Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    22-11-2024 13:53

General

  • Target

    95770f512f29e3f16c0bcd44cdddd7efe515c23bdbfb638d3c57ed5cb1ae3b29N.exe

  • Size

    206KB

  • MD5

    2728f8cbda969fc55ac899fc4d030300

  • SHA1

    9faf3be0dd7dd6b387862606af3022ae9efee8f9

  • SHA256

    95770f512f29e3f16c0bcd44cdddd7efe515c23bdbfb638d3c57ed5cb1ae3b29

  • SHA512

    54a0293933efeee2651a3f3b0395b9e3eea25870b6cd43be9655d1d3f496a91e6a2803b29326cb7ab22653b92c85fab2fbc9250790181e0544aec6164e25fc0a

  • SSDEEP

    3072:zvEfVUzSLhIVbV6i5LirrlZrHyrUHUckoMQ2RN6unJ:zvEN2U+T6i5LirrllHy4HUcMQY6i

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 8 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 8 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\95770f512f29e3f16c0bcd44cdddd7efe515c23bdbfb638d3c57ed5cb1ae3b29N.exe
    "C:\Users\Admin\AppData\Local\Temp\95770f512f29e3f16c0bcd44cdddd7efe515c23bdbfb638d3c57ed5cb1ae3b29N.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1916
    • \??\c:\windows\system\explorer.exe
      c:\windows\system\explorer.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visiblity of hidden/system files in Explorer
      • Boot or Logon Autostart Execution: Active Setup
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2124
      • \??\c:\windows\system\spoolsv.exe
        c:\windows\system\spoolsv.exe SE
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1424
        • \??\c:\windows\system\svchost.exe
          c:\windows\system\svchost.exe
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visiblity of hidden/system files in Explorer
          • Boot or Logon Autostart Execution: Active Setup
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2800
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe PR
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            PID:2704
          • C:\Windows\SysWOW64\at.exe
            at 13:55 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
            5⤵
            • System Location Discovery: System Language Discovery
            PID:2740
          • C:\Windows\SysWOW64\at.exe
            at 13:56 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
            5⤵
            • System Location Discovery: System Language Discovery
            PID:2060

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\mrsys.exe

    Filesize

    206KB

    MD5

    f8cb042646ade99430fcc377f69accd2

    SHA1

    35ce04ac090c0d458ec9323da1b550bbb5202a0b

    SHA256

    d2617322e69dc224cf56586b98b4658ab9aa7af2ef6cb924bda29f95291266c5

    SHA512

    30d903cb0ca071c8613a98b76445db4c5f801ecb0c146dc4bd3c8a72ba02657e2ad868958ccde463c370cc12b2deb968f6a799ddc6c95c2af9001a814f241043

  • C:\Windows\system\spoolsv.exe

    Filesize

    206KB

    MD5

    bc9f59257b6f9b3cb7c2ef52ce56fbca

    SHA1

    79883d9feb7be7cca61c441c04b0d15818bbfef3

    SHA256

    1e4fc564b8d0183db82385ce2eb3e2fcc9b40037409547e3110ab647369e88ee

    SHA512

    8816a2fc049485b207e7e701ef8563c599a7689e2b898717ec8b657392bdced8e8eb53f1f70f0d30fca766173a2c161150973172d9ae3bf4622db4ab0c84c9ed

  • \Windows\system\explorer.exe

    Filesize

    206KB

    MD5

    039754e48a6046085f545611cdeb5b39

    SHA1

    2bdacd8ff92f27fd4734771b085900b8909ae598

    SHA256

    3dd4b7416e15421438ddd9fdf49cb35fff16cea402e78f61b504bc2131d9e9a1

    SHA512

    7d7be17850cdaec545da656c38f0abd1a636d6f4633d9ac0babc9b13637b25feddb0c0efd6dcc195dbe24993beabd3eac0768508140b9762c89ce32849490c12

  • \Windows\system\svchost.exe

    Filesize

    206KB

    MD5

    4b7bf55e5a21da7b3105abbd2ad7be57

    SHA1

    37d2f3a385bca86769040fd40fcc1e94079f2897

    SHA256

    c36caded5fc302089477b5afdc306b8aebff29fcd3d2faae18d3bc1eb72fcc31

    SHA512

    0235c6255f5a83a1b43bd9d3399c395ceeca72d302fccdce0f850d87aa232734203c3867ed3dd68afbb5709550d91155be704cb54d0e35b76928900f7b2a05bf