff41079912cc5af436400a27f2a5a0dce7c94ace7088fb757c3.exe 3032 e03b5e62ea80cff41079912cc5af436400a27f2a5a0dce7c94ace7088fb757c3.exe 3032 e03b5e62ea80cff41079912cc5af436400a27f2a5a0dce7c94ace7088fb757c3.exe 3032 e03b5e62ea80cff41079912cc5af436400a27f2a5a0dce7c94ace7088fb757c3.exe 3032 e03b5e62ea80cff41079912cc5af436400a27f2a5a0dce7c94ace7088fb757c3.exe 3032 e03b5e62ea80cff41079912cc5af436400a27f2a5a0dce7c94ace7088fb757c3.exe 3032 e03b5e62ea80cff41079912cc5af436400a27f2a5a0dce7c94ace7088fb757c3.exe 3032 e03b5e62ea80cff41079912cc5af436400a27f2a5a0dce7c94ace7088fb757c3.exe 3032 e03b5e62ea80cff41079912cc5af436400a27f2a5a0dce7c94ace7088fb757c3.exe 3032 e03b5e62ea80cff41079912cc5af436400a27f2a5a0dce7c94ace7088fb757c3.exe 3032 e03b5e62ea80cff41079912cc5af436400a27f2a5a0dce7c94ace7088fb757c3.exe 3032 e03b5e62ea80cff41079912cc5af436400a27f2a5a0dce7c94ace7088fb757c3.exe 3032 e03b5e62ea80cff41079912cc5af436400a27f2a5a0dce7c94ace7088fb757c3.exe 2792 explorer.exe 2792 explorer.exe 2792 explorer.exe 2792 explorer.exe 2792 explorer.exe 2792 explorer.exe 2792 explorer.exe 2792 explorer.exe 2792 explorer.exe 2792 explorer.exe 2792 explorer.exe 2792 explorer.exe 2792 explorer.exe 2792 explorer.exe 2792 explorer.exe 2792 explorer.exe 2792 explorer.exe 2064 spoolsv.exe 2188 svchost.exe 2188 svchost.exe 2188 svchost.exe 2188 svchost.exe 2188 svchost.exe 2188 svchost.exe 2188 svchost.exe 2188 svchost.exe 2188 svchost.exe 2188 svchost.exe 2188 svchost.exe 2188 svchost.exe 2188 svchost.exe 2188 svchost.exe 2188 svchost.exe 2188 svchost.exe 2188 svchost.exe 1756 spoolsv.exe 2792 explorer.exe 2792 explorer.exe 2792 explorer.exe 2792 explorer.exe 2792 explorer.exe 2188 svchost.exe 2188 svchost.exe 2792 explorer.exe 2792 explorer.exe 2188 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2792 explorer.exe 2188 svchost.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 3032 e03b5e62ea80cff41079912cc5af436400a27f2a5a0dce7c94ace7088fb757c3.exe 3032 e03b5e62ea80cff41079912cc5af436400a27f2a5a0dce7c94ace7088fb757c3.exe 2792 explorer.exe 2792 explorer.exe 2064 spoolsv.exe 2064 spoolsv.exe 2188 svchost.exe 2188 svchost.exe 1756 spoolsv.exe 1756 spoolsv.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 3032 wrote to memory of 2792 3032 e03b5e62ea80cff41079912cc5af436400a27f2a5a0dce7c94ace7088fb757c3.exe 30 PID 3032 wrote to memory of 2792 3032 e03b5e62ea80cff41079912cc5af436400a27f2a5a0dce7c94ace7088fb757c3.exe 30 PID 3032 wrote to memory of 2792 3032 e03b5e62ea80cff41079912cc5af436400a27f2a5a0dce7c94ace7088fb757c3.exe 30 PID 3032 wrote to memory of 2792 3032 e03b5e62ea80cff41079912cc5af436400a27f2a5a0dce7c94ace7088fb757c3.exe 30 PID 2792 wrote to memory of 2064 2792 explorer.exe 31 PID 2792 wrote to memory of 2064 2792 explorer.exe 31 PID 2792 wrote to memory of 2064 2792 explorer.exe 31 PID 2792 wrote to memory of 2064 2792 explorer.exe 31 PID 2064 wrote to memory of 2188 2064 spoolsv.exe 32 PID 2064 wrote to memory of 2188 2064 spoolsv.exe 32 PID 2064 wrote to memory of 2188 2064 spoolsv.exe 32 PID 2064 wrote to memory of 2188 2064 spoolsv.exe 32 PID 2188 wrote to memory of 1756 2188 svchost.exe 33 PID 2188 wrote to memory of 1756 2188 svchost.exe 33 PID 2188 wrote to memory of 1756 2188 svchost.exe 33 PID 2188 wrote to memory of 1756 2188 svchost.exe 33 PID 2792 wrote to memory of 1144 2792 explorer.exe 34 PID 2792 wrote to memory of 1144 2792 explorer.exe 34 PID 2792 wrote to memory of 1144 2792 explorer.exe 34 PID 2792 wrote to memory of 1144 2792 explorer.exe 34 PID 2188 wrote to memory of 2184 2188 svchost.exe 35 PID 2188 wrote to memory of 2184 2188 svchost.exe 35 PID 2188 wrote to memory of 2184 2188 svchost.exe 35 PID 2188 wrote to memory of 2184 2188 svchost.exe 35 PID 2188 wrote to memory of 2112 2188 svchost.exe 38 PID 2188 wrote to memory of 2112 2188 svchost.exe 38 PID 2188 wrote to memory of 2112 2188 svchost.exe 38 PID 2188 wrote to memory of 2112 2188 svchost.exe 38 PID 2188 wrote to memory of 2588 2188 svchost.exe 40 PID 2188 wrote to memory of 2588 2188 svchost.exe 40 PID 2188 wrote to memory of 2588 2188 svchost.exe 40 PID 2188 wrote to memory of 2588 2188 svchost.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\e03b5e62ea80cff41079912cc5af436400a27f2a5a0dce7c94ace7088fb757c3.exe"C:\Users\Admin\AppData\Local\Temp\e03b5e62ea80cff41079912cc5af436400a27f2a5a0dce7c94ace7088fb757c3.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3032 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2792 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2064 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe4⤵
- Modifies visiblity of hidden/system files in Explorer
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2188 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1756
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 05:06 /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2184
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 05:07 /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2112
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 05:08 /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2588
-
-
-
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe3⤵PID:1144
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD503b5d13b0cc9fc0996979692e56a5a01
SHA14ebd54c58452ff7cc98fb0b766c1dc2436a40525
SHA2562bc15630aafa64c658888d9ab7ef4c8964cdb556c08751a6cf4083ecb5e69b7a
SHA512f22d38ee6e5b6a7ae5f517001be72df93f962b94bda56a75dac015e349c0f08b39acd86d4bde30087c3d2eaad5f5cf5d3992c4a37e440f904e5c4968325d15c2
-
Filesize
1.9MB
MD55aff8a733e98396c5b77f40aaef992c1
SHA18855715fb5e19cd3a512aafc8e6f864664242b41
SHA2567c8ba3129ee9d554e4af9e7fbf9ff1ddf4b03707f180959fe203d421d48b7db9
SHA512b2fbda1144d7b52524ee35339b9ff71e82a5f86418eedb70e4b9f8bc6de923047cbd96b056732f35a860bc1507960c9451971fd17d6e978eda71f5191ab72b3d
-
Filesize
1.9MB
MD5b6854d377df09d49ee8301e430897463
SHA16cd1455de12d200877344d4733667bc483476346
SHA2565683c61c8dabc669ca76b8ada30f2c036aa2fa73322cda2ee9bcac2cb9083c3c
SHA51265c73c88605a016028e8884353244d141e057144deb97989bd7ebd425f1345960ce225db5795cea119ac1453e6180bc77bc0e45c55e68aff51d4d6a071260f1e