Analysis

  • max time kernel
    150s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    24-05-2024 03:05

General

  • Target

    b1f2fcaff038e4ad2b718d3b4c07f7744c103490fb6b2f849f40b7024db38c00.exe

  • Size

    74KB

  • MD5

    74d7170d8b910ae2e2453337fdee45b5

  • SHA1

    42bd70ccffd224630d2b04b82a7df33053a8613a

  • SHA256

    b1f2fcaff038e4ad2b718d3b4c07f7744c103490fb6b2f849f40b7024db38c00

  • SHA512

    9c9494a2f08954909a89c58be0c96d57c35b3dc4e2831d8ae6028da526c015000aff3363e102eae4122faa55fa84ce5aab7a726f64678f9123ff63af142bbefc

  • SSDEEP

    768:agO5xRYi+SfSWHHNvvG5bnl/NqNwsKVDstHxYD0p1aXKynF0vQmYZS0HdJnfWO:RshfSWHHNvoLqNwDDGw02eQmh0HjWO

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Modifies system executable filetype association 2 TTPs 5 IoCs
  • Drops file in System32 directory 4 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies registry class 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b1f2fcaff038e4ad2b718d3b4c07f7744c103490fb6b2f849f40b7024db38c00.exe
    "C:\Users\Admin\AppData\Local\Temp\b1f2fcaff038e4ad2b718d3b4c07f7744c103490fb6b2f849f40b7024db38c00.exe"
    1⤵
    • Loads dropped DLL
    • Modifies system executable filetype association
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3008
    • C:\Windows\system\rundll32.exe
      C:\Windows\system\rundll32.exe
      2⤵
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:2168

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\notepad¢¬.exe

    Filesize

    82KB

    MD5

    bfdc10ad3a55829f6e0b158ef088998e

    SHA1

    a33e538f14c494c36e8510ba4a152a7b2f9a40ba

    SHA256

    1520949d06add8be40ed56b571d30d5d9191ec0349c758bf3a89a61a22769607

    SHA512

    319986be597441d630c3a2b254cda8f3b060e4b08f1bb4e110efc6f908bba042db0f643fcf3369175507f6854382224375d0c63c588105b3cbcd3d02e4bcb827

  • \Windows\system\rundll32.exe

    Filesize

    83KB

    MD5

    4697495e517c3865e68960cf3861216e

    SHA1

    f6b81cd8fbff5d7fe1b7f8e7a559e62a014dce5c

    SHA256

    756acc4e8c31bd848b7dab3b318b3934fe10e390d9515da94477550eb77e5f95

    SHA512

    8db714bd717adba6a1cd45179235fd6096554895dfb453439df3dcc00f69363ff8650cb148738738fceea8d503acb11ef17ac070aaaf057658db8bcac9447819

  • memory/2168-19-0x0000000000400000-0x0000000000415A00-memory.dmp

    Filesize

    86KB

  • memory/3008-0-0x0000000000400000-0x0000000000415A00-memory.dmp

    Filesize

    86KB

  • memory/3008-12-0x00000000002E0000-0x00000000002F6000-memory.dmp

    Filesize

    88KB

  • memory/3008-18-0x00000000002E0000-0x00000000002F6000-memory.dmp

    Filesize

    88KB

  • memory/3008-21-0x0000000000400000-0x0000000000415A00-memory.dmp

    Filesize

    86KB

  • memory/3008-22-0x00000000002E0000-0x00000000002E2000-memory.dmp

    Filesize

    8KB