Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
25/04/2024, 02:20
Static task
static1
Behavioral task
behavioral1
Sample
44d1f830c7722b20cd31338105fdbaa60b39471a8540b0c310f039ed14b09554.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
44d1f830c7722b20cd31338105fdbaa60b39471a8540b0c310f039ed14b09554.exe
Resource
win10v2004-20240412-en
General
-
Target
44d1f830c7722b20cd31338105fdbaa60b39471a8540b0c310f039ed14b09554.exe
-
Size
80KB
-
MD5
ecb5d3ab296e31c5a0e3f135f4286632
-
SHA1
11cf60a1fd1a1c07576617d9bd7f9903a2852d3c
-
SHA256
44d1f830c7722b20cd31338105fdbaa60b39471a8540b0c310f039ed14b09554
-
SHA512
ce7a6e61e47812b2ea334370512bade4e2396889b487b4f69bbe3958edad8b7b12cb6a03f1f9037484dfbaa6809456697e31f3766f695dad6d14419010ae24bd
-
SSDEEP
1536:RshfSWHHNvoLqNwDDGw02eQmh0HjWO1LJj:GhfxHNIreQm+HigLJj
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 5020 rundll32.exe -
Modifies system executable filetype association 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 44d1f830c7722b20cd31338105fdbaa60b39471a8540b0c310f039ed14b09554.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" 44d1f830c7722b20cd31338105fdbaa60b39471a8540b0c310f039ed14b09554.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command 44d1f830c7722b20cd31338105fdbaa60b39471a8540b0c310f039ed14b09554.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\¢«.exe 44d1f830c7722b20cd31338105fdbaa60b39471a8540b0c310f039ed14b09554.exe File created C:\Windows\SysWOW64\¢«.exe 44d1f830c7722b20cd31338105fdbaa60b39471a8540b0c310f039ed14b09554.exe File opened for modification C:\Windows\SysWOW64\notepad¢¬.exe 44d1f830c7722b20cd31338105fdbaa60b39471a8540b0c310f039ed14b09554.exe File created C:\Windows\SysWOW64\notepad¢¬.exe 44d1f830c7722b20cd31338105fdbaa60b39471a8540b0c310f039ed14b09554.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\system\rundll32.exe 44d1f830c7722b20cd31338105fdbaa60b39471a8540b0c310f039ed14b09554.exe File opened for modification C:\Windows\system\rundll32.exe 44d1f830c7722b20cd31338105fdbaa60b39471a8540b0c310f039ed14b09554.exe -
Modifies registry class 15 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad.exe %1" 44d1f830c7722b20cd31338105fdbaa60b39471a8540b0c310f039ed14b09554.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" 44d1f830c7722b20cd31338105fdbaa60b39471a8540b0c310f039ed14b09554.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 44d1f830c7722b20cd31338105fdbaa60b39471a8540b0c310f039ed14b09554.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainVer = "506" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command 44d1f830c7722b20cd31338105fdbaa60b39471a8540b0c310f039ed14b09554.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command 44d1f830c7722b20cd31338105fdbaa60b39471a8540b0c310f039ed14b09554.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" 44d1f830c7722b20cd31338105fdbaa60b39471a8540b0c310f039ed14b09554.exe Key created \REGISTRY\MACHINE\Software\Classes\MSipv rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainSetup = "1714011636" rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainUp = "1714011636" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\MSipv 44d1f830c7722b20cd31338105fdbaa60b39471a8540b0c310f039ed14b09554.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 324 44d1f830c7722b20cd31338105fdbaa60b39471a8540b0c310f039ed14b09554.exe 324 44d1f830c7722b20cd31338105fdbaa60b39471a8540b0c310f039ed14b09554.exe 324 44d1f830c7722b20cd31338105fdbaa60b39471a8540b0c310f039ed14b09554.exe 324 44d1f830c7722b20cd31338105fdbaa60b39471a8540b0c310f039ed14b09554.exe 324 44d1f830c7722b20cd31338105fdbaa60b39471a8540b0c310f039ed14b09554.exe 324 44d1f830c7722b20cd31338105fdbaa60b39471a8540b0c310f039ed14b09554.exe 324 44d1f830c7722b20cd31338105fdbaa60b39471a8540b0c310f039ed14b09554.exe 324 44d1f830c7722b20cd31338105fdbaa60b39471a8540b0c310f039ed14b09554.exe 324 44d1f830c7722b20cd31338105fdbaa60b39471a8540b0c310f039ed14b09554.exe 324 44d1f830c7722b20cd31338105fdbaa60b39471a8540b0c310f039ed14b09554.exe 324 44d1f830c7722b20cd31338105fdbaa60b39471a8540b0c310f039ed14b09554.exe 324 44d1f830c7722b20cd31338105fdbaa60b39471a8540b0c310f039ed14b09554.exe 324 44d1f830c7722b20cd31338105fdbaa60b39471a8540b0c310f039ed14b09554.exe 324 44d1f830c7722b20cd31338105fdbaa60b39471a8540b0c310f039ed14b09554.exe 324 44d1f830c7722b20cd31338105fdbaa60b39471a8540b0c310f039ed14b09554.exe 324 44d1f830c7722b20cd31338105fdbaa60b39471a8540b0c310f039ed14b09554.exe 324 44d1f830c7722b20cd31338105fdbaa60b39471a8540b0c310f039ed14b09554.exe 324 44d1f830c7722b20cd31338105fdbaa60b39471a8540b0c310f039ed14b09554.exe 324 44d1f830c7722b20cd31338105fdbaa60b39471a8540b0c310f039ed14b09554.exe 324 44d1f830c7722b20cd31338105fdbaa60b39471a8540b0c310f039ed14b09554.exe 324 44d1f830c7722b20cd31338105fdbaa60b39471a8540b0c310f039ed14b09554.exe 324 44d1f830c7722b20cd31338105fdbaa60b39471a8540b0c310f039ed14b09554.exe 324 44d1f830c7722b20cd31338105fdbaa60b39471a8540b0c310f039ed14b09554.exe 324 44d1f830c7722b20cd31338105fdbaa60b39471a8540b0c310f039ed14b09554.exe 324 44d1f830c7722b20cd31338105fdbaa60b39471a8540b0c310f039ed14b09554.exe 324 44d1f830c7722b20cd31338105fdbaa60b39471a8540b0c310f039ed14b09554.exe 324 44d1f830c7722b20cd31338105fdbaa60b39471a8540b0c310f039ed14b09554.exe 324 44d1f830c7722b20cd31338105fdbaa60b39471a8540b0c310f039ed14b09554.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 5020 rundll32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 324 44d1f830c7722b20cd31338105fdbaa60b39471a8540b0c310f039ed14b09554.exe 5020 rundll32.exe 5020 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 324 wrote to memory of 5020 324 44d1f830c7722b20cd31338105fdbaa60b39471a8540b0c310f039ed14b09554.exe 90 PID 324 wrote to memory of 5020 324 44d1f830c7722b20cd31338105fdbaa60b39471a8540b0c310f039ed14b09554.exe 90 PID 324 wrote to memory of 5020 324 44d1f830c7722b20cd31338105fdbaa60b39471a8540b0c310f039ed14b09554.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\44d1f830c7722b20cd31338105fdbaa60b39471a8540b0c310f039ed14b09554.exe"C:\Users\Admin\AppData\Local\Temp\44d1f830c7722b20cd31338105fdbaa60b39471a8540b0c310f039ed14b09554.exe"1⤵
- Modifies system executable filetype association
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:324 -
C:\Windows\system\rundll32.exeC:\Windows\system\rundll32.exe2⤵
- Executes dropped EXE
- Modifies system executable filetype association
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:5020
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
79KB
MD5c8afcd1223347e9b1ecd9b243a62d558
SHA127b30e81121f82341abced1bb65b31186d54de02
SHA256c2e19f21b78a049e4c5d4c1fa9c206fbcfbab2315114b7014f1e13e7fa10e28a
SHA512d686b811c022e60895d6027164c2ee9dbe5f3651d4f53a9cbe53dbc498ee7a3aaf8a59864a86c8bf63894900018fa6f24bf53b25bda0c6b8b37beb66fe973ee2
-
Filesize
83KB
MD5739ac2622d163805c68057330b50d131
SHA16aa04ba07304b2b251c3bcbdb7f097eca28dbc77
SHA25666b903c4661a4d55a2e72fe9f1bdd599c9745ddd8b9d29d3394999e47757425d
SHA512fcd7b8ef0fe64fb70d6ca557aaf348f10633a89d2ddceab8a2ada02353ca6156524b967fd56f74c19736c2896730848c36146fac8c4ed7cc0263fe2e4b3384da