Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
15/03/2024, 05:16
Static task
static1
Behavioral task
behavioral1
Sample
ca9301989060594a9ee636cdfb329598.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
ca9301989060594a9ee636cdfb329598.exe
Resource
win10v2004-20240226-en
General
-
Target
ca9301989060594a9ee636cdfb329598.exe
-
Size
64KB
-
MD5
ca9301989060594a9ee636cdfb329598
-
SHA1
473eda410e256c3d72de7510ab5d2eb1ca5e51d0
-
SHA256
92f9cadca90c9e443c15f10628574b4dba504103e8fd26b64e60f799c537d923
-
SHA512
7d592edbb30fb8d28475e4fecc2392ca0be798a849a0e294337e310c50af3cc1eb3c6471a0eac275455b7a4e94069ec969d3ccecca336214cf72b43e8beac4e4
-
SSDEEP
1536:BoquHm0GQ0IeSwxMvEqZoQL9EINBbubDG:VLSwxMFo49HBbubDG
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 1688 ca9301989060594a9ee636cdfb329598.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\_rx = "C:\\Windows\\rundll32.exe" ca9301989060594a9ee636cdfb329598.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\dllz.dll ca9301989060594a9ee636cdfb329598.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\rundll32.exe ca9301989060594a9ee636cdfb329598.exe File opened for modification C:\Windows\rundll32.exe ca9301989060594a9ee636cdfb329598.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1688 ca9301989060594a9ee636cdfb329598.exe 1688 ca9301989060594a9ee636cdfb329598.exe 1688 ca9301989060594a9ee636cdfb329598.exe 1688 ca9301989060594a9ee636cdfb329598.exe 1688 ca9301989060594a9ee636cdfb329598.exe 1688 ca9301989060594a9ee636cdfb329598.exe 1688 ca9301989060594a9ee636cdfb329598.exe 1688 ca9301989060594a9ee636cdfb329598.exe 1688 ca9301989060594a9ee636cdfb329598.exe 1688 ca9301989060594a9ee636cdfb329598.exe 1688 ca9301989060594a9ee636cdfb329598.exe 1688 ca9301989060594a9ee636cdfb329598.exe 1688 ca9301989060594a9ee636cdfb329598.exe 1688 ca9301989060594a9ee636cdfb329598.exe 1688 ca9301989060594a9ee636cdfb329598.exe 1688 ca9301989060594a9ee636cdfb329598.exe 1688 ca9301989060594a9ee636cdfb329598.exe 1688 ca9301989060594a9ee636cdfb329598.exe 1688 ca9301989060594a9ee636cdfb329598.exe 1688 ca9301989060594a9ee636cdfb329598.exe 1688 ca9301989060594a9ee636cdfb329598.exe 1688 ca9301989060594a9ee636cdfb329598.exe 1688 ca9301989060594a9ee636cdfb329598.exe 1688 ca9301989060594a9ee636cdfb329598.exe 1688 ca9301989060594a9ee636cdfb329598.exe 1688 ca9301989060594a9ee636cdfb329598.exe 1688 ca9301989060594a9ee636cdfb329598.exe 1688 ca9301989060594a9ee636cdfb329598.exe 1688 ca9301989060594a9ee636cdfb329598.exe 1688 ca9301989060594a9ee636cdfb329598.exe 1688 ca9301989060594a9ee636cdfb329598.exe 1688 ca9301989060594a9ee636cdfb329598.exe 1688 ca9301989060594a9ee636cdfb329598.exe 1688 ca9301989060594a9ee636cdfb329598.exe 1688 ca9301989060594a9ee636cdfb329598.exe 1688 ca9301989060594a9ee636cdfb329598.exe 1688 ca9301989060594a9ee636cdfb329598.exe 1688 ca9301989060594a9ee636cdfb329598.exe 1688 ca9301989060594a9ee636cdfb329598.exe 1688 ca9301989060594a9ee636cdfb329598.exe 1688 ca9301989060594a9ee636cdfb329598.exe 1688 ca9301989060594a9ee636cdfb329598.exe 1688 ca9301989060594a9ee636cdfb329598.exe 1688 ca9301989060594a9ee636cdfb329598.exe 1688 ca9301989060594a9ee636cdfb329598.exe 1688 ca9301989060594a9ee636cdfb329598.exe 1688 ca9301989060594a9ee636cdfb329598.exe 1688 ca9301989060594a9ee636cdfb329598.exe 1688 ca9301989060594a9ee636cdfb329598.exe 1688 ca9301989060594a9ee636cdfb329598.exe 1688 ca9301989060594a9ee636cdfb329598.exe 1688 ca9301989060594a9ee636cdfb329598.exe 1688 ca9301989060594a9ee636cdfb329598.exe 1688 ca9301989060594a9ee636cdfb329598.exe 1688 ca9301989060594a9ee636cdfb329598.exe 1688 ca9301989060594a9ee636cdfb329598.exe 1688 ca9301989060594a9ee636cdfb329598.exe 1688 ca9301989060594a9ee636cdfb329598.exe 1688 ca9301989060594a9ee636cdfb329598.exe 1688 ca9301989060594a9ee636cdfb329598.exe 1688 ca9301989060594a9ee636cdfb329598.exe 1688 ca9301989060594a9ee636cdfb329598.exe 1688 ca9301989060594a9ee636cdfb329598.exe 1688 ca9301989060594a9ee636cdfb329598.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1688 ca9301989060594a9ee636cdfb329598.exe 1688 ca9301989060594a9ee636cdfb329598.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ca9301989060594a9ee636cdfb329598.exe"C:\Users\Admin\AppData\Local\Temp\ca9301989060594a9ee636cdfb329598.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1688
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
34KB
MD5b01ba22509dc6c1efb490f0d2178a927
SHA1202faf7a7a11b91878648be4766f22f9da945c0e
SHA256d01d286064a5eb38a138c7e0cc27d2873003051da05753da4a2f7931ac32d434
SHA512219b4f655ff6d2989a319e1ae8f28138b8fceebeb4558806942efcc32c42da5c21a2e4decc3a7548384981d71710d8b13d29f3fcf117d82e0f2a6e92ab8a1de7