Analysis
-
max time kernel
150s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
04/06/2024, 22:03
Static task
static1
Behavioral task
behavioral1
Sample
5cb51f159da23cb3b2e5db0261292fbf971cfb12c27485e36d8b82de5058ae0f.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
5cb51f159da23cb3b2e5db0261292fbf971cfb12c27485e36d8b82de5058ae0f.exe
Resource
win10v2004-20240426-en
General
-
Target
5cb51f159da23cb3b2e5db0261292fbf971cfb12c27485e36d8b82de5058ae0f.exe
-
Size
65KB
-
MD5
13db7a5460fd9a38f54786a695153506
-
SHA1
a8c3c18d82f6f0b8a12c4301cf8d8e7fc8768bbd
-
SHA256
5cb51f159da23cb3b2e5db0261292fbf971cfb12c27485e36d8b82de5058ae0f
-
SHA512
99a8580cce561b6920c0c2521bbbaa15286d2c3c0e1fd459e4ebcf6848b99756c2fc50d0e2f5201f5c7a9a937eaf9c705703c2c901d6baf12bda2b9b9fcdddf2
-
SSDEEP
1536:ECq3yRuqrI01eArdW/O7JnI2e13XiLij40MkTUVqa/Oug:7WNqkOJWmo1HpM0MkTUmug
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 320 explorer.exe 4740 spoolsv.exe 3692 svchost.exe 2676 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification \??\c:\windows\system\explorer.exe 5cb51f159da23cb3b2e5db0261292fbf971cfb12c27485e36d8b82de5058ae0f.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe svchost.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3916 5cb51f159da23cb3b2e5db0261292fbf971cfb12c27485e36d8b82de5058ae0f.exe 3916 5cb51f159da23cb3b2e5db0261292fbf971cfb12c27485e36d8b82de5058ae0f.exe 320 explorer.exe 320 explorer.exe 320 explorer.exe 320 explorer.exe 320 explorer.exe 320 explorer.exe 3692 svchost.exe 3692 svchost.exe 3692 svchost.exe 3692 svchost.exe 320 explorer.exe 320 explorer.exe 3692 svchost.exe 3692 svchost.exe 320 explorer.exe 320 explorer.exe 3692 svchost.exe 3692 svchost.exe 320 explorer.exe 320 explorer.exe 3692 svchost.exe 3692 svchost.exe 320 explorer.exe 320 explorer.exe 3692 svchost.exe 3692 svchost.exe 320 explorer.exe 320 explorer.exe 3692 svchost.exe 3692 svchost.exe 320 explorer.exe 320 explorer.exe 3692 svchost.exe 3692 svchost.exe 320 explorer.exe 320 explorer.exe 3692 svchost.exe 3692 svchost.exe 320 explorer.exe 320 explorer.exe 3692 svchost.exe 3692 svchost.exe 320 explorer.exe 320 explorer.exe 3692 svchost.exe 3692 svchost.exe 320 explorer.exe 320 explorer.exe 3692 svchost.exe 3692 svchost.exe 320 explorer.exe 320 explorer.exe 3692 svchost.exe 3692 svchost.exe 320 explorer.exe 320 explorer.exe 3692 svchost.exe 3692 svchost.exe 320 explorer.exe 320 explorer.exe 3692 svchost.exe 3692 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 320 explorer.exe 3692 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3916 5cb51f159da23cb3b2e5db0261292fbf971cfb12c27485e36d8b82de5058ae0f.exe 3916 5cb51f159da23cb3b2e5db0261292fbf971cfb12c27485e36d8b82de5058ae0f.exe 320 explorer.exe 320 explorer.exe 4740 spoolsv.exe 4740 spoolsv.exe 3692 svchost.exe 3692 svchost.exe 2676 spoolsv.exe 2676 spoolsv.exe 320 explorer.exe 320 explorer.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 3916 wrote to memory of 320 3916 5cb51f159da23cb3b2e5db0261292fbf971cfb12c27485e36d8b82de5058ae0f.exe 82 PID 3916 wrote to memory of 320 3916 5cb51f159da23cb3b2e5db0261292fbf971cfb12c27485e36d8b82de5058ae0f.exe 82 PID 3916 wrote to memory of 320 3916 5cb51f159da23cb3b2e5db0261292fbf971cfb12c27485e36d8b82de5058ae0f.exe 82 PID 320 wrote to memory of 4740 320 explorer.exe 83 PID 320 wrote to memory of 4740 320 explorer.exe 83 PID 320 wrote to memory of 4740 320 explorer.exe 83 PID 4740 wrote to memory of 3692 4740 spoolsv.exe 84 PID 4740 wrote to memory of 3692 4740 spoolsv.exe 84 PID 4740 wrote to memory of 3692 4740 spoolsv.exe 84 PID 3692 wrote to memory of 2676 3692 svchost.exe 85 PID 3692 wrote to memory of 2676 3692 svchost.exe 85 PID 3692 wrote to memory of 2676 3692 svchost.exe 85 PID 3692 wrote to memory of 5080 3692 svchost.exe 86 PID 3692 wrote to memory of 5080 3692 svchost.exe 86 PID 3692 wrote to memory of 5080 3692 svchost.exe 86 PID 3692 wrote to memory of 2520 3692 svchost.exe 101 PID 3692 wrote to memory of 2520 3692 svchost.exe 101 PID 3692 wrote to memory of 2520 3692 svchost.exe 101 PID 3692 wrote to memory of 4568 3692 svchost.exe 103 PID 3692 wrote to memory of 4568 3692 svchost.exe 103 PID 3692 wrote to memory of 4568 3692 svchost.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\5cb51f159da23cb3b2e5db0261292fbf971cfb12c27485e36d8b82de5058ae0f.exe"C:\Users\Admin\AppData\Local\Temp\5cb51f159da23cb3b2e5db0261292fbf971cfb12c27485e36d8b82de5058ae0f.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3916 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:320 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4740 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3692 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2676
-
-
C:\Windows\SysWOW64\at.exeat 22:05 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:5080
-
-
C:\Windows\SysWOW64\at.exeat 22:06 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:2520
-
-
C:\Windows\SysWOW64\at.exeat 22:07 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:4568
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD56050d80f3d7f0b93ebb8dc238fdb04a8
SHA1f6f49a04e1cd49452c9b5d0b3c8b8d552572efd2
SHA2565c577efc5c0c6283334c44a8765db363a08db9c7a2e3d0ec3055bd808d6ca1cd
SHA512f456a0a192fac717890c663bc1799cbcac71ed529b5f68ff4a6d96f78666a6ffa86257920869c818ff237f189935db20883a0ffbdc702db66c13644c3fb04f7e
-
Filesize
65KB
MD5661eb68e168eb83755f6f1376a39b45c
SHA1e925aef5b29f17d6ab38ac548f0a5afc38150066
SHA25606b149b4615fe6c93cd970b59ce8b40240f1645c3bbe938739a0e80ef881c6d7
SHA51257ee19b610122ff0aebc7d748b22e86efcf8091a698dd895e7287b44e366606ffe7ef5e1864dd05ea96599798b7218f073ae53e0c3ea4a79e094a35bbac47059
-
Filesize
65KB
MD5a4b07da7fa2bd071a1fac6313c6002de
SHA19fc7d76cbb270c93fae0d4c62fe5329919274148
SHA256c4e171c136ae743f9ca94bd3ff681df251f64ed31768df1b44952975ec95fee9
SHA5123ea07e04cda883bff75f70339e156823c04550a0351eb16a79852568d4c7c95ea8292accf679007a95c53e399cbc8327fd27ca559d1891a77b6d865f38fa7de7
-
Filesize
65KB
MD5c925b9a10d6e370081170b13d9078e81
SHA14a7a4cc2bce962a568297080344461b364339153
SHA25664079d956e1af9ce21789c7f0d1e50d404f1d33583c1897f16f8f3497c96c6c2
SHA51208a05f623f7ad42adf0966b461b2ed87ba4f00d4bdbd8e24791f30676c0d1c1d7c0842020ea3e04f1dde485487b8937b314d7526ba613a02df9474be42c69b94