Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12/09/2024, 03:03
Behavioral task
behavioral1
Sample
a6a7d0449c2d8626b59d01dfa3899400N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a6a7d0449c2d8626b59d01dfa3899400N.exe
Resource
win10v2004-20240802-en
General
-
Target
a6a7d0449c2d8626b59d01dfa3899400N.exe
-
Size
69KB
-
MD5
a6a7d0449c2d8626b59d01dfa3899400
-
SHA1
e0f336832ec01deb62acc97a8a85af511cf69f37
-
SHA256
dc015037a687274736aa766539a17532971ac4e249c157460271c704f5adc364
-
SHA512
207cac72eef61e234c3f2d3349f50f250e6454ca4830a37355e01d1dcddbbb343c3f05e71bdb4503bf6982366368473fa33979f60db86b46dda874b8cfa4f4a2
-
SSDEEP
1536:EJrFDMRyriCY/qXfatMp4Q2V6fIMxIpL9:0F8dCY85TE6fIMSR9
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 8 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe -
Executes dropped EXE 4 IoCs
pid Process 3044 explorer.exe 3300 spoolsv.exe 4496 svchost.exe 1732 spoolsv.exe -
resource yara_rule behavioral2/memory/2636-0-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral2/files/0x000a000000023531-7.dat upx behavioral2/files/0x0009000000023557-13.dat upx behavioral2/files/0x0009000000023559-24.dat upx behavioral2/memory/1732-33-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral2/memory/3300-37-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral2/memory/2636-38-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral2/files/0x000b000000023558-39.dat upx behavioral2/memory/3044-40-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral2/memory/4496-41-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral2/memory/3044-52-0x0000000000400000-0x0000000000434000-memory.dmp upx -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification \??\c:\windows\system\explorer.exe a6a7d0449c2d8626b59d01dfa3899400N.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe svchost.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a6a7d0449c2d8626b59d01dfa3899400N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2636 a6a7d0449c2d8626b59d01dfa3899400N.exe 2636 a6a7d0449c2d8626b59d01dfa3899400N.exe 3044 explorer.exe 3044 explorer.exe 3044 explorer.exe 3044 explorer.exe 3044 explorer.exe 3044 explorer.exe 3044 explorer.exe 4496 svchost.exe 3044 explorer.exe 4496 svchost.exe 4496 svchost.exe 4496 svchost.exe 3044 explorer.exe 4496 svchost.exe 3044 explorer.exe 4496 svchost.exe 3044 explorer.exe 4496 svchost.exe 3044 explorer.exe 4496 svchost.exe 3044 explorer.exe 4496 svchost.exe 3044 explorer.exe 4496 svchost.exe 4496 svchost.exe 4496 svchost.exe 3044 explorer.exe 3044 explorer.exe 3044 explorer.exe 4496 svchost.exe 3044 explorer.exe 4496 svchost.exe 3044 explorer.exe 3044 explorer.exe 4496 svchost.exe 4496 svchost.exe 3044 explorer.exe 4496 svchost.exe 3044 explorer.exe 4496 svchost.exe 4496 svchost.exe 3044 explorer.exe 4496 svchost.exe 3044 explorer.exe 3044 explorer.exe 3044 explorer.exe 4496 svchost.exe 4496 svchost.exe 3044 explorer.exe 4496 svchost.exe 4496 svchost.exe 3044 explorer.exe 3044 explorer.exe 4496 svchost.exe 3044 explorer.exe 4496 svchost.exe 3044 explorer.exe 4496 svchost.exe 4496 svchost.exe 3044 explorer.exe 3044 explorer.exe 3044 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 3044 explorer.exe 4496 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2636 a6a7d0449c2d8626b59d01dfa3899400N.exe 2636 a6a7d0449c2d8626b59d01dfa3899400N.exe 3044 explorer.exe 3044 explorer.exe 3300 spoolsv.exe 3300 spoolsv.exe 4496 svchost.exe 4496 svchost.exe 1732 spoolsv.exe 1732 spoolsv.exe 3044 explorer.exe 3044 explorer.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2636 wrote to memory of 3044 2636 a6a7d0449c2d8626b59d01dfa3899400N.exe 91 PID 2636 wrote to memory of 3044 2636 a6a7d0449c2d8626b59d01dfa3899400N.exe 91 PID 2636 wrote to memory of 3044 2636 a6a7d0449c2d8626b59d01dfa3899400N.exe 91 PID 3044 wrote to memory of 3300 3044 explorer.exe 92 PID 3044 wrote to memory of 3300 3044 explorer.exe 92 PID 3044 wrote to memory of 3300 3044 explorer.exe 92 PID 3300 wrote to memory of 4496 3300 spoolsv.exe 94 PID 3300 wrote to memory of 4496 3300 spoolsv.exe 94 PID 3300 wrote to memory of 4496 3300 spoolsv.exe 94 PID 4496 wrote to memory of 1732 4496 svchost.exe 95 PID 4496 wrote to memory of 1732 4496 svchost.exe 95 PID 4496 wrote to memory of 1732 4496 svchost.exe 95 PID 4496 wrote to memory of 4396 4496 svchost.exe 96 PID 4496 wrote to memory of 4396 4496 svchost.exe 96 PID 4496 wrote to memory of 4396 4496 svchost.exe 96 PID 4496 wrote to memory of 2768 4496 svchost.exe 109 PID 4496 wrote to memory of 2768 4496 svchost.exe 109 PID 4496 wrote to memory of 2768 4496 svchost.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\a6a7d0449c2d8626b59d01dfa3899400N.exe"C:\Users\Admin\AppData\Local\Temp\a6a7d0449c2d8626b59d01dfa3899400N.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2636 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3044 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3300 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4496 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1732
-
-
C:\Windows\SysWOW64\at.exeat 03:05 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:4396
-
-
C:\Windows\SysWOW64\at.exeat 03:06 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:2768
-
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4436,i,11251706013556949551,5157034131170452377,262144 --variations-seed-version --mojo-platform-channel-handle=4184 /prefetch:81⤵PID:4500
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
69KB
MD54fb8ce47569ef858462b653d61e302b5
SHA1e321529d583224bab29cab8f54b4a82ba9cabf68
SHA2563b876101e53e36c4f22e987da15bffa90e9fb9f4a55fb2e127c28de4de610643
SHA5123368f8ec13289466f78595382ad380c3645821f946d3459eee4d1a42db37b5294000dee2d2ba25357e99993e9cbbe1c36086909124b656268ef43acd4d799eb0
-
Filesize
69KB
MD54b0587b42ccdbd3ff923eb3895990f24
SHA1a74c8457023ec1567ba9a4f82b33d00f20610d2a
SHA256e273534b69d6ec4454d8dffeca409153e7d6e29e218041048c7c29a887889e77
SHA51251495689b6f16a21231c90700073594264962ca561544997cc80691434301b273ce292ec2a8bbcab8cda6e1cb505316959446115cd526c3d28491677b2baefe3
-
Filesize
70KB
MD5bf6486cf75cd7d0e4e14387909fd52ce
SHA15c95a5ebc6e921cc6d6f496c1d9c1d4f57142c1f
SHA256195b9caf5d35bde0e63520349129e0ea576f9d7e574184d7b8a2abe4623723eb
SHA512e00b1571a92ecf133521872511a7661dc7d8adc49f3bd89619664caed2d96c79efd8545e3b263b018efd6831f661faab074bbdd1ab03c38e40c3723bb93c0d4e
-
Filesize
69KB
MD525d90e0ca04684cf4f463594e7c88044
SHA188a685690a0c648e57e38f9d99a5b907ec1a0a66
SHA256804300d3d10db4c666df303ceb3a18787633cb8dbd3e8b03944eff8ff1da850b
SHA512735d7bbf386b86c224dce53df36aaa7dcce2cf322be1dc8561cd7b5613f923ef72027a10dc2d307f974388ac11aa12324712f6feb4e4c7106d0d082ca665343e