Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 10:43
Static task
static1
Behavioral task
behavioral1
Sample
7f16a724a0c8399c9ce8cd4a0a21eab0N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
7f16a724a0c8399c9ce8cd4a0a21eab0N.exe
Resource
win10v2004-20240802-en
General
-
Target
7f16a724a0c8399c9ce8cd4a0a21eab0N.exe
-
Size
1.4MB
-
MD5
7f16a724a0c8399c9ce8cd4a0a21eab0
-
SHA1
1aaf1b9cd83067904c7cb023e6bc353ecff50f69
-
SHA256
66299b2a4a65cec262355fd31e4910a30b7e21df5b089a9182da45249c23ce9c
-
SHA512
d19f4409ad864cbaf2b0e1bd13d505243dc7c5504cd5201bc973b56de0be76f45b0368841a944f30b7758e6f597fb0d1dcb7564420396a79fdb1efae278bd038
-
SSDEEP
24576:S9cdOqX1uuMliQzd4mNy9Sh5hJgpiwVQLJaOSZ4LehoZza9gNWmAO5ehlMV:S9UX1uBx4mYo83vOSeyeaKrT
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 8 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 2708 explorer.exe 2896 spoolsv.exe 2548 svchost.exe 3004 spoolsv.exe -
Loads dropped DLL 8 IoCs
pid Process 3064 7f16a724a0c8399c9ce8cd4a0a21eab0N.exe 3064 7f16a724a0c8399c9ce8cd4a0a21eab0N.exe 2708 explorer.exe 2708 explorer.exe 2896 spoolsv.exe 2896 spoolsv.exe 2548 svchost.exe 2548 svchost.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 29 IoCs
pid Process 3064 7f16a724a0c8399c9ce8cd4a0a21eab0N.exe 2708 explorer.exe 2896 spoolsv.exe 2548 svchost.exe 3004 spoolsv.exe 2708 explorer.exe 2548 svchost.exe 2708 explorer.exe 2548 svchost.exe 2708 explorer.exe 2548 svchost.exe 2708 explorer.exe 2548 svchost.exe 2708 explorer.exe 2548 svchost.exe 2708 explorer.exe 2548 svchost.exe 2708 explorer.exe 2548 svchost.exe 2708 explorer.exe 2548 svchost.exe 2708 explorer.exe 2548 svchost.exe 2708 explorer.exe 2548 svchost.exe 2708 explorer.exe 2548 svchost.exe 2708 explorer.exe 2548 svchost.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification \??\c:\windows\system\explorer.exe 7f16a724a0c8399c9ce8cd4a0a21eab0N.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe svchost.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7f16a724a0c8399c9ce8cd4a0a21eab0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3064 7f16a724a0c8399c9ce8cd4a0a21eab0N.exe 2708 explorer.exe 2708 explorer.exe 2708 explorer.exe 2708 explorer.exe 2548 svchost.exe 2548 svchost.exe 2708 explorer.exe 2548 svchost.exe 2708 explorer.exe 2548 svchost.exe 2708 explorer.exe 2548 svchost.exe 2708 explorer.exe 2548 svchost.exe 2708 explorer.exe 2548 svchost.exe 2708 explorer.exe 2548 svchost.exe 2708 explorer.exe 2548 svchost.exe 2708 explorer.exe 2548 svchost.exe 2708 explorer.exe 2548 svchost.exe 2708 explorer.exe 2548 svchost.exe 2708 explorer.exe 2548 svchost.exe 2708 explorer.exe 2548 svchost.exe 2708 explorer.exe 2548 svchost.exe 2708 explorer.exe 2548 svchost.exe 2708 explorer.exe 2548 svchost.exe 2708 explorer.exe 2548 svchost.exe 2708 explorer.exe 2548 svchost.exe 2708 explorer.exe 2548 svchost.exe 2708 explorer.exe 2548 svchost.exe 2708 explorer.exe 2548 svchost.exe 2708 explorer.exe 2548 svchost.exe 2708 explorer.exe 2548 svchost.exe 2708 explorer.exe 2548 svchost.exe 2708 explorer.exe 2548 svchost.exe 2708 explorer.exe 2548 svchost.exe 2708 explorer.exe 2548 svchost.exe 2708 explorer.exe 2548 svchost.exe 2708 explorer.exe 2548 svchost.exe 2708 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2708 explorer.exe 2548 svchost.exe -
Suspicious use of SetWindowsHookEx 17 IoCs
pid Process 3064 7f16a724a0c8399c9ce8cd4a0a21eab0N.exe 3064 7f16a724a0c8399c9ce8cd4a0a21eab0N.exe 3064 7f16a724a0c8399c9ce8cd4a0a21eab0N.exe 2708 explorer.exe 2708 explorer.exe 2708 explorer.exe 2896 spoolsv.exe 2896 spoolsv.exe 2896 spoolsv.exe 2548 svchost.exe 2548 svchost.exe 2548 svchost.exe 3004 spoolsv.exe 3004 spoolsv.exe 3004 spoolsv.exe 2708 explorer.exe 2708 explorer.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 3064 wrote to memory of 2708 3064 7f16a724a0c8399c9ce8cd4a0a21eab0N.exe 30 PID 3064 wrote to memory of 2708 3064 7f16a724a0c8399c9ce8cd4a0a21eab0N.exe 30 PID 3064 wrote to memory of 2708 3064 7f16a724a0c8399c9ce8cd4a0a21eab0N.exe 30 PID 3064 wrote to memory of 2708 3064 7f16a724a0c8399c9ce8cd4a0a21eab0N.exe 30 PID 2708 wrote to memory of 2896 2708 explorer.exe 31 PID 2708 wrote to memory of 2896 2708 explorer.exe 31 PID 2708 wrote to memory of 2896 2708 explorer.exe 31 PID 2708 wrote to memory of 2896 2708 explorer.exe 31 PID 2896 wrote to memory of 2548 2896 spoolsv.exe 32 PID 2896 wrote to memory of 2548 2896 spoolsv.exe 32 PID 2896 wrote to memory of 2548 2896 spoolsv.exe 32 PID 2896 wrote to memory of 2548 2896 spoolsv.exe 32 PID 2548 wrote to memory of 3004 2548 svchost.exe 33 PID 2548 wrote to memory of 3004 2548 svchost.exe 33 PID 2548 wrote to memory of 3004 2548 svchost.exe 33 PID 2548 wrote to memory of 3004 2548 svchost.exe 33 PID 2548 wrote to memory of 1200 2548 svchost.exe 34 PID 2548 wrote to memory of 1200 2548 svchost.exe 34 PID 2548 wrote to memory of 1200 2548 svchost.exe 34 PID 2548 wrote to memory of 1200 2548 svchost.exe 34 PID 2548 wrote to memory of 592 2548 svchost.exe 36 PID 2548 wrote to memory of 592 2548 svchost.exe 36 PID 2548 wrote to memory of 592 2548 svchost.exe 36 PID 2548 wrote to memory of 592 2548 svchost.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\7f16a724a0c8399c9ce8cd4a0a21eab0N.exe"C:\Users\Admin\AppData\Local\Temp\7f16a724a0c8399c9ce8cd4a0a21eab0N.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3064 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2708 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2896 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2548 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3004
-
-
C:\Windows\SysWOW64\at.exeat 10:45 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:1200
-
-
C:\Windows\SysWOW64\at.exeat 10:46 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:592
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD5fcc0b636c95c7ad434716cc3dbc1bd19
SHA1f316164c2c9154eb0b75f902bc51404deeb21655
SHA2560316a66d2d37d7c761a369f95f256fc961e28948628a8af115de015a5e11f408
SHA5128dccee4cb0a3067d4849e19a780aa548607f8e4b34f43d970948e2340a171b9a52151f4944a54fb4592ab5adbadcbc367dc4d6d1eace3b02ebb65416fa05731b
-
Filesize
1.4MB
MD5773551fbda813f404277fe92579b8358
SHA1cc79ba1927b8e71b84f4fb24a21aac5dbcd5dd38
SHA256358bbefd03302a3baa0ff4d6f085756302fba32e48164fdd60b8f290ea26273d
SHA5123a96d66effba5a8729fb5936eb16cabae18c91e1f64b14db60eeb6f393db17ad758b1808909b5c37888e8732ee7428e66550c7164ef1c010036be6748e21d032
-
Filesize
1.4MB
MD5a1af72fdb91ed93bf1503ac814f841a7
SHA19ec1db4517083c107ca6fdc2d9e98fa2b74bb98b
SHA256bf20df4e539e8609910e6d25b41002a0b262cf0521501c9be4bf297e06826add
SHA5128f7bc195f715bee44c9822e63f00d4aa62e27899e28c27495d773a1c76e9d5bc844a837069a1cb4cb24e74f4ec0c4c7862193a549089465a39fd8ba006973143
-
Filesize
1.4MB
MD5b31651bb70d13f8003fa981f215fc868
SHA1630f1326205ef78357bc16df8fc40a4540ce39f1
SHA2563e8216f9eb81d63216a5c8a77907df239108d70d471f20ee3fa7f1d8489aa61a
SHA5123649767da12f420a793dc0f3f128a424f216d97d7366711922d8ad0603ff53a1e472f253e8f927c27c1376fd5856a3d1e843117b2110035a66b056b0609dd0f0