Analysis
-
max time kernel
120s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20/09/2024, 12:40
Static task
static1
Behavioral task
behavioral1
Sample
6966abeae5c51d169fc04e631bdb3f510c33322430151d8b8835a5a070b53c12N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
6966abeae5c51d169fc04e631bdb3f510c33322430151d8b8835a5a070b53c12N.exe
Resource
win10v2004-20240802-en
General
-
Target
6966abeae5c51d169fc04e631bdb3f510c33322430151d8b8835a5a070b53c12N.exe
-
Size
211KB
-
MD5
b8d5396cea016bbc4b4911a14a8d6260
-
SHA1
fb87f9231e9f2e6438be13876cf9ca5345507f6f
-
SHA256
6966abeae5c51d169fc04e631bdb3f510c33322430151d8b8835a5a070b53c12
-
SHA512
969a846371efe4cf4428a32a68b4e38dcdd2bf41bcbcd9a01e27dd751cee5516aa9c971fc581e30db737bb6f5820cb324fba60724ce5f527c9dc6c1922418b73
-
SSDEEP
3072:JD6Xtx68yygRBE52mxkEOHLRMpZ4deth8PEAjAfIbAYGPhz6sPJBInxZqOU:Jh8cBzHLRMpZ4d1ZU
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\userinit.exe" userinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\userinit.exe" swchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" userinit.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" swchost.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 8 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} swchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Local\\mrsys.exe MR" swchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} swchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} userinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Local\\mrsys.exe MR" userinit.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} swchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Local\\mrsys.exe MR" swchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} swchost.exe -
Executes dropped EXE 4 IoCs
pid Process 2508 userinit.exe 2892 spoolsw.exe 3036 swchost.exe 2672 spoolsw.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\userinit = "c:\\windows\\userinit.exe RO" userinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Swchost = "c:\\windows\\swchost.exe RO" userinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\userinit = "c:\\windows\\userinit.exe RO" swchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Swchost = "c:\\windows\\swchost.exe RO" swchost.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\system\udsys.exe userinit.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification \??\c:\windows\swchost.exe swchost.exe File opened for modification \??\c:\windows\userinit.exe 6966abeae5c51d169fc04e631bdb3f510c33322430151d8b8835a5a070b53c12N.exe File opened for modification \??\c:\windows\spoolsw.exe userinit.exe File opened for modification \??\c:\windows\swchost.exe spoolsw.exe File opened for modification \??\c:\windows\userinit.exe userinit.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language userinit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language swchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6966abeae5c51d169fc04e631bdb3f510c33322430151d8b8835a5a070b53c12N.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1712 6966abeae5c51d169fc04e631bdb3f510c33322430151d8b8835a5a070b53c12N.exe 2508 userinit.exe 2508 userinit.exe 2508 userinit.exe 3036 swchost.exe 3036 swchost.exe 2508 userinit.exe 3036 swchost.exe 2508 userinit.exe 3036 swchost.exe 2508 userinit.exe 3036 swchost.exe 2508 userinit.exe 3036 swchost.exe 2508 userinit.exe 3036 swchost.exe 2508 userinit.exe 3036 swchost.exe 2508 userinit.exe 3036 swchost.exe 2508 userinit.exe 3036 swchost.exe 2508 userinit.exe 3036 swchost.exe 2508 userinit.exe 3036 swchost.exe 2508 userinit.exe 3036 swchost.exe 2508 userinit.exe 3036 swchost.exe 2508 userinit.exe 3036 swchost.exe 2508 userinit.exe 3036 swchost.exe 2508 userinit.exe 3036 swchost.exe 2508 userinit.exe 3036 swchost.exe 2508 userinit.exe 3036 swchost.exe 2508 userinit.exe 3036 swchost.exe 2508 userinit.exe 3036 swchost.exe 2508 userinit.exe 3036 swchost.exe 2508 userinit.exe 3036 swchost.exe 2508 userinit.exe 3036 swchost.exe 2508 userinit.exe 3036 swchost.exe 2508 userinit.exe 3036 swchost.exe 2508 userinit.exe 3036 swchost.exe 2508 userinit.exe 3036 swchost.exe 2508 userinit.exe 3036 swchost.exe 2508 userinit.exe 3036 swchost.exe 2508 userinit.exe 3036 swchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2508 userinit.exe 3036 swchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1712 6966abeae5c51d169fc04e631bdb3f510c33322430151d8b8835a5a070b53c12N.exe 1712 6966abeae5c51d169fc04e631bdb3f510c33322430151d8b8835a5a070b53c12N.exe 2508 userinit.exe 2508 userinit.exe 2892 spoolsw.exe 2892 spoolsw.exe 3036 swchost.exe 3036 swchost.exe 2672 spoolsw.exe 2672 spoolsw.exe 2508 userinit.exe 2508 userinit.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1712 wrote to memory of 2508 1712 6966abeae5c51d169fc04e631bdb3f510c33322430151d8b8835a5a070b53c12N.exe 31 PID 1712 wrote to memory of 2508 1712 6966abeae5c51d169fc04e631bdb3f510c33322430151d8b8835a5a070b53c12N.exe 31 PID 1712 wrote to memory of 2508 1712 6966abeae5c51d169fc04e631bdb3f510c33322430151d8b8835a5a070b53c12N.exe 31 PID 1712 wrote to memory of 2508 1712 6966abeae5c51d169fc04e631bdb3f510c33322430151d8b8835a5a070b53c12N.exe 31 PID 2508 wrote to memory of 2892 2508 userinit.exe 32 PID 2508 wrote to memory of 2892 2508 userinit.exe 32 PID 2508 wrote to memory of 2892 2508 userinit.exe 32 PID 2508 wrote to memory of 2892 2508 userinit.exe 32 PID 2892 wrote to memory of 3036 2892 spoolsw.exe 33 PID 2892 wrote to memory of 3036 2892 spoolsw.exe 33 PID 2892 wrote to memory of 3036 2892 spoolsw.exe 33 PID 2892 wrote to memory of 3036 2892 spoolsw.exe 33 PID 3036 wrote to memory of 2672 3036 swchost.exe 34 PID 3036 wrote to memory of 2672 3036 swchost.exe 34 PID 3036 wrote to memory of 2672 3036 swchost.exe 34 PID 3036 wrote to memory of 2672 3036 swchost.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\6966abeae5c51d169fc04e631bdb3f510c33322430151d8b8835a5a070b53c12N.exe"C:\Users\Admin\AppData\Local\Temp\6966abeae5c51d169fc04e631bdb3f510c33322430151d8b8835a5a070b53c12N.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1712 -
\??\c:\windows\userinit.exec:\windows\userinit.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2508 -
\??\c:\windows\spoolsw.exec:\windows\spoolsw.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2892 -
\??\c:\windows\swchost.exec:\windows\swchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3036 -
\??\c:\windows\spoolsw.exec:\windows\spoolsw.exe PR5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2672
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
211KB
MD528b6b789b18b172b19ec5723fc48cacb
SHA18d19c9c6d9d4217b29d9d627a1df959612d73299
SHA25677269521f152b4dfd0ad8b012cd2191ad8c0df103d93b2fd56a87561420959bd
SHA512a927fd15e291da8a2361266c1fea924e9d2a9ccd29a8fa72397fc099abef96305c3a7539dac4b7ebe00ebd250b990e83f538a1af68a1838583fc9145e914aa86
-
Filesize
211KB
MD52af8c421b29778dbe205aaea72b4ab28
SHA1d63dba57b0118aaecce87093c604bdce66d42906
SHA256305fdd5b9dde7099ce1ef28e63ac000908da193b821e85928ea61943b31a4caf
SHA51261eb96495585797c817d03832ff8cd1c17e672917b8bda7ab782e43c6ff4e3189eb7837bc184d8042b4a959610cf4c04bc48618276318958a65d3d96787bd37a
-
Filesize
211KB
MD5562a01eaa959006ed96c9ef07259ae4d
SHA1ef966572a2203e855c48abb48e5c2045b6ad188c
SHA25641eacd2c57ea43ecbbae1fd450ecf4505e68974becbc5b4ec62a07e0d8cb08f1
SHA512dd05b697252321cfeb228661b0e3ad2d6f07b9c4bf69ac5cb45725367f2f479dbf5a90db5fb30df34b2e5eeb499e09ab124f61152dfa645f549fae85e0e093e6
-
Filesize
211KB
MD507636018904775abd46ab0264b8d76b8
SHA195fb0d9010d36221a0926668c96e1c0206e03613
SHA25660828437246bd2231117a01bf61f9e1089bacf6b66564abdc48c797dc7840d46
SHA51233f9e2e2e726f2c341084c08b8d2a64c539e9b10c570a46a7f6b71d7967840ea919bcb06fea5cc115f7a490639c4c75588d2943ba73b00c5ef3e74d3cbfd00e8