Analysis
-
max time kernel
151s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2023, 12:27
Static task
static1
Behavioral task
behavioral1
Sample
56c478a29ca854578b9b5a3011056427181144159de8f78514979cec2ca25a46.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
56c478a29ca854578b9b5a3011056427181144159de8f78514979cec2ca25a46.exe
Resource
win10v2004-20230915-en
General
-
Target
56c478a29ca854578b9b5a3011056427181144159de8f78514979cec2ca25a46.exe
-
Size
83KB
-
MD5
155a2f2ef4d6c52610ada672506f7535
-
SHA1
46f90856c109438e2ccf54d4436c2820561c8e80
-
SHA256
56c478a29ca854578b9b5a3011056427181144159de8f78514979cec2ca25a46
-
SHA512
23506ccdaff3f8b783d6840949be18e1c703d73f1fa4b9064c5f6049f85dfc5cc09a77e90d407e185a2796d5e71d5145f22fe36c72b50c5d1bcde7e4909fb4f8
-
SSDEEP
1536:RshfSWHHNvoLqNwDDGw02eQmh0HjWOcrDUAGbAv+mcVaRApvq:GhfxHNIreQm+HiZrDUAGbAv+mcVaRApS
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1288 rundll32.exe -
Modifies system executable filetype association 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command 56c478a29ca854578b9b5a3011056427181144159de8f78514979cec2ca25a46.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 56c478a29ca854578b9b5a3011056427181144159de8f78514979cec2ca25a46.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" 56c478a29ca854578b9b5a3011056427181144159de8f78514979cec2ca25a46.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\¢«.exe 56c478a29ca854578b9b5a3011056427181144159de8f78514979cec2ca25a46.exe File created C:\Windows\SysWOW64\¢«.exe 56c478a29ca854578b9b5a3011056427181144159de8f78514979cec2ca25a46.exe File opened for modification C:\Windows\SysWOW64\notepad¢¬.exe 56c478a29ca854578b9b5a3011056427181144159de8f78514979cec2ca25a46.exe File created C:\Windows\SysWOW64\notepad¢¬.exe 56c478a29ca854578b9b5a3011056427181144159de8f78514979cec2ca25a46.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system\rundll32.exe 56c478a29ca854578b9b5a3011056427181144159de8f78514979cec2ca25a46.exe File created C:\Windows\system\rundll32.exe 56c478a29ca854578b9b5a3011056427181144159de8f78514979cec2ca25a46.exe -
Modifies registry class 15 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainSetup = "1697065093" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" 56c478a29ca854578b9b5a3011056427181144159de8f78514979cec2ca25a46.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" 56c478a29ca854578b9b5a3011056427181144159de8f78514979cec2ca25a46.exe Key created \REGISTRY\MACHINE\Software\Classes\MSipv rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainVer = "506" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\MSipv 56c478a29ca854578b9b5a3011056427181144159de8f78514979cec2ca25a46.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad.exe %1" 56c478a29ca854578b9b5a3011056427181144159de8f78514979cec2ca25a46.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command 56c478a29ca854578b9b5a3011056427181144159de8f78514979cec2ca25a46.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command 56c478a29ca854578b9b5a3011056427181144159de8f78514979cec2ca25a46.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainUp = "1697065093" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 56c478a29ca854578b9b5a3011056427181144159de8f78514979cec2ca25a46.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 220 56c478a29ca854578b9b5a3011056427181144159de8f78514979cec2ca25a46.exe 220 56c478a29ca854578b9b5a3011056427181144159de8f78514979cec2ca25a46.exe 220 56c478a29ca854578b9b5a3011056427181144159de8f78514979cec2ca25a46.exe 220 56c478a29ca854578b9b5a3011056427181144159de8f78514979cec2ca25a46.exe 220 56c478a29ca854578b9b5a3011056427181144159de8f78514979cec2ca25a46.exe 220 56c478a29ca854578b9b5a3011056427181144159de8f78514979cec2ca25a46.exe 220 56c478a29ca854578b9b5a3011056427181144159de8f78514979cec2ca25a46.exe 220 56c478a29ca854578b9b5a3011056427181144159de8f78514979cec2ca25a46.exe 220 56c478a29ca854578b9b5a3011056427181144159de8f78514979cec2ca25a46.exe 220 56c478a29ca854578b9b5a3011056427181144159de8f78514979cec2ca25a46.exe 220 56c478a29ca854578b9b5a3011056427181144159de8f78514979cec2ca25a46.exe 220 56c478a29ca854578b9b5a3011056427181144159de8f78514979cec2ca25a46.exe 220 56c478a29ca854578b9b5a3011056427181144159de8f78514979cec2ca25a46.exe 220 56c478a29ca854578b9b5a3011056427181144159de8f78514979cec2ca25a46.exe 220 56c478a29ca854578b9b5a3011056427181144159de8f78514979cec2ca25a46.exe 220 56c478a29ca854578b9b5a3011056427181144159de8f78514979cec2ca25a46.exe 220 56c478a29ca854578b9b5a3011056427181144159de8f78514979cec2ca25a46.exe 220 56c478a29ca854578b9b5a3011056427181144159de8f78514979cec2ca25a46.exe 220 56c478a29ca854578b9b5a3011056427181144159de8f78514979cec2ca25a46.exe 220 56c478a29ca854578b9b5a3011056427181144159de8f78514979cec2ca25a46.exe 220 56c478a29ca854578b9b5a3011056427181144159de8f78514979cec2ca25a46.exe 220 56c478a29ca854578b9b5a3011056427181144159de8f78514979cec2ca25a46.exe 220 56c478a29ca854578b9b5a3011056427181144159de8f78514979cec2ca25a46.exe 220 56c478a29ca854578b9b5a3011056427181144159de8f78514979cec2ca25a46.exe 220 56c478a29ca854578b9b5a3011056427181144159de8f78514979cec2ca25a46.exe 220 56c478a29ca854578b9b5a3011056427181144159de8f78514979cec2ca25a46.exe 220 56c478a29ca854578b9b5a3011056427181144159de8f78514979cec2ca25a46.exe 220 56c478a29ca854578b9b5a3011056427181144159de8f78514979cec2ca25a46.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1288 rundll32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 220 56c478a29ca854578b9b5a3011056427181144159de8f78514979cec2ca25a46.exe 1288 rundll32.exe 1288 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 220 wrote to memory of 1288 220 56c478a29ca854578b9b5a3011056427181144159de8f78514979cec2ca25a46.exe 84 PID 220 wrote to memory of 1288 220 56c478a29ca854578b9b5a3011056427181144159de8f78514979cec2ca25a46.exe 84 PID 220 wrote to memory of 1288 220 56c478a29ca854578b9b5a3011056427181144159de8f78514979cec2ca25a46.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\56c478a29ca854578b9b5a3011056427181144159de8f78514979cec2ca25a46.exe"C:\Users\Admin\AppData\Local\Temp\56c478a29ca854578b9b5a3011056427181144159de8f78514979cec2ca25a46.exe"1⤵
- Modifies system executable filetype association
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Windows\system\rundll32.exeC:\Windows\system\rundll32.exe2⤵
- Executes dropped EXE
- Modifies system executable filetype association
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1288
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD5e3128f19c1d8b540171a84f0ac4931ef
SHA18fd5afd01a359dd1d1c9aef7598cdaefd445b0be
SHA2563124c25df59d44370112f19c3bc346d256cd826f93c8de7dadae491c09b78781
SHA5122837bd3d27afe6aa4ebd287a0ff4fa71c6544da46a802bf7736ebf4eb4c4861201623313dc14c0d0ea776550ba6f602f3c044f5740e08335982507ed3e3d764e
-
Filesize
81KB
MD5fd81af230b63e03275d50b64967891a9
SHA17346e171e405881a64741be0c143b8c5e81cbe48
SHA2562c95c805e5ce9dc6e6073252d99d321ccc0ebf312784789f9fbb17cada776d04
SHA51242fb09c21beb556179d2b48461bd513bb5419cdad3a4aecd1bb20bdacb14102ffc88b70119383239a7a1ca1da9b46a29b714e2166a6500a194a998b95233637c
-
Filesize
81KB
MD5fd81af230b63e03275d50b64967891a9
SHA17346e171e405881a64741be0c143b8c5e81cbe48
SHA2562c95c805e5ce9dc6e6073252d99d321ccc0ebf312784789f9fbb17cada776d04
SHA51242fb09c21beb556179d2b48461bd513bb5419cdad3a4aecd1bb20bdacb14102ffc88b70119383239a7a1ca1da9b46a29b714e2166a6500a194a998b95233637c