Analysis

  • max time kernel
    150s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/06/2024, 03:27

General

  • Target

    cbe0b927a55c5660dcfc8bf303eaf47ece0bcb2f810bf7a440a7453f41887622.exe

  • Size

    66KB

  • MD5

    a7c439d704249a3bffc08d43acd5883a

  • SHA1

    60a38069a8dec7e5008a63eee696f5f471eda659

  • SHA256

    cbe0b927a55c5660dcfc8bf303eaf47ece0bcb2f810bf7a440a7453f41887622

  • SHA512

    aebd56f3cee77c54676516dd1d45d93906718f2f62253aa1f123a297d133b7af474c34054f745ffe60ccca04dd4127d573f3a49b360a70fccb4db8ebff5630a2

  • SSDEEP

    1536:EHfetdklPp+07gDSrB8Xru2zGeJxgawTzpXzrDJrXiw:IeklMMYJhqezw/pXzH9iw

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Modifies Installed Components in the registry 2 TTPs 8 IoCs
  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cbe0b927a55c5660dcfc8bf303eaf47ece0bcb2f810bf7a440a7453f41887622.exe
    "C:\Users\Admin\AppData\Local\Temp\cbe0b927a55c5660dcfc8bf303eaf47ece0bcb2f810bf7a440a7453f41887622.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3216
    • \??\c:\windows\system\explorer.exe
      c:\windows\system\explorer.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visiblity of hidden/system files in Explorer
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:440
      • \??\c:\windows\system\spoolsv.exe
        c:\windows\system\spoolsv.exe SE
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1552
        • \??\c:\windows\system\svchost.exe
          c:\windows\system\svchost.exe
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visiblity of hidden/system files in Explorer
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:3284
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe PR
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:1156
          • C:\Windows\SysWOW64\at.exe
            at 03:29 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
            5⤵
              PID:4064
            • C:\Windows\SysWOW64\at.exe
              at 03:30 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
              5⤵
                PID:540
              • C:\Windows\SysWOW64\at.exe
                at 03:31 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
                5⤵
                  PID:4108

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\mrsys.exe

          Filesize

          66KB

          MD5

          2cc7c9e5d153dce695307a3d37a67528

          SHA1

          b58ae2dd6307a6130d8fce23486fbc1ab92ce035

          SHA256

          b7c5243cc07be71ef78f7301749baa0902dbdd70100f1601038483d7b453cd6a

          SHA512

          df46acc654a7d88b42e875f37b7a7217097bb9eacd7b1f5ef611c5431df8bb5cc30d3a63cf9bccb7721d9d39faef95c9675df14ce87b3ceafdc8a685c68f710e

        • C:\Windows\System\explorer.exe

          Filesize

          66KB

          MD5

          d11e5f2189d3f12dd420ce18bdfb01f6

          SHA1

          b558680476a1f93ad26cd5a9e5313ba313823610

          SHA256

          d2e39caaf0a1181ec2ccb8abeb3c1c8e640b71431c9feee2614b2944da9b1b13

          SHA512

          603fc0f4ec50537bc934af137c438eb8c878b952a2afb7dfa4fbc52c4b4e3074e89a9bbba7f18c6f200dc5f74586b8e62286c9776f90a15aa708ca92324deb4a

        • C:\Windows\System\spoolsv.exe

          Filesize

          66KB

          MD5

          876f289f74f6ac825015b2e8ac03ac6b

          SHA1

          584dd9ac325ba31a96a982f9b0cfbe1b39f588ae

          SHA256

          b9dc53ee718ff358c765a0cd3f89f560e3de1d0d1974fb5601f83228c337eaa0

          SHA512

          d576c06603dc59a4d07394908eca8170bfc8c92db0a043c80a3d5a98ab6ff70f50b677308cae0c1777a843685d994a2703f78d95dbf275602512a2dd7da816ca

        • C:\Windows\System\svchost.exe

          Filesize

          66KB

          MD5

          f51021115e296ed1c266eed11724ed93

          SHA1

          01ab243a5ccddbf5598deaf3f3b37ff786a44129

          SHA256

          4fa6eb80ccf33d115049acff9b44da56ee3c6a4f93916894ed5384851656da41

          SHA512

          1707d3b6ddb789e4e7080093c4a747f9e769035ec3b96eb1ff7b3a6f3fd89ff7ba55f0407f4e9237a0fab17a732e1157c84defc48d556692a220983f480cb0a6

        • memory/440-13-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/440-71-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/440-14-0x0000000074B30000-0x0000000074C8D000-memory.dmp

          Filesize

          1.4MB

        • memory/440-17-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/440-60-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/1156-48-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/1156-53-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/1156-44-0x0000000074B30000-0x0000000074C8D000-memory.dmp

          Filesize

          1.4MB

        • memory/1552-25-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/1552-26-0x0000000074B30000-0x0000000074C8D000-memory.dmp

          Filesize

          1.4MB

        • memory/1552-55-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/3216-58-0x0000000000401000-0x000000000042E000-memory.dmp

          Filesize

          180KB

        • memory/3216-1-0x0000000074B30000-0x0000000074C8D000-memory.dmp

          Filesize

          1.4MB

        • memory/3216-4-0x0000000000401000-0x000000000042E000-memory.dmp

          Filesize

          180KB

        • memory/3216-2-0x00000000001C0000-0x00000000001C4000-memory.dmp

          Filesize

          16KB

        • memory/3216-57-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/3216-3-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/3216-0-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/3284-41-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/3284-37-0x0000000074B30000-0x0000000074C8D000-memory.dmp

          Filesize

          1.4MB

        • memory/3284-36-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/3284-62-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB