Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    13-06-2024 22:08

General

  • Target

    4230c744b44b026252ec0961b884a77e164ceae1eec514e0b724c223afbdd90e.exe

  • Size

    65KB

  • MD5

    70c35d668d0506e94a29f3cd95c3687a

  • SHA1

    2d460c83d5d6fe3835ca595ce35b420b3b90443d

  • SHA256

    4230c744b44b026252ec0961b884a77e164ceae1eec514e0b724c223afbdd90e

  • SHA512

    609837bf04451f65a072ecede018f99ef71fb696e6323b1542d6dc5fba28aeffbe13ce2864dc8bdd3fe935b4405fe73e3c8ede64e41d47dcbef3b28466812a64

  • SSDEEP

    1536:ECq3yRuqrI01eArdW/O7JnI2e13XiLij40MkTUVqa/OuWppppppppppppppppppq:7WNqkOJWmo1HpM0MkTUmup

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Modifies Installed Components in the registry 2 TTPs 8 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 8 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4230c744b44b026252ec0961b884a77e164ceae1eec514e0b724c223afbdd90e.exe
    "C:\Users\Admin\AppData\Local\Temp\4230c744b44b026252ec0961b884a77e164ceae1eec514e0b724c223afbdd90e.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2128
    • \??\c:\windows\system\explorer.exe
      c:\windows\system\explorer.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visiblity of hidden/system files in Explorer
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2332
      • \??\c:\windows\system\spoolsv.exe
        c:\windows\system\spoolsv.exe SE
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2620
        • \??\c:\windows\system\svchost.exe
          c:\windows\system\svchost.exe
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visiblity of hidden/system files in Explorer
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2988
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe PR
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:2464
          • C:\Windows\SysWOW64\at.exe
            at 22:10 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
            5⤵
              PID:2252
            • C:\Windows\SysWOW64\at.exe
              at 22:11 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
              5⤵
                PID:804
              • C:\Windows\SysWOW64\at.exe
                at 22:12 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
                5⤵
                  PID:640

        Network

        MITRE ATT&CK Matrix ATT&CK v13

        Persistence

        Boot or Logon Autostart Execution

        3
        T1547

        Registry Run Keys / Startup Folder

        2
        T1547.001

        Winlogon Helper DLL

        1
        T1547.004

        Privilege Escalation

        Boot or Logon Autostart Execution

        3
        T1547

        Registry Run Keys / Startup Folder

        2
        T1547.001

        Winlogon Helper DLL

        1
        T1547.004

        Defense Evasion

        Modify Registry

        4
        T1112

        Hide Artifacts

        1
        T1564

        Hidden Files and Directories

        1
        T1564.001

        Discovery

        System Information Discovery

        1
        T1082

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\mrsys.exe
          Filesize

          65KB

          MD5

          7781fc28e9cfc7f5f8c7d8fbc251a2ab

          SHA1

          4b8aad8b58fd52145af92ba5bcfb8a0a779021ce

          SHA256

          78042b9696a997d75b4bab05d0f92ebf11c2a5f42dbd66df6f98784a27a3e48c

          SHA512

          da2179218a6d5785b133a521e782de3e867a8873fbb58d03a5c43b35399708023d014e711cbea6d17263610539f8379560ad147e9cd6debd4844c6183de25487

        • \Windows\system\explorer.exe
          Filesize

          65KB

          MD5

          f09373231e6c51abe0b5a30ba7f4a0bb

          SHA1

          58a7e8fec040f5864efa4dfb5a41495b809d061a

          SHA256

          cb84d83ef4c2afceb40e80dd74fd13871d7bfb31468bf38fc7af02db2c9f4c3f

          SHA512

          48d79cb81e868a984c472a4874d658ebd15a9ca7596b00653d39a7790d4c4df831a65727059609d849ba0c5d9f7462984983baf1927f86b133b01b15bfb46829

        • \Windows\system\spoolsv.exe
          Filesize

          65KB

          MD5

          5c0ed9fc4f492b8d1a5c882490a61761

          SHA1

          bfa69efcfe4bec7df58a2081db848edba7c22bfd

          SHA256

          fddf98e43ec69fc1c3ff32bf6c4d039f035fab3b86216f590db0681f1521177a

          SHA512

          1611905329d3cf617033b461cd5e97978887e4487074510b627d85b16594fc9611d3b045c69994e113a554a5751ae67934bfcafcd1ac3c7518d6107fc73418f5

        • \Windows\system\svchost.exe
          Filesize

          65KB

          MD5

          c09f87c68ecfcfa0315d144e9c3c3b1d

          SHA1

          c2a5884ba3f84e52240ebf5d0960dce90a09ea0f

          SHA256

          27956563961af274ed5a0c87071fab07bc9a58e1aaeab512daa619f313921755

          SHA512

          813db8860f634f9300310ff06d85d6511d559a066e4d78a8578ec33682f564a5bb8d99f299ad3cea922350232cbd0de94a0db726536c013184a16fe8aa935461

        • memory/2128-16-0x00000000023D0000-0x0000000002401000-memory.dmp
          Filesize

          196KB

        • memory/2128-2-0x0000000072940000-0x0000000072A93000-memory.dmp
          Filesize

          1.3MB

        • memory/2128-3-0x0000000000400000-0x0000000000431000-memory.dmp
          Filesize

          196KB

        • memory/2128-1-0x0000000000020000-0x0000000000024000-memory.dmp
          Filesize

          16KB

        • memory/2128-4-0x0000000000401000-0x000000000042E000-memory.dmp
          Filesize

          180KB

        • memory/2128-78-0x0000000000400000-0x0000000000431000-memory.dmp
          Filesize

          196KB

        • memory/2128-0-0x0000000000400000-0x0000000000431000-memory.dmp
          Filesize

          196KB

        • memory/2128-79-0x0000000000401000-0x000000000042E000-memory.dmp
          Filesize

          180KB

        • memory/2128-62-0x0000000000401000-0x000000000042E000-memory.dmp
          Filesize

          180KB

        • memory/2332-18-0x0000000000400000-0x0000000000431000-memory.dmp
          Filesize

          196KB

        • memory/2332-91-0x0000000000400000-0x0000000000431000-memory.dmp
          Filesize

          196KB

        • memory/2332-81-0x0000000000400000-0x0000000000431000-memory.dmp
          Filesize

          196KB

        • memory/2332-19-0x0000000072940000-0x0000000072A93000-memory.dmp
          Filesize

          1.3MB

        • memory/2332-25-0x0000000000400000-0x0000000000431000-memory.dmp
          Filesize

          196KB

        • memory/2332-30-0x00000000032D0000-0x0000000003301000-memory.dmp
          Filesize

          196KB

        • memory/2332-66-0x0000000000400000-0x0000000000431000-memory.dmp
          Filesize

          196KB

        • memory/2464-67-0x0000000072940000-0x0000000072A93000-memory.dmp
          Filesize

          1.3MB

        • memory/2464-73-0x0000000000400000-0x0000000000431000-memory.dmp
          Filesize

          196KB

        • memory/2620-36-0x0000000072940000-0x0000000072A93000-memory.dmp
          Filesize

          1.3MB

        • memory/2620-40-0x0000000000400000-0x0000000000431000-memory.dmp
          Filesize

          196KB

        • memory/2620-77-0x0000000000400000-0x0000000000431000-memory.dmp
          Filesize

          196KB

        • memory/2620-52-0x0000000001E90000-0x0000000001EC1000-memory.dmp
          Filesize

          196KB

        • memory/2988-64-0x00000000024F0000-0x0000000002521000-memory.dmp
          Filesize

          196KB

        • memory/2988-60-0x0000000000400000-0x0000000000431000-memory.dmp
          Filesize

          196KB

        • memory/2988-54-0x0000000072940000-0x0000000072A93000-memory.dmp
          Filesize

          1.3MB

        • memory/2988-82-0x0000000000400000-0x0000000000431000-memory.dmp
          Filesize

          196KB

        • memory/2988-53-0x0000000000400000-0x0000000000431000-memory.dmp
          Filesize

          196KB