Analysis
-
max time kernel
120s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07-09-2024 10:23
Static task
static1
Behavioral task
behavioral1
Sample
bef7cb55b42d2eefbc137b0e1cc8cf70N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
bef7cb55b42d2eefbc137b0e1cc8cf70N.exe
Resource
win10v2004-20240802-en
General
-
Target
bef7cb55b42d2eefbc137b0e1cc8cf70N.exe
-
Size
211KB
-
MD5
bef7cb55b42d2eefbc137b0e1cc8cf70
-
SHA1
298e292afb2ccc5103e846bb05bd1bbcc75d78bb
-
SHA256
62bcfc7301c5e4fa40e052c20696efcf7adbdafc685e4141747ca6971f7dfb90
-
SHA512
7d766f90e7f36f256268965dca4edbb4d7f3fd04e029fd1f2e57d0f0fee0f26a9e7e497d0946951a1c115cb74425ae55afda887a1ae7a26d29221b5608765bb8
-
SSDEEP
3072:bDpM9Nvih5c9DE1pvAPXIHLfMgw7ySBL8PEAjAfIbAYGPJz6sPJBINFZ1FqnF:b1iNKQxENHLfMgw7y9ZrK
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\userinit.exe" userinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\userinit.exe" swchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" userinit.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" swchost.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 8 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Local\\mrsys.exe MR" swchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} swchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} swchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Local\\mrsys.exe MR" swchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} swchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} userinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Local\\mrsys.exe MR" userinit.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} swchost.exe -
Executes dropped EXE 4 IoCs
pid Process 2592 userinit.exe 4520 spoolsw.exe 960 swchost.exe 3148 spoolsw.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\userinit = "c:\\windows\\userinit.exe RO" swchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Swchost = "c:\\windows\\swchost.exe RO" swchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\userinit = "c:\\windows\\userinit.exe RO" userinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Swchost = "c:\\windows\\swchost.exe RO" userinit.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\udsys.exe userinit.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification \??\c:\windows\userinit.exe bef7cb55b42d2eefbc137b0e1cc8cf70N.exe File opened for modification \??\c:\windows\spoolsw.exe userinit.exe File opened for modification \??\c:\windows\swchost.exe spoolsw.exe File opened for modification \??\c:\windows\userinit.exe userinit.exe File opened for modification \??\c:\windows\swchost.exe swchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language userinit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language swchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bef7cb55b42d2eefbc137b0e1cc8cf70N.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2276 bef7cb55b42d2eefbc137b0e1cc8cf70N.exe 2276 bef7cb55b42d2eefbc137b0e1cc8cf70N.exe 2592 userinit.exe 2592 userinit.exe 2592 userinit.exe 2592 userinit.exe 2592 userinit.exe 2592 userinit.exe 960 swchost.exe 960 swchost.exe 960 swchost.exe 960 swchost.exe 2592 userinit.exe 2592 userinit.exe 960 swchost.exe 960 swchost.exe 2592 userinit.exe 2592 userinit.exe 960 swchost.exe 960 swchost.exe 2592 userinit.exe 2592 userinit.exe 960 swchost.exe 960 swchost.exe 2592 userinit.exe 2592 userinit.exe 960 swchost.exe 960 swchost.exe 2592 userinit.exe 2592 userinit.exe 960 swchost.exe 960 swchost.exe 2592 userinit.exe 2592 userinit.exe 960 swchost.exe 960 swchost.exe 2592 userinit.exe 2592 userinit.exe 960 swchost.exe 960 swchost.exe 2592 userinit.exe 2592 userinit.exe 960 swchost.exe 960 swchost.exe 2592 userinit.exe 2592 userinit.exe 960 swchost.exe 960 swchost.exe 2592 userinit.exe 2592 userinit.exe 960 swchost.exe 960 swchost.exe 2592 userinit.exe 2592 userinit.exe 960 swchost.exe 960 swchost.exe 2592 userinit.exe 2592 userinit.exe 960 swchost.exe 960 swchost.exe 2592 userinit.exe 2592 userinit.exe 960 swchost.exe 960 swchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2592 userinit.exe 960 swchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2276 bef7cb55b42d2eefbc137b0e1cc8cf70N.exe 2276 bef7cb55b42d2eefbc137b0e1cc8cf70N.exe 2592 userinit.exe 2592 userinit.exe 4520 spoolsw.exe 4520 spoolsw.exe 960 swchost.exe 960 swchost.exe 3148 spoolsw.exe 3148 spoolsw.exe 2592 userinit.exe 2592 userinit.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2276 wrote to memory of 2592 2276 bef7cb55b42d2eefbc137b0e1cc8cf70N.exe 84 PID 2276 wrote to memory of 2592 2276 bef7cb55b42d2eefbc137b0e1cc8cf70N.exe 84 PID 2276 wrote to memory of 2592 2276 bef7cb55b42d2eefbc137b0e1cc8cf70N.exe 84 PID 2592 wrote to memory of 4520 2592 userinit.exe 85 PID 2592 wrote to memory of 4520 2592 userinit.exe 85 PID 2592 wrote to memory of 4520 2592 userinit.exe 85 PID 4520 wrote to memory of 960 4520 spoolsw.exe 87 PID 4520 wrote to memory of 960 4520 spoolsw.exe 87 PID 4520 wrote to memory of 960 4520 spoolsw.exe 87 PID 960 wrote to memory of 3148 960 swchost.exe 88 PID 960 wrote to memory of 3148 960 swchost.exe 88 PID 960 wrote to memory of 3148 960 swchost.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\bef7cb55b42d2eefbc137b0e1cc8cf70N.exe"C:\Users\Admin\AppData\Local\Temp\bef7cb55b42d2eefbc137b0e1cc8cf70N.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2276 -
\??\c:\windows\userinit.exec:\windows\userinit.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2592 -
\??\c:\windows\spoolsw.exec:\windows\spoolsw.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4520 -
\??\c:\windows\swchost.exec:\windows\swchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:960 -
\??\c:\windows\spoolsw.exec:\windows\spoolsw.exe PR5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3148
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
211KB
MD5c30de2bea68ff3c80ec75f007511cbb9
SHA116f8dbe585ecd495219a672539b0409425b678b3
SHA256bb65d3d6d5f66ca9471d81e3003669e923d0e28ca7cb0d09ac78621ed2d10a09
SHA51201ba66b798ba492eee954f41f6cb66370f27b8b95f1c6e1f5c8341e0bd12d1bb0adbb4fa2f24ec24f0855a39141c525cbed14df034f11beb30d60b2fc514b2f9
-
Filesize
211KB
MD56b961c5c97d770a20075445f014d9fef
SHA15b4c3b98c608c4d3ce9769e65b545e3f8e904810
SHA256cb3267bd9d37d16fe935faa443a565f3ebc7a76e221459f66e25bfea40b73235
SHA5126e6e37e75d07930ca2e074708f32c47abca889edfd167deaf73dad8eb05c2ee1c45bda6c1896545dee83affd750b7d178e85e7222eef1f9059eb93d8dd0efe2e
-
Filesize
211KB
MD54fa3dff955e3fc4a5a8bda7aca9fa5ab
SHA1222b6e375cc2b26682c836cf6d61b85ac885ba86
SHA2561d6b59377e3c953ab60a2439703c7823d3ad9dedb46e9b9df8ae60a45c0ee477
SHA512564645a12b1f0e9b3a953c8561d4073ae7d18a91d94aba05fa01deeefcebcdff3b8ce24c853a65ab3a82249ae2e426fde4fecb347d2da5aa3d48e55c62f6521a
-
Filesize
211KB
MD5806d06aba3dff6cf6dc70179111a5b51
SHA18e00b62e79622bc835a737610178fb41232d2df1
SHA256fde20414e65936b248de093e6310e96797f492706410b94974ce0b0912b2b2ce
SHA51297603365e64eb51afd0cab3c46a4859281ec894b9e9bcdb30dc7090093dcdab5c0674106ddf1b06f7390639a543540b58cf4196ae551777d27e17b22a5c91445