Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
12-06-2024 04:46
Static task
static1
Behavioral task
behavioral1
Sample
d5a72adc53d434da872442a8dd7a88a6f492354baacac6d15bc6d51ba98df75a.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d5a72adc53d434da872442a8dd7a88a6f492354baacac6d15bc6d51ba98df75a.exe
Resource
win10v2004-20240611-en
General
-
Target
d5a72adc53d434da872442a8dd7a88a6f492354baacac6d15bc6d51ba98df75a.exe
-
Size
66KB
-
MD5
8fd7138f70be771dc1356599c31c3cd6
-
SHA1
d0dfe1e6ecb6a820af62670f221d1f94193400df
-
SHA256
d5a72adc53d434da872442a8dd7a88a6f492354baacac6d15bc6d51ba98df75a
-
SHA512
49347b0a5cb71370a68059daf2742f5baf7ec29b01478d328de8200339b9a7e9e5d999a5db113e7f32ff68bafd4e0284aa18b94869da5aa44b6b2a97507af425
-
SSDEEP
1536:EHfetdklPp+07gDSrB8Xru2zGeJxgawTzpXzrDJrXih:IeklMMYJhqezw/pXzH9ih
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 2872 explorer.exe 2640 spoolsv.exe 2716 svchost.exe 2592 spoolsv.exe -
Loads dropped DLL 8 IoCs
pid Process 2928 d5a72adc53d434da872442a8dd7a88a6f492354baacac6d15bc6d51ba98df75a.exe 2928 d5a72adc53d434da872442a8dd7a88a6f492354baacac6d15bc6d51ba98df75a.exe 2872 explorer.exe 2872 explorer.exe 2640 spoolsv.exe 2640 spoolsv.exe 2716 svchost.exe 2716 svchost.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification C:\Windows\system\udsys.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe d5a72adc53d434da872442a8dd7a88a6f492354baacac6d15bc6d51ba98df75a.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2928 d5a72adc53d434da872442a8dd7a88a6f492354baacac6d15bc6d51ba98df75a.exe 2872 explorer.exe 2872 explorer.exe 2872 explorer.exe 2716 svchost.exe 2716 svchost.exe 2872 explorer.exe 2716 svchost.exe 2872 explorer.exe 2716 svchost.exe 2872 explorer.exe 2716 svchost.exe 2872 explorer.exe 2716 svchost.exe 2872 explorer.exe 2716 svchost.exe 2872 explorer.exe 2716 svchost.exe 2872 explorer.exe 2716 svchost.exe 2872 explorer.exe 2716 svchost.exe 2872 explorer.exe 2716 svchost.exe 2872 explorer.exe 2716 svchost.exe 2872 explorer.exe 2716 svchost.exe 2872 explorer.exe 2716 svchost.exe 2872 explorer.exe 2716 svchost.exe 2872 explorer.exe 2716 svchost.exe 2872 explorer.exe 2716 svchost.exe 2872 explorer.exe 2716 svchost.exe 2872 explorer.exe 2716 svchost.exe 2872 explorer.exe 2716 svchost.exe 2872 explorer.exe 2716 svchost.exe 2872 explorer.exe 2716 svchost.exe 2872 explorer.exe 2716 svchost.exe 2872 explorer.exe 2716 svchost.exe 2872 explorer.exe 2716 svchost.exe 2872 explorer.exe 2716 svchost.exe 2872 explorer.exe 2716 svchost.exe 2872 explorer.exe 2716 svchost.exe 2872 explorer.exe 2716 svchost.exe 2872 explorer.exe 2716 svchost.exe 2872 explorer.exe 2716 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2872 explorer.exe 2716 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2928 d5a72adc53d434da872442a8dd7a88a6f492354baacac6d15bc6d51ba98df75a.exe 2928 d5a72adc53d434da872442a8dd7a88a6f492354baacac6d15bc6d51ba98df75a.exe 2872 explorer.exe 2872 explorer.exe 2640 spoolsv.exe 2640 spoolsv.exe 2716 svchost.exe 2716 svchost.exe 2592 spoolsv.exe 2592 spoolsv.exe 2872 explorer.exe 2872 explorer.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2928 wrote to memory of 2872 2928 d5a72adc53d434da872442a8dd7a88a6f492354baacac6d15bc6d51ba98df75a.exe 28 PID 2928 wrote to memory of 2872 2928 d5a72adc53d434da872442a8dd7a88a6f492354baacac6d15bc6d51ba98df75a.exe 28 PID 2928 wrote to memory of 2872 2928 d5a72adc53d434da872442a8dd7a88a6f492354baacac6d15bc6d51ba98df75a.exe 28 PID 2928 wrote to memory of 2872 2928 d5a72adc53d434da872442a8dd7a88a6f492354baacac6d15bc6d51ba98df75a.exe 28 PID 2872 wrote to memory of 2640 2872 explorer.exe 29 PID 2872 wrote to memory of 2640 2872 explorer.exe 29 PID 2872 wrote to memory of 2640 2872 explorer.exe 29 PID 2872 wrote to memory of 2640 2872 explorer.exe 29 PID 2640 wrote to memory of 2716 2640 spoolsv.exe 30 PID 2640 wrote to memory of 2716 2640 spoolsv.exe 30 PID 2640 wrote to memory of 2716 2640 spoolsv.exe 30 PID 2640 wrote to memory of 2716 2640 spoolsv.exe 30 PID 2716 wrote to memory of 2592 2716 svchost.exe 31 PID 2716 wrote to memory of 2592 2716 svchost.exe 31 PID 2716 wrote to memory of 2592 2716 svchost.exe 31 PID 2716 wrote to memory of 2592 2716 svchost.exe 31 PID 2716 wrote to memory of 2984 2716 svchost.exe 32 PID 2716 wrote to memory of 2984 2716 svchost.exe 32 PID 2716 wrote to memory of 2984 2716 svchost.exe 32 PID 2716 wrote to memory of 2984 2716 svchost.exe 32 PID 2716 wrote to memory of 1512 2716 svchost.exe 36 PID 2716 wrote to memory of 1512 2716 svchost.exe 36 PID 2716 wrote to memory of 1512 2716 svchost.exe 36 PID 2716 wrote to memory of 1512 2716 svchost.exe 36 PID 2716 wrote to memory of 2244 2716 svchost.exe 38 PID 2716 wrote to memory of 2244 2716 svchost.exe 38 PID 2716 wrote to memory of 2244 2716 svchost.exe 38 PID 2716 wrote to memory of 2244 2716 svchost.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\d5a72adc53d434da872442a8dd7a88a6f492354baacac6d15bc6d51ba98df75a.exe"C:\Users\Admin\AppData\Local\Temp\d5a72adc53d434da872442a8dd7a88a6f492354baacac6d15bc6d51ba98df75a.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2928 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2872 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2640 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2716 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2592
-
-
C:\Windows\SysWOW64\at.exeat 04:48 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:2984
-
-
C:\Windows\SysWOW64\at.exeat 04:49 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:1512
-
-
C:\Windows\SysWOW64\at.exeat 04:50 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:2244
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66KB
MD5b3a80981481e38e7988bbc628c5e3d40
SHA19512c03411e03b2040be0fc5255546d484492db3
SHA256c9dbd1bf7cdf928c8a279b38bca2a82960b12432ae2d6cfb25d81029c39bc7db
SHA512da60860574fdd6431cbc0ee2c3c3e6d01fef3060f897b9317b241e3c2efd5786ab2fb9323bc1f85b75bfbbd6dd55be54535aeb31453333e108dce8d18edc7e7f
-
Filesize
66KB
MD55d65d9e6456448c52ffefb6798e63b08
SHA1bcd32a57b4d5604b9b668f6642437d82785fadfb
SHA256b81a80ebb7338c9e7fa9021eade1dd00cb1c55c3c76a38da3ea77adb06a11d76
SHA5121788fda5703b8c3aa47b666d2cca190b73a8c45b45f769354fbe995ffaff8ad861ee77d59bcc214fd84bd44b5121c61456ecd39310ddeef42c74ca8a2b3d7ffd
-
Filesize
66KB
MD52b7ccbe7c42aaa8a73a3123cf993e5d0
SHA194c0618902812c8ff12c16ffd0e47a1a995e49d5
SHA256c5ecbf24160e6ad17dec2f6f588fbc9f9d3156c8f6dfe737dc88feb539b89533
SHA5124abd568a9395f7e4352627e6cc4a58c5cc15a8cad0e65dd4fb9a9e3fe0e53654d9834396ce7fa1a701f5bc0cbccbd65dffcfbf35b28cb699268c1ab9cc761154
-
Filesize
66KB
MD5d1eea0b724240a1583ed73bd02da334a
SHA16b0a115e0ff15c168e72982be544d43afc792853
SHA2560543287f11d02ef69276c786d538b4e7367e4148e2498da55ce86b4cace9b1ac
SHA512887f069556560b2de92922f776ca3a0985ae5a547e28a1dfb0286bc54a7d18fa17275e38990701d98d98d604a9430f196e06e0b34620aa016c9cf9ca5915acae