Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    25-04-2024 03:56

General

  • Target

    d7872c553974f4dbde417da646b2ad4b170deb805e29547993362f324846e908.exe

  • Size

    206KB

  • MD5

    038f12ac48bdbf7a6a4cde19fa5d4822

  • SHA1

    4204f2c1aca9e198cb92ed7d46ff205aa7725f25

  • SHA256

    d7872c553974f4dbde417da646b2ad4b170deb805e29547993362f324846e908

  • SHA512

    b01f573a7635ddada8e8ce8eacf480cda1da8f355a7a33b190bf52739dcc070700599f797cfa01fb3911f8813236aa09432e53fa566972759d7e29522feb1cee

  • SSDEEP

    3072:RvEfVUzSLhIVbV6i5LirrlZrHyrUHUckoMQ2RN6unm9:RvEN2U+T6i5LirrllHy4HUcMQY6b9

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Modifies Installed Components in the registry 2 TTPs 8 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 8 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d7872c553974f4dbde417da646b2ad4b170deb805e29547993362f324846e908.exe
    "C:\Users\Admin\AppData\Local\Temp\d7872c553974f4dbde417da646b2ad4b170deb805e29547993362f324846e908.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3048
    • \??\c:\windows\system\explorer.exe
      c:\windows\system\explorer.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visiblity of hidden/system files in Explorer
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2528
      • \??\c:\windows\system\spoolsv.exe
        c:\windows\system\spoolsv.exe SE
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2524
        • \??\c:\windows\system\svchost.exe
          c:\windows\system\svchost.exe
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visiblity of hidden/system files in Explorer
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2456
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe PR
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:1976
          • C:\Windows\SysWOW64\at.exe
            at 03:59 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
            5⤵
              PID:2044
            • C:\Windows\SysWOW64\at.exe
              at 04:00 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
              5⤵
                PID:2632
              • C:\Windows\SysWOW64\at.exe
                at 04:01 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
                5⤵
                  PID:2288

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\mrsys.exe

          Filesize

          206KB

          MD5

          f5a49aa401649bebd8e7142036741c26

          SHA1

          8e041430e0749e74a77bbf4b1eca6706b6f3d23a

          SHA256

          23de8bd393ce122ecc29719b6de1eb3bd2e4cfe9bfd49ae3c7ac7414a95d8745

          SHA512

          ed329f2347c9882a0c58eed53110388c23e2c53c33dd14863ee2659fe4a80f6368dd3e41e43fdd7eab91c9c7884d3ca8fea117ad09879a75bde778405ecb6e8e

        • C:\Windows\system\spoolsv.exe

          Filesize

          206KB

          MD5

          e997b56be6809fd0da8aa64fdcdc61a0

          SHA1

          2fb19c973a0c20591f0dbb082223a7fe9c81d126

          SHA256

          a3cea7d0f71e7377e23831afff61f84b13cbc53ea06ea54459d34a9b4b87b463

          SHA512

          8754be7eaf69fc7112db8fee27e0b9020a5af35fde11c3f8e05510a00e8c5ba126445127fb1b3b6366bc2ce6132aaba5c599ec821fe50ff85be24369a4578932

        • C:\Windows\system\svchost.exe

          Filesize

          206KB

          MD5

          dac08fea61be2a58191402b2ac2c0717

          SHA1

          2c7a8564c6d798339ea7603cb411ce3453580f08

          SHA256

          1d77174ce9145af56c72ce88f1fc94f8e56a75137749d4a8c3e5c9dd907450d1

          SHA512

          bbfe72efcc51d5a1466de02f5f94c8d434f35dba009d97169a0badf2b0118992d9fc317558eef7137eeeedae93169a48750ece0dcf5f4531fbafbee2831567cf

        • \Windows\system\explorer.exe

          Filesize

          206KB

          MD5

          dc501f96bdc49d89767cf27e43422f92

          SHA1

          b7d890b203d547d100b89bb538a220487d2fe843

          SHA256

          59b6200aea9c6c770ace06fe73348391869f7012b0646cbca324ba85959ad871

          SHA512

          3c51bc89f69647d574b296175007a6caa9b79dfa9c28d0d9a9b3f957848c29697dab83ead481a6462d34d1bffe41871d5ce8c103840e43318d4783696b242ad8

        • memory/1976-51-0x0000000000400000-0x0000000000442000-memory.dmp

          Filesize

          264KB

        • memory/2524-54-0x0000000000400000-0x0000000000442000-memory.dmp

          Filesize

          264KB

        • memory/2528-14-0x0000000000400000-0x0000000000442000-memory.dmp

          Filesize

          264KB

        • memory/3048-0-0x0000000000400000-0x0000000000442000-memory.dmp

          Filesize

          264KB

        • memory/3048-55-0x0000000000400000-0x0000000000442000-memory.dmp

          Filesize

          264KB

        • memory/3048-12-0x0000000002FA0000-0x0000000002FE2000-memory.dmp

          Filesize

          264KB