Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
14/06/2024, 18:53
Static task
static1
Behavioral task
behavioral1
Sample
01135d1cf63f250c023ff209d643e38893ac3ea28fa92e68a3b4905c2d3bf434.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
01135d1cf63f250c023ff209d643e38893ac3ea28fa92e68a3b4905c2d3bf434.exe
Resource
win10v2004-20240611-en
General
-
Target
01135d1cf63f250c023ff209d643e38893ac3ea28fa92e68a3b4905c2d3bf434.exe
-
Size
66KB
-
MD5
00cfdaf02d05e7e54723e44f1779768b
-
SHA1
58a6c9696a49c988639dc8a5c87d545a49a3fbdc
-
SHA256
01135d1cf63f250c023ff209d643e38893ac3ea28fa92e68a3b4905c2d3bf434
-
SHA512
b22618323a16fa83ba5c67eb1f30e28d64b86e1cef9fee12f6e3f337ab5f1f5d3819f66af2b7778033e2f772436da47695dadc75183ba2b97162de62a0f23dbc
-
SSDEEP
1536:EHfetdklPp+07gDSrB8Xru2zGeJxgawTzpXzrDJrXiH:IeklMMYJhqezw/pXzH9iH
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 4688 explorer.exe 2816 spoolsv.exe 376 svchost.exe 1676 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification \??\c:\windows\system\explorer.exe 01135d1cf63f250c023ff209d643e38893ac3ea28fa92e68a3b4905c2d3bf434.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe svchost.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4252 01135d1cf63f250c023ff209d643e38893ac3ea28fa92e68a3b4905c2d3bf434.exe 4252 01135d1cf63f250c023ff209d643e38893ac3ea28fa92e68a3b4905c2d3bf434.exe 4688 explorer.exe 4688 explorer.exe 4688 explorer.exe 4688 explorer.exe 4688 explorer.exe 4688 explorer.exe 4688 explorer.exe 376 svchost.exe 4688 explorer.exe 376 svchost.exe 376 svchost.exe 376 svchost.exe 376 svchost.exe 4688 explorer.exe 376 svchost.exe 4688 explorer.exe 4688 explorer.exe 4688 explorer.exe 376 svchost.exe 376 svchost.exe 376 svchost.exe 376 svchost.exe 4688 explorer.exe 4688 explorer.exe 4688 explorer.exe 4688 explorer.exe 376 svchost.exe 376 svchost.exe 376 svchost.exe 376 svchost.exe 4688 explorer.exe 4688 explorer.exe 4688 explorer.exe 376 svchost.exe 4688 explorer.exe 376 svchost.exe 376 svchost.exe 4688 explorer.exe 376 svchost.exe 4688 explorer.exe 4688 explorer.exe 376 svchost.exe 4688 explorer.exe 376 svchost.exe 4688 explorer.exe 376 svchost.exe 4688 explorer.exe 376 svchost.exe 4688 explorer.exe 376 svchost.exe 4688 explorer.exe 376 svchost.exe 376 svchost.exe 4688 explorer.exe 376 svchost.exe 4688 explorer.exe 4688 explorer.exe 4688 explorer.exe 376 svchost.exe 376 svchost.exe 376 svchost.exe 4688 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 4688 explorer.exe 376 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 4252 01135d1cf63f250c023ff209d643e38893ac3ea28fa92e68a3b4905c2d3bf434.exe 4252 01135d1cf63f250c023ff209d643e38893ac3ea28fa92e68a3b4905c2d3bf434.exe 4688 explorer.exe 4688 explorer.exe 2816 spoolsv.exe 2816 spoolsv.exe 376 svchost.exe 376 svchost.exe 1676 spoolsv.exe 1676 spoolsv.exe 4688 explorer.exe 4688 explorer.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 4252 wrote to memory of 4688 4252 01135d1cf63f250c023ff209d643e38893ac3ea28fa92e68a3b4905c2d3bf434.exe 82 PID 4252 wrote to memory of 4688 4252 01135d1cf63f250c023ff209d643e38893ac3ea28fa92e68a3b4905c2d3bf434.exe 82 PID 4252 wrote to memory of 4688 4252 01135d1cf63f250c023ff209d643e38893ac3ea28fa92e68a3b4905c2d3bf434.exe 82 PID 4688 wrote to memory of 2816 4688 explorer.exe 84 PID 4688 wrote to memory of 2816 4688 explorer.exe 84 PID 4688 wrote to memory of 2816 4688 explorer.exe 84 PID 2816 wrote to memory of 376 2816 spoolsv.exe 86 PID 2816 wrote to memory of 376 2816 spoolsv.exe 86 PID 2816 wrote to memory of 376 2816 spoolsv.exe 86 PID 376 wrote to memory of 1676 376 svchost.exe 87 PID 376 wrote to memory of 1676 376 svchost.exe 87 PID 376 wrote to memory of 1676 376 svchost.exe 87 PID 376 wrote to memory of 2132 376 svchost.exe 88 PID 376 wrote to memory of 2132 376 svchost.exe 88 PID 376 wrote to memory of 2132 376 svchost.exe 88 PID 376 wrote to memory of 4076 376 svchost.exe 94 PID 376 wrote to memory of 4076 376 svchost.exe 94 PID 376 wrote to memory of 4076 376 svchost.exe 94 PID 376 wrote to memory of 4500 376 svchost.exe 96 PID 376 wrote to memory of 4500 376 svchost.exe 96 PID 376 wrote to memory of 4500 376 svchost.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\01135d1cf63f250c023ff209d643e38893ac3ea28fa92e68a3b4905c2d3bf434.exe"C:\Users\Admin\AppData\Local\Temp\01135d1cf63f250c023ff209d643e38893ac3ea28fa92e68a3b4905c2d3bf434.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4252 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4688 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2816 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:376 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1676
-
-
C:\Windows\SysWOW64\at.exeat 18:56 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:2132
-
-
C:\Windows\SysWOW64\at.exeat 18:57 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:4076
-
-
C:\Windows\SysWOW64\at.exeat 18:58 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:4500
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66KB
MD5376ea4a527331b122bd1acb0c239d797
SHA1b7ffa2f98768d3e6c589f2014eb8d8d0ce8b0fef
SHA2560b260e39175230f4bcbbc5d0e161d55371d6f5d1cb2cd47761b3714922815d15
SHA51269cafafef5e3067ffea407c41ed3cf152213e49fb39d7d686ea2e92e268be8f80a77a9482328f2e661afd6a765c91ae8c6d412d0c4ace6a7c360d2880789c897
-
Filesize
66KB
MD5727bbbb1f57d0883db8214d41901a251
SHA18278c9b7bd16188bcca54951d7d66f98008dc86d
SHA256e29fb5384b7d611c0ad27812ebf3a8dc52e794de213edae194419d69867fa580
SHA5123a1d2f1b594e7468f802657f6c37d9c2f47d0d7ca894de681ed8b9bac7b149e9c8935b6a2cff761fdb0097c641cabdf3565c3413ed6163b4a7c37f4dd4971a20
-
Filesize
66KB
MD5cb919c80bd7b315ea5cfbe982e523dfd
SHA1090ac4813fd4d8f8bc966d1c5e10a739c9bc32dd
SHA2569ac89f374f8a813064b2e79663dbd732558d956d58c25b16e760e59b31ad9079
SHA5124189da640fcbbfab417193a90ed7f2cd9ebda8407aa088618593f20f2fa36f138f6dfb9854349770bd51f6fc4916cfaaa47605cfa629d0a33672e89e450b4a5d
-
Filesize
66KB
MD59992408a82aea07daf7497545a55333c
SHA19829ccdcc54755ebce9c66f81ce5ae843bd46af9
SHA25600400ff1c2bf53b7e55f096f5937ac3958f43928eef9734637eec4a03ffd7731
SHA5122d77b5cbefcf94bc051e8504977920c2f30b9ccea28fba1d1be145cc0cb9670423f122d4fd1e860a608637a0afba6f1eb3f0f0be8c4d077d9800a9427701fcaa