Analysis
-
max time kernel
150s -
max time network
93s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
09/06/2024, 01:36
Static task
static1
Behavioral task
behavioral1
Sample
6ae8b56011c221d0a39d8dc845b2a5da940ca60489a4d544b1f58cfa4bf8a9c5.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6ae8b56011c221d0a39d8dc845b2a5da940ca60489a4d544b1f58cfa4bf8a9c5.exe
Resource
win10v2004-20240426-en
General
-
Target
6ae8b56011c221d0a39d8dc845b2a5da940ca60489a4d544b1f58cfa4bf8a9c5.exe
-
Size
65KB
-
MD5
dabe7c8360385d6cfdd4a8024e4681e4
-
SHA1
ed478b3f38d989aa4d283274104b2f264bd20839
-
SHA256
6ae8b56011c221d0a39d8dc845b2a5da940ca60489a4d544b1f58cfa4bf8a9c5
-
SHA512
e28e3e79ac06ef9b7a87e7344600433710efeabf18ecab4781d9f6f25d416f27274189320fde203effaf522d1142b6379dfb49c78d6d0ec14c3da03a0a064902
-
SSDEEP
1536:ECq3yRuqrI01eArdW/O7JnI2e13XiLij40MkTUVqa/Ou6999999999999999999f:7WNqkOJWmo1HpM0MkTUmu6999999999d
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 2964 explorer.exe 4964 spoolsv.exe 2900 svchost.exe 2032 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe svchost.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe 6ae8b56011c221d0a39d8dc845b2a5da940ca60489a4d544b1f58cfa4bf8a9c5.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2424 6ae8b56011c221d0a39d8dc845b2a5da940ca60489a4d544b1f58cfa4bf8a9c5.exe 2424 6ae8b56011c221d0a39d8dc845b2a5da940ca60489a4d544b1f58cfa4bf8a9c5.exe 2964 explorer.exe 2964 explorer.exe 2964 explorer.exe 2964 explorer.exe 2964 explorer.exe 2964 explorer.exe 2900 svchost.exe 2900 svchost.exe 2900 svchost.exe 2900 svchost.exe 2964 explorer.exe 2964 explorer.exe 2900 svchost.exe 2900 svchost.exe 2964 explorer.exe 2964 explorer.exe 2900 svchost.exe 2900 svchost.exe 2964 explorer.exe 2964 explorer.exe 2900 svchost.exe 2900 svchost.exe 2964 explorer.exe 2964 explorer.exe 2900 svchost.exe 2900 svchost.exe 2964 explorer.exe 2964 explorer.exe 2900 svchost.exe 2900 svchost.exe 2964 explorer.exe 2964 explorer.exe 2900 svchost.exe 2900 svchost.exe 2964 explorer.exe 2964 explorer.exe 2900 svchost.exe 2900 svchost.exe 2964 explorer.exe 2964 explorer.exe 2900 svchost.exe 2900 svchost.exe 2964 explorer.exe 2964 explorer.exe 2900 svchost.exe 2900 svchost.exe 2964 explorer.exe 2964 explorer.exe 2900 svchost.exe 2900 svchost.exe 2964 explorer.exe 2964 explorer.exe 2900 svchost.exe 2900 svchost.exe 2964 explorer.exe 2964 explorer.exe 2900 svchost.exe 2900 svchost.exe 2964 explorer.exe 2964 explorer.exe 2900 svchost.exe 2900 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2964 explorer.exe 2900 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2424 6ae8b56011c221d0a39d8dc845b2a5da940ca60489a4d544b1f58cfa4bf8a9c5.exe 2424 6ae8b56011c221d0a39d8dc845b2a5da940ca60489a4d544b1f58cfa4bf8a9c5.exe 2964 explorer.exe 2964 explorer.exe 4964 spoolsv.exe 4964 spoolsv.exe 2900 svchost.exe 2900 svchost.exe 2032 spoolsv.exe 2032 spoolsv.exe 2964 explorer.exe 2964 explorer.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2424 wrote to memory of 2964 2424 6ae8b56011c221d0a39d8dc845b2a5da940ca60489a4d544b1f58cfa4bf8a9c5.exe 82 PID 2424 wrote to memory of 2964 2424 6ae8b56011c221d0a39d8dc845b2a5da940ca60489a4d544b1f58cfa4bf8a9c5.exe 82 PID 2424 wrote to memory of 2964 2424 6ae8b56011c221d0a39d8dc845b2a5da940ca60489a4d544b1f58cfa4bf8a9c5.exe 82 PID 2964 wrote to memory of 4964 2964 explorer.exe 84 PID 2964 wrote to memory of 4964 2964 explorer.exe 84 PID 2964 wrote to memory of 4964 2964 explorer.exe 84 PID 4964 wrote to memory of 2900 4964 spoolsv.exe 85 PID 4964 wrote to memory of 2900 4964 spoolsv.exe 85 PID 4964 wrote to memory of 2900 4964 spoolsv.exe 85 PID 2900 wrote to memory of 2032 2900 svchost.exe 87 PID 2900 wrote to memory of 2032 2900 svchost.exe 87 PID 2900 wrote to memory of 2032 2900 svchost.exe 87 PID 2900 wrote to memory of 3356 2900 svchost.exe 89 PID 2900 wrote to memory of 3356 2900 svchost.exe 89 PID 2900 wrote to memory of 3356 2900 svchost.exe 89 PID 2900 wrote to memory of 2464 2900 svchost.exe 99 PID 2900 wrote to memory of 2464 2900 svchost.exe 99 PID 2900 wrote to memory of 2464 2900 svchost.exe 99 PID 2900 wrote to memory of 1956 2900 svchost.exe 101 PID 2900 wrote to memory of 1956 2900 svchost.exe 101 PID 2900 wrote to memory of 1956 2900 svchost.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\6ae8b56011c221d0a39d8dc845b2a5da940ca60489a4d544b1f58cfa4bf8a9c5.exe"C:\Users\Admin\AppData\Local\Temp\6ae8b56011c221d0a39d8dc845b2a5da940ca60489a4d544b1f58cfa4bf8a9c5.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2424 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2964 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4964 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2900 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2032
-
-
C:\Windows\SysWOW64\at.exeat 01:39 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:3356
-
-
C:\Windows\SysWOW64\at.exeat 01:40 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:2464
-
-
C:\Windows\SysWOW64\at.exeat 01:41 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:1956
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD529b3224679af49bab6bcbf494b391247
SHA1035ee261022adaa9d03b5968b17facce92d110a1
SHA256005e47ff90af1efc31acc9056f8aa00b7e5e08481d7edcf8c869bfad1e71c00a
SHA512776c6dd6930c75a65acd211ece6bb6a1e2fdde6525d0ecb37ea329e082ea1f79491cd378b10eed1a2627a82ca5689fd78b8966b453321d79cfbc69826c59b409
-
Filesize
65KB
MD5317d85a032684ff4a96694e5401aa577
SHA13503bc31e6ab05e3c3775548015943df5db2aeeb
SHA256ce531d52cde94e9195775b206699b33053625bf475775ea217bbd7dbb16b9524
SHA512a604f157f79b8d6f5e2ee1298502bfa6df7416979c46373218ebe28abfaee533809330a7ef497d5c4154920ab325a823dc8db18104f90f788e4ca942efff8dd1
-
Filesize
65KB
MD5cea537ba14f6a8dcaecc4a8a35c49f16
SHA1f61d4c820fc27e06f1102042eb849a41f5165fbd
SHA2567362a4c2dd820f24f34feff36cf69bcb613ef45c52e63947110d68332471d132
SHA5122e1519ff9f79fb753b185fe994b188f15785a7deb8891b558ad062904e6f1daddaf79d74febc863bc1967a86dbbc68e2029a73d55f312f8f2979a50820d4c8ac
-
Filesize
65KB
MD59b688bce4c2fa89dcc4ee76a8f746ba8
SHA134fdee1f1e34ca328cdec3a5c6cf8ca8312c3404
SHA256bf350bd324a6277812d9edf970b01b65b3fa9f89f8c45e777945abb2843d6fa0
SHA5120b86e10400a94d1b73acc66fde5bad1050b8445d51fc04122e96a97b68286b17fd49b1a83edb878e114398d95a4ff4db5209b1eee8557218e21c8e44c97f3da4