Analysis

  • max time kernel
    150s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    02/10/2024, 02:11

General

  • Target

    d72d2f0e6154799277900b2290c0c853cb37a2e0d6464492d6ec928c3c770811N.exe

  • Size

    211KB

  • MD5

    7b1a668eb5c6d16ed9c06e6d7b5fcb40

  • SHA1

    861076702455b7207cd93d36f7911fad16a56f89

  • SHA256

    d72d2f0e6154799277900b2290c0c853cb37a2e0d6464492d6ec928c3c770811

  • SHA512

    62441c1433b1b4977987f3498144a5634900333f0a599698e7323f5010169c8e9c38fcda9fd16940f40abc42baac59cf75bd331343dfdd5dc1b07aa5c4400ee5

  • SSDEEP

    3072:WD6Xtx68yygRBE52mxkEOHLRMpZ4deth8PEAjAfIbAYGPhz6sPJBInxZqOf:Wh8cBzHLRMpZ4d1Zf

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 8 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d72d2f0e6154799277900b2290c0c853cb37a2e0d6464492d6ec928c3c770811N.exe
    "C:\Users\Admin\AppData\Local\Temp\d72d2f0e6154799277900b2290c0c853cb37a2e0d6464492d6ec928c3c770811N.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2336
    • \??\c:\windows\userinit.exe
      c:\windows\userinit.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visiblity of hidden/system files in Explorer
      • Boot or Logon Autostart Execution: Active Setup
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2192
      • \??\c:\windows\spoolsw.exe
        c:\windows\spoolsw.exe SE
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1484
        • \??\c:\windows\swchost.exe
          c:\windows\swchost.exe
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visiblity of hidden/system files in Explorer
          • Boot or Logon Autostart Execution: Active Setup
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2732
          • \??\c:\windows\spoolsw.exe
            c:\windows\spoolsw.exe PR
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            PID:2868

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\mrsys.exe

    Filesize

    211KB

    MD5

    c9c4827dc7c8544a0e3a81b41bf02dbe

    SHA1

    ab7143b81c2c3dce64a25612e54301673f863994

    SHA256

    a7a6e0b335cf18ad0ee8e2129f4c7e6d1f096e662146baa254106512d24d1e3d

    SHA512

    a878ecb1ddec8cb4191d0b0d36ea834fb178f39d8f471b5ce2a574f059a39e438d43c9a8b2bef338fcce62ba21a26739cff0e54bdc01ccff5aaa3238f3c47cfd

  • C:\Windows\spoolsw.exe

    Filesize

    211KB

    MD5

    b0b675a8de08d76b5b550d5225050b61

    SHA1

    8f87b3ac2e3ec6e9c7a32e1290b81c0de3803ba0

    SHA256

    4d09ef6a23ca4413241534684239f96c6f9c1865aaddcca18dd14e7836d8f6d5

    SHA512

    f3aead0f0eea7b76a9c145efe4d0321d30928b596991b74c4cfa045cff6173463887dbe09328cc756d11603852beda0b2351584211ecf4ac8bec6e4887ee1591

  • C:\Windows\swchost.exe

    Filesize

    211KB

    MD5

    64ca66395f5861d0fec54628b5c3d0bf

    SHA1

    966f3cd3fac34f82f0d1b1e6e656f39ace436401

    SHA256

    e25104400fd19ab4386b124f30232ddb64f4ce5df2c6f073f3f9b5d38fd57042

    SHA512

    72b8d742b635fa2ebea69b84f92bdbf8fe9ec27e758d7cade8f5508fa3a005201bc78497aa46ac3fbe6db50da41bdc690363470196b833f2ca225e880e526f19

  • C:\Windows\userinit.exe

    Filesize

    211KB

    MD5

    c226be46d9945a5e4449fcef69a85c2b

    SHA1

    bb234e0ae527fcfdb32bd82a1fa6b700117ec481

    SHA256

    84b3ddecfe525e141999d4441a3b5ea48953ef5de591825941e46e729c8cb054

    SHA512

    bfcf7861a9d7803e4c4f90e3d65adbf637e15605c0d4bdd0f2d3cb848e8258f7a05603a9ace5adb2f4899c806d33731d56716a249ae02c42d620a77a9f085673

  • memory/1484-49-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/1484-35-0x0000000002440000-0x0000000002470000-memory.dmp

    Filesize

    192KB

  • memory/2192-14-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/2192-52-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/2192-24-0x0000000002460000-0x0000000002490000-memory.dmp

    Filesize

    192KB

  • memory/2336-12-0x0000000002500000-0x0000000002530000-memory.dmp

    Filesize

    192KB

  • memory/2336-50-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/2336-0-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/2732-40-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/2732-53-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/2868-46-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB