Analysis
-
max time kernel
4s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
22/12/2023, 13:00
Static task
static1
Behavioral task
behavioral1
Sample
94d8b72ca67a5c38d0d0b5c519dc29ca.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
94d8b72ca67a5c38d0d0b5c519dc29ca.exe
Resource
win10v2004-20231215-en
General
-
Target
94d8b72ca67a5c38d0d0b5c519dc29ca.exe
-
Size
1.3MB
-
MD5
94d8b72ca67a5c38d0d0b5c519dc29ca
-
SHA1
25e2f4dfc9440439849c7ca072dd5c1b60276ca0
-
SHA256
4837b504315a1846afbd2c7832bec0c5e537074dc0f5f0156c0ad62302b85412
-
SHA512
29feb5ddb267ee0e4fe3968bdacb255259a0e8b72a6a8b5d70f5ced36c03d9c0bea070fdeece1a53d77457c5fb189de2496344cc86fd0629816ef43d762bf5ad
-
SSDEEP
24576:gOgtcqfVOm8pBflsRAtyqUZdwI0TjSVkNClkJ4ev0:gOqOmojsRAtb2wI0qVTi+l
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Modifies Installed Components in the registry 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 1712 explorer.exe 2580 spoolsv.exe 2572 svchost.exe 2616 spoolsv.exe -
Loads dropped DLL 8 IoCs
pid Process 2892 94d8b72ca67a5c38d0d0b5c519dc29ca.exe 2892 94d8b72ca67a5c38d0d0b5c519dc29ca.exe 1712 explorer.exe 1712 explorer.exe 2580 spoolsv.exe 2580 spoolsv.exe 2572 svchost.exe 2572 svchost.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
pid Process 2892 94d8b72ca67a5c38d0d0b5c519dc29ca.exe 1712 explorer.exe 2580 spoolsv.exe 2572 svchost.exe 2616 spoolsv.exe 1712 explorer.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification \??\c:\windows\system\explorer.exe 94d8b72ca67a5c38d0d0b5c519dc29ca.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2892 94d8b72ca67a5c38d0d0b5c519dc29ca.exe 1712 explorer.exe 1712 explorer.exe 1712 explorer.exe 1712 explorer.exe 1712 explorer.exe 1712 explorer.exe 2572 svchost.exe 2572 svchost.exe 1712 explorer.exe 2572 svchost.exe 1712 explorer.exe 2572 svchost.exe 1712 explorer.exe 2572 svchost.exe 1712 explorer.exe 2572 svchost.exe 1712 explorer.exe 2572 svchost.exe 1712 explorer.exe 2572 svchost.exe 1712 explorer.exe 2572 svchost.exe 1712 explorer.exe 2572 svchost.exe 1712 explorer.exe 2572 svchost.exe 1712 explorer.exe 2572 svchost.exe 1712 explorer.exe 2572 svchost.exe 1712 explorer.exe 2572 svchost.exe 1712 explorer.exe 2572 svchost.exe 1712 explorer.exe 2572 svchost.exe 1712 explorer.exe 2572 svchost.exe 1712 explorer.exe 2572 svchost.exe 1712 explorer.exe 2572 svchost.exe 1712 explorer.exe 2572 svchost.exe 1712 explorer.exe 2572 svchost.exe 1712 explorer.exe 2572 svchost.exe 1712 explorer.exe 2572 svchost.exe 1712 explorer.exe 2572 svchost.exe 1712 explorer.exe 2572 svchost.exe 1712 explorer.exe 2572 svchost.exe 1712 explorer.exe 2572 svchost.exe 1712 explorer.exe 2572 svchost.exe 1712 explorer.exe 2572 svchost.exe 1712 explorer.exe -
Suspicious use of SetWindowsHookEx 17 IoCs
pid Process 2892 94d8b72ca67a5c38d0d0b5c519dc29ca.exe 2892 94d8b72ca67a5c38d0d0b5c519dc29ca.exe 2892 94d8b72ca67a5c38d0d0b5c519dc29ca.exe 1712 explorer.exe 1712 explorer.exe 1712 explorer.exe 2580 spoolsv.exe 2580 spoolsv.exe 2580 spoolsv.exe 2572 svchost.exe 2572 svchost.exe 2572 svchost.exe 2616 spoolsv.exe 2616 spoolsv.exe 2616 spoolsv.exe 1712 explorer.exe 1712 explorer.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2892 wrote to memory of 1712 2892 94d8b72ca67a5c38d0d0b5c519dc29ca.exe 25 PID 2892 wrote to memory of 1712 2892 94d8b72ca67a5c38d0d0b5c519dc29ca.exe 25 PID 2892 wrote to memory of 1712 2892 94d8b72ca67a5c38d0d0b5c519dc29ca.exe 25 PID 2892 wrote to memory of 1712 2892 94d8b72ca67a5c38d0d0b5c519dc29ca.exe 25 PID 1712 wrote to memory of 2580 1712 explorer.exe 24 PID 1712 wrote to memory of 2580 1712 explorer.exe 24 PID 1712 wrote to memory of 2580 1712 explorer.exe 24 PID 1712 wrote to memory of 2580 1712 explorer.exe 24 PID 2580 wrote to memory of 2572 2580 spoolsv.exe 23 PID 2580 wrote to memory of 2572 2580 spoolsv.exe 23 PID 2580 wrote to memory of 2572 2580 spoolsv.exe 23 PID 2580 wrote to memory of 2572 2580 spoolsv.exe 23 PID 2572 wrote to memory of 2616 2572 svchost.exe 22 PID 2572 wrote to memory of 2616 2572 svchost.exe 22 PID 2572 wrote to memory of 2616 2572 svchost.exe 22 PID 2572 wrote to memory of 2616 2572 svchost.exe 22 PID 2572 wrote to memory of 2560 2572 svchost.exe 21 PID 2572 wrote to memory of 2560 2572 svchost.exe 21 PID 2572 wrote to memory of 2560 2572 svchost.exe 21 PID 2572 wrote to memory of 2560 2572 svchost.exe 21
Processes
-
C:\Users\Admin\AppData\Local\Temp\94d8b72ca67a5c38d0d0b5c519dc29ca.exe"C:\Users\Admin\AppData\Local\Temp\94d8b72ca67a5c38d0d0b5c519dc29ca.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2892 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1712
-
-
C:\Windows\SysWOW64\at.exeat 13:33 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe1⤵PID:2560
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:2616
-
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe1⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Windows\SysWOW64\at.exeat 13:34 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe2⤵PID:2016
-
-
C:\Windows\SysWOW64\at.exeat 13:35 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe2⤵PID:1724
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2580
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD5e3b942d2b4af062fecd91a359dfc9e4f
SHA11ca605c36dd7a9d610e4251b53cf40e032cbc040
SHA256e9f25cfa19fbf1f17ef2736d6d913f65c80e2afda94085aa7a9b4e7b3a4b647c
SHA5128910615e65581e3297797ad0d89ff9f479df31283d1217d8bca1c1309bf5a5bd27937cc940535f4bd76f7ed874f134128bd45fc2a75010e4d8f71db80b7e1d61
-
Filesize
27KB
MD59463108afe613f27bd6815d5996ce9fc
SHA13d54c9fff53713189551945cdad5619e43efc24c
SHA2561f1a5daad0b937db2bc2fd9366bbb848ec32ac97b56180e456559437745954e3
SHA512f268128ac5b4f4283ac9f5a622e6c825225d908d7023680bb32216fce6438f75d4fe30e1e6c18d09c8824b6922eb7e4abba633b29a19414472ac661777a92adb
-
Filesize
22KB
MD56c3547bb76dd83c3a3c466ee52f3b87c
SHA18ab4c7b7f731669ac4c8cd972bed078045c61a24
SHA256a4f2b3be57273e375ab8a81ee58fd48e062f07a361a5e4c1146388991cc212a5
SHA5126856a9bcc09d23288aae8833087f655f4cbf995f669ecdbafec22d6641172dbe4d8044b9738e048a48e042d51326940741a752766bcbbe9bada123469b4916c3
-
Filesize
76KB
MD5d1ce26bfaf5ae55d70a94b4d884141d0
SHA1a747e6b2a41cae9a89ed6d47bce4f80160f3157c
SHA2561a7a81359c489fda28b91ce8083151eddaada539d8e4fbc7e0b9e79c0f9d1979
SHA51276e12ff094a565d33c64209483b5a24bb5a1a5ccaed1e7618108a15440c1b042a1a4cc4471277c044fddb2a2c6d432c3d442832e7ebcb6578e87da58b1354855
-
Filesize
42KB
MD5444e0d74c5f4b8a8436dad5d11f756ec
SHA19f465e28e7cc0d3a4d58f5fcd33375247ed62fdb
SHA256e76fd455bfb347b96a7fc3b51cf4ea4caf7079487c7253c3d77996de1b80e3f9
SHA51256df2f5f667091a265379cdf4045d89b5c869e01e49e0e36af85a4281df000020e6a5efbdb39decf2f777bfd53613c42f5be1c71904e783abe661125103f1469
-
Filesize
53KB
MD5e26fb69b71e75460c1ce01ee7f0579a5
SHA150a7047072b3a4947c0a72f10d3fd4558ef80cf7
SHA256efaf29256354bfb1f1cfed0e75682bd5657521ef4dea56e509b73718948099b0
SHA5124dbf1b61747d4659c2a7fb1962ab41cfeef7e2373888ce8ac590ade19e20d02e4b6c11c147954523b62ec9f0f6dbe742e4345e38497c4811b886d6ddb862cd17
-
Filesize
46KB
MD54744a37134f12798bb275ff52784fac2
SHA1c17f4ef2637cc23ebf4eab21c8a149c3db4462ff
SHA256f37ccc3a2b635373cfbec675ed3a9be125804338c5f11bafdf6406791421e570
SHA5129d9db6ab0f1e1d5110210d9c428a274c74e481956adfb93ca4aa1fba6a8939d8f3a983cad045dbdd28d5e169503b5a97602c7d2319661bb7f630318629d74f6f
-
Filesize
116KB
MD50390d615f2dfe0c52ca98ab0ca339c2c
SHA1d3a48051b1c1fd7ef85055c7d1a92b4c555e4631
SHA25624b6110561cd580efd88329ec6d8a3472ee497bab5b3a6b7e6fe420293905b16
SHA51226d9a6fdc738e51a34ba48d0474002e5e515aa8b53de2f04a2974099064184169aa826dccb1849bf314ac333e142497c558a98cfc23f225e50e1706dd2b6875d
-
Filesize
79KB
MD55c50a94654a014300b6b617908ee1e2c
SHA1d27c6d6c0153724ca0f5f65da3c73418cc759c93
SHA25674f47115e77a40338b04cfd25a4525e30ffcc1046b2cbe981144d07194359f78
SHA5122fe4049fc187574c1cf04ddae156025af48f162c1e0935d2175e421bec46487494cc13af1c113f3418576c40b6afac959542224c76106c8347f5e3438ab98215
-
Filesize
232KB
MD55ddf2d9d4e333b480fe636553fac72c5
SHA1663e08f99ac4484c921d208d003ae7c1c78d6690
SHA256b133b793433f3934ff24563b055339503bef7e0f140e99dde14d5da42f9e6897
SHA512208d98065b35d98edbbb6d4f432ec704473583eb15730d23dd5727289a458e5cede88ef05d84cce226690cbd6288b62d194d46b75278e38684e79d63045b9efa
-
Filesize
246KB
MD540df3240aa6354f05de9bb86360a4661
SHA138b34ecfdd7469bb0116100040f1de7db621adc5
SHA25614987ba9229c4c110886e60b3d4fded72f682d6dd2ee0f5f4e8c8ad4feee8a20
SHA51202671e6ccea8b0dade7465ca2947c854070effe1093fab7b2c6ceeefaf9a71d3493db6bd6715a99f27aa00ddcba956ea03d52edf6ca3f6fbf2b0228db55f0fae
-
Filesize
157KB
MD511278aac503914d1748b5994897fba52
SHA1c2f3700d430147ae618e0fc2ec64115805b8fdba
SHA256eda05577d4e3fd592a3ca332231fbde120646278e8d5e0279a8947e45e897277
SHA512e0944719320309bfe2cdf6c59b80505468dde2bd3785671fdec18eac090bce740de766c3b704886541da4d322485b2344fcd8c69fbf01d4e389ec3d8b9bf979e
-
Filesize
148KB
MD5ebcf3334c2224a6cba37f147447918ca
SHA17164c3a1dd807dba364bfc2bb27f1fc39941a787
SHA256dc55a16d576e42e3f69d7d6c72be3489104e341c34b397c9b6b6ce1682f96bd9
SHA512d031c96d9624254dd59d83f5fc1f384b8f9a7f91e3106a83ce3fce7769152a1b567d5d8abf2a0c7c72f84bda325c7c5c7139d3da0382fc94ad330b544ec98eb9
-
Filesize
169KB
MD5426fb9f26cc986dccc0b1377d6b06919
SHA185c2af37e3ed283e9733eee36c755d019796bcfc
SHA256576a1cd490d598666b5e55634b0a226123dd0ed9b8460468b8da315c368752d5
SHA512f0438ee4d861b28b01ff06c283399a611e4f10411f5e023bbecf9e85d710308c530d0ae913a03dcc6e3284909314c5bb28154272448c9412fdf73d13102e64e8
-
Filesize
53KB
MD5cd4126fa6de3f7d7886c940e20e516ec
SHA1db7667933bc9abfa607271ee52a02836daf9f05e
SHA2560cd5ca56e9c5bce5f99805ac324718c53c5068715d2f9b1a877e20ae954c8315
SHA512f68b43b846c962733883abd87e7008052fb4103fac2d05541c8c3977ccd08002860d7079f41b824714f60d091f0334329d9b173f961c3ea399b208b46abca649
-
Filesize
115KB
MD5b20541a8de4d22d7e236615dcfbcd99d
SHA1989e0a9e7cebbc38272424bc8b315171c4ad748c
SHA2566567486a709ad2b2ce454e04f5d615c57c428389d27f2db1d3a2d736ccf5128e
SHA512c1ddb80749d2e3072b05d211267a8d112b3e505a7d74cb42353b61ab1c64f3f52b83ae7991dbea61b7c68ac0fe6828abce9cfd8b8bac151f4220118e02f30836
-
Filesize
136KB
MD581d0dbe1d5ccbf6633ba5e908565564f
SHA1d06ca7ca160fd2f8d9a4153876eb451444596a4c
SHA2563acc066e3ab555b36cb5eebccb32e05efd18fd69392db38166efdb2d61483d83
SHA51207a9bf9b63b64fb78abe2469e39c8d85883bdc56630f3972c488b2ce977a6482bdf0bfeca1ca804007a541d036198443e27d46ceb5fcd771b801ba8d3f8c55ef