Analysis

  • max time kernel
    120s
  • max time network
    114s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-09-2024 21:26

General

  • Target

    8969491a3d38a0526faaaf04447a6cbbb893f194348f47ecbec7c38a524d6af3N.exe

  • Size

    260KB

  • MD5

    da2fedaf4c78a65dcbaa13d3d26d9ae0

  • SHA1

    a54a8aa2d68ea960e339521969a7904efb42f9dc

  • SHA256

    8969491a3d38a0526faaaf04447a6cbbb893f194348f47ecbec7c38a524d6af3

  • SHA512

    ba7765366686fd5e5747b316886599580282147751198ff864030b84ddc676cb9dd992e8571a98cb0d5f9de41eb02d86cce70c1bb8fc3a3bb858cff50bdc6e03

  • SSDEEP

    3072:AygCullUQN7gsBh1L1gygCullUQN7gsBh1L1/:ARleK771qRleK771R

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 8 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Windows directory 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8969491a3d38a0526faaaf04447a6cbbb893f194348f47ecbec7c38a524d6af3N.exe
    "C:\Users\Admin\AppData\Local\Temp\8969491a3d38a0526faaaf04447a6cbbb893f194348f47ecbec7c38a524d6af3N.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1952
    • \??\c:\windows\system\explorer.exe
      c:\windows\system\explorer.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visiblity of hidden/system files in Explorer
      • Boot or Logon Autostart Execution: Active Setup
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3400
      • \??\c:\windows\system\spoolsv.exe
        c:\windows\system\spoolsv.exe SE
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3752
        • \??\c:\windows\system\svchost.exe
          c:\windows\system\svchost.exe
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visiblity of hidden/system files in Explorer
          • Boot or Logon Autostart Execution: Active Setup
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:4376
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe PR
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            PID:2840

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\mrsys.exe

    Filesize

    260KB

    MD5

    21a4fdce1bdf99ac05a62f7636c6d06f

    SHA1

    3a03c667657fa5479f405f68393bf7d11cd6615a

    SHA256

    bc3b0757f109856e7969d19088c1c7b015d043694e9f97595c751c026c717c5f

    SHA512

    7524f03fa142bbe9c19dbbe57f47f9a788bc39d87e0c7e7307bee59ff21d8ee3c343263f6a1084377d47b4d6801b2e2ea960fcd8e6f9305a90a63594c91197a7

  • C:\Windows\System\explorer.exe

    Filesize

    260KB

    MD5

    92bb1d8cd5648c111b34a486a293bafb

    SHA1

    210f6424b1cbd2ec78f2796d77d8abdc7cccfdeb

    SHA256

    77562f50655d7f1806b3ba538e5e1b67afaaaeb8b1658883c38964f86f0d32d2

    SHA512

    130c358ecbb8960e360672002543305c77f13c89b9135a4f26f39ec1d352ab34fb8beae42b76bd482c86401500e078a7cfc3ecebb75fa62cf83f5ba4608b181c

  • C:\Windows\System\spoolsv.exe

    Filesize

    260KB

    MD5

    430b040e5287d32a30a53d236bfcce08

    SHA1

    2f98563c4fe79c57420e46a2177f1399bb957a9b

    SHA256

    8377be2c927d7a65c5d9ce169084808bcae76ea8cf04550a9f2809aebd10ff62

    SHA512

    f06642174d0615d71574a67b005ad0ca9105376ac8e10b4481acafd4139f3f5ce818c428b89cc61ef5db14ba7774b719bb61698d9eed6b53fe7ce7833fe48e52

  • C:\Windows\System\svchost.exe

    Filesize

    260KB

    MD5

    58839fe7ec2f0d462b483066836ab7f0

    SHA1

    cabae5f78c7189a34459d67d4c37ba84871997b6

    SHA256

    ce031a3b97b11a6944b8e5240d4a431b76a9477e22c6660d674e18344574455e

    SHA512

    659ac99201293c7ca001a6ad61f3f42c9c43b42bbb8b012ae109834df7c4fcfdfafded4da6d2d4f19afdd0a0de96afd3274406338dbf501735fe5503227a81c7