Analysis

  • max time kernel
    149s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    15/05/2024, 02:14

General

  • Target

    5df30518bfa758746bf41232f04fa27b6c7308b4a2b4c6a20470bea18514917c.exe

  • Size

    81KB

  • MD5

    caec76d938e7bef3e79213ce1d287c15

  • SHA1

    567caf28bf8c6c42ae26f2671c9f5f123f33bd01

  • SHA256

    5df30518bfa758746bf41232f04fa27b6c7308b4a2b4c6a20470bea18514917c

  • SHA512

    c5cdcdcdf2e84ca3dd6ed687f0a9970b6059f1d89be71ce364f9b7c21db3a41ceb80f4910bc19e989362c847a4e634e518883cd7ca23ed6367f58d0fe2df2df3

  • SSDEEP

    768:agO5xRYi+SfSWHHNvvG5bnl/NqNwsKVDstHxYD0p1aXKynF0vQmYZS0HdJnfWOuy:RshfSWHHNvoLqNwDDGw02eQmh0HjWOuy

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Modifies system executable filetype association 2 TTPs 5 IoCs
  • Drops file in System32 directory 4 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies registry class 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5df30518bfa758746bf41232f04fa27b6c7308b4a2b4c6a20470bea18514917c.exe
    "C:\Users\Admin\AppData\Local\Temp\5df30518bfa758746bf41232f04fa27b6c7308b4a2b4c6a20470bea18514917c.exe"
    1⤵
    • Loads dropped DLL
    • Modifies system executable filetype association
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2696
    • C:\Windows\system\rundll32.exe
      C:\Windows\system\rundll32.exe
      2⤵
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:2216

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\notepad¢¬.exe

          Filesize

          84KB

          MD5

          865871c585e76d92eb833195390aa21c

          SHA1

          fe78e5ff2cd0e206a3e6f1069e71b51abf2feed6

          SHA256

          860ae3bfb29cfc09ede1959a50e2878f9c194842fb9ae1f00084a97ceb591ee2

          SHA512

          bfa081aa51486d4de8d5409a0e33d29419099620092e2af1be71c7d235586c4908af0fb091a8eb76f34cde7069ed6e42e0fbf8675317e8aba094cb8f8ff4b85b

        • \Windows\system\rundll32.exe

          Filesize

          78KB

          MD5

          4433b2c25e91adfdff97637faacec404

          SHA1

          99fe2ce0c5c3f2ef17c0813001fbc42d8e312077

          SHA256

          3bd57b8442142656da666e10d3aa066a814a65f550af9833b80838c57664ce79

          SHA512

          73b0bf822c06bdadb3f17ad16f5f72014baf9830b3b2e639b3a79b373c5a0f79a89e2047fea7a23006098aa66b6ee89d9d61eb84d3216e01ad2e6d523c9049f8

        • memory/2216-19-0x0000000000400000-0x0000000000415A00-memory.dmp

          Filesize

          86KB

        • memory/2696-0-0x0000000000400000-0x0000000000415A00-memory.dmp

          Filesize

          86KB

        • memory/2696-17-0x00000000002F0000-0x0000000000306000-memory.dmp

          Filesize

          88KB

        • memory/2696-18-0x00000000002F0000-0x0000000000306000-memory.dmp

          Filesize

          88KB

        • memory/2696-21-0x0000000000400000-0x0000000000415A00-memory.dmp

          Filesize

          86KB

        • memory/2696-22-0x00000000002F0000-0x00000000002F2000-memory.dmp

          Filesize

          8KB