Analysis

  • max time kernel
    85s
  • max time network
    81s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/11/2024, 11:10

General

  • Target

    icsys.icn.exe

  • Size

    135KB

  • MD5

    df0a34b2c6ac70dfe57018f98866e4e7

  • SHA1

    bc7a21fdc0c51ffee545833eb1769612cbd16918

  • SHA256

    6beb5261404f30d097d40adfc431334a431e4c7f0378fba5d14387ade7d7ecd5

  • SHA512

    d0a0e70b76b584cf63251a866888980ae19334b2cc89ef6aaa13c7aea18fbc9195300dee3f7a69933f150a4c82820b7eb8a8e2aa26f90ef940ea3de8ed5d65af

  • SSDEEP

    1536:UfsEqouTRcG/Mzvgf7xEuvnXNTRdUzwTekUOisZ1yDDajtXbVXJ:UVqoCl/YgjxEufVU0TbTyDDalRJ

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 4 IoCs
  • Executes dropped EXE 10 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Drops file in System32 directory 4 IoCs
  • Drops file in Windows directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 11 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 15 IoCs
  • Suspicious use of SendNotifyMessage 15 IoCs
  • Suspicious use of SetWindowsHookEx 22 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\icsys.icn.exe
    "C:\Users\Admin\AppData\Local\Temp\icsys.icn.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:440
    • \??\c:\windows\resources\themes\explorer.exe
      c:\windows\resources\themes\explorer.exe
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:384
      • \??\c:\windows\resources\spoolsv.exe
        c:\windows\resources\spoolsv.exe SE
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4384
        • \??\c:\windows\resources\svchost.exe
          c:\windows\resources\svchost.exe
          4⤵
          • Modifies visiblity of hidden/system files in Explorer
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:3852
          • \??\c:\windows\resources\spoolsv.exe
            c:\windows\resources\spoolsv.exe PR
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            PID:2552
      • \??\c:\windows\resources\spoolsv.exe
        c:\windows\resources\spoolsv.exe SE
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3380
        • \??\c:\windows\resources\svchost.exe
          c:\windows\resources\svchost.exe
          4⤵
          • Modifies visiblity of hidden/system files in Explorer
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:4400
          • \??\c:\windows\resources\spoolsv.exe
            c:\windows\resources\spoolsv.exe PR
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            PID:208
          • \??\c:\windows\resources\spoolsv.exe
            c:\windows\resources\spoolsv.exe PR
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:1208
            • \??\c:\windows\resources\themes\explorer.exe
              c:\windows\resources\themes\explorer.exe
              6⤵
              • Modifies visiblity of hidden/system files in Explorer
              • Executes dropped EXE
              • Adds Run key to start application
              • Drops file in System32 directory
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: GetForegroundWindowSpam
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:4324
              • \??\c:\windows\resources\spoolsv.exe
                c:\windows\resources\spoolsv.exe SE
                7⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of SetWindowsHookEx
                PID:5040
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:1324
    • C:\Windows\system32\taskmgr.exe
      "C:\Windows\system32\taskmgr.exe" /0
      1⤵
      • Checks SCSI registry key(s)
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4356

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\Resources\Themes\explorer.exe

      Filesize

      135KB

      MD5

      fbf2eb1212b960cfe391563bbe98b8be

      SHA1

      87a4ab1573302e0ca6703628db5c6003e4ccf5b2

      SHA256

      3948b47aee70811bc3bfa729f0e6a28e76e07a35a5e307ad01b2559bf34648e4

      SHA512

      e6399d6b4d6b589bd55ea3f5820a3bce81ec45c709f810dc5206707db4da802d54fd32e7139538514e8d0751901ead94042d3112327cbc76f9557e7c8643cd18

    • C:\Windows\Resources\spoolsv.exe

      Filesize

      135KB

      MD5

      859ed113b0110f57851b29d258a0a497

      SHA1

      caeb7c3a95012636cad17f9e54de9718070aba31

      SHA256

      a4f68ee00bd498a927287ac80bc4f3d1ac74fd7089e3548d2608f3a516d08385

      SHA512

      8c0bf1add7acc867d6e59431b6d1a3f8d2ce6ca7f559c754f904d32a23b755c60e03b144d9ed84003bdc39a70e07c365d1477fcf15812a1245907ed67481ebde

    • C:\Windows\Resources\svchost.exe

      Filesize

      135KB

      MD5

      2e11bfd95ff4f0d7c9a8a2fbe77f4096

      SHA1

      fed52d940e9f5cfe4de606d8ab3dc51f1f5bb6dc

      SHA256

      107cf8bd0b3e9899d3fe6dd91828b1bd4013fe57389caf358cc1df2ab37a0c93

      SHA512

      941e9c5155bbfdf54e5aa078e2808e02da9b9783e6d2074badbece4f01f4dc69d54d89c9f2f463f6bd90dcc2c793eeefae76fa0d4aab13148bb5267981a386ac

    • memory/208-62-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/384-9-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/384-64-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/440-0-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/440-35-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/1208-78-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/2552-33-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/3380-63-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/3852-49-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/4356-47-0x0000018EFEA70000-0x0000018EFEA71000-memory.dmp

      Filesize

      4KB

    • memory/4356-46-0x0000018EFEA70000-0x0000018EFEA71000-memory.dmp

      Filesize

      4KB

    • memory/4356-45-0x0000018EFEA70000-0x0000018EFEA71000-memory.dmp

      Filesize

      4KB

    • memory/4356-44-0x0000018EFEA70000-0x0000018EFEA71000-memory.dmp

      Filesize

      4KB

    • memory/4356-43-0x0000018EFEA70000-0x0000018EFEA71000-memory.dmp

      Filesize

      4KB

    • memory/4356-42-0x0000018EFEA70000-0x0000018EFEA71000-memory.dmp

      Filesize

      4KB

    • memory/4356-48-0x0000018EFEA70000-0x0000018EFEA71000-memory.dmp

      Filesize

      4KB

    • memory/4356-38-0x0000018EFEA70000-0x0000018EFEA71000-memory.dmp

      Filesize

      4KB

    • memory/4356-37-0x0000018EFEA70000-0x0000018EFEA71000-memory.dmp

      Filesize

      4KB

    • memory/4356-36-0x0000018EFEA70000-0x0000018EFEA71000-memory.dmp

      Filesize

      4KB

    • memory/4384-34-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/5040-77-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB