Analysis
-
max time kernel
151s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 07:40
Behavioral task
behavioral1
Sample
0f8be03895ee6a1fb47015061775f6f5.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0f8be03895ee6a1fb47015061775f6f5.exe
Resource
win10v2004-20231215-en
General
-
Target
0f8be03895ee6a1fb47015061775f6f5.exe
-
Size
269KB
-
MD5
0f8be03895ee6a1fb47015061775f6f5
-
SHA1
812eadf3612926e18baa37b36edaea9abbbc7e71
-
SHA256
3a0a1e093ef1cdedeaa66dfed414330effd9dad5967a34d7dbdf2e22211e9d75
-
SHA512
ef66c37943080feef8db5e9858b58228a71f7e8d074090e9a76bd0605bb8ee04842d05f999c80e4e6dd25ef0791e02b163bb6a71f0df7798382352294f203f19
-
SSDEEP
6144:lvIj8N0oK0zat8GzwzkIX8NLoK0zat8GzwzkIXOgaNS:lQjeK0qjISsK0qjIBP
Malware Config
Signatures
-
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\drivers\spools.exe 0f8be03895ee6a1fb47015061775f6f5.exe File opened for modification C:\Windows\SysWOW64\drivers\spools.exe 0f8be03895ee6a1fb47015061775f6f5.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Schedule\ImagePath = "C:\\Windows\\system32\\drivers\\spools.exe" 0f8be03895ee6a1fb47015061775f6f5.exe -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\SysWow64\\drivers\\spools.exe \"%1\" %*" 0f8be03895ee6a1fb47015061775f6f5.exe -
resource yara_rule behavioral2/memory/1220-0-0x0000000000400000-0x0000000001564000-memory.dmp upx behavioral2/files/0x000200000001e1ff-5.dat upx behavioral2/memory/1220-6-0x0000000000400000-0x0000000001564000-memory.dmp upx -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ntuser = "C:\\Windows\\system32\\drivers\\spools.exe" 0f8be03895ee6a1fb47015061775f6f5.exe Set value (str) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\autoload = "C:\\Users\\Admin\\cftmon.exe" 0f8be03895ee6a1fb47015061775f6f5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ntuser = "C:\\Windows\\system32\\drivers\\spools.exe" 0f8be03895ee6a1fb47015061775f6f5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\autoload = "C:\\Users\\Admin\\cftmon.exe" 0f8be03895ee6a1fb47015061775f6f5.exe -
Enumerates connected drives 3 TTPs 19 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\J: 0f8be03895ee6a1fb47015061775f6f5.exe File opened (read-only) \??\K: 0f8be03895ee6a1fb47015061775f6f5.exe File opened (read-only) \??\N: 0f8be03895ee6a1fb47015061775f6f5.exe File opened (read-only) \??\P: 0f8be03895ee6a1fb47015061775f6f5.exe File opened (read-only) \??\S: 0f8be03895ee6a1fb47015061775f6f5.exe File opened (read-only) \??\W: 0f8be03895ee6a1fb47015061775f6f5.exe File opened (read-only) \??\E: 0f8be03895ee6a1fb47015061775f6f5.exe File opened (read-only) \??\I: 0f8be03895ee6a1fb47015061775f6f5.exe File opened (read-only) \??\R: 0f8be03895ee6a1fb47015061775f6f5.exe File opened (read-only) \??\U: 0f8be03895ee6a1fb47015061775f6f5.exe File opened (read-only) \??\V: 0f8be03895ee6a1fb47015061775f6f5.exe File opened (read-only) \??\G: 0f8be03895ee6a1fb47015061775f6f5.exe File opened (read-only) \??\O: 0f8be03895ee6a1fb47015061775f6f5.exe File opened (read-only) \??\Q: 0f8be03895ee6a1fb47015061775f6f5.exe File opened (read-only) \??\T: 0f8be03895ee6a1fb47015061775f6f5.exe File opened (read-only) \??\X: 0f8be03895ee6a1fb47015061775f6f5.exe File opened (read-only) \??\H: 0f8be03895ee6a1fb47015061775f6f5.exe File opened (read-only) \??\M: 0f8be03895ee6a1fb47015061775f6f5.exe File opened (read-only) \??\L: 0f8be03895ee6a1fb47015061775f6f5.exe -
Modifies registry class 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\SysWow64\\drivers\\spools.exe \"%1\" %*" 0f8be03895ee6a1fb47015061775f6f5.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1220 wrote to memory of 4572 1220 0f8be03895ee6a1fb47015061775f6f5.exe 91 PID 1220 wrote to memory of 4572 1220 0f8be03895ee6a1fb47015061775f6f5.exe 91 PID 1220 wrote to memory of 4572 1220 0f8be03895ee6a1fb47015061775f6f5.exe 91 PID 1220 wrote to memory of 2904 1220 0f8be03895ee6a1fb47015061775f6f5.exe 94 PID 1220 wrote to memory of 2904 1220 0f8be03895ee6a1fb47015061775f6f5.exe 94 PID 1220 wrote to memory of 2904 1220 0f8be03895ee6a1fb47015061775f6f5.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\0f8be03895ee6a1fb47015061775f6f5.exe"C:\Users\Admin\AppData\Local\Temp\0f8be03895ee6a1fb47015061775f6f5.exe"1⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Modifies system executable filetype association
- Adds Run key to start application
- Enumerates connected drives
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c rmdir /S /Q "C:\Users\Admin\Cookies\"2⤵PID:4572
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c rmdir /S /Q "C:\Users\Admin\Application Data\Macromedia\Flash Player\"2⤵PID:2904
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Event Triggered Execution
1Change Default File Association
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
298KB
MD5550f5f08e4c477246a56fed2baee95e5
SHA1e29eb9ff8b15f94fd6ed254218ac407f327c4ee4
SHA2560e9fd3361d9eef06f5d307ec2315eae4d2bb319a8a053ac47f2c37b101d8b8dd
SHA512957a11ee50f0d0422140ae17b838eee0410b3bc37de2fe45f9704379fc16e9e0d7bcb5597f8d7ce6c4273086fa235bd7bf1ff34b30884937b8a8d8edb9fb0e87