Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 02:10
Static task
static1
Behavioral task
behavioral1
Sample
7506ecba0c8dcd4496f7f336808e98706fb7b0b4bbe156b4c7ce9dc4efa392f7.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
7506ecba0c8dcd4496f7f336808e98706fb7b0b4bbe156b4c7ce9dc4efa392f7.exe
Resource
win10v2004-20240508-en
General
-
Target
7506ecba0c8dcd4496f7f336808e98706fb7b0b4bbe156b4c7ce9dc4efa392f7.exe
-
Size
211KB
-
MD5
114f4aaaca4e97325d1c8ccc63e783c0
-
SHA1
f8a8e8a94ae052486d3a862ad9d96b12594bd15b
-
SHA256
7506ecba0c8dcd4496f7f336808e98706fb7b0b4bbe156b4c7ce9dc4efa392f7
-
SHA512
1bbf431826b10f355c994d6e87746ef5de148d4e00a3d6589b5e292afe883b8b5103bc601dbe9e509ae8405f71a24ca1e59d4c4c2b238cb90897726b0f34c12e
-
SSDEEP
3072:JD6Xtx68yygRBE52mxkEOHLRMpZ4deth8PEAjAfIbAYGPhz6sPJBInxZqOd:Jh8cBzHLRMpZ4d1Zd
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
Processes:
userinit.exeswchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\userinit.exe" userinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\userinit.exe" swchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
Processes:
userinit.exeswchost.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" userinit.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" swchost.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
Processes:
swchost.exeuserinit.exedescription ioc process Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} swchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} userinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Local\\mrsys.exe MR" userinit.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} swchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Local\\mrsys.exe MR" swchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} swchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} swchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Local\\mrsys.exe MR" swchost.exe -
Executes dropped EXE 4 IoCs
Processes:
userinit.exespoolsw.exeswchost.exespoolsw.exepid process 2364 userinit.exe 2772 spoolsw.exe 2816 swchost.exe 2608 spoolsw.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
swchost.exeuserinit.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\userinit = "c:\\windows\\userinit.exe RO" swchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Swchost = "c:\\windows\\swchost.exe RO" swchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\userinit = "c:\\windows\\userinit.exe RO" userinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Swchost = "c:\\windows\\swchost.exe RO" userinit.exe -
Drops file in System32 directory 1 IoCs
Processes:
userinit.exedescription ioc process File opened for modification C:\Windows\SysWOW64\system\udsys.exe userinit.exe -
Drops file in Windows directory 5 IoCs
Processes:
userinit.exeswchost.exe7506ecba0c8dcd4496f7f336808e98706fb7b0b4bbe156b4c7ce9dc4efa392f7.exespoolsw.exedescription ioc process File opened for modification \??\c:\windows\userinit.exe userinit.exe File opened for modification \??\c:\windows\swchost.exe swchost.exe File opened for modification \??\c:\windows\userinit.exe 7506ecba0c8dcd4496f7f336808e98706fb7b0b4bbe156b4c7ce9dc4efa392f7.exe File opened for modification \??\c:\windows\spoolsw.exe userinit.exe File opened for modification \??\c:\windows\swchost.exe spoolsw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
7506ecba0c8dcd4496f7f336808e98706fb7b0b4bbe156b4c7ce9dc4efa392f7.exeuserinit.exeswchost.exepid process 2420 7506ecba0c8dcd4496f7f336808e98706fb7b0b4bbe156b4c7ce9dc4efa392f7.exe 2364 userinit.exe 2364 userinit.exe 2364 userinit.exe 2816 swchost.exe 2816 swchost.exe 2364 userinit.exe 2816 swchost.exe 2364 userinit.exe 2816 swchost.exe 2364 userinit.exe 2816 swchost.exe 2364 userinit.exe 2816 swchost.exe 2364 userinit.exe 2816 swchost.exe 2364 userinit.exe 2816 swchost.exe 2364 userinit.exe 2816 swchost.exe 2364 userinit.exe 2816 swchost.exe 2364 userinit.exe 2816 swchost.exe 2364 userinit.exe 2816 swchost.exe 2364 userinit.exe 2816 swchost.exe 2364 userinit.exe 2816 swchost.exe 2364 userinit.exe 2816 swchost.exe 2364 userinit.exe 2816 swchost.exe 2364 userinit.exe 2816 swchost.exe 2364 userinit.exe 2816 swchost.exe 2364 userinit.exe 2816 swchost.exe 2364 userinit.exe 2816 swchost.exe 2364 userinit.exe 2816 swchost.exe 2364 userinit.exe 2816 swchost.exe 2364 userinit.exe 2816 swchost.exe 2364 userinit.exe 2816 swchost.exe 2364 userinit.exe 2816 swchost.exe 2364 userinit.exe 2816 swchost.exe 2364 userinit.exe 2816 swchost.exe 2364 userinit.exe 2816 swchost.exe 2364 userinit.exe 2816 swchost.exe 2364 userinit.exe 2816 swchost.exe 2364 userinit.exe 2816 swchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
userinit.exeswchost.exepid process 2364 userinit.exe 2816 swchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
Processes:
7506ecba0c8dcd4496f7f336808e98706fb7b0b4bbe156b4c7ce9dc4efa392f7.exeuserinit.exespoolsw.exeswchost.exespoolsw.exepid process 2420 7506ecba0c8dcd4496f7f336808e98706fb7b0b4bbe156b4c7ce9dc4efa392f7.exe 2420 7506ecba0c8dcd4496f7f336808e98706fb7b0b4bbe156b4c7ce9dc4efa392f7.exe 2364 userinit.exe 2364 userinit.exe 2772 spoolsw.exe 2772 spoolsw.exe 2816 swchost.exe 2816 swchost.exe 2608 spoolsw.exe 2608 spoolsw.exe 2364 userinit.exe 2364 userinit.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
7506ecba0c8dcd4496f7f336808e98706fb7b0b4bbe156b4c7ce9dc4efa392f7.exeuserinit.exespoolsw.exeswchost.exedescription pid process target process PID 2420 wrote to memory of 2364 2420 7506ecba0c8dcd4496f7f336808e98706fb7b0b4bbe156b4c7ce9dc4efa392f7.exe userinit.exe PID 2420 wrote to memory of 2364 2420 7506ecba0c8dcd4496f7f336808e98706fb7b0b4bbe156b4c7ce9dc4efa392f7.exe userinit.exe PID 2420 wrote to memory of 2364 2420 7506ecba0c8dcd4496f7f336808e98706fb7b0b4bbe156b4c7ce9dc4efa392f7.exe userinit.exe PID 2420 wrote to memory of 2364 2420 7506ecba0c8dcd4496f7f336808e98706fb7b0b4bbe156b4c7ce9dc4efa392f7.exe userinit.exe PID 2364 wrote to memory of 2772 2364 userinit.exe spoolsw.exe PID 2364 wrote to memory of 2772 2364 userinit.exe spoolsw.exe PID 2364 wrote to memory of 2772 2364 userinit.exe spoolsw.exe PID 2364 wrote to memory of 2772 2364 userinit.exe spoolsw.exe PID 2772 wrote to memory of 2816 2772 spoolsw.exe swchost.exe PID 2772 wrote to memory of 2816 2772 spoolsw.exe swchost.exe PID 2772 wrote to memory of 2816 2772 spoolsw.exe swchost.exe PID 2772 wrote to memory of 2816 2772 spoolsw.exe swchost.exe PID 2816 wrote to memory of 2608 2816 swchost.exe spoolsw.exe PID 2816 wrote to memory of 2608 2816 swchost.exe spoolsw.exe PID 2816 wrote to memory of 2608 2816 swchost.exe spoolsw.exe PID 2816 wrote to memory of 2608 2816 swchost.exe spoolsw.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7506ecba0c8dcd4496f7f336808e98706fb7b0b4bbe156b4c7ce9dc4efa392f7.exe"C:\Users\Admin\AppData\Local\Temp\7506ecba0c8dcd4496f7f336808e98706fb7b0b4bbe156b4c7ce9dc4efa392f7.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
\??\c:\windows\userinit.exec:\windows\userinit.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
\??\c:\windows\spoolsw.exec:\windows\spoolsw.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
\??\c:\windows\swchost.exec:\windows\swchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
\??\c:\windows\spoolsw.exec:\windows\spoolsw.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\mrsys.exeFilesize
211KB
MD57dba927831e336339297b8ab7c7ccaba
SHA110315932469ed5454c34572740fc61e1e2286550
SHA2561a60000db2fbcff2812b1910873eaddc8a7b0050788878c1081c718351c86c88
SHA512fbbbe466752f8821cec022f888682ac92ab7b29220c37f3a59804283bb8f49c4486fb407f323e13f1ad884c4f0fd829b90c614654bcef462aba3b0ba0a99bbe5
-
C:\Windows\spoolsw.exeFilesize
211KB
MD50046c031cf70c48577c8bc5f5e0a39e5
SHA1f3bd700e3a2544630c3d8da6c757f7e06c0b7e48
SHA2568af5904da3258f305a4d1b0ef6310035afa8c5785053cb8ee6417a948c0a1591
SHA512f68df9ba9b581ef752d81fa4492b7095a70b2198a1ea8a92f578a19767aa038de9fca4c2248199110e0528612dd212265f9a667faba9753c2088e408469e8832
-
C:\Windows\swchost.exeFilesize
211KB
MD5215cb2f3cb230a4ec88aae88abba84b5
SHA175cce633fff1a15d6c70a2d353fc2fcbb5b4d69b
SHA256fa6a95007e67026bf6d6ed6bb04402d9454b1faebbb9dd06b08b4d597c3ca4a1
SHA512f6c8d6502c97e016037e7456ce99c1dad5cfd0208084b6b6842a8c81b5386accdab382a62b6509e05d8e361fec9bb0d8dffe765ddd932d94196ef7b3f18b97e2
-
C:\Windows\userinit.exeFilesize
211KB
MD59b4816bb994e96b1a4ac3b06ecfa8339
SHA176bd696bc083239359177ee01c3fe58f4030b5ee
SHA256be0446a80d0093a98a8b74d2c5faea415bef70cddef7c1d9ab021f071922eeed
SHA5128c9d780322db4b2b518bae563d0795ff07fd9497423b238cc74a64af4d7358589ff2f6632c21021c7203fe706b26fddc22c8dda53dff11052652634605865bb4