Analysis

  • max time kernel
    177s
  • max time network
    167s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/10/2023, 03:19

General

  • Target

    0325bb5d819a2bcf618f6b597ea8b3ce897bfeab416e0da6914d20446e177cf5.exe

  • Size

    82KB

  • MD5

    1eed14c3d0d8c0e23a77e4b6bbf2d479

  • SHA1

    a6c7a95c9d0abd1072fd492ef3f93ffaf52dd209

  • SHA256

    0325bb5d819a2bcf618f6b597ea8b3ce897bfeab416e0da6914d20446e177cf5

  • SHA512

    a6ba6377dc4dc0f72c0a14cd60b212dc8493c0467dc12604f949e3dd17b721f78626a4898d3ca8fb69cd9e12b02da90920da07789f9302090b05b130e0dda0d7

  • SSDEEP

    1536:RshfSWHHNvoLqNwDDGw02eQmh0HjWOHt0g0f9:GhfxHNIreQm+Hiet0g0f9

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Modifies system executable filetype association 2 TTPs 5 IoCs
  • Drops file in System32 directory 4 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies registry class 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 28 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0325bb5d819a2bcf618f6b597ea8b3ce897bfeab416e0da6914d20446e177cf5.exe
    "C:\Users\Admin\AppData\Local\Temp\0325bb5d819a2bcf618f6b597ea8b3ce897bfeab416e0da6914d20446e177cf5.exe"
    1⤵
    • Modifies system executable filetype association
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3632
    • C:\Windows\system\rundll32.exe
      C:\Windows\system\rundll32.exe
      2⤵
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:4792

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\notepad¢¬.exe

          Filesize

          85KB

          MD5

          6a28250f53d39db35b99356adb3a3ee1

          SHA1

          0b615da9d5a8ac38a024c806fcf2ec7eceafa5b1

          SHA256

          524d0fc85390d43b00f004f29a7c94aa3c053085a12de0abde15b1e62b43d2b7

          SHA512

          181ee69c05b589333a6a0e6aa6202cd33179fda117e4caca9d05512923e857ba04953d0e6d29342b26dc53b409bf0af0a6bfe2d876b7b225d9c413b810693d3b

        • C:\Windows\System\rundll32.exe

          Filesize

          74KB

          MD5

          e76c5d128dcd5e8f61a3a56bfa66e2f1

          SHA1

          2acafc15130129dab5d9ec283ad8735ea432e56b

          SHA256

          e015ed5666f7647367cd5ff290ab917901320955fa3e1f9211e8fdafe1ef22b0

          SHA512

          f172172f790fef245d30cd8d50c2c2399a754f548f6451381312d1ff532319c7735000f7ec5b3ba3ae8db31765720682d574b03d10f115f840fb58b3f7468064

        • C:\Windows\system\rundll32.exe

          Filesize

          74KB

          MD5

          e76c5d128dcd5e8f61a3a56bfa66e2f1

          SHA1

          2acafc15130129dab5d9ec283ad8735ea432e56b

          SHA256

          e015ed5666f7647367cd5ff290ab917901320955fa3e1f9211e8fdafe1ef22b0

          SHA512

          f172172f790fef245d30cd8d50c2c2399a754f548f6451381312d1ff532319c7735000f7ec5b3ba3ae8db31765720682d574b03d10f115f840fb58b3f7468064

        • memory/3632-0-0x0000000000400000-0x0000000000415A00-memory.dmp

          Filesize

          86KB

        • memory/3632-13-0x0000000000400000-0x0000000000415A00-memory.dmp

          Filesize

          86KB

        • memory/4792-14-0x0000000000400000-0x0000000000415A00-memory.dmp

          Filesize

          86KB