Analysis
-
max time kernel
150s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
31-05-2024 23:14
Static task
static1
Behavioral task
behavioral1
Sample
73baa056e40cfba5ff9da552c2b2311dd8442712904d33185dbbbba39b6bf82b.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
73baa056e40cfba5ff9da552c2b2311dd8442712904d33185dbbbba39b6bf82b.exe
Resource
win10v2004-20240426-en
General
-
Target
73baa056e40cfba5ff9da552c2b2311dd8442712904d33185dbbbba39b6bf82b.exe
-
Size
66KB
-
MD5
93952a80aebecd034262a8de55fcfc3d
-
SHA1
832498327f4fbcc16f4ed14c4707d6e40b786b3f
-
SHA256
73baa056e40cfba5ff9da552c2b2311dd8442712904d33185dbbbba39b6bf82b
-
SHA512
07e82fec0cea719b230a443baf5ee0d98e15226c9012575c4597bc38756def099a003f3cd1abe8726abbc1e98217415dcd9b5ede0d06faf3a3fb395fb0bb44b2
-
SSDEEP
1536:EHfetdklPp+07gDSrB8Xru2zGeJxgawTzpXzrDJrXiO:IeklMMYJhqezw/pXzH9iO
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 4012 explorer.exe 548 spoolsv.exe 1000 svchost.exe 3964 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification \??\c:\windows\system\svchost.exe svchost.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe 73baa056e40cfba5ff9da552c2b2311dd8442712904d33185dbbbba39b6bf82b.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4476 73baa056e40cfba5ff9da552c2b2311dd8442712904d33185dbbbba39b6bf82b.exe 4476 73baa056e40cfba5ff9da552c2b2311dd8442712904d33185dbbbba39b6bf82b.exe 4012 explorer.exe 4012 explorer.exe 4012 explorer.exe 4012 explorer.exe 4012 explorer.exe 4012 explorer.exe 1000 svchost.exe 1000 svchost.exe 1000 svchost.exe 1000 svchost.exe 1000 svchost.exe 4012 explorer.exe 4012 explorer.exe 1000 svchost.exe 1000 svchost.exe 4012 explorer.exe 4012 explorer.exe 1000 svchost.exe 4012 explorer.exe 4012 explorer.exe 1000 svchost.exe 1000 svchost.exe 4012 explorer.exe 1000 svchost.exe 4012 explorer.exe 1000 svchost.exe 1000 svchost.exe 1000 svchost.exe 4012 explorer.exe 4012 explorer.exe 1000 svchost.exe 4012 explorer.exe 4012 explorer.exe 1000 svchost.exe 1000 svchost.exe 1000 svchost.exe 4012 explorer.exe 4012 explorer.exe 1000 svchost.exe 4012 explorer.exe 4012 explorer.exe 1000 svchost.exe 1000 svchost.exe 4012 explorer.exe 1000 svchost.exe 4012 explorer.exe 4012 explorer.exe 1000 svchost.exe 4012 explorer.exe 1000 svchost.exe 1000 svchost.exe 4012 explorer.exe 1000 svchost.exe 4012 explorer.exe 4012 explorer.exe 1000 svchost.exe 1000 svchost.exe 4012 explorer.exe 4012 explorer.exe 1000 svchost.exe 4012 explorer.exe 1000 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 1000 svchost.exe 4012 explorer.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 4476 73baa056e40cfba5ff9da552c2b2311dd8442712904d33185dbbbba39b6bf82b.exe 4476 73baa056e40cfba5ff9da552c2b2311dd8442712904d33185dbbbba39b6bf82b.exe 4012 explorer.exe 4012 explorer.exe 548 spoolsv.exe 548 spoolsv.exe 1000 svchost.exe 1000 svchost.exe 3964 spoolsv.exe 3964 spoolsv.exe 4012 explorer.exe 4012 explorer.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 4476 wrote to memory of 4012 4476 73baa056e40cfba5ff9da552c2b2311dd8442712904d33185dbbbba39b6bf82b.exe 85 PID 4476 wrote to memory of 4012 4476 73baa056e40cfba5ff9da552c2b2311dd8442712904d33185dbbbba39b6bf82b.exe 85 PID 4476 wrote to memory of 4012 4476 73baa056e40cfba5ff9da552c2b2311dd8442712904d33185dbbbba39b6bf82b.exe 85 PID 4012 wrote to memory of 548 4012 explorer.exe 86 PID 4012 wrote to memory of 548 4012 explorer.exe 86 PID 4012 wrote to memory of 548 4012 explorer.exe 86 PID 548 wrote to memory of 1000 548 spoolsv.exe 88 PID 548 wrote to memory of 1000 548 spoolsv.exe 88 PID 548 wrote to memory of 1000 548 spoolsv.exe 88 PID 1000 wrote to memory of 3964 1000 svchost.exe 89 PID 1000 wrote to memory of 3964 1000 svchost.exe 89 PID 1000 wrote to memory of 3964 1000 svchost.exe 89 PID 1000 wrote to memory of 3220 1000 svchost.exe 90 PID 1000 wrote to memory of 3220 1000 svchost.exe 90 PID 1000 wrote to memory of 3220 1000 svchost.exe 90 PID 1000 wrote to memory of 4524 1000 svchost.exe 100 PID 1000 wrote to memory of 4524 1000 svchost.exe 100 PID 1000 wrote to memory of 4524 1000 svchost.exe 100 PID 1000 wrote to memory of 1224 1000 svchost.exe 102 PID 1000 wrote to memory of 1224 1000 svchost.exe 102 PID 1000 wrote to memory of 1224 1000 svchost.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\73baa056e40cfba5ff9da552c2b2311dd8442712904d33185dbbbba39b6bf82b.exe"C:\Users\Admin\AppData\Local\Temp\73baa056e40cfba5ff9da552c2b2311dd8442712904d33185dbbbba39b6bf82b.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4476 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4012 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:548 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1000 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3964
-
-
C:\Windows\SysWOW64\at.exeat 23:16 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:3220
-
-
C:\Windows\SysWOW64\at.exeat 23:17 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:4524
-
-
C:\Windows\SysWOW64\at.exeat 23:18 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:1224
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66KB
MD5652f31d1e9472a32bde382f2aaa6cd29
SHA12e4226b63a8fadc869c8be953c0eb317136da210
SHA2569590ca337b7e9f4f2ae9ad06df7e7a200113f4b42081520c24eb9c58147dd16d
SHA512e9338db96edc440502a9284f71a673cbf9dc02aa753a27ba5fe6b65f4849343bc888f2267a945dbf0477eff7f2e5d8c6efc2b14b188f3cf71c86c7b9ced8c83c
-
Filesize
66KB
MD587cf19e6f0e34816f92dd6be5063453a
SHA1d673c242299e0a7416287a0f9c1be33845921328
SHA256e6d87262b6dacfdd07df9fecf373241a585f8e546f983d96bea0da337697219b
SHA51278a3839458a0795f692e7c96ab02d90720fa81db75f3547b04253bf299081fab4837b71612493acbc499ff39b35f84647cb2a6691eaa1a6651a59ab3129aa4bf
-
Filesize
66KB
MD598164ecb5a3e7f8bd84e923649dc7dfc
SHA16a7e00ffbbc54e9846a045f8c25c6b89ba1fa617
SHA25695e1529505c01fac4235097114d6ed06092026b32cb7bcbf53043cce020d1acf
SHA512cea7646bc0f3aaa52749787d668cfb26332271d2af3d94c6ca928b932a37219f569833f0dcc4be5e9821a2fdf316cb416223c0027caeda4a64e631bf9ce3bb8f
-
Filesize
66KB
MD51e35d3677a0427162fbb12598835485e
SHA1ad56875e1a83916af301a238855d4266237056ed
SHA25617ce02e3a6aae2179d5ed6089a1f4bc9d4e7210ec9325a0d66d3f85790ac945b
SHA5123c24a3495f0261459ff68c07a3b72f99db355c26a1f2ba2b9ba1fc1e63d163c8088ff0bdd316210b4998d3edcba8245bfccf0fcfb2596a28ab589d7b855e10f0