Analysis

  • max time kernel
    149s
  • max time network
    103s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/05/2024, 09:41

General

  • Target

    4d423737172e2f8bced9b02baa70a09eaf02da9364c51287b8ded485c490e4b6.exe

  • Size

    79KB

  • MD5

    976db5b098511da58cac625226fd5361

  • SHA1

    5099e477d770b9f06b6f1364599b189c858d9282

  • SHA256

    4d423737172e2f8bced9b02baa70a09eaf02da9364c51287b8ded485c490e4b6

  • SHA512

    6051711661ead0a2b0bc94c108f2aad1192958d459aabe963f83e78800df10768750271cb02c15862ce5b877980040810e9b331bac30b2ec95d91abc610a1d26

  • SSDEEP

    1536:RshfSWHHNvoLqNwDDGw02eQmh0HjWOwnqZkW:GhfxHNIreQm+HibnqZkW

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Modifies system executable filetype association 2 TTPs 5 IoCs
  • Drops file in System32 directory 4 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies registry class 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 28 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4d423737172e2f8bced9b02baa70a09eaf02da9364c51287b8ded485c490e4b6.exe
    "C:\Users\Admin\AppData\Local\Temp\4d423737172e2f8bced9b02baa70a09eaf02da9364c51287b8ded485c490e4b6.exe"
    1⤵
    • Modifies system executable filetype association
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3952
    • C:\Windows\system\rundll32.exe
      C:\Windows\system\rundll32.exe
      2⤵
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:5048

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\notepad¢¬.exe

    Filesize

    79KB

    MD5

    bd0d71bfe4db2aa68994da67df3dc0a8

    SHA1

    3c7add6537259f714b172e728591b48150c4dee3

    SHA256

    92ac0924518f51eb9f821c287ab6bec19af35c86bef2e60b94b68f9210a138fd

    SHA512

    4009d275056f2054b26509f678670bec118776e736d28be125a94847f2374616e5812e917dabfd158722e76cb2071448a0c7af2ebf57a27152d19510904a5e92

  • C:\Windows\System\rundll32.exe

    Filesize

    82KB

    MD5

    7ba817ae9124133a2e0e9e8073b559db

    SHA1

    3cd4a4ace3b5256079bbc41895aafa4619e627f8

    SHA256

    3d43a5a10c224d8ac973d21a49a565fc7ef7bd4fdf88645d33b87b5f48f4ec10

    SHA512

    ae6d2d80ca65694a8c4df0712e270e14787e835ec959cf88084ad9ba28125c4925df2db0faa4164bb7da9a2e94975b277f8c2fca08537e39d76040db52b0600d

  • memory/3952-0-0x0000000000400000-0x0000000000415A00-memory.dmp

    Filesize

    86KB

  • memory/3952-13-0x0000000000400000-0x0000000000415A00-memory.dmp

    Filesize

    86KB