Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
01/06/2024, 21:06
Static task
static1
Behavioral task
behavioral1
Sample
4b75099cf7902bc81ecb530d30f066c5c15f48c85e2cfe4573462bfb7d07744e.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
4b75099cf7902bc81ecb530d30f066c5c15f48c85e2cfe4573462bfb7d07744e.exe
Resource
win10v2004-20240508-en
General
-
Target
4b75099cf7902bc81ecb530d30f066c5c15f48c85e2cfe4573462bfb7d07744e.exe
-
Size
65KB
-
MD5
49e0fa8368cd83a2b8ec1b85ea560421
-
SHA1
a70f81439c4c04baccfe113e2741c69a89a1ebc9
-
SHA256
4b75099cf7902bc81ecb530d30f066c5c15f48c85e2cfe4573462bfb7d07744e
-
SHA512
dcef16e05809521ca90d4f586aa92467ee8e9d3247e43d9da2f390df3d0c704542beb50916aa80afffab9a8fb4fd838cc47f82ee76e09770716756ec59fac3f3
-
SSDEEP
1536:ECq3yRuqrI01eArdW/O7JnI2e13XiLij40MkTUVqa/Oul:7WNqkOJWmo1HpM0MkTUmul
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 4876 explorer.exe 4636 spoolsv.exe 64 svchost.exe 2856 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe svchost.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe 4b75099cf7902bc81ecb530d30f066c5c15f48c85e2cfe4573462bfb7d07744e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2284 4b75099cf7902bc81ecb530d30f066c5c15f48c85e2cfe4573462bfb7d07744e.exe 2284 4b75099cf7902bc81ecb530d30f066c5c15f48c85e2cfe4573462bfb7d07744e.exe 4876 explorer.exe 4876 explorer.exe 4876 explorer.exe 4876 explorer.exe 4876 explorer.exe 4876 explorer.exe 4876 explorer.exe 64 svchost.exe 4876 explorer.exe 64 svchost.exe 64 svchost.exe 64 svchost.exe 4876 explorer.exe 64 svchost.exe 64 svchost.exe 4876 explorer.exe 64 svchost.exe 4876 explorer.exe 64 svchost.exe 4876 explorer.exe 64 svchost.exe 4876 explorer.exe 64 svchost.exe 4876 explorer.exe 4876 explorer.exe 64 svchost.exe 64 svchost.exe 4876 explorer.exe 4876 explorer.exe 64 svchost.exe 4876 explorer.exe 64 svchost.exe 4876 explorer.exe 64 svchost.exe 4876 explorer.exe 64 svchost.exe 4876 explorer.exe 64 svchost.exe 4876 explorer.exe 64 svchost.exe 4876 explorer.exe 64 svchost.exe 4876 explorer.exe 64 svchost.exe 64 svchost.exe 4876 explorer.exe 4876 explorer.exe 64 svchost.exe 64 svchost.exe 4876 explorer.exe 4876 explorer.exe 64 svchost.exe 64 svchost.exe 64 svchost.exe 4876 explorer.exe 4876 explorer.exe 4876 explorer.exe 64 svchost.exe 4876 explorer.exe 64 svchost.exe 4876 explorer.exe 64 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 4876 explorer.exe 64 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2284 4b75099cf7902bc81ecb530d30f066c5c15f48c85e2cfe4573462bfb7d07744e.exe 2284 4b75099cf7902bc81ecb530d30f066c5c15f48c85e2cfe4573462bfb7d07744e.exe 4876 explorer.exe 4876 explorer.exe 4636 spoolsv.exe 4636 spoolsv.exe 64 svchost.exe 64 svchost.exe 2856 spoolsv.exe 2856 spoolsv.exe 4876 explorer.exe 4876 explorer.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2284 wrote to memory of 4876 2284 4b75099cf7902bc81ecb530d30f066c5c15f48c85e2cfe4573462bfb7d07744e.exe 82 PID 2284 wrote to memory of 4876 2284 4b75099cf7902bc81ecb530d30f066c5c15f48c85e2cfe4573462bfb7d07744e.exe 82 PID 2284 wrote to memory of 4876 2284 4b75099cf7902bc81ecb530d30f066c5c15f48c85e2cfe4573462bfb7d07744e.exe 82 PID 4876 wrote to memory of 4636 4876 explorer.exe 83 PID 4876 wrote to memory of 4636 4876 explorer.exe 83 PID 4876 wrote to memory of 4636 4876 explorer.exe 83 PID 4636 wrote to memory of 64 4636 spoolsv.exe 84 PID 4636 wrote to memory of 64 4636 spoolsv.exe 84 PID 4636 wrote to memory of 64 4636 spoolsv.exe 84 PID 64 wrote to memory of 2856 64 svchost.exe 85 PID 64 wrote to memory of 2856 64 svchost.exe 85 PID 64 wrote to memory of 2856 64 svchost.exe 85 PID 64 wrote to memory of 3456 64 svchost.exe 86 PID 64 wrote to memory of 3456 64 svchost.exe 86 PID 64 wrote to memory of 3456 64 svchost.exe 86 PID 64 wrote to memory of 3992 64 svchost.exe 101 PID 64 wrote to memory of 3992 64 svchost.exe 101 PID 64 wrote to memory of 3992 64 svchost.exe 101 PID 64 wrote to memory of 532 64 svchost.exe 112 PID 64 wrote to memory of 532 64 svchost.exe 112 PID 64 wrote to memory of 532 64 svchost.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\4b75099cf7902bc81ecb530d30f066c5c15f48c85e2cfe4573462bfb7d07744e.exe"C:\Users\Admin\AppData\Local\Temp\4b75099cf7902bc81ecb530d30f066c5c15f48c85e2cfe4573462bfb7d07744e.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2284 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4876 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4636 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:64 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2856
-
-
C:\Windows\SysWOW64\at.exeat 21:08 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:3456
-
-
C:\Windows\SysWOW64\at.exeat 21:09 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:3992
-
-
C:\Windows\SysWOW64\at.exeat 21:10 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:532
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD57fd188b35f4cd85fb8c28f07a400c1db
SHA18c997c71203b84e37b4a597c4a14fd44c6f2328b
SHA256c664cdd9c6850759504eb314a75b2a4fc9d44a25c0c1e1d126f115a082c8b878
SHA5122317ec4c99a6c4f34e4f9e646e7f83b74d8e7cc5bfd65aeb9a8a6c35042c834884ed3145d133632b157ba207528db1dd3eda53f2bc9a75039b1fb2b91504a941
-
Filesize
65KB
MD51c3e49817c2f1030fa92eb102e58aced
SHA13411a98032de9d4cbfc7bd08065f3de647f76843
SHA256f6630e05e238f3afc94d037af73265c45e96ac60a48122105ef0637371bcbbd7
SHA5121e4604e6caf604159e05f8e1c84b692d46ec4612a457292c60cb5f082c0046a04f3e2034018756ea1e1396afda0cb93f30d6c70876693f6ef5da15bc637a414c
-
Filesize
65KB
MD51f59467d7b14f643f0320020240b3d7c
SHA18883e49026195d2943b6d21246fbe3584c366f25
SHA256e65307501819987e931794a44b9bb2f226559888716e1b5044a7f285972a6120
SHA512aaec5c4674a40abcbe9f62e063ad201f13182b7c6e055f00fefd8c8bf9dfec9799eb5a6256324a44b5dc98e77eb1c0b69c98db565eeb1c94fac90ae372480acd
-
Filesize
65KB
MD59e50de61de149a7a1be34e3dad806f4f
SHA1c0b80317397e54b7ab1f6723dd55171896db3ac0
SHA256980381863820fb48daae6ef9cbd04db9dfe078e0f14d208bcdd69c0cc81b49f7
SHA512a9f064ea2024deef31ce36e6e1a798429d6ee2000a851dcc7dd5f258b0411ae9072fa6ba9f997617fd2d836ce855b9d3df41492866029795f33e026d9d422dce