Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-05-2024 19:32

General

  • Target

    633790397a4511aafe87bd0d8b49119fe85782d1b049b90674d1a52cbefe5fc4.exe

  • Size

    79KB

  • MD5

    cfdd248fe07bb5d6daa7ae2ba0470a65

  • SHA1

    e86063575c6f7a76ca4daf022d2a5fb3f7d7dc9e

  • SHA256

    633790397a4511aafe87bd0d8b49119fe85782d1b049b90674d1a52cbefe5fc4

  • SHA512

    f227b6713f76880b73cdb59a2b6c0efe84cb758fd7e5c1a94e6e1d067b644cdad125e3b162f304ab762c86ef85cc45c8b3309413e83c45da86d1da971eccd756

  • SSDEEP

    1536:RshfSWHHNvoLqNwDDGw02eQmh0HjWOwUtmS9:GhfxHNIreQm+HiDUtmS9

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Modifies system executable filetype association 2 TTPs 5 IoCs
  • Drops file in System32 directory 4 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies registry class 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 28 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\633790397a4511aafe87bd0d8b49119fe85782d1b049b90674d1a52cbefe5fc4.exe
    "C:\Users\Admin\AppData\Local\Temp\633790397a4511aafe87bd0d8b49119fe85782d1b049b90674d1a52cbefe5fc4.exe"
    1⤵
    • Modifies system executable filetype association
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4692
    • C:\Windows\system\rundll32.exe
      C:\Windows\system\rundll32.exe
      2⤵
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:3956

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\notepad¢¬.exe

    Filesize

    81KB

    MD5

    9bd434863bf19c1a64a29d550a74c687

    SHA1

    422cc179fe1a7aa2c1ee1f07dbb05dc3502f9f34

    SHA256

    090dc25855d0815ede62a70590358f34fc88fd403531d9153919dc9bc96a6774

    SHA512

    db473cf6333722ee7cc70fd5b94742da0dbc9f5d9b111af2431c8b8308a0809b88c7bda4978331d27ab606ab47ab390f1c619465b8a9d88f02f653ac5dca5bff

  • C:\Windows\System\rundll32.exe

    Filesize

    80KB

    MD5

    929a3390a4ba0b2b192350831720da15

    SHA1

    0000e0e12c6dfc51bfe3debc62a3fc088b93df81

    SHA256

    c4649354f2a7dce9186578d6c1f3d73607308cc15f172c554becbbe59fa4d427

    SHA512

    1446d7a94f18eccac1bb55ef4fc3787f6aca323ad6861f7accf62214a2760689ee5375e467ed925cb7b434b96b72c60388f77a474fad82145ef569b10486bf94

  • memory/4692-0-0x0000000000400000-0x0000000000415A00-memory.dmp

    Filesize

    86KB

  • memory/4692-13-0x0000000000400000-0x0000000000415A00-memory.dmp

    Filesize

    86KB