Analysis
-
max time kernel
163s -
max time network
73s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11/10/2023, 18:36
Static task
static1
Behavioral task
behavioral1
Sample
e3f82cffd383b196e62f075ac7a76ba478dc50d4cdc31a9c32c74c5620e08e43.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
e3f82cffd383b196e62f075ac7a76ba478dc50d4cdc31a9c32c74c5620e08e43.exe
Resource
win10v2004-20230915-en
General
-
Target
e3f82cffd383b196e62f075ac7a76ba478dc50d4cdc31a9c32c74c5620e08e43.exe
-
Size
73KB
-
MD5
17e4eee321b8108529150475333ada90
-
SHA1
8b0e74239313a5739a535dad468319c10ffa3627
-
SHA256
e3f82cffd383b196e62f075ac7a76ba478dc50d4cdc31a9c32c74c5620e08e43
-
SHA512
045532b53a9a118ed83191a10ea3bc0288056998fdf5d97ba261873557879788de717f9981b4add63028c8669bf0098f1f59d7d2302cd17b83da2e006a3ef93a
-
SSDEEP
768:agO5xRYi+SfSWHHNvvG5bnl/NqNwsKVDstHxYD0p1aXKynF0vQmYZS0HdJnfWOn:RshfSWHHNvoLqNwDDGw02eQmh0HjWOn
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2776 rundll32.exe -
Loads dropped DLL 2 IoCs
pid Process 3020 e3f82cffd383b196e62f075ac7a76ba478dc50d4cdc31a9c32c74c5620e08e43.exe 3020 e3f82cffd383b196e62f075ac7a76ba478dc50d4cdc31a9c32c74c5620e08e43.exe -
Modifies system executable filetype association 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command e3f82cffd383b196e62f075ac7a76ba478dc50d4cdc31a9c32c74c5620e08e43.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" e3f82cffd383b196e62f075ac7a76ba478dc50d4cdc31a9c32c74c5620e08e43.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" e3f82cffd383b196e62f075ac7a76ba478dc50d4cdc31a9c32c74c5620e08e43.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\notepad¢¬.exe e3f82cffd383b196e62f075ac7a76ba478dc50d4cdc31a9c32c74c5620e08e43.exe File created C:\Windows\SysWOW64\notepad¢¬.exe e3f82cffd383b196e62f075ac7a76ba478dc50d4cdc31a9c32c74c5620e08e43.exe File opened for modification C:\Windows\SysWOW64\¢«.exe e3f82cffd383b196e62f075ac7a76ba478dc50d4cdc31a9c32c74c5620e08e43.exe File created C:\Windows\SysWOW64\¢«.exe e3f82cffd383b196e62f075ac7a76ba478dc50d4cdc31a9c32c74c5620e08e43.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system\rundll32.exe e3f82cffd383b196e62f075ac7a76ba478dc50d4cdc31a9c32c74c5620e08e43.exe File created C:\Windows\system\rundll32.exe e3f82cffd383b196e62f075ac7a76ba478dc50d4cdc31a9c32c74c5620e08e43.exe -
Modifies registry class 15 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad.exe %1" e3f82cffd383b196e62f075ac7a76ba478dc50d4cdc31a9c32c74c5620e08e43.exe Key created \REGISTRY\MACHINE\Software\Classes\MSipv rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainVer = "506" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\MSipv e3f82cffd383b196e62f075ac7a76ba478dc50d4cdc31a9c32c74c5620e08e43.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command e3f82cffd383b196e62f075ac7a76ba478dc50d4cdc31a9c32c74c5620e08e43.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" e3f82cffd383b196e62f075ac7a76ba478dc50d4cdc31a9c32c74c5620e08e43.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" e3f82cffd383b196e62f075ac7a76ba478dc50d4cdc31a9c32c74c5620e08e43.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" e3f82cffd383b196e62f075ac7a76ba478dc50d4cdc31a9c32c74c5620e08e43.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command e3f82cffd383b196e62f075ac7a76ba478dc50d4cdc31a9c32c74c5620e08e43.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainSetup = "1697107603" rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainUp = "1697107603" rundll32.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 3020 e3f82cffd383b196e62f075ac7a76ba478dc50d4cdc31a9c32c74c5620e08e43.exe 3020 e3f82cffd383b196e62f075ac7a76ba478dc50d4cdc31a9c32c74c5620e08e43.exe 3020 e3f82cffd383b196e62f075ac7a76ba478dc50d4cdc31a9c32c74c5620e08e43.exe 3020 e3f82cffd383b196e62f075ac7a76ba478dc50d4cdc31a9c32c74c5620e08e43.exe 3020 e3f82cffd383b196e62f075ac7a76ba478dc50d4cdc31a9c32c74c5620e08e43.exe 3020 e3f82cffd383b196e62f075ac7a76ba478dc50d4cdc31a9c32c74c5620e08e43.exe 3020 e3f82cffd383b196e62f075ac7a76ba478dc50d4cdc31a9c32c74c5620e08e43.exe 3020 e3f82cffd383b196e62f075ac7a76ba478dc50d4cdc31a9c32c74c5620e08e43.exe 3020 e3f82cffd383b196e62f075ac7a76ba478dc50d4cdc31a9c32c74c5620e08e43.exe 3020 e3f82cffd383b196e62f075ac7a76ba478dc50d4cdc31a9c32c74c5620e08e43.exe 3020 e3f82cffd383b196e62f075ac7a76ba478dc50d4cdc31a9c32c74c5620e08e43.exe 3020 e3f82cffd383b196e62f075ac7a76ba478dc50d4cdc31a9c32c74c5620e08e43.exe 3020 e3f82cffd383b196e62f075ac7a76ba478dc50d4cdc31a9c32c74c5620e08e43.exe 3020 e3f82cffd383b196e62f075ac7a76ba478dc50d4cdc31a9c32c74c5620e08e43.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2776 rundll32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3020 e3f82cffd383b196e62f075ac7a76ba478dc50d4cdc31a9c32c74c5620e08e43.exe 2776 rundll32.exe 2776 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3020 wrote to memory of 2776 3020 e3f82cffd383b196e62f075ac7a76ba478dc50d4cdc31a9c32c74c5620e08e43.exe 30 PID 3020 wrote to memory of 2776 3020 e3f82cffd383b196e62f075ac7a76ba478dc50d4cdc31a9c32c74c5620e08e43.exe 30 PID 3020 wrote to memory of 2776 3020 e3f82cffd383b196e62f075ac7a76ba478dc50d4cdc31a9c32c74c5620e08e43.exe 30 PID 3020 wrote to memory of 2776 3020 e3f82cffd383b196e62f075ac7a76ba478dc50d4cdc31a9c32c74c5620e08e43.exe 30 PID 3020 wrote to memory of 2776 3020 e3f82cffd383b196e62f075ac7a76ba478dc50d4cdc31a9c32c74c5620e08e43.exe 30 PID 3020 wrote to memory of 2776 3020 e3f82cffd383b196e62f075ac7a76ba478dc50d4cdc31a9c32c74c5620e08e43.exe 30 PID 3020 wrote to memory of 2776 3020 e3f82cffd383b196e62f075ac7a76ba478dc50d4cdc31a9c32c74c5620e08e43.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\e3f82cffd383b196e62f075ac7a76ba478dc50d4cdc31a9c32c74c5620e08e43.exe"C:\Users\Admin\AppData\Local\Temp\e3f82cffd383b196e62f075ac7a76ba478dc50d4cdc31a9c32c74c5620e08e43.exe"1⤵
- Loads dropped DLL
- Modifies system executable filetype association
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\system\rundll32.exeC:\Windows\system\rundll32.exe2⤵
- Executes dropped EXE
- Modifies system executable filetype association
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2776
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD5070a70c63fdedaaf4ab4e39471af379c
SHA1e93e75833063384a8d7b66ab26fdd22619496e94
SHA2564fedcd27cf836d5197592ee1169fb0f7074dbe9158e67d36ef6bcded9b32655a
SHA5127af0f0bf47628a96e1acc020755e50d672d864fb52fb4155fcc488685a7a74bd557b2cce74e937a9eb0d6c128cb859094dc7279381ff77410dd6a18f9d649902
-
Filesize
83KB
MD54400a25b010605b1dbf0528635dfcb3d
SHA1ec7f83892871ab675f9832e82e8629ea12c1b5d0
SHA25661557c4aa802a4f1fde4797297fb648f3e09b59bd1b8901f779db45472469d17
SHA512516d780539fea9729a543cd69c3b343ea4a7f95bbd8a457b108ddb218e9b05ccb5f499fb8812b9d7eaa17924f1994766f41ee356daaab16cec6b24e1acc9947b
-
Filesize
83KB
MD54400a25b010605b1dbf0528635dfcb3d
SHA1ec7f83892871ab675f9832e82e8629ea12c1b5d0
SHA25661557c4aa802a4f1fde4797297fb648f3e09b59bd1b8901f779db45472469d17
SHA512516d780539fea9729a543cd69c3b343ea4a7f95bbd8a457b108ddb218e9b05ccb5f499fb8812b9d7eaa17924f1994766f41ee356daaab16cec6b24e1acc9947b
-
Filesize
83KB
MD54400a25b010605b1dbf0528635dfcb3d
SHA1ec7f83892871ab675f9832e82e8629ea12c1b5d0
SHA25661557c4aa802a4f1fde4797297fb648f3e09b59bd1b8901f779db45472469d17
SHA512516d780539fea9729a543cd69c3b343ea4a7f95bbd8a457b108ddb218e9b05ccb5f499fb8812b9d7eaa17924f1994766f41ee356daaab16cec6b24e1acc9947b
-
Filesize
83KB
MD54400a25b010605b1dbf0528635dfcb3d
SHA1ec7f83892871ab675f9832e82e8629ea12c1b5d0
SHA25661557c4aa802a4f1fde4797297fb648f3e09b59bd1b8901f779db45472469d17
SHA512516d780539fea9729a543cd69c3b343ea4a7f95bbd8a457b108ddb218e9b05ccb5f499fb8812b9d7eaa17924f1994766f41ee356daaab16cec6b24e1acc9947b