Analysis

  • max time kernel
    150s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230831-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/09/2023, 04:31

General

  • Target

    0c99b8c9d74abcbc7d5914055f34656bf20b8e76a3079ec3006e3bcc20618b14.exe

  • Size

    84KB

  • MD5

    56e307adec814c43eecbc8f2efcec038

  • SHA1

    c0cef3c35367dc4c1dfde7f167d2d28eaef39e7c

  • SHA256

    0c99b8c9d74abcbc7d5914055f34656bf20b8e76a3079ec3006e3bcc20618b14

  • SHA512

    fa5707f4120de5d73044966cb71ff4d1f5e84be941db1cb5f502d124fd25195092cd7c1417b6ae5ccddb261263263b7bc105d84f288b4a6c0cd02122497429d1

  • SSDEEP

    1536:RshfSWHHNvoLqNwDDGw02eQmh0HjWOw0SH010P9:GhfxHNIreQm+Hi70SH010P9

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Modifies system executable filetype association 2 TTPs 5 IoCs
  • Drops file in System32 directory 4 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies registry class 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 28 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0c99b8c9d74abcbc7d5914055f34656bf20b8e76a3079ec3006e3bcc20618b14.exe
    "C:\Users\Admin\AppData\Local\Temp\0c99b8c9d74abcbc7d5914055f34656bf20b8e76a3079ec3006e3bcc20618b14.exe"
    1⤵
    • Modifies system executable filetype association
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3532
    • C:\Windows\system\rundll32.exe
      C:\Windows\system\rundll32.exe
      2⤵
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:2168

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\notepad¢¬.exe

          Filesize

          75KB

          MD5

          97c39f34d2af1653f8742aa834084012

          SHA1

          1e401bae0961eb2c92851a89c6f0d63263ed4da7

          SHA256

          5ae40d6cf376facef1533257443e9ef44eb2c7ea15e439d7aa573d7e76437a30

          SHA512

          5b0b9aa518a0bea595bab636f46f44972daf4a099241bf69e1abb36cdb6d4e93601ac8050908160dbcd036158f8883a257aaeaf1cc50e203a2f43b7586dddd49

        • C:\Windows\System\rundll32.exe

          Filesize

          79KB

          MD5

          0d57c4d4db6b9f6bbbde93bd16e4cd3f

          SHA1

          7713dfad138c645a060e775b29e3d0bbdeaf53ce

          SHA256

          cc1e7c25afd1c5869164f8993152fae0b0a4b90be120dc75eeaa5d0e2d87e169

          SHA512

          48f4b404db1f5ed48a80ac5ebd9b37d80b878ddac7d86195816b952e8f285903def0d8b3c28707ad8604f1cd5bbc63220b8bbc749ae647e1673d87e2fd7df1f0

        • C:\Windows\system\rundll32.exe

          Filesize

          79KB

          MD5

          0d57c4d4db6b9f6bbbde93bd16e4cd3f

          SHA1

          7713dfad138c645a060e775b29e3d0bbdeaf53ce

          SHA256

          cc1e7c25afd1c5869164f8993152fae0b0a4b90be120dc75eeaa5d0e2d87e169

          SHA512

          48f4b404db1f5ed48a80ac5ebd9b37d80b878ddac7d86195816b952e8f285903def0d8b3c28707ad8604f1cd5bbc63220b8bbc749ae647e1673d87e2fd7df1f0

        • memory/2168-14-0x0000000000400000-0x0000000000415A00-memory.dmp

          Filesize

          86KB

        • memory/3532-0-0x0000000000400000-0x0000000000415A00-memory.dmp

          Filesize

          86KB

        • memory/3532-13-0x0000000000400000-0x0000000000415A00-memory.dmp

          Filesize

          86KB