Analysis

  • max time kernel
    149s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    28/08/2023, 02:52

General

  • Target

    0b07fb523fc6eb277b443968b841aa8b17623c1fa1765399cac978afbad40bd9.exe

  • Size

    78KB

  • MD5

    5599d7868bd1287150ab8a1d6bccc7bf

  • SHA1

    74b69832a55f056d3bb2e4da62f53de362ec3dfd

  • SHA256

    0b07fb523fc6eb277b443968b841aa8b17623c1fa1765399cac978afbad40bd9

  • SHA512

    063dcbf572e47256e2f31e1269f8e7742b32410cbbd37ebab65e0ca2980026e936d9859208cd2b55febe5cf1b6c56d233c35f429b08aa7ca567557fb7cf46573

  • SSDEEP

    768:agO5xRYi+SfSWHHNvvG5bnl/NqNwsKVDstHxYD0p1aXKynF0vQmYZS0HdJnfWO2P:RshfSWHHNvoLqNwDDGw02eQmh0HjWO2P

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Modifies system executable filetype association 2 TTPs 5 IoCs
  • Drops file in System32 directory 4 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies registry class 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0b07fb523fc6eb277b443968b841aa8b17623c1fa1765399cac978afbad40bd9.exe
    "C:\Users\Admin\AppData\Local\Temp\0b07fb523fc6eb277b443968b841aa8b17623c1fa1765399cac978afbad40bd9.exe"
    1⤵
    • Loads dropped DLL
    • Modifies system executable filetype association
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2084
    • C:\Windows\system\rundll32.exe
      C:\Windows\system\rundll32.exe
      2⤵
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:1868

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\notepad¢¬.exe

    Filesize

    83KB

    MD5

    874204d1db83b49c86ce621adc73b9f9

    SHA1

    6e6bfe27cf29c7e5b8f4da83806b8595ddbea74a

    SHA256

    e0ccc22569f75f3a0bf28a0e7da0d5516e4bd630c3612d8363f6153edc1bafe5

    SHA512

    dd178646c97cc52ab181202d8a700db4845ae230facc7bab04f7e65be47fbbc6c70406320c2a5e0967f2128fa1c2b86bef3f615c8ac11346f1f592e2d489405d

  • C:\Windows\system\rundll32.exe

    Filesize

    73KB

    MD5

    abf417452508dfeddfe65848303ffb2d

    SHA1

    56f4a2bc928d230e9619ea511b2aacb34234c2dd

    SHA256

    93e5b56d2d3a5d6852957289023fa654faaa4734c7254e8d4f9d9cdbfeda0aed

    SHA512

    32f9df2a57d29d5ec57974ea0d6fc9d8c1eca92d6dfcba475731c03a8e3f7ffd72ac899be1b0cdce1c69e843368942ea406c614a2e40cc8acf15dc60554cfdb3

  • C:\Windows\system\rundll32.exe

    Filesize

    73KB

    MD5

    abf417452508dfeddfe65848303ffb2d

    SHA1

    56f4a2bc928d230e9619ea511b2aacb34234c2dd

    SHA256

    93e5b56d2d3a5d6852957289023fa654faaa4734c7254e8d4f9d9cdbfeda0aed

    SHA512

    32f9df2a57d29d5ec57974ea0d6fc9d8c1eca92d6dfcba475731c03a8e3f7ffd72ac899be1b0cdce1c69e843368942ea406c614a2e40cc8acf15dc60554cfdb3

  • \Windows\system\rundll32.exe

    Filesize

    73KB

    MD5

    abf417452508dfeddfe65848303ffb2d

    SHA1

    56f4a2bc928d230e9619ea511b2aacb34234c2dd

    SHA256

    93e5b56d2d3a5d6852957289023fa654faaa4734c7254e8d4f9d9cdbfeda0aed

    SHA512

    32f9df2a57d29d5ec57974ea0d6fc9d8c1eca92d6dfcba475731c03a8e3f7ffd72ac899be1b0cdce1c69e843368942ea406c614a2e40cc8acf15dc60554cfdb3

  • \Windows\system\rundll32.exe

    Filesize

    73KB

    MD5

    abf417452508dfeddfe65848303ffb2d

    SHA1

    56f4a2bc928d230e9619ea511b2aacb34234c2dd

    SHA256

    93e5b56d2d3a5d6852957289023fa654faaa4734c7254e8d4f9d9cdbfeda0aed

    SHA512

    32f9df2a57d29d5ec57974ea0d6fc9d8c1eca92d6dfcba475731c03a8e3f7ffd72ac899be1b0cdce1c69e843368942ea406c614a2e40cc8acf15dc60554cfdb3

  • memory/1868-21-0x0000000000400000-0x0000000000415A00-memory.dmp

    Filesize

    86KB

  • memory/2084-0-0x0000000000400000-0x0000000000415A00-memory.dmp

    Filesize

    86KB

  • memory/2084-12-0x00000000003C0000-0x00000000003D6000-memory.dmp

    Filesize

    88KB

  • memory/2084-19-0x0000000000400000-0x0000000000415A00-memory.dmp

    Filesize

    86KB

  • memory/2084-20-0x00000000003C0000-0x00000000003C6000-memory.dmp

    Filesize

    24KB