Analysis
-
max time kernel
150s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
03/06/2024, 03:08
Static task
static1
Behavioral task
behavioral1
Sample
bea52030f2d2bb08619532039619c7ee3a6f60fc81d4833cea7ce922138808d0.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
bea52030f2d2bb08619532039619c7ee3a6f60fc81d4833cea7ce922138808d0.exe
Resource
win10v2004-20240426-en
General
-
Target
bea52030f2d2bb08619532039619c7ee3a6f60fc81d4833cea7ce922138808d0.exe
-
Size
65KB
-
MD5
70993d531a81faa3e30833d47630eea3
-
SHA1
9e0a0d41c36b65ed7d77ae81f4634cb25685fa18
-
SHA256
bea52030f2d2bb08619532039619c7ee3a6f60fc81d4833cea7ce922138808d0
-
SHA512
2de6b99f57712f6196d0bbdf796e5bc0af22d48ec8e3f7e962b07d59cc121a4ada369b24b60dc5746471aa66078ea5c44695e9e7cef665958402f599178d833c
-
SSDEEP
1536:ECq3yRuqrI01eArdW/O7JnI2e13XiLij40MkTUVqa/OuYkkkkkkkkkkkkkkkkkkq:7WNqkOJWmo1HpM0MkTUmub
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 464 explorer.exe 3040 spoolsv.exe 4084 svchost.exe 2336 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification C:\Windows\system\udsys.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe bea52030f2d2bb08619532039619c7ee3a6f60fc81d4833cea7ce922138808d0.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 948 bea52030f2d2bb08619532039619c7ee3a6f60fc81d4833cea7ce922138808d0.exe 948 bea52030f2d2bb08619532039619c7ee3a6f60fc81d4833cea7ce922138808d0.exe 464 explorer.exe 464 explorer.exe 464 explorer.exe 464 explorer.exe 464 explorer.exe 464 explorer.exe 464 explorer.exe 464 explorer.exe 4084 svchost.exe 4084 svchost.exe 4084 svchost.exe 4084 svchost.exe 464 explorer.exe 464 explorer.exe 4084 svchost.exe 4084 svchost.exe 464 explorer.exe 464 explorer.exe 4084 svchost.exe 4084 svchost.exe 464 explorer.exe 464 explorer.exe 4084 svchost.exe 4084 svchost.exe 464 explorer.exe 464 explorer.exe 4084 svchost.exe 4084 svchost.exe 464 explorer.exe 464 explorer.exe 4084 svchost.exe 4084 svchost.exe 464 explorer.exe 464 explorer.exe 4084 svchost.exe 4084 svchost.exe 464 explorer.exe 464 explorer.exe 4084 svchost.exe 4084 svchost.exe 464 explorer.exe 464 explorer.exe 4084 svchost.exe 4084 svchost.exe 464 explorer.exe 464 explorer.exe 4084 svchost.exe 4084 svchost.exe 464 explorer.exe 464 explorer.exe 4084 svchost.exe 4084 svchost.exe 464 explorer.exe 464 explorer.exe 4084 svchost.exe 4084 svchost.exe 464 explorer.exe 464 explorer.exe 4084 svchost.exe 4084 svchost.exe 464 explorer.exe 464 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 464 explorer.exe 4084 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 948 bea52030f2d2bb08619532039619c7ee3a6f60fc81d4833cea7ce922138808d0.exe 948 bea52030f2d2bb08619532039619c7ee3a6f60fc81d4833cea7ce922138808d0.exe 464 explorer.exe 464 explorer.exe 3040 spoolsv.exe 3040 spoolsv.exe 4084 svchost.exe 4084 svchost.exe 2336 spoolsv.exe 2336 spoolsv.exe 464 explorer.exe 464 explorer.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 948 wrote to memory of 464 948 bea52030f2d2bb08619532039619c7ee3a6f60fc81d4833cea7ce922138808d0.exe 82 PID 948 wrote to memory of 464 948 bea52030f2d2bb08619532039619c7ee3a6f60fc81d4833cea7ce922138808d0.exe 82 PID 948 wrote to memory of 464 948 bea52030f2d2bb08619532039619c7ee3a6f60fc81d4833cea7ce922138808d0.exe 82 PID 464 wrote to memory of 3040 464 explorer.exe 83 PID 464 wrote to memory of 3040 464 explorer.exe 83 PID 464 wrote to memory of 3040 464 explorer.exe 83 PID 3040 wrote to memory of 4084 3040 spoolsv.exe 85 PID 3040 wrote to memory of 4084 3040 spoolsv.exe 85 PID 3040 wrote to memory of 4084 3040 spoolsv.exe 85 PID 4084 wrote to memory of 2336 4084 svchost.exe 87 PID 4084 wrote to memory of 2336 4084 svchost.exe 87 PID 4084 wrote to memory of 2336 4084 svchost.exe 87 PID 4084 wrote to memory of 2124 4084 svchost.exe 89 PID 4084 wrote to memory of 2124 4084 svchost.exe 89 PID 4084 wrote to memory of 2124 4084 svchost.exe 89 PID 4084 wrote to memory of 936 4084 svchost.exe 99 PID 4084 wrote to memory of 936 4084 svchost.exe 99 PID 4084 wrote to memory of 936 4084 svchost.exe 99 PID 4084 wrote to memory of 2112 4084 svchost.exe 101 PID 4084 wrote to memory of 2112 4084 svchost.exe 101 PID 4084 wrote to memory of 2112 4084 svchost.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\bea52030f2d2bb08619532039619c7ee3a6f60fc81d4833cea7ce922138808d0.exe"C:\Users\Admin\AppData\Local\Temp\bea52030f2d2bb08619532039619c7ee3a6f60fc81d4833cea7ce922138808d0.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:948 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:464 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3040 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4084 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2336
-
-
C:\Windows\SysWOW64\at.exeat 03:11 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:2124
-
-
C:\Windows\SysWOW64\at.exeat 03:12 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:936
-
-
C:\Windows\SysWOW64\at.exeat 03:13 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:2112
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD517be95bf78869484e7f713fd8af0009a
SHA173f2e3422d9d70991b7dab10d54efafc5490a56c
SHA2561570d64858075a81777ddd8b3a6c7830ac98ea8659f10530e9e942d0c2105f73
SHA512caf50338977480d595423d9432c3f60831c04fa2226e6c1f033769aabece08c8e793c63ac1210afc30dd0d98dc033063c568a511627eb3c510cffb9fd4d8db73
-
Filesize
65KB
MD5ade5553517e5a7e9b26840554015426f
SHA1fdb7b07dbe09157f0ff285d7d9680133a768a46f
SHA256a4d47d3adea2e907fba4e0718c0fb622600ff146b6ba34747f7cdc67638491e5
SHA512be5b164ba7fd6891024699bca12cdbbe98f6fe14dd29270a6cb0570a6746dc9589051cf4526eb3fc3b2fa8adde07792e30b17a4405c7acf67d609f9f27d26189
-
Filesize
65KB
MD5e8f87545f433b92b5e753f5cbb26d9a5
SHA1aba8a95e0cb523f4ac5301d076886bdeff420d32
SHA2569cb6263e5813baf0e042b14740f86511762ad5240ec9d2c4d71fd2305988bc83
SHA512a2706fe9b6733b8c0aa7c5f3f350e0570e5058b4cc0ba1007c45ee82428868d03b35e3914688d5c6e10dce1c716b5669cd467ec25d1e24aad21997f1bc773f3e
-
Filesize
65KB
MD51bebaca87ff895ad61cbd2125e77e669
SHA1feeb206d64c9864f89dcab086e5b7c727b13a4e0
SHA256f2e72652ec5ba0368ec82d955bb689b4ae49e149ad9bbf87e06abfcdd6751098
SHA5124c53004958f93cfdfdd3280262fc414a44ee5cd21092df98e67bb35db33e14d847e0978e02cf6aba217c030a6e374e389b59695e38900d7d29ff8bd31c82c76c