Analysis

  • max time kernel
    150s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    24-05-2024 02:26

General

  • Target

    b93739acaed9d2f6a48c9ab2239165c8e4741ec4b6de6643ba1efca12bec7d64.exe

  • Size

    69KB

  • MD5

    bfc41158ac74fc66b1b45ed13ee045b8

  • SHA1

    e3ac999666e4137f284b34589afb28658ed9ab4f

  • SHA256

    b93739acaed9d2f6a48c9ab2239165c8e4741ec4b6de6643ba1efca12bec7d64

  • SHA512

    b520cf7cbe230e963441d456a6854a46f5726d7cc2fdeeefadaf164cb377dcbbf273965ddb3a38c8eda257115f2558a2a5a601e42e7527e9e35fd40499b5cc0c

  • SSDEEP

    1536:EJrFDMRyriCY/qXfatMp4Q2V6fIMxIpL3:0F8dCY85TE6fIMSR3

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • UPX dump on OEP (original entry point) 14 IoCs
  • Modifies Installed Components in the registry 2 TTPs 8 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 8 IoCs
  • UPX packed file 14 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b93739acaed9d2f6a48c9ab2239165c8e4741ec4b6de6643ba1efca12bec7d64.exe
    "C:\Users\Admin\AppData\Local\Temp\b93739acaed9d2f6a48c9ab2239165c8e4741ec4b6de6643ba1efca12bec7d64.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1640
    • \??\c:\windows\system\explorer.exe
      c:\windows\system\explorer.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visiblity of hidden/system files in Explorer
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2060
      • \??\c:\windows\system\spoolsv.exe
        c:\windows\system\spoolsv.exe SE
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2716
        • \??\c:\windows\system\svchost.exe
          c:\windows\system\svchost.exe
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visiblity of hidden/system files in Explorer
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2772
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe PR
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:2868
          • C:\Windows\SysWOW64\at.exe
            at 02:28 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
            5⤵
              PID:2564
            • C:\Windows\SysWOW64\at.exe
              at 02:29 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
              5⤵
                PID:1540
              • C:\Windows\SysWOW64\at.exe
                at 02:30 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
                5⤵
                  PID:1468

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\mrsys.exe
          Filesize

          69KB

          MD5

          3a247bc1c69e2e24f7fe2a024baa8f58

          SHA1

          0b6a2064a51fa8088391d6b68a853a7e68209904

          SHA256

          c311c5ce00009c8dbcc8b92c5201b7cac4f995addcaae6b90bb12d7f32b8530d

          SHA512

          aea8dc20972b688c6142598148613202f7dd074e66f50fb9336325ec33964cd65809ced2c50fe34569e3fb81c57321a124281edb0ab1d44cff9449faa9773967

        • \Windows\system\explorer.exe
          Filesize

          69KB

          MD5

          2904896d2fb692efeb95e8b9d4511546

          SHA1

          f73e365e7b25700b11646447c76f516a25b3f720

          SHA256

          273f6b04d2200067e10586afeb3617ad9fbf3fdd4e36e7e18c341cef6ddd0c4c

          SHA512

          fe261fbd3dcb38ae3b94c5dc720b0a9c6aa4942058bf291ff84c964677ba01470773e89e02af00b8c56a8ad1640bcaaf2d534afe1fcf43d300d7ec554d82a56e

        • \Windows\system\spoolsv.exe
          Filesize

          70KB

          MD5

          e23659edcd7f0a7dbbf0e47bc9734515

          SHA1

          402cc2cb2cea5e913522852c9e72b7bbdc9ec055

          SHA256

          1d07cc559fd4b17d7fe53aa67a70bebb7a82b543b7240554dcd003e1343c7a42

          SHA512

          8d68b2711dd4572a28a89f627037f08c6ce9be25b7aa60bb9856bb58d137d0e75d7e22b9cb27e0e03161cbdd2a4fe747d52130e3945610e3254862408564cc48

        • \Windows\system\svchost.exe
          Filesize

          69KB

          MD5

          5fefb534d1b340c10fd62d087f9bfae6

          SHA1

          d2621f25375a9e4d226f9f842e27948b221c7dbc

          SHA256

          aa3ffb88526fa80db097f560698d4191ed03d111d9e2df69a93e000fe37f6728

          SHA512

          1609ff359b1cae262dc2aaeaa5c64f812fc0db396528520aa0005206b5d71f142ea6f3ad40005436c4991c8a8f812f8cfedd25af05237663f64adff06b2e365a

        • memory/1640-12-0x00000000025E0000-0x0000000002614000-memory.dmp
          Filesize

          208KB

        • memory/1640-13-0x00000000025E0000-0x0000000002614000-memory.dmp
          Filesize

          208KB

        • memory/1640-0-0x0000000000400000-0x0000000000434000-memory.dmp
          Filesize

          208KB

        • memory/1640-63-0x0000000000400000-0x0000000000434000-memory.dmp
          Filesize

          208KB

        • memory/2060-15-0x0000000000400000-0x0000000000434000-memory.dmp
          Filesize

          208KB

        • memory/2060-30-0x0000000002720000-0x0000000002754000-memory.dmp
          Filesize

          208KB

        • memory/2060-29-0x0000000002720000-0x0000000002754000-memory.dmp
          Filesize

          208KB

        • memory/2060-65-0x0000000000400000-0x0000000000434000-memory.dmp
          Filesize

          208KB

        • memory/2060-75-0x0000000000400000-0x0000000000434000-memory.dmp
          Filesize

          208KB

        • memory/2716-44-0x0000000001EF0000-0x0000000001F24000-memory.dmp
          Filesize

          208KB

        • memory/2716-61-0x0000000000400000-0x0000000000434000-memory.dmp
          Filesize

          208KB

        • memory/2772-66-0x0000000000400000-0x0000000000434000-memory.dmp
          Filesize

          208KB

        • memory/2868-53-0x0000000000400000-0x0000000000434000-memory.dmp
          Filesize

          208KB

        • memory/2868-57-0x0000000000400000-0x0000000000434000-memory.dmp
          Filesize

          208KB