Analysis
-
max time kernel
150s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
10/06/2024, 02:47
Static task
static1
Behavioral task
behavioral1
Sample
1f71572c3d8f8b458cffdbdf64df8f0d2a56b6d0155e8c542707ed68126d7d7a.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
1f71572c3d8f8b458cffdbdf64df8f0d2a56b6d0155e8c542707ed68126d7d7a.exe
Resource
win10v2004-20240426-en
General
-
Target
1f71572c3d8f8b458cffdbdf64df8f0d2a56b6d0155e8c542707ed68126d7d7a.exe
-
Size
66KB
-
MD5
5d1f21b0fdf57adce184b5520f47b4d5
-
SHA1
d0d273ce28ad23c4bc34db1b9fbc9127c4fe0b20
-
SHA256
1f71572c3d8f8b458cffdbdf64df8f0d2a56b6d0155e8c542707ed68126d7d7a
-
SHA512
30d96e698ef44e3bbaba40ae1a47f97c4238e1a30d1ddf1f04c3fe8f588abb2284e598375ece1dd472580e3465e560e881acd4632d7dac5c50e3ba34810e138d
-
SSDEEP
1536:EHfetdklPp+07gDSrB8Xru2zGeJxgawTzpXzrDJrXis:IeklMMYJhqezw/pXzH9is
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe -
Executes dropped EXE 4 IoCs
pid Process 4984 explorer.exe 4940 spoolsv.exe 4312 svchost.exe 4372 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification \??\c:\windows\system\explorer.exe 1f71572c3d8f8b458cffdbdf64df8f0d2a56b6d0155e8c542707ed68126d7d7a.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe svchost.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2320 1f71572c3d8f8b458cffdbdf64df8f0d2a56b6d0155e8c542707ed68126d7d7a.exe 2320 1f71572c3d8f8b458cffdbdf64df8f0d2a56b6d0155e8c542707ed68126d7d7a.exe 4984 explorer.exe 4984 explorer.exe 4984 explorer.exe 4984 explorer.exe 4984 explorer.exe 4984 explorer.exe 4312 svchost.exe 4312 svchost.exe 4312 svchost.exe 4312 svchost.exe 4984 explorer.exe 4984 explorer.exe 4312 svchost.exe 4312 svchost.exe 4984 explorer.exe 4984 explorer.exe 4312 svchost.exe 4312 svchost.exe 4984 explorer.exe 4984 explorer.exe 4312 svchost.exe 4312 svchost.exe 4984 explorer.exe 4984 explorer.exe 4312 svchost.exe 4312 svchost.exe 4984 explorer.exe 4984 explorer.exe 4312 svchost.exe 4312 svchost.exe 4984 explorer.exe 4984 explorer.exe 4312 svchost.exe 4312 svchost.exe 4984 explorer.exe 4984 explorer.exe 4312 svchost.exe 4312 svchost.exe 4984 explorer.exe 4984 explorer.exe 4312 svchost.exe 4312 svchost.exe 4984 explorer.exe 4984 explorer.exe 4312 svchost.exe 4312 svchost.exe 4984 explorer.exe 4984 explorer.exe 4312 svchost.exe 4312 svchost.exe 4984 explorer.exe 4984 explorer.exe 4312 svchost.exe 4312 svchost.exe 4984 explorer.exe 4984 explorer.exe 4312 svchost.exe 4312 svchost.exe 4984 explorer.exe 4984 explorer.exe 4312 svchost.exe 4312 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 4984 explorer.exe 4312 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2320 1f71572c3d8f8b458cffdbdf64df8f0d2a56b6d0155e8c542707ed68126d7d7a.exe 2320 1f71572c3d8f8b458cffdbdf64df8f0d2a56b6d0155e8c542707ed68126d7d7a.exe 4984 explorer.exe 4984 explorer.exe 4940 spoolsv.exe 4940 spoolsv.exe 4312 svchost.exe 4312 svchost.exe 4372 spoolsv.exe 4372 spoolsv.exe 4984 explorer.exe 4984 explorer.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2320 wrote to memory of 4984 2320 1f71572c3d8f8b458cffdbdf64df8f0d2a56b6d0155e8c542707ed68126d7d7a.exe 81 PID 2320 wrote to memory of 4984 2320 1f71572c3d8f8b458cffdbdf64df8f0d2a56b6d0155e8c542707ed68126d7d7a.exe 81 PID 2320 wrote to memory of 4984 2320 1f71572c3d8f8b458cffdbdf64df8f0d2a56b6d0155e8c542707ed68126d7d7a.exe 81 PID 4984 wrote to memory of 4940 4984 explorer.exe 82 PID 4984 wrote to memory of 4940 4984 explorer.exe 82 PID 4984 wrote to memory of 4940 4984 explorer.exe 82 PID 4940 wrote to memory of 4312 4940 spoolsv.exe 83 PID 4940 wrote to memory of 4312 4940 spoolsv.exe 83 PID 4940 wrote to memory of 4312 4940 spoolsv.exe 83 PID 4312 wrote to memory of 4372 4312 svchost.exe 84 PID 4312 wrote to memory of 4372 4312 svchost.exe 84 PID 4312 wrote to memory of 4372 4312 svchost.exe 84 PID 4312 wrote to memory of 3632 4312 svchost.exe 85 PID 4312 wrote to memory of 3632 4312 svchost.exe 85 PID 4312 wrote to memory of 3632 4312 svchost.exe 85 PID 4312 wrote to memory of 5012 4312 svchost.exe 95 PID 4312 wrote to memory of 5012 4312 svchost.exe 95 PID 4312 wrote to memory of 5012 4312 svchost.exe 95 PID 4312 wrote to memory of 1584 4312 svchost.exe 97 PID 4312 wrote to memory of 1584 4312 svchost.exe 97 PID 4312 wrote to memory of 1584 4312 svchost.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\1f71572c3d8f8b458cffdbdf64df8f0d2a56b6d0155e8c542707ed68126d7d7a.exe"C:\Users\Admin\AppData\Local\Temp\1f71572c3d8f8b458cffdbdf64df8f0d2a56b6d0155e8c542707ed68126d7d7a.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2320 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4984 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4940 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4312 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4372
-
-
C:\Windows\SysWOW64\at.exeat 02:49 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:3632
-
-
C:\Windows\SysWOW64\at.exeat 02:50 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:5012
-
-
C:\Windows\SysWOW64\at.exeat 02:51 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:1584
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66KB
MD598f661976a4a82f3606f6e9a6476a28b
SHA1e47e6a30994d50827eaf11972204b27e8ee3cca8
SHA256e0a5bcc39877f9a8231d64ccc83504f64a370281c3814f9bf98bf7e6fb71a5cf
SHA5129990e80ce0e629294057fd4bb643b515ec6caae6b344a3006e2d0a7afdc449a5e6635d1eb4e5b853288fe5e56c90621d36c05a939138b11b6882948da7a25cb0
-
Filesize
66KB
MD5c20760ebbe93a02df172223024a44426
SHA1850fe65d219b8d778c42eab165123bd02a9025ae
SHA256c2448795717b9d34cb3b4dd4c5ec563f3c64d9438fd63e9dde6e52dd6507192a
SHA512e398e8cc632191c3d1f66542470ea5c20239f5d65ccea885f15d952660626f7071435039f1b7c086fc6edc7637cb0b9f2f43fad61922de68a3c5af23f48ef091
-
Filesize
66KB
MD5ffa8b87809c93bc47796d0889e8f1a96
SHA1051add480cc13b9dd71191756cdefa8b0763b8fa
SHA256f6e22747ea9bd6dd75ff493eca13d49bd77cf24d4b0b66b6f82e387065fb9e2e
SHA5120415354aef3f763cccfd8488feff47378f8041a80c54bb0e558329bf83109b101309569296e81e41baf021be06548eb1289ddbfaee4c689b03ecb8d88e7f926a
-
Filesize
66KB
MD54397ed135a4ad51698d86e7b1c215e9a
SHA1ede949ca616e76fbbe918aa90f5a05db1618d7c0
SHA2561d13a917f720f4451ab555e9f84b8d5d58ebb06db3c4dbdb0c66feb388756d96
SHA51288cd2693a958844a03abc8edfeb96deb19d7770b4d5f5211750090579f492c3dfa3171bcd36f23033b92ed102f17af7f989b2c6321b9b43c632bed7039e0ddb4