Analysis
-
max time kernel
150s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
26/07/2024, 23:11
Behavioral task
behavioral1
Sample
6f918cda99092ef3de36b60e1eba55c28c0d1012adc678e580cd91609fbbe4f8.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6f918cda99092ef3de36b60e1eba55c28c0d1012adc678e580cd91609fbbe4f8.exe
Resource
win10v2004-20240709-en
General
-
Target
6f918cda99092ef3de36b60e1eba55c28c0d1012adc678e580cd91609fbbe4f8.exe
-
Size
71KB
-
MD5
e56fc52a7d427f7a06d468995163628d
-
SHA1
52ff9a29ba02f60898a59d112d1201ef1874cdc1
-
SHA256
6f918cda99092ef3de36b60e1eba55c28c0d1012adc678e580cd91609fbbe4f8
-
SHA512
d57d50f646056030f2a43953560007e53b8c064f0e1e234076d291ec58c4c13b70bd9e57edf066d4c407fd68011f1befabeef98351228bbaff59faace6827bc4
-
SSDEEP
768:EXKeT2Si83nLt8tkGX8uxOHgRrW5YLKG9Y/HrSNm0kmG7xMsVAnc3yy85SBiLFMP:EFrmh0HgB3LKrL9AcnQFMc9zwR6i+BC
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 8 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 548 explorer.exe 1308 spoolsv.exe 2664 svchost.exe 2832 spoolsv.exe -
Loads dropped DLL 8 IoCs
pid Process 2292 6f918cda99092ef3de36b60e1eba55c28c0d1012adc678e580cd91609fbbe4f8.exe 2292 6f918cda99092ef3de36b60e1eba55c28c0d1012adc678e580cd91609fbbe4f8.exe 548 explorer.exe 548 explorer.exe 1308 spoolsv.exe 1308 spoolsv.exe 2664 svchost.exe 2664 svchost.exe -
resource yara_rule behavioral1/memory/2292-0-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/files/0x000a000000016d81-6.dat upx behavioral1/files/0x000800000001722b-20.dat upx behavioral1/memory/548-26-0x0000000000440000-0x0000000000475000-memory.dmp upx behavioral1/files/0x00070000000174d0-35.dat upx behavioral1/memory/2664-43-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/memory/2832-58-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/memory/2292-62-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/memory/1308-60-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/files/0x000a000000016d66-63.dat upx behavioral1/memory/548-64-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/memory/2664-67-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/memory/548-78-0x0000000000400000-0x0000000000435000-memory.dmp upx -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification \??\c:\windows\system\explorer.exe 6f918cda99092ef3de36b60e1eba55c28c0d1012adc678e580cd91609fbbe4f8.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe svchost.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6f918cda99092ef3de36b60e1eba55c28c0d1012adc678e580cd91609fbbe4f8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2292 6f918cda99092ef3de36b60e1eba55c28c0d1012adc678e580cd91609fbbe4f8.exe 548 explorer.exe 548 explorer.exe 548 explorer.exe 548 explorer.exe 2664 svchost.exe 2664 svchost.exe 548 explorer.exe 2664 svchost.exe 548 explorer.exe 2664 svchost.exe 548 explorer.exe 2664 svchost.exe 548 explorer.exe 2664 svchost.exe 548 explorer.exe 2664 svchost.exe 548 explorer.exe 2664 svchost.exe 548 explorer.exe 2664 svchost.exe 548 explorer.exe 2664 svchost.exe 548 explorer.exe 2664 svchost.exe 548 explorer.exe 2664 svchost.exe 548 explorer.exe 2664 svchost.exe 548 explorer.exe 2664 svchost.exe 548 explorer.exe 2664 svchost.exe 548 explorer.exe 2664 svchost.exe 548 explorer.exe 2664 svchost.exe 548 explorer.exe 2664 svchost.exe 548 explorer.exe 2664 svchost.exe 548 explorer.exe 2664 svchost.exe 548 explorer.exe 2664 svchost.exe 548 explorer.exe 2664 svchost.exe 548 explorer.exe 2664 svchost.exe 548 explorer.exe 2664 svchost.exe 548 explorer.exe 2664 svchost.exe 548 explorer.exe 2664 svchost.exe 548 explorer.exe 2664 svchost.exe 548 explorer.exe 2664 svchost.exe 548 explorer.exe 2664 svchost.exe 548 explorer.exe 2664 svchost.exe 548 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 548 explorer.exe 2664 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2292 6f918cda99092ef3de36b60e1eba55c28c0d1012adc678e580cd91609fbbe4f8.exe 2292 6f918cda99092ef3de36b60e1eba55c28c0d1012adc678e580cd91609fbbe4f8.exe 548 explorer.exe 548 explorer.exe 1308 spoolsv.exe 1308 spoolsv.exe 2664 svchost.exe 2664 svchost.exe 2832 spoolsv.exe 2832 spoolsv.exe 548 explorer.exe 548 explorer.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2292 wrote to memory of 548 2292 6f918cda99092ef3de36b60e1eba55c28c0d1012adc678e580cd91609fbbe4f8.exe 30 PID 2292 wrote to memory of 548 2292 6f918cda99092ef3de36b60e1eba55c28c0d1012adc678e580cd91609fbbe4f8.exe 30 PID 2292 wrote to memory of 548 2292 6f918cda99092ef3de36b60e1eba55c28c0d1012adc678e580cd91609fbbe4f8.exe 30 PID 2292 wrote to memory of 548 2292 6f918cda99092ef3de36b60e1eba55c28c0d1012adc678e580cd91609fbbe4f8.exe 30 PID 548 wrote to memory of 1308 548 explorer.exe 31 PID 548 wrote to memory of 1308 548 explorer.exe 31 PID 548 wrote to memory of 1308 548 explorer.exe 31 PID 548 wrote to memory of 1308 548 explorer.exe 31 PID 1308 wrote to memory of 2664 1308 spoolsv.exe 32 PID 1308 wrote to memory of 2664 1308 spoolsv.exe 32 PID 1308 wrote to memory of 2664 1308 spoolsv.exe 32 PID 1308 wrote to memory of 2664 1308 spoolsv.exe 32 PID 2664 wrote to memory of 2832 2664 svchost.exe 33 PID 2664 wrote to memory of 2832 2664 svchost.exe 33 PID 2664 wrote to memory of 2832 2664 svchost.exe 33 PID 2664 wrote to memory of 2832 2664 svchost.exe 33 PID 2664 wrote to memory of 2560 2664 svchost.exe 34 PID 2664 wrote to memory of 2560 2664 svchost.exe 34 PID 2664 wrote to memory of 2560 2664 svchost.exe 34 PID 2664 wrote to memory of 2560 2664 svchost.exe 34 PID 2664 wrote to memory of 1092 2664 svchost.exe 36 PID 2664 wrote to memory of 1092 2664 svchost.exe 36 PID 2664 wrote to memory of 1092 2664 svchost.exe 36 PID 2664 wrote to memory of 1092 2664 svchost.exe 36 PID 2664 wrote to memory of 2028 2664 svchost.exe 38 PID 2664 wrote to memory of 2028 2664 svchost.exe 38 PID 2664 wrote to memory of 2028 2664 svchost.exe 38 PID 2664 wrote to memory of 2028 2664 svchost.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\6f918cda99092ef3de36b60e1eba55c28c0d1012adc678e580cd91609fbbe4f8.exe"C:\Users\Admin\AppData\Local\Temp\6f918cda99092ef3de36b60e1eba55c28c0d1012adc678e580cd91609fbbe4f8.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2292 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:548 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1308 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2664 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2832
-
-
C:\Windows\SysWOW64\at.exeat 23:13 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:2560
-
-
C:\Windows\SysWOW64\at.exeat 23:14 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:1092
-
-
C:\Windows\SysWOW64\at.exeat 23:15 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:2028
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
71KB
MD5c6a9717d81e74ae0f6ea70904cd54e1e
SHA17ce97fd7b480393e10e1a29f6b66fdb2415ad979
SHA256da80109d63a04ac06e22b0ac539b665ae8ea7807c735ec3a9e9b62f0e36ae806
SHA5120b183aa0d050d35c9c036acbe840e8d9f89a3759e4b8ef921c0f839a7e17d91a4e03eb8fad7ba594b29f7fa8f861544a093b2115c9daf004f5eb93d3186176c2
-
Filesize
71KB
MD557e14d7d15d338e7c6a4b3eadcc7b152
SHA1f4456af4c73b8bbcbcf2067cb12ad8463d80849b
SHA256fcfea2b1449c978f111c93e0f0372b97e764b407cf7a1cc955f1beed6205ba7c
SHA512fc194b3c415a1a2d929c578f6ef45e326f0b2f0156574ac198019ed61056dcb2b3efdd2e522226c22270ee33a6826cefe56a19bc2c6fbf991e3cb6f84f895068
-
Filesize
71KB
MD5cea5c623d34659bd61fc48e108f507f3
SHA1d17cd31ae0b790d0313f2c50787da5fe69153228
SHA256d35e541224d5433550c77cb5ce96092c9ad7eaf7eab93e388b166604565adbde
SHA51216ca6d3a5c019fa36ce14959109ff0ca6cfd9775d1b30cd351fe7d12e2c4f7a8fe99a1344b3e65dd3ae322ff38335340e261ec28287408857c15c753837dd545
-
Filesize
71KB
MD5d4a3ee1f25dcf4e2cc0a90229b75ec06
SHA18860c289e06dc13f811f6f415e0ba737957527b5
SHA256e4aebc3c07ced0a19f2d81a440fdc93b44b3674bcfe8bec117836d7a781b57cb
SHA512f219d137a2644a472f84279f9f8a576db9f1f8f91c146d89280b25e53fb31f8d35efebbc24af8fe4192d35b74bcf52eb8d60a2924e572ac04fdd1bd8ef91f84a