Analysis
-
max time kernel
210s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 10:41
Static task
static1
Behavioral task
behavioral1
Sample
847ffc3e90573d4faf845bb9473ce93960527e6d3086a58ef09441503c195179.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
847ffc3e90573d4faf845bb9473ce93960527e6d3086a58ef09441503c195179.exe
Resource
win10v2004-20221111-en
General
-
Target
847ffc3e90573d4faf845bb9473ce93960527e6d3086a58ef09441503c195179.exe
-
Size
82KB
-
MD5
7a9f7f8cfa8a9b003ec8a02c2be2bbf1
-
SHA1
5b14b06002dd19c1d916dc560936860b8d615830
-
SHA256
847ffc3e90573d4faf845bb9473ce93960527e6d3086a58ef09441503c195179
-
SHA512
a1637d98ef81c89d030dc96e8ca0a7ce5c77a16c9f9e8e4ca5e78166b71ebc2548a8a318af100e2c616466ec679c9271b0eebdaf7eb2862f38f7e0a4869ffde1
-
SSDEEP
1536:tnqdu3abBGy3G8V0iuokdQX2oooD+AyxAr/:tqhMPskdQXMm/
Malware Config
Signatures
-
Modifies system executable filetype association 2 TTPs 2 IoCs
Processes:
hdsp.exe847ffc3e90573d4faf845bb9473ce93960527e6d3086a58ef09441503c195179.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt hdsp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt 847ffc3e90573d4faf845bb9473ce93960527e6d3086a58ef09441503c195179.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 2 IoCs
Processes:
847ffc3e90573d4faf845bb9473ce93960527e6d3086a58ef09441503c195179.exehdsp.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 847ffc3e90573d4faf845bb9473ce93960527e6d3086a58ef09441503c195179.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" hdsp.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
Processes:
847ffc3e90573d4faf845bb9473ce93960527e6d3086a58ef09441503c195179.exehdsp.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 847ffc3e90573d4faf845bb9473ce93960527e6d3086a58ef09441503c195179.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" hdsp.exe -
Executes dropped EXE 1 IoCs
Processes:
hdsp.exepid process 548 hdsp.exe -
Loads dropped DLL 2 IoCs
Processes:
847ffc3e90573d4faf845bb9473ce93960527e6d3086a58ef09441503c195179.exepid process 1756 847ffc3e90573d4faf845bb9473ce93960527e6d3086a58ef09441503c195179.exe 1756 847ffc3e90573d4faf845bb9473ce93960527e6d3086a58ef09441503c195179.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
hdsp.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run hdsp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\VisualStyle = "c:\\windows\\system32\\Desktop.sysm" hdsp.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
hdsp.exedescription ioc process File opened (read-only) \??\E: hdsp.exe File opened (read-only) \??\O: hdsp.exe File opened (read-only) \??\Q: hdsp.exe File opened (read-only) \??\R: hdsp.exe File opened (read-only) \??\U: hdsp.exe File opened (read-only) \??\W: hdsp.exe File opened (read-only) \??\J: hdsp.exe File opened (read-only) \??\M: hdsp.exe File opened (read-only) \??\N: hdsp.exe File opened (read-only) \??\V: hdsp.exe File opened (read-only) \??\Y: hdsp.exe File opened (read-only) \??\F: hdsp.exe File opened (read-only) \??\H: hdsp.exe File opened (read-only) \??\I: hdsp.exe File opened (read-only) \??\P: hdsp.exe File opened (read-only) \??\T: hdsp.exe File opened (read-only) \??\Z: hdsp.exe File opened (read-only) \??\B: hdsp.exe File opened (read-only) \??\G: hdsp.exe File opened (read-only) \??\K: hdsp.exe File opened (read-only) \??\L: hdsp.exe File opened (read-only) \??\S: hdsp.exe File opened (read-only) \??\X: hdsp.exe -
Drops file in System32 directory 6 IoCs
Processes:
hdsp.exe847ffc3e90573d4faf845bb9473ce93960527e6d3086a58ef09441503c195179.exedescription ioc process File created \??\c:\windows\SysWOW64\Desktop.sysm hdsp.exe File created \??\c:\windows\SysWOW64\CommandPrompt.Sysm hdsp.exe File created \??\c:\windows\SysWOW64\maxtrox.txt 847ffc3e90573d4faf845bb9473ce93960527e6d3086a58ef09441503c195179.exe File created \??\c:\windows\SysWOW64\Windows 3D.scr 847ffc3e90573d4faf845bb9473ce93960527e6d3086a58ef09441503c195179.exe File opened for modification \??\c:\windows\SysWOW64\maxtrox.txt hdsp.exe File opened for modification \??\c:\windows\SysWOW64\Windows 3D.scr hdsp.exe -
Drops file in Program Files directory 34 IoCs
Processes:
hdsp.exedescription ioc process File opened for modification \??\c:\Program Files\Windows Media Player\WMPDMC.exe hdsp.exe File opened for modification \??\c:\Program Files\Windows Defender\MpCmdRun.exe hdsp.exe File opened for modification \??\c:\Program Files\Windows Defender\MSASCui.exe hdsp.exe File opened for modification \??\c:\Program Files\Windows Mail\wabmig.exe hdsp.exe File opened for modification \??\c:\Program Files\Mozilla Firefox\firefox.exe hdsp.exe File opened for modification \??\c:\Program Files\Mozilla Firefox\minidump-analyzer.exe hdsp.exe File opened for modification \??\c:\Program Files\Mozilla Firefox\plugin-hang-ui.exe hdsp.exe File opened for modification \??\c:\Program Files\Internet Explorer\ieinstal.exe hdsp.exe File opened for modification \??\c:\Program Files\Windows Journal\PDIALOG.exe hdsp.exe File opened for modification \??\c:\Program Files\Windows Media Player\wmpconfig.exe hdsp.exe File opened for modification \??\c:\Program Files\Windows Media Player\wmpnetwk.exe hdsp.exe File opened for modification \??\c:\Program Files\Internet Explorer\iediagcmd.exe hdsp.exe File opened for modification \??\c:\Program Files\Mozilla Firefox\default-browser-agent.exe hdsp.exe File opened for modification \??\c:\Program Files\Windows Media Player\wmplayer.exe hdsp.exe File opened for modification \??\c:\Program Files\Windows Sidebar\sidebar.exe hdsp.exe File opened for modification \??\c:\Program Files\7-Zip\7zFM.exe hdsp.exe File opened for modification \??\c:\Program Files\Internet Explorer\iexplore.exe hdsp.exe File opened for modification \??\c:\Program Files\Mozilla Firefox\updater.exe hdsp.exe File opened for modification \??\c:\Program Files\Mozilla Firefox\plugin-container.exe hdsp.exe File opened for modification \??\c:\Program Files\Windows Mail\wab.exe hdsp.exe File opened for modification \??\c:\Program Files\Windows Media Player\wmlaunch.exe hdsp.exe File opened for modification \??\c:\Program Files\Windows Media Player\wmprph.exe hdsp.exe File opened for modification \??\c:\Program Files\Windows Media Player\wmpshare.exe hdsp.exe File opened for modification \??\c:\Program Files\7-Zip\Uninstall.exe hdsp.exe File opened for modification \??\c:\Program Files\Mozilla Firefox\maintenanceservice.exe hdsp.exe File opened for modification \??\c:\Program Files\Mozilla Firefox\maintenanceservice_installer.exe hdsp.exe File opened for modification \??\c:\Program Files\Windows Media Player\WMPSideShowGadget.exe hdsp.exe File opened for modification \??\c:\Program Files\7-Zip\7z.exe hdsp.exe File opened for modification \??\c:\Program Files\Internet Explorer\ielowutil.exe hdsp.exe File opened for modification \??\c:\Program Files\Windows Media Player\wmpenc.exe hdsp.exe File opened for modification \??\c:\Program Files\Windows Media Player\wmpnscfg.exe hdsp.exe File opened for modification \??\c:\Program Files\7-Zip\7zG.exe hdsp.exe File opened for modification \??\c:\Program Files\Mozilla Firefox\crashreporter.exe hdsp.exe File opened for modification \??\c:\Program Files\Mozilla Firefox\pingsender.exe hdsp.exe -
Modifies registry class 36 IoCs
Processes:
847ffc3e90573d4faf845bb9473ce93960527e6d3086a58ef09441503c195179.exehdsp.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\DefaultIcon 847ffc3e90573d4faf845bb9473ce93960527e6d3086a58ef09441503c195179.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\Shell\Open\Command 847ffc3e90573d4faf845bb9473ce93960527e6d3086a58ef09441503c195179.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\ = "Microsoft System Direct" hdsp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\Shell\Open\Command hdsp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\DefaultIcon\ = "c:\\windows\\SysWow64\\netsetup.exe" hdsp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\Shell 847ffc3e90573d4faf845bb9473ce93960527e6d3086a58ef09441503c195179.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\Shell\Open 847ffc3e90573d4faf845bb9473ce93960527e6d3086a58ef09441503c195179.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\Shell\Open\Command\ = "%1" 847ffc3e90573d4faf845bb9473ce93960527e6d3086a58ef09441503c195179.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\DefaultIcon\ = "c:\\windows\\SysWow64\\rasphone.exe" hdsp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile hdsp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm hdsp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\NeverShowExt hdsp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\DefaultIcon hdsp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd 847ffc3e90573d4faf845bb9473ce93960527e6d3086a58ef09441503c195179.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\DefaultIcon hdsp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\Shell\Open\Command\ = "%1" hdsp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\ = "Microsoft System Direct" 847ffc3e90573d4faf845bb9473ce93960527e6d3086a58ef09441503c195179.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\NeverShowExt 847ffc3e90573d4faf845bb9473ce93960527e6d3086a58ef09441503c195179.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\ = "System Mechanic" hdsp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\Shell\Open\Command hdsp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile 847ffc3e90573d4faf845bb9473ce93960527e6d3086a58ef09441503c195179.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\DefaultIcon\ = "c:\\windows\\SysWow64\\rasphone.exe" 847ffc3e90573d4faf845bb9473ce93960527e6d3086a58ef09441503c195179.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\Shell\Open\Command 847ffc3e90573d4faf845bb9473ce93960527e6d3086a58ef09441503c195179.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\Shell 847ffc3e90573d4faf845bb9473ce93960527e6d3086a58ef09441503c195179.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\DefaultIcon 847ffc3e90573d4faf845bb9473ce93960527e6d3086a58ef09441503c195179.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd hdsp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt 847ffc3e90573d4faf845bb9473ce93960527e6d3086a58ef09441503c195179.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\NeverShowExt 847ffc3e90573d4faf845bb9473ce93960527e6d3086a58ef09441503c195179.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\NeverShowExt hdsp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\Shell\Open 847ffc3e90573d4faf845bb9473ce93960527e6d3086a58ef09441503c195179.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\Shell\Open\Command\ = "%1" 847ffc3e90573d4faf845bb9473ce93960527e6d3086a58ef09441503c195179.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm 847ffc3e90573d4faf845bb9473ce93960527e6d3086a58ef09441503c195179.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\ = "System Mechanic" 847ffc3e90573d4faf845bb9473ce93960527e6d3086a58ef09441503c195179.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\DefaultIcon\ = "c:\\windows\\SysWow64\\netsetup.exe" 847ffc3e90573d4faf845bb9473ce93960527e6d3086a58ef09441503c195179.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt hdsp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\Shell\Open\Command\ = "%1" hdsp.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
847ffc3e90573d4faf845bb9473ce93960527e6d3086a58ef09441503c195179.exehdsp.exepid process 1756 847ffc3e90573d4faf845bb9473ce93960527e6d3086a58ef09441503c195179.exe 548 hdsp.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
847ffc3e90573d4faf845bb9473ce93960527e6d3086a58ef09441503c195179.exedescription pid process target process PID 1756 wrote to memory of 548 1756 847ffc3e90573d4faf845bb9473ce93960527e6d3086a58ef09441503c195179.exe hdsp.exe PID 1756 wrote to memory of 548 1756 847ffc3e90573d4faf845bb9473ce93960527e6d3086a58ef09441503c195179.exe hdsp.exe PID 1756 wrote to memory of 548 1756 847ffc3e90573d4faf845bb9473ce93960527e6d3086a58ef09441503c195179.exe hdsp.exe PID 1756 wrote to memory of 548 1756 847ffc3e90573d4faf845bb9473ce93960527e6d3086a58ef09441503c195179.exe hdsp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\847ffc3e90573d4faf845bb9473ce93960527e6d3086a58ef09441503c195179.exe"C:\Users\Admin\AppData\Local\Temp\847ffc3e90573d4faf845bb9473ce93960527e6d3086a58ef09441503c195179.exe"1⤵
- Modifies system executable filetype association
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1756 -
\??\c:\Documents and Settings\Admin\Application Data\Microsoft\hdsp.exe"c:\Documents and Settings\Admin\Application Data\Microsoft\hdsp.exe" 847ffc3e90573d4faf845bb9473ce93960527e6d3086a58ef09441503c1951792⤵
- Modifies system executable filetype association
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:548
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD5b9812caa00fe49dd92183b81530bc9c5
SHA1df587f23589a2d78fc9c99c2691747a59210d0e4
SHA2569fd40ff9fc05375b068ccb0400770147193d52c2c38064c3a41cb42fe9e2adfa
SHA512fa43434a525c96dd3b9ef920c77133ac9acce8eff2c07b21a746f7506abfd4fd2974172ee399284a1a23eda8294e70045cce0fae1cd112bdb500dd519f641a2d
-
Filesize
82KB
MD5b9812caa00fe49dd92183b81530bc9c5
SHA1df587f23589a2d78fc9c99c2691747a59210d0e4
SHA2569fd40ff9fc05375b068ccb0400770147193d52c2c38064c3a41cb42fe9e2adfa
SHA512fa43434a525c96dd3b9ef920c77133ac9acce8eff2c07b21a746f7506abfd4fd2974172ee399284a1a23eda8294e70045cce0fae1cd112bdb500dd519f641a2d
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
8B
MD524865ca220aa1936cbac0a57685217c5
SHA137f687cafe79e91eae6cbdffbf2f7ad3975f5e83
SHA256841e95fa333ed89085bfbab19bb658d96ed0c837d25721411233fa55c860c743
SHA512c8d3f514c72f48fed5de9582c4252cf5466a9d32866d8df3631ba9274ed734bb95139e4909e8116a10947fc1afa1dbeb33809da6ec050e6e4eb83d5241aeb062
-
Filesize
82KB
MD5b9812caa00fe49dd92183b81530bc9c5
SHA1df587f23589a2d78fc9c99c2691747a59210d0e4
SHA2569fd40ff9fc05375b068ccb0400770147193d52c2c38064c3a41cb42fe9e2adfa
SHA512fa43434a525c96dd3b9ef920c77133ac9acce8eff2c07b21a746f7506abfd4fd2974172ee399284a1a23eda8294e70045cce0fae1cd112bdb500dd519f641a2d
-
Filesize
82KB
MD5b9812caa00fe49dd92183b81530bc9c5
SHA1df587f23589a2d78fc9c99c2691747a59210d0e4
SHA2569fd40ff9fc05375b068ccb0400770147193d52c2c38064c3a41cb42fe9e2adfa
SHA512fa43434a525c96dd3b9ef920c77133ac9acce8eff2c07b21a746f7506abfd4fd2974172ee399284a1a23eda8294e70045cce0fae1cd112bdb500dd519f641a2d