Analysis
-
max time kernel
150s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-11-2024 21:44
Static task
static1
Behavioral task
behavioral1
Sample
351565b5605e02bbc53b6b299c1e3eae5eb6340f9d6582674600cc561a16eb36.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
351565b5605e02bbc53b6b299c1e3eae5eb6340f9d6582674600cc561a16eb36.exe
Resource
win10v2004-20241007-en
General
-
Target
351565b5605e02bbc53b6b299c1e3eae5eb6340f9d6582674600cc561a16eb36.exe
-
Size
67KB
-
MD5
4851fb73dd894ee82629bc373f8697b3
-
SHA1
93599608bfe3fdf39b98d854a307b927ef59b5ff
-
SHA256
351565b5605e02bbc53b6b299c1e3eae5eb6340f9d6582674600cc561a16eb36
-
SHA512
c672f1b2f84ad26a7ba27b59b741e15e476588cc09ac711b4b5c280c567150a1c8de3854903d29da80000918d5831598d1a7fcab565748bfa611b0eb7886ee2e
-
SSDEEP
1536:EgXsfgWQN1kYsRxWTg3PwSWe991Rdolpdz6JAkA4lllllllllllllllllllllllp:1tWYfGATvPe9slp+ApK
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
Processes:
explorer.exesvchost.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
Processes:
svchost.exeexplorer.exedescription ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 8 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
Processes:
svchost.exeexplorer.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe -
Executes dropped EXE 4 IoCs
Processes:
explorer.exespoolsv.exesvchost.exespoolsv.exepid Process 1896 explorer.exe 4440 spoolsv.exe 2968 svchost.exe 2280 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
explorer.exesvchost.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe -
Drops file in Windows directory 6 IoCs
Processes:
spoolsv.exeexplorer.exesvchost.exe351565b5605e02bbc53b6b299c1e3eae5eb6340f9d6582674600cc561a16eb36.exedescription ioc Process File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe svchost.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe 351565b5605e02bbc53b6b299c1e3eae5eb6340f9d6582674600cc561a16eb36.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
351565b5605e02bbc53b6b299c1e3eae5eb6340f9d6582674600cc561a16eb36.exeexplorer.exespoolsv.exesvchost.exespoolsv.exeat.exeat.exeat.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 351565b5605e02bbc53b6b299c1e3eae5eb6340f9d6582674600cc561a16eb36.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
351565b5605e02bbc53b6b299c1e3eae5eb6340f9d6582674600cc561a16eb36.exeexplorer.exesvchost.exepid Process 3052 351565b5605e02bbc53b6b299c1e3eae5eb6340f9d6582674600cc561a16eb36.exe 3052 351565b5605e02bbc53b6b299c1e3eae5eb6340f9d6582674600cc561a16eb36.exe 1896 explorer.exe 1896 explorer.exe 1896 explorer.exe 1896 explorer.exe 1896 explorer.exe 1896 explorer.exe 2968 svchost.exe 2968 svchost.exe 2968 svchost.exe 2968 svchost.exe 1896 explorer.exe 1896 explorer.exe 2968 svchost.exe 2968 svchost.exe 1896 explorer.exe 1896 explorer.exe 2968 svchost.exe 2968 svchost.exe 1896 explorer.exe 1896 explorer.exe 2968 svchost.exe 2968 svchost.exe 1896 explorer.exe 1896 explorer.exe 2968 svchost.exe 2968 svchost.exe 2968 svchost.exe 1896 explorer.exe 1896 explorer.exe 2968 svchost.exe 1896 explorer.exe 2968 svchost.exe 1896 explorer.exe 2968 svchost.exe 2968 svchost.exe 2968 svchost.exe 1896 explorer.exe 1896 explorer.exe 2968 svchost.exe 1896 explorer.exe 1896 explorer.exe 2968 svchost.exe 2968 svchost.exe 1896 explorer.exe 1896 explorer.exe 2968 svchost.exe 2968 svchost.exe 1896 explorer.exe 1896 explorer.exe 2968 svchost.exe 2968 svchost.exe 2968 svchost.exe 1896 explorer.exe 1896 explorer.exe 1896 explorer.exe 2968 svchost.exe 1896 explorer.exe 2968 svchost.exe 2968 svchost.exe 1896 explorer.exe 1896 explorer.exe 2968 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
explorer.exesvchost.exepid Process 1896 explorer.exe 2968 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
Processes:
351565b5605e02bbc53b6b299c1e3eae5eb6340f9d6582674600cc561a16eb36.exeexplorer.exespoolsv.exesvchost.exespoolsv.exepid Process 3052 351565b5605e02bbc53b6b299c1e3eae5eb6340f9d6582674600cc561a16eb36.exe 3052 351565b5605e02bbc53b6b299c1e3eae5eb6340f9d6582674600cc561a16eb36.exe 1896 explorer.exe 1896 explorer.exe 4440 spoolsv.exe 4440 spoolsv.exe 2968 svchost.exe 2968 svchost.exe 2280 spoolsv.exe 2280 spoolsv.exe 1896 explorer.exe 1896 explorer.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
351565b5605e02bbc53b6b299c1e3eae5eb6340f9d6582674600cc561a16eb36.exeexplorer.exespoolsv.exesvchost.exedescription pid Process procid_target PID 3052 wrote to memory of 1896 3052 351565b5605e02bbc53b6b299c1e3eae5eb6340f9d6582674600cc561a16eb36.exe 83 PID 3052 wrote to memory of 1896 3052 351565b5605e02bbc53b6b299c1e3eae5eb6340f9d6582674600cc561a16eb36.exe 83 PID 3052 wrote to memory of 1896 3052 351565b5605e02bbc53b6b299c1e3eae5eb6340f9d6582674600cc561a16eb36.exe 83 PID 1896 wrote to memory of 4440 1896 explorer.exe 84 PID 1896 wrote to memory of 4440 1896 explorer.exe 84 PID 1896 wrote to memory of 4440 1896 explorer.exe 84 PID 4440 wrote to memory of 2968 4440 spoolsv.exe 85 PID 4440 wrote to memory of 2968 4440 spoolsv.exe 85 PID 4440 wrote to memory of 2968 4440 spoolsv.exe 85 PID 2968 wrote to memory of 2280 2968 svchost.exe 86 PID 2968 wrote to memory of 2280 2968 svchost.exe 86 PID 2968 wrote to memory of 2280 2968 svchost.exe 86 PID 2968 wrote to memory of 2892 2968 svchost.exe 87 PID 2968 wrote to memory of 2892 2968 svchost.exe 87 PID 2968 wrote to memory of 2892 2968 svchost.exe 87 PID 2968 wrote to memory of 1036 2968 svchost.exe 105 PID 2968 wrote to memory of 1036 2968 svchost.exe 105 PID 2968 wrote to memory of 1036 2968 svchost.exe 105 PID 2968 wrote to memory of 4180 2968 svchost.exe 107 PID 2968 wrote to memory of 4180 2968 svchost.exe 107 PID 2968 wrote to memory of 4180 2968 svchost.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\351565b5605e02bbc53b6b299c1e3eae5eb6340f9d6582674600cc561a16eb36.exe"C:\Users\Admin\AppData\Local\Temp\351565b5605e02bbc53b6b299c1e3eae5eb6340f9d6582674600cc561a16eb36.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3052 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1896 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4440 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2968 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2280
-
-
C:\Windows\SysWOW64\at.exeat 21:46 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:2892
-
-
C:\Windows\SysWOW64\at.exeat 21:47 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:1036
-
-
C:\Windows\SysWOW64\at.exeat 21:48 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:4180
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5fe725ca9cb014b89667c95d0b0a3928b
SHA1fc5b313618a5b1ce63d9e8041c3b4043234a1702
SHA25639930ec4b373def7b02fec36729cf2d7498dd1e158b237c99d0ca19ffbc9a3e5
SHA5120a2560b5c8376da1744ec66290e6444ca3bf97a1566c6b46efdc4b74ee7a1aea9730395ae0a2e76c0593ddd1fc64858950d52e6f0f6903b52a3ba321c11f0fea
-
Filesize
67KB
MD5cf6a061ba837895468ecfd74f6dad25b
SHA16a0764677ae8f148ed5558a8995aab964387dd7f
SHA2565c70f586efba87704909071281022f232943b755c0994a3b7752aecbb194aaf9
SHA5124295d762f5eaa7368562717d124bd3e63be8ec66dd494957f1d82137c6c9fa915ec65578816e35ec8daa1b79a9d66aeacedd9b4bbd14c82f58e475b94c407b23
-
Filesize
67KB
MD5678d4b7d0c3cb46c855ea9c04b85248d
SHA183991d98846366e03f5641751ff254626ddaa9ea
SHA2560b0c99af6b94e8314f49f4dd152e6f31efa90c2410f85290a8ffeb5205be8256
SHA512154d2a3229ceb575b96c5bbe0d5ae7d9bd2525618e2ff72c1695e534a25d425e5f6cbff6f65cbd034121cb82677f7da3989113a48ea0abb5260c3a375ecf0754
-
Filesize
67KB
MD5996eb5b06cffc52a270088e1763d13d0
SHA1b673f704c2146f8b05f867fd070b4162e11248d1
SHA256ea0b6387afacd9c63486039033dfab5eb33d93f96c14e8b465a011d9a6cda94f
SHA512b10c26fd20ef77768c5f461ef9e9ad579fbde6cddc1e75ec965e9ca32bcb2e929e40a215eb5f03d83257f6692f4814a738b3f85b902f85bdf9806395c4a67408