Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
07-05-2024 02:07
Static task
static1
Behavioral task
behavioral1
Sample
dffce7fe5a998086d3e8e70c395ca9bbaa966b7ac74383e9de38c39732ab6cef.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
dffce7fe5a998086d3e8e70c395ca9bbaa966b7ac74383e9de38c39732ab6cef.exe
Resource
win10v2004-20240419-en
General
-
Target
dffce7fe5a998086d3e8e70c395ca9bbaa966b7ac74383e9de38c39732ab6cef.exe
-
Size
211KB
-
MD5
4d6f250bb8d011ade5678301ef60d3d4
-
SHA1
07c2ef14f490767bf938bd9bce997f3384da3be4
-
SHA256
dffce7fe5a998086d3e8e70c395ca9bbaa966b7ac74383e9de38c39732ab6cef
-
SHA512
52fce216b88e3089e57633f83c409abecf596d6ea126129be7136630503ee8e86250389a53bbc00e524c191ca0339faba895020e48f47b3b95c5b605d5ff183a
-
SSDEEP
3072:WD6Xtx68yygRBE52mxkEOHLRMpZ4deth8PEAjAfIbAYGPhz6sPJBInxZqO4:Wh8cBzHLRMpZ4d1Z4
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\userinit.exe" swchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\userinit.exe" userinit.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" userinit.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" swchost.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Local\\mrsys.exe MR" swchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} swchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} swchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Local\\mrsys.exe MR" swchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} swchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} userinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Local\\mrsys.exe MR" userinit.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} swchost.exe -
Executes dropped EXE 4 IoCs
pid Process 2580 userinit.exe 2364 spoolsw.exe 2536 swchost.exe 2408 spoolsw.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\userinit = "c:\\windows\\userinit.exe RO" userinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Swchost = "c:\\windows\\swchost.exe RO" userinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\userinit = "c:\\windows\\userinit.exe RO" swchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Swchost = "c:\\windows\\swchost.exe RO" swchost.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\system\udsys.exe userinit.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification \??\c:\windows\userinit.exe dffce7fe5a998086d3e8e70c395ca9bbaa966b7ac74383e9de38c39732ab6cef.exe File opened for modification \??\c:\windows\spoolsw.exe userinit.exe File opened for modification \??\c:\windows\swchost.exe spoolsw.exe File opened for modification \??\c:\windows\userinit.exe userinit.exe File opened for modification \??\c:\windows\swchost.exe swchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 640 dffce7fe5a998086d3e8e70c395ca9bbaa966b7ac74383e9de38c39732ab6cef.exe 2580 userinit.exe 2580 userinit.exe 2580 userinit.exe 2536 swchost.exe 2536 swchost.exe 2580 userinit.exe 2536 swchost.exe 2580 userinit.exe 2580 userinit.exe 2536 swchost.exe 2536 swchost.exe 2580 userinit.exe 2536 swchost.exe 2580 userinit.exe 2536 swchost.exe 2580 userinit.exe 2580 userinit.exe 2536 swchost.exe 2580 userinit.exe 2536 swchost.exe 2536 swchost.exe 2580 userinit.exe 2536 swchost.exe 2580 userinit.exe 2536 swchost.exe 2580 userinit.exe 2580 userinit.exe 2536 swchost.exe 2536 swchost.exe 2580 userinit.exe 2580 userinit.exe 2536 swchost.exe 2536 swchost.exe 2580 userinit.exe 2580 userinit.exe 2536 swchost.exe 2536 swchost.exe 2580 userinit.exe 2580 userinit.exe 2536 swchost.exe 2536 swchost.exe 2580 userinit.exe 2536 swchost.exe 2580 userinit.exe 2536 swchost.exe 2580 userinit.exe 2580 userinit.exe 2536 swchost.exe 2536 swchost.exe 2580 userinit.exe 2580 userinit.exe 2536 swchost.exe 2536 swchost.exe 2580 userinit.exe 2536 swchost.exe 2580 userinit.exe 2536 swchost.exe 2580 userinit.exe 2580 userinit.exe 2536 swchost.exe 2536 swchost.exe 2580 userinit.exe 2536 swchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2580 userinit.exe 2536 swchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 640 dffce7fe5a998086d3e8e70c395ca9bbaa966b7ac74383e9de38c39732ab6cef.exe 640 dffce7fe5a998086d3e8e70c395ca9bbaa966b7ac74383e9de38c39732ab6cef.exe 2580 userinit.exe 2580 userinit.exe 2364 spoolsw.exe 2364 spoolsw.exe 2536 swchost.exe 2536 swchost.exe 2408 spoolsw.exe 2408 spoolsw.exe 2580 userinit.exe 2580 userinit.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 640 wrote to memory of 2580 640 dffce7fe5a998086d3e8e70c395ca9bbaa966b7ac74383e9de38c39732ab6cef.exe 29 PID 640 wrote to memory of 2580 640 dffce7fe5a998086d3e8e70c395ca9bbaa966b7ac74383e9de38c39732ab6cef.exe 29 PID 640 wrote to memory of 2580 640 dffce7fe5a998086d3e8e70c395ca9bbaa966b7ac74383e9de38c39732ab6cef.exe 29 PID 640 wrote to memory of 2580 640 dffce7fe5a998086d3e8e70c395ca9bbaa966b7ac74383e9de38c39732ab6cef.exe 29 PID 2580 wrote to memory of 2364 2580 userinit.exe 30 PID 2580 wrote to memory of 2364 2580 userinit.exe 30 PID 2580 wrote to memory of 2364 2580 userinit.exe 30 PID 2580 wrote to memory of 2364 2580 userinit.exe 30 PID 2364 wrote to memory of 2536 2364 spoolsw.exe 31 PID 2364 wrote to memory of 2536 2364 spoolsw.exe 31 PID 2364 wrote to memory of 2536 2364 spoolsw.exe 31 PID 2364 wrote to memory of 2536 2364 spoolsw.exe 31 PID 2536 wrote to memory of 2408 2536 swchost.exe 32 PID 2536 wrote to memory of 2408 2536 swchost.exe 32 PID 2536 wrote to memory of 2408 2536 swchost.exe 32 PID 2536 wrote to memory of 2408 2536 swchost.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\dffce7fe5a998086d3e8e70c395ca9bbaa966b7ac74383e9de38c39732ab6cef.exe"C:\Users\Admin\AppData\Local\Temp\dffce7fe5a998086d3e8e70c395ca9bbaa966b7ac74383e9de38c39732ab6cef.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:640 -
\??\c:\windows\userinit.exec:\windows\userinit.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2580 -
\??\c:\windows\spoolsw.exec:\windows\spoolsw.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2364 -
\??\c:\windows\swchost.exec:\windows\swchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2536 -
\??\c:\windows\spoolsw.exec:\windows\spoolsw.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2408
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
211KB
MD5540c2a73235cdb478928b2cb4df26d22
SHA1bedb91c46d6f5f8da7a05cf30dd84373ce12c653
SHA256d134fc8c3ba1514d3126cdc190ccf83c5bbec37a104d491f673dedfb9104476a
SHA512bf9b0342e360c79aac2bab2c6e6e685923e77fb023b513a4112320b2647a3fb550d2e1657124a5611828b085c9456e8fedfd5f53c411c9358081cf86674af206
-
Filesize
211KB
MD5a2c09faafea1b57cfb4d29cc43deb01b
SHA1da5d0d6db4cad8724bfa8346c0cd1b9f5f16918c
SHA2567a6615c5b1655fa44b68330adce4ac97437821bfb20bfbf8e1c9507b08569cd9
SHA5125c1a30d58cab81fbc2f2a5081d22a4549acec01d5f3e3defaffb421620b01ea7fa2e3c8ceccc592a3672f40e25e88a3628c8c020f20c281af2ed385c33fc2af5
-
Filesize
211KB
MD51601e319eefbc75f80c905fa2cf20fb5
SHA18681f88fa9221d2933ea306c0cfa602328fcbb53
SHA25683cfc920a470741a662698a9bad569265e064ffd97fe0910f72d6b66c61a850b
SHA512838f9563fe0fe4b64e0a1fcee2333620f50f0365ea8ef51c7de6598535e6ddec82357d8c58fefc85c6ef1fb6e4590fe1e46e4e7e80d6b10b68cb0b553ba543ea
-
Filesize
211KB
MD56148f2238e1b75c128d875a11614ebee
SHA16826dded2a36f49076dbb1bf08737a081e4c42ae
SHA2568d4dffa42271fe5c069f935482274bd63606d481239e3f97f1ca306224c46579
SHA51215b9a7be8846406f2af6cfe5f09e89903cfb898dff35ab98f6c3157f4991a6e58e04c5d4eee8ab88c826ef4d79734052787242edd9b8fd0585fcfbbe2c070147