Analysis
-
max time kernel
120s -
max time network
108s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14/09/2024, 18:19
Static task
static1
Behavioral task
behavioral1
Sample
160b07adf0a2c766a027810931d8ef60N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
160b07adf0a2c766a027810931d8ef60N.exe
Resource
win10v2004-20240802-en
General
-
Target
160b07adf0a2c766a027810931d8ef60N.exe
-
Size
206KB
-
MD5
160b07adf0a2c766a027810931d8ef60
-
SHA1
6d02d6e65c4d48a08529774c7918cd80522bab89
-
SHA256
33ddfe1862ea38aeffa1a9e478186de4f235c31453f72e8deeb338cde8480472
-
SHA512
235d4f9a825a1f1aa9940e29e59f0028781ada40b2ab82f77bbfcbfe73a7877f07971f39d9f2a149521da1187495079a1f92b8d0a0e2a4a92ce19548d11b8c09
-
SSDEEP
3072:zvEfVUzSLhIVbV6i5LirrlZrHyrUHUckoMQ2RN6unJ:zvEN2U+T6i5LirrllHy4HUcMQY6G
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 8 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe -
Executes dropped EXE 4 IoCs
pid Process 2216 explorer.exe 3664 spoolsv.exe 2272 svchost.exe 632 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification \??\c:\windows\system\explorer.exe 160b07adf0a2c766a027810931d8ef60N.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe svchost.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 160b07adf0a2c766a027810931d8ef60N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 656 160b07adf0a2c766a027810931d8ef60N.exe 656 160b07adf0a2c766a027810931d8ef60N.exe 2216 explorer.exe 2216 explorer.exe 2216 explorer.exe 2216 explorer.exe 2216 explorer.exe 2216 explorer.exe 2272 svchost.exe 2272 svchost.exe 2272 svchost.exe 2272 svchost.exe 2216 explorer.exe 2216 explorer.exe 2272 svchost.exe 2272 svchost.exe 2216 explorer.exe 2216 explorer.exe 2272 svchost.exe 2272 svchost.exe 2216 explorer.exe 2216 explorer.exe 2272 svchost.exe 2272 svchost.exe 2216 explorer.exe 2216 explorer.exe 2272 svchost.exe 2272 svchost.exe 2216 explorer.exe 2216 explorer.exe 2272 svchost.exe 2272 svchost.exe 2216 explorer.exe 2216 explorer.exe 2272 svchost.exe 2272 svchost.exe 2216 explorer.exe 2216 explorer.exe 2272 svchost.exe 2272 svchost.exe 2216 explorer.exe 2216 explorer.exe 2272 svchost.exe 2272 svchost.exe 2216 explorer.exe 2216 explorer.exe 2272 svchost.exe 2272 svchost.exe 2216 explorer.exe 2216 explorer.exe 2272 svchost.exe 2272 svchost.exe 2216 explorer.exe 2216 explorer.exe 2272 svchost.exe 2272 svchost.exe 2216 explorer.exe 2216 explorer.exe 2272 svchost.exe 2272 svchost.exe 2216 explorer.exe 2216 explorer.exe 2272 svchost.exe 2272 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2216 explorer.exe 2272 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 656 160b07adf0a2c766a027810931d8ef60N.exe 656 160b07adf0a2c766a027810931d8ef60N.exe 2216 explorer.exe 2216 explorer.exe 3664 spoolsv.exe 3664 spoolsv.exe 2272 svchost.exe 2272 svchost.exe 632 spoolsv.exe 632 spoolsv.exe 2216 explorer.exe 2216 explorer.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 656 wrote to memory of 2216 656 160b07adf0a2c766a027810931d8ef60N.exe 84 PID 656 wrote to memory of 2216 656 160b07adf0a2c766a027810931d8ef60N.exe 84 PID 656 wrote to memory of 2216 656 160b07adf0a2c766a027810931d8ef60N.exe 84 PID 2216 wrote to memory of 3664 2216 explorer.exe 86 PID 2216 wrote to memory of 3664 2216 explorer.exe 86 PID 2216 wrote to memory of 3664 2216 explorer.exe 86 PID 3664 wrote to memory of 2272 3664 spoolsv.exe 87 PID 3664 wrote to memory of 2272 3664 spoolsv.exe 87 PID 3664 wrote to memory of 2272 3664 spoolsv.exe 87 PID 2272 wrote to memory of 632 2272 svchost.exe 89 PID 2272 wrote to memory of 632 2272 svchost.exe 89 PID 2272 wrote to memory of 632 2272 svchost.exe 89 PID 2272 wrote to memory of 4732 2272 svchost.exe 90 PID 2272 wrote to memory of 4732 2272 svchost.exe 90 PID 2272 wrote to memory of 4732 2272 svchost.exe 90 PID 2272 wrote to memory of 4384 2272 svchost.exe 102 PID 2272 wrote to memory of 4384 2272 svchost.exe 102 PID 2272 wrote to memory of 4384 2272 svchost.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\160b07adf0a2c766a027810931d8ef60N.exe"C:\Users\Admin\AppData\Local\Temp\160b07adf0a2c766a027810931d8ef60N.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:656 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2216 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3664 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2272 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:632
-
-
C:\Windows\SysWOW64\at.exeat 18:21 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:4732
-
-
C:\Windows\SysWOW64\at.exeat 18:22 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:4384
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
206KB
MD59be1fbb6deb97f5d66a05b2c9eb40615
SHA177e179728ce3c5bb4566251c809b3e3207814619
SHA2564a5136c2189dc70d161042e75195a8bffcff5d9e4024859e94759f5ceba28f6a
SHA512b99dfaa8d24097c60959ac110719868130398841da08f6c4bbaaf880ec6bb016dad48a0c1796838f305a5e039f963cc6753ee3ff8cb33df0977b2767b0a689e2
-
Filesize
206KB
MD5d6a91868cb9cfd4a5672f54a7849d506
SHA10c546039f2590a026ff3b65598084d4c722b3056
SHA256a18c8a32da7fe0f9d6b990c3359f9d02b98e45665aceebacd5421ff9938e101b
SHA51210b9592d1fb8126b49dbd76a9c487268e38f3419ee525de2f5a2286283f9a2bd9502bcd8144b2c9d2a370eee5278b10f9e9c65197a49a651589003cd490c4689
-
Filesize
206KB
MD52e6402a3e5e90208e437d41d10f03442
SHA16e64a6c522d4f78fd67ec6decde662e5c282f76f
SHA25608096fa70870837199096c837390eac10c8aa657e80c8b2a38522a726ea0ae1f
SHA512113f4f3ceba81be3d820ebe32c37fa9b29303b36de60d53327cdf3c762e4b60634b7667f963c06f51d5179ab39a9483cd235c818683b0f890917d83d084455f5
-
Filesize
206KB
MD5bcc2fbac10245f0c63b10462fa5a1ddf
SHA1c63c055753bca543792afef3e7111c72eb01caec
SHA256c8ce6d52aa0e14fcfdfe00b058c2cea88e807dbcc3d353250249fd7e158678a6
SHA512f6db7752ed839f8827b3be807521627696b80f2ce81350fc543614ef953272c7629d2d9238dc9334d320e5d7b52ec071ff8af2e80deaa4a84847c1740614c7bb