Analysis

  • max time kernel
    149s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    12/05/2024, 08:14

General

  • Target

    cac5de93b7e0fa1946f9e6cac597d2c3c5f4a6a559d34e2517236c93573ef6f0.exe

  • Size

    75KB

  • MD5

    6385db27dc64e87161f2402aa8bc1346

  • SHA1

    86d597f4f042e4db5dababeb616516db8553db73

  • SHA256

    cac5de93b7e0fa1946f9e6cac597d2c3c5f4a6a559d34e2517236c93573ef6f0

  • SHA512

    11ee5b085ad86de03d35c5314d5b9312f009ced78e5a8d4fde6aac7280f5920b35440df57924bc0f5f3951ccd87000600853705486d4f3bb39fab685d488d455

  • SSDEEP

    1536:RshfSWHHNvoLqNwDDGw02eQmh0HjWO5qu:GhfxHNIreQm+Hiaqu

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Modifies system executable filetype association 2 TTPs 5 IoCs
  • Drops file in System32 directory 4 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies registry class 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cac5de93b7e0fa1946f9e6cac597d2c3c5f4a6a559d34e2517236c93573ef6f0.exe
    "C:\Users\Admin\AppData\Local\Temp\cac5de93b7e0fa1946f9e6cac597d2c3c5f4a6a559d34e2517236c93573ef6f0.exe"
    1⤵
    • Loads dropped DLL
    • Modifies system executable filetype association
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2656
    • C:\Windows\system\rundll32.exe
      C:\Windows\system\rundll32.exe
      2⤵
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:2560

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\notepad¢¬.exe

          Filesize

          78KB

          MD5

          22ba8ca5f671a55201a69693dc40818b

          SHA1

          37dfa46d1285f21cde9e9134f282c2a32b369291

          SHA256

          dee02cf3b0f22f5c440610f6bf5908943f28a32014e10effbecd044426d1ae43

          SHA512

          2c9957f73bf765d5fe5743d4f08dc5c68b335589b118cd72e8b0983129282824ff866c9ef3cdafed3c970d74518fb7fdd7838533c866ce515ddab82fa09e36c9

        • C:\Windows\system\rundll32.exe

          Filesize

          81KB

          MD5

          054db0d68f63c16d3ff6f4f3f31c8a8a

          SHA1

          e5a436a8609d6813410bbe608647534015b37ae2

          SHA256

          9485ba65c1cf678d125cfd779011c56ddf8b89815bd895a52c98eef913ab023e

          SHA512

          188ad79f995616c4e525d26d75b52b6300312fef3e182575568a796f625bd4c1d39dc7daba3cc78f0a1cbb49cc0a7fd8ddac260dc8f86e663733e97679945abb

        • memory/2656-0-0x0000000000400000-0x0000000000415A00-memory.dmp

          Filesize

          86KB

        • memory/2656-18-0x00000000003A0000-0x00000000003B6000-memory.dmp

          Filesize

          88KB

        • memory/2656-16-0x00000000003A0000-0x00000000003B6000-memory.dmp

          Filesize

          88KB

        • memory/2656-21-0x00000000003A0000-0x00000000003A2000-memory.dmp

          Filesize

          8KB

        • memory/2656-20-0x0000000000400000-0x0000000000415A00-memory.dmp

          Filesize

          86KB