Analysis

  • max time kernel
    120s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/11/2024, 15:25

General

  • Target

    e42621e2a5208e82867501da32bd1530e4a8d30ff389247c1cdd80dfeac6b714N.exe

  • Size

    206KB

  • MD5

    baafedd50fa04d016a17d3d14338f280

  • SHA1

    d18576d842b724b63ff53496b26163be1adbdbc0

  • SHA256

    e42621e2a5208e82867501da32bd1530e4a8d30ff389247c1cdd80dfeac6b714

  • SHA512

    c973108d639cf86839d13a9b36f916198f08abb45e6c68d614557ae9de57f88900f4a6e5a3a48365a34d2bbdce11cbc3f800978973ae29100c2514c2d29b67da

  • SSDEEP

    3072:zvEfVUzSLhIVbV6i5LirrlZrHyrUHUckoMQ2RN6unF:zvEN2U+T6i5LirrllHy4HUcMQY6a

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 8 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e42621e2a5208e82867501da32bd1530e4a8d30ff389247c1cdd80dfeac6b714N.exe
    "C:\Users\Admin\AppData\Local\Temp\e42621e2a5208e82867501da32bd1530e4a8d30ff389247c1cdd80dfeac6b714N.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2888
    • \??\c:\windows\system\explorer.exe
      c:\windows\system\explorer.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visiblity of hidden/system files in Explorer
      • Boot or Logon Autostart Execution: Active Setup
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:448
      • \??\c:\windows\system\spoolsv.exe
        c:\windows\system\spoolsv.exe SE
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:220
        • \??\c:\windows\system\svchost.exe
          c:\windows\system\svchost.exe
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visiblity of hidden/system files in Explorer
          • Boot or Logon Autostart Execution: Active Setup
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1224
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe PR
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            PID:3452
          • C:\Windows\SysWOW64\at.exe
            at 15:27 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
            5⤵
            • System Location Discovery: System Language Discovery
            PID:4924
          • C:\Windows\SysWOW64\at.exe
            at 15:28 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
            5⤵
            • System Location Discovery: System Language Discovery
            PID:756

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\mrsys.exe

    Filesize

    206KB

    MD5

    923b23fe33bb4c3c19bf80f8548a251d

    SHA1

    6b9844fb2db972aa1f1120aab915d8174ddf8acb

    SHA256

    7830f9b2f78535f5f715726f1b3446dbf904c7781c3115067ea129440e6606d8

    SHA512

    be2a28f797090970cc1b9c68b66bbb0e4aa06a16d15e5307ede686de37b89e7cc829d1befa54e960cbad9460517455676d2caefa3e3c5527261cad373a8b5635

  • C:\Windows\System\explorer.exe

    Filesize

    206KB

    MD5

    c58395c5e8e974937f6d18b0cdbf1d4c

    SHA1

    5ee908ca2846ad3677b8728aa89981598ecd144f

    SHA256

    1384d58bfe9c5c84ef6e96ac4694bbf2947e39875ded82826a36093a358b4c8e

    SHA512

    282c87680b61c74f2ffca5cfd6ced23d44bd353e74806d9656986329c4af8405ed41fe48a9f557e82f59397efecd5fcbe80842316fe53c434895b529a4aef05f

  • C:\Windows\System\spoolsv.exe

    Filesize

    206KB

    MD5

    b48e9d1e8194684c3f4f236d8bc2f903

    SHA1

    782be1122adf954b2e3143bbac6b35ae8b7cd631

    SHA256

    cfd376005e84bd28dcc990ca6bac5860772fe27297c8c05b1915b22105a9cdf1

    SHA512

    65877bdac71bb0c7a3c96e4b7383aa9dd94f74f882bf34e63860c90c30cd7d4a32f5fabd050f88b795df731f015f7580e1dd4dbe088d8109a58d4a4b4fbd2f27

  • C:\Windows\System\svchost.exe

    Filesize

    206KB

    MD5

    c9ba8010017d13c7bf965078412929d9

    SHA1

    7d7b19473cc1ba9fe89be93f746fa7c8125ab1f6

    SHA256

    5afb2c802406b1ad3ecf2690a75da8c56fa46bfcef4bd8b1174dcfd4a166777e

    SHA512

    cde5806e4b253252cea035c67923610674785eed7455d183a5ba720587864a07ad3e101c3e9190042ed8bce46da6489af5a3b6c33e4008c51fd77562a55db2bb