Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
29-06-2024 04:11
Static task
static1
Behavioral task
behavioral1
Sample
e2e3adca74a101c2ccc9449b7c75aff059d08864ba87698fdc6212e96390c799.exe
Resource
win7-20240508-en
General
-
Target
e2e3adca74a101c2ccc9449b7c75aff059d08864ba87698fdc6212e96390c799.exe
-
Size
319KB
-
MD5
09792127dbc60545639e024d1e2195e5
-
SHA1
58fe06a353b2a4d6ab3d4fdc10a7c305f7563335
-
SHA256
e2e3adca74a101c2ccc9449b7c75aff059d08864ba87698fdc6212e96390c799
-
SHA512
0ea9ea7e7508192ea49db5b4d3da0baa8ae25612e044048c2313e356e2fcb70bfee68b5525305ed626d1186919cea598caf2bcf8ca026a6884e5f43e67b87589
-
SSDEEP
3072:XVqoCl/YgjxEufVU0TbTyDDalBVnnAQVG/LytaKItS/fiLKS+f5Aq7iu:XsLqdufVUNDa5OTeHI8HiL7+f5b
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
Processes:
svchost.exeexplorer.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
UPX dump on OEP (original entry point) 2 IoCs
Processes:
resource yara_rule behavioral1/memory/2216-14-0x0000000000400000-0x000000000042A000-memory.dmp UPX behavioral1/memory/2216-21-0x0000000000400000-0x000000000042A000-memory.dmp UPX -
Executes dropped EXE 6 IoCs
Processes:
e2e3adca74a101c2ccc9449b7c75aff059d08864ba87698fdc6212e96390c799.exe icsys.icn.exeexplorer.exespoolsv.exesvchost.exespoolsv.exepid process 2216 e2e3adca74a101c2ccc9449b7c75aff059d08864ba87698fdc6212e96390c799.exe 1992 icsys.icn.exe 2816 explorer.exe 2916 spoolsv.exe 2872 svchost.exe 2740 spoolsv.exe -
Loads dropped DLL 9 IoCs
Processes:
e2e3adca74a101c2ccc9449b7c75aff059d08864ba87698fdc6212e96390c799.exee2e3adca74a101c2ccc9449b7c75aff059d08864ba87698fdc6212e96390c799.exe icsys.icn.exeexplorer.exespoolsv.exesvchost.exepid process 2480 e2e3adca74a101c2ccc9449b7c75aff059d08864ba87698fdc6212e96390c799.exe 2480 e2e3adca74a101c2ccc9449b7c75aff059d08864ba87698fdc6212e96390c799.exe 2216 e2e3adca74a101c2ccc9449b7c75aff059d08864ba87698fdc6212e96390c799.exe 2216 e2e3adca74a101c2ccc9449b7c75aff059d08864ba87698fdc6212e96390c799.exe 2480 e2e3adca74a101c2ccc9449b7c75aff059d08864ba87698fdc6212e96390c799.exe 1992 icsys.icn.exe 2816 explorer.exe 2916 spoolsv.exe 2872 svchost.exe -
Processes:
resource yara_rule behavioral1/memory/2216-14-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2216-21-0x0000000000400000-0x000000000042A000-memory.dmp upx -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
explorer.exesvchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe -
Drops file in System32 directory 2 IoCs
Processes:
explorer.exesvchost.exedescription ioc process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Drops file in Windows directory 5 IoCs
Processes:
e2e3adca74a101c2ccc9449b7c75aff059d08864ba87698fdc6212e96390c799.exeicsys.icn.exeexplorer.exespoolsv.exedescription ioc process File opened for modification C:\Windows\Resources\Themes\icsys.icn.exe e2e3adca74a101c2ccc9449b7c75aff059d08864ba87698fdc6212e96390c799.exe File opened for modification \??\c:\windows\resources\themes\explorer.exe icsys.icn.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2088 2216 WerFault.exe e2e3adca74a101c2ccc9449b7c75aff059d08864ba87698fdc6212e96390c799.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exepid process 2440 schtasks.exe 852 schtasks.exe 1864 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
e2e3adca74a101c2ccc9449b7c75aff059d08864ba87698fdc6212e96390c799.exeicsys.icn.exeexplorer.exesvchost.exepid process 2480 e2e3adca74a101c2ccc9449b7c75aff059d08864ba87698fdc6212e96390c799.exe 2480 e2e3adca74a101c2ccc9449b7c75aff059d08864ba87698fdc6212e96390c799.exe 2480 e2e3adca74a101c2ccc9449b7c75aff059d08864ba87698fdc6212e96390c799.exe 2480 e2e3adca74a101c2ccc9449b7c75aff059d08864ba87698fdc6212e96390c799.exe 2480 e2e3adca74a101c2ccc9449b7c75aff059d08864ba87698fdc6212e96390c799.exe 2480 e2e3adca74a101c2ccc9449b7c75aff059d08864ba87698fdc6212e96390c799.exe 2480 e2e3adca74a101c2ccc9449b7c75aff059d08864ba87698fdc6212e96390c799.exe 2480 e2e3adca74a101c2ccc9449b7c75aff059d08864ba87698fdc6212e96390c799.exe 2480 e2e3adca74a101c2ccc9449b7c75aff059d08864ba87698fdc6212e96390c799.exe 2480 e2e3adca74a101c2ccc9449b7c75aff059d08864ba87698fdc6212e96390c799.exe 2480 e2e3adca74a101c2ccc9449b7c75aff059d08864ba87698fdc6212e96390c799.exe 2480 e2e3adca74a101c2ccc9449b7c75aff059d08864ba87698fdc6212e96390c799.exe 2480 e2e3adca74a101c2ccc9449b7c75aff059d08864ba87698fdc6212e96390c799.exe 2480 e2e3adca74a101c2ccc9449b7c75aff059d08864ba87698fdc6212e96390c799.exe 2480 e2e3adca74a101c2ccc9449b7c75aff059d08864ba87698fdc6212e96390c799.exe 2480 e2e3adca74a101c2ccc9449b7c75aff059d08864ba87698fdc6212e96390c799.exe 1992 icsys.icn.exe 1992 icsys.icn.exe 1992 icsys.icn.exe 1992 icsys.icn.exe 1992 icsys.icn.exe 1992 icsys.icn.exe 1992 icsys.icn.exe 1992 icsys.icn.exe 1992 icsys.icn.exe 1992 icsys.icn.exe 1992 icsys.icn.exe 1992 icsys.icn.exe 1992 icsys.icn.exe 1992 icsys.icn.exe 1992 icsys.icn.exe 1992 icsys.icn.exe 1992 icsys.icn.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2872 svchost.exe 2872 svchost.exe 2872 svchost.exe 2872 svchost.exe 2872 svchost.exe 2872 svchost.exe 2872 svchost.exe 2872 svchost.exe 2872 svchost.exe 2872 svchost.exe 2872 svchost.exe 2872 svchost.exe 2872 svchost.exe 2872 svchost.exe 2872 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
svchost.exeexplorer.exepid process 2872 svchost.exe 2816 explorer.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
Processes:
e2e3adca74a101c2ccc9449b7c75aff059d08864ba87698fdc6212e96390c799.exeicsys.icn.exeexplorer.exespoolsv.exesvchost.exespoolsv.exepid process 2480 e2e3adca74a101c2ccc9449b7c75aff059d08864ba87698fdc6212e96390c799.exe 2480 e2e3adca74a101c2ccc9449b7c75aff059d08864ba87698fdc6212e96390c799.exe 1992 icsys.icn.exe 1992 icsys.icn.exe 2816 explorer.exe 2816 explorer.exe 2916 spoolsv.exe 2916 spoolsv.exe 2872 svchost.exe 2872 svchost.exe 2740 spoolsv.exe 2740 spoolsv.exe -
Suspicious use of WriteProcessMemory 40 IoCs
Processes:
e2e3adca74a101c2ccc9449b7c75aff059d08864ba87698fdc6212e96390c799.exeicsys.icn.exeexplorer.exespoolsv.exesvchost.exedescription pid process target process PID 2480 wrote to memory of 2216 2480 e2e3adca74a101c2ccc9449b7c75aff059d08864ba87698fdc6212e96390c799.exe e2e3adca74a101c2ccc9449b7c75aff059d08864ba87698fdc6212e96390c799.exe PID 2480 wrote to memory of 2216 2480 e2e3adca74a101c2ccc9449b7c75aff059d08864ba87698fdc6212e96390c799.exe e2e3adca74a101c2ccc9449b7c75aff059d08864ba87698fdc6212e96390c799.exe PID 2480 wrote to memory of 2216 2480 e2e3adca74a101c2ccc9449b7c75aff059d08864ba87698fdc6212e96390c799.exe e2e3adca74a101c2ccc9449b7c75aff059d08864ba87698fdc6212e96390c799.exe PID 2480 wrote to memory of 2216 2480 e2e3adca74a101c2ccc9449b7c75aff059d08864ba87698fdc6212e96390c799.exe e2e3adca74a101c2ccc9449b7c75aff059d08864ba87698fdc6212e96390c799.exe PID 2480 wrote to memory of 1992 2480 e2e3adca74a101c2ccc9449b7c75aff059d08864ba87698fdc6212e96390c799.exe icsys.icn.exe PID 2480 wrote to memory of 1992 2480 e2e3adca74a101c2ccc9449b7c75aff059d08864ba87698fdc6212e96390c799.exe icsys.icn.exe PID 2480 wrote to memory of 1992 2480 e2e3adca74a101c2ccc9449b7c75aff059d08864ba87698fdc6212e96390c799.exe icsys.icn.exe PID 2480 wrote to memory of 1992 2480 e2e3adca74a101c2ccc9449b7c75aff059d08864ba87698fdc6212e96390c799.exe icsys.icn.exe PID 1992 wrote to memory of 2816 1992 icsys.icn.exe explorer.exe PID 1992 wrote to memory of 2816 1992 icsys.icn.exe explorer.exe PID 1992 wrote to memory of 2816 1992 icsys.icn.exe explorer.exe PID 1992 wrote to memory of 2816 1992 icsys.icn.exe explorer.exe PID 2816 wrote to memory of 2916 2816 explorer.exe spoolsv.exe PID 2816 wrote to memory of 2916 2816 explorer.exe spoolsv.exe PID 2816 wrote to memory of 2916 2816 explorer.exe spoolsv.exe PID 2816 wrote to memory of 2916 2816 explorer.exe spoolsv.exe PID 2916 wrote to memory of 2872 2916 spoolsv.exe svchost.exe PID 2916 wrote to memory of 2872 2916 spoolsv.exe svchost.exe PID 2916 wrote to memory of 2872 2916 spoolsv.exe svchost.exe PID 2916 wrote to memory of 2872 2916 spoolsv.exe svchost.exe PID 2872 wrote to memory of 2740 2872 svchost.exe spoolsv.exe PID 2872 wrote to memory of 2740 2872 svchost.exe spoolsv.exe PID 2872 wrote to memory of 2740 2872 svchost.exe spoolsv.exe PID 2872 wrote to memory of 2740 2872 svchost.exe spoolsv.exe PID 2816 wrote to memory of 2632 2816 explorer.exe Explorer.exe PID 2816 wrote to memory of 2632 2816 explorer.exe Explorer.exe PID 2816 wrote to memory of 2632 2816 explorer.exe Explorer.exe PID 2816 wrote to memory of 2632 2816 explorer.exe Explorer.exe PID 2872 wrote to memory of 2440 2872 svchost.exe schtasks.exe PID 2872 wrote to memory of 2440 2872 svchost.exe schtasks.exe PID 2872 wrote to memory of 2440 2872 svchost.exe schtasks.exe PID 2872 wrote to memory of 2440 2872 svchost.exe schtasks.exe PID 2872 wrote to memory of 852 2872 svchost.exe schtasks.exe PID 2872 wrote to memory of 852 2872 svchost.exe schtasks.exe PID 2872 wrote to memory of 852 2872 svchost.exe schtasks.exe PID 2872 wrote to memory of 852 2872 svchost.exe schtasks.exe PID 2872 wrote to memory of 1864 2872 svchost.exe schtasks.exe PID 2872 wrote to memory of 1864 2872 svchost.exe schtasks.exe PID 2872 wrote to memory of 1864 2872 svchost.exe schtasks.exe PID 2872 wrote to memory of 1864 2872 svchost.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e2e3adca74a101c2ccc9449b7c75aff059d08864ba87698fdc6212e96390c799.exe"C:\Users\Admin\AppData\Local\Temp\e2e3adca74a101c2ccc9449b7c75aff059d08864ba87698fdc6212e96390c799.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
\??\c:\users\admin\appdata\local\temp\e2e3adca74a101c2ccc9449b7c75aff059d08864ba87698fdc6212e96390c799.exec:\users\admin\appdata\local\temp\e2e3adca74a101c2ccc9449b7c75aff059d08864ba87698fdc6212e96390c799.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2216 -s 1803⤵
- Program crash
-
C:\Windows\Resources\Themes\icsys.icn.exeC:\Windows\Resources\Themes\icsys.icn.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe3⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe5⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 04:13 /f6⤵
- Scheduled Task/Job: Scheduled Task
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 04:14 /f6⤵
- Scheduled Task/Job: Scheduled Task
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 04:15 /f6⤵
- Scheduled Task/Job: Scheduled Task
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe4⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\Resources\Themes\explorer.exeFilesize
135KB
MD55df368e900a770427dd6e13abfc57729
SHA11e75fb63630762cc877121b7cc31bd781a97963b
SHA256d919bc8f34620823b68aef1863643969bcbcad1cda663b950e34513230a507e3
SHA512e5d22b3b0a061e52b354151b5343f5db53eedbf73124293aa8962038954a44cd7251e80ae10e2292f3c5e92fff7e6e575cad15a020d9ee89221a1c90c79f49dc
-
\Users\Admin\AppData\Local\Temp\e2e3adca74a101c2ccc9449b7c75aff059d08864ba87698fdc6212e96390c799.exeFilesize
184KB
MD51d92c741bc5b2d34dcd0a0265ab54275
SHA1a160982825420567c15f6c11f777cb4ccbe69bb8
SHA2563aab3cf37efd4c034da13a0d7ba8725f49a21d227e05f3bba91d8d36350f4a67
SHA5121da728dba6383e0e9fc51370f8fb782a15e724b57b952d952e4c719f81d517a56035b1e9496da3d7f9bf79af0a4bd5caa8a351ca60f40d637da3648224944b94
-
\Users\Admin\AppData\Local\Temp\~TM21C3.tmpFilesize
1.2MB
MD5d124f55b9393c976963407dff51ffa79
SHA12c7bbedd79791bfb866898c85b504186db610b5d
SHA256ea1e16247c848c8c171c4cd1fa17bc5a018a1fcb0c0dac25009066b6667b8eef
SHA512278fe3a4b1fbbe700e4f4483b610133e975e36e101455661d5197bd892a68839b9d555499040d200c92aefa9e3819380e395c0cd85d5fc845c6364d128a8cf06
-
\Users\Admin\AppData\Local\Temp\~TM21F3.tmpFilesize
1.1MB
MD59b98d47916ead4f69ef51b56b0c2323c
SHA1290a80b4ded0efc0fd00816f373fcea81a521330
SHA25696e0ae104c9662d0d20fdf59844c2d18334e5847b6c4fc7f8ce4b3b87f39887b
SHA51268b67021f228d8d71df4deb0b6388558b2f935a6aa466a12199cd37ada47ee588ea407b278d190d3a498b0ef3f5f1a2573a469b7ea5561ab2e7055c45565fe94
-
\Windows\Resources\Themes\icsys.icn.exeFilesize
135KB
MD53b61297a768586856d5b7a157cfc856f
SHA1b2469454e1f9f6b3a2d2673464334330ef3644b0
SHA256a18e2f3103f4086b37706681b66bc12d8c96df97978cd7f55e1e382d9b486568
SHA5121a07c6a8569c1fe94bcc4153bec7f64dfe9be91440a3531ee74b71dd23ef3f9598ffd272d420a971a7f56a9b173f25092ce80fbd0bf8ed0472437e6cbec3af0b
-
\Windows\Resources\spoolsv.exeFilesize
135KB
MD55fc7d5b424c4f4c943cd6440fc353d1a
SHA14164e18b613a14458a53aca2453efcb533c27005
SHA256f62e9433f659b3d03549b0dc8846bf2f435761365651de659fbbc352e75a2687
SHA512073771c2673f655a445fd3d2fde9a662409a828e734fd50d3826e823770ae1362d4350c75b8f452ccbc33408dc4e3f1e448f53c30dafd4a573cd9579488f6696
-
\Windows\Resources\svchost.exeFilesize
135KB
MD5521de4286264b5363ef9815d2f2b637e
SHA11a3842270f4acd14882979d4483d6071a8f4ab77
SHA2569e5089cc880705c51f2fb66e65d32ac3724c93dc12c3cebb5dce56dd9f6e6ac2
SHA512437fb7598713e3f9ae4a71f25476fd4ca108573bace527f6796f15086de553c9b2afef87ea0df36532b5da52870eca64c105703c377f561216b9986884f6da4d
-
memory/1992-73-0x0000000000400000-0x000000000041F000-memory.dmpFilesize
124KB
-
memory/1992-37-0x0000000002580000-0x000000000259F000-memory.dmpFilesize
124KB
-
memory/2216-21-0x0000000000400000-0x000000000042A000-memory.dmpFilesize
168KB
-
memory/2216-14-0x0000000000400000-0x000000000042A000-memory.dmpFilesize
168KB
-
memory/2480-24-0x00000000002F0000-0x000000000030F000-memory.dmpFilesize
124KB
-
memory/2480-72-0x0000000000400000-0x000000000041F000-memory.dmpFilesize
124KB
-
memory/2480-0-0x0000000000400000-0x000000000041F000-memory.dmpFilesize
124KB
-
memory/2740-68-0x0000000000400000-0x000000000041F000-memory.dmpFilesize
124KB
-
memory/2740-70-0x0000000000400000-0x000000000041F000-memory.dmpFilesize
124KB
-
memory/2916-51-0x0000000000400000-0x000000000041F000-memory.dmpFilesize
124KB
-
memory/2916-59-0x0000000001D70000-0x0000000001D8F000-memory.dmpFilesize
124KB
-
memory/2916-71-0x0000000000400000-0x000000000041F000-memory.dmpFilesize
124KB