Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
05/06/2024, 22:36
Static task
static1
Behavioral task
behavioral1
Sample
4d9c90764d8f463c1b9b83242638bc350798a1d994887ce7820ac97aa3aa99ef.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
4d9c90764d8f463c1b9b83242638bc350798a1d994887ce7820ac97aa3aa99ef.exe
Resource
win10v2004-20240226-en
General
-
Target
4d9c90764d8f463c1b9b83242638bc350798a1d994887ce7820ac97aa3aa99ef.exe
-
Size
66KB
-
MD5
cfb9dfdcce2c43a8dfd818fb3a916465
-
SHA1
8db58dc2c8751e108a0e98fd45c9e6452912924d
-
SHA256
4d9c90764d8f463c1b9b83242638bc350798a1d994887ce7820ac97aa3aa99ef
-
SHA512
89ebf9aa442adbd6e5b5a734cb8510a1665c343a019cfa88b70735efefff44545faad023e6b5594b4887a439a1e83c19c35d8f69aa3082258bc1f5049e4f2c5c
-
SSDEEP
1536:EHfetdklPp+07gDSrB8Xru2zGeJxgawTzpXzrDJrXig:IeklMMYJhqezw/pXzH9ig
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe -
Executes dropped EXE 4 IoCs
pid Process 2984 explorer.exe 2736 spoolsv.exe 2804 svchost.exe 2464 spoolsv.exe -
Loads dropped DLL 8 IoCs
pid Process 3000 4d9c90764d8f463c1b9b83242638bc350798a1d994887ce7820ac97aa3aa99ef.exe 3000 4d9c90764d8f463c1b9b83242638bc350798a1d994887ce7820ac97aa3aa99ef.exe 2984 explorer.exe 2984 explorer.exe 2736 spoolsv.exe 2736 spoolsv.exe 2804 svchost.exe 2804 svchost.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe svchost.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe 4d9c90764d8f463c1b9b83242638bc350798a1d994887ce7820ac97aa3aa99ef.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3000 4d9c90764d8f463c1b9b83242638bc350798a1d994887ce7820ac97aa3aa99ef.exe 2984 explorer.exe 2984 explorer.exe 2984 explorer.exe 2984 explorer.exe 2804 svchost.exe 2804 svchost.exe 2804 svchost.exe 2984 explorer.exe 2804 svchost.exe 2984 explorer.exe 2984 explorer.exe 2804 svchost.exe 2984 explorer.exe 2804 svchost.exe 2984 explorer.exe 2804 svchost.exe 2804 svchost.exe 2984 explorer.exe 2804 svchost.exe 2984 explorer.exe 2804 svchost.exe 2984 explorer.exe 2804 svchost.exe 2984 explorer.exe 2804 svchost.exe 2984 explorer.exe 2804 svchost.exe 2984 explorer.exe 2804 svchost.exe 2984 explorer.exe 2804 svchost.exe 2984 explorer.exe 2984 explorer.exe 2804 svchost.exe 2984 explorer.exe 2804 svchost.exe 2984 explorer.exe 2804 svchost.exe 2804 svchost.exe 2984 explorer.exe 2804 svchost.exe 2984 explorer.exe 2984 explorer.exe 2804 svchost.exe 2804 svchost.exe 2984 explorer.exe 2804 svchost.exe 2984 explorer.exe 2804 svchost.exe 2984 explorer.exe 2984 explorer.exe 2804 svchost.exe 2804 svchost.exe 2984 explorer.exe 2804 svchost.exe 2984 explorer.exe 2804 svchost.exe 2984 explorer.exe 2984 explorer.exe 2804 svchost.exe 2804 svchost.exe 2984 explorer.exe 2984 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2984 explorer.exe 2804 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3000 4d9c90764d8f463c1b9b83242638bc350798a1d994887ce7820ac97aa3aa99ef.exe 3000 4d9c90764d8f463c1b9b83242638bc350798a1d994887ce7820ac97aa3aa99ef.exe 2984 explorer.exe 2984 explorer.exe 2736 spoolsv.exe 2736 spoolsv.exe 2804 svchost.exe 2804 svchost.exe 2464 spoolsv.exe 2464 spoolsv.exe 2984 explorer.exe 2984 explorer.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 3000 wrote to memory of 2984 3000 4d9c90764d8f463c1b9b83242638bc350798a1d994887ce7820ac97aa3aa99ef.exe 28 PID 3000 wrote to memory of 2984 3000 4d9c90764d8f463c1b9b83242638bc350798a1d994887ce7820ac97aa3aa99ef.exe 28 PID 3000 wrote to memory of 2984 3000 4d9c90764d8f463c1b9b83242638bc350798a1d994887ce7820ac97aa3aa99ef.exe 28 PID 3000 wrote to memory of 2984 3000 4d9c90764d8f463c1b9b83242638bc350798a1d994887ce7820ac97aa3aa99ef.exe 28 PID 2984 wrote to memory of 2736 2984 explorer.exe 29 PID 2984 wrote to memory of 2736 2984 explorer.exe 29 PID 2984 wrote to memory of 2736 2984 explorer.exe 29 PID 2984 wrote to memory of 2736 2984 explorer.exe 29 PID 2736 wrote to memory of 2804 2736 spoolsv.exe 30 PID 2736 wrote to memory of 2804 2736 spoolsv.exe 30 PID 2736 wrote to memory of 2804 2736 spoolsv.exe 30 PID 2736 wrote to memory of 2804 2736 spoolsv.exe 30 PID 2804 wrote to memory of 2464 2804 svchost.exe 31 PID 2804 wrote to memory of 2464 2804 svchost.exe 31 PID 2804 wrote to memory of 2464 2804 svchost.exe 31 PID 2804 wrote to memory of 2464 2804 svchost.exe 31 PID 2804 wrote to memory of 2356 2804 svchost.exe 32 PID 2804 wrote to memory of 2356 2804 svchost.exe 32 PID 2804 wrote to memory of 2356 2804 svchost.exe 32 PID 2804 wrote to memory of 2356 2804 svchost.exe 32 PID 2804 wrote to memory of 1360 2804 svchost.exe 36 PID 2804 wrote to memory of 1360 2804 svchost.exe 36 PID 2804 wrote to memory of 1360 2804 svchost.exe 36 PID 2804 wrote to memory of 1360 2804 svchost.exe 36 PID 2804 wrote to memory of 2432 2804 svchost.exe 38 PID 2804 wrote to memory of 2432 2804 svchost.exe 38 PID 2804 wrote to memory of 2432 2804 svchost.exe 38 PID 2804 wrote to memory of 2432 2804 svchost.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\4d9c90764d8f463c1b9b83242638bc350798a1d994887ce7820ac97aa3aa99ef.exe"C:\Users\Admin\AppData\Local\Temp\4d9c90764d8f463c1b9b83242638bc350798a1d994887ce7820ac97aa3aa99ef.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3000 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2984 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2736 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2804 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2464
-
-
C:\Windows\SysWOW64\at.exeat 22:38 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:2356
-
-
C:\Windows\SysWOW64\at.exeat 22:39 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:1360
-
-
C:\Windows\SysWOW64\at.exeat 22:40 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:2432
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66KB
MD598d3659a8ca0f0b50170dfd16ce9f1ea
SHA1bc6a6e359d0efc2d986832453138f6a21b793320
SHA256ae03fee0fa9dc19bc4f82fc43d012c39a5bfe792470f162821a15e54b9a554bb
SHA5126f114f15be5171aa1c03adccb2d7b861d8ec24b9af463121b8f3f0cc3ca783e671010bcc1a6817a2c6ca3bfce943bdf73964cf5b3551fae24c0d9d3b7afbe27d
-
Filesize
66KB
MD5456a2bffcde2fda904b89c11f2ee33ba
SHA12e5b5fa4f6d8811d2168e07441bacfcf46fce9e1
SHA2568cb3d7ab04a8023bdc913b1daedad13d6a88e28d2562f665a66c2b7328154c78
SHA512ba32f5477b9810c8b34569d203443dbd423c90c7823d0cbc17eab5c752819a8f49311ad6c4590b62acdd73d2e71af5dfbab0525fffad87b91dc76724b24f4c3e
-
Filesize
66KB
MD570d0101fa090b197e269c0e153bb4286
SHA11bb4f2913a32ee3f9c551f7540ddfbcfe1dddeb2
SHA25650ee349736e3501a0ecfb3ac8ec6031d6842f2bc973322d175ae9f7b3d5d6107
SHA512a84f15ff4bb44fb17fc73f3e4555c31acf2fadea3ec205d86c8a710854478209bc4bcda00a43e3f428f2970339db8cb7c025d3d8b30f19656e5153a2567cfcb8
-
Filesize
66KB
MD57428963efc7e2116b7444c93a8065f07
SHA1b9a98c9a3328861900f496acac5e3603c296610e
SHA256ec2f586155e5352b08928f3c8066daa4dbf1df47e8e29424d98fafb22a1107e4
SHA5120365a4d0968b64274255e6ec687d2fec59fad11013711944b278402dc65656145e83961944cbd5e20cf60646de3b98a9eb6c98c1a78916ac643d349cb89c1429