Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
11/06/2024, 23:39
Static task
static1
Behavioral task
behavioral1
Sample
7634cd402846900e69435d1161ea9317c0cc72f8a63992006cc0833764b486ae.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
7634cd402846900e69435d1161ea9317c0cc72f8a63992006cc0833764b486ae.exe
Resource
win10v2004-20240508-en
General
-
Target
7634cd402846900e69435d1161ea9317c0cc72f8a63992006cc0833764b486ae.exe
-
Size
216KB
-
MD5
82980df5841ac2c05270f6e82134cd9a
-
SHA1
623e1d9f2f389d4732f53a053ebf1a7ae0b6a2a8
-
SHA256
7634cd402846900e69435d1161ea9317c0cc72f8a63992006cc0833764b486ae
-
SHA512
33985729a1b36bda9e59cd9eef4224d37c2125a23366a604b5b2778e79702f970dcaf1d3ac5020201ebb534ae6547e83100927dacf6d2d41060f85f4d96dd539
-
SSDEEP
3072:7vEfVUzSLhIVbV6i5LirrlZrHyrUHUckoMQ2RN6uBL9iA:7vEN2U+T6i5LirrllHy4HUcMQY6C9iA
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 2168 explorer.exe 740 spoolsv.exe 2456 svchost.exe 5080 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification C:\Windows\system\udsys.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe 7634cd402846900e69435d1161ea9317c0cc72f8a63992006cc0833764b486ae.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4480 7634cd402846900e69435d1161ea9317c0cc72f8a63992006cc0833764b486ae.exe 4480 7634cd402846900e69435d1161ea9317c0cc72f8a63992006cc0833764b486ae.exe 2168 explorer.exe 2168 explorer.exe 2168 explorer.exe 2168 explorer.exe 2168 explorer.exe 2168 explorer.exe 2456 svchost.exe 2456 svchost.exe 2456 svchost.exe 2456 svchost.exe 2168 explorer.exe 2168 explorer.exe 2456 svchost.exe 2456 svchost.exe 2168 explorer.exe 2168 explorer.exe 2456 svchost.exe 2456 svchost.exe 2168 explorer.exe 2168 explorer.exe 2456 svchost.exe 2456 svchost.exe 2168 explorer.exe 2168 explorer.exe 2456 svchost.exe 2456 svchost.exe 2168 explorer.exe 2168 explorer.exe 2456 svchost.exe 2456 svchost.exe 2168 explorer.exe 2168 explorer.exe 2456 svchost.exe 2456 svchost.exe 2168 explorer.exe 2168 explorer.exe 2456 svchost.exe 2456 svchost.exe 2168 explorer.exe 2168 explorer.exe 2456 svchost.exe 2456 svchost.exe 2168 explorer.exe 2168 explorer.exe 2456 svchost.exe 2456 svchost.exe 2168 explorer.exe 2168 explorer.exe 2456 svchost.exe 2456 svchost.exe 2168 explorer.exe 2168 explorer.exe 2456 svchost.exe 2456 svchost.exe 2168 explorer.exe 2168 explorer.exe 2456 svchost.exe 2456 svchost.exe 2168 explorer.exe 2168 explorer.exe 2456 svchost.exe 2456 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2168 explorer.exe 2456 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 4480 7634cd402846900e69435d1161ea9317c0cc72f8a63992006cc0833764b486ae.exe 4480 7634cd402846900e69435d1161ea9317c0cc72f8a63992006cc0833764b486ae.exe 2168 explorer.exe 2168 explorer.exe 740 spoolsv.exe 740 spoolsv.exe 2456 svchost.exe 2456 svchost.exe 5080 spoolsv.exe 5080 spoolsv.exe 2168 explorer.exe 2168 explorer.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 4480 wrote to memory of 2168 4480 7634cd402846900e69435d1161ea9317c0cc72f8a63992006cc0833764b486ae.exe 81 PID 4480 wrote to memory of 2168 4480 7634cd402846900e69435d1161ea9317c0cc72f8a63992006cc0833764b486ae.exe 81 PID 4480 wrote to memory of 2168 4480 7634cd402846900e69435d1161ea9317c0cc72f8a63992006cc0833764b486ae.exe 81 PID 2168 wrote to memory of 740 2168 explorer.exe 82 PID 2168 wrote to memory of 740 2168 explorer.exe 82 PID 2168 wrote to memory of 740 2168 explorer.exe 82 PID 740 wrote to memory of 2456 740 spoolsv.exe 83 PID 740 wrote to memory of 2456 740 spoolsv.exe 83 PID 740 wrote to memory of 2456 740 spoolsv.exe 83 PID 2456 wrote to memory of 5080 2456 svchost.exe 84 PID 2456 wrote to memory of 5080 2456 svchost.exe 84 PID 2456 wrote to memory of 5080 2456 svchost.exe 84 PID 2456 wrote to memory of 4376 2456 svchost.exe 85 PID 2456 wrote to memory of 4376 2456 svchost.exe 85 PID 2456 wrote to memory of 4376 2456 svchost.exe 85 PID 2456 wrote to memory of 4364 2456 svchost.exe 94 PID 2456 wrote to memory of 4364 2456 svchost.exe 94 PID 2456 wrote to memory of 4364 2456 svchost.exe 94 PID 2456 wrote to memory of 3120 2456 svchost.exe 96 PID 2456 wrote to memory of 3120 2456 svchost.exe 96 PID 2456 wrote to memory of 3120 2456 svchost.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\7634cd402846900e69435d1161ea9317c0cc72f8a63992006cc0833764b486ae.exe"C:\Users\Admin\AppData\Local\Temp\7634cd402846900e69435d1161ea9317c0cc72f8a63992006cc0833764b486ae.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4480 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2168 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:740 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2456 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5080
-
-
C:\Windows\SysWOW64\at.exeat 23:41 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:4376
-
-
C:\Windows\SysWOW64\at.exeat 23:42 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:4364
-
-
C:\Windows\SysWOW64\at.exeat 23:43 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:3120
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
216KB
MD57df673668e160436e8fae5d33d0060ba
SHA1f909efb9e370bcdc2e41bcd6b152cf93e3169748
SHA25696d484ce0f305e1bec5ff3eaa788fbe572fb996c4729b8cdf5d764f368528f5b
SHA512c8ca5c70e4868f507daafe2fbc05e12107580f29f5004ec7404537eb8e1c2ea207b9101dc619ec0d655bf0e62388aee7e4a82b218d6a1b23359113b3791a0ccf
-
Filesize
216KB
MD54e55f658a9eabefd000a40412435f0b3
SHA1f0ae6f8b4a72a90424e13e12d7d541e5e7825d27
SHA256710f6aacf0dc08ac0c165d6a2c28aba2fca3ae8d6907090aff2471e7a59ead7c
SHA512b2faea4757f34346b7314533dfa5e1453ebc2d42f1b4d6eaadcf8417a6542b9a635bb70ffb295a64957d87bfe4d462429edc7da6ecaba44e9d62e53a94811cb2
-
Filesize
216KB
MD51237dbf138963d6c4285487e463e70e7
SHA1ae3389fc9e13bfb06379956302377880f482d2a2
SHA2562794de18cfa8a26e23c0039641a2f3dd15f81daac90743ee62610b5d0afc02f8
SHA5120e72b42e33851fb1d7b4ecf3e0e7fb464de1231adf460843e5f2824f0fdeb93c2088fe39d4491b5bfc2422b298e961f6ff187dca6f86db0342325caf306124dd
-
Filesize
216KB
MD572c5ccfc3e7f37808cef372d54c4b7f8
SHA14f0e6e8c1c7f7d4ff38ecfa2823ae99ab08b1580
SHA2563813a666fce67f385244a2158560481bb9e616937ba2d1c0f689ada1fec966b7
SHA51210a5fd649e3b7169f52c0f6b1fd9a4470a6259cf4b01374daed02aaf04bd419ab3647411b6b643146b0683d1c3e5f2e73066e4ced21e7735efe0e0da6505f606