Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    07-09-2024 15:49

General

  • Target

    5080efb71ab520f789a41c45870be9c0N.exe

  • Size

    211KB

  • MD5

    5080efb71ab520f789a41c45870be9c0

  • SHA1

    776bbe2d86f6269719b1158c673734021fc86e68

  • SHA256

    1c00cf1fb536c2b3a76fac398817484607311f827e2254349e04b694de66ff55

  • SHA512

    a16b9d76eb5ab3f86e86be5c489a1077e9107e87de0d1091ddcc231a19029c88b2d4bd7d5128176410f5ec61374ee1aae6612c6e7a8ab888d0aa65234eaa89d2

  • SSDEEP

    3072:JD6Xtx68yygRBE52mxkEOHLRMpZ4deth8PEAjAfIbAYGPhz6sPJBInxZqOb:Jh8cBzHLRMpZ4d1Zb

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 8 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5080efb71ab520f789a41c45870be9c0N.exe
    "C:\Users\Admin\AppData\Local\Temp\5080efb71ab520f789a41c45870be9c0N.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2848
    • \??\c:\windows\userinit.exe
      c:\windows\userinit.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visiblity of hidden/system files in Explorer
      • Boot or Logon Autostart Execution: Active Setup
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1812
      • \??\c:\windows\spoolsw.exe
        c:\windows\spoolsw.exe SE
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2692
        • \??\c:\windows\swchost.exe
          c:\windows\swchost.exe
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visiblity of hidden/system files in Explorer
          • Boot or Logon Autostart Execution: Active Setup
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2708
          • \??\c:\windows\spoolsw.exe
            c:\windows\spoolsw.exe PR
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            PID:2372

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\mrsys.exe

    Filesize

    211KB

    MD5

    1c7372aa5bc1dd1731a5d57573481af7

    SHA1

    8b5b2ccd88077658598c0933d1dc732a14d3a15f

    SHA256

    93ffa13b0737fa3da346b3ef4428fc50d2144d956b32ed4edb5f7ea5cbc73856

    SHA512

    607cf26202ad4ef9d45925ff2ce8039efd3f69ec1728e01211b3583f24b10bbdc1ca2890cad927a2a5b87a001fc48e64e88951722c03ee8ba54cbe46d4fdee2b

  • C:\Windows\spoolsw.exe

    Filesize

    211KB

    MD5

    18493a8800c9c994ac136a453e4ae937

    SHA1

    c99916ae1bcce7c69bce0dabca0372f7a89ac6fd

    SHA256

    8c0ff1de0b3c297efae74f723057865ecbbb57eec72c822bb17c702848296262

    SHA512

    6c8fd0d4a0ba105f88d4b1495e82c1f684897c24e281c72e625885c78754d713c20b8e30ffd8a0a9e82b0848a702f2ee753686b9b396848fcc4d1fc7e085483f

  • C:\Windows\swchost.exe

    Filesize

    211KB

    MD5

    235554a8f7c7ec24e3e12f12e22cf49a

    SHA1

    6e5a5da23aac2286308b1f281e6c6c73a54c2e39

    SHA256

    a46f105f49a2a6e74227208dc8b1f588b6636737025f25d430a8abb4fc1acb24

    SHA512

    ada9af6c3a69ed3cf9466b37fd0e186ec9ac9d951b09391c88340f376cd65434cd6c2885670e8515b646e779c0ccd9dc2801edbf2e6a939cb4ab7b6c7435e0a7

  • C:\Windows\userinit.exe

    Filesize

    211KB

    MD5

    1e14ce1cd3fdfda050d9a0350f966bdd

    SHA1

    15951b197155418b75fb10a3c5ebc134141ed9c6

    SHA256

    af1699741639e07fd95fe891e25bd0de24780364570f33da5a5a5ff3742799a2

    SHA512

    641fa4cb310366b152ba5339edfc551feae5869c9f9c645162e48242be595724421ac57232454d4707f6c9774469dc0aecc5fb421cc131742670bf5002dfc9fe