Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
01-01-2024 16:18
Behavioral task
behavioral1
Sample
3d506f3a42cd179ff7adaba5781f30d4.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3d506f3a42cd179ff7adaba5781f30d4.exe
Resource
win10v2004-20231215-en
General
-
Target
3d506f3a42cd179ff7adaba5781f30d4.exe
-
Size
18KB
-
MD5
3d506f3a42cd179ff7adaba5781f30d4
-
SHA1
22dff2a0ff3d659ce72fa68983968688fa733a0e
-
SHA256
e5b2fec0c5c8cd40e200c99ebf633d5f9dbc187ee24d8ecd88ab9fb3e2217361
-
SHA512
03075ca94ae31ff496809511efaa764f5e4e2519d5f89dd066479f35bf280d9270b011a27ddea06b95f1b33de64ec8a9fc88537cb8e1175540a17ea9a863f9cd
-
SSDEEP
384:zAMbrzR6wH1pyKVSA+e9dzLbSlVFJAxvr6+e9Pfqbn1v1:zhzR6wH/PVSATx+ha5v
Malware Config
Signatures
-
resource yara_rule behavioral1/files/0x000d0000000122ca-9.dat aspack_v212_v242 behavioral1/memory/2656-10-0x00000000003E0000-0x00000000003EE000-memory.dmp aspack_v212_v242 -
Deletes itself 1 IoCs
pid Process 2792 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2712 Rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Rundll32 = "C:\\Windows\\Rundll32.exe" 3d506f3a42cd179ff7adaba5781f30d4.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Rundll32.exe 3d506f3a42cd179ff7adaba5781f30d4.exe File opened for modification C:\Windows\Rundll32.exe 3d506f3a42cd179ff7adaba5781f30d4.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main Rundll32.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Start Page Rundll32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2656 3d506f3a42cd179ff7adaba5781f30d4.exe 2712 Rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2656 wrote to memory of 2712 2656 3d506f3a42cd179ff7adaba5781f30d4.exe 28 PID 2656 wrote to memory of 2712 2656 3d506f3a42cd179ff7adaba5781f30d4.exe 28 PID 2656 wrote to memory of 2712 2656 3d506f3a42cd179ff7adaba5781f30d4.exe 28 PID 2656 wrote to memory of 2712 2656 3d506f3a42cd179ff7adaba5781f30d4.exe 28 PID 2656 wrote to memory of 2712 2656 3d506f3a42cd179ff7adaba5781f30d4.exe 28 PID 2656 wrote to memory of 2712 2656 3d506f3a42cd179ff7adaba5781f30d4.exe 28 PID 2656 wrote to memory of 2712 2656 3d506f3a42cd179ff7adaba5781f30d4.exe 28 PID 2656 wrote to memory of 2792 2656 3d506f3a42cd179ff7adaba5781f30d4.exe 29 PID 2656 wrote to memory of 2792 2656 3d506f3a42cd179ff7adaba5781f30d4.exe 29 PID 2656 wrote to memory of 2792 2656 3d506f3a42cd179ff7adaba5781f30d4.exe 29 PID 2656 wrote to memory of 2792 2656 3d506f3a42cd179ff7adaba5781f30d4.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\3d506f3a42cd179ff7adaba5781f30d4.exe"C:\Users\Admin\AppData\Local\Temp\3d506f3a42cd179ff7adaba5781f30d4.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\Rundll32.exeC:\Windows\Rundll32.exe2⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Suspicious use of SetWindowsHookEx
PID:2712
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\killme.bat2⤵
- Deletes itself
PID:2792
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
91B
MD5679fe6a8f51765e07fb207d8a4e93f0a
SHA188b17e7b4917c1ad99928d7a83db19b626d529cb
SHA2566b3cdeccfc81f0fd6caa2841600fe09aceff08daf31d7a3c31ce52d5c31d8a66
SHA512bc013e2e65010129d9237d7bdc0ad4af34e8cadcf97018f8b3a2d2e00d49f3501ddca9a2499dc36b805a242d63eef1b2ea83e7633514022fe19e4f4b45a2251d
-
Filesize
18KB
MD53d506f3a42cd179ff7adaba5781f30d4
SHA122dff2a0ff3d659ce72fa68983968688fa733a0e
SHA256e5b2fec0c5c8cd40e200c99ebf633d5f9dbc187ee24d8ecd88ab9fb3e2217361
SHA51203075ca94ae31ff496809511efaa764f5e4e2519d5f89dd066479f35bf280d9270b011a27ddea06b95f1b33de64ec8a9fc88537cb8e1175540a17ea9a863f9cd