Analysis
-
max time kernel
150s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 02:10
Static task
static1
Behavioral task
behavioral1
Sample
7506ecba0c8dcd4496f7f336808e98706fb7b0b4bbe156b4c7ce9dc4efa392f7.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
7506ecba0c8dcd4496f7f336808e98706fb7b0b4bbe156b4c7ce9dc4efa392f7.exe
Resource
win10v2004-20240508-en
General
-
Target
7506ecba0c8dcd4496f7f336808e98706fb7b0b4bbe156b4c7ce9dc4efa392f7.exe
-
Size
211KB
-
MD5
114f4aaaca4e97325d1c8ccc63e783c0
-
SHA1
f8a8e8a94ae052486d3a862ad9d96b12594bd15b
-
SHA256
7506ecba0c8dcd4496f7f336808e98706fb7b0b4bbe156b4c7ce9dc4efa392f7
-
SHA512
1bbf431826b10f355c994d6e87746ef5de148d4e00a3d6589b5e292afe883b8b5103bc601dbe9e509ae8405f71a24ca1e59d4c4c2b238cb90897726b0f34c12e
-
SSDEEP
3072:JD6Xtx68yygRBE52mxkEOHLRMpZ4deth8PEAjAfIbAYGPhz6sPJBInxZqOd:Jh8cBzHLRMpZ4d1Zd
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
Processes:
swchost.exeuserinit.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\userinit.exe" swchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\userinit.exe" userinit.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
Processes:
userinit.exeswchost.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" userinit.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" swchost.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
Processes:
swchost.exeuserinit.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} swchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Local\\mrsys.exe MR" swchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} swchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} userinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Local\\mrsys.exe MR" userinit.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} swchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Local\\mrsys.exe MR" swchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} swchost.exe -
Executes dropped EXE 4 IoCs
Processes:
userinit.exespoolsw.exeswchost.exespoolsw.exepid process 5020 userinit.exe 3048 spoolsw.exe 2492 swchost.exe 1948 spoolsw.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
userinit.exeswchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\userinit = "c:\\windows\\userinit.exe RO" userinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Swchost = "c:\\windows\\swchost.exe RO" userinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\userinit = "c:\\windows\\userinit.exe RO" swchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Swchost = "c:\\windows\\swchost.exe RO" swchost.exe -
Drops file in System32 directory 1 IoCs
Processes:
userinit.exedescription ioc process File opened for modification C:\Windows\SysWOW64\system\udsys.exe userinit.exe -
Drops file in Windows directory 5 IoCs
Processes:
7506ecba0c8dcd4496f7f336808e98706fb7b0b4bbe156b4c7ce9dc4efa392f7.exeuserinit.exespoolsw.exeswchost.exedescription ioc process File opened for modification \??\c:\windows\userinit.exe 7506ecba0c8dcd4496f7f336808e98706fb7b0b4bbe156b4c7ce9dc4efa392f7.exe File opened for modification \??\c:\windows\spoolsw.exe userinit.exe File opened for modification \??\c:\windows\swchost.exe spoolsw.exe File opened for modification \??\c:\windows\userinit.exe userinit.exe File opened for modification \??\c:\windows\swchost.exe swchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
7506ecba0c8dcd4496f7f336808e98706fb7b0b4bbe156b4c7ce9dc4efa392f7.exeuserinit.exeswchost.exepid process 4724 7506ecba0c8dcd4496f7f336808e98706fb7b0b4bbe156b4c7ce9dc4efa392f7.exe 4724 7506ecba0c8dcd4496f7f336808e98706fb7b0b4bbe156b4c7ce9dc4efa392f7.exe 5020 userinit.exe 5020 userinit.exe 5020 userinit.exe 5020 userinit.exe 5020 userinit.exe 5020 userinit.exe 2492 swchost.exe 2492 swchost.exe 2492 swchost.exe 2492 swchost.exe 5020 userinit.exe 5020 userinit.exe 2492 swchost.exe 2492 swchost.exe 5020 userinit.exe 5020 userinit.exe 2492 swchost.exe 2492 swchost.exe 5020 userinit.exe 5020 userinit.exe 2492 swchost.exe 2492 swchost.exe 5020 userinit.exe 5020 userinit.exe 2492 swchost.exe 2492 swchost.exe 5020 userinit.exe 5020 userinit.exe 2492 swchost.exe 2492 swchost.exe 5020 userinit.exe 5020 userinit.exe 2492 swchost.exe 2492 swchost.exe 5020 userinit.exe 5020 userinit.exe 2492 swchost.exe 2492 swchost.exe 5020 userinit.exe 5020 userinit.exe 2492 swchost.exe 2492 swchost.exe 5020 userinit.exe 5020 userinit.exe 2492 swchost.exe 2492 swchost.exe 5020 userinit.exe 5020 userinit.exe 2492 swchost.exe 2492 swchost.exe 5020 userinit.exe 5020 userinit.exe 2492 swchost.exe 2492 swchost.exe 5020 userinit.exe 5020 userinit.exe 2492 swchost.exe 2492 swchost.exe 5020 userinit.exe 5020 userinit.exe 2492 swchost.exe 2492 swchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
userinit.exeswchost.exepid process 5020 userinit.exe 2492 swchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
Processes:
7506ecba0c8dcd4496f7f336808e98706fb7b0b4bbe156b4c7ce9dc4efa392f7.exeuserinit.exespoolsw.exeswchost.exespoolsw.exepid process 4724 7506ecba0c8dcd4496f7f336808e98706fb7b0b4bbe156b4c7ce9dc4efa392f7.exe 4724 7506ecba0c8dcd4496f7f336808e98706fb7b0b4bbe156b4c7ce9dc4efa392f7.exe 5020 userinit.exe 5020 userinit.exe 3048 spoolsw.exe 3048 spoolsw.exe 2492 swchost.exe 2492 swchost.exe 1948 spoolsw.exe 1948 spoolsw.exe 5020 userinit.exe 5020 userinit.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
7506ecba0c8dcd4496f7f336808e98706fb7b0b4bbe156b4c7ce9dc4efa392f7.exeuserinit.exespoolsw.exeswchost.exedescription pid process target process PID 4724 wrote to memory of 5020 4724 7506ecba0c8dcd4496f7f336808e98706fb7b0b4bbe156b4c7ce9dc4efa392f7.exe userinit.exe PID 4724 wrote to memory of 5020 4724 7506ecba0c8dcd4496f7f336808e98706fb7b0b4bbe156b4c7ce9dc4efa392f7.exe userinit.exe PID 4724 wrote to memory of 5020 4724 7506ecba0c8dcd4496f7f336808e98706fb7b0b4bbe156b4c7ce9dc4efa392f7.exe userinit.exe PID 5020 wrote to memory of 3048 5020 userinit.exe spoolsw.exe PID 5020 wrote to memory of 3048 5020 userinit.exe spoolsw.exe PID 5020 wrote to memory of 3048 5020 userinit.exe spoolsw.exe PID 3048 wrote to memory of 2492 3048 spoolsw.exe swchost.exe PID 3048 wrote to memory of 2492 3048 spoolsw.exe swchost.exe PID 3048 wrote to memory of 2492 3048 spoolsw.exe swchost.exe PID 2492 wrote to memory of 1948 2492 swchost.exe spoolsw.exe PID 2492 wrote to memory of 1948 2492 swchost.exe spoolsw.exe PID 2492 wrote to memory of 1948 2492 swchost.exe spoolsw.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7506ecba0c8dcd4496f7f336808e98706fb7b0b4bbe156b4c7ce9dc4efa392f7.exe"C:\Users\Admin\AppData\Local\Temp\7506ecba0c8dcd4496f7f336808e98706fb7b0b4bbe156b4c7ce9dc4efa392f7.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
\??\c:\windows\userinit.exec:\windows\userinit.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
\??\c:\windows\spoolsw.exec:\windows\spoolsw.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
\??\c:\windows\swchost.exec:\windows\swchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
\??\c:\windows\spoolsw.exec:\windows\spoolsw.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\mrsys.exeFilesize
211KB
MD5efaeb334b14444043de87d39f474b9a8
SHA1568cc080d1c128ba312aac8530f9dd4a61a6c516
SHA256e334bb4b7b4ed202a086d594fa51d772f6d03570b9831b816d8f33cbf95a3565
SHA5123fcfba009be66d096047fa8e5e687800809dbf4fc97b2b2d98b5c02ef5d264c7e9aefa64c543a7ea5aa3c7a25de30a406ef7036b522ae889a722c877d91c85f7
-
C:\Windows\spoolsw.exeFilesize
211KB
MD566f9dc357adb725498ac2632785711d0
SHA1e4b8779e8e968093b723ccdb05b4af0866298c3b
SHA256e931ce70485fc3e130f921985bc43e87747353f7a9c8740ef995f2be51d482e3
SHA512e0ffab6e08b1eb04565bed6714650ffab51bbab5f1dbb66cb0c7a22c8618ed0a9de9489c80eb9406dcbdf44c61b027bb4e1081c94342cb580d3fe9d84775dee2
-
C:\Windows\swchost.exeFilesize
211KB
MD5768d7b47284d131d742549baa0e99a57
SHA16ebf5f21444fb800e1f7c4c4444bf491c29b72a7
SHA256a7ea49f536cd2661ac0137c8b3fb8bbdb2d5e02c7b5916d5292b98cde42d3f3f
SHA51242d07763d94c67fe3c5889d11e87cbf790284bdabf5f2677d18718a6aace28d32cf763a3ad6e2ccf9fcfcf2eb9afc487c2dad5ea65564b9f0265fcdb73f3c941
-
C:\Windows\userinit.exeFilesize
211KB
MD5fdd84df6597075368c572ce1d2d658e9
SHA152e93e0cfa5d0b08ff46fa3e68d610bb722c53be
SHA256ffa0273ad4b5a7025699183dadf4e2a86698b9cd59dc6a177df65af5b5f609b3
SHA5123d51b474fe5236bca05fff0a57468d5e6d5eb8bc39e0184e5b9cf9c094ae045f14f14562115efaaba890e61265bd06d31fd3d0bc7c1c4a5c1dd81687b5ba7e48