Analysis
-
max time kernel
150s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
09/05/2024, 04:24
Static task
static1
Behavioral task
behavioral1
Sample
d2aefc636b6db18278187345fb5bf1e898c2edae0d0edb35cb4e736ac434ad7a.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d2aefc636b6db18278187345fb5bf1e898c2edae0d0edb35cb4e736ac434ad7a.exe
Resource
win10v2004-20240508-en
General
-
Target
d2aefc636b6db18278187345fb5bf1e898c2edae0d0edb35cb4e736ac434ad7a.exe
-
Size
66KB
-
MD5
79566a1c23d7399ce2d4cb6172a753ce
-
SHA1
4f007c19c14cca656c5a814a1d2c65349bc2be80
-
SHA256
d2aefc636b6db18278187345fb5bf1e898c2edae0d0edb35cb4e736ac434ad7a
-
SHA512
0765258ac8c1510722d4169251e94cc7c845c69060c9621827b76595899c9832d7840fdd7c3c4cbf95ad469733bfd904b30e82f6808bd1314283af68ff2f9071
-
SSDEEP
1536:EHfetdklPp+07gDSrB8Xru2zGeJxgawTzpXzrDJrXiY:IeklMMYJhqezw/pXzH9iY
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 4012 explorer.exe 5076 spoolsv.exe 3232 svchost.exe 2512 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification \??\c:\windows\system\svchost.exe svchost.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe d2aefc636b6db18278187345fb5bf1e898c2edae0d0edb35cb4e736ac434ad7a.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1300 d2aefc636b6db18278187345fb5bf1e898c2edae0d0edb35cb4e736ac434ad7a.exe 1300 d2aefc636b6db18278187345fb5bf1e898c2edae0d0edb35cb4e736ac434ad7a.exe 4012 explorer.exe 4012 explorer.exe 4012 explorer.exe 4012 explorer.exe 4012 explorer.exe 4012 explorer.exe 4012 explorer.exe 4012 explorer.exe 3232 svchost.exe 3232 svchost.exe 3232 svchost.exe 3232 svchost.exe 3232 svchost.exe 4012 explorer.exe 3232 svchost.exe 4012 explorer.exe 4012 explorer.exe 3232 svchost.exe 3232 svchost.exe 4012 explorer.exe 4012 explorer.exe 3232 svchost.exe 4012 explorer.exe 3232 svchost.exe 3232 svchost.exe 4012 explorer.exe 3232 svchost.exe 4012 explorer.exe 4012 explorer.exe 3232 svchost.exe 4012 explorer.exe 3232 svchost.exe 3232 svchost.exe 4012 explorer.exe 3232 svchost.exe 4012 explorer.exe 3232 svchost.exe 4012 explorer.exe 3232 svchost.exe 4012 explorer.exe 3232 svchost.exe 3232 svchost.exe 4012 explorer.exe 4012 explorer.exe 4012 explorer.exe 3232 svchost.exe 4012 explorer.exe 3232 svchost.exe 4012 explorer.exe 3232 svchost.exe 4012 explorer.exe 3232 svchost.exe 3232 svchost.exe 4012 explorer.exe 4012 explorer.exe 3232 svchost.exe 4012 explorer.exe 3232 svchost.exe 4012 explorer.exe 3232 svchost.exe 3232 svchost.exe 4012 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 4012 explorer.exe 3232 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1300 d2aefc636b6db18278187345fb5bf1e898c2edae0d0edb35cb4e736ac434ad7a.exe 1300 d2aefc636b6db18278187345fb5bf1e898c2edae0d0edb35cb4e736ac434ad7a.exe 4012 explorer.exe 4012 explorer.exe 5076 spoolsv.exe 5076 spoolsv.exe 3232 svchost.exe 3232 svchost.exe 2512 spoolsv.exe 2512 spoolsv.exe 4012 explorer.exe 4012 explorer.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1300 wrote to memory of 4012 1300 d2aefc636b6db18278187345fb5bf1e898c2edae0d0edb35cb4e736ac434ad7a.exe 79 PID 1300 wrote to memory of 4012 1300 d2aefc636b6db18278187345fb5bf1e898c2edae0d0edb35cb4e736ac434ad7a.exe 79 PID 1300 wrote to memory of 4012 1300 d2aefc636b6db18278187345fb5bf1e898c2edae0d0edb35cb4e736ac434ad7a.exe 79 PID 4012 wrote to memory of 5076 4012 explorer.exe 81 PID 4012 wrote to memory of 5076 4012 explorer.exe 81 PID 4012 wrote to memory of 5076 4012 explorer.exe 81 PID 5076 wrote to memory of 3232 5076 spoolsv.exe 83 PID 5076 wrote to memory of 3232 5076 spoolsv.exe 83 PID 5076 wrote to memory of 3232 5076 spoolsv.exe 83 PID 3232 wrote to memory of 2512 3232 svchost.exe 84 PID 3232 wrote to memory of 2512 3232 svchost.exe 84 PID 3232 wrote to memory of 2512 3232 svchost.exe 84 PID 3232 wrote to memory of 1364 3232 svchost.exe 85 PID 3232 wrote to memory of 1364 3232 svchost.exe 85 PID 3232 wrote to memory of 1364 3232 svchost.exe 85 PID 3232 wrote to memory of 3000 3232 svchost.exe 90 PID 3232 wrote to memory of 3000 3232 svchost.exe 90 PID 3232 wrote to memory of 3000 3232 svchost.exe 90 PID 3232 wrote to memory of 4352 3232 svchost.exe 94 PID 3232 wrote to memory of 4352 3232 svchost.exe 94 PID 3232 wrote to memory of 4352 3232 svchost.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\d2aefc636b6db18278187345fb5bf1e898c2edae0d0edb35cb4e736ac434ad7a.exe"C:\Users\Admin\AppData\Local\Temp\d2aefc636b6db18278187345fb5bf1e898c2edae0d0edb35cb4e736ac434ad7a.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1300 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4012 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5076 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3232 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2512
-
-
C:\Windows\SysWOW64\at.exeat 04:26 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:1364
-
-
C:\Windows\SysWOW64\at.exeat 04:27 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:3000
-
-
C:\Windows\SysWOW64\at.exeat 04:28 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:4352
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66KB
MD5770f70bd83d9edf145d5eb4a85cacefd
SHA162b103b3e7c8b6b6baed284f16b5ce8bc6f46c97
SHA256d4cd43ebe7588f5fd6dffe9da3f729a04a3f71c96fb7c807417939637da03a2f
SHA512e2bb25628817dcbdd6fe7a33d8b1a0f5ac046b9ae8bf5493cb23834c3e3d1594d2d48dbe0449b92dd2f2f3cc1a09143a29b77107fabe61dd3b47c7c7f5124c3e
-
Filesize
66KB
MD5b1ca700ff7bf83c4ebf78fb8ff6b45bf
SHA1c3b742ffee1a411cd5718473851c8c205b71aa51
SHA256d3b9154273cceeb3c6ee2435948de0ef9d0818eb2fabd8706e75e623e33f9aed
SHA51233f95ff815bd421770c87ff10711441ebae9cbd694f817042151a633011f4d9f81c21f068e0b6f01678a44d01f08b8164c6b8b5cc070b6bc7059cddc69e90946
-
Filesize
66KB
MD5dcd9ce9bb6ccee604e85fcdfba3d4759
SHA12b2af21dddfdb01c875d6e7434afe723c71a31b0
SHA25618cabd59c9a2a3e25356935e538c3c0b22aefca4910eef8fbfefa8fa8cc3b67a
SHA51227d910d21ce6e33e8acf148b22dcf0dab2d94ca3f3e8929258e8b83c04dbe850ba40dec31425346995ec254570aaeee9c29c917eda81a1e394c040559fc0c738
-
Filesize
66KB
MD55c11f3c5f86d39360e0281ec1d8bd911
SHA1273ddd0e85ec508c12a0d86f573050ebb2ecab0a
SHA256272c434fdebdd9d35671e222fd2ac5cb7946bb54ec8adf33d21edb19562cfa43
SHA51299a527b0af9d9c3ba22d8ecbb18b5069c9e8036e65333887cf43659fadbcf87119b23400a092fb6f4c3234c829c6ef665eb6d2ee12358dbf7bb2ad60564c9505