Analysis

  • max time kernel
    148s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    11/06/2024, 04:07

General

  • Target

    df579052fa681d2ed07351035c9ab78ed5dd1beb493c4c27c40a02d775ea72f5.exe

  • Size

    207KB

  • MD5

    7ac3da031ee34aed0ddd7f8d7978653f

  • SHA1

    83532aa44302ebcf5ed1b07542d2e1ec8a9abaa2

  • SHA256

    df579052fa681d2ed07351035c9ab78ed5dd1beb493c4c27c40a02d775ea72f5

  • SHA512

    2ce7dd5aedb1d17ac137759f0a31083c5de1177b7418af2822b70de6e90a76754c3578efad32d0b17a306e6cb341bc92ade13eaf6b73105e371abc7ed56ef54b

  • SSDEEP

    3072:5vEfVUzSLhIVbV6i5LirrlZrHyrUHUckoMQ2RN6unLE:5vEN2U+T6i5LirrllHy4HUcMQY6KE

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Modifies Installed Components in the registry 2 TTPs 8 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 8 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\df579052fa681d2ed07351035c9ab78ed5dd1beb493c4c27c40a02d775ea72f5.exe
    "C:\Users\Admin\AppData\Local\Temp\df579052fa681d2ed07351035c9ab78ed5dd1beb493c4c27c40a02d775ea72f5.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3008
    • \??\c:\windows\system\explorer.exe
      c:\windows\system\explorer.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visiblity of hidden/system files in Explorer
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2932
      • \??\c:\windows\system\spoolsv.exe
        c:\windows\system\spoolsv.exe SE
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2520
        • \??\c:\windows\system\svchost.exe
          c:\windows\system\svchost.exe
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visiblity of hidden/system files in Explorer
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2704
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe PR
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:2464
          • C:\Windows\SysWOW64\at.exe
            at 04:09 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
            5⤵
              PID:2876
            • C:\Windows\SysWOW64\at.exe
              at 04:10 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
              5⤵
                PID:1932
              • C:\Windows\SysWOW64\at.exe
                at 04:11 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
                5⤵
                  PID:2096

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\mrsys.exe

          Filesize

          207KB

          MD5

          8eb8615222c87e5c4c093aaa8cf089cd

          SHA1

          c7e21a567fc13b77c4d62a1755cd3612fb73f730

          SHA256

          577e452484c4ff0e7cb9aa30a6d224c1b01143c6bc56f699362120d5916152c6

          SHA512

          1c302dd037635dc0ff24ae3f8f3f85d909da41bbab0e81116bd1a09f16d8a4c677603c9fb6971759b038e6f40af15494bd74c1837de64d5778825f2fdf85cca4

        • \Windows\system\explorer.exe

          Filesize

          206KB

          MD5

          7e3f73160c2ef95c07d69399fbace1d5

          SHA1

          2babdc1392d165a2546a75067353244c0c81665a

          SHA256

          b1d24b304eb247af4495098ab3d4e257b984c5441a814bc61d9dcf3850f58636

          SHA512

          6e3422e1282152377221940d768f94f293af4d88f4415d64a8b5113e82880fe4cb7669194bc886503f81c11a703062b8cc9b6ece4b1938b0f25373a32df47a2b

        • \Windows\system\spoolsv.exe

          Filesize

          207KB

          MD5

          96f35dc94a3ec350ccc9e7d19683bb7d

          SHA1

          f964c43e857bd5f6fe8f566c1259b2a327a3d126

          SHA256

          91e37222e5fd5cde56da84574d3a385425233e19a32a0d20e0c2b5ade8ea0a8b

          SHA512

          3f8cc785331fcf93f0a2531ee265e4d5a0e039b07bc93557e0e19b5f5ac3676a60c62692de65c715b834047b36acd89289f2f2f2cb28c58aa42c36da9f28243b

        • \Windows\system\svchost.exe

          Filesize

          206KB

          MD5

          1c40f9524dfe1ae8fbbafb3676b50dee

          SHA1

          e87663c1103d925a87ce58342164788fea9909b2

          SHA256

          36d3835cfed4b9eca5b2aa4b38455bc884ec058703d7dba0fcd32a05eea5ccf3

          SHA512

          cb46ff50dbae5327314252db54f1cb729d901a42f4834bffaa2e4e3fb7f4dff91377a8787e095a218c74ec8c0a34e45bc962dc16cc62614dff495b9e79658063

        • memory/2464-52-0x0000000000400000-0x0000000000440000-memory.dmp

          Filesize

          256KB

        • memory/2520-55-0x0000000000400000-0x0000000000440000-memory.dmp

          Filesize

          256KB

        • memory/2932-14-0x0000000000400000-0x0000000000440000-memory.dmp

          Filesize

          256KB

        • memory/2932-27-0x00000000026E0000-0x0000000002720000-memory.dmp

          Filesize

          256KB

        • memory/3008-0-0x0000000000400000-0x0000000000440000-memory.dmp

          Filesize

          256KB

        • memory/3008-11-0x0000000002E60000-0x0000000002EA0000-memory.dmp

          Filesize

          256KB

        • memory/3008-56-0x0000000000400000-0x0000000000440000-memory.dmp

          Filesize

          256KB