Analysis

  • max time kernel
    149s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    10-05-2024 06:21

General

  • Target

    bd75b224e93330748531eae634bff13b785e31dbf2aabbccf21537e5cc1039e3.exe

  • Size

    74KB

  • MD5

    665c77fe8af498c2919bab70b6899a1f

  • SHA1

    e3f0e32aedafa906ad98ac51e2e49038d70e2aef

  • SHA256

    bd75b224e93330748531eae634bff13b785e31dbf2aabbccf21537e5cc1039e3

  • SHA512

    631228be4a6e34db6eda45e04b838178288cad9eab6a1857b0ca949b671bb2688f80a8de2dcaabf83190d30bc8f887230bf464cb7fe8a9f6529eb6df460a7c28

  • SSDEEP

    768:agO5xRYi+SfSWHHNvvG5bnl/NqNwsKVDstHxYD0p1aXKynF0vQmYZS0HdJnfWOw:RshfSWHHNvoLqNwDDGw02eQmh0HjWOw

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Modifies system executable filetype association 2 TTPs 5 IoCs
  • Drops file in System32 directory 4 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies registry class 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bd75b224e93330748531eae634bff13b785e31dbf2aabbccf21537e5cc1039e3.exe
    "C:\Users\Admin\AppData\Local\Temp\bd75b224e93330748531eae634bff13b785e31dbf2aabbccf21537e5cc1039e3.exe"
    1⤵
    • Loads dropped DLL
    • Modifies system executable filetype association
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2024
    • C:\Windows\system\rundll32.exe
      C:\Windows\system\rundll32.exe
      2⤵
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:2484

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\notepad¢¬.exe

    Filesize

    74KB

    MD5

    2b095c058862eff0d086009319fbbc4c

    SHA1

    a27888ceb9ae3948b66230e11821bfbec2a066bf

    SHA256

    a03b80bfb052183788fcb44d46a4307527c280b7703df424869a0a2e38b40d99

    SHA512

    a8ab518d4f2efbc8cd3760f691ada2de5a878cbee1bf743210b796381ea30fa3561f582f88c18d03ba6621a89143ae18285651aa9b2309dfdce241b0fa86cc40

  • \Windows\system\rundll32.exe

    Filesize

    73KB

    MD5

    185431c99b018901833798b0a30b88f2

    SHA1

    ce4d43a9dec13c95a551981c62c3cf2528a180e4

    SHA256

    15d86bb3ee88f81634bde6ce53865c3ab98acc2492786b400adba6aa3afc08b6

    SHA512

    ab0a079f04ed8ecab604be46335c15fd53d76b57474616b8c5a53c319bb7cf67e94a44b1eea713b477079bc5ef8d4da9244bd11c019dac6fc835e30788421faa

  • memory/2024-0-0x0000000000400000-0x0000000000415A00-memory.dmp

    Filesize

    86KB

  • memory/2024-17-0x00000000002E0000-0x00000000002F6000-memory.dmp

    Filesize

    88KB

  • memory/2024-16-0x00000000002E0000-0x00000000002F6000-memory.dmp

    Filesize

    88KB

  • memory/2024-21-0x0000000000400000-0x0000000000415A00-memory.dmp

    Filesize

    86KB

  • memory/2024-22-0x00000000002E0000-0x00000000002E2000-memory.dmp

    Filesize

    8KB

  • memory/2484-19-0x0000000000400000-0x0000000000415A00-memory.dmp

    Filesize

    86KB