Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
29-05-2024 20:35
Static task
static1
Behavioral task
behavioral1
Sample
3c325ef1d3dc67640d0adab5c879d592d2ba27c178817bc1b656fa8645695a30.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
3c325ef1d3dc67640d0adab5c879d592d2ba27c178817bc1b656fa8645695a30.exe
Resource
win10v2004-20240426-en
General
-
Target
3c325ef1d3dc67640d0adab5c879d592d2ba27c178817bc1b656fa8645695a30.exe
-
Size
65KB
-
MD5
ca3803799e2756c25418d591cd8ee1f3
-
SHA1
4f573f5eaec79200c67dcffbe356810fd1e019ab
-
SHA256
3c325ef1d3dc67640d0adab5c879d592d2ba27c178817bc1b656fa8645695a30
-
SHA512
767328e4e27188e4c22d82210f22dc959f5ecedabe60c61d44896440d03d17f3ca2e59b6e88777a24d7e023762f1d850f3a1d8092e88b87a35fa5b36cb249e17
-
SSDEEP
1536:ECq3yRuqrI01eArdW/O7JnI2e13XiLij40MkTUVqa/Ouw:7WNqkOJWmo1HpM0MkTUmuw
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe -
Executes dropped EXE 4 IoCs
pid Process 1872 explorer.exe 2816 spoolsv.exe 2828 svchost.exe 2560 spoolsv.exe -
Loads dropped DLL 8 IoCs
pid Process 2024 3c325ef1d3dc67640d0adab5c879d592d2ba27c178817bc1b656fa8645695a30.exe 2024 3c325ef1d3dc67640d0adab5c879d592d2ba27c178817bc1b656fa8645695a30.exe 1872 explorer.exe 1872 explorer.exe 2816 spoolsv.exe 2816 spoolsv.exe 2828 svchost.exe 2828 svchost.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification \??\c:\windows\system\explorer.exe 3c325ef1d3dc67640d0adab5c879d592d2ba27c178817bc1b656fa8645695a30.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe svchost.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2024 3c325ef1d3dc67640d0adab5c879d592d2ba27c178817bc1b656fa8645695a30.exe 1872 explorer.exe 1872 explorer.exe 1872 explorer.exe 2828 svchost.exe 2828 svchost.exe 1872 explorer.exe 2828 svchost.exe 1872 explorer.exe 2828 svchost.exe 1872 explorer.exe 2828 svchost.exe 1872 explorer.exe 2828 svchost.exe 1872 explorer.exe 2828 svchost.exe 1872 explorer.exe 2828 svchost.exe 1872 explorer.exe 2828 svchost.exe 1872 explorer.exe 2828 svchost.exe 1872 explorer.exe 2828 svchost.exe 1872 explorer.exe 2828 svchost.exe 1872 explorer.exe 2828 svchost.exe 1872 explorer.exe 2828 svchost.exe 1872 explorer.exe 2828 svchost.exe 1872 explorer.exe 2828 svchost.exe 1872 explorer.exe 2828 svchost.exe 1872 explorer.exe 2828 svchost.exe 1872 explorer.exe 2828 svchost.exe 1872 explorer.exe 2828 svchost.exe 1872 explorer.exe 2828 svchost.exe 1872 explorer.exe 2828 svchost.exe 1872 explorer.exe 2828 svchost.exe 1872 explorer.exe 2828 svchost.exe 1872 explorer.exe 2828 svchost.exe 1872 explorer.exe 2828 svchost.exe 1872 explorer.exe 2828 svchost.exe 1872 explorer.exe 2828 svchost.exe 1872 explorer.exe 2828 svchost.exe 1872 explorer.exe 2828 svchost.exe 1872 explorer.exe 2828 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 1872 explorer.exe 2828 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2024 3c325ef1d3dc67640d0adab5c879d592d2ba27c178817bc1b656fa8645695a30.exe 2024 3c325ef1d3dc67640d0adab5c879d592d2ba27c178817bc1b656fa8645695a30.exe 1872 explorer.exe 1872 explorer.exe 2816 spoolsv.exe 2816 spoolsv.exe 2828 svchost.exe 2828 svchost.exe 2560 spoolsv.exe 2560 spoolsv.exe 1872 explorer.exe 1872 explorer.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2024 wrote to memory of 1872 2024 3c325ef1d3dc67640d0adab5c879d592d2ba27c178817bc1b656fa8645695a30.exe 28 PID 2024 wrote to memory of 1872 2024 3c325ef1d3dc67640d0adab5c879d592d2ba27c178817bc1b656fa8645695a30.exe 28 PID 2024 wrote to memory of 1872 2024 3c325ef1d3dc67640d0adab5c879d592d2ba27c178817bc1b656fa8645695a30.exe 28 PID 2024 wrote to memory of 1872 2024 3c325ef1d3dc67640d0adab5c879d592d2ba27c178817bc1b656fa8645695a30.exe 28 PID 1872 wrote to memory of 2816 1872 explorer.exe 29 PID 1872 wrote to memory of 2816 1872 explorer.exe 29 PID 1872 wrote to memory of 2816 1872 explorer.exe 29 PID 1872 wrote to memory of 2816 1872 explorer.exe 29 PID 2816 wrote to memory of 2828 2816 spoolsv.exe 30 PID 2816 wrote to memory of 2828 2816 spoolsv.exe 30 PID 2816 wrote to memory of 2828 2816 spoolsv.exe 30 PID 2816 wrote to memory of 2828 2816 spoolsv.exe 30 PID 2828 wrote to memory of 2560 2828 svchost.exe 31 PID 2828 wrote to memory of 2560 2828 svchost.exe 31 PID 2828 wrote to memory of 2560 2828 svchost.exe 31 PID 2828 wrote to memory of 2560 2828 svchost.exe 31 PID 2828 wrote to memory of 2136 2828 svchost.exe 32 PID 2828 wrote to memory of 2136 2828 svchost.exe 32 PID 2828 wrote to memory of 2136 2828 svchost.exe 32 PID 2828 wrote to memory of 2136 2828 svchost.exe 32 PID 2828 wrote to memory of 1328 2828 svchost.exe 36 PID 2828 wrote to memory of 1328 2828 svchost.exe 36 PID 2828 wrote to memory of 1328 2828 svchost.exe 36 PID 2828 wrote to memory of 1328 2828 svchost.exe 36 PID 2828 wrote to memory of 2844 2828 svchost.exe 38 PID 2828 wrote to memory of 2844 2828 svchost.exe 38 PID 2828 wrote to memory of 2844 2828 svchost.exe 38 PID 2828 wrote to memory of 2844 2828 svchost.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\3c325ef1d3dc67640d0adab5c879d592d2ba27c178817bc1b656fa8645695a30.exe"C:\Users\Admin\AppData\Local\Temp\3c325ef1d3dc67640d0adab5c879d592d2ba27c178817bc1b656fa8645695a30.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2024 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1872 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2816 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2828 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2560
-
-
C:\Windows\SysWOW64\at.exeat 20:37 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:2136
-
-
C:\Windows\SysWOW64\at.exeat 20:38 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:1328
-
-
C:\Windows\SysWOW64\at.exeat 20:39 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:2844
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD53aa6388e08eb5170bafce8da5406e204
SHA10675f245254311f7af2cd5f5c76cdd9cedb93801
SHA2562b4dc8c1739b4cb8b052b223780aab7ce5d53f894324148018f70c0e31f40be7
SHA512b3db34e3c2666688ef9414ad9111719f868ad23b3233d7796c284bdc5638e16cf8cd702686cc43db048f215d9ca9858a9a34bb232c3dd119e7012a63f440786b
-
Filesize
65KB
MD53ef97e0d294bda7f2b5c39c05c49c950
SHA19224c5124e8d356d8ec60781b947a14ac8282ddb
SHA256c6b8b31f9bfeb8e707ebe2c10d812b8b15448297e3834c68c35dec8ea3b34806
SHA5128cbc631ba12c73ec3641882c29fbe2bdaf76aa4cf960ae4a2d9d6e02a583bb60c7cae15205f664c993c744de2bd5194a649feec76a3bcd430fa21283f0d8d633
-
Filesize
65KB
MD57ee0e27dfa476fd5f0f015d89e365474
SHA10284a80b5423d62f2b484b67869af9b9dd7dfd91
SHA2566ca5fb0f30f02dd0ea73b03e1538761ff2d725f727bb1a51f0b8cb9b7d11f63f
SHA5129eb98f9a767eb2aa4f36bdcc7f7bf9d3bd058ad9ce5a0540cdcd0e53317d1086225cb28522142c030448fdec3b1ebedbe5de09b712a817758df5a009eac7226c
-
Filesize
65KB
MD559eb8fbcde968cf027f6f5f753866c3f
SHA1a38350571e3c89ec42eb53607619a99fd729db9c
SHA2562aab33ff48db328ed91cc5674b28f85db8133d6e0310947fda6f0669f7c1abf3
SHA5123727b8567ca31f96b0fea2b4e5624af9b381d2d4396f194fe8f0bf8360662387786f24e297aeed2f7eaffaee6cab921725b5ae5c27ee9477a54660c39169b8b3