Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20/09/2024, 12:40
Static task
static1
Behavioral task
behavioral1
Sample
6966abeae5c51d169fc04e631bdb3f510c33322430151d8b8835a5a070b53c12N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
6966abeae5c51d169fc04e631bdb3f510c33322430151d8b8835a5a070b53c12N.exe
Resource
win10v2004-20240802-en
General
-
Target
6966abeae5c51d169fc04e631bdb3f510c33322430151d8b8835a5a070b53c12N.exe
-
Size
211KB
-
MD5
b8d5396cea016bbc4b4911a14a8d6260
-
SHA1
fb87f9231e9f2e6438be13876cf9ca5345507f6f
-
SHA256
6966abeae5c51d169fc04e631bdb3f510c33322430151d8b8835a5a070b53c12
-
SHA512
969a846371efe4cf4428a32a68b4e38dcdd2bf41bcbcd9a01e27dd751cee5516aa9c971fc581e30db737bb6f5820cb324fba60724ce5f527c9dc6c1922418b73
-
SSDEEP
3072:JD6Xtx68yygRBE52mxkEOHLRMpZ4deth8PEAjAfIbAYGPhz6sPJBInxZqOU:Jh8cBzHLRMpZ4d1ZU
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\userinit.exe" userinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\userinit.exe" swchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" userinit.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" swchost.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 8 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} swchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} userinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Local\\mrsys.exe MR" userinit.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} swchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Local\\mrsys.exe MR" swchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} swchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} swchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Local\\mrsys.exe MR" swchost.exe -
Executes dropped EXE 4 IoCs
pid Process 4120 userinit.exe 720 spoolsw.exe 872 swchost.exe 2436 spoolsw.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\userinit = "c:\\windows\\userinit.exe RO" userinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Swchost = "c:\\windows\\swchost.exe RO" userinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\userinit = "c:\\windows\\userinit.exe RO" swchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Swchost = "c:\\windows\\swchost.exe RO" swchost.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\system\udsys.exe userinit.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification \??\c:\windows\userinit.exe 6966abeae5c51d169fc04e631bdb3f510c33322430151d8b8835a5a070b53c12N.exe File opened for modification \??\c:\windows\spoolsw.exe userinit.exe File opened for modification \??\c:\windows\swchost.exe spoolsw.exe File opened for modification \??\c:\windows\userinit.exe userinit.exe File opened for modification \??\c:\windows\swchost.exe swchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6966abeae5c51d169fc04e631bdb3f510c33322430151d8b8835a5a070b53c12N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language userinit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language swchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsw.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4016 6966abeae5c51d169fc04e631bdb3f510c33322430151d8b8835a5a070b53c12N.exe 4016 6966abeae5c51d169fc04e631bdb3f510c33322430151d8b8835a5a070b53c12N.exe 4120 userinit.exe 4120 userinit.exe 4120 userinit.exe 4120 userinit.exe 4120 userinit.exe 4120 userinit.exe 872 swchost.exe 872 swchost.exe 872 swchost.exe 872 swchost.exe 4120 userinit.exe 872 swchost.exe 4120 userinit.exe 872 swchost.exe 4120 userinit.exe 872 swchost.exe 4120 userinit.exe 872 swchost.exe 872 swchost.exe 4120 userinit.exe 872 swchost.exe 4120 userinit.exe 872 swchost.exe 4120 userinit.exe 872 swchost.exe 4120 userinit.exe 4120 userinit.exe 872 swchost.exe 4120 userinit.exe 872 swchost.exe 4120 userinit.exe 872 swchost.exe 4120 userinit.exe 872 swchost.exe 872 swchost.exe 4120 userinit.exe 4120 userinit.exe 872 swchost.exe 872 swchost.exe 4120 userinit.exe 4120 userinit.exe 872 swchost.exe 4120 userinit.exe 872 swchost.exe 872 swchost.exe 4120 userinit.exe 872 swchost.exe 4120 userinit.exe 4120 userinit.exe 872 swchost.exe 872 swchost.exe 4120 userinit.exe 872 swchost.exe 4120 userinit.exe 872 swchost.exe 4120 userinit.exe 872 swchost.exe 4120 userinit.exe 872 swchost.exe 4120 userinit.exe 4120 userinit.exe 872 swchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 4120 userinit.exe 872 swchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 4016 6966abeae5c51d169fc04e631bdb3f510c33322430151d8b8835a5a070b53c12N.exe 4016 6966abeae5c51d169fc04e631bdb3f510c33322430151d8b8835a5a070b53c12N.exe 4120 userinit.exe 4120 userinit.exe 720 spoolsw.exe 720 spoolsw.exe 872 swchost.exe 872 swchost.exe 2436 spoolsw.exe 2436 spoolsw.exe 4120 userinit.exe 4120 userinit.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4016 wrote to memory of 4120 4016 6966abeae5c51d169fc04e631bdb3f510c33322430151d8b8835a5a070b53c12N.exe 90 PID 4016 wrote to memory of 4120 4016 6966abeae5c51d169fc04e631bdb3f510c33322430151d8b8835a5a070b53c12N.exe 90 PID 4016 wrote to memory of 4120 4016 6966abeae5c51d169fc04e631bdb3f510c33322430151d8b8835a5a070b53c12N.exe 90 PID 4120 wrote to memory of 720 4120 userinit.exe 91 PID 4120 wrote to memory of 720 4120 userinit.exe 91 PID 4120 wrote to memory of 720 4120 userinit.exe 91 PID 720 wrote to memory of 872 720 spoolsw.exe 92 PID 720 wrote to memory of 872 720 spoolsw.exe 92 PID 720 wrote to memory of 872 720 spoolsw.exe 92 PID 872 wrote to memory of 2436 872 swchost.exe 93 PID 872 wrote to memory of 2436 872 swchost.exe 93 PID 872 wrote to memory of 2436 872 swchost.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\6966abeae5c51d169fc04e631bdb3f510c33322430151d8b8835a5a070b53c12N.exe"C:\Users\Admin\AppData\Local\Temp\6966abeae5c51d169fc04e631bdb3f510c33322430151d8b8835a5a070b53c12N.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4016 -
\??\c:\windows\userinit.exec:\windows\userinit.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4120 -
\??\c:\windows\spoolsw.exec:\windows\spoolsw.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:720 -
\??\c:\windows\swchost.exec:\windows\swchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:872 -
\??\c:\windows\spoolsw.exec:\windows\spoolsw.exe PR5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2436
-
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4400,i,10597648459838880772,16562651767759956329,262144 --variations-seed-version --mojo-platform-channel-handle=4164 /prefetch:81⤵PID:3304
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
211KB
MD588aded53aaf8a9d743c62233985be66e
SHA10ccb0745827577f803c98776d8f80bf2e9b8061b
SHA25613085f71a9786425a67d43fef4453b5dd44af0853af23475367a31a4f27d882a
SHA51260c59aa163d859fa52d78edf17377ac9dd8e00ae592cbb3f03870cbdbe9d8f1f32c435be58ab5754f9e6ded9ea9ef4040b52f17de7efcbf963e2fa1c5c73e4cf
-
Filesize
211KB
MD5e8a4d15bd57dee819fddf2c0063641da
SHA1b16edf114dbe94802b53eab4a3cebb36b7937287
SHA256de42f15dbb6ef9ce0eb706b1922f38c218615e600650a205f14b30391f6e7f87
SHA512d07c6d889048b9d8b82a42c808c83c8ab58716afe44c8a00599ccef75f6d0c8957b86d3bed04bfd3db3e57973a84328fd4b95a7df84a8b06df21c396cdb6fe4c
-
Filesize
211KB
MD5bd4be03d44ebcc2a379296fe02c9f2b1
SHA1eaf7dba7ce54b9fc5a4101a6b753fc4e2f67c593
SHA256cb4e3c52316a55b58529a7e5f69e0d27d5f26890774e6bf3197b143d6d272673
SHA512b145036d9b9751ac44c714df1de926cbcde8b981838508bd1921be9aa84ee4e3d0bccf444e35e590e303eef0771ddec99ec74a798b7e9accb569691d5b622cf9
-
Filesize
211KB
MD5aa58f4d3ae3eec5a85c6b2596b6476db
SHA1c64f85b944169a15dbea480e35b52217d2961ca9
SHA256daed9c7179b6d3e576821302e706fa24489433d1bdae67a24625cc196cb0f6b5
SHA512c78b0ec2296838bc68df376d36138ff529cc9220069a5f1a12e590cb1deef4e682a1e0693903e32d72bec2820809d14eaa8b5b377ea3c5452c0600781c4eb832