Analysis

  • max time kernel
    150s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/06/2024, 20:40

General

  • Target

    3511f46e5a8756eb55109c119413b5a403a6a4b48a034517263932006bcd5391.exe

  • Size

    199KB

  • MD5

    9fb28fbd3e062a1f91cf45004d2f796b

  • SHA1

    bbe609bacd8179b61b22da7a9dcd172b71505d95

  • SHA256

    3511f46e5a8756eb55109c119413b5a403a6a4b48a034517263932006bcd5391

  • SHA512

    16ecae84da06a6b33ec52abf60373a163fbb354352124211558ae2a0013b7807f70cddedd78c888f624dc0d6180685926df2dbdfa27bd88a1c0ab52c67c02c90

  • SSDEEP

    3072:7vEfVUzSLhIVbV6i5LirrlZrHyrUHUckoMQ2RN6u4Pmu1:7vEN2U+T6i5LirrllHy4HUcMQY6j

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Modifies Installed Components in the registry 2 TTPs 8 IoCs
  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3511f46e5a8756eb55109c119413b5a403a6a4b48a034517263932006bcd5391.exe
    "C:\Users\Admin\AppData\Local\Temp\3511f46e5a8756eb55109c119413b5a403a6a4b48a034517263932006bcd5391.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3516
    • \??\c:\windows\system\explorer.exe
      c:\windows\system\explorer.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visiblity of hidden/system files in Explorer
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4004
      • \??\c:\windows\system\spoolsv.exe
        c:\windows\system\spoolsv.exe SE
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3136
        • \??\c:\windows\system\svchost.exe
          c:\windows\system\svchost.exe
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visiblity of hidden/system files in Explorer
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1260
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe PR
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:2472
          • C:\Windows\SysWOW64\at.exe
            at 20:42 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
            5⤵
              PID:2220
            • C:\Windows\SysWOW64\at.exe
              at 20:43 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
              5⤵
                PID:3188
              • C:\Windows\SysWOW64\at.exe
                at 20:44 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
                5⤵
                  PID:4484

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\mrsys.exe

          Filesize

          216KB

          MD5

          f8e1ddae7c767aed47d46e235b2c0101

          SHA1

          c04a37d52b11f21faf350376b0623f80b19813b2

          SHA256

          acfceb68d41cb775c7570a949a839190c957b1c943ec8d5ab5fb0a6043c74673

          SHA512

          e7f0f974f7f8cba7cce620d3bfa357c9b2dd3d55b2f1fbd22c3632b01c045d0c4ed8eba23594c6ef1bc8f33acd84da6182216625e196a19b0738d1bda20be92d

        • C:\Windows\System\explorer.exe

          Filesize

          216KB

          MD5

          6f04e0c7e48cec5dfe5b3c1634c4d5de

          SHA1

          0c5e67879ddff88275ba496ce0fc440795deff80

          SHA256

          5587b6e1bb5242f00a652980defed2dad4d98adc974ef3ed5ce9553f88eb49ee

          SHA512

          700f96fec7e053c046396f1d671ce4e6297b22de6317ec9fa537452048dc6d16c2c97e5d5df30d1450ea1bb86e0ad2dde285bec7b32c26c445a6eca01687905e

        • C:\Windows\System\spoolsv.exe

          Filesize

          216KB

          MD5

          89d156f8e476a0c63add57bfa8a65a8a

          SHA1

          e716fb095815bfd96a7a6d002a8dafad1213e81c

          SHA256

          1a33e6fd3ddf5d5f54b7eafe7eead5a15f3e1a4e1f19a24137b3abcc82f5e485

          SHA512

          e171978d260317dd8e006d3d47763d93f5b14eeb6313841950021e7cda05a89dd8ceb94d18587893a8447b38e214fb8d4d97037b0323bfa790b2e7564c8d9a30

        • C:\Windows\System\svchost.exe

          Filesize

          216KB

          MD5

          0b1b738bcbd01958022937619c3598be

          SHA1

          37e70914dcb8ee74c0cc1dc93ee86280b649fadc

          SHA256

          672feaf8a00dfbf2309f4bd8cb14aabae5ee4f437e7d00c02ddb27397b0148b5

          SHA512

          948dc15a6303d24be96adc5c2e8d5504e359fc615e7b0c3c150d72894d33dcf24a3a503741b425839f9b6a55afd0207804524876f13899256d51c2ffa53e7973

        • memory/2472-29-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/2472-35-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/3136-36-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/3516-0-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/3516-37-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB