Analysis
-
max time kernel
120s -
max time network
114s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20-09-2024 21:26
Static task
static1
Behavioral task
behavioral1
Sample
8969491a3d38a0526faaaf04447a6cbbb893f194348f47ecbec7c38a524d6af3N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8969491a3d38a0526faaaf04447a6cbbb893f194348f47ecbec7c38a524d6af3N.exe
Resource
win10v2004-20240802-en
General
-
Target
8969491a3d38a0526faaaf04447a6cbbb893f194348f47ecbec7c38a524d6af3N.exe
-
Size
260KB
-
MD5
da2fedaf4c78a65dcbaa13d3d26d9ae0
-
SHA1
a54a8aa2d68ea960e339521969a7904efb42f9dc
-
SHA256
8969491a3d38a0526faaaf04447a6cbbb893f194348f47ecbec7c38a524d6af3
-
SHA512
ba7765366686fd5e5747b316886599580282147751198ff864030b84ddc676cb9dd992e8571a98cb0d5f9de41eb02d86cce70c1bb8fc3a3bb858cff50bdc6e03
-
SSDEEP
3072:AygCullUQN7gsBh1L1gygCullUQN7gsBh1L1/:ARleK771qRleK771R
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 8 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 3400 explorer.exe 3752 spoolsv.exe 4376 svchost.exe 2840 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe -
Drops file in Windows directory 7 IoCs
description ioc Process File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe svchost.exe File opened for modification C:\Windows\System\tjud.exe explorer.exe File opened for modification C:\Windows\System\tjcm.cmn explorer.exe File opened for modification \??\c:\windows\system\explorer.exe 8969491a3d38a0526faaaf04447a6cbbb893f194348f47ecbec7c38a524d6af3N.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8969491a3d38a0526faaaf04447a6cbbb893f194348f47ecbec7c38a524d6af3N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1952 8969491a3d38a0526faaaf04447a6cbbb893f194348f47ecbec7c38a524d6af3N.exe 1952 8969491a3d38a0526faaaf04447a6cbbb893f194348f47ecbec7c38a524d6af3N.exe 3400 explorer.exe 3400 explorer.exe 3400 explorer.exe 3400 explorer.exe 3400 explorer.exe 3400 explorer.exe 4376 svchost.exe 4376 svchost.exe 4376 svchost.exe 4376 svchost.exe 3400 explorer.exe 3400 explorer.exe 4376 svchost.exe 4376 svchost.exe 3400 explorer.exe 3400 explorer.exe 4376 svchost.exe 4376 svchost.exe 3400 explorer.exe 3400 explorer.exe 4376 svchost.exe 4376 svchost.exe 3400 explorer.exe 3400 explorer.exe 4376 svchost.exe 4376 svchost.exe 3400 explorer.exe 3400 explorer.exe 4376 svchost.exe 4376 svchost.exe 3400 explorer.exe 3400 explorer.exe 4376 svchost.exe 4376 svchost.exe 3400 explorer.exe 3400 explorer.exe 4376 svchost.exe 4376 svchost.exe 3400 explorer.exe 3400 explorer.exe 4376 svchost.exe 4376 svchost.exe 3400 explorer.exe 3400 explorer.exe 4376 svchost.exe 4376 svchost.exe 3400 explorer.exe 3400 explorer.exe 4376 svchost.exe 4376 svchost.exe 3400 explorer.exe 3400 explorer.exe 4376 svchost.exe 4376 svchost.exe 3400 explorer.exe 3400 explorer.exe 4376 svchost.exe 4376 svchost.exe 3400 explorer.exe 3400 explorer.exe 4376 svchost.exe 4376 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 3400 explorer.exe 4376 svchost.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 1952 8969491a3d38a0526faaaf04447a6cbbb893f194348f47ecbec7c38a524d6af3N.exe 1952 8969491a3d38a0526faaaf04447a6cbbb893f194348f47ecbec7c38a524d6af3N.exe 3400 explorer.exe 3400 explorer.exe 3752 spoolsv.exe 3752 spoolsv.exe 4376 svchost.exe 4376 svchost.exe 2840 spoolsv.exe 2840 spoolsv.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1952 wrote to memory of 3400 1952 8969491a3d38a0526faaaf04447a6cbbb893f194348f47ecbec7c38a524d6af3N.exe 82 PID 1952 wrote to memory of 3400 1952 8969491a3d38a0526faaaf04447a6cbbb893f194348f47ecbec7c38a524d6af3N.exe 82 PID 1952 wrote to memory of 3400 1952 8969491a3d38a0526faaaf04447a6cbbb893f194348f47ecbec7c38a524d6af3N.exe 82 PID 3400 wrote to memory of 3752 3400 explorer.exe 83 PID 3400 wrote to memory of 3752 3400 explorer.exe 83 PID 3400 wrote to memory of 3752 3400 explorer.exe 83 PID 3752 wrote to memory of 4376 3752 spoolsv.exe 84 PID 3752 wrote to memory of 4376 3752 spoolsv.exe 84 PID 3752 wrote to memory of 4376 3752 spoolsv.exe 84 PID 4376 wrote to memory of 2840 4376 svchost.exe 85 PID 4376 wrote to memory of 2840 4376 svchost.exe 85 PID 4376 wrote to memory of 2840 4376 svchost.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\8969491a3d38a0526faaaf04447a6cbbb893f194348f47ecbec7c38a524d6af3N.exe"C:\Users\Admin\AppData\Local\Temp\8969491a3d38a0526faaaf04447a6cbbb893f194348f47ecbec7c38a524d6af3N.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1952 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3400 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3752 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4376 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2840
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
260KB
MD521a4fdce1bdf99ac05a62f7636c6d06f
SHA13a03c667657fa5479f405f68393bf7d11cd6615a
SHA256bc3b0757f109856e7969d19088c1c7b015d043694e9f97595c751c026c717c5f
SHA5127524f03fa142bbe9c19dbbe57f47f9a788bc39d87e0c7e7307bee59ff21d8ee3c343263f6a1084377d47b4d6801b2e2ea960fcd8e6f9305a90a63594c91197a7
-
Filesize
260KB
MD592bb1d8cd5648c111b34a486a293bafb
SHA1210f6424b1cbd2ec78f2796d77d8abdc7cccfdeb
SHA25677562f50655d7f1806b3ba538e5e1b67afaaaeb8b1658883c38964f86f0d32d2
SHA512130c358ecbb8960e360672002543305c77f13c89b9135a4f26f39ec1d352ab34fb8beae42b76bd482c86401500e078a7cfc3ecebb75fa62cf83f5ba4608b181c
-
Filesize
260KB
MD5430b040e5287d32a30a53d236bfcce08
SHA12f98563c4fe79c57420e46a2177f1399bb957a9b
SHA2568377be2c927d7a65c5d9ce169084808bcae76ea8cf04550a9f2809aebd10ff62
SHA512f06642174d0615d71574a67b005ad0ca9105376ac8e10b4481acafd4139f3f5ce818c428b89cc61ef5db14ba7774b719bb61698d9eed6b53fe7ce7833fe48e52
-
Filesize
260KB
MD558839fe7ec2f0d462b483066836ab7f0
SHA1cabae5f78c7189a34459d67d4c37ba84871997b6
SHA256ce031a3b97b11a6944b8e5240d4a431b76a9477e22c6660d674e18344574455e
SHA512659ac99201293c7ca001a6ad61f3f42c9c43b42bbb8b012ae109834df7c4fcfdfafded4da6d2d4f19afdd0a0de96afd3274406338dbf501735fe5503227a81c7