Analysis
-
max time kernel
150s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
05/06/2024, 03:27
Static task
static1
Behavioral task
behavioral1
Sample
cbe0b927a55c5660dcfc8bf303eaf47ece0bcb2f810bf7a440a7453f41887622.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
cbe0b927a55c5660dcfc8bf303eaf47ece0bcb2f810bf7a440a7453f41887622.exe
Resource
win10v2004-20240426-en
General
-
Target
cbe0b927a55c5660dcfc8bf303eaf47ece0bcb2f810bf7a440a7453f41887622.exe
-
Size
66KB
-
MD5
a7c439d704249a3bffc08d43acd5883a
-
SHA1
60a38069a8dec7e5008a63eee696f5f471eda659
-
SHA256
cbe0b927a55c5660dcfc8bf303eaf47ece0bcb2f810bf7a440a7453f41887622
-
SHA512
aebd56f3cee77c54676516dd1d45d93906718f2f62253aa1f123a297d133b7af474c34054f745ffe60ccca04dd4127d573f3a49b360a70fccb4db8ebff5630a2
-
SSDEEP
1536:EHfetdklPp+07gDSrB8Xru2zGeJxgawTzpXzrDJrXiw:IeklMMYJhqezw/pXzH9iw
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 440 explorer.exe 1552 spoolsv.exe 3284 svchost.exe 1156 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe svchost.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe cbe0b927a55c5660dcfc8bf303eaf47ece0bcb2f810bf7a440a7453f41887622.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3216 cbe0b927a55c5660dcfc8bf303eaf47ece0bcb2f810bf7a440a7453f41887622.exe 3216 cbe0b927a55c5660dcfc8bf303eaf47ece0bcb2f810bf7a440a7453f41887622.exe 440 explorer.exe 440 explorer.exe 440 explorer.exe 440 explorer.exe 440 explorer.exe 440 explorer.exe 3284 svchost.exe 3284 svchost.exe 3284 svchost.exe 3284 svchost.exe 440 explorer.exe 440 explorer.exe 3284 svchost.exe 3284 svchost.exe 440 explorer.exe 440 explorer.exe 3284 svchost.exe 3284 svchost.exe 440 explorer.exe 440 explorer.exe 3284 svchost.exe 3284 svchost.exe 440 explorer.exe 440 explorer.exe 3284 svchost.exe 3284 svchost.exe 440 explorer.exe 440 explorer.exe 3284 svchost.exe 3284 svchost.exe 440 explorer.exe 440 explorer.exe 3284 svchost.exe 3284 svchost.exe 440 explorer.exe 440 explorer.exe 3284 svchost.exe 3284 svchost.exe 440 explorer.exe 440 explorer.exe 3284 svchost.exe 3284 svchost.exe 440 explorer.exe 440 explorer.exe 3284 svchost.exe 3284 svchost.exe 440 explorer.exe 440 explorer.exe 3284 svchost.exe 3284 svchost.exe 440 explorer.exe 440 explorer.exe 3284 svchost.exe 3284 svchost.exe 440 explorer.exe 440 explorer.exe 3284 svchost.exe 3284 svchost.exe 440 explorer.exe 440 explorer.exe 3284 svchost.exe 3284 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 3284 svchost.exe 440 explorer.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3216 cbe0b927a55c5660dcfc8bf303eaf47ece0bcb2f810bf7a440a7453f41887622.exe 3216 cbe0b927a55c5660dcfc8bf303eaf47ece0bcb2f810bf7a440a7453f41887622.exe 440 explorer.exe 440 explorer.exe 1552 spoolsv.exe 1552 spoolsv.exe 3284 svchost.exe 3284 svchost.exe 1156 spoolsv.exe 1156 spoolsv.exe 440 explorer.exe 440 explorer.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 3216 wrote to memory of 440 3216 cbe0b927a55c5660dcfc8bf303eaf47ece0bcb2f810bf7a440a7453f41887622.exe 82 PID 3216 wrote to memory of 440 3216 cbe0b927a55c5660dcfc8bf303eaf47ece0bcb2f810bf7a440a7453f41887622.exe 82 PID 3216 wrote to memory of 440 3216 cbe0b927a55c5660dcfc8bf303eaf47ece0bcb2f810bf7a440a7453f41887622.exe 82 PID 440 wrote to memory of 1552 440 explorer.exe 83 PID 440 wrote to memory of 1552 440 explorer.exe 83 PID 440 wrote to memory of 1552 440 explorer.exe 83 PID 1552 wrote to memory of 3284 1552 spoolsv.exe 84 PID 1552 wrote to memory of 3284 1552 spoolsv.exe 84 PID 1552 wrote to memory of 3284 1552 spoolsv.exe 84 PID 3284 wrote to memory of 1156 3284 svchost.exe 85 PID 3284 wrote to memory of 1156 3284 svchost.exe 85 PID 3284 wrote to memory of 1156 3284 svchost.exe 85 PID 3284 wrote to memory of 4064 3284 svchost.exe 87 PID 3284 wrote to memory of 4064 3284 svchost.exe 87 PID 3284 wrote to memory of 4064 3284 svchost.exe 87 PID 3284 wrote to memory of 540 3284 svchost.exe 99 PID 3284 wrote to memory of 540 3284 svchost.exe 99 PID 3284 wrote to memory of 540 3284 svchost.exe 99 PID 3284 wrote to memory of 4108 3284 svchost.exe 101 PID 3284 wrote to memory of 4108 3284 svchost.exe 101 PID 3284 wrote to memory of 4108 3284 svchost.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\cbe0b927a55c5660dcfc8bf303eaf47ece0bcb2f810bf7a440a7453f41887622.exe"C:\Users\Admin\AppData\Local\Temp\cbe0b927a55c5660dcfc8bf303eaf47ece0bcb2f810bf7a440a7453f41887622.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3216 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:440 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1552 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3284 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1156
-
-
C:\Windows\SysWOW64\at.exeat 03:29 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:4064
-
-
C:\Windows\SysWOW64\at.exeat 03:30 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:540
-
-
C:\Windows\SysWOW64\at.exeat 03:31 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:4108
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66KB
MD52cc7c9e5d153dce695307a3d37a67528
SHA1b58ae2dd6307a6130d8fce23486fbc1ab92ce035
SHA256b7c5243cc07be71ef78f7301749baa0902dbdd70100f1601038483d7b453cd6a
SHA512df46acc654a7d88b42e875f37b7a7217097bb9eacd7b1f5ef611c5431df8bb5cc30d3a63cf9bccb7721d9d39faef95c9675df14ce87b3ceafdc8a685c68f710e
-
Filesize
66KB
MD5d11e5f2189d3f12dd420ce18bdfb01f6
SHA1b558680476a1f93ad26cd5a9e5313ba313823610
SHA256d2e39caaf0a1181ec2ccb8abeb3c1c8e640b71431c9feee2614b2944da9b1b13
SHA512603fc0f4ec50537bc934af137c438eb8c878b952a2afb7dfa4fbc52c4b4e3074e89a9bbba7f18c6f200dc5f74586b8e62286c9776f90a15aa708ca92324deb4a
-
Filesize
66KB
MD5876f289f74f6ac825015b2e8ac03ac6b
SHA1584dd9ac325ba31a96a982f9b0cfbe1b39f588ae
SHA256b9dc53ee718ff358c765a0cd3f89f560e3de1d0d1974fb5601f83228c337eaa0
SHA512d576c06603dc59a4d07394908eca8170bfc8c92db0a043c80a3d5a98ab6ff70f50b677308cae0c1777a843685d994a2703f78d95dbf275602512a2dd7da816ca
-
Filesize
66KB
MD5f51021115e296ed1c266eed11724ed93
SHA101ab243a5ccddbf5598deaf3f3b37ff786a44129
SHA2564fa6eb80ccf33d115049acff9b44da56ee3c6a4f93916894ed5384851656da41
SHA5121707d3b6ddb789e4e7080093c4a747f9e769035ec3b96eb1ff7b3a6f3fd89ff7ba55f0407f4e9237a0fab17a732e1157c84defc48d556692a220983f480cb0a6