Analysis
-
max time kernel
150s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
29/05/2024, 20:35
Static task
static1
Behavioral task
behavioral1
Sample
3c325ef1d3dc67640d0adab5c879d592d2ba27c178817bc1b656fa8645695a30.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
3c325ef1d3dc67640d0adab5c879d592d2ba27c178817bc1b656fa8645695a30.exe
Resource
win10v2004-20240426-en
General
-
Target
3c325ef1d3dc67640d0adab5c879d592d2ba27c178817bc1b656fa8645695a30.exe
-
Size
65KB
-
MD5
ca3803799e2756c25418d591cd8ee1f3
-
SHA1
4f573f5eaec79200c67dcffbe356810fd1e019ab
-
SHA256
3c325ef1d3dc67640d0adab5c879d592d2ba27c178817bc1b656fa8645695a30
-
SHA512
767328e4e27188e4c22d82210f22dc959f5ecedabe60c61d44896440d03d17f3ca2e59b6e88777a24d7e023762f1d850f3a1d8092e88b87a35fa5b36cb249e17
-
SSDEEP
1536:ECq3yRuqrI01eArdW/O7JnI2e13XiLij40MkTUVqa/Ouw:7WNqkOJWmo1HpM0MkTUmuw
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe -
Executes dropped EXE 4 IoCs
pid Process 3788 explorer.exe 3920 spoolsv.exe 1732 svchost.exe 1436 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification C:\Windows\system\udsys.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe 3c325ef1d3dc67640d0adab5c879d592d2ba27c178817bc1b656fa8645695a30.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1272 3c325ef1d3dc67640d0adab5c879d592d2ba27c178817bc1b656fa8645695a30.exe 1272 3c325ef1d3dc67640d0adab5c879d592d2ba27c178817bc1b656fa8645695a30.exe 3788 explorer.exe 3788 explorer.exe 3788 explorer.exe 3788 explorer.exe 3788 explorer.exe 3788 explorer.exe 3788 explorer.exe 3788 explorer.exe 3788 explorer.exe 3788 explorer.exe 3788 explorer.exe 3788 explorer.exe 3788 explorer.exe 3788 explorer.exe 3788 explorer.exe 3788 explorer.exe 3788 explorer.exe 3788 explorer.exe 3788 explorer.exe 1732 svchost.exe 3788 explorer.exe 1732 svchost.exe 1732 svchost.exe 1732 svchost.exe 1732 svchost.exe 3788 explorer.exe 1732 svchost.exe 3788 explorer.exe 1732 svchost.exe 3788 explorer.exe 1732 svchost.exe 3788 explorer.exe 1732 svchost.exe 3788 explorer.exe 3788 explorer.exe 1732 svchost.exe 1732 svchost.exe 1732 svchost.exe 3788 explorer.exe 3788 explorer.exe 3788 explorer.exe 1732 svchost.exe 3788 explorer.exe 1732 svchost.exe 3788 explorer.exe 1732 svchost.exe 3788 explorer.exe 1732 svchost.exe 1732 svchost.exe 3788 explorer.exe 1732 svchost.exe 3788 explorer.exe 1732 svchost.exe 3788 explorer.exe 1732 svchost.exe 3788 explorer.exe 3788 explorer.exe 1732 svchost.exe 3788 explorer.exe 1732 svchost.exe 1732 svchost.exe 3788 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 3788 explorer.exe 1732 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1272 3c325ef1d3dc67640d0adab5c879d592d2ba27c178817bc1b656fa8645695a30.exe 1272 3c325ef1d3dc67640d0adab5c879d592d2ba27c178817bc1b656fa8645695a30.exe 3788 explorer.exe 3788 explorer.exe 3920 spoolsv.exe 3920 spoolsv.exe 1732 svchost.exe 1732 svchost.exe 1436 spoolsv.exe 1436 spoolsv.exe 3788 explorer.exe 3788 explorer.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1272 wrote to memory of 3788 1272 3c325ef1d3dc67640d0adab5c879d592d2ba27c178817bc1b656fa8645695a30.exe 84 PID 1272 wrote to memory of 3788 1272 3c325ef1d3dc67640d0adab5c879d592d2ba27c178817bc1b656fa8645695a30.exe 84 PID 1272 wrote to memory of 3788 1272 3c325ef1d3dc67640d0adab5c879d592d2ba27c178817bc1b656fa8645695a30.exe 84 PID 3788 wrote to memory of 3920 3788 explorer.exe 85 PID 3788 wrote to memory of 3920 3788 explorer.exe 85 PID 3788 wrote to memory of 3920 3788 explorer.exe 85 PID 3920 wrote to memory of 1732 3920 spoolsv.exe 87 PID 3920 wrote to memory of 1732 3920 spoolsv.exe 87 PID 3920 wrote to memory of 1732 3920 spoolsv.exe 87 PID 1732 wrote to memory of 1436 1732 svchost.exe 89 PID 1732 wrote to memory of 1436 1732 svchost.exe 89 PID 1732 wrote to memory of 1436 1732 svchost.exe 89 PID 1732 wrote to memory of 1988 1732 svchost.exe 90 PID 1732 wrote to memory of 1988 1732 svchost.exe 90 PID 1732 wrote to memory of 1988 1732 svchost.exe 90 PID 1732 wrote to memory of 4120 1732 svchost.exe 101 PID 1732 wrote to memory of 4120 1732 svchost.exe 101 PID 1732 wrote to memory of 4120 1732 svchost.exe 101 PID 1732 wrote to memory of 2612 1732 svchost.exe 103 PID 1732 wrote to memory of 2612 1732 svchost.exe 103 PID 1732 wrote to memory of 2612 1732 svchost.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\3c325ef1d3dc67640d0adab5c879d592d2ba27c178817bc1b656fa8645695a30.exe"C:\Users\Admin\AppData\Local\Temp\3c325ef1d3dc67640d0adab5c879d592d2ba27c178817bc1b656fa8645695a30.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1272 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3788 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3920 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1732 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1436
-
-
C:\Windows\SysWOW64\at.exeat 20:38 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:1988
-
-
C:\Windows\SysWOW64\at.exeat 20:39 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:4120
-
-
C:\Windows\SysWOW64\at.exeat 20:40 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:2612
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD5bf13e5ada1207bb13e1eb53eb8b990c5
SHA1766a1c47aaa4adf47728d33a74bfe2fc8c90b2f9
SHA256ccac8131c84eab8abee6ee75f6503be92fd4a67730675938536fa6daf9417630
SHA512a73daac19b518df5e42603bae51caa0f340f4e0b294b1718183e5f4a7bd9b84f5b5acf3e147c272b1c5d35600005f209449cdef8df11d6246066e691b8ee58fd
-
Filesize
65KB
MD53d7f5d1af7d50ee82e1e20131c9dce70
SHA1a4b5642d1f74fc2c099d1b39e93c4919226c0734
SHA256ebc19bbb3e364592279f2334dffff6b159ec4c1ba6bafc0bc29c7cf7a870abf2
SHA512effac6b7d6750d752750ea5bed38b8a3686d859de6ebd009b654a817903bea5aedc69c68fe65fb9cbf6c185b8024ce50dcb632113dcae51ff6b2ed544b807f66
-
Filesize
65KB
MD5155b761e51877501795a0b319033ca1c
SHA1432ee22656a77c52a501e717a1721fc565ad5aeb
SHA256f0aa30d0c6ea45b79bf4c1c21dcee4ca07c920fb713a4f1b3ca9499f4420a49c
SHA5127de83b3fba8f31382b19bbea60c31867eb0031a67ca1645913b6fdc6dac8e06e761d46ab7666bfa7d474ccb46c364b83cc5379d5cced0383f00a0dbdfd86f5b4
-
Filesize
65KB
MD55fd2f0b99ffcb8137e592761ce7e0b69
SHA1842cd42dc8e690d0e94063e769ab7feb335760dc
SHA256b1af5f30e3d44da755617d5a35e2e9ddbab53503e05fc235d77a581967ee6f01
SHA512474eb016890ccedd30af182b081c304e95d187bc3287860597812d34f3f68218950c804d0ca7c37159c1a9fd4295d9ae87d2db8f8ab1741e7eea22aaf667847d