Analysis
-
max time kernel
149s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
01/05/2024, 05:19
Static task
static1
Behavioral task
behavioral1
Sample
cb86cd89eef978f36a3dd4e939b9e35b5959d6f2c0c9e0c14b3f06e0ea16a006.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cb86cd89eef978f36a3dd4e939b9e35b5959d6f2c0c9e0c14b3f06e0ea16a006.exe
Resource
win10v2004-20240426-en
General
-
Target
cb86cd89eef978f36a3dd4e939b9e35b5959d6f2c0c9e0c14b3f06e0ea16a006.exe
-
Size
82KB
-
MD5
758ebf28c6a7d2a50cbdc4f5c4f1a1b0
-
SHA1
d6f28d6f676fe40222762a881f0debcfd46fb3ee
-
SHA256
cb86cd89eef978f36a3dd4e939b9e35b5959d6f2c0c9e0c14b3f06e0ea16a006
-
SHA512
eca8f230d3a2a7229ea0d99d52cc92f22483f3dfc706354b2696548aaa11e93ab7c347d1c76eabbb917d980130c1c16b98090319437723194ed4aa5167e95e4e
-
SSDEEP
1536:RshfSWHHNvoLqNwDDGw02eQmh0HjWOyP9kF0HucLEsR5:GhfxHNIreQm+HiHP9kF0HucLEsR5
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4540 rundll32.exe -
Modifies system executable filetype association 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command cb86cd89eef978f36a3dd4e939b9e35b5959d6f2c0c9e0c14b3f06e0ea16a006.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" cb86cd89eef978f36a3dd4e939b9e35b5959d6f2c0c9e0c14b3f06e0ea16a006.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" cb86cd89eef978f36a3dd4e939b9e35b5959d6f2c0c9e0c14b3f06e0ea16a006.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\¢«.exe cb86cd89eef978f36a3dd4e939b9e35b5959d6f2c0c9e0c14b3f06e0ea16a006.exe File opened for modification C:\Windows\SysWOW64\notepad¢¬.exe cb86cd89eef978f36a3dd4e939b9e35b5959d6f2c0c9e0c14b3f06e0ea16a006.exe File created C:\Windows\SysWOW64\notepad¢¬.exe cb86cd89eef978f36a3dd4e939b9e35b5959d6f2c0c9e0c14b3f06e0ea16a006.exe File opened for modification C:\Windows\SysWOW64\¢«.exe cb86cd89eef978f36a3dd4e939b9e35b5959d6f2c0c9e0c14b3f06e0ea16a006.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system\rundll32.exe cb86cd89eef978f36a3dd4e939b9e35b5959d6f2c0c9e0c14b3f06e0ea16a006.exe File created C:\Windows\system\rundll32.exe cb86cd89eef978f36a3dd4e939b9e35b5959d6f2c0c9e0c14b3f06e0ea16a006.exe -
Modifies registry class 15 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainUp = "1714540756" rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainVer = "506" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\MSipv cb86cd89eef978f36a3dd4e939b9e35b5959d6f2c0c9e0c14b3f06e0ea16a006.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" cb86cd89eef978f36a3dd4e939b9e35b5959d6f2c0c9e0c14b3f06e0ea16a006.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" cb86cd89eef978f36a3dd4e939b9e35b5959d6f2c0c9e0c14b3f06e0ea16a006.exe Key created \REGISTRY\MACHINE\Software\Classes\MSipv rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command cb86cd89eef978f36a3dd4e939b9e35b5959d6f2c0c9e0c14b3f06e0ea16a006.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" cb86cd89eef978f36a3dd4e939b9e35b5959d6f2c0c9e0c14b3f06e0ea16a006.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainSetup = "1714540756" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command cb86cd89eef978f36a3dd4e939b9e35b5959d6f2c0c9e0c14b3f06e0ea16a006.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad.exe %1" cb86cd89eef978f36a3dd4e939b9e35b5959d6f2c0c9e0c14b3f06e0ea16a006.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 4876 cb86cd89eef978f36a3dd4e939b9e35b5959d6f2c0c9e0c14b3f06e0ea16a006.exe 4876 cb86cd89eef978f36a3dd4e939b9e35b5959d6f2c0c9e0c14b3f06e0ea16a006.exe 4876 cb86cd89eef978f36a3dd4e939b9e35b5959d6f2c0c9e0c14b3f06e0ea16a006.exe 4876 cb86cd89eef978f36a3dd4e939b9e35b5959d6f2c0c9e0c14b3f06e0ea16a006.exe 4876 cb86cd89eef978f36a3dd4e939b9e35b5959d6f2c0c9e0c14b3f06e0ea16a006.exe 4876 cb86cd89eef978f36a3dd4e939b9e35b5959d6f2c0c9e0c14b3f06e0ea16a006.exe 4876 cb86cd89eef978f36a3dd4e939b9e35b5959d6f2c0c9e0c14b3f06e0ea16a006.exe 4876 cb86cd89eef978f36a3dd4e939b9e35b5959d6f2c0c9e0c14b3f06e0ea16a006.exe 4876 cb86cd89eef978f36a3dd4e939b9e35b5959d6f2c0c9e0c14b3f06e0ea16a006.exe 4876 cb86cd89eef978f36a3dd4e939b9e35b5959d6f2c0c9e0c14b3f06e0ea16a006.exe 4876 cb86cd89eef978f36a3dd4e939b9e35b5959d6f2c0c9e0c14b3f06e0ea16a006.exe 4876 cb86cd89eef978f36a3dd4e939b9e35b5959d6f2c0c9e0c14b3f06e0ea16a006.exe 4876 cb86cd89eef978f36a3dd4e939b9e35b5959d6f2c0c9e0c14b3f06e0ea16a006.exe 4876 cb86cd89eef978f36a3dd4e939b9e35b5959d6f2c0c9e0c14b3f06e0ea16a006.exe 4876 cb86cd89eef978f36a3dd4e939b9e35b5959d6f2c0c9e0c14b3f06e0ea16a006.exe 4876 cb86cd89eef978f36a3dd4e939b9e35b5959d6f2c0c9e0c14b3f06e0ea16a006.exe 4876 cb86cd89eef978f36a3dd4e939b9e35b5959d6f2c0c9e0c14b3f06e0ea16a006.exe 4876 cb86cd89eef978f36a3dd4e939b9e35b5959d6f2c0c9e0c14b3f06e0ea16a006.exe 4876 cb86cd89eef978f36a3dd4e939b9e35b5959d6f2c0c9e0c14b3f06e0ea16a006.exe 4876 cb86cd89eef978f36a3dd4e939b9e35b5959d6f2c0c9e0c14b3f06e0ea16a006.exe 4876 cb86cd89eef978f36a3dd4e939b9e35b5959d6f2c0c9e0c14b3f06e0ea16a006.exe 4876 cb86cd89eef978f36a3dd4e939b9e35b5959d6f2c0c9e0c14b3f06e0ea16a006.exe 4876 cb86cd89eef978f36a3dd4e939b9e35b5959d6f2c0c9e0c14b3f06e0ea16a006.exe 4876 cb86cd89eef978f36a3dd4e939b9e35b5959d6f2c0c9e0c14b3f06e0ea16a006.exe 4876 cb86cd89eef978f36a3dd4e939b9e35b5959d6f2c0c9e0c14b3f06e0ea16a006.exe 4876 cb86cd89eef978f36a3dd4e939b9e35b5959d6f2c0c9e0c14b3f06e0ea16a006.exe 4876 cb86cd89eef978f36a3dd4e939b9e35b5959d6f2c0c9e0c14b3f06e0ea16a006.exe 4876 cb86cd89eef978f36a3dd4e939b9e35b5959d6f2c0c9e0c14b3f06e0ea16a006.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4540 rundll32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4876 cb86cd89eef978f36a3dd4e939b9e35b5959d6f2c0c9e0c14b3f06e0ea16a006.exe 4540 rundll32.exe 4540 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4876 wrote to memory of 4540 4876 cb86cd89eef978f36a3dd4e939b9e35b5959d6f2c0c9e0c14b3f06e0ea16a006.exe 85 PID 4876 wrote to memory of 4540 4876 cb86cd89eef978f36a3dd4e939b9e35b5959d6f2c0c9e0c14b3f06e0ea16a006.exe 85 PID 4876 wrote to memory of 4540 4876 cb86cd89eef978f36a3dd4e939b9e35b5959d6f2c0c9e0c14b3f06e0ea16a006.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\cb86cd89eef978f36a3dd4e939b9e35b5959d6f2c0c9e0c14b3f06e0ea16a006.exe"C:\Users\Admin\AppData\Local\Temp\cb86cd89eef978f36a3dd4e939b9e35b5959d6f2c0c9e0c14b3f06e0ea16a006.exe"1⤵
- Modifies system executable filetype association
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Windows\system\rundll32.exeC:\Windows\system\rundll32.exe2⤵
- Executes dropped EXE
- Modifies system executable filetype association
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:4540
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD5e7ef086b464f46f10573e288862e5424
SHA1e7462b7b37992235f2f6fbf0a04943e43718da57
SHA256189b64ed8c31b43fc733273a31e245f795a11d1dfdeabf3e6d6e7232d677dba3
SHA512da854d4a2dfe5765e362484115f1b3b7bcc671578603f53e922dd93c8161f86ae251b670700423daf0613a8f0231d1cd1ab7d55317bbd3412598986b728ce27f
-
Filesize
81KB
MD5dad931211707a25ce1baf2ba7661c785
SHA1e042932535f148c525c182e6494f82d93890ac1f
SHA25634356cd123391c87116708239b9495998024f3b56ba047f543fddcca40a49fd8
SHA512da22e065632cd9f1e6df90d7d434550291a2f88fcf49e76f2f7d30818e7e256532fa4a17600d5f9a2a567b937b7ea2bdb27449390a52775086a2138931024c4b