Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
18-09-2023 02:28
Static task
static1
Behavioral task
behavioral1
Sample
5c057e9597dddaf151c2784acf7158c9c18cbf11e663f7156976fcdc601c7b45.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
5c057e9597dddaf151c2784acf7158c9c18cbf11e663f7156976fcdc601c7b45.exe
Resource
win10v2004-20230915-en
General
-
Target
5c057e9597dddaf151c2784acf7158c9c18cbf11e663f7156976fcdc601c7b45.exe
-
Size
82KB
-
MD5
fe2bd44489ea2b5ef3b38f61ddae0653
-
SHA1
d7ab2e89d692b14f83bb4fb528916e60451a05fb
-
SHA256
5c057e9597dddaf151c2784acf7158c9c18cbf11e663f7156976fcdc601c7b45
-
SHA512
048bccda9a98134c616d7c437d84dbb3dbf50752e03e47f03e4f5c27437d6f4e138d8f105391d73bd88285937151012a511ce43154d97d95334f07b434162057
-
SSDEEP
1536:RshfSWHHNvoLqNwDDGw02eQmh0HjWOAo4BENO:GhfxHNIreQm+HiNo4BENO
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2308 rundll32.exe -
Loads dropped DLL 2 IoCs
pid Process 2472 5c057e9597dddaf151c2784acf7158c9c18cbf11e663f7156976fcdc601c7b45.exe 2472 5c057e9597dddaf151c2784acf7158c9c18cbf11e663f7156976fcdc601c7b45.exe -
Modifies system executable filetype association 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 5c057e9597dddaf151c2784acf7158c9c18cbf11e663f7156976fcdc601c7b45.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" 5c057e9597dddaf151c2784acf7158c9c18cbf11e663f7156976fcdc601c7b45.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command 5c057e9597dddaf151c2784acf7158c9c18cbf11e663f7156976fcdc601c7b45.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\¢«.exe 5c057e9597dddaf151c2784acf7158c9c18cbf11e663f7156976fcdc601c7b45.exe File created C:\Windows\SysWOW64\¢«.exe 5c057e9597dddaf151c2784acf7158c9c18cbf11e663f7156976fcdc601c7b45.exe File opened for modification C:\Windows\SysWOW64\notepad¢¬.exe 5c057e9597dddaf151c2784acf7158c9c18cbf11e663f7156976fcdc601c7b45.exe File created C:\Windows\SysWOW64\notepad¢¬.exe 5c057e9597dddaf151c2784acf7158c9c18cbf11e663f7156976fcdc601c7b45.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system\rundll32.exe 5c057e9597dddaf151c2784acf7158c9c18cbf11e663f7156976fcdc601c7b45.exe File created C:\Windows\system\rundll32.exe 5c057e9597dddaf151c2784acf7158c9c18cbf11e663f7156976fcdc601c7b45.exe -
Modifies registry class 15 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command 5c057e9597dddaf151c2784acf7158c9c18cbf11e663f7156976fcdc601c7b45.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" 5c057e9597dddaf151c2784acf7158c9c18cbf11e663f7156976fcdc601c7b45.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainUp = "1695004145" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 5c057e9597dddaf151c2784acf7158c9c18cbf11e663f7156976fcdc601c7b45.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad.exe %1" 5c057e9597dddaf151c2784acf7158c9c18cbf11e663f7156976fcdc601c7b45.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainSetup = "1695004145" rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainVer = "506" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\MSipv 5c057e9597dddaf151c2784acf7158c9c18cbf11e663f7156976fcdc601c7b45.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command 5c057e9597dddaf151c2784acf7158c9c18cbf11e663f7156976fcdc601c7b45.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" 5c057e9597dddaf151c2784acf7158c9c18cbf11e663f7156976fcdc601c7b45.exe Key created \REGISTRY\MACHINE\Software\Classes\MSipv rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" rundll32.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2472 5c057e9597dddaf151c2784acf7158c9c18cbf11e663f7156976fcdc601c7b45.exe 2472 5c057e9597dddaf151c2784acf7158c9c18cbf11e663f7156976fcdc601c7b45.exe 2472 5c057e9597dddaf151c2784acf7158c9c18cbf11e663f7156976fcdc601c7b45.exe 2472 5c057e9597dddaf151c2784acf7158c9c18cbf11e663f7156976fcdc601c7b45.exe 2472 5c057e9597dddaf151c2784acf7158c9c18cbf11e663f7156976fcdc601c7b45.exe 2472 5c057e9597dddaf151c2784acf7158c9c18cbf11e663f7156976fcdc601c7b45.exe 2472 5c057e9597dddaf151c2784acf7158c9c18cbf11e663f7156976fcdc601c7b45.exe 2472 5c057e9597dddaf151c2784acf7158c9c18cbf11e663f7156976fcdc601c7b45.exe 2472 5c057e9597dddaf151c2784acf7158c9c18cbf11e663f7156976fcdc601c7b45.exe 2472 5c057e9597dddaf151c2784acf7158c9c18cbf11e663f7156976fcdc601c7b45.exe 2472 5c057e9597dddaf151c2784acf7158c9c18cbf11e663f7156976fcdc601c7b45.exe 2472 5c057e9597dddaf151c2784acf7158c9c18cbf11e663f7156976fcdc601c7b45.exe 2472 5c057e9597dddaf151c2784acf7158c9c18cbf11e663f7156976fcdc601c7b45.exe 2472 5c057e9597dddaf151c2784acf7158c9c18cbf11e663f7156976fcdc601c7b45.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2308 rundll32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2472 5c057e9597dddaf151c2784acf7158c9c18cbf11e663f7156976fcdc601c7b45.exe 2308 rundll32.exe 2308 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2472 wrote to memory of 2308 2472 5c057e9597dddaf151c2784acf7158c9c18cbf11e663f7156976fcdc601c7b45.exe 28 PID 2472 wrote to memory of 2308 2472 5c057e9597dddaf151c2784acf7158c9c18cbf11e663f7156976fcdc601c7b45.exe 28 PID 2472 wrote to memory of 2308 2472 5c057e9597dddaf151c2784acf7158c9c18cbf11e663f7156976fcdc601c7b45.exe 28 PID 2472 wrote to memory of 2308 2472 5c057e9597dddaf151c2784acf7158c9c18cbf11e663f7156976fcdc601c7b45.exe 28 PID 2472 wrote to memory of 2308 2472 5c057e9597dddaf151c2784acf7158c9c18cbf11e663f7156976fcdc601c7b45.exe 28 PID 2472 wrote to memory of 2308 2472 5c057e9597dddaf151c2784acf7158c9c18cbf11e663f7156976fcdc601c7b45.exe 28 PID 2472 wrote to memory of 2308 2472 5c057e9597dddaf151c2784acf7158c9c18cbf11e663f7156976fcdc601c7b45.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\5c057e9597dddaf151c2784acf7158c9c18cbf11e663f7156976fcdc601c7b45.exe"C:\Users\Admin\AppData\Local\Temp\5c057e9597dddaf151c2784acf7158c9c18cbf11e663f7156976fcdc601c7b45.exe"1⤵
- Loads dropped DLL
- Modifies system executable filetype association
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Windows\system\rundll32.exeC:\Windows\system\rundll32.exe2⤵
- Executes dropped EXE
- Modifies system executable filetype association
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2308
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76KB
MD5553467c96e0c49551a629222e128cb61
SHA1c2815063c9c365a17c9794bf2f7d482a52d2477b
SHA2563d4f94ed291f4a5b9275c8d4c6c81807b761e879b728e4216ce9f5e18ff4543c
SHA5127c080a00e08b89efc46099d84ad755eba4287627ff6bac00ddfc8b611f218db18a019ca4dba6339993fdd5cf2280df4ce3ee9402dbfc2bcadd43fc3e29ef7159
-
Filesize
82KB
MD54603b0a0b6782ba31afe0ae3316d0df6
SHA1ee54340537f2331f3f38d8357f2a68bff1a874a8
SHA2563c4b69deb8c7a8216e403dbd05a97c3d1bcccf42ba81ed14a06eeabe210f35bb
SHA512c4d91f1ba9a5700a3560f1751fb01925afdd9df9bbb15eb8a49ebd46d40ceb44fa86848154a1e8770715c47d9f03ea07148016252671f240cc9c29519a86c752
-
Filesize
82KB
MD54603b0a0b6782ba31afe0ae3316d0df6
SHA1ee54340537f2331f3f38d8357f2a68bff1a874a8
SHA2563c4b69deb8c7a8216e403dbd05a97c3d1bcccf42ba81ed14a06eeabe210f35bb
SHA512c4d91f1ba9a5700a3560f1751fb01925afdd9df9bbb15eb8a49ebd46d40ceb44fa86848154a1e8770715c47d9f03ea07148016252671f240cc9c29519a86c752
-
Filesize
82KB
MD54603b0a0b6782ba31afe0ae3316d0df6
SHA1ee54340537f2331f3f38d8357f2a68bff1a874a8
SHA2563c4b69deb8c7a8216e403dbd05a97c3d1bcccf42ba81ed14a06eeabe210f35bb
SHA512c4d91f1ba9a5700a3560f1751fb01925afdd9df9bbb15eb8a49ebd46d40ceb44fa86848154a1e8770715c47d9f03ea07148016252671f240cc9c29519a86c752
-
Filesize
82KB
MD54603b0a0b6782ba31afe0ae3316d0df6
SHA1ee54340537f2331f3f38d8357f2a68bff1a874a8
SHA2563c4b69deb8c7a8216e403dbd05a97c3d1bcccf42ba81ed14a06eeabe210f35bb
SHA512c4d91f1ba9a5700a3560f1751fb01925afdd9df9bbb15eb8a49ebd46d40ceb44fa86848154a1e8770715c47d9f03ea07148016252671f240cc9c29519a86c752