Analysis
-
max time kernel
153s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 20:53
Static task
static1
Behavioral task
behavioral1
Sample
3f8043c9ee50757444607d22f70c94ed3df175add0bd4dbb09239a44e1583c8c.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
3f8043c9ee50757444607d22f70c94ed3df175add0bd4dbb09239a44e1583c8c.exe
Resource
win10v2004-20240226-en
General
-
Target
3f8043c9ee50757444607d22f70c94ed3df175add0bd4dbb09239a44e1583c8c.exe
-
Size
2.6MB
-
MD5
db9d14ae80710f32c9f7e678ebdc0928
-
SHA1
6cd2aca6b719bd8fd14ab6c7ef040910fa82afa7
-
SHA256
3f8043c9ee50757444607d22f70c94ed3df175add0bd4dbb09239a44e1583c8c
-
SHA512
fa06e543a6c9447ece98a9e70dfaceb387cc67edd4f4dffdb66d34f84c532bbdcf908680a45616594c1913710acbd7b970d9b1bb3d42def737f92da1af46cc6e
-
SSDEEP
49152:cYMum5+mnFOMaJGVAkfqKH64I66ZG4+uXBV4uTvM+v8g2qxL:ZMJrNAkfFI66f/M+v8g2qxL
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
Processes:
explorer.exesvchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
Processes:
explorer.exesvchost.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
Processes:
svchost.exeexplorer.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe -
Executes dropped EXE 6 IoCs
Processes:
3f8043c9ee50757444607d22f70c94ed3df175add0bd4dbb09239a44e1583c8c.exe icsys.icn.exeexplorer.exespoolsv.exesvchost.exespoolsv.exepid process 2324 3f8043c9ee50757444607d22f70c94ed3df175add0bd4dbb09239a44e1583c8c.exe 4764 icsys.icn.exe 4524 explorer.exe 2940 spoolsv.exe 2656 svchost.exe 2096 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
explorer.exesvchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe -
Drops file in Windows directory 6 IoCs
Processes:
icsys.icn.exeexplorer.exespoolsv.exesvchost.exedescription ioc process File opened for modification \??\c:\windows\system\explorer.exe icsys.icn.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe svchost.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
icsys.icn.exeexplorer.exesvchost.exepid process 4764 icsys.icn.exe 4764 icsys.icn.exe 4524 explorer.exe 4524 explorer.exe 4524 explorer.exe 4524 explorer.exe 4524 explorer.exe 4524 explorer.exe 4524 explorer.exe 4524 explorer.exe 4524 explorer.exe 4524 explorer.exe 2656 svchost.exe 2656 svchost.exe 2656 svchost.exe 2656 svchost.exe 4524 explorer.exe 4524 explorer.exe 2656 svchost.exe 2656 svchost.exe 4524 explorer.exe 4524 explorer.exe 2656 svchost.exe 2656 svchost.exe 4524 explorer.exe 4524 explorer.exe 2656 svchost.exe 2656 svchost.exe 4524 explorer.exe 4524 explorer.exe 4524 explorer.exe 2656 svchost.exe 4524 explorer.exe 2656 svchost.exe 4524 explorer.exe 2656 svchost.exe 4524 explorer.exe 2656 svchost.exe 4524 explorer.exe 2656 svchost.exe 4524 explorer.exe 2656 svchost.exe 4524 explorer.exe 2656 svchost.exe 2656 svchost.exe 4524 explorer.exe 2656 svchost.exe 4524 explorer.exe 4524 explorer.exe 2656 svchost.exe 4524 explorer.exe 2656 svchost.exe 4524 explorer.exe 2656 svchost.exe 4524 explorer.exe 2656 svchost.exe 4524 explorer.exe 2656 svchost.exe 4524 explorer.exe 4524 explorer.exe 2656 svchost.exe 2656 svchost.exe 4524 explorer.exe 4524 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
explorer.exesvchost.exepid process 4524 explorer.exe 2656 svchost.exe -
Suspicious use of SetWindowsHookEx 14 IoCs
Processes:
3f8043c9ee50757444607d22f70c94ed3df175add0bd4dbb09239a44e1583c8c.exeicsys.icn.exeexplorer.exespoolsv.exesvchost.exespoolsv.exepid process 3152 3f8043c9ee50757444607d22f70c94ed3df175add0bd4dbb09239a44e1583c8c.exe 3152 3f8043c9ee50757444607d22f70c94ed3df175add0bd4dbb09239a44e1583c8c.exe 4764 icsys.icn.exe 4764 icsys.icn.exe 4524 explorer.exe 4524 explorer.exe 2940 spoolsv.exe 2940 spoolsv.exe 2656 svchost.exe 2656 svchost.exe 2096 spoolsv.exe 2096 spoolsv.exe 4524 explorer.exe 4524 explorer.exe -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
3f8043c9ee50757444607d22f70c94ed3df175add0bd4dbb09239a44e1583c8c.exeicsys.icn.exeexplorer.exespoolsv.exesvchost.exedescription pid process target process PID 3152 wrote to memory of 4764 3152 3f8043c9ee50757444607d22f70c94ed3df175add0bd4dbb09239a44e1583c8c.exe icsys.icn.exe PID 3152 wrote to memory of 4764 3152 3f8043c9ee50757444607d22f70c94ed3df175add0bd4dbb09239a44e1583c8c.exe icsys.icn.exe PID 3152 wrote to memory of 4764 3152 3f8043c9ee50757444607d22f70c94ed3df175add0bd4dbb09239a44e1583c8c.exe icsys.icn.exe PID 4764 wrote to memory of 4524 4764 icsys.icn.exe explorer.exe PID 4764 wrote to memory of 4524 4764 icsys.icn.exe explorer.exe PID 4764 wrote to memory of 4524 4764 icsys.icn.exe explorer.exe PID 4524 wrote to memory of 2940 4524 explorer.exe spoolsv.exe PID 4524 wrote to memory of 2940 4524 explorer.exe spoolsv.exe PID 4524 wrote to memory of 2940 4524 explorer.exe spoolsv.exe PID 2940 wrote to memory of 2656 2940 spoolsv.exe svchost.exe PID 2940 wrote to memory of 2656 2940 spoolsv.exe svchost.exe PID 2940 wrote to memory of 2656 2940 spoolsv.exe svchost.exe PID 2656 wrote to memory of 2096 2656 svchost.exe spoolsv.exe PID 2656 wrote to memory of 2096 2656 svchost.exe spoolsv.exe PID 2656 wrote to memory of 2096 2656 svchost.exe spoolsv.exe PID 2656 wrote to memory of 772 2656 svchost.exe at.exe PID 2656 wrote to memory of 772 2656 svchost.exe at.exe PID 2656 wrote to memory of 772 2656 svchost.exe at.exe PID 2656 wrote to memory of 3656 2656 svchost.exe at.exe PID 2656 wrote to memory of 3656 2656 svchost.exe at.exe PID 2656 wrote to memory of 3656 2656 svchost.exe at.exe PID 2656 wrote to memory of 2876 2656 svchost.exe at.exe PID 2656 wrote to memory of 2876 2656 svchost.exe at.exe PID 2656 wrote to memory of 2876 2656 svchost.exe at.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3f8043c9ee50757444607d22f70c94ed3df175add0bd4dbb09239a44e1583c8c.exe"C:\Users\Admin\AppData\Local\Temp\3f8043c9ee50757444607d22f70c94ed3df175add0bd4dbb09239a44e1583c8c.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3152 -
\??\c:\users\admin\appdata\local\temp\3f8043c9ee50757444607d22f70c94ed3df175add0bd4dbb09239a44e1583c8c.exec:\users\admin\appdata\local\temp\3f8043c9ee50757444607d22f70c94ed3df175add0bd4dbb09239a44e1583c8c.exe2⤵
- Executes dropped EXE
PID:2324
-
-
C:\Users\Admin\AppData\Local\icsys.icn.exeC:\Users\Admin\AppData\Local\icsys.icn.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4764 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe3⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4524 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE4⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2940 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe5⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2656 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2096
-
-
C:\Windows\SysWOW64\at.exeat 20:56 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe6⤵PID:772
-
-
C:\Windows\SysWOW64\at.exeat 20:57 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe6⤵PID:3656
-
-
C:\Windows\SysWOW64\at.exeat 20:58 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe6⤵PID:2876
-
-
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1344 --field-trial-handle=2276,i,11674642242468042059,14711253743544118298,262144 --variations-seed-version /prefetch:81⤵PID:3400
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\3f8043c9ee50757444607d22f70c94ed3df175add0bd4dbb09239a44e1583c8c.exe
Filesize2.4MB
MD5a766188d75e570ea3f9b09fb9d82cb54
SHA1a82705f4f5d1408f7c14d16a9cbe26c509422b29
SHA25607832d5f6344bd4d68376a6ca3c5baabb9cef7166a3752268e73fadffb07ddff
SHA5127a953539885f4061dcd94fa78b0d60877e56b64012d75d7294b643df1a9e1a10418c2f2dd5b26708167624a1782b30501e0307c49dd2224d49deac10bcd75ee5
-
Filesize
206KB
MD556f9ef984a9c96d5fd455cd172582e7a
SHA1013df3f9528c97f5edd0fa9f0b4f09afb1342aa4
SHA2568b154c68869dbe01ce2480cffa72db9bee844c51eebb349d679e96e045bd59a9
SHA5127e644bab57698381eb91368d07eaf1ea9fce659616bd9a7695e108b14ee66a690ebf704a58e87857217751b44a42389c0494fd71e2e2ca4b39c15fe43e41f8c7
-
Filesize
206KB
MD5e9afeb7cb5fcd1be4dfc14bf94fb96ed
SHA19e0c068fc02588399e4221900288d4db98e87206
SHA2560ad5f024b5004ff97bf73f91668c91903ca9cdf4be7958da2c8d1abe85939d07
SHA512bff18420f24375fc7bc32eea078d360141abe6171134fc88397daa1542228d042ab6798ac91029b082f16b99f25a808044dee7199a0281b67fe2f719b78c8d73
-
Filesize
206KB
MD5f32209b91852ea3dc08df8ceed70d14c
SHA1a2c31996766296d37232f53412d8ed918623c46b
SHA256cafa37bef6e8f1e9deea9bcdbf055154415c8232ff127c0a168fccd8ade75212
SHA512eff70d8d06815ac3ab7e0984c8397423906497b56837b412e8abb16ee9600709c4adfdbb0786d4f9ab932ac973f7cf576664132062a60b39afde4e7610211e0b
-
Filesize
206KB
MD5fc979a5c5f1fe571f6bed357e8944469
SHA1bdf986b32ec95ca317581f6809a3762cb5be6793
SHA2569cf63ec25e11ed8c8d45b1648d1fad8c4fde5f48029dcd5302ebb2abd8ab1dda
SHA512de3e1ca0cec67ef1e2c4f045461dfaf4e691a09a008167761cb4bff10ff2f130145f8e888292ab3b4cdcfff07afcb06ba95776a29284e6b843888d509da0af58
-
Filesize
206KB
MD500148d4ef56d619d166265c2778a1ffc
SHA115840226609a54988e21784dea3131674834dcea
SHA25602b21708822299e94396a69d6ddf10958f20491ccb2139187143cb442df8b882
SHA512cfb0d6cdddb65755eff41635640f9c7fd4bd0c1c922e5b6bfc4fc2e23bf274150ee849ea621b3cdbb2e5719914ea79f1cb3a40c28793cb72bdf1fea99a21dc12