Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/09/2024, 03:03

General

  • Target

    a6a7d0449c2d8626b59d01dfa3899400N.exe

  • Size

    69KB

  • MD5

    a6a7d0449c2d8626b59d01dfa3899400

  • SHA1

    e0f336832ec01deb62acc97a8a85af511cf69f37

  • SHA256

    dc015037a687274736aa766539a17532971ac4e249c157460271c704f5adc364

  • SHA512

    207cac72eef61e234c3f2d3349f50f250e6454ca4830a37355e01d1dcddbbb343c3f05e71bdb4503bf6982366368473fa33979f60db86b46dda874b8cfa4f4a2

  • SSDEEP

    1536:EJrFDMRyriCY/qXfatMp4Q2V6fIMxIpL9:0F8dCY85TE6fIMSR9

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 8 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Executes dropped EXE 4 IoCs
  • UPX packed file 11 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a6a7d0449c2d8626b59d01dfa3899400N.exe
    "C:\Users\Admin\AppData\Local\Temp\a6a7d0449c2d8626b59d01dfa3899400N.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2636
    • \??\c:\windows\system\explorer.exe
      c:\windows\system\explorer.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visiblity of hidden/system files in Explorer
      • Boot or Logon Autostart Execution: Active Setup
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3044
      • \??\c:\windows\system\spoolsv.exe
        c:\windows\system\spoolsv.exe SE
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3300
        • \??\c:\windows\system\svchost.exe
          c:\windows\system\svchost.exe
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visiblity of hidden/system files in Explorer
          • Boot or Logon Autostart Execution: Active Setup
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:4496
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe PR
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            PID:1732
          • C:\Windows\SysWOW64\at.exe
            at 03:05 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
            5⤵
            • System Location Discovery: System Language Discovery
            PID:4396
          • C:\Windows\SysWOW64\at.exe
            at 03:06 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
            5⤵
            • System Location Discovery: System Language Discovery
            PID:2768
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4436,i,11251706013556949551,5157034131170452377,262144 --variations-seed-version --mojo-platform-channel-handle=4184 /prefetch:8
    1⤵
      PID:4500

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Roaming\mrsys.exe

            Filesize

            69KB

            MD5

            4fb8ce47569ef858462b653d61e302b5

            SHA1

            e321529d583224bab29cab8f54b4a82ba9cabf68

            SHA256

            3b876101e53e36c4f22e987da15bffa90e9fb9f4a55fb2e127c28de4de610643

            SHA512

            3368f8ec13289466f78595382ad380c3645821f946d3459eee4d1a42db37b5294000dee2d2ba25357e99993e9cbbe1c36086909124b656268ef43acd4d799eb0

          • C:\Windows\System\explorer.exe

            Filesize

            69KB

            MD5

            4b0587b42ccdbd3ff923eb3895990f24

            SHA1

            a74c8457023ec1567ba9a4f82b33d00f20610d2a

            SHA256

            e273534b69d6ec4454d8dffeca409153e7d6e29e218041048c7c29a887889e77

            SHA512

            51495689b6f16a21231c90700073594264962ca561544997cc80691434301b273ce292ec2a8bbcab8cda6e1cb505316959446115cd526c3d28491677b2baefe3

          • C:\Windows\System\spoolsv.exe

            Filesize

            70KB

            MD5

            bf6486cf75cd7d0e4e14387909fd52ce

            SHA1

            5c95a5ebc6e921cc6d6f496c1d9c1d4f57142c1f

            SHA256

            195b9caf5d35bde0e63520349129e0ea576f9d7e574184d7b8a2abe4623723eb

            SHA512

            e00b1571a92ecf133521872511a7661dc7d8adc49f3bd89619664caed2d96c79efd8545e3b263b018efd6831f661faab074bbdd1ab03c38e40c3723bb93c0d4e

          • \??\c:\windows\system\svchost.exe

            Filesize

            69KB

            MD5

            25d90e0ca04684cf4f463594e7c88044

            SHA1

            88a685690a0c648e57e38f9d99a5b907ec1a0a66

            SHA256

            804300d3d10db4c666df303ceb3a18787633cb8dbd3e8b03944eff8ff1da850b

            SHA512

            735d7bbf386b86c224dce53df36aaa7dcce2cf322be1dc8561cd7b5613f923ef72027a10dc2d307f974388ac11aa12324712f6feb4e4c7106d0d082ca665343e

          • memory/1732-33-0x0000000000400000-0x0000000000434000-memory.dmp

            Filesize

            208KB

          • memory/2636-0-0x0000000000400000-0x0000000000434000-memory.dmp

            Filesize

            208KB

          • memory/2636-38-0x0000000000400000-0x0000000000434000-memory.dmp

            Filesize

            208KB

          • memory/3044-40-0x0000000000400000-0x0000000000434000-memory.dmp

            Filesize

            208KB

          • memory/3044-52-0x0000000000400000-0x0000000000434000-memory.dmp

            Filesize

            208KB

          • memory/3300-37-0x0000000000400000-0x0000000000434000-memory.dmp

            Filesize

            208KB

          • memory/4496-41-0x0000000000400000-0x0000000000434000-memory.dmp

            Filesize

            208KB