Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 03:15
Static task
static1
Behavioral task
behavioral1
Sample
ef7dccb6e33fb9d360bd9be4b0acd28d54d2988fd16a0ce42ab2b4aa844bdbc9.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ef7dccb6e33fb9d360bd9be4b0acd28d54d2988fd16a0ce42ab2b4aa844bdbc9.exe
Resource
win10v2004-20240802-en
General
-
Target
ef7dccb6e33fb9d360bd9be4b0acd28d54d2988fd16a0ce42ab2b4aa844bdbc9.exe
-
Size
122KB
-
MD5
8cff9c7979f43c7c1f97664ea1afd836
-
SHA1
5a366d4fde27504ae71d1a64527ffc016448b89c
-
SHA256
ef7dccb6e33fb9d360bd9be4b0acd28d54d2988fd16a0ce42ab2b4aa844bdbc9
-
SHA512
0e905236cabbb3830ceb909b44a3fdaf59a39e37cbb088b7dc92c7b2d59363660165c7d579cfbfdfa8b7c8d5d187569e69dc147e3f3d28f50387f96ccfff4948
-
SSDEEP
1536:niyzlrXCu2lsuAoeQZZ86ukpj0nGGF9v+4Dvo:iyZCu2lhA1QZZ4kp4F9Xzo
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 8 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 2408 explorer.exe 2920 spoolsv.exe 2808 svchost.exe 2748 spoolsv.exe -
Loads dropped DLL 8 IoCs
pid Process 1076 ef7dccb6e33fb9d360bd9be4b0acd28d54d2988fd16a0ce42ab2b4aa844bdbc9.exe 1076 ef7dccb6e33fb9d360bd9be4b0acd28d54d2988fd16a0ce42ab2b4aa844bdbc9.exe 2408 explorer.exe 2408 explorer.exe 2920 spoolsv.exe 2920 spoolsv.exe 2808 svchost.exe 2808 svchost.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification \??\c:\windows\system\explorer.exe ef7dccb6e33fb9d360bd9be4b0acd28d54d2988fd16a0ce42ab2b4aa844bdbc9.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe svchost.exe File opened for modification C:\Windows\System\tjud.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ef7dccb6e33fb9d360bd9be4b0acd28d54d2988fd16a0ce42ab2b4aa844bdbc9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1076 ef7dccb6e33fb9d360bd9be4b0acd28d54d2988fd16a0ce42ab2b4aa844bdbc9.exe 2408 explorer.exe 2408 explorer.exe 2408 explorer.exe 2808 svchost.exe 2808 svchost.exe 2408 explorer.exe 2808 svchost.exe 2408 explorer.exe 2808 svchost.exe 2408 explorer.exe 2808 svchost.exe 2408 explorer.exe 2808 svchost.exe 2408 explorer.exe 2808 svchost.exe 2408 explorer.exe 2808 svchost.exe 2408 explorer.exe 2808 svchost.exe 2408 explorer.exe 2808 svchost.exe 2408 explorer.exe 2808 svchost.exe 2408 explorer.exe 2808 svchost.exe 2408 explorer.exe 2808 svchost.exe 2408 explorer.exe 2808 svchost.exe 2408 explorer.exe 2808 svchost.exe 2408 explorer.exe 2808 svchost.exe 2408 explorer.exe 2808 svchost.exe 2408 explorer.exe 2808 svchost.exe 2408 explorer.exe 2808 svchost.exe 2408 explorer.exe 2808 svchost.exe 2408 explorer.exe 2808 svchost.exe 2408 explorer.exe 2808 svchost.exe 2408 explorer.exe 2808 svchost.exe 2408 explorer.exe 2808 svchost.exe 2408 explorer.exe 2808 svchost.exe 2408 explorer.exe 2808 svchost.exe 2408 explorer.exe 2808 svchost.exe 2408 explorer.exe 2808 svchost.exe 2408 explorer.exe 2808 svchost.exe 2408 explorer.exe 2808 svchost.exe 2408 explorer.exe 2808 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2408 explorer.exe 2808 svchost.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 1076 ef7dccb6e33fb9d360bd9be4b0acd28d54d2988fd16a0ce42ab2b4aa844bdbc9.exe 1076 ef7dccb6e33fb9d360bd9be4b0acd28d54d2988fd16a0ce42ab2b4aa844bdbc9.exe 2408 explorer.exe 2408 explorer.exe 2920 spoolsv.exe 2920 spoolsv.exe 2808 svchost.exe 2808 svchost.exe 2748 spoolsv.exe 2748 spoolsv.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1076 wrote to memory of 2408 1076 ef7dccb6e33fb9d360bd9be4b0acd28d54d2988fd16a0ce42ab2b4aa844bdbc9.exe 30 PID 1076 wrote to memory of 2408 1076 ef7dccb6e33fb9d360bd9be4b0acd28d54d2988fd16a0ce42ab2b4aa844bdbc9.exe 30 PID 1076 wrote to memory of 2408 1076 ef7dccb6e33fb9d360bd9be4b0acd28d54d2988fd16a0ce42ab2b4aa844bdbc9.exe 30 PID 1076 wrote to memory of 2408 1076 ef7dccb6e33fb9d360bd9be4b0acd28d54d2988fd16a0ce42ab2b4aa844bdbc9.exe 30 PID 2408 wrote to memory of 2920 2408 explorer.exe 31 PID 2408 wrote to memory of 2920 2408 explorer.exe 31 PID 2408 wrote to memory of 2920 2408 explorer.exe 31 PID 2408 wrote to memory of 2920 2408 explorer.exe 31 PID 2920 wrote to memory of 2808 2920 spoolsv.exe 32 PID 2920 wrote to memory of 2808 2920 spoolsv.exe 32 PID 2920 wrote to memory of 2808 2920 spoolsv.exe 32 PID 2920 wrote to memory of 2808 2920 spoolsv.exe 32 PID 2808 wrote to memory of 2748 2808 svchost.exe 33 PID 2808 wrote to memory of 2748 2808 svchost.exe 33 PID 2808 wrote to memory of 2748 2808 svchost.exe 33 PID 2808 wrote to memory of 2748 2808 svchost.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\ef7dccb6e33fb9d360bd9be4b0acd28d54d2988fd16a0ce42ab2b4aa844bdbc9.exe"C:\Users\Admin\AppData\Local\Temp\ef7dccb6e33fb9d360bd9be4b0acd28d54d2988fd16a0ce42ab2b4aa844bdbc9.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1076 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2408 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2920 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2808 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2748
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
122KB
MD5ad94929a61ad3a06dd9bf983a6daa90c
SHA127febbda4c44c45c157afd2ccfc16baf90990866
SHA2566851b2cdcfa1f95ecf09d8ea8a1d659798d81b4a6fdce3f3255d85ff0e374d51
SHA512d4510599be74bdcb305944bb218f61c7b3a734e2b6c522da315002919dc2c89165068ef26227bfe73cafbd4b0a2fa4f3bdd5917a80d19fc9a08a924e974d2af9
-
Filesize
122KB
MD5c4891164339f11ce66e13f2a787715e1
SHA110b337f3d089672d4aab8d4530a5d15bee9366a0
SHA25617ab2c049ae7cbd9f98ad7fb6df1dc7c589d51a2572213dcc007ba9bce2157d3
SHA5129545f2f1a2f233f99e7120ded2e961d5291451564ff31b0a10b386a2c222ac0fa5aea5f33f1e283909d52281a2cf00a10e4ea3092122f25ca92babe2e6ba4757
-
Filesize
122KB
MD5511a561d264e3405168e21f8bb412d26
SHA10bb7666b3db45db5f441ff14ad8b2cd887230ec4
SHA256cae78791cebc439d654ba3cdbb6e5896229ce215488c9e6ce809b701cf610196
SHA5122716eca14fe9e27f3d9a8920c16773f91cfb451fefe87d952a1e8e6d1238b9a95ed9005b30f65997484607436ac279f5100d4dda35e180dfdf713f744613af06
-
Filesize
122KB
MD57d7c517c929153582fdb72f93e3275e5
SHA18ad6f6214bef7ed82c29f46e8c8e2c98a453f8d0
SHA256b884a4649a51175adc19a7c356c1f6babe4b9f4e05fa17bb65c1c3ee4c8ed80f
SHA5128ad902a6c3cd9a4fe9483eba2fd2d6ec3e6916d67ed0786e05d5bc1e03118cc1912aed277ef3ad3696e476b7fe8ca32dc8c338b3a324ed25f5ec495ce9a90b8c