Analysis
-
max time kernel
150s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
29-05-2024 01:27
Static task
static1
Behavioral task
behavioral1
Sample
b6138581b11f392e2e3bfb0a7e3677a9a94540240504738b2213cc1d61f03c1d.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
b6138581b11f392e2e3bfb0a7e3677a9a94540240504738b2213cc1d61f03c1d.exe
Resource
win10v2004-20240508-en
General
-
Target
b6138581b11f392e2e3bfb0a7e3677a9a94540240504738b2213cc1d61f03c1d.exe
-
Size
66KB
-
MD5
6435f34e6f9444ad3cfbfac52afa0779
-
SHA1
93c130fcfeb99ee78fc2d7c60c230fd70d983de8
-
SHA256
b6138581b11f392e2e3bfb0a7e3677a9a94540240504738b2213cc1d61f03c1d
-
SHA512
fa3f23a5734b08dc721ee523e603a314c15b5eb9ac7601dfac1e3984b17b8f2c1c656c3e33a7edc370b5f24399b82b64b51de428d79f7b58ae7c0f0f7fc027e9
-
SSDEEP
1536:EHfetdklPp+07gDSrB8Xru2zGeJxgawTzpXzrDJrXiTZZZZZZZZZZZZZZZZZZZZG:IeklMMYJhqezw/pXzH9ii
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 2656 explorer.exe 3668 spoolsv.exe 3100 svchost.exe 1592 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification \??\c:\windows\system\explorer.exe b6138581b11f392e2e3bfb0a7e3677a9a94540240504738b2213cc1d61f03c1d.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe svchost.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1520 b6138581b11f392e2e3bfb0a7e3677a9a94540240504738b2213cc1d61f03c1d.exe 1520 b6138581b11f392e2e3bfb0a7e3677a9a94540240504738b2213cc1d61f03c1d.exe 2656 explorer.exe 2656 explorer.exe 2656 explorer.exe 2656 explorer.exe 2656 explorer.exe 2656 explorer.exe 3100 svchost.exe 3100 svchost.exe 3100 svchost.exe 3100 svchost.exe 2656 explorer.exe 2656 explorer.exe 3100 svchost.exe 3100 svchost.exe 2656 explorer.exe 2656 explorer.exe 3100 svchost.exe 3100 svchost.exe 2656 explorer.exe 2656 explorer.exe 3100 svchost.exe 3100 svchost.exe 2656 explorer.exe 2656 explorer.exe 3100 svchost.exe 3100 svchost.exe 2656 explorer.exe 2656 explorer.exe 3100 svchost.exe 3100 svchost.exe 2656 explorer.exe 2656 explorer.exe 3100 svchost.exe 3100 svchost.exe 2656 explorer.exe 2656 explorer.exe 3100 svchost.exe 3100 svchost.exe 2656 explorer.exe 2656 explorer.exe 3100 svchost.exe 3100 svchost.exe 2656 explorer.exe 2656 explorer.exe 3100 svchost.exe 3100 svchost.exe 2656 explorer.exe 2656 explorer.exe 3100 svchost.exe 3100 svchost.exe 2656 explorer.exe 2656 explorer.exe 3100 svchost.exe 3100 svchost.exe 2656 explorer.exe 2656 explorer.exe 3100 svchost.exe 3100 svchost.exe 2656 explorer.exe 2656 explorer.exe 3100 svchost.exe 3100 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2656 explorer.exe 3100 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1520 b6138581b11f392e2e3bfb0a7e3677a9a94540240504738b2213cc1d61f03c1d.exe 1520 b6138581b11f392e2e3bfb0a7e3677a9a94540240504738b2213cc1d61f03c1d.exe 2656 explorer.exe 2656 explorer.exe 3668 spoolsv.exe 3668 spoolsv.exe 3100 svchost.exe 3100 svchost.exe 1592 spoolsv.exe 1592 spoolsv.exe 2656 explorer.exe 2656 explorer.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1520 wrote to memory of 2656 1520 b6138581b11f392e2e3bfb0a7e3677a9a94540240504738b2213cc1d61f03c1d.exe 85 PID 1520 wrote to memory of 2656 1520 b6138581b11f392e2e3bfb0a7e3677a9a94540240504738b2213cc1d61f03c1d.exe 85 PID 1520 wrote to memory of 2656 1520 b6138581b11f392e2e3bfb0a7e3677a9a94540240504738b2213cc1d61f03c1d.exe 85 PID 2656 wrote to memory of 3668 2656 explorer.exe 86 PID 2656 wrote to memory of 3668 2656 explorer.exe 86 PID 2656 wrote to memory of 3668 2656 explorer.exe 86 PID 3668 wrote to memory of 3100 3668 spoolsv.exe 87 PID 3668 wrote to memory of 3100 3668 spoolsv.exe 87 PID 3668 wrote to memory of 3100 3668 spoolsv.exe 87 PID 3100 wrote to memory of 1592 3100 svchost.exe 88 PID 3100 wrote to memory of 1592 3100 svchost.exe 88 PID 3100 wrote to memory of 1592 3100 svchost.exe 88 PID 3100 wrote to memory of 3996 3100 svchost.exe 89 PID 3100 wrote to memory of 3996 3100 svchost.exe 89 PID 3100 wrote to memory of 3996 3100 svchost.exe 89 PID 3100 wrote to memory of 4360 3100 svchost.exe 105 PID 3100 wrote to memory of 4360 3100 svchost.exe 105 PID 3100 wrote to memory of 4360 3100 svchost.exe 105 PID 3100 wrote to memory of 3036 3100 svchost.exe 114 PID 3100 wrote to memory of 3036 3100 svchost.exe 114 PID 3100 wrote to memory of 3036 3100 svchost.exe 114
Processes
-
C:\Users\Admin\AppData\Local\Temp\b6138581b11f392e2e3bfb0a7e3677a9a94540240504738b2213cc1d61f03c1d.exe"C:\Users\Admin\AppData\Local\Temp\b6138581b11f392e2e3bfb0a7e3677a9a94540240504738b2213cc1d61f03c1d.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1520 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2656 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3668 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3100 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1592
-
-
C:\Windows\SysWOW64\at.exeat 01:30 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:3996
-
-
C:\Windows\SysWOW64\at.exeat 01:31 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:4360
-
-
C:\Windows\SysWOW64\at.exeat 01:32 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:3036
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66KB
MD57a696f85687f6b1c1e84bf39fb234c75
SHA1c266f8d522a27f7f230ce594e3c39f6771ea4ad4
SHA256f4edb5e7120b47e67f0eaf245bb2506edc07d71eef6dd5a32468cac14aced73d
SHA5120b5d1b198a43dd1988d0db62ce3b8f0a62ff51b35db35a480aec58e42f288a43158ee029e4329cf429bf21c54b2e53cf7292fe08ecdd86be5c7de84f0aac734f
-
Filesize
66KB
MD550f5d575601ec065c684f2d4b6242a1a
SHA1a412691e4ee90bd0b22a4ddc56bb8d4cc8e9899f
SHA2562521f397ca752259ac83202ab7c4285879ac444604ff4b3fa747283c6a05ede2
SHA512599503024b5173c58dfe8156d151b796c68d771c67dcfbf862ddc72c42e827fae5911f5bdb8a686bd69f5232b3b535ac9b9084fd4e0cde87d9c9c12121874fd3
-
Filesize
66KB
MD5bbe63c6858888a104c13d2c41f700295
SHA19069b2f1a42ef4f41b3ac86b69e4615578c50374
SHA25638738f172e6ee603398e71efb1b910cdd694766f1ddbfe8e02f9a1297841b545
SHA51256fdf31058b9f6b33c3dddd281b0df591a4461bd1368b97c58ec441ba8508b63928b20aed1c9eeca17f2f19ec963254ee016d93bb08c37cf8ecb7c5f4000213f
-
Filesize
66KB
MD54c76d9144b135e60c392c1ed28322386
SHA1c5f9edb425bda58785413d71e99267d35cc7622b
SHA256537ce0cd6b8bb4b0e1f7f0492c9343dd16be46df2ec65b6257c02d9d9cd1a298
SHA512b2351fd2496b6ed7a8455065ee43a83dc2de63bb654de59402fabdfe899c667265c05a84ea037f4a46bb946c173d9640a5ef46eede9d5391563b02ffc893c394