Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
20/05/2024, 18:25
Static task
static1
Behavioral task
behavioral1
Sample
0f8623d238c17d8cb9782fadb586093eff8b18a4e8983590262b2e4a1ab179a3.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0f8623d238c17d8cb9782fadb586093eff8b18a4e8983590262b2e4a1ab179a3.exe
Resource
win10v2004-20240426-en
General
-
Target
0f8623d238c17d8cb9782fadb586093eff8b18a4e8983590262b2e4a1ab179a3.exe
-
Size
75KB
-
MD5
0d1ecb483514c9d8f9e79874d7b60c9c
-
SHA1
144790971a3f1e55f3a004dc1c19b83eae2e191e
-
SHA256
0f8623d238c17d8cb9782fadb586093eff8b18a4e8983590262b2e4a1ab179a3
-
SHA512
f130266a7490fda7124666694f0ddf1e06cc289a639484ce245cb9593fb43f77641ff6c59cd57e47d7a4bd7b617848a58bed410d07cfdae2ac630c1a39cd7601
-
SSDEEP
1536:RshfSWHHNvoLqNwDDGw02eQmh0HjWO/bl:GhfxHNIreQm+Hicbl
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4536 rundll32.exe -
Modifies system executable filetype association 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command 0f8623d238c17d8cb9782fadb586093eff8b18a4e8983590262b2e4a1ab179a3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 0f8623d238c17d8cb9782fadb586093eff8b18a4e8983590262b2e4a1ab179a3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" 0f8623d238c17d8cb9782fadb586093eff8b18a4e8983590262b2e4a1ab179a3.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\notepad¢¬.exe 0f8623d238c17d8cb9782fadb586093eff8b18a4e8983590262b2e4a1ab179a3.exe File opened for modification C:\Windows\SysWOW64\¢«.exe 0f8623d238c17d8cb9782fadb586093eff8b18a4e8983590262b2e4a1ab179a3.exe File created C:\Windows\SysWOW64\¢«.exe 0f8623d238c17d8cb9782fadb586093eff8b18a4e8983590262b2e4a1ab179a3.exe File opened for modification C:\Windows\SysWOW64\notepad¢¬.exe 0f8623d238c17d8cb9782fadb586093eff8b18a4e8983590262b2e4a1ab179a3.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\system\rundll32.exe 0f8623d238c17d8cb9782fadb586093eff8b18a4e8983590262b2e4a1ab179a3.exe File opened for modification C:\Windows\system\rundll32.exe 0f8623d238c17d8cb9782fadb586093eff8b18a4e8983590262b2e4a1ab179a3.exe -
Modifies registry class 15 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command 0f8623d238c17d8cb9782fadb586093eff8b18a4e8983590262b2e4a1ab179a3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" 0f8623d238c17d8cb9782fadb586093eff8b18a4e8983590262b2e4a1ab179a3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" 0f8623d238c17d8cb9782fadb586093eff8b18a4e8983590262b2e4a1ab179a3.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainVer = "506" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command 0f8623d238c17d8cb9782fadb586093eff8b18a4e8983590262b2e4a1ab179a3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainSetup = "1716229533" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\MSipv 0f8623d238c17d8cb9782fadb586093eff8b18a4e8983590262b2e4a1ab179a3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 0f8623d238c17d8cb9782fadb586093eff8b18a4e8983590262b2e4a1ab179a3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad.exe %1" 0f8623d238c17d8cb9782fadb586093eff8b18a4e8983590262b2e4a1ab179a3.exe Key created \REGISTRY\MACHINE\Software\Classes\MSipv rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainUp = "1716229533" rundll32.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 4952 0f8623d238c17d8cb9782fadb586093eff8b18a4e8983590262b2e4a1ab179a3.exe 4952 0f8623d238c17d8cb9782fadb586093eff8b18a4e8983590262b2e4a1ab179a3.exe 4952 0f8623d238c17d8cb9782fadb586093eff8b18a4e8983590262b2e4a1ab179a3.exe 4952 0f8623d238c17d8cb9782fadb586093eff8b18a4e8983590262b2e4a1ab179a3.exe 4952 0f8623d238c17d8cb9782fadb586093eff8b18a4e8983590262b2e4a1ab179a3.exe 4952 0f8623d238c17d8cb9782fadb586093eff8b18a4e8983590262b2e4a1ab179a3.exe 4952 0f8623d238c17d8cb9782fadb586093eff8b18a4e8983590262b2e4a1ab179a3.exe 4952 0f8623d238c17d8cb9782fadb586093eff8b18a4e8983590262b2e4a1ab179a3.exe 4952 0f8623d238c17d8cb9782fadb586093eff8b18a4e8983590262b2e4a1ab179a3.exe 4952 0f8623d238c17d8cb9782fadb586093eff8b18a4e8983590262b2e4a1ab179a3.exe 4952 0f8623d238c17d8cb9782fadb586093eff8b18a4e8983590262b2e4a1ab179a3.exe 4952 0f8623d238c17d8cb9782fadb586093eff8b18a4e8983590262b2e4a1ab179a3.exe 4952 0f8623d238c17d8cb9782fadb586093eff8b18a4e8983590262b2e4a1ab179a3.exe 4952 0f8623d238c17d8cb9782fadb586093eff8b18a4e8983590262b2e4a1ab179a3.exe 4952 0f8623d238c17d8cb9782fadb586093eff8b18a4e8983590262b2e4a1ab179a3.exe 4952 0f8623d238c17d8cb9782fadb586093eff8b18a4e8983590262b2e4a1ab179a3.exe 4952 0f8623d238c17d8cb9782fadb586093eff8b18a4e8983590262b2e4a1ab179a3.exe 4952 0f8623d238c17d8cb9782fadb586093eff8b18a4e8983590262b2e4a1ab179a3.exe 4952 0f8623d238c17d8cb9782fadb586093eff8b18a4e8983590262b2e4a1ab179a3.exe 4952 0f8623d238c17d8cb9782fadb586093eff8b18a4e8983590262b2e4a1ab179a3.exe 4952 0f8623d238c17d8cb9782fadb586093eff8b18a4e8983590262b2e4a1ab179a3.exe 4952 0f8623d238c17d8cb9782fadb586093eff8b18a4e8983590262b2e4a1ab179a3.exe 4952 0f8623d238c17d8cb9782fadb586093eff8b18a4e8983590262b2e4a1ab179a3.exe 4952 0f8623d238c17d8cb9782fadb586093eff8b18a4e8983590262b2e4a1ab179a3.exe 4952 0f8623d238c17d8cb9782fadb586093eff8b18a4e8983590262b2e4a1ab179a3.exe 4952 0f8623d238c17d8cb9782fadb586093eff8b18a4e8983590262b2e4a1ab179a3.exe 4952 0f8623d238c17d8cb9782fadb586093eff8b18a4e8983590262b2e4a1ab179a3.exe 4952 0f8623d238c17d8cb9782fadb586093eff8b18a4e8983590262b2e4a1ab179a3.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4536 rundll32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4952 0f8623d238c17d8cb9782fadb586093eff8b18a4e8983590262b2e4a1ab179a3.exe 4536 rundll32.exe 4536 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4952 wrote to memory of 4536 4952 0f8623d238c17d8cb9782fadb586093eff8b18a4e8983590262b2e4a1ab179a3.exe 87 PID 4952 wrote to memory of 4536 4952 0f8623d238c17d8cb9782fadb586093eff8b18a4e8983590262b2e4a1ab179a3.exe 87 PID 4952 wrote to memory of 4536 4952 0f8623d238c17d8cb9782fadb586093eff8b18a4e8983590262b2e4a1ab179a3.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\0f8623d238c17d8cb9782fadb586093eff8b18a4e8983590262b2e4a1ab179a3.exe"C:\Users\Admin\AppData\Local\Temp\0f8623d238c17d8cb9782fadb586093eff8b18a4e8983590262b2e4a1ab179a3.exe"1⤵
- Modifies system executable filetype association
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Windows\system\rundll32.exeC:\Windows\system\rundll32.exe2⤵
- Executes dropped EXE
- Modifies system executable filetype association
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:4536
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74KB
MD5b3d8f8b047d99f27ebd270ae6a2b3655
SHA19bda9a9ca292f2b10819662034953cd455696fde
SHA256135ccf5074fbf0a88067b270c714ccfb1e15842361b0a5178a40d870e9887952
SHA512c1e7137c2c2b160d1c33f6903ec29e3e44443a0010c5ab05b48a20be0e7ff5930133b8c4273eebaac0e0142c3fb3bf17699e6b39e005c40013d5b530c0661f63
-
Filesize
74KB
MD5544f7d9a9e23e8061c63f9c02a9466b1
SHA1d95f756925cfc86286509a2b117b3ad71278f355
SHA256bc63aeb68c69e4c8bfe25bc2d7e9991dd20b08c1a8ccdf77c710e17a5e65b8a1
SHA512d8358b79ce32aee8526e0644b015ba7bfc9813512a51734d4f02bf6935f3734cdb4891a0d6b87f1e948b6580160f12b191234d63ee0cd607306f5b311967d715