Analysis
-
max time kernel
128s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09/03/2024, 18:13
Static task
static1
Behavioral task
behavioral1
Sample
02e2a8310f697864345966490f1ea9db48ec8ab1de9b6d8b69c5bb43c8921b10.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
02e2a8310f697864345966490f1ea9db48ec8ab1de9b6d8b69c5bb43c8921b10.exe
Resource
win10v2004-20240226-en
General
-
Target
02e2a8310f697864345966490f1ea9db48ec8ab1de9b6d8b69c5bb43c8921b10.exe
-
Size
613KB
-
MD5
73adf635b8451e53c07fdd816e5f46f7
-
SHA1
f0425273d75979c13ab985ea431a1ca7d1ea3558
-
SHA256
02e2a8310f697864345966490f1ea9db48ec8ab1de9b6d8b69c5bb43c8921b10
-
SHA512
15bc29b1647db147e912218d0c8b60150e03b8d43dec3088594385914766d5dc68d1a1b3dce242c99541f88033f595f802bf5a1f3eb89590e1079f4192dbf993
-
SSDEEP
12288:UsAqMGHGSX1388BxGVILSY4oSe8lUz7iTuZ13/f46Dv13GNBlq3eaBl8M:UsBbWOSY4He8K76uZKMv13Grlq3hBlP
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{410D4ABD-8B9A-11D5-EBA1-F78EEEEEE983} 02e2a8310f697864345966490f1ea9db48ec8ab1de9b6d8b69c5bb43c8921b10.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{410D4ABD-8B9A-11D5-EBA1-F78EEEEEE983}\StubPath = "msecq32.exe" 02e2a8310f697864345966490f1ea9db48ec8ab1de9b6d8b69c5bb43c8921b10.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{410D4ABD-8B9A-11D5-EBA1-F78EEEEEE983} spoolsv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{410D4ABD-8B9A-11D5-EBA1-F78EEEEEE983}\StubPath = "msecq32.exe" spoolsv.exe -
Executes dropped EXE 1 IoCs
pid Process 2708 spoolsv.exe -
Modifies system executable filetype association 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\SysWow64\\concp32.exe \"%1\" %*" 02e2a8310f697864345966490f1ea9db48ec8ab1de9b6d8b69c5bb43c8921b10.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\SysWow64\\concp32.exe \"%1\" %*" spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\VCL = "vcl32.exe" 02e2a8310f697864345966490f1ea9db48ec8ab1de9b6d8b69c5bb43c8921b10.exe Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Windows\CurrentVersion\Run\VCL = "vcl32.exe" 02e2a8310f697864345966490f1ea9db48ec8ab1de9b6d8b69c5bb43c8921b10.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\VCL = "vcl32.exe" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Windows\CurrentVersion\Run\VCL = "vcl32.exe" spoolsv.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\vcl32.exe 02e2a8310f697864345966490f1ea9db48ec8ab1de9b6d8b69c5bb43c8921b10.exe File opened for modification C:\Windows\SysWOW64\vcl32.exe 02e2a8310f697864345966490f1ea9db48ec8ab1de9b6d8b69c5bb43c8921b10.exe File created C:\Windows\SysWOW64\msecq32.exe 02e2a8310f697864345966490f1ea9db48ec8ab1de9b6d8b69c5bb43c8921b10.exe File opened for modification C:\Windows\SysWOW64\msecq32.exe 02e2a8310f697864345966490f1ea9db48ec8ab1de9b6d8b69c5bb43c8921b10.exe File created C:\Windows\SysWOW64\concp32.exe 02e2a8310f697864345966490f1ea9db48ec8ab1de9b6d8b69c5bb43c8921b10.exe File opened for modification C:\Windows\SysWOW64\concp32.exe 02e2a8310f697864345966490f1ea9db48ec8ab1de9b6d8b69c5bb43c8921b10.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\spoolsv.exe 02e2a8310f697864345966490f1ea9db48ec8ab1de9b6d8b69c5bb43c8921b10.exe File opened for modification C:\Windows\spoolsv.exe 02e2a8310f697864345966490f1ea9db48ec8ab1de9b6d8b69c5bb43c8921b10.exe -
Modifies registry class 12 IoCs
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{410D4ABD-8B9A-11D5-EBA1-F78EEEEEE983}\ax = 1ef0a28fb7b46449c369b2433a1baa3d 02e2a8310f697864345966490f1ea9db48ec8ab1de9b6d8b69c5bb43c8921b10.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{410D4ABD-8B9A-11D5-EBA1-F78EEEEEE983}\u0 = 658663d26f8bad325217a06063847056939f558d910ed252e05dd0113550f7fc0f4da82ff73a0681ba604c2d4f23269f spoolsv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{410D4ABD-8B9A-11D5-EBA1-F78EEEEEE983}\v = "165" spoolsv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{410D4ABD-8B9A-11D5-EBA1-F78EEEEEE983} 02e2a8310f697864345966490f1ea9db48ec8ab1de9b6d8b69c5bb43c8921b10.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{410D4ABD-8B9A-11D5-EBA1-F78EEEEEE983}\InprocServer32 02e2a8310f697864345966490f1ea9db48ec8ab1de9b6d8b69c5bb43c8921b10.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{410D4ABD-8B9A-11D5-EBA1-F78EEEEEE983} spoolsv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{410D4ABD-8B9A-11D5-EBA1-F78EEEEEE983}\InprocServer32 spoolsv.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{410D4ABD-8B9A-11D5-EBA1-F78EEEEEE983}\u1 = 551d2e0658054ba756fd3798fea5ffca42865cb762a31639dabd7f2cca44e226 spoolsv.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{410D4ABD-8B9A-11D5-EBA1-F78EEEEEE983}\u2 = a54a6b702f92fdf2acd57599e2ae1608015dff41aa020117fc9bd8e2dcf4340f3fa61eb55d6f28597df90602703809d4 spoolsv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\SysWow64\\concp32.exe \"%1\" %*" spoolsv.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{410D4ABD-8B9A-11D5-EBA1-F78EEEEEE983}\sm = 01b8ec350471bd332433eee476ebe1f3 02e2a8310f697864345966490f1ea9db48ec8ab1de9b6d8b69c5bb43c8921b10.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\SysWow64\\concp32.exe \"%1\" %*" 02e2a8310f697864345966490f1ea9db48ec8ab1de9b6d8b69c5bb43c8921b10.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1864 02e2a8310f697864345966490f1ea9db48ec8ab1de9b6d8b69c5bb43c8921b10.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1864 wrote to memory of 2708 1864 02e2a8310f697864345966490f1ea9db48ec8ab1de9b6d8b69c5bb43c8921b10.exe 28 PID 1864 wrote to memory of 2708 1864 02e2a8310f697864345966490f1ea9db48ec8ab1de9b6d8b69c5bb43c8921b10.exe 28 PID 1864 wrote to memory of 2708 1864 02e2a8310f697864345966490f1ea9db48ec8ab1de9b6d8b69c5bb43c8921b10.exe 28 PID 1864 wrote to memory of 2708 1864 02e2a8310f697864345966490f1ea9db48ec8ab1de9b6d8b69c5bb43c8921b10.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\02e2a8310f697864345966490f1ea9db48ec8ab1de9b6d8b69c5bb43c8921b10.exe"C:\Users\Admin\AppData\Local\Temp\02e2a8310f697864345966490f1ea9db48ec8ab1de9b6d8b69c5bb43c8921b10.exe"1⤵
- Modifies Installed Components in the registry
- Modifies system executable filetype association
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Windows\spoolsv.exeC:\Windows\spoolsv.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Modifies system executable filetype association
- Adds Run key to start application
- Modifies registry class
PID:2708
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Event Triggered Execution
1Change Default File Association
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
618KB
MD587dde94d210cddb5dc3418db31d94941
SHA129c655f1efab4a11b9a6831bcc243c6840b0ee12
SHA2563f691cac3540225d03a61d3b42a1f4e40660f01de57def5df87071c942e9ae78
SHA5120eca20dadaf7d3434e61edec1c710ad104af0de2ed2ddfeea3ca691e418efaeeef7dd27652ef244d71e3bb8cb7ad3a4a39d237c17ae61e76bbb8dd7a0ff23110
-
Filesize
618KB
MD50b9a6065f27ec79eca26d2d23a0ed5af
SHA16c3dfcf5f1086543a3732c719d8642a68a7ff315
SHA2563bdccd66a49f6299a0077b2709882e293e80b8bfa2cd70492ed7e0d02ea329ac
SHA512f34f067effea9f3cf7c6dfd92593cd26803808acfd23a36574fe1a09edf3d53a96a624a47ccbbf3d35f7bc8f2464989a23efccf87a0a994d7215c12a46f74209