Analysis
-
max time kernel
167s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
20/09/2023, 15:29
Static task
static1
Behavioral task
behavioral1
Sample
91d026ae60c3b2e1441765950c33f4a1d0d17addc1b53dc778f3cab215032c5f.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
91d026ae60c3b2e1441765950c33f4a1d0d17addc1b53dc778f3cab215032c5f.exe
Resource
win10v2004-20230915-en
General
-
Target
91d026ae60c3b2e1441765950c33f4a1d0d17addc1b53dc778f3cab215032c5f.exe
-
Size
76KB
-
MD5
cc73e7318e81ab0a4949fc9a3be04550
-
SHA1
a01f2cb5edecd78e8383116871302d2d7e91d6f1
-
SHA256
91d026ae60c3b2e1441765950c33f4a1d0d17addc1b53dc778f3cab215032c5f
-
SHA512
41e8c3a9482c5459f1d599ec94f7e7eff8df3e7f809899080bca54da7d76ec916a1e890528a58655d81d149a73712c119282734d7246dea3f644746b2899249c
-
SSDEEP
1536:RshfSWHHNvoLqNwDDGw02eQmh0HjWOfWe:GhfxHNIreQm+HiIWe
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4364 rundll32.exe -
Modifies system executable filetype association 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command 91d026ae60c3b2e1441765950c33f4a1d0d17addc1b53dc778f3cab215032c5f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 91d026ae60c3b2e1441765950c33f4a1d0d17addc1b53dc778f3cab215032c5f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" 91d026ae60c3b2e1441765950c33f4a1d0d17addc1b53dc778f3cab215032c5f.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\¢«.exe 91d026ae60c3b2e1441765950c33f4a1d0d17addc1b53dc778f3cab215032c5f.exe File opened for modification C:\Windows\SysWOW64\notepad¢¬.exe 91d026ae60c3b2e1441765950c33f4a1d0d17addc1b53dc778f3cab215032c5f.exe File created C:\Windows\SysWOW64\notepad¢¬.exe 91d026ae60c3b2e1441765950c33f4a1d0d17addc1b53dc778f3cab215032c5f.exe File opened for modification C:\Windows\SysWOW64\¢«.exe 91d026ae60c3b2e1441765950c33f4a1d0d17addc1b53dc778f3cab215032c5f.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\system\rundll32.exe 91d026ae60c3b2e1441765950c33f4a1d0d17addc1b53dc778f3cab215032c5f.exe File opened for modification C:\Windows\system\rundll32.exe 91d026ae60c3b2e1441765950c33f4a1d0d17addc1b53dc778f3cab215032c5f.exe -
Modifies registry class 15 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad.exe %1" 91d026ae60c3b2e1441765950c33f4a1d0d17addc1b53dc778f3cab215032c5f.exe Key created \REGISTRY\MACHINE\Software\Classes\MSipv rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainSetup = "1695223771" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" 91d026ae60c3b2e1441765950c33f4a1d0d17addc1b53dc778f3cab215032c5f.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command 91d026ae60c3b2e1441765950c33f4a1d0d17addc1b53dc778f3cab215032c5f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 91d026ae60c3b2e1441765950c33f4a1d0d17addc1b53dc778f3cab215032c5f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainUp = "1695223771" rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainVer = "506" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\MSipv 91d026ae60c3b2e1441765950c33f4a1d0d17addc1b53dc778f3cab215032c5f.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command 91d026ae60c3b2e1441765950c33f4a1d0d17addc1b53dc778f3cab215032c5f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" 91d026ae60c3b2e1441765950c33f4a1d0d17addc1b53dc778f3cab215032c5f.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 5000 91d026ae60c3b2e1441765950c33f4a1d0d17addc1b53dc778f3cab215032c5f.exe 5000 91d026ae60c3b2e1441765950c33f4a1d0d17addc1b53dc778f3cab215032c5f.exe 5000 91d026ae60c3b2e1441765950c33f4a1d0d17addc1b53dc778f3cab215032c5f.exe 5000 91d026ae60c3b2e1441765950c33f4a1d0d17addc1b53dc778f3cab215032c5f.exe 5000 91d026ae60c3b2e1441765950c33f4a1d0d17addc1b53dc778f3cab215032c5f.exe 5000 91d026ae60c3b2e1441765950c33f4a1d0d17addc1b53dc778f3cab215032c5f.exe 5000 91d026ae60c3b2e1441765950c33f4a1d0d17addc1b53dc778f3cab215032c5f.exe 5000 91d026ae60c3b2e1441765950c33f4a1d0d17addc1b53dc778f3cab215032c5f.exe 5000 91d026ae60c3b2e1441765950c33f4a1d0d17addc1b53dc778f3cab215032c5f.exe 5000 91d026ae60c3b2e1441765950c33f4a1d0d17addc1b53dc778f3cab215032c5f.exe 5000 91d026ae60c3b2e1441765950c33f4a1d0d17addc1b53dc778f3cab215032c5f.exe 5000 91d026ae60c3b2e1441765950c33f4a1d0d17addc1b53dc778f3cab215032c5f.exe 5000 91d026ae60c3b2e1441765950c33f4a1d0d17addc1b53dc778f3cab215032c5f.exe 5000 91d026ae60c3b2e1441765950c33f4a1d0d17addc1b53dc778f3cab215032c5f.exe 5000 91d026ae60c3b2e1441765950c33f4a1d0d17addc1b53dc778f3cab215032c5f.exe 5000 91d026ae60c3b2e1441765950c33f4a1d0d17addc1b53dc778f3cab215032c5f.exe 5000 91d026ae60c3b2e1441765950c33f4a1d0d17addc1b53dc778f3cab215032c5f.exe 5000 91d026ae60c3b2e1441765950c33f4a1d0d17addc1b53dc778f3cab215032c5f.exe 5000 91d026ae60c3b2e1441765950c33f4a1d0d17addc1b53dc778f3cab215032c5f.exe 5000 91d026ae60c3b2e1441765950c33f4a1d0d17addc1b53dc778f3cab215032c5f.exe 5000 91d026ae60c3b2e1441765950c33f4a1d0d17addc1b53dc778f3cab215032c5f.exe 5000 91d026ae60c3b2e1441765950c33f4a1d0d17addc1b53dc778f3cab215032c5f.exe 5000 91d026ae60c3b2e1441765950c33f4a1d0d17addc1b53dc778f3cab215032c5f.exe 5000 91d026ae60c3b2e1441765950c33f4a1d0d17addc1b53dc778f3cab215032c5f.exe 5000 91d026ae60c3b2e1441765950c33f4a1d0d17addc1b53dc778f3cab215032c5f.exe 5000 91d026ae60c3b2e1441765950c33f4a1d0d17addc1b53dc778f3cab215032c5f.exe 5000 91d026ae60c3b2e1441765950c33f4a1d0d17addc1b53dc778f3cab215032c5f.exe 5000 91d026ae60c3b2e1441765950c33f4a1d0d17addc1b53dc778f3cab215032c5f.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4364 rundll32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 5000 91d026ae60c3b2e1441765950c33f4a1d0d17addc1b53dc778f3cab215032c5f.exe 4364 rundll32.exe 4364 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5000 wrote to memory of 4364 5000 91d026ae60c3b2e1441765950c33f4a1d0d17addc1b53dc778f3cab215032c5f.exe 85 PID 5000 wrote to memory of 4364 5000 91d026ae60c3b2e1441765950c33f4a1d0d17addc1b53dc778f3cab215032c5f.exe 85 PID 5000 wrote to memory of 4364 5000 91d026ae60c3b2e1441765950c33f4a1d0d17addc1b53dc778f3cab215032c5f.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\91d026ae60c3b2e1441765950c33f4a1d0d17addc1b53dc778f3cab215032c5f.exe"C:\Users\Admin\AppData\Local\Temp\91d026ae60c3b2e1441765950c33f4a1d0d17addc1b53dc778f3cab215032c5f.exe"1⤵
- Modifies system executable filetype association
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Windows\system\rundll32.exeC:\Windows\system\rundll32.exe2⤵
- Executes dropped EXE
- Modifies system executable filetype association
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:4364
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
77KB
MD58a1112412e796ac8315f5ec64644e5aa
SHA1fa55b2c3db0686476e1b8f7dd421d1074aa85a48
SHA25689dc912fecdfff504280d30473b5cc79c7a27dac36223928e6cc2e1105e49c7c
SHA512ba679cd2d6e58a9215d4b9bdd9ac5750a28c3f3fc7948737c3f0920d5c99dc46a1e92bccd4797a68961e09adbfa0c42293f20f02e5f439758969d5c0abf2a23c
-
Filesize
77KB
MD5aa2b5d0480b1fe4888e57e32f185a9fc
SHA1666c7c187226ac3c0cbb2d8de78431eee39650db
SHA2569694554086d2fb53510f16a0e15bc00e24148f97e270e4ec4c295c0ec7c930a9
SHA5127f2284171c107a22dfa47e0cd818c61938513cacef50d854281166b00e6efd019fe6c5712a9b70b0954957337c430b01bf612d542f7435e89a5fcec086aa7a4d
-
Filesize
77KB
MD5aa2b5d0480b1fe4888e57e32f185a9fc
SHA1666c7c187226ac3c0cbb2d8de78431eee39650db
SHA2569694554086d2fb53510f16a0e15bc00e24148f97e270e4ec4c295c0ec7c930a9
SHA5127f2284171c107a22dfa47e0cd818c61938513cacef50d854281166b00e6efd019fe6c5712a9b70b0954957337c430b01bf612d542f7435e89a5fcec086aa7a4d