Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
13-06-2024 22:08
Static task
static1
Behavioral task
behavioral1
Sample
4230c744b44b026252ec0961b884a77e164ceae1eec514e0b724c223afbdd90e.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4230c744b44b026252ec0961b884a77e164ceae1eec514e0b724c223afbdd90e.exe
Resource
win10v2004-20240508-en
General
-
Target
4230c744b44b026252ec0961b884a77e164ceae1eec514e0b724c223afbdd90e.exe
-
Size
65KB
-
MD5
70c35d668d0506e94a29f3cd95c3687a
-
SHA1
2d460c83d5d6fe3835ca595ce35b420b3b90443d
-
SHA256
4230c744b44b026252ec0961b884a77e164ceae1eec514e0b724c223afbdd90e
-
SHA512
609837bf04451f65a072ecede018f99ef71fb696e6323b1542d6dc5fba28aeffbe13ce2864dc8bdd3fe935b4405fe73e3c8ede64e41d47dcbef3b28466812a64
-
SSDEEP
1536:ECq3yRuqrI01eArdW/O7JnI2e13XiLij40MkTUVqa/OuWppppppppppppppppppq:7WNqkOJWmo1HpM0MkTUmup
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
Processes:
explorer.exesvchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
Processes:
explorer.exesvchost.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
Processes:
svchost.exeexplorer.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe -
Executes dropped EXE 4 IoCs
Processes:
explorer.exespoolsv.exesvchost.exespoolsv.exepid process 2332 explorer.exe 2620 spoolsv.exe 2988 svchost.exe 2464 spoolsv.exe -
Loads dropped DLL 8 IoCs
Processes:
4230c744b44b026252ec0961b884a77e164ceae1eec514e0b724c223afbdd90e.exeexplorer.exespoolsv.exesvchost.exepid process 2128 4230c744b44b026252ec0961b884a77e164ceae1eec514e0b724c223afbdd90e.exe 2128 4230c744b44b026252ec0961b884a77e164ceae1eec514e0b724c223afbdd90e.exe 2332 explorer.exe 2332 explorer.exe 2620 spoolsv.exe 2620 spoolsv.exe 2988 svchost.exe 2988 svchost.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
svchost.exeexplorer.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe -
Drops file in Windows directory 6 IoCs
Processes:
spoolsv.exeexplorer.exesvchost.exe4230c744b44b026252ec0961b884a77e164ceae1eec514e0b724c223afbdd90e.exedescription ioc process File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe svchost.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe 4230c744b44b026252ec0961b884a77e164ceae1eec514e0b724c223afbdd90e.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
4230c744b44b026252ec0961b884a77e164ceae1eec514e0b724c223afbdd90e.exeexplorer.exesvchost.exepid process 2128 4230c744b44b026252ec0961b884a77e164ceae1eec514e0b724c223afbdd90e.exe 2332 explorer.exe 2332 explorer.exe 2332 explorer.exe 2988 svchost.exe 2988 svchost.exe 2332 explorer.exe 2988 svchost.exe 2332 explorer.exe 2988 svchost.exe 2332 explorer.exe 2988 svchost.exe 2332 explorer.exe 2988 svchost.exe 2332 explorer.exe 2988 svchost.exe 2332 explorer.exe 2988 svchost.exe 2332 explorer.exe 2988 svchost.exe 2332 explorer.exe 2988 svchost.exe 2332 explorer.exe 2988 svchost.exe 2332 explorer.exe 2988 svchost.exe 2332 explorer.exe 2988 svchost.exe 2332 explorer.exe 2988 svchost.exe 2332 explorer.exe 2988 svchost.exe 2332 explorer.exe 2988 svchost.exe 2332 explorer.exe 2988 svchost.exe 2332 explorer.exe 2988 svchost.exe 2332 explorer.exe 2988 svchost.exe 2332 explorer.exe 2988 svchost.exe 2332 explorer.exe 2988 svchost.exe 2332 explorer.exe 2988 svchost.exe 2332 explorer.exe 2988 svchost.exe 2332 explorer.exe 2988 svchost.exe 2332 explorer.exe 2988 svchost.exe 2332 explorer.exe 2988 svchost.exe 2332 explorer.exe 2988 svchost.exe 2332 explorer.exe 2988 svchost.exe 2332 explorer.exe 2988 svchost.exe 2332 explorer.exe 2988 svchost.exe 2332 explorer.exe 2988 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
explorer.exesvchost.exepid process 2332 explorer.exe 2988 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
Processes:
4230c744b44b026252ec0961b884a77e164ceae1eec514e0b724c223afbdd90e.exeexplorer.exespoolsv.exesvchost.exespoolsv.exepid process 2128 4230c744b44b026252ec0961b884a77e164ceae1eec514e0b724c223afbdd90e.exe 2128 4230c744b44b026252ec0961b884a77e164ceae1eec514e0b724c223afbdd90e.exe 2332 explorer.exe 2332 explorer.exe 2620 spoolsv.exe 2620 spoolsv.exe 2988 svchost.exe 2988 svchost.exe 2464 spoolsv.exe 2464 spoolsv.exe 2332 explorer.exe 2332 explorer.exe -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
4230c744b44b026252ec0961b884a77e164ceae1eec514e0b724c223afbdd90e.exeexplorer.exespoolsv.exesvchost.exedescription pid process target process PID 2128 wrote to memory of 2332 2128 4230c744b44b026252ec0961b884a77e164ceae1eec514e0b724c223afbdd90e.exe explorer.exe PID 2128 wrote to memory of 2332 2128 4230c744b44b026252ec0961b884a77e164ceae1eec514e0b724c223afbdd90e.exe explorer.exe PID 2128 wrote to memory of 2332 2128 4230c744b44b026252ec0961b884a77e164ceae1eec514e0b724c223afbdd90e.exe explorer.exe PID 2128 wrote to memory of 2332 2128 4230c744b44b026252ec0961b884a77e164ceae1eec514e0b724c223afbdd90e.exe explorer.exe PID 2332 wrote to memory of 2620 2332 explorer.exe spoolsv.exe PID 2332 wrote to memory of 2620 2332 explorer.exe spoolsv.exe PID 2332 wrote to memory of 2620 2332 explorer.exe spoolsv.exe PID 2332 wrote to memory of 2620 2332 explorer.exe spoolsv.exe PID 2620 wrote to memory of 2988 2620 spoolsv.exe svchost.exe PID 2620 wrote to memory of 2988 2620 spoolsv.exe svchost.exe PID 2620 wrote to memory of 2988 2620 spoolsv.exe svchost.exe PID 2620 wrote to memory of 2988 2620 spoolsv.exe svchost.exe PID 2988 wrote to memory of 2464 2988 svchost.exe spoolsv.exe PID 2988 wrote to memory of 2464 2988 svchost.exe spoolsv.exe PID 2988 wrote to memory of 2464 2988 svchost.exe spoolsv.exe PID 2988 wrote to memory of 2464 2988 svchost.exe spoolsv.exe PID 2988 wrote to memory of 2252 2988 svchost.exe at.exe PID 2988 wrote to memory of 2252 2988 svchost.exe at.exe PID 2988 wrote to memory of 2252 2988 svchost.exe at.exe PID 2988 wrote to memory of 2252 2988 svchost.exe at.exe PID 2988 wrote to memory of 804 2988 svchost.exe at.exe PID 2988 wrote to memory of 804 2988 svchost.exe at.exe PID 2988 wrote to memory of 804 2988 svchost.exe at.exe PID 2988 wrote to memory of 804 2988 svchost.exe at.exe PID 2988 wrote to memory of 640 2988 svchost.exe at.exe PID 2988 wrote to memory of 640 2988 svchost.exe at.exe PID 2988 wrote to memory of 640 2988 svchost.exe at.exe PID 2988 wrote to memory of 640 2988 svchost.exe at.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4230c744b44b026252ec0961b884a77e164ceae1eec514e0b724c223afbdd90e.exe"C:\Users\Admin\AppData\Local\Temp\4230c744b44b026252ec0961b884a77e164ceae1eec514e0b724c223afbdd90e.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\at.exeat 22:10 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵
-
C:\Windows\SysWOW64\at.exeat 22:11 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵
-
C:\Windows\SysWOW64\at.exeat 22:12 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\mrsys.exeFilesize
65KB
MD57781fc28e9cfc7f5f8c7d8fbc251a2ab
SHA14b8aad8b58fd52145af92ba5bcfb8a0a779021ce
SHA25678042b9696a997d75b4bab05d0f92ebf11c2a5f42dbd66df6f98784a27a3e48c
SHA512da2179218a6d5785b133a521e782de3e867a8873fbb58d03a5c43b35399708023d014e711cbea6d17263610539f8379560ad147e9cd6debd4844c6183de25487
-
\Windows\system\explorer.exeFilesize
65KB
MD5f09373231e6c51abe0b5a30ba7f4a0bb
SHA158a7e8fec040f5864efa4dfb5a41495b809d061a
SHA256cb84d83ef4c2afceb40e80dd74fd13871d7bfb31468bf38fc7af02db2c9f4c3f
SHA51248d79cb81e868a984c472a4874d658ebd15a9ca7596b00653d39a7790d4c4df831a65727059609d849ba0c5d9f7462984983baf1927f86b133b01b15bfb46829
-
\Windows\system\spoolsv.exeFilesize
65KB
MD55c0ed9fc4f492b8d1a5c882490a61761
SHA1bfa69efcfe4bec7df58a2081db848edba7c22bfd
SHA256fddf98e43ec69fc1c3ff32bf6c4d039f035fab3b86216f590db0681f1521177a
SHA5121611905329d3cf617033b461cd5e97978887e4487074510b627d85b16594fc9611d3b045c69994e113a554a5751ae67934bfcafcd1ac3c7518d6107fc73418f5
-
\Windows\system\svchost.exeFilesize
65KB
MD5c09f87c68ecfcfa0315d144e9c3c3b1d
SHA1c2a5884ba3f84e52240ebf5d0960dce90a09ea0f
SHA25627956563961af274ed5a0c87071fab07bc9a58e1aaeab512daa619f313921755
SHA512813db8860f634f9300310ff06d85d6511d559a066e4d78a8578ec33682f564a5bb8d99f299ad3cea922350232cbd0de94a0db726536c013184a16fe8aa935461
-
memory/2128-16-0x00000000023D0000-0x0000000002401000-memory.dmpFilesize
196KB
-
memory/2128-2-0x0000000072940000-0x0000000072A93000-memory.dmpFilesize
1.3MB
-
memory/2128-3-0x0000000000400000-0x0000000000431000-memory.dmpFilesize
196KB
-
memory/2128-1-0x0000000000020000-0x0000000000024000-memory.dmpFilesize
16KB
-
memory/2128-4-0x0000000000401000-0x000000000042E000-memory.dmpFilesize
180KB
-
memory/2128-78-0x0000000000400000-0x0000000000431000-memory.dmpFilesize
196KB
-
memory/2128-0-0x0000000000400000-0x0000000000431000-memory.dmpFilesize
196KB
-
memory/2128-79-0x0000000000401000-0x000000000042E000-memory.dmpFilesize
180KB
-
memory/2128-62-0x0000000000401000-0x000000000042E000-memory.dmpFilesize
180KB
-
memory/2332-18-0x0000000000400000-0x0000000000431000-memory.dmpFilesize
196KB
-
memory/2332-91-0x0000000000400000-0x0000000000431000-memory.dmpFilesize
196KB
-
memory/2332-81-0x0000000000400000-0x0000000000431000-memory.dmpFilesize
196KB
-
memory/2332-19-0x0000000072940000-0x0000000072A93000-memory.dmpFilesize
1.3MB
-
memory/2332-25-0x0000000000400000-0x0000000000431000-memory.dmpFilesize
196KB
-
memory/2332-30-0x00000000032D0000-0x0000000003301000-memory.dmpFilesize
196KB
-
memory/2332-66-0x0000000000400000-0x0000000000431000-memory.dmpFilesize
196KB
-
memory/2464-67-0x0000000072940000-0x0000000072A93000-memory.dmpFilesize
1.3MB
-
memory/2464-73-0x0000000000400000-0x0000000000431000-memory.dmpFilesize
196KB
-
memory/2620-36-0x0000000072940000-0x0000000072A93000-memory.dmpFilesize
1.3MB
-
memory/2620-40-0x0000000000400000-0x0000000000431000-memory.dmpFilesize
196KB
-
memory/2620-77-0x0000000000400000-0x0000000000431000-memory.dmpFilesize
196KB
-
memory/2620-52-0x0000000001E90000-0x0000000001EC1000-memory.dmpFilesize
196KB
-
memory/2988-64-0x00000000024F0000-0x0000000002521000-memory.dmpFilesize
196KB
-
memory/2988-60-0x0000000000400000-0x0000000000431000-memory.dmpFilesize
196KB
-
memory/2988-54-0x0000000072940000-0x0000000072A93000-memory.dmpFilesize
1.3MB
-
memory/2988-82-0x0000000000400000-0x0000000000431000-memory.dmpFilesize
196KB
-
memory/2988-53-0x0000000000400000-0x0000000000431000-memory.dmpFilesize
196KB