Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
30/05/2024, 00:29
Static task
static1
Behavioral task
behavioral1
Sample
9357c511ac6e9bf7c09690a0989661a942ad8a2f6c5f0ebc7b158302fdebaada.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
9357c511ac6e9bf7c09690a0989661a942ad8a2f6c5f0ebc7b158302fdebaada.exe
Resource
win10v2004-20240426-en
General
-
Target
9357c511ac6e9bf7c09690a0989661a942ad8a2f6c5f0ebc7b158302fdebaada.exe
-
Size
66KB
-
MD5
8568bba8a57f05d22055022ee5c48fe2
-
SHA1
fdde30c3c97da81e83b64719ba8b34cc6780f853
-
SHA256
9357c511ac6e9bf7c09690a0989661a942ad8a2f6c5f0ebc7b158302fdebaada
-
SHA512
5b9d65a08f41f026d7c0cb785488f81959b07b30405177de0f64ffa0d9a6fac20eb3baa4a6c503bc26c31cb59257fbd14a354976d6ea5813ab2e7c21349912d7
-
SSDEEP
1536:EHfetdklPp+07gDSrB8Xru2zGeJxgawTzpXzrDJrXiC:IeklMMYJhqezw/pXzH9iC
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe -
Executes dropped EXE 4 IoCs
pid Process 3048 explorer.exe 2564 spoolsv.exe 2864 svchost.exe 2624 spoolsv.exe -
Loads dropped DLL 8 IoCs
pid Process 2912 9357c511ac6e9bf7c09690a0989661a942ad8a2f6c5f0ebc7b158302fdebaada.exe 2912 9357c511ac6e9bf7c09690a0989661a942ad8a2f6c5f0ebc7b158302fdebaada.exe 3048 explorer.exe 3048 explorer.exe 2564 spoolsv.exe 2564 spoolsv.exe 2864 svchost.exe 2864 svchost.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe svchost.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe 9357c511ac6e9bf7c09690a0989661a942ad8a2f6c5f0ebc7b158302fdebaada.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2912 9357c511ac6e9bf7c09690a0989661a942ad8a2f6c5f0ebc7b158302fdebaada.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 2864 svchost.exe 2864 svchost.exe 3048 explorer.exe 2864 svchost.exe 3048 explorer.exe 2864 svchost.exe 3048 explorer.exe 2864 svchost.exe 3048 explorer.exe 2864 svchost.exe 3048 explorer.exe 2864 svchost.exe 3048 explorer.exe 2864 svchost.exe 3048 explorer.exe 2864 svchost.exe 3048 explorer.exe 2864 svchost.exe 3048 explorer.exe 2864 svchost.exe 3048 explorer.exe 2864 svchost.exe 3048 explorer.exe 2864 svchost.exe 3048 explorer.exe 2864 svchost.exe 3048 explorer.exe 2864 svchost.exe 3048 explorer.exe 2864 svchost.exe 3048 explorer.exe 2864 svchost.exe 3048 explorer.exe 2864 svchost.exe 3048 explorer.exe 2864 svchost.exe 3048 explorer.exe 2864 svchost.exe 3048 explorer.exe 2864 svchost.exe 3048 explorer.exe 2864 svchost.exe 3048 explorer.exe 2864 svchost.exe 3048 explorer.exe 2864 svchost.exe 3048 explorer.exe 2864 svchost.exe 3048 explorer.exe 2864 svchost.exe 3048 explorer.exe 2864 svchost.exe 3048 explorer.exe 2864 svchost.exe 3048 explorer.exe 2864 svchost.exe 3048 explorer.exe 2864 svchost.exe 3048 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 3048 explorer.exe 2864 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2912 9357c511ac6e9bf7c09690a0989661a942ad8a2f6c5f0ebc7b158302fdebaada.exe 2912 9357c511ac6e9bf7c09690a0989661a942ad8a2f6c5f0ebc7b158302fdebaada.exe 3048 explorer.exe 3048 explorer.exe 2564 spoolsv.exe 2564 spoolsv.exe 2864 svchost.exe 2864 svchost.exe 2624 spoolsv.exe 2624 spoolsv.exe 3048 explorer.exe 3048 explorer.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2912 wrote to memory of 3048 2912 9357c511ac6e9bf7c09690a0989661a942ad8a2f6c5f0ebc7b158302fdebaada.exe 28 PID 2912 wrote to memory of 3048 2912 9357c511ac6e9bf7c09690a0989661a942ad8a2f6c5f0ebc7b158302fdebaada.exe 28 PID 2912 wrote to memory of 3048 2912 9357c511ac6e9bf7c09690a0989661a942ad8a2f6c5f0ebc7b158302fdebaada.exe 28 PID 2912 wrote to memory of 3048 2912 9357c511ac6e9bf7c09690a0989661a942ad8a2f6c5f0ebc7b158302fdebaada.exe 28 PID 3048 wrote to memory of 2564 3048 explorer.exe 29 PID 3048 wrote to memory of 2564 3048 explorer.exe 29 PID 3048 wrote to memory of 2564 3048 explorer.exe 29 PID 3048 wrote to memory of 2564 3048 explorer.exe 29 PID 2564 wrote to memory of 2864 2564 spoolsv.exe 30 PID 2564 wrote to memory of 2864 2564 spoolsv.exe 30 PID 2564 wrote to memory of 2864 2564 spoolsv.exe 30 PID 2564 wrote to memory of 2864 2564 spoolsv.exe 30 PID 2864 wrote to memory of 2624 2864 svchost.exe 31 PID 2864 wrote to memory of 2624 2864 svchost.exe 31 PID 2864 wrote to memory of 2624 2864 svchost.exe 31 PID 2864 wrote to memory of 2624 2864 svchost.exe 31 PID 2864 wrote to memory of 2504 2864 svchost.exe 32 PID 2864 wrote to memory of 2504 2864 svchost.exe 32 PID 2864 wrote to memory of 2504 2864 svchost.exe 32 PID 2864 wrote to memory of 2504 2864 svchost.exe 32 PID 2864 wrote to memory of 1632 2864 svchost.exe 36 PID 2864 wrote to memory of 1632 2864 svchost.exe 36 PID 2864 wrote to memory of 1632 2864 svchost.exe 36 PID 2864 wrote to memory of 1632 2864 svchost.exe 36 PID 2864 wrote to memory of 1904 2864 svchost.exe 38 PID 2864 wrote to memory of 1904 2864 svchost.exe 38 PID 2864 wrote to memory of 1904 2864 svchost.exe 38 PID 2864 wrote to memory of 1904 2864 svchost.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\9357c511ac6e9bf7c09690a0989661a942ad8a2f6c5f0ebc7b158302fdebaada.exe"C:\Users\Admin\AppData\Local\Temp\9357c511ac6e9bf7c09690a0989661a942ad8a2f6c5f0ebc7b158302fdebaada.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2912 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3048 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2564 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2864 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2624
-
-
C:\Windows\SysWOW64\at.exeat 00:31 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:2504
-
-
C:\Windows\SysWOW64\at.exeat 00:32 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:1632
-
-
C:\Windows\SysWOW64\at.exeat 00:33 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:1904
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66KB
MD58e91f9940a188815afe5248a730a96b8
SHA1dc1e93683c1bf66ba1dca191916b589a25a087d4
SHA256e9d0a22eb7bea564d8b66ab3483742712f03f735893fe79e473146f36732e935
SHA5128a5c40ae2da770f5be2d18515437a199caa0e189fafee91dba686742f49885df1975b8b9be071ac0cac291e03e700d3df9d7871a341963b78976ed33b1142515
-
Filesize
66KB
MD530c533e898e97345ef4644a7f1a62ce6
SHA14b24c53e3734ccdea8ff33c7a027545c28876075
SHA2567727a1b5e3001433eb2bbb72615a8aa2503f77ca0e35d29216b6196f57379d09
SHA51258df2896dc11a9c4bf65c3eec25882bb996007842fb50a61c07762e515c613b255188d79a3c95767bfbc865e675ee935f486f0cc6800f06174e1ceb788a2d44f
-
Filesize
66KB
MD5b37c605d748dbe1ba4117c2c9ad7266a
SHA12ce5aa48ccb2ffd29475161faf5182aa0d0c8052
SHA2564ae47760c3744699edd27d0b39db5ed0f189eef1da6ac795a4a9b00f6b016624
SHA5127c7eec441dedca31e28c60c4c08977761486e1597d7814d9a484c2ea47065d0c1b4a0f8af583526145ead833aa3e94ffe6e50f45ebbf20064cc1719c7daddcea
-
Filesize
66KB
MD5ae322811bc28e5160a617c2a84205966
SHA15a901b97932530b17b28327ac9cdd5e111edd43d
SHA256a760be87bc3994176a8c951b2c550daf0997a1fa5ce75fa44faf20df8a103d3c
SHA5122b8e280db7698b13937a737986505b2d13a059b7195863642ccf8d071ec6c24b213c49f72dbc2b362de7cdde504064822970f309d556bcfce189cfc5d451a1b3