Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20/09/2024, 12:40

General

  • Target

    6966abeae5c51d169fc04e631bdb3f510c33322430151d8b8835a5a070b53c12N.exe

  • Size

    211KB

  • MD5

    b8d5396cea016bbc4b4911a14a8d6260

  • SHA1

    fb87f9231e9f2e6438be13876cf9ca5345507f6f

  • SHA256

    6966abeae5c51d169fc04e631bdb3f510c33322430151d8b8835a5a070b53c12

  • SHA512

    969a846371efe4cf4428a32a68b4e38dcdd2bf41bcbcd9a01e27dd751cee5516aa9c971fc581e30db737bb6f5820cb324fba60724ce5f527c9dc6c1922418b73

  • SSDEEP

    3072:JD6Xtx68yygRBE52mxkEOHLRMpZ4deth8PEAjAfIbAYGPhz6sPJBInxZqOU:Jh8cBzHLRMpZ4d1ZU

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 8 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6966abeae5c51d169fc04e631bdb3f510c33322430151d8b8835a5a070b53c12N.exe
    "C:\Users\Admin\AppData\Local\Temp\6966abeae5c51d169fc04e631bdb3f510c33322430151d8b8835a5a070b53c12N.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1712
    • \??\c:\windows\userinit.exe
      c:\windows\userinit.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visiblity of hidden/system files in Explorer
      • Boot or Logon Autostart Execution: Active Setup
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2508
      • \??\c:\windows\spoolsw.exe
        c:\windows\spoolsw.exe SE
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2892
        • \??\c:\windows\swchost.exe
          c:\windows\swchost.exe
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visiblity of hidden/system files in Explorer
          • Boot or Logon Autostart Execution: Active Setup
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:3036
          • \??\c:\windows\spoolsw.exe
            c:\windows\spoolsw.exe PR
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            PID:2672

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\mrsys.exe

    Filesize

    211KB

    MD5

    28b6b789b18b172b19ec5723fc48cacb

    SHA1

    8d19c9c6d9d4217b29d9d627a1df959612d73299

    SHA256

    77269521f152b4dfd0ad8b012cd2191ad8c0df103d93b2fd56a87561420959bd

    SHA512

    a927fd15e291da8a2361266c1fea924e9d2a9ccd29a8fa72397fc099abef96305c3a7539dac4b7ebe00ebd250b990e83f538a1af68a1838583fc9145e914aa86

  • C:\Windows\spoolsw.exe

    Filesize

    211KB

    MD5

    2af8c421b29778dbe205aaea72b4ab28

    SHA1

    d63dba57b0118aaecce87093c604bdce66d42906

    SHA256

    305fdd5b9dde7099ce1ef28e63ac000908da193b821e85928ea61943b31a4caf

    SHA512

    61eb96495585797c817d03832ff8cd1c17e672917b8bda7ab782e43c6ff4e3189eb7837bc184d8042b4a959610cf4c04bc48618276318958a65d3d96787bd37a

  • C:\Windows\swchost.exe

    Filesize

    211KB

    MD5

    562a01eaa959006ed96c9ef07259ae4d

    SHA1

    ef966572a2203e855c48abb48e5c2045b6ad188c

    SHA256

    41eacd2c57ea43ecbbae1fd450ecf4505e68974becbc5b4ec62a07e0d8cb08f1

    SHA512

    dd05b697252321cfeb228661b0e3ad2d6f07b9c4bf69ac5cb45725367f2f479dbf5a90db5fb30df34b2e5eeb499e09ab124f61152dfa645f549fae85e0e093e6

  • C:\Windows\userinit.exe

    Filesize

    211KB

    MD5

    07636018904775abd46ab0264b8d76b8

    SHA1

    95fb0d9010d36221a0926668c96e1c0206e03613

    SHA256

    60828437246bd2231117a01bf61f9e1089bacf6b66564abdc48c797dc7840d46

    SHA512

    33f9e2e2e726f2c341084c08b8d2a64c539e9b10c570a46a7f6b71d7967840ea919bcb06fea5cc115f7a490639c4c75588d2943ba73b00c5ef3e74d3cbfd00e8