Analysis
-
max time kernel
151s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2023, 02:38
Static task
static1
Behavioral task
behavioral1
Sample
6d1aaf6a853d39b2decbb63012fbb2fc7a125fe6307de3022d50b2b0d8b8062d.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
6d1aaf6a853d39b2decbb63012fbb2fc7a125fe6307de3022d50b2b0d8b8062d.exe
Resource
win10v2004-20230915-en
General
-
Target
6d1aaf6a853d39b2decbb63012fbb2fc7a125fe6307de3022d50b2b0d8b8062d.exe
-
Size
79KB
-
MD5
810596e0b1acee4c520e0f1567903646
-
SHA1
d718a25fd006322d7bacd924c049639d38ce4623
-
SHA256
6d1aaf6a853d39b2decbb63012fbb2fc7a125fe6307de3022d50b2b0d8b8062d
-
SHA512
be30b5d396c3500f67f7bb7e81541ab04963415bc1672028c3ad0fd89b717b765a2178f9445c1009c6dda2d3dd471926eb869229f00030e6c495c68e31c7bc53
-
SSDEEP
1536:RshfSWHHNvoLqNwDDGw02eQmh0HjWOt+GNk:GhfxHNIreQm+Hi6+GNk
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3844 rundll32.exe -
Modifies system executable filetype association 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command 6d1aaf6a853d39b2decbb63012fbb2fc7a125fe6307de3022d50b2b0d8b8062d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 6d1aaf6a853d39b2decbb63012fbb2fc7a125fe6307de3022d50b2b0d8b8062d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" 6d1aaf6a853d39b2decbb63012fbb2fc7a125fe6307de3022d50b2b0d8b8062d.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\notepad¢¬.exe 6d1aaf6a853d39b2decbb63012fbb2fc7a125fe6307de3022d50b2b0d8b8062d.exe File created C:\Windows\SysWOW64\notepad¢¬.exe 6d1aaf6a853d39b2decbb63012fbb2fc7a125fe6307de3022d50b2b0d8b8062d.exe File opened for modification C:\Windows\SysWOW64\¢«.exe 6d1aaf6a853d39b2decbb63012fbb2fc7a125fe6307de3022d50b2b0d8b8062d.exe File created C:\Windows\SysWOW64\¢«.exe 6d1aaf6a853d39b2decbb63012fbb2fc7a125fe6307de3022d50b2b0d8b8062d.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system\rundll32.exe 6d1aaf6a853d39b2decbb63012fbb2fc7a125fe6307de3022d50b2b0d8b8062d.exe File created C:\Windows\system\rundll32.exe 6d1aaf6a853d39b2decbb63012fbb2fc7a125fe6307de3022d50b2b0d8b8062d.exe -
Modifies registry class 15 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 6d1aaf6a853d39b2decbb63012fbb2fc7a125fe6307de3022d50b2b0d8b8062d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainSetup = "1697168318" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\MSipv 6d1aaf6a853d39b2decbb63012fbb2fc7a125fe6307de3022d50b2b0d8b8062d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" 6d1aaf6a853d39b2decbb63012fbb2fc7a125fe6307de3022d50b2b0d8b8062d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" 6d1aaf6a853d39b2decbb63012fbb2fc7a125fe6307de3022d50b2b0d8b8062d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainUp = "1697168318" rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainVer = "506" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command 6d1aaf6a853d39b2decbb63012fbb2fc7a125fe6307de3022d50b2b0d8b8062d.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command 6d1aaf6a853d39b2decbb63012fbb2fc7a125fe6307de3022d50b2b0d8b8062d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad.exe %1" 6d1aaf6a853d39b2decbb63012fbb2fc7a125fe6307de3022d50b2b0d8b8062d.exe Key created \REGISTRY\MACHINE\Software\Classes\MSipv rundll32.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 4628 6d1aaf6a853d39b2decbb63012fbb2fc7a125fe6307de3022d50b2b0d8b8062d.exe 4628 6d1aaf6a853d39b2decbb63012fbb2fc7a125fe6307de3022d50b2b0d8b8062d.exe 4628 6d1aaf6a853d39b2decbb63012fbb2fc7a125fe6307de3022d50b2b0d8b8062d.exe 4628 6d1aaf6a853d39b2decbb63012fbb2fc7a125fe6307de3022d50b2b0d8b8062d.exe 4628 6d1aaf6a853d39b2decbb63012fbb2fc7a125fe6307de3022d50b2b0d8b8062d.exe 4628 6d1aaf6a853d39b2decbb63012fbb2fc7a125fe6307de3022d50b2b0d8b8062d.exe 4628 6d1aaf6a853d39b2decbb63012fbb2fc7a125fe6307de3022d50b2b0d8b8062d.exe 4628 6d1aaf6a853d39b2decbb63012fbb2fc7a125fe6307de3022d50b2b0d8b8062d.exe 4628 6d1aaf6a853d39b2decbb63012fbb2fc7a125fe6307de3022d50b2b0d8b8062d.exe 4628 6d1aaf6a853d39b2decbb63012fbb2fc7a125fe6307de3022d50b2b0d8b8062d.exe 4628 6d1aaf6a853d39b2decbb63012fbb2fc7a125fe6307de3022d50b2b0d8b8062d.exe 4628 6d1aaf6a853d39b2decbb63012fbb2fc7a125fe6307de3022d50b2b0d8b8062d.exe 4628 6d1aaf6a853d39b2decbb63012fbb2fc7a125fe6307de3022d50b2b0d8b8062d.exe 4628 6d1aaf6a853d39b2decbb63012fbb2fc7a125fe6307de3022d50b2b0d8b8062d.exe 4628 6d1aaf6a853d39b2decbb63012fbb2fc7a125fe6307de3022d50b2b0d8b8062d.exe 4628 6d1aaf6a853d39b2decbb63012fbb2fc7a125fe6307de3022d50b2b0d8b8062d.exe 4628 6d1aaf6a853d39b2decbb63012fbb2fc7a125fe6307de3022d50b2b0d8b8062d.exe 4628 6d1aaf6a853d39b2decbb63012fbb2fc7a125fe6307de3022d50b2b0d8b8062d.exe 4628 6d1aaf6a853d39b2decbb63012fbb2fc7a125fe6307de3022d50b2b0d8b8062d.exe 4628 6d1aaf6a853d39b2decbb63012fbb2fc7a125fe6307de3022d50b2b0d8b8062d.exe 4628 6d1aaf6a853d39b2decbb63012fbb2fc7a125fe6307de3022d50b2b0d8b8062d.exe 4628 6d1aaf6a853d39b2decbb63012fbb2fc7a125fe6307de3022d50b2b0d8b8062d.exe 4628 6d1aaf6a853d39b2decbb63012fbb2fc7a125fe6307de3022d50b2b0d8b8062d.exe 4628 6d1aaf6a853d39b2decbb63012fbb2fc7a125fe6307de3022d50b2b0d8b8062d.exe 4628 6d1aaf6a853d39b2decbb63012fbb2fc7a125fe6307de3022d50b2b0d8b8062d.exe 4628 6d1aaf6a853d39b2decbb63012fbb2fc7a125fe6307de3022d50b2b0d8b8062d.exe 4628 6d1aaf6a853d39b2decbb63012fbb2fc7a125fe6307de3022d50b2b0d8b8062d.exe 4628 6d1aaf6a853d39b2decbb63012fbb2fc7a125fe6307de3022d50b2b0d8b8062d.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4628 6d1aaf6a853d39b2decbb63012fbb2fc7a125fe6307de3022d50b2b0d8b8062d.exe 3844 rundll32.exe 3844 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4628 wrote to memory of 3844 4628 6d1aaf6a853d39b2decbb63012fbb2fc7a125fe6307de3022d50b2b0d8b8062d.exe 86 PID 4628 wrote to memory of 3844 4628 6d1aaf6a853d39b2decbb63012fbb2fc7a125fe6307de3022d50b2b0d8b8062d.exe 86 PID 4628 wrote to memory of 3844 4628 6d1aaf6a853d39b2decbb63012fbb2fc7a125fe6307de3022d50b2b0d8b8062d.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\6d1aaf6a853d39b2decbb63012fbb2fc7a125fe6307de3022d50b2b0d8b8062d.exe"C:\Users\Admin\AppData\Local\Temp\6d1aaf6a853d39b2decbb63012fbb2fc7a125fe6307de3022d50b2b0d8b8062d.exe"1⤵
- Modifies system executable filetype association
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4628 -
C:\Windows\system\rundll32.exeC:\Windows\system\rundll32.exe2⤵
- Executes dropped EXE
- Modifies system executable filetype association
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3844
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74KB
MD5bfeb23fd50059f5a6a8e1a7b99633f5f
SHA151ae2ff8f69b5011e813b7c0d520c92bfb5c8aeb
SHA25686a0d0131fa3850974176716e485961d0b28e3da6ea9308f672a86954ec0d84c
SHA512115f82b499461858e009466856bf00961549d8932ec80cf81279b3bae7fec6b6a75a750b3d1e533e815132adb62307bdf9f81f61de50260927b5d2a6f0d3f0c5
-
Filesize
77KB
MD5cb2bab1e23eed6b2af1af1b17e2cb0c1
SHA1380f8f746e7d80088c44dda032f5c0579181cb1e
SHA2562f7428dfd22d7ddf1623a99b0459cb5748ddbe7fa4e0d4aee1405a3021c57247
SHA512cd96f7c9a03ae06db48ddb926ef968864dc8edc9365b4f397618de2da1689096a25f90cdd4e47b94737f5c638d4504d8289e14db16a6168e1f889a589deca2e2
-
Filesize
77KB
MD5cb2bab1e23eed6b2af1af1b17e2cb0c1
SHA1380f8f746e7d80088c44dda032f5c0579181cb1e
SHA2562f7428dfd22d7ddf1623a99b0459cb5748ddbe7fa4e0d4aee1405a3021c57247
SHA512cd96f7c9a03ae06db48ddb926ef968864dc8edc9365b4f397618de2da1689096a25f90cdd4e47b94737f5c638d4504d8289e14db16a6168e1f889a589deca2e2