Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
31/05/2024, 03:55
Static task
static1
Behavioral task
behavioral1
Sample
dd02cac8b9a2679690c86bdbcc407dd0a4a03017a542a01dba7a2532b80eebcf.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
dd02cac8b9a2679690c86bdbcc407dd0a4a03017a542a01dba7a2532b80eebcf.exe
Resource
win10v2004-20240426-en
General
-
Target
dd02cac8b9a2679690c86bdbcc407dd0a4a03017a542a01dba7a2532b80eebcf.exe
-
Size
66KB
-
MD5
422d40a0e93b3f71a5c129a738aafdb4
-
SHA1
c6da2db8e78b27a790f35686f765da7db7ee4c6d
-
SHA256
dd02cac8b9a2679690c86bdbcc407dd0a4a03017a542a01dba7a2532b80eebcf
-
SHA512
32d32c59bddaab526709b731263192d5ded5fdeb3c467c153640aaaa7fb20b202295214d1a99387b2a985815304881a7055532abb632fb88254396bacaf4c56d
-
SSDEEP
1536:EHfetdklPp+07gDSrB8Xru2zGeJxgawTzpXzrDJrXi4:IeklMMYJhqezw/pXzH9i4
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 4000 explorer.exe 1588 spoolsv.exe 1420 svchost.exe 4856 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification \??\c:\windows\system\explorer.exe dd02cac8b9a2679690c86bdbcc407dd0a4a03017a542a01dba7a2532b80eebcf.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe svchost.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4600 dd02cac8b9a2679690c86bdbcc407dd0a4a03017a542a01dba7a2532b80eebcf.exe 4600 dd02cac8b9a2679690c86bdbcc407dd0a4a03017a542a01dba7a2532b80eebcf.exe 4000 explorer.exe 4000 explorer.exe 4000 explorer.exe 4000 explorer.exe 4000 explorer.exe 4000 explorer.exe 1420 svchost.exe 1420 svchost.exe 1420 svchost.exe 1420 svchost.exe 4000 explorer.exe 4000 explorer.exe 1420 svchost.exe 1420 svchost.exe 4000 explorer.exe 4000 explorer.exe 1420 svchost.exe 1420 svchost.exe 4000 explorer.exe 4000 explorer.exe 1420 svchost.exe 1420 svchost.exe 4000 explorer.exe 4000 explorer.exe 1420 svchost.exe 1420 svchost.exe 4000 explorer.exe 4000 explorer.exe 1420 svchost.exe 1420 svchost.exe 4000 explorer.exe 4000 explorer.exe 1420 svchost.exe 1420 svchost.exe 4000 explorer.exe 4000 explorer.exe 1420 svchost.exe 1420 svchost.exe 4000 explorer.exe 4000 explorer.exe 1420 svchost.exe 1420 svchost.exe 4000 explorer.exe 4000 explorer.exe 1420 svchost.exe 1420 svchost.exe 4000 explorer.exe 4000 explorer.exe 1420 svchost.exe 1420 svchost.exe 4000 explorer.exe 4000 explorer.exe 1420 svchost.exe 1420 svchost.exe 4000 explorer.exe 4000 explorer.exe 1420 svchost.exe 1420 svchost.exe 4000 explorer.exe 4000 explorer.exe 1420 svchost.exe 1420 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 4000 explorer.exe 1420 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 4600 dd02cac8b9a2679690c86bdbcc407dd0a4a03017a542a01dba7a2532b80eebcf.exe 4600 dd02cac8b9a2679690c86bdbcc407dd0a4a03017a542a01dba7a2532b80eebcf.exe 4000 explorer.exe 4000 explorer.exe 1588 spoolsv.exe 1588 spoolsv.exe 1420 svchost.exe 1420 svchost.exe 4856 spoolsv.exe 4856 spoolsv.exe 4000 explorer.exe 4000 explorer.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 4600 wrote to memory of 4000 4600 dd02cac8b9a2679690c86bdbcc407dd0a4a03017a542a01dba7a2532b80eebcf.exe 82 PID 4600 wrote to memory of 4000 4600 dd02cac8b9a2679690c86bdbcc407dd0a4a03017a542a01dba7a2532b80eebcf.exe 82 PID 4600 wrote to memory of 4000 4600 dd02cac8b9a2679690c86bdbcc407dd0a4a03017a542a01dba7a2532b80eebcf.exe 82 PID 4000 wrote to memory of 1588 4000 explorer.exe 83 PID 4000 wrote to memory of 1588 4000 explorer.exe 83 PID 4000 wrote to memory of 1588 4000 explorer.exe 83 PID 1588 wrote to memory of 1420 1588 spoolsv.exe 84 PID 1588 wrote to memory of 1420 1588 spoolsv.exe 84 PID 1588 wrote to memory of 1420 1588 spoolsv.exe 84 PID 1420 wrote to memory of 4856 1420 svchost.exe 86 PID 1420 wrote to memory of 4856 1420 svchost.exe 86 PID 1420 wrote to memory of 4856 1420 svchost.exe 86 PID 1420 wrote to memory of 1872 1420 svchost.exe 87 PID 1420 wrote to memory of 1872 1420 svchost.exe 87 PID 1420 wrote to memory of 1872 1420 svchost.exe 87 PID 1420 wrote to memory of 3084 1420 svchost.exe 99 PID 1420 wrote to memory of 3084 1420 svchost.exe 99 PID 1420 wrote to memory of 3084 1420 svchost.exe 99 PID 1420 wrote to memory of 4860 1420 svchost.exe 101 PID 1420 wrote to memory of 4860 1420 svchost.exe 101 PID 1420 wrote to memory of 4860 1420 svchost.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\dd02cac8b9a2679690c86bdbcc407dd0a4a03017a542a01dba7a2532b80eebcf.exe"C:\Users\Admin\AppData\Local\Temp\dd02cac8b9a2679690c86bdbcc407dd0a4a03017a542a01dba7a2532b80eebcf.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4600 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4000 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1588 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1420 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4856
-
-
C:\Windows\SysWOW64\at.exeat 03:57 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:1872
-
-
C:\Windows\SysWOW64\at.exeat 03:58 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:3084
-
-
C:\Windows\SysWOW64\at.exeat 03:59 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:4860
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66KB
MD52a3b81d8b91a3767c20d6e9c857d14f2
SHA1cc837223c957e890ee11808675be6291da51180c
SHA2569afb8d75f7a12dae3fd109f45ce34e4ea05c02b00e589cb07251d46d1b0bce18
SHA5122cd4cb46781cd66317cd01a19d5a96afe323e0b0af54a430fd68f509fa8e993aa33799eb86d52d4455a1cdce9189636a8a9a10c8184ed9c80d009e02c14239ac
-
Filesize
66KB
MD5b3f60f080d0c853be8b1802359b9021c
SHA116aa262d95dd7a8a9452e547e4e9b590bb248c98
SHA25620d498d45db7b608e30286b8f581f905c1a835523330961a80c80fbd0b663195
SHA5128d4b89d72189da249040f3593f6db3390134e1b1ff40e34ff892a4512203f1499e0e202ea2ecf75f13840bb2c8af247b9d5922a54823df158b7c63b512edd15f
-
Filesize
66KB
MD5e2c91348f1b17ad8f53434b9e4d2c5e3
SHA11d62af9d295115646e6cfa23428f495f0fe61095
SHA2563dcb570534cf180676eb62970f36a9a4f8a3b7d2dc8fc4f36b17d5672a828a01
SHA5127bca7f28ba12b4ff9f91ced27dc6b7b9a34f383588b4c205d39a811cad0a1df37c6bd3aeb2c0fe2f7a37fddac1a2d40ac2d7928c8fc799aaaf6e1972da445881
-
Filesize
66KB
MD58414877d912a2f39ec6c68d64ea2439f
SHA15f9f9c61f42ac61739bb8f4a3458d2fc2de530ef
SHA25656f71959b7f786affe41ef951aa2e948ce0ea10dddc89fa25cad9114f4b002af
SHA512ba3be188675017f2735a3f63bc02632ef735c39dfba5a578a78b468530a0140ff21bd0e8641ec89151418b2369fb35b297a3c4c82648c21245a1ed33673d4352