Analysis

  • max time kernel
    120s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/09/2024, 06:40

General

  • Target

    58b02d0eb1e58564c274e82b3aedcad163dbfbbdd25c8ddd8155d15053773e1bN.exe

  • Size

    503KB

  • MD5

    ebe4fd3691956df84f935c1b2f895e30

  • SHA1

    58c7cbf3ff51c18c7f9adb334e16f50bf1d0033f

  • SHA256

    58b02d0eb1e58564c274e82b3aedcad163dbfbbdd25c8ddd8155d15053773e1b

  • SHA512

    1031d7e9c6e8c30b08f27b172f195f087e139245ebf7b6d302d8484408b015de8af0bab3fd13958f0f425e75243a5996352cf30f6d4d8ddc128ad5cf1f3ff6da

  • SSDEEP

    12288:3ENN+T5xYrllrU7QY6CRYiioQzhGTRKhWcFc9f:N5xolYQY6yYjJzhgKhWcFc9f

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 8 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\58b02d0eb1e58564c274e82b3aedcad163dbfbbdd25c8ddd8155d15053773e1bN.exe
    "C:\Users\Admin\AppData\Local\Temp\58b02d0eb1e58564c274e82b3aedcad163dbfbbdd25c8ddd8155d15053773e1bN.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3692
    • \??\c:\windows\system\explorer.exe
      c:\windows\system\explorer.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visiblity of hidden/system files in Explorer
      • Boot or Logon Autostart Execution: Active Setup
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2640
      • \??\c:\windows\system\spoolsv.exe
        c:\windows\system\spoolsv.exe SE
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3480
        • \??\c:\windows\system\svchost.exe
          c:\windows\system\svchost.exe
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visiblity of hidden/system files in Explorer
          • Boot or Logon Autostart Execution: Active Setup
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:932
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe PR
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            PID:744
          • C:\Windows\SysWOW64\at.exe
            at 06:42 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
            5⤵
            • System Location Discovery: System Language Discovery
            PID:408
          • C:\Windows\SysWOW64\at.exe
            at 06:43 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
            5⤵
            • System Location Discovery: System Language Discovery
            PID:996

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\mrsys.exe

    Filesize

    503KB

    MD5

    0604831527710a3fe9c435b2af8b32e5

    SHA1

    7859229e5f8ebb59d1e00bfeef9f0fc1a4889149

    SHA256

    2ad2e5e5e20701aefe1e8e85b01f23241722331b377f12ef06e928958b647d7c

    SHA512

    1fbe600d9dd671734608c212b021e03bb8a83004712ac6d1caf246d4582b6061adfe82dc9b76878f5cb382ca4634177ce7db45ceed8de69d0a83080d68a132fa

  • C:\Windows\System\explorer.exe

    Filesize

    503KB

    MD5

    5449bca353c97fce57ee01126f89fb6d

    SHA1

    847ef159363c11a5cc709fd7492d5efb2767c98c

    SHA256

    ba1238ca10a4c0c2aafbabc279f93ee7ec3b2e9d89fda90531934486ff3a9cca

    SHA512

    8d8a089ab7e05162bd2af221de50189dd6542823777291a2af44ebf2427de902b62bcf7a6a41e0c650f2bc406d5190cddab94dd7910714a0551db5a0af9e20d5

  • C:\Windows\System\spoolsv.exe

    Filesize

    503KB

    MD5

    d0f2e18c4e0db6ca97fe331642cd0a34

    SHA1

    8987d82f8558f20a13e3e774d0ca8ab02d3d8c4e

    SHA256

    9c3abd1749e847be850172872ad8986f7a6de97079de00ff7fa32e2c573bba95

    SHA512

    88ed624bae4e92481a4842bfe7f32500bfe432f81eb7a441863d0f8b893307289d417322a1b10ccd58f4658c606e51c85f7eabeefb51524526b63c184845982f

  • C:\Windows\System\svchost.exe

    Filesize

    503KB

    MD5

    fe57c434548f11533560bb863f726810

    SHA1

    7b64874bbdf23bd6fc603111b2240ac2e3ffe83c

    SHA256

    a74c474b618d0f0a9cde1b795056d2d9361fb85ca4806c397b429a40684e633f

    SHA512

    125ef4aaeb34ac350876eb2f538b474d68b8b91c8d48009f7f4f0639fc6766d84e0f743f67756cf71e3f43219024f6239946920f978bd7fcf19daf93d494bdba

  • memory/744-32-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/932-39-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/2640-38-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/3480-35-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/3692-0-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/3692-37-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB