Analysis
-
max time kernel
150s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 14:17
Static task
static1
Behavioral task
behavioral1
Sample
e49235e6052b75ed46dba5c4359028a90a445e37aab52e5725fe5d005dafe57c.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e49235e6052b75ed46dba5c4359028a90a445e37aab52e5725fe5d005dafe57c.exe
Resource
win10v2004-20240508-en
General
-
Target
e49235e6052b75ed46dba5c4359028a90a445e37aab52e5725fe5d005dafe57c.exe
-
Size
78KB
-
MD5
a7d61ab6c655d8bfb5d9804d6a010dd2
-
SHA1
eecedf39de8c1c73059b56d8e4df651f771a634d
-
SHA256
e49235e6052b75ed46dba5c4359028a90a445e37aab52e5725fe5d005dafe57c
-
SHA512
7061b1615557815eebf94c621a7e7916c26e11c1b384ddd5c452b8e0fa675f4e4d2a13f327616012aed44eb23b835d49f2457b26b4fa7914bd4efb397d0e3e04
-
SSDEEP
768:agO5xRYi+SfSWHHNvvG5bnl/NqNwsKVDstHxYD0p1aXKynF0vQmYZS0HdJnfWOt2:RshfSWHHNvoLqNwDDGw02eQmh0HjWOQ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
rundll32.exepid process 1560 rundll32.exe -
Modifies system executable filetype association 2 TTPs 5 IoCs
Processes:
e49235e6052b75ed46dba5c4359028a90a445e37aab52e5725fe5d005dafe57c.exerundll32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" e49235e6052b75ed46dba5c4359028a90a445e37aab52e5725fe5d005dafe57c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" e49235e6052b75ed46dba5c4359028a90a445e37aab52e5725fe5d005dafe57c.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command e49235e6052b75ed46dba5c4359028a90a445e37aab52e5725fe5d005dafe57c.exe -
Drops file in System32 directory 4 IoCs
Processes:
e49235e6052b75ed46dba5c4359028a90a445e37aab52e5725fe5d005dafe57c.exedescription ioc process File created C:\Windows\SysWOW64\notepad¢¬.exe e49235e6052b75ed46dba5c4359028a90a445e37aab52e5725fe5d005dafe57c.exe File opened for modification C:\Windows\SysWOW64\¢«.exe e49235e6052b75ed46dba5c4359028a90a445e37aab52e5725fe5d005dafe57c.exe File created C:\Windows\SysWOW64\¢«.exe e49235e6052b75ed46dba5c4359028a90a445e37aab52e5725fe5d005dafe57c.exe File opened for modification C:\Windows\SysWOW64\notepad¢¬.exe e49235e6052b75ed46dba5c4359028a90a445e37aab52e5725fe5d005dafe57c.exe -
Drops file in Windows directory 2 IoCs
Processes:
e49235e6052b75ed46dba5c4359028a90a445e37aab52e5725fe5d005dafe57c.exedescription ioc process File opened for modification C:\Windows\system\rundll32.exe e49235e6052b75ed46dba5c4359028a90a445e37aab52e5725fe5d005dafe57c.exe File created C:\Windows\system\rundll32.exe e49235e6052b75ed46dba5c4359028a90a445e37aab52e5725fe5d005dafe57c.exe -
Modifies registry class 15 IoCs
Processes:
rundll32.exee49235e6052b75ed46dba5c4359028a90a445e37aab52e5725fe5d005dafe57c.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainSetup = "1716301079" rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainUp = "1716301079" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command e49235e6052b75ed46dba5c4359028a90a445e37aab52e5725fe5d005dafe57c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" e49235e6052b75ed46dba5c4359028a90a445e37aab52e5725fe5d005dafe57c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" e49235e6052b75ed46dba5c4359028a90a445e37aab52e5725fe5d005dafe57c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" e49235e6052b75ed46dba5c4359028a90a445e37aab52e5725fe5d005dafe57c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainVer = "506" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\MSipv e49235e6052b75ed46dba5c4359028a90a445e37aab52e5725fe5d005dafe57c.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command e49235e6052b75ed46dba5c4359028a90a445e37aab52e5725fe5d005dafe57c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad.exe %1" e49235e6052b75ed46dba5c4359028a90a445e37aab52e5725fe5d005dafe57c.exe Key created \REGISTRY\MACHINE\Software\Classes\MSipv rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command rundll32.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
Processes:
e49235e6052b75ed46dba5c4359028a90a445e37aab52e5725fe5d005dafe57c.exepid process 4116 e49235e6052b75ed46dba5c4359028a90a445e37aab52e5725fe5d005dafe57c.exe 4116 e49235e6052b75ed46dba5c4359028a90a445e37aab52e5725fe5d005dafe57c.exe 4116 e49235e6052b75ed46dba5c4359028a90a445e37aab52e5725fe5d005dafe57c.exe 4116 e49235e6052b75ed46dba5c4359028a90a445e37aab52e5725fe5d005dafe57c.exe 4116 e49235e6052b75ed46dba5c4359028a90a445e37aab52e5725fe5d005dafe57c.exe 4116 e49235e6052b75ed46dba5c4359028a90a445e37aab52e5725fe5d005dafe57c.exe 4116 e49235e6052b75ed46dba5c4359028a90a445e37aab52e5725fe5d005dafe57c.exe 4116 e49235e6052b75ed46dba5c4359028a90a445e37aab52e5725fe5d005dafe57c.exe 4116 e49235e6052b75ed46dba5c4359028a90a445e37aab52e5725fe5d005dafe57c.exe 4116 e49235e6052b75ed46dba5c4359028a90a445e37aab52e5725fe5d005dafe57c.exe 4116 e49235e6052b75ed46dba5c4359028a90a445e37aab52e5725fe5d005dafe57c.exe 4116 e49235e6052b75ed46dba5c4359028a90a445e37aab52e5725fe5d005dafe57c.exe 4116 e49235e6052b75ed46dba5c4359028a90a445e37aab52e5725fe5d005dafe57c.exe 4116 e49235e6052b75ed46dba5c4359028a90a445e37aab52e5725fe5d005dafe57c.exe 4116 e49235e6052b75ed46dba5c4359028a90a445e37aab52e5725fe5d005dafe57c.exe 4116 e49235e6052b75ed46dba5c4359028a90a445e37aab52e5725fe5d005dafe57c.exe 4116 e49235e6052b75ed46dba5c4359028a90a445e37aab52e5725fe5d005dafe57c.exe 4116 e49235e6052b75ed46dba5c4359028a90a445e37aab52e5725fe5d005dafe57c.exe 4116 e49235e6052b75ed46dba5c4359028a90a445e37aab52e5725fe5d005dafe57c.exe 4116 e49235e6052b75ed46dba5c4359028a90a445e37aab52e5725fe5d005dafe57c.exe 4116 e49235e6052b75ed46dba5c4359028a90a445e37aab52e5725fe5d005dafe57c.exe 4116 e49235e6052b75ed46dba5c4359028a90a445e37aab52e5725fe5d005dafe57c.exe 4116 e49235e6052b75ed46dba5c4359028a90a445e37aab52e5725fe5d005dafe57c.exe 4116 e49235e6052b75ed46dba5c4359028a90a445e37aab52e5725fe5d005dafe57c.exe 4116 e49235e6052b75ed46dba5c4359028a90a445e37aab52e5725fe5d005dafe57c.exe 4116 e49235e6052b75ed46dba5c4359028a90a445e37aab52e5725fe5d005dafe57c.exe 4116 e49235e6052b75ed46dba5c4359028a90a445e37aab52e5725fe5d005dafe57c.exe 4116 e49235e6052b75ed46dba5c4359028a90a445e37aab52e5725fe5d005dafe57c.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
rundll32.exepid process 1560 rundll32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
e49235e6052b75ed46dba5c4359028a90a445e37aab52e5725fe5d005dafe57c.exerundll32.exepid process 4116 e49235e6052b75ed46dba5c4359028a90a445e37aab52e5725fe5d005dafe57c.exe 1560 rundll32.exe 1560 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
e49235e6052b75ed46dba5c4359028a90a445e37aab52e5725fe5d005dafe57c.exedescription pid process target process PID 4116 wrote to memory of 1560 4116 e49235e6052b75ed46dba5c4359028a90a445e37aab52e5725fe5d005dafe57c.exe rundll32.exe PID 4116 wrote to memory of 1560 4116 e49235e6052b75ed46dba5c4359028a90a445e37aab52e5725fe5d005dafe57c.exe rundll32.exe PID 4116 wrote to memory of 1560 4116 e49235e6052b75ed46dba5c4359028a90a445e37aab52e5725fe5d005dafe57c.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e49235e6052b75ed46dba5c4359028a90a445e37aab52e5725fe5d005dafe57c.exe"C:\Users\Admin\AppData\Local\Temp\e49235e6052b75ed46dba5c4359028a90a445e37aab52e5725fe5d005dafe57c.exe"1⤵
- Modifies system executable filetype association
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4116 -
C:\Windows\system\rundll32.exeC:\Windows\system\rundll32.exe2⤵
- Executes dropped EXE
- Modifies system executable filetype association
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4200,i,13035806169561352434,1332896185314862791,262144 --variations-seed-version --mojo-platform-channel-handle=4240 /prefetch:81⤵PID:3328
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76KB
MD5e2f6fef4b4be043e96b1ee9c3d1e3995
SHA12098595764cdd0f393e09d15e1aaa66bfc9bb58b
SHA25680a28d4525cae155813fbd616c756463166ef908644b19d2dfcdfc3c8a5c25f8
SHA51272c2e2633468359e6c61e2936e7a713b519be960696cacdd6ce74169a1c9cc5316f6eecf6c6212a44aecd5321875a90ace8c6a89df52b166236fd292a3a1519a
-
Filesize
80KB
MD5f620335d307c7af46c764b5a8aa0029f
SHA1cba433a750fc5f65fef6e5ca778fcdcff41c6d68
SHA2562b9f579ff94150ba209d9569e10ccf47c0b0b21bfbaa7603a34eaa6f4f517cee
SHA512a48090d9f28270aef3e85e4e12b8dd48008a3ef6a09e28584140049208168545f8d1e45b16e9bce5193bf7b11fccbfd21425b4a3a924481618ebd4f276fbfd4d