Analysis

  • max time kernel
    150s
  • max time network
    20s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    08/08/2024, 22:46

General

  • Target

    763aae1f3ae133bb55560ef85dee3ec87263df8232f95c213c1c5e0f6c11c77b.exe

  • Size

    207KB

  • MD5

    1da17e9ebf0dbc9cca47040e4ffd51c0

  • SHA1

    84e292e82c91fcb355c9de36a6dc43762c63082c

  • SHA256

    763aae1f3ae133bb55560ef85dee3ec87263df8232f95c213c1c5e0f6c11c77b

  • SHA512

    ae8d511b4dd24c7c5bb6f322e6726af929c8c3dc8c697a98ae81fa5835ec53dc9b53433fb445f01f949bb3cd4dd1a34aa3634b971eb2c7b91be835ee8d78d7a8

  • SSDEEP

    6144:zvEN2U+T6i5LirrllHy4HUcMQY6yQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQX:zENN+T5xYrllrU7QY6h

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 8 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 8 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\763aae1f3ae133bb55560ef85dee3ec87263df8232f95c213c1c5e0f6c11c77b.exe
    "C:\Users\Admin\AppData\Local\Temp\763aae1f3ae133bb55560ef85dee3ec87263df8232f95c213c1c5e0f6c11c77b.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:288
    • \??\c:\windows\system\explorer.exe
      c:\windows\system\explorer.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visiblity of hidden/system files in Explorer
      • Boot or Logon Autostart Execution: Active Setup
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1640
      • \??\c:\windows\system\spoolsv.exe
        c:\windows\system\spoolsv.exe SE
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2612
        • \??\c:\windows\system\svchost.exe
          c:\windows\system\svchost.exe
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visiblity of hidden/system files in Explorer
          • Boot or Logon Autostart Execution: Active Setup
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:3012
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe PR
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            PID:3020
          • C:\Windows\SysWOW64\at.exe
            at 22:48 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
            5⤵
            • System Location Discovery: System Language Discovery
            PID:2720
          • C:\Windows\SysWOW64\at.exe
            at 22:49 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
            5⤵
            • System Location Discovery: System Language Discovery
            PID:2592
          • C:\Windows\SysWOW64\at.exe
            at 22:50 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
            5⤵
            • System Location Discovery: System Language Discovery
            PID:1084

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\mrsys.exe

          Filesize

          206KB

          MD5

          956eba15c2b5c1d3c0fa60d029bf0913

          SHA1

          46f235174b04964ebdf4de459cf736b871089d22

          SHA256

          c52b1521eeb67bc884609fdfce99c49ba49ceecd00b9c5108134fb22c191749f

          SHA512

          c86d9c76fd48bb0f12580182e9ce97b6c0baeff3cc77e2a06d0b4dd7f773a604b5d259fb61e120da658366ec51224bbd94326773d0027c1d05d8235f0b9d806e

        • C:\Windows\system\explorer.exe

          Filesize

          207KB

          MD5

          93808c607c669f6eeefb93af4f71e5b7

          SHA1

          b63bdcbbec5bf158f62e85153ce90608eef0c569

          SHA256

          18d97e1945baf8dcd43e902dff62f5a22aea671616bd2b019b65942c0c27c4f9

          SHA512

          7180d0ed9fb6d1350adb618cb830d156c5829f0ee939c92736ede93360ed8333d489749aaf354ebd137ca1de87e4f1ea64195b7e775679811892776118e42980

        • \Windows\system\spoolsv.exe

          Filesize

          206KB

          MD5

          ed61841252f450a055858377ea509b5d

          SHA1

          114ffdfe69c0336f666dad4f926959c7ce207a41

          SHA256

          5e1365a0f852028f5b77fb7db1b49e1d25e437518ae18760784c83b114c8576e

          SHA512

          26ae3300bccb9465372a769e2d18cf61dbc9f544e7e75a41c4938960dfed2b54e96119477bc532f55a1004adf29cb3fe1101808d672b74355ac559f909d62ace

        • \Windows\system\svchost.exe

          Filesize

          206KB

          MD5

          e75ff56ba9715375b5020950cf6651b1

          SHA1

          7f98996a6dba3344601ebdf3bfc37e3d4e0771f8

          SHA256

          2a91a93f8c752cee9b49ca31ffdfc057e5d85e41fb561d4fe357990bde845ab0

          SHA512

          6df5f3f6c36844d33656b3afb4d56c17e4853a481f4f110531c812538c0e4eb23276eccf26d3dfa6c9e1ead4ecf974c2b805085694413bca46b0374e80aa5ac9