Analysis

  • max time kernel
    151s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/10/2023, 12:27

General

  • Target

    56c478a29ca854578b9b5a3011056427181144159de8f78514979cec2ca25a46.exe

  • Size

    83KB

  • MD5

    155a2f2ef4d6c52610ada672506f7535

  • SHA1

    46f90856c109438e2ccf54d4436c2820561c8e80

  • SHA256

    56c478a29ca854578b9b5a3011056427181144159de8f78514979cec2ca25a46

  • SHA512

    23506ccdaff3f8b783d6840949be18e1c703d73f1fa4b9064c5f6049f85dfc5cc09a77e90d407e185a2796d5e71d5145f22fe36c72b50c5d1bcde7e4909fb4f8

  • SSDEEP

    1536:RshfSWHHNvoLqNwDDGw02eQmh0HjWOcrDUAGbAv+mcVaRApvq:GhfxHNIreQm+HiZrDUAGbAv+mcVaRApS

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Modifies system executable filetype association 2 TTPs 5 IoCs
  • Drops file in System32 directory 4 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies registry class 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 28 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\56c478a29ca854578b9b5a3011056427181144159de8f78514979cec2ca25a46.exe
    "C:\Users\Admin\AppData\Local\Temp\56c478a29ca854578b9b5a3011056427181144159de8f78514979cec2ca25a46.exe"
    1⤵
    • Modifies system executable filetype association
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:220
    • C:\Windows\system\rundll32.exe
      C:\Windows\system\rundll32.exe
      2⤵
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:1288

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\notepad¢¬.exe

          Filesize

          82KB

          MD5

          e3128f19c1d8b540171a84f0ac4931ef

          SHA1

          8fd5afd01a359dd1d1c9aef7598cdaefd445b0be

          SHA256

          3124c25df59d44370112f19c3bc346d256cd826f93c8de7dadae491c09b78781

          SHA512

          2837bd3d27afe6aa4ebd287a0ff4fa71c6544da46a802bf7736ebf4eb4c4861201623313dc14c0d0ea776550ba6f602f3c044f5740e08335982507ed3e3d764e

        • C:\Windows\System\rundll32.exe

          Filesize

          81KB

          MD5

          fd81af230b63e03275d50b64967891a9

          SHA1

          7346e171e405881a64741be0c143b8c5e81cbe48

          SHA256

          2c95c805e5ce9dc6e6073252d99d321ccc0ebf312784789f9fbb17cada776d04

          SHA512

          42fb09c21beb556179d2b48461bd513bb5419cdad3a4aecd1bb20bdacb14102ffc88b70119383239a7a1ca1da9b46a29b714e2166a6500a194a998b95233637c

        • C:\Windows\system\rundll32.exe

          Filesize

          81KB

          MD5

          fd81af230b63e03275d50b64967891a9

          SHA1

          7346e171e405881a64741be0c143b8c5e81cbe48

          SHA256

          2c95c805e5ce9dc6e6073252d99d321ccc0ebf312784789f9fbb17cada776d04

          SHA512

          42fb09c21beb556179d2b48461bd513bb5419cdad3a4aecd1bb20bdacb14102ffc88b70119383239a7a1ca1da9b46a29b714e2166a6500a194a998b95233637c

        • memory/220-0-0x0000000000400000-0x0000000000415A00-memory.dmp

          Filesize

          86KB

        • memory/220-13-0x0000000000400000-0x0000000000415A00-memory.dmp

          Filesize

          86KB

        • memory/1288-14-0x0000000000400000-0x0000000000415A00-memory.dmp

          Filesize

          86KB