Analysis
-
max time kernel
150s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
02/06/2024, 20:40
Static task
static1
Behavioral task
behavioral1
Sample
3511f46e5a8756eb55109c119413b5a403a6a4b48a034517263932006bcd5391.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3511f46e5a8756eb55109c119413b5a403a6a4b48a034517263932006bcd5391.exe
Resource
win10v2004-20240426-en
General
-
Target
3511f46e5a8756eb55109c119413b5a403a6a4b48a034517263932006bcd5391.exe
-
Size
199KB
-
MD5
9fb28fbd3e062a1f91cf45004d2f796b
-
SHA1
bbe609bacd8179b61b22da7a9dcd172b71505d95
-
SHA256
3511f46e5a8756eb55109c119413b5a403a6a4b48a034517263932006bcd5391
-
SHA512
16ecae84da06a6b33ec52abf60373a163fbb354352124211558ae2a0013b7807f70cddedd78c888f624dc0d6180685926df2dbdfa27bd88a1c0ab52c67c02c90
-
SSDEEP
3072:7vEfVUzSLhIVbV6i5LirrlZrHyrUHUckoMQ2RN6u4Pmu1:7vEN2U+T6i5LirrllHy4HUcMQY6j
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 4004 explorer.exe 3136 spoolsv.exe 1260 svchost.exe 2472 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe svchost.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe 3511f46e5a8756eb55109c119413b5a403a6a4b48a034517263932006bcd5391.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3516 3511f46e5a8756eb55109c119413b5a403a6a4b48a034517263932006bcd5391.exe 3516 3511f46e5a8756eb55109c119413b5a403a6a4b48a034517263932006bcd5391.exe 4004 explorer.exe 4004 explorer.exe 4004 explorer.exe 4004 explorer.exe 4004 explorer.exe 4004 explorer.exe 1260 svchost.exe 1260 svchost.exe 1260 svchost.exe 1260 svchost.exe 4004 explorer.exe 4004 explorer.exe 1260 svchost.exe 1260 svchost.exe 4004 explorer.exe 4004 explorer.exe 1260 svchost.exe 1260 svchost.exe 4004 explorer.exe 4004 explorer.exe 1260 svchost.exe 1260 svchost.exe 4004 explorer.exe 4004 explorer.exe 1260 svchost.exe 1260 svchost.exe 4004 explorer.exe 4004 explorer.exe 1260 svchost.exe 1260 svchost.exe 4004 explorer.exe 4004 explorer.exe 1260 svchost.exe 1260 svchost.exe 4004 explorer.exe 4004 explorer.exe 1260 svchost.exe 1260 svchost.exe 4004 explorer.exe 4004 explorer.exe 1260 svchost.exe 1260 svchost.exe 4004 explorer.exe 4004 explorer.exe 1260 svchost.exe 1260 svchost.exe 4004 explorer.exe 4004 explorer.exe 1260 svchost.exe 1260 svchost.exe 4004 explorer.exe 4004 explorer.exe 1260 svchost.exe 1260 svchost.exe 4004 explorer.exe 4004 explorer.exe 1260 svchost.exe 1260 svchost.exe 4004 explorer.exe 4004 explorer.exe 1260 svchost.exe 1260 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 4004 explorer.exe 1260 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3516 3511f46e5a8756eb55109c119413b5a403a6a4b48a034517263932006bcd5391.exe 3516 3511f46e5a8756eb55109c119413b5a403a6a4b48a034517263932006bcd5391.exe 4004 explorer.exe 4004 explorer.exe 3136 spoolsv.exe 3136 spoolsv.exe 1260 svchost.exe 1260 svchost.exe 2472 spoolsv.exe 2472 spoolsv.exe 4004 explorer.exe 4004 explorer.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 3516 wrote to memory of 4004 3516 3511f46e5a8756eb55109c119413b5a403a6a4b48a034517263932006bcd5391.exe 84 PID 3516 wrote to memory of 4004 3516 3511f46e5a8756eb55109c119413b5a403a6a4b48a034517263932006bcd5391.exe 84 PID 3516 wrote to memory of 4004 3516 3511f46e5a8756eb55109c119413b5a403a6a4b48a034517263932006bcd5391.exe 84 PID 4004 wrote to memory of 3136 4004 explorer.exe 85 PID 4004 wrote to memory of 3136 4004 explorer.exe 85 PID 4004 wrote to memory of 3136 4004 explorer.exe 85 PID 3136 wrote to memory of 1260 3136 spoolsv.exe 86 PID 3136 wrote to memory of 1260 3136 spoolsv.exe 86 PID 3136 wrote to memory of 1260 3136 spoolsv.exe 86 PID 1260 wrote to memory of 2472 1260 svchost.exe 88 PID 1260 wrote to memory of 2472 1260 svchost.exe 88 PID 1260 wrote to memory of 2472 1260 svchost.exe 88 PID 1260 wrote to memory of 2220 1260 svchost.exe 89 PID 1260 wrote to memory of 2220 1260 svchost.exe 89 PID 1260 wrote to memory of 2220 1260 svchost.exe 89 PID 1260 wrote to memory of 3188 1260 svchost.exe 101 PID 1260 wrote to memory of 3188 1260 svchost.exe 101 PID 1260 wrote to memory of 3188 1260 svchost.exe 101 PID 1260 wrote to memory of 4484 1260 svchost.exe 103 PID 1260 wrote to memory of 4484 1260 svchost.exe 103 PID 1260 wrote to memory of 4484 1260 svchost.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\3511f46e5a8756eb55109c119413b5a403a6a4b48a034517263932006bcd5391.exe"C:\Users\Admin\AppData\Local\Temp\3511f46e5a8756eb55109c119413b5a403a6a4b48a034517263932006bcd5391.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3516 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4004 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3136 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1260 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2472
-
-
C:\Windows\SysWOW64\at.exeat 20:42 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:2220
-
-
C:\Windows\SysWOW64\at.exeat 20:43 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:3188
-
-
C:\Windows\SysWOW64\at.exeat 20:44 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:4484
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
216KB
MD5f8e1ddae7c767aed47d46e235b2c0101
SHA1c04a37d52b11f21faf350376b0623f80b19813b2
SHA256acfceb68d41cb775c7570a949a839190c957b1c943ec8d5ab5fb0a6043c74673
SHA512e7f0f974f7f8cba7cce620d3bfa357c9b2dd3d55b2f1fbd22c3632b01c045d0c4ed8eba23594c6ef1bc8f33acd84da6182216625e196a19b0738d1bda20be92d
-
Filesize
216KB
MD56f04e0c7e48cec5dfe5b3c1634c4d5de
SHA10c5e67879ddff88275ba496ce0fc440795deff80
SHA2565587b6e1bb5242f00a652980defed2dad4d98adc974ef3ed5ce9553f88eb49ee
SHA512700f96fec7e053c046396f1d671ce4e6297b22de6317ec9fa537452048dc6d16c2c97e5d5df30d1450ea1bb86e0ad2dde285bec7b32c26c445a6eca01687905e
-
Filesize
216KB
MD589d156f8e476a0c63add57bfa8a65a8a
SHA1e716fb095815bfd96a7a6d002a8dafad1213e81c
SHA2561a33e6fd3ddf5d5f54b7eafe7eead5a15f3e1a4e1f19a24137b3abcc82f5e485
SHA512e171978d260317dd8e006d3d47763d93f5b14eeb6313841950021e7cda05a89dd8ceb94d18587893a8447b38e214fb8d4d97037b0323bfa790b2e7564c8d9a30
-
Filesize
216KB
MD50b1b738bcbd01958022937619c3598be
SHA137e70914dcb8ee74c0cc1dc93ee86280b649fadc
SHA256672feaf8a00dfbf2309f4bd8cb14aabae5ee4f437e7d00c02ddb27397b0148b5
SHA512948dc15a6303d24be96adc5c2e8d5504e359fc615e7b0c3c150d72894d33dcf24a3a503741b425839f9b6a55afd0207804524876f13899256d51c2ffa53e7973