Analysis

  • max time kernel
    1s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-01-2024 16:18

General

  • Target

    3d506f3a42cd179ff7adaba5781f30d4.exe

  • Size

    18KB

  • MD5

    3d506f3a42cd179ff7adaba5781f30d4

  • SHA1

    22dff2a0ff3d659ce72fa68983968688fa733a0e

  • SHA256

    e5b2fec0c5c8cd40e200c99ebf633d5f9dbc187ee24d8ecd88ab9fb3e2217361

  • SHA512

    03075ca94ae31ff496809511efaa764f5e4e2519d5f89dd066479f35bf280d9270b011a27ddea06b95f1b33de64ec8a9fc88537cb8e1175540a17ea9a863f9cd

  • SSDEEP

    384:zAMbrzR6wH1pyKVSA+e9dzLbSlVFJAxvr6+e9Pfqbn1v1:zhzR6wH/PVSATx+ha5v

Score
7/10

Malware Config

Signatures

  • ASPack v2.12-2.42 1 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies Internet Explorer start page 1 TTPs 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3d506f3a42cd179ff7adaba5781f30d4.exe
    "C:\Users\Admin\AppData\Local\Temp\3d506f3a42cd179ff7adaba5781f30d4.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1120
    • C:\Windows\Rundll32.exe
      C:\Windows\Rundll32.exe
      2⤵
      • Executes dropped EXE
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Suspicious use of SetWindowsHookEx
      PID:2872
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\killme.bat
      2⤵
        PID:3740

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\killme.bat

      Filesize

      91B

      MD5

      679fe6a8f51765e07fb207d8a4e93f0a

      SHA1

      88b17e7b4917c1ad99928d7a83db19b626d529cb

      SHA256

      6b3cdeccfc81f0fd6caa2841600fe09aceff08daf31d7a3c31ce52d5c31d8a66

      SHA512

      bc013e2e65010129d9237d7bdc0ad4af34e8cadcf97018f8b3a2d2e00d49f3501ddca9a2499dc36b805a242d63eef1b2ea83e7633514022fe19e4f4b45a2251d

    • C:\Windows\Rundll32.exe

      Filesize

      18KB

      MD5

      3d506f3a42cd179ff7adaba5781f30d4

      SHA1

      22dff2a0ff3d659ce72fa68983968688fa733a0e

      SHA256

      e5b2fec0c5c8cd40e200c99ebf633d5f9dbc187ee24d8ecd88ab9fb3e2217361

      SHA512

      03075ca94ae31ff496809511efaa764f5e4e2519d5f89dd066479f35bf280d9270b011a27ddea06b95f1b33de64ec8a9fc88537cb8e1175540a17ea9a863f9cd

    • memory/1120-0-0x0000000000400000-0x000000000040E000-memory.dmp

      Filesize

      56KB

    • memory/1120-11-0x0000000000400000-0x000000000040E000-memory.dmp

      Filesize

      56KB

    • memory/2872-13-0x0000000000400000-0x000000000040E000-memory.dmp

      Filesize

      56KB