Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
22/09/2023, 04:16
Static task
static1
Behavioral task
behavioral1
Sample
a05c65af47148b518d0b9fabf5fa5015e855acc00246ccb37feeedf54447b178.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
a05c65af47148b518d0b9fabf5fa5015e855acc00246ccb37feeedf54447b178.exe
Resource
win10v2004-20230915-en
General
-
Target
a05c65af47148b518d0b9fabf5fa5015e855acc00246ccb37feeedf54447b178.exe
-
Size
76KB
-
MD5
a04e52792fe6d1e79b259c547dc0cfcd
-
SHA1
452ace5309d1382889d4ad31fda69a97b3932d53
-
SHA256
a05c65af47148b518d0b9fabf5fa5015e855acc00246ccb37feeedf54447b178
-
SHA512
7f84a2bc6e9be671b4dcdd2cdb541858e4e8780c3ac20320565e7443188ca75264136352ac4854a3b8cc8dbe5bd0c850c34d5f554c76518461e6484e311c8f01
-
SSDEEP
768:agO5xRYi+SfSWHHNvvG5bnl/NqNwsKVDstHxYD0p1aXKynF0vQmYZS0HdJnfWOxf:RshfSWHHNvoLqNwDDGw02eQmh0HjWOxf
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2364 rundll32.exe -
Loads dropped DLL 2 IoCs
pid Process 2208 a05c65af47148b518d0b9fabf5fa5015e855acc00246ccb37feeedf54447b178.exe 2208 a05c65af47148b518d0b9fabf5fa5015e855acc00246ccb37feeedf54447b178.exe -
Modifies system executable filetype association 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" a05c65af47148b518d0b9fabf5fa5015e855acc00246ccb37feeedf54447b178.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" a05c65af47148b518d0b9fabf5fa5015e855acc00246ccb37feeedf54447b178.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command a05c65af47148b518d0b9fabf5fa5015e855acc00246ccb37feeedf54447b178.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\¢«.exe a05c65af47148b518d0b9fabf5fa5015e855acc00246ccb37feeedf54447b178.exe File created C:\Windows\SysWOW64\¢«.exe a05c65af47148b518d0b9fabf5fa5015e855acc00246ccb37feeedf54447b178.exe File opened for modification C:\Windows\SysWOW64\notepad¢¬.exe a05c65af47148b518d0b9fabf5fa5015e855acc00246ccb37feeedf54447b178.exe File created C:\Windows\SysWOW64\notepad¢¬.exe a05c65af47148b518d0b9fabf5fa5015e855acc00246ccb37feeedf54447b178.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system\rundll32.exe a05c65af47148b518d0b9fabf5fa5015e855acc00246ccb37feeedf54447b178.exe File created C:\Windows\system\rundll32.exe a05c65af47148b518d0b9fabf5fa5015e855acc00246ccb37feeedf54447b178.exe -
Modifies registry class 15 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\MSipv a05c65af47148b518d0b9fabf5fa5015e855acc00246ccb37feeedf54447b178.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainVer = "506" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command a05c65af47148b518d0b9fabf5fa5015e855acc00246ccb37feeedf54447b178.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad.exe %1" a05c65af47148b518d0b9fabf5fa5015e855acc00246ccb37feeedf54447b178.exe Key created \REGISTRY\MACHINE\Software\Classes\MSipv rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainSetup = "1695356193" rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainUp = "1695356193" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" a05c65af47148b518d0b9fabf5fa5015e855acc00246ccb37feeedf54447b178.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" a05c65af47148b518d0b9fabf5fa5015e855acc00246ccb37feeedf54447b178.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command a05c65af47148b518d0b9fabf5fa5015e855acc00246ccb37feeedf54447b178.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" a05c65af47148b518d0b9fabf5fa5015e855acc00246ccb37feeedf54447b178.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2208 a05c65af47148b518d0b9fabf5fa5015e855acc00246ccb37feeedf54447b178.exe 2208 a05c65af47148b518d0b9fabf5fa5015e855acc00246ccb37feeedf54447b178.exe 2208 a05c65af47148b518d0b9fabf5fa5015e855acc00246ccb37feeedf54447b178.exe 2208 a05c65af47148b518d0b9fabf5fa5015e855acc00246ccb37feeedf54447b178.exe 2208 a05c65af47148b518d0b9fabf5fa5015e855acc00246ccb37feeedf54447b178.exe 2208 a05c65af47148b518d0b9fabf5fa5015e855acc00246ccb37feeedf54447b178.exe 2208 a05c65af47148b518d0b9fabf5fa5015e855acc00246ccb37feeedf54447b178.exe 2208 a05c65af47148b518d0b9fabf5fa5015e855acc00246ccb37feeedf54447b178.exe 2208 a05c65af47148b518d0b9fabf5fa5015e855acc00246ccb37feeedf54447b178.exe 2208 a05c65af47148b518d0b9fabf5fa5015e855acc00246ccb37feeedf54447b178.exe 2208 a05c65af47148b518d0b9fabf5fa5015e855acc00246ccb37feeedf54447b178.exe 2208 a05c65af47148b518d0b9fabf5fa5015e855acc00246ccb37feeedf54447b178.exe 2208 a05c65af47148b518d0b9fabf5fa5015e855acc00246ccb37feeedf54447b178.exe 2208 a05c65af47148b518d0b9fabf5fa5015e855acc00246ccb37feeedf54447b178.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2364 rundll32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2208 a05c65af47148b518d0b9fabf5fa5015e855acc00246ccb37feeedf54447b178.exe 2364 rundll32.exe 2364 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2208 wrote to memory of 2364 2208 a05c65af47148b518d0b9fabf5fa5015e855acc00246ccb37feeedf54447b178.exe 28 PID 2208 wrote to memory of 2364 2208 a05c65af47148b518d0b9fabf5fa5015e855acc00246ccb37feeedf54447b178.exe 28 PID 2208 wrote to memory of 2364 2208 a05c65af47148b518d0b9fabf5fa5015e855acc00246ccb37feeedf54447b178.exe 28 PID 2208 wrote to memory of 2364 2208 a05c65af47148b518d0b9fabf5fa5015e855acc00246ccb37feeedf54447b178.exe 28 PID 2208 wrote to memory of 2364 2208 a05c65af47148b518d0b9fabf5fa5015e855acc00246ccb37feeedf54447b178.exe 28 PID 2208 wrote to memory of 2364 2208 a05c65af47148b518d0b9fabf5fa5015e855acc00246ccb37feeedf54447b178.exe 28 PID 2208 wrote to memory of 2364 2208 a05c65af47148b518d0b9fabf5fa5015e855acc00246ccb37feeedf54447b178.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\a05c65af47148b518d0b9fabf5fa5015e855acc00246ccb37feeedf54447b178.exe"C:\Users\Admin\AppData\Local\Temp\a05c65af47148b518d0b9fabf5fa5015e855acc00246ccb37feeedf54447b178.exe"1⤵
- Loads dropped DLL
- Modifies system executable filetype association
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\system\rundll32.exeC:\Windows\system\rundll32.exe2⤵
- Executes dropped EXE
- Modifies system executable filetype association
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2364
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76KB
MD5ec9dd1ef58d7d1aa282874dd9a55d414
SHA130b8307760afe2014a87caeae99e4cc2ea5ec453
SHA2565e73d2456bfab89025db051048b65e3744e7209b5c7dcda532f91a3e7c93c963
SHA51215244871b9027e39bc2b8fcae05cede6a83dd0c9c39a283fdd88ae06aa2b39da4732e88c8e864474f362b001036879fd19f5aae54e0da244c8061d5358f44f72
-
Filesize
83KB
MD5da3fd7a0bc1d8c2de1d59f5e3c78e9b6
SHA13fe5c5f0a61119f18f5f574db6becaecc631d677
SHA256fbda0734cbda388fa769a80430e5b89ff379f908fcc51efb459910177da14987
SHA51258bf15989f2b32e50084b5bbc2e1ef3ccbfe0030085082a6f6f55255ca12bdc8ec3a186d134df81821a61106150869e73be924725ecdd33a0ad1f67b56da033a
-
Filesize
83KB
MD5da3fd7a0bc1d8c2de1d59f5e3c78e9b6
SHA13fe5c5f0a61119f18f5f574db6becaecc631d677
SHA256fbda0734cbda388fa769a80430e5b89ff379f908fcc51efb459910177da14987
SHA51258bf15989f2b32e50084b5bbc2e1ef3ccbfe0030085082a6f6f55255ca12bdc8ec3a186d134df81821a61106150869e73be924725ecdd33a0ad1f67b56da033a
-
Filesize
83KB
MD5da3fd7a0bc1d8c2de1d59f5e3c78e9b6
SHA13fe5c5f0a61119f18f5f574db6becaecc631d677
SHA256fbda0734cbda388fa769a80430e5b89ff379f908fcc51efb459910177da14987
SHA51258bf15989f2b32e50084b5bbc2e1ef3ccbfe0030085082a6f6f55255ca12bdc8ec3a186d134df81821a61106150869e73be924725ecdd33a0ad1f67b56da033a
-
Filesize
83KB
MD5da3fd7a0bc1d8c2de1d59f5e3c78e9b6
SHA13fe5c5f0a61119f18f5f574db6becaecc631d677
SHA256fbda0734cbda388fa769a80430e5b89ff379f908fcc51efb459910177da14987
SHA51258bf15989f2b32e50084b5bbc2e1ef3ccbfe0030085082a6f6f55255ca12bdc8ec3a186d134df81821a61106150869e73be924725ecdd33a0ad1f67b56da033a