Analysis

  • max time kernel
    120s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-09-2024 10:23

General

  • Target

    bef7cb55b42d2eefbc137b0e1cc8cf70N.exe

  • Size

    211KB

  • MD5

    bef7cb55b42d2eefbc137b0e1cc8cf70

  • SHA1

    298e292afb2ccc5103e846bb05bd1bbcc75d78bb

  • SHA256

    62bcfc7301c5e4fa40e052c20696efcf7adbdafc685e4141747ca6971f7dfb90

  • SHA512

    7d766f90e7f36f256268965dca4edbb4d7f3fd04e029fd1f2e57d0f0fee0f26a9e7e497d0946951a1c115cb74425ae55afda887a1ae7a26d29221b5608765bb8

  • SSDEEP

    3072:bDpM9Nvih5c9DE1pvAPXIHLfMgw7ySBL8PEAjAfIbAYGPJz6sPJBINFZ1FqnF:b1iNKQxENHLfMgw7y9ZrK

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 8 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bef7cb55b42d2eefbc137b0e1cc8cf70N.exe
    "C:\Users\Admin\AppData\Local\Temp\bef7cb55b42d2eefbc137b0e1cc8cf70N.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2276
    • \??\c:\windows\userinit.exe
      c:\windows\userinit.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visiblity of hidden/system files in Explorer
      • Boot or Logon Autostart Execution: Active Setup
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2592
      • \??\c:\windows\spoolsw.exe
        c:\windows\spoolsw.exe SE
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4520
        • \??\c:\windows\swchost.exe
          c:\windows\swchost.exe
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visiblity of hidden/system files in Explorer
          • Boot or Logon Autostart Execution: Active Setup
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:960
          • \??\c:\windows\spoolsw.exe
            c:\windows\spoolsw.exe PR
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            PID:3148

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\mrsys.exe

    Filesize

    211KB

    MD5

    c30de2bea68ff3c80ec75f007511cbb9

    SHA1

    16f8dbe585ecd495219a672539b0409425b678b3

    SHA256

    bb65d3d6d5f66ca9471d81e3003669e923d0e28ca7cb0d09ac78621ed2d10a09

    SHA512

    01ba66b798ba492eee954f41f6cb66370f27b8b95f1c6e1f5c8341e0bd12d1bb0adbb4fa2f24ec24f0855a39141c525cbed14df034f11beb30d60b2fc514b2f9

  • C:\Windows\spoolsw.exe

    Filesize

    211KB

    MD5

    6b961c5c97d770a20075445f014d9fef

    SHA1

    5b4c3b98c608c4d3ce9769e65b545e3f8e904810

    SHA256

    cb3267bd9d37d16fe935faa443a565f3ebc7a76e221459f66e25bfea40b73235

    SHA512

    6e6e37e75d07930ca2e074708f32c47abca889edfd167deaf73dad8eb05c2ee1c45bda6c1896545dee83affd750b7d178e85e7222eef1f9059eb93d8dd0efe2e

  • C:\Windows\swchost.exe

    Filesize

    211KB

    MD5

    4fa3dff955e3fc4a5a8bda7aca9fa5ab

    SHA1

    222b6e375cc2b26682c836cf6d61b85ac885ba86

    SHA256

    1d6b59377e3c953ab60a2439703c7823d3ad9dedb46e9b9df8ae60a45c0ee477

    SHA512

    564645a12b1f0e9b3a953c8561d4073ae7d18a91d94aba05fa01deeefcebcdff3b8ce24c853a65ab3a82249ae2e426fde4fecb347d2da5aa3d48e55c62f6521a

  • C:\Windows\userinit.exe

    Filesize

    211KB

    MD5

    806d06aba3dff6cf6dc70179111a5b51

    SHA1

    8e00b62e79622bc835a737610178fb41232d2df1

    SHA256

    fde20414e65936b248de093e6310e96797f492706410b94974ce0b0912b2b2ce

    SHA512

    97603365e64eb51afd0cab3c46a4859281ec894b9e9bcdb30dc7090093dcdab5c0674106ddf1b06f7390639a543540b58cf4196ae551777d27e17b22a5c91445