Analysis

  • max time kernel
    156s
  • max time network
    164s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/10/2023, 19:48

General

  • Target

    de43b0c08e579bc5bb59493ea848b8b0_exe32.exe

  • Size

    206KB

  • MD5

    de43b0c08e579bc5bb59493ea848b8b0

  • SHA1

    1bb15ce188d11b7f07fa6cdc4eb1d26f8725ebaf

  • SHA256

    08528cc1a9100ce58f9e1c83d6aba4ad35ca8f1cf181be8ced1a3fe694faf7bb

  • SHA512

    987cfad042b9a85ca4037f92243397bd31f506a5d5be96086fffc50389f1bf4fd92dde9d65eba470ab8ee89701c3cbf14b8b35372fb8d4943a93aedd7a546a9f

  • SSDEEP

    3072:avEfVUzSLhIVbV6i5LirrlZrHyrUHUckoMQ2RN6un9:avEN2U+T6i5LirrllHy4HUcMQY6W

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Modifies Installed Components in the registry 2 TTPs 8 IoCs
  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\de43b0c08e579bc5bb59493ea848b8b0_exe32.exe
    "C:\Users\Admin\AppData\Local\Temp\de43b0c08e579bc5bb59493ea848b8b0_exe32.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4948
    • \??\c:\windows\system\explorer.exe
      c:\windows\system\explorer.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visiblity of hidden/system files in Explorer
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3216
      • \??\c:\windows\system\spoolsv.exe
        c:\windows\system\spoolsv.exe SE
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2932
        • \??\c:\windows\system\svchost.exe
          c:\windows\system\svchost.exe
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visiblity of hidden/system files in Explorer
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2224
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe PR
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:1280
          • C:\Windows\SysWOW64\at.exe
            at 01:16 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
            5⤵
              PID:3132
            • C:\Windows\SysWOW64\at.exe
              at 01:17 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
              5⤵
                PID:1764
              • C:\Windows\SysWOW64\at.exe
                at 01:18 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
                5⤵
                  PID:2416

        Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Roaming\mrsys.exe

                Filesize

                206KB

                MD5

                489ec565bbef519eecf4f210c3545b0e

                SHA1

                b7debe2d5433c6e61773c850a3a8ca5e6cbe73d3

                SHA256

                b2ea1827b445c3c8429bd4ca02a36ff3ffccaa1d6d0ee5e9617e7c1b1a9d0ea1

                SHA512

                10e01d0864d0d253ab7f4452a5110d027cbafcbf3f7b1206ff830575ebdf2ad73ea437610c1b59d7152df56d727e9303d8775d9ed88315cb7b6158cba3117bbb

              • C:\Users\Admin\AppData\Roaming\mrsys.exe

                Filesize

                206KB

                MD5

                489ec565bbef519eecf4f210c3545b0e

                SHA1

                b7debe2d5433c6e61773c850a3a8ca5e6cbe73d3

                SHA256

                b2ea1827b445c3c8429bd4ca02a36ff3ffccaa1d6d0ee5e9617e7c1b1a9d0ea1

                SHA512

                10e01d0864d0d253ab7f4452a5110d027cbafcbf3f7b1206ff830575ebdf2ad73ea437610c1b59d7152df56d727e9303d8775d9ed88315cb7b6158cba3117bbb

              • C:\Windows\System\explorer.exe

                Filesize

                206KB

                MD5

                cb957032e66dec12632511d550f3c35d

                SHA1

                c50a2ab911db664783657c6f424d291969b5b6eb

                SHA256

                29fe16863a9442e401cc2cc3bbe19a3d63f803254cf9bb8cf1def592a6f4e8d0

                SHA512

                d7eafe2f71a014b5c14b361d33ebc6ea5988c93480e6a98e12c7e53879967ece0ac8206befcb9623b2e8c90816beec8a14a58c94ea2797a7654960a52171ca6b

              • C:\Windows\System\spoolsv.exe

                Filesize

                206KB

                MD5

                aedff80296a457fda4bc9e0847f5d30a

                SHA1

                eb6df9f89fc808322f4e5dcda987f298478aee04

                SHA256

                b77ced80fc2fc2ffa48362373efdb4f1c83b1230787abf5d2b51cce0b463009e

                SHA512

                aa28d3a540bfed80019b8fdd6c650e37471773f78c666b116823caae525b6769c75e17d3395f4ef09089be36d05f0a1b821d688091edfce5db9cb840d3f91ec9

              • C:\Windows\System\spoolsv.exe

                Filesize

                206KB

                MD5

                aedff80296a457fda4bc9e0847f5d30a

                SHA1

                eb6df9f89fc808322f4e5dcda987f298478aee04

                SHA256

                b77ced80fc2fc2ffa48362373efdb4f1c83b1230787abf5d2b51cce0b463009e

                SHA512

                aa28d3a540bfed80019b8fdd6c650e37471773f78c666b116823caae525b6769c75e17d3395f4ef09089be36d05f0a1b821d688091edfce5db9cb840d3f91ec9

              • C:\Windows\System\spoolsv.exe

                Filesize

                206KB

                MD5

                aedff80296a457fda4bc9e0847f5d30a

                SHA1

                eb6df9f89fc808322f4e5dcda987f298478aee04

                SHA256

                b77ced80fc2fc2ffa48362373efdb4f1c83b1230787abf5d2b51cce0b463009e

                SHA512

                aa28d3a540bfed80019b8fdd6c650e37471773f78c666b116823caae525b6769c75e17d3395f4ef09089be36d05f0a1b821d688091edfce5db9cb840d3f91ec9

              • C:\Windows\System\svchost.exe

                Filesize

                206KB

                MD5

                682da22792c70c77b677b4ed7d0e53f3

                SHA1

                2f4b46030c8100872240ac003ee238d11f2c6d1e

                SHA256

                087299df07de6cdb705ba1cec471e37c028a9c4fc90fa080950640b0dd0c5ed1

                SHA512

                e610279c49e4881c8e99fcbf2309405457a2ab74c5670bb303d825e18967022c49473a94d7b7d0dda4682cf603c514a40aa27528b51cf3692eb2e947f8810951

              • \??\c:\windows\system\explorer.exe

                Filesize

                206KB

                MD5

                cb957032e66dec12632511d550f3c35d

                SHA1

                c50a2ab911db664783657c6f424d291969b5b6eb

                SHA256

                29fe16863a9442e401cc2cc3bbe19a3d63f803254cf9bb8cf1def592a6f4e8d0

                SHA512

                d7eafe2f71a014b5c14b361d33ebc6ea5988c93480e6a98e12c7e53879967ece0ac8206befcb9623b2e8c90816beec8a14a58c94ea2797a7654960a52171ca6b

              • \??\c:\windows\system\spoolsv.exe

                Filesize

                206KB

                MD5

                aedff80296a457fda4bc9e0847f5d30a

                SHA1

                eb6df9f89fc808322f4e5dcda987f298478aee04

                SHA256

                b77ced80fc2fc2ffa48362373efdb4f1c83b1230787abf5d2b51cce0b463009e

                SHA512

                aa28d3a540bfed80019b8fdd6c650e37471773f78c666b116823caae525b6769c75e17d3395f4ef09089be36d05f0a1b821d688091edfce5db9cb840d3f91ec9

              • \??\c:\windows\system\svchost.exe

                Filesize

                206KB

                MD5

                682da22792c70c77b677b4ed7d0e53f3

                SHA1

                2f4b46030c8100872240ac003ee238d11f2c6d1e

                SHA256

                087299df07de6cdb705ba1cec471e37c028a9c4fc90fa080950640b0dd0c5ed1

                SHA512

                e610279c49e4881c8e99fcbf2309405457a2ab74c5670bb303d825e18967022c49473a94d7b7d0dda4682cf603c514a40aa27528b51cf3692eb2e947f8810951

              • memory/1280-32-0x0000000000400000-0x000000000042F000-memory.dmp

                Filesize

                188KB

              • memory/2224-42-0x0000000000400000-0x000000000042F000-memory.dmp

                Filesize

                188KB

              • memory/2932-33-0x0000000000400000-0x000000000042F000-memory.dmp

                Filesize

                188KB

              • memory/3216-41-0x0000000000400000-0x000000000042F000-memory.dmp

                Filesize

                188KB

              • memory/4948-0-0x0000000000400000-0x000000000042F000-memory.dmp

                Filesize

                188KB

              • memory/4948-40-0x0000000000400000-0x000000000042F000-memory.dmp

                Filesize

                188KB