Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    22/09/2023, 04:16

General

  • Target

    a05c65af47148b518d0b9fabf5fa5015e855acc00246ccb37feeedf54447b178.exe

  • Size

    76KB

  • MD5

    a04e52792fe6d1e79b259c547dc0cfcd

  • SHA1

    452ace5309d1382889d4ad31fda69a97b3932d53

  • SHA256

    a05c65af47148b518d0b9fabf5fa5015e855acc00246ccb37feeedf54447b178

  • SHA512

    7f84a2bc6e9be671b4dcdd2cdb541858e4e8780c3ac20320565e7443188ca75264136352ac4854a3b8cc8dbe5bd0c850c34d5f554c76518461e6484e311c8f01

  • SSDEEP

    768:agO5xRYi+SfSWHHNvvG5bnl/NqNwsKVDstHxYD0p1aXKynF0vQmYZS0HdJnfWOxf:RshfSWHHNvoLqNwDDGw02eQmh0HjWOxf

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Modifies system executable filetype association 2 TTPs 5 IoCs
  • Drops file in System32 directory 4 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies registry class 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a05c65af47148b518d0b9fabf5fa5015e855acc00246ccb37feeedf54447b178.exe
    "C:\Users\Admin\AppData\Local\Temp\a05c65af47148b518d0b9fabf5fa5015e855acc00246ccb37feeedf54447b178.exe"
    1⤵
    • Loads dropped DLL
    • Modifies system executable filetype association
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2208
    • C:\Windows\system\rundll32.exe
      C:\Windows\system\rundll32.exe
      2⤵
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:2364

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\notepad¢¬.exe

          Filesize

          76KB

          MD5

          ec9dd1ef58d7d1aa282874dd9a55d414

          SHA1

          30b8307760afe2014a87caeae99e4cc2ea5ec453

          SHA256

          5e73d2456bfab89025db051048b65e3744e7209b5c7dcda532f91a3e7c93c963

          SHA512

          15244871b9027e39bc2b8fcae05cede6a83dd0c9c39a283fdd88ae06aa2b39da4732e88c8e864474f362b001036879fd19f5aae54e0da244c8061d5358f44f72

        • C:\Windows\system\rundll32.exe

          Filesize

          83KB

          MD5

          da3fd7a0bc1d8c2de1d59f5e3c78e9b6

          SHA1

          3fe5c5f0a61119f18f5f574db6becaecc631d677

          SHA256

          fbda0734cbda388fa769a80430e5b89ff379f908fcc51efb459910177da14987

          SHA512

          58bf15989f2b32e50084b5bbc2e1ef3ccbfe0030085082a6f6f55255ca12bdc8ec3a186d134df81821a61106150869e73be924725ecdd33a0ad1f67b56da033a

        • C:\Windows\system\rundll32.exe

          Filesize

          83KB

          MD5

          da3fd7a0bc1d8c2de1d59f5e3c78e9b6

          SHA1

          3fe5c5f0a61119f18f5f574db6becaecc631d677

          SHA256

          fbda0734cbda388fa769a80430e5b89ff379f908fcc51efb459910177da14987

          SHA512

          58bf15989f2b32e50084b5bbc2e1ef3ccbfe0030085082a6f6f55255ca12bdc8ec3a186d134df81821a61106150869e73be924725ecdd33a0ad1f67b56da033a

        • \Windows\system\rundll32.exe

          Filesize

          83KB

          MD5

          da3fd7a0bc1d8c2de1d59f5e3c78e9b6

          SHA1

          3fe5c5f0a61119f18f5f574db6becaecc631d677

          SHA256

          fbda0734cbda388fa769a80430e5b89ff379f908fcc51efb459910177da14987

          SHA512

          58bf15989f2b32e50084b5bbc2e1ef3ccbfe0030085082a6f6f55255ca12bdc8ec3a186d134df81821a61106150869e73be924725ecdd33a0ad1f67b56da033a

        • \Windows\system\rundll32.exe

          Filesize

          83KB

          MD5

          da3fd7a0bc1d8c2de1d59f5e3c78e9b6

          SHA1

          3fe5c5f0a61119f18f5f574db6becaecc631d677

          SHA256

          fbda0734cbda388fa769a80430e5b89ff379f908fcc51efb459910177da14987

          SHA512

          58bf15989f2b32e50084b5bbc2e1ef3ccbfe0030085082a6f6f55255ca12bdc8ec3a186d134df81821a61106150869e73be924725ecdd33a0ad1f67b56da033a

        • memory/2208-0-0x0000000000400000-0x0000000000415A00-memory.dmp

          Filesize

          86KB

        • memory/2208-12-0x0000000000270000-0x0000000000286000-memory.dmp

          Filesize

          88KB

        • memory/2208-20-0x0000000000400000-0x0000000000415A00-memory.dmp

          Filesize

          86KB

        • memory/2208-21-0x0000000000270000-0x0000000000272000-memory.dmp

          Filesize

          8KB

        • memory/2364-18-0x0000000000400000-0x0000000000415A00-memory.dmp

          Filesize

          86KB

        • memory/2364-22-0x0000000000400000-0x0000000000415A00-memory.dmp

          Filesize

          86KB