Analysis

  • max time kernel
    152s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/10/2023, 20:20

General

  • Target

    f397275e901f10655b6cd89988239dfabdb2ee1cde079b1c43770db9bd63b7ad.exe

  • Size

    74KB

  • MD5

    5a4aee9ed4978136876c444ef8fdcbcc

  • SHA1

    de43ba821c1efdc0ff461dfe7a04dcf3e8c59759

  • SHA256

    f397275e901f10655b6cd89988239dfabdb2ee1cde079b1c43770db9bd63b7ad

  • SHA512

    01f7d4bbdbf487dafeb8d33f420fbe6f108b034fbdd623051144897331616a11bb2312cc8220ee10fbb4c03145a461cd27d6ff356d77dd8301c24946052bdd12

  • SSDEEP

    768:agO5xRYi+SfSWHHNvvG5bnl/NqNwsKVDstHxYD0p1aXKynF0vQmYZS0HdJnfWO37:RshfSWHHNvoLqNwDDGw02eQmh0HjWO37

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Modifies system executable filetype association 2 TTPs 5 IoCs
  • Drops file in System32 directory 4 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies registry class 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 28 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f397275e901f10655b6cd89988239dfabdb2ee1cde079b1c43770db9bd63b7ad.exe
    "C:\Users\Admin\AppData\Local\Temp\f397275e901f10655b6cd89988239dfabdb2ee1cde079b1c43770db9bd63b7ad.exe"
    1⤵
    • Modifies system executable filetype association
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3312
    • C:\Windows\system\rundll32.exe
      C:\Windows\system\rundll32.exe
      2⤵
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:5100

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\notepad¢¬.exe

    Filesize

    73KB

    MD5

    078212867b1203d6271434a5cabe298f

    SHA1

    b938e57d9cc224eb5b47fd497dae17f2a02e377a

    SHA256

    010e2a7e9f96a152684738f949c1e933c39198816d84812642eef63eee1b13f7

    SHA512

    77499b02ab642260321e0694ea104178a8e6678b1ca7bfab8e35d137fd984a74d24f2740fc543d0e87e771dec5deac9d7a5de0f2dc25d87a117e2fd19e754b64

  • C:\Windows\System\rundll32.exe

    Filesize

    76KB

    MD5

    2febcd054b36f05419623ad58d9d576e

    SHA1

    e5748b1fb68445e8e84c708593267b3683013472

    SHA256

    4a9fad2225032413be7ec122df6a94e85dd7960f6bea3231205715df46860823

    SHA512

    6fd62523a504497fde2e3e92bcc83a8f6199b872cfa88cb8683e48e3acd001e12484cd348f10fc80524105510d21cd0064a6aba2bceb4df542c381c56d5415b4

  • C:\Windows\system\rundll32.exe

    Filesize

    76KB

    MD5

    2febcd054b36f05419623ad58d9d576e

    SHA1

    e5748b1fb68445e8e84c708593267b3683013472

    SHA256

    4a9fad2225032413be7ec122df6a94e85dd7960f6bea3231205715df46860823

    SHA512

    6fd62523a504497fde2e3e92bcc83a8f6199b872cfa88cb8683e48e3acd001e12484cd348f10fc80524105510d21cd0064a6aba2bceb4df542c381c56d5415b4

  • memory/3312-0-0x0000000000400000-0x0000000000415A00-memory.dmp

    Filesize

    86KB

  • memory/3312-13-0x0000000000400000-0x0000000000415A00-memory.dmp

    Filesize

    86KB

  • memory/5100-14-0x0000000000400000-0x0000000000415A00-memory.dmp

    Filesize

    86KB