Analysis

  • max time kernel
    150s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    29/09/2024, 03:11

General

  • Target

    d133481550e0bb90c316990a83090fc283dd7eb31c942cd7eb5824056df2102c.exe

  • Size

    211KB

  • MD5

    9331f7abed97b237181938a171ccd8f7

  • SHA1

    bb3995196ce1b4b4a3b01e1dd1c44ee60e04babd

  • SHA256

    d133481550e0bb90c316990a83090fc283dd7eb31c942cd7eb5824056df2102c

  • SHA512

    b86a1f986106eba5507d521cd0c358532900b72f4dd43283f5783dd54b820038b6f8fe6fa9b0aaa026e1b0def026e986d3d8effb14f359a327fbbe382c8717fd

  • SSDEEP

    3072:JD6Xtx68yygRBE52mxkEOHLRMpZ4deth8PEAjAfIbAYGPhz6sPJBInxZqO3:Jh8cBzHLRMpZ4d1Z3

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 8 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d133481550e0bb90c316990a83090fc283dd7eb31c942cd7eb5824056df2102c.exe
    "C:\Users\Admin\AppData\Local\Temp\d133481550e0bb90c316990a83090fc283dd7eb31c942cd7eb5824056df2102c.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1704
    • \??\c:\windows\userinit.exe
      c:\windows\userinit.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visiblity of hidden/system files in Explorer
      • Boot or Logon Autostart Execution: Active Setup
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2920
      • \??\c:\windows\spoolsw.exe
        c:\windows\spoolsw.exe SE
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2864
        • \??\c:\windows\swchost.exe
          c:\windows\swchost.exe
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visiblity of hidden/system files in Explorer
          • Boot or Logon Autostart Execution: Active Setup
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2740
          • \??\c:\windows\spoolsw.exe
            c:\windows\spoolsw.exe PR
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            PID:2916

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\mrsys.exe

          Filesize

          211KB

          MD5

          e351336794abd70adc62d1ea7178d52d

          SHA1

          291ea35baa08761cf1ccf5bf80c6d7caf7cfaccc

          SHA256

          1f231fc321f31576346b3508b6ae55ebecf9a31b25eb55b2bc82413e7680fec7

          SHA512

          f3b310890d784c4c0f2a0f17a83b66451c8ef2ef091d1f59f923b5c70ee677370c378f6454322cdd516b216c2ae77e7a7c01e64be92c7a7661c0af8581899a02

        • C:\Windows\spoolsw.exe

          Filesize

          211KB

          MD5

          500326f62d1b0ab596a5c1f6d43039fe

          SHA1

          e65264b642516a8aedae0672a7c51be910af9d68

          SHA256

          aba9d1001885e04905ccd017461ba1b9fa3618e0582a9f6486ac97d47e646eb4

          SHA512

          a07fe65548d016af998f0abeffeded8743adf34fc10e9f94c37474b1ab6d31e100d4e2fc2df0c4ddac881720780b3d1221cbba8fe7aa35f814b5b895b33bb01e

        • C:\Windows\swchost.exe

          Filesize

          211KB

          MD5

          d7f4ae6564791a421ebcd44a7060bc9b

          SHA1

          f32e36b0ceefde1719d6f4188c21cfae958f2cac

          SHA256

          8d106cf5b798fd03f9302ce8dc25abf81529b205ece7d93555854ffe7079af51

          SHA512

          9947b273aec1d8c702dddea984c0f0319665c1499de09a6960667ba5fe1638cc0148ac296db46df4bbbdb9bc5146d67ce1d218570a438c26002f2f207cd745af

        • C:\Windows\userinit.exe

          Filesize

          211KB

          MD5

          4d923828bcbce4946f15d0ecd9600eb1

          SHA1

          c184e0c80f3045780da10bce462de845ca08f0f3

          SHA256

          6087d30a1436251124521ad20cdeef2ab4f2bbebcdaafa6d1000c18cab7c9f38

          SHA512

          2720a19479cc68eb8d7c3d441eeb845b693ac8299a930da479c06a7d9cc2b1ff0f0c953525442553e00ae9378ec3bb0004353c7be2e6c839f537ef7b4ca583ed