Analysis

  • max time kernel
    120s
  • max time network
    99s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-09-2024 23:21

General

  • Target

    de4bf050551c8b0e112125383f13f9751f6738a899d666be333aa926bddcc4e4N.exe

  • Size

    211KB

  • MD5

    faf69e2c0040a8b0f62b8d1a7915b6c0

  • SHA1

    9d54a8c0d6ccb3a008a970127015938e87fe1499

  • SHA256

    de4bf050551c8b0e112125383f13f9751f6738a899d666be333aa926bddcc4e4

  • SHA512

    ea58dbcc31b8944339bf7bb1f0cda2c0a0d64475f446dc23b82a05072c27c10ed5990f47e34e807094d676254f394b034201bc77aea9ed0ddff4fb9ad417d72e

  • SSDEEP

    3072:WD6Xtx68yygRBE52mxkEOHLRMpZ4deth8PEAjAfIbAYGPhz6sPJBInxZqOR:Wh8cBzHLRMpZ4d1ZR

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 8 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\de4bf050551c8b0e112125383f13f9751f6738a899d666be333aa926bddcc4e4N.exe
    "C:\Users\Admin\AppData\Local\Temp\de4bf050551c8b0e112125383f13f9751f6738a899d666be333aa926bddcc4e4N.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3368
    • \??\c:\windows\userinit.exe
      c:\windows\userinit.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visiblity of hidden/system files in Explorer
      • Boot or Logon Autostart Execution: Active Setup
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2152
      • \??\c:\windows\spoolsw.exe
        c:\windows\spoolsw.exe SE
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3716
        • \??\c:\windows\swchost.exe
          c:\windows\swchost.exe
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visiblity of hidden/system files in Explorer
          • Boot or Logon Autostart Execution: Active Setup
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:3928
          • \??\c:\windows\spoolsw.exe
            c:\windows\spoolsw.exe PR
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            PID:4136

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\mrsys.exe

    Filesize

    211KB

    MD5

    4a1a4821d4d5e6976b0143636c3b4555

    SHA1

    f97279aba256d11fdce60f549e9f47fa2c2aed28

    SHA256

    dc2de1a4639562f352c1e65591a725a3c1de8eb2e38e76622391d8f01d47647a

    SHA512

    89c10308c200412e8266bd3b3da7b53499aa86e089e553fba47b129ebc1e1f2666e764e3f5d238774d639515438522b4220c28507f03eb68392a935765c79183

  • C:\Windows\spoolsw.exe

    Filesize

    211KB

    MD5

    52c9e527f0284df85b95b5118d99476f

    SHA1

    ee18ccf092d9e9ef1f1532bb5dd9ee383d0d8670

    SHA256

    e9a566324e75cb0e856aa52403e6c20c66c8d8dffa0e4b05114cce84bb58c52f

    SHA512

    84d7747292b29caf6f0349c27891e50e3b342f314df42e73b5441dff336c9561ae8cf17f023a813b2b52c2658208e7dac43a93a9b8244b858ec694bb857e8820

  • C:\Windows\swchost.exe

    Filesize

    211KB

    MD5

    0b97758ecb780e6f7b993ab46ded930c

    SHA1

    912951b3a9453a31aa3352eda91d5d86c5b422df

    SHA256

    8c0852008e0b893e01768163fb66e44bae99dd095ad5a63c2958df9aa27466f9

    SHA512

    7e0f9061c165c6c8bb5e4784b75839d58bb0a936c9a065465740d9de07bf7799d7fb49b4925f5676f2b7720f75d482e178cfd95001fc6652497c5c44fcfc4435

  • C:\Windows\userinit.exe

    Filesize

    211KB

    MD5

    3d4ae186806daf9b0e442be4ff168dda

    SHA1

    46074ca0d96f758a65605db691b0533c4b2356f3

    SHA256

    494718280cde88be92def6a187eabba8e670a8de67580459472f9be93fef6cd6

    SHA512

    37f0088324a338c059761df0ccb4a8cd8863fb13614067062501bd000022dcfab79c07087ad86e9b51f1f12bcee567b900f7956a135ac9867ee3b2d53e8b06c5

  • memory/2152-38-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/3368-0-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/3368-37-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/3716-35-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/3928-39-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/4136-32-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB