Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    13/09/2024, 20:35

General

  • Target

    396d291c1bb63139881672d6c17312d902232cd4b3e1a4d1fe0be35a582ed006.exe

  • Size

    206KB

  • MD5

    0a4f5b0d9b6a7517772ee7814937a51c

  • SHA1

    bc67dad5b0f137abc94d7acbb3567bb5a3af4f73

  • SHA256

    396d291c1bb63139881672d6c17312d902232cd4b3e1a4d1fe0be35a582ed006

  • SHA512

    585b15c83d398b04b0160aeddbf9e76414f16dd85de726d6ac617e7a0a83ae53420ed7b1e1a5cd3bf8626d01e8505aa8594e788f42850a9a1f9c86a75965bb3d

  • SSDEEP

    3072:5vEfVUzSLhIVbV6i5LirrlZrHyrUHUckoMQ2RN6unu:5vEN2U+T6i5LirrllHy4HUcMQY6p

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 8 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 8 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\396d291c1bb63139881672d6c17312d902232cd4b3e1a4d1fe0be35a582ed006.exe
    "C:\Users\Admin\AppData\Local\Temp\396d291c1bb63139881672d6c17312d902232cd4b3e1a4d1fe0be35a582ed006.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2492
    • \??\c:\windows\system\explorer.exe
      c:\windows\system\explorer.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visiblity of hidden/system files in Explorer
      • Boot or Logon Autostart Execution: Active Setup
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2044
      • \??\c:\windows\system\spoolsv.exe
        c:\windows\system\spoolsv.exe SE
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2064
        • \??\c:\windows\system\svchost.exe
          c:\windows\system\svchost.exe
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visiblity of hidden/system files in Explorer
          • Boot or Logon Autostart Execution: Active Setup
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2828
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe PR
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            PID:2688
          • C:\Windows\SysWOW64\at.exe
            at 20:37 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
            5⤵
            • System Location Discovery: System Language Discovery
            PID:2728
          • C:\Windows\SysWOW64\at.exe
            at 20:38 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
            5⤵
            • System Location Discovery: System Language Discovery
            PID:1028
          • C:\Windows\SysWOW64\at.exe
            at 20:39 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
            5⤵
            • System Location Discovery: System Language Discovery
            PID:2900

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\mrsys.exe

    Filesize

    206KB

    MD5

    0f77a9bc23082f1ed0e8d6406651de51

    SHA1

    42b0095924e5bb3e6775b6c3c130992b15d8d129

    SHA256

    4e884aac627a8b7079b00e64261cc63bfaea2ec9c9904106d5255aca757188d3

    SHA512

    3660662a166561d869595853e77dfb36c0c43314361759934b4a3a598b4aa7f21d6bd6d488432b62f6b10b65eaa7844093b2b616fca16e2d614559430084ca6c

  • \Windows\system\explorer.exe

    Filesize

    206KB

    MD5

    a67d3b2a0d15546866e671e571e23ac2

    SHA1

    4298f172cacace343aeb24358d3f239a07e7a764

    SHA256

    820edd8f84ffb92dbd98d531f4a57ef628965ac90e57a4ef8c4e7f23ae27ba77

    SHA512

    a0a07cfc01ad7a5fb777a0344851000e226b25ebb1307c29efc610d4e539310a7ee58cb56627c1b14c10f4699312e78d3b0c851336dfa03962d048f350f58747

  • \Windows\system\spoolsv.exe

    Filesize

    206KB

    MD5

    d0311b1d3e07ea8e48deb97ec8d8fa8c

    SHA1

    c3f471378c8b077ffaa0954288d8731520fe1650

    SHA256

    af11783d36efbfdac6d49498dff12c9b1ac560d0d00af71328d1bb2714a5d03f

    SHA512

    60d981046f932f888d88539a38d5ba74909da281b37128507ced01a059cd1ad444ac8c33827ec7eafc71675f107131466b90a418c4d9fa6b448aa0ecf73bc180

  • \Windows\system\svchost.exe

    Filesize

    206KB

    MD5

    50635a9032d42dbd3968a6e35f80d700

    SHA1

    891a4a7ebb81852272cd44875b20a6c7d7363898

    SHA256

    052339ed2283ad0cd913a90c955ee9a43840a3b14b0e4caef2f27334037ec5aa

    SHA512

    540eef65ae0506980b205025ff678b0d7ed9eaddbd5dc12bb6f0ad4ba83c8027af4872502fe15389d848ce5a9de928891cdf99925610fa5dc24669c185d3513d

  • memory/2044-58-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2044-26-0x0000000002780000-0x00000000027C0000-memory.dmp

    Filesize

    256KB

  • memory/2064-55-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2492-56-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2492-0-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2492-12-0x0000000003250000-0x0000000003290000-memory.dmp

    Filesize

    256KB

  • memory/2688-52-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2828-47-0x00000000003C0000-0x0000000000400000-memory.dmp

    Filesize

    256KB

  • memory/2828-59-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2828-60-0x00000000003C0000-0x0000000000400000-memory.dmp

    Filesize

    256KB

  • memory/2828-61-0x00000000003C0000-0x0000000000400000-memory.dmp

    Filesize

    256KB