Analysis
-
max time kernel
151s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06/06/2024, 03:02
Static task
static1
Behavioral task
behavioral1
Sample
9296967bd7520e26732cb92dc2e7adb28ca69ee68d58cdd891bc26a2b7a1bdc0.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
9296967bd7520e26732cb92dc2e7adb28ca69ee68d58cdd891bc26a2b7a1bdc0.exe
Resource
win10v2004-20240226-en
General
-
Target
9296967bd7520e26732cb92dc2e7adb28ca69ee68d58cdd891bc26a2b7a1bdc0.exe
-
Size
211KB
-
MD5
d3c5c0b268c2d7c671fc0099c1fabdfa
-
SHA1
989457fbbab0d05e851e67aec64e8c3137d46765
-
SHA256
9296967bd7520e26732cb92dc2e7adb28ca69ee68d58cdd891bc26a2b7a1bdc0
-
SHA512
5d79ab391465abc6aa71bde6188ed60c9dd9d0d7465fc6875f2c5ab9c7598d74983ad0a4787fe431a7edc60b30904daeafe6965670c9a943de3e7f5f56a3244a
-
SSDEEP
3072:JD6Xtx68yygRBE52mxkEOHLRMpZ4deth8PEAjAfIbAYGPhz6sPJBInxZqOZ:Jh8cBzHLRMpZ4d1ZZ
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\userinit.exe" userinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\userinit.exe" swchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" userinit.exe Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" swchost.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} userinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Local\\mrsys.exe MR" userinit.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} swchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Local\\mrsys.exe MR" swchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} swchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} swchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Local\\mrsys.exe MR" swchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} swchost.exe -
Executes dropped EXE 4 IoCs
pid Process 4000 userinit.exe 1052 spoolsw.exe 2036 swchost.exe 2068 spoolsw.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\userinit = "c:\\windows\\userinit.exe RO" userinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Swchost = "c:\\windows\\swchost.exe RO" userinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\userinit = "c:\\windows\\userinit.exe RO" swchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Swchost = "c:\\windows\\swchost.exe RO" swchost.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\system\udsys.exe userinit.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification \??\c:\windows\userinit.exe 9296967bd7520e26732cb92dc2e7adb28ca69ee68d58cdd891bc26a2b7a1bdc0.exe File opened for modification \??\c:\windows\spoolsw.exe userinit.exe File opened for modification \??\c:\windows\swchost.exe spoolsw.exe File opened for modification \??\c:\windows\userinit.exe userinit.exe File opened for modification \??\c:\windows\swchost.exe swchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4860 9296967bd7520e26732cb92dc2e7adb28ca69ee68d58cdd891bc26a2b7a1bdc0.exe 4860 9296967bd7520e26732cb92dc2e7adb28ca69ee68d58cdd891bc26a2b7a1bdc0.exe 4000 userinit.exe 4000 userinit.exe 4000 userinit.exe 4000 userinit.exe 4000 userinit.exe 4000 userinit.exe 4000 userinit.exe 2036 swchost.exe 4000 userinit.exe 2036 swchost.exe 2036 swchost.exe 2036 swchost.exe 2036 swchost.exe 4000 userinit.exe 2036 swchost.exe 4000 userinit.exe 4000 userinit.exe 2036 swchost.exe 4000 userinit.exe 2036 swchost.exe 4000 userinit.exe 4000 userinit.exe 2036 swchost.exe 2036 swchost.exe 4000 userinit.exe 4000 userinit.exe 2036 swchost.exe 2036 swchost.exe 4000 userinit.exe 4000 userinit.exe 2036 swchost.exe 2036 swchost.exe 4000 userinit.exe 4000 userinit.exe 2036 swchost.exe 2036 swchost.exe 4000 userinit.exe 4000 userinit.exe 2036 swchost.exe 2036 swchost.exe 4000 userinit.exe 4000 userinit.exe 2036 swchost.exe 2036 swchost.exe 4000 userinit.exe 4000 userinit.exe 2036 swchost.exe 2036 swchost.exe 4000 userinit.exe 4000 userinit.exe 2036 swchost.exe 2036 swchost.exe 4000 userinit.exe 4000 userinit.exe 2036 swchost.exe 2036 swchost.exe 4000 userinit.exe 4000 userinit.exe 2036 swchost.exe 2036 swchost.exe 4000 userinit.exe 4000 userinit.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 4000 userinit.exe 2036 swchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 4860 9296967bd7520e26732cb92dc2e7adb28ca69ee68d58cdd891bc26a2b7a1bdc0.exe 4860 9296967bd7520e26732cb92dc2e7adb28ca69ee68d58cdd891bc26a2b7a1bdc0.exe 4000 userinit.exe 4000 userinit.exe 1052 spoolsw.exe 1052 spoolsw.exe 2036 swchost.exe 2036 swchost.exe 2068 spoolsw.exe 2068 spoolsw.exe 4000 userinit.exe 4000 userinit.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4860 wrote to memory of 4000 4860 9296967bd7520e26732cb92dc2e7adb28ca69ee68d58cdd891bc26a2b7a1bdc0.exe 92 PID 4860 wrote to memory of 4000 4860 9296967bd7520e26732cb92dc2e7adb28ca69ee68d58cdd891bc26a2b7a1bdc0.exe 92 PID 4860 wrote to memory of 4000 4860 9296967bd7520e26732cb92dc2e7adb28ca69ee68d58cdd891bc26a2b7a1bdc0.exe 92 PID 4000 wrote to memory of 1052 4000 userinit.exe 93 PID 4000 wrote to memory of 1052 4000 userinit.exe 93 PID 4000 wrote to memory of 1052 4000 userinit.exe 93 PID 1052 wrote to memory of 2036 1052 spoolsw.exe 94 PID 1052 wrote to memory of 2036 1052 spoolsw.exe 94 PID 1052 wrote to memory of 2036 1052 spoolsw.exe 94 PID 2036 wrote to memory of 2068 2036 swchost.exe 95 PID 2036 wrote to memory of 2068 2036 swchost.exe 95 PID 2036 wrote to memory of 2068 2036 swchost.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\9296967bd7520e26732cb92dc2e7adb28ca69ee68d58cdd891bc26a2b7a1bdc0.exe"C:\Users\Admin\AppData\Local\Temp\9296967bd7520e26732cb92dc2e7adb28ca69ee68d58cdd891bc26a2b7a1bdc0.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4860 -
\??\c:\windows\userinit.exec:\windows\userinit.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4000 -
\??\c:\windows\spoolsw.exec:\windows\spoolsw.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1052 -
\??\c:\windows\swchost.exec:\windows\swchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2036 -
\??\c:\windows\spoolsw.exec:\windows\spoolsw.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2068
-
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1408 --field-trial-handle=2676,i,447940133669489189,1353734109898858672,262144 --variations-seed-version /prefetch:81⤵PID:2772
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
211KB
MD584d0bd45862fba3af9363540c0f44fe7
SHA165b96fa4619884201c76e25be10d60f15e9a0209
SHA25694569b1cdee0274eed08fe0a4ab702a80706697e3fe47986db027b1258c50108
SHA512aeb1203cddfe686e75b0123b0e148f9a86baadc36e425286119ddcd64d4645fcfe02a2d1d4f036667d8a0ec2f14c87a13458c0decce9b1d1179d48a896ad0638
-
Filesize
211KB
MD513405c0a97e19b9f4aaa97f1bed11e18
SHA12698ed27fdceadabdab29ed76ec155a7ff944081
SHA25687283c6f79ab8c7344563396ce628d0e943ac00b4eb9a5b2d90fddb4b411ee3a
SHA512907e705114f570756ba99cd312e4ce5109af5b66e19e2dd5e012ede0ff4499507f16f4bcb0b33797501dc413744260b0ab13c38acff99900f034e9ec7fae97a3
-
Filesize
211KB
MD547bc37374556cad16bc42adbc514b020
SHA1ed61df6f58192d12139a7e56058c3ac342df78e8
SHA2565ebf6b49f654050f7b978010bef5cbba4804ee4b81a45165ee5b13a318037fb7
SHA51278d951a146a400d0a2e163fe6e97808544f95fe2cb05cde86be71bd4609da3512224ff4c2e1d2623eb9e9a301d9539594acbf8450b4ab02d76e620dbc5454f97
-
Filesize
211KB
MD50cb872495a977ea69fdc82345d7eed30
SHA1c5a102926aba33c54f6c69d72aab0add21e161c1
SHA256f9bb53a936169c906f26a02b365fa4d3fff2ed4c944db3e53d7a958dff3b9d53
SHA512bad8dce806c564ea0167f0fb05805c2a8cbdf723652e9b8fd7e928331da1db1be4454daf59b0639e2767d4b074c96ad8b8ae2650b367fb78fd7d5c60a1962c10