Analysis

  • max time kernel
    149s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-05-2024 02:32

General

  • Target

    bc80481e94a11a1f646b77948158a7407338fb1485ecffbeae32a1084d20f923.exe

  • Size

    82KB

  • MD5

    65fa62a3380c2ce042a21132f8ca8ba3

  • SHA1

    09aa217ab7d85e2e72784a87b7b674556f3005d1

  • SHA256

    bc80481e94a11a1f646b77948158a7407338fb1485ecffbeae32a1084d20f923

  • SHA512

    7d9e886de557dc19c9d70961fb094ad8e1ee035dce57d3e722a89da01091e8c2bc26fe71a9009081a26c2b1a5f5e49c929c3bb7212ed00af2e7e1cc19d26ffe3

  • SSDEEP

    1536:RshfSWHHNvoLqNwDDGw02eQmh0HjWO4BKyRTL:GhfxHNIreQm+HiHBKyRTL

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Modifies system executable filetype association 2 TTPs 5 IoCs
  • Drops file in System32 directory 4 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies registry class 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 28 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bc80481e94a11a1f646b77948158a7407338fb1485ecffbeae32a1084d20f923.exe
    "C:\Users\Admin\AppData\Local\Temp\bc80481e94a11a1f646b77948158a7407338fb1485ecffbeae32a1084d20f923.exe"
    1⤵
    • Modifies system executable filetype association
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:740
    • C:\Windows\system\rundll32.exe
      C:\Windows\system\rundll32.exe
      2⤵
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:4204

Network

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Event Triggered Execution

1
T1546

Change Default File Association

1
T1546.001

Privilege Escalation

Event Triggered Execution

1
T1546

Change Default File Association

1
T1546.001

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\notepad¢¬.exe
    Filesize

    77KB

    MD5

    495e7e1bd32dfd8286509864437f5b38

    SHA1

    f2e612485d62f0295e649aad5375ea6dd05b98ed

    SHA256

    7f64fc521808c574d6395eda8b228f6168f9bbd56c42aca2bc457696b1488c74

    SHA512

    75d27b6c39b40726d996b57a68fa40c064893596372875d5af3cf70c0d6e3603b8251dd9ccd85d81d70abbfea014dcebc7a4fc11d68d110181a30f6fb3091cb5

  • C:\Windows\system\rundll32.exe
    Filesize

    74KB

    MD5

    075c6c0e0c66c62934d98ceb528295ea

    SHA1

    fb61bcd15aabaf151074d1302f79b12097308958

    SHA256

    f8aa534b66cba7ec0c16d9178aac0d6921eadce4bbcca392d075470371994c9b

    SHA512

    29f64271f98d6d212d3fd5c0886bef3ff0e0abdc0bd7af1fb12bbfa5a91c51125c1083810d990b0ee5a639bb22b38f370b4b7c66d13488056c7afa417f7d31db

  • memory/740-0-0x0000000000400000-0x0000000000415A00-memory.dmp
    Filesize

    86KB

  • memory/740-14-0x0000000000400000-0x0000000000415A00-memory.dmp
    Filesize

    86KB

  • memory/4204-13-0x0000000000400000-0x0000000000415A00-memory.dmp
    Filesize

    86KB