Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
11/06/2024, 19:21
Static task
static1
Behavioral task
behavioral1
Sample
1db8c87ffb3f7291885afe5d9be823bb4ddd7825fa4d09e32e530eaca43edc8a.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
1db8c87ffb3f7291885afe5d9be823bb4ddd7825fa4d09e32e530eaca43edc8a.exe
Resource
win10v2004-20240508-en
General
-
Target
1db8c87ffb3f7291885afe5d9be823bb4ddd7825fa4d09e32e530eaca43edc8a.exe
-
Size
206KB
-
MD5
57eb5252c1c32b79c0a8a159d3746ed4
-
SHA1
363a253435345172a4e93e2e9b5e697bd9026f33
-
SHA256
1db8c87ffb3f7291885afe5d9be823bb4ddd7825fa4d09e32e530eaca43edc8a
-
SHA512
12e01bb5e4cd0778ddfeb89a49cfc01459d99a8607798c09d037abd754397d0a02f80acf30a6ac7069b1b58219328ca799a2e854cf50bcd31a768eed5ff2cccc
-
SSDEEP
3072:zvEfVUzSLhIVbV6i5LirrlZrHyrUHUckoMQ2RN6unl:zvEN2U+T6i5LirrllHy4HUcMQY6e
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 4684 explorer.exe 228 spoolsv.exe 3096 svchost.exe 1020 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe svchost.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe 1db8c87ffb3f7291885afe5d9be823bb4ddd7825fa4d09e32e530eaca43edc8a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 660 1db8c87ffb3f7291885afe5d9be823bb4ddd7825fa4d09e32e530eaca43edc8a.exe 660 1db8c87ffb3f7291885afe5d9be823bb4ddd7825fa4d09e32e530eaca43edc8a.exe 4684 explorer.exe 4684 explorer.exe 4684 explorer.exe 4684 explorer.exe 4684 explorer.exe 4684 explorer.exe 3096 svchost.exe 3096 svchost.exe 3096 svchost.exe 3096 svchost.exe 4684 explorer.exe 4684 explorer.exe 3096 svchost.exe 3096 svchost.exe 4684 explorer.exe 4684 explorer.exe 3096 svchost.exe 3096 svchost.exe 4684 explorer.exe 4684 explorer.exe 3096 svchost.exe 3096 svchost.exe 4684 explorer.exe 4684 explorer.exe 3096 svchost.exe 3096 svchost.exe 4684 explorer.exe 4684 explorer.exe 3096 svchost.exe 3096 svchost.exe 4684 explorer.exe 4684 explorer.exe 3096 svchost.exe 3096 svchost.exe 4684 explorer.exe 4684 explorer.exe 3096 svchost.exe 3096 svchost.exe 4684 explorer.exe 4684 explorer.exe 3096 svchost.exe 3096 svchost.exe 4684 explorer.exe 4684 explorer.exe 3096 svchost.exe 3096 svchost.exe 4684 explorer.exe 4684 explorer.exe 3096 svchost.exe 3096 svchost.exe 4684 explorer.exe 4684 explorer.exe 3096 svchost.exe 3096 svchost.exe 4684 explorer.exe 4684 explorer.exe 3096 svchost.exe 3096 svchost.exe 4684 explorer.exe 4684 explorer.exe 3096 svchost.exe 3096 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 4684 explorer.exe 3096 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 660 1db8c87ffb3f7291885afe5d9be823bb4ddd7825fa4d09e32e530eaca43edc8a.exe 660 1db8c87ffb3f7291885afe5d9be823bb4ddd7825fa4d09e32e530eaca43edc8a.exe 4684 explorer.exe 4684 explorer.exe 228 spoolsv.exe 228 spoolsv.exe 3096 svchost.exe 3096 svchost.exe 1020 spoolsv.exe 1020 spoolsv.exe 4684 explorer.exe 4684 explorer.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 660 wrote to memory of 4684 660 1db8c87ffb3f7291885afe5d9be823bb4ddd7825fa4d09e32e530eaca43edc8a.exe 82 PID 660 wrote to memory of 4684 660 1db8c87ffb3f7291885afe5d9be823bb4ddd7825fa4d09e32e530eaca43edc8a.exe 82 PID 660 wrote to memory of 4684 660 1db8c87ffb3f7291885afe5d9be823bb4ddd7825fa4d09e32e530eaca43edc8a.exe 82 PID 4684 wrote to memory of 228 4684 explorer.exe 83 PID 4684 wrote to memory of 228 4684 explorer.exe 83 PID 4684 wrote to memory of 228 4684 explorer.exe 83 PID 228 wrote to memory of 3096 228 spoolsv.exe 85 PID 228 wrote to memory of 3096 228 spoolsv.exe 85 PID 228 wrote to memory of 3096 228 spoolsv.exe 85 PID 3096 wrote to memory of 1020 3096 svchost.exe 86 PID 3096 wrote to memory of 1020 3096 svchost.exe 86 PID 3096 wrote to memory of 1020 3096 svchost.exe 86 PID 3096 wrote to memory of 3192 3096 svchost.exe 88 PID 3096 wrote to memory of 3192 3096 svchost.exe 88 PID 3096 wrote to memory of 3192 3096 svchost.exe 88 PID 3096 wrote to memory of 2368 3096 svchost.exe 98 PID 3096 wrote to memory of 2368 3096 svchost.exe 98 PID 3096 wrote to memory of 2368 3096 svchost.exe 98 PID 3096 wrote to memory of 4920 3096 svchost.exe 100 PID 3096 wrote to memory of 4920 3096 svchost.exe 100 PID 3096 wrote to memory of 4920 3096 svchost.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\1db8c87ffb3f7291885afe5d9be823bb4ddd7825fa4d09e32e530eaca43edc8a.exe"C:\Users\Admin\AppData\Local\Temp\1db8c87ffb3f7291885afe5d9be823bb4ddd7825fa4d09e32e530eaca43edc8a.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:660 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4684 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:228 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3096 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1020
-
-
C:\Windows\SysWOW64\at.exeat 19:23 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:3192
-
-
C:\Windows\SysWOW64\at.exeat 19:24 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:2368
-
-
C:\Windows\SysWOW64\at.exeat 19:25 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:4920
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
206KB
MD560b1e4a99f9ee8cd07716d6b32a91e52
SHA1417a175eeeac903996a211d240bffae2f73e0eff
SHA256ce3957ac48f97b53c3ae5ccc5daa94ccaace61a8135e1b436267e541c44dfc53
SHA51260eab100e58e9bd62f1813255e995276b55c6ce67d42e4e93cac9a223f5177067bd8fd1b51c064951079819bb7dd2f8b49aaaeea8031e18c3f11fbb21357fe67
-
Filesize
206KB
MD51706d41c83bd64b9418556a19103d8f8
SHA13e3300bda56334fb748012bca2249627bd69f547
SHA256bea2ae76e8dcd85b37a8a488fb9ab7244990a1ef8ef230ed7045e73f8423694f
SHA512fedab1cd815405c0a1d61a67179d51e6bc98504c63360204e346534444d499970bd79b6aaeb43867ccfd0644e662039e9b986b080160a23416d66f73a2659e92
-
Filesize
206KB
MD58871f8beb923c7b876c1a4353ef068ca
SHA10ca0144d110dfd603ad15b88524ab0f023fe9eff
SHA25619d21ea5d3b3d74d5c6e52937563ee1b47fe4c9178bb382e0fec1d147d65dc53
SHA5127b2155cf7a0133535a9250b6f142b435095d5e4bb43fa1e0f6d8ceed9753837b1567faf7eced2a5607cf92b739cedeac35bfbee5446fed414cab1c47d6ad7826
-
Filesize
206KB
MD5319fcd2ed675b288db8655ce6af91888
SHA1a3d11bf004c1c89c721cf70dc81efff8c4ac602e
SHA25688477e3759562afc090b1141d16935177b713e466fc08815dbc69ffb9a3f3abb
SHA512cdd796353da123ccccba9e3e3e8ec87a6ded399707529a2fddc9d84130279633a3f1b6ca85461f5d231899a5e1b4d8b5a33896025d5aff519689d783655bfecc