Analysis
-
max time kernel
149s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
11/05/2024, 08:18
Static task
static1
Behavioral task
behavioral1
Sample
a89303deec42806c7f9939aa1b4ed2c52d61b81497b2046e36efbf5590b5d7b0.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
a89303deec42806c7f9939aa1b4ed2c52d61b81497b2046e36efbf5590b5d7b0.exe
Resource
win10v2004-20240508-en
General
-
Target
a89303deec42806c7f9939aa1b4ed2c52d61b81497b2046e36efbf5590b5d7b0.exe
-
Size
73KB
-
MD5
e39c934b9f05ce4a4361a6ec8f2eb790
-
SHA1
5696cd0f681aa53e6e57e97e8dd675f58eba80aa
-
SHA256
a89303deec42806c7f9939aa1b4ed2c52d61b81497b2046e36efbf5590b5d7b0
-
SHA512
95ea40aa7a7f2c3435c4a78252de381f09158f3483ec626b43e45c0bfd3c069c1977295c5a1b0daaca752bb0be0bb81df9ae08806750037083b9da529da22852
-
SSDEEP
768:agO5xRYi+SfSWHHNvvG5bnl/NqNwsKVDstHxYD0p1aXKynF0vQmYZS0HdJnfWO8:RshfSWHHNvoLqNwDDGw02eQmh0HjWO8
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1636 rundll32.exe -
Modifies system executable filetype association 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" a89303deec42806c7f9939aa1b4ed2c52d61b81497b2046e36efbf5590b5d7b0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" a89303deec42806c7f9939aa1b4ed2c52d61b81497b2046e36efbf5590b5d7b0.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command a89303deec42806c7f9939aa1b4ed2c52d61b81497b2046e36efbf5590b5d7b0.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\¢«.exe a89303deec42806c7f9939aa1b4ed2c52d61b81497b2046e36efbf5590b5d7b0.exe File created C:\Windows\SysWOW64\¢«.exe a89303deec42806c7f9939aa1b4ed2c52d61b81497b2046e36efbf5590b5d7b0.exe File opened for modification C:\Windows\SysWOW64\notepad¢¬.exe a89303deec42806c7f9939aa1b4ed2c52d61b81497b2046e36efbf5590b5d7b0.exe File created C:\Windows\SysWOW64\notepad¢¬.exe a89303deec42806c7f9939aa1b4ed2c52d61b81497b2046e36efbf5590b5d7b0.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system\rundll32.exe a89303deec42806c7f9939aa1b4ed2c52d61b81497b2046e36efbf5590b5d7b0.exe File created C:\Windows\system\rundll32.exe a89303deec42806c7f9939aa1b4ed2c52d61b81497b2046e36efbf5590b5d7b0.exe -
Modifies registry class 15 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" a89303deec42806c7f9939aa1b4ed2c52d61b81497b2046e36efbf5590b5d7b0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainSetup = "1715415488" rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainUp = "1715415488" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\MSipv a89303deec42806c7f9939aa1b4ed2c52d61b81497b2046e36efbf5590b5d7b0.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command a89303deec42806c7f9939aa1b4ed2c52d61b81497b2046e36efbf5590b5d7b0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainVer = "506" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad.exe %1" a89303deec42806c7f9939aa1b4ed2c52d61b81497b2046e36efbf5590b5d7b0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" a89303deec42806c7f9939aa1b4ed2c52d61b81497b2046e36efbf5590b5d7b0.exe Key created \REGISTRY\MACHINE\Software\Classes\MSipv rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" a89303deec42806c7f9939aa1b4ed2c52d61b81497b2046e36efbf5590b5d7b0.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command a89303deec42806c7f9939aa1b4ed2c52d61b81497b2046e36efbf5590b5d7b0.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 5008 a89303deec42806c7f9939aa1b4ed2c52d61b81497b2046e36efbf5590b5d7b0.exe 5008 a89303deec42806c7f9939aa1b4ed2c52d61b81497b2046e36efbf5590b5d7b0.exe 5008 a89303deec42806c7f9939aa1b4ed2c52d61b81497b2046e36efbf5590b5d7b0.exe 5008 a89303deec42806c7f9939aa1b4ed2c52d61b81497b2046e36efbf5590b5d7b0.exe 5008 a89303deec42806c7f9939aa1b4ed2c52d61b81497b2046e36efbf5590b5d7b0.exe 5008 a89303deec42806c7f9939aa1b4ed2c52d61b81497b2046e36efbf5590b5d7b0.exe 5008 a89303deec42806c7f9939aa1b4ed2c52d61b81497b2046e36efbf5590b5d7b0.exe 5008 a89303deec42806c7f9939aa1b4ed2c52d61b81497b2046e36efbf5590b5d7b0.exe 5008 a89303deec42806c7f9939aa1b4ed2c52d61b81497b2046e36efbf5590b5d7b0.exe 5008 a89303deec42806c7f9939aa1b4ed2c52d61b81497b2046e36efbf5590b5d7b0.exe 5008 a89303deec42806c7f9939aa1b4ed2c52d61b81497b2046e36efbf5590b5d7b0.exe 5008 a89303deec42806c7f9939aa1b4ed2c52d61b81497b2046e36efbf5590b5d7b0.exe 5008 a89303deec42806c7f9939aa1b4ed2c52d61b81497b2046e36efbf5590b5d7b0.exe 5008 a89303deec42806c7f9939aa1b4ed2c52d61b81497b2046e36efbf5590b5d7b0.exe 5008 a89303deec42806c7f9939aa1b4ed2c52d61b81497b2046e36efbf5590b5d7b0.exe 5008 a89303deec42806c7f9939aa1b4ed2c52d61b81497b2046e36efbf5590b5d7b0.exe 5008 a89303deec42806c7f9939aa1b4ed2c52d61b81497b2046e36efbf5590b5d7b0.exe 5008 a89303deec42806c7f9939aa1b4ed2c52d61b81497b2046e36efbf5590b5d7b0.exe 5008 a89303deec42806c7f9939aa1b4ed2c52d61b81497b2046e36efbf5590b5d7b0.exe 5008 a89303deec42806c7f9939aa1b4ed2c52d61b81497b2046e36efbf5590b5d7b0.exe 5008 a89303deec42806c7f9939aa1b4ed2c52d61b81497b2046e36efbf5590b5d7b0.exe 5008 a89303deec42806c7f9939aa1b4ed2c52d61b81497b2046e36efbf5590b5d7b0.exe 5008 a89303deec42806c7f9939aa1b4ed2c52d61b81497b2046e36efbf5590b5d7b0.exe 5008 a89303deec42806c7f9939aa1b4ed2c52d61b81497b2046e36efbf5590b5d7b0.exe 5008 a89303deec42806c7f9939aa1b4ed2c52d61b81497b2046e36efbf5590b5d7b0.exe 5008 a89303deec42806c7f9939aa1b4ed2c52d61b81497b2046e36efbf5590b5d7b0.exe 5008 a89303deec42806c7f9939aa1b4ed2c52d61b81497b2046e36efbf5590b5d7b0.exe 5008 a89303deec42806c7f9939aa1b4ed2c52d61b81497b2046e36efbf5590b5d7b0.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1636 rundll32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 5008 a89303deec42806c7f9939aa1b4ed2c52d61b81497b2046e36efbf5590b5d7b0.exe 1636 rundll32.exe 1636 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5008 wrote to memory of 1636 5008 a89303deec42806c7f9939aa1b4ed2c52d61b81497b2046e36efbf5590b5d7b0.exe 81 PID 5008 wrote to memory of 1636 5008 a89303deec42806c7f9939aa1b4ed2c52d61b81497b2046e36efbf5590b5d7b0.exe 81 PID 5008 wrote to memory of 1636 5008 a89303deec42806c7f9939aa1b4ed2c52d61b81497b2046e36efbf5590b5d7b0.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\a89303deec42806c7f9939aa1b4ed2c52d61b81497b2046e36efbf5590b5d7b0.exe"C:\Users\Admin\AppData\Local\Temp\a89303deec42806c7f9939aa1b4ed2c52d61b81497b2046e36efbf5590b5d7b0.exe"1⤵
- Modifies system executable filetype association
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Windows\system\rundll32.exeC:\Windows\system\rundll32.exe2⤵
- Executes dropped EXE
- Modifies system executable filetype association
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1636
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
81KB
MD51fba939c9785df61bbddbbf3e2657150
SHA1b895bc2a8b58e129779d3177c25fe36e13f8592c
SHA256a18c79dd3731482f8fb1b00c3bbf16afa512f655ffba3b10dc308258c3b5cae9
SHA5127cf8f00f1daba7cf235f894904e18ae39c56b89a3263beff7a5a493911c7a4d1dc2e09378b11450ad282529620f431a90c8af91864d7eabd1ecee1796df2c5f3
-
Filesize
73KB
MD58b83af8f861b1073ca61af16fb6dc924
SHA1f550fe632a3eb991110f60e7e79fe0aa72f1ead6
SHA25623551cc3a70a63b30d2f3d9861bb62feb8ad8b859d511904e837f33968f8f3c9
SHA51266bcb5373f994470d832ef86d4d690c227b94398cb0e58cf07015474f632f113edf98baa7c89c784e9155b812840bbcc7d3e279c0a69c05de0fb5c216e291b76