Analysis
-
max time kernel
120s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/10/2024, 21:19
Static task
static1
Behavioral task
behavioral1
Sample
c983dd7341ee70efcddc66491abfa5567c75d562d7990c876fd84dc3ec9dc163N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c983dd7341ee70efcddc66491abfa5567c75d562d7990c876fd84dc3ec9dc163N.exe
Resource
win10v2004-20241007-en
General
-
Target
c983dd7341ee70efcddc66491abfa5567c75d562d7990c876fd84dc3ec9dc163N.exe
-
Size
2.3MB
-
MD5
42f31f98028cfe21c7d37450a4c07200
-
SHA1
b2f96d230aef8e883e843e3f2f46d09855ccd996
-
SHA256
c983dd7341ee70efcddc66491abfa5567c75d562d7990c876fd84dc3ec9dc163
-
SHA512
a7b562a1b0941ff6d98e4bf01f2951d3f0c307ec3eaa0642a732a5acc841eb192214eaa754a81cc0481b1966dbf36da62fb1c52dca2aca39d36223be557fa235
-
SSDEEP
49152:SLHEfWcnLJ6I3BUz8fsK5CdoQmTZMCpylljl:ZXnL73XHdFHpql
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 8 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe -
Executes dropped EXE 4 IoCs
pid Process 1384 explorer.exe 2244 spoolsv.exe 2776 svchost.exe 2844 spoolsv.exe -
Loads dropped DLL 8 IoCs
pid Process 1680 c983dd7341ee70efcddc66491abfa5567c75d562d7990c876fd84dc3ec9dc163N.exe 1680 c983dd7341ee70efcddc66491abfa5567c75d562d7990c876fd84dc3ec9dc163N.exe 1384 explorer.exe 1384 explorer.exe 2244 spoolsv.exe 2244 spoolsv.exe 2776 svchost.exe 2776 svchost.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 31 IoCs
pid Process 1680 c983dd7341ee70efcddc66491abfa5567c75d562d7990c876fd84dc3ec9dc163N.exe 1680 c983dd7341ee70efcddc66491abfa5567c75d562d7990c876fd84dc3ec9dc163N.exe 1384 explorer.exe 2244 spoolsv.exe 2244 spoolsv.exe 2776 svchost.exe 2844 spoolsv.exe 2844 spoolsv.exe 1384 explorer.exe 2776 svchost.exe 1384 explorer.exe 2776 svchost.exe 1384 explorer.exe 2776 svchost.exe 1384 explorer.exe 2776 svchost.exe 1384 explorer.exe 2776 svchost.exe 1384 explorer.exe 2776 svchost.exe 1384 explorer.exe 2776 svchost.exe 1384 explorer.exe 2776 svchost.exe 1384 explorer.exe 2776 svchost.exe 1384 explorer.exe 2776 svchost.exe 1384 explorer.exe 2776 svchost.exe 1384 explorer.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe svchost.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe c983dd7341ee70efcddc66491abfa5567c75d562d7990c876fd84dc3ec9dc163N.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c983dd7341ee70efcddc66491abfa5567c75d562d7990c876fd84dc3ec9dc163N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1680 c983dd7341ee70efcddc66491abfa5567c75d562d7990c876fd84dc3ec9dc163N.exe 1384 explorer.exe 1384 explorer.exe 1384 explorer.exe 1384 explorer.exe 1384 explorer.exe 2776 svchost.exe 2776 svchost.exe 2776 svchost.exe 1384 explorer.exe 1384 explorer.exe 2776 svchost.exe 1384 explorer.exe 2776 svchost.exe 1384 explorer.exe 2776 svchost.exe 1384 explorer.exe 2776 svchost.exe 1384 explorer.exe 2776 svchost.exe 2776 svchost.exe 1384 explorer.exe 1384 explorer.exe 2776 svchost.exe 2776 svchost.exe 1384 explorer.exe 1384 explorer.exe 2776 svchost.exe 2776 svchost.exe 1384 explorer.exe 1384 explorer.exe 2776 svchost.exe 1384 explorer.exe 2776 svchost.exe 1384 explorer.exe 2776 svchost.exe 2776 svchost.exe 1384 explorer.exe 1384 explorer.exe 2776 svchost.exe 2776 svchost.exe 1384 explorer.exe 2776 svchost.exe 1384 explorer.exe 1384 explorer.exe 2776 svchost.exe 2776 svchost.exe 1384 explorer.exe 2776 svchost.exe 1384 explorer.exe 2776 svchost.exe 1384 explorer.exe 2776 svchost.exe 1384 explorer.exe 2776 svchost.exe 1384 explorer.exe 2776 svchost.exe 1384 explorer.exe 2776 svchost.exe 1384 explorer.exe 2776 svchost.exe 1384 explorer.exe 2776 svchost.exe 1384 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 1384 explorer.exe 2776 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1680 c983dd7341ee70efcddc66491abfa5567c75d562d7990c876fd84dc3ec9dc163N.exe 1680 c983dd7341ee70efcddc66491abfa5567c75d562d7990c876fd84dc3ec9dc163N.exe 1384 explorer.exe 1384 explorer.exe 2244 spoolsv.exe 2244 spoolsv.exe 2776 svchost.exe 2776 svchost.exe 2844 spoolsv.exe 2844 spoolsv.exe 1384 explorer.exe 1384 explorer.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1680 wrote to memory of 1384 1680 c983dd7341ee70efcddc66491abfa5567c75d562d7990c876fd84dc3ec9dc163N.exe 30 PID 1680 wrote to memory of 1384 1680 c983dd7341ee70efcddc66491abfa5567c75d562d7990c876fd84dc3ec9dc163N.exe 30 PID 1680 wrote to memory of 1384 1680 c983dd7341ee70efcddc66491abfa5567c75d562d7990c876fd84dc3ec9dc163N.exe 30 PID 1680 wrote to memory of 1384 1680 c983dd7341ee70efcddc66491abfa5567c75d562d7990c876fd84dc3ec9dc163N.exe 30 PID 1384 wrote to memory of 2244 1384 explorer.exe 31 PID 1384 wrote to memory of 2244 1384 explorer.exe 31 PID 1384 wrote to memory of 2244 1384 explorer.exe 31 PID 1384 wrote to memory of 2244 1384 explorer.exe 31 PID 2244 wrote to memory of 2776 2244 spoolsv.exe 32 PID 2244 wrote to memory of 2776 2244 spoolsv.exe 32 PID 2244 wrote to memory of 2776 2244 spoolsv.exe 32 PID 2244 wrote to memory of 2776 2244 spoolsv.exe 32 PID 2776 wrote to memory of 2844 2776 svchost.exe 33 PID 2776 wrote to memory of 2844 2776 svchost.exe 33 PID 2776 wrote to memory of 2844 2776 svchost.exe 33 PID 2776 wrote to memory of 2844 2776 svchost.exe 33 PID 2776 wrote to memory of 2680 2776 svchost.exe 34 PID 2776 wrote to memory of 2680 2776 svchost.exe 34 PID 2776 wrote to memory of 2680 2776 svchost.exe 34 PID 2776 wrote to memory of 2680 2776 svchost.exe 34 PID 2776 wrote to memory of 1076 2776 svchost.exe 37 PID 2776 wrote to memory of 1076 2776 svchost.exe 37 PID 2776 wrote to memory of 1076 2776 svchost.exe 37 PID 2776 wrote to memory of 1076 2776 svchost.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\c983dd7341ee70efcddc66491abfa5567c75d562d7990c876fd84dc3ec9dc163N.exe"C:\Users\Admin\AppData\Local\Temp\c983dd7341ee70efcddc66491abfa5567c75d562d7990c876fd84dc3ec9dc163N.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1680 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1384 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2244 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2776 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2844
-
-
C:\Windows\SysWOW64\at.exeat 21:21 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:2680
-
-
C:\Windows\SysWOW64\at.exeat 21:22 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:1076
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.3MB
MD5488912527ffe35a42823f1751192dbe1
SHA163751d9e17787d575126b72d99efbb6c74558b68
SHA256a289fa7720261fc93925ac287f0f086c39d0c5152c35bafefd8177d333fe370d
SHA51244a6e1ad253e639573d18d7e48842e1b30032992e31aa7c85a4c47d2f752043dda4c48b5b58fdab1b4fc45992db20c072e9fab7a91d4b82c3ca95fd840efd0a7
-
Filesize
2.3MB
MD5e20ad8a68cb05ada6869deb89dd92169
SHA1d5605c43ff4f544ab6171f8ab334d5a866f238a4
SHA256199157faf5857831446accb2e2172a4edb31fe6ad6e31a65838d7c85201fb3c4
SHA5120554d2d83bf79be04db874c454e0471a3fb90b12ac9c99a5c9d7d3db72b6ca612cc839e073691023dedfba422fcd9b2ed7f6ec57f89552c10a9251c528da4804
-
Filesize
2.3MB
MD56f730f5471daff4dddc8504e08c103d9
SHA1ee3e0bafe9872ab83745224f7f7e76334283eb91
SHA2564770dbe7cdc7caa135bd3f5c7f39a9cda45078a14ca9ecd7e22fdd278c3aa06f
SHA51235a3704f85c6e4ad45cfd02bc7a9f6508e364c44d15cae237d29087f298ef099cc310952ad081a690692c32176b4969bf905875ab2dbddef6fe3674e53752c90
-
Filesize
2.3MB
MD5417914e5cfdb7f9d3c14164373eaac94
SHA1d2b5470ece4777447ca79d459283dd0a1300fc62
SHA25680b43e678f144b3cda4a1c42549c0079d8dd9b5723c091f3af956f431b57aa62
SHA51212bc1c0d0383a2bc6a9a4b6ee6530f8dc7c95f64d92ceb1838dba9ad2aa64d6ba9a4930d78bb5adf18036938001bd542cd175f5a40ac3327c319f9b7aa5300b5