Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
21/09/2023, 04:46
Static task
static1
Behavioral task
behavioral1
Sample
e4be467f7ead8e346239df7ec1745f7904a4f3918eaedafbbb0280c3f8bea105.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
e4be467f7ead8e346239df7ec1745f7904a4f3918eaedafbbb0280c3f8bea105.exe
Resource
win10v2004-20230915-en
General
-
Target
e4be467f7ead8e346239df7ec1745f7904a4f3918eaedafbbb0280c3f8bea105.exe
-
Size
77KB
-
MD5
9b0a9937fec1d7018a457b32a3c38dbf
-
SHA1
846684d12de79125108337611fa4622a4cd040dc
-
SHA256
e4be467f7ead8e346239df7ec1745f7904a4f3918eaedafbbb0280c3f8bea105
-
SHA512
4e400a7f562d15479e8b472bc8361fda242697e096b1d5dbfa8a368bb458e296e96c705e91859f669677dcb71db3231ab2d4f676b85506d42c2cb2ae6abe8c49
-
SSDEEP
1536:RshfSWHHNvoLqNwDDGw02eQmh0HjWOZKhm:GhfxHNIreQm+HieKhm
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4860 rundll32.exe -
Modifies system executable filetype association 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command e4be467f7ead8e346239df7ec1745f7904a4f3918eaedafbbb0280c3f8bea105.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" e4be467f7ead8e346239df7ec1745f7904a4f3918eaedafbbb0280c3f8bea105.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" e4be467f7ead8e346239df7ec1745f7904a4f3918eaedafbbb0280c3f8bea105.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\¢«.exe e4be467f7ead8e346239df7ec1745f7904a4f3918eaedafbbb0280c3f8bea105.exe File created C:\Windows\SysWOW64\¢«.exe e4be467f7ead8e346239df7ec1745f7904a4f3918eaedafbbb0280c3f8bea105.exe File opened for modification C:\Windows\SysWOW64\notepad¢¬.exe e4be467f7ead8e346239df7ec1745f7904a4f3918eaedafbbb0280c3f8bea105.exe File created C:\Windows\SysWOW64\notepad¢¬.exe e4be467f7ead8e346239df7ec1745f7904a4f3918eaedafbbb0280c3f8bea105.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system\rundll32.exe e4be467f7ead8e346239df7ec1745f7904a4f3918eaedafbbb0280c3f8bea105.exe File created C:\Windows\system\rundll32.exe e4be467f7ead8e346239df7ec1745f7904a4f3918eaedafbbb0280c3f8bea105.exe -
Modifies registry class 15 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\MSipv rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainSetup = "1695271588" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command e4be467f7ead8e346239df7ec1745f7904a4f3918eaedafbbb0280c3f8bea105.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" e4be467f7ead8e346239df7ec1745f7904a4f3918eaedafbbb0280c3f8bea105.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainUp = "1695271588" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" e4be467f7ead8e346239df7ec1745f7904a4f3918eaedafbbb0280c3f8bea105.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainVer = "506" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command e4be467f7ead8e346239df7ec1745f7904a4f3918eaedafbbb0280c3f8bea105.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" e4be467f7ead8e346239df7ec1745f7904a4f3918eaedafbbb0280c3f8bea105.exe Key created \REGISTRY\MACHINE\Software\Classes\MSipv e4be467f7ead8e346239df7ec1745f7904a4f3918eaedafbbb0280c3f8bea105.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad.exe %1" e4be467f7ead8e346239df7ec1745f7904a4f3918eaedafbbb0280c3f8bea105.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 3240 e4be467f7ead8e346239df7ec1745f7904a4f3918eaedafbbb0280c3f8bea105.exe 3240 e4be467f7ead8e346239df7ec1745f7904a4f3918eaedafbbb0280c3f8bea105.exe 3240 e4be467f7ead8e346239df7ec1745f7904a4f3918eaedafbbb0280c3f8bea105.exe 3240 e4be467f7ead8e346239df7ec1745f7904a4f3918eaedafbbb0280c3f8bea105.exe 3240 e4be467f7ead8e346239df7ec1745f7904a4f3918eaedafbbb0280c3f8bea105.exe 3240 e4be467f7ead8e346239df7ec1745f7904a4f3918eaedafbbb0280c3f8bea105.exe 3240 e4be467f7ead8e346239df7ec1745f7904a4f3918eaedafbbb0280c3f8bea105.exe 3240 e4be467f7ead8e346239df7ec1745f7904a4f3918eaedafbbb0280c3f8bea105.exe 3240 e4be467f7ead8e346239df7ec1745f7904a4f3918eaedafbbb0280c3f8bea105.exe 3240 e4be467f7ead8e346239df7ec1745f7904a4f3918eaedafbbb0280c3f8bea105.exe 3240 e4be467f7ead8e346239df7ec1745f7904a4f3918eaedafbbb0280c3f8bea105.exe 3240 e4be467f7ead8e346239df7ec1745f7904a4f3918eaedafbbb0280c3f8bea105.exe 3240 e4be467f7ead8e346239df7ec1745f7904a4f3918eaedafbbb0280c3f8bea105.exe 3240 e4be467f7ead8e346239df7ec1745f7904a4f3918eaedafbbb0280c3f8bea105.exe 3240 e4be467f7ead8e346239df7ec1745f7904a4f3918eaedafbbb0280c3f8bea105.exe 3240 e4be467f7ead8e346239df7ec1745f7904a4f3918eaedafbbb0280c3f8bea105.exe 3240 e4be467f7ead8e346239df7ec1745f7904a4f3918eaedafbbb0280c3f8bea105.exe 3240 e4be467f7ead8e346239df7ec1745f7904a4f3918eaedafbbb0280c3f8bea105.exe 3240 e4be467f7ead8e346239df7ec1745f7904a4f3918eaedafbbb0280c3f8bea105.exe 3240 e4be467f7ead8e346239df7ec1745f7904a4f3918eaedafbbb0280c3f8bea105.exe 3240 e4be467f7ead8e346239df7ec1745f7904a4f3918eaedafbbb0280c3f8bea105.exe 3240 e4be467f7ead8e346239df7ec1745f7904a4f3918eaedafbbb0280c3f8bea105.exe 3240 e4be467f7ead8e346239df7ec1745f7904a4f3918eaedafbbb0280c3f8bea105.exe 3240 e4be467f7ead8e346239df7ec1745f7904a4f3918eaedafbbb0280c3f8bea105.exe 3240 e4be467f7ead8e346239df7ec1745f7904a4f3918eaedafbbb0280c3f8bea105.exe 3240 e4be467f7ead8e346239df7ec1745f7904a4f3918eaedafbbb0280c3f8bea105.exe 3240 e4be467f7ead8e346239df7ec1745f7904a4f3918eaedafbbb0280c3f8bea105.exe 3240 e4be467f7ead8e346239df7ec1745f7904a4f3918eaedafbbb0280c3f8bea105.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4860 rundll32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3240 e4be467f7ead8e346239df7ec1745f7904a4f3918eaedafbbb0280c3f8bea105.exe 4860 rundll32.exe 4860 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3240 wrote to memory of 4860 3240 e4be467f7ead8e346239df7ec1745f7904a4f3918eaedafbbb0280c3f8bea105.exe 88 PID 3240 wrote to memory of 4860 3240 e4be467f7ead8e346239df7ec1745f7904a4f3918eaedafbbb0280c3f8bea105.exe 88 PID 3240 wrote to memory of 4860 3240 e4be467f7ead8e346239df7ec1745f7904a4f3918eaedafbbb0280c3f8bea105.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\e4be467f7ead8e346239df7ec1745f7904a4f3918eaedafbbb0280c3f8bea105.exe"C:\Users\Admin\AppData\Local\Temp\e4be467f7ead8e346239df7ec1745f7904a4f3918eaedafbbb0280c3f8bea105.exe"1⤵
- Modifies system executable filetype association
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3240 -
C:\Windows\system\rundll32.exeC:\Windows\system\rundll32.exe2⤵
- Executes dropped EXE
- Modifies system executable filetype association
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:4860
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
79KB
MD5a01be12c100edb4422c3b9b3dbe22551
SHA1bf4b6c957e9ae4aba832ec22c3cdabd851d3b3f3
SHA256d144bd713ce1dca369b2f9a6d559d1625e233337d3fdae9f604ecab2bcfcccfc
SHA5128ae42b10c67a3602c98413761d423a2a6dd6cfaf1e71c3522617ee99528359600668c672b3e0dd4d78928ad80a059ac0da71b63218f7a187d3df026c4b536b93
-
Filesize
83KB
MD5bbe15d635f0b78b8a0ee39736f7f83dc
SHA1c0fb0f74f0f2a1120fdc5d5ff32ef1f133096eb3
SHA25652673f1ca4e90d8e6151e9868ae4db3ca2ddeda0010ca349a7feceec3eec929b
SHA5124bec2bb53150dd3ab0a9d6ce64f849c0a75c5d3e239ddeef896ebc6b004a3eedc0c4671a9ce89ab299ecd84594d6c7ac8433f6cbdc7a93dffe7b70d2461d6690
-
Filesize
83KB
MD5bbe15d635f0b78b8a0ee39736f7f83dc
SHA1c0fb0f74f0f2a1120fdc5d5ff32ef1f133096eb3
SHA25652673f1ca4e90d8e6151e9868ae4db3ca2ddeda0010ca349a7feceec3eec929b
SHA5124bec2bb53150dd3ab0a9d6ce64f849c0a75c5d3e239ddeef896ebc6b004a3eedc0c4671a9ce89ab299ecd84594d6c7ac8433f6cbdc7a93dffe7b70d2461d6690