Analysis
-
max time kernel
151s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
30/08/2023, 14:31
Static task
static1
Behavioral task
behavioral1
Sample
dcdc9d5ca48b187e43579970d081041297b8fa202a4420d613102b150c6d4edb.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
dcdc9d5ca48b187e43579970d081041297b8fa202a4420d613102b150c6d4edb.exe
Resource
win10v2004-20230703-en
General
-
Target
dcdc9d5ca48b187e43579970d081041297b8fa202a4420d613102b150c6d4edb.exe
-
Size
75KB
-
MD5
8021a741998f62d03f8014e654d97ec3
-
SHA1
336edfef185a7f02136de3a195406cc82bbb44e2
-
SHA256
dcdc9d5ca48b187e43579970d081041297b8fa202a4420d613102b150c6d4edb
-
SHA512
76a05642924f5eddff42148b9e4aff129c286057fa86268dc451fa82ec7453d576656533db4543a5e1b89fd44e7060d795c0f51ace830c572de3ce91c68138bd
-
SSDEEP
768:agO5xRYi+SfSWHHNvvG5bnl/NqNwsKVDstHxYD0p1aXKynF0vQmYZS0HdJnfWO:RshfSWHHNvoLqNwDDGw02eQmh0HjWO
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2152 rundll32.exe -
Modifies system executable filetype association 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command dcdc9d5ca48b187e43579970d081041297b8fa202a4420d613102b150c6d4edb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" dcdc9d5ca48b187e43579970d081041297b8fa202a4420d613102b150c6d4edb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" dcdc9d5ca48b187e43579970d081041297b8fa202a4420d613102b150c6d4edb.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\notepad¢¬.exe dcdc9d5ca48b187e43579970d081041297b8fa202a4420d613102b150c6d4edb.exe File opened for modification C:\Windows\SysWOW64\¢«.exe dcdc9d5ca48b187e43579970d081041297b8fa202a4420d613102b150c6d4edb.exe File created C:\Windows\SysWOW64\¢«.exe dcdc9d5ca48b187e43579970d081041297b8fa202a4420d613102b150c6d4edb.exe File opened for modification C:\Windows\SysWOW64\notepad¢¬.exe dcdc9d5ca48b187e43579970d081041297b8fa202a4420d613102b150c6d4edb.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system\rundll32.exe dcdc9d5ca48b187e43579970d081041297b8fa202a4420d613102b150c6d4edb.exe File created C:\Windows\system\rundll32.exe dcdc9d5ca48b187e43579970d081041297b8fa202a4420d613102b150c6d4edb.exe -
Modifies registry class 15 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" dcdc9d5ca48b187e43579970d081041297b8fa202a4420d613102b150c6d4edb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainVer = "506" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\MSipv dcdc9d5ca48b187e43579970d081041297b8fa202a4420d613102b150c6d4edb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" dcdc9d5ca48b187e43579970d081041297b8fa202a4420d613102b150c6d4edb.exe Key created \REGISTRY\MACHINE\Software\Classes\MSipv rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad.exe %1" dcdc9d5ca48b187e43579970d081041297b8fa202a4420d613102b150c6d4edb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" dcdc9d5ca48b187e43579970d081041297b8fa202a4420d613102b150c6d4edb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainUp = "1693405928" rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainSetup = "1693405928" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command dcdc9d5ca48b187e43579970d081041297b8fa202a4420d613102b150c6d4edb.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command dcdc9d5ca48b187e43579970d081041297b8fa202a4420d613102b150c6d4edb.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 4580 dcdc9d5ca48b187e43579970d081041297b8fa202a4420d613102b150c6d4edb.exe 4580 dcdc9d5ca48b187e43579970d081041297b8fa202a4420d613102b150c6d4edb.exe 4580 dcdc9d5ca48b187e43579970d081041297b8fa202a4420d613102b150c6d4edb.exe 4580 dcdc9d5ca48b187e43579970d081041297b8fa202a4420d613102b150c6d4edb.exe 4580 dcdc9d5ca48b187e43579970d081041297b8fa202a4420d613102b150c6d4edb.exe 4580 dcdc9d5ca48b187e43579970d081041297b8fa202a4420d613102b150c6d4edb.exe 4580 dcdc9d5ca48b187e43579970d081041297b8fa202a4420d613102b150c6d4edb.exe 4580 dcdc9d5ca48b187e43579970d081041297b8fa202a4420d613102b150c6d4edb.exe 4580 dcdc9d5ca48b187e43579970d081041297b8fa202a4420d613102b150c6d4edb.exe 4580 dcdc9d5ca48b187e43579970d081041297b8fa202a4420d613102b150c6d4edb.exe 4580 dcdc9d5ca48b187e43579970d081041297b8fa202a4420d613102b150c6d4edb.exe 4580 dcdc9d5ca48b187e43579970d081041297b8fa202a4420d613102b150c6d4edb.exe 4580 dcdc9d5ca48b187e43579970d081041297b8fa202a4420d613102b150c6d4edb.exe 4580 dcdc9d5ca48b187e43579970d081041297b8fa202a4420d613102b150c6d4edb.exe 4580 dcdc9d5ca48b187e43579970d081041297b8fa202a4420d613102b150c6d4edb.exe 4580 dcdc9d5ca48b187e43579970d081041297b8fa202a4420d613102b150c6d4edb.exe 4580 dcdc9d5ca48b187e43579970d081041297b8fa202a4420d613102b150c6d4edb.exe 4580 dcdc9d5ca48b187e43579970d081041297b8fa202a4420d613102b150c6d4edb.exe 4580 dcdc9d5ca48b187e43579970d081041297b8fa202a4420d613102b150c6d4edb.exe 4580 dcdc9d5ca48b187e43579970d081041297b8fa202a4420d613102b150c6d4edb.exe 4580 dcdc9d5ca48b187e43579970d081041297b8fa202a4420d613102b150c6d4edb.exe 4580 dcdc9d5ca48b187e43579970d081041297b8fa202a4420d613102b150c6d4edb.exe 4580 dcdc9d5ca48b187e43579970d081041297b8fa202a4420d613102b150c6d4edb.exe 4580 dcdc9d5ca48b187e43579970d081041297b8fa202a4420d613102b150c6d4edb.exe 4580 dcdc9d5ca48b187e43579970d081041297b8fa202a4420d613102b150c6d4edb.exe 4580 dcdc9d5ca48b187e43579970d081041297b8fa202a4420d613102b150c6d4edb.exe 4580 dcdc9d5ca48b187e43579970d081041297b8fa202a4420d613102b150c6d4edb.exe 4580 dcdc9d5ca48b187e43579970d081041297b8fa202a4420d613102b150c6d4edb.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2152 rundll32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4580 dcdc9d5ca48b187e43579970d081041297b8fa202a4420d613102b150c6d4edb.exe 2152 rundll32.exe 2152 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4580 wrote to memory of 2152 4580 dcdc9d5ca48b187e43579970d081041297b8fa202a4420d613102b150c6d4edb.exe 82 PID 4580 wrote to memory of 2152 4580 dcdc9d5ca48b187e43579970d081041297b8fa202a4420d613102b150c6d4edb.exe 82 PID 4580 wrote to memory of 2152 4580 dcdc9d5ca48b187e43579970d081041297b8fa202a4420d613102b150c6d4edb.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\dcdc9d5ca48b187e43579970d081041297b8fa202a4420d613102b150c6d4edb.exe"C:\Users\Admin\AppData\Local\Temp\dcdc9d5ca48b187e43579970d081041297b8fa202a4420d613102b150c6d4edb.exe"1⤵
- Modifies system executable filetype association
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4580 -
C:\Windows\system\rundll32.exeC:\Windows\system\rundll32.exe2⤵
- Executes dropped EXE
- Modifies system executable filetype association
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2152
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76KB
MD5c2ba8b420537407571618d9f84ee1483
SHA15907e1a56267637c15f258616f60be256be7bb6f
SHA256b9ffb596c9dc982771d49388dfe6454f68d0b432ec5529f189cb58749e0b7627
SHA512dde6a603ea2525aa7feb77cff99383a4a318b3320ffae4bc42ae5faa5c005dbf98e1360a8a90a987ac3afb6fdc0945eed8010078862963904a092fa81313befe
-
Filesize
81KB
MD5b6283d623ed0fd976163010478bc958a
SHA115fbed2092db70be738a4f92ca9e7f845df0d28f
SHA2564cf05b547bcd3c924ccd22eb3ee67d739b02c70da64233d2abe0e0e76c8a72a7
SHA5126900d231a93bd9eca7e0a8d6054c2ec5139b7910b3a59ba94b22ab836adbe84583e273cb1c0715594265864295d043f8880dcccb2cdb11fe20d6f9204e08fd24
-
Filesize
81KB
MD5b6283d623ed0fd976163010478bc958a
SHA115fbed2092db70be738a4f92ca9e7f845df0d28f
SHA2564cf05b547bcd3c924ccd22eb3ee67d739b02c70da64233d2abe0e0e76c8a72a7
SHA5126900d231a93bd9eca7e0a8d6054c2ec5139b7910b3a59ba94b22ab836adbe84583e273cb1c0715594265864295d043f8880dcccb2cdb11fe20d6f9204e08fd24