Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/06/2024, 23:39

General

  • Target

    7634cd402846900e69435d1161ea9317c0cc72f8a63992006cc0833764b486ae.exe

  • Size

    216KB

  • MD5

    82980df5841ac2c05270f6e82134cd9a

  • SHA1

    623e1d9f2f389d4732f53a053ebf1a7ae0b6a2a8

  • SHA256

    7634cd402846900e69435d1161ea9317c0cc72f8a63992006cc0833764b486ae

  • SHA512

    33985729a1b36bda9e59cd9eef4224d37c2125a23366a604b5b2778e79702f970dcaf1d3ac5020201ebb534ae6547e83100927dacf6d2d41060f85f4d96dd539

  • SSDEEP

    3072:7vEfVUzSLhIVbV6i5LirrlZrHyrUHUckoMQ2RN6uBL9iA:7vEN2U+T6i5LirrllHy4HUcMQY6C9iA

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Modifies Installed Components in the registry 2 TTPs 8 IoCs
  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7634cd402846900e69435d1161ea9317c0cc72f8a63992006cc0833764b486ae.exe
    "C:\Users\Admin\AppData\Local\Temp\7634cd402846900e69435d1161ea9317c0cc72f8a63992006cc0833764b486ae.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4480
    • \??\c:\windows\system\explorer.exe
      c:\windows\system\explorer.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visiblity of hidden/system files in Explorer
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2168
      • \??\c:\windows\system\spoolsv.exe
        c:\windows\system\spoolsv.exe SE
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:740
        • \??\c:\windows\system\svchost.exe
          c:\windows\system\svchost.exe
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visiblity of hidden/system files in Explorer
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2456
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe PR
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:5080
          • C:\Windows\SysWOW64\at.exe
            at 23:41 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
            5⤵
              PID:4376
            • C:\Windows\SysWOW64\at.exe
              at 23:42 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
              5⤵
                PID:4364
              • C:\Windows\SysWOW64\at.exe
                at 23:43 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
                5⤵
                  PID:3120

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\mrsys.exe

          Filesize

          216KB

          MD5

          7df673668e160436e8fae5d33d0060ba

          SHA1

          f909efb9e370bcdc2e41bcd6b152cf93e3169748

          SHA256

          96d484ce0f305e1bec5ff3eaa788fbe572fb996c4729b8cdf5d764f368528f5b

          SHA512

          c8ca5c70e4868f507daafe2fbc05e12107580f29f5004ec7404537eb8e1c2ea207b9101dc619ec0d655bf0e62388aee7e4a82b218d6a1b23359113b3791a0ccf

        • C:\Windows\System\explorer.exe

          Filesize

          216KB

          MD5

          4e55f658a9eabefd000a40412435f0b3

          SHA1

          f0ae6f8b4a72a90424e13e12d7d541e5e7825d27

          SHA256

          710f6aacf0dc08ac0c165d6a2c28aba2fca3ae8d6907090aff2471e7a59ead7c

          SHA512

          b2faea4757f34346b7314533dfa5e1453ebc2d42f1b4d6eaadcf8417a6542b9a635bb70ffb295a64957d87bfe4d462429edc7da6ecaba44e9d62e53a94811cb2

        • C:\Windows\System\spoolsv.exe

          Filesize

          216KB

          MD5

          1237dbf138963d6c4285487e463e70e7

          SHA1

          ae3389fc9e13bfb06379956302377880f482d2a2

          SHA256

          2794de18cfa8a26e23c0039641a2f3dd15f81daac90743ee62610b5d0afc02f8

          SHA512

          0e72b42e33851fb1d7b4ecf3e0e7fb464de1231adf460843e5f2824f0fdeb93c2088fe39d4491b5bfc2422b298e961f6ff187dca6f86db0342325caf306124dd

        • C:\Windows\System\svchost.exe

          Filesize

          216KB

          MD5

          72c5ccfc3e7f37808cef372d54c4b7f8

          SHA1

          4f0e6e8c1c7f7d4ff38ecfa2823ae99ab08b1580

          SHA256

          3813a666fce67f385244a2158560481bb9e616937ba2d1c0f689ada1fec966b7

          SHA512

          10a5fd649e3b7169f52c0f6b1fd9a4470a6259cf4b01374daed02aaf04bd419ab3647411b6b643146b0683d1c3e5f2e73066e4ced21e7735efe0e0da6505f606

        • memory/740-36-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/2168-9-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/4480-0-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/4480-37-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/5080-35-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB