Analysis
-
max time kernel
120s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-01-2025 06:51
Static task
static1
Behavioral task
behavioral1
Sample
e221e438393ee641406d919d43a4eb3205644ae31f35713c059f688bc2ebe3f3N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e221e438393ee641406d919d43a4eb3205644ae31f35713c059f688bc2ebe3f3N.exe
Resource
win10v2004-20241007-en
General
-
Target
e221e438393ee641406d919d43a4eb3205644ae31f35713c059f688bc2ebe3f3N.exe
-
Size
135KB
-
MD5
4378eac179cc19e0d57d83c5f7bd2b80
-
SHA1
48eb8741f6081b2f01f69d04ca422cd0075d7bc6
-
SHA256
e221e438393ee641406d919d43a4eb3205644ae31f35713c059f688bc2ebe3f3
-
SHA512
09315720b50c653b3027b9e8815d6252745c856b54a0ced4f5f1d5cc46f2cc457175734c01c5d5234e90c061ef3cf100926314c0d694622c835add5407c5b1ca
-
SSDEEP
1536:XfsEqouTRcG/Mzvgf7xEuvnXNTRdUzwTekUOisZ1yDDajtXbgwFTlI:XVqoCl/YgjxEufVU0TbTyDDalbI
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 4124 explorer.exe 3748 spoolsv.exe 3268 svchost.exe 4828 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification \??\c:\windows\resources\themes\explorer.exe e221e438393ee641406d919d43a4eb3205644ae31f35713c059f688bc2ebe3f3N.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e221e438393ee641406d919d43a4eb3205644ae31f35713c059f688bc2ebe3f3N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4600 e221e438393ee641406d919d43a4eb3205644ae31f35713c059f688bc2ebe3f3N.exe 4600 e221e438393ee641406d919d43a4eb3205644ae31f35713c059f688bc2ebe3f3N.exe 4600 e221e438393ee641406d919d43a4eb3205644ae31f35713c059f688bc2ebe3f3N.exe 4600 e221e438393ee641406d919d43a4eb3205644ae31f35713c059f688bc2ebe3f3N.exe 4600 e221e438393ee641406d919d43a4eb3205644ae31f35713c059f688bc2ebe3f3N.exe 4600 e221e438393ee641406d919d43a4eb3205644ae31f35713c059f688bc2ebe3f3N.exe 4600 e221e438393ee641406d919d43a4eb3205644ae31f35713c059f688bc2ebe3f3N.exe 4600 e221e438393ee641406d919d43a4eb3205644ae31f35713c059f688bc2ebe3f3N.exe 4600 e221e438393ee641406d919d43a4eb3205644ae31f35713c059f688bc2ebe3f3N.exe 4600 e221e438393ee641406d919d43a4eb3205644ae31f35713c059f688bc2ebe3f3N.exe 4600 e221e438393ee641406d919d43a4eb3205644ae31f35713c059f688bc2ebe3f3N.exe 4600 e221e438393ee641406d919d43a4eb3205644ae31f35713c059f688bc2ebe3f3N.exe 4600 e221e438393ee641406d919d43a4eb3205644ae31f35713c059f688bc2ebe3f3N.exe 4600 e221e438393ee641406d919d43a4eb3205644ae31f35713c059f688bc2ebe3f3N.exe 4600 e221e438393ee641406d919d43a4eb3205644ae31f35713c059f688bc2ebe3f3N.exe 4600 e221e438393ee641406d919d43a4eb3205644ae31f35713c059f688bc2ebe3f3N.exe 4600 e221e438393ee641406d919d43a4eb3205644ae31f35713c059f688bc2ebe3f3N.exe 4600 e221e438393ee641406d919d43a4eb3205644ae31f35713c059f688bc2ebe3f3N.exe 4600 e221e438393ee641406d919d43a4eb3205644ae31f35713c059f688bc2ebe3f3N.exe 4600 e221e438393ee641406d919d43a4eb3205644ae31f35713c059f688bc2ebe3f3N.exe 4600 e221e438393ee641406d919d43a4eb3205644ae31f35713c059f688bc2ebe3f3N.exe 4600 e221e438393ee641406d919d43a4eb3205644ae31f35713c059f688bc2ebe3f3N.exe 4600 e221e438393ee641406d919d43a4eb3205644ae31f35713c059f688bc2ebe3f3N.exe 4600 e221e438393ee641406d919d43a4eb3205644ae31f35713c059f688bc2ebe3f3N.exe 4600 e221e438393ee641406d919d43a4eb3205644ae31f35713c059f688bc2ebe3f3N.exe 4600 e221e438393ee641406d919d43a4eb3205644ae31f35713c059f688bc2ebe3f3N.exe 4600 e221e438393ee641406d919d43a4eb3205644ae31f35713c059f688bc2ebe3f3N.exe 4600 e221e438393ee641406d919d43a4eb3205644ae31f35713c059f688bc2ebe3f3N.exe 4600 e221e438393ee641406d919d43a4eb3205644ae31f35713c059f688bc2ebe3f3N.exe 4600 e221e438393ee641406d919d43a4eb3205644ae31f35713c059f688bc2ebe3f3N.exe 4600 e221e438393ee641406d919d43a4eb3205644ae31f35713c059f688bc2ebe3f3N.exe 4600 e221e438393ee641406d919d43a4eb3205644ae31f35713c059f688bc2ebe3f3N.exe 4600 e221e438393ee641406d919d43a4eb3205644ae31f35713c059f688bc2ebe3f3N.exe 4600 e221e438393ee641406d919d43a4eb3205644ae31f35713c059f688bc2ebe3f3N.exe 4124 explorer.exe 4124 explorer.exe 4124 explorer.exe 4124 explorer.exe 4124 explorer.exe 4124 explorer.exe 4124 explorer.exe 4124 explorer.exe 4124 explorer.exe 4124 explorer.exe 4124 explorer.exe 4124 explorer.exe 4124 explorer.exe 4124 explorer.exe 4124 explorer.exe 4124 explorer.exe 4124 explorer.exe 4124 explorer.exe 4124 explorer.exe 4124 explorer.exe 4124 explorer.exe 4124 explorer.exe 4124 explorer.exe 4124 explorer.exe 4124 explorer.exe 4124 explorer.exe 4124 explorer.exe 4124 explorer.exe 4124 explorer.exe 4124 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 4124 explorer.exe 3268 svchost.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 4600 e221e438393ee641406d919d43a4eb3205644ae31f35713c059f688bc2ebe3f3N.exe 4600 e221e438393ee641406d919d43a4eb3205644ae31f35713c059f688bc2ebe3f3N.exe 4124 explorer.exe 4124 explorer.exe 3748 spoolsv.exe 3748 spoolsv.exe 3268 svchost.exe 3268 svchost.exe 4828 spoolsv.exe 4828 spoolsv.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4600 wrote to memory of 4124 4600 e221e438393ee641406d919d43a4eb3205644ae31f35713c059f688bc2ebe3f3N.exe 82 PID 4600 wrote to memory of 4124 4600 e221e438393ee641406d919d43a4eb3205644ae31f35713c059f688bc2ebe3f3N.exe 82 PID 4600 wrote to memory of 4124 4600 e221e438393ee641406d919d43a4eb3205644ae31f35713c059f688bc2ebe3f3N.exe 82 PID 4124 wrote to memory of 3748 4124 explorer.exe 83 PID 4124 wrote to memory of 3748 4124 explorer.exe 83 PID 4124 wrote to memory of 3748 4124 explorer.exe 83 PID 3748 wrote to memory of 3268 3748 spoolsv.exe 84 PID 3748 wrote to memory of 3268 3748 spoolsv.exe 84 PID 3748 wrote to memory of 3268 3748 spoolsv.exe 84 PID 3268 wrote to memory of 4828 3268 svchost.exe 85 PID 3268 wrote to memory of 4828 3268 svchost.exe 85 PID 3268 wrote to memory of 4828 3268 svchost.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\e221e438393ee641406d919d43a4eb3205644ae31f35713c059f688bc2ebe3f3N.exe"C:\Users\Admin\AppData\Local\Temp\e221e438393ee641406d919d43a4eb3205644ae31f35713c059f688bc2ebe3f3N.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4600 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4124 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3748 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3268 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4828
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135KB
MD50ef47f3de7a6cb3eccfe641bdcc7d49b
SHA14c3ff08788777e683f51b6f85429074a2f46c7f5
SHA256fb32a5d00e95e0f97c2a878d31bb7234ddb1c2a01182edd7034bc63f81fab57d
SHA512bac850edcd89dede3d1dd7067b5605a93151e1e38a8c30e2f213d79c4139c5c13077a190c57975ec7422ba4d8aeac6b908b9b825cf21ded34f75134005fed537
-
Filesize
135KB
MD539858d1f0d3ebbe39ab020c2f3e1c1da
SHA16c15cf15f21dc788053652989034a8e09bdae4c3
SHA25642c2c3cdadf1008a4b5c95e245a19e0acbe20e53459f70bd50142f21173266ab
SHA512f3ccd2a5851f31ebce3d83d88b0cd908440e127d42d47ab54a1d270be4b02c0b3128eda13d9454144d0423538b3ce7f353256a6203b3987b047e03b0a89732d4
-
Filesize
135KB
MD5f902a54ae3180f41bd3104699abf519f
SHA16aaeaabee2cb1e4e341b6d6c83d14e782a2b71fe
SHA256128a71d4b33d25eff44a07d8a17dc6c22961f5afc9db97227258585d52fe677a
SHA512b3638188936bcc44c5a4b7c716b88c87c9cf38951e1654b0ad5ff2e230cb35c97fc789ddaf63b24610d59a88c50a60aa36f7566179f57e912fc3749b77f445df