Analysis

  • max time kernel
    149s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    22-05-2024 20:53

General

  • Target

    3f8043c9ee50757444607d22f70c94ed3df175add0bd4dbb09239a44e1583c8c.exe

  • Size

    2.6MB

  • MD5

    db9d14ae80710f32c9f7e678ebdc0928

  • SHA1

    6cd2aca6b719bd8fd14ab6c7ef040910fa82afa7

  • SHA256

    3f8043c9ee50757444607d22f70c94ed3df175add0bd4dbb09239a44e1583c8c

  • SHA512

    fa06e543a6c9447ece98a9e70dfaceb387cc67edd4f4dffdb66d34f84c532bbdcf908680a45616594c1913710acbd7b970d9b1bb3d42def737f92da1af46cc6e

  • SSDEEP

    49152:cYMum5+mnFOMaJGVAkfqKH64I66ZG4+uXBV4uTvM+v8g2qxL:ZMJrNAkfFI66f/M+v8g2qxL

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Modifies Installed Components in the registry 2 TTPs 8 IoCs
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 11 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 14 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3f8043c9ee50757444607d22f70c94ed3df175add0bd4dbb09239a44e1583c8c.exe
    "C:\Users\Admin\AppData\Local\Temp\3f8043c9ee50757444607d22f70c94ed3df175add0bd4dbb09239a44e1583c8c.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1640
    • \??\c:\users\admin\appdata\local\temp\3f8043c9ee50757444607d22f70c94ed3df175add0bd4dbb09239a44e1583c8c.exe 
      c:\users\admin\appdata\local\temp\3f8043c9ee50757444607d22f70c94ed3df175add0bd4dbb09239a44e1583c8c.exe 
      2⤵
      • Executes dropped EXE
      PID:2752
    • C:\Users\Admin\AppData\Local\icsys.icn.exe
      C:\Users\Admin\AppData\Local\icsys.icn.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2608
      • \??\c:\windows\system\explorer.exe
        c:\windows\system\explorer.exe
        3⤵
        • Modifies WinLogon for persistence
        • Modifies visiblity of hidden/system files in Explorer
        • Modifies Installed Components in the registry
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2688
        • \??\c:\windows\system\spoolsv.exe
          c:\windows\system\spoolsv.exe SE
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in Windows directory
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2716
          • \??\c:\windows\system\svchost.exe
            c:\windows\system\svchost.exe
            5⤵
            • Modifies WinLogon for persistence
            • Modifies visiblity of hidden/system files in Explorer
            • Modifies Installed Components in the registry
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Drops file in Windows directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2324
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe PR
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              PID:2428
            • C:\Windows\SysWOW64\at.exe
              at 20:55 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
              6⤵
                PID:2104
              • C:\Windows\SysWOW64\at.exe
                at 20:56 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
                6⤵
                  PID:2192
                • C:\Windows\SysWOW64\at.exe
                  at 20:57 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
                  6⤵
                    PID:1180

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\mrsys.exe

          Filesize

          206KB

          MD5

          0138ba3aa1650dadb50d1db4e9d01b97

          SHA1

          727b83e3c562fc99f2963a9f2d7baa8dffeb23fe

          SHA256

          f19a2ffe32dfdaf2d77bbfc779f813f9f776e504ad9138cbbeb9c1c0c3334eb3

          SHA512

          a72e42c9dae6a3d36230aa66ba9d5fce1c10cd2ddaf1974a9a6d3b6423760fb73b6937c9938e259b6461ec15903615c6f75ce36862acf91ce40fefb40c2c3906

        • \Users\Admin\AppData\Local\Temp\3f8043c9ee50757444607d22f70c94ed3df175add0bd4dbb09239a44e1583c8c.exe 

          Filesize

          2.4MB

          MD5

          a766188d75e570ea3f9b09fb9d82cb54

          SHA1

          a82705f4f5d1408f7c14d16a9cbe26c509422b29

          SHA256

          07832d5f6344bd4d68376a6ca3c5baabb9cef7166a3752268e73fadffb07ddff

          SHA512

          7a953539885f4061dcd94fa78b0d60877e56b64012d75d7294b643df1a9e1a10418c2f2dd5b26708167624a1782b30501e0307c49dd2224d49deac10bcd75ee5

        • \Users\Admin\AppData\Local\icsys.icn.exe

          Filesize

          206KB

          MD5

          56f9ef984a9c96d5fd455cd172582e7a

          SHA1

          013df3f9528c97f5edd0fa9f0b4f09afb1342aa4

          SHA256

          8b154c68869dbe01ce2480cffa72db9bee844c51eebb349d679e96e045bd59a9

          SHA512

          7e644bab57698381eb91368d07eaf1ea9fce659616bd9a7695e108b14ee66a690ebf704a58e87857217751b44a42389c0494fd71e2e2ca4b39c15fe43e41f8c7

        • \Windows\system\explorer.exe

          Filesize

          206KB

          MD5

          cd6cb3f60aa5e245e5cb2ead8c42128a

          SHA1

          5b76d67de0d91ed2c6353b18dec533cabb8d9f9d

          SHA256

          f5fcce22c878427e0b479cc1fd9e517faec5e355d831acb187e4ad4dca33dda7

          SHA512

          5fe90d12fe181746fb2fa07bc99a08060c70d1fe50927cc8f9a953a0be2571ccba2328fb647c49debb95ac66b880e04508ffea15b66e9fa889701592e7974663

        • \Windows\system\spoolsv.exe

          Filesize

          206KB

          MD5

          2ef429e16e2fb1cb03bff6b5e41acf84

          SHA1

          d485698caa4ffc756fc7b8bfb0cbe3a247bd5feb

          SHA256

          dd499057caa6deba5916ae640c7c2de10547e61633a50d35762238d938fb54e5

          SHA512

          1fff9255030e8dbe987cfa8cef6dde81886d9d88e027fd5c0678eedf7112bbf0c792cc5b65814890a751f9bc94ec1768cd9a44617401e80756d706e62a9839eb

        • \Windows\system\svchost.exe

          Filesize

          206KB

          MD5

          e55ec5185b066ba1b0cd4dbd7f168ef2

          SHA1

          0bb64b6456f59578e493aecd1bfebb6cb86835d4

          SHA256

          d06a54abaf5446b3ed7aed0e3de4aba9b53d521a1c52afe014e598509c234bb9

          SHA512

          a72f23fd14201745da59e6fb0ef840c0bf551898bcc0c9a9d0e697bade37a0bd802db55440ea4f7fc2efb4acc925945b6bc58f97b8d303a581d483b43b5ae045