Analysis

  • max time kernel
    150s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/10/2023, 12:57

General

  • Target

    b9e68e02f9a98106c51ef36ad10029e4dc8fceaebd5b4f903e1a3ad7fd0a27eb.exe

  • Size

    82KB

  • MD5

    95cff6a83b1881f8e64fd1968dbb0329

  • SHA1

    651ee0d92a2c845faf23b9419a8022cefdaa4e0d

  • SHA256

    b9e68e02f9a98106c51ef36ad10029e4dc8fceaebd5b4f903e1a3ad7fd0a27eb

  • SHA512

    c499b101165efd25b25649a7e048e614e87db4f7ea37b92d2691087edb62f4e6e2fb74e204eb77a19d1f7a5c4e60e087e60bcecf373c0adb0b9a47c080fe18cf

  • SSDEEP

    768:agO5xRYi+SfSWHHNvvG5bnl/NqNwsKVDstHxYD0p1aXKynF0vQmYZS0HdJnfWOKr:RshfSWHHNvoLqNwDDGw02eQmh0HjWOKr

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Modifies system executable filetype association 2 TTPs 5 IoCs
  • Drops file in System32 directory 4 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies registry class 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 28 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b9e68e02f9a98106c51ef36ad10029e4dc8fceaebd5b4f903e1a3ad7fd0a27eb.exe
    "C:\Users\Admin\AppData\Local\Temp\b9e68e02f9a98106c51ef36ad10029e4dc8fceaebd5b4f903e1a3ad7fd0a27eb.exe"
    1⤵
    • Modifies system executable filetype association
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2368
    • C:\Windows\system\rundll32.exe
      C:\Windows\system\rundll32.exe
      2⤵
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:2532

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\notepad¢¬.exe

          Filesize

          84KB

          MD5

          5b67fedac7b6c9c9359a84b112d51003

          SHA1

          c74073b45c270ddf02ff271dbfccc18daca4ffd0

          SHA256

          e86b80afea74ae315c6ec45b665c1a2f9c1ef223f126d1bbbc14c3d6f7fbd9b6

          SHA512

          e444aa48333a07cf2491bed28e02144e5bc5740ac0e9a2099e00a2a1c800a70839187c7b486e4d1d5fa6fddacab2a5fc8cd43f311a2e837b84795e62e7d39236

        • C:\Windows\System\rundll32.exe

          Filesize

          77KB

          MD5

          b2814c7a2f9d8e1bde3214987e753e8a

          SHA1

          b16d7512e6fdb03f853b787965d4a274f6a6ee1a

          SHA256

          cc642636c61881b1f2331dcfa6d74e28d6abe8e39298151a1c0bb6ac707a0686

          SHA512

          b9f408408134a3cefa0e270d174e0c930ea33f5cdc1770c8d1677c647f75282b97c478d2cea068547a959a1dd5a9710b0cd85c731622877df22265ae6fbea42b

        • C:\Windows\system\rundll32.exe

          Filesize

          77KB

          MD5

          b2814c7a2f9d8e1bde3214987e753e8a

          SHA1

          b16d7512e6fdb03f853b787965d4a274f6a6ee1a

          SHA256

          cc642636c61881b1f2331dcfa6d74e28d6abe8e39298151a1c0bb6ac707a0686

          SHA512

          b9f408408134a3cefa0e270d174e0c930ea33f5cdc1770c8d1677c647f75282b97c478d2cea068547a959a1dd5a9710b0cd85c731622877df22265ae6fbea42b

        • memory/2368-0-0x0000000000400000-0x0000000000415A00-memory.dmp

          Filesize

          86KB

        • memory/2368-13-0x0000000000400000-0x0000000000415A00-memory.dmp

          Filesize

          86KB

        • memory/2532-14-0x0000000000400000-0x0000000000415A00-memory.dmp

          Filesize

          86KB