Analysis
-
max time kernel
153s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
30-10-2022 05:23
Static task
static1
Behavioral task
behavioral1
Sample
c54917d0c61bbbf56fb53a698f45f13f8884f9391b357030a86775e49455385c.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
c54917d0c61bbbf56fb53a698f45f13f8884f9391b357030a86775e49455385c.exe
Resource
win10v2004-20220812-en
General
-
Target
c54917d0c61bbbf56fb53a698f45f13f8884f9391b357030a86775e49455385c.exe
-
Size
288KB
-
MD5
839b92b07934e02f8ffdc41aad980a79
-
SHA1
a252419e6e78fa327e7dcae19dc7a75b094357d0
-
SHA256
c54917d0c61bbbf56fb53a698f45f13f8884f9391b357030a86775e49455385c
-
SHA512
976984fa798f4ac5cd41d197cc8ffd82f9c2105cb9abeda88ccb1474227d800f0fb1d11893d82e7c729cadb9175318c3df3c1dc301dc606bee0533ad9a8eecf6
-
SSDEEP
3072:JvEfVUzSLhIVbV6i5LirrlZrHyrUHUckoMQ2RN6ungPKvLP:JvEN2U+T6i5LirrllHy4HUcMQY6lKLP
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 5040 explorer.exe 4556 spoolsv.exe 2000 svchost.exe 2024 spoolsv.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification \??\c:\windows\system\explorer.exe c54917d0c61bbbf56fb53a698f45f13f8884f9391b357030a86775e49455385c.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe svchost.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1200 c54917d0c61bbbf56fb53a698f45f13f8884f9391b357030a86775e49455385c.exe 1200 c54917d0c61bbbf56fb53a698f45f13f8884f9391b357030a86775e49455385c.exe 5040 explorer.exe 5040 explorer.exe 5040 explorer.exe 5040 explorer.exe 5040 explorer.exe 5040 explorer.exe 5040 explorer.exe 5040 explorer.exe 5040 explorer.exe 2000 svchost.exe 5040 explorer.exe 2000 svchost.exe 2000 svchost.exe 2000 svchost.exe 5040 explorer.exe 5040 explorer.exe 2000 svchost.exe 2000 svchost.exe 5040 explorer.exe 5040 explorer.exe 2000 svchost.exe 2000 svchost.exe 5040 explorer.exe 5040 explorer.exe 2000 svchost.exe 2000 svchost.exe 2000 svchost.exe 5040 explorer.exe 2000 svchost.exe 5040 explorer.exe 5040 explorer.exe 2000 svchost.exe 5040 explorer.exe 2000 svchost.exe 5040 explorer.exe 2000 svchost.exe 5040 explorer.exe 2000 svchost.exe 5040 explorer.exe 2000 svchost.exe 5040 explorer.exe 2000 svchost.exe 5040 explorer.exe 2000 svchost.exe 5040 explorer.exe 2000 svchost.exe 2000 svchost.exe 2000 svchost.exe 5040 explorer.exe 5040 explorer.exe 5040 explorer.exe 2000 svchost.exe 5040 explorer.exe 2000 svchost.exe 5040 explorer.exe 2000 svchost.exe 5040 explorer.exe 2000 svchost.exe 5040 explorer.exe 2000 svchost.exe 5040 explorer.exe 2000 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 5040 explorer.exe 2000 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1200 c54917d0c61bbbf56fb53a698f45f13f8884f9391b357030a86775e49455385c.exe 1200 c54917d0c61bbbf56fb53a698f45f13f8884f9391b357030a86775e49455385c.exe 5040 explorer.exe 5040 explorer.exe 4556 spoolsv.exe 4556 spoolsv.exe 2000 svchost.exe 2000 svchost.exe 2024 spoolsv.exe 2024 spoolsv.exe 5040 explorer.exe 5040 explorer.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1200 wrote to memory of 5040 1200 c54917d0c61bbbf56fb53a698f45f13f8884f9391b357030a86775e49455385c.exe 82 PID 1200 wrote to memory of 5040 1200 c54917d0c61bbbf56fb53a698f45f13f8884f9391b357030a86775e49455385c.exe 82 PID 1200 wrote to memory of 5040 1200 c54917d0c61bbbf56fb53a698f45f13f8884f9391b357030a86775e49455385c.exe 82 PID 5040 wrote to memory of 4556 5040 explorer.exe 83 PID 5040 wrote to memory of 4556 5040 explorer.exe 83 PID 5040 wrote to memory of 4556 5040 explorer.exe 83 PID 4556 wrote to memory of 2000 4556 spoolsv.exe 84 PID 4556 wrote to memory of 2000 4556 spoolsv.exe 84 PID 4556 wrote to memory of 2000 4556 spoolsv.exe 84 PID 2000 wrote to memory of 2024 2000 svchost.exe 85 PID 2000 wrote to memory of 2024 2000 svchost.exe 85 PID 2000 wrote to memory of 2024 2000 svchost.exe 85 PID 2000 wrote to memory of 1052 2000 svchost.exe 86 PID 2000 wrote to memory of 1052 2000 svchost.exe 86 PID 2000 wrote to memory of 1052 2000 svchost.exe 86 PID 2000 wrote to memory of 996 2000 svchost.exe 95 PID 2000 wrote to memory of 996 2000 svchost.exe 95 PID 2000 wrote to memory of 996 2000 svchost.exe 95 PID 2000 wrote to memory of 1264 2000 svchost.exe 97 PID 2000 wrote to memory of 1264 2000 svchost.exe 97 PID 2000 wrote to memory of 1264 2000 svchost.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\c54917d0c61bbbf56fb53a698f45f13f8884f9391b357030a86775e49455385c.exe"C:\Users\Admin\AppData\Local\Temp\c54917d0c61bbbf56fb53a698f45f13f8884f9391b357030a86775e49455385c.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1200 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Modifies Installed Components in the registry
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5040 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4556 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Modifies Installed Components in the registry
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2000 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2024
-
-
C:\Windows\SysWOW64\at.exeat 18:01 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:1052
-
-
C:\Windows\SysWOW64\at.exeat 18:02 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:996
-
-
C:\Windows\SysWOW64\at.exeat 18:03 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:1264
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
287KB
MD5ec0edc6605559181df99dd463ed43fa5
SHA15e71cfc9bd5715aa6d5862b94395ba625d7fded2
SHA256693ab1a14e8e98e7167bf86094606c7af384fee2f6e3f5f0ebc328ccd5d13539
SHA5125159f40c70971cb34b9ef4d6c4c981d9968abde3fe182662aad945d17c791e12f91c5d319ea9539e4a674a5de6fbdbb188190aae9cf565c28344947bb38002d0
-
Filesize
288KB
MD578852e0bb138b5ef63c451ad1af65463
SHA1c9ade061d64d30dd084428696fcbc6230834840f
SHA25663d40ef08b449d8408c855a9dccc849687fc27bbb5355206e63bc91cd833bc71
SHA512b8d7f799de526b292ce31d6936ac871ad0c4579324b1e0632da7cdb03b88075c6970b24ebb99acff2cd69be070749167d40373667b1eb5f0cb3a1daaa4115132
-
Filesize
287KB
MD5688361a33c0f896b162a66d5d826c23e
SHA175deed446254f2748bf5d82b752c8bdf6a15522f
SHA2564037328a4521264534239881c300ab43defd121eaf8a5d660faf270ff6a4c6cd
SHA5122d38404b021ec7b988afe3ba3959eae2e7df5f568d6e90297b03262c6a4c5960d0d367fbd884ed5f8502f43fe29081ede660f931f25951fc5529b742e6f142d3
-
Filesize
287KB
MD5688361a33c0f896b162a66d5d826c23e
SHA175deed446254f2748bf5d82b752c8bdf6a15522f
SHA2564037328a4521264534239881c300ab43defd121eaf8a5d660faf270ff6a4c6cd
SHA5122d38404b021ec7b988afe3ba3959eae2e7df5f568d6e90297b03262c6a4c5960d0d367fbd884ed5f8502f43fe29081ede660f931f25951fc5529b742e6f142d3
-
Filesize
288KB
MD5f220500689583a00aecf386bcf16da53
SHA168c3082f5ea122a6f6e71b124d53bc8ff3e57c99
SHA25646b5f00b1ec827528d65d8c3744560dca6b5847b0afc0fb5f274adc748e8c123
SHA512fdd253fd4da0486bdcb4243f31d6a61d08759b8fe806a2cc0e7436abd6df9ea7346316d4d4d044e81b86309908c0bc16c79ab14b1f6ae2ad102b73436a551c56
-
Filesize
288KB
MD578852e0bb138b5ef63c451ad1af65463
SHA1c9ade061d64d30dd084428696fcbc6230834840f
SHA25663d40ef08b449d8408c855a9dccc849687fc27bbb5355206e63bc91cd833bc71
SHA512b8d7f799de526b292ce31d6936ac871ad0c4579324b1e0632da7cdb03b88075c6970b24ebb99acff2cd69be070749167d40373667b1eb5f0cb3a1daaa4115132
-
Filesize
287KB
MD5688361a33c0f896b162a66d5d826c23e
SHA175deed446254f2748bf5d82b752c8bdf6a15522f
SHA2564037328a4521264534239881c300ab43defd121eaf8a5d660faf270ff6a4c6cd
SHA5122d38404b021ec7b988afe3ba3959eae2e7df5f568d6e90297b03262c6a4c5960d0d367fbd884ed5f8502f43fe29081ede660f931f25951fc5529b742e6f142d3
-
Filesize
288KB
MD5f220500689583a00aecf386bcf16da53
SHA168c3082f5ea122a6f6e71b124d53bc8ff3e57c99
SHA25646b5f00b1ec827528d65d8c3744560dca6b5847b0afc0fb5f274adc748e8c123
SHA512fdd253fd4da0486bdcb4243f31d6a61d08759b8fe806a2cc0e7436abd6df9ea7346316d4d4d044e81b86309908c0bc16c79ab14b1f6ae2ad102b73436a551c56