Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
12-06-2024 04:46
Static task
static1
Behavioral task
behavioral1
Sample
d5a72adc53d434da872442a8dd7a88a6f492354baacac6d15bc6d51ba98df75a.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d5a72adc53d434da872442a8dd7a88a6f492354baacac6d15bc6d51ba98df75a.exe
Resource
win10v2004-20240611-en
General
-
Target
d5a72adc53d434da872442a8dd7a88a6f492354baacac6d15bc6d51ba98df75a.exe
-
Size
66KB
-
MD5
8fd7138f70be771dc1356599c31c3cd6
-
SHA1
d0dfe1e6ecb6a820af62670f221d1f94193400df
-
SHA256
d5a72adc53d434da872442a8dd7a88a6f492354baacac6d15bc6d51ba98df75a
-
SHA512
49347b0a5cb71370a68059daf2742f5baf7ec29b01478d328de8200339b9a7e9e5d999a5db113e7f32ff68bafd4e0284aa18b94869da5aa44b6b2a97507af425
-
SSDEEP
1536:EHfetdklPp+07gDSrB8Xru2zGeJxgawTzpXzrDJrXih:IeklMMYJhqezw/pXzH9ih
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 2952 explorer.exe 2564 spoolsv.exe 4236 svchost.exe 696 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification C:\Windows\system\udsys.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe d5a72adc53d434da872442a8dd7a88a6f492354baacac6d15bc6d51ba98df75a.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2608 d5a72adc53d434da872442a8dd7a88a6f492354baacac6d15bc6d51ba98df75a.exe 2608 d5a72adc53d434da872442a8dd7a88a6f492354baacac6d15bc6d51ba98df75a.exe 2952 explorer.exe 2952 explorer.exe 2952 explorer.exe 2952 explorer.exe 2952 explorer.exe 2952 explorer.exe 4236 svchost.exe 4236 svchost.exe 4236 svchost.exe 4236 svchost.exe 2952 explorer.exe 2952 explorer.exe 4236 svchost.exe 4236 svchost.exe 2952 explorer.exe 2952 explorer.exe 4236 svchost.exe 4236 svchost.exe 2952 explorer.exe 2952 explorer.exe 4236 svchost.exe 4236 svchost.exe 2952 explorer.exe 2952 explorer.exe 4236 svchost.exe 4236 svchost.exe 2952 explorer.exe 2952 explorer.exe 4236 svchost.exe 4236 svchost.exe 2952 explorer.exe 2952 explorer.exe 4236 svchost.exe 4236 svchost.exe 2952 explorer.exe 2952 explorer.exe 4236 svchost.exe 4236 svchost.exe 2952 explorer.exe 2952 explorer.exe 4236 svchost.exe 4236 svchost.exe 2952 explorer.exe 2952 explorer.exe 4236 svchost.exe 4236 svchost.exe 2952 explorer.exe 2952 explorer.exe 4236 svchost.exe 4236 svchost.exe 2952 explorer.exe 2952 explorer.exe 4236 svchost.exe 4236 svchost.exe 2952 explorer.exe 2952 explorer.exe 4236 svchost.exe 4236 svchost.exe 2952 explorer.exe 2952 explorer.exe 4236 svchost.exe 4236 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2952 explorer.exe 4236 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2608 d5a72adc53d434da872442a8dd7a88a6f492354baacac6d15bc6d51ba98df75a.exe 2608 d5a72adc53d434da872442a8dd7a88a6f492354baacac6d15bc6d51ba98df75a.exe 2952 explorer.exe 2952 explorer.exe 2564 spoolsv.exe 2564 spoolsv.exe 4236 svchost.exe 4236 svchost.exe 696 spoolsv.exe 696 spoolsv.exe 2952 explorer.exe 2952 explorer.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2608 wrote to memory of 2952 2608 d5a72adc53d434da872442a8dd7a88a6f492354baacac6d15bc6d51ba98df75a.exe 81 PID 2608 wrote to memory of 2952 2608 d5a72adc53d434da872442a8dd7a88a6f492354baacac6d15bc6d51ba98df75a.exe 81 PID 2608 wrote to memory of 2952 2608 d5a72adc53d434da872442a8dd7a88a6f492354baacac6d15bc6d51ba98df75a.exe 81 PID 2952 wrote to memory of 2564 2952 explorer.exe 83 PID 2952 wrote to memory of 2564 2952 explorer.exe 83 PID 2952 wrote to memory of 2564 2952 explorer.exe 83 PID 2564 wrote to memory of 4236 2564 spoolsv.exe 84 PID 2564 wrote to memory of 4236 2564 spoolsv.exe 84 PID 2564 wrote to memory of 4236 2564 spoolsv.exe 84 PID 4236 wrote to memory of 696 4236 svchost.exe 85 PID 4236 wrote to memory of 696 4236 svchost.exe 85 PID 4236 wrote to memory of 696 4236 svchost.exe 85 PID 4236 wrote to memory of 1104 4236 svchost.exe 86 PID 4236 wrote to memory of 1104 4236 svchost.exe 86 PID 4236 wrote to memory of 1104 4236 svchost.exe 86 PID 4236 wrote to memory of 3980 4236 svchost.exe 90 PID 4236 wrote to memory of 3980 4236 svchost.exe 90 PID 4236 wrote to memory of 3980 4236 svchost.exe 90 PID 4236 wrote to memory of 2776 4236 svchost.exe 92 PID 4236 wrote to memory of 2776 4236 svchost.exe 92 PID 4236 wrote to memory of 2776 4236 svchost.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\d5a72adc53d434da872442a8dd7a88a6f492354baacac6d15bc6d51ba98df75a.exe"C:\Users\Admin\AppData\Local\Temp\d5a72adc53d434da872442a8dd7a88a6f492354baacac6d15bc6d51ba98df75a.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2608 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2952 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2564 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4236 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:696
-
-
C:\Windows\SysWOW64\at.exeat 04:48 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:1104
-
-
C:\Windows\SysWOW64\at.exeat 04:49 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:3980
-
-
C:\Windows\SysWOW64\at.exeat 04:50 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:2776
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66KB
MD55b5b7eb6c248e8d37ab6826dd6fddd18
SHA14c591093f153e2cc4bb8ea5d438778b2b0fad276
SHA256b34350158a1e18ae4b2b813274d8277b468196c0af1005c3e5a0f8dc55ca2094
SHA512a1a4ec33cc57af251c87bf45fc7915817b6492f23e0bec3c6e9b7889dde1e35f05027b3c76a9b0df65d57fd93cb1c55bb329498d76c10959e255602535ead937
-
Filesize
66KB
MD5ef8c5d82650e9834493febf5df07a16a
SHA194b318be8ce37abada710e4c0a280eba91838379
SHA256045445902b4b6e762a27a0ec38311f80087b55f59ffd8de002cb7e40256ee06b
SHA51238e023e6755e25ed7c9aa8d3452ff4081a2c93e73196c2ffb92220b51a8e0ffd591f7b53c6c699939192e025018477c6e199dde48391d3b32bd6c5e38baf4946
-
Filesize
66KB
MD54047b7d9d01ff8ec0a538ceb97753f7a
SHA1a3ebd89a42589dda25d784364411b70bf3bf4ef5
SHA25658f4f016ebd1407b90bbea0d9b616afeb3198430248bac88f8fe14aa199de1b5
SHA512af8c5bd79f072a28ffccddef3630ca3f8f67bb82f2d79bcb68cd9f587cf32eb206a2317187495bccb2c50cb68c3d36df1e439291f72cdecae698d194413a37a6
-
Filesize
66KB
MD5098a5ee3f1f4c016aed15564126e15d4
SHA184311dad700fb347fe85c7b824a5ab7af1c98113
SHA2569cc809497663f776e17d634e5d4d0737b4a2001be66732c5ec1eefc3a280d858
SHA512a923ceb96f392c731436eb860eacf12423cdd3281a6a74f225f0a80c9d8b4570a7c056f28271dcee466ba96be610158e6ef4967c4ae449496fe3c24a60ef17e1