Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 20:53
Static task
static1
Behavioral task
behavioral1
Sample
3f8043c9ee50757444607d22f70c94ed3df175add0bd4dbb09239a44e1583c8c.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
3f8043c9ee50757444607d22f70c94ed3df175add0bd4dbb09239a44e1583c8c.exe
Resource
win10v2004-20240226-en
General
-
Target
3f8043c9ee50757444607d22f70c94ed3df175add0bd4dbb09239a44e1583c8c.exe
-
Size
2.6MB
-
MD5
db9d14ae80710f32c9f7e678ebdc0928
-
SHA1
6cd2aca6b719bd8fd14ab6c7ef040910fa82afa7
-
SHA256
3f8043c9ee50757444607d22f70c94ed3df175add0bd4dbb09239a44e1583c8c
-
SHA512
fa06e543a6c9447ece98a9e70dfaceb387cc67edd4f4dffdb66d34f84c532bbdcf908680a45616594c1913710acbd7b970d9b1bb3d42def737f92da1af46cc6e
-
SSDEEP
49152:cYMum5+mnFOMaJGVAkfqKH64I66ZG4+uXBV4uTvM+v8g2qxL:ZMJrNAkfFI66f/M+v8g2qxL
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
Processes:
explorer.exesvchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
Processes:
explorer.exesvchost.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
Processes:
svchost.exeexplorer.exedescription ioc process Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe -
Executes dropped EXE 6 IoCs
Processes:
3f8043c9ee50757444607d22f70c94ed3df175add0bd4dbb09239a44e1583c8c.exe icsys.icn.exeexplorer.exespoolsv.exesvchost.exespoolsv.exepid process 2752 3f8043c9ee50757444607d22f70c94ed3df175add0bd4dbb09239a44e1583c8c.exe 2608 icsys.icn.exe 2688 explorer.exe 2716 spoolsv.exe 2324 svchost.exe 2428 spoolsv.exe -
Loads dropped DLL 11 IoCs
Processes:
3f8043c9ee50757444607d22f70c94ed3df175add0bd4dbb09239a44e1583c8c.exeicsys.icn.exeexplorer.exespoolsv.exesvchost.exepid process 1640 3f8043c9ee50757444607d22f70c94ed3df175add0bd4dbb09239a44e1583c8c.exe 1640 3f8043c9ee50757444607d22f70c94ed3df175add0bd4dbb09239a44e1583c8c.exe 1640 3f8043c9ee50757444607d22f70c94ed3df175add0bd4dbb09239a44e1583c8c.exe 2608 icsys.icn.exe 2608 icsys.icn.exe 2688 explorer.exe 2688 explorer.exe 2716 spoolsv.exe 2716 spoolsv.exe 2324 svchost.exe 2324 svchost.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
explorer.exesvchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe -
Drops file in Windows directory 6 IoCs
Processes:
spoolsv.exeexplorer.exesvchost.exeicsys.icn.exedescription ioc process File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe svchost.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe icsys.icn.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
icsys.icn.exeexplorer.exesvchost.exepid process 2608 icsys.icn.exe 2688 explorer.exe 2688 explorer.exe 2688 explorer.exe 2324 svchost.exe 2324 svchost.exe 2688 explorer.exe 2324 svchost.exe 2688 explorer.exe 2324 svchost.exe 2688 explorer.exe 2324 svchost.exe 2688 explorer.exe 2324 svchost.exe 2688 explorer.exe 2324 svchost.exe 2688 explorer.exe 2324 svchost.exe 2688 explorer.exe 2324 svchost.exe 2688 explorer.exe 2324 svchost.exe 2688 explorer.exe 2324 svchost.exe 2688 explorer.exe 2324 svchost.exe 2688 explorer.exe 2324 svchost.exe 2688 explorer.exe 2324 svchost.exe 2688 explorer.exe 2324 svchost.exe 2688 explorer.exe 2324 svchost.exe 2688 explorer.exe 2324 svchost.exe 2688 explorer.exe 2324 svchost.exe 2688 explorer.exe 2324 svchost.exe 2688 explorer.exe 2324 svchost.exe 2688 explorer.exe 2324 svchost.exe 2688 explorer.exe 2324 svchost.exe 2688 explorer.exe 2324 svchost.exe 2688 explorer.exe 2324 svchost.exe 2688 explorer.exe 2324 svchost.exe 2688 explorer.exe 2324 svchost.exe 2688 explorer.exe 2324 svchost.exe 2688 explorer.exe 2324 svchost.exe 2688 explorer.exe 2324 svchost.exe 2688 explorer.exe 2324 svchost.exe 2688 explorer.exe 2324 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
explorer.exesvchost.exepid process 2688 explorer.exe 2324 svchost.exe -
Suspicious use of SetWindowsHookEx 14 IoCs
Processes:
3f8043c9ee50757444607d22f70c94ed3df175add0bd4dbb09239a44e1583c8c.exeicsys.icn.exeexplorer.exespoolsv.exesvchost.exespoolsv.exepid process 1640 3f8043c9ee50757444607d22f70c94ed3df175add0bd4dbb09239a44e1583c8c.exe 1640 3f8043c9ee50757444607d22f70c94ed3df175add0bd4dbb09239a44e1583c8c.exe 2608 icsys.icn.exe 2608 icsys.icn.exe 2688 explorer.exe 2688 explorer.exe 2716 spoolsv.exe 2716 spoolsv.exe 2324 svchost.exe 2324 svchost.exe 2428 spoolsv.exe 2428 spoolsv.exe 2688 explorer.exe 2688 explorer.exe -
Suspicious use of WriteProcessMemory 32 IoCs
Processes:
3f8043c9ee50757444607d22f70c94ed3df175add0bd4dbb09239a44e1583c8c.exeicsys.icn.exeexplorer.exespoolsv.exesvchost.exedescription pid process target process PID 1640 wrote to memory of 2608 1640 3f8043c9ee50757444607d22f70c94ed3df175add0bd4dbb09239a44e1583c8c.exe icsys.icn.exe PID 1640 wrote to memory of 2608 1640 3f8043c9ee50757444607d22f70c94ed3df175add0bd4dbb09239a44e1583c8c.exe icsys.icn.exe PID 1640 wrote to memory of 2608 1640 3f8043c9ee50757444607d22f70c94ed3df175add0bd4dbb09239a44e1583c8c.exe icsys.icn.exe PID 1640 wrote to memory of 2608 1640 3f8043c9ee50757444607d22f70c94ed3df175add0bd4dbb09239a44e1583c8c.exe icsys.icn.exe PID 2608 wrote to memory of 2688 2608 icsys.icn.exe explorer.exe PID 2608 wrote to memory of 2688 2608 icsys.icn.exe explorer.exe PID 2608 wrote to memory of 2688 2608 icsys.icn.exe explorer.exe PID 2608 wrote to memory of 2688 2608 icsys.icn.exe explorer.exe PID 2688 wrote to memory of 2716 2688 explorer.exe spoolsv.exe PID 2688 wrote to memory of 2716 2688 explorer.exe spoolsv.exe PID 2688 wrote to memory of 2716 2688 explorer.exe spoolsv.exe PID 2688 wrote to memory of 2716 2688 explorer.exe spoolsv.exe PID 2716 wrote to memory of 2324 2716 spoolsv.exe svchost.exe PID 2716 wrote to memory of 2324 2716 spoolsv.exe svchost.exe PID 2716 wrote to memory of 2324 2716 spoolsv.exe svchost.exe PID 2716 wrote to memory of 2324 2716 spoolsv.exe svchost.exe PID 2324 wrote to memory of 2428 2324 svchost.exe spoolsv.exe PID 2324 wrote to memory of 2428 2324 svchost.exe spoolsv.exe PID 2324 wrote to memory of 2428 2324 svchost.exe spoolsv.exe PID 2324 wrote to memory of 2428 2324 svchost.exe spoolsv.exe PID 2324 wrote to memory of 2104 2324 svchost.exe at.exe PID 2324 wrote to memory of 2104 2324 svchost.exe at.exe PID 2324 wrote to memory of 2104 2324 svchost.exe at.exe PID 2324 wrote to memory of 2104 2324 svchost.exe at.exe PID 2324 wrote to memory of 2192 2324 svchost.exe at.exe PID 2324 wrote to memory of 2192 2324 svchost.exe at.exe PID 2324 wrote to memory of 2192 2324 svchost.exe at.exe PID 2324 wrote to memory of 2192 2324 svchost.exe at.exe PID 2324 wrote to memory of 1180 2324 svchost.exe at.exe PID 2324 wrote to memory of 1180 2324 svchost.exe at.exe PID 2324 wrote to memory of 1180 2324 svchost.exe at.exe PID 2324 wrote to memory of 1180 2324 svchost.exe at.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3f8043c9ee50757444607d22f70c94ed3df175add0bd4dbb09239a44e1583c8c.exe"C:\Users\Admin\AppData\Local\Temp\3f8043c9ee50757444607d22f70c94ed3df175add0bd4dbb09239a44e1583c8c.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1640 -
\??\c:\users\admin\appdata\local\temp\3f8043c9ee50757444607d22f70c94ed3df175add0bd4dbb09239a44e1583c8c.exec:\users\admin\appdata\local\temp\3f8043c9ee50757444607d22f70c94ed3df175add0bd4dbb09239a44e1583c8c.exe2⤵
- Executes dropped EXE
PID:2752
-
-
C:\Users\Admin\AppData\Local\icsys.icn.exeC:\Users\Admin\AppData\Local\icsys.icn.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2608 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe3⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2688 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2716 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe5⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2324 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2428
-
-
C:\Windows\SysWOW64\at.exeat 20:55 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe6⤵PID:2104
-
-
C:\Windows\SysWOW64\at.exeat 20:56 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe6⤵PID:2192
-
-
C:\Windows\SysWOW64\at.exeat 20:57 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe6⤵PID:1180
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
206KB
MD50138ba3aa1650dadb50d1db4e9d01b97
SHA1727b83e3c562fc99f2963a9f2d7baa8dffeb23fe
SHA256f19a2ffe32dfdaf2d77bbfc779f813f9f776e504ad9138cbbeb9c1c0c3334eb3
SHA512a72e42c9dae6a3d36230aa66ba9d5fce1c10cd2ddaf1974a9a6d3b6423760fb73b6937c9938e259b6461ec15903615c6f75ce36862acf91ce40fefb40c2c3906
-
\Users\Admin\AppData\Local\Temp\3f8043c9ee50757444607d22f70c94ed3df175add0bd4dbb09239a44e1583c8c.exe
Filesize2.4MB
MD5a766188d75e570ea3f9b09fb9d82cb54
SHA1a82705f4f5d1408f7c14d16a9cbe26c509422b29
SHA25607832d5f6344bd4d68376a6ca3c5baabb9cef7166a3752268e73fadffb07ddff
SHA5127a953539885f4061dcd94fa78b0d60877e56b64012d75d7294b643df1a9e1a10418c2f2dd5b26708167624a1782b30501e0307c49dd2224d49deac10bcd75ee5
-
Filesize
206KB
MD556f9ef984a9c96d5fd455cd172582e7a
SHA1013df3f9528c97f5edd0fa9f0b4f09afb1342aa4
SHA2568b154c68869dbe01ce2480cffa72db9bee844c51eebb349d679e96e045bd59a9
SHA5127e644bab57698381eb91368d07eaf1ea9fce659616bd9a7695e108b14ee66a690ebf704a58e87857217751b44a42389c0494fd71e2e2ca4b39c15fe43e41f8c7
-
Filesize
206KB
MD5cd6cb3f60aa5e245e5cb2ead8c42128a
SHA15b76d67de0d91ed2c6353b18dec533cabb8d9f9d
SHA256f5fcce22c878427e0b479cc1fd9e517faec5e355d831acb187e4ad4dca33dda7
SHA5125fe90d12fe181746fb2fa07bc99a08060c70d1fe50927cc8f9a953a0be2571ccba2328fb647c49debb95ac66b880e04508ffea15b66e9fa889701592e7974663
-
Filesize
206KB
MD52ef429e16e2fb1cb03bff6b5e41acf84
SHA1d485698caa4ffc756fc7b8bfb0cbe3a247bd5feb
SHA256dd499057caa6deba5916ae640c7c2de10547e61633a50d35762238d938fb54e5
SHA5121fff9255030e8dbe987cfa8cef6dde81886d9d88e027fd5c0678eedf7112bbf0c792cc5b65814890a751f9bc94ec1768cd9a44617401e80756d706e62a9839eb
-
Filesize
206KB
MD5e55ec5185b066ba1b0cd4dbd7f168ef2
SHA10bb64b6456f59578e493aecd1bfebb6cb86835d4
SHA256d06a54abaf5446b3ed7aed0e3de4aba9b53d521a1c52afe014e598509c234bb9
SHA512a72f23fd14201745da59e6fb0ef840c0bf551898bcc0c9a9d0e697bade37a0bd802db55440ea4f7fc2efb4acc925945b6bc58f97b8d303a581d483b43b5ae045