Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
18-01-2024 03:35
Static task
static1
Behavioral task
behavioral1
Sample
a8bf4660bb98a585ba2f603ee258a1b4116839222578d28576fd30f8b6885df3.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
a8bf4660bb98a585ba2f603ee258a1b4116839222578d28576fd30f8b6885df3.exe
Resource
win10v2004-20231215-en
General
-
Target
a8bf4660bb98a585ba2f603ee258a1b4116839222578d28576fd30f8b6885df3.exe
-
Size
83KB
-
MD5
749594fcf8a90c0916774aba4c31551b
-
SHA1
686f5e43375bab27687a433ed2445abda2a944f1
-
SHA256
a8bf4660bb98a585ba2f603ee258a1b4116839222578d28576fd30f8b6885df3
-
SHA512
66ce9283b065aa1ccd62890df63f350b651fc57328b3a26d49bb7db1b57d0cfb9ffbe1ba55f8812e71d990d08b120dd95230abcd75288297a258044015c16c96
-
SSDEEP
1536:RshfSWHHNvoLqNwDDGw02eQmh0HjWOQvoNm:GhfxHNIreQm+HirvoNm
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2692 rundll32.exe -
Loads dropped DLL 2 IoCs
pid Process 2504 a8bf4660bb98a585ba2f603ee258a1b4116839222578d28576fd30f8b6885df3.exe 2504 a8bf4660bb98a585ba2f603ee258a1b4116839222578d28576fd30f8b6885df3.exe -
Modifies system executable filetype association 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command a8bf4660bb98a585ba2f603ee258a1b4116839222578d28576fd30f8b6885df3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" a8bf4660bb98a585ba2f603ee258a1b4116839222578d28576fd30f8b6885df3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" a8bf4660bb98a585ba2f603ee258a1b4116839222578d28576fd30f8b6885df3.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\notepad¢¬.exe a8bf4660bb98a585ba2f603ee258a1b4116839222578d28576fd30f8b6885df3.exe File created C:\Windows\SysWOW64\notepad¢¬.exe a8bf4660bb98a585ba2f603ee258a1b4116839222578d28576fd30f8b6885df3.exe File opened for modification C:\Windows\SysWOW64\¢«.exe a8bf4660bb98a585ba2f603ee258a1b4116839222578d28576fd30f8b6885df3.exe File created C:\Windows\SysWOW64\¢«.exe a8bf4660bb98a585ba2f603ee258a1b4116839222578d28576fd30f8b6885df3.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system\rundll32.exe a8bf4660bb98a585ba2f603ee258a1b4116839222578d28576fd30f8b6885df3.exe File created C:\Windows\system\rundll32.exe a8bf4660bb98a585ba2f603ee258a1b4116839222578d28576fd30f8b6885df3.exe -
Modifies registry class 15 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\MSipv a8bf4660bb98a585ba2f603ee258a1b4116839222578d28576fd30f8b6885df3.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command a8bf4660bb98a585ba2f603ee258a1b4116839222578d28576fd30f8b6885df3.exe Key created \REGISTRY\MACHINE\Software\Classes\MSipv rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainUp = "1705548910" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" a8bf4660bb98a585ba2f603ee258a1b4116839222578d28576fd30f8b6885df3.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command a8bf4660bb98a585ba2f603ee258a1b4116839222578d28576fd30f8b6885df3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad.exe %1" a8bf4660bb98a585ba2f603ee258a1b4116839222578d28576fd30f8b6885df3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" a8bf4660bb98a585ba2f603ee258a1b4116839222578d28576fd30f8b6885df3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainVer = "506" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" a8bf4660bb98a585ba2f603ee258a1b4116839222578d28576fd30f8b6885df3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainSetup = "1705548910" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command rundll32.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2504 a8bf4660bb98a585ba2f603ee258a1b4116839222578d28576fd30f8b6885df3.exe 2504 a8bf4660bb98a585ba2f603ee258a1b4116839222578d28576fd30f8b6885df3.exe 2504 a8bf4660bb98a585ba2f603ee258a1b4116839222578d28576fd30f8b6885df3.exe 2504 a8bf4660bb98a585ba2f603ee258a1b4116839222578d28576fd30f8b6885df3.exe 2504 a8bf4660bb98a585ba2f603ee258a1b4116839222578d28576fd30f8b6885df3.exe 2504 a8bf4660bb98a585ba2f603ee258a1b4116839222578d28576fd30f8b6885df3.exe 2504 a8bf4660bb98a585ba2f603ee258a1b4116839222578d28576fd30f8b6885df3.exe 2504 a8bf4660bb98a585ba2f603ee258a1b4116839222578d28576fd30f8b6885df3.exe 2504 a8bf4660bb98a585ba2f603ee258a1b4116839222578d28576fd30f8b6885df3.exe 2504 a8bf4660bb98a585ba2f603ee258a1b4116839222578d28576fd30f8b6885df3.exe 2504 a8bf4660bb98a585ba2f603ee258a1b4116839222578d28576fd30f8b6885df3.exe 2504 a8bf4660bb98a585ba2f603ee258a1b4116839222578d28576fd30f8b6885df3.exe 2504 a8bf4660bb98a585ba2f603ee258a1b4116839222578d28576fd30f8b6885df3.exe 2504 a8bf4660bb98a585ba2f603ee258a1b4116839222578d28576fd30f8b6885df3.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2692 rundll32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2504 a8bf4660bb98a585ba2f603ee258a1b4116839222578d28576fd30f8b6885df3.exe 2692 rundll32.exe 2692 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2504 wrote to memory of 2692 2504 a8bf4660bb98a585ba2f603ee258a1b4116839222578d28576fd30f8b6885df3.exe 28 PID 2504 wrote to memory of 2692 2504 a8bf4660bb98a585ba2f603ee258a1b4116839222578d28576fd30f8b6885df3.exe 28 PID 2504 wrote to memory of 2692 2504 a8bf4660bb98a585ba2f603ee258a1b4116839222578d28576fd30f8b6885df3.exe 28 PID 2504 wrote to memory of 2692 2504 a8bf4660bb98a585ba2f603ee258a1b4116839222578d28576fd30f8b6885df3.exe 28 PID 2504 wrote to memory of 2692 2504 a8bf4660bb98a585ba2f603ee258a1b4116839222578d28576fd30f8b6885df3.exe 28 PID 2504 wrote to memory of 2692 2504 a8bf4660bb98a585ba2f603ee258a1b4116839222578d28576fd30f8b6885df3.exe 28 PID 2504 wrote to memory of 2692 2504 a8bf4660bb98a585ba2f603ee258a1b4116839222578d28576fd30f8b6885df3.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\a8bf4660bb98a585ba2f603ee258a1b4116839222578d28576fd30f8b6885df3.exe"C:\Users\Admin\AppData\Local\Temp\a8bf4660bb98a585ba2f603ee258a1b4116839222578d28576fd30f8b6885df3.exe"1⤵
- Loads dropped DLL
- Modifies system executable filetype association
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Windows\system\rundll32.exeC:\Windows\system\rundll32.exe2⤵
- Executes dropped EXE
- Modifies system executable filetype association
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2692
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74KB
MD508634bdddf9b45f58a7a8b9c7a88d713
SHA14afb4e19611ebc20ab7f1751f677bb82f84c5917
SHA25633400f6ebdcddfb9974542a23b259e2e4301e7ab19c3647ee83c08b1a4393e03
SHA512c2cf7ad534620da36f03342add52b9a81237dfc1201ec37dfafe4cfe454cc35301cca29fb1c55ab6aaa3a6e54c3d40b1539a9cf74dd484fdfa65fd3ef4013968
-
Filesize
82KB
MD5f6143d538de48458e854c0c7a91d540d
SHA1ad43c14712131a84780fd7320a732edb83a58d23
SHA2565557890999b097d291de839ee0b12173a619065ae78321bfc0ae3250104f7de6
SHA512c7c678f77e1a74fcc2f176d20655d9b3395a920577003b55a89c5a0726bf063864088a655d113021255bb424bdce076f5418e9726d24fcd3e58c7101b667c8fa