Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
21/09/2023, 04:46
Static task
static1
Behavioral task
behavioral1
Sample
e4be467f7ead8e346239df7ec1745f7904a4f3918eaedafbbb0280c3f8bea105.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
e4be467f7ead8e346239df7ec1745f7904a4f3918eaedafbbb0280c3f8bea105.exe
Resource
win10v2004-20230915-en
General
-
Target
e4be467f7ead8e346239df7ec1745f7904a4f3918eaedafbbb0280c3f8bea105.exe
-
Size
77KB
-
MD5
9b0a9937fec1d7018a457b32a3c38dbf
-
SHA1
846684d12de79125108337611fa4622a4cd040dc
-
SHA256
e4be467f7ead8e346239df7ec1745f7904a4f3918eaedafbbb0280c3f8bea105
-
SHA512
4e400a7f562d15479e8b472bc8361fda242697e096b1d5dbfa8a368bb458e296e96c705e91859f669677dcb71db3231ab2d4f676b85506d42c2cb2ae6abe8c49
-
SSDEEP
1536:RshfSWHHNvoLqNwDDGw02eQmh0HjWOZKhm:GhfxHNIreQm+HieKhm
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2904 rundll32.exe -
Loads dropped DLL 2 IoCs
pid Process 2172 e4be467f7ead8e346239df7ec1745f7904a4f3918eaedafbbb0280c3f8bea105.exe 2172 e4be467f7ead8e346239df7ec1745f7904a4f3918eaedafbbb0280c3f8bea105.exe -
Modifies system executable filetype association 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command e4be467f7ead8e346239df7ec1745f7904a4f3918eaedafbbb0280c3f8bea105.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" e4be467f7ead8e346239df7ec1745f7904a4f3918eaedafbbb0280c3f8bea105.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" e4be467f7ead8e346239df7ec1745f7904a4f3918eaedafbbb0280c3f8bea105.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\¢«.exe e4be467f7ead8e346239df7ec1745f7904a4f3918eaedafbbb0280c3f8bea105.exe File created C:\Windows\SysWOW64\¢«.exe e4be467f7ead8e346239df7ec1745f7904a4f3918eaedafbbb0280c3f8bea105.exe File opened for modification C:\Windows\SysWOW64\notepad¢¬.exe e4be467f7ead8e346239df7ec1745f7904a4f3918eaedafbbb0280c3f8bea105.exe File created C:\Windows\SysWOW64\notepad¢¬.exe e4be467f7ead8e346239df7ec1745f7904a4f3918eaedafbbb0280c3f8bea105.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system\rundll32.exe e4be467f7ead8e346239df7ec1745f7904a4f3918eaedafbbb0280c3f8bea105.exe File created C:\Windows\system\rundll32.exe e4be467f7ead8e346239df7ec1745f7904a4f3918eaedafbbb0280c3f8bea105.exe -
Modifies registry class 15 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command e4be467f7ead8e346239df7ec1745f7904a4f3918eaedafbbb0280c3f8bea105.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command e4be467f7ead8e346239df7ec1745f7904a4f3918eaedafbbb0280c3f8bea105.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainVer = "506" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\MSipv e4be467f7ead8e346239df7ec1745f7904a4f3918eaedafbbb0280c3f8bea105.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" e4be467f7ead8e346239df7ec1745f7904a4f3918eaedafbbb0280c3f8bea105.exe Key created \REGISTRY\MACHINE\Software\Classes\MSipv rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainSetup = "1695271585" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" e4be467f7ead8e346239df7ec1745f7904a4f3918eaedafbbb0280c3f8bea105.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad.exe %1" e4be467f7ead8e346239df7ec1745f7904a4f3918eaedafbbb0280c3f8bea105.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" e4be467f7ead8e346239df7ec1745f7904a4f3918eaedafbbb0280c3f8bea105.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainUp = "1695271585" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2172 e4be467f7ead8e346239df7ec1745f7904a4f3918eaedafbbb0280c3f8bea105.exe 2172 e4be467f7ead8e346239df7ec1745f7904a4f3918eaedafbbb0280c3f8bea105.exe 2172 e4be467f7ead8e346239df7ec1745f7904a4f3918eaedafbbb0280c3f8bea105.exe 2172 e4be467f7ead8e346239df7ec1745f7904a4f3918eaedafbbb0280c3f8bea105.exe 2172 e4be467f7ead8e346239df7ec1745f7904a4f3918eaedafbbb0280c3f8bea105.exe 2172 e4be467f7ead8e346239df7ec1745f7904a4f3918eaedafbbb0280c3f8bea105.exe 2172 e4be467f7ead8e346239df7ec1745f7904a4f3918eaedafbbb0280c3f8bea105.exe 2172 e4be467f7ead8e346239df7ec1745f7904a4f3918eaedafbbb0280c3f8bea105.exe 2172 e4be467f7ead8e346239df7ec1745f7904a4f3918eaedafbbb0280c3f8bea105.exe 2172 e4be467f7ead8e346239df7ec1745f7904a4f3918eaedafbbb0280c3f8bea105.exe 2172 e4be467f7ead8e346239df7ec1745f7904a4f3918eaedafbbb0280c3f8bea105.exe 2172 e4be467f7ead8e346239df7ec1745f7904a4f3918eaedafbbb0280c3f8bea105.exe 2172 e4be467f7ead8e346239df7ec1745f7904a4f3918eaedafbbb0280c3f8bea105.exe 2172 e4be467f7ead8e346239df7ec1745f7904a4f3918eaedafbbb0280c3f8bea105.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2904 rundll32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2172 e4be467f7ead8e346239df7ec1745f7904a4f3918eaedafbbb0280c3f8bea105.exe 2904 rundll32.exe 2904 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2172 wrote to memory of 2904 2172 e4be467f7ead8e346239df7ec1745f7904a4f3918eaedafbbb0280c3f8bea105.exe 28 PID 2172 wrote to memory of 2904 2172 e4be467f7ead8e346239df7ec1745f7904a4f3918eaedafbbb0280c3f8bea105.exe 28 PID 2172 wrote to memory of 2904 2172 e4be467f7ead8e346239df7ec1745f7904a4f3918eaedafbbb0280c3f8bea105.exe 28 PID 2172 wrote to memory of 2904 2172 e4be467f7ead8e346239df7ec1745f7904a4f3918eaedafbbb0280c3f8bea105.exe 28 PID 2172 wrote to memory of 2904 2172 e4be467f7ead8e346239df7ec1745f7904a4f3918eaedafbbb0280c3f8bea105.exe 28 PID 2172 wrote to memory of 2904 2172 e4be467f7ead8e346239df7ec1745f7904a4f3918eaedafbbb0280c3f8bea105.exe 28 PID 2172 wrote to memory of 2904 2172 e4be467f7ead8e346239df7ec1745f7904a4f3918eaedafbbb0280c3f8bea105.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\e4be467f7ead8e346239df7ec1745f7904a4f3918eaedafbbb0280c3f8bea105.exe"C:\Users\Admin\AppData\Local\Temp\e4be467f7ead8e346239df7ec1745f7904a4f3918eaedafbbb0280c3f8bea105.exe"1⤵
- Loads dropped DLL
- Modifies system executable filetype association
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\system\rundll32.exeC:\Windows\system\rundll32.exe2⤵
- Executes dropped EXE
- Modifies system executable filetype association
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2904
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76KB
MD5580503458ec7b5f4a93ff2d550e97994
SHA1af2b3e4c24edca14efad85bdd0831c4432cf4c99
SHA2566e3ee63d173db57559c5429b0a79e19987df05afaaaf159c1c62f2fdd2b34dee
SHA51259520b7637e358e87bfc97020089506abf0b971bef2dbc7377b8c793a650016c812b6331a24e9d2c008850293caf9682ab2f704642a93179803efb6302ad9ad6
-
Filesize
78KB
MD5a3cc1c1e1a22b36f81fba78dc8ed4ea6
SHA1d083dcf897a8f10e3a083dd159d40d9a1ba3cbe3
SHA256ec1ec2be2ef4c64852718aecd9686e360ab645fae54ab6bb8f0f58585d40f870
SHA512766ed9848bd4266ba6c1f6af8c9a9e3685cf8b087ec292f5c990ecc8410d1ac3074f83ec11db47af53856c4e008f42b081f58bfae7231bd3c3ef3b954bced169
-
Filesize
78KB
MD5a3cc1c1e1a22b36f81fba78dc8ed4ea6
SHA1d083dcf897a8f10e3a083dd159d40d9a1ba3cbe3
SHA256ec1ec2be2ef4c64852718aecd9686e360ab645fae54ab6bb8f0f58585d40f870
SHA512766ed9848bd4266ba6c1f6af8c9a9e3685cf8b087ec292f5c990ecc8410d1ac3074f83ec11db47af53856c4e008f42b081f58bfae7231bd3c3ef3b954bced169
-
Filesize
78KB
MD5a3cc1c1e1a22b36f81fba78dc8ed4ea6
SHA1d083dcf897a8f10e3a083dd159d40d9a1ba3cbe3
SHA256ec1ec2be2ef4c64852718aecd9686e360ab645fae54ab6bb8f0f58585d40f870
SHA512766ed9848bd4266ba6c1f6af8c9a9e3685cf8b087ec292f5c990ecc8410d1ac3074f83ec11db47af53856c4e008f42b081f58bfae7231bd3c3ef3b954bced169
-
Filesize
78KB
MD5a3cc1c1e1a22b36f81fba78dc8ed4ea6
SHA1d083dcf897a8f10e3a083dd159d40d9a1ba3cbe3
SHA256ec1ec2be2ef4c64852718aecd9686e360ab645fae54ab6bb8f0f58585d40f870
SHA512766ed9848bd4266ba6c1f6af8c9a9e3685cf8b087ec292f5c990ecc8410d1ac3074f83ec11db47af53856c4e008f42b081f58bfae7231bd3c3ef3b954bced169