Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    26/07/2024, 21:45

General

  • Target

    5b9508e08db808c9c6dee5083eec0910N.exe

  • Size

    206KB

  • MD5

    5b9508e08db808c9c6dee5083eec0910

  • SHA1

    dafc2cecf3bcbcca2128aedd938257cd1e7e6f8f

  • SHA256

    36d09b7ce5afa1d5c7865b2474c4a9188ced996578d5118eb1764fd2e24dc485

  • SHA512

    f2aa9f886e77952bb84fc69dd6511b1d395e8243e54a7c17dc4400a4fd68a9da318d8e1bc91b38f8cb2cd868b7fcafc85bf0cfd38426b434c12805faf52efe69

  • SSDEEP

    6144:zvEN2U+T6i5LirrllHy4HUcMQY6xUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUH:zENN+T5xYrllrU7QY6q

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 8 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 8 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5b9508e08db808c9c6dee5083eec0910N.exe
    "C:\Users\Admin\AppData\Local\Temp\5b9508e08db808c9c6dee5083eec0910N.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1488
    • \??\c:\windows\system\explorer.exe
      c:\windows\system\explorer.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visiblity of hidden/system files in Explorer
      • Boot or Logon Autostart Execution: Active Setup
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:788
      • \??\c:\windows\system\spoolsv.exe
        c:\windows\system\spoolsv.exe SE
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1972
        • \??\c:\windows\system\svchost.exe
          c:\windows\system\svchost.exe
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visiblity of hidden/system files in Explorer
          • Boot or Logon Autostart Execution: Active Setup
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2744
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe PR
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            PID:2872
          • C:\Windows\SysWOW64\at.exe
            at 21:48 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
            5⤵
            • System Location Discovery: System Language Discovery
            PID:2832
          • C:\Windows\SysWOW64\at.exe
            at 21:49 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
            5⤵
            • System Location Discovery: System Language Discovery
            PID:2668

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\mrsys.exe

    Filesize

    206KB

    MD5

    3bbd3cf16a858dc6d2edfc096868c29c

    SHA1

    33b6f9b8faf8f48dddb4a8709f44831fec9992f1

    SHA256

    ab11c4242a0abce2feb649bb1ab2ee5a6f164b089177f5db0d63a538a4374baa

    SHA512

    eb06e68d12afcbdb3c45b22056f2a13c4d14a466dad179be7b9b52e107b140fa901657d13402f43d480f67ed8a40de32d5de86f1fa1a1a3735c81447c974efbf

  • \Windows\system\explorer.exe

    Filesize

    206KB

    MD5

    d3fe2466313084a2bbbbe58c91b963b0

    SHA1

    02ed2358e0ce42c8432249987164fea31b44ac82

    SHA256

    bc332b6ee5baa72bcde01a2733cf6b8419a09b9a14b4b2be9f781186ad04eb4a

    SHA512

    27e852aeb91f2294950d372b98058043cb17deb24167284215705cb14dbd9728f6a3360bdc56cc60efa1d45ccc45dc93fed5af7415af34817302e22c03ec8346

  • \Windows\system\spoolsv.exe

    Filesize

    206KB

    MD5

    6bb3193c48d7a5d869638b89f3aa90b4

    SHA1

    16f8326a7e8f1b2bb37fc82b1721680664e39f2e

    SHA256

    5e6983d108016573dcfe03a595b2097fc5179dd9f879ff09d9c793fe71c56eb2

    SHA512

    46a2d2682af2952653647f6b3995b65e78c1661c674d1878b04c312b6cd91c0d565b19c630fefa6df9ed0e8d8a2addcc14bdd353eabe0cf9a1e41336e46975e4

  • \Windows\system\svchost.exe

    Filesize

    206KB

    MD5

    0fc6850d1cb214be2a4fcd5fc66318ac

    SHA1

    437e4fb6d874361ee9094c3f867cdc27e147cc80

    SHA256

    9e2ea9623e9e6a02cbf5b7ac78ddc34774249d54cdfde3196ff2e76ed2f62203

    SHA512

    269f03721d85c26c260ee240c7c795eea9fd91f6148ad8049369c9bf8cfd50243364cf884d1198a08c0d5321e7eacb6d002dcbcc98257e7414afee13b761e8de