Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/06/2024, 00:26
Static task
static1
Behavioral task
behavioral1
Sample
a45ea63908dd8c9f74db9bc0f7545e761f75b88cb419038b8cd7d6913600d354.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a45ea63908dd8c9f74db9bc0f7545e761f75b88cb419038b8cd7d6913600d354.exe
Resource
win10v2004-20240226-en
General
-
Target
a45ea63908dd8c9f74db9bc0f7545e761f75b88cb419038b8cd7d6913600d354.exe
-
Size
66KB
-
MD5
4f8746db3b5170d082656e89422d85da
-
SHA1
7157abb3d3a9cce696c441dc880d46ea6a053fc3
-
SHA256
a45ea63908dd8c9f74db9bc0f7545e761f75b88cb419038b8cd7d6913600d354
-
SHA512
0dd334085b12b9c8aa91c4f58d8f55d7d58ac2946cc1ab942e5d16c87cac185d84a9ba0edc4036068cc5bf55d68c50cb6b3fdf3eff2a6a06719d8062b4a9d965
-
SSDEEP
1536:EHfetdklPp+07gDSrB8Xru2zGeJxgawTzpXzrDJrXi3nnnnnnnnnnnnnnnnnnnnr:IeklMMYJhqezw/pXzH9i3nnnnnnnnnnr
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 3040 explorer.exe 2840 spoolsv.exe 2212 svchost.exe 2396 spoolsv.exe -
Loads dropped DLL 8 IoCs
pid Process 2192 a45ea63908dd8c9f74db9bc0f7545e761f75b88cb419038b8cd7d6913600d354.exe 2192 a45ea63908dd8c9f74db9bc0f7545e761f75b88cb419038b8cd7d6913600d354.exe 3040 explorer.exe 3040 explorer.exe 2840 spoolsv.exe 2840 spoolsv.exe 2212 svchost.exe 2212 svchost.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification \??\c:\windows\system\explorer.exe a45ea63908dd8c9f74db9bc0f7545e761f75b88cb419038b8cd7d6913600d354.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe svchost.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2192 a45ea63908dd8c9f74db9bc0f7545e761f75b88cb419038b8cd7d6913600d354.exe 3040 explorer.exe 3040 explorer.exe 3040 explorer.exe 3040 explorer.exe 2212 svchost.exe 2212 svchost.exe 3040 explorer.exe 2212 svchost.exe 3040 explorer.exe 2212 svchost.exe 3040 explorer.exe 2212 svchost.exe 3040 explorer.exe 2212 svchost.exe 3040 explorer.exe 2212 svchost.exe 3040 explorer.exe 2212 svchost.exe 3040 explorer.exe 2212 svchost.exe 3040 explorer.exe 2212 svchost.exe 3040 explorer.exe 2212 svchost.exe 3040 explorer.exe 2212 svchost.exe 3040 explorer.exe 2212 svchost.exe 3040 explorer.exe 2212 svchost.exe 3040 explorer.exe 2212 svchost.exe 3040 explorer.exe 2212 svchost.exe 3040 explorer.exe 2212 svchost.exe 3040 explorer.exe 2212 svchost.exe 3040 explorer.exe 2212 svchost.exe 3040 explorer.exe 2212 svchost.exe 3040 explorer.exe 2212 svchost.exe 3040 explorer.exe 2212 svchost.exe 3040 explorer.exe 2212 svchost.exe 3040 explorer.exe 2212 svchost.exe 3040 explorer.exe 2212 svchost.exe 3040 explorer.exe 2212 svchost.exe 3040 explorer.exe 2212 svchost.exe 3040 explorer.exe 2212 svchost.exe 3040 explorer.exe 2212 svchost.exe 3040 explorer.exe 2212 svchost.exe 3040 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 3040 explorer.exe 2212 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2192 a45ea63908dd8c9f74db9bc0f7545e761f75b88cb419038b8cd7d6913600d354.exe 2192 a45ea63908dd8c9f74db9bc0f7545e761f75b88cb419038b8cd7d6913600d354.exe 3040 explorer.exe 3040 explorer.exe 2840 spoolsv.exe 2840 spoolsv.exe 2212 svchost.exe 2212 svchost.exe 2396 spoolsv.exe 2396 spoolsv.exe 3040 explorer.exe 3040 explorer.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2192 wrote to memory of 3040 2192 a45ea63908dd8c9f74db9bc0f7545e761f75b88cb419038b8cd7d6913600d354.exe 28 PID 2192 wrote to memory of 3040 2192 a45ea63908dd8c9f74db9bc0f7545e761f75b88cb419038b8cd7d6913600d354.exe 28 PID 2192 wrote to memory of 3040 2192 a45ea63908dd8c9f74db9bc0f7545e761f75b88cb419038b8cd7d6913600d354.exe 28 PID 2192 wrote to memory of 3040 2192 a45ea63908dd8c9f74db9bc0f7545e761f75b88cb419038b8cd7d6913600d354.exe 28 PID 3040 wrote to memory of 2840 3040 explorer.exe 29 PID 3040 wrote to memory of 2840 3040 explorer.exe 29 PID 3040 wrote to memory of 2840 3040 explorer.exe 29 PID 3040 wrote to memory of 2840 3040 explorer.exe 29 PID 2840 wrote to memory of 2212 2840 spoolsv.exe 30 PID 2840 wrote to memory of 2212 2840 spoolsv.exe 30 PID 2840 wrote to memory of 2212 2840 spoolsv.exe 30 PID 2840 wrote to memory of 2212 2840 spoolsv.exe 30 PID 2212 wrote to memory of 2396 2212 svchost.exe 31 PID 2212 wrote to memory of 2396 2212 svchost.exe 31 PID 2212 wrote to memory of 2396 2212 svchost.exe 31 PID 2212 wrote to memory of 2396 2212 svchost.exe 31 PID 2212 wrote to memory of 1992 2212 svchost.exe 32 PID 2212 wrote to memory of 1992 2212 svchost.exe 32 PID 2212 wrote to memory of 1992 2212 svchost.exe 32 PID 2212 wrote to memory of 1992 2212 svchost.exe 32 PID 2212 wrote to memory of 1312 2212 svchost.exe 36 PID 2212 wrote to memory of 1312 2212 svchost.exe 36 PID 2212 wrote to memory of 1312 2212 svchost.exe 36 PID 2212 wrote to memory of 1312 2212 svchost.exe 36 PID 2212 wrote to memory of 1556 2212 svchost.exe 38 PID 2212 wrote to memory of 1556 2212 svchost.exe 38 PID 2212 wrote to memory of 1556 2212 svchost.exe 38 PID 2212 wrote to memory of 1556 2212 svchost.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\a45ea63908dd8c9f74db9bc0f7545e761f75b88cb419038b8cd7d6913600d354.exe"C:\Users\Admin\AppData\Local\Temp\a45ea63908dd8c9f74db9bc0f7545e761f75b88cb419038b8cd7d6913600d354.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2192 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3040 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2840 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2212 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2396
-
-
C:\Windows\SysWOW64\at.exeat 00:28 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:1992
-
-
C:\Windows\SysWOW64\at.exeat 00:29 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:1312
-
-
C:\Windows\SysWOW64\at.exeat 00:30 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:1556
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66KB
MD5b016c055d0fa921853ce4533d387f73b
SHA1360d180ba6a35b850ffb481633552290ac033eee
SHA25659bd91c10ac9b5c41dc115a63e9b4c6dd564ae2864b55addc02764b2a608e4e7
SHA512ce7a04cdbb72dbc2fe3de4f1163b733be2a5efd7c589b85da976e1e5afee22e13b80045a2d460b8cd1b12b4af6013082924a2bc450d62f623e72491bc0e2c553
-
Filesize
66KB
MD54597f7339a6e85ba09173714f84d6dab
SHA11191678b89d9d4943596ccfb501b18c104ecb702
SHA256936a52d56f61d0f25c5a8ffb6a4dedc8b54f8c5c059eefe64c98d09fb002bea3
SHA512b0142022f2921e44021edb69fae843828692a068a7125add4c71d1ee8171ceabf4a75d40db1a2f35b5d2deaacda14f6fc1658dff4309265050b15d75838bcb31
-
Filesize
66KB
MD539bf02e9b57d96f94dae261dcd1a8317
SHA138aa9b482e96386cf3c62cd4e78700f33f6e4da0
SHA2563bbcea579cd17653c93791b860522a53ad1a0b31f9a5157e2755171b1094a604
SHA512d9cc8bd74aea04bec3dc523c6da61e79d96c081877a491f13273307514bb031197ba523d7512323694b7227717b89699f2d34f10bd4acd509c7b1107753cc784
-
Filesize
66KB
MD5842b32452f058053fe9c22ae98aa6604
SHA158b0c2ebf7c1879c4a97d886ad4596861d1ee6da
SHA25628d4158f1ed422abf6390d6594d587862a389430d5d53d5ea18b06e2cd3949e2
SHA512b320d4b702693cfa7cba0886c9943f18b8430ef0cf6145a05bb596f101eca35d7c8641e7ef2da311829883d30d4688a9bdadcc43f7be0bfc6a552b18ef07e207