Analysis

  • max time kernel
    160s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/10/2023, 03:43

General

  • Target

    77c80c2814b42aed71e0d39ad5ec5b6c7cc8adcad9c14fd315315ee76b4f11fd.exe

  • Size

    80KB

  • MD5

    f7110d120347c374d115f2624bcab62e

  • SHA1

    ae0122c10f9461b55d7d2633967f08ba112c30f7

  • SHA256

    77c80c2814b42aed71e0d39ad5ec5b6c7cc8adcad9c14fd315315ee76b4f11fd

  • SHA512

    e6d328598e40f23ae781835218274f304dee0f3e2e7fba5b64ffe1423d48c46bc1dcfddc3666222491682b2678a268c96cc916168438677833115e9e1568448a

  • SSDEEP

    1536:RshfSWHHNvoLqNwDDGw02eQmh0HjWOrv3dmD:GhfxHNIreQm+HiYv3d0

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Modifies system executable filetype association 2 TTPs 5 IoCs
  • Drops file in System32 directory 4 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies registry class 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 28 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\77c80c2814b42aed71e0d39ad5ec5b6c7cc8adcad9c14fd315315ee76b4f11fd.exe
    "C:\Users\Admin\AppData\Local\Temp\77c80c2814b42aed71e0d39ad5ec5b6c7cc8adcad9c14fd315315ee76b4f11fd.exe"
    1⤵
    • Modifies system executable filetype association
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4480
    • C:\Windows\system\rundll32.exe
      C:\Windows\system\rundll32.exe
      2⤵
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:4440

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\notepad¢¬.exe

          Filesize

          73KB

          MD5

          fcf8cf1d13ef7277f849446d1889947b

          SHA1

          19b6c45dc3ccc5f664ec331560b4ca585acebd2d

          SHA256

          06a5f90735b5704297565e75474071ffe8cd14868dd5b0f13e02e5730ce6f65f

          SHA512

          6b811f19829cce840c78e093922ab343e3397f0f7267aee440a68ba53d3a6f94f180638e304a1a61168dfd67cf46492ff7a0e75825d28e051a4ad3481521a29e

        • C:\Windows\System\rundll32.exe

          Filesize

          83KB

          MD5

          9e58cd1d88f656b2f4574398130bb8b4

          SHA1

          c787e04e2e39713df94c816aec4041fb07e00c0e

          SHA256

          2a90f3c06ce556089e267c500dcdf627bd26f662b7f8b3fca6423cda53b1ad8d

          SHA512

          812ef284d7ffd64b50b956a28f383b99f435fb3bfe5c3ddfb00fff77671c2aa9b313066d85fbb97808ac0b1bbae9cfc754dc6e25ee208b804873e2342d874dae

        • C:\Windows\system\rundll32.exe

          Filesize

          83KB

          MD5

          9e58cd1d88f656b2f4574398130bb8b4

          SHA1

          c787e04e2e39713df94c816aec4041fb07e00c0e

          SHA256

          2a90f3c06ce556089e267c500dcdf627bd26f662b7f8b3fca6423cda53b1ad8d

          SHA512

          812ef284d7ffd64b50b956a28f383b99f435fb3bfe5c3ddfb00fff77671c2aa9b313066d85fbb97808ac0b1bbae9cfc754dc6e25ee208b804873e2342d874dae

        • memory/4440-14-0x0000000000400000-0x0000000000415A00-memory.dmp

          Filesize

          86KB

        • memory/4480-0-0x0000000000400000-0x0000000000415A00-memory.dmp

          Filesize

          86KB

        • memory/4480-13-0x0000000000400000-0x0000000000415A00-memory.dmp

          Filesize

          86KB