Analysis
-
max time kernel
151s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
14-06-2024 19:04
Static task
static1
Behavioral task
behavioral1
Sample
01f1d58f0a432ef693b1f7c78e10bdb490c1d3533c9f2ca487e2183bf0352837.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
01f1d58f0a432ef693b1f7c78e10bdb490c1d3533c9f2ca487e2183bf0352837.exe
Resource
win10v2004-20240226-en
General
-
Target
01f1d58f0a432ef693b1f7c78e10bdb490c1d3533c9f2ca487e2183bf0352837.exe
-
Size
66KB
-
MD5
5f5926a6a95556b9d29ac14cee9cb370
-
SHA1
e22a2ad1ccfd8a9b9763c3b4325fa50a20c57134
-
SHA256
01f1d58f0a432ef693b1f7c78e10bdb490c1d3533c9f2ca487e2183bf0352837
-
SHA512
789d7e3748e4df9fcc32b4ef1f41b2cb6905154efe2138071530f133b4a4cd62661132e049fedfba2c40e289ac9f86b92809531feb09f2c68969cbbe7a5795c8
-
SSDEEP
1536:EHfetdklPp+07gDSrB8Xru2zGeJxgawTzpXzrDJrXi9:IeklMMYJhqezw/pXzH9i9
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 3464 explorer.exe 1576 spoolsv.exe 3632 svchost.exe 4512 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification C:\Windows\system\udsys.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe 01f1d58f0a432ef693b1f7c78e10bdb490c1d3533c9f2ca487e2183bf0352837.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3352 01f1d58f0a432ef693b1f7c78e10bdb490c1d3533c9f2ca487e2183bf0352837.exe 3352 01f1d58f0a432ef693b1f7c78e10bdb490c1d3533c9f2ca487e2183bf0352837.exe 3464 explorer.exe 3464 explorer.exe 3464 explorer.exe 3464 explorer.exe 3464 explorer.exe 3464 explorer.exe 3632 svchost.exe 3632 svchost.exe 3632 svchost.exe 3632 svchost.exe 3464 explorer.exe 3464 explorer.exe 3632 svchost.exe 3632 svchost.exe 3464 explorer.exe 3464 explorer.exe 3632 svchost.exe 3632 svchost.exe 3464 explorer.exe 3464 explorer.exe 3632 svchost.exe 3632 svchost.exe 3464 explorer.exe 3464 explorer.exe 3632 svchost.exe 3632 svchost.exe 3464 explorer.exe 3464 explorer.exe 3632 svchost.exe 3632 svchost.exe 3464 explorer.exe 3464 explorer.exe 3632 svchost.exe 3632 svchost.exe 3464 explorer.exe 3464 explorer.exe 3632 svchost.exe 3632 svchost.exe 3464 explorer.exe 3464 explorer.exe 3632 svchost.exe 3632 svchost.exe 3464 explorer.exe 3464 explorer.exe 3632 svchost.exe 3632 svchost.exe 3464 explorer.exe 3464 explorer.exe 3632 svchost.exe 3632 svchost.exe 3464 explorer.exe 3464 explorer.exe 3632 svchost.exe 3632 svchost.exe 3464 explorer.exe 3464 explorer.exe 3632 svchost.exe 3632 svchost.exe 3632 svchost.exe 3464 explorer.exe 3632 svchost.exe 3464 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 3632 svchost.exe 3464 explorer.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3352 01f1d58f0a432ef693b1f7c78e10bdb490c1d3533c9f2ca487e2183bf0352837.exe 3352 01f1d58f0a432ef693b1f7c78e10bdb490c1d3533c9f2ca487e2183bf0352837.exe 3464 explorer.exe 3464 explorer.exe 1576 spoolsv.exe 1576 spoolsv.exe 3632 svchost.exe 3632 svchost.exe 4512 spoolsv.exe 4512 spoolsv.exe 3464 explorer.exe 3464 explorer.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 3352 wrote to memory of 3464 3352 01f1d58f0a432ef693b1f7c78e10bdb490c1d3533c9f2ca487e2183bf0352837.exe 91 PID 3352 wrote to memory of 3464 3352 01f1d58f0a432ef693b1f7c78e10bdb490c1d3533c9f2ca487e2183bf0352837.exe 91 PID 3352 wrote to memory of 3464 3352 01f1d58f0a432ef693b1f7c78e10bdb490c1d3533c9f2ca487e2183bf0352837.exe 91 PID 3464 wrote to memory of 1576 3464 explorer.exe 92 PID 3464 wrote to memory of 1576 3464 explorer.exe 92 PID 3464 wrote to memory of 1576 3464 explorer.exe 92 PID 1576 wrote to memory of 3632 1576 spoolsv.exe 93 PID 1576 wrote to memory of 3632 1576 spoolsv.exe 93 PID 1576 wrote to memory of 3632 1576 spoolsv.exe 93 PID 3632 wrote to memory of 4512 3632 svchost.exe 94 PID 3632 wrote to memory of 4512 3632 svchost.exe 94 PID 3632 wrote to memory of 4512 3632 svchost.exe 94 PID 3632 wrote to memory of 2012 3632 svchost.exe 95 PID 3632 wrote to memory of 2012 3632 svchost.exe 95 PID 3632 wrote to memory of 2012 3632 svchost.exe 95 PID 3632 wrote to memory of 1612 3632 svchost.exe 107 PID 3632 wrote to memory of 1612 3632 svchost.exe 107 PID 3632 wrote to memory of 1612 3632 svchost.exe 107 PID 3632 wrote to memory of 4860 3632 svchost.exe 109 PID 3632 wrote to memory of 4860 3632 svchost.exe 109 PID 3632 wrote to memory of 4860 3632 svchost.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\01f1d58f0a432ef693b1f7c78e10bdb490c1d3533c9f2ca487e2183bf0352837.exe"C:\Users\Admin\AppData\Local\Temp\01f1d58f0a432ef693b1f7c78e10bdb490c1d3533c9f2ca487e2183bf0352837.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3352 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3464 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1576 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3632 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4512
-
-
C:\Windows\SysWOW64\at.exeat 19:06 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:2012
-
-
C:\Windows\SysWOW64\at.exeat 19:07 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:1612
-
-
C:\Windows\SysWOW64\at.exeat 19:08 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:4860
-
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4440 --field-trial-handle=2248,i,10247514684337323751,15511974759131734137,262144 --variations-seed-version /prefetch:81⤵PID:3912
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66KB
MD5782ad92a242fb514ffe4ac4bc5cd7024
SHA1ce5a2d267b22b790b35e5363fedefab758bb384b
SHA256f98df4aa4b12aa6b24cfa042256866924f92eb5a26c8fdf557bfbe87ea185625
SHA5125b0ccc37d52ed43dafe0e6d51200039959ce63fc84ec602085b1005c18c47f5c99e71bfc87fcc3db8005b3f17dc52670b61d4dfe2ad3425ee493a62cb3300e66
-
Filesize
66KB
MD58d39dbe8892550056e62c31203549f33
SHA12318c24836eaa0756e81a1015210222301cfb43a
SHA25651c8d51d4e800d5d921f439306cbb65f777a5b497d9b8fe50cf8953aae597070
SHA512a6ac64eef40c0f1db7b9061b1f2d4365cd57ce7a3568250577b757ec554bfafcb1e1d333f9ed444735119cb4fe38070c6138b05f8d60c9ca61345fcda7b03018
-
Filesize
66KB
MD5f97961431822b770894b3ad570018f8b
SHA1e5dfb651c2a20a38999662098f1e96d4398e8932
SHA256c34065a508339ed75c1f5a4331867f0c9f5dfa3310d70e88d3ed442f83007b61
SHA512922c3ae37d21258e7dae6e7f99311e76159b800f7a0bbef4265588ff0062d309b7c716eedc14441009ce664f33fa782510a69a5fe7a5ee764e0872adc3aa904d
-
Filesize
66KB
MD56d61ee1ad05468ac13f0c4c924e4e173
SHA1a51c7fb34dcf5200b86b7e62ed136e8a9957c062
SHA256a79322087d31855382dab42a7e792627bba0889d7129e4f1b87fe3ebe002e43b
SHA512e2f608b7c6c6399bf7a01871c9f0005d577d933ace66b91b98352555a2fe30d2414eac94a2bf76694f5e484230a45a4789a79488365122b8f3d0900d6234ba48