Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07/09/2024, 15:49
Static task
static1
Behavioral task
behavioral1
Sample
5080efb71ab520f789a41c45870be9c0N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5080efb71ab520f789a41c45870be9c0N.exe
Resource
win10v2004-20240802-en
General
-
Target
5080efb71ab520f789a41c45870be9c0N.exe
-
Size
211KB
-
MD5
5080efb71ab520f789a41c45870be9c0
-
SHA1
776bbe2d86f6269719b1158c673734021fc86e68
-
SHA256
1c00cf1fb536c2b3a76fac398817484607311f827e2254349e04b694de66ff55
-
SHA512
a16b9d76eb5ab3f86e86be5c489a1077e9107e87de0d1091ddcc231a19029c88b2d4bd7d5128176410f5ec61374ee1aae6612c6e7a8ab888d0aa65234eaa89d2
-
SSDEEP
3072:JD6Xtx68yygRBE52mxkEOHLRMpZ4deth8PEAjAfIbAYGPhz6sPJBInxZqOb:Jh8cBzHLRMpZ4d1Zb
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\userinit.exe" userinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\userinit.exe" swchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" userinit.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" swchost.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 8 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} userinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Local\\mrsys.exe MR" userinit.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} swchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Local\\mrsys.exe MR" swchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} swchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} swchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Local\\mrsys.exe MR" swchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} swchost.exe -
Executes dropped EXE 4 IoCs
pid Process 3348 userinit.exe 5076 spoolsw.exe 3408 swchost.exe 4384 spoolsw.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\userinit = "c:\\windows\\userinit.exe RO" userinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Swchost = "c:\\windows\\swchost.exe RO" userinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\userinit = "c:\\windows\\userinit.exe RO" swchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Swchost = "c:\\windows\\swchost.exe RO" swchost.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\system\udsys.exe userinit.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification \??\c:\windows\swchost.exe swchost.exe File opened for modification \??\c:\windows\userinit.exe 5080efb71ab520f789a41c45870be9c0N.exe File opened for modification \??\c:\windows\spoolsw.exe userinit.exe File opened for modification \??\c:\windows\swchost.exe spoolsw.exe File opened for modification \??\c:\windows\userinit.exe userinit.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5080efb71ab520f789a41c45870be9c0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language userinit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language swchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsw.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4844 5080efb71ab520f789a41c45870be9c0N.exe 4844 5080efb71ab520f789a41c45870be9c0N.exe 3348 userinit.exe 3348 userinit.exe 3348 userinit.exe 3348 userinit.exe 3348 userinit.exe 3348 userinit.exe 3408 swchost.exe 3408 swchost.exe 3408 swchost.exe 3408 swchost.exe 3348 userinit.exe 3348 userinit.exe 3408 swchost.exe 3408 swchost.exe 3348 userinit.exe 3348 userinit.exe 3408 swchost.exe 3408 swchost.exe 3348 userinit.exe 3348 userinit.exe 3408 swchost.exe 3408 swchost.exe 3348 userinit.exe 3348 userinit.exe 3408 swchost.exe 3408 swchost.exe 3348 userinit.exe 3348 userinit.exe 3408 swchost.exe 3408 swchost.exe 3348 userinit.exe 3348 userinit.exe 3408 swchost.exe 3408 swchost.exe 3348 userinit.exe 3348 userinit.exe 3408 swchost.exe 3408 swchost.exe 3348 userinit.exe 3348 userinit.exe 3408 swchost.exe 3408 swchost.exe 3348 userinit.exe 3348 userinit.exe 3408 swchost.exe 3408 swchost.exe 3348 userinit.exe 3348 userinit.exe 3408 swchost.exe 3408 swchost.exe 3348 userinit.exe 3348 userinit.exe 3408 swchost.exe 3408 swchost.exe 3348 userinit.exe 3348 userinit.exe 3408 swchost.exe 3408 swchost.exe 3348 userinit.exe 3348 userinit.exe 3408 swchost.exe 3408 swchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 3348 userinit.exe 3408 swchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 4844 5080efb71ab520f789a41c45870be9c0N.exe 4844 5080efb71ab520f789a41c45870be9c0N.exe 3348 userinit.exe 3348 userinit.exe 5076 spoolsw.exe 5076 spoolsw.exe 3408 swchost.exe 3408 swchost.exe 4384 spoolsw.exe 4384 spoolsw.exe 3348 userinit.exe 3348 userinit.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4844 wrote to memory of 3348 4844 5080efb71ab520f789a41c45870be9c0N.exe 93 PID 4844 wrote to memory of 3348 4844 5080efb71ab520f789a41c45870be9c0N.exe 93 PID 4844 wrote to memory of 3348 4844 5080efb71ab520f789a41c45870be9c0N.exe 93 PID 3348 wrote to memory of 5076 3348 userinit.exe 94 PID 3348 wrote to memory of 5076 3348 userinit.exe 94 PID 3348 wrote to memory of 5076 3348 userinit.exe 94 PID 5076 wrote to memory of 3408 5076 spoolsw.exe 95 PID 5076 wrote to memory of 3408 5076 spoolsw.exe 95 PID 5076 wrote to memory of 3408 5076 spoolsw.exe 95 PID 3408 wrote to memory of 4384 3408 swchost.exe 97 PID 3408 wrote to memory of 4384 3408 swchost.exe 97 PID 3408 wrote to memory of 4384 3408 swchost.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\5080efb71ab520f789a41c45870be9c0N.exe"C:\Users\Admin\AppData\Local\Temp\5080efb71ab520f789a41c45870be9c0N.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4844 -
\??\c:\windows\userinit.exec:\windows\userinit.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3348 -
\??\c:\windows\spoolsw.exec:\windows\spoolsw.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5076 -
\??\c:\windows\swchost.exec:\windows\swchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3408 -
\??\c:\windows\spoolsw.exec:\windows\spoolsw.exe PR5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4384
-
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4048,i,10597648459838880772,16562651767759956329,262144 --variations-seed-version --mojo-platform-channel-handle=4460 /prefetch:81⤵PID:1868
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
211KB
MD5f81c15969c77cc4162cc4f95d10e316a
SHA1c735a5eef6def7cc9dbb849f7fc4060383519119
SHA2563a203f1e29e4f2c3e6a1e93db3771ea5d9caa54f2212c0b6c8d9c147bd4e22f1
SHA51202001519fd6972a2ef33e48c65a54e43ef624afc043b125d01a64e71a7062f4bfe1e06d123a7b930042665214f5f66849bd4767d3db47bcd6349270ad87323c4
-
Filesize
211KB
MD5f7ad7c4d61b5bfb71811f349b0fdc786
SHA16b88b1094f735de965db7937c24ca8aef6edeca4
SHA256b53ec783280ced37b74b13a7fca54527c1f92f0914f81c6bf48ef44a306b34ec
SHA512246471036c39db7f52e08bef737b4ae147a42d0106a44b225f14da7afd64d2a395d9f291b7661183e45cad8cd46e2e19cc2765f4151ea3e8a39be5bd7bd4b010
-
Filesize
211KB
MD5285e2619d1268193dbd438b3b05b3361
SHA19af9226e1933a795923254e60382aba2d0925b26
SHA256bb50bc8916788d0f304a3e76ceccfbe33c46515416ce4af536d39e6419ec1389
SHA512a6d1cd845ff8f2bbcd69953948227d388e38348990b3d4db91efc774dde8756350a7eb53372b5f30936fa877a384be1b2e98dd5d4b7e480df22283819052e9bc
-
Filesize
211KB
MD5eb8d72813b01bc7e50043f1859f86d38
SHA1d0f67fbc79a956f2c4c152c9c48dcf738e25310e
SHA256470a14ea18183e4632cb7497d5cd85a7aa813f4e0f5427af883835ad49e6d03e
SHA51246ce9c47ec439158dc0d2f1378d933a085cd4f3ba162376cd5094a1a1150b897a6f363d6bfdcbc944193da0a4a7a2c9a2317d80d2536ab9b96ad387405ba888b