Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 05:17
Static task
static1
Behavioral task
behavioral1
Sample
5510219bd5e48f7e36d15616bc1ae48096defb97df79944f7d6fafbf31e48742.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
5510219bd5e48f7e36d15616bc1ae48096defb97df79944f7d6fafbf31e48742.exe
Resource
win10v2004-20240508-en
General
-
Target
5510219bd5e48f7e36d15616bc1ae48096defb97df79944f7d6fafbf31e48742.exe
-
Size
84KB
-
MD5
7ee390f5e7b0cfb7c8c642f66c91a7c0
-
SHA1
4b3536ff664593ab504f9827dac835dc78b57784
-
SHA256
5510219bd5e48f7e36d15616bc1ae48096defb97df79944f7d6fafbf31e48742
-
SHA512
de70aa0f143446219a3c96e73f294b0e88751f6201111191a52ef4f931771ff63aec6f9253e286af40ae9a787d71f7d59d60157a2c4b2f23c914e385dc6dc4ee
-
SSDEEP
1536:RshfSWHHNvoLqNwDDGw02eQmh0HjWONOfNpKx4:GhfxHNIreQm+HiwOfNpKx4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2064 rundll32.exe -
Loads dropped DLL 2 IoCs
pid Process 2980 5510219bd5e48f7e36d15616bc1ae48096defb97df79944f7d6fafbf31e48742.exe 2980 5510219bd5e48f7e36d15616bc1ae48096defb97df79944f7d6fafbf31e48742.exe -
Modifies system executable filetype association 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command 5510219bd5e48f7e36d15616bc1ae48096defb97df79944f7d6fafbf31e48742.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 5510219bd5e48f7e36d15616bc1ae48096defb97df79944f7d6fafbf31e48742.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" 5510219bd5e48f7e36d15616bc1ae48096defb97df79944f7d6fafbf31e48742.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\¢«.exe 5510219bd5e48f7e36d15616bc1ae48096defb97df79944f7d6fafbf31e48742.exe File created C:\Windows\SysWOW64\¢«.exe 5510219bd5e48f7e36d15616bc1ae48096defb97df79944f7d6fafbf31e48742.exe File opened for modification C:\Windows\SysWOW64\notepad¢¬.exe 5510219bd5e48f7e36d15616bc1ae48096defb97df79944f7d6fafbf31e48742.exe File created C:\Windows\SysWOW64\notepad¢¬.exe 5510219bd5e48f7e36d15616bc1ae48096defb97df79944f7d6fafbf31e48742.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\system\rundll32.exe 5510219bd5e48f7e36d15616bc1ae48096defb97df79944f7d6fafbf31e48742.exe File opened for modification C:\Windows\system\rundll32.exe 5510219bd5e48f7e36d15616bc1ae48096defb97df79944f7d6fafbf31e48742.exe -
Modifies registry class 15 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" 5510219bd5e48f7e36d15616bc1ae48096defb97df79944f7d6fafbf31e48742.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" 5510219bd5e48f7e36d15616bc1ae48096defb97df79944f7d6fafbf31e48742.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command 5510219bd5e48f7e36d15616bc1ae48096defb97df79944f7d6fafbf31e48742.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainUp = "1716268675" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainVer = "506" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\MSipv 5510219bd5e48f7e36d15616bc1ae48096defb97df79944f7d6fafbf31e48742.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command 5510219bd5e48f7e36d15616bc1ae48096defb97df79944f7d6fafbf31e48742.exe Key created \REGISTRY\MACHINE\Software\Classes\MSipv rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 5510219bd5e48f7e36d15616bc1ae48096defb97df79944f7d6fafbf31e48742.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad.exe %1" 5510219bd5e48f7e36d15616bc1ae48096defb97df79944f7d6fafbf31e48742.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainSetup = "1716268675" rundll32.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2980 5510219bd5e48f7e36d15616bc1ae48096defb97df79944f7d6fafbf31e48742.exe 2980 5510219bd5e48f7e36d15616bc1ae48096defb97df79944f7d6fafbf31e48742.exe 2980 5510219bd5e48f7e36d15616bc1ae48096defb97df79944f7d6fafbf31e48742.exe 2980 5510219bd5e48f7e36d15616bc1ae48096defb97df79944f7d6fafbf31e48742.exe 2980 5510219bd5e48f7e36d15616bc1ae48096defb97df79944f7d6fafbf31e48742.exe 2980 5510219bd5e48f7e36d15616bc1ae48096defb97df79944f7d6fafbf31e48742.exe 2980 5510219bd5e48f7e36d15616bc1ae48096defb97df79944f7d6fafbf31e48742.exe 2980 5510219bd5e48f7e36d15616bc1ae48096defb97df79944f7d6fafbf31e48742.exe 2980 5510219bd5e48f7e36d15616bc1ae48096defb97df79944f7d6fafbf31e48742.exe 2980 5510219bd5e48f7e36d15616bc1ae48096defb97df79944f7d6fafbf31e48742.exe 2980 5510219bd5e48f7e36d15616bc1ae48096defb97df79944f7d6fafbf31e48742.exe 2980 5510219bd5e48f7e36d15616bc1ae48096defb97df79944f7d6fafbf31e48742.exe 2980 5510219bd5e48f7e36d15616bc1ae48096defb97df79944f7d6fafbf31e48742.exe 2980 5510219bd5e48f7e36d15616bc1ae48096defb97df79944f7d6fafbf31e48742.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2064 rundll32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2980 5510219bd5e48f7e36d15616bc1ae48096defb97df79944f7d6fafbf31e48742.exe 2064 rundll32.exe 2064 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2980 wrote to memory of 2064 2980 5510219bd5e48f7e36d15616bc1ae48096defb97df79944f7d6fafbf31e48742.exe 28 PID 2980 wrote to memory of 2064 2980 5510219bd5e48f7e36d15616bc1ae48096defb97df79944f7d6fafbf31e48742.exe 28 PID 2980 wrote to memory of 2064 2980 5510219bd5e48f7e36d15616bc1ae48096defb97df79944f7d6fafbf31e48742.exe 28 PID 2980 wrote to memory of 2064 2980 5510219bd5e48f7e36d15616bc1ae48096defb97df79944f7d6fafbf31e48742.exe 28 PID 2980 wrote to memory of 2064 2980 5510219bd5e48f7e36d15616bc1ae48096defb97df79944f7d6fafbf31e48742.exe 28 PID 2980 wrote to memory of 2064 2980 5510219bd5e48f7e36d15616bc1ae48096defb97df79944f7d6fafbf31e48742.exe 28 PID 2980 wrote to memory of 2064 2980 5510219bd5e48f7e36d15616bc1ae48096defb97df79944f7d6fafbf31e48742.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\5510219bd5e48f7e36d15616bc1ae48096defb97df79944f7d6fafbf31e48742.exe"C:\Users\Admin\AppData\Local\Temp\5510219bd5e48f7e36d15616bc1ae48096defb97df79944f7d6fafbf31e48742.exe"1⤵
- Loads dropped DLL
- Modifies system executable filetype association
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Windows\system\rundll32.exeC:\Windows\system\rundll32.exe2⤵
- Executes dropped EXE
- Modifies system executable filetype association
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2064
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
79KB
MD5950003f14f5a1557020bc99d1d4d3906
SHA141101c32ac8a9b6ba6e7528176f105d7d2b8562f
SHA256d77eecb4c6450248cf6f195d4546fd9d77910195587216c474bfb014b97e188c
SHA512ddc3fa06c117d89166e4c5d818e8c838a4631f9c9c671c37c37f0ae8816d697de465dd9ab7897f7bb73251b87bb911878e0fcba5dce7f7869b52519ffaf34d40
-
Filesize
77KB
MD5060d195e55dee142e33ce6bad733f1ef
SHA137d7c63f2d14a28d57533cccbb83e57e0a64ce30
SHA256ab4840927f231e0fae0a11e1bce1e3d63dba00b6c67059034242dfa7cb290e29
SHA512f6418710acaedfd663483ef25b152c2e90baf0f0621062e5c7c4035f07eba5f9b54b0036ae86cd32b165606a5ace840f0b1c102be481dc8c6df625ad112bdaab