Analysis

  • max time kernel
    150s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    22/04/2024, 20:39

General

  • Target

    3427a3de054f8448871f3b2f58ad33d0b5893b9483cdc43399dd3fa8befcc77f.exe

  • Size

    211KB

  • MD5

    c51fc2f3b5baf94edd0a789e86064513

  • SHA1

    e5bd7871977d8edb5374035ef4d6628cf9514889

  • SHA256

    3427a3de054f8448871f3b2f58ad33d0b5893b9483cdc43399dd3fa8befcc77f

  • SHA512

    2d6a8aae9161ebc43abcefcac70363f1dd4cfafd874117c52f2ff0c1dc5e28ac512cc6e70bb24c5d799939395e609ec05e26a526d02808b014388f73c97e637d

  • SSDEEP

    3072:JD6Xtx68yygRBE52mxkEOHLRMpZ4deth8PEAjAfIbAYGPhz6sPJBInxZqON:Jh8cBzHLRMpZ4d1ZN

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Modifies Installed Components in the registry 2 TTPs 8 IoCs
  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3427a3de054f8448871f3b2f58ad33d0b5893b9483cdc43399dd3fa8befcc77f.exe
    "C:\Users\Admin\AppData\Local\Temp\3427a3de054f8448871f3b2f58ad33d0b5893b9483cdc43399dd3fa8befcc77f.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1704
    • \??\c:\windows\userinit.exe
      c:\windows\userinit.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visiblity of hidden/system files in Explorer
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2688
      • \??\c:\windows\spoolsw.exe
        c:\windows\spoolsw.exe SE
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2556
        • \??\c:\windows\swchost.exe
          c:\windows\swchost.exe
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visiblity of hidden/system files in Explorer
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2452
          • \??\c:\windows\spoolsw.exe
            c:\windows\spoolsw.exe PR
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:2444

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\mrsys.exe

    Filesize

    211KB

    MD5

    a4e3338f0509343e0ffb4f43219387bc

    SHA1

    168e01692fd85fca422f0abc1171394dc14a501e

    SHA256

    4419e0fe8572fe04041d1222b1f3d1322bdffe9b8df30c805f246027d769a4f0

    SHA512

    cc2311601b50c76aba16ad03212fda2ec35f0e365cfb2c87f977a13c4a15c009cd22006988ef466bd4898d73c21ed984279289399e80c76ce685e8bcf33f95df

  • C:\Windows\spoolsw.exe

    Filesize

    211KB

    MD5

    5d699bcd5966f70eb25267b675a713ae

    SHA1

    8d67d26f9c893ce9955b6922c4cdca0e0f6d2dee

    SHA256

    d225dc55bb24b94bd8aef046516269032a7b6d57e56f86588f0490a81e47d742

    SHA512

    89285be54573134a488e0fcaaf51d9f1b50be70f08bd5f8b7fae575189f18ee45e387579723c670e45f3f6065e9ef1b3d824d0c11d481cd2f903fbd999994205

  • C:\Windows\swchost.exe

    Filesize

    211KB

    MD5

    c4636ac18c94dee24f61fef84215adcf

    SHA1

    c9f82baeb82686d2c483d6a5da18fc52458d0cdc

    SHA256

    b9e2441dea9f13ed5294a69e11906b59fefa2d4c42fe179e171e9a57c7a8a076

    SHA512

    c614951a0fcc0f96a05d25d07dc826f7e3b1bbf78f2e607e111d7839704fb0f9acb894985519414e267be43e298647e29f0140c8cd34ab69ef8637e0c5d657d9

  • C:\Windows\userinit.exe

    Filesize

    211KB

    MD5

    cf98ea9eaa5439915da124c99655fb3a

    SHA1

    c684bf2e90b5f2dda4cc8fc9c58828b4c99e9943

    SHA256

    d2f0d6b01725572ccd0485a7b1cbb274700f5eec55fb9973558b8a4f479ae8b5

    SHA512

    f62286f85115f07356069f477655918f6c3b517a7ef68bf4250b9b54f2d72c4ade3b5bf6c8030b591284a6aafef9f7546773445e31e8913eb12690afb75765c5