Analysis
-
max time kernel
150s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-01-2025 06:50
Static task
static1
Behavioral task
behavioral1
Sample
d146deab32fdab4c09a6978989bf0ac5e3b0696fd0b8d70cfe9d50380d86a5a8.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d146deab32fdab4c09a6978989bf0ac5e3b0696fd0b8d70cfe9d50380d86a5a8.exe
Resource
win10v2004-20241007-en
General
-
Target
d146deab32fdab4c09a6978989bf0ac5e3b0696fd0b8d70cfe9d50380d86a5a8.exe
-
Size
135KB
-
MD5
c2b5290f38c56c8587d53a266de507fc
-
SHA1
9af095f8c495066c41e2ee31ee53e326d3d933ec
-
SHA256
d146deab32fdab4c09a6978989bf0ac5e3b0696fd0b8d70cfe9d50380d86a5a8
-
SHA512
a0e95a41cc90b37985c0ee92b9b442d53fc2981f2a3ee2b376f3f72c088c502b4d52ada1d32ad5e954940d557d062e4ad769fc35d7018858e080927e5f89f645
-
SSDEEP
1536:XfsEqouTRcG/Mzvgf7xEuvnXNTRdUzwTekUOisZ1yDDajtXbgn69999999999990:XVqoCl/YgjxEufVU0TbTyDDalsn
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 1880 explorer.exe 1876 spoolsv.exe 376 svchost.exe 4908 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification \??\c:\windows\resources\themes\explorer.exe d146deab32fdab4c09a6978989bf0ac5e3b0696fd0b8d70cfe9d50380d86a5a8.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d146deab32fdab4c09a6978989bf0ac5e3b0696fd0b8d70cfe9d50380d86a5a8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2176 d146deab32fdab4c09a6978989bf0ac5e3b0696fd0b8d70cfe9d50380d86a5a8.exe 2176 d146deab32fdab4c09a6978989bf0ac5e3b0696fd0b8d70cfe9d50380d86a5a8.exe 2176 d146deab32fdab4c09a6978989bf0ac5e3b0696fd0b8d70cfe9d50380d86a5a8.exe 2176 d146deab32fdab4c09a6978989bf0ac5e3b0696fd0b8d70cfe9d50380d86a5a8.exe 2176 d146deab32fdab4c09a6978989bf0ac5e3b0696fd0b8d70cfe9d50380d86a5a8.exe 2176 d146deab32fdab4c09a6978989bf0ac5e3b0696fd0b8d70cfe9d50380d86a5a8.exe 2176 d146deab32fdab4c09a6978989bf0ac5e3b0696fd0b8d70cfe9d50380d86a5a8.exe 2176 d146deab32fdab4c09a6978989bf0ac5e3b0696fd0b8d70cfe9d50380d86a5a8.exe 2176 d146deab32fdab4c09a6978989bf0ac5e3b0696fd0b8d70cfe9d50380d86a5a8.exe 2176 d146deab32fdab4c09a6978989bf0ac5e3b0696fd0b8d70cfe9d50380d86a5a8.exe 2176 d146deab32fdab4c09a6978989bf0ac5e3b0696fd0b8d70cfe9d50380d86a5a8.exe 2176 d146deab32fdab4c09a6978989bf0ac5e3b0696fd0b8d70cfe9d50380d86a5a8.exe 2176 d146deab32fdab4c09a6978989bf0ac5e3b0696fd0b8d70cfe9d50380d86a5a8.exe 2176 d146deab32fdab4c09a6978989bf0ac5e3b0696fd0b8d70cfe9d50380d86a5a8.exe 2176 d146deab32fdab4c09a6978989bf0ac5e3b0696fd0b8d70cfe9d50380d86a5a8.exe 2176 d146deab32fdab4c09a6978989bf0ac5e3b0696fd0b8d70cfe9d50380d86a5a8.exe 2176 d146deab32fdab4c09a6978989bf0ac5e3b0696fd0b8d70cfe9d50380d86a5a8.exe 2176 d146deab32fdab4c09a6978989bf0ac5e3b0696fd0b8d70cfe9d50380d86a5a8.exe 2176 d146deab32fdab4c09a6978989bf0ac5e3b0696fd0b8d70cfe9d50380d86a5a8.exe 2176 d146deab32fdab4c09a6978989bf0ac5e3b0696fd0b8d70cfe9d50380d86a5a8.exe 2176 d146deab32fdab4c09a6978989bf0ac5e3b0696fd0b8d70cfe9d50380d86a5a8.exe 2176 d146deab32fdab4c09a6978989bf0ac5e3b0696fd0b8d70cfe9d50380d86a5a8.exe 2176 d146deab32fdab4c09a6978989bf0ac5e3b0696fd0b8d70cfe9d50380d86a5a8.exe 2176 d146deab32fdab4c09a6978989bf0ac5e3b0696fd0b8d70cfe9d50380d86a5a8.exe 2176 d146deab32fdab4c09a6978989bf0ac5e3b0696fd0b8d70cfe9d50380d86a5a8.exe 2176 d146deab32fdab4c09a6978989bf0ac5e3b0696fd0b8d70cfe9d50380d86a5a8.exe 2176 d146deab32fdab4c09a6978989bf0ac5e3b0696fd0b8d70cfe9d50380d86a5a8.exe 2176 d146deab32fdab4c09a6978989bf0ac5e3b0696fd0b8d70cfe9d50380d86a5a8.exe 2176 d146deab32fdab4c09a6978989bf0ac5e3b0696fd0b8d70cfe9d50380d86a5a8.exe 2176 d146deab32fdab4c09a6978989bf0ac5e3b0696fd0b8d70cfe9d50380d86a5a8.exe 2176 d146deab32fdab4c09a6978989bf0ac5e3b0696fd0b8d70cfe9d50380d86a5a8.exe 2176 d146deab32fdab4c09a6978989bf0ac5e3b0696fd0b8d70cfe9d50380d86a5a8.exe 2176 d146deab32fdab4c09a6978989bf0ac5e3b0696fd0b8d70cfe9d50380d86a5a8.exe 2176 d146deab32fdab4c09a6978989bf0ac5e3b0696fd0b8d70cfe9d50380d86a5a8.exe 1880 explorer.exe 1880 explorer.exe 1880 explorer.exe 1880 explorer.exe 1880 explorer.exe 1880 explorer.exe 1880 explorer.exe 1880 explorer.exe 1880 explorer.exe 1880 explorer.exe 1880 explorer.exe 1880 explorer.exe 1880 explorer.exe 1880 explorer.exe 1880 explorer.exe 1880 explorer.exe 1880 explorer.exe 1880 explorer.exe 1880 explorer.exe 1880 explorer.exe 1880 explorer.exe 1880 explorer.exe 1880 explorer.exe 1880 explorer.exe 1880 explorer.exe 1880 explorer.exe 1880 explorer.exe 1880 explorer.exe 1880 explorer.exe 1880 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 1880 explorer.exe 376 svchost.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 2176 d146deab32fdab4c09a6978989bf0ac5e3b0696fd0b8d70cfe9d50380d86a5a8.exe 2176 d146deab32fdab4c09a6978989bf0ac5e3b0696fd0b8d70cfe9d50380d86a5a8.exe 1880 explorer.exe 1880 explorer.exe 1876 spoolsv.exe 1876 spoolsv.exe 376 svchost.exe 376 svchost.exe 4908 spoolsv.exe 4908 spoolsv.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2176 wrote to memory of 1880 2176 d146deab32fdab4c09a6978989bf0ac5e3b0696fd0b8d70cfe9d50380d86a5a8.exe 83 PID 2176 wrote to memory of 1880 2176 d146deab32fdab4c09a6978989bf0ac5e3b0696fd0b8d70cfe9d50380d86a5a8.exe 83 PID 2176 wrote to memory of 1880 2176 d146deab32fdab4c09a6978989bf0ac5e3b0696fd0b8d70cfe9d50380d86a5a8.exe 83 PID 1880 wrote to memory of 1876 1880 explorer.exe 84 PID 1880 wrote to memory of 1876 1880 explorer.exe 84 PID 1880 wrote to memory of 1876 1880 explorer.exe 84 PID 1876 wrote to memory of 376 1876 spoolsv.exe 85 PID 1876 wrote to memory of 376 1876 spoolsv.exe 85 PID 1876 wrote to memory of 376 1876 spoolsv.exe 85 PID 376 wrote to memory of 4908 376 svchost.exe 86 PID 376 wrote to memory of 4908 376 svchost.exe 86 PID 376 wrote to memory of 4908 376 svchost.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\d146deab32fdab4c09a6978989bf0ac5e3b0696fd0b8d70cfe9d50380d86a5a8.exe"C:\Users\Admin\AppData\Local\Temp\d146deab32fdab4c09a6978989bf0ac5e3b0696fd0b8d70cfe9d50380d86a5a8.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2176 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1880 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1876 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:376 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4908
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135KB
MD52eb63e9df313b20d65f20a176369a062
SHA19a16277331619abb19b11b05aad65e3ccacfb05d
SHA25627f4278842dc5bf284a4b712a6ca9e80872930b2efa06a3528f6809e5f0f44b3
SHA512bcd2003af6c9e085207b3e825f12962c2b179c035593f3da6c8e358788bc05968e9f432a5a8e0eb0e0147bc404d5af8ac64d722330bbf6d633dd6951293deacc
-
Filesize
135KB
MD53f20597802d7a3995c01fe5f895f7f9c
SHA1ce05bfa437fd86469a63af1a55a861cf73fc6d96
SHA256ea4eec69f0c24a3a6cbd6a398bf2328b72dc7f3202ab09fe6ecd62880bb79620
SHA512958a8ce8cdcca5710e7263d344b6230778e106e36eba6204a0240fef05d98de324ca495e987ac7a22b27316629bfafb78869b41ea678b7e1f01ff823c4213fa4
-
Filesize
135KB
MD54dfd29cdde8945e591ab7eb1530d1f33
SHA1a52b4339708526e133341924f352d452aafef1a5
SHA256a9565433d78312243cc4bbbd3e9abb57a8fb8cf5ea144ede14fa743836291b1f
SHA5122a0680b1ac011019f88fd3c80729d97cfb7aeec6e036515a350db62858d105a9e95e2d506f0efac102e93b98277b2bf94e771c9907473cc982df100a9702f55b