Analysis
-
max time kernel
150s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25-04-2024 04:06
Static task
static1
Behavioral task
behavioral1
Sample
db5822d2faef5fd72bbc4198569d9ede539a33ea695bea6841824b029866a3c4.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
db5822d2faef5fd72bbc4198569d9ede539a33ea695bea6841824b029866a3c4.exe
Resource
win10v2004-20240226-en
General
-
Target
db5822d2faef5fd72bbc4198569d9ede539a33ea695bea6841824b029866a3c4.exe
-
Size
293KB
-
MD5
a58d3e9f348de31e8d5b79cf9c20701e
-
SHA1
eb6344cde15b514e1c076eff7699a0c68d334d61
-
SHA256
db5822d2faef5fd72bbc4198569d9ede539a33ea695bea6841824b029866a3c4
-
SHA512
140e42e0d0a076d50ccb0dd7b2aff7fb3350aa133f02a504bc9ad64ce40bbeb6d52bcdd56863b1896697964768e727616a300e7885292817a8799694332d42b5
-
SSDEEP
3072:AygCullUQN7gsBh1L1QygCullUQN7gsBh1L1d:ARleK7712RleK771D
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
Processes:
explorer.exesvchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
Processes:
explorer.exesvchost.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
Processes:
svchost.exeexplorer.exedescription ioc process Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe -
Executes dropped EXE 4 IoCs
Processes:
explorer.exespoolsv.exesvchost.exespoolsv.exepid process 1956 explorer.exe 2488 spoolsv.exe 2816 svchost.exe 2720 spoolsv.exe -
Loads dropped DLL 8 IoCs
Processes:
db5822d2faef5fd72bbc4198569d9ede539a33ea695bea6841824b029866a3c4.exeexplorer.exespoolsv.exesvchost.exepid process 1196 db5822d2faef5fd72bbc4198569d9ede539a33ea695bea6841824b029866a3c4.exe 1196 db5822d2faef5fd72bbc4198569d9ede539a33ea695bea6841824b029866a3c4.exe 1956 explorer.exe 1956 explorer.exe 2488 spoolsv.exe 2488 spoolsv.exe 2816 svchost.exe 2816 svchost.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
svchost.exeexplorer.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe -
Drops file in Windows directory 7 IoCs
Processes:
db5822d2faef5fd72bbc4198569d9ede539a33ea695bea6841824b029866a3c4.exeexplorer.exespoolsv.exesvchost.exedescription ioc process File opened for modification \??\c:\windows\system\explorer.exe db5822d2faef5fd72bbc4198569d9ede539a33ea695bea6841824b029866a3c4.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe svchost.exe File opened for modification C:\Windows\System\tjud.exe explorer.exe File opened for modification C:\Windows\System\tjcm.cmn explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
db5822d2faef5fd72bbc4198569d9ede539a33ea695bea6841824b029866a3c4.exeexplorer.exesvchost.exepid process 1196 db5822d2faef5fd72bbc4198569d9ede539a33ea695bea6841824b029866a3c4.exe 1956 explorer.exe 1956 explorer.exe 1956 explorer.exe 2816 svchost.exe 2816 svchost.exe 1956 explorer.exe 2816 svchost.exe 1956 explorer.exe 2816 svchost.exe 1956 explorer.exe 2816 svchost.exe 1956 explorer.exe 2816 svchost.exe 1956 explorer.exe 2816 svchost.exe 1956 explorer.exe 2816 svchost.exe 1956 explorer.exe 2816 svchost.exe 1956 explorer.exe 2816 svchost.exe 1956 explorer.exe 2816 svchost.exe 1956 explorer.exe 2816 svchost.exe 1956 explorer.exe 2816 svchost.exe 1956 explorer.exe 2816 svchost.exe 1956 explorer.exe 2816 svchost.exe 1956 explorer.exe 2816 svchost.exe 1956 explorer.exe 2816 svchost.exe 1956 explorer.exe 2816 svchost.exe 1956 explorer.exe 2816 svchost.exe 1956 explorer.exe 2816 svchost.exe 1956 explorer.exe 2816 svchost.exe 1956 explorer.exe 2816 svchost.exe 1956 explorer.exe 2816 svchost.exe 1956 explorer.exe 2816 svchost.exe 1956 explorer.exe 2816 svchost.exe 1956 explorer.exe 2816 svchost.exe 1956 explorer.exe 2816 svchost.exe 1956 explorer.exe 2816 svchost.exe 1956 explorer.exe 2816 svchost.exe 1956 explorer.exe 2816 svchost.exe 1956 explorer.exe 2816 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
explorer.exesvchost.exepid process 1956 explorer.exe 2816 svchost.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
Processes:
db5822d2faef5fd72bbc4198569d9ede539a33ea695bea6841824b029866a3c4.exeexplorer.exespoolsv.exesvchost.exespoolsv.exepid process 1196 db5822d2faef5fd72bbc4198569d9ede539a33ea695bea6841824b029866a3c4.exe 1196 db5822d2faef5fd72bbc4198569d9ede539a33ea695bea6841824b029866a3c4.exe 1956 explorer.exe 1956 explorer.exe 2488 spoolsv.exe 2488 spoolsv.exe 2816 svchost.exe 2816 svchost.exe 2720 spoolsv.exe 2720 spoolsv.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
db5822d2faef5fd72bbc4198569d9ede539a33ea695bea6841824b029866a3c4.exeexplorer.exespoolsv.exesvchost.exedescription pid process target process PID 1196 wrote to memory of 1956 1196 db5822d2faef5fd72bbc4198569d9ede539a33ea695bea6841824b029866a3c4.exe explorer.exe PID 1196 wrote to memory of 1956 1196 db5822d2faef5fd72bbc4198569d9ede539a33ea695bea6841824b029866a3c4.exe explorer.exe PID 1196 wrote to memory of 1956 1196 db5822d2faef5fd72bbc4198569d9ede539a33ea695bea6841824b029866a3c4.exe explorer.exe PID 1196 wrote to memory of 1956 1196 db5822d2faef5fd72bbc4198569d9ede539a33ea695bea6841824b029866a3c4.exe explorer.exe PID 1956 wrote to memory of 2488 1956 explorer.exe spoolsv.exe PID 1956 wrote to memory of 2488 1956 explorer.exe spoolsv.exe PID 1956 wrote to memory of 2488 1956 explorer.exe spoolsv.exe PID 1956 wrote to memory of 2488 1956 explorer.exe spoolsv.exe PID 2488 wrote to memory of 2816 2488 spoolsv.exe svchost.exe PID 2488 wrote to memory of 2816 2488 spoolsv.exe svchost.exe PID 2488 wrote to memory of 2816 2488 spoolsv.exe svchost.exe PID 2488 wrote to memory of 2816 2488 spoolsv.exe svchost.exe PID 2816 wrote to memory of 2720 2816 svchost.exe spoolsv.exe PID 2816 wrote to memory of 2720 2816 svchost.exe spoolsv.exe PID 2816 wrote to memory of 2720 2816 svchost.exe spoolsv.exe PID 2816 wrote to memory of 2720 2816 svchost.exe spoolsv.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\db5822d2faef5fd72bbc4198569d9ede539a33ea695bea6841824b029866a3c4.exe"C:\Users\Admin\AppData\Local\Temp\db5822d2faef5fd72bbc4198569d9ede539a33ea695bea6841824b029866a3c4.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1196 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1956 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2488 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2816 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2720
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
292KB
MD5c7ac97091a5ea5916d20af8a68f6039b
SHA1edebca8630be7f7720fbe63309f9226dfddbd3b0
SHA256c0e4b2cf05d1ef03d5f329b59b904a05adf117f9c555838b0558207028e7c160
SHA512013443bb8a9c508e17d1b4f98f72ed9fc36672742fa307878c3922c1d8c2eff42cbaac14c8cebfa86e24241cf7c06153fa94a6fc726419e95e8ce788409b86ab
-
Filesize
292KB
MD5f1301e0e8e90cf02684e6fc8ee127eb1
SHA1207e308eff2be93a66044078d4903596f86fc060
SHA256cf26326881af308718abaa18599fcf3d6354c4beb5411f9cdfc94059a41e1aa9
SHA512da19c9e86e207671de34271f5ce2a3ba7b2c7b16f7bc87fc57a0200e9424d75cd8e95629344f3d3630af22827057c31d6dedac27c95df0d8185adf0792f56498
-
Filesize
292KB
MD5e9cc0aa9b072f4df593952aba76e85aa
SHA1fa3e07215e28d809693cfa44a70403bf759ea2f8
SHA25642baed3c08375e48ac783b12fc1a274063412c24469bf8abb7ec4d064506c6b5
SHA512f68ad07cf95e8907af8157932f6a68c1fa5e8a6ba24d1dd84e7db25185b8becbf09f1e1cf03dbec0649128bd68fcaf9db9fd1ff74c5dd74b913a907c712df688
-
Filesize
292KB
MD5a8d11d463ab90801ea498e7d427b21de
SHA16ba37585810b4310fb500cba42d04b8e0ae9d18a
SHA25638004caa3f5b2cf24bef2698185c4b96a74cd3ba5c002e78cfcb4e9e5d4e6bca
SHA51218765e1535424a1cf4231bba1860fe422f1d0a43c0e26a88d023b255a6660b616888dd6b2a9815e9b2315708deac5a4cf4bd165950e10f809b895d91e0563c81