Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 02:30
Behavioral task
behavioral1
Sample
bd88cf8c700d7064f3738f7349dab2224b9ff4eae69bd2459f35d19c4cf78063.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bd88cf8c700d7064f3738f7349dab2224b9ff4eae69bd2459f35d19c4cf78063.exe
Resource
win10v2004-20240508-en
General
-
Target
bd88cf8c700d7064f3738f7349dab2224b9ff4eae69bd2459f35d19c4cf78063.exe
-
Size
69KB
-
MD5
f56f004d5b096f4907fa0197eab2d21f
-
SHA1
34ce1851628e4d38e2d9439440fe73e1ff98ee4a
-
SHA256
bd88cf8c700d7064f3738f7349dab2224b9ff4eae69bd2459f35d19c4cf78063
-
SHA512
fcd0b3b0409762cecc2602113b227b67b34ab81ae45e992b877594ff8631736fa5db730d8c0f8a37d409ae17b96008323245d46dac1f498839f528260b603ed7
-
SSDEEP
1536:EJrFDMRyriCY/qXfatMp4Q2V6fIMxIpL9:0F8dCY85TE6fIMSR9
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
Processes:
explorer.exesvchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
Processes:
explorer.exesvchost.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
UPX dump on OEP (original entry point) 14 IoCs
Processes:
resource yara_rule behavioral2/memory/5092-0-0x0000000000400000-0x0000000000434000-memory.dmp UPX \??\c:\windows\system\explorer.exe UPX behavioral2/memory/3584-9-0x0000000000400000-0x0000000000434000-memory.dmp UPX C:\Windows\System\spoolsv.exe UPX behavioral2/memory/3956-19-0x0000000000400000-0x0000000000434000-memory.dmp UPX C:\Windows\System\svchost.exe UPX behavioral2/memory/3372-27-0x0000000000400000-0x0000000000434000-memory.dmp UPX behavioral2/memory/4856-38-0x0000000000400000-0x0000000000434000-memory.dmp UPX behavioral2/memory/3956-40-0x0000000000400000-0x0000000000434000-memory.dmp UPX behavioral2/memory/5092-42-0x0000000000400000-0x0000000000434000-memory.dmp UPX C:\Users\Admin\AppData\Roaming\mrsys.exe UPX behavioral2/memory/3584-44-0x0000000000400000-0x0000000000434000-memory.dmp UPX behavioral2/memory/3372-45-0x0000000000400000-0x0000000000434000-memory.dmp UPX behavioral2/memory/3584-54-0x0000000000400000-0x0000000000434000-memory.dmp UPX -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
Processes:
svchost.exeexplorer.exedescription ioc process Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe -
Executes dropped EXE 4 IoCs
Processes:
explorer.exespoolsv.exesvchost.exespoolsv.exepid process 3584 explorer.exe 3956 spoolsv.exe 3372 svchost.exe 4856 spoolsv.exe -
Processes:
resource yara_rule behavioral2/memory/5092-0-0x0000000000400000-0x0000000000434000-memory.dmp upx \??\c:\windows\system\explorer.exe upx behavioral2/memory/3584-9-0x0000000000400000-0x0000000000434000-memory.dmp upx C:\Windows\System\spoolsv.exe upx behavioral2/memory/3956-19-0x0000000000400000-0x0000000000434000-memory.dmp upx C:\Windows\System\svchost.exe upx behavioral2/memory/3372-27-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral2/memory/4856-38-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral2/memory/3956-40-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral2/memory/5092-42-0x0000000000400000-0x0000000000434000-memory.dmp upx C:\Users\Admin\AppData\Roaming\mrsys.exe upx behavioral2/memory/3584-44-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral2/memory/3372-45-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral2/memory/3584-54-0x0000000000400000-0x0000000000434000-memory.dmp upx -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
explorer.exesvchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe -
Drops file in Windows directory 6 IoCs
Processes:
explorer.exespoolsv.exesvchost.exebd88cf8c700d7064f3738f7349dab2224b9ff4eae69bd2459f35d19c4cf78063.exedescription ioc process File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe svchost.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe bd88cf8c700d7064f3738f7349dab2224b9ff4eae69bd2459f35d19c4cf78063.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
bd88cf8c700d7064f3738f7349dab2224b9ff4eae69bd2459f35d19c4cf78063.exeexplorer.exesvchost.exepid process 5092 bd88cf8c700d7064f3738f7349dab2224b9ff4eae69bd2459f35d19c4cf78063.exe 5092 bd88cf8c700d7064f3738f7349dab2224b9ff4eae69bd2459f35d19c4cf78063.exe 3584 explorer.exe 3584 explorer.exe 3584 explorer.exe 3584 explorer.exe 3584 explorer.exe 3584 explorer.exe 3372 svchost.exe 3372 svchost.exe 3372 svchost.exe 3372 svchost.exe 3584 explorer.exe 3584 explorer.exe 3372 svchost.exe 3372 svchost.exe 3584 explorer.exe 3584 explorer.exe 3372 svchost.exe 3372 svchost.exe 3584 explorer.exe 3584 explorer.exe 3372 svchost.exe 3372 svchost.exe 3584 explorer.exe 3584 explorer.exe 3372 svchost.exe 3372 svchost.exe 3584 explorer.exe 3584 explorer.exe 3372 svchost.exe 3372 svchost.exe 3584 explorer.exe 3584 explorer.exe 3372 svchost.exe 3372 svchost.exe 3584 explorer.exe 3584 explorer.exe 3372 svchost.exe 3372 svchost.exe 3584 explorer.exe 3584 explorer.exe 3372 svchost.exe 3372 svchost.exe 3584 explorer.exe 3584 explorer.exe 3372 svchost.exe 3372 svchost.exe 3584 explorer.exe 3584 explorer.exe 3372 svchost.exe 3372 svchost.exe 3584 explorer.exe 3584 explorer.exe 3372 svchost.exe 3372 svchost.exe 3584 explorer.exe 3584 explorer.exe 3372 svchost.exe 3372 svchost.exe 3584 explorer.exe 3584 explorer.exe 3372 svchost.exe 3372 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
explorer.exesvchost.exepid process 3584 explorer.exe 3372 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
Processes:
bd88cf8c700d7064f3738f7349dab2224b9ff4eae69bd2459f35d19c4cf78063.exeexplorer.exespoolsv.exesvchost.exespoolsv.exepid process 5092 bd88cf8c700d7064f3738f7349dab2224b9ff4eae69bd2459f35d19c4cf78063.exe 5092 bd88cf8c700d7064f3738f7349dab2224b9ff4eae69bd2459f35d19c4cf78063.exe 3584 explorer.exe 3584 explorer.exe 3956 spoolsv.exe 3956 spoolsv.exe 3372 svchost.exe 3372 svchost.exe 4856 spoolsv.exe 4856 spoolsv.exe 3584 explorer.exe 3584 explorer.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
bd88cf8c700d7064f3738f7349dab2224b9ff4eae69bd2459f35d19c4cf78063.exeexplorer.exespoolsv.exesvchost.exedescription pid process target process PID 5092 wrote to memory of 3584 5092 bd88cf8c700d7064f3738f7349dab2224b9ff4eae69bd2459f35d19c4cf78063.exe explorer.exe PID 5092 wrote to memory of 3584 5092 bd88cf8c700d7064f3738f7349dab2224b9ff4eae69bd2459f35d19c4cf78063.exe explorer.exe PID 5092 wrote to memory of 3584 5092 bd88cf8c700d7064f3738f7349dab2224b9ff4eae69bd2459f35d19c4cf78063.exe explorer.exe PID 3584 wrote to memory of 3956 3584 explorer.exe spoolsv.exe PID 3584 wrote to memory of 3956 3584 explorer.exe spoolsv.exe PID 3584 wrote to memory of 3956 3584 explorer.exe spoolsv.exe PID 3956 wrote to memory of 3372 3956 spoolsv.exe svchost.exe PID 3956 wrote to memory of 3372 3956 spoolsv.exe svchost.exe PID 3956 wrote to memory of 3372 3956 spoolsv.exe svchost.exe PID 3372 wrote to memory of 4856 3372 svchost.exe spoolsv.exe PID 3372 wrote to memory of 4856 3372 svchost.exe spoolsv.exe PID 3372 wrote to memory of 4856 3372 svchost.exe spoolsv.exe PID 3372 wrote to memory of 4256 3372 svchost.exe at.exe PID 3372 wrote to memory of 4256 3372 svchost.exe at.exe PID 3372 wrote to memory of 4256 3372 svchost.exe at.exe PID 3372 wrote to memory of 2440 3372 svchost.exe at.exe PID 3372 wrote to memory of 2440 3372 svchost.exe at.exe PID 3372 wrote to memory of 2440 3372 svchost.exe at.exe PID 3372 wrote to memory of 2824 3372 svchost.exe at.exe PID 3372 wrote to memory of 2824 3372 svchost.exe at.exe PID 3372 wrote to memory of 2824 3372 svchost.exe at.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bd88cf8c700d7064f3738f7349dab2224b9ff4eae69bd2459f35d19c4cf78063.exe"C:\Users\Admin\AppData\Local\Temp\bd88cf8c700d7064f3738f7349dab2224b9ff4eae69bd2459f35d19c4cf78063.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5092 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3584 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3956 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3372 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4856
-
-
C:\Windows\SysWOW64\at.exeat 02:32 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:4256
-
-
C:\Windows\SysWOW64\at.exeat 02:33 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:2440
-
-
C:\Windows\SysWOW64\at.exeat 02:34 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:2824
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
69KB
MD5d512b5d71e18ac720b6f182dc4eb8241
SHA1e03928a28ce5c63c9ea93cfad569fbf67c79832d
SHA2566548e37ccf210dbf29db1c69dd8d092733d96a24458f0db8d8e2817760e676b5
SHA5124e3ea67c745739cd45137d748f6aa39cd2af8dc1f3d9fe91f163926c5c49e7d0ef8016d0a527ef72b59232fd9ad39a2111b28aaa177e1817c9d2f74b25022af7
-
Filesize
69KB
MD57e7bc7193d4eeb6d647b7e8c2ab7ad5f
SHA177cad881f021f6794aaa9266728374d72f8cd978
SHA256ee767bb5535be852756cd82421405b4d4e87ec1a8318e1584b86adc9226e12dc
SHA5124f57175083af6d2d4edea21917ff6a0b84d505cf0d46cac5ceaaf333dd110f5b5ecb5fb1bef022650271bec8b49730e524ddbe9c05217314cce5a647577ed4ed
-
Filesize
70KB
MD51cf022bff7aab52b63f2d8a3008663f6
SHA141744025456ad82f812990c3c37ca0d72f740228
SHA25634135c4763859ed64d5bd6f4c45fe6f0041dcbd62a22f620f9ae0860c29b9e8d
SHA512ff1cf1c3896492c4de9ec58b93235297f773c49106b467fb87ee5360173a7a8d6f9f849d881dad2ef40ebb041e73ff8397171fd1334e21259a6324724605cdc3
-
Filesize
69KB
MD571847ae43f305532170c1c9e9f1c4d94
SHA1c2128bce4eddfaa7200320e3ab5b2fba219cfa25
SHA2569133f18400d3021116a28bae314739cd7b2688a82b0eb849637045bd69d47ccc
SHA512b152886b634f20d5cad1d5eed3118b3fe6d68ea77572e54af199143d672ad050f42f3358465eae46283727f93c871df4b338d89dbc7f89a8e23fce9259c7b916