Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
12-06-2024 04:25
Static task
static1
Behavioral task
behavioral1
Sample
ce8d09b56030a10bf42dadcea1297c899133a4817c360bc9a4c5e7bd38077dab.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ce8d09b56030a10bf42dadcea1297c899133a4817c360bc9a4c5e7bd38077dab.exe
Resource
win10v2004-20240508-en
General
-
Target
ce8d09b56030a10bf42dadcea1297c899133a4817c360bc9a4c5e7bd38077dab.exe
-
Size
66KB
-
MD5
147349cb633169a528f55d4ee713449c
-
SHA1
6a96814c65361b0243dae01a5df960d9cdfc130d
-
SHA256
ce8d09b56030a10bf42dadcea1297c899133a4817c360bc9a4c5e7bd38077dab
-
SHA512
b36d2a1bf117ba3742e177d3935cd722629607c8a5474e77f18ecd971dae93a58a21a7aad87308ba939a9d4d7a9de4121295b691f500fad1b2b6f66859a8e7ea
-
SSDEEP
1536:EHfetdklPp+07gDSrB8Xru2zGeJxgawTzpXzrDJrXi0:IeklMMYJhqezw/pXzH9i0
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 3052 explorer.exe 2660 spoolsv.exe 2808 svchost.exe 2220 spoolsv.exe -
Loads dropped DLL 8 IoCs
pid Process 2340 ce8d09b56030a10bf42dadcea1297c899133a4817c360bc9a4c5e7bd38077dab.exe 2340 ce8d09b56030a10bf42dadcea1297c899133a4817c360bc9a4c5e7bd38077dab.exe 3052 explorer.exe 3052 explorer.exe 2660 spoolsv.exe 2660 spoolsv.exe 2808 svchost.exe 2808 svchost.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification \??\c:\windows\system\explorer.exe ce8d09b56030a10bf42dadcea1297c899133a4817c360bc9a4c5e7bd38077dab.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe svchost.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2340 ce8d09b56030a10bf42dadcea1297c899133a4817c360bc9a4c5e7bd38077dab.exe 3052 explorer.exe 3052 explorer.exe 3052 explorer.exe 2808 svchost.exe 2808 svchost.exe 3052 explorer.exe 2808 svchost.exe 3052 explorer.exe 2808 svchost.exe 3052 explorer.exe 2808 svchost.exe 3052 explorer.exe 2808 svchost.exe 3052 explorer.exe 2808 svchost.exe 3052 explorer.exe 2808 svchost.exe 3052 explorer.exe 2808 svchost.exe 3052 explorer.exe 2808 svchost.exe 3052 explorer.exe 2808 svchost.exe 3052 explorer.exe 2808 svchost.exe 3052 explorer.exe 2808 svchost.exe 3052 explorer.exe 2808 svchost.exe 3052 explorer.exe 2808 svchost.exe 3052 explorer.exe 2808 svchost.exe 3052 explorer.exe 2808 svchost.exe 3052 explorer.exe 2808 svchost.exe 3052 explorer.exe 2808 svchost.exe 3052 explorer.exe 2808 svchost.exe 3052 explorer.exe 2808 svchost.exe 3052 explorer.exe 2808 svchost.exe 3052 explorer.exe 2808 svchost.exe 3052 explorer.exe 2808 svchost.exe 3052 explorer.exe 2808 svchost.exe 3052 explorer.exe 2808 svchost.exe 3052 explorer.exe 2808 svchost.exe 3052 explorer.exe 2808 svchost.exe 3052 explorer.exe 2808 svchost.exe 3052 explorer.exe 2808 svchost.exe 3052 explorer.exe 2808 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 3052 explorer.exe 2808 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2340 ce8d09b56030a10bf42dadcea1297c899133a4817c360bc9a4c5e7bd38077dab.exe 2340 ce8d09b56030a10bf42dadcea1297c899133a4817c360bc9a4c5e7bd38077dab.exe 3052 explorer.exe 3052 explorer.exe 2660 spoolsv.exe 2660 spoolsv.exe 2808 svchost.exe 2808 svchost.exe 2220 spoolsv.exe 2220 spoolsv.exe 3052 explorer.exe 3052 explorer.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2340 wrote to memory of 3052 2340 ce8d09b56030a10bf42dadcea1297c899133a4817c360bc9a4c5e7bd38077dab.exe 28 PID 2340 wrote to memory of 3052 2340 ce8d09b56030a10bf42dadcea1297c899133a4817c360bc9a4c5e7bd38077dab.exe 28 PID 2340 wrote to memory of 3052 2340 ce8d09b56030a10bf42dadcea1297c899133a4817c360bc9a4c5e7bd38077dab.exe 28 PID 2340 wrote to memory of 3052 2340 ce8d09b56030a10bf42dadcea1297c899133a4817c360bc9a4c5e7bd38077dab.exe 28 PID 3052 wrote to memory of 2660 3052 explorer.exe 29 PID 3052 wrote to memory of 2660 3052 explorer.exe 29 PID 3052 wrote to memory of 2660 3052 explorer.exe 29 PID 3052 wrote to memory of 2660 3052 explorer.exe 29 PID 2660 wrote to memory of 2808 2660 spoolsv.exe 30 PID 2660 wrote to memory of 2808 2660 spoolsv.exe 30 PID 2660 wrote to memory of 2808 2660 spoolsv.exe 30 PID 2660 wrote to memory of 2808 2660 spoolsv.exe 30 PID 2808 wrote to memory of 2220 2808 svchost.exe 31 PID 2808 wrote to memory of 2220 2808 svchost.exe 31 PID 2808 wrote to memory of 2220 2808 svchost.exe 31 PID 2808 wrote to memory of 2220 2808 svchost.exe 31 PID 2808 wrote to memory of 2904 2808 svchost.exe 32 PID 2808 wrote to memory of 2904 2808 svchost.exe 32 PID 2808 wrote to memory of 2904 2808 svchost.exe 32 PID 2808 wrote to memory of 2904 2808 svchost.exe 32 PID 2808 wrote to memory of 1532 2808 svchost.exe 36 PID 2808 wrote to memory of 1532 2808 svchost.exe 36 PID 2808 wrote to memory of 1532 2808 svchost.exe 36 PID 2808 wrote to memory of 1532 2808 svchost.exe 36 PID 2808 wrote to memory of 924 2808 svchost.exe 38 PID 2808 wrote to memory of 924 2808 svchost.exe 38 PID 2808 wrote to memory of 924 2808 svchost.exe 38 PID 2808 wrote to memory of 924 2808 svchost.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\ce8d09b56030a10bf42dadcea1297c899133a4817c360bc9a4c5e7bd38077dab.exe"C:\Users\Admin\AppData\Local\Temp\ce8d09b56030a10bf42dadcea1297c899133a4817c360bc9a4c5e7bd38077dab.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2340 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3052 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2660 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2808 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2220
-
-
C:\Windows\SysWOW64\at.exeat 04:27 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:2904
-
-
C:\Windows\SysWOW64\at.exeat 04:28 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:1532
-
-
C:\Windows\SysWOW64\at.exeat 04:29 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:924
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66KB
MD58d4ffc1349abd6e20f8cd37534ed2677
SHA1c5f97e3fe37659196e5aa07e1f631526042150c3
SHA256e54a579033d7557ea169d2712cf3b5be3fb24839fa64c9399e7b1f2dba8720f2
SHA512b46588660c4bc792c3d533dd172169900aa1bebd2fa902129b9a977e0f79a273fec777d055f8cb319d52bf00d4c9e3ac9cbb3bf951f7fec5c7ee1166a9a1406e
-
Filesize
66KB
MD54f0a5a17178267e934d723f1dbbd79b3
SHA16e6477f33ece1705287c3dee890701097dea4294
SHA256935ef400698645d0d19e09fea19b0b483de89e2aa20419f4b8ae947defcf8ba8
SHA5121680f9b27b3050aa145bbe417099decfece339124804413a7580ebeccdd899f18d58f87da5c348770323df6b2adc2ec9e1c335376e579fa2b5b4c2311e1297d6
-
Filesize
66KB
MD527b51b92a303d35d1e4bbd5b758f2655
SHA1075887862c20640b50346d192a917c8764de4082
SHA2565000b49dfbb36769ec518fdc0e4084d6b0d95035be4cebb081a5a1e425736d16
SHA51235899d10a7ba33f3a4419c6a81355c0981a3ed02d1430fa021c76da7cc899efd90f4025b0bdaa60e1911f5647f5b4e6392246783a7d5cc4172005da2389eeb36
-
Filesize
66KB
MD5121bf0c32cdb562438ea09487e4fedd4
SHA19cec1f804bdb926382e30af96c30f4426344b7c9
SHA2565203e566bf9b2d73fca5a729c12922fc2f03f2ff3560c90a621646a0c08b5819
SHA51224edd30a44719f680c3fa368380bde37cdae78a9bc41fc26ae907c32e06289a06ac5ba31b0316e9a44d1631c580e7a7f3c97b6478110788fc071e2dd840bf634