Analysis
-
max time kernel
151s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
26/03/2024, 15:35
Static task
static1
Behavioral task
behavioral1
Sample
df827d49260c481868d344dc2c0788ff.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
df827d49260c481868d344dc2c0788ff.exe
Resource
win10v2004-20240226-en
General
-
Target
df827d49260c481868d344dc2c0788ff.exe
-
Size
14KB
-
MD5
df827d49260c481868d344dc2c0788ff
-
SHA1
89f319b73d457352d8db8a830351d78d325f8b4b
-
SHA256
82337411014263d1b1b02aa477e703b4c9db6ba05bee54e8d1c229d1c8f288fe
-
SHA512
2e7f91d416faf3b817d1096756e8d6482c21eec82a8b6011a3dcff18b2ff7383c3fcd9df55cdb93ae58c35d5fb30c4bec12d4f966925ef30bd9a2b1add950d5f
-
SSDEEP
384:/TK8jx04kwhpowraju8Pu10eJb/5jV0hH:/Y4tzNajuWofzjOd
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 5000 Mscng.exe -
Modifies system executable filetype association 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\CLASSES\exefile\shell\Open\Command df827d49260c481868d344dc2c0788ff.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "Mscng.exe opext \"%1\" %*" df827d49260c481868d344dc2c0788ff.exe Key created \REGISTRY\MACHINE\Software\CLASSES\exefile\shell\Open\Command Mscng.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "Mscng.exe opext \"%1\" %*" Mscng.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\Mscng.exe Mscng.exe File created C:\Windows\SysWOW64\Mscng.exe df827d49260c481868d344dc2c0788ff.exe File opened for modification C:\Windows\SysWOW64\Mscng.exe df827d49260c481868d344dc2c0788ff.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\CLASSES\exefile\shell\Open\Command Mscng.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "Mscng.exe opext \"%1\" %*" Mscng.exe Key created \REGISTRY\MACHINE\Software\CLASSES\exefile\shell\Open\Command df827d49260c481868d344dc2c0788ff.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "Mscng.exe opext \"%1\" %*" df827d49260c481868d344dc2c0788ff.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1452 df827d49260c481868d344dc2c0788ff.exe 5000 Mscng.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1452 wrote to memory of 5000 1452 df827d49260c481868d344dc2c0788ff.exe 88 PID 1452 wrote to memory of 5000 1452 df827d49260c481868d344dc2c0788ff.exe 88 PID 1452 wrote to memory of 5000 1452 df827d49260c481868d344dc2c0788ff.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\df827d49260c481868d344dc2c0788ff.exe"C:\Users\Admin\AppData\Local\Temp\df827d49260c481868d344dc2c0788ff.exe"1⤵
- Modifies system executable filetype association
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Windows\SysWOW64\Mscng.exeC:\Windows\system32\Mscng.exe /au2⤵
- Executes dropped EXE
- Modifies system executable filetype association
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:5000
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD5df827d49260c481868d344dc2c0788ff
SHA189f319b73d457352d8db8a830351d78d325f8b4b
SHA25682337411014263d1b1b02aa477e703b4c9db6ba05bee54e8d1c229d1c8f288fe
SHA5122e7f91d416faf3b817d1096756e8d6482c21eec82a8b6011a3dcff18b2ff7383c3fcd9df55cdb93ae58c35d5fb30c4bec12d4f966925ef30bd9a2b1add950d5f