Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/06/2024, 01:26
Static task
static1
Behavioral task
behavioral1
Sample
bb05144be48d0eccf2c4908592ce5778c2ab80c7b88142fbf726bc301da9e336.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bb05144be48d0eccf2c4908592ce5778c2ab80c7b88142fbf726bc301da9e336.exe
Resource
win10v2004-20240508-en
General
-
Target
bb05144be48d0eccf2c4908592ce5778c2ab80c7b88142fbf726bc301da9e336.exe
-
Size
65KB
-
MD5
90d8c9f1600e1d99fa81496c099f3b13
-
SHA1
52b4ddcb4934374f5209d48b9d6288e9c409f565
-
SHA256
bb05144be48d0eccf2c4908592ce5778c2ab80c7b88142fbf726bc301da9e336
-
SHA512
7a8242e5cab2dcf5052a4a0f2636352749c5680fb3aab6c9b40abd5a707938df8c2a10f96860f56d79b971102be9eff28f8e24e18f59f0d21f1bbae0be047182
-
SSDEEP
1536:ECq3yRuqrI01eArdW/O7JnI2e13XiLij40MkTUVqa/Ous:7WNqkOJWmo1HpM0MkTUmus
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 2744 explorer.exe 2652 spoolsv.exe 2452 svchost.exe 2640 spoolsv.exe -
Loads dropped DLL 8 IoCs
pid Process 2012 bb05144be48d0eccf2c4908592ce5778c2ab80c7b88142fbf726bc301da9e336.exe 2012 bb05144be48d0eccf2c4908592ce5778c2ab80c7b88142fbf726bc301da9e336.exe 2744 explorer.exe 2744 explorer.exe 2652 spoolsv.exe 2652 spoolsv.exe 2452 svchost.exe 2452 svchost.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe svchost.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe bb05144be48d0eccf2c4908592ce5778c2ab80c7b88142fbf726bc301da9e336.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2012 bb05144be48d0eccf2c4908592ce5778c2ab80c7b88142fbf726bc301da9e336.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2452 svchost.exe 2452 svchost.exe 2744 explorer.exe 2452 svchost.exe 2744 explorer.exe 2452 svchost.exe 2744 explorer.exe 2452 svchost.exe 2744 explorer.exe 2452 svchost.exe 2744 explorer.exe 2452 svchost.exe 2744 explorer.exe 2452 svchost.exe 2744 explorer.exe 2452 svchost.exe 2744 explorer.exe 2452 svchost.exe 2744 explorer.exe 2452 svchost.exe 2744 explorer.exe 2452 svchost.exe 2744 explorer.exe 2452 svchost.exe 2744 explorer.exe 2452 svchost.exe 2744 explorer.exe 2452 svchost.exe 2744 explorer.exe 2452 svchost.exe 2744 explorer.exe 2452 svchost.exe 2744 explorer.exe 2452 svchost.exe 2744 explorer.exe 2452 svchost.exe 2744 explorer.exe 2452 svchost.exe 2744 explorer.exe 2452 svchost.exe 2744 explorer.exe 2452 svchost.exe 2744 explorer.exe 2452 svchost.exe 2744 explorer.exe 2452 svchost.exe 2744 explorer.exe 2452 svchost.exe 2744 explorer.exe 2452 svchost.exe 2744 explorer.exe 2452 svchost.exe 2744 explorer.exe 2452 svchost.exe 2744 explorer.exe 2452 svchost.exe 2744 explorer.exe 2452 svchost.exe 2744 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2744 explorer.exe 2452 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2012 bb05144be48d0eccf2c4908592ce5778c2ab80c7b88142fbf726bc301da9e336.exe 2012 bb05144be48d0eccf2c4908592ce5778c2ab80c7b88142fbf726bc301da9e336.exe 2744 explorer.exe 2744 explorer.exe 2652 spoolsv.exe 2652 spoolsv.exe 2452 svchost.exe 2452 svchost.exe 2640 spoolsv.exe 2640 spoolsv.exe 2744 explorer.exe 2744 explorer.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2012 wrote to memory of 2744 2012 bb05144be48d0eccf2c4908592ce5778c2ab80c7b88142fbf726bc301da9e336.exe 28 PID 2012 wrote to memory of 2744 2012 bb05144be48d0eccf2c4908592ce5778c2ab80c7b88142fbf726bc301da9e336.exe 28 PID 2012 wrote to memory of 2744 2012 bb05144be48d0eccf2c4908592ce5778c2ab80c7b88142fbf726bc301da9e336.exe 28 PID 2012 wrote to memory of 2744 2012 bb05144be48d0eccf2c4908592ce5778c2ab80c7b88142fbf726bc301da9e336.exe 28 PID 2744 wrote to memory of 2652 2744 explorer.exe 29 PID 2744 wrote to memory of 2652 2744 explorer.exe 29 PID 2744 wrote to memory of 2652 2744 explorer.exe 29 PID 2744 wrote to memory of 2652 2744 explorer.exe 29 PID 2652 wrote to memory of 2452 2652 spoolsv.exe 30 PID 2652 wrote to memory of 2452 2652 spoolsv.exe 30 PID 2652 wrote to memory of 2452 2652 spoolsv.exe 30 PID 2652 wrote to memory of 2452 2652 spoolsv.exe 30 PID 2452 wrote to memory of 2640 2452 svchost.exe 31 PID 2452 wrote to memory of 2640 2452 svchost.exe 31 PID 2452 wrote to memory of 2640 2452 svchost.exe 31 PID 2452 wrote to memory of 2640 2452 svchost.exe 31 PID 2452 wrote to memory of 2804 2452 svchost.exe 32 PID 2452 wrote to memory of 2804 2452 svchost.exe 32 PID 2452 wrote to memory of 2804 2452 svchost.exe 32 PID 2452 wrote to memory of 2804 2452 svchost.exe 32 PID 2452 wrote to memory of 840 2452 svchost.exe 36 PID 2452 wrote to memory of 840 2452 svchost.exe 36 PID 2452 wrote to memory of 840 2452 svchost.exe 36 PID 2452 wrote to memory of 840 2452 svchost.exe 36 PID 2452 wrote to memory of 2128 2452 svchost.exe 38 PID 2452 wrote to memory of 2128 2452 svchost.exe 38 PID 2452 wrote to memory of 2128 2452 svchost.exe 38 PID 2452 wrote to memory of 2128 2452 svchost.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\bb05144be48d0eccf2c4908592ce5778c2ab80c7b88142fbf726bc301da9e336.exe"C:\Users\Admin\AppData\Local\Temp\bb05144be48d0eccf2c4908592ce5778c2ab80c7b88142fbf726bc301da9e336.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2012 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2744 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2652 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2452 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2640
-
-
C:\Windows\SysWOW64\at.exeat 01:28 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:2804
-
-
C:\Windows\SysWOW64\at.exeat 01:29 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:840
-
-
C:\Windows\SysWOW64\at.exeat 01:30 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:2128
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD580dc9eb4630fb59e2f3f4117858752ae
SHA134574b24c76586c483a17a47ed393a5368d12cc6
SHA25635a156752567397725b31a4578885029086171969cd89a6cfa93e5f6084c568e
SHA5121d2ecec33209786b99e34f7a4c627aea4242a57ac35e1a28332d2de83bfaeb1835f7c9ebe6fb15923161b5411cda2a4e00406bce59a3576936684706256be007
-
Filesize
65KB
MD56aab8dd8c9b6cd4c1c302f6e61c71f88
SHA1c3ca610de17a65548c17163f762f7ead46316c68
SHA25648665e3d451bb5cb5d2649063160bfeeb9bbe92111e552ce2e29d03987b3545e
SHA5125f3c401b4b1b05385fbf047ab2d8cc383283be30e91184d891a70589caf228e493690628a6fe0f4a196d942ae24fbdc3b927e36e445f7ee48943285126901e91
-
Filesize
65KB
MD58e1ff3cfa068705c9c2c126140a3e0c9
SHA163b0821427aa2374099b6a9b959468fd71f79dee
SHA2565875f8fb2dc0bad106736c379a386568b2a414aafeb56a350dfac4d9a8bf5eeb
SHA51217a2c4cea2dea312c340bc46f4de3cb21d734bc6754a8a420ea3a3dadc1cccc466ed2d8884ce0028a66fb7ef0c668689daf435e7f203df423151481083e4973e
-
Filesize
65KB
MD58a8f37d5947745445fa9f697886f146e
SHA1e8ce74dfa73932f1c0bc7e4d547655b91639e0fb
SHA256964f012a545878463043539469993f508c35f8ec2e3db1341285a31ec32dbb80
SHA512fda6017ffbc32d82272b96cd78cafce1df5335b1e3ed007d018ccc4a0af2e6e20784d4c411903e474b63d3433629b69b699e279271a3bbe3cedcb351516b7e4c