Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-09-2023 02:28

General

  • Target

    5c057e9597dddaf151c2784acf7158c9c18cbf11e663f7156976fcdc601c7b45.exe

  • Size

    82KB

  • MD5

    fe2bd44489ea2b5ef3b38f61ddae0653

  • SHA1

    d7ab2e89d692b14f83bb4fb528916e60451a05fb

  • SHA256

    5c057e9597dddaf151c2784acf7158c9c18cbf11e663f7156976fcdc601c7b45

  • SHA512

    048bccda9a98134c616d7c437d84dbb3dbf50752e03e47f03e4f5c27437d6f4e138d8f105391d73bd88285937151012a511ce43154d97d95334f07b434162057

  • SSDEEP

    1536:RshfSWHHNvoLqNwDDGw02eQmh0HjWOAo4BENO:GhfxHNIreQm+HiNo4BENO

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Modifies system executable filetype association 2 TTPs 5 IoCs
  • Drops file in System32 directory 4 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies registry class 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 28 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5c057e9597dddaf151c2784acf7158c9c18cbf11e663f7156976fcdc601c7b45.exe
    "C:\Users\Admin\AppData\Local\Temp\5c057e9597dddaf151c2784acf7158c9c18cbf11e663f7156976fcdc601c7b45.exe"
    1⤵
    • Modifies system executable filetype association
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3772
    • C:\Windows\system\rundll32.exe
      C:\Windows\system\rundll32.exe
      2⤵
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:3324

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\notepad¢¬.exe

    Filesize

    80KB

    MD5

    4ef8749251be1d33b5d6004fd3820bd3

    SHA1

    f14ffacf191cb87d7dda5907e793d32661edb1af

    SHA256

    7b6977e43931b99263021dcf25c2e7f5b598c73f4deb8a540b2f1b27adb74542

    SHA512

    1154ddb4a1bf06937eb795dfa644355c3ffded433ffdb66f1ad89c7c53fa3dccda1434781e73bcdfca2191fa4e3f85c8dc5b43cbd3d8c7d54f1623da394cb0cb

  • C:\Windows\System\rundll32.exe

    Filesize

    80KB

    MD5

    7139b392a3b4f54f6df756fb0899dc30

    SHA1

    d74ec470f60bd0fad1f72b2cd612107be70041c3

    SHA256

    f93c570c0b42da40d79382ddb5b9f47ac462f7d1eaeba67746b1650f9fd1895b

    SHA512

    d394b9541b2713a6efec8ad81f6799fb3bee013203efa7d315e1626ceaea8c965f463a381b741cac002e4fcf7e3e13dabf3e684b4923194fd89f7dd281d52a07

  • C:\Windows\system\rundll32.exe

    Filesize

    80KB

    MD5

    7139b392a3b4f54f6df756fb0899dc30

    SHA1

    d74ec470f60bd0fad1f72b2cd612107be70041c3

    SHA256

    f93c570c0b42da40d79382ddb5b9f47ac462f7d1eaeba67746b1650f9fd1895b

    SHA512

    d394b9541b2713a6efec8ad81f6799fb3bee013203efa7d315e1626ceaea8c965f463a381b741cac002e4fcf7e3e13dabf3e684b4923194fd89f7dd281d52a07

  • memory/3324-14-0x0000000000400000-0x0000000000415A00-memory.dmp

    Filesize

    86KB

  • memory/3772-0-0x0000000000400000-0x0000000000415A00-memory.dmp

    Filesize

    86KB

  • memory/3772-13-0x0000000000400000-0x0000000000415A00-memory.dmp

    Filesize

    86KB