Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
21-07-2024 09:59
Static task
static1
Behavioral task
behavioral1
Sample
a8b6655d6632057bfb64eb43d9bd3c00N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a8b6655d6632057bfb64eb43d9bd3c00N.exe
Resource
win10v2004-20240709-en
General
-
Target
a8b6655d6632057bfb64eb43d9bd3c00N.exe
-
Size
479KB
-
MD5
a8b6655d6632057bfb64eb43d9bd3c00
-
SHA1
f830f5b262a47dcc4a56f7d9117c33d7edc68a5d
-
SHA256
cfef5b9a74db7c0abd81069caee13ee3f57347a8f4d68c6781b0fba072302bde
-
SHA512
ebb41e09e9963934fa4f4441e1372fa27a8748852b894c1630f76470245b95b2a16fab4562aa8791e8a928e62be396306c90823191c870ffe86e5c02d208dbe5
-
SSDEEP
12288:ntKe6Zv23YeC1zApdxHLMLa/NcDoAWmojaygBWL05e9:76Zv2lTdOLyNa4aygBc
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{CD88F385-8B9A-11D5-EBA1-F78EEEEEE983} a8b6655d6632057bfb64eb43d9bd3c00N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{CD88F385-8B9A-11D5-EBA1-F78EEEEEE983}\StubPath = "mshrg32.exe" a8b6655d6632057bfb64eb43d9bd3c00N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{CD88F385-8B9A-11D5-EBA1-F78EEEEEE983} spoolsv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{CD88F385-8B9A-11D5-EBA1-F78EEEEEE983}\StubPath = "mshrg32.exe" spoolsv.exe -
Executes dropped EXE 1 IoCs
pid Process 2176 spoolsv.exe -
Modifies system executable filetype association 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\SysWow64\\concp32.exe \"%1\" %*" a8b6655d6632057bfb64eb43d9bd3c00N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\SysWow64\\concp32.exe \"%1\" %*" spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\VCL = "vcl32.exe" a8b6655d6632057bfb64eb43d9bd3c00N.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\VCL = "vcl32.exe" a8b6655d6632057bfb64eb43d9bd3c00N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\VCL = "vcl32.exe" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\VCL = "vcl32.exe" spoolsv.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\mshrg32.exe a8b6655d6632057bfb64eb43d9bd3c00N.exe File opened for modification C:\Windows\SysWOW64\mshrg32.exe a8b6655d6632057bfb64eb43d9bd3c00N.exe File created C:\Windows\SysWOW64\concp32.exe a8b6655d6632057bfb64eb43d9bd3c00N.exe File opened for modification C:\Windows\SysWOW64\concp32.exe a8b6655d6632057bfb64eb43d9bd3c00N.exe File created C:\Windows\SysWOW64\vcl32.exe a8b6655d6632057bfb64eb43d9bd3c00N.exe File opened for modification C:\Windows\SysWOW64\vcl32.exe a8b6655d6632057bfb64eb43d9bd3c00N.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\spoolsv.exe a8b6655d6632057bfb64eb43d9bd3c00N.exe File created C:\Windows\spoolsv.exe a8b6655d6632057bfb64eb43d9bd3c00N.exe -
Modifies registry class 12 IoCs
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CD88F385-8B9A-11D5-EBA1-F78EEEEEE983}\sm = 01b8ec350471bd332433eee476ebe1f3 a8b6655d6632057bfb64eb43d9bd3c00N.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CD88F385-8B9A-11D5-EBA1-F78EEEEEE983}\u0 = 658663d26f8bad325217a06063847056939f558d910ed252e05dd0113550f7fc0f4da82ff73a0681ba604c2d4f23269f spoolsv.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CD88F385-8B9A-11D5-EBA1-F78EEEEEE983}\u1 = 551d2e0658054ba756fd3798fea5ffca42865cb762a31639dabd7f2cca44e226 spoolsv.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CD88F385-8B9A-11D5-EBA1-F78EEEEEE983}\u2 = a54a6b702f92fdf2acd57599e2ae1608015dff41aa020117fc9bd8e2dcf4340f3fa61eb55d6f28597df90602703809d4 spoolsv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CD88F385-8B9A-11D5-EBA1-F78EEEEEE983}\v = "165" spoolsv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CD88F385-8B9A-11D5-EBA1-F78EEEEEE983}\InprocServer32 a8b6655d6632057bfb64eb43d9bd3c00N.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CD88F385-8B9A-11D5-EBA1-F78EEEEEE983}\ax = 45767f74d43d581a1cb0d3452e643913 a8b6655d6632057bfb64eb43d9bd3c00N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\SysWow64\\concp32.exe \"%1\" %*" a8b6655d6632057bfb64eb43d9bd3c00N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CD88F385-8B9A-11D5-EBA1-F78EEEEEE983} spoolsv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CD88F385-8B9A-11D5-EBA1-F78EEEEEE983}\InprocServer32 spoolsv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\SysWow64\\concp32.exe \"%1\" %*" spoolsv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CD88F385-8B9A-11D5-EBA1-F78EEEEEE983} a8b6655d6632057bfb64eb43d9bd3c00N.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2392 a8b6655d6632057bfb64eb43d9bd3c00N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2392 wrote to memory of 2176 2392 a8b6655d6632057bfb64eb43d9bd3c00N.exe 30 PID 2392 wrote to memory of 2176 2392 a8b6655d6632057bfb64eb43d9bd3c00N.exe 30 PID 2392 wrote to memory of 2176 2392 a8b6655d6632057bfb64eb43d9bd3c00N.exe 30 PID 2392 wrote to memory of 2176 2392 a8b6655d6632057bfb64eb43d9bd3c00N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\a8b6655d6632057bfb64eb43d9bd3c00N.exe"C:\Users\Admin\AppData\Local\Temp\a8b6655d6632057bfb64eb43d9bd3c00N.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies system executable filetype association
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Windows\spoolsv.exeC:\Windows\spoolsv.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Modifies system executable filetype association
- Adds Run key to start application
- Modifies registry class
PID:2176
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Change Default File Association
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
483KB
MD5f06626e9e23b6fb9a8f9e843955ce2d4
SHA118fe73183e5625c774237112c23863811d511384
SHA2568c7574da0df3e4d0f295ba3b5ba16a0fdb063bdbdb9735e7fb7daf665b0d5a85
SHA512d7922b4d6684ea5185933c2329d01835d3f8adc1f035f25d1209743759b6b4bacaef1b32995bce3209573a053bfa6586d49ec8417f2b51fe0df33c9ba5b1b0bf
-
Filesize
484KB
MD5abcb9f25ba1bd9f9883837c52806842c
SHA1fb6d3b51155ab2f91c78decfb1fc314f018c5068
SHA256490e94935202d53d3893b3e0a6fb5ac1fc062097468e36dfb2e223398cd2e0eb
SHA51259956d1c56a5829484177a0b4f425c7cf0b6a15f07489d7a483aecb02cc3a43302384dcc4194b204bacd593a75022d6dd742e6a462a0f619f327b8760f996ff5