Analysis
-
max time kernel
146s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29/05/2024, 03:15
Static task
static1
Behavioral task
behavioral1
Sample
df20327ae5c846b3dfc1d99bb1d617cc02a32b78d193487c07a1a6ab6f4916ab.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
df20327ae5c846b3dfc1d99bb1d617cc02a32b78d193487c07a1a6ab6f4916ab.exe
Resource
win10v2004-20240426-en
General
-
Target
df20327ae5c846b3dfc1d99bb1d617cc02a32b78d193487c07a1a6ab6f4916ab.exe
-
Size
66KB
-
MD5
9a605ca94d4c380c4e3065e3d7d9888c
-
SHA1
f799c08750e479f56f67b33f56b9a8d3c9199e84
-
SHA256
df20327ae5c846b3dfc1d99bb1d617cc02a32b78d193487c07a1a6ab6f4916ab
-
SHA512
e28863d8125a262ff6bc47caa6c4e7dd30d07b27236c4e67a1ef37a9f52050ab87b689740e51e7fcf9d42ab7dc7c075dd7076437bb7c6938f3e29f728cea1c2d
-
SSDEEP
1536:EHfetdklPp+07gDSrB8Xru2zGeJxgawTzpXzrDJrXiF:IeklMMYJhqezw/pXzH9iF
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 2540 explorer.exe 2620 spoolsv.exe 2608 svchost.exe 2844 spoolsv.exe -
Loads dropped DLL 8 IoCs
pid Process 2656 df20327ae5c846b3dfc1d99bb1d617cc02a32b78d193487c07a1a6ab6f4916ab.exe 2656 df20327ae5c846b3dfc1d99bb1d617cc02a32b78d193487c07a1a6ab6f4916ab.exe 2540 explorer.exe 2540 explorer.exe 2620 spoolsv.exe 2620 spoolsv.exe 2608 svchost.exe 2608 svchost.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification \??\c:\windows\system\explorer.exe df20327ae5c846b3dfc1d99bb1d617cc02a32b78d193487c07a1a6ab6f4916ab.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe svchost.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2656 df20327ae5c846b3dfc1d99bb1d617cc02a32b78d193487c07a1a6ab6f4916ab.exe 2540 explorer.exe 2540 explorer.exe 2540 explorer.exe 2540 explorer.exe 2540 explorer.exe 2608 svchost.exe 2608 svchost.exe 2540 explorer.exe 2608 svchost.exe 2540 explorer.exe 2608 svchost.exe 2540 explorer.exe 2608 svchost.exe 2540 explorer.exe 2608 svchost.exe 2540 explorer.exe 2608 svchost.exe 2540 explorer.exe 2608 svchost.exe 2540 explorer.exe 2608 svchost.exe 2540 explorer.exe 2608 svchost.exe 2540 explorer.exe 2608 svchost.exe 2540 explorer.exe 2608 svchost.exe 2540 explorer.exe 2608 svchost.exe 2540 explorer.exe 2608 svchost.exe 2540 explorer.exe 2608 svchost.exe 2540 explorer.exe 2608 svchost.exe 2540 explorer.exe 2608 svchost.exe 2540 explorer.exe 2608 svchost.exe 2540 explorer.exe 2608 svchost.exe 2540 explorer.exe 2608 svchost.exe 2540 explorer.exe 2608 svchost.exe 2540 explorer.exe 2608 svchost.exe 2540 explorer.exe 2608 svchost.exe 2540 explorer.exe 2608 svchost.exe 2540 explorer.exe 2608 svchost.exe 2540 explorer.exe 2608 svchost.exe 2540 explorer.exe 2608 svchost.exe 2540 explorer.exe 2608 svchost.exe 2540 explorer.exe 2608 svchost.exe 2540 explorer.exe 2608 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2540 explorer.exe 2608 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2656 df20327ae5c846b3dfc1d99bb1d617cc02a32b78d193487c07a1a6ab6f4916ab.exe 2656 df20327ae5c846b3dfc1d99bb1d617cc02a32b78d193487c07a1a6ab6f4916ab.exe 2540 explorer.exe 2540 explorer.exe 2620 spoolsv.exe 2620 spoolsv.exe 2608 svchost.exe 2608 svchost.exe 2844 spoolsv.exe 2844 spoolsv.exe 2540 explorer.exe 2540 explorer.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2656 wrote to memory of 2540 2656 df20327ae5c846b3dfc1d99bb1d617cc02a32b78d193487c07a1a6ab6f4916ab.exe 28 PID 2656 wrote to memory of 2540 2656 df20327ae5c846b3dfc1d99bb1d617cc02a32b78d193487c07a1a6ab6f4916ab.exe 28 PID 2656 wrote to memory of 2540 2656 df20327ae5c846b3dfc1d99bb1d617cc02a32b78d193487c07a1a6ab6f4916ab.exe 28 PID 2656 wrote to memory of 2540 2656 df20327ae5c846b3dfc1d99bb1d617cc02a32b78d193487c07a1a6ab6f4916ab.exe 28 PID 2540 wrote to memory of 2620 2540 explorer.exe 29 PID 2540 wrote to memory of 2620 2540 explorer.exe 29 PID 2540 wrote to memory of 2620 2540 explorer.exe 29 PID 2540 wrote to memory of 2620 2540 explorer.exe 29 PID 2620 wrote to memory of 2608 2620 spoolsv.exe 30 PID 2620 wrote to memory of 2608 2620 spoolsv.exe 30 PID 2620 wrote to memory of 2608 2620 spoolsv.exe 30 PID 2620 wrote to memory of 2608 2620 spoolsv.exe 30 PID 2608 wrote to memory of 2844 2608 svchost.exe 31 PID 2608 wrote to memory of 2844 2608 svchost.exe 31 PID 2608 wrote to memory of 2844 2608 svchost.exe 31 PID 2608 wrote to memory of 2844 2608 svchost.exe 31 PID 2608 wrote to memory of 596 2608 svchost.exe 32 PID 2608 wrote to memory of 596 2608 svchost.exe 32 PID 2608 wrote to memory of 596 2608 svchost.exe 32 PID 2608 wrote to memory of 596 2608 svchost.exe 32 PID 2608 wrote to memory of 1620 2608 svchost.exe 36 PID 2608 wrote to memory of 1620 2608 svchost.exe 36 PID 2608 wrote to memory of 1620 2608 svchost.exe 36 PID 2608 wrote to memory of 1620 2608 svchost.exe 36 PID 2608 wrote to memory of 3016 2608 svchost.exe 38 PID 2608 wrote to memory of 3016 2608 svchost.exe 38 PID 2608 wrote to memory of 3016 2608 svchost.exe 38 PID 2608 wrote to memory of 3016 2608 svchost.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\df20327ae5c846b3dfc1d99bb1d617cc02a32b78d193487c07a1a6ab6f4916ab.exe"C:\Users\Admin\AppData\Local\Temp\df20327ae5c846b3dfc1d99bb1d617cc02a32b78d193487c07a1a6ab6f4916ab.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2656 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2540 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2620 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2608 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2844
-
-
C:\Windows\SysWOW64\at.exeat 03:18 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:596
-
-
C:\Windows\SysWOW64\at.exeat 03:19 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:1620
-
-
C:\Windows\SysWOW64\at.exeat 03:20 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:3016
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66KB
MD5e917cc3473dd1272f961e61357f539cd
SHA140ca4a6e58d26487c91bbc2021661d3e9a8ed682
SHA25641555d2271c39213af94ee7851014a06280282c5a35f67f218d79794ce67e70b
SHA5127e88a6e4da2fcc9b31c625fd728a2cf4609634c67b5de03d97058215a2f4b967450b3b4f30b3127998553bfd21750f1de52594eab2330d2a94a6aac9f32fb6b5
-
Filesize
66KB
MD57e3147cfe1587244af1b0f549ce9ad92
SHA1e27457bc5f9f26b2c74e47dffad20cf992ea69c9
SHA25635afc924851bd553a9ba07355289f56936e9f77f8d0b285d185ceaecf519f52a
SHA5124b6b3f42034ef8bb4f341ee0107a8b72a7d249b3645b83a59e086fa94f676c8ce69f2eccdd8f1d13d025a242760b5b8730471e1535da504479895c127981d87d
-
Filesize
66KB
MD51d7e7cc38d604c09bda02fb61020fc38
SHA191e052bc80b50b163a6ee8d4689a12bea30c5bca
SHA256dbde9395283eeebe940ce3a34669c8640d98c00706ec258b3f7715c73f3f8b0f
SHA5120b578e34b471342c5b9002bb35851fdf9b278cec19371bea761c716a3108087f01c3cbd9305714d76b13545443ba0de76cd5a6e530c046ef4ae0c400191cd4ec
-
Filesize
66KB
MD529087d9d845e9bab3e3082a7372143b3
SHA13ba6763e177bb3c4381ece168f0f5d1218a28aae
SHA256d4261422962b8aa92aaae905308a65c5f04c9c06991583dfb42916f064637f54
SHA51240833443926bc04ef4f4fd4a390329a40dcdacd5c429104847a4eae65220b191917c2063dc26f50eea1c1ee20b06d2ea9d437e0d1f2c6a68c73c71d1ce9f227e