Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/05/2024, 02:14
Static task
static1
Behavioral task
behavioral1
Sample
5df30518bfa758746bf41232f04fa27b6c7308b4a2b4c6a20470bea18514917c.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5df30518bfa758746bf41232f04fa27b6c7308b4a2b4c6a20470bea18514917c.exe
Resource
win10v2004-20240426-en
General
-
Target
5df30518bfa758746bf41232f04fa27b6c7308b4a2b4c6a20470bea18514917c.exe
-
Size
81KB
-
MD5
caec76d938e7bef3e79213ce1d287c15
-
SHA1
567caf28bf8c6c42ae26f2671c9f5f123f33bd01
-
SHA256
5df30518bfa758746bf41232f04fa27b6c7308b4a2b4c6a20470bea18514917c
-
SHA512
c5cdcdcdf2e84ca3dd6ed687f0a9970b6059f1d89be71ce364f9b7c21db3a41ceb80f4910bc19e989362c847a4e634e518883cd7ca23ed6367f58d0fe2df2df3
-
SSDEEP
768:agO5xRYi+SfSWHHNvvG5bnl/NqNwsKVDstHxYD0p1aXKynF0vQmYZS0HdJnfWOuy:RshfSWHHNvoLqNwDDGw02eQmh0HjWOuy
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2216 rundll32.exe -
Loads dropped DLL 2 IoCs
pid Process 2696 5df30518bfa758746bf41232f04fa27b6c7308b4a2b4c6a20470bea18514917c.exe 2696 5df30518bfa758746bf41232f04fa27b6c7308b4a2b4c6a20470bea18514917c.exe -
Modifies system executable filetype association 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command 5df30518bfa758746bf41232f04fa27b6c7308b4a2b4c6a20470bea18514917c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 5df30518bfa758746bf41232f04fa27b6c7308b4a2b4c6a20470bea18514917c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" 5df30518bfa758746bf41232f04fa27b6c7308b4a2b4c6a20470bea18514917c.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\¢«.exe 5df30518bfa758746bf41232f04fa27b6c7308b4a2b4c6a20470bea18514917c.exe File created C:\Windows\SysWOW64\¢«.exe 5df30518bfa758746bf41232f04fa27b6c7308b4a2b4c6a20470bea18514917c.exe File opened for modification C:\Windows\SysWOW64\notepad¢¬.exe 5df30518bfa758746bf41232f04fa27b6c7308b4a2b4c6a20470bea18514917c.exe File created C:\Windows\SysWOW64\notepad¢¬.exe 5df30518bfa758746bf41232f04fa27b6c7308b4a2b4c6a20470bea18514917c.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system\rundll32.exe 5df30518bfa758746bf41232f04fa27b6c7308b4a2b4c6a20470bea18514917c.exe File created C:\Windows\system\rundll32.exe 5df30518bfa758746bf41232f04fa27b6c7308b4a2b4c6a20470bea18514917c.exe -
Modifies registry class 15 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\MSipv 5df30518bfa758746bf41232f04fa27b6c7308b4a2b4c6a20470bea18514917c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 5df30518bfa758746bf41232f04fa27b6c7308b4a2b4c6a20470bea18514917c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" 5df30518bfa758746bf41232f04fa27b6c7308b4a2b4c6a20470bea18514917c.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command 5df30518bfa758746bf41232f04fa27b6c7308b4a2b4c6a20470bea18514917c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\MSipv rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainSetup = "1715739294" rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainUp = "1715739294" rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainVer = "506" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command 5df30518bfa758746bf41232f04fa27b6c7308b4a2b4c6a20470bea18514917c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad.exe %1" 5df30518bfa758746bf41232f04fa27b6c7308b4a2b4c6a20470bea18514917c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" 5df30518bfa758746bf41232f04fa27b6c7308b4a2b4c6a20470bea18514917c.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2696 5df30518bfa758746bf41232f04fa27b6c7308b4a2b4c6a20470bea18514917c.exe 2696 5df30518bfa758746bf41232f04fa27b6c7308b4a2b4c6a20470bea18514917c.exe 2696 5df30518bfa758746bf41232f04fa27b6c7308b4a2b4c6a20470bea18514917c.exe 2696 5df30518bfa758746bf41232f04fa27b6c7308b4a2b4c6a20470bea18514917c.exe 2696 5df30518bfa758746bf41232f04fa27b6c7308b4a2b4c6a20470bea18514917c.exe 2696 5df30518bfa758746bf41232f04fa27b6c7308b4a2b4c6a20470bea18514917c.exe 2696 5df30518bfa758746bf41232f04fa27b6c7308b4a2b4c6a20470bea18514917c.exe 2696 5df30518bfa758746bf41232f04fa27b6c7308b4a2b4c6a20470bea18514917c.exe 2696 5df30518bfa758746bf41232f04fa27b6c7308b4a2b4c6a20470bea18514917c.exe 2696 5df30518bfa758746bf41232f04fa27b6c7308b4a2b4c6a20470bea18514917c.exe 2696 5df30518bfa758746bf41232f04fa27b6c7308b4a2b4c6a20470bea18514917c.exe 2696 5df30518bfa758746bf41232f04fa27b6c7308b4a2b4c6a20470bea18514917c.exe 2696 5df30518bfa758746bf41232f04fa27b6c7308b4a2b4c6a20470bea18514917c.exe 2696 5df30518bfa758746bf41232f04fa27b6c7308b4a2b4c6a20470bea18514917c.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2216 rundll32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2696 5df30518bfa758746bf41232f04fa27b6c7308b4a2b4c6a20470bea18514917c.exe 2216 rundll32.exe 2216 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2696 wrote to memory of 2216 2696 5df30518bfa758746bf41232f04fa27b6c7308b4a2b4c6a20470bea18514917c.exe 28 PID 2696 wrote to memory of 2216 2696 5df30518bfa758746bf41232f04fa27b6c7308b4a2b4c6a20470bea18514917c.exe 28 PID 2696 wrote to memory of 2216 2696 5df30518bfa758746bf41232f04fa27b6c7308b4a2b4c6a20470bea18514917c.exe 28 PID 2696 wrote to memory of 2216 2696 5df30518bfa758746bf41232f04fa27b6c7308b4a2b4c6a20470bea18514917c.exe 28 PID 2696 wrote to memory of 2216 2696 5df30518bfa758746bf41232f04fa27b6c7308b4a2b4c6a20470bea18514917c.exe 28 PID 2696 wrote to memory of 2216 2696 5df30518bfa758746bf41232f04fa27b6c7308b4a2b4c6a20470bea18514917c.exe 28 PID 2696 wrote to memory of 2216 2696 5df30518bfa758746bf41232f04fa27b6c7308b4a2b4c6a20470bea18514917c.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\5df30518bfa758746bf41232f04fa27b6c7308b4a2b4c6a20470bea18514917c.exe"C:\Users\Admin\AppData\Local\Temp\5df30518bfa758746bf41232f04fa27b6c7308b4a2b4c6a20470bea18514917c.exe"1⤵
- Loads dropped DLL
- Modifies system executable filetype association
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\system\rundll32.exeC:\Windows\system\rundll32.exe2⤵
- Executes dropped EXE
- Modifies system executable filetype association
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2216
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD5865871c585e76d92eb833195390aa21c
SHA1fe78e5ff2cd0e206a3e6f1069e71b51abf2feed6
SHA256860ae3bfb29cfc09ede1959a50e2878f9c194842fb9ae1f00084a97ceb591ee2
SHA512bfa081aa51486d4de8d5409a0e33d29419099620092e2af1be71c7d235586c4908af0fb091a8eb76f34cde7069ed6e42e0fbf8675317e8aba094cb8f8ff4b85b
-
Filesize
78KB
MD54433b2c25e91adfdff97637faacec404
SHA199fe2ce0c5c3f2ef17c0813001fbc42d8e312077
SHA2563bd57b8442142656da666e10d3aa066a814a65f550af9833b80838c57664ce79
SHA51273b0bf822c06bdadb3f17ad16f5f72014baf9830b3b2e639b3a79b373c5a0f79a89e2047fea7a23006098aa66b6ee89d9d61eb84d3216e01ad2e6d523c9049f8