Analysis
-
max time kernel
150s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
30-05-2024 22:09
Static task
static1
Behavioral task
behavioral1
Sample
59915f9410eca4a1e2b43888387ec215d6e5a7ccb39a58d2ebf4f5ebdf700220.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
59915f9410eca4a1e2b43888387ec215d6e5a7ccb39a58d2ebf4f5ebdf700220.exe
Resource
win10v2004-20240508-en
General
-
Target
59915f9410eca4a1e2b43888387ec215d6e5a7ccb39a58d2ebf4f5ebdf700220.exe
-
Size
66KB
-
MD5
835a29ddcb263bf8e68d6ba1d541c7ab
-
SHA1
3f487df6d59df3e429c79cb65ca750fac39075d0
-
SHA256
59915f9410eca4a1e2b43888387ec215d6e5a7ccb39a58d2ebf4f5ebdf700220
-
SHA512
2f856edcafb95e34f7ddcd90734c02e08894faf01d23bf43947f703b5f5326d825c93ad1f24dfa1e25517fa3db951bb3b795ef754bd4062ab59f235d9b59558c
-
SSDEEP
1536:EHfetdklPp+07gDSrB8Xru2zGeJxgawTzpXzrDJrXiW:IeklMMYJhqezw/pXzH9iW
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 4936 explorer.exe 1112 spoolsv.exe 4460 svchost.exe 1104 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification \??\c:\windows\system\explorer.exe 59915f9410eca4a1e2b43888387ec215d6e5a7ccb39a58d2ebf4f5ebdf700220.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe svchost.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 536 59915f9410eca4a1e2b43888387ec215d6e5a7ccb39a58d2ebf4f5ebdf700220.exe 536 59915f9410eca4a1e2b43888387ec215d6e5a7ccb39a58d2ebf4f5ebdf700220.exe 4936 explorer.exe 4936 explorer.exe 4936 explorer.exe 4936 explorer.exe 4936 explorer.exe 4936 explorer.exe 4460 svchost.exe 4460 svchost.exe 4460 svchost.exe 4460 svchost.exe 4936 explorer.exe 4936 explorer.exe 4460 svchost.exe 4460 svchost.exe 4936 explorer.exe 4936 explorer.exe 4460 svchost.exe 4460 svchost.exe 4936 explorer.exe 4460 svchost.exe 4936 explorer.exe 4460 svchost.exe 4936 explorer.exe 4460 svchost.exe 4936 explorer.exe 4460 svchost.exe 4460 svchost.exe 4936 explorer.exe 4460 svchost.exe 4936 explorer.exe 4936 explorer.exe 4460 svchost.exe 4936 explorer.exe 4460 svchost.exe 4460 svchost.exe 4936 explorer.exe 4460 svchost.exe 4936 explorer.exe 4936 explorer.exe 4460 svchost.exe 4936 explorer.exe 4460 svchost.exe 4936 explorer.exe 4936 explorer.exe 4460 svchost.exe 4460 svchost.exe 4460 svchost.exe 4936 explorer.exe 4936 explorer.exe 4460 svchost.exe 4936 explorer.exe 4460 svchost.exe 4936 explorer.exe 4460 svchost.exe 4460 svchost.exe 4936 explorer.exe 4936 explorer.exe 4460 svchost.exe 4936 explorer.exe 4936 explorer.exe 4460 svchost.exe 4460 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 4936 explorer.exe 4460 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 536 59915f9410eca4a1e2b43888387ec215d6e5a7ccb39a58d2ebf4f5ebdf700220.exe 536 59915f9410eca4a1e2b43888387ec215d6e5a7ccb39a58d2ebf4f5ebdf700220.exe 4936 explorer.exe 4936 explorer.exe 1112 spoolsv.exe 1112 spoolsv.exe 4460 svchost.exe 4460 svchost.exe 1104 spoolsv.exe 1104 spoolsv.exe 4936 explorer.exe 4936 explorer.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 536 wrote to memory of 4936 536 59915f9410eca4a1e2b43888387ec215d6e5a7ccb39a58d2ebf4f5ebdf700220.exe 90 PID 536 wrote to memory of 4936 536 59915f9410eca4a1e2b43888387ec215d6e5a7ccb39a58d2ebf4f5ebdf700220.exe 90 PID 536 wrote to memory of 4936 536 59915f9410eca4a1e2b43888387ec215d6e5a7ccb39a58d2ebf4f5ebdf700220.exe 90 PID 4936 wrote to memory of 1112 4936 explorer.exe 91 PID 4936 wrote to memory of 1112 4936 explorer.exe 91 PID 4936 wrote to memory of 1112 4936 explorer.exe 91 PID 1112 wrote to memory of 4460 1112 spoolsv.exe 92 PID 1112 wrote to memory of 4460 1112 spoolsv.exe 92 PID 1112 wrote to memory of 4460 1112 spoolsv.exe 92 PID 4460 wrote to memory of 1104 4460 svchost.exe 93 PID 4460 wrote to memory of 1104 4460 svchost.exe 93 PID 4460 wrote to memory of 1104 4460 svchost.exe 93 PID 4460 wrote to memory of 4104 4460 svchost.exe 94 PID 4460 wrote to memory of 4104 4460 svchost.exe 94 PID 4460 wrote to memory of 4104 4460 svchost.exe 94 PID 4460 wrote to memory of 4620 4460 svchost.exe 113 PID 4460 wrote to memory of 4620 4460 svchost.exe 113 PID 4460 wrote to memory of 4620 4460 svchost.exe 113 PID 4460 wrote to memory of 2916 4460 svchost.exe 123 PID 4460 wrote to memory of 2916 4460 svchost.exe 123 PID 4460 wrote to memory of 2916 4460 svchost.exe 123
Processes
-
C:\Users\Admin\AppData\Local\Temp\59915f9410eca4a1e2b43888387ec215d6e5a7ccb39a58d2ebf4f5ebdf700220.exe"C:\Users\Admin\AppData\Local\Temp\59915f9410eca4a1e2b43888387ec215d6e5a7ccb39a58d2ebf4f5ebdf700220.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:536 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4936 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1112 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4460 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1104
-
-
C:\Windows\SysWOW64\at.exeat 22:11 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:4104
-
-
C:\Windows\SysWOW64\at.exeat 22:12 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:4620
-
-
C:\Windows\SysWOW64\at.exeat 22:13 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:2916
-
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=3468,i,6166776566165096562,4582328833313060853,262144 --variations-seed-version --mojo-platform-channel-handle=4108 /prefetch:81⤵PID:4836
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66KB
MD5611829adcbc40292d8dcdce8fbadcb9c
SHA15e813bc7d7f5ad248bb2d83109d2835b3ea30576
SHA2561bab597b19c020c71de2f8709cebf0115b1b709e9ece9adf8faa2e6bbc424afd
SHA5127b3a8234c9389922f5c4a49ce34feb36aeadcab484271ad0e153778f16b7bae1323e14c8c9200f8a557a5a4192f0271a9743ac550f8cc70fcec93899a4c033fa
-
Filesize
66KB
MD54eced97766f454f80316e2e058c0b2bc
SHA1eb24a2c78d024457c1de1cd854f788d19e9c9691
SHA2562b12de21d2c7f3ca49acf180f6a222dbff9dd5b731de5c706e572182474fa1b8
SHA51280a1f95226caa326044c1aa9991c68d779c97788cc140583e1b8136c52c53e65c141a1d87d126e5a54c1af4d21afa6947a690f58a283d963d17109c6fad78fd3
-
Filesize
66KB
MD52228560400c43861d419924082ad8409
SHA13f2983b154d2f57b989bd7d81851cae6eb40a908
SHA256ed61928cbb5368094a09833552529f44813892dea2aea0b50f1efe79ae2e122e
SHA512f8a50fe1e0a43045ca07082cc9aac071f17912e1bf99d6934f33710e608c401dc2a9f25fe4bdba292c4a2c1f4e8613d2127f06f3ab4036792da7fe382b36196b
-
Filesize
66KB
MD5a5eb9b2f09893368500799adfe7db863
SHA1ebbdf66ac6b8be7d54207a21468a61de66835b01
SHA2561c17c4acedb7eae89c6033dd45fed32362bce62fd72b9bc4bcff14c7c024db22
SHA512fb0569f0ef95d8ea80a066e72ac0ca5c37b564d2f1bccda81379abf1290f8e79be2944b2b6cc6376a45e749496d23fa9924b8617abd44e15e392d6d9beeb548a