Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    22/11/2024, 15:25

General

  • Target

    e42621e2a5208e82867501da32bd1530e4a8d30ff389247c1cdd80dfeac6b714N.exe

  • Size

    206KB

  • MD5

    baafedd50fa04d016a17d3d14338f280

  • SHA1

    d18576d842b724b63ff53496b26163be1adbdbc0

  • SHA256

    e42621e2a5208e82867501da32bd1530e4a8d30ff389247c1cdd80dfeac6b714

  • SHA512

    c973108d639cf86839d13a9b36f916198f08abb45e6c68d614557ae9de57f88900f4a6e5a3a48365a34d2bbdce11cbc3f800978973ae29100c2514c2d29b67da

  • SSDEEP

    3072:zvEfVUzSLhIVbV6i5LirrlZrHyrUHUckoMQ2RN6unF:zvEN2U+T6i5LirrllHy4HUcMQY6a

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 8 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 8 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e42621e2a5208e82867501da32bd1530e4a8d30ff389247c1cdd80dfeac6b714N.exe
    "C:\Users\Admin\AppData\Local\Temp\e42621e2a5208e82867501da32bd1530e4a8d30ff389247c1cdd80dfeac6b714N.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3052
    • \??\c:\windows\system\explorer.exe
      c:\windows\system\explorer.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visiblity of hidden/system files in Explorer
      • Boot or Logon Autostart Execution: Active Setup
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2164
      • \??\c:\windows\system\spoolsv.exe
        c:\windows\system\spoolsv.exe SE
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2960
        • \??\c:\windows\system\svchost.exe
          c:\windows\system\svchost.exe
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visiblity of hidden/system files in Explorer
          • Boot or Logon Autostart Execution: Active Setup
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2864
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe PR
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            PID:2200
          • C:\Windows\SysWOW64\at.exe
            at 15:27 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
            5⤵
            • System Location Discovery: System Language Discovery
            PID:2632
          • C:\Windows\SysWOW64\at.exe
            at 15:28 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
            5⤵
            • System Location Discovery: System Language Discovery
            PID:2676

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\mrsys.exe

    Filesize

    206KB

    MD5

    49b6132b8d251281fd5acb9ad0d7d055

    SHA1

    81c708cc52842aaa2bb1fe6a1b8f6c96de57cc9d

    SHA256

    12a666b791a04a5ff9d1309068715e150236b47acc716c39bf9df6387a78b4a0

    SHA512

    d516ac67555623ac4dc435946a843738193be71b6dbf6f6af127b4ab4e94c3558abca41b9cfac2ecef9724d70995dcb2913bfecd3da8787647417c59345f25eb

  • \Windows\system\explorer.exe

    Filesize

    206KB

    MD5

    cc2381c5605df9679d4ecfffff0c1202

    SHA1

    e2b9c3bd4d5d1549eb846c4989c11df3c5f3449f

    SHA256

    8d26c134c364fc3603a4c841da915583e001085da1dcc374c43c787264458de2

    SHA512

    acf27afc4d2f4cb64fb8e676a9dde3df80c8715ad4f9e14cda538c2226a6c09f41f88103156cdb8434325f5ccd9c291ca62da90d8d18505164f9d67d59608059

  • \Windows\system\spoolsv.exe

    Filesize

    206KB

    MD5

    c58395c5e8e974937f6d18b0cdbf1d4c

    SHA1

    5ee908ca2846ad3677b8728aa89981598ecd144f

    SHA256

    1384d58bfe9c5c84ef6e96ac4694bbf2947e39875ded82826a36093a358b4c8e

    SHA512

    282c87680b61c74f2ffca5cfd6ced23d44bd353e74806d9656986329c4af8405ed41fe48a9f557e82f59397efecd5fcbe80842316fe53c434895b529a4aef05f

  • \Windows\system\svchost.exe

    Filesize

    206KB

    MD5

    0c76538adc9c7cf542fa7270cf2bfc0a

    SHA1

    82baaaab56fac5264b8f0c16585aa85c07de24c3

    SHA256

    053955711445235bd35eada2b7f01e845ee469aa8129f048073c796cebddd183

    SHA512

    7090be066183ceab2b8b59faa479cbdf7f5ab554cd02d31378d5b0048641c649e3ae21ab795d3ece2e9d42c9d89fe4d44042958dbd60b66e73ae5cc3f5463d19