Analysis
-
max time kernel
151s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
20-09-2023 01:26
Static task
static1
Behavioral task
behavioral1
Sample
06717b2d323266fcaf47484058df07be3610c5eb113754119913a183ebff22cc.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
06717b2d323266fcaf47484058df07be3610c5eb113754119913a183ebff22cc.exe
Resource
win10v2004-20230915-en
General
-
Target
06717b2d323266fcaf47484058df07be3610c5eb113754119913a183ebff22cc.exe
-
Size
80KB
-
MD5
22ae85ec72eb9675462270044176815e
-
SHA1
9c73eae8388ae7c90b92e995283913ee964597ac
-
SHA256
06717b2d323266fcaf47484058df07be3610c5eb113754119913a183ebff22cc
-
SHA512
9ea5bbb1e6f67db0126815c5bf62bd52048c646dab12e0183f66465be07f4c261dd7a6b0a7235d0befdfd2476f52c7b31fd38b6d8d010ed79bf2f149495b3685
-
SSDEEP
768:agO5xRYi+SfSWHHNvvG5bnl/NqNwsKVDstHxYD0p1aXKynF0vQmYZS0HdJnfWOVr:RshfSWHHNvoLqNwDDGw02eQmh0HjWOt
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1532 rundll32.exe -
Modifies system executable filetype association 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command 06717b2d323266fcaf47484058df07be3610c5eb113754119913a183ebff22cc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 06717b2d323266fcaf47484058df07be3610c5eb113754119913a183ebff22cc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" 06717b2d323266fcaf47484058df07be3610c5eb113754119913a183ebff22cc.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\¢«.exe 06717b2d323266fcaf47484058df07be3610c5eb113754119913a183ebff22cc.exe File created C:\Windows\SysWOW64\¢«.exe 06717b2d323266fcaf47484058df07be3610c5eb113754119913a183ebff22cc.exe File opened for modification C:\Windows\SysWOW64\notepad¢¬.exe 06717b2d323266fcaf47484058df07be3610c5eb113754119913a183ebff22cc.exe File created C:\Windows\SysWOW64\notepad¢¬.exe 06717b2d323266fcaf47484058df07be3610c5eb113754119913a183ebff22cc.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system\rundll32.exe 06717b2d323266fcaf47484058df07be3610c5eb113754119913a183ebff22cc.exe File created C:\Windows\system\rundll32.exe 06717b2d323266fcaf47484058df07be3610c5eb113754119913a183ebff22cc.exe -
Modifies registry class 15 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command 06717b2d323266fcaf47484058df07be3610c5eb113754119913a183ebff22cc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 06717b2d323266fcaf47484058df07be3610c5eb113754119913a183ebff22cc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad.exe %1" 06717b2d323266fcaf47484058df07be3610c5eb113754119913a183ebff22cc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainSetup = "1695173219" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" 06717b2d323266fcaf47484058df07be3610c5eb113754119913a183ebff22cc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" 06717b2d323266fcaf47484058df07be3610c5eb113754119913a183ebff22cc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainVer = "506" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\MSipv rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\MSipv 06717b2d323266fcaf47484058df07be3610c5eb113754119913a183ebff22cc.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command 06717b2d323266fcaf47484058df07be3610c5eb113754119913a183ebff22cc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainUp = "1695173219" rundll32.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 1344 06717b2d323266fcaf47484058df07be3610c5eb113754119913a183ebff22cc.exe 1344 06717b2d323266fcaf47484058df07be3610c5eb113754119913a183ebff22cc.exe 1344 06717b2d323266fcaf47484058df07be3610c5eb113754119913a183ebff22cc.exe 1344 06717b2d323266fcaf47484058df07be3610c5eb113754119913a183ebff22cc.exe 1344 06717b2d323266fcaf47484058df07be3610c5eb113754119913a183ebff22cc.exe 1344 06717b2d323266fcaf47484058df07be3610c5eb113754119913a183ebff22cc.exe 1344 06717b2d323266fcaf47484058df07be3610c5eb113754119913a183ebff22cc.exe 1344 06717b2d323266fcaf47484058df07be3610c5eb113754119913a183ebff22cc.exe 1344 06717b2d323266fcaf47484058df07be3610c5eb113754119913a183ebff22cc.exe 1344 06717b2d323266fcaf47484058df07be3610c5eb113754119913a183ebff22cc.exe 1344 06717b2d323266fcaf47484058df07be3610c5eb113754119913a183ebff22cc.exe 1344 06717b2d323266fcaf47484058df07be3610c5eb113754119913a183ebff22cc.exe 1344 06717b2d323266fcaf47484058df07be3610c5eb113754119913a183ebff22cc.exe 1344 06717b2d323266fcaf47484058df07be3610c5eb113754119913a183ebff22cc.exe 1344 06717b2d323266fcaf47484058df07be3610c5eb113754119913a183ebff22cc.exe 1344 06717b2d323266fcaf47484058df07be3610c5eb113754119913a183ebff22cc.exe 1344 06717b2d323266fcaf47484058df07be3610c5eb113754119913a183ebff22cc.exe 1344 06717b2d323266fcaf47484058df07be3610c5eb113754119913a183ebff22cc.exe 1344 06717b2d323266fcaf47484058df07be3610c5eb113754119913a183ebff22cc.exe 1344 06717b2d323266fcaf47484058df07be3610c5eb113754119913a183ebff22cc.exe 1344 06717b2d323266fcaf47484058df07be3610c5eb113754119913a183ebff22cc.exe 1344 06717b2d323266fcaf47484058df07be3610c5eb113754119913a183ebff22cc.exe 1344 06717b2d323266fcaf47484058df07be3610c5eb113754119913a183ebff22cc.exe 1344 06717b2d323266fcaf47484058df07be3610c5eb113754119913a183ebff22cc.exe 1344 06717b2d323266fcaf47484058df07be3610c5eb113754119913a183ebff22cc.exe 1344 06717b2d323266fcaf47484058df07be3610c5eb113754119913a183ebff22cc.exe 1344 06717b2d323266fcaf47484058df07be3610c5eb113754119913a183ebff22cc.exe 1344 06717b2d323266fcaf47484058df07be3610c5eb113754119913a183ebff22cc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1532 rundll32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1344 06717b2d323266fcaf47484058df07be3610c5eb113754119913a183ebff22cc.exe 1532 rundll32.exe 1532 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1344 wrote to memory of 1532 1344 06717b2d323266fcaf47484058df07be3610c5eb113754119913a183ebff22cc.exe 85 PID 1344 wrote to memory of 1532 1344 06717b2d323266fcaf47484058df07be3610c5eb113754119913a183ebff22cc.exe 85 PID 1344 wrote to memory of 1532 1344 06717b2d323266fcaf47484058df07be3610c5eb113754119913a183ebff22cc.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\06717b2d323266fcaf47484058df07be3610c5eb113754119913a183ebff22cc.exe"C:\Users\Admin\AppData\Local\Temp\06717b2d323266fcaf47484058df07be3610c5eb113754119913a183ebff22cc.exe"1⤵
- Modifies system executable filetype association
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Windows\system\rundll32.exeC:\Windows\system\rundll32.exe2⤵
- Executes dropped EXE
- Modifies system executable filetype association
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1532
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
81KB
MD5f549b8e2b81a50dff54895900e68d724
SHA118a29834dc415358bd048dd0a6116c59b9e027cf
SHA2565b7f069282ee6efaa1110c4198b85eaf7acab93e4631c6f25f66d904ba2c6416
SHA5120cf8833c3e9cbad366f7622e2c37c8103d68dacca2d5eff89647fe2faa79f5399232ca67aaadcc71bd76986c47cdbf9845053072fa52449435d6fc82dbbcbca5
-
Filesize
74KB
MD551ccd8cf94ec1bc40d165cdcf91c0f00
SHA10de505c7a192f2f41525b545f9a9cded736b591b
SHA2564eac23f257f546be9d6484a0b7adbf36a70406659754bb5f5551dcb088181fb8
SHA5128a15eaf4571807e07fce7909dc9b5b71cb00d2d92bd553a484b5a88a40f5ad961edd6761b7aa7039f9e06f9fab5d18b27b863b8998b7257e009a890a67a6679f
-
Filesize
74KB
MD551ccd8cf94ec1bc40d165cdcf91c0f00
SHA10de505c7a192f2f41525b545f9a9cded736b591b
SHA2564eac23f257f546be9d6484a0b7adbf36a70406659754bb5f5551dcb088181fb8
SHA5128a15eaf4571807e07fce7909dc9b5b71cb00d2d92bd553a484b5a88a40f5ad961edd6761b7aa7039f9e06f9fab5d18b27b863b8998b7257e009a890a67a6679f