Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/09/2024, 12:40

General

  • Target

    6966abeae5c51d169fc04e631bdb3f510c33322430151d8b8835a5a070b53c12N.exe

  • Size

    211KB

  • MD5

    b8d5396cea016bbc4b4911a14a8d6260

  • SHA1

    fb87f9231e9f2e6438be13876cf9ca5345507f6f

  • SHA256

    6966abeae5c51d169fc04e631bdb3f510c33322430151d8b8835a5a070b53c12

  • SHA512

    969a846371efe4cf4428a32a68b4e38dcdd2bf41bcbcd9a01e27dd751cee5516aa9c971fc581e30db737bb6f5820cb324fba60724ce5f527c9dc6c1922418b73

  • SSDEEP

    3072:JD6Xtx68yygRBE52mxkEOHLRMpZ4deth8PEAjAfIbAYGPhz6sPJBInxZqOU:Jh8cBzHLRMpZ4d1ZU

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 8 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6966abeae5c51d169fc04e631bdb3f510c33322430151d8b8835a5a070b53c12N.exe
    "C:\Users\Admin\AppData\Local\Temp\6966abeae5c51d169fc04e631bdb3f510c33322430151d8b8835a5a070b53c12N.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4016
    • \??\c:\windows\userinit.exe
      c:\windows\userinit.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visiblity of hidden/system files in Explorer
      • Boot or Logon Autostart Execution: Active Setup
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4120
      • \??\c:\windows\spoolsw.exe
        c:\windows\spoolsw.exe SE
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:720
        • \??\c:\windows\swchost.exe
          c:\windows\swchost.exe
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visiblity of hidden/system files in Explorer
          • Boot or Logon Autostart Execution: Active Setup
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:872
          • \??\c:\windows\spoolsw.exe
            c:\windows\spoolsw.exe PR
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            PID:2436
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4400,i,10597648459838880772,16562651767759956329,262144 --variations-seed-version --mojo-platform-channel-handle=4164 /prefetch:8
    1⤵
      PID:3304

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\mrsys.exe

      Filesize

      211KB

      MD5

      88aded53aaf8a9d743c62233985be66e

      SHA1

      0ccb0745827577f803c98776d8f80bf2e9b8061b

      SHA256

      13085f71a9786425a67d43fef4453b5dd44af0853af23475367a31a4f27d882a

      SHA512

      60c59aa163d859fa52d78edf17377ac9dd8e00ae592cbb3f03870cbdbe9d8f1f32c435be58ab5754f9e6ded9ea9ef4040b52f17de7efcbf963e2fa1c5c73e4cf

    • C:\Windows\spoolsw.exe

      Filesize

      211KB

      MD5

      e8a4d15bd57dee819fddf2c0063641da

      SHA1

      b16edf114dbe94802b53eab4a3cebb36b7937287

      SHA256

      de42f15dbb6ef9ce0eb706b1922f38c218615e600650a205f14b30391f6e7f87

      SHA512

      d07c6d889048b9d8b82a42c808c83c8ab58716afe44c8a00599ccef75f6d0c8957b86d3bed04bfd3db3e57973a84328fd4b95a7df84a8b06df21c396cdb6fe4c

    • C:\Windows\swchost.exe

      Filesize

      211KB

      MD5

      bd4be03d44ebcc2a379296fe02c9f2b1

      SHA1

      eaf7dba7ce54b9fc5a4101a6b753fc4e2f67c593

      SHA256

      cb4e3c52316a55b58529a7e5f69e0d27d5f26890774e6bf3197b143d6d272673

      SHA512

      b145036d9b9751ac44c714df1de926cbcde8b981838508bd1921be9aa84ee4e3d0bccf444e35e590e303eef0771ddec99ec74a798b7e9accb569691d5b622cf9

    • C:\Windows\userinit.exe

      Filesize

      211KB

      MD5

      aa58f4d3ae3eec5a85c6b2596b6476db

      SHA1

      c64f85b944169a15dbea480e35b52217d2961ca9

      SHA256

      daed9c7179b6d3e576821302e706fa24489433d1bdae67a24625cc196cb0f6b5

      SHA512

      c78b0ec2296838bc68df376d36138ff529cc9220069a5f1a12e590cb1deef4e682a1e0693903e32d72bec2820809d14eaa8b5b377ea3c5452c0600781c4eb832