Analysis

  • max time kernel
    150s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/06/2024, 03:08

General

  • Target

    bea52030f2d2bb08619532039619c7ee3a6f60fc81d4833cea7ce922138808d0.exe

  • Size

    65KB

  • MD5

    70993d531a81faa3e30833d47630eea3

  • SHA1

    9e0a0d41c36b65ed7d77ae81f4634cb25685fa18

  • SHA256

    bea52030f2d2bb08619532039619c7ee3a6f60fc81d4833cea7ce922138808d0

  • SHA512

    2de6b99f57712f6196d0bbdf796e5bc0af22d48ec8e3f7e962b07d59cc121a4ada369b24b60dc5746471aa66078ea5c44695e9e7cef665958402f599178d833c

  • SSDEEP

    1536:ECq3yRuqrI01eArdW/O7JnI2e13XiLij40MkTUVqa/OuYkkkkkkkkkkkkkkkkkkq:7WNqkOJWmo1HpM0MkTUmub

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Modifies Installed Components in the registry 2 TTPs 8 IoCs
  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bea52030f2d2bb08619532039619c7ee3a6f60fc81d4833cea7ce922138808d0.exe
    "C:\Users\Admin\AppData\Local\Temp\bea52030f2d2bb08619532039619c7ee3a6f60fc81d4833cea7ce922138808d0.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:948
    • \??\c:\windows\system\explorer.exe
      c:\windows\system\explorer.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visiblity of hidden/system files in Explorer
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:464
      • \??\c:\windows\system\spoolsv.exe
        c:\windows\system\spoolsv.exe SE
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3040
        • \??\c:\windows\system\svchost.exe
          c:\windows\system\svchost.exe
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visiblity of hidden/system files in Explorer
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:4084
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe PR
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:2336
          • C:\Windows\SysWOW64\at.exe
            at 03:11 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
            5⤵
              PID:2124
            • C:\Windows\SysWOW64\at.exe
              at 03:12 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
              5⤵
                PID:936
              • C:\Windows\SysWOW64\at.exe
                at 03:13 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
                5⤵
                  PID:2112

        Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Roaming\mrsys.exe

                Filesize

                65KB

                MD5

                17be95bf78869484e7f713fd8af0009a

                SHA1

                73f2e3422d9d70991b7dab10d54efafc5490a56c

                SHA256

                1570d64858075a81777ddd8b3a6c7830ac98ea8659f10530e9e942d0c2105f73

                SHA512

                caf50338977480d595423d9432c3f60831c04fa2226e6c1f033769aabece08c8e793c63ac1210afc30dd0d98dc033063c568a511627eb3c510cffb9fd4d8db73

              • C:\Windows\System\spoolsv.exe

                Filesize

                65KB

                MD5

                ade5553517e5a7e9b26840554015426f

                SHA1

                fdb7b07dbe09157f0ff285d7d9680133a768a46f

                SHA256

                a4d47d3adea2e907fba4e0718c0fb622600ff146b6ba34747f7cdc67638491e5

                SHA512

                be5b164ba7fd6891024699bca12cdbbe98f6fe14dd29270a6cb0570a6746dc9589051cf4526eb3fc3b2fa8adde07792e30b17a4405c7acf67d609f9f27d26189

              • C:\Windows\System\svchost.exe

                Filesize

                65KB

                MD5

                e8f87545f433b92b5e753f5cbb26d9a5

                SHA1

                aba8a95e0cb523f4ac5301d076886bdeff420d32

                SHA256

                9cb6263e5813baf0e042b14740f86511762ad5240ec9d2c4d71fd2305988bc83

                SHA512

                a2706fe9b6733b8c0aa7c5f3f350e0570e5058b4cc0ba1007c45ee82428868d03b35e3914688d5c6e10dce1c716b5669cd467ec25d1e24aad21997f1bc773f3e

              • \??\c:\windows\system\explorer.exe

                Filesize

                65KB

                MD5

                1bebaca87ff895ad61cbd2125e77e669

                SHA1

                feeb206d64c9864f89dcab086e5b7c727b13a4e0

                SHA256

                f2e72652ec5ba0368ec82d955bb689b4ae49e149ad9bbf87e06abfcdd6751098

                SHA512

                4c53004958f93cfdfdd3280262fc414a44ee5cd21092df98e67bb35db33e14d847e0978e02cf6aba217c030a6e374e389b59695e38900d7d29ff8bd31c82c76c

              • memory/464-13-0x0000000000400000-0x0000000000431000-memory.dmp

                Filesize

                196KB

              • memory/464-68-0x0000000000400000-0x0000000000431000-memory.dmp

                Filesize

                196KB

              • memory/464-14-0x0000000075460000-0x00000000755BD000-memory.dmp

                Filesize

                1.4MB

              • memory/464-17-0x0000000000400000-0x0000000000431000-memory.dmp

                Filesize

                196KB

              • memory/464-58-0x0000000000400000-0x0000000000431000-memory.dmp

                Filesize

                196KB

              • memory/948-2-0x0000000075460000-0x00000000755BD000-memory.dmp

                Filesize

                1.4MB

              • memory/948-1-0x00000000001C0000-0x00000000001C4000-memory.dmp

                Filesize

                16KB

              • memory/948-3-0x0000000000400000-0x0000000000431000-memory.dmp

                Filesize

                196KB

              • memory/948-0-0x0000000000400000-0x0000000000431000-memory.dmp

                Filesize

                196KB

              • memory/948-5-0x0000000000401000-0x000000000042E000-memory.dmp

                Filesize

                180KB

              • memory/948-56-0x0000000000401000-0x000000000042E000-memory.dmp

                Filesize

                180KB

              • memory/948-55-0x0000000000400000-0x0000000000431000-memory.dmp

                Filesize

                196KB

              • memory/2336-43-0x0000000075460000-0x00000000755BD000-memory.dmp

                Filesize

                1.4MB

              • memory/2336-49-0x0000000000400000-0x0000000000431000-memory.dmp

                Filesize

                196KB

              • memory/3040-25-0x0000000000400000-0x0000000000431000-memory.dmp

                Filesize

                196KB

              • memory/3040-53-0x0000000000400000-0x0000000000431000-memory.dmp

                Filesize

                196KB

              • memory/3040-26-0x0000000075460000-0x00000000755BD000-memory.dmp

                Filesize

                1.4MB

              • memory/4084-40-0x0000000000400000-0x0000000000431000-memory.dmp

                Filesize

                196KB

              • memory/4084-59-0x0000000000400000-0x0000000000431000-memory.dmp

                Filesize

                196KB

              • memory/4084-36-0x0000000075460000-0x00000000755BD000-memory.dmp

                Filesize

                1.4MB