Analysis

  • max time kernel
    120s
  • max time network
    97s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-11-2024 13:53

General

  • Target

    95770f512f29e3f16c0bcd44cdddd7efe515c23bdbfb638d3c57ed5cb1ae3b29N.exe

  • Size

    206KB

  • MD5

    2728f8cbda969fc55ac899fc4d030300

  • SHA1

    9faf3be0dd7dd6b387862606af3022ae9efee8f9

  • SHA256

    95770f512f29e3f16c0bcd44cdddd7efe515c23bdbfb638d3c57ed5cb1ae3b29

  • SHA512

    54a0293933efeee2651a3f3b0395b9e3eea25870b6cd43be9655d1d3f496a91e6a2803b29326cb7ab22653b92c85fab2fbc9250790181e0544aec6164e25fc0a

  • SSDEEP

    3072:zvEfVUzSLhIVbV6i5LirrlZrHyrUHUckoMQ2RN6unJ:zvEN2U+T6i5LirrllHy4HUcMQY6i

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 8 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\95770f512f29e3f16c0bcd44cdddd7efe515c23bdbfb638d3c57ed5cb1ae3b29N.exe
    "C:\Users\Admin\AppData\Local\Temp\95770f512f29e3f16c0bcd44cdddd7efe515c23bdbfb638d3c57ed5cb1ae3b29N.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1600
    • \??\c:\windows\system\explorer.exe
      c:\windows\system\explorer.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visiblity of hidden/system files in Explorer
      • Boot or Logon Autostart Execution: Active Setup
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3892
      • \??\c:\windows\system\spoolsv.exe
        c:\windows\system\spoolsv.exe SE
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1116
        • \??\c:\windows\system\svchost.exe
          c:\windows\system\svchost.exe
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visiblity of hidden/system files in Explorer
          • Boot or Logon Autostart Execution: Active Setup
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2276
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe PR
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            PID:1528
          • C:\Windows\SysWOW64\at.exe
            at 13:55 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
            5⤵
            • System Location Discovery: System Language Discovery
            PID:3708
          • C:\Windows\SysWOW64\at.exe
            at 13:56 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
            5⤵
            • System Location Discovery: System Language Discovery
            PID:1332

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\mrsys.exe

    Filesize

    206KB

    MD5

    36b4234d9cb60b4eaefb2de35046a21b

    SHA1

    d8f68a8ec122ea33cbbf3cb755d0f3bcd4c850d4

    SHA256

    4e7ab8c8c94a90c3b6e25c8ddd2a8935cefee96b6fbc4bedea45369cd02f8c7c

    SHA512

    f880e2c669ea73f13b6499d891c1a96b587947d22736e13f2cd1ec170c252e754043a92f63b57abe5f329581618533a8b0cf799d97605f71d5156989bffe68db

  • C:\Windows\System\explorer.exe

    Filesize

    206KB

    MD5

    2df1051bd17f28f05d00ee22915672e3

    SHA1

    883d8b33c4c28985d79ca451d22a718550873d07

    SHA256

    a5f0153e9a0d011454647cbf1def4584ab3036db3b738766294c8a37b482ad37

    SHA512

    e34f3908c7d411018fc583a786e7c87a43693e4c0b79753377ec1d044fd75dfcea7f12eba7afda8f389251b9c0b5352c09b5730a03b38d934bd3471c507c1d50

  • C:\Windows\System\spoolsv.exe

    Filesize

    206KB

    MD5

    4418fd1a3b383d4420896dfd88d405cb

    SHA1

    6819c37d0c74bc30e838a51155ad7e65a30e3688

    SHA256

    216c0d6f41d5c8cfc40b96b3db7023e649620e98514733d108341c0facdf861d

    SHA512

    ac397c508bcf2028c840dd62ac1085b49967c9172df9ec8163bbb3b3bf103d391888690b818e136362f62100c8be272e370382c0d9f643329c88ba54a129ef88

  • \??\c:\windows\system\svchost.exe

    Filesize

    206KB

    MD5

    2839e2362225ad1447d9edc981dfbb7e

    SHA1

    126acb411f86cf454714f3d6d124da94446a52ab

    SHA256

    438ecac1c68a20a4fe6112fb0f94dccb3c5d1a6cf527effc9841e56b26cbd32c

    SHA512

    1821a84cf69e42f2bc1cd998f27598cd81dcb64d41353bfa3a44164e8d7fa3bf522955f3be194a9cadd5b8b0fa9de2f8e9d071707288e4b3573d066d3e9c2c19