Analysis

  • max time kernel
    150s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/05/2024, 20:35

General

  • Target

    3c325ef1d3dc67640d0adab5c879d592d2ba27c178817bc1b656fa8645695a30.exe

  • Size

    65KB

  • MD5

    ca3803799e2756c25418d591cd8ee1f3

  • SHA1

    4f573f5eaec79200c67dcffbe356810fd1e019ab

  • SHA256

    3c325ef1d3dc67640d0adab5c879d592d2ba27c178817bc1b656fa8645695a30

  • SHA512

    767328e4e27188e4c22d82210f22dc959f5ecedabe60c61d44896440d03d17f3ca2e59b6e88777a24d7e023762f1d850f3a1d8092e88b87a35fa5b36cb249e17

  • SSDEEP

    1536:ECq3yRuqrI01eArdW/O7JnI2e13XiLij40MkTUVqa/Ouw:7WNqkOJWmo1HpM0MkTUmuw

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Modifies Installed Components in the registry 2 TTPs 8 IoCs
  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3c325ef1d3dc67640d0adab5c879d592d2ba27c178817bc1b656fa8645695a30.exe
    "C:\Users\Admin\AppData\Local\Temp\3c325ef1d3dc67640d0adab5c879d592d2ba27c178817bc1b656fa8645695a30.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1272
    • \??\c:\windows\system\explorer.exe
      c:\windows\system\explorer.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visiblity of hidden/system files in Explorer
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3788
      • \??\c:\windows\system\spoolsv.exe
        c:\windows\system\spoolsv.exe SE
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3920
        • \??\c:\windows\system\svchost.exe
          c:\windows\system\svchost.exe
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visiblity of hidden/system files in Explorer
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1732
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe PR
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:1436
          • C:\Windows\SysWOW64\at.exe
            at 20:38 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
            5⤵
              PID:1988
            • C:\Windows\SysWOW64\at.exe
              at 20:39 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
              5⤵
                PID:4120
              • C:\Windows\SysWOW64\at.exe
                at 20:40 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
                5⤵
                  PID:2612

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\mrsys.exe

          Filesize

          65KB

          MD5

          bf13e5ada1207bb13e1eb53eb8b990c5

          SHA1

          766a1c47aaa4adf47728d33a74bfe2fc8c90b2f9

          SHA256

          ccac8131c84eab8abee6ee75f6503be92fd4a67730675938536fa6daf9417630

          SHA512

          a73daac19b518df5e42603bae51caa0f340f4e0b294b1718183e5f4a7bd9b84f5b5acf3e147c272b1c5d35600005f209449cdef8df11d6246066e691b8ee58fd

        • C:\Windows\System\spoolsv.exe

          Filesize

          65KB

          MD5

          3d7f5d1af7d50ee82e1e20131c9dce70

          SHA1

          a4b5642d1f74fc2c099d1b39e93c4919226c0734

          SHA256

          ebc19bbb3e364592279f2334dffff6b159ec4c1ba6bafc0bc29c7cf7a870abf2

          SHA512

          effac6b7d6750d752750ea5bed38b8a3686d859de6ebd009b654a817903bea5aedc69c68fe65fb9cbf6c185b8024ce50dcb632113dcae51ff6b2ed544b807f66

        • C:\Windows\System\svchost.exe

          Filesize

          65KB

          MD5

          155b761e51877501795a0b319033ca1c

          SHA1

          432ee22656a77c52a501e717a1721fc565ad5aeb

          SHA256

          f0aa30d0c6ea45b79bf4c1c21dcee4ca07c920fb713a4f1b3ca9499f4420a49c

          SHA512

          7de83b3fba8f31382b19bbea60c31867eb0031a67ca1645913b6fdc6dac8e06e761d46ab7666bfa7d474ccb46c364b83cc5379d5cced0383f00a0dbdfd86f5b4

        • \??\c:\windows\system\explorer.exe

          Filesize

          65KB

          MD5

          5fd2f0b99ffcb8137e592761ce7e0b69

          SHA1

          842cd42dc8e690d0e94063e769ab7feb335760dc

          SHA256

          b1af5f30e3d44da755617d5a35e2e9ddbab53503e05fc235d77a581967ee6f01

          SHA512

          474eb016890ccedd30af182b081c304e95d187bc3287860597812d34f3f68218950c804d0ca7c37159c1a9fd4295d9ae87d2db8f8ab1741e7eea22aaf667847d

        • memory/1272-4-0x0000000000401000-0x000000000042E000-memory.dmp

          Filesize

          180KB

        • memory/1272-0-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/1272-57-0x0000000000401000-0x000000000042E000-memory.dmp

          Filesize

          180KB

        • memory/1272-3-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/1272-2-0x0000000075A70000-0x0000000075BCD000-memory.dmp

          Filesize

          1.4MB

        • memory/1272-56-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/1272-1-0x00000000001C0000-0x00000000001C4000-memory.dmp

          Filesize

          16KB

        • memory/1436-44-0x0000000075A70000-0x0000000075BCD000-memory.dmp

          Filesize

          1.4MB

        • memory/1436-50-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/1732-61-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/1732-36-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/1732-37-0x0000000075A70000-0x0000000075BCD000-memory.dmp

          Filesize

          1.4MB

        • memory/1732-41-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/3788-13-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/3788-59-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/3788-17-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/3788-70-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/3788-14-0x0000000075A70000-0x0000000075BCD000-memory.dmp

          Filesize

          1.4MB

        • memory/3920-54-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/3920-29-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/3920-25-0x0000000075A70000-0x0000000075BCD000-memory.dmp

          Filesize

          1.4MB