Analysis
-
max time kernel
1s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
01-01-2024 16:18
Behavioral task
behavioral1
Sample
3d506f3a42cd179ff7adaba5781f30d4.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3d506f3a42cd179ff7adaba5781f30d4.exe
Resource
win10v2004-20231215-en
General
-
Target
3d506f3a42cd179ff7adaba5781f30d4.exe
-
Size
18KB
-
MD5
3d506f3a42cd179ff7adaba5781f30d4
-
SHA1
22dff2a0ff3d659ce72fa68983968688fa733a0e
-
SHA256
e5b2fec0c5c8cd40e200c99ebf633d5f9dbc187ee24d8ecd88ab9fb3e2217361
-
SHA512
03075ca94ae31ff496809511efaa764f5e4e2519d5f89dd066479f35bf280d9270b011a27ddea06b95f1b33de64ec8a9fc88537cb8e1175540a17ea9a863f9cd
-
SSDEEP
384:zAMbrzR6wH1pyKVSA+e9dzLbSlVFJAxvr6+e9Pfqbn1v1:zhzR6wH/PVSATx+ha5v
Malware Config
Signatures
-
resource yara_rule behavioral2/files/0x000700000002320d-7.dat aspack_v212_v242 -
Executes dropped EXE 1 IoCs
pid Process 2872 Rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Rundll32 = "C:\\Windows\\Rundll32.exe" 3d506f3a42cd179ff7adaba5781f30d4.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Rundll32.exe 3d506f3a42cd179ff7adaba5781f30d4.exe File opened for modification C:\Windows\Rundll32.exe 3d506f3a42cd179ff7adaba5781f30d4.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Software\Microsoft\Internet Explorer\Main Rundll32.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page Rundll32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1120 3d506f3a42cd179ff7adaba5781f30d4.exe 2872 Rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1120 wrote to memory of 2872 1120 3d506f3a42cd179ff7adaba5781f30d4.exe 18 PID 1120 wrote to memory of 2872 1120 3d506f3a42cd179ff7adaba5781f30d4.exe 18 PID 1120 wrote to memory of 2872 1120 3d506f3a42cd179ff7adaba5781f30d4.exe 18 PID 1120 wrote to memory of 3740 1120 3d506f3a42cd179ff7adaba5781f30d4.exe 25 PID 1120 wrote to memory of 3740 1120 3d506f3a42cd179ff7adaba5781f30d4.exe 25 PID 1120 wrote to memory of 3740 1120 3d506f3a42cd179ff7adaba5781f30d4.exe 25
Processes
-
C:\Users\Admin\AppData\Local\Temp\3d506f3a42cd179ff7adaba5781f30d4.exe"C:\Users\Admin\AppData\Local\Temp\3d506f3a42cd179ff7adaba5781f30d4.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Windows\Rundll32.exeC:\Windows\Rundll32.exe2⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Suspicious use of SetWindowsHookEx
PID:2872
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\killme.bat2⤵PID:3740
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
91B
MD5679fe6a8f51765e07fb207d8a4e93f0a
SHA188b17e7b4917c1ad99928d7a83db19b626d529cb
SHA2566b3cdeccfc81f0fd6caa2841600fe09aceff08daf31d7a3c31ce52d5c31d8a66
SHA512bc013e2e65010129d9237d7bdc0ad4af34e8cadcf97018f8b3a2d2e00d49f3501ddca9a2499dc36b805a242d63eef1b2ea83e7633514022fe19e4f4b45a2251d
-
Filesize
18KB
MD53d506f3a42cd179ff7adaba5781f30d4
SHA122dff2a0ff3d659ce72fa68983968688fa733a0e
SHA256e5b2fec0c5c8cd40e200c99ebf633d5f9dbc187ee24d8ecd88ab9fb3e2217361
SHA51203075ca94ae31ff496809511efaa764f5e4e2519d5f89dd066479f35bf280d9270b011a27ddea06b95f1b33de64ec8a9fc88537cb8e1175540a17ea9a863f9cd