Analysis
-
max time kernel
149s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23/05/2024, 05:12
Static task
static1
Behavioral task
behavioral1
Sample
d4b7bc7bbd162b0659d6caf32bd3ace1160f229e0ef554e43c2cb7904f2ba996.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
d4b7bc7bbd162b0659d6caf32bd3ace1160f229e0ef554e43c2cb7904f2ba996.exe
Resource
win10v2004-20240508-en
General
-
Target
d4b7bc7bbd162b0659d6caf32bd3ace1160f229e0ef554e43c2cb7904f2ba996.exe
-
Size
82KB
-
MD5
ee4d0f0e340f1d4272f3c72c3c2c799e
-
SHA1
284cfe2aa44ceb79d07ed4e7acf451c615bf1631
-
SHA256
d4b7bc7bbd162b0659d6caf32bd3ace1160f229e0ef554e43c2cb7904f2ba996
-
SHA512
db864a92171fb6b6650518bbe1f09b8d082cc6c79c0bb576824b811691e3971cd1ce7e86f3ba1b415d759a30d35f0cd5182e5dc3a03fca5a4523276ff55b49e5
-
SSDEEP
1536:RshfSWHHNvoLqNwDDGw02eQmh0HjWOy4FMc:GhfxHNIreQm+HiB4FM
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1744 rundll32.exe -
Modifies system executable filetype association 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" d4b7bc7bbd162b0659d6caf32bd3ace1160f229e0ef554e43c2cb7904f2ba996.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command d4b7bc7bbd162b0659d6caf32bd3ace1160f229e0ef554e43c2cb7904f2ba996.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" d4b7bc7bbd162b0659d6caf32bd3ace1160f229e0ef554e43c2cb7904f2ba996.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\¢«.exe d4b7bc7bbd162b0659d6caf32bd3ace1160f229e0ef554e43c2cb7904f2ba996.exe File created C:\Windows\SysWOW64\¢«.exe d4b7bc7bbd162b0659d6caf32bd3ace1160f229e0ef554e43c2cb7904f2ba996.exe File opened for modification C:\Windows\SysWOW64\notepad¢¬.exe d4b7bc7bbd162b0659d6caf32bd3ace1160f229e0ef554e43c2cb7904f2ba996.exe File created C:\Windows\SysWOW64\notepad¢¬.exe d4b7bc7bbd162b0659d6caf32bd3ace1160f229e0ef554e43c2cb7904f2ba996.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system\rundll32.exe d4b7bc7bbd162b0659d6caf32bd3ace1160f229e0ef554e43c2cb7904f2ba996.exe File created C:\Windows\system\rundll32.exe d4b7bc7bbd162b0659d6caf32bd3ace1160f229e0ef554e43c2cb7904f2ba996.exe -
Modifies registry class 15 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\MSipv d4b7bc7bbd162b0659d6caf32bd3ace1160f229e0ef554e43c2cb7904f2ba996.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command d4b7bc7bbd162b0659d6caf32bd3ace1160f229e0ef554e43c2cb7904f2ba996.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" d4b7bc7bbd162b0659d6caf32bd3ace1160f229e0ef554e43c2cb7904f2ba996.exe Key created \REGISTRY\MACHINE\Software\Classes\MSipv rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainSetup = "1716441142" rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainVer = "506" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" d4b7bc7bbd162b0659d6caf32bd3ace1160f229e0ef554e43c2cb7904f2ba996.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad.exe %1" d4b7bc7bbd162b0659d6caf32bd3ace1160f229e0ef554e43c2cb7904f2ba996.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" d4b7bc7bbd162b0659d6caf32bd3ace1160f229e0ef554e43c2cb7904f2ba996.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainUp = "1716441142" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command d4b7bc7bbd162b0659d6caf32bd3ace1160f229e0ef554e43c2cb7904f2ba996.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" rundll32.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 228 d4b7bc7bbd162b0659d6caf32bd3ace1160f229e0ef554e43c2cb7904f2ba996.exe 228 d4b7bc7bbd162b0659d6caf32bd3ace1160f229e0ef554e43c2cb7904f2ba996.exe 228 d4b7bc7bbd162b0659d6caf32bd3ace1160f229e0ef554e43c2cb7904f2ba996.exe 228 d4b7bc7bbd162b0659d6caf32bd3ace1160f229e0ef554e43c2cb7904f2ba996.exe 228 d4b7bc7bbd162b0659d6caf32bd3ace1160f229e0ef554e43c2cb7904f2ba996.exe 228 d4b7bc7bbd162b0659d6caf32bd3ace1160f229e0ef554e43c2cb7904f2ba996.exe 228 d4b7bc7bbd162b0659d6caf32bd3ace1160f229e0ef554e43c2cb7904f2ba996.exe 228 d4b7bc7bbd162b0659d6caf32bd3ace1160f229e0ef554e43c2cb7904f2ba996.exe 228 d4b7bc7bbd162b0659d6caf32bd3ace1160f229e0ef554e43c2cb7904f2ba996.exe 228 d4b7bc7bbd162b0659d6caf32bd3ace1160f229e0ef554e43c2cb7904f2ba996.exe 228 d4b7bc7bbd162b0659d6caf32bd3ace1160f229e0ef554e43c2cb7904f2ba996.exe 228 d4b7bc7bbd162b0659d6caf32bd3ace1160f229e0ef554e43c2cb7904f2ba996.exe 228 d4b7bc7bbd162b0659d6caf32bd3ace1160f229e0ef554e43c2cb7904f2ba996.exe 228 d4b7bc7bbd162b0659d6caf32bd3ace1160f229e0ef554e43c2cb7904f2ba996.exe 228 d4b7bc7bbd162b0659d6caf32bd3ace1160f229e0ef554e43c2cb7904f2ba996.exe 228 d4b7bc7bbd162b0659d6caf32bd3ace1160f229e0ef554e43c2cb7904f2ba996.exe 228 d4b7bc7bbd162b0659d6caf32bd3ace1160f229e0ef554e43c2cb7904f2ba996.exe 228 d4b7bc7bbd162b0659d6caf32bd3ace1160f229e0ef554e43c2cb7904f2ba996.exe 228 d4b7bc7bbd162b0659d6caf32bd3ace1160f229e0ef554e43c2cb7904f2ba996.exe 228 d4b7bc7bbd162b0659d6caf32bd3ace1160f229e0ef554e43c2cb7904f2ba996.exe 228 d4b7bc7bbd162b0659d6caf32bd3ace1160f229e0ef554e43c2cb7904f2ba996.exe 228 d4b7bc7bbd162b0659d6caf32bd3ace1160f229e0ef554e43c2cb7904f2ba996.exe 228 d4b7bc7bbd162b0659d6caf32bd3ace1160f229e0ef554e43c2cb7904f2ba996.exe 228 d4b7bc7bbd162b0659d6caf32bd3ace1160f229e0ef554e43c2cb7904f2ba996.exe 228 d4b7bc7bbd162b0659d6caf32bd3ace1160f229e0ef554e43c2cb7904f2ba996.exe 228 d4b7bc7bbd162b0659d6caf32bd3ace1160f229e0ef554e43c2cb7904f2ba996.exe 228 d4b7bc7bbd162b0659d6caf32bd3ace1160f229e0ef554e43c2cb7904f2ba996.exe 228 d4b7bc7bbd162b0659d6caf32bd3ace1160f229e0ef554e43c2cb7904f2ba996.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1744 rundll32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 228 d4b7bc7bbd162b0659d6caf32bd3ace1160f229e0ef554e43c2cb7904f2ba996.exe 1744 rundll32.exe 1744 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 228 wrote to memory of 1744 228 d4b7bc7bbd162b0659d6caf32bd3ace1160f229e0ef554e43c2cb7904f2ba996.exe 86 PID 228 wrote to memory of 1744 228 d4b7bc7bbd162b0659d6caf32bd3ace1160f229e0ef554e43c2cb7904f2ba996.exe 86 PID 228 wrote to memory of 1744 228 d4b7bc7bbd162b0659d6caf32bd3ace1160f229e0ef554e43c2cb7904f2ba996.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\d4b7bc7bbd162b0659d6caf32bd3ace1160f229e0ef554e43c2cb7904f2ba996.exe"C:\Users\Admin\AppData\Local\Temp\d4b7bc7bbd162b0659d6caf32bd3ace1160f229e0ef554e43c2cb7904f2ba996.exe"1⤵
- Modifies system executable filetype association
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Windows\system\rundll32.exeC:\Windows\system\rundll32.exe2⤵
- Executes dropped EXE
- Modifies system executable filetype association
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1744
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD50b4506c21c490fd20f01c5c4df45092c
SHA1ad9e0f359ceb3440ce0e4541415b816b2b18690f
SHA256896a3b3c7b3c8ca884c59ac18d46de1da8e676790a8921d7f1711f04ad284195
SHA51201385dd1890fc043cc45ff7405272864db19b808ff81af5820e1a93ac9c9632c724ec0ae3f2227b8d673fe4cbc829d8e7f0a38ff610835a5303d96d7fa11eb98
-
Filesize
79KB
MD597bded5bf4a77886546984e061229f39
SHA19da8d157398c1e1ca7d3b9afa191c72b40926f16
SHA25678d108464cb0ff6ec0a6d616b8d2dba6fdf9601146d72ad31610fffdc909fd2b
SHA512eb8961d9ae1ebd74e36ae61e06955208d32a4068d36bee41ba11f563a523004ab1ec7ec3c3891f079fd44d28f63521ff3989c77872aac0a817d322a6bdc61ffb