Analysis
-
max time kernel
120s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12/09/2024, 08:04
Static task
static1
Behavioral task
behavioral1
Sample
e351668d68d45749607c1a6cfb1de480N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e351668d68d45749607c1a6cfb1de480N.exe
Resource
win10v2004-20240802-en
General
-
Target
e351668d68d45749607c1a6cfb1de480N.exe
-
Size
67KB
-
MD5
e351668d68d45749607c1a6cfb1de480
-
SHA1
5c5419d549d690406ea5a8f3791d0927db999584
-
SHA256
1fbd5101492ab9a490ccf0f925c0e672858a6ff31aeba78c217481366ef62a2a
-
SHA512
4be86887e25f9f7811c819f1b61f61109fd9c3cffc453b0eb4cb04514bab4aa834103a8bcc28ae5c79d28fbaeec46419302fb116f99aee5ca1d64360be4dcae6
-
SSDEEP
1536:EgXsfgWQN1kYsRxWTg3PwSWe991Rdolpdz6JAkAT:1tWYfGATvPe9slp+ApT
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 8 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 3012 explorer.exe 3228 spoolsv.exe 4304 svchost.exe 3252 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification \??\c:\windows\system\explorer.exe e351668d68d45749607c1a6cfb1de480N.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe svchost.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e351668d68d45749607c1a6cfb1de480N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4248 e351668d68d45749607c1a6cfb1de480N.exe 4248 e351668d68d45749607c1a6cfb1de480N.exe 3012 explorer.exe 3012 explorer.exe 3012 explorer.exe 3012 explorer.exe 3012 explorer.exe 3012 explorer.exe 4304 svchost.exe 4304 svchost.exe 4304 svchost.exe 4304 svchost.exe 3012 explorer.exe 3012 explorer.exe 4304 svchost.exe 4304 svchost.exe 3012 explorer.exe 3012 explorer.exe 4304 svchost.exe 4304 svchost.exe 3012 explorer.exe 3012 explorer.exe 4304 svchost.exe 4304 svchost.exe 3012 explorer.exe 3012 explorer.exe 4304 svchost.exe 4304 svchost.exe 3012 explorer.exe 3012 explorer.exe 4304 svchost.exe 4304 svchost.exe 3012 explorer.exe 3012 explorer.exe 4304 svchost.exe 4304 svchost.exe 3012 explorer.exe 3012 explorer.exe 4304 svchost.exe 4304 svchost.exe 3012 explorer.exe 3012 explorer.exe 4304 svchost.exe 4304 svchost.exe 3012 explorer.exe 3012 explorer.exe 4304 svchost.exe 4304 svchost.exe 3012 explorer.exe 3012 explorer.exe 4304 svchost.exe 4304 svchost.exe 3012 explorer.exe 3012 explorer.exe 4304 svchost.exe 4304 svchost.exe 3012 explorer.exe 3012 explorer.exe 4304 svchost.exe 4304 svchost.exe 3012 explorer.exe 3012 explorer.exe 4304 svchost.exe 4304 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 3012 explorer.exe 4304 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 4248 e351668d68d45749607c1a6cfb1de480N.exe 4248 e351668d68d45749607c1a6cfb1de480N.exe 3012 explorer.exe 3012 explorer.exe 3228 spoolsv.exe 3228 spoolsv.exe 4304 svchost.exe 4304 svchost.exe 3252 spoolsv.exe 3252 spoolsv.exe 3012 explorer.exe 3012 explorer.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 4248 wrote to memory of 3012 4248 e351668d68d45749607c1a6cfb1de480N.exe 84 PID 4248 wrote to memory of 3012 4248 e351668d68d45749607c1a6cfb1de480N.exe 84 PID 4248 wrote to memory of 3012 4248 e351668d68d45749607c1a6cfb1de480N.exe 84 PID 3012 wrote to memory of 3228 3012 explorer.exe 85 PID 3012 wrote to memory of 3228 3012 explorer.exe 85 PID 3012 wrote to memory of 3228 3012 explorer.exe 85 PID 3228 wrote to memory of 4304 3228 spoolsv.exe 87 PID 3228 wrote to memory of 4304 3228 spoolsv.exe 87 PID 3228 wrote to memory of 4304 3228 spoolsv.exe 87 PID 4304 wrote to memory of 3252 4304 svchost.exe 88 PID 4304 wrote to memory of 3252 4304 svchost.exe 88 PID 4304 wrote to memory of 3252 4304 svchost.exe 88 PID 4304 wrote to memory of 4188 4304 svchost.exe 90 PID 4304 wrote to memory of 4188 4304 svchost.exe 90 PID 4304 wrote to memory of 4188 4304 svchost.exe 90 PID 4304 wrote to memory of 1824 4304 svchost.exe 101 PID 4304 wrote to memory of 1824 4304 svchost.exe 101 PID 4304 wrote to memory of 1824 4304 svchost.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\e351668d68d45749607c1a6cfb1de480N.exe"C:\Users\Admin\AppData\Local\Temp\e351668d68d45749607c1a6cfb1de480N.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4248 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3012 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3228 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4304 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3252
-
-
C:\Windows\SysWOW64\at.exeat 08:06 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:4188
-
-
C:\Windows\SysWOW64\at.exeat 08:07 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:1824
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5fde1ad13b5456caf55f257fc7dc7ab14
SHA1cfbea86cad0a5b2074e8b9d19b985c5913f1d8cd
SHA2564baac2ea7112da61162acd13f5d0de84b4771ec3ea024e1994f0cf573027b3b8
SHA512699e5a112f6f36016e461b7289b0ed8471e6ddc920a7f3a6607313f89e94fd8486aafea390141d589aa89d60cab5ecb0041a58ca17facfc55a83f01446274043
-
Filesize
67KB
MD5fef9704d0cc4d1fb4a17773052ccce2e
SHA1f2d47b60a2ab538badcba38948c5cf9eb9c0efc6
SHA256740b6d9c9366e33dd4f91e488b901020338eaa8c5679226d3db584b78b538437
SHA512c282440f3bdc02847311f58695be63bdcd91c53fc020ef6acb36c479861ac537e34ea6791a18056d611d454c20b5383d352c85f6c5dc10f6d8615b2ec700462f
-
Filesize
67KB
MD585c95c7a7b3cd46591e72a9a03ebb4f0
SHA19e7020c676a3b440ef68e25a51ece37531ad63ca
SHA25671dafe11a89bc238f03b5b63343001f9a20b3e9cb7d04ec266af108c49011d88
SHA512a7b1b58a57ecebee8533d56b6eb1c4aa36131b3848142ab3310d90517233ad7cc78a8a685dbb2035b64b59b6d1a62939c6dd15e0767c5902efa6bf1b47859d2e
-
Filesize
67KB
MD54e02dfa3ad24ec1fc391751c66416174
SHA12aecaadc8b12145a1e63e4ad34e8590e653d532a
SHA25632f3c56e0a6d5affb2f90fcd933f5f94a2e84d12bd04540a0f2ab6f8e293f73b
SHA5125860b44a03f16f9d753aa1d60558efcf0f2843830dbf5e7c31a447b272e30cea3ffaf36676ac4a4148c31e335e2016abdebd0521b449a544bbef3dd2a8197f48