Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
13-06-2024 22:02
Static task
static1
Behavioral task
behavioral1
Sample
3fc8084e724f10c0b6f94416c18032a2e1a6ebcb3021d76e9b9c655301d01bb6.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3fc8084e724f10c0b6f94416c18032a2e1a6ebcb3021d76e9b9c655301d01bb6.exe
Resource
win10v2004-20240508-en
General
-
Target
3fc8084e724f10c0b6f94416c18032a2e1a6ebcb3021d76e9b9c655301d01bb6.exe
-
Size
66KB
-
MD5
23aa9b9c01f9b6a3c5661b2dc652cb2e
-
SHA1
d0ba8f8db0654ddeff99e7885fdc7a2972a3a4ee
-
SHA256
3fc8084e724f10c0b6f94416c18032a2e1a6ebcb3021d76e9b9c655301d01bb6
-
SHA512
63871b0cee982464fc37b48ea1365e6203ccdf19df21091c44e05ccb0b4dd22b73921b548a2158e553c5f920ab91f99a13a90e3df291919ec8c6b515ecb05669
-
SSDEEP
1536:EHfetdklPp+07gDSrB8Xru2zGeJxgawTzpXzrDJrXiP:IeklMMYJhqezw/pXzH9iP
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
Processes:
explorer.exesvchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
Processes:
explorer.exesvchost.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
Processes:
svchost.exeexplorer.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe -
Executes dropped EXE 4 IoCs
Processes:
explorer.exespoolsv.exesvchost.exespoolsv.exepid process 1148 explorer.exe 3708 spoolsv.exe 4796 svchost.exe 3336 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
explorer.exesvchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe -
Drops file in Windows directory 6 IoCs
Processes:
3fc8084e724f10c0b6f94416c18032a2e1a6ebcb3021d76e9b9c655301d01bb6.exeexplorer.exespoolsv.exesvchost.exedescription ioc process File opened for modification \??\c:\windows\system\explorer.exe 3fc8084e724f10c0b6f94416c18032a2e1a6ebcb3021d76e9b9c655301d01bb6.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe svchost.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
3fc8084e724f10c0b6f94416c18032a2e1a6ebcb3021d76e9b9c655301d01bb6.exeexplorer.exesvchost.exepid process 776 3fc8084e724f10c0b6f94416c18032a2e1a6ebcb3021d76e9b9c655301d01bb6.exe 776 3fc8084e724f10c0b6f94416c18032a2e1a6ebcb3021d76e9b9c655301d01bb6.exe 1148 explorer.exe 1148 explorer.exe 1148 explorer.exe 1148 explorer.exe 1148 explorer.exe 1148 explorer.exe 4796 svchost.exe 4796 svchost.exe 4796 svchost.exe 4796 svchost.exe 1148 explorer.exe 1148 explorer.exe 4796 svchost.exe 4796 svchost.exe 1148 explorer.exe 1148 explorer.exe 4796 svchost.exe 4796 svchost.exe 1148 explorer.exe 1148 explorer.exe 4796 svchost.exe 4796 svchost.exe 1148 explorer.exe 1148 explorer.exe 4796 svchost.exe 4796 svchost.exe 1148 explorer.exe 1148 explorer.exe 4796 svchost.exe 4796 svchost.exe 1148 explorer.exe 1148 explorer.exe 4796 svchost.exe 4796 svchost.exe 1148 explorer.exe 1148 explorer.exe 4796 svchost.exe 4796 svchost.exe 1148 explorer.exe 1148 explorer.exe 4796 svchost.exe 4796 svchost.exe 1148 explorer.exe 1148 explorer.exe 4796 svchost.exe 4796 svchost.exe 1148 explorer.exe 1148 explorer.exe 4796 svchost.exe 4796 svchost.exe 1148 explorer.exe 1148 explorer.exe 4796 svchost.exe 4796 svchost.exe 1148 explorer.exe 1148 explorer.exe 4796 svchost.exe 4796 svchost.exe 1148 explorer.exe 1148 explorer.exe 4796 svchost.exe 4796 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
explorer.exesvchost.exepid process 1148 explorer.exe 4796 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
Processes:
3fc8084e724f10c0b6f94416c18032a2e1a6ebcb3021d76e9b9c655301d01bb6.exeexplorer.exespoolsv.exesvchost.exespoolsv.exepid process 776 3fc8084e724f10c0b6f94416c18032a2e1a6ebcb3021d76e9b9c655301d01bb6.exe 776 3fc8084e724f10c0b6f94416c18032a2e1a6ebcb3021d76e9b9c655301d01bb6.exe 1148 explorer.exe 1148 explorer.exe 3708 spoolsv.exe 3708 spoolsv.exe 4796 svchost.exe 4796 svchost.exe 3336 spoolsv.exe 3336 spoolsv.exe 1148 explorer.exe 1148 explorer.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
3fc8084e724f10c0b6f94416c18032a2e1a6ebcb3021d76e9b9c655301d01bb6.exeexplorer.exespoolsv.exesvchost.exedescription pid process target process PID 776 wrote to memory of 1148 776 3fc8084e724f10c0b6f94416c18032a2e1a6ebcb3021d76e9b9c655301d01bb6.exe explorer.exe PID 776 wrote to memory of 1148 776 3fc8084e724f10c0b6f94416c18032a2e1a6ebcb3021d76e9b9c655301d01bb6.exe explorer.exe PID 776 wrote to memory of 1148 776 3fc8084e724f10c0b6f94416c18032a2e1a6ebcb3021d76e9b9c655301d01bb6.exe explorer.exe PID 1148 wrote to memory of 3708 1148 explorer.exe spoolsv.exe PID 1148 wrote to memory of 3708 1148 explorer.exe spoolsv.exe PID 1148 wrote to memory of 3708 1148 explorer.exe spoolsv.exe PID 3708 wrote to memory of 4796 3708 spoolsv.exe svchost.exe PID 3708 wrote to memory of 4796 3708 spoolsv.exe svchost.exe PID 3708 wrote to memory of 4796 3708 spoolsv.exe svchost.exe PID 4796 wrote to memory of 3336 4796 svchost.exe spoolsv.exe PID 4796 wrote to memory of 3336 4796 svchost.exe spoolsv.exe PID 4796 wrote to memory of 3336 4796 svchost.exe spoolsv.exe PID 4796 wrote to memory of 3692 4796 svchost.exe at.exe PID 4796 wrote to memory of 3692 4796 svchost.exe at.exe PID 4796 wrote to memory of 3692 4796 svchost.exe at.exe PID 4796 wrote to memory of 3768 4796 svchost.exe at.exe PID 4796 wrote to memory of 3768 4796 svchost.exe at.exe PID 4796 wrote to memory of 3768 4796 svchost.exe at.exe PID 4796 wrote to memory of 3904 4796 svchost.exe at.exe PID 4796 wrote to memory of 3904 4796 svchost.exe at.exe PID 4796 wrote to memory of 3904 4796 svchost.exe at.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3fc8084e724f10c0b6f94416c18032a2e1a6ebcb3021d76e9b9c655301d01bb6.exe"C:\Users\Admin\AppData\Local\Temp\3fc8084e724f10c0b6f94416c18032a2e1a6ebcb3021d76e9b9c655301d01bb6.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\at.exeat 22:04 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵
-
C:\Windows\SysWOW64\at.exeat 22:05 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵
-
C:\Windows\SysWOW64\at.exeat 22:06 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\mrsys.exeFilesize
66KB
MD5f9b7fa0df8d5733c9263c5c1b814a176
SHA16889f6be650c1f7a54281ba7395c33772af0cf90
SHA2565e06b17108ca13f58e48d44579e079e37e59225b38d28d93af43baaed523b5a3
SHA512668800ab987c629c7e8031422629bcf41a7b8212370e664b28240113e55c8a2776e3732a5e44222b1a3553e42c236abd4bed2ad8fcd7941083db0090e0f42731
-
C:\Windows\System\explorer.exeFilesize
66KB
MD5bf76efcb7bbcd3ff384fc1ed610518d7
SHA14508afa56589e927d620ba693e0794304387b5bb
SHA256502efb2a63915d795e598624b2e5273903fe490af83bb787078ce7d3edb185e4
SHA512f3b17b2009a47a8aa505a7e18767aa994e089bdc130c563b38538be2c84bb26dfab79617ae51ec583010b96663ba7106e4b707adcbdd897a3e3de20006be6b28
-
C:\Windows\System\spoolsv.exeFilesize
66KB
MD50aa9e11fbc50df051841825cbb763621
SHA156b4fc1bb243ea2acb21143186080be9ccd78644
SHA256cfe0d9e6c215c0b515ce08eade8a21eeb299ce0ef5e8f302926be60cda3dc186
SHA51228ddc62aa6e1e426b55f4a5c179aba238afc6b39dad1c76b967ff9ddfb8e1f989fbe8deb316d5297257c5f2598ef2ef5f8866465af8a01384a6fb29ecfc6a1b2
-
C:\Windows\System\svchost.exeFilesize
66KB
MD55da64f42a4646c6d1d7f057a74b8cb98
SHA1fa9a72111b010387f19b6cb8e6a67febb0d10977
SHA2561f6b18de15b273dd5e532c8f446d32fe1f55361e3d98dbbcf2eb51b48cbf1819
SHA5129f53c457e91afc41fb55be8863e4a40d180bba7c534838576d963ead829c4b2f5d9bcdc28044e1a6a599909e8d89e59cbf9084bdb17532dd74bbbb7eead1092b
-
\??\PIPE\atsvcMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
memory/776-5-0x0000000000401000-0x000000000042E000-memory.dmpFilesize
180KB
-
memory/776-57-0x0000000000401000-0x000000000042E000-memory.dmpFilesize
180KB
-
memory/776-2-0x00000000750B0000-0x000000007520D000-memory.dmpFilesize
1.4MB
-
memory/776-0-0x0000000000400000-0x0000000000431000-memory.dmpFilesize
196KB
-
memory/776-3-0x0000000000400000-0x0000000000431000-memory.dmpFilesize
196KB
-
memory/776-1-0x00000000001C0000-0x00000000001C4000-memory.dmpFilesize
16KB
-
memory/776-56-0x0000000000400000-0x0000000000431000-memory.dmpFilesize
196KB
-
memory/1148-15-0x0000000000400000-0x0000000000431000-memory.dmpFilesize
196KB
-
memory/1148-13-0x00000000750B0000-0x000000007520D000-memory.dmpFilesize
1.4MB
-
memory/1148-69-0x0000000000400000-0x0000000000431000-memory.dmpFilesize
196KB
-
memory/1148-59-0x0000000000400000-0x0000000000431000-memory.dmpFilesize
196KB
-
memory/3336-44-0x00000000750B0000-0x000000007520D000-memory.dmpFilesize
1.4MB
-
memory/3336-50-0x0000000000400000-0x0000000000431000-memory.dmpFilesize
196KB
-
memory/3708-26-0x00000000750B0000-0x000000007520D000-memory.dmpFilesize
1.4MB
-
memory/3708-54-0x0000000000400000-0x0000000000431000-memory.dmpFilesize
196KB
-
memory/3708-30-0x0000000000400000-0x0000000000431000-memory.dmpFilesize
196KB
-
memory/3708-24-0x0000000000400000-0x0000000000431000-memory.dmpFilesize
196KB
-
memory/3708-25-0x0000000000400000-0x0000000000431000-memory.dmpFilesize
196KB
-
memory/4796-42-0x0000000000400000-0x0000000000431000-memory.dmpFilesize
196KB
-
memory/4796-37-0x00000000750B0000-0x000000007520D000-memory.dmpFilesize
1.4MB
-
memory/4796-60-0x0000000000400000-0x0000000000431000-memory.dmpFilesize
196KB