Analysis
-
max time kernel
150s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11-10-2023 19:18
Static task
static1
Behavioral task
behavioral1
Sample
fc38e751ed3a0812f868868a2b274a37818014c1d9f5db1a8d27c8e8c5dce832.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
fc38e751ed3a0812f868868a2b274a37818014c1d9f5db1a8d27c8e8c5dce832.exe
Resource
win10v2004-20230915-en
General
-
Target
fc38e751ed3a0812f868868a2b274a37818014c1d9f5db1a8d27c8e8c5dce832.exe
-
Size
80KB
-
MD5
ae75fec135157bda2b3d6ab83f730287
-
SHA1
23605d82bd1351cd85b602ce86365584a175dd42
-
SHA256
fc38e751ed3a0812f868868a2b274a37818014c1d9f5db1a8d27c8e8c5dce832
-
SHA512
2fae9e929e887718dbdff559ad13d35c5d4d8b59c178d192ed94a8e53a07579f9b1e53567b47bdad7ccf3cc9f2b1849cf1cdaa57221167f1db2fcd1667e3e70b
-
SSDEEP
1536:RshfSWHHNvoLqNwDDGw02eQmh0HjWOjB+86wG:GhfxHNIreQm+HiKB+86wG
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2612 rundll32.exe -
Loads dropped DLL 2 IoCs
pid Process 2212 fc38e751ed3a0812f868868a2b274a37818014c1d9f5db1a8d27c8e8c5dce832.exe 2212 fc38e751ed3a0812f868868a2b274a37818014c1d9f5db1a8d27c8e8c5dce832.exe -
Modifies system executable filetype association 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" fc38e751ed3a0812f868868a2b274a37818014c1d9f5db1a8d27c8e8c5dce832.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command fc38e751ed3a0812f868868a2b274a37818014c1d9f5db1a8d27c8e8c5dce832.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" fc38e751ed3a0812f868868a2b274a37818014c1d9f5db1a8d27c8e8c5dce832.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\notepad¢¬.exe fc38e751ed3a0812f868868a2b274a37818014c1d9f5db1a8d27c8e8c5dce832.exe File created C:\Windows\SysWOW64\notepad¢¬.exe fc38e751ed3a0812f868868a2b274a37818014c1d9f5db1a8d27c8e8c5dce832.exe File opened for modification C:\Windows\SysWOW64\¢«.exe fc38e751ed3a0812f868868a2b274a37818014c1d9f5db1a8d27c8e8c5dce832.exe File created C:\Windows\SysWOW64\¢«.exe fc38e751ed3a0812f868868a2b274a37818014c1d9f5db1a8d27c8e8c5dce832.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system\rundll32.exe fc38e751ed3a0812f868868a2b274a37818014c1d9f5db1a8d27c8e8c5dce832.exe File created C:\Windows\system\rundll32.exe fc38e751ed3a0812f868868a2b274a37818014c1d9f5db1a8d27c8e8c5dce832.exe -
Modifies registry class 15 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" fc38e751ed3a0812f868868a2b274a37818014c1d9f5db1a8d27c8e8c5dce832.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainSetup = "1697113785" rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainUp = "1697113785" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\MSipv rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" fc38e751ed3a0812f868868a2b274a37818014c1d9f5db1a8d27c8e8c5dce832.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainVer = "506" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" fc38e751ed3a0812f868868a2b274a37818014c1d9f5db1a8d27c8e8c5dce832.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command fc38e751ed3a0812f868868a2b274a37818014c1d9f5db1a8d27c8e8c5dce832.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad.exe %1" fc38e751ed3a0812f868868a2b274a37818014c1d9f5db1a8d27c8e8c5dce832.exe Key created \REGISTRY\MACHINE\Software\Classes\MSipv fc38e751ed3a0812f868868a2b274a37818014c1d9f5db1a8d27c8e8c5dce832.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command fc38e751ed3a0812f868868a2b274a37818014c1d9f5db1a8d27c8e8c5dce832.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2212 fc38e751ed3a0812f868868a2b274a37818014c1d9f5db1a8d27c8e8c5dce832.exe 2212 fc38e751ed3a0812f868868a2b274a37818014c1d9f5db1a8d27c8e8c5dce832.exe 2212 fc38e751ed3a0812f868868a2b274a37818014c1d9f5db1a8d27c8e8c5dce832.exe 2212 fc38e751ed3a0812f868868a2b274a37818014c1d9f5db1a8d27c8e8c5dce832.exe 2212 fc38e751ed3a0812f868868a2b274a37818014c1d9f5db1a8d27c8e8c5dce832.exe 2212 fc38e751ed3a0812f868868a2b274a37818014c1d9f5db1a8d27c8e8c5dce832.exe 2212 fc38e751ed3a0812f868868a2b274a37818014c1d9f5db1a8d27c8e8c5dce832.exe 2212 fc38e751ed3a0812f868868a2b274a37818014c1d9f5db1a8d27c8e8c5dce832.exe 2212 fc38e751ed3a0812f868868a2b274a37818014c1d9f5db1a8d27c8e8c5dce832.exe 2212 fc38e751ed3a0812f868868a2b274a37818014c1d9f5db1a8d27c8e8c5dce832.exe 2212 fc38e751ed3a0812f868868a2b274a37818014c1d9f5db1a8d27c8e8c5dce832.exe 2212 fc38e751ed3a0812f868868a2b274a37818014c1d9f5db1a8d27c8e8c5dce832.exe 2212 fc38e751ed3a0812f868868a2b274a37818014c1d9f5db1a8d27c8e8c5dce832.exe 2212 fc38e751ed3a0812f868868a2b274a37818014c1d9f5db1a8d27c8e8c5dce832.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2612 rundll32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2212 fc38e751ed3a0812f868868a2b274a37818014c1d9f5db1a8d27c8e8c5dce832.exe 2612 rundll32.exe 2612 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2212 wrote to memory of 2612 2212 fc38e751ed3a0812f868868a2b274a37818014c1d9f5db1a8d27c8e8c5dce832.exe 28 PID 2212 wrote to memory of 2612 2212 fc38e751ed3a0812f868868a2b274a37818014c1d9f5db1a8d27c8e8c5dce832.exe 28 PID 2212 wrote to memory of 2612 2212 fc38e751ed3a0812f868868a2b274a37818014c1d9f5db1a8d27c8e8c5dce832.exe 28 PID 2212 wrote to memory of 2612 2212 fc38e751ed3a0812f868868a2b274a37818014c1d9f5db1a8d27c8e8c5dce832.exe 28 PID 2212 wrote to memory of 2612 2212 fc38e751ed3a0812f868868a2b274a37818014c1d9f5db1a8d27c8e8c5dce832.exe 28 PID 2212 wrote to memory of 2612 2212 fc38e751ed3a0812f868868a2b274a37818014c1d9f5db1a8d27c8e8c5dce832.exe 28 PID 2212 wrote to memory of 2612 2212 fc38e751ed3a0812f868868a2b274a37818014c1d9f5db1a8d27c8e8c5dce832.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\fc38e751ed3a0812f868868a2b274a37818014c1d9f5db1a8d27c8e8c5dce832.exe"C:\Users\Admin\AppData\Local\Temp\fc38e751ed3a0812f868868a2b274a37818014c1d9f5db1a8d27c8e8c5dce832.exe"1⤵
- Loads dropped DLL
- Modifies system executable filetype association
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Windows\system\rundll32.exeC:\Windows\system\rundll32.exe2⤵
- Executes dropped EXE
- Modifies system executable filetype association
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2612
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
81KB
MD5b8ff24149f236bcd514f559e8a8a13b3
SHA1aca6c388c6b8bb3402df0909afbb4fda7b69d07c
SHA2560df9cd1dcaae908d97894a107800cc22bf585ada32ab7d2d53b60ebf09ca9eca
SHA512be408a103cf508a8568004eed67e0e3478fcc61add19ad925a17d8ea2b5d11ea5abe9cc13d0c318d47ec1558129c3c431afa49a568145bebe40887749c9282f9
-
Filesize
76KB
MD5cc199f05f3742d45549f2100424597c7
SHA12be34ce61c8e1d35ec14b329f6f1c2ff52d41648
SHA256e95020e4e621dbe251f797edb3223ffb46c9d627499c6a2cac6e9315a4b53deb
SHA512432167a6969fcac38f710110896e92103f2b0f2a4b1ef095b6d5cc3f19252c7aa153ad99719f4199698ef28a70070ae11c866ba67c6b2f1b3dea0e35add491f8
-
Filesize
76KB
MD5cc199f05f3742d45549f2100424597c7
SHA12be34ce61c8e1d35ec14b329f6f1c2ff52d41648
SHA256e95020e4e621dbe251f797edb3223ffb46c9d627499c6a2cac6e9315a4b53deb
SHA512432167a6969fcac38f710110896e92103f2b0f2a4b1ef095b6d5cc3f19252c7aa153ad99719f4199698ef28a70070ae11c866ba67c6b2f1b3dea0e35add491f8
-
Filesize
76KB
MD5cc199f05f3742d45549f2100424597c7
SHA12be34ce61c8e1d35ec14b329f6f1c2ff52d41648
SHA256e95020e4e621dbe251f797edb3223ffb46c9d627499c6a2cac6e9315a4b53deb
SHA512432167a6969fcac38f710110896e92103f2b0f2a4b1ef095b6d5cc3f19252c7aa153ad99719f4199698ef28a70070ae11c866ba67c6b2f1b3dea0e35add491f8
-
Filesize
76KB
MD5cc199f05f3742d45549f2100424597c7
SHA12be34ce61c8e1d35ec14b329f6f1c2ff52d41648
SHA256e95020e4e621dbe251f797edb3223ffb46c9d627499c6a2cac6e9315a4b53deb
SHA512432167a6969fcac38f710110896e92103f2b0f2a4b1ef095b6d5cc3f19252c7aa153ad99719f4199698ef28a70070ae11c866ba67c6b2f1b3dea0e35add491f8