Analysis
-
max time kernel
153s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
13/10/2023, 04:40
Static task
static1
Behavioral task
behavioral1
Sample
1d61af4f0800387ab7b8b60835c7e3dbfd3aef86773f9e7532723fd882c07752.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
1d61af4f0800387ab7b8b60835c7e3dbfd3aef86773f9e7532723fd882c07752.exe
Resource
win10v2004-20230915-en
General
-
Target
1d61af4f0800387ab7b8b60835c7e3dbfd3aef86773f9e7532723fd882c07752.exe
-
Size
81KB
-
MD5
76544919796349b8bf6087361c17cc85
-
SHA1
c80a938312adbbbc6836b98954d95e8de8e974e8
-
SHA256
1d61af4f0800387ab7b8b60835c7e3dbfd3aef86773f9e7532723fd882c07752
-
SHA512
924870c44060952ffc416ab339b2def494e174c8c21cc81e92399b357365c3638abf1bfd59e294f3d0f93baa4cec69c9c20a216ebf9ca99c4539b72355a3264d
-
SSDEEP
1536:RshfSWHHNvoLqNwDDGw02eQmh0HjWOzLH5qR:GhfxHNIreQm+HiALH5qR
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2192 rundll32.exe -
Loads dropped DLL 2 IoCs
pid Process 3040 1d61af4f0800387ab7b8b60835c7e3dbfd3aef86773f9e7532723fd882c07752.exe 3040 1d61af4f0800387ab7b8b60835c7e3dbfd3aef86773f9e7532723fd882c07752.exe -
Modifies system executable filetype association 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command 1d61af4f0800387ab7b8b60835c7e3dbfd3aef86773f9e7532723fd882c07752.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 1d61af4f0800387ab7b8b60835c7e3dbfd3aef86773f9e7532723fd882c07752.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" 1d61af4f0800387ab7b8b60835c7e3dbfd3aef86773f9e7532723fd882c07752.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\¢«.exe 1d61af4f0800387ab7b8b60835c7e3dbfd3aef86773f9e7532723fd882c07752.exe File created C:\Windows\SysWOW64\¢«.exe 1d61af4f0800387ab7b8b60835c7e3dbfd3aef86773f9e7532723fd882c07752.exe File opened for modification C:\Windows\SysWOW64\notepad¢¬.exe 1d61af4f0800387ab7b8b60835c7e3dbfd3aef86773f9e7532723fd882c07752.exe File created C:\Windows\SysWOW64\notepad¢¬.exe 1d61af4f0800387ab7b8b60835c7e3dbfd3aef86773f9e7532723fd882c07752.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system\rundll32.exe 1d61af4f0800387ab7b8b60835c7e3dbfd3aef86773f9e7532723fd882c07752.exe File created C:\Windows\system\rundll32.exe 1d61af4f0800387ab7b8b60835c7e3dbfd3aef86773f9e7532723fd882c07752.exe -
Modifies registry class 15 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" 1d61af4f0800387ab7b8b60835c7e3dbfd3aef86773f9e7532723fd882c07752.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" 1d61af4f0800387ab7b8b60835c7e3dbfd3aef86773f9e7532723fd882c07752.exe Key created \REGISTRY\MACHINE\Software\Classes\MSipv 1d61af4f0800387ab7b8b60835c7e3dbfd3aef86773f9e7532723fd882c07752.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command 1d61af4f0800387ab7b8b60835c7e3dbfd3aef86773f9e7532723fd882c07752.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainVer = "506" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 1d61af4f0800387ab7b8b60835c7e3dbfd3aef86773f9e7532723fd882c07752.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad.exe %1" 1d61af4f0800387ab7b8b60835c7e3dbfd3aef86773f9e7532723fd882c07752.exe Key created \REGISTRY\MACHINE\Software\Classes\MSipv rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainUp = "1697596918" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command 1d61af4f0800387ab7b8b60835c7e3dbfd3aef86773f9e7532723fd882c07752.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainSetup = "1697596918" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" rundll32.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 3040 1d61af4f0800387ab7b8b60835c7e3dbfd3aef86773f9e7532723fd882c07752.exe 3040 1d61af4f0800387ab7b8b60835c7e3dbfd3aef86773f9e7532723fd882c07752.exe 3040 1d61af4f0800387ab7b8b60835c7e3dbfd3aef86773f9e7532723fd882c07752.exe 3040 1d61af4f0800387ab7b8b60835c7e3dbfd3aef86773f9e7532723fd882c07752.exe 3040 1d61af4f0800387ab7b8b60835c7e3dbfd3aef86773f9e7532723fd882c07752.exe 3040 1d61af4f0800387ab7b8b60835c7e3dbfd3aef86773f9e7532723fd882c07752.exe 3040 1d61af4f0800387ab7b8b60835c7e3dbfd3aef86773f9e7532723fd882c07752.exe 3040 1d61af4f0800387ab7b8b60835c7e3dbfd3aef86773f9e7532723fd882c07752.exe 3040 1d61af4f0800387ab7b8b60835c7e3dbfd3aef86773f9e7532723fd882c07752.exe 3040 1d61af4f0800387ab7b8b60835c7e3dbfd3aef86773f9e7532723fd882c07752.exe 3040 1d61af4f0800387ab7b8b60835c7e3dbfd3aef86773f9e7532723fd882c07752.exe 3040 1d61af4f0800387ab7b8b60835c7e3dbfd3aef86773f9e7532723fd882c07752.exe 3040 1d61af4f0800387ab7b8b60835c7e3dbfd3aef86773f9e7532723fd882c07752.exe 3040 1d61af4f0800387ab7b8b60835c7e3dbfd3aef86773f9e7532723fd882c07752.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2192 rundll32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3040 1d61af4f0800387ab7b8b60835c7e3dbfd3aef86773f9e7532723fd882c07752.exe 2192 rundll32.exe 2192 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3040 wrote to memory of 2192 3040 1d61af4f0800387ab7b8b60835c7e3dbfd3aef86773f9e7532723fd882c07752.exe 28 PID 3040 wrote to memory of 2192 3040 1d61af4f0800387ab7b8b60835c7e3dbfd3aef86773f9e7532723fd882c07752.exe 28 PID 3040 wrote to memory of 2192 3040 1d61af4f0800387ab7b8b60835c7e3dbfd3aef86773f9e7532723fd882c07752.exe 28 PID 3040 wrote to memory of 2192 3040 1d61af4f0800387ab7b8b60835c7e3dbfd3aef86773f9e7532723fd882c07752.exe 28 PID 3040 wrote to memory of 2192 3040 1d61af4f0800387ab7b8b60835c7e3dbfd3aef86773f9e7532723fd882c07752.exe 28 PID 3040 wrote to memory of 2192 3040 1d61af4f0800387ab7b8b60835c7e3dbfd3aef86773f9e7532723fd882c07752.exe 28 PID 3040 wrote to memory of 2192 3040 1d61af4f0800387ab7b8b60835c7e3dbfd3aef86773f9e7532723fd882c07752.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\1d61af4f0800387ab7b8b60835c7e3dbfd3aef86773f9e7532723fd882c07752.exe"C:\Users\Admin\AppData\Local\Temp\1d61af4f0800387ab7b8b60835c7e3dbfd3aef86773f9e7532723fd882c07752.exe"1⤵
- Loads dropped DLL
- Modifies system executable filetype association
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Windows\system\rundll32.exeC:\Windows\system\rundll32.exe2⤵
- Executes dropped EXE
- Modifies system executable filetype association
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2192
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD5bfa3f24ca5db37111ddf3d90501066b1
SHA1d43f810ff69d82afcbd95913e15bc3884a575295
SHA256f17194903ffaad9c6fe107430a40ffc77424ac453d1f0e6b6d7787422b453d49
SHA512e7ee15da6886e10990b093ff373d500e3a9be883dbccdb6e82f68ce9643b3aa837cf98d52d2b403ae72ff883bfc622638492f7572ac10ee896368cb48e4874a0
-
Filesize
79KB
MD55935408f6fb9089d7c4f848cbe168246
SHA12ac588007554b5b59273baf3581192ad8e4afbf4
SHA256b0e526e86c024f746bfd53d01babea97726bc79065e53d502415a6393b53b622
SHA51252f6b60ca868b4d6557f926ee3feed247e5fd90c48af37faff213f35e11df10dea2f455a9eba7f01ec3a0f9e174b6a09f05eff446f2651a30cec8d3c06c8a86d
-
Filesize
79KB
MD55935408f6fb9089d7c4f848cbe168246
SHA12ac588007554b5b59273baf3581192ad8e4afbf4
SHA256b0e526e86c024f746bfd53d01babea97726bc79065e53d502415a6393b53b622
SHA51252f6b60ca868b4d6557f926ee3feed247e5fd90c48af37faff213f35e11df10dea2f455a9eba7f01ec3a0f9e174b6a09f05eff446f2651a30cec8d3c06c8a86d
-
Filesize
79KB
MD55935408f6fb9089d7c4f848cbe168246
SHA12ac588007554b5b59273baf3581192ad8e4afbf4
SHA256b0e526e86c024f746bfd53d01babea97726bc79065e53d502415a6393b53b622
SHA51252f6b60ca868b4d6557f926ee3feed247e5fd90c48af37faff213f35e11df10dea2f455a9eba7f01ec3a0f9e174b6a09f05eff446f2651a30cec8d3c06c8a86d
-
Filesize
79KB
MD55935408f6fb9089d7c4f848cbe168246
SHA12ac588007554b5b59273baf3581192ad8e4afbf4
SHA256b0e526e86c024f746bfd53d01babea97726bc79065e53d502415a6393b53b622
SHA51252f6b60ca868b4d6557f926ee3feed247e5fd90c48af37faff213f35e11df10dea2f455a9eba7f01ec3a0f9e174b6a09f05eff446f2651a30cec8d3c06c8a86d