Analysis

  • max time kernel
    167s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/09/2023, 15:29

General

  • Target

    91d026ae60c3b2e1441765950c33f4a1d0d17addc1b53dc778f3cab215032c5f.exe

  • Size

    76KB

  • MD5

    cc73e7318e81ab0a4949fc9a3be04550

  • SHA1

    a01f2cb5edecd78e8383116871302d2d7e91d6f1

  • SHA256

    91d026ae60c3b2e1441765950c33f4a1d0d17addc1b53dc778f3cab215032c5f

  • SHA512

    41e8c3a9482c5459f1d599ec94f7e7eff8df3e7f809899080bca54da7d76ec916a1e890528a58655d81d149a73712c119282734d7246dea3f644746b2899249c

  • SSDEEP

    1536:RshfSWHHNvoLqNwDDGw02eQmh0HjWOfWe:GhfxHNIreQm+HiIWe

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Modifies system executable filetype association 2 TTPs 5 IoCs
  • Drops file in System32 directory 4 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies registry class 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 28 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\91d026ae60c3b2e1441765950c33f4a1d0d17addc1b53dc778f3cab215032c5f.exe
    "C:\Users\Admin\AppData\Local\Temp\91d026ae60c3b2e1441765950c33f4a1d0d17addc1b53dc778f3cab215032c5f.exe"
    1⤵
    • Modifies system executable filetype association
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:5000
    • C:\Windows\system\rundll32.exe
      C:\Windows\system\rundll32.exe
      2⤵
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:4364

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\notepad¢¬.exe

          Filesize

          77KB

          MD5

          8a1112412e796ac8315f5ec64644e5aa

          SHA1

          fa55b2c3db0686476e1b8f7dd421d1074aa85a48

          SHA256

          89dc912fecdfff504280d30473b5cc79c7a27dac36223928e6cc2e1105e49c7c

          SHA512

          ba679cd2d6e58a9215d4b9bdd9ac5750a28c3f3fc7948737c3f0920d5c99dc46a1e92bccd4797a68961e09adbfa0c42293f20f02e5f439758969d5c0abf2a23c

        • C:\Windows\System\rundll32.exe

          Filesize

          77KB

          MD5

          aa2b5d0480b1fe4888e57e32f185a9fc

          SHA1

          666c7c187226ac3c0cbb2d8de78431eee39650db

          SHA256

          9694554086d2fb53510f16a0e15bc00e24148f97e270e4ec4c295c0ec7c930a9

          SHA512

          7f2284171c107a22dfa47e0cd818c61938513cacef50d854281166b00e6efd019fe6c5712a9b70b0954957337c430b01bf612d542f7435e89a5fcec086aa7a4d

        • C:\Windows\system\rundll32.exe

          Filesize

          77KB

          MD5

          aa2b5d0480b1fe4888e57e32f185a9fc

          SHA1

          666c7c187226ac3c0cbb2d8de78431eee39650db

          SHA256

          9694554086d2fb53510f16a0e15bc00e24148f97e270e4ec4c295c0ec7c930a9

          SHA512

          7f2284171c107a22dfa47e0cd818c61938513cacef50d854281166b00e6efd019fe6c5712a9b70b0954957337c430b01bf612d542f7435e89a5fcec086aa7a4d

        • memory/4364-14-0x0000000000400000-0x0000000000415A00-memory.dmp

          Filesize

          86KB

        • memory/5000-0-0x0000000000400000-0x0000000000415A00-memory.dmp

          Filesize

          86KB

        • memory/5000-13-0x0000000000400000-0x0000000000415A00-memory.dmp

          Filesize

          86KB