Analysis

  • max time kernel
    151s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    10-10-2023 20:47

General

  • Target

    154585e22d0a2dc9e2f22ce3932688c6a3590aa9ecc28fd678b98ab358853b96.exe

  • Size

    76KB

  • MD5

    c1795cae53e450f36ee55ecdffa1a257

  • SHA1

    c16a52b9f10a669cbf9f4c775ffaae9a79344c3c

  • SHA256

    154585e22d0a2dc9e2f22ce3932688c6a3590aa9ecc28fd678b98ab358853b96

  • SHA512

    b977c35da709497d5647ccbc06ef6ec7f90644e44bf726f67004cc3c8ec9d9c87a4e0a741de0984aa37fbec46e62b01d2bcfcc8fbe7e366956c6d674a18fe269

  • SSDEEP

    1536:RshfSWHHNvoLqNwDDGw02eQmh0HjWOj3c:GhfxHNIreQm+HiM3c

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Modifies system executable filetype association 2 TTPs 5 IoCs
  • Drops file in System32 directory 4 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies registry class 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\154585e22d0a2dc9e2f22ce3932688c6a3590aa9ecc28fd678b98ab358853b96.exe
    "C:\Users\Admin\AppData\Local\Temp\154585e22d0a2dc9e2f22ce3932688c6a3590aa9ecc28fd678b98ab358853b96.exe"
    1⤵
    • Loads dropped DLL
    • Modifies system executable filetype association
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2380
    • C:\Windows\system\rundll32.exe
      C:\Windows\system\rundll32.exe
      2⤵
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:2176

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\notepad¢¬.exe

    Filesize

    77KB

    MD5

    1a5f114e4e815f99f0dd36d0126a37f4

    SHA1

    1501ef82cb8b861baf0810f8532fb99e4ca1897a

    SHA256

    97eef1138eb48608c2b2ecb7092425d01606557544227bc9bb4d69904dc82446

    SHA512

    87a9b0c03690a18ab37dbcdeff64ebbbb3ef7125e4d4d8b211da5573dce3650448689f9c965045bd7442d9e5de0b645cd9a0be9a6f6289c5c4b51056560ed84d

  • C:\Windows\system\rundll32.exe

    Filesize

    79KB

    MD5

    440e12c84c4e4a95f4332524e06ea354

    SHA1

    4ae8498b6743f3b26c0e6cef46f3b4fd86f7f904

    SHA256

    24e1c89a08a3b2e6b4eef26affd831d2f232ec011fc72d106e961ffaecb35b3c

    SHA512

    c44cc2c74c679f9ddee18986deb18e8962e2139ac8a0561c8f3b75c877fcd38d71c576e592bcc0137b76c8641cef14fd3b530c44b09ddfe8d0061d31b4b7a63f

  • C:\Windows\system\rundll32.exe

    Filesize

    79KB

    MD5

    440e12c84c4e4a95f4332524e06ea354

    SHA1

    4ae8498b6743f3b26c0e6cef46f3b4fd86f7f904

    SHA256

    24e1c89a08a3b2e6b4eef26affd831d2f232ec011fc72d106e961ffaecb35b3c

    SHA512

    c44cc2c74c679f9ddee18986deb18e8962e2139ac8a0561c8f3b75c877fcd38d71c576e592bcc0137b76c8641cef14fd3b530c44b09ddfe8d0061d31b4b7a63f

  • \Windows\system\rundll32.exe

    Filesize

    79KB

    MD5

    440e12c84c4e4a95f4332524e06ea354

    SHA1

    4ae8498b6743f3b26c0e6cef46f3b4fd86f7f904

    SHA256

    24e1c89a08a3b2e6b4eef26affd831d2f232ec011fc72d106e961ffaecb35b3c

    SHA512

    c44cc2c74c679f9ddee18986deb18e8962e2139ac8a0561c8f3b75c877fcd38d71c576e592bcc0137b76c8641cef14fd3b530c44b09ddfe8d0061d31b4b7a63f

  • \Windows\system\rundll32.exe

    Filesize

    79KB

    MD5

    440e12c84c4e4a95f4332524e06ea354

    SHA1

    4ae8498b6743f3b26c0e6cef46f3b4fd86f7f904

    SHA256

    24e1c89a08a3b2e6b4eef26affd831d2f232ec011fc72d106e961ffaecb35b3c

    SHA512

    c44cc2c74c679f9ddee18986deb18e8962e2139ac8a0561c8f3b75c877fcd38d71c576e592bcc0137b76c8641cef14fd3b530c44b09ddfe8d0061d31b4b7a63f

  • memory/2176-21-0x0000000000400000-0x0000000000415A00-memory.dmp

    Filesize

    86KB

  • memory/2380-0-0x0000000000400000-0x0000000000415A00-memory.dmp

    Filesize

    86KB

  • memory/2380-12-0x0000000000240000-0x0000000000256000-memory.dmp

    Filesize

    88KB

  • memory/2380-19-0x0000000000400000-0x0000000000415A00-memory.dmp

    Filesize

    86KB

  • memory/2380-20-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB