Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 10:27
Static task
static1
Behavioral task
behavioral1
Sample
1720f8426f21f5de168038a0820a39a0.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1720f8426f21f5de168038a0820a39a0.exe
Resource
win10v2004-20231222-en
General
-
Target
1720f8426f21f5de168038a0820a39a0.exe
-
Size
206KB
-
MD5
1720f8426f21f5de168038a0820a39a0
-
SHA1
e54bc419c5293e422a0eae8054a081a3c4e56c8c
-
SHA256
48c073b15ba2d0c496b5e663ebf4c11f87d0dd7952eeea7fc11cf90f6f7df8fd
-
SHA512
5a5510862ccb3965c67d8ecc8056d2a0e504b4059bcffad4960fe0031b0d82abf70e6ff0d7b2157a9e4fe81e4d0e5abff9aef7ca1b90fd2759ed2713c36baf2e
-
SSDEEP
6144:zvEN2U+T6i5LirrllHy4HUcMQY6oSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSE:zENN+T5xYrllrU7QY6oSSSSSSSSSSSS9
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 620 explorer.exe 4804 spoolsv.exe 3988 svchost.exe 228 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification \??\c:\windows\system\explorer.exe 1720f8426f21f5de168038a0820a39a0.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe svchost.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2612 1720f8426f21f5de168038a0820a39a0.exe 2612 1720f8426f21f5de168038a0820a39a0.exe 620 explorer.exe 620 explorer.exe 620 explorer.exe 620 explorer.exe 620 explorer.exe 620 explorer.exe 3988 svchost.exe 3988 svchost.exe 3988 svchost.exe 3988 svchost.exe 620 explorer.exe 620 explorer.exe 3988 svchost.exe 3988 svchost.exe 620 explorer.exe 620 explorer.exe 3988 svchost.exe 3988 svchost.exe 620 explorer.exe 620 explorer.exe 3988 svchost.exe 3988 svchost.exe 620 explorer.exe 620 explorer.exe 3988 svchost.exe 3988 svchost.exe 620 explorer.exe 620 explorer.exe 3988 svchost.exe 3988 svchost.exe 620 explorer.exe 620 explorer.exe 3988 svchost.exe 3988 svchost.exe 620 explorer.exe 620 explorer.exe 3988 svchost.exe 3988 svchost.exe 620 explorer.exe 620 explorer.exe 3988 svchost.exe 3988 svchost.exe 620 explorer.exe 620 explorer.exe 3988 svchost.exe 3988 svchost.exe 620 explorer.exe 620 explorer.exe 3988 svchost.exe 3988 svchost.exe 620 explorer.exe 620 explorer.exe 3988 svchost.exe 3988 svchost.exe 620 explorer.exe 620 explorer.exe 3988 svchost.exe 3988 svchost.exe 620 explorer.exe 620 explorer.exe 3988 svchost.exe 3988 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 620 explorer.exe 3988 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2612 1720f8426f21f5de168038a0820a39a0.exe 2612 1720f8426f21f5de168038a0820a39a0.exe 620 explorer.exe 620 explorer.exe 4804 spoolsv.exe 4804 spoolsv.exe 3988 svchost.exe 3988 svchost.exe 228 spoolsv.exe 228 spoolsv.exe 620 explorer.exe 620 explorer.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2612 wrote to memory of 620 2612 1720f8426f21f5de168038a0820a39a0.exe 28 PID 2612 wrote to memory of 620 2612 1720f8426f21f5de168038a0820a39a0.exe 28 PID 2612 wrote to memory of 620 2612 1720f8426f21f5de168038a0820a39a0.exe 28 PID 620 wrote to memory of 4804 620 explorer.exe 22 PID 620 wrote to memory of 4804 620 explorer.exe 22 PID 620 wrote to memory of 4804 620 explorer.exe 22 PID 4804 wrote to memory of 3988 4804 spoolsv.exe 23 PID 4804 wrote to memory of 3988 4804 spoolsv.exe 23 PID 4804 wrote to memory of 3988 4804 spoolsv.exe 23 PID 3988 wrote to memory of 228 3988 svchost.exe 26 PID 3988 wrote to memory of 228 3988 svchost.exe 26 PID 3988 wrote to memory of 228 3988 svchost.exe 26 PID 3988 wrote to memory of 5020 3988 svchost.exe 25 PID 3988 wrote to memory of 5020 3988 svchost.exe 25 PID 3988 wrote to memory of 5020 3988 svchost.exe 25 PID 3988 wrote to memory of 4384 3988 svchost.exe 100 PID 3988 wrote to memory of 4384 3988 svchost.exe 100 PID 3988 wrote to memory of 4384 3988 svchost.exe 100 PID 3988 wrote to memory of 1044 3988 svchost.exe 102 PID 3988 wrote to memory of 1044 3988 svchost.exe 102 PID 3988 wrote to memory of 1044 3988 svchost.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\1720f8426f21f5de168038a0820a39a0.exe"C:\Users\Admin\AppData\Local\Temp\1720f8426f21f5de168038a0820a39a0.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2612 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:620
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE1⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4804 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3988 -
C:\Windows\SysWOW64\at.exeat 23:39 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe3⤵PID:5020
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:228
-
-
C:\Windows\SysWOW64\at.exeat 23:40 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe3⤵PID:4384
-
-
C:\Windows\SysWOW64\at.exeat 23:41 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe3⤵PID:1044
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66KB
MD57dcce129f8438fb94912aa3aa4fff2c9
SHA195f033d8f5caba5b084e6d5587a183c2b691f1d2
SHA256735b03666e7235ee608ecb60ec785c3668b2e8bb74baa72d44f44689db828c40
SHA5127a6671b342d813698f548e32dac2100eed647d66dfc8dd5ece7d62e18ab9732739ba4a9fa5e71b457be30ef85ac61bf2aaa40326fbef0def42bbe8a0425369e1
-
Filesize
82KB
MD546861734b1bce3d63d206ce8c9591325
SHA10947402a314550bc74f3d9835d8e8c5aebe5594b
SHA256ef2c89dc31aebeb7826d3899a3633dfd7008b14e3428351d599f060d7f5a9f7f
SHA5124b8c6a4259ac875cb9649671b1110873b19bf7a9e367991881790887f119fdb7c2f92204c516724b3ff04e238e880a19b1261380e046688e9046842d137a9620
-
Filesize
52KB
MD54d406d4cab3d67acb1ff5ff3cfe222d2
SHA13260e9d10c40deedfe99b88b2ea8f407aa6129fb
SHA256471368e4d97932e7de439398f501edc92e16d339f126fb74d414be4d8cc4ce9b
SHA512e471cae12d1e36a9342e2982d9687c4bd776aadf5a22087d7497083a7ccfb73048ae686667e50a99442c63c0c6782be2cb98ff4433579accac1739e8cbb5fa6d
-
Filesize
76KB
MD57259d9950d277a37b1e26c46c153350b
SHA1e343b5c101fc5d6862dee0af7a43cfd03e233927
SHA2561c3b0da28cbc01d1bc950a79ecc6b7f693b7dbc1ff479aaba159ef1e6e517378
SHA5121ed0bae0e2afaaf7c3d3adcd11cc96687964e0dbb24e5d7ee83ce9ae8806a9caad23c151686de6ca2ae469938e939aa3316b214cdca37dfbee5a815bbf861f0d
-
Filesize
92KB
MD5b6a1d5a8b9bcb5a2f5c17c762e64eb28
SHA1cbba7999b5638f1b884303d49e4d4f27cc902c22
SHA256b18c47a87383282de29f443c7e139fc3a7afb745986c64c1e7fed2fbd0f663cf
SHA51222eeb2a03e7f303d696cb2438168d8447238960feadf93094e8d7f1ccb1d357e5000fab5fad18a9b8213c374fd8c76d142b85c7a1754465ad4a598a7dd4a01c5
-
Filesize
34KB
MD51b0132780d0b5d94af34d5945d4cf519
SHA1772e489a7bf26b96830421da79991fe9957f8aed
SHA256466576b78bf82347e7910edb54c9820512c01c00e04563346fc03f6d073582d3
SHA51201fc5388821b44503eb3ffdde680255ffb93344b9225573be28ad1e4b39d682ca26aec0ee3a686a330e1dd62a67d9b1f3209fc5d88d98a3db45ea672212b6563
-
Filesize
64KB
MD5c800582e43c15f6024c17a44f4ef5120
SHA175ba795e5f1a16532aa920427afe3034e1982f9f
SHA256b969ecc0635400f4ee1a8858e59dde7d129c51df9d23f72d53dfa6c3aab52421
SHA5123878b37e62d579921b6c6d8439a9c63a15aea02e6a7a88c52ab4c2bab02270a5a008a28b58bb50858c278ff7b7c547f8debb055425000d0df8667dacad54391e
-
Filesize
65KB
MD50aaa89e02cc236785da7e127f8c460b7
SHA1e99cd6579d01dd776f18aa919251154342a3e8be
SHA256e196e9480f22722b1e15f6bbe1bec450cd57678bc8e5f4a8b6cfcb2c5fcc029b
SHA5125758e4f704a6cdd78ad8563a0316ee30c1750e149a4c753619242d0321c1b461938af756b0aef47d5b796b72d64355dc47f8cbc46ef5581c043dc3b94d5bb256
-
Filesize
124KB
MD5f426bea6fb3725cfb8df117672a12b28
SHA1d6e7c582b3be09cf2cd0f29479a1d5d2a32f252e
SHA25606a56f46442fb49bec52a8a7ea45cc607bf4ecc1aa802fed2bcd2b0fc61321a8
SHA5125dcd7e6adf5bc67632fa3c0daede6f432864890d3a9753bc1ca8a150f8b24ca6037134dbca2cb420f77afc5b7bf7b227f85f74682c8400ac9de3e27cc3b380a3