Malware Analysis Report

2025-01-06 08:57

Sample ID 240604-a9faksgc29
Target 9fa09c0ba494ce791441b2f413a9c74d2eeba7a716d4d4711dda9f730050ec13
SHA256 9fa09c0ba494ce791441b2f413a9c74d2eeba7a716d4d4711dda9f730050ec13
Tags
evasion persistence
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

9fa09c0ba494ce791441b2f413a9c74d2eeba7a716d4d4711dda9f730050ec13

Threat Level: Known bad

The file 9fa09c0ba494ce791441b2f413a9c74d2eeba7a716d4d4711dda9f730050ec13 was found to be: Known bad.

Malicious Activity Summary

evasion persistence

Modifies visiblity of hidden/system files in Explorer

Modifies WinLogon for persistence

Modifies Installed Components in the registry

Executes dropped EXE

Loads dropped DLL

Adds Run key to start application

Drops file in Windows directory

Enumerates physical storage devices

Unsigned PE

Suspicious behavior: EnumeratesProcesses

Suspicious behavior: GetForegroundWindowSpam

Suspicious use of SetWindowsHookEx

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-06-04 00:54

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-04 00:54

Reported

2024-06-04 00:57

Platform

win7-20240221-en

Max time kernel

150s

Max time network

129s

Command Line

"C:\Users\Admin\AppData\Local\Temp\9fa09c0ba494ce791441b2f413a9c74d2eeba7a716d4d4711dda9f730050ec13.exe"

Signatures

Modifies WinLogon for persistence

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" \??\c:\windows\system\explorer.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" \??\c:\windows\system\svchost.exe N/A

Modifies visiblity of hidden/system files in Explorer

evasion
Description Indicator Process Target
Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" \??\c:\windows\system\explorer.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" \??\c:\windows\system\svchost.exe N/A

Modifies Installed Components in the registry

persistence
Description Indicator Process Target
Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} \??\c:\windows\system\svchost.exe N/A
Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} \??\c:\windows\system\explorer.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" \??\c:\windows\system\explorer.exe N/A
Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} \??\c:\windows\system\svchost.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" \??\c:\windows\system\svchost.exe N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} \??\c:\windows\system\svchost.exe N/A
Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} \??\c:\windows\system\svchost.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" \??\c:\windows\system\svchost.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\svchost.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" \??\c:\windows\system\svchost.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" \??\c:\windows\system\svchost.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" \??\c:\windows\system\explorer.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" \??\c:\windows\system\explorer.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\system\udsys.exe \??\c:\windows\system\explorer.exe N/A
File opened for modification \??\c:\windows\system\explorer.exe C:\Users\Admin\AppData\Local\Temp\9fa09c0ba494ce791441b2f413a9c74d2eeba7a716d4d4711dda9f730050ec13.exe N/A
File opened for modification \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\explorer.exe N/A
File opened for modification \??\c:\windows\system\svchost.exe \??\c:\windows\system\spoolsv.exe N/A
File opened for modification \??\c:\windows\system\explorer.exe \??\c:\windows\system\explorer.exe N/A
File opened for modification \??\c:\windows\system\svchost.exe \??\c:\windows\system\svchost.exe N/A

Enumerates physical storage devices

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\9fa09c0ba494ce791441b2f413a9c74d2eeba7a716d4d4711dda9f730050ec13.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\svchost.exe N/A
N/A N/A \??\c:\windows\system\svchost.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\svchost.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\svchost.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\svchost.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\svchost.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\svchost.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\svchost.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\svchost.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\svchost.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\svchost.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\svchost.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\svchost.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\svchost.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\svchost.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\svchost.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\svchost.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\svchost.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\svchost.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\svchost.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\svchost.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\svchost.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\svchost.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\svchost.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\svchost.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\svchost.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\svchost.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\svchost.exe N/A
N/A N/A \??\c:\windows\system\svchost.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\svchost.exe N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\svchost.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2184 wrote to memory of 1940 N/A C:\Users\Admin\AppData\Local\Temp\9fa09c0ba494ce791441b2f413a9c74d2eeba7a716d4d4711dda9f730050ec13.exe \??\c:\windows\system\explorer.exe
PID 2184 wrote to memory of 1940 N/A C:\Users\Admin\AppData\Local\Temp\9fa09c0ba494ce791441b2f413a9c74d2eeba7a716d4d4711dda9f730050ec13.exe \??\c:\windows\system\explorer.exe
PID 2184 wrote to memory of 1940 N/A C:\Users\Admin\AppData\Local\Temp\9fa09c0ba494ce791441b2f413a9c74d2eeba7a716d4d4711dda9f730050ec13.exe \??\c:\windows\system\explorer.exe
PID 2184 wrote to memory of 1940 N/A C:\Users\Admin\AppData\Local\Temp\9fa09c0ba494ce791441b2f413a9c74d2eeba7a716d4d4711dda9f730050ec13.exe \??\c:\windows\system\explorer.exe
PID 1940 wrote to memory of 2760 N/A \??\c:\windows\system\explorer.exe \??\c:\windows\system\spoolsv.exe
PID 1940 wrote to memory of 2760 N/A \??\c:\windows\system\explorer.exe \??\c:\windows\system\spoolsv.exe
PID 1940 wrote to memory of 2760 N/A \??\c:\windows\system\explorer.exe \??\c:\windows\system\spoolsv.exe
PID 1940 wrote to memory of 2760 N/A \??\c:\windows\system\explorer.exe \??\c:\windows\system\spoolsv.exe
PID 2760 wrote to memory of 2408 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\svchost.exe
PID 2760 wrote to memory of 2408 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\svchost.exe
PID 2760 wrote to memory of 2408 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\svchost.exe
PID 2760 wrote to memory of 2408 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\svchost.exe
PID 2408 wrote to memory of 2376 N/A \??\c:\windows\system\svchost.exe \??\c:\windows\system\spoolsv.exe
PID 2408 wrote to memory of 2376 N/A \??\c:\windows\system\svchost.exe \??\c:\windows\system\spoolsv.exe
PID 2408 wrote to memory of 2376 N/A \??\c:\windows\system\svchost.exe \??\c:\windows\system\spoolsv.exe
PID 2408 wrote to memory of 2376 N/A \??\c:\windows\system\svchost.exe \??\c:\windows\system\spoolsv.exe
PID 2408 wrote to memory of 556 N/A \??\c:\windows\system\svchost.exe C:\Windows\SysWOW64\at.exe
PID 2408 wrote to memory of 556 N/A \??\c:\windows\system\svchost.exe C:\Windows\SysWOW64\at.exe
PID 2408 wrote to memory of 556 N/A \??\c:\windows\system\svchost.exe C:\Windows\SysWOW64\at.exe
PID 2408 wrote to memory of 556 N/A \??\c:\windows\system\svchost.exe C:\Windows\SysWOW64\at.exe
PID 2408 wrote to memory of 756 N/A \??\c:\windows\system\svchost.exe C:\Windows\SysWOW64\at.exe
PID 2408 wrote to memory of 756 N/A \??\c:\windows\system\svchost.exe C:\Windows\SysWOW64\at.exe
PID 2408 wrote to memory of 756 N/A \??\c:\windows\system\svchost.exe C:\Windows\SysWOW64\at.exe
PID 2408 wrote to memory of 756 N/A \??\c:\windows\system\svchost.exe C:\Windows\SysWOW64\at.exe
PID 2408 wrote to memory of 2960 N/A \??\c:\windows\system\svchost.exe C:\Windows\SysWOW64\at.exe
PID 2408 wrote to memory of 2960 N/A \??\c:\windows\system\svchost.exe C:\Windows\SysWOW64\at.exe
PID 2408 wrote to memory of 2960 N/A \??\c:\windows\system\svchost.exe C:\Windows\SysWOW64\at.exe
PID 2408 wrote to memory of 2960 N/A \??\c:\windows\system\svchost.exe C:\Windows\SysWOW64\at.exe

Processes

C:\Users\Admin\AppData\Local\Temp\9fa09c0ba494ce791441b2f413a9c74d2eeba7a716d4d4711dda9f730050ec13.exe

"C:\Users\Admin\AppData\Local\Temp\9fa09c0ba494ce791441b2f413a9c74d2eeba7a716d4d4711dda9f730050ec13.exe"

\??\c:\windows\system\explorer.exe

c:\windows\system\explorer.exe

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\svchost.exe

c:\windows\system\svchost.exe

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe PR

C:\Windows\SysWOW64\at.exe

at 00:56 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe

C:\Windows\SysWOW64\at.exe

at 00:57 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe

C:\Windows\SysWOW64\at.exe

at 00:58 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe

Network

N/A

Files

memory/2184-1-0x0000000000020000-0x0000000000024000-memory.dmp

memory/2184-0-0x0000000000400000-0x0000000000431000-memory.dmp

memory/2184-4-0x0000000000401000-0x000000000042E000-memory.dmp

memory/2184-2-0x0000000072940000-0x0000000072A93000-memory.dmp

memory/2184-3-0x0000000000400000-0x0000000000431000-memory.dmp

\Windows\system\explorer.exe

MD5 3bf3a2739871aa969fb11750be8028bd
SHA1 29bf95792fa72469fb56a5b95190d2fbe6746093
SHA256 073eeebcb439530b91616764ab7c9e296b70805074b5b29800836efc56bb0f9a
SHA512 c28240c32e859af895ac35d51d2c9794ce23c70ff047a9c23799d0106137b3ebf1f5809a41031c6304f2761a6cbc44daf6ffa97b0353a15b314f90773e48eaf9

memory/1940-19-0x0000000000400000-0x0000000000431000-memory.dmp

memory/2184-18-0x0000000002810000-0x0000000002841000-memory.dmp

memory/2184-12-0x0000000002810000-0x0000000002841000-memory.dmp

memory/1940-20-0x0000000072940000-0x0000000072A93000-memory.dmp

memory/1940-22-0x0000000000400000-0x0000000000431000-memory.dmp

\Windows\system\spoolsv.exe

MD5 b8b1571089806befc5380c57b01d43c4
SHA1 e4ee3e44ff6c86d2dec7cc72b8f473f7b7a9741a
SHA256 09acb1148818f0cb4e78e6b92b23b6a7648eac6a295b2f79460ae3baee3e3caf
SHA512 b145ba642294d6e00a25c2d83b81fe8552d5ea341df22ceaea0b62dcb4749a2348298bb546fd3120eae0b54fe0f0f7eff88302abf75d6aea5d86babffba34b84

\Windows\system\svchost.exe

MD5 07bfb5ea69548fdf90080d2e3c8d8202
SHA1 b3a0db22646b89c07f1f55fa23db9f2752443c0c
SHA256 7230be4da5490fac9dfabddb069c95758404642e347a33737d87793df5836539
SHA512 855a108f924c4a5d9479d5cbb93483b88efad12ac6f3e6421fc6ec38b9ca6009311c77a181adb7c89cf5fa4e663b3248d79413ef0226624addf4f798194fc730

memory/2760-38-0x0000000072940000-0x0000000072A93000-memory.dmp

memory/2184-56-0x0000000000401000-0x000000000042E000-memory.dmp

memory/2408-62-0x0000000000400000-0x0000000000431000-memory.dmp

memory/2376-69-0x0000000072940000-0x0000000072A93000-memory.dmp

memory/2408-68-0x0000000002620000-0x0000000002651000-memory.dmp

memory/2760-78-0x0000000000400000-0x0000000000431000-memory.dmp

C:\Users\Admin\AppData\Roaming\mrsys.exe

MD5 49aacbfca01411da40a9c1cb9af390dd
SHA1 047c9958da68257104cd6dfc57fcd11187616a03
SHA256 6c7efc200d255382f074f4244971a29008ecd0aa16393a38d79088e421edf39a
SHA512 25855c9bbcd4073971233bae63c82757b6693c8e6ac4cbcbce6964489d1428d118e97d236267c5dd7178b98b8f82bf212736e0a70bc3938d270c8ecbc7a90040

memory/2184-80-0x0000000000400000-0x0000000000431000-memory.dmp

memory/2184-81-0x0000000000401000-0x000000000042E000-memory.dmp

memory/2376-77-0x0000000000400000-0x0000000000431000-memory.dmp

memory/1940-66-0x0000000000400000-0x0000000000431000-memory.dmp

memory/2408-57-0x0000000072940000-0x0000000072A93000-memory.dmp

memory/2184-54-0x0000000000020000-0x0000000000024000-memory.dmp

memory/2760-43-0x0000000000400000-0x0000000000431000-memory.dmp

memory/2760-39-0x0000000000400000-0x0000000000431000-memory.dmp

memory/2760-37-0x0000000000400000-0x0000000000431000-memory.dmp

memory/1940-36-0x0000000002DA0000-0x0000000002DD1000-memory.dmp

memory/1940-83-0x0000000000400000-0x0000000000431000-memory.dmp

memory/2408-84-0x0000000000400000-0x0000000000431000-memory.dmp

memory/1940-93-0x0000000000400000-0x0000000000431000-memory.dmp

\??\PIPE\atsvc

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-04 00:54

Reported

2024-06-04 00:57

Platform

win10v2004-20240508-en

Max time kernel

150s

Max time network

150s

Command Line

"C:\Users\Admin\AppData\Local\Temp\9fa09c0ba494ce791441b2f413a9c74d2eeba7a716d4d4711dda9f730050ec13.exe"

Signatures

Modifies WinLogon for persistence

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" \??\c:\windows\system\svchost.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" \??\c:\windows\system\explorer.exe N/A

Modifies visiblity of hidden/system files in Explorer

evasion
Description Indicator Process Target
Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" \??\c:\windows\system\explorer.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" \??\c:\windows\system\svchost.exe N/A

Modifies Installed Components in the registry

persistence
Description Indicator Process Target
Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} \??\c:\windows\system\svchost.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" \??\c:\windows\system\svchost.exe N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} \??\c:\windows\system\svchost.exe N/A
Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} \??\c:\windows\system\svchost.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" \??\c:\windows\system\svchost.exe N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} \??\c:\windows\system\svchost.exe N/A
Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} \??\c:\windows\system\explorer.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" \??\c:\windows\system\explorer.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\svchost.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" \??\c:\windows\system\svchost.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" \??\c:\windows\system\explorer.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" \??\c:\windows\system\explorer.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" \??\c:\windows\system\svchost.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File opened for modification \??\c:\windows\system\explorer.exe C:\Users\Admin\AppData\Local\Temp\9fa09c0ba494ce791441b2f413a9c74d2eeba7a716d4d4711dda9f730050ec13.exe N/A
File opened for modification \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\explorer.exe N/A
File opened for modification \??\c:\windows\system\svchost.exe \??\c:\windows\system\spoolsv.exe N/A
File opened for modification \??\c:\windows\system\explorer.exe \??\c:\windows\system\explorer.exe N/A
File opened for modification \??\c:\windows\system\svchost.exe \??\c:\windows\system\svchost.exe N/A
File opened for modification C:\Windows\system\udsys.exe \??\c:\windows\system\explorer.exe N/A

Enumerates physical storage devices

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\9fa09c0ba494ce791441b2f413a9c74d2eeba7a716d4d4711dda9f730050ec13.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\9fa09c0ba494ce791441b2f413a9c74d2eeba7a716d4d4711dda9f730050ec13.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\svchost.exe N/A
N/A N/A \??\c:\windows\system\svchost.exe N/A
N/A N/A \??\c:\windows\system\svchost.exe N/A
N/A N/A \??\c:\windows\system\svchost.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\svchost.exe N/A
N/A N/A \??\c:\windows\system\svchost.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\svchost.exe N/A
N/A N/A \??\c:\windows\system\svchost.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\svchost.exe N/A
N/A N/A \??\c:\windows\system\svchost.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\svchost.exe N/A
N/A N/A \??\c:\windows\system\svchost.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\svchost.exe N/A
N/A N/A \??\c:\windows\system\svchost.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\svchost.exe N/A
N/A N/A \??\c:\windows\system\svchost.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\svchost.exe N/A
N/A N/A \??\c:\windows\system\svchost.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\svchost.exe N/A
N/A N/A \??\c:\windows\system\svchost.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\svchost.exe N/A
N/A N/A \??\c:\windows\system\svchost.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\svchost.exe N/A
N/A N/A \??\c:\windows\system\svchost.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\svchost.exe N/A
N/A N/A \??\c:\windows\system\svchost.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\svchost.exe N/A
N/A N/A \??\c:\windows\system\svchost.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\svchost.exe N/A
N/A N/A \??\c:\windows\system\svchost.exe N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\svchost.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3668 wrote to memory of 3012 N/A C:\Users\Admin\AppData\Local\Temp\9fa09c0ba494ce791441b2f413a9c74d2eeba7a716d4d4711dda9f730050ec13.exe \??\c:\windows\system\explorer.exe
PID 3668 wrote to memory of 3012 N/A C:\Users\Admin\AppData\Local\Temp\9fa09c0ba494ce791441b2f413a9c74d2eeba7a716d4d4711dda9f730050ec13.exe \??\c:\windows\system\explorer.exe
PID 3668 wrote to memory of 3012 N/A C:\Users\Admin\AppData\Local\Temp\9fa09c0ba494ce791441b2f413a9c74d2eeba7a716d4d4711dda9f730050ec13.exe \??\c:\windows\system\explorer.exe
PID 3012 wrote to memory of 1628 N/A \??\c:\windows\system\explorer.exe \??\c:\windows\system\spoolsv.exe
PID 3012 wrote to memory of 1628 N/A \??\c:\windows\system\explorer.exe \??\c:\windows\system\spoolsv.exe
PID 3012 wrote to memory of 1628 N/A \??\c:\windows\system\explorer.exe \??\c:\windows\system\spoolsv.exe
PID 1628 wrote to memory of 3160 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\svchost.exe
PID 1628 wrote to memory of 3160 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\svchost.exe
PID 1628 wrote to memory of 3160 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\svchost.exe
PID 3160 wrote to memory of 1504 N/A \??\c:\windows\system\svchost.exe \??\c:\windows\system\spoolsv.exe
PID 3160 wrote to memory of 1504 N/A \??\c:\windows\system\svchost.exe \??\c:\windows\system\spoolsv.exe
PID 3160 wrote to memory of 1504 N/A \??\c:\windows\system\svchost.exe \??\c:\windows\system\spoolsv.exe
PID 3160 wrote to memory of 1404 N/A \??\c:\windows\system\svchost.exe C:\Windows\SysWOW64\at.exe
PID 3160 wrote to memory of 1404 N/A \??\c:\windows\system\svchost.exe C:\Windows\SysWOW64\at.exe
PID 3160 wrote to memory of 1404 N/A \??\c:\windows\system\svchost.exe C:\Windows\SysWOW64\at.exe
PID 3160 wrote to memory of 2692 N/A \??\c:\windows\system\svchost.exe C:\Windows\SysWOW64\at.exe
PID 3160 wrote to memory of 2692 N/A \??\c:\windows\system\svchost.exe C:\Windows\SysWOW64\at.exe
PID 3160 wrote to memory of 2692 N/A \??\c:\windows\system\svchost.exe C:\Windows\SysWOW64\at.exe
PID 3160 wrote to memory of 224 N/A \??\c:\windows\system\svchost.exe C:\Windows\SysWOW64\at.exe
PID 3160 wrote to memory of 224 N/A \??\c:\windows\system\svchost.exe C:\Windows\SysWOW64\at.exe
PID 3160 wrote to memory of 224 N/A \??\c:\windows\system\svchost.exe C:\Windows\SysWOW64\at.exe

Processes

C:\Users\Admin\AppData\Local\Temp\9fa09c0ba494ce791441b2f413a9c74d2eeba7a716d4d4711dda9f730050ec13.exe

"C:\Users\Admin\AppData\Local\Temp\9fa09c0ba494ce791441b2f413a9c74d2eeba7a716d4d4711dda9f730050ec13.exe"

\??\c:\windows\system\explorer.exe

c:\windows\system\explorer.exe

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\svchost.exe

c:\windows\system\svchost.exe

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe PR

C:\Windows\SysWOW64\at.exe

at 00:56 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe

C:\Windows\SysWOW64\at.exe

at 00:57 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe

C:\Windows\SysWOW64\at.exe

at 00:58 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 241.150.49.20.in-addr.arpa udp
US 8.8.8.8:53 240.221.184.93.in-addr.arpa udp
US 8.8.8.8:53 14.160.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 86.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 240.197.17.2.in-addr.arpa udp
US 52.111.229.43:443 tcp
US 8.8.8.8:53 249.197.17.2.in-addr.arpa udp
US 8.8.8.8:53 14.227.111.52.in-addr.arpa udp

Files

memory/3668-0-0x0000000000400000-0x0000000000431000-memory.dmp

memory/3668-1-0x00000000001C0000-0x00000000001C4000-memory.dmp

memory/3668-2-0x0000000074DA0000-0x0000000074EFD000-memory.dmp

memory/3668-4-0x0000000000401000-0x000000000042E000-memory.dmp

memory/3668-3-0x0000000000400000-0x0000000000431000-memory.dmp

memory/3012-13-0x0000000000400000-0x0000000000431000-memory.dmp

\??\c:\windows\system\explorer.exe

MD5 73a5254b1c5de90f1dcfb9e0cad410a6
SHA1 fefd3bc594f6357524a34735ce8844330f790bf5
SHA256 481c6a76d4cedd6bde66b115756be3c17440a30fba85af2b1ae52e7a0f17c55c
SHA512 b2335e33434471eaeca44e1e834f882b43318b664530df7d2d59e99c1dad6451e110e4f60ced9a7a7cf8e24f9319c9b806d29982aef224f57bcc67181bd6c058

memory/3012-14-0x0000000000400000-0x0000000000431000-memory.dmp

memory/3012-15-0x0000000074DA0000-0x0000000074EFD000-memory.dmp

memory/3012-18-0x0000000000400000-0x0000000000431000-memory.dmp

C:\Windows\System\spoolsv.exe

MD5 6c049081c02f7586d9f92e4047187d4e
SHA1 ecfe1cdd3745720830c4c69d5fd1baa82da63375
SHA256 60022507368f98cb7e3ed525670816ff01fdb9c0205e91f880b4eb841c6f8587
SHA512 2e9681b62193a0cc6e5cb45f54f2da71e6bf3ddea7c88e741301efd1d89f0863c51f25a8408d4bdabad42a2ddb8230c079eaf6c772473169eccdd37b2f987654

memory/1628-26-0x0000000000400000-0x0000000000431000-memory.dmp

memory/1628-27-0x0000000074DA0000-0x0000000074EFD000-memory.dmp

memory/1628-31-0x0000000000400000-0x0000000000431000-memory.dmp

C:\Windows\System\svchost.exe

MD5 6e014338a7d83b5d069ae27bc1778d50
SHA1 257ae45af0450e8d698bcbed1f77d44862c22ad8
SHA256 e9de410713e6dc7d08dda349ee7685c4bd3acfce43efe2112b51bdd8b916e953
SHA512 c786882710d1d670b0d9b27cd2d37083a21bff06f3d9282413713fc5091bbf143286aef5ef21dcd1b87579fe7110e6f43f2ffa5d5fd8bbb5032052a588a3ef85

memory/3160-38-0x0000000074DA0000-0x0000000074EFD000-memory.dmp

memory/1504-44-0x0000000074DA0000-0x0000000074EFD000-memory.dmp

memory/1504-50-0x0000000000400000-0x0000000000431000-memory.dmp

memory/3668-55-0x0000000000400000-0x0000000000431000-memory.dmp

memory/3668-56-0x0000000000401000-0x000000000042E000-memory.dmp

memory/1628-54-0x0000000000400000-0x0000000000431000-memory.dmp

C:\Users\Admin\AppData\Roaming\mrsys.exe

MD5 9dc97f2e6e55861bfadfa6ef17968a25
SHA1 18b1908f791af8a16f4740318e12cf58872f698f
SHA256 e45d3187ba122c137f4b780a786a155ec7d0b312f07ee66b34fe3813ed4158a0
SHA512 92ed80b8e4679124d3818f82954830e07cb7fb890bddeab1171a94b0ef418f6a261735ee51926eb339b90b6b6e7854ac77abb1c3d41ddee9e698286645d70b2f

memory/3012-58-0x0000000000400000-0x0000000000431000-memory.dmp

memory/3160-60-0x0000000000400000-0x0000000000431000-memory.dmp

memory/3012-69-0x0000000000400000-0x0000000000431000-memory.dmp