Analysis
-
max time kernel
149s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20/05/2024, 14:20
Static task
static1
Behavioral task
behavioral1
Sample
e114c08e64b9af00451109fb0d298620950746d9189f074eb4cf2c07a17facd2.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
e114c08e64b9af00451109fb0d298620950746d9189f074eb4cf2c07a17facd2.exe
Resource
win10v2004-20240508-en
General
-
Target
e114c08e64b9af00451109fb0d298620950746d9189f074eb4cf2c07a17facd2.exe
-
Size
73KB
-
MD5
6fd4b47ecb957e5698af24b62f8afad8
-
SHA1
92037d57624efcb865d34b5d82ceb57b70e59e2d
-
SHA256
e114c08e64b9af00451109fb0d298620950746d9189f074eb4cf2c07a17facd2
-
SHA512
dc8f7d53f97a518622b154a44935e2dd1b2d12a90de6e3e2aa749637108080fd35544948fb48ed5a44a540830282072c3196c795583ca39401cea2e1a70a2359
-
SSDEEP
768:agO5xRYi+SfSWHHNvvG5bnl/NqNwsKVDstHxYD0p1aXKynF0vQmYZS0HdJnfWOr:RshfSWHHNvoLqNwDDGw02eQmh0HjWOr
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1852 rundll32.exe -
Modifies system executable filetype association 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command e114c08e64b9af00451109fb0d298620950746d9189f074eb4cf2c07a17facd2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" e114c08e64b9af00451109fb0d298620950746d9189f074eb4cf2c07a17facd2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" e114c08e64b9af00451109fb0d298620950746d9189f074eb4cf2c07a17facd2.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\¢«.exe e114c08e64b9af00451109fb0d298620950746d9189f074eb4cf2c07a17facd2.exe File created C:\Windows\SysWOW64\¢«.exe e114c08e64b9af00451109fb0d298620950746d9189f074eb4cf2c07a17facd2.exe File opened for modification C:\Windows\SysWOW64\notepad¢¬.exe e114c08e64b9af00451109fb0d298620950746d9189f074eb4cf2c07a17facd2.exe File created C:\Windows\SysWOW64\notepad¢¬.exe e114c08e64b9af00451109fb0d298620950746d9189f074eb4cf2c07a17facd2.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system\rundll32.exe e114c08e64b9af00451109fb0d298620950746d9189f074eb4cf2c07a17facd2.exe File created C:\Windows\system\rundll32.exe e114c08e64b9af00451109fb0d298620950746d9189f074eb4cf2c07a17facd2.exe -
Modifies registry class 15 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" e114c08e64b9af00451109fb0d298620950746d9189f074eb4cf2c07a17facd2.exe Key created \REGISTRY\MACHINE\Software\Classes\MSipv rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\MSipv e114c08e64b9af00451109fb0d298620950746d9189f074eb4cf2c07a17facd2.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command e114c08e64b9af00451109fb0d298620950746d9189f074eb4cf2c07a17facd2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command e114c08e64b9af00451109fb0d298620950746d9189f074eb4cf2c07a17facd2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainUp = "1716214854" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" e114c08e64b9af00451109fb0d298620950746d9189f074eb4cf2c07a17facd2.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad.exe %1" e114c08e64b9af00451109fb0d298620950746d9189f074eb4cf2c07a17facd2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" e114c08e64b9af00451109fb0d298620950746d9189f074eb4cf2c07a17facd2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainSetup = "1716214854" rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainVer = "506" rundll32.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 380 e114c08e64b9af00451109fb0d298620950746d9189f074eb4cf2c07a17facd2.exe 380 e114c08e64b9af00451109fb0d298620950746d9189f074eb4cf2c07a17facd2.exe 380 e114c08e64b9af00451109fb0d298620950746d9189f074eb4cf2c07a17facd2.exe 380 e114c08e64b9af00451109fb0d298620950746d9189f074eb4cf2c07a17facd2.exe 380 e114c08e64b9af00451109fb0d298620950746d9189f074eb4cf2c07a17facd2.exe 380 e114c08e64b9af00451109fb0d298620950746d9189f074eb4cf2c07a17facd2.exe 380 e114c08e64b9af00451109fb0d298620950746d9189f074eb4cf2c07a17facd2.exe 380 e114c08e64b9af00451109fb0d298620950746d9189f074eb4cf2c07a17facd2.exe 380 e114c08e64b9af00451109fb0d298620950746d9189f074eb4cf2c07a17facd2.exe 380 e114c08e64b9af00451109fb0d298620950746d9189f074eb4cf2c07a17facd2.exe 380 e114c08e64b9af00451109fb0d298620950746d9189f074eb4cf2c07a17facd2.exe 380 e114c08e64b9af00451109fb0d298620950746d9189f074eb4cf2c07a17facd2.exe 380 e114c08e64b9af00451109fb0d298620950746d9189f074eb4cf2c07a17facd2.exe 380 e114c08e64b9af00451109fb0d298620950746d9189f074eb4cf2c07a17facd2.exe 380 e114c08e64b9af00451109fb0d298620950746d9189f074eb4cf2c07a17facd2.exe 380 e114c08e64b9af00451109fb0d298620950746d9189f074eb4cf2c07a17facd2.exe 380 e114c08e64b9af00451109fb0d298620950746d9189f074eb4cf2c07a17facd2.exe 380 e114c08e64b9af00451109fb0d298620950746d9189f074eb4cf2c07a17facd2.exe 380 e114c08e64b9af00451109fb0d298620950746d9189f074eb4cf2c07a17facd2.exe 380 e114c08e64b9af00451109fb0d298620950746d9189f074eb4cf2c07a17facd2.exe 380 e114c08e64b9af00451109fb0d298620950746d9189f074eb4cf2c07a17facd2.exe 380 e114c08e64b9af00451109fb0d298620950746d9189f074eb4cf2c07a17facd2.exe 380 e114c08e64b9af00451109fb0d298620950746d9189f074eb4cf2c07a17facd2.exe 380 e114c08e64b9af00451109fb0d298620950746d9189f074eb4cf2c07a17facd2.exe 380 e114c08e64b9af00451109fb0d298620950746d9189f074eb4cf2c07a17facd2.exe 380 e114c08e64b9af00451109fb0d298620950746d9189f074eb4cf2c07a17facd2.exe 380 e114c08e64b9af00451109fb0d298620950746d9189f074eb4cf2c07a17facd2.exe 380 e114c08e64b9af00451109fb0d298620950746d9189f074eb4cf2c07a17facd2.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1852 rundll32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 380 e114c08e64b9af00451109fb0d298620950746d9189f074eb4cf2c07a17facd2.exe 1852 rundll32.exe 1852 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 380 wrote to memory of 1852 380 e114c08e64b9af00451109fb0d298620950746d9189f074eb4cf2c07a17facd2.exe 93 PID 380 wrote to memory of 1852 380 e114c08e64b9af00451109fb0d298620950746d9189f074eb4cf2c07a17facd2.exe 93 PID 380 wrote to memory of 1852 380 e114c08e64b9af00451109fb0d298620950746d9189f074eb4cf2c07a17facd2.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\e114c08e64b9af00451109fb0d298620950746d9189f074eb4cf2c07a17facd2.exe"C:\Users\Admin\AppData\Local\Temp\e114c08e64b9af00451109fb0d298620950746d9189f074eb4cf2c07a17facd2.exe"1⤵
- Modifies system executable filetype association
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:380 -
C:\Windows\system\rundll32.exeC:\Windows\system\rundll32.exe2⤵
- Executes dropped EXE
- Modifies system executable filetype association
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4340,i,17096020621006928097,15544233752327415349,262144 --variations-seed-version --mojo-platform-channel-handle=3820 /prefetch:81⤵PID:5088
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
85KB
MD5aa353fb6eb6b6603ab3a2fdf39d218b8
SHA1bfe23dc20ab18f66fae358d1b36321dc2126a88f
SHA25613a6fda50caff71b51c667fda18c6be8e737d5d914e711cdd1763a1aacaa0885
SHA512f8c8f4d9866c8def52c56b1480115c0980c4ef93edb402f47e8f4322b1f21293b9bad8074cec59a02783eb5ee9bc5747d9f30d8e13eedfae9d35ec85bf2f9e9f
-
Filesize
83KB
MD53c998f7f9a22027ac604d9d260968fef
SHA1aa54cd45427ef0e69d128396c25d237718e2b048
SHA25619cfeaccdd8a265f8cf4ca0427d799145be69564200ed4cdc903b15793946574
SHA5124d43f46b763de0fcd01fce59d2b2979083b38dafa2c9c002a72b1b5e339382b8574208c66c49149dacf73159f1a04a57647ab4b81e57c8f747886468fa228ccd