Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-06-2024 01:20

General

  • Target

    ad40c4e15565e5e3962fd54c8f7cc1eba646c25188db1a876cc6747e8589f254.exe

  • Size

    206KB

  • MD5

    e2ba77cc58e9e927493399a11f23ccd5

  • SHA1

    5c87978b66971a42c10f425146b6ce965be49a07

  • SHA256

    ad40c4e15565e5e3962fd54c8f7cc1eba646c25188db1a876cc6747e8589f254

  • SHA512

    df3b2e4b0d24ec73fd91e5d3c1f19ccff6eeee1a5097f9b597cd9b5af23be8c31cb7a07dce7bb3ec79094dc7e24250431fcbbe3ee61896e6d67865af915f9d16

  • SSDEEP

    3072:5vEfVUzSLhIVbV6i5LirrlZrHyrUHUckoMQ2RN6unjS:5vEN2U+T6i5LirrllHy4HUcMQY6T

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 8 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ad40c4e15565e5e3962fd54c8f7cc1eba646c25188db1a876cc6747e8589f254.exe
    "C:\Users\Admin\AppData\Local\Temp\ad40c4e15565e5e3962fd54c8f7cc1eba646c25188db1a876cc6747e8589f254.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2540
    • \??\c:\windows\system\explorer.exe
      c:\windows\system\explorer.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visiblity of hidden/system files in Explorer
      • Boot or Logon Autostart Execution: Active Setup
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4608
      • \??\c:\windows\system\spoolsv.exe
        c:\windows\system\spoolsv.exe SE
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1004
        • \??\c:\windows\system\svchost.exe
          c:\windows\system\svchost.exe
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visiblity of hidden/system files in Explorer
          • Boot or Logon Autostart Execution: Active Setup
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2904
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe PR
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:220
          • C:\Windows\SysWOW64\at.exe
            at 01:22 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
            5⤵
              PID:4920
            • C:\Windows\SysWOW64\at.exe
              at 01:23 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
              5⤵
                PID:2960
              • C:\Windows\SysWOW64\at.exe
                at 01:24 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
                5⤵
                  PID:3900

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\mrsys.exe

          Filesize

          206KB

          MD5

          9c4692260f708e9992ce0366db6ba049

          SHA1

          ada30a388aa55a370672934acb0dac751329147a

          SHA256

          e7632ef561de178ea8f3fab0279b39f64a2ea4b390129889546ba0a257a42049

          SHA512

          d86caed5fa99ea76d50f494e2289d8d6c657b21a58750c56d6036b779328a08fb74f6c104c92c9308f405c568f70c4c298099aa2bc8ebac1904d2b34e0bddcd3

        • C:\Windows\System\explorer.exe

          Filesize

          206KB

          MD5

          6f716c55f3789d0aecf3b061311fd231

          SHA1

          423482001dc1abf6e5575a365a5f4a6f758624cd

          SHA256

          76f1ed5f453399ac9be7e4a04ad4b0b02d936e9bdabff4385e16649703eff274

          SHA512

          0f3ee378e480b9e39952d6254d05bdd9882482403af7f2c8bc5db213357387d031999f0c8d57e1356b53c67302d6d9ea7bde0f8b952e0bbed5707a45ba49422c

        • C:\Windows\System\spoolsv.exe

          Filesize

          206KB

          MD5

          47d60de159325b6a8b7fa258f06069d9

          SHA1

          248384137389dcf9678ef5b24c1ee789b9118bf1

          SHA256

          f8a46845c29eadebb47595d197fc52a85058bbe709263435897c1090614d2502

          SHA512

          01a2311f5b313a8b45d28f991738cd3c78740fd51d600d884973a176bc81d9ac0f6e10862a9e918bfc769be19f40b09879114d2bbe12bd76119d689657940861

        • C:\Windows\System\svchost.exe

          Filesize

          206KB

          MD5

          b6abba32e2bd5e118f487da3e317d918

          SHA1

          435276daac17978e77a1b484d9f2465bcfbb4a7b

          SHA256

          1daa445105d2f8777cd3445811d154e10fa2c9e5e13024fcf7ac159763a5d264

          SHA512

          e0cc46a0c5b69c3726ff04a1d5afccd24103067f4ce4ad5ecd43a21a25239475bdd9426db07faccc714cf5156ad95f2395ff892a9a735b5745efa8f1ce0e07ce

        • memory/220-35-0x0000000000400000-0x0000000000440000-memory.dmp

          Filesize

          256KB

        • memory/1004-36-0x0000000000400000-0x0000000000440000-memory.dmp

          Filesize

          256KB

        • memory/2540-0-0x0000000000400000-0x0000000000440000-memory.dmp

          Filesize

          256KB

        • memory/2540-37-0x0000000000400000-0x0000000000440000-memory.dmp

          Filesize

          256KB

        • memory/2904-25-0x0000000000400000-0x0000000000440000-memory.dmp

          Filesize

          256KB