Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
01-06-2024 20:35
Static task
static1
Behavioral task
behavioral1
Sample
40846733ca4c5c79baa9d1456eb77a75017844e14baa677fce82049b95a764cc.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
40846733ca4c5c79baa9d1456eb77a75017844e14baa677fce82049b95a764cc.exe
Resource
win10v2004-20240508-en
General
-
Target
40846733ca4c5c79baa9d1456eb77a75017844e14baa677fce82049b95a764cc.exe
-
Size
206KB
-
MD5
036d77e8a713f3e4516aba7f2a5c2b75
-
SHA1
5b7fd394aac8fd89f5ba681e903842f2fac8c67f
-
SHA256
40846733ca4c5c79baa9d1456eb77a75017844e14baa677fce82049b95a764cc
-
SHA512
d25ddfd1375129b923e03943ebe8e80599aa3d529d747c19d734f551db67e518846b92aea49e3682c4cf846f288efec8ba60eeb1edcf8311754fc9d6157bb052
-
SSDEEP
3072:5vEfVUzSLhIVbV6i5LirrlZrHyrUHUckoMQ2RN6unLf:5vEN2U+T6i5LirrllHy4HUcMQY6Kf
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe -
Executes dropped EXE 4 IoCs
pid Process 3932 explorer.exe 3248 spoolsv.exe 3500 svchost.exe 2656 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification \??\c:\windows\system\svchost.exe svchost.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe 40846733ca4c5c79baa9d1456eb77a75017844e14baa677fce82049b95a764cc.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2796 40846733ca4c5c79baa9d1456eb77a75017844e14baa677fce82049b95a764cc.exe 2796 40846733ca4c5c79baa9d1456eb77a75017844e14baa677fce82049b95a764cc.exe 3932 explorer.exe 3932 explorer.exe 3932 explorer.exe 3932 explorer.exe 3932 explorer.exe 3932 explorer.exe 3500 svchost.exe 3500 svchost.exe 3500 svchost.exe 3500 svchost.exe 3932 explorer.exe 3932 explorer.exe 3500 svchost.exe 3500 svchost.exe 3932 explorer.exe 3932 explorer.exe 3500 svchost.exe 3500 svchost.exe 3932 explorer.exe 3932 explorer.exe 3500 svchost.exe 3500 svchost.exe 3932 explorer.exe 3932 explorer.exe 3500 svchost.exe 3500 svchost.exe 3932 explorer.exe 3932 explorer.exe 3500 svchost.exe 3500 svchost.exe 3932 explorer.exe 3932 explorer.exe 3500 svchost.exe 3500 svchost.exe 3932 explorer.exe 3932 explorer.exe 3500 svchost.exe 3500 svchost.exe 3932 explorer.exe 3932 explorer.exe 3500 svchost.exe 3500 svchost.exe 3932 explorer.exe 3932 explorer.exe 3500 svchost.exe 3500 svchost.exe 3932 explorer.exe 3932 explorer.exe 3500 svchost.exe 3500 svchost.exe 3932 explorer.exe 3932 explorer.exe 3500 svchost.exe 3500 svchost.exe 3932 explorer.exe 3932 explorer.exe 3500 svchost.exe 3500 svchost.exe 3932 explorer.exe 3932 explorer.exe 3500 svchost.exe 3500 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 3932 explorer.exe 3500 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2796 40846733ca4c5c79baa9d1456eb77a75017844e14baa677fce82049b95a764cc.exe 2796 40846733ca4c5c79baa9d1456eb77a75017844e14baa677fce82049b95a764cc.exe 3932 explorer.exe 3932 explorer.exe 3248 spoolsv.exe 3248 spoolsv.exe 3500 svchost.exe 3500 svchost.exe 2656 spoolsv.exe 2656 spoolsv.exe 3932 explorer.exe 3932 explorer.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2796 wrote to memory of 3932 2796 40846733ca4c5c79baa9d1456eb77a75017844e14baa677fce82049b95a764cc.exe 84 PID 2796 wrote to memory of 3932 2796 40846733ca4c5c79baa9d1456eb77a75017844e14baa677fce82049b95a764cc.exe 84 PID 2796 wrote to memory of 3932 2796 40846733ca4c5c79baa9d1456eb77a75017844e14baa677fce82049b95a764cc.exe 84 PID 3932 wrote to memory of 3248 3932 explorer.exe 85 PID 3932 wrote to memory of 3248 3932 explorer.exe 85 PID 3932 wrote to memory of 3248 3932 explorer.exe 85 PID 3248 wrote to memory of 3500 3248 spoolsv.exe 86 PID 3248 wrote to memory of 3500 3248 spoolsv.exe 86 PID 3248 wrote to memory of 3500 3248 spoolsv.exe 86 PID 3500 wrote to memory of 2656 3500 svchost.exe 87 PID 3500 wrote to memory of 2656 3500 svchost.exe 87 PID 3500 wrote to memory of 2656 3500 svchost.exe 87 PID 3500 wrote to memory of 1520 3500 svchost.exe 88 PID 3500 wrote to memory of 1520 3500 svchost.exe 88 PID 3500 wrote to memory of 1520 3500 svchost.exe 88 PID 3500 wrote to memory of 2632 3500 svchost.exe 102 PID 3500 wrote to memory of 2632 3500 svchost.exe 102 PID 3500 wrote to memory of 2632 3500 svchost.exe 102 PID 3500 wrote to memory of 3796 3500 svchost.exe 104 PID 3500 wrote to memory of 3796 3500 svchost.exe 104 PID 3500 wrote to memory of 3796 3500 svchost.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\40846733ca4c5c79baa9d1456eb77a75017844e14baa677fce82049b95a764cc.exe"C:\Users\Admin\AppData\Local\Temp\40846733ca4c5c79baa9d1456eb77a75017844e14baa677fce82049b95a764cc.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2796 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3932 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3248 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3500 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2656
-
-
C:\Windows\SysWOW64\at.exeat 20:37 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:1520
-
-
C:\Windows\SysWOW64\at.exeat 20:38 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:2632
-
-
C:\Windows\SysWOW64\at.exeat 20:39 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:3796
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
206KB
MD545d07054f61fbeac6da24544dfd76b73
SHA136cd2079c61b572cb374f65fff80b2a777dd7f7c
SHA256d4702d9069843358ebdb7b3c9ee11365c613f43b8c8d8f06bdba3be945c0d419
SHA512b71dba772212d359fb9f84c783f4e2a1dd42f65754b31bdb095f217d6a2e22c70d6a2acfa8bca3b67f40d66e8ef6265f77763d58f5911d132dc6773529077030
-
Filesize
206KB
MD57bafb7483ad80d3a12337894e2c23d2e
SHA1959e259624a84290269c806cf17d1865a65ca6c7
SHA2566a1f6adff7d073cc3aa6d4f4ff01c3f087aa8731c19375416f4fe10e9f81e199
SHA51212680d27894cb5ac1b55d0e374e30c083e15575cc7c9900fb76e48ab55ec9151742aa4dce9974be29f2e2d692c4aa377bed22b6c1a6efa24900db9b6bf2be4a1
-
Filesize
207KB
MD53d4d757a195cd071c63592200a13ffad
SHA1466c3625d65dc3748de48bb350fa677a29c14766
SHA2562c5b6eb7f607b36a8bf2947a33d29c0f8a49da3798549187a062f1b0d215a4dd
SHA5124c6b2aadcde050557faae387c2682e0bced55b9a3078654bb639e35de07071daf65b6cda450ddc5caf2a870c8dd4754526a286ae398cc881a0b5db82aa47bcce
-
Filesize
206KB
MD509add0bde96b59dc851044b4fe77c4fd
SHA17138103dba31d2f9e5e34519e079a1316f048f32
SHA2560bc652d366a31f563e330b2b7b78d32cf1dc4203ea0195dc692512fe758a3fff
SHA5124ea380097aed7d91ad1c65c0a7ad3d4ee2f22bc0f206b8f9942264f077a7c1e26ea76ec00b3ecb8fd3c431323a90fefcd52cb09689ab323ea298c5948224e86d