Analysis

  • max time kernel
    4s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    22/12/2023, 13:00

General

  • Target

    94d8b72ca67a5c38d0d0b5c519dc29ca.exe

  • Size

    1.3MB

  • MD5

    94d8b72ca67a5c38d0d0b5c519dc29ca

  • SHA1

    25e2f4dfc9440439849c7ca072dd5c1b60276ca0

  • SHA256

    4837b504315a1846afbd2c7832bec0c5e537074dc0f5f0156c0ad62302b85412

  • SHA512

    29feb5ddb267ee0e4fe3968bdacb255259a0e8b72a6a8b5d70f5ced36c03d9c0bea070fdeece1a53d77457c5fb189de2496344cc86fd0629816ef43d762bf5ad

  • SSDEEP

    24576:gOgtcqfVOm8pBflsRAtyqUZdwI0TjSVkNClkJ4ev0:gOqOmojsRAtb2wI0qVTi+l

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Modifies Installed Components in the registry 2 TTPs 5 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 8 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 17 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\94d8b72ca67a5c38d0d0b5c519dc29ca.exe
    "C:\Users\Admin\AppData\Local\Temp\94d8b72ca67a5c38d0d0b5c519dc29ca.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2892
    • \??\c:\windows\system\explorer.exe
      c:\windows\system\explorer.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visiblity of hidden/system files in Explorer
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1712
  • C:\Windows\SysWOW64\at.exe
    at 13:33 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
    1⤵
      PID:2560
    • \??\c:\windows\system\spoolsv.exe
      c:\windows\system\spoolsv.exe PR
      1⤵
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of SetWindowsHookEx
      PID:2616
    • \??\c:\windows\system\svchost.exe
      c:\windows\system\svchost.exe
      1⤵
      • Modifies WinLogon for persistence
      • Modifies visiblity of hidden/system files in Explorer
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2572
      • C:\Windows\SysWOW64\at.exe
        at 13:34 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
        2⤵
          PID:2016
        • C:\Windows\SysWOW64\at.exe
          at 13:35 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
          2⤵
            PID:1724
        • \??\c:\windows\system\spoolsv.exe
          c:\windows\system\spoolsv.exe SE
          1⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Drops file in Windows directory
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2580

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\mrsys.exe

          Filesize

          72KB

          MD5

          e3b942d2b4af062fecd91a359dfc9e4f

          SHA1

          1ca605c36dd7a9d610e4251b53cf40e032cbc040

          SHA256

          e9f25cfa19fbf1f17ef2736d6d913f65c80e2afda94085aa7a9b4e7b3a4b647c

          SHA512

          8910615e65581e3297797ad0d89ff9f479df31283d1217d8bca1c1309bf5a5bd27937cc940535f4bd76f7ed874f134128bd45fc2a75010e4d8f71db80b7e1d61

        • C:\Windows\system\explorer.exe

          Filesize

          27KB

          MD5

          9463108afe613f27bd6815d5996ce9fc

          SHA1

          3d54c9fff53713189551945cdad5619e43efc24c

          SHA256

          1f1a5daad0b937db2bc2fd9366bbb848ec32ac97b56180e456559437745954e3

          SHA512

          f268128ac5b4f4283ac9f5a622e6c825225d908d7023680bb32216fce6438f75d4fe30e1e6c18d09c8824b6922eb7e4abba633b29a19414472ac661777a92adb

        • C:\Windows\system\explorer.exe

          Filesize

          22KB

          MD5

          6c3547bb76dd83c3a3c466ee52f3b87c

          SHA1

          8ab4c7b7f731669ac4c8cd972bed078045c61a24

          SHA256

          a4f2b3be57273e375ab8a81ee58fd48e062f07a361a5e4c1146388991cc212a5

          SHA512

          6856a9bcc09d23288aae8833087f655f4cbf995f669ecdbafec22d6641172dbe4d8044b9738e048a48e042d51326940741a752766bcbbe9bada123469b4916c3

        • C:\Windows\system\spoolsv.exe

          Filesize

          76KB

          MD5

          d1ce26bfaf5ae55d70a94b4d884141d0

          SHA1

          a747e6b2a41cae9a89ed6d47bce4f80160f3157c

          SHA256

          1a7a81359c489fda28b91ce8083151eddaada539d8e4fbc7e0b9e79c0f9d1979

          SHA512

          76e12ff094a565d33c64209483b5a24bb5a1a5ccaed1e7618108a15440c1b042a1a4cc4471277c044fddb2a2c6d432c3d442832e7ebcb6578e87da58b1354855

        • C:\Windows\system\spoolsv.exe

          Filesize

          42KB

          MD5

          444e0d74c5f4b8a8436dad5d11f756ec

          SHA1

          9f465e28e7cc0d3a4d58f5fcd33375247ed62fdb

          SHA256

          e76fd455bfb347b96a7fc3b51cf4ea4caf7079487c7253c3d77996de1b80e3f9

          SHA512

          56df2f5f667091a265379cdf4045d89b5c869e01e49e0e36af85a4281df000020e6a5efbdb39decf2f777bfd53613c42f5be1c71904e783abe661125103f1469

        • C:\Windows\system\svchost.exe

          Filesize

          53KB

          MD5

          e26fb69b71e75460c1ce01ee7f0579a5

          SHA1

          50a7047072b3a4947c0a72f10d3fd4558ef80cf7

          SHA256

          efaf29256354bfb1f1cfed0e75682bd5657521ef4dea56e509b73718948099b0

          SHA512

          4dbf1b61747d4659c2a7fb1962ab41cfeef7e2373888ce8ac590ade19e20d02e4b6c11c147954523b62ec9f0f6dbe742e4345e38497c4811b886d6ddb862cd17

        • \??\c:\windows\system\explorer.exe

          Filesize

          46KB

          MD5

          4744a37134f12798bb275ff52784fac2

          SHA1

          c17f4ef2637cc23ebf4eab21c8a149c3db4462ff

          SHA256

          f37ccc3a2b635373cfbec675ed3a9be125804338c5f11bafdf6406791421e570

          SHA512

          9d9db6ab0f1e1d5110210d9c428a274c74e481956adfb93ca4aa1fba6a8939d8f3a983cad045dbdd28d5e169503b5a97602c7d2319661bb7f630318629d74f6f

        • \??\c:\windows\system\spoolsv.exe

          Filesize

          116KB

          MD5

          0390d615f2dfe0c52ca98ab0ca339c2c

          SHA1

          d3a48051b1c1fd7ef85055c7d1a92b4c555e4631

          SHA256

          24b6110561cd580efd88329ec6d8a3472ee497bab5b3a6b7e6fe420293905b16

          SHA512

          26d9a6fdc738e51a34ba48d0474002e5e515aa8b53de2f04a2974099064184169aa826dccb1849bf314ac333e142497c558a98cfc23f225e50e1706dd2b6875d

        • \??\c:\windows\system\svchost.exe

          Filesize

          79KB

          MD5

          5c50a94654a014300b6b617908ee1e2c

          SHA1

          d27c6d6c0153724ca0f5f65da3c73418cc759c93

          SHA256

          74f47115e77a40338b04cfd25a4525e30ffcc1046b2cbe981144d07194359f78

          SHA512

          2fe4049fc187574c1cf04ddae156025af48f162c1e0935d2175e421bec46487494cc13af1c113f3418576c40b6afac959542224c76106c8347f5e3438ab98215

        • \Windows\system\explorer.exe

          Filesize

          232KB

          MD5

          5ddf2d9d4e333b480fe636553fac72c5

          SHA1

          663e08f99ac4484c921d208d003ae7c1c78d6690

          SHA256

          b133b793433f3934ff24563b055339503bef7e0f140e99dde14d5da42f9e6897

          SHA512

          208d98065b35d98edbbb6d4f432ec704473583eb15730d23dd5727289a458e5cede88ef05d84cce226690cbd6288b62d194d46b75278e38684e79d63045b9efa

        • \Windows\system\explorer.exe

          Filesize

          246KB

          MD5

          40df3240aa6354f05de9bb86360a4661

          SHA1

          38b34ecfdd7469bb0116100040f1de7db621adc5

          SHA256

          14987ba9229c4c110886e60b3d4fded72f682d6dd2ee0f5f4e8c8ad4feee8a20

          SHA512

          02671e6ccea8b0dade7465ca2947c854070effe1093fab7b2c6ceeefaf9a71d3493db6bd6715a99f27aa00ddcba956ea03d52edf6ca3f6fbf2b0228db55f0fae

        • \Windows\system\spoolsv.exe

          Filesize

          157KB

          MD5

          11278aac503914d1748b5994897fba52

          SHA1

          c2f3700d430147ae618e0fc2ec64115805b8fdba

          SHA256

          eda05577d4e3fd592a3ca332231fbde120646278e8d5e0279a8947e45e897277

          SHA512

          e0944719320309bfe2cdf6c59b80505468dde2bd3785671fdec18eac090bce740de766c3b704886541da4d322485b2344fcd8c69fbf01d4e389ec3d8b9bf979e

        • \Windows\system\spoolsv.exe

          Filesize

          148KB

          MD5

          ebcf3334c2224a6cba37f147447918ca

          SHA1

          7164c3a1dd807dba364bfc2bb27f1fc39941a787

          SHA256

          dc55a16d576e42e3f69d7d6c72be3489104e341c34b397c9b6b6ce1682f96bd9

          SHA512

          d031c96d9624254dd59d83f5fc1f384b8f9a7f91e3106a83ce3fce7769152a1b567d5d8abf2a0c7c72f84bda325c7c5c7139d3da0382fc94ad330b544ec98eb9

        • \Windows\system\spoolsv.exe

          Filesize

          169KB

          MD5

          426fb9f26cc986dccc0b1377d6b06919

          SHA1

          85c2af37e3ed283e9733eee36c755d019796bcfc

          SHA256

          576a1cd490d598666b5e55634b0a226123dd0ed9b8460468b8da315c368752d5

          SHA512

          f0438ee4d861b28b01ff06c283399a611e4f10411f5e023bbecf9e85d710308c530d0ae913a03dcc6e3284909314c5bb28154272448c9412fdf73d13102e64e8

        • \Windows\system\spoolsv.exe

          Filesize

          53KB

          MD5

          cd4126fa6de3f7d7886c940e20e516ec

          SHA1

          db7667933bc9abfa607271ee52a02836daf9f05e

          SHA256

          0cd5ca56e9c5bce5f99805ac324718c53c5068715d2f9b1a877e20ae954c8315

          SHA512

          f68b43b846c962733883abd87e7008052fb4103fac2d05541c8c3977ccd08002860d7079f41b824714f60d091f0334329d9b173f961c3ea399b208b46abca649

        • \Windows\system\svchost.exe

          Filesize

          115KB

          MD5

          b20541a8de4d22d7e236615dcfbcd99d

          SHA1

          989e0a9e7cebbc38272424bc8b315171c4ad748c

          SHA256

          6567486a709ad2b2ce454e04f5d615c57c428389d27f2db1d3a2d736ccf5128e

          SHA512

          c1ddb80749d2e3072b05d211267a8d112b3e505a7d74cb42353b61ab1c64f3f52b83ae7991dbea61b7c68ac0fe6828abce9cfd8b8bac151f4220118e02f30836

        • \Windows\system\svchost.exe

          Filesize

          136KB

          MD5

          81d0dbe1d5ccbf6633ba5e908565564f

          SHA1

          d06ca7ca160fd2f8d9a4153876eb451444596a4c

          SHA256

          3acc066e3ab555b36cb5eebccb32e05efd18fd69392db38166efdb2d61483d83

          SHA512

          07a9bf9b63b64fb78abe2469e39c8d85883bdc56630f3972c488b2ce977a6482bdf0bfeca1ca804007a541d036198443e27d46ceb5fcd771b801ba8d3f8c55ef

        • memory/1712-80-0x0000000000400000-0x000000000079C000-memory.dmp

          Filesize

          3.6MB

        • memory/1712-28-0x0000000003DE0000-0x000000000417C000-memory.dmp

          Filesize

          3.6MB

        • memory/1712-88-0x0000000000400000-0x000000000079C000-memory.dmp

          Filesize

          3.6MB

        • memory/1712-84-0x0000000000400000-0x000000000079C000-memory.dmp

          Filesize

          3.6MB

        • memory/1712-82-0x0000000000400000-0x000000000079C000-memory.dmp

          Filesize

          3.6MB

        • memory/1712-90-0x0000000000400000-0x000000000079C000-memory.dmp

          Filesize

          3.6MB

        • memory/1712-78-0x0000000000400000-0x000000000079C000-memory.dmp

          Filesize

          3.6MB

        • memory/1712-76-0x0000000000400000-0x000000000079C000-memory.dmp

          Filesize

          3.6MB

        • memory/1712-74-0x0000000000400000-0x000000000079C000-memory.dmp

          Filesize

          3.6MB

        • memory/1712-86-0x0000000000400000-0x000000000079C000-memory.dmp

          Filesize

          3.6MB

        • memory/1712-16-0x0000000000400000-0x000000000079C000-memory.dmp

          Filesize

          3.6MB

        • memory/1712-72-0x0000000000400000-0x000000000079C000-memory.dmp

          Filesize

          3.6MB

        • memory/1712-63-0x0000000000400000-0x000000000079C000-memory.dmp

          Filesize

          3.6MB

        • memory/1712-70-0x0000000000400000-0x000000000079C000-memory.dmp

          Filesize

          3.6MB

        • memory/1712-65-0x0000000000400000-0x000000000079C000-memory.dmp

          Filesize

          3.6MB

        • memory/1712-66-0x0000000000400000-0x000000000079C000-memory.dmp

          Filesize

          3.6MB

        • memory/1712-68-0x0000000000400000-0x000000000079C000-memory.dmp

          Filesize

          3.6MB

        • memory/2572-69-0x0000000000400000-0x000000000079C000-memory.dmp

          Filesize

          3.6MB

        • memory/2572-85-0x0000000000400000-0x000000000079C000-memory.dmp

          Filesize

          3.6MB

        • memory/2572-64-0x0000000000400000-0x000000000079C000-memory.dmp

          Filesize

          3.6MB

        • memory/2572-71-0x0000000000400000-0x000000000079C000-memory.dmp

          Filesize

          3.6MB

        • memory/2572-91-0x0000000000400000-0x000000000079C000-memory.dmp

          Filesize

          3.6MB

        • memory/2572-73-0x0000000000400000-0x000000000079C000-memory.dmp

          Filesize

          3.6MB

        • memory/2572-75-0x0000000000400000-0x000000000079C000-memory.dmp

          Filesize

          3.6MB

        • memory/2572-52-0x0000000003AD0000-0x0000000003E6C000-memory.dmp

          Filesize

          3.6MB

        • memory/2572-77-0x0000000000400000-0x000000000079C000-memory.dmp

          Filesize

          3.6MB

        • memory/2572-89-0x0000000000400000-0x000000000079C000-memory.dmp

          Filesize

          3.6MB

        • memory/2572-79-0x0000000000400000-0x000000000079C000-memory.dmp

          Filesize

          3.6MB

        • memory/2572-47-0x0000000000400000-0x000000000079C000-memory.dmp

          Filesize

          3.6MB

        • memory/2572-87-0x0000000000400000-0x000000000079C000-memory.dmp

          Filesize

          3.6MB

        • memory/2572-81-0x0000000000400000-0x000000000079C000-memory.dmp

          Filesize

          3.6MB

        • memory/2572-83-0x0000000000400000-0x000000000079C000-memory.dmp

          Filesize

          3.6MB

        • memory/2572-67-0x0000000000400000-0x000000000079C000-memory.dmp

          Filesize

          3.6MB

        • memory/2580-60-0x0000000000400000-0x000000000079C000-memory.dmp

          Filesize

          3.6MB

        • memory/2580-44-0x0000000003B30000-0x0000000003ECC000-memory.dmp

          Filesize

          3.6MB

        • memory/2580-31-0x0000000000400000-0x000000000079C000-memory.dmp

          Filesize

          3.6MB

        • memory/2616-57-0x0000000000400000-0x000000000079C000-memory.dmp

          Filesize

          3.6MB

        • memory/2616-54-0x0000000000400000-0x000000000079C000-memory.dmp

          Filesize

          3.6MB

        • memory/2892-61-0x0000000000400000-0x000000000079C000-memory.dmp

          Filesize

          3.6MB

        • memory/2892-13-0x0000000003DF0000-0x000000000418C000-memory.dmp

          Filesize

          3.6MB

        • memory/2892-0-0x0000000000400000-0x000000000079C000-memory.dmp

          Filesize

          3.6MB