Analysis
-
max time kernel
117s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
02/09/2024, 15:21
Behavioral task
behavioral1
Sample
64ffbb49b23b1afe0a2c56c6d38e3b10N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
64ffbb49b23b1afe0a2c56c6d38e3b10N.exe
Resource
win10v2004-20240802-en
General
-
Target
64ffbb49b23b1afe0a2c56c6d38e3b10N.exe
-
Size
918KB
-
MD5
64ffbb49b23b1afe0a2c56c6d38e3b10
-
SHA1
46fe8d1306c8bcbba11de5e905527a02852ad88d
-
SHA256
0bd3b635f422bf0f1d0e5d5329c0ca6aa1c8a89ed5a9e89f599cc0daac41f620
-
SHA512
e0129b31eb0b5c64b66fa6c8a5fe176778b59adcf99d7148a76ea417c9f76533901e99ede826da3358f360b2304483397d7d08b264b3a0c79ce31e14fde7a8f4
-
SSDEEP
24576:v6Zv2ivhBVnFys7xP86LkRCwPYfuukvDtiflQMSt:vE2ivhQs7dLkRumsbSt
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B5DBD56B-8B9A-11D5-EBA1-F78EEEEEE983} 64ffbb49b23b1afe0a2c56c6d38e3b10N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B5DBD56B-8B9A-11D5-EBA1-F78EEEEEE983}\StubPath = "msgrp32.exe" 64ffbb49b23b1afe0a2c56c6d38e3b10N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B5DBD56B-8B9A-11D5-EBA1-F78EEEEEE983} spoolsv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B5DBD56B-8B9A-11D5-EBA1-F78EEEEEE983}\StubPath = "msgrp32.exe" spoolsv.exe -
Executes dropped EXE 1 IoCs
pid Process 2344 spoolsv.exe -
Modifies system executable filetype association 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\SysWow64\\concp32.exe \"%1\" %*" 64ffbb49b23b1afe0a2c56c6d38e3b10N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\SysWow64\\concp32.exe \"%1\" %*" spoolsv.exe -
resource yara_rule behavioral1/memory/2404-0-0x0000000000400000-0x0000000000439000-memory.dmp upx behavioral1/files/0x000800000001613b-5.dat upx behavioral1/memory/2404-10-0x0000000000270000-0x00000000002A9000-memory.dmp upx behavioral1/files/0x0008000000015e21-14.dat upx behavioral1/memory/2344-16-0x0000000000400000-0x0000000000439000-memory.dmp upx behavioral1/memory/2404-15-0x0000000000400000-0x0000000000439000-memory.dmp upx behavioral1/memory/2344-17-0x0000000000400000-0x0000000000439000-memory.dmp upx -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\VCL = "vcl32.exe" 64ffbb49b23b1afe0a2c56c6d38e3b10N.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\VCL = "vcl32.exe" 64ffbb49b23b1afe0a2c56c6d38e3b10N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\VCL = "vcl32.exe" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\VCL = "vcl32.exe" spoolsv.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\msgrp32.exe 64ffbb49b23b1afe0a2c56c6d38e3b10N.exe File created C:\Windows\SysWOW64\concp32.exe 64ffbb49b23b1afe0a2c56c6d38e3b10N.exe File opened for modification C:\Windows\SysWOW64\concp32.exe 64ffbb49b23b1afe0a2c56c6d38e3b10N.exe File created C:\Windows\SysWOW64\vcl32.exe 64ffbb49b23b1afe0a2c56c6d38e3b10N.exe File opened for modification C:\Windows\SysWOW64\vcl32.exe 64ffbb49b23b1afe0a2c56c6d38e3b10N.exe File created C:\Windows\SysWOW64\msgrp32.exe 64ffbb49b23b1afe0a2c56c6d38e3b10N.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\spoolsv.exe 64ffbb49b23b1afe0a2c56c6d38e3b10N.exe File opened for modification C:\Windows\spoolsv.exe 64ffbb49b23b1afe0a2c56c6d38e3b10N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 64ffbb49b23b1afe0a2c56c6d38e3b10N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe -
Modifies registry class 12 IoCs
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B5DBD56B-8B9A-11D5-EBA1-F78EEEEEE983}\ax = 38362c038779c1cc60715178723730e0 64ffbb49b23b1afe0a2c56c6d38e3b10N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B5DBD56B-8B9A-11D5-EBA1-F78EEEEEE983}\InprocServer32 spoolsv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\SysWow64\\concp32.exe \"%1\" %*" spoolsv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B5DBD56B-8B9A-11D5-EBA1-F78EEEEEE983} 64ffbb49b23b1afe0a2c56c6d38e3b10N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B5DBD56B-8B9A-11D5-EBA1-F78EEEEEE983}\InprocServer32 64ffbb49b23b1afe0a2c56c6d38e3b10N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B5DBD56B-8B9A-11D5-EBA1-F78EEEEEE983} spoolsv.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B5DBD56B-8B9A-11D5-EBA1-F78EEEEEE983}\u0 = 658663d26f8bad325217a06063847056939f558d910ed252e05dd0113550f7fc0f4da82ff73a0681ba604c2d4f23269f spoolsv.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B5DBD56B-8B9A-11D5-EBA1-F78EEEEEE983}\u1 = 551d2e0658054ba756fd3798fea5ffca42865cb762a31639dabd7f2cca44e226 spoolsv.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B5DBD56B-8B9A-11D5-EBA1-F78EEEEEE983}\u2 = a54a6b702f92fdf2acd57599e2ae1608015dff41aa020117fc9bd8e2dcf4340f3fa61eb55d6f28597df90602703809d4 spoolsv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B5DBD56B-8B9A-11D5-EBA1-F78EEEEEE983}\v = "165" spoolsv.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B5DBD56B-8B9A-11D5-EBA1-F78EEEEEE983}\sm = 01b8ec350471bd332433eee476ebe1f3 64ffbb49b23b1afe0a2c56c6d38e3b10N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\SysWow64\\concp32.exe \"%1\" %*" 64ffbb49b23b1afe0a2c56c6d38e3b10N.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2404 64ffbb49b23b1afe0a2c56c6d38e3b10N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2404 wrote to memory of 2344 2404 64ffbb49b23b1afe0a2c56c6d38e3b10N.exe 30 PID 2404 wrote to memory of 2344 2404 64ffbb49b23b1afe0a2c56c6d38e3b10N.exe 30 PID 2404 wrote to memory of 2344 2404 64ffbb49b23b1afe0a2c56c6d38e3b10N.exe 30 PID 2404 wrote to memory of 2344 2404 64ffbb49b23b1afe0a2c56c6d38e3b10N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\64ffbb49b23b1afe0a2c56c6d38e3b10N.exe"C:\Users\Admin\AppData\Local\Temp\64ffbb49b23b1afe0a2c56c6d38e3b10N.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies system executable filetype association
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Windows\spoolsv.exeC:\Windows\spoolsv.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Modifies system executable filetype association
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2344
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Change Default File Association
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
928KB
MD551eb66d5db871623207dd0801cd4f04b
SHA1269516833cc178bb4d3c948647b6cb4c03f42219
SHA256698d53cfa297da7c8135d4ec2e1391a2d16869cd80879b424aa8f40baf8156bb
SHA5129024732be720e2218963d1dd6cddd90962601747e28bc28c0e1b76cce1d8c002d707640858a340ee4ef03eab33c563b1e3698cb49714b48e3f4781a81e777f2a
-
Filesize
920KB
MD576efd15eb17acaa39d2a908d895e4ddb
SHA1b4aff678262f4e123c6908db73bba54c7ad0117d
SHA256921851bd7cc150ff766db8937f32dfbc3028f3233f3fb0d4ba013b9c77e09caf
SHA512e413692b56eaac0aac41170dc8a0ffe0bd4ab429ad8bc6efe18b960d2961bf558aaf05a7f61e6ac277294be06ff6b26f6d558b4b78a6f1091bbe07f96215147f