Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-11-2024 21:16

General

  • Target

    2a1274a40d58767f3caabf866c034d00fa8c764c5aac8a11b15b8712f51fa32f.exe

  • Size

    206KB

  • MD5

    28458738ba1c9a40fc2a2d52ed94ea6d

  • SHA1

    2cee0297a1575c9b149fb94d9082abe084266983

  • SHA256

    2a1274a40d58767f3caabf866c034d00fa8c764c5aac8a11b15b8712f51fa32f

  • SHA512

    a903141ab0d994c02a3e822c95a12eef01bfcdbacf21c8e43e766145f5d14366c622f924ab6d8fb8597caccb5d3b5db35daf873f1c1d4483cd2efd91f57f686e

  • SSDEEP

    3072:zvEfVUzSLhIVbV6i5LirrlZrHyrUHUckoMQ2RN6un1:zvEN2U+T6i5LirrllHy4HUcMQY6i

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 8 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2a1274a40d58767f3caabf866c034d00fa8c764c5aac8a11b15b8712f51fa32f.exe
    "C:\Users\Admin\AppData\Local\Temp\2a1274a40d58767f3caabf866c034d00fa8c764c5aac8a11b15b8712f51fa32f.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4892
    • \??\c:\windows\system\explorer.exe
      c:\windows\system\explorer.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visiblity of hidden/system files in Explorer
      • Boot or Logon Autostart Execution: Active Setup
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2816
      • \??\c:\windows\system\spoolsv.exe
        c:\windows\system\spoolsv.exe SE
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:5056
        • \??\c:\windows\system\svchost.exe
          c:\windows\system\svchost.exe
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visiblity of hidden/system files in Explorer
          • Boot or Logon Autostart Execution: Active Setup
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2676
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe PR
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            PID:2552
          • C:\Windows\SysWOW64\at.exe
            at 21:18 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
            5⤵
            • System Location Discovery: System Language Discovery
            PID:5096
          • C:\Windows\SysWOW64\at.exe
            at 21:19 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
            5⤵
            • System Location Discovery: System Language Discovery
            PID:4112
          • C:\Windows\SysWOW64\at.exe
            at 21:20 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
            5⤵
            • System Location Discovery: System Language Discovery
            PID:2572

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\mrsys.exe

    Filesize

    207KB

    MD5

    0c024de2ba8088e0cd11516d90ca0795

    SHA1

    bca17fec782b13f6372ed4f39f2aa1591b1a1bf3

    SHA256

    f7ba73641e9703e45389b791f3cb655ee3f72aba895880a8f85325df4312ac1f

    SHA512

    411175c029fb51fac708836c44ef7cb038e6d1d2c81732f72d5210572c8503a28aadf1f9d2cf5a02bda6189526a596e1acff9d36c4116a093a87484e1cbb0561

  • C:\Windows\System\explorer.exe

    Filesize

    206KB

    MD5

    0d17ecdf3302096010a112c89ca402fb

    SHA1

    e50004aee86925cd8db968a3866422c4b3c44c3d

    SHA256

    73954b3b4dacc4c564e330674c2f7a7d9e6e1ce24391df9a49cf41a6eaef1e1b

    SHA512

    72adcaa884d6b5ac8008b100e5012bc639fe23f7d87bab5f12784ab5744a886a097edc79558bf297e63f864e36f5c1125148182f26263e2de6d99e1ed8dd6e16

  • C:\Windows\System\spoolsv.exe

    Filesize

    206KB

    MD5

    051d3ee48a337de2559eee498c7f4dd0

    SHA1

    d0be8a6dee97fa94b0a908f5fdd9c990a836aa6b

    SHA256

    4fe799ce5dd3c51978517b0ade1743228eba181cb274556e70a9b110d0a52f12

    SHA512

    3f13f3781a3a6b8e723df7e3c3f2a304128bc6e84abfec20c492b01bb1d84b3dfbcaf5a65a0dbf9a836221c30c84c42e163fd0869a47a59042491c785b39d937

  • C:\Windows\System\svchost.exe

    Filesize

    206KB

    MD5

    2a5eeb00b54b69bab3571467e52c1960

    SHA1

    c2034cb53f3614c158ae073c396298f3168cc873

    SHA256

    63dfc18c0eb855e9d8ed66c9e7294bdd3fbee35cd33219d2d33c101f654d57c0

    SHA512

    e056bc0c92dc934b047dac61df76838ca590bfe3e8e8a461f15c89fa1c65f9a97f2f383af96e228b6a0980d01cca789012e089f69109c7b7e6d221c504158394