Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
11/05/2024, 23:14
Static task
static1
Behavioral task
behavioral1
Sample
bd7f7fd5a379598d37916bfb89911091ab88545f53c709079a7fcac9d20d960a.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
bd7f7fd5a379598d37916bfb89911091ab88545f53c709079a7fcac9d20d960a.exe
Resource
win10v2004-20240508-en
General
-
Target
bd7f7fd5a379598d37916bfb89911091ab88545f53c709079a7fcac9d20d960a.exe
-
Size
82KB
-
MD5
3638a9d6da3f3de75c2575f14cc8085c
-
SHA1
58d464f951304bd4a81ccd147ce933ef5b550026
-
SHA256
bd7f7fd5a379598d37916bfb89911091ab88545f53c709079a7fcac9d20d960a
-
SHA512
5d11ff7aeb260aef08472e9ea05f118378cf3df6f09072346870d2a378b999e7fc3ab572f44b383fc8b18491b6210c1e66c57e2709c2aa89d56a7c9125801efc
-
SSDEEP
1536:RshfSWHHNvoLqNwDDGw02eQmh0HjWOQMESE8:GhfxHNIreQm+Hi9MESE8
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1632 rundll32.exe -
Loads dropped DLL 2 IoCs
pid Process 2428 bd7f7fd5a379598d37916bfb89911091ab88545f53c709079a7fcac9d20d960a.exe 2428 bd7f7fd5a379598d37916bfb89911091ab88545f53c709079a7fcac9d20d960a.exe -
Modifies system executable filetype association 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command bd7f7fd5a379598d37916bfb89911091ab88545f53c709079a7fcac9d20d960a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" bd7f7fd5a379598d37916bfb89911091ab88545f53c709079a7fcac9d20d960a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" bd7f7fd5a379598d37916bfb89911091ab88545f53c709079a7fcac9d20d960a.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\¢«.exe bd7f7fd5a379598d37916bfb89911091ab88545f53c709079a7fcac9d20d960a.exe File created C:\Windows\SysWOW64\¢«.exe bd7f7fd5a379598d37916bfb89911091ab88545f53c709079a7fcac9d20d960a.exe File opened for modification C:\Windows\SysWOW64\notepad¢¬.exe bd7f7fd5a379598d37916bfb89911091ab88545f53c709079a7fcac9d20d960a.exe File created C:\Windows\SysWOW64\notepad¢¬.exe bd7f7fd5a379598d37916bfb89911091ab88545f53c709079a7fcac9d20d960a.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system\rundll32.exe bd7f7fd5a379598d37916bfb89911091ab88545f53c709079a7fcac9d20d960a.exe File created C:\Windows\system\rundll32.exe bd7f7fd5a379598d37916bfb89911091ab88545f53c709079a7fcac9d20d960a.exe -
Modifies registry class 15 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" bd7f7fd5a379598d37916bfb89911091ab88545f53c709079a7fcac9d20d960a.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command bd7f7fd5a379598d37916bfb89911091ab88545f53c709079a7fcac9d20d960a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" bd7f7fd5a379598d37916bfb89911091ab88545f53c709079a7fcac9d20d960a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainSetup = "1715469293" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" bd7f7fd5a379598d37916bfb89911091ab88545f53c709079a7fcac9d20d960a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad.exe %1" bd7f7fd5a379598d37916bfb89911091ab88545f53c709079a7fcac9d20d960a.exe Key created \REGISTRY\MACHINE\Software\Classes\MSipv rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainUp = "1715469293" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\MSipv bd7f7fd5a379598d37916bfb89911091ab88545f53c709079a7fcac9d20d960a.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command bd7f7fd5a379598d37916bfb89911091ab88545f53c709079a7fcac9d20d960a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainVer = "506" rundll32.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2428 bd7f7fd5a379598d37916bfb89911091ab88545f53c709079a7fcac9d20d960a.exe 2428 bd7f7fd5a379598d37916bfb89911091ab88545f53c709079a7fcac9d20d960a.exe 2428 bd7f7fd5a379598d37916bfb89911091ab88545f53c709079a7fcac9d20d960a.exe 2428 bd7f7fd5a379598d37916bfb89911091ab88545f53c709079a7fcac9d20d960a.exe 2428 bd7f7fd5a379598d37916bfb89911091ab88545f53c709079a7fcac9d20d960a.exe 2428 bd7f7fd5a379598d37916bfb89911091ab88545f53c709079a7fcac9d20d960a.exe 2428 bd7f7fd5a379598d37916bfb89911091ab88545f53c709079a7fcac9d20d960a.exe 2428 bd7f7fd5a379598d37916bfb89911091ab88545f53c709079a7fcac9d20d960a.exe 2428 bd7f7fd5a379598d37916bfb89911091ab88545f53c709079a7fcac9d20d960a.exe 2428 bd7f7fd5a379598d37916bfb89911091ab88545f53c709079a7fcac9d20d960a.exe 2428 bd7f7fd5a379598d37916bfb89911091ab88545f53c709079a7fcac9d20d960a.exe 2428 bd7f7fd5a379598d37916bfb89911091ab88545f53c709079a7fcac9d20d960a.exe 2428 bd7f7fd5a379598d37916bfb89911091ab88545f53c709079a7fcac9d20d960a.exe 2428 bd7f7fd5a379598d37916bfb89911091ab88545f53c709079a7fcac9d20d960a.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1632 rundll32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2428 bd7f7fd5a379598d37916bfb89911091ab88545f53c709079a7fcac9d20d960a.exe 1632 rundll32.exe 1632 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2428 wrote to memory of 1632 2428 bd7f7fd5a379598d37916bfb89911091ab88545f53c709079a7fcac9d20d960a.exe 28 PID 2428 wrote to memory of 1632 2428 bd7f7fd5a379598d37916bfb89911091ab88545f53c709079a7fcac9d20d960a.exe 28 PID 2428 wrote to memory of 1632 2428 bd7f7fd5a379598d37916bfb89911091ab88545f53c709079a7fcac9d20d960a.exe 28 PID 2428 wrote to memory of 1632 2428 bd7f7fd5a379598d37916bfb89911091ab88545f53c709079a7fcac9d20d960a.exe 28 PID 2428 wrote to memory of 1632 2428 bd7f7fd5a379598d37916bfb89911091ab88545f53c709079a7fcac9d20d960a.exe 28 PID 2428 wrote to memory of 1632 2428 bd7f7fd5a379598d37916bfb89911091ab88545f53c709079a7fcac9d20d960a.exe 28 PID 2428 wrote to memory of 1632 2428 bd7f7fd5a379598d37916bfb89911091ab88545f53c709079a7fcac9d20d960a.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\bd7f7fd5a379598d37916bfb89911091ab88545f53c709079a7fcac9d20d960a.exe"C:\Users\Admin\AppData\Local\Temp\bd7f7fd5a379598d37916bfb89911091ab88545f53c709079a7fcac9d20d960a.exe"1⤵
- Loads dropped DLL
- Modifies system executable filetype association
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Windows\system\rundll32.exeC:\Windows\system\rundll32.exe2⤵
- Executes dropped EXE
- Modifies system executable filetype association
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1632
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
81KB
MD52d5f79b231da186f7bfa62760fab0357
SHA17b74b93368d3f6a739f3c070e9f58c117b9cf80d
SHA256c29f266b60b7ae2d882a4fb0788cf64efa6a31a05c031dfa791f28927a7ca059
SHA512198d78b23df6e426ba195c7c6ffbf94ed0ae42a053e49637822a0b53a5d1bae8fb31ad20bf4257a03162476e65159af246000a3a9c89a276de1e0b1581f31981
-
Filesize
76KB
MD575c78e8aafd6f68cfb2e1ede3c1ec0a2
SHA185db79dbea5790fed69ad821b95fc1dd9787ef3a
SHA2564ca3c651ce9e4ae5b3a5c54d291600fea4cd0eac88c11a719c3e01a01a7786f7
SHA51271ee7e478b63e28c6d2b28acb5179775772cfb11ac1ec0f1441e4c319a98dcca8903f13abc5ad4d5caad8248c08849a6f655782dd145d8bb306cce8e8a84d24a