Analysis
-
max time kernel
149s -
max time network
57s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
27-04-2024 22:18
Static task
static1
Behavioral task
behavioral1
Sample
3f429a952a17b4aefff320113de4c0003ca263a60c0fb2c3d881130c4777e90a.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3f429a952a17b4aefff320113de4c0003ca263a60c0fb2c3d881130c4777e90a.exe
Resource
win10v2004-20240419-en
General
-
Target
3f429a952a17b4aefff320113de4c0003ca263a60c0fb2c3d881130c4777e90a.exe
-
Size
83KB
-
MD5
3ac03c32ba869f1919e36b1595ff3a67
-
SHA1
2ddd627495c03901e109097b05857aae4a565325
-
SHA256
3f429a952a17b4aefff320113de4c0003ca263a60c0fb2c3d881130c4777e90a
-
SHA512
46bc724fc72a0ec89c243d47751f1e69ea6abe006c3ae70e15a1ea36dfbc963c00baa8c48fdc88ffefc33f537793d72f4c690afc41afd987acff735cf448fad4
-
SSDEEP
1536:RshfSWHHNvoLqNwDDGw02eQmh0HjWO1P9rLlW:GhfxHNIreQm+Hi2P9rLlW
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
rundll32.exepid process 5112 rundll32.exe -
Modifies system executable filetype association 2 TTPs 5 IoCs
Processes:
3f429a952a17b4aefff320113de4c0003ca263a60c0fb2c3d881130c4777e90a.exerundll32.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command 3f429a952a17b4aefff320113de4c0003ca263a60c0fb2c3d881130c4777e90a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 3f429a952a17b4aefff320113de4c0003ca263a60c0fb2c3d881130c4777e90a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" 3f429a952a17b4aefff320113de4c0003ca263a60c0fb2c3d881130c4777e90a.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe -
Drops file in System32 directory 4 IoCs
Processes:
3f429a952a17b4aefff320113de4c0003ca263a60c0fb2c3d881130c4777e90a.exedescription ioc process File created C:\Windows\SysWOW64\notepad¢¬.exe 3f429a952a17b4aefff320113de4c0003ca263a60c0fb2c3d881130c4777e90a.exe File opened for modification C:\Windows\SysWOW64\¢«.exe 3f429a952a17b4aefff320113de4c0003ca263a60c0fb2c3d881130c4777e90a.exe File created C:\Windows\SysWOW64\¢«.exe 3f429a952a17b4aefff320113de4c0003ca263a60c0fb2c3d881130c4777e90a.exe File opened for modification C:\Windows\SysWOW64\notepad¢¬.exe 3f429a952a17b4aefff320113de4c0003ca263a60c0fb2c3d881130c4777e90a.exe -
Drops file in Windows directory 2 IoCs
Processes:
3f429a952a17b4aefff320113de4c0003ca263a60c0fb2c3d881130c4777e90a.exedescription ioc process File opened for modification C:\Windows\system\rundll32.exe 3f429a952a17b4aefff320113de4c0003ca263a60c0fb2c3d881130c4777e90a.exe File created C:\Windows\system\rundll32.exe 3f429a952a17b4aefff320113de4c0003ca263a60c0fb2c3d881130c4777e90a.exe -
Modifies registry class 15 IoCs
Processes:
rundll32.exe3f429a952a17b4aefff320113de4c0003ca263a60c0fb2c3d881130c4777e90a.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" 3f429a952a17b4aefff320113de4c0003ca263a60c0fb2c3d881130c4777e90a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainUp = "1714256347" rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainVer = "506" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\MSipv rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command 3f429a952a17b4aefff320113de4c0003ca263a60c0fb2c3d881130c4777e90a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" 3f429a952a17b4aefff320113de4c0003ca263a60c0fb2c3d881130c4777e90a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainSetup = "1714256347" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad.exe %1" 3f429a952a17b4aefff320113de4c0003ca263a60c0fb2c3d881130c4777e90a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\MSipv 3f429a952a17b4aefff320113de4c0003ca263a60c0fb2c3d881130c4777e90a.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command 3f429a952a17b4aefff320113de4c0003ca263a60c0fb2c3d881130c4777e90a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 3f429a952a17b4aefff320113de4c0003ca263a60c0fb2c3d881130c4777e90a.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
Processes:
3f429a952a17b4aefff320113de4c0003ca263a60c0fb2c3d881130c4777e90a.exepid process 3024 3f429a952a17b4aefff320113de4c0003ca263a60c0fb2c3d881130c4777e90a.exe 3024 3f429a952a17b4aefff320113de4c0003ca263a60c0fb2c3d881130c4777e90a.exe 3024 3f429a952a17b4aefff320113de4c0003ca263a60c0fb2c3d881130c4777e90a.exe 3024 3f429a952a17b4aefff320113de4c0003ca263a60c0fb2c3d881130c4777e90a.exe 3024 3f429a952a17b4aefff320113de4c0003ca263a60c0fb2c3d881130c4777e90a.exe 3024 3f429a952a17b4aefff320113de4c0003ca263a60c0fb2c3d881130c4777e90a.exe 3024 3f429a952a17b4aefff320113de4c0003ca263a60c0fb2c3d881130c4777e90a.exe 3024 3f429a952a17b4aefff320113de4c0003ca263a60c0fb2c3d881130c4777e90a.exe 3024 3f429a952a17b4aefff320113de4c0003ca263a60c0fb2c3d881130c4777e90a.exe 3024 3f429a952a17b4aefff320113de4c0003ca263a60c0fb2c3d881130c4777e90a.exe 3024 3f429a952a17b4aefff320113de4c0003ca263a60c0fb2c3d881130c4777e90a.exe 3024 3f429a952a17b4aefff320113de4c0003ca263a60c0fb2c3d881130c4777e90a.exe 3024 3f429a952a17b4aefff320113de4c0003ca263a60c0fb2c3d881130c4777e90a.exe 3024 3f429a952a17b4aefff320113de4c0003ca263a60c0fb2c3d881130c4777e90a.exe 3024 3f429a952a17b4aefff320113de4c0003ca263a60c0fb2c3d881130c4777e90a.exe 3024 3f429a952a17b4aefff320113de4c0003ca263a60c0fb2c3d881130c4777e90a.exe 3024 3f429a952a17b4aefff320113de4c0003ca263a60c0fb2c3d881130c4777e90a.exe 3024 3f429a952a17b4aefff320113de4c0003ca263a60c0fb2c3d881130c4777e90a.exe 3024 3f429a952a17b4aefff320113de4c0003ca263a60c0fb2c3d881130c4777e90a.exe 3024 3f429a952a17b4aefff320113de4c0003ca263a60c0fb2c3d881130c4777e90a.exe 3024 3f429a952a17b4aefff320113de4c0003ca263a60c0fb2c3d881130c4777e90a.exe 3024 3f429a952a17b4aefff320113de4c0003ca263a60c0fb2c3d881130c4777e90a.exe 3024 3f429a952a17b4aefff320113de4c0003ca263a60c0fb2c3d881130c4777e90a.exe 3024 3f429a952a17b4aefff320113de4c0003ca263a60c0fb2c3d881130c4777e90a.exe 3024 3f429a952a17b4aefff320113de4c0003ca263a60c0fb2c3d881130c4777e90a.exe 3024 3f429a952a17b4aefff320113de4c0003ca263a60c0fb2c3d881130c4777e90a.exe 3024 3f429a952a17b4aefff320113de4c0003ca263a60c0fb2c3d881130c4777e90a.exe 3024 3f429a952a17b4aefff320113de4c0003ca263a60c0fb2c3d881130c4777e90a.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
rundll32.exepid process 5112 rundll32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
3f429a952a17b4aefff320113de4c0003ca263a60c0fb2c3d881130c4777e90a.exerundll32.exepid process 3024 3f429a952a17b4aefff320113de4c0003ca263a60c0fb2c3d881130c4777e90a.exe 5112 rundll32.exe 5112 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
3f429a952a17b4aefff320113de4c0003ca263a60c0fb2c3d881130c4777e90a.exedescription pid process target process PID 3024 wrote to memory of 5112 3024 3f429a952a17b4aefff320113de4c0003ca263a60c0fb2c3d881130c4777e90a.exe rundll32.exe PID 3024 wrote to memory of 5112 3024 3f429a952a17b4aefff320113de4c0003ca263a60c0fb2c3d881130c4777e90a.exe rundll32.exe PID 3024 wrote to memory of 5112 3024 3f429a952a17b4aefff320113de4c0003ca263a60c0fb2c3d881130c4777e90a.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3f429a952a17b4aefff320113de4c0003ca263a60c0fb2c3d881130c4777e90a.exe"C:\Users\Admin\AppData\Local\Temp\3f429a952a17b4aefff320113de4c0003ca263a60c0fb2c3d881130c4777e90a.exe"1⤵
- Modifies system executable filetype association
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\system\rundll32.exeC:\Windows\system\rundll32.exe2⤵
- Executes dropped EXE
- Modifies system executable filetype association
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\SysWOW64\notepad¢¬.exeFilesize
79KB
MD51a5fb433bd9b417300580bd5657a70c8
SHA113961eeb43b39a734a67583bac753cec7c3fe632
SHA256b31c32ff59a37360f79422a7ce2e394292051f95b9086b69ddaab2b976a49ac1
SHA512d4865b4935ef2451cbacd5bbdbb4b4aab1fec5fc2f9ae42ab20eec1ebc6b81ada140209438661e731b923f2c1ebc24cb912af948446d109bab0dbc108bb908d4
-
C:\Windows\System\rundll32.exeFilesize
75KB
MD537a8b6be086e97a0dc1ef3da48fd3417
SHA1d4eef7f2aeebde90da760558be5a6fae3e3e5645
SHA25603c9560b6b71898bbda63c30fb3eda944c4d04376a692a6272a94886bf70f071
SHA5121af30e96be07659ec3f56dda864ec1e0b3b260f86a25ea861a40a8b28de7327036af2e331cb34b7eeaff479ee33286386d816c36d88b2938f2c5659a48797246
-
memory/3024-0-0x0000000000400000-0x0000000000415A00-memory.dmpFilesize
86KB
-
memory/3024-14-0x0000000000400000-0x0000000000415A00-memory.dmpFilesize
86KB
-
memory/5112-12-0x0000000000400000-0x0000000000415A00-memory.dmpFilesize
86KB