Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    21/09/2023, 04:46

General

  • Target

    e4be467f7ead8e346239df7ec1745f7904a4f3918eaedafbbb0280c3f8bea105.exe

  • Size

    77KB

  • MD5

    9b0a9937fec1d7018a457b32a3c38dbf

  • SHA1

    846684d12de79125108337611fa4622a4cd040dc

  • SHA256

    e4be467f7ead8e346239df7ec1745f7904a4f3918eaedafbbb0280c3f8bea105

  • SHA512

    4e400a7f562d15479e8b472bc8361fda242697e096b1d5dbfa8a368bb458e296e96c705e91859f669677dcb71db3231ab2d4f676b85506d42c2cb2ae6abe8c49

  • SSDEEP

    1536:RshfSWHHNvoLqNwDDGw02eQmh0HjWOZKhm:GhfxHNIreQm+HieKhm

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Modifies system executable filetype association 2 TTPs 5 IoCs
  • Drops file in System32 directory 4 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies registry class 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e4be467f7ead8e346239df7ec1745f7904a4f3918eaedafbbb0280c3f8bea105.exe
    "C:\Users\Admin\AppData\Local\Temp\e4be467f7ead8e346239df7ec1745f7904a4f3918eaedafbbb0280c3f8bea105.exe"
    1⤵
    • Loads dropped DLL
    • Modifies system executable filetype association
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2172
    • C:\Windows\system\rundll32.exe
      C:\Windows\system\rundll32.exe
      2⤵
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:2904

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\notepad¢¬.exe

    Filesize

    76KB

    MD5

    580503458ec7b5f4a93ff2d550e97994

    SHA1

    af2b3e4c24edca14efad85bdd0831c4432cf4c99

    SHA256

    6e3ee63d173db57559c5429b0a79e19987df05afaaaf159c1c62f2fdd2b34dee

    SHA512

    59520b7637e358e87bfc97020089506abf0b971bef2dbc7377b8c793a650016c812b6331a24e9d2c008850293caf9682ab2f704642a93179803efb6302ad9ad6

  • C:\Windows\system\rundll32.exe

    Filesize

    78KB

    MD5

    a3cc1c1e1a22b36f81fba78dc8ed4ea6

    SHA1

    d083dcf897a8f10e3a083dd159d40d9a1ba3cbe3

    SHA256

    ec1ec2be2ef4c64852718aecd9686e360ab645fae54ab6bb8f0f58585d40f870

    SHA512

    766ed9848bd4266ba6c1f6af8c9a9e3685cf8b087ec292f5c990ecc8410d1ac3074f83ec11db47af53856c4e008f42b081f58bfae7231bd3c3ef3b954bced169

  • C:\Windows\system\rundll32.exe

    Filesize

    78KB

    MD5

    a3cc1c1e1a22b36f81fba78dc8ed4ea6

    SHA1

    d083dcf897a8f10e3a083dd159d40d9a1ba3cbe3

    SHA256

    ec1ec2be2ef4c64852718aecd9686e360ab645fae54ab6bb8f0f58585d40f870

    SHA512

    766ed9848bd4266ba6c1f6af8c9a9e3685cf8b087ec292f5c990ecc8410d1ac3074f83ec11db47af53856c4e008f42b081f58bfae7231bd3c3ef3b954bced169

  • \Windows\system\rundll32.exe

    Filesize

    78KB

    MD5

    a3cc1c1e1a22b36f81fba78dc8ed4ea6

    SHA1

    d083dcf897a8f10e3a083dd159d40d9a1ba3cbe3

    SHA256

    ec1ec2be2ef4c64852718aecd9686e360ab645fae54ab6bb8f0f58585d40f870

    SHA512

    766ed9848bd4266ba6c1f6af8c9a9e3685cf8b087ec292f5c990ecc8410d1ac3074f83ec11db47af53856c4e008f42b081f58bfae7231bd3c3ef3b954bced169

  • \Windows\system\rundll32.exe

    Filesize

    78KB

    MD5

    a3cc1c1e1a22b36f81fba78dc8ed4ea6

    SHA1

    d083dcf897a8f10e3a083dd159d40d9a1ba3cbe3

    SHA256

    ec1ec2be2ef4c64852718aecd9686e360ab645fae54ab6bb8f0f58585d40f870

    SHA512

    766ed9848bd4266ba6c1f6af8c9a9e3685cf8b087ec292f5c990ecc8410d1ac3074f83ec11db47af53856c4e008f42b081f58bfae7231bd3c3ef3b954bced169

  • memory/2172-0-0x0000000000400000-0x0000000000415A00-memory.dmp

    Filesize

    86KB

  • memory/2172-12-0x00000000002C0000-0x00000000002D6000-memory.dmp

    Filesize

    88KB

  • memory/2172-18-0x00000000002C0000-0x00000000002D6000-memory.dmp

    Filesize

    88KB

  • memory/2172-21-0x0000000000400000-0x0000000000415A00-memory.dmp

    Filesize

    86KB

  • memory/2172-22-0x00000000002C0000-0x00000000002C6000-memory.dmp

    Filesize

    24KB

  • memory/2904-20-0x0000000000400000-0x0000000000415A00-memory.dmp

    Filesize

    86KB

  • memory/2904-23-0x0000000000400000-0x0000000000415A00-memory.dmp

    Filesize

    86KB