Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-04-2024 21:09

General

  • Target

    3dc8ed924f145649c4ded3f740bd627a8ae2a4adb78de9ec87248210f94387b0.exe

  • Size

    206KB

  • MD5

    92ba2b484272b899b065a55ea8736932

  • SHA1

    f20eae6446da818981bf29f0ea380a0c504051cf

  • SHA256

    3dc8ed924f145649c4ded3f740bd627a8ae2a4adb78de9ec87248210f94387b0

  • SHA512

    ff546ea3e32aebb1852d64cddc2aca9eecacb430fe7b5cd3b92362ebe4583d8428b9215a5a138e2d205b780f5eadc5456b013b3747f4bded8aa7c6f1c5a3b8a7

  • SSDEEP

    3072:5vEfVUzSLhIVbV6i5LirrlZrHyrUHUckoMQ2RN6une:5vEN2U+T6i5LirrllHy4HUcMQY6j

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Modifies Installed Components in the registry 2 TTPs 8 IoCs
  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3dc8ed924f145649c4ded3f740bd627a8ae2a4adb78de9ec87248210f94387b0.exe
    "C:\Users\Admin\AppData\Local\Temp\3dc8ed924f145649c4ded3f740bd627a8ae2a4adb78de9ec87248210f94387b0.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2676
    • \??\c:\windows\system\explorer.exe
      c:\windows\system\explorer.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visiblity of hidden/system files in Explorer
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1324
      • \??\c:\windows\system\spoolsv.exe
        c:\windows\system\spoolsv.exe SE
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:768
        • \??\c:\windows\system\svchost.exe
          c:\windows\system\svchost.exe
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visiblity of hidden/system files in Explorer
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1388
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe PR
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:4684
          • C:\Windows\SysWOW64\at.exe
            at 21:11 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
            5⤵
              PID:2528
            • C:\Windows\SysWOW64\at.exe
              at 21:12 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
              5⤵
                PID:1916
              • C:\Windows\SysWOW64\at.exe
                at 21:13 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
                5⤵
                  PID:1376

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\mrsys.exe

          Filesize

          206KB

          MD5

          4f7870fc0a113a350031a1785e825ace

          SHA1

          1cac7775eae051aa2667296fb1c6cf092e432965

          SHA256

          3c5eb469cfa87b7722e01beb27ddf100bdfa8d896a3cae9754b0676fbe1ea18a

          SHA512

          a313eb58ced06db8308b12bdc17f543b3fc14bd60efd8351cc6a58ab703b6779368cef5483bf00501018961c211ce49a1d0c5b169e2c144dffd2b14662aa191f

        • C:\Windows\System\explorer.exe

          Filesize

          206KB

          MD5

          e478e181c9d606d326864704b7010afc

          SHA1

          236e33c65e12f46be68661ba32d6461ea97ef907

          SHA256

          312193b027c464a4aa971e5c05392e373730c7159f927912f6c39938ed9a67c3

          SHA512

          7c928a1d7a066720f7defc315f21b51b739f5db6b1462c78991a233fa6e310d7fc9b98e200f729b11203e2f25270a4b7a9933fdd41ef939a2b509b3e44859b55

        • C:\Windows\System\spoolsv.exe

          Filesize

          206KB

          MD5

          58b122d0cff744cbd7a1da2732f00a02

          SHA1

          7394d739867139f7aeee42f0e8bad34166ed5ca5

          SHA256

          73413900b2708b5504f0d0e8a409e01297723845ac1f62e4b1d9f70f6bf2ded9

          SHA512

          6412d3bbfb9607a5446a9dfa53daf0960b927c61db386c3d9cd88dbeafb037cc3bede9d601016dea48a506c35750f04a6f218d129156b7536e5dd94e7d749c43

        • C:\Windows\System\svchost.exe

          Filesize

          206KB

          MD5

          696ae49cb06c7762c960db1b62df8071

          SHA1

          39f91d1690b096e2907e71b0bcd0a8b5364442cc

          SHA256

          5851fcb718b355030f4648f39c92c7c65bd08eb2d0db8c033e2bcbf3e57799b4

          SHA512

          3bcae8616396d94511bc9fefdbf325b7f18e5ae3771af955813eb59970ec51eb9021c46989f963e9dfcdab924276f484f326ab0601f11776d41086305d746bab

        • memory/768-36-0x0000000000400000-0x0000000000440000-memory.dmp

          Filesize

          256KB

        • memory/2676-0-0x0000000000400000-0x0000000000440000-memory.dmp

          Filesize

          256KB

        • memory/2676-35-0x0000000000400000-0x0000000000440000-memory.dmp

          Filesize

          256KB

        • memory/4684-32-0x0000000000400000-0x0000000000440000-memory.dmp

          Filesize

          256KB