Analysis

  • max time kernel
    150s
  • max time network
    134s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-11-2024 00:49

General

  • Target

    8234f60cfbfae39174415f9d4abbfc21453f9f31e5548f13636ea9faa0b67820.exe

  • Size

    206KB

  • MD5

    6866f46c7116c1edc78a09acb11e0e77

  • SHA1

    e2d6836eb5a222a1087d463094140808758e2718

  • SHA256

    8234f60cfbfae39174415f9d4abbfc21453f9f31e5548f13636ea9faa0b67820

  • SHA512

    353533dcafe8196ee4fc751f5d4bc28fa23ea6318b809ec6aee74bbd462c9f1434b3b14ab00e608d9eb8be9772701b1b8e1525819c41f670e1a303b76e140e0d

  • SSDEEP

    3072:5vEfVUzSLhIVbV6i5LirrlZrHyrUHUckoMQ2RN6unv:5vEN2U+T6i5LirrllHy4HUcMQY6E

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 8 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8234f60cfbfae39174415f9d4abbfc21453f9f31e5548f13636ea9faa0b67820.exe
    "C:\Users\Admin\AppData\Local\Temp\8234f60cfbfae39174415f9d4abbfc21453f9f31e5548f13636ea9faa0b67820.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2012
    • \??\c:\windows\system\explorer.exe
      c:\windows\system\explorer.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visiblity of hidden/system files in Explorer
      • Boot or Logon Autostart Execution: Active Setup
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4360
      • \??\c:\windows\system\spoolsv.exe
        c:\windows\system\spoolsv.exe SE
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1876
        • \??\c:\windows\system\svchost.exe
          c:\windows\system\svchost.exe
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visiblity of hidden/system files in Explorer
          • Boot or Logon Autostart Execution: Active Setup
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:4884
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe PR
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            PID:3572
          • C:\Windows\SysWOW64\at.exe
            at 00:51 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
            5⤵
            • System Location Discovery: System Language Discovery
            PID:956
          • C:\Windows\SysWOW64\at.exe
            at 00:52 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
            5⤵
            • System Location Discovery: System Language Discovery
            PID:1860
          • C:\Windows\SysWOW64\at.exe
            at 00:53 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
            5⤵
            • System Location Discovery: System Language Discovery
            PID:4588

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\mrsys.exe

    Filesize

    206KB

    MD5

    782615dd7453f07d1aa757f5217b86c1

    SHA1

    2004944f5cbb47a1c4597113297b3a3eb7998358

    SHA256

    075cf4e22cb34a1430bf959d5ba50eb9ed058568b7db2981b8fd93375466d2e6

    SHA512

    a590acb3cb4df494d642350bb40f66e7e995ec2cd58ffda35a26becc734bba522712ed630524133e929f6ef4cab864620174580b2894c7106dff65d15247d5ea

  • C:\Windows\System\explorer.exe

    Filesize

    206KB

    MD5

    7c585d6f29c08a67897d5b0047b72dc9

    SHA1

    8143ce42a6d34890ea6735cf44af2ec6d19a2e84

    SHA256

    38349f13459467c83e8105be1b20e03ca09264266b0f7e6a6f9013b23e9e08c9

    SHA512

    2e884bc13e0c3e19f26b7df9515e998a3dc70594ce1ba86b4db2af4e9590f812f769e32aed1f6bed24f80eea5a718fcb4c21ccb03d34152798c18d88bfa5e5f2

  • C:\Windows\System\spoolsv.exe

    Filesize

    206KB

    MD5

    aa573fafc1cd8a1271c03e88720b49c2

    SHA1

    739d76225226737c18b59d97e58eeb5a7748c93c

    SHA256

    65077894f2554482fd2645299925da602417a45e787eac118473142ed4a3492d

    SHA512

    79b07d64f339868e38a044c752ec2d96c1dc25c2abb3452d340e14a30c9756449a9b334bfb72efdc4b3be8992c0d0541559643376d38e6afe2b27819fd9bfda1

  • C:\Windows\System\svchost.exe

    Filesize

    206KB

    MD5

    b51a7e43f5412d008042e62d573adae8

    SHA1

    d6b8d0b2c3da7decd66b8f8aa8bfbb2b8ea66b70

    SHA256

    d11239021c1cc91638dbf0ea446cd441cef2891de7185ed2c8ac4894bd2ddfa1

    SHA512

    3f831dfdc791f9e36d9c6b97ede16c6b3c40a490b07f6149d0af99747710d4051a32ee6a351514254abcb556c2a883fac5b20a1bd01ba0904ccb8fde829d4953

  • memory/1876-35-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2012-0-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2012-36-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/3572-34-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/4360-38-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/4884-39-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB