Analysis
-
max time kernel
157s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
03/06/2024, 00:12
Static task
static1
Behavioral task
behavioral1
Sample
81a2b08ade27d47514e9f208bfd8bbd2e5e9487b4aeb7e1132facf39afa10a7e.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
81a2b08ade27d47514e9f208bfd8bbd2e5e9487b4aeb7e1132facf39afa10a7e.exe
Resource
win10v2004-20240226-en
General
-
Target
81a2b08ade27d47514e9f208bfd8bbd2e5e9487b4aeb7e1132facf39afa10a7e.exe
-
Size
65KB
-
MD5
1776870e08d43bad71031a61c0338a53
-
SHA1
436ace6e362807fc0e19ae5aea4ffd7b78d8ee0b
-
SHA256
81a2b08ade27d47514e9f208bfd8bbd2e5e9487b4aeb7e1132facf39afa10a7e
-
SHA512
7f3bd946f304d079ceb96334d69268dfa0259a332b7b99b3f29556a48f7205e86c5df2af863f871f98822094650ba86f2b95341d9c27f248ecfeb61d5e3fba3a
-
SSDEEP
1536:ECq3yRuqrI01eArdW/O7JnI2e13XiLij40MkTUVqa/OuT:7WNqkOJWmo1HpM0MkTUmuT
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 4676 explorer.exe 2360 spoolsv.exe 4232 svchost.exe 224 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe svchost.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe 81a2b08ade27d47514e9f208bfd8bbd2e5e9487b4aeb7e1132facf39afa10a7e.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3148 81a2b08ade27d47514e9f208bfd8bbd2e5e9487b4aeb7e1132facf39afa10a7e.exe 3148 81a2b08ade27d47514e9f208bfd8bbd2e5e9487b4aeb7e1132facf39afa10a7e.exe 4676 explorer.exe 4676 explorer.exe 4676 explorer.exe 4676 explorer.exe 4676 explorer.exe 4676 explorer.exe 4232 svchost.exe 4232 svchost.exe 4232 svchost.exe 4232 svchost.exe 4676 explorer.exe 4676 explorer.exe 4232 svchost.exe 4232 svchost.exe 4676 explorer.exe 4676 explorer.exe 4232 svchost.exe 4232 svchost.exe 4676 explorer.exe 4676 explorer.exe 4232 svchost.exe 4232 svchost.exe 4676 explorer.exe 4676 explorer.exe 4232 svchost.exe 4232 svchost.exe 4676 explorer.exe 4676 explorer.exe 4232 svchost.exe 4232 svchost.exe 4676 explorer.exe 4676 explorer.exe 4232 svchost.exe 4232 svchost.exe 4676 explorer.exe 4676 explorer.exe 4232 svchost.exe 4232 svchost.exe 4676 explorer.exe 4676 explorer.exe 4232 svchost.exe 4232 svchost.exe 4676 explorer.exe 4676 explorer.exe 4232 svchost.exe 4232 svchost.exe 4676 explorer.exe 4676 explorer.exe 4232 svchost.exe 4232 svchost.exe 4676 explorer.exe 4676 explorer.exe 4232 svchost.exe 4232 svchost.exe 4676 explorer.exe 4676 explorer.exe 4232 svchost.exe 4232 svchost.exe 4676 explorer.exe 4676 explorer.exe 4232 svchost.exe 4232 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 4232 svchost.exe 4676 explorer.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3148 81a2b08ade27d47514e9f208bfd8bbd2e5e9487b4aeb7e1132facf39afa10a7e.exe 3148 81a2b08ade27d47514e9f208bfd8bbd2e5e9487b4aeb7e1132facf39afa10a7e.exe 4676 explorer.exe 4676 explorer.exe 2360 spoolsv.exe 2360 spoolsv.exe 4232 svchost.exe 4232 svchost.exe 224 spoolsv.exe 224 spoolsv.exe 4676 explorer.exe 4676 explorer.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 3148 wrote to memory of 4676 3148 81a2b08ade27d47514e9f208bfd8bbd2e5e9487b4aeb7e1132facf39afa10a7e.exe 91 PID 3148 wrote to memory of 4676 3148 81a2b08ade27d47514e9f208bfd8bbd2e5e9487b4aeb7e1132facf39afa10a7e.exe 91 PID 3148 wrote to memory of 4676 3148 81a2b08ade27d47514e9f208bfd8bbd2e5e9487b4aeb7e1132facf39afa10a7e.exe 91 PID 4676 wrote to memory of 2360 4676 explorer.exe 92 PID 4676 wrote to memory of 2360 4676 explorer.exe 92 PID 4676 wrote to memory of 2360 4676 explorer.exe 92 PID 2360 wrote to memory of 4232 2360 spoolsv.exe 93 PID 2360 wrote to memory of 4232 2360 spoolsv.exe 93 PID 2360 wrote to memory of 4232 2360 spoolsv.exe 93 PID 4232 wrote to memory of 224 4232 svchost.exe 94 PID 4232 wrote to memory of 224 4232 svchost.exe 94 PID 4232 wrote to memory of 224 4232 svchost.exe 94 PID 4232 wrote to memory of 5036 4232 svchost.exe 95 PID 4232 wrote to memory of 5036 4232 svchost.exe 95 PID 4232 wrote to memory of 5036 4232 svchost.exe 95 PID 4232 wrote to memory of 4588 4232 svchost.exe 106 PID 4232 wrote to memory of 4588 4232 svchost.exe 106 PID 4232 wrote to memory of 4588 4232 svchost.exe 106 PID 4232 wrote to memory of 4460 4232 svchost.exe 108 PID 4232 wrote to memory of 4460 4232 svchost.exe 108 PID 4232 wrote to memory of 4460 4232 svchost.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\81a2b08ade27d47514e9f208bfd8bbd2e5e9487b4aeb7e1132facf39afa10a7e.exe"C:\Users\Admin\AppData\Local\Temp\81a2b08ade27d47514e9f208bfd8bbd2e5e9487b4aeb7e1132facf39afa10a7e.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3148 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4676 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2360 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4232 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:224
-
-
C:\Windows\SysWOW64\at.exeat 00:14 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:5036
-
-
C:\Windows\SysWOW64\at.exeat 00:15 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:4588
-
-
C:\Windows\SysWOW64\at.exeat 00:16 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:4460
-
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3704 --field-trial-handle=2252,i,16022092570067181109,3235558581947505669,262144 --variations-seed-version /prefetch:81⤵PID:3648
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD5d85acbb987686c64471a3107bd6aea33
SHA11456cc8a34c3e03ef66c9e82c80d36705b7027c5
SHA2563508fd2cade2a2485f1f8bc990572fbad5b07a5d0963ae063d01ece8fa37b280
SHA5120164ea9acc55f36f644e9274b3ece9979997951983cc1cf3f22596eec774a9335f6540105109dc93433e052417796f1d907be41ea91243e9d238f634d1a4a565
-
Filesize
65KB
MD546057c0f1f5d55d9584a6e35fe6272e8
SHA19565e744eda4668793d23f8e54c5523b0ed07f2e
SHA256cad40d777bc80abdf1d4090eb28b8dfb61ad0750867c519faf002974be69b448
SHA512766fbd96c1a3385ac485f9edc2eaf6a7b12ae44e824041e5d9206868696eedd887aac7fc109ebb5c3be9ffab6b57d71e315943319839c56af07f91b05b86e11f
-
Filesize
65KB
MD5f08b97d36365882f056ca4dfb54d8cab
SHA146cc5f6827a3ebcbc6aedbc288b3237b52017798
SHA256637bc1cc1f00954d08ef56fbb1723833dc8d2145f46bbbcd218def9c86e0ea28
SHA5126490c2018009a0bb444beafe3b46870cbbe08fc57113fb77cf56bcc522e961e9b40592d044e8bbea1b458575c701c3ac7d6b5ee025fca0a441d8a8b614996655
-
Filesize
65KB
MD5adf9707f33bffdaf3e7c300653d0784f
SHA1747e386dcfb58574ad7052a679a5b995f0ae0a09
SHA256382297f4b64b0fb8431d4532802216b28083fb847799ef4033af35ce84e01968
SHA512490446613ba0548f3a872e0591b59071ca00a49344a8b7ddf4a10f2c4aee1bf65255dc4b96e7d5f9d0b46c73aa2fadace9b66d1c79f05656e02a77f0b691d1d6