Analysis

  • max time kernel
    152s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    15/10/2023, 19:44

General

  • Target

    c0a6f10ea1c6467ae22adfade7dcbf30_exe32.exe

  • Size

    112KB

  • MD5

    c0a6f10ea1c6467ae22adfade7dcbf30

  • SHA1

    3f332d377a15ffb05b9f7467eabe117dcb88d48d

  • SHA256

    219cefd4d88375ee3edfc8fdb3741c822e16d86583630bf86fdd19c8e65dc3fe

  • SHA512

    254f499e734a43431c80f02f03de4b8ecc6f3f5ded7047fd40288bffd79be5e5b4bf1d21802de4fcfa9cde1ceb01377707b1208586d082e85a3eb1c0d0f0fbaf

  • SSDEEP

    768:5BBdFYDgao5/AUrLEEzayTpBJfxBDlxcFNXK8D1FojP:5pcC/eAayJ3Rx0w

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Modifies system executable filetype association 2 TTPs 5 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Modifies registry class 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c0a6f10ea1c6467ae22adfade7dcbf30_exe32.exe
    "C:\Users\Admin\AppData\Local\Temp\c0a6f10ea1c6467ae22adfade7dcbf30_exe32.exe"
    1⤵
    • Loads dropped DLL
    • Modifies system executable filetype association
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2064
    • C:\Windows\system\rundll32.exe
      C:\Windows\system\rundll32.exe
      2⤵
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:2332

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\system\rundll32.exe

          Filesize

          122KB

          MD5

          866206c8bbffc8702e7148fcb1c0574f

          SHA1

          cd01bf13e4797d9d78e34d77e9f276d0f8582e16

          SHA256

          a4e8031aec41396ce37327577b72a762f5b649725e01a4cccba5be777b4ca8b8

          SHA512

          736f6584a6a60ac0c8d7909ebd9a1ff8e2d786cda1f40f3f534ee150dc89d23b197c29f815cb58d67b9909d4822260bdf1bda36546177edf0b48c802d1f2b7e6

        • C:\Windows\system\rundll32.exe

          Filesize

          122KB

          MD5

          866206c8bbffc8702e7148fcb1c0574f

          SHA1

          cd01bf13e4797d9d78e34d77e9f276d0f8582e16

          SHA256

          a4e8031aec41396ce37327577b72a762f5b649725e01a4cccba5be777b4ca8b8

          SHA512

          736f6584a6a60ac0c8d7909ebd9a1ff8e2d786cda1f40f3f534ee150dc89d23b197c29f815cb58d67b9909d4822260bdf1bda36546177edf0b48c802d1f2b7e6

        • C:\Windows\system\rundll32.exe

          Filesize

          122KB

          MD5

          866206c8bbffc8702e7148fcb1c0574f

          SHA1

          cd01bf13e4797d9d78e34d77e9f276d0f8582e16

          SHA256

          a4e8031aec41396ce37327577b72a762f5b649725e01a4cccba5be777b4ca8b8

          SHA512

          736f6584a6a60ac0c8d7909ebd9a1ff8e2d786cda1f40f3f534ee150dc89d23b197c29f815cb58d67b9909d4822260bdf1bda36546177edf0b48c802d1f2b7e6

        • \Windows\system\rundll32.exe

          Filesize

          122KB

          MD5

          866206c8bbffc8702e7148fcb1c0574f

          SHA1

          cd01bf13e4797d9d78e34d77e9f276d0f8582e16

          SHA256

          a4e8031aec41396ce37327577b72a762f5b649725e01a4cccba5be777b4ca8b8

          SHA512

          736f6584a6a60ac0c8d7909ebd9a1ff8e2d786cda1f40f3f534ee150dc89d23b197c29f815cb58d67b9909d4822260bdf1bda36546177edf0b48c802d1f2b7e6

        • \Windows\system\rundll32.exe

          Filesize

          122KB

          MD5

          866206c8bbffc8702e7148fcb1c0574f

          SHA1

          cd01bf13e4797d9d78e34d77e9f276d0f8582e16

          SHA256

          a4e8031aec41396ce37327577b72a762f5b649725e01a4cccba5be777b4ca8b8

          SHA512

          736f6584a6a60ac0c8d7909ebd9a1ff8e2d786cda1f40f3f534ee150dc89d23b197c29f815cb58d67b9909d4822260bdf1bda36546177edf0b48c802d1f2b7e6

        • memory/2064-0-0x0000000000400000-0x0000000000415000-memory.dmp

          Filesize

          84KB

        • memory/2064-9-0x0000000000400000-0x0000000000415000-memory.dmp

          Filesize

          84KB

        • memory/2064-14-0x0000000000340000-0x0000000000355000-memory.dmp

          Filesize

          84KB

        • memory/2064-16-0x0000000000400000-0x0000000000415000-memory.dmp

          Filesize

          84KB

        • memory/2064-17-0x0000000000340000-0x0000000000346000-memory.dmp

          Filesize

          24KB

        • memory/2332-13-0x0000000000400000-0x0000000000415000-memory.dmp

          Filesize

          84KB

        • memory/2332-15-0x0000000000400000-0x0000000000415000-memory.dmp

          Filesize

          84KB