Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/05/2024, 18:25

General

  • Target

    0f8623d238c17d8cb9782fadb586093eff8b18a4e8983590262b2e4a1ab179a3.exe

  • Size

    75KB

  • MD5

    0d1ecb483514c9d8f9e79874d7b60c9c

  • SHA1

    144790971a3f1e55f3a004dc1c19b83eae2e191e

  • SHA256

    0f8623d238c17d8cb9782fadb586093eff8b18a4e8983590262b2e4a1ab179a3

  • SHA512

    f130266a7490fda7124666694f0ddf1e06cc289a639484ce245cb9593fb43f77641ff6c59cd57e47d7a4bd7b617848a58bed410d07cfdae2ac630c1a39cd7601

  • SSDEEP

    1536:RshfSWHHNvoLqNwDDGw02eQmh0HjWO/bl:GhfxHNIreQm+Hicbl

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Modifies system executable filetype association 2 TTPs 5 IoCs
  • Drops file in System32 directory 4 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies registry class 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 28 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0f8623d238c17d8cb9782fadb586093eff8b18a4e8983590262b2e4a1ab179a3.exe
    "C:\Users\Admin\AppData\Local\Temp\0f8623d238c17d8cb9782fadb586093eff8b18a4e8983590262b2e4a1ab179a3.exe"
    1⤵
    • Modifies system executable filetype association
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4952
    • C:\Windows\system\rundll32.exe
      C:\Windows\system\rundll32.exe
      2⤵
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:4536

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\notepad¢¬.exe

    Filesize

    74KB

    MD5

    b3d8f8b047d99f27ebd270ae6a2b3655

    SHA1

    9bda9a9ca292f2b10819662034953cd455696fde

    SHA256

    135ccf5074fbf0a88067b270c714ccfb1e15842361b0a5178a40d870e9887952

    SHA512

    c1e7137c2c2b160d1c33f6903ec29e3e44443a0010c5ab05b48a20be0e7ff5930133b8c4273eebaac0e0142c3fb3bf17699e6b39e005c40013d5b530c0661f63

  • C:\Windows\system\rundll32.exe

    Filesize

    74KB

    MD5

    544f7d9a9e23e8061c63f9c02a9466b1

    SHA1

    d95f756925cfc86286509a2b117b3ad71278f355

    SHA256

    bc63aeb68c69e4c8bfe25bc2d7e9991dd20b08c1a8ccdf77c710e17a5e65b8a1

    SHA512

    d8358b79ce32aee8526e0644b015ba7bfc9813512a51734d4f02bf6935f3734cdb4891a0d6b87f1e948b6580160f12b191234d63ee0cd607306f5b311967d715

  • memory/4952-0-0x0000000000400000-0x0000000000415A00-memory.dmp

    Filesize

    86KB

  • memory/4952-13-0x0000000000400000-0x0000000000415A00-memory.dmp

    Filesize

    86KB