Analysis

  • max time kernel
    149s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    17/05/2024, 05:24

General

  • Target

    6bc12ab82ef64209cda5f20adfb25b84d0b5a3a56eabb02ed5a14336a3ac4d70.exe

  • Size

    84KB

  • MD5

    0b6903d6da4a0bbc704df62bf5a45a76

  • SHA1

    0ec6e573a4312ea88f3bd7f0e9bd909cb40940ce

  • SHA256

    6bc12ab82ef64209cda5f20adfb25b84d0b5a3a56eabb02ed5a14336a3ac4d70

  • SHA512

    8e1969c50d20a19d667038b712273f03e94e64c0a2b0133cb2587ed2ed7447efd37cdacc47efcdbba97437e6452cc135ee4b2f4de1ce173c5918d16b08f51dc6

  • SSDEEP

    1536:RshfSWHHNvoLqNwDDGw02eQmh0HjWOkeqfiFhO9EI:GhfxHNIreQm+Hi3RfiFhO9EI

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Modifies system executable filetype association 2 TTPs 5 IoCs
  • Drops file in System32 directory 4 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies registry class 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6bc12ab82ef64209cda5f20adfb25b84d0b5a3a56eabb02ed5a14336a3ac4d70.exe
    "C:\Users\Admin\AppData\Local\Temp\6bc12ab82ef64209cda5f20adfb25b84d0b5a3a56eabb02ed5a14336a3ac4d70.exe"
    1⤵
    • Loads dropped DLL
    • Modifies system executable filetype association
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1712
    • C:\Windows\system\rundll32.exe
      C:\Windows\system\rundll32.exe
      2⤵
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:2520

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\notepad¢¬.exe

    Filesize

    77KB

    MD5

    9e07b5e0fe999e6c28c7e76a832c5d0b

    SHA1

    0c94b56e7811f49cee2c2bfa6d696a9c5136dcf9

    SHA256

    930676e5ab78e7fa6fcab69562a1a8ed50467e4aaf7af3bf7d32a2a4a08b6afa

    SHA512

    e1dadf1082611b24fb378c14ae22b830e2f4e5fe1b8d702227505c4f67b964b45c3edcd324f1ce55e85d97cf2e628821ef092db81c007395e3e2d6bc52642286

  • C:\Windows\system\rundll32.exe

    Filesize

    74KB

    MD5

    05afe5bd4405dfaf62c25f4ab24832f4

    SHA1

    aa3c6636a9ee721f579e1fe3207ab68397f967e1

    SHA256

    b043bd01bcaf8a238d19fa1f09c803c94f5918f1fb4dfdd81818e044b98a97a7

    SHA512

    1eb417c05489d2431cc778785a3d24095d4115da7cbe9145a187fd57fd46d7226812d2dadaa3ffe0308a74b00b04479d90ae1de0d1d33b26a8c5fc1bfa9e9e41

  • memory/1712-0-0x0000000000400000-0x0000000000415A00-memory.dmp

    Filesize

    86KB

  • memory/1712-19-0x00000000002B0000-0x00000000002C6000-memory.dmp

    Filesize

    88KB

  • memory/1712-18-0x00000000002B0000-0x00000000002C6000-memory.dmp

    Filesize

    88KB

  • memory/1712-21-0x0000000000400000-0x0000000000415A00-memory.dmp

    Filesize

    86KB

  • memory/1712-22-0x00000000002B0000-0x00000000002B2000-memory.dmp

    Filesize

    8KB

  • memory/2520-20-0x0000000000400000-0x0000000000415A00-memory.dmp

    Filesize

    86KB