Analysis
-
max time kernel
150s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29/09/2024, 03:11
Static task
static1
Behavioral task
behavioral1
Sample
d133481550e0bb90c316990a83090fc283dd7eb31c942cd7eb5824056df2102c.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d133481550e0bb90c316990a83090fc283dd7eb31c942cd7eb5824056df2102c.exe
Resource
win10v2004-20240802-en
General
-
Target
d133481550e0bb90c316990a83090fc283dd7eb31c942cd7eb5824056df2102c.exe
-
Size
211KB
-
MD5
9331f7abed97b237181938a171ccd8f7
-
SHA1
bb3995196ce1b4b4a3b01e1dd1c44ee60e04babd
-
SHA256
d133481550e0bb90c316990a83090fc283dd7eb31c942cd7eb5824056df2102c
-
SHA512
b86a1f986106eba5507d521cd0c358532900b72f4dd43283f5783dd54b820038b6f8fe6fa9b0aaa026e1b0def026e986d3d8effb14f359a327fbbe382c8717fd
-
SSDEEP
3072:JD6Xtx68yygRBE52mxkEOHLRMpZ4deth8PEAjAfIbAYGPhz6sPJBInxZqO3:Jh8cBzHLRMpZ4d1Z3
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\userinit.exe" userinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\userinit.exe" swchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" userinit.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" swchost.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 8 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Local\\mrsys.exe MR" userinit.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} swchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Local\\mrsys.exe MR" swchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} swchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} swchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Local\\mrsys.exe MR" swchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} swchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} userinit.exe -
Executes dropped EXE 4 IoCs
pid Process 2920 userinit.exe 2864 spoolsw.exe 2740 swchost.exe 2916 spoolsw.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\userinit = "c:\\windows\\userinit.exe RO" userinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Swchost = "c:\\windows\\swchost.exe RO" userinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\userinit = "c:\\windows\\userinit.exe RO" swchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Swchost = "c:\\windows\\swchost.exe RO" swchost.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\system\udsys.exe userinit.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification \??\c:\windows\userinit.exe d133481550e0bb90c316990a83090fc283dd7eb31c942cd7eb5824056df2102c.exe File opened for modification \??\c:\windows\spoolsw.exe userinit.exe File opened for modification \??\c:\windows\swchost.exe spoolsw.exe File opened for modification \??\c:\windows\userinit.exe userinit.exe File opened for modification \??\c:\windows\swchost.exe swchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language userinit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language swchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d133481550e0bb90c316990a83090fc283dd7eb31c942cd7eb5824056df2102c.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1704 d133481550e0bb90c316990a83090fc283dd7eb31c942cd7eb5824056df2102c.exe 2920 userinit.exe 2920 userinit.exe 2920 userinit.exe 2740 swchost.exe 2740 swchost.exe 2920 userinit.exe 2740 swchost.exe 2920 userinit.exe 2740 swchost.exe 2920 userinit.exe 2740 swchost.exe 2920 userinit.exe 2740 swchost.exe 2920 userinit.exe 2740 swchost.exe 2920 userinit.exe 2740 swchost.exe 2920 userinit.exe 2740 swchost.exe 2920 userinit.exe 2740 swchost.exe 2920 userinit.exe 2740 swchost.exe 2920 userinit.exe 2740 swchost.exe 2920 userinit.exe 2740 swchost.exe 2920 userinit.exe 2740 swchost.exe 2920 userinit.exe 2740 swchost.exe 2920 userinit.exe 2740 swchost.exe 2920 userinit.exe 2740 swchost.exe 2920 userinit.exe 2740 swchost.exe 2920 userinit.exe 2740 swchost.exe 2920 userinit.exe 2740 swchost.exe 2920 userinit.exe 2740 swchost.exe 2920 userinit.exe 2740 swchost.exe 2920 userinit.exe 2740 swchost.exe 2920 userinit.exe 2740 swchost.exe 2920 userinit.exe 2740 swchost.exe 2920 userinit.exe 2740 swchost.exe 2920 userinit.exe 2740 swchost.exe 2920 userinit.exe 2740 swchost.exe 2920 userinit.exe 2740 swchost.exe 2920 userinit.exe 2740 swchost.exe 2920 userinit.exe 2740 swchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2920 userinit.exe 2740 swchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1704 d133481550e0bb90c316990a83090fc283dd7eb31c942cd7eb5824056df2102c.exe 1704 d133481550e0bb90c316990a83090fc283dd7eb31c942cd7eb5824056df2102c.exe 2920 userinit.exe 2920 userinit.exe 2864 spoolsw.exe 2864 spoolsw.exe 2740 swchost.exe 2740 swchost.exe 2916 spoolsw.exe 2916 spoolsw.exe 2920 userinit.exe 2920 userinit.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1704 wrote to memory of 2920 1704 d133481550e0bb90c316990a83090fc283dd7eb31c942cd7eb5824056df2102c.exe 31 PID 1704 wrote to memory of 2920 1704 d133481550e0bb90c316990a83090fc283dd7eb31c942cd7eb5824056df2102c.exe 31 PID 1704 wrote to memory of 2920 1704 d133481550e0bb90c316990a83090fc283dd7eb31c942cd7eb5824056df2102c.exe 31 PID 1704 wrote to memory of 2920 1704 d133481550e0bb90c316990a83090fc283dd7eb31c942cd7eb5824056df2102c.exe 31 PID 2920 wrote to memory of 2864 2920 userinit.exe 32 PID 2920 wrote to memory of 2864 2920 userinit.exe 32 PID 2920 wrote to memory of 2864 2920 userinit.exe 32 PID 2920 wrote to memory of 2864 2920 userinit.exe 32 PID 2864 wrote to memory of 2740 2864 spoolsw.exe 33 PID 2864 wrote to memory of 2740 2864 spoolsw.exe 33 PID 2864 wrote to memory of 2740 2864 spoolsw.exe 33 PID 2864 wrote to memory of 2740 2864 spoolsw.exe 33 PID 2740 wrote to memory of 2916 2740 swchost.exe 34 PID 2740 wrote to memory of 2916 2740 swchost.exe 34 PID 2740 wrote to memory of 2916 2740 swchost.exe 34 PID 2740 wrote to memory of 2916 2740 swchost.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\d133481550e0bb90c316990a83090fc283dd7eb31c942cd7eb5824056df2102c.exe"C:\Users\Admin\AppData\Local\Temp\d133481550e0bb90c316990a83090fc283dd7eb31c942cd7eb5824056df2102c.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1704 -
\??\c:\windows\userinit.exec:\windows\userinit.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2920 -
\??\c:\windows\spoolsw.exec:\windows\spoolsw.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2864 -
\??\c:\windows\swchost.exec:\windows\swchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2740 -
\??\c:\windows\spoolsw.exec:\windows\spoolsw.exe PR5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2916
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
211KB
MD5e351336794abd70adc62d1ea7178d52d
SHA1291ea35baa08761cf1ccf5bf80c6d7caf7cfaccc
SHA2561f231fc321f31576346b3508b6ae55ebecf9a31b25eb55b2bc82413e7680fec7
SHA512f3b310890d784c4c0f2a0f17a83b66451c8ef2ef091d1f59f923b5c70ee677370c378f6454322cdd516b216c2ae77e7a7c01e64be92c7a7661c0af8581899a02
-
Filesize
211KB
MD5500326f62d1b0ab596a5c1f6d43039fe
SHA1e65264b642516a8aedae0672a7c51be910af9d68
SHA256aba9d1001885e04905ccd017461ba1b9fa3618e0582a9f6486ac97d47e646eb4
SHA512a07fe65548d016af998f0abeffeded8743adf34fc10e9f94c37474b1ab6d31e100d4e2fc2df0c4ddac881720780b3d1221cbba8fe7aa35f814b5b895b33bb01e
-
Filesize
211KB
MD5d7f4ae6564791a421ebcd44a7060bc9b
SHA1f32e36b0ceefde1719d6f4188c21cfae958f2cac
SHA2568d106cf5b798fd03f9302ce8dc25abf81529b205ece7d93555854ffe7079af51
SHA5129947b273aec1d8c702dddea984c0f0319665c1499de09a6960667ba5fe1638cc0148ac296db46df4bbbdb9bc5146d67ce1d218570a438c26002f2f207cd745af
-
Filesize
211KB
MD54d923828bcbce4946f15d0ecd9600eb1
SHA1c184e0c80f3045780da10bce462de845ca08f0f3
SHA2566087d30a1436251124521ad20cdeef2ab4f2bbebcdaafa6d1000c18cab7c9f38
SHA5122720a19479cc68eb8d7c3d441eeb845b693ac8299a930da479c06a7d9cc2b1ff0f0c953525442553e00ae9378ec3bb0004353c7be2e6c839f537ef7b4ca583ed