Analysis

  • max time kernel
    150s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/08/2024, 02:17

General

  • Target

    ca0f505b0010a26226f9b1f47ef48fe0688b163d13aea8da095b746c3c989a55.exe

  • Size

    206KB

  • MD5

    7cc69dce9b289f96d0d1bf3009f405c5

  • SHA1

    872f976fd2af8b4e95532d9c6f8b8a0242cc2f05

  • SHA256

    ca0f505b0010a26226f9b1f47ef48fe0688b163d13aea8da095b746c3c989a55

  • SHA512

    163a48c2224f72fe9d62411f4b4b0dbdb2c0b360bc6aa44d92c9aab14bf0ba288ae1eb60814d8dac4feeec2214b30687d1e3e683e442b93360c124de909d9625

  • SSDEEP

    3072:zvEfVUzSLhIVbV6i5LirrlZrHyrUHUckoMQ2RN6un+:zvEN2U+T6i5LirrllHy4HUcMQY6X

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 8 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ca0f505b0010a26226f9b1f47ef48fe0688b163d13aea8da095b746c3c989a55.exe
    "C:\Users\Admin\AppData\Local\Temp\ca0f505b0010a26226f9b1f47ef48fe0688b163d13aea8da095b746c3c989a55.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3464
    • \??\c:\windows\system\explorer.exe
      c:\windows\system\explorer.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visiblity of hidden/system files in Explorer
      • Boot or Logon Autostart Execution: Active Setup
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3144
      • \??\c:\windows\system\spoolsv.exe
        c:\windows\system\spoolsv.exe SE
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4996
        • \??\c:\windows\system\svchost.exe
          c:\windows\system\svchost.exe
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visiblity of hidden/system files in Explorer
          • Boot or Logon Autostart Execution: Active Setup
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:876
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe PR
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            PID:1420
          • C:\Windows\SysWOW64\at.exe
            at 02:19 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
            5⤵
            • System Location Discovery: System Language Discovery
            PID:3704
          • C:\Windows\SysWOW64\at.exe
            at 02:20 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
            5⤵
            • System Location Discovery: System Language Discovery
            PID:4816
          • C:\Windows\SysWOW64\at.exe
            at 02:21 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
            5⤵
            • System Location Discovery: System Language Discovery
            PID:4780

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\mrsys.exe

          Filesize

          206KB

          MD5

          da7d9cbe6359838f58ec88a149ef81f5

          SHA1

          88513b2f2ed808828fc51c925dd51c6277af235a

          SHA256

          2cb1d0d58a29b669e56b1e83bf52e37870aafad38a61d79c177b2a31bd1ddf5c

          SHA512

          4fcfca0c593ad328c4d04686dcbb61e68aef22191c0ac3559ea29aec94a3ef3002aace6ded26c4fcab48fc4f9d5882a4bf9e8f8d5759fcce4a320175c54a1c57

        • C:\Windows\System\spoolsv.exe

          Filesize

          206KB

          MD5

          e578ea9b63ead330b359cfb103fb0785

          SHA1

          543aa407c28bbe33fcaff3b99cfe549e69afdaaa

          SHA256

          aa0390019a8106dd6c9bc364dd25d4c19983c3e0198d69b0a9e81487819067a3

          SHA512

          ace046ddbe8f5da6540f2c8958ab5db8c22b6b0f0186195bd5ba58f000c0bc9c88a1e3fba6c6f493c1a8b40238a4c0e25477e106cf9f7babbebf3fa42a06bf3f

        • C:\Windows\System\svchost.exe

          Filesize

          206KB

          MD5

          0ad332ba6c4566de06d3cbe35ffaea05

          SHA1

          7c1bc62b8765b0d4ecfb21fd1b644da376153773

          SHA256

          348d9b27940340e44f50292c13decf5b2088bf84412088c33f41768e2e96fad6

          SHA512

          99756397ae35170774a93757090f0f4ff32cca96c9a7ae2f4a5365824b3f9a18274d075d8757750c53820d15801521a1c1e5f8d6c3fea61d943f001ffbd00927

        • \??\c:\windows\system\explorer.exe

          Filesize

          206KB

          MD5

          d88cacdba80f6eb50be4f400d71b6d8c

          SHA1

          211fe3b379ff182712eab57dd00ee06cbb53d38e

          SHA256

          12b399eec8d55c3f5569888be61d241ee8693b8a20ac864a59b8114e0cf8f422

          SHA512

          a0ec56985ab477484cb11397bd6aa513a178f2b1795294778a7f4cecc9b34f23518f6f2da864ea7f7f3e1fc72ff45d18a4bd6610cd605e888f20eb304e3b6d82