Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25-04-2024 03:56
Static task
static1
Behavioral task
behavioral1
Sample
d7872c553974f4dbde417da646b2ad4b170deb805e29547993362f324846e908.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d7872c553974f4dbde417da646b2ad4b170deb805e29547993362f324846e908.exe
Resource
win10v2004-20240412-en
General
-
Target
d7872c553974f4dbde417da646b2ad4b170deb805e29547993362f324846e908.exe
-
Size
206KB
-
MD5
038f12ac48bdbf7a6a4cde19fa5d4822
-
SHA1
4204f2c1aca9e198cb92ed7d46ff205aa7725f25
-
SHA256
d7872c553974f4dbde417da646b2ad4b170deb805e29547993362f324846e908
-
SHA512
b01f573a7635ddada8e8ce8eacf480cda1da8f355a7a33b190bf52739dcc070700599f797cfa01fb3911f8813236aa09432e53fa566972759d7e29522feb1cee
-
SSDEEP
3072:RvEfVUzSLhIVbV6i5LirrlZrHyrUHUckoMQ2RN6unm9:RvEN2U+T6i5LirrllHy4HUcMQY6b9
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
Processes:
explorer.exesvchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
Processes:
explorer.exesvchost.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
Processes:
svchost.exeexplorer.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe -
Executes dropped EXE 4 IoCs
Processes:
explorer.exespoolsv.exesvchost.exespoolsv.exepid process 2528 explorer.exe 2524 spoolsv.exe 2456 svchost.exe 1976 spoolsv.exe -
Loads dropped DLL 8 IoCs
Processes:
d7872c553974f4dbde417da646b2ad4b170deb805e29547993362f324846e908.exeexplorer.exespoolsv.exesvchost.exepid process 3048 d7872c553974f4dbde417da646b2ad4b170deb805e29547993362f324846e908.exe 3048 d7872c553974f4dbde417da646b2ad4b170deb805e29547993362f324846e908.exe 2528 explorer.exe 2528 explorer.exe 2524 spoolsv.exe 2524 spoolsv.exe 2456 svchost.exe 2456 svchost.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
svchost.exeexplorer.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe -
Drops file in Windows directory 6 IoCs
Processes:
explorer.exesvchost.exed7872c553974f4dbde417da646b2ad4b170deb805e29547993362f324846e908.exespoolsv.exedescription ioc process File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe svchost.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe d7872c553974f4dbde417da646b2ad4b170deb805e29547993362f324846e908.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
d7872c553974f4dbde417da646b2ad4b170deb805e29547993362f324846e908.exeexplorer.exesvchost.exepid process 3048 d7872c553974f4dbde417da646b2ad4b170deb805e29547993362f324846e908.exe 2528 explorer.exe 2528 explorer.exe 2528 explorer.exe 2528 explorer.exe 2528 explorer.exe 2456 svchost.exe 2456 svchost.exe 2528 explorer.exe 2456 svchost.exe 2528 explorer.exe 2456 svchost.exe 2528 explorer.exe 2528 explorer.exe 2456 svchost.exe 2456 svchost.exe 2528 explorer.exe 2456 svchost.exe 2528 explorer.exe 2528 explorer.exe 2456 svchost.exe 2456 svchost.exe 2528 explorer.exe 2456 svchost.exe 2528 explorer.exe 2528 explorer.exe 2456 svchost.exe 2528 explorer.exe 2456 svchost.exe 2528 explorer.exe 2456 svchost.exe 2528 explorer.exe 2456 svchost.exe 2528 explorer.exe 2456 svchost.exe 2456 svchost.exe 2528 explorer.exe 2456 svchost.exe 2528 explorer.exe 2528 explorer.exe 2456 svchost.exe 2528 explorer.exe 2456 svchost.exe 2456 svchost.exe 2528 explorer.exe 2528 explorer.exe 2456 svchost.exe 2456 svchost.exe 2528 explorer.exe 2456 svchost.exe 2528 explorer.exe 2528 explorer.exe 2456 svchost.exe 2456 svchost.exe 2528 explorer.exe 2528 explorer.exe 2456 svchost.exe 2456 svchost.exe 2528 explorer.exe 2528 explorer.exe 2456 svchost.exe 2528 explorer.exe 2456 svchost.exe 2456 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
explorer.exesvchost.exepid process 2528 explorer.exe 2456 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
Processes:
d7872c553974f4dbde417da646b2ad4b170deb805e29547993362f324846e908.exeexplorer.exespoolsv.exesvchost.exespoolsv.exepid process 3048 d7872c553974f4dbde417da646b2ad4b170deb805e29547993362f324846e908.exe 3048 d7872c553974f4dbde417da646b2ad4b170deb805e29547993362f324846e908.exe 2528 explorer.exe 2528 explorer.exe 2524 spoolsv.exe 2524 spoolsv.exe 2456 svchost.exe 2456 svchost.exe 1976 spoolsv.exe 1976 spoolsv.exe 2528 explorer.exe 2528 explorer.exe -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
d7872c553974f4dbde417da646b2ad4b170deb805e29547993362f324846e908.exeexplorer.exespoolsv.exesvchost.exedescription pid process target process PID 3048 wrote to memory of 2528 3048 d7872c553974f4dbde417da646b2ad4b170deb805e29547993362f324846e908.exe explorer.exe PID 3048 wrote to memory of 2528 3048 d7872c553974f4dbde417da646b2ad4b170deb805e29547993362f324846e908.exe explorer.exe PID 3048 wrote to memory of 2528 3048 d7872c553974f4dbde417da646b2ad4b170deb805e29547993362f324846e908.exe explorer.exe PID 3048 wrote to memory of 2528 3048 d7872c553974f4dbde417da646b2ad4b170deb805e29547993362f324846e908.exe explorer.exe PID 2528 wrote to memory of 2524 2528 explorer.exe spoolsv.exe PID 2528 wrote to memory of 2524 2528 explorer.exe spoolsv.exe PID 2528 wrote to memory of 2524 2528 explorer.exe spoolsv.exe PID 2528 wrote to memory of 2524 2528 explorer.exe spoolsv.exe PID 2524 wrote to memory of 2456 2524 spoolsv.exe svchost.exe PID 2524 wrote to memory of 2456 2524 spoolsv.exe svchost.exe PID 2524 wrote to memory of 2456 2524 spoolsv.exe svchost.exe PID 2524 wrote to memory of 2456 2524 spoolsv.exe svchost.exe PID 2456 wrote to memory of 1976 2456 svchost.exe spoolsv.exe PID 2456 wrote to memory of 1976 2456 svchost.exe spoolsv.exe PID 2456 wrote to memory of 1976 2456 svchost.exe spoolsv.exe PID 2456 wrote to memory of 1976 2456 svchost.exe spoolsv.exe PID 2456 wrote to memory of 2044 2456 svchost.exe at.exe PID 2456 wrote to memory of 2044 2456 svchost.exe at.exe PID 2456 wrote to memory of 2044 2456 svchost.exe at.exe PID 2456 wrote to memory of 2044 2456 svchost.exe at.exe PID 2456 wrote to memory of 2632 2456 svchost.exe at.exe PID 2456 wrote to memory of 2632 2456 svchost.exe at.exe PID 2456 wrote to memory of 2632 2456 svchost.exe at.exe PID 2456 wrote to memory of 2632 2456 svchost.exe at.exe PID 2456 wrote to memory of 2288 2456 svchost.exe at.exe PID 2456 wrote to memory of 2288 2456 svchost.exe at.exe PID 2456 wrote to memory of 2288 2456 svchost.exe at.exe PID 2456 wrote to memory of 2288 2456 svchost.exe at.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d7872c553974f4dbde417da646b2ad4b170deb805e29547993362f324846e908.exe"C:\Users\Admin\AppData\Local\Temp\d7872c553974f4dbde417da646b2ad4b170deb805e29547993362f324846e908.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3048 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2528 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2524 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2456 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1976 -
C:\Windows\SysWOW64\at.exeat 03:59 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:2044
-
C:\Windows\SysWOW64\at.exeat 04:00 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:2632
-
C:\Windows\SysWOW64\at.exeat 04:01 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:2288
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
206KB
MD5f5a49aa401649bebd8e7142036741c26
SHA18e041430e0749e74a77bbf4b1eca6706b6f3d23a
SHA25623de8bd393ce122ecc29719b6de1eb3bd2e4cfe9bfd49ae3c7ac7414a95d8745
SHA512ed329f2347c9882a0c58eed53110388c23e2c53c33dd14863ee2659fe4a80f6368dd3e41e43fdd7eab91c9c7884d3ca8fea117ad09879a75bde778405ecb6e8e
-
Filesize
206KB
MD5e997b56be6809fd0da8aa64fdcdc61a0
SHA12fb19c973a0c20591f0dbb082223a7fe9c81d126
SHA256a3cea7d0f71e7377e23831afff61f84b13cbc53ea06ea54459d34a9b4b87b463
SHA5128754be7eaf69fc7112db8fee27e0b9020a5af35fde11c3f8e05510a00e8c5ba126445127fb1b3b6366bc2ce6132aaba5c599ec821fe50ff85be24369a4578932
-
Filesize
206KB
MD5dac08fea61be2a58191402b2ac2c0717
SHA12c7a8564c6d798339ea7603cb411ce3453580f08
SHA2561d77174ce9145af56c72ce88f1fc94f8e56a75137749d4a8c3e5c9dd907450d1
SHA512bbfe72efcc51d5a1466de02f5f94c8d434f35dba009d97169a0badf2b0118992d9fc317558eef7137eeeedae93169a48750ece0dcf5f4531fbafbee2831567cf
-
Filesize
206KB
MD5dc501f96bdc49d89767cf27e43422f92
SHA1b7d890b203d547d100b89bb538a220487d2fe843
SHA25659b6200aea9c6c770ace06fe73348391869f7012b0646cbca324ba85959ad871
SHA5123c51bc89f69647d574b296175007a6caa9b79dfa9c28d0d9a9b3f957848c29697dab83ead481a6462d34d1bffe41871d5ce8c103840e43318d4783696b242ad8