Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/10/2024, 15:03

General

  • Target

    f4405fa918850cfa4e850aa24e0db1540fc4434a37eb54a4a9adbfae3af2a549N.exe

  • Size

    481KB

  • MD5

    db71037290b469775402cdab66412680

  • SHA1

    b98cc48f9dd47d66a6b3c04af6037d6ec5e99678

  • SHA256

    f4405fa918850cfa4e850aa24e0db1540fc4434a37eb54a4a9adbfae3af2a549

  • SHA512

    0ed26e3f3ce703549e15a87c74a1df199c20864ee3ebfba235a548a4bd9034409603bf89a0545d6adaa928f97f7ad1974dd719930c9a6a626b329d7574211f45

  • SSDEEP

    12288:8ENN+T5xYrllrU7QY6RymN80DULxfAxRd:45xolYQY6RyyDWxIxb

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 8 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f4405fa918850cfa4e850aa24e0db1540fc4434a37eb54a4a9adbfae3af2a549N.exe
    "C:\Users\Admin\AppData\Local\Temp\f4405fa918850cfa4e850aa24e0db1540fc4434a37eb54a4a9adbfae3af2a549N.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3716
    • \??\c:\windows\system\explorer.exe
      c:\windows\system\explorer.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visiblity of hidden/system files in Explorer
      • Boot or Logon Autostart Execution: Active Setup
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3364
      • \??\c:\windows\system\spoolsv.exe
        c:\windows\system\spoolsv.exe SE
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3436
        • \??\c:\windows\system\svchost.exe
          c:\windows\system\svchost.exe
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visiblity of hidden/system files in Explorer
          • Boot or Logon Autostart Execution: Active Setup
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2788
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe PR
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            PID:4288
          • C:\Windows\SysWOW64\at.exe
            at 15:05 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
            5⤵
            • System Location Discovery: System Language Discovery
            PID:5016
          • C:\Windows\SysWOW64\at.exe
            at 15:06 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
            5⤵
            • System Location Discovery: System Language Discovery
            PID:2036
          • C:\Windows\SysWOW64\at.exe
            at 15:07 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
            5⤵
            • System Location Discovery: System Language Discovery
            PID:1272

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\mrsys.exe

          Filesize

          481KB

          MD5

          32bd1216d8dc24240db9fc1be19f7e1f

          SHA1

          c4c0a659acf38afbd471f0c614213b9f301769b3

          SHA256

          b19227c4055ffc95517feedc21f2e234dd783094cbbeeb21b669f6f180e7fc52

          SHA512

          38bf9bfcd09ad070e1cf9bb32f88858a98391adce0a6df12723d5ce5c055a3b8d9dfaf3c53c9d0be0f9d7812374e5ce332a289dcf9262ee5800e11531067b3ba

        • C:\Windows\System\explorer.exe

          Filesize

          481KB

          MD5

          dfea2c3af2b2bd63e912d33317c891fc

          SHA1

          af08579b8f07237441542f94c389ec2f8fcd3237

          SHA256

          6031de78693aed2cdaf04437bee8d21e940e372173ad2a59f1df3d73779119ce

          SHA512

          05bda33d680f4503af8261de2e703615de0e9fba6960e8d54fb9e377e403a5ec322824a913eb84485db70b503aad55271726ca80df0537a923107984f213f6a6

        • C:\Windows\System\spoolsv.exe

          Filesize

          481KB

          MD5

          2384a64969fa496225bbb8849985bf6f

          SHA1

          3ea3f58d5894b98d88ece9c2deaabebd471dd6ee

          SHA256

          4c5b21211a48e212e07131ee8895b5211348dba477ba6d1687ed38ab35454913

          SHA512

          63ee36c7a39a34a401b3699c7dfdb3686cd560a93836c4aabebe951235c66f7ee6ed65d54399c946a8d0d8cf3cc55636f8c0aa88c4074b781502d5efade8d554

        • C:\Windows\System\svchost.exe

          Filesize

          481KB

          MD5

          68469f892755a92e6bb18adeadc3c355

          SHA1

          7b5b0ed1f2732c5e62f56044ec4f3ee072297059

          SHA256

          5bd7ed2836130b5193b154ef4770939dfd7811b0687493be9aa2c9b276209b68

          SHA512

          21dddeee916a2664f285fe9df39a8c242f70ce4a3efa5c7f8ee6f4cfbbfa0ad303912163795a6e06f51bec0c97a06b596885ac4a77c4ff606afb6ad2193b5ffd