Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/09/2024, 15:49

General

  • Target

    5080efb71ab520f789a41c45870be9c0N.exe

  • Size

    211KB

  • MD5

    5080efb71ab520f789a41c45870be9c0

  • SHA1

    776bbe2d86f6269719b1158c673734021fc86e68

  • SHA256

    1c00cf1fb536c2b3a76fac398817484607311f827e2254349e04b694de66ff55

  • SHA512

    a16b9d76eb5ab3f86e86be5c489a1077e9107e87de0d1091ddcc231a19029c88b2d4bd7d5128176410f5ec61374ee1aae6612c6e7a8ab888d0aa65234eaa89d2

  • SSDEEP

    3072:JD6Xtx68yygRBE52mxkEOHLRMpZ4deth8PEAjAfIbAYGPhz6sPJBInxZqOb:Jh8cBzHLRMpZ4d1Zb

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 8 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5080efb71ab520f789a41c45870be9c0N.exe
    "C:\Users\Admin\AppData\Local\Temp\5080efb71ab520f789a41c45870be9c0N.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4844
    • \??\c:\windows\userinit.exe
      c:\windows\userinit.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visiblity of hidden/system files in Explorer
      • Boot or Logon Autostart Execution: Active Setup
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3348
      • \??\c:\windows\spoolsw.exe
        c:\windows\spoolsw.exe SE
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:5076
        • \??\c:\windows\swchost.exe
          c:\windows\swchost.exe
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visiblity of hidden/system files in Explorer
          • Boot or Logon Autostart Execution: Active Setup
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:3408
          • \??\c:\windows\spoolsw.exe
            c:\windows\spoolsw.exe PR
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            PID:4384
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4048,i,10597648459838880772,16562651767759956329,262144 --variations-seed-version --mojo-platform-channel-handle=4460 /prefetch:8
    1⤵
      PID:1868

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\mrsys.exe

            Filesize

            211KB

            MD5

            f81c15969c77cc4162cc4f95d10e316a

            SHA1

            c735a5eef6def7cc9dbb849f7fc4060383519119

            SHA256

            3a203f1e29e4f2c3e6a1e93db3771ea5d9caa54f2212c0b6c8d9c147bd4e22f1

            SHA512

            02001519fd6972a2ef33e48c65a54e43ef624afc043b125d01a64e71a7062f4bfe1e06d123a7b930042665214f5f66849bd4767d3db47bcd6349270ad87323c4

          • C:\Windows\spoolsw.exe

            Filesize

            211KB

            MD5

            f7ad7c4d61b5bfb71811f349b0fdc786

            SHA1

            6b88b1094f735de965db7937c24ca8aef6edeca4

            SHA256

            b53ec783280ced37b74b13a7fca54527c1f92f0914f81c6bf48ef44a306b34ec

            SHA512

            246471036c39db7f52e08bef737b4ae147a42d0106a44b225f14da7afd64d2a395d9f291b7661183e45cad8cd46e2e19cc2765f4151ea3e8a39be5bd7bd4b010

          • C:\Windows\swchost.exe

            Filesize

            211KB

            MD5

            285e2619d1268193dbd438b3b05b3361

            SHA1

            9af9226e1933a795923254e60382aba2d0925b26

            SHA256

            bb50bc8916788d0f304a3e76ceccfbe33c46515416ce4af536d39e6419ec1389

            SHA512

            a6d1cd845ff8f2bbcd69953948227d388e38348990b3d4db91efc774dde8756350a7eb53372b5f30936fa877a384be1b2e98dd5d4b7e480df22283819052e9bc

          • C:\Windows\userinit.exe

            Filesize

            211KB

            MD5

            eb8d72813b01bc7e50043f1859f86d38

            SHA1

            d0f67fbc79a956f2c4c152c9c48dcf738e25310e

            SHA256

            470a14ea18183e4632cb7497d5cd85a7aa813f4e0f5427af883835ad49e6d03e

            SHA512

            46ce9c47ec439158dc0d2f1378d933a085cd4f3ba162376cd5094a1a1150b897a6f363d6bfdcbc944193da0a4a7a2c9a2317d80d2536ab9b96ad387405ba888b