Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    30-10-2023 18:26

General

  • Target

    3d69d1fa8c64ee6976d69fe6e6217739ffe449cbaf230dafb5acfe7fc916a70b.exe

  • Size

    78KB

  • MD5

    933e75d6eb417732688285a3b5e67eff

  • SHA1

    f951e48c80b582c0147f75aeb03ba34ba2972774

  • SHA256

    3d69d1fa8c64ee6976d69fe6e6217739ffe449cbaf230dafb5acfe7fc916a70b

  • SHA512

    f3ce70f80f91fdbd76b4fd8d3580074219821825ecf6964bec793654e0410e0df85a8e35cbb4e55d5892de8b63545fdf280145409e2f8cdb5059ad920ee44619

  • SSDEEP

    1536:RshfSWHHNvoLqNwDDGw02eQmh0HjWOTuEWfp:GhfxHNIreQm+HiQuEWR

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Modifies system executable filetype association 2 TTPs 5 IoCs
  • Drops file in System32 directory 4 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies registry class 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3d69d1fa8c64ee6976d69fe6e6217739ffe449cbaf230dafb5acfe7fc916a70b.exe
    "C:\Users\Admin\AppData\Local\Temp\3d69d1fa8c64ee6976d69fe6e6217739ffe449cbaf230dafb5acfe7fc916a70b.exe"
    1⤵
    • Loads dropped DLL
    • Modifies system executable filetype association
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2440
    • C:\Windows\system\rundll32.exe
      C:\Windows\system\rundll32.exe
      2⤵
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:792

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\notepad¢¬.exe

    Filesize

    79KB

    MD5

    970194b80a0b51e4a1bff6d350dab863

    SHA1

    4d76604ea1013203824dc2c45f0a49ea1dfc376f

    SHA256

    d209b159d236af567d0b8e99df73f17fa18e75d86ca13b062735fec47fbd40fc

    SHA512

    b23e83e8007f55fd9a130b5c101f89e06ff1f5f01d68831ef2b9774c2dfdcd5a80622501936b461aad79d1226d8d7e92e22aa6927afc7553daf6dca2e9a4638a

  • C:\Windows\system\rundll32.exe

    Filesize

    81KB

    MD5

    93acfb84dc4bea3d15809056fe84427d

    SHA1

    61f85c660291becbb873b8774908537d2a62a8fa

    SHA256

    f1eed4c5123ca8a4b9114eeee96d370deb818a1792f7d612eefd0421d7755b00

    SHA512

    996378895386a71a78bff100f4fb1ab2cdfb47968ec74e6b0d6847ba2320613006ca392c0224d999163030b53f231c5e3fa1de3917bfdffa386d444d09a5a99c

  • C:\Windows\system\rundll32.exe

    Filesize

    81KB

    MD5

    93acfb84dc4bea3d15809056fe84427d

    SHA1

    61f85c660291becbb873b8774908537d2a62a8fa

    SHA256

    f1eed4c5123ca8a4b9114eeee96d370deb818a1792f7d612eefd0421d7755b00

    SHA512

    996378895386a71a78bff100f4fb1ab2cdfb47968ec74e6b0d6847ba2320613006ca392c0224d999163030b53f231c5e3fa1de3917bfdffa386d444d09a5a99c

  • \Windows\system\rundll32.exe

    Filesize

    81KB

    MD5

    93acfb84dc4bea3d15809056fe84427d

    SHA1

    61f85c660291becbb873b8774908537d2a62a8fa

    SHA256

    f1eed4c5123ca8a4b9114eeee96d370deb818a1792f7d612eefd0421d7755b00

    SHA512

    996378895386a71a78bff100f4fb1ab2cdfb47968ec74e6b0d6847ba2320613006ca392c0224d999163030b53f231c5e3fa1de3917bfdffa386d444d09a5a99c

  • \Windows\system\rundll32.exe

    Filesize

    81KB

    MD5

    93acfb84dc4bea3d15809056fe84427d

    SHA1

    61f85c660291becbb873b8774908537d2a62a8fa

    SHA256

    f1eed4c5123ca8a4b9114eeee96d370deb818a1792f7d612eefd0421d7755b00

    SHA512

    996378895386a71a78bff100f4fb1ab2cdfb47968ec74e6b0d6847ba2320613006ca392c0224d999163030b53f231c5e3fa1de3917bfdffa386d444d09a5a99c

  • memory/792-20-0x0000000000400000-0x0000000000415A00-memory.dmp

    Filesize

    86KB

  • memory/792-23-0x0000000000400000-0x0000000000415A00-memory.dmp

    Filesize

    86KB

  • memory/2440-0-0x0000000000400000-0x0000000000415A00-memory.dmp

    Filesize

    86KB

  • memory/2440-12-0x00000000002C0000-0x00000000002D6000-memory.dmp

    Filesize

    88KB

  • memory/2440-17-0x00000000002C0000-0x00000000002D6000-memory.dmp

    Filesize

    88KB

  • memory/2440-21-0x0000000000400000-0x0000000000415A00-memory.dmp

    Filesize

    86KB

  • memory/2440-22-0x00000000002C0000-0x00000000002C6000-memory.dmp

    Filesize

    24KB