Analysis
-
max time kernel
60s -
max time network
33s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03-10-2024 19:51
Behavioral task
behavioral1
Sample
7ce9c99c25a62d800985ef253f15a723b92e090d7e4d28769ec2848ff7fb844b.exe
Resource
win7-20240903-en
General
-
Target
7ce9c99c25a62d800985ef253f15a723b92e090d7e4d28769ec2848ff7fb844b.exe
-
Size
2.2MB
-
MD5
55004fc96bffbf7f6247d1b39cdd04c1
-
SHA1
543ff6bc399574efdbfe5fba1998699f40ec6ee9
-
SHA256
7ce9c99c25a62d800985ef253f15a723b92e090d7e4d28769ec2848ff7fb844b
-
SHA512
b2db4e7607b11d9817c28902e512eab73e205a7e485cf12631a2804396f0ac72149dfea7d340612096cc942bbee59ece9c7e5d33607dad496770d8c519808a1b
-
SSDEEP
24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZj:0UzeyQMS4DqodCnoe+iitjWww/
Malware Config
Extracted
pony
http://don.service-master.eu/gate.php
-
payload_url
http://don.service-master.eu/shit.exe
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\7ce9c99c25a62d800985ef253f15a723b92e090d7e4d28769ec2848ff7fb844b.exe 7ce9c99c25a62d800985ef253f15a723b92e090d7e4d28769ec2848ff7fb844b.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\7ce9c99c25a62d800985ef253f15a723b92e090d7e4d28769ec2848ff7fb844b.exe 7ce9c99c25a62d800985ef253f15a723b92e090d7e4d28769ec2848ff7fb844b.exe -
Executes dropped EXE 5 IoCs
pid Process 2052 explorer.exe 5100 explorer.exe 3916 spoolsv.exe 1916 spoolsv.exe 4708 spoolsv.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4836 set thread context of 3596 4836 7ce9c99c25a62d800985ef253f15a723b92e090d7e4d28769ec2848ff7fb844b.exe 91 PID 2052 set thread context of 5100 2052 explorer.exe 95 -
Drops file in Windows directory 7 IoCs
description ioc Process File opened for modification C:\Windows\Parameters.ini 7ce9c99c25a62d800985ef253f15a723b92e090d7e4d28769ec2848ff7fb844b.exe File opened for modification \??\c:\windows\system\explorer.exe 7ce9c99c25a62d800985ef253f15a723b92e090d7e4d28769ec2848ff7fb844b.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7ce9c99c25a62d800985ef253f15a723b92e090d7e4d28769ec2848ff7fb844b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7ce9c99c25a62d800985ef253f15a723b92e090d7e4d28769ec2848ff7fb844b.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3596 7ce9c99c25a62d800985ef253f15a723b92e090d7e4d28769ec2848ff7fb844b.exe 3596 7ce9c99c25a62d800985ef253f15a723b92e090d7e4d28769ec2848ff7fb844b.exe 5100 explorer.exe 5100 explorer.exe 5100 explorer.exe 5100 explorer.exe 5100 explorer.exe 5100 explorer.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3596 7ce9c99c25a62d800985ef253f15a723b92e090d7e4d28769ec2848ff7fb844b.exe 3596 7ce9c99c25a62d800985ef253f15a723b92e090d7e4d28769ec2848ff7fb844b.exe 5100 explorer.exe 5100 explorer.exe 5100 explorer.exe 5100 explorer.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 4836 wrote to memory of 4556 4836 7ce9c99c25a62d800985ef253f15a723b92e090d7e4d28769ec2848ff7fb844b.exe 82 PID 4836 wrote to memory of 4556 4836 7ce9c99c25a62d800985ef253f15a723b92e090d7e4d28769ec2848ff7fb844b.exe 82 PID 4836 wrote to memory of 3596 4836 7ce9c99c25a62d800985ef253f15a723b92e090d7e4d28769ec2848ff7fb844b.exe 91 PID 4836 wrote to memory of 3596 4836 7ce9c99c25a62d800985ef253f15a723b92e090d7e4d28769ec2848ff7fb844b.exe 91 PID 4836 wrote to memory of 3596 4836 7ce9c99c25a62d800985ef253f15a723b92e090d7e4d28769ec2848ff7fb844b.exe 91 PID 4836 wrote to memory of 3596 4836 7ce9c99c25a62d800985ef253f15a723b92e090d7e4d28769ec2848ff7fb844b.exe 91 PID 4836 wrote to memory of 3596 4836 7ce9c99c25a62d800985ef253f15a723b92e090d7e4d28769ec2848ff7fb844b.exe 91 PID 3596 wrote to memory of 2052 3596 7ce9c99c25a62d800985ef253f15a723b92e090d7e4d28769ec2848ff7fb844b.exe 92 PID 3596 wrote to memory of 2052 3596 7ce9c99c25a62d800985ef253f15a723b92e090d7e4d28769ec2848ff7fb844b.exe 92 PID 3596 wrote to memory of 2052 3596 7ce9c99c25a62d800985ef253f15a723b92e090d7e4d28769ec2848ff7fb844b.exe 92 PID 2052 wrote to memory of 5100 2052 explorer.exe 95 PID 2052 wrote to memory of 5100 2052 explorer.exe 95 PID 2052 wrote to memory of 5100 2052 explorer.exe 95 PID 2052 wrote to memory of 5100 2052 explorer.exe 95 PID 2052 wrote to memory of 5100 2052 explorer.exe 95 PID 5100 wrote to memory of 3916 5100 explorer.exe 96 PID 5100 wrote to memory of 3916 5100 explorer.exe 96 PID 5100 wrote to memory of 3916 5100 explorer.exe 96 PID 5100 wrote to memory of 1916 5100 explorer.exe 97 PID 5100 wrote to memory of 1916 5100 explorer.exe 97 PID 5100 wrote to memory of 1916 5100 explorer.exe 97 PID 5100 wrote to memory of 4708 5100 explorer.exe 98 PID 5100 wrote to memory of 4708 5100 explorer.exe 98 PID 5100 wrote to memory of 4708 5100 explorer.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\7ce9c99c25a62d800985ef253f15a723b92e090d7e4d28769ec2848ff7fb844b.exe"C:\Users\Admin\AppData\Local\Temp\7ce9c99c25a62d800985ef253f15a723b92e090d7e4d28769ec2848ff7fb844b.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4836 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:4556
-
-
C:\Users\Admin\AppData\Local\Temp\7ce9c99c25a62d800985ef253f15a723b92e090d7e4d28769ec2848ff7fb844b.exe"C:\Users\Admin\AppData\Local\Temp\7ce9c99c25a62d800985ef253f15a723b92e090d7e4d28769ec2848ff7fb844b.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3596 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2052 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5100 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3916
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1916
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4708
-
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:1420
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74B
MD56687785d6a31cdf9a5f80acb3abc459b
SHA11ddda26cc18189770eaaa4a9e78cc4abe4fe39c9
SHA2563b5ebe1c6d4d33c14e5f2ca735fc085759f47895ea90192999a22a035c7edc9b
SHA5125fe9429d64ee6fe0d3698cabb39757729b48d525500afa5f073d69f14f791c8aa2bc7ce0467d48d66fc58d894983391022c59035fa67703fefd309ec4a5d9962
-
Filesize
2.2MB
MD57d161f6378d286c69b4544c5b7cc1bbd
SHA159e40af8ce127ca52e4b2b53a09c8cfa121fc17b
SHA2569a6b3586270f884cec6b2d6d5115fa2c59970b149c0ac0f9fe89716555b9f4d3
SHA512aac5d2533f076d03438ebc87c28ecb2951bcda1c170bb53648e5304f96bd131840b9bc262bef515e02be7cc4afc720f7b4a840bff2b3fcc2498a049ba78175f3
-
Filesize
2.2MB
MD52ca18dc23c64a7723aadfda2b078f98c
SHA1b049743ab42e459c3752d9450dfc28b781566849
SHA25633f8a5cd2eba31cee1413c32edbf7a24e8cd12c9259492868c4f2be55a2fa6f0
SHA512d02bf5173b664002ebd09bc9bfad4f809f8846b1b8402494d9b81651f998dbeec56d0c06f187d0f50420ea1f095d6b76f94c4471d41828a7ec90d8b619b6153c