Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
31-05-2024 23:14
Static task
static1
Behavioral task
behavioral1
Sample
73baa056e40cfba5ff9da552c2b2311dd8442712904d33185dbbbba39b6bf82b.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
73baa056e40cfba5ff9da552c2b2311dd8442712904d33185dbbbba39b6bf82b.exe
Resource
win10v2004-20240426-en
General
-
Target
73baa056e40cfba5ff9da552c2b2311dd8442712904d33185dbbbba39b6bf82b.exe
-
Size
66KB
-
MD5
93952a80aebecd034262a8de55fcfc3d
-
SHA1
832498327f4fbcc16f4ed14c4707d6e40b786b3f
-
SHA256
73baa056e40cfba5ff9da552c2b2311dd8442712904d33185dbbbba39b6bf82b
-
SHA512
07e82fec0cea719b230a443baf5ee0d98e15226c9012575c4597bc38756def099a003f3cd1abe8726abbc1e98217415dcd9b5ede0d06faf3a3fb395fb0bb44b2
-
SSDEEP
1536:EHfetdklPp+07gDSrB8Xru2zGeJxgawTzpXzrDJrXiO:IeklMMYJhqezw/pXzH9iO
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 2932 explorer.exe 2712 spoolsv.exe 2612 svchost.exe 2420 spoolsv.exe -
Loads dropped DLL 8 IoCs
pid Process 2344 73baa056e40cfba5ff9da552c2b2311dd8442712904d33185dbbbba39b6bf82b.exe 2344 73baa056e40cfba5ff9da552c2b2311dd8442712904d33185dbbbba39b6bf82b.exe 2932 explorer.exe 2932 explorer.exe 2712 spoolsv.exe 2712 spoolsv.exe 2612 svchost.exe 2612 svchost.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe svchost.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe 73baa056e40cfba5ff9da552c2b2311dd8442712904d33185dbbbba39b6bf82b.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2344 73baa056e40cfba5ff9da552c2b2311dd8442712904d33185dbbbba39b6bf82b.exe 2932 explorer.exe 2932 explorer.exe 2932 explorer.exe 2932 explorer.exe 2932 explorer.exe 2932 explorer.exe 2612 svchost.exe 2612 svchost.exe 2612 svchost.exe 2932 explorer.exe 2932 explorer.exe 2612 svchost.exe 2612 svchost.exe 2932 explorer.exe 2932 explorer.exe 2612 svchost.exe 2612 svchost.exe 2932 explorer.exe 2932 explorer.exe 2612 svchost.exe 2932 explorer.exe 2612 svchost.exe 2612 svchost.exe 2932 explorer.exe 2932 explorer.exe 2612 svchost.exe 2612 svchost.exe 2932 explorer.exe 2612 svchost.exe 2932 explorer.exe 2932 explorer.exe 2612 svchost.exe 2932 explorer.exe 2612 svchost.exe 2612 svchost.exe 2932 explorer.exe 2932 explorer.exe 2612 svchost.exe 2612 svchost.exe 2932 explorer.exe 2612 svchost.exe 2932 explorer.exe 2612 svchost.exe 2932 explorer.exe 2932 explorer.exe 2612 svchost.exe 2932 explorer.exe 2612 svchost.exe 2932 explorer.exe 2612 svchost.exe 2932 explorer.exe 2612 svchost.exe 2932 explorer.exe 2612 svchost.exe 2932 explorer.exe 2612 svchost.exe 2932 explorer.exe 2612 svchost.exe 2932 explorer.exe 2612 svchost.exe 2932 explorer.exe 2612 svchost.exe 2932 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2932 explorer.exe 2612 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2344 73baa056e40cfba5ff9da552c2b2311dd8442712904d33185dbbbba39b6bf82b.exe 2344 73baa056e40cfba5ff9da552c2b2311dd8442712904d33185dbbbba39b6bf82b.exe 2932 explorer.exe 2932 explorer.exe 2712 spoolsv.exe 2712 spoolsv.exe 2612 svchost.exe 2612 svchost.exe 2420 spoolsv.exe 2420 spoolsv.exe 2932 explorer.exe 2932 explorer.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2344 wrote to memory of 2932 2344 73baa056e40cfba5ff9da552c2b2311dd8442712904d33185dbbbba39b6bf82b.exe 28 PID 2344 wrote to memory of 2932 2344 73baa056e40cfba5ff9da552c2b2311dd8442712904d33185dbbbba39b6bf82b.exe 28 PID 2344 wrote to memory of 2932 2344 73baa056e40cfba5ff9da552c2b2311dd8442712904d33185dbbbba39b6bf82b.exe 28 PID 2344 wrote to memory of 2932 2344 73baa056e40cfba5ff9da552c2b2311dd8442712904d33185dbbbba39b6bf82b.exe 28 PID 2932 wrote to memory of 2712 2932 explorer.exe 29 PID 2932 wrote to memory of 2712 2932 explorer.exe 29 PID 2932 wrote to memory of 2712 2932 explorer.exe 29 PID 2932 wrote to memory of 2712 2932 explorer.exe 29 PID 2712 wrote to memory of 2612 2712 spoolsv.exe 30 PID 2712 wrote to memory of 2612 2712 spoolsv.exe 30 PID 2712 wrote to memory of 2612 2712 spoolsv.exe 30 PID 2712 wrote to memory of 2612 2712 spoolsv.exe 30 PID 2612 wrote to memory of 2420 2612 svchost.exe 31 PID 2612 wrote to memory of 2420 2612 svchost.exe 31 PID 2612 wrote to memory of 2420 2612 svchost.exe 31 PID 2612 wrote to memory of 2420 2612 svchost.exe 31 PID 2612 wrote to memory of 1480 2612 svchost.exe 32 PID 2612 wrote to memory of 1480 2612 svchost.exe 32 PID 2612 wrote to memory of 1480 2612 svchost.exe 32 PID 2612 wrote to memory of 1480 2612 svchost.exe 32 PID 2612 wrote to memory of 920 2612 svchost.exe 36 PID 2612 wrote to memory of 920 2612 svchost.exe 36 PID 2612 wrote to memory of 920 2612 svchost.exe 36 PID 2612 wrote to memory of 920 2612 svchost.exe 36 PID 2612 wrote to memory of 1256 2612 svchost.exe 38 PID 2612 wrote to memory of 1256 2612 svchost.exe 38 PID 2612 wrote to memory of 1256 2612 svchost.exe 38 PID 2612 wrote to memory of 1256 2612 svchost.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\73baa056e40cfba5ff9da552c2b2311dd8442712904d33185dbbbba39b6bf82b.exe"C:\Users\Admin\AppData\Local\Temp\73baa056e40cfba5ff9da552c2b2311dd8442712904d33185dbbbba39b6bf82b.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2344 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2932 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2712 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2612 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2420
-
-
C:\Windows\SysWOW64\at.exeat 23:16 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:1480
-
-
C:\Windows\SysWOW64\at.exeat 23:17 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:920
-
-
C:\Windows\SysWOW64\at.exeat 23:18 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:1256
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66KB
MD5d9b268ac5451f97f530d38fd64128ee7
SHA12e1ab7421aa6c80169dab06058ab1329103249bc
SHA2565d345ae5ff73d3649ca018e0961598224d969d13b88712c3b8bf509051584ba3
SHA512556e192426280719cbadad35e096a073adcb85fd8045278d0e1d527311c28493f97004eaa43aa7f9aa475d8a0c1160410420bbcfc03df912ea7aacf890e3128c
-
Filesize
66KB
MD51dacd3a7fe109dad7fa732a736515360
SHA17b87326773cc6a617f55113f763a6d7ec78d4c79
SHA256bb464115336ca4426713fdb83fe97a7d0d349c6c95405cd006c64d331e91051c
SHA512778352ded2413e51bb71c586d50becefda33423932a43a30f3531d520884a1866dee25d53236d1187d1f9e84dd0b784745918ff5ff3e6da03b9f6fc853eda526
-
Filesize
66KB
MD53080f2799147e1024bbbb6891ec9d893
SHA15eb2f3a6d249dde3e46d9c698e8a96820a06fd76
SHA256952a3ddb12b8890800b6aaa09b251f376a611a9c7a31f4f5ed01178f25c02f48
SHA512aa6f8ce124940cefbef73abc435af516de0b156dd6d2400a0e67f9d657328b0f501c543f95f858dbd83c163807d33611545c029f251de98b91d6ce07acbe0903
-
Filesize
66KB
MD53085240cddcc0fe27faf7fd6e1a35cb9
SHA175ed310820a53cabcb1bedaed1ce09e185adcbc3
SHA256080170c2a48ccf826e5143522a29542fd1014e9912c51dfdc66645a1e1fbcfb2
SHA5121fcc8070d8963a8bfa66795481614dbbc2c2c3b02c5bf450622e1bb43bcefb108efac91e476cc59308e1180885566705f1ba02090809a5cd67e512365e7f9efa