Analysis
-
max time kernel
149s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 09:03
Static task
static1
Behavioral task
behavioral1
Sample
634c1ff5ab9165343d21b4f8acdd2edddc50aa7cd4b5435e72730528122e5a97.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
634c1ff5ab9165343d21b4f8acdd2edddc50aa7cd4b5435e72730528122e5a97.exe
Resource
win10v2004-20240508-en
General
-
Target
634c1ff5ab9165343d21b4f8acdd2edddc50aa7cd4b5435e72730528122e5a97.exe
-
Size
84KB
-
MD5
5f8f8a3745da64221d702edc2f68909f
-
SHA1
7b6eda264c737364fb7b19295817f1f2eaf0be43
-
SHA256
634c1ff5ab9165343d21b4f8acdd2edddc50aa7cd4b5435e72730528122e5a97
-
SHA512
b3c398f2d17ab931c6321e49d539d39420ac4f67a2f6632755941f537b0a94a4a2f8a751e3997903acc757be3d94238d7812962f1a52297a2fba6ff17e8c443f
-
SSDEEP
1536:RshfSWHHNvoLqNwDDGw02eQmh0HjWOecBHZLcCi:GhfxHNIreQm+HitcBHZLcCi
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3124 rundll32.exe -
Modifies system executable filetype association 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command 634c1ff5ab9165343d21b4f8acdd2edddc50aa7cd4b5435e72730528122e5a97.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 634c1ff5ab9165343d21b4f8acdd2edddc50aa7cd4b5435e72730528122e5a97.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" 634c1ff5ab9165343d21b4f8acdd2edddc50aa7cd4b5435e72730528122e5a97.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\¢«.exe 634c1ff5ab9165343d21b4f8acdd2edddc50aa7cd4b5435e72730528122e5a97.exe File created C:\Windows\SysWOW64\¢«.exe 634c1ff5ab9165343d21b4f8acdd2edddc50aa7cd4b5435e72730528122e5a97.exe File opened for modification C:\Windows\SysWOW64\notepad¢¬.exe 634c1ff5ab9165343d21b4f8acdd2edddc50aa7cd4b5435e72730528122e5a97.exe File created C:\Windows\SysWOW64\notepad¢¬.exe 634c1ff5ab9165343d21b4f8acdd2edddc50aa7cd4b5435e72730528122e5a97.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system\rundll32.exe 634c1ff5ab9165343d21b4f8acdd2edddc50aa7cd4b5435e72730528122e5a97.exe File created C:\Windows\system\rundll32.exe 634c1ff5ab9165343d21b4f8acdd2edddc50aa7cd4b5435e72730528122e5a97.exe -
Modifies registry class 15 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\MSipv 634c1ff5ab9165343d21b4f8acdd2edddc50aa7cd4b5435e72730528122e5a97.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 634c1ff5ab9165343d21b4f8acdd2edddc50aa7cd4b5435e72730528122e5a97.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command 634c1ff5ab9165343d21b4f8acdd2edddc50aa7cd4b5435e72730528122e5a97.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad.exe %1" 634c1ff5ab9165343d21b4f8acdd2edddc50aa7cd4b5435e72730528122e5a97.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainUp = "1716541394" rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainVer = "506" rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainSetup = "1716541394" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" 634c1ff5ab9165343d21b4f8acdd2edddc50aa7cd4b5435e72730528122e5a97.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command 634c1ff5ab9165343d21b4f8acdd2edddc50aa7cd4b5435e72730528122e5a97.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" 634c1ff5ab9165343d21b4f8acdd2edddc50aa7cd4b5435e72730528122e5a97.exe Key created \REGISTRY\MACHINE\Software\Classes\MSipv rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command rundll32.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 3916 634c1ff5ab9165343d21b4f8acdd2edddc50aa7cd4b5435e72730528122e5a97.exe 3916 634c1ff5ab9165343d21b4f8acdd2edddc50aa7cd4b5435e72730528122e5a97.exe 3916 634c1ff5ab9165343d21b4f8acdd2edddc50aa7cd4b5435e72730528122e5a97.exe 3916 634c1ff5ab9165343d21b4f8acdd2edddc50aa7cd4b5435e72730528122e5a97.exe 3916 634c1ff5ab9165343d21b4f8acdd2edddc50aa7cd4b5435e72730528122e5a97.exe 3916 634c1ff5ab9165343d21b4f8acdd2edddc50aa7cd4b5435e72730528122e5a97.exe 3916 634c1ff5ab9165343d21b4f8acdd2edddc50aa7cd4b5435e72730528122e5a97.exe 3916 634c1ff5ab9165343d21b4f8acdd2edddc50aa7cd4b5435e72730528122e5a97.exe 3916 634c1ff5ab9165343d21b4f8acdd2edddc50aa7cd4b5435e72730528122e5a97.exe 3916 634c1ff5ab9165343d21b4f8acdd2edddc50aa7cd4b5435e72730528122e5a97.exe 3916 634c1ff5ab9165343d21b4f8acdd2edddc50aa7cd4b5435e72730528122e5a97.exe 3916 634c1ff5ab9165343d21b4f8acdd2edddc50aa7cd4b5435e72730528122e5a97.exe 3916 634c1ff5ab9165343d21b4f8acdd2edddc50aa7cd4b5435e72730528122e5a97.exe 3916 634c1ff5ab9165343d21b4f8acdd2edddc50aa7cd4b5435e72730528122e5a97.exe 3916 634c1ff5ab9165343d21b4f8acdd2edddc50aa7cd4b5435e72730528122e5a97.exe 3916 634c1ff5ab9165343d21b4f8acdd2edddc50aa7cd4b5435e72730528122e5a97.exe 3916 634c1ff5ab9165343d21b4f8acdd2edddc50aa7cd4b5435e72730528122e5a97.exe 3916 634c1ff5ab9165343d21b4f8acdd2edddc50aa7cd4b5435e72730528122e5a97.exe 3916 634c1ff5ab9165343d21b4f8acdd2edddc50aa7cd4b5435e72730528122e5a97.exe 3916 634c1ff5ab9165343d21b4f8acdd2edddc50aa7cd4b5435e72730528122e5a97.exe 3916 634c1ff5ab9165343d21b4f8acdd2edddc50aa7cd4b5435e72730528122e5a97.exe 3916 634c1ff5ab9165343d21b4f8acdd2edddc50aa7cd4b5435e72730528122e5a97.exe 3916 634c1ff5ab9165343d21b4f8acdd2edddc50aa7cd4b5435e72730528122e5a97.exe 3916 634c1ff5ab9165343d21b4f8acdd2edddc50aa7cd4b5435e72730528122e5a97.exe 3916 634c1ff5ab9165343d21b4f8acdd2edddc50aa7cd4b5435e72730528122e5a97.exe 3916 634c1ff5ab9165343d21b4f8acdd2edddc50aa7cd4b5435e72730528122e5a97.exe 3916 634c1ff5ab9165343d21b4f8acdd2edddc50aa7cd4b5435e72730528122e5a97.exe 3916 634c1ff5ab9165343d21b4f8acdd2edddc50aa7cd4b5435e72730528122e5a97.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3124 rundll32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3916 634c1ff5ab9165343d21b4f8acdd2edddc50aa7cd4b5435e72730528122e5a97.exe 3124 rundll32.exe 3124 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3916 wrote to memory of 3124 3916 634c1ff5ab9165343d21b4f8acdd2edddc50aa7cd4b5435e72730528122e5a97.exe 85 PID 3916 wrote to memory of 3124 3916 634c1ff5ab9165343d21b4f8acdd2edddc50aa7cd4b5435e72730528122e5a97.exe 85 PID 3916 wrote to memory of 3124 3916 634c1ff5ab9165343d21b4f8acdd2edddc50aa7cd4b5435e72730528122e5a97.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\634c1ff5ab9165343d21b4f8acdd2edddc50aa7cd4b5435e72730528122e5a97.exe"C:\Users\Admin\AppData\Local\Temp\634c1ff5ab9165343d21b4f8acdd2edddc50aa7cd4b5435e72730528122e5a97.exe"1⤵
- Modifies system executable filetype association
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3916 -
C:\Windows\system\rundll32.exeC:\Windows\system\rundll32.exe2⤵
- Executes dropped EXE
- Modifies system executable filetype association
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3124
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
81KB
MD59e86f64a7db74afe5c39e52eb90b0b84
SHA1278513f971466cd966e9d18c6ddda84582e629e5
SHA256da7bd1f0662ea4225e80e3c177a106bfdbd28c4b1d8686eaece427690f9f53e2
SHA5122ad0aed451e4f1951bce7db242fa424dd582bdd6abb07220fac07a75331d0a197e8b5f53b7d6d2e367c22c7ad7cc5e8b0d5e73fbcc02cf2f62b2b7f0052706e6
-
Filesize
73KB
MD5ed3dd4a578e363dee80c977fe18ee3e4
SHA125ceff11d78b4c7babf166937f220807935e49cd
SHA2568e2ddc39cc79e4936ba0c39e5c6826be9fb7e2064362815c1ee8a7ce6a92d98c
SHA51279b1b71862b0001fb07aee4ff706c437e88388c6e0f37813a02986decb5e5809f3cc3cf96eba71c5f2086567192feb4c1ddb38056440166df0ae88da150c8e6a