Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
29/05/2024, 03:15
Static task
static1
Behavioral task
behavioral1
Sample
df20327ae5c846b3dfc1d99bb1d617cc02a32b78d193487c07a1a6ab6f4916ab.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
df20327ae5c846b3dfc1d99bb1d617cc02a32b78d193487c07a1a6ab6f4916ab.exe
Resource
win10v2004-20240426-en
General
-
Target
df20327ae5c846b3dfc1d99bb1d617cc02a32b78d193487c07a1a6ab6f4916ab.exe
-
Size
66KB
-
MD5
9a605ca94d4c380c4e3065e3d7d9888c
-
SHA1
f799c08750e479f56f67b33f56b9a8d3c9199e84
-
SHA256
df20327ae5c846b3dfc1d99bb1d617cc02a32b78d193487c07a1a6ab6f4916ab
-
SHA512
e28863d8125a262ff6bc47caa6c4e7dd30d07b27236c4e67a1ef37a9f52050ab87b689740e51e7fcf9d42ab7dc7c075dd7076437bb7c6938f3e29f728cea1c2d
-
SSDEEP
1536:EHfetdklPp+07gDSrB8Xru2zGeJxgawTzpXzrDJrXiF:IeklMMYJhqezw/pXzH9iF
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 4956 explorer.exe 2052 spoolsv.exe 2240 svchost.exe 3528 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe svchost.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe df20327ae5c846b3dfc1d99bb1d617cc02a32b78d193487c07a1a6ab6f4916ab.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2316 df20327ae5c846b3dfc1d99bb1d617cc02a32b78d193487c07a1a6ab6f4916ab.exe 2316 df20327ae5c846b3dfc1d99bb1d617cc02a32b78d193487c07a1a6ab6f4916ab.exe 4956 explorer.exe 4956 explorer.exe 4956 explorer.exe 4956 explorer.exe 4956 explorer.exe 4956 explorer.exe 2240 svchost.exe 2240 svchost.exe 2240 svchost.exe 2240 svchost.exe 4956 explorer.exe 4956 explorer.exe 2240 svchost.exe 2240 svchost.exe 4956 explorer.exe 4956 explorer.exe 2240 svchost.exe 2240 svchost.exe 4956 explorer.exe 4956 explorer.exe 2240 svchost.exe 2240 svchost.exe 4956 explorer.exe 4956 explorer.exe 2240 svchost.exe 2240 svchost.exe 4956 explorer.exe 4956 explorer.exe 2240 svchost.exe 2240 svchost.exe 4956 explorer.exe 4956 explorer.exe 2240 svchost.exe 2240 svchost.exe 4956 explorer.exe 4956 explorer.exe 2240 svchost.exe 2240 svchost.exe 4956 explorer.exe 4956 explorer.exe 2240 svchost.exe 2240 svchost.exe 4956 explorer.exe 4956 explorer.exe 2240 svchost.exe 2240 svchost.exe 4956 explorer.exe 4956 explorer.exe 2240 svchost.exe 2240 svchost.exe 4956 explorer.exe 4956 explorer.exe 2240 svchost.exe 2240 svchost.exe 4956 explorer.exe 4956 explorer.exe 2240 svchost.exe 2240 svchost.exe 4956 explorer.exe 4956 explorer.exe 2240 svchost.exe 2240 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 4956 explorer.exe 2240 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2316 df20327ae5c846b3dfc1d99bb1d617cc02a32b78d193487c07a1a6ab6f4916ab.exe 2316 df20327ae5c846b3dfc1d99bb1d617cc02a32b78d193487c07a1a6ab6f4916ab.exe 4956 explorer.exe 4956 explorer.exe 2052 spoolsv.exe 2052 spoolsv.exe 2240 svchost.exe 2240 svchost.exe 3528 spoolsv.exe 3528 spoolsv.exe 4956 explorer.exe 4956 explorer.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2316 wrote to memory of 4956 2316 df20327ae5c846b3dfc1d99bb1d617cc02a32b78d193487c07a1a6ab6f4916ab.exe 82 PID 2316 wrote to memory of 4956 2316 df20327ae5c846b3dfc1d99bb1d617cc02a32b78d193487c07a1a6ab6f4916ab.exe 82 PID 2316 wrote to memory of 4956 2316 df20327ae5c846b3dfc1d99bb1d617cc02a32b78d193487c07a1a6ab6f4916ab.exe 82 PID 4956 wrote to memory of 2052 4956 explorer.exe 83 PID 4956 wrote to memory of 2052 4956 explorer.exe 83 PID 4956 wrote to memory of 2052 4956 explorer.exe 83 PID 2052 wrote to memory of 2240 2052 spoolsv.exe 84 PID 2052 wrote to memory of 2240 2052 spoolsv.exe 84 PID 2052 wrote to memory of 2240 2052 spoolsv.exe 84 PID 2240 wrote to memory of 3528 2240 svchost.exe 85 PID 2240 wrote to memory of 3528 2240 svchost.exe 85 PID 2240 wrote to memory of 3528 2240 svchost.exe 85 PID 2240 wrote to memory of 1328 2240 svchost.exe 87 PID 2240 wrote to memory of 1328 2240 svchost.exe 87 PID 2240 wrote to memory of 1328 2240 svchost.exe 87 PID 2240 wrote to memory of 4724 2240 svchost.exe 99 PID 2240 wrote to memory of 4724 2240 svchost.exe 99 PID 2240 wrote to memory of 4724 2240 svchost.exe 99 PID 2240 wrote to memory of 5116 2240 svchost.exe 101 PID 2240 wrote to memory of 5116 2240 svchost.exe 101 PID 2240 wrote to memory of 5116 2240 svchost.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\df20327ae5c846b3dfc1d99bb1d617cc02a32b78d193487c07a1a6ab6f4916ab.exe"C:\Users\Admin\AppData\Local\Temp\df20327ae5c846b3dfc1d99bb1d617cc02a32b78d193487c07a1a6ab6f4916ab.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2316 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4956 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2052 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2240 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3528
-
-
C:\Windows\SysWOW64\at.exeat 03:17 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:1328
-
-
C:\Windows\SysWOW64\at.exeat 03:18 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:4724
-
-
C:\Windows\SysWOW64\at.exeat 03:19 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:5116
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66KB
MD53a33c74fc9cc95b5f69704278556a3d0
SHA1855d414cdb8e8f9db4d0d82548bfad93b353a286
SHA2561da538b287a5bd9ff191d55be0cc3c41205c6ed5047e35cd3089ccf11728985d
SHA5125b8ae2f23d43d2d0169180ef9e1b25d90bd9526a216917a6711f64d5bd3b9c0b5337184e6a7db11f4ab18f394a64bcda4e40a68df9437647ce733225389cc832
-
Filesize
66KB
MD56fe24795c6fdb98a4a72dc9a3ec98c01
SHA1baf1f3dbed1a82918ed71e11106aa9317b7a412c
SHA256bc76d0f308103102ac9687c73e8256862e6ed6fbc9f970cb25d885c89f640331
SHA51223c46fb77d8782e706d56b585f013d5ec2f6346aa866c25cd49969f2f03d1a57a788b5cdc8c5a8ce03d3ac44df1657968c28a612dcba314ce3b6ada0eaa37a22
-
Filesize
66KB
MD5d9d0c6946bd5be2e5e1c14b579358f50
SHA105005635ab0625cfee478b21808e747c66c3cbd0
SHA256f66ac0d85939bf46008b1c25be452b57f23649532813d1ac9ccd70bfa46586ca
SHA512b4fd7820de73934f8360858130d22463ba943394234e1df9892691ff9c120962a643abaf070c08a3c4a59f1b4558bd4453f5059036e848b7a96b494d42667b5c
-
Filesize
66KB
MD534374ab5836c715922062bec2e341e6a
SHA1f2eadbd00de7980594fd3edac62bdc7981b94254
SHA2569e859c37ac69142a8ca58751f642b4df2bdc73991889331121b99ead1b631d46
SHA512eccecf3db3f5edf8766730ca61acef0bc3b6f0e98a10459e895080850f266d4a3b4568c8d7fbf282a286cef48670a1908943411bcc7b81c8596bf93f612e4844