Analysis
-
max time kernel
120s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2024 05:11
Static task
static1
Behavioral task
behavioral1
Sample
f3c8b1744ca7e323797d6f87dec7528fdc5587c39f72897a60106e25e92f66deN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f3c8b1744ca7e323797d6f87dec7528fdc5587c39f72897a60106e25e92f66deN.exe
Resource
win10v2004-20241007-en
General
-
Target
f3c8b1744ca7e323797d6f87dec7528fdc5587c39f72897a60106e25e92f66deN.exe
-
Size
1.2MB
-
MD5
a4446a4f5250b97f4f00a7ec9a0e3d10
-
SHA1
4fd7c2b72a30009d9eddb7c877fa0db86d552f2e
-
SHA256
f3c8b1744ca7e323797d6f87dec7528fdc5587c39f72897a60106e25e92f66de
-
SHA512
31f2805e9f90c8bd5bbb609b5e7778077c184ee7134a4032c13da739f0a68a14c56e9107e8c75d58e97eb7cdf3ad9f8bcbf45488a0b2f922af4872709da6c951
-
SSDEEP
24576:cFOavduSvY3TDxcQq/1vezu72ssMCKBqSulC8wWQ2ie5mZ/l4Fz5Uw0i:sTd1Y3TDxcf1vR72kqSkJXwW56wd
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Executes dropped EXE 6 IoCs
pid Process 3068 f3c8b1744ca7e323797d6f87dec7528fdc5587c39f72897a60106e25e92f66den.exe 2720 icsys.icn.exe 1844 explorer.exe 4676 spoolsv.exe 2952 svchost.exe 2012 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\Resources\Themes\icsys.icn.exe f3c8b1744ca7e323797d6f87dec7528fdc5587c39f72897a60106e25e92f66deN.exe File opened for modification \??\c:\windows\resources\themes\explorer.exe icsys.icn.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe -
System Location Discovery: System Language Discovery 1 TTPs 21 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f3c8b1744ca7e323797d6f87dec7528fdc5587c39f72897a60106e25e92f66den.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icsys.icn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mode.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f3c8b1744ca7e323797d6f87dec7528fdc5587c39f72897a60106e25e92f66deN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 560 f3c8b1744ca7e323797d6f87dec7528fdc5587c39f72897a60106e25e92f66deN.exe 560 f3c8b1744ca7e323797d6f87dec7528fdc5587c39f72897a60106e25e92f66deN.exe 560 f3c8b1744ca7e323797d6f87dec7528fdc5587c39f72897a60106e25e92f66deN.exe 560 f3c8b1744ca7e323797d6f87dec7528fdc5587c39f72897a60106e25e92f66deN.exe 560 f3c8b1744ca7e323797d6f87dec7528fdc5587c39f72897a60106e25e92f66deN.exe 560 f3c8b1744ca7e323797d6f87dec7528fdc5587c39f72897a60106e25e92f66deN.exe 560 f3c8b1744ca7e323797d6f87dec7528fdc5587c39f72897a60106e25e92f66deN.exe 560 f3c8b1744ca7e323797d6f87dec7528fdc5587c39f72897a60106e25e92f66deN.exe 560 f3c8b1744ca7e323797d6f87dec7528fdc5587c39f72897a60106e25e92f66deN.exe 560 f3c8b1744ca7e323797d6f87dec7528fdc5587c39f72897a60106e25e92f66deN.exe 560 f3c8b1744ca7e323797d6f87dec7528fdc5587c39f72897a60106e25e92f66deN.exe 560 f3c8b1744ca7e323797d6f87dec7528fdc5587c39f72897a60106e25e92f66deN.exe 560 f3c8b1744ca7e323797d6f87dec7528fdc5587c39f72897a60106e25e92f66deN.exe 560 f3c8b1744ca7e323797d6f87dec7528fdc5587c39f72897a60106e25e92f66deN.exe 560 f3c8b1744ca7e323797d6f87dec7528fdc5587c39f72897a60106e25e92f66deN.exe 560 f3c8b1744ca7e323797d6f87dec7528fdc5587c39f72897a60106e25e92f66deN.exe 560 f3c8b1744ca7e323797d6f87dec7528fdc5587c39f72897a60106e25e92f66deN.exe 560 f3c8b1744ca7e323797d6f87dec7528fdc5587c39f72897a60106e25e92f66deN.exe 560 f3c8b1744ca7e323797d6f87dec7528fdc5587c39f72897a60106e25e92f66deN.exe 560 f3c8b1744ca7e323797d6f87dec7528fdc5587c39f72897a60106e25e92f66deN.exe 560 f3c8b1744ca7e323797d6f87dec7528fdc5587c39f72897a60106e25e92f66deN.exe 560 f3c8b1744ca7e323797d6f87dec7528fdc5587c39f72897a60106e25e92f66deN.exe 560 f3c8b1744ca7e323797d6f87dec7528fdc5587c39f72897a60106e25e92f66deN.exe 560 f3c8b1744ca7e323797d6f87dec7528fdc5587c39f72897a60106e25e92f66deN.exe 560 f3c8b1744ca7e323797d6f87dec7528fdc5587c39f72897a60106e25e92f66deN.exe 560 f3c8b1744ca7e323797d6f87dec7528fdc5587c39f72897a60106e25e92f66deN.exe 560 f3c8b1744ca7e323797d6f87dec7528fdc5587c39f72897a60106e25e92f66deN.exe 560 f3c8b1744ca7e323797d6f87dec7528fdc5587c39f72897a60106e25e92f66deN.exe 560 f3c8b1744ca7e323797d6f87dec7528fdc5587c39f72897a60106e25e92f66deN.exe 560 f3c8b1744ca7e323797d6f87dec7528fdc5587c39f72897a60106e25e92f66deN.exe 560 f3c8b1744ca7e323797d6f87dec7528fdc5587c39f72897a60106e25e92f66deN.exe 560 f3c8b1744ca7e323797d6f87dec7528fdc5587c39f72897a60106e25e92f66deN.exe 2720 icsys.icn.exe 2720 icsys.icn.exe 2720 icsys.icn.exe 2720 icsys.icn.exe 2720 icsys.icn.exe 2720 icsys.icn.exe 2720 icsys.icn.exe 2720 icsys.icn.exe 2720 icsys.icn.exe 2720 icsys.icn.exe 2720 icsys.icn.exe 2720 icsys.icn.exe 2720 icsys.icn.exe 2720 icsys.icn.exe 2720 icsys.icn.exe 2720 icsys.icn.exe 2720 icsys.icn.exe 2720 icsys.icn.exe 2720 icsys.icn.exe 2720 icsys.icn.exe 2720 icsys.icn.exe 2720 icsys.icn.exe 2720 icsys.icn.exe 2720 icsys.icn.exe 2720 icsys.icn.exe 2720 icsys.icn.exe 2720 icsys.icn.exe 2720 icsys.icn.exe 2720 icsys.icn.exe 2720 icsys.icn.exe 2720 icsys.icn.exe 2720 icsys.icn.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 1844 explorer.exe 2952 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 560 f3c8b1744ca7e323797d6f87dec7528fdc5587c39f72897a60106e25e92f66deN.exe 560 f3c8b1744ca7e323797d6f87dec7528fdc5587c39f72897a60106e25e92f66deN.exe 2720 icsys.icn.exe 2720 icsys.icn.exe 1844 explorer.exe 1844 explorer.exe 4676 spoolsv.exe 4676 spoolsv.exe 2952 svchost.exe 2952 svchost.exe 2012 spoolsv.exe 2012 spoolsv.exe -
Suspicious use of WriteProcessMemory 60 IoCs
description pid Process procid_target PID 560 wrote to memory of 3068 560 f3c8b1744ca7e323797d6f87dec7528fdc5587c39f72897a60106e25e92f66deN.exe 84 PID 560 wrote to memory of 3068 560 f3c8b1744ca7e323797d6f87dec7528fdc5587c39f72897a60106e25e92f66deN.exe 84 PID 560 wrote to memory of 3068 560 f3c8b1744ca7e323797d6f87dec7528fdc5587c39f72897a60106e25e92f66deN.exe 84 PID 560 wrote to memory of 2720 560 f3c8b1744ca7e323797d6f87dec7528fdc5587c39f72897a60106e25e92f66deN.exe 85 PID 560 wrote to memory of 2720 560 f3c8b1744ca7e323797d6f87dec7528fdc5587c39f72897a60106e25e92f66deN.exe 85 PID 560 wrote to memory of 2720 560 f3c8b1744ca7e323797d6f87dec7528fdc5587c39f72897a60106e25e92f66deN.exe 85 PID 2720 wrote to memory of 1844 2720 icsys.icn.exe 87 PID 2720 wrote to memory of 1844 2720 icsys.icn.exe 87 PID 2720 wrote to memory of 1844 2720 icsys.icn.exe 87 PID 1844 wrote to memory of 4676 1844 explorer.exe 88 PID 1844 wrote to memory of 4676 1844 explorer.exe 88 PID 1844 wrote to memory of 4676 1844 explorer.exe 88 PID 3068 wrote to memory of 2608 3068 f3c8b1744ca7e323797d6f87dec7528fdc5587c39f72897a60106e25e92f66den.exe 89 PID 3068 wrote to memory of 2608 3068 f3c8b1744ca7e323797d6f87dec7528fdc5587c39f72897a60106e25e92f66den.exe 89 PID 3068 wrote to memory of 2608 3068 f3c8b1744ca7e323797d6f87dec7528fdc5587c39f72897a60106e25e92f66den.exe 89 PID 2608 wrote to memory of 1388 2608 cmd.exe 90 PID 2608 wrote to memory of 1388 2608 cmd.exe 90 PID 2608 wrote to memory of 1388 2608 cmd.exe 90 PID 4676 wrote to memory of 2952 4676 spoolsv.exe 91 PID 4676 wrote to memory of 2952 4676 spoolsv.exe 91 PID 4676 wrote to memory of 2952 4676 spoolsv.exe 91 PID 2952 wrote to memory of 2012 2952 svchost.exe 92 PID 2952 wrote to memory of 2012 2952 svchost.exe 92 PID 2952 wrote to memory of 2012 2952 svchost.exe 92 PID 3068 wrote to memory of 2564 3068 f3c8b1744ca7e323797d6f87dec7528fdc5587c39f72897a60106e25e92f66den.exe 93 PID 3068 wrote to memory of 2564 3068 f3c8b1744ca7e323797d6f87dec7528fdc5587c39f72897a60106e25e92f66den.exe 93 PID 3068 wrote to memory of 2564 3068 f3c8b1744ca7e323797d6f87dec7528fdc5587c39f72897a60106e25e92f66den.exe 93 PID 3068 wrote to memory of 4396 3068 f3c8b1744ca7e323797d6f87dec7528fdc5587c39f72897a60106e25e92f66den.exe 94 PID 3068 wrote to memory of 4396 3068 f3c8b1744ca7e323797d6f87dec7528fdc5587c39f72897a60106e25e92f66den.exe 94 PID 3068 wrote to memory of 4396 3068 f3c8b1744ca7e323797d6f87dec7528fdc5587c39f72897a60106e25e92f66den.exe 94 PID 3068 wrote to memory of 4700 3068 f3c8b1744ca7e323797d6f87dec7528fdc5587c39f72897a60106e25e92f66den.exe 95 PID 3068 wrote to memory of 4700 3068 f3c8b1744ca7e323797d6f87dec7528fdc5587c39f72897a60106e25e92f66den.exe 95 PID 3068 wrote to memory of 4700 3068 f3c8b1744ca7e323797d6f87dec7528fdc5587c39f72897a60106e25e92f66den.exe 95 PID 3068 wrote to memory of 4596 3068 f3c8b1744ca7e323797d6f87dec7528fdc5587c39f72897a60106e25e92f66den.exe 96 PID 3068 wrote to memory of 4596 3068 f3c8b1744ca7e323797d6f87dec7528fdc5587c39f72897a60106e25e92f66den.exe 96 PID 3068 wrote to memory of 4596 3068 f3c8b1744ca7e323797d6f87dec7528fdc5587c39f72897a60106e25e92f66den.exe 96 PID 3068 wrote to memory of 2648 3068 f3c8b1744ca7e323797d6f87dec7528fdc5587c39f72897a60106e25e92f66den.exe 97 PID 3068 wrote to memory of 2648 3068 f3c8b1744ca7e323797d6f87dec7528fdc5587c39f72897a60106e25e92f66den.exe 97 PID 3068 wrote to memory of 2648 3068 f3c8b1744ca7e323797d6f87dec7528fdc5587c39f72897a60106e25e92f66den.exe 97 PID 3068 wrote to memory of 4740 3068 f3c8b1744ca7e323797d6f87dec7528fdc5587c39f72897a60106e25e92f66den.exe 98 PID 3068 wrote to memory of 4740 3068 f3c8b1744ca7e323797d6f87dec7528fdc5587c39f72897a60106e25e92f66den.exe 98 PID 3068 wrote to memory of 4740 3068 f3c8b1744ca7e323797d6f87dec7528fdc5587c39f72897a60106e25e92f66den.exe 98 PID 3068 wrote to memory of 4972 3068 f3c8b1744ca7e323797d6f87dec7528fdc5587c39f72897a60106e25e92f66den.exe 99 PID 3068 wrote to memory of 4972 3068 f3c8b1744ca7e323797d6f87dec7528fdc5587c39f72897a60106e25e92f66den.exe 99 PID 3068 wrote to memory of 4972 3068 f3c8b1744ca7e323797d6f87dec7528fdc5587c39f72897a60106e25e92f66den.exe 99 PID 3068 wrote to memory of 4936 3068 f3c8b1744ca7e323797d6f87dec7528fdc5587c39f72897a60106e25e92f66den.exe 100 PID 3068 wrote to memory of 4936 3068 f3c8b1744ca7e323797d6f87dec7528fdc5587c39f72897a60106e25e92f66den.exe 100 PID 3068 wrote to memory of 4936 3068 f3c8b1744ca7e323797d6f87dec7528fdc5587c39f72897a60106e25e92f66den.exe 100 PID 3068 wrote to memory of 2280 3068 f3c8b1744ca7e323797d6f87dec7528fdc5587c39f72897a60106e25e92f66den.exe 101 PID 3068 wrote to memory of 2280 3068 f3c8b1744ca7e323797d6f87dec7528fdc5587c39f72897a60106e25e92f66den.exe 101 PID 3068 wrote to memory of 2280 3068 f3c8b1744ca7e323797d6f87dec7528fdc5587c39f72897a60106e25e92f66den.exe 101 PID 3068 wrote to memory of 3452 3068 f3c8b1744ca7e323797d6f87dec7528fdc5587c39f72897a60106e25e92f66den.exe 102 PID 3068 wrote to memory of 3452 3068 f3c8b1744ca7e323797d6f87dec7528fdc5587c39f72897a60106e25e92f66den.exe 102 PID 3068 wrote to memory of 3452 3068 f3c8b1744ca7e323797d6f87dec7528fdc5587c39f72897a60106e25e92f66den.exe 102 PID 3068 wrote to memory of 2140 3068 f3c8b1744ca7e323797d6f87dec7528fdc5587c39f72897a60106e25e92f66den.exe 103 PID 3068 wrote to memory of 2140 3068 f3c8b1744ca7e323797d6f87dec7528fdc5587c39f72897a60106e25e92f66den.exe 103 PID 3068 wrote to memory of 2140 3068 f3c8b1744ca7e323797d6f87dec7528fdc5587c39f72897a60106e25e92f66den.exe 103 PID 3068 wrote to memory of 984 3068 f3c8b1744ca7e323797d6f87dec7528fdc5587c39f72897a60106e25e92f66den.exe 104 PID 3068 wrote to memory of 984 3068 f3c8b1744ca7e323797d6f87dec7528fdc5587c39f72897a60106e25e92f66den.exe 104 PID 3068 wrote to memory of 984 3068 f3c8b1744ca7e323797d6f87dec7528fdc5587c39f72897a60106e25e92f66den.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\f3c8b1744ca7e323797d6f87dec7528fdc5587c39f72897a60106e25e92f66deN.exe"C:\Users\Admin\AppData\Local\Temp\f3c8b1744ca7e323797d6f87dec7528fdc5587c39f72897a60106e25e92f66deN.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:560 -
\??\c:\users\admin\appdata\local\temp\f3c8b1744ca7e323797d6f87dec7528fdc5587c39f72897a60106e25e92f66den.exec:\users\admin\appdata\local\temp\f3c8b1744ca7e323797d6f87dec7528fdc5587c39f72897a60106e25e92f66den.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c MODE CON COLS=19 LINES=23⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\SysWOW64\mode.comMODE CON COLS=19 LINES=24⤵
- System Location Discovery: System Language Discovery
PID:1388
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Color A3⤵
- System Location Discovery: System Language Discovery
PID:2564
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c CLS3⤵
- System Location Discovery: System Language Discovery
PID:4396
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Color A3⤵
- System Location Discovery: System Language Discovery
PID:4700
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c CLS3⤵
- System Location Discovery: System Language Discovery
PID:4596
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Color A3⤵
- System Location Discovery: System Language Discovery
PID:2648
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c CLS3⤵
- System Location Discovery: System Language Discovery
PID:4740
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Color A3⤵
- System Location Discovery: System Language Discovery
PID:4972
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c CLS3⤵
- System Location Discovery: System Language Discovery
PID:4936
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Color A3⤵
- System Location Discovery: System Language Discovery
PID:2280
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c CLS3⤵
- System Location Discovery: System Language Discovery
PID:3452
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Color A3⤵
- System Location Discovery: System Language Discovery
PID:2140
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c CLS3⤵
- System Location Discovery: System Language Discovery
PID:984
-
-
-
C:\Windows\Resources\Themes\icsys.icn.exeC:\Windows\Resources\Themes\icsys.icn.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2720 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe3⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1844 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE4⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4676 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe5⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2952 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2012
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\f3c8b1744ca7e323797d6f87dec7528fdc5587c39f72897a60106e25e92f66den.exe
Filesize1.1MB
MD597e0b85b9ca71655f83bc481798d6efa
SHA1b8e2d7f0ea99fdd73a916a4c9f765e2d2aa44de4
SHA256cb6915315cfc5c80f8527cdbe1b78ace0f6ecae43a70685ba8732f86968ba67d
SHA5121e31c86867a98a902765a83bc01f72fc9d2e818ac59b4715ef9925181217bc21ea74cc382f1ef64b79d25c09468a2bee116fbb04125c41f932b646c9243cebbe
-
Filesize
135KB
MD5b403f0f03f8866e949a9e6b13fd43257
SHA112c505083037c04d8d82042743c2b4925f63df8d
SHA2569f3671eb76f7cc0673d437e0b7ea091acc2c99aa31aa550bed2123e1995168cf
SHA512d994cfaa4a291a43177d4df02ac1c378c285a8d8bcacfbd66cb22e13a0612e65ae627d0aea91e70396d6294be08a58b53fb82eacc4d7d98e7ca9887f425e2f00
-
Filesize
135KB
MD56f122a4dd29137760475fa7e0501cd8c
SHA15cb54489d31999991ea2b6134a9db5877ab80cac
SHA256b4d54bac156ac2b8873fc994706e50b4bae8123d1a789db1429213a4447085fc
SHA512081d94c87988ff33c1af79774dbe16d0ee36a1b62e30ef2b9368147cc17a6e64dca992040a131410f566931df0de4020c5f6a7258384f5c7ec0e4ad4b371630d
-
Filesize
135KB
MD572085b0668c220fef49f484887e6301a
SHA1973b32e8b49322c615b62c31378c56349cebf55e
SHA2568ec9c34e0643238fa2afaa499a0ce642b77d6e3fc10dd9a5a2f7ec9906de03fe
SHA512fb7d3cd7496ff1bd928cbbf292eaa12f97f886cdc4914031ca82ebae0df365df6d9b1a253d80dddc6dd9cffa13f5b062c72519d2810d9ddbfc22931f1b855ae6
-
Filesize
135KB
MD58a0848d170fbad62cadcc8aba6bc9847
SHA1ca027684a4b65e16db523dbd2f650dbeae270cc4
SHA256035fda7d86400d4750f4a5621e64ed55e5f6bb07bc518cfbdd9136c2310620f7
SHA512298953913e8de36078d4b6f6ae9311c198f1cfb696bb397bf4a658fbcff770b67498e653b92435066139110d41a8f92254be29df06a6d8f69d3c6d71f94e5655