Analysis
-
max time kernel
92s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
01/09/2024, 18:10
Behavioral task
behavioral1
Sample
94754cefc063f4714ff41d4159837cf0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
94754cefc063f4714ff41d4159837cf0N.exe
Resource
win10v2004-20240802-en
General
-
Target
94754cefc063f4714ff41d4159837cf0N.exe
-
Size
678KB
-
MD5
94754cefc063f4714ff41d4159837cf0
-
SHA1
0415810fd50ea45e09958389eec8823c469d5523
-
SHA256
1f4ba905eea3da2b39b4a3effaeca8a737d325a474ac41bf5d81e70633916b2c
-
SHA512
15c252a4d3fe8516e67a60c23659ddfbc35f06063e51cf2993c5777a41bd48923c6a16458af29aa11295e3aa43ca6327eb03926ef99484f9a431a4d0e4bfce08
-
SSDEEP
12288:7tKe6Zv23YLVFhBsC8iFHs+hsuQXIQRUP/g8t55VGGWEs4UE0LP:v6Zv2ivhBVnFvh5Q44UP48eEDUE0LP
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{ECD440E3-8B9A-11D5-EBA1-F78EEEEEE983} 94754cefc063f4714ff41d4159837cf0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{ECD440E3-8B9A-11D5-EBA1-F78EEEEEE983}\StubPath = "msfuc32.exe" 94754cefc063f4714ff41d4159837cf0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{ECD440E3-8B9A-11D5-EBA1-F78EEEEEE983} spoolsv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{ECD440E3-8B9A-11D5-EBA1-F78EEEEEE983}\StubPath = "msfuc32.exe" spoolsv.exe -
Executes dropped EXE 1 IoCs
pid Process 2700 spoolsv.exe -
Modifies system executable filetype association 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\SysWow64\\concp32.exe \"%1\" %*" 94754cefc063f4714ff41d4159837cf0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\SysWow64\\concp32.exe \"%1\" %*" spoolsv.exe -
resource yara_rule behavioral1/memory/2532-0-0x0000000000400000-0x0000000000439000-memory.dmp upx behavioral1/files/0x0007000000018b6e-5.dat upx behavioral1/memory/2532-15-0x0000000000400000-0x0000000000439000-memory.dmp upx behavioral1/memory/2700-16-0x0000000000400000-0x0000000000439000-memory.dmp upx behavioral1/files/0x0018000000018b3e-14.dat upx behavioral1/memory/2700-17-0x0000000000400000-0x0000000000439000-memory.dmp upx -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\VCL = "vcl32.exe" 94754cefc063f4714ff41d4159837cf0N.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\VCL = "vcl32.exe" 94754cefc063f4714ff41d4159837cf0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\VCL = "vcl32.exe" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\VCL = "vcl32.exe" spoolsv.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\concp32.exe 94754cefc063f4714ff41d4159837cf0N.exe File created C:\Windows\SysWOW64\vcl32.exe 94754cefc063f4714ff41d4159837cf0N.exe File opened for modification C:\Windows\SysWOW64\vcl32.exe 94754cefc063f4714ff41d4159837cf0N.exe File created C:\Windows\SysWOW64\msfuc32.exe 94754cefc063f4714ff41d4159837cf0N.exe File opened for modification C:\Windows\SysWOW64\msfuc32.exe 94754cefc063f4714ff41d4159837cf0N.exe File created C:\Windows\SysWOW64\concp32.exe 94754cefc063f4714ff41d4159837cf0N.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\spoolsv.exe 94754cefc063f4714ff41d4159837cf0N.exe File opened for modification C:\Windows\spoolsv.exe 94754cefc063f4714ff41d4159837cf0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 94754cefc063f4714ff41d4159837cf0N.exe -
Modifies registry class 12 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{ECD440E3-8B9A-11D5-EBA1-F78EEEEEE983}\InprocServer32 94754cefc063f4714ff41d4159837cf0N.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{ECD440E3-8B9A-11D5-EBA1-F78EEEEEE983}\ax = df42404730a7698866b1248c6d16768f 94754cefc063f4714ff41d4159837cf0N.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{ECD440E3-8B9A-11D5-EBA1-F78EEEEEE983}\u0 = 658663d26f8bad325217a06063847056939f558d910ed252e05dd0113550f7fc0f4da82ff73a0681ba604c2d4f23269f spoolsv.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{ECD440E3-8B9A-11D5-EBA1-F78EEEEEE983}\u1 = 551d2e0658054ba756fd3798fea5ffca42865cb762a31639dabd7f2cca44e226 spoolsv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{ECD440E3-8B9A-11D5-EBA1-F78EEEEEE983}\v = "165" spoolsv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\SysWow64\\concp32.exe \"%1\" %*" spoolsv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{ECD440E3-8B9A-11D5-EBA1-F78EEEEEE983} 94754cefc063f4714ff41d4159837cf0N.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{ECD440E3-8B9A-11D5-EBA1-F78EEEEEE983}\sm = 01b8ec350471bd332433eee476ebe1f3 94754cefc063f4714ff41d4159837cf0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\SysWow64\\concp32.exe \"%1\" %*" 94754cefc063f4714ff41d4159837cf0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{ECD440E3-8B9A-11D5-EBA1-F78EEEEEE983} spoolsv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{ECD440E3-8B9A-11D5-EBA1-F78EEEEEE983}\InprocServer32 spoolsv.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{ECD440E3-8B9A-11D5-EBA1-F78EEEEEE983}\u2 = a54a6b702f92fdf2acd57599e2ae1608015dff41aa020117fc9bd8e2dcf4340f3fa61eb55d6f28597df90602703809d4 spoolsv.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2532 94754cefc063f4714ff41d4159837cf0N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2532 wrote to memory of 2700 2532 94754cefc063f4714ff41d4159837cf0N.exe 29 PID 2532 wrote to memory of 2700 2532 94754cefc063f4714ff41d4159837cf0N.exe 29 PID 2532 wrote to memory of 2700 2532 94754cefc063f4714ff41d4159837cf0N.exe 29 PID 2532 wrote to memory of 2700 2532 94754cefc063f4714ff41d4159837cf0N.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\94754cefc063f4714ff41d4159837cf0N.exe"C:\Users\Admin\AppData\Local\Temp\94754cefc063f4714ff41d4159837cf0N.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies system executable filetype association
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Windows\spoolsv.exeC:\Windows\spoolsv.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Modifies system executable filetype association
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2700
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Change Default File Association
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
684KB
MD50ec499c8944fab962a1780eb01aa02ab
SHA103d39dc07deb562f6cdac9191c9180620408aeba
SHA2565033920abf84fe6ff36f2eda1d8a3555251c45ee48a750d16c467d064620a86f
SHA512a6925aefad4d3b855507c16d9498ec11c168d2892522f81d0d9e459dd6fdebda24dd857279e6006ad831afd832120b9738bf23da3b274b20f979d4b43f1cf594
-
Filesize
681KB
MD580835a6aea9721babbabf28567599924
SHA1c19f8d4e7ce5d9661f51825f63bbb6d93dec9815
SHA256015c228de0347a6600a0b82c21896f31d91ab52fe9d3f0b7f9d6a8f96a17c9b4
SHA5123b01ef7f6ad1cad1be7cd8c33d7f1a36b79ac2be919e83123d9031057d17a727f6950697e0672b66c5f4950d9a0f891e7ef8e279eec6e4e8c4509f5eb74553c6