Analysis
-
max time kernel
149s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
13/10/2023, 22:31
Static task
static1
Behavioral task
behavioral1
Sample
162aab9f88fdc5b7a2d7bd8820800ecdf5dfc31dd63fb60118c63d5aee001dc6.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
162aab9f88fdc5b7a2d7bd8820800ecdf5dfc31dd63fb60118c63d5aee001dc6.exe
Resource
win10v2004-20230915-en
General
-
Target
162aab9f88fdc5b7a2d7bd8820800ecdf5dfc31dd63fb60118c63d5aee001dc6.exe
-
Size
76KB
-
MD5
412b6af01f6f2bc9e9a51c59ccdf3011
-
SHA1
9971ee02504e2a839158cfe35bf734a7bca58825
-
SHA256
162aab9f88fdc5b7a2d7bd8820800ecdf5dfc31dd63fb60118c63d5aee001dc6
-
SHA512
41a2a1ea4cc0c1d9b2d77f65ca462899c29b9ca090a163073a7aa2e46fe159f5053aac92c0520b23ec9b3928509680356cb9ef90b20230f50ccf552ed4c5b3a5
-
SSDEEP
1536:RshfSWHHNvoLqNwDDGw02eQmh0HjWOaTh:GhfxHNIreQm+Hi3Th
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 620 rundll32.exe -
Loads dropped DLL 2 IoCs
pid Process 292 162aab9f88fdc5b7a2d7bd8820800ecdf5dfc31dd63fb60118c63d5aee001dc6.exe 292 162aab9f88fdc5b7a2d7bd8820800ecdf5dfc31dd63fb60118c63d5aee001dc6.exe -
Modifies system executable filetype association 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command 162aab9f88fdc5b7a2d7bd8820800ecdf5dfc31dd63fb60118c63d5aee001dc6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 162aab9f88fdc5b7a2d7bd8820800ecdf5dfc31dd63fb60118c63d5aee001dc6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" 162aab9f88fdc5b7a2d7bd8820800ecdf5dfc31dd63fb60118c63d5aee001dc6.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\¢«.exe 162aab9f88fdc5b7a2d7bd8820800ecdf5dfc31dd63fb60118c63d5aee001dc6.exe File created C:\Windows\SysWOW64\¢«.exe 162aab9f88fdc5b7a2d7bd8820800ecdf5dfc31dd63fb60118c63d5aee001dc6.exe File opened for modification C:\Windows\SysWOW64\notepad¢¬.exe 162aab9f88fdc5b7a2d7bd8820800ecdf5dfc31dd63fb60118c63d5aee001dc6.exe File created C:\Windows\SysWOW64\notepad¢¬.exe 162aab9f88fdc5b7a2d7bd8820800ecdf5dfc31dd63fb60118c63d5aee001dc6.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system\rundll32.exe 162aab9f88fdc5b7a2d7bd8820800ecdf5dfc31dd63fb60118c63d5aee001dc6.exe File created C:\Windows\system\rundll32.exe 162aab9f88fdc5b7a2d7bd8820800ecdf5dfc31dd63fb60118c63d5aee001dc6.exe -
Modifies registry class 15 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainVer = "506" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\MSipv rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 162aab9f88fdc5b7a2d7bd8820800ecdf5dfc31dd63fb60118c63d5aee001dc6.exe Key created \REGISTRY\MACHINE\Software\Classes\MSipv 162aab9f88fdc5b7a2d7bd8820800ecdf5dfc31dd63fb60118c63d5aee001dc6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad.exe %1" 162aab9f88fdc5b7a2d7bd8820800ecdf5dfc31dd63fb60118c63d5aee001dc6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" 162aab9f88fdc5b7a2d7bd8820800ecdf5dfc31dd63fb60118c63d5aee001dc6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" 162aab9f88fdc5b7a2d7bd8820800ecdf5dfc31dd63fb60118c63d5aee001dc6.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command 162aab9f88fdc5b7a2d7bd8820800ecdf5dfc31dd63fb60118c63d5aee001dc6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainSetup = "1697278065" rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainUp = "1697278065" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command 162aab9f88fdc5b7a2d7bd8820800ecdf5dfc31dd63fb60118c63d5aee001dc6.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 292 162aab9f88fdc5b7a2d7bd8820800ecdf5dfc31dd63fb60118c63d5aee001dc6.exe 292 162aab9f88fdc5b7a2d7bd8820800ecdf5dfc31dd63fb60118c63d5aee001dc6.exe 292 162aab9f88fdc5b7a2d7bd8820800ecdf5dfc31dd63fb60118c63d5aee001dc6.exe 292 162aab9f88fdc5b7a2d7bd8820800ecdf5dfc31dd63fb60118c63d5aee001dc6.exe 292 162aab9f88fdc5b7a2d7bd8820800ecdf5dfc31dd63fb60118c63d5aee001dc6.exe 292 162aab9f88fdc5b7a2d7bd8820800ecdf5dfc31dd63fb60118c63d5aee001dc6.exe 292 162aab9f88fdc5b7a2d7bd8820800ecdf5dfc31dd63fb60118c63d5aee001dc6.exe 292 162aab9f88fdc5b7a2d7bd8820800ecdf5dfc31dd63fb60118c63d5aee001dc6.exe 292 162aab9f88fdc5b7a2d7bd8820800ecdf5dfc31dd63fb60118c63d5aee001dc6.exe 292 162aab9f88fdc5b7a2d7bd8820800ecdf5dfc31dd63fb60118c63d5aee001dc6.exe 292 162aab9f88fdc5b7a2d7bd8820800ecdf5dfc31dd63fb60118c63d5aee001dc6.exe 292 162aab9f88fdc5b7a2d7bd8820800ecdf5dfc31dd63fb60118c63d5aee001dc6.exe 292 162aab9f88fdc5b7a2d7bd8820800ecdf5dfc31dd63fb60118c63d5aee001dc6.exe 292 162aab9f88fdc5b7a2d7bd8820800ecdf5dfc31dd63fb60118c63d5aee001dc6.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 620 rundll32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 292 162aab9f88fdc5b7a2d7bd8820800ecdf5dfc31dd63fb60118c63d5aee001dc6.exe 620 rundll32.exe 620 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 292 wrote to memory of 620 292 162aab9f88fdc5b7a2d7bd8820800ecdf5dfc31dd63fb60118c63d5aee001dc6.exe 28 PID 292 wrote to memory of 620 292 162aab9f88fdc5b7a2d7bd8820800ecdf5dfc31dd63fb60118c63d5aee001dc6.exe 28 PID 292 wrote to memory of 620 292 162aab9f88fdc5b7a2d7bd8820800ecdf5dfc31dd63fb60118c63d5aee001dc6.exe 28 PID 292 wrote to memory of 620 292 162aab9f88fdc5b7a2d7bd8820800ecdf5dfc31dd63fb60118c63d5aee001dc6.exe 28 PID 292 wrote to memory of 620 292 162aab9f88fdc5b7a2d7bd8820800ecdf5dfc31dd63fb60118c63d5aee001dc6.exe 28 PID 292 wrote to memory of 620 292 162aab9f88fdc5b7a2d7bd8820800ecdf5dfc31dd63fb60118c63d5aee001dc6.exe 28 PID 292 wrote to memory of 620 292 162aab9f88fdc5b7a2d7bd8820800ecdf5dfc31dd63fb60118c63d5aee001dc6.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\162aab9f88fdc5b7a2d7bd8820800ecdf5dfc31dd63fb60118c63d5aee001dc6.exe"C:\Users\Admin\AppData\Local\Temp\162aab9f88fdc5b7a2d7bd8820800ecdf5dfc31dd63fb60118c63d5aee001dc6.exe"1⤵
- Loads dropped DLL
- Modifies system executable filetype association
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:292 -
C:\Windows\system\rundll32.exeC:\Windows\system\rundll32.exe2⤵
- Executes dropped EXE
- Modifies system executable filetype association
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:620
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
75KB
MD5eff1f504165e2a1d8a7fb07a3f4d802f
SHA131d61ae2c7ee53dd7ae6c86c779cbefd84c8c74e
SHA2560d3c59fdbb66ad092e85752f49ea9161f492a92880e218ede0dc8f960a9b911e
SHA5121a26b6e90cd70dabf56be7f9317b4fb38bbaebc900851f06128b06b1ebb9aa56da51aee2305b50cf4006609a4f930abe8d90e1a9d5f94918026599d7af24aede
-
Filesize
80KB
MD5e52bf6271afa20cfd7eca3931cc46110
SHA1152dee7397174d7e7f79c90651ca6cde9d72df19
SHA256cf7194daefc6f4d626a9d221cf22877b81b54d0ab4a57e646943b2db9e626060
SHA512c437c710957ec2e23b4029e76d039f27260f04102214c9d388662f3315e191ad420a9384f1cdc6ea6541167ce81aa8751398a1e2a089a83626b89bd0f6bd9acc
-
Filesize
80KB
MD5e52bf6271afa20cfd7eca3931cc46110
SHA1152dee7397174d7e7f79c90651ca6cde9d72df19
SHA256cf7194daefc6f4d626a9d221cf22877b81b54d0ab4a57e646943b2db9e626060
SHA512c437c710957ec2e23b4029e76d039f27260f04102214c9d388662f3315e191ad420a9384f1cdc6ea6541167ce81aa8751398a1e2a089a83626b89bd0f6bd9acc
-
Filesize
80KB
MD5e52bf6271afa20cfd7eca3931cc46110
SHA1152dee7397174d7e7f79c90651ca6cde9d72df19
SHA256cf7194daefc6f4d626a9d221cf22877b81b54d0ab4a57e646943b2db9e626060
SHA512c437c710957ec2e23b4029e76d039f27260f04102214c9d388662f3315e191ad420a9384f1cdc6ea6541167ce81aa8751398a1e2a089a83626b89bd0f6bd9acc
-
Filesize
80KB
MD5e52bf6271afa20cfd7eca3931cc46110
SHA1152dee7397174d7e7f79c90651ca6cde9d72df19
SHA256cf7194daefc6f4d626a9d221cf22877b81b54d0ab4a57e646943b2db9e626060
SHA512c437c710957ec2e23b4029e76d039f27260f04102214c9d388662f3315e191ad420a9384f1cdc6ea6541167ce81aa8751398a1e2a089a83626b89bd0f6bd9acc