Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 01:44
Static task
static1
Behavioral task
behavioral1
Sample
944ce2e2bcee30b2efce0b366bf39e18cc1855bd824e7976db65b1a7779cb54c.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
944ce2e2bcee30b2efce0b366bf39e18cc1855bd824e7976db65b1a7779cb54c.exe
Resource
win10v2004-20241007-en
General
-
Target
944ce2e2bcee30b2efce0b366bf39e18cc1855bd824e7976db65b1a7779cb54c.exe
-
Size
67KB
-
MD5
f23b574fad39f213858dc68196f18cf4
-
SHA1
fc90f13de3f4219d2ba60c06f1accb67cac646af
-
SHA256
944ce2e2bcee30b2efce0b366bf39e18cc1855bd824e7976db65b1a7779cb54c
-
SHA512
0b0c84cd04cc65d34a4f0a6b713ba93bff86e14384e53fd4618484f273f1d8374953b03025f36d3da801d7bb3953f4ae75f61267833c0bdd1acbeb492cd871de
-
SSDEEP
1536:EgXsfgWQN1kYsRxWTg3PwSWe991Rdolpdz6JAkAG:1tWYfGATvPe9slp+ApG
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
Processes:
svchost.exeexplorer.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
Processes:
explorer.exesvchost.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 8 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
Processes:
svchost.exeexplorer.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe -
Executes dropped EXE 4 IoCs
Processes:
explorer.exespoolsv.exesvchost.exespoolsv.exepid process 4668 explorer.exe 1844 spoolsv.exe 1600 svchost.exe 1164 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
explorer.exesvchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe -
Drops file in Windows directory 6 IoCs
Processes:
svchost.exeexplorer.exe944ce2e2bcee30b2efce0b366bf39e18cc1855bd824e7976db65b1a7779cb54c.exespoolsv.exedescription ioc process File opened for modification \??\c:\windows\system\svchost.exe svchost.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe 944ce2e2bcee30b2efce0b366bf39e18cc1855bd824e7976db65b1a7779cb54c.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
at.exe944ce2e2bcee30b2efce0b366bf39e18cc1855bd824e7976db65b1a7779cb54c.exeexplorer.exespoolsv.exesvchost.exespoolsv.exeat.exeat.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 944ce2e2bcee30b2efce0b366bf39e18cc1855bd824e7976db65b1a7779cb54c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
944ce2e2bcee30b2efce0b366bf39e18cc1855bd824e7976db65b1a7779cb54c.exeexplorer.exesvchost.exepid process 1344 944ce2e2bcee30b2efce0b366bf39e18cc1855bd824e7976db65b1a7779cb54c.exe 1344 944ce2e2bcee30b2efce0b366bf39e18cc1855bd824e7976db65b1a7779cb54c.exe 4668 explorer.exe 4668 explorer.exe 4668 explorer.exe 4668 explorer.exe 4668 explorer.exe 4668 explorer.exe 1600 svchost.exe 1600 svchost.exe 1600 svchost.exe 1600 svchost.exe 4668 explorer.exe 4668 explorer.exe 1600 svchost.exe 1600 svchost.exe 4668 explorer.exe 4668 explorer.exe 1600 svchost.exe 1600 svchost.exe 4668 explorer.exe 4668 explorer.exe 1600 svchost.exe 1600 svchost.exe 4668 explorer.exe 4668 explorer.exe 1600 svchost.exe 1600 svchost.exe 4668 explorer.exe 4668 explorer.exe 1600 svchost.exe 1600 svchost.exe 4668 explorer.exe 4668 explorer.exe 1600 svchost.exe 1600 svchost.exe 4668 explorer.exe 4668 explorer.exe 1600 svchost.exe 1600 svchost.exe 4668 explorer.exe 4668 explorer.exe 1600 svchost.exe 1600 svchost.exe 4668 explorer.exe 4668 explorer.exe 1600 svchost.exe 1600 svchost.exe 4668 explorer.exe 4668 explorer.exe 1600 svchost.exe 1600 svchost.exe 4668 explorer.exe 4668 explorer.exe 1600 svchost.exe 1600 svchost.exe 4668 explorer.exe 4668 explorer.exe 1600 svchost.exe 1600 svchost.exe 4668 explorer.exe 4668 explorer.exe 1600 svchost.exe 1600 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
explorer.exesvchost.exepid process 4668 explorer.exe 1600 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
Processes:
944ce2e2bcee30b2efce0b366bf39e18cc1855bd824e7976db65b1a7779cb54c.exeexplorer.exespoolsv.exesvchost.exespoolsv.exepid process 1344 944ce2e2bcee30b2efce0b366bf39e18cc1855bd824e7976db65b1a7779cb54c.exe 1344 944ce2e2bcee30b2efce0b366bf39e18cc1855bd824e7976db65b1a7779cb54c.exe 4668 explorer.exe 4668 explorer.exe 1844 spoolsv.exe 1844 spoolsv.exe 1600 svchost.exe 1600 svchost.exe 1164 spoolsv.exe 1164 spoolsv.exe 4668 explorer.exe 4668 explorer.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
944ce2e2bcee30b2efce0b366bf39e18cc1855bd824e7976db65b1a7779cb54c.exeexplorer.exespoolsv.exesvchost.exedescription pid process target process PID 1344 wrote to memory of 4668 1344 944ce2e2bcee30b2efce0b366bf39e18cc1855bd824e7976db65b1a7779cb54c.exe explorer.exe PID 1344 wrote to memory of 4668 1344 944ce2e2bcee30b2efce0b366bf39e18cc1855bd824e7976db65b1a7779cb54c.exe explorer.exe PID 1344 wrote to memory of 4668 1344 944ce2e2bcee30b2efce0b366bf39e18cc1855bd824e7976db65b1a7779cb54c.exe explorer.exe PID 4668 wrote to memory of 1844 4668 explorer.exe spoolsv.exe PID 4668 wrote to memory of 1844 4668 explorer.exe spoolsv.exe PID 4668 wrote to memory of 1844 4668 explorer.exe spoolsv.exe PID 1844 wrote to memory of 1600 1844 spoolsv.exe svchost.exe PID 1844 wrote to memory of 1600 1844 spoolsv.exe svchost.exe PID 1844 wrote to memory of 1600 1844 spoolsv.exe svchost.exe PID 1600 wrote to memory of 1164 1600 svchost.exe spoolsv.exe PID 1600 wrote to memory of 1164 1600 svchost.exe spoolsv.exe PID 1600 wrote to memory of 1164 1600 svchost.exe spoolsv.exe PID 1600 wrote to memory of 4092 1600 svchost.exe at.exe PID 1600 wrote to memory of 4092 1600 svchost.exe at.exe PID 1600 wrote to memory of 4092 1600 svchost.exe at.exe PID 1600 wrote to memory of 4480 1600 svchost.exe at.exe PID 1600 wrote to memory of 4480 1600 svchost.exe at.exe PID 1600 wrote to memory of 4480 1600 svchost.exe at.exe PID 1600 wrote to memory of 548 1600 svchost.exe at.exe PID 1600 wrote to memory of 548 1600 svchost.exe at.exe PID 1600 wrote to memory of 548 1600 svchost.exe at.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\944ce2e2bcee30b2efce0b366bf39e18cc1855bd824e7976db65b1a7779cb54c.exe"C:\Users\Admin\AppData\Local\Temp\944ce2e2bcee30b2efce0b366bf39e18cc1855bd824e7976db65b1a7779cb54c.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1344 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4668 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1844 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1600 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1164
-
-
C:\Windows\SysWOW64\at.exeat 01:47 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:4092
-
-
C:\Windows\SysWOW64\at.exeat 01:48 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:4480
-
-
C:\Windows\SysWOW64\at.exeat 01:49 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:548
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5f8a452cca1956f44a756531665fee9f6
SHA16cf68baa0285ce1c4e68bfae1c098deb14b68149
SHA2560a648ae6abd653fba482bff4e1df1353e8e974105c7685658c0f13346e9f8853
SHA512a6bf12c7770b2fa8fa13afe08df4df7282d44e0fc1f907d819d1d32799418385d246d4978ade3043b5551f7391e2490e3e66357f8a529f7fcb92f79718bb7d64
-
Filesize
67KB
MD52c517fa2c5c27e94cc27c21c7d12e007
SHA1b6f5f4ab50592989e0c8d5481a7d4e1b28fb0ab4
SHA25623427850b809db94a83c6e9fde20fa52ff76646e7273043a62ae9fa64e69d39b
SHA51280d69a3fe12b87878c71318cd847bd7975155b3d5a93801cdb09be153e67917f4f5c4594873e8a096b23fe19b41db0c50cf4c186f4b06705f3cbb286d2d0d978
-
Filesize
67KB
MD5e3e30668857aad40e0d7d24551a5482e
SHA1b029c5d241bbe072e7ade8046b8f38a1b89e575a
SHA2560f50b88536d0de81c320bf6193f7fa95f0703c4918836751b0ea0db78380ab0f
SHA512477bb043c24e49518494085f9534b609b381dc2ccb6a03dbc7eb1ad0fc64dbd18e14610eab1684b5dc1b94abd3a0a6bfaf877684c49c02bdb3e7fd8cdbecab93
-
Filesize
67KB
MD57c8f80f8e24a9e08b2148ceb6b5cb8a3
SHA1816d1ff265b3ca44ff624bc665535ba87210b57d
SHA25684ac7fa826e6810f6931c08adf69f997e426c19f7afcc85111527db9783c84d1
SHA5126d6a3cfe50f2bf4b399a753855e3197c8d5e66dc13224190fb8724f193ca577099eb3a64ed3dd6b7d2b3f3ac09f1a00d72a6aa3dbdbd4f89ae36ced44551b8af
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e