Analysis
-
max time kernel
120s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20/09/2024, 06:40
Static task
static1
Behavioral task
behavioral1
Sample
58b02d0eb1e58564c274e82b3aedcad163dbfbbdd25c8ddd8155d15053773e1bN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
58b02d0eb1e58564c274e82b3aedcad163dbfbbdd25c8ddd8155d15053773e1bN.exe
Resource
win10v2004-20240802-en
General
-
Target
58b02d0eb1e58564c274e82b3aedcad163dbfbbdd25c8ddd8155d15053773e1bN.exe
-
Size
503KB
-
MD5
ebe4fd3691956df84f935c1b2f895e30
-
SHA1
58c7cbf3ff51c18c7f9adb334e16f50bf1d0033f
-
SHA256
58b02d0eb1e58564c274e82b3aedcad163dbfbbdd25c8ddd8155d15053773e1b
-
SHA512
1031d7e9c6e8c30b08f27b172f195f087e139245ebf7b6d302d8484408b015de8af0bab3fd13958f0f425e75243a5996352cf30f6d4d8ddc128ad5cf1f3ff6da
-
SSDEEP
12288:3ENN+T5xYrllrU7QY6CRYiioQzhGTRKhWcFc9f:N5xolYQY6yYjJzhgKhWcFc9f
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 8 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 2640 explorer.exe 3480 spoolsv.exe 932 svchost.exe 744 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe svchost.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe 58b02d0eb1e58564c274e82b3aedcad163dbfbbdd25c8ddd8155d15053773e1bN.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 58b02d0eb1e58564c274e82b3aedcad163dbfbbdd25c8ddd8155d15053773e1bN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3692 58b02d0eb1e58564c274e82b3aedcad163dbfbbdd25c8ddd8155d15053773e1bN.exe 3692 58b02d0eb1e58564c274e82b3aedcad163dbfbbdd25c8ddd8155d15053773e1bN.exe 2640 explorer.exe 2640 explorer.exe 2640 explorer.exe 932 svchost.exe 2640 explorer.exe 932 svchost.exe 2640 explorer.exe 2640 explorer.exe 932 svchost.exe 932 svchost.exe 2640 explorer.exe 2640 explorer.exe 932 svchost.exe 932 svchost.exe 2640 explorer.exe 2640 explorer.exe 932 svchost.exe 932 svchost.exe 2640 explorer.exe 2640 explorer.exe 932 svchost.exe 932 svchost.exe 2640 explorer.exe 2640 explorer.exe 932 svchost.exe 932 svchost.exe 2640 explorer.exe 2640 explorer.exe 932 svchost.exe 932 svchost.exe 2640 explorer.exe 2640 explorer.exe 932 svchost.exe 932 svchost.exe 2640 explorer.exe 2640 explorer.exe 932 svchost.exe 932 svchost.exe 2640 explorer.exe 2640 explorer.exe 932 svchost.exe 932 svchost.exe 2640 explorer.exe 2640 explorer.exe 932 svchost.exe 932 svchost.exe 2640 explorer.exe 2640 explorer.exe 932 svchost.exe 932 svchost.exe 2640 explorer.exe 2640 explorer.exe 932 svchost.exe 932 svchost.exe 2640 explorer.exe 2640 explorer.exe 932 svchost.exe 932 svchost.exe 2640 explorer.exe 2640 explorer.exe 932 svchost.exe 932 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2640 explorer.exe 932 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3692 58b02d0eb1e58564c274e82b3aedcad163dbfbbdd25c8ddd8155d15053773e1bN.exe 3692 58b02d0eb1e58564c274e82b3aedcad163dbfbbdd25c8ddd8155d15053773e1bN.exe 2640 explorer.exe 2640 explorer.exe 3480 spoolsv.exe 3480 spoolsv.exe 932 svchost.exe 932 svchost.exe 744 spoolsv.exe 744 spoolsv.exe 2640 explorer.exe 2640 explorer.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 3692 wrote to memory of 2640 3692 58b02d0eb1e58564c274e82b3aedcad163dbfbbdd25c8ddd8155d15053773e1bN.exe 82 PID 3692 wrote to memory of 2640 3692 58b02d0eb1e58564c274e82b3aedcad163dbfbbdd25c8ddd8155d15053773e1bN.exe 82 PID 3692 wrote to memory of 2640 3692 58b02d0eb1e58564c274e82b3aedcad163dbfbbdd25c8ddd8155d15053773e1bN.exe 82 PID 2640 wrote to memory of 3480 2640 explorer.exe 83 PID 2640 wrote to memory of 3480 2640 explorer.exe 83 PID 2640 wrote to memory of 3480 2640 explorer.exe 83 PID 3480 wrote to memory of 932 3480 spoolsv.exe 84 PID 3480 wrote to memory of 932 3480 spoolsv.exe 84 PID 3480 wrote to memory of 932 3480 spoolsv.exe 84 PID 932 wrote to memory of 744 932 svchost.exe 85 PID 932 wrote to memory of 744 932 svchost.exe 85 PID 932 wrote to memory of 744 932 svchost.exe 85 PID 932 wrote to memory of 408 932 svchost.exe 86 PID 932 wrote to memory of 408 932 svchost.exe 86 PID 932 wrote to memory of 408 932 svchost.exe 86 PID 932 wrote to memory of 996 932 svchost.exe 97 PID 932 wrote to memory of 996 932 svchost.exe 97 PID 932 wrote to memory of 996 932 svchost.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\58b02d0eb1e58564c274e82b3aedcad163dbfbbdd25c8ddd8155d15053773e1bN.exe"C:\Users\Admin\AppData\Local\Temp\58b02d0eb1e58564c274e82b3aedcad163dbfbbdd25c8ddd8155d15053773e1bN.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3692 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2640 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3480 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:932 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:744
-
-
C:\Windows\SysWOW64\at.exeat 06:42 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:408
-
-
C:\Windows\SysWOW64\at.exeat 06:43 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:996
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
503KB
MD50604831527710a3fe9c435b2af8b32e5
SHA17859229e5f8ebb59d1e00bfeef9f0fc1a4889149
SHA2562ad2e5e5e20701aefe1e8e85b01f23241722331b377f12ef06e928958b647d7c
SHA5121fbe600d9dd671734608c212b021e03bb8a83004712ac6d1caf246d4582b6061adfe82dc9b76878f5cb382ca4634177ce7db45ceed8de69d0a83080d68a132fa
-
Filesize
503KB
MD55449bca353c97fce57ee01126f89fb6d
SHA1847ef159363c11a5cc709fd7492d5efb2767c98c
SHA256ba1238ca10a4c0c2aafbabc279f93ee7ec3b2e9d89fda90531934486ff3a9cca
SHA5128d8a089ab7e05162bd2af221de50189dd6542823777291a2af44ebf2427de902b62bcf7a6a41e0c650f2bc406d5190cddab94dd7910714a0551db5a0af9e20d5
-
Filesize
503KB
MD5d0f2e18c4e0db6ca97fe331642cd0a34
SHA18987d82f8558f20a13e3e774d0ca8ab02d3d8c4e
SHA2569c3abd1749e847be850172872ad8986f7a6de97079de00ff7fa32e2c573bba95
SHA51288ed624bae4e92481a4842bfe7f32500bfe432f81eb7a441863d0f8b893307289d417322a1b10ccd58f4658c606e51c85f7eabeefb51524526b63c184845982f
-
Filesize
503KB
MD5fe57c434548f11533560bb863f726810
SHA17b64874bbdf23bd6fc603111b2240ac2e3ffe83c
SHA256a74c474b618d0f0a9cde1b795056d2d9361fb85ca4806c397b429a40684e633f
SHA512125ef4aaeb34ac350876eb2f538b474d68b8b91c8d48009f7f4f0639fc6766d84e0f743f67756cf71e3f43219024f6239946920f978bd7fcf19daf93d494bdba