Analysis
-
max time kernel
157s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
13/10/2023, 22:48
Static task
static1
Behavioral task
behavioral1
Sample
6cd54a3df40cc37b457775d9954521fbe51089834ede9acc3a4203b67028a278.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
6cd54a3df40cc37b457775d9954521fbe51089834ede9acc3a4203b67028a278.exe
Resource
win10v2004-20230915-en
General
-
Target
6cd54a3df40cc37b457775d9954521fbe51089834ede9acc3a4203b67028a278.exe
-
Size
73KB
-
MD5
8a83dcfe436b7a936b9d4de87d9c80f7
-
SHA1
73af495a6476f89d6c2be56128e1039db66119b5
-
SHA256
6cd54a3df40cc37b457775d9954521fbe51089834ede9acc3a4203b67028a278
-
SHA512
6d1cb79aa8d7a80d5f3945a88cf2894fa92cc307d74e6a087ac6fa1e8561a7ecddeda0119391a6281683a1a7a82e9ae5d673afc1031b430f2795c4513a48f212
-
SSDEEP
768:agO5xRYi+SfSWHHNvvG5bnl/NqNwsKVDstHxYD0p1aXKynF0vQmYZS0HdJnfWOn:RshfSWHHNvoLqNwDDGw02eQmh0HjWOn
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 396 rundll32.exe -
Modifies system executable filetype association 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command 6cd54a3df40cc37b457775d9954521fbe51089834ede9acc3a4203b67028a278.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 6cd54a3df40cc37b457775d9954521fbe51089834ede9acc3a4203b67028a278.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" 6cd54a3df40cc37b457775d9954521fbe51089834ede9acc3a4203b67028a278.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\notepad¢¬.exe 6cd54a3df40cc37b457775d9954521fbe51089834ede9acc3a4203b67028a278.exe File created C:\Windows\SysWOW64\notepad¢¬.exe 6cd54a3df40cc37b457775d9954521fbe51089834ede9acc3a4203b67028a278.exe File opened for modification C:\Windows\SysWOW64\¢«.exe 6cd54a3df40cc37b457775d9954521fbe51089834ede9acc3a4203b67028a278.exe File created C:\Windows\SysWOW64\¢«.exe 6cd54a3df40cc37b457775d9954521fbe51089834ede9acc3a4203b67028a278.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system\rundll32.exe 6cd54a3df40cc37b457775d9954521fbe51089834ede9acc3a4203b67028a278.exe File created C:\Windows\system\rundll32.exe 6cd54a3df40cc37b457775d9954521fbe51089834ede9acc3a4203b67028a278.exe -
Modifies registry class 15 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainSetup = "1697279637" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 6cd54a3df40cc37b457775d9954521fbe51089834ede9acc3a4203b67028a278.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" 6cd54a3df40cc37b457775d9954521fbe51089834ede9acc3a4203b67028a278.exe Key created \REGISTRY\MACHINE\Software\Classes\MSipv rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" 6cd54a3df40cc37b457775d9954521fbe51089834ede9acc3a4203b67028a278.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad.exe %1" 6cd54a3df40cc37b457775d9954521fbe51089834ede9acc3a4203b67028a278.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainUp = "1697279637" rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainVer = "506" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\MSipv 6cd54a3df40cc37b457775d9954521fbe51089834ede9acc3a4203b67028a278.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command 6cd54a3df40cc37b457775d9954521fbe51089834ede9acc3a4203b67028a278.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command 6cd54a3df40cc37b457775d9954521fbe51089834ede9acc3a4203b67028a278.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 4156 6cd54a3df40cc37b457775d9954521fbe51089834ede9acc3a4203b67028a278.exe 4156 6cd54a3df40cc37b457775d9954521fbe51089834ede9acc3a4203b67028a278.exe 4156 6cd54a3df40cc37b457775d9954521fbe51089834ede9acc3a4203b67028a278.exe 4156 6cd54a3df40cc37b457775d9954521fbe51089834ede9acc3a4203b67028a278.exe 4156 6cd54a3df40cc37b457775d9954521fbe51089834ede9acc3a4203b67028a278.exe 4156 6cd54a3df40cc37b457775d9954521fbe51089834ede9acc3a4203b67028a278.exe 4156 6cd54a3df40cc37b457775d9954521fbe51089834ede9acc3a4203b67028a278.exe 4156 6cd54a3df40cc37b457775d9954521fbe51089834ede9acc3a4203b67028a278.exe 4156 6cd54a3df40cc37b457775d9954521fbe51089834ede9acc3a4203b67028a278.exe 4156 6cd54a3df40cc37b457775d9954521fbe51089834ede9acc3a4203b67028a278.exe 4156 6cd54a3df40cc37b457775d9954521fbe51089834ede9acc3a4203b67028a278.exe 4156 6cd54a3df40cc37b457775d9954521fbe51089834ede9acc3a4203b67028a278.exe 4156 6cd54a3df40cc37b457775d9954521fbe51089834ede9acc3a4203b67028a278.exe 4156 6cd54a3df40cc37b457775d9954521fbe51089834ede9acc3a4203b67028a278.exe 4156 6cd54a3df40cc37b457775d9954521fbe51089834ede9acc3a4203b67028a278.exe 4156 6cd54a3df40cc37b457775d9954521fbe51089834ede9acc3a4203b67028a278.exe 4156 6cd54a3df40cc37b457775d9954521fbe51089834ede9acc3a4203b67028a278.exe 4156 6cd54a3df40cc37b457775d9954521fbe51089834ede9acc3a4203b67028a278.exe 4156 6cd54a3df40cc37b457775d9954521fbe51089834ede9acc3a4203b67028a278.exe 4156 6cd54a3df40cc37b457775d9954521fbe51089834ede9acc3a4203b67028a278.exe 4156 6cd54a3df40cc37b457775d9954521fbe51089834ede9acc3a4203b67028a278.exe 4156 6cd54a3df40cc37b457775d9954521fbe51089834ede9acc3a4203b67028a278.exe 4156 6cd54a3df40cc37b457775d9954521fbe51089834ede9acc3a4203b67028a278.exe 4156 6cd54a3df40cc37b457775d9954521fbe51089834ede9acc3a4203b67028a278.exe 4156 6cd54a3df40cc37b457775d9954521fbe51089834ede9acc3a4203b67028a278.exe 4156 6cd54a3df40cc37b457775d9954521fbe51089834ede9acc3a4203b67028a278.exe 4156 6cd54a3df40cc37b457775d9954521fbe51089834ede9acc3a4203b67028a278.exe 4156 6cd54a3df40cc37b457775d9954521fbe51089834ede9acc3a4203b67028a278.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 396 rundll32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4156 6cd54a3df40cc37b457775d9954521fbe51089834ede9acc3a4203b67028a278.exe 396 rundll32.exe 396 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4156 wrote to memory of 396 4156 6cd54a3df40cc37b457775d9954521fbe51089834ede9acc3a4203b67028a278.exe 88 PID 4156 wrote to memory of 396 4156 6cd54a3df40cc37b457775d9954521fbe51089834ede9acc3a4203b67028a278.exe 88 PID 4156 wrote to memory of 396 4156 6cd54a3df40cc37b457775d9954521fbe51089834ede9acc3a4203b67028a278.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\6cd54a3df40cc37b457775d9954521fbe51089834ede9acc3a4203b67028a278.exe"C:\Users\Admin\AppData\Local\Temp\6cd54a3df40cc37b457775d9954521fbe51089834ede9acc3a4203b67028a278.exe"1⤵
- Modifies system executable filetype association
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4156 -
C:\Windows\system\rundll32.exeC:\Windows\system\rundll32.exe2⤵
- Executes dropped EXE
- Modifies system executable filetype association
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:396
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74KB
MD528c133d951d256d97c3277cdad7a1918
SHA1ea2e7b5603a1775c5dbfdf6b1e2eeacf173a39b6
SHA256c79df9d468536c2494009d27b1881feb6b07998a79ce778d81766a1027be624e
SHA512d7b53a2d5798c181789f4b6f2f97f89d3432ed09bf71d8efc2ef17f3cf35f4f860bfc8f0933739e71e6c06fbb9165b84214f40920a3f38881e1ed7b489aa74f1
-
Filesize
78KB
MD5cf053b08a4a277c0bf51ec33840971d0
SHA10b56aec9efa55a9836b3c75a49f62d60dc522435
SHA2560962cafd1b2396b6dd4d6fef8bbbaed7917766f3452a21d835d92a5f5f5af524
SHA5122599164ec530c09bd638029643ce734a6fb15f2b0f5e1a30e28f103593095adf6261dcdf1b6fe0ebac2d90a150331e7f196d18275335de267ae73e3adc1a02ef
-
Filesize
78KB
MD5cf053b08a4a277c0bf51ec33840971d0
SHA10b56aec9efa55a9836b3c75a49f62d60dc522435
SHA2560962cafd1b2396b6dd4d6fef8bbbaed7917766f3452a21d835d92a5f5f5af524
SHA5122599164ec530c09bd638029643ce734a6fb15f2b0f5e1a30e28f103593095adf6261dcdf1b6fe0ebac2d90a150331e7f196d18275335de267ae73e3adc1a02ef