Overview
overview
10Static
static
10AntiPubs D...er.exe
windows7-x64
10AntiPubs D...er.exe
windows10-2004-x64
10AntiPubs D...er.exe
windows7-x64
3AntiPubs D...er.exe
windows10-2004-x64
3AntiPubs D...ol.dll
windows7-x64
1AntiPubs D...ol.dll
windows10-2004-x64
1AntiPubs D...er.dll
windows7-x64
1AntiPubs D...er.dll
windows10-2004-x64
1AntiPubs D...rk.dll
windows7-x64
1AntiPubs D...rk.dll
windows10-2004-x64
1AntiPubs D...ib.dll
windows7-x64
1AntiPubs D...ib.dll
windows10-2004-x64
1AntiPubs D...on.dll
windows7-x64
1AntiPubs D...on.dll
windows10-2004-x64
1AntiPubs D...er.exe
windows7-x64
10AntiPubs D...er.exe
windows10-2004-x64
10AntiPubs D...F6.dll
windows7-x64
1AntiPubs D...F6.dll
windows10-2004-x64
1AntiPubs D...nq.dll
windows7-x64
1AntiPubs D...nq.dll
windows10-2004-x64
1AntiPubs D...te.dll
windows7-x64
1AntiPubs D...te.dll
windows10-2004-x64
1AntiPubs D...te.exe
windows7-x64
10AntiPubs D...te.exe
windows10-2004-x64
10AntiPubs D...ar.dll
windows7-x64
1AntiPubs D...ar.dll
windows10-2004-x64
1AntiPubs D...er.exe
windows7-x64
3AntiPubs D...er.exe
windows10-2004-x64
3AntiPubs D...op.dll
windows7-x64
1AntiPubs D...op.dll
windows10-2004-x64
1AntiPubs D...op.dll
windows7-x64
3AntiPubs D...op.dll
windows10-2004-x64
3Analysis
-
max time kernel
150s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-12-2024 12:23
Behavioral task
behavioral1
Sample
AntiPubs Dork Searcher EZ/._cache_Searcher.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
AntiPubs Dork Searcher EZ/._cache_Searcher.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
AntiPubs Dork Searcher EZ/._cache_searcher.exe
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
AntiPubs Dork Searcher EZ/._cache_searcher.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
AntiPubs Dork Searcher EZ/Control.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
AntiPubs Dork Searcher EZ/Control.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
AntiPubs Dork Searcher EZ/EntityFramework.SqlServer.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
AntiPubs Dork Searcher EZ/EntityFramework.SqlServer.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
AntiPubs Dork Searcher EZ/EntityFramework.dll
Resource
win7-20241023-en
Behavioral task
behavioral10
Sample
AntiPubs Dork Searcher EZ/EntityFramework.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
AntiPubs Dork Searcher EZ/Interop.WMPLib.dll
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
AntiPubs Dork Searcher EZ/Interop.WMPLib.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
AntiPubs Dork Searcher EZ/Newtonsoft.Json.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
AntiPubs Dork Searcher EZ/Newtonsoft.Json.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
AntiPubs Dork Searcher EZ/Searcher.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
AntiPubs Dork Searcher EZ/Searcher.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
AntiPubs Dork Searcher EZ/System.Data.SQLite.EF6.dll
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
AntiPubs Dork Searcher EZ/System.Data.SQLite.EF6.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
AntiPubs Dork Searcher EZ/System.Data.SQLite.Linq.dll
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
AntiPubs Dork Searcher EZ/System.Data.SQLite.Linq.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
AntiPubs Dork Searcher EZ/System.Data.SQLite.dll
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
AntiPubs Dork Searcher EZ/System.Data.SQLite.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
AntiPubs Dork Searcher EZ/Update.exe
Resource
win7-20241010-en
Behavioral task
behavioral24
Sample
AntiPubs Dork Searcher EZ/Update.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
AntiPubs Dork Searcher EZ/War.dll
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
AntiPubs Dork Searcher EZ/War.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
AntiPubs Dork Searcher EZ/searcher.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
AntiPubs Dork Searcher EZ/searcher.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
AntiPubs Dork Searcher EZ/x64/SQLite.Interop.dll
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
AntiPubs Dork Searcher EZ/x64/SQLite.Interop.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
AntiPubs Dork Searcher EZ/x86/SQLite.Interop.dll
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
AntiPubs Dork Searcher EZ/x86/SQLite.Interop.dll
Resource
win10v2004-20241007-en
General
-
Target
AntiPubs Dork Searcher EZ/._cache_Searcher.exe
-
Size
7.0MB
-
MD5
15eb4b61e2e64ac84925535dc5ffe8de
-
SHA1
b95491efa58261ca585878238fa24d98fae41287
-
SHA256
3b28aaf3dd8ea9623ab80e4f567e65b8bb5db686b129f27f6d9bc0907f2ed289
-
SHA512
489751c78f8aded9a4b77eada0cccedab4d0faf50443607e17d81f65856ff77ad2842cb2ba5002e377c48fff441d86d38f74273367353fc2572a80ff980c14b5
-
SSDEEP
98304:JyldpqU5s+h9oK4MtPSXDjLWdNo/v5LlCKly37gjA1tCJa8IRku6Fml2u:JyldD5smuMQDfUi/vXgIa8IRkZI2u
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Executes dropped EXE 6 IoCs
pid Process 3148 ._cache_searcher.exe 2368 icsys.icn.exe 2592 explorer.exe 4804 spoolsv.exe 4800 svchost.exe 940 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\Resources\tjud.exe explorer.exe File opened for modification C:\Windows\Resources\Themes\icsys.icn.exe ._cache_Searcher.exe File opened for modification \??\c:\windows\resources\themes\explorer.exe icsys.icn.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Searcher.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_searcher.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icsys.icn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1104 ._cache_Searcher.exe 1104 ._cache_Searcher.exe 1104 ._cache_Searcher.exe 1104 ._cache_Searcher.exe 1104 ._cache_Searcher.exe 1104 ._cache_Searcher.exe 1104 ._cache_Searcher.exe 1104 ._cache_Searcher.exe 1104 ._cache_Searcher.exe 1104 ._cache_Searcher.exe 1104 ._cache_Searcher.exe 1104 ._cache_Searcher.exe 1104 ._cache_Searcher.exe 1104 ._cache_Searcher.exe 1104 ._cache_Searcher.exe 1104 ._cache_Searcher.exe 1104 ._cache_Searcher.exe 1104 ._cache_Searcher.exe 1104 ._cache_Searcher.exe 1104 ._cache_Searcher.exe 1104 ._cache_Searcher.exe 1104 ._cache_Searcher.exe 1104 ._cache_Searcher.exe 1104 ._cache_Searcher.exe 1104 ._cache_Searcher.exe 1104 ._cache_Searcher.exe 1104 ._cache_Searcher.exe 1104 ._cache_Searcher.exe 1104 ._cache_Searcher.exe 1104 ._cache_Searcher.exe 1104 ._cache_Searcher.exe 1104 ._cache_Searcher.exe 2368 icsys.icn.exe 2368 icsys.icn.exe 2368 icsys.icn.exe 2368 icsys.icn.exe 2368 icsys.icn.exe 2368 icsys.icn.exe 2368 icsys.icn.exe 2368 icsys.icn.exe 2368 icsys.icn.exe 2368 icsys.icn.exe 2368 icsys.icn.exe 2368 icsys.icn.exe 2368 icsys.icn.exe 2368 icsys.icn.exe 2368 icsys.icn.exe 2368 icsys.icn.exe 2368 icsys.icn.exe 2368 icsys.icn.exe 2368 icsys.icn.exe 2368 icsys.icn.exe 2368 icsys.icn.exe 2368 icsys.icn.exe 2368 icsys.icn.exe 2368 icsys.icn.exe 2368 icsys.icn.exe 2368 icsys.icn.exe 2368 icsys.icn.exe 2368 icsys.icn.exe 2368 icsys.icn.exe 2368 icsys.icn.exe 2368 icsys.icn.exe 2368 icsys.icn.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2592 explorer.exe 4800 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1104 ._cache_Searcher.exe 1104 ._cache_Searcher.exe 2368 icsys.icn.exe 2368 icsys.icn.exe 2592 explorer.exe 2592 explorer.exe 4804 spoolsv.exe 4804 spoolsv.exe 4800 svchost.exe 4800 svchost.exe 940 spoolsv.exe 940 spoolsv.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1104 wrote to memory of 3148 1104 ._cache_Searcher.exe 81 PID 1104 wrote to memory of 3148 1104 ._cache_Searcher.exe 81 PID 1104 wrote to memory of 3148 1104 ._cache_Searcher.exe 81 PID 1104 wrote to memory of 2368 1104 ._cache_Searcher.exe 82 PID 1104 wrote to memory of 2368 1104 ._cache_Searcher.exe 82 PID 1104 wrote to memory of 2368 1104 ._cache_Searcher.exe 82 PID 2368 wrote to memory of 2592 2368 icsys.icn.exe 83 PID 2368 wrote to memory of 2592 2368 icsys.icn.exe 83 PID 2368 wrote to memory of 2592 2368 icsys.icn.exe 83 PID 2592 wrote to memory of 4804 2592 explorer.exe 84 PID 2592 wrote to memory of 4804 2592 explorer.exe 84 PID 2592 wrote to memory of 4804 2592 explorer.exe 84 PID 4804 wrote to memory of 4800 4804 spoolsv.exe 85 PID 4804 wrote to memory of 4800 4804 spoolsv.exe 85 PID 4804 wrote to memory of 4800 4804 spoolsv.exe 85 PID 4800 wrote to memory of 940 4800 svchost.exe 86 PID 4800 wrote to memory of 940 4800 svchost.exe 86 PID 4800 wrote to memory of 940 4800 svchost.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\AntiPubs Dork Searcher EZ\._cache_Searcher.exe"C:\Users\Admin\AppData\Local\Temp\AntiPubs Dork Searcher EZ\._cache_Searcher.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1104 -
\??\c:\users\admin\appdata\local\temp\antipubs dork searcher ez\._cache_searcher.exe"c:\users\admin\appdata\local\temp\antipubs dork searcher ez\._cache_searcher.exe "2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3148
-
-
C:\Windows\Resources\Themes\icsys.icn.exeC:\Windows\Resources\Themes\icsys.icn.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2368 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe3⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2592 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE4⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4804 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe5⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4800 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:940
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.8MB
MD5d4b43b2ce490d8786ccde6debcad2251
SHA1e88d0c6b5c336ee7c03e145532a6ce44db28af90
SHA2563aad4931bc76e1d654e5fe3fc6a1a10277b0d66190a8547782a3d7fa117ccc27
SHA5128bff940911e750f06c76c724b92de0753f4089d92f95e5d3d3659de3869a91908c6de25e480a0101d8149fcc881b71f585c39a2e9206393bb89f1f5e43bdda46
-
Filesize
135KB
MD59df22aeb75f0aed1739557530daa8264
SHA1d2186d2a433ca3039bff3b206485eee2340588cb
SHA256ecb02fc272c7c9fbdf276c02323d569b3c24b8374c1e2378e5034b618f1e801e
SHA512f22d4342aeda22c449a87285078a4c013823601cd82a3c4480759fbc18bc9a01bb8b2ea60322c2ad11b78c5720f06f9966473f8e82b24d5204483929a9da1507
-
Filesize
135KB
MD5bb38812e659c3d728f409ba8206da43e
SHA1231777c045c807c20eb964c5a8714e1de9e4302b
SHA2569eee738a0be74282659e61da2764f358cd5db063019bab247d513b5b63af748f
SHA51291854244be2838e0efa5f3566ce3a4518484ab71fff5f06b86ef0b1309cb9e8dc988d63b0d35e54a6c7515b0c1cea9b95bbdfd469415459a46c58e96ed42a2fc
-
Filesize
135KB
MD5578313be3cb7b5c1b8dacb2be4fdd21c
SHA15eec1c65e21f7c631d16e1ae1c15138d54314d2f
SHA2568a84385a24ed8a99226e2f87a422e816745ec8db02b33aafbfebec8be46ff36e
SHA512cb440d01ce9402bac037ec1b7bd6d03c02ae48511271536e721208837b2ad56f50b26de411a1ee4a280d930672d0cb92cd5f9083080f74b2471a802280c1c923
-
Filesize
135KB
MD59aa97d3733bce6f137b358bdd88498ac
SHA182a4257e4a1c4afe36f722560a05d19e67294a5b
SHA256fdaa5a7989fecc276ef876da6e92cf29a0f2e1924ee7daf135419710f3acf3e2
SHA512edb3224855a27579d7dc36393f8b495dae070530ad97a2f237cafd71d7b7403371ef8b96005a8abb5837a4493c309599767304409874dde872ba0587105ba6bd