Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
22-04-2024 21:09
Static task
static1
Behavioral task
behavioral1
Sample
3dc8ed924f145649c4ded3f740bd627a8ae2a4adb78de9ec87248210f94387b0.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3dc8ed924f145649c4ded3f740bd627a8ae2a4adb78de9ec87248210f94387b0.exe
Resource
win10v2004-20240412-en
General
-
Target
3dc8ed924f145649c4ded3f740bd627a8ae2a4adb78de9ec87248210f94387b0.exe
-
Size
206KB
-
MD5
92ba2b484272b899b065a55ea8736932
-
SHA1
f20eae6446da818981bf29f0ea380a0c504051cf
-
SHA256
3dc8ed924f145649c4ded3f740bd627a8ae2a4adb78de9ec87248210f94387b0
-
SHA512
ff546ea3e32aebb1852d64cddc2aca9eecacb430fe7b5cd3b92362ebe4583d8428b9215a5a138e2d205b780f5eadc5456b013b3747f4bded8aa7c6f1c5a3b8a7
-
SSDEEP
3072:5vEfVUzSLhIVbV6i5LirrlZrHyrUHUckoMQ2RN6une:5vEN2U+T6i5LirrllHy4HUcMQY6j
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 1324 explorer.exe 768 spoolsv.exe 1388 svchost.exe 4684 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe svchost.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe 3dc8ed924f145649c4ded3f740bd627a8ae2a4adb78de9ec87248210f94387b0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2676 3dc8ed924f145649c4ded3f740bd627a8ae2a4adb78de9ec87248210f94387b0.exe 2676 3dc8ed924f145649c4ded3f740bd627a8ae2a4adb78de9ec87248210f94387b0.exe 1324 explorer.exe 1324 explorer.exe 1324 explorer.exe 1324 explorer.exe 1324 explorer.exe 1324 explorer.exe 1324 explorer.exe 1324 explorer.exe 1388 svchost.exe 1388 svchost.exe 1388 svchost.exe 1388 svchost.exe 1324 explorer.exe 1324 explorer.exe 1388 svchost.exe 1388 svchost.exe 1324 explorer.exe 1324 explorer.exe 1388 svchost.exe 1388 svchost.exe 1324 explorer.exe 1324 explorer.exe 1388 svchost.exe 1388 svchost.exe 1324 explorer.exe 1324 explorer.exe 1388 svchost.exe 1388 svchost.exe 1324 explorer.exe 1324 explorer.exe 1388 svchost.exe 1388 svchost.exe 1324 explorer.exe 1324 explorer.exe 1388 svchost.exe 1388 svchost.exe 1324 explorer.exe 1324 explorer.exe 1388 svchost.exe 1388 svchost.exe 1324 explorer.exe 1324 explorer.exe 1388 svchost.exe 1388 svchost.exe 1324 explorer.exe 1324 explorer.exe 1388 svchost.exe 1388 svchost.exe 1324 explorer.exe 1324 explorer.exe 1388 svchost.exe 1388 svchost.exe 1324 explorer.exe 1324 explorer.exe 1388 svchost.exe 1388 svchost.exe 1324 explorer.exe 1324 explorer.exe 1388 svchost.exe 1388 svchost.exe 1324 explorer.exe 1324 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 1324 explorer.exe 1388 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2676 3dc8ed924f145649c4ded3f740bd627a8ae2a4adb78de9ec87248210f94387b0.exe 2676 3dc8ed924f145649c4ded3f740bd627a8ae2a4adb78de9ec87248210f94387b0.exe 1324 explorer.exe 1324 explorer.exe 768 spoolsv.exe 768 spoolsv.exe 1388 svchost.exe 1388 svchost.exe 4684 spoolsv.exe 4684 spoolsv.exe 1324 explorer.exe 1324 explorer.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2676 wrote to memory of 1324 2676 3dc8ed924f145649c4ded3f740bd627a8ae2a4adb78de9ec87248210f94387b0.exe 85 PID 2676 wrote to memory of 1324 2676 3dc8ed924f145649c4ded3f740bd627a8ae2a4adb78de9ec87248210f94387b0.exe 85 PID 2676 wrote to memory of 1324 2676 3dc8ed924f145649c4ded3f740bd627a8ae2a4adb78de9ec87248210f94387b0.exe 85 PID 1324 wrote to memory of 768 1324 explorer.exe 87 PID 1324 wrote to memory of 768 1324 explorer.exe 87 PID 1324 wrote to memory of 768 1324 explorer.exe 87 PID 768 wrote to memory of 1388 768 spoolsv.exe 88 PID 768 wrote to memory of 1388 768 spoolsv.exe 88 PID 768 wrote to memory of 1388 768 spoolsv.exe 88 PID 1388 wrote to memory of 4684 1388 svchost.exe 89 PID 1388 wrote to memory of 4684 1388 svchost.exe 89 PID 1388 wrote to memory of 4684 1388 svchost.exe 89 PID 1388 wrote to memory of 2528 1388 svchost.exe 90 PID 1388 wrote to memory of 2528 1388 svchost.exe 90 PID 1388 wrote to memory of 2528 1388 svchost.exe 90 PID 1388 wrote to memory of 1916 1388 svchost.exe 107 PID 1388 wrote to memory of 1916 1388 svchost.exe 107 PID 1388 wrote to memory of 1916 1388 svchost.exe 107 PID 1388 wrote to memory of 1376 1388 svchost.exe 123 PID 1388 wrote to memory of 1376 1388 svchost.exe 123 PID 1388 wrote to memory of 1376 1388 svchost.exe 123
Processes
-
C:\Users\Admin\AppData\Local\Temp\3dc8ed924f145649c4ded3f740bd627a8ae2a4adb78de9ec87248210f94387b0.exe"C:\Users\Admin\AppData\Local\Temp\3dc8ed924f145649c4ded3f740bd627a8ae2a4adb78de9ec87248210f94387b0.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2676 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1324 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:768 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1388 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4684
-
-
C:\Windows\SysWOW64\at.exeat 21:11 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:2528
-
-
C:\Windows\SysWOW64\at.exeat 21:12 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:1916
-
-
C:\Windows\SysWOW64\at.exeat 21:13 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:1376
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
206KB
MD54f7870fc0a113a350031a1785e825ace
SHA11cac7775eae051aa2667296fb1c6cf092e432965
SHA2563c5eb469cfa87b7722e01beb27ddf100bdfa8d896a3cae9754b0676fbe1ea18a
SHA512a313eb58ced06db8308b12bdc17f543b3fc14bd60efd8351cc6a58ab703b6779368cef5483bf00501018961c211ce49a1d0c5b169e2c144dffd2b14662aa191f
-
Filesize
206KB
MD5e478e181c9d606d326864704b7010afc
SHA1236e33c65e12f46be68661ba32d6461ea97ef907
SHA256312193b027c464a4aa971e5c05392e373730c7159f927912f6c39938ed9a67c3
SHA5127c928a1d7a066720f7defc315f21b51b739f5db6b1462c78991a233fa6e310d7fc9b98e200f729b11203e2f25270a4b7a9933fdd41ef939a2b509b3e44859b55
-
Filesize
206KB
MD558b122d0cff744cbd7a1da2732f00a02
SHA17394d739867139f7aeee42f0e8bad34166ed5ca5
SHA25673413900b2708b5504f0d0e8a409e01297723845ac1f62e4b1d9f70f6bf2ded9
SHA5126412d3bbfb9607a5446a9dfa53daf0960b927c61db386c3d9cd88dbeafb037cc3bede9d601016dea48a506c35750f04a6f218d129156b7536e5dd94e7d749c43
-
Filesize
206KB
MD5696ae49cb06c7762c960db1b62df8071
SHA139f91d1690b096e2907e71b0bcd0a8b5364442cc
SHA2565851fcb718b355030f4648f39c92c7c65bd08eb2d0db8c033e2bcbf3e57799b4
SHA5123bcae8616396d94511bc9fefdbf325b7f18e5ae3771af955813eb59970ec51eb9021c46989f963e9dfcdab924276f484f326ab0601f11776d41086305d746bab