Analysis
-
max time kernel
120s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07-09-2024 15:49
Static task
static1
Behavioral task
behavioral1
Sample
5080efb71ab520f789a41c45870be9c0N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5080efb71ab520f789a41c45870be9c0N.exe
Resource
win10v2004-20240802-en
General
-
Target
5080efb71ab520f789a41c45870be9c0N.exe
-
Size
211KB
-
MD5
5080efb71ab520f789a41c45870be9c0
-
SHA1
776bbe2d86f6269719b1158c673734021fc86e68
-
SHA256
1c00cf1fb536c2b3a76fac398817484607311f827e2254349e04b694de66ff55
-
SHA512
a16b9d76eb5ab3f86e86be5c489a1077e9107e87de0d1091ddcc231a19029c88b2d4bd7d5128176410f5ec61374ee1aae6612c6e7a8ab888d0aa65234eaa89d2
-
SSDEEP
3072:JD6Xtx68yygRBE52mxkEOHLRMpZ4deth8PEAjAfIbAYGPhz6sPJBInxZqOb:Jh8cBzHLRMpZ4d1Zb
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\userinit.exe" userinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\userinit.exe" swchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" swchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" userinit.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 8 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} swchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Local\\mrsys.exe MR" swchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} swchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} userinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Local\\mrsys.exe MR" userinit.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} swchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Local\\mrsys.exe MR" swchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} swchost.exe -
Executes dropped EXE 4 IoCs
pid Process 1812 userinit.exe 2692 spoolsw.exe 2708 swchost.exe 2372 spoolsw.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Swchost = "c:\\windows\\swchost.exe RO" userinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\userinit = "c:\\windows\\userinit.exe RO" swchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Swchost = "c:\\windows\\swchost.exe RO" swchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\userinit = "c:\\windows\\userinit.exe RO" userinit.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\system\udsys.exe userinit.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification \??\c:\windows\swchost.exe swchost.exe File opened for modification \??\c:\windows\userinit.exe 5080efb71ab520f789a41c45870be9c0N.exe File opened for modification \??\c:\windows\spoolsw.exe userinit.exe File opened for modification \??\c:\windows\swchost.exe spoolsw.exe File opened for modification \??\c:\windows\userinit.exe userinit.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5080efb71ab520f789a41c45870be9c0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language userinit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language swchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2848 5080efb71ab520f789a41c45870be9c0N.exe 1812 userinit.exe 1812 userinit.exe 1812 userinit.exe 2708 swchost.exe 2708 swchost.exe 1812 userinit.exe 2708 swchost.exe 1812 userinit.exe 2708 swchost.exe 1812 userinit.exe 2708 swchost.exe 1812 userinit.exe 2708 swchost.exe 1812 userinit.exe 2708 swchost.exe 1812 userinit.exe 2708 swchost.exe 1812 userinit.exe 2708 swchost.exe 1812 userinit.exe 2708 swchost.exe 1812 userinit.exe 2708 swchost.exe 1812 userinit.exe 2708 swchost.exe 1812 userinit.exe 2708 swchost.exe 1812 userinit.exe 2708 swchost.exe 1812 userinit.exe 2708 swchost.exe 1812 userinit.exe 2708 swchost.exe 1812 userinit.exe 2708 swchost.exe 1812 userinit.exe 2708 swchost.exe 1812 userinit.exe 2708 swchost.exe 1812 userinit.exe 2708 swchost.exe 1812 userinit.exe 2708 swchost.exe 1812 userinit.exe 2708 swchost.exe 1812 userinit.exe 2708 swchost.exe 1812 userinit.exe 2708 swchost.exe 1812 userinit.exe 2708 swchost.exe 1812 userinit.exe 2708 swchost.exe 1812 userinit.exe 2708 swchost.exe 1812 userinit.exe 2708 swchost.exe 1812 userinit.exe 2708 swchost.exe 1812 userinit.exe 2708 swchost.exe 1812 userinit.exe 2708 swchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 1812 userinit.exe 2708 swchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2848 5080efb71ab520f789a41c45870be9c0N.exe 2848 5080efb71ab520f789a41c45870be9c0N.exe 1812 userinit.exe 1812 userinit.exe 2692 spoolsw.exe 2692 spoolsw.exe 2708 swchost.exe 2708 swchost.exe 2372 spoolsw.exe 2372 spoolsw.exe 1812 userinit.exe 1812 userinit.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2848 wrote to memory of 1812 2848 5080efb71ab520f789a41c45870be9c0N.exe 32 PID 2848 wrote to memory of 1812 2848 5080efb71ab520f789a41c45870be9c0N.exe 32 PID 2848 wrote to memory of 1812 2848 5080efb71ab520f789a41c45870be9c0N.exe 32 PID 2848 wrote to memory of 1812 2848 5080efb71ab520f789a41c45870be9c0N.exe 32 PID 1812 wrote to memory of 2692 1812 userinit.exe 33 PID 1812 wrote to memory of 2692 1812 userinit.exe 33 PID 1812 wrote to memory of 2692 1812 userinit.exe 33 PID 1812 wrote to memory of 2692 1812 userinit.exe 33 PID 2692 wrote to memory of 2708 2692 spoolsw.exe 34 PID 2692 wrote to memory of 2708 2692 spoolsw.exe 34 PID 2692 wrote to memory of 2708 2692 spoolsw.exe 34 PID 2692 wrote to memory of 2708 2692 spoolsw.exe 34 PID 2708 wrote to memory of 2372 2708 swchost.exe 35 PID 2708 wrote to memory of 2372 2708 swchost.exe 35 PID 2708 wrote to memory of 2372 2708 swchost.exe 35 PID 2708 wrote to memory of 2372 2708 swchost.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\5080efb71ab520f789a41c45870be9c0N.exe"C:\Users\Admin\AppData\Local\Temp\5080efb71ab520f789a41c45870be9c0N.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2848 -
\??\c:\windows\userinit.exec:\windows\userinit.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1812 -
\??\c:\windows\spoolsw.exec:\windows\spoolsw.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2692 -
\??\c:\windows\swchost.exec:\windows\swchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2708 -
\??\c:\windows\spoolsw.exec:\windows\spoolsw.exe PR5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2372
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
211KB
MD51c7372aa5bc1dd1731a5d57573481af7
SHA18b5b2ccd88077658598c0933d1dc732a14d3a15f
SHA25693ffa13b0737fa3da346b3ef4428fc50d2144d956b32ed4edb5f7ea5cbc73856
SHA512607cf26202ad4ef9d45925ff2ce8039efd3f69ec1728e01211b3583f24b10bbdc1ca2890cad927a2a5b87a001fc48e64e88951722c03ee8ba54cbe46d4fdee2b
-
Filesize
211KB
MD518493a8800c9c994ac136a453e4ae937
SHA1c99916ae1bcce7c69bce0dabca0372f7a89ac6fd
SHA2568c0ff1de0b3c297efae74f723057865ecbbb57eec72c822bb17c702848296262
SHA5126c8fd0d4a0ba105f88d4b1495e82c1f684897c24e281c72e625885c78754d713c20b8e30ffd8a0a9e82b0848a702f2ee753686b9b396848fcc4d1fc7e085483f
-
Filesize
211KB
MD5235554a8f7c7ec24e3e12f12e22cf49a
SHA16e5a5da23aac2286308b1f281e6c6c73a54c2e39
SHA256a46f105f49a2a6e74227208dc8b1f588b6636737025f25d430a8abb4fc1acb24
SHA512ada9af6c3a69ed3cf9466b37fd0e186ec9ac9d951b09391c88340f376cd65434cd6c2885670e8515b646e779c0ccd9dc2801edbf2e6a939cb4ab7b6c7435e0a7
-
Filesize
211KB
MD51e14ce1cd3fdfda050d9a0350f966bdd
SHA115951b197155418b75fb10a3c5ebc134141ed9c6
SHA256af1699741639e07fd95fe891e25bd0de24780364570f33da5a5a5ff3742799a2
SHA512641fa4cb310366b152ba5339edfc551feae5869c9f9c645162e48242be595724421ac57232454d4707f6c9774469dc0aecc5fb421cc131742670bf5002dfc9fe