Analysis

  • max time kernel
    159s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    12/10/2023, 12:57

General

  • Target

    b9e68e02f9a98106c51ef36ad10029e4dc8fceaebd5b4f903e1a3ad7fd0a27eb.exe

  • Size

    82KB

  • MD5

    95cff6a83b1881f8e64fd1968dbb0329

  • SHA1

    651ee0d92a2c845faf23b9419a8022cefdaa4e0d

  • SHA256

    b9e68e02f9a98106c51ef36ad10029e4dc8fceaebd5b4f903e1a3ad7fd0a27eb

  • SHA512

    c499b101165efd25b25649a7e048e614e87db4f7ea37b92d2691087edb62f4e6e2fb74e204eb77a19d1f7a5c4e60e087e60bcecf373c0adb0b9a47c080fe18cf

  • SSDEEP

    768:agO5xRYi+SfSWHHNvvG5bnl/NqNwsKVDstHxYD0p1aXKynF0vQmYZS0HdJnfWOKr:RshfSWHHNvoLqNwDDGw02eQmh0HjWOKr

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Modifies system executable filetype association 2 TTPs 5 IoCs
  • Drops file in System32 directory 4 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies registry class 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b9e68e02f9a98106c51ef36ad10029e4dc8fceaebd5b4f903e1a3ad7fd0a27eb.exe
    "C:\Users\Admin\AppData\Local\Temp\b9e68e02f9a98106c51ef36ad10029e4dc8fceaebd5b4f903e1a3ad7fd0a27eb.exe"
    1⤵
    • Loads dropped DLL
    • Modifies system executable filetype association
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1656
    • C:\Windows\system\rundll32.exe
      C:\Windows\system\rundll32.exe
      2⤵
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:2740

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\notepad¢¬.exe

          Filesize

          81KB

          MD5

          1fd2938b800fe1bd35ba43659a767cdb

          SHA1

          db6225bbc52c9dd6f200bad781c7b8e8546aaced

          SHA256

          58ad8910c42182adf6bce7ace304d8b29593a771a713131c0aee534491c859d8

          SHA512

          1d17d330782ecbf53687eb93378ff2501d8ad386abcfeae07e74f3c0843d73215c186ea96c52de7153bbe2336219fd263d19af5425a7d4275d08c73b5a29ac73

        • C:\Windows\system\rundll32.exe

          Filesize

          75KB

          MD5

          debb508d1accd4896a48d5b5e6664bd3

          SHA1

          b8e2801d941dc1c3608e0e791ad30932aa4e3de0

          SHA256

          7b0b0d78883bf6df27d0c6505cc3f2512bfd7acb235d1348921e8d5ee3ae0eb5

          SHA512

          f4250f306b1184a9952657d87070923d258cd0564ca673b7e882b60e8daa705840d63c359e4511315e6e707a6435dbd56aebb4a44142e7c8fce1980397a85413

        • C:\Windows\system\rundll32.exe

          Filesize

          75KB

          MD5

          debb508d1accd4896a48d5b5e6664bd3

          SHA1

          b8e2801d941dc1c3608e0e791ad30932aa4e3de0

          SHA256

          7b0b0d78883bf6df27d0c6505cc3f2512bfd7acb235d1348921e8d5ee3ae0eb5

          SHA512

          f4250f306b1184a9952657d87070923d258cd0564ca673b7e882b60e8daa705840d63c359e4511315e6e707a6435dbd56aebb4a44142e7c8fce1980397a85413

        • \Windows\system\rundll32.exe

          Filesize

          75KB

          MD5

          debb508d1accd4896a48d5b5e6664bd3

          SHA1

          b8e2801d941dc1c3608e0e791ad30932aa4e3de0

          SHA256

          7b0b0d78883bf6df27d0c6505cc3f2512bfd7acb235d1348921e8d5ee3ae0eb5

          SHA512

          f4250f306b1184a9952657d87070923d258cd0564ca673b7e882b60e8daa705840d63c359e4511315e6e707a6435dbd56aebb4a44142e7c8fce1980397a85413

        • \Windows\system\rundll32.exe

          Filesize

          75KB

          MD5

          debb508d1accd4896a48d5b5e6664bd3

          SHA1

          b8e2801d941dc1c3608e0e791ad30932aa4e3de0

          SHA256

          7b0b0d78883bf6df27d0c6505cc3f2512bfd7acb235d1348921e8d5ee3ae0eb5

          SHA512

          f4250f306b1184a9952657d87070923d258cd0564ca673b7e882b60e8daa705840d63c359e4511315e6e707a6435dbd56aebb4a44142e7c8fce1980397a85413

        • memory/1656-0-0x0000000000400000-0x0000000000415A00-memory.dmp

          Filesize

          86KB

        • memory/1656-12-0x0000000000340000-0x0000000000356000-memory.dmp

          Filesize

          88KB

        • memory/1656-19-0x0000000000400000-0x0000000000415A00-memory.dmp

          Filesize

          86KB

        • memory/1656-20-0x0000000000340000-0x0000000000346000-memory.dmp

          Filesize

          24KB

        • memory/2740-21-0x0000000000400000-0x0000000000415A00-memory.dmp

          Filesize

          86KB