Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 19:32
Static task
static1
Behavioral task
behavioral1
Sample
633790397a4511aafe87bd0d8b49119fe85782d1b049b90674d1a52cbefe5fc4.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
633790397a4511aafe87bd0d8b49119fe85782d1b049b90674d1a52cbefe5fc4.exe
Resource
win10v2004-20240508-en
General
-
Target
633790397a4511aafe87bd0d8b49119fe85782d1b049b90674d1a52cbefe5fc4.exe
-
Size
79KB
-
MD5
cfdd248fe07bb5d6daa7ae2ba0470a65
-
SHA1
e86063575c6f7a76ca4daf022d2a5fb3f7d7dc9e
-
SHA256
633790397a4511aafe87bd0d8b49119fe85782d1b049b90674d1a52cbefe5fc4
-
SHA512
f227b6713f76880b73cdb59a2b6c0efe84cb758fd7e5c1a94e6e1d067b644cdad125e3b162f304ab762c86ef85cc45c8b3309413e83c45da86d1da971eccd756
-
SSDEEP
1536:RshfSWHHNvoLqNwDDGw02eQmh0HjWOwUtmS9:GhfxHNIreQm+HiDUtmS9
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3956 rundll32.exe -
Modifies system executable filetype association 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command 633790397a4511aafe87bd0d8b49119fe85782d1b049b90674d1a52cbefe5fc4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 633790397a4511aafe87bd0d8b49119fe85782d1b049b90674d1a52cbefe5fc4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" 633790397a4511aafe87bd0d8b49119fe85782d1b049b90674d1a52cbefe5fc4.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\¢«.exe 633790397a4511aafe87bd0d8b49119fe85782d1b049b90674d1a52cbefe5fc4.exe File created C:\Windows\SysWOW64\¢«.exe 633790397a4511aafe87bd0d8b49119fe85782d1b049b90674d1a52cbefe5fc4.exe File opened for modification C:\Windows\SysWOW64\notepad¢¬.exe 633790397a4511aafe87bd0d8b49119fe85782d1b049b90674d1a52cbefe5fc4.exe File created C:\Windows\SysWOW64\notepad¢¬.exe 633790397a4511aafe87bd0d8b49119fe85782d1b049b90674d1a52cbefe5fc4.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\system\rundll32.exe 633790397a4511aafe87bd0d8b49119fe85782d1b049b90674d1a52cbefe5fc4.exe File opened for modification C:\Windows\system\rundll32.exe 633790397a4511aafe87bd0d8b49119fe85782d1b049b90674d1a52cbefe5fc4.exe -
Modifies registry class 15 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad.exe %1" 633790397a4511aafe87bd0d8b49119fe85782d1b049b90674d1a52cbefe5fc4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" 633790397a4511aafe87bd0d8b49119fe85782d1b049b90674d1a52cbefe5fc4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" 633790397a4511aafe87bd0d8b49119fe85782d1b049b90674d1a52cbefe5fc4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainUp = "1716579176" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command 633790397a4511aafe87bd0d8b49119fe85782d1b049b90674d1a52cbefe5fc4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainSetup = "1716579176" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\MSipv 633790397a4511aafe87bd0d8b49119fe85782d1b049b90674d1a52cbefe5fc4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 633790397a4511aafe87bd0d8b49119fe85782d1b049b90674d1a52cbefe5fc4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainVer = "506" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command 633790397a4511aafe87bd0d8b49119fe85782d1b049b90674d1a52cbefe5fc4.exe Key created \REGISTRY\MACHINE\Software\Classes\MSipv rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" rundll32.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 4692 633790397a4511aafe87bd0d8b49119fe85782d1b049b90674d1a52cbefe5fc4.exe 4692 633790397a4511aafe87bd0d8b49119fe85782d1b049b90674d1a52cbefe5fc4.exe 4692 633790397a4511aafe87bd0d8b49119fe85782d1b049b90674d1a52cbefe5fc4.exe 4692 633790397a4511aafe87bd0d8b49119fe85782d1b049b90674d1a52cbefe5fc4.exe 4692 633790397a4511aafe87bd0d8b49119fe85782d1b049b90674d1a52cbefe5fc4.exe 4692 633790397a4511aafe87bd0d8b49119fe85782d1b049b90674d1a52cbefe5fc4.exe 4692 633790397a4511aafe87bd0d8b49119fe85782d1b049b90674d1a52cbefe5fc4.exe 4692 633790397a4511aafe87bd0d8b49119fe85782d1b049b90674d1a52cbefe5fc4.exe 4692 633790397a4511aafe87bd0d8b49119fe85782d1b049b90674d1a52cbefe5fc4.exe 4692 633790397a4511aafe87bd0d8b49119fe85782d1b049b90674d1a52cbefe5fc4.exe 4692 633790397a4511aafe87bd0d8b49119fe85782d1b049b90674d1a52cbefe5fc4.exe 4692 633790397a4511aafe87bd0d8b49119fe85782d1b049b90674d1a52cbefe5fc4.exe 4692 633790397a4511aafe87bd0d8b49119fe85782d1b049b90674d1a52cbefe5fc4.exe 4692 633790397a4511aafe87bd0d8b49119fe85782d1b049b90674d1a52cbefe5fc4.exe 4692 633790397a4511aafe87bd0d8b49119fe85782d1b049b90674d1a52cbefe5fc4.exe 4692 633790397a4511aafe87bd0d8b49119fe85782d1b049b90674d1a52cbefe5fc4.exe 4692 633790397a4511aafe87bd0d8b49119fe85782d1b049b90674d1a52cbefe5fc4.exe 4692 633790397a4511aafe87bd0d8b49119fe85782d1b049b90674d1a52cbefe5fc4.exe 4692 633790397a4511aafe87bd0d8b49119fe85782d1b049b90674d1a52cbefe5fc4.exe 4692 633790397a4511aafe87bd0d8b49119fe85782d1b049b90674d1a52cbefe5fc4.exe 4692 633790397a4511aafe87bd0d8b49119fe85782d1b049b90674d1a52cbefe5fc4.exe 4692 633790397a4511aafe87bd0d8b49119fe85782d1b049b90674d1a52cbefe5fc4.exe 4692 633790397a4511aafe87bd0d8b49119fe85782d1b049b90674d1a52cbefe5fc4.exe 4692 633790397a4511aafe87bd0d8b49119fe85782d1b049b90674d1a52cbefe5fc4.exe 4692 633790397a4511aafe87bd0d8b49119fe85782d1b049b90674d1a52cbefe5fc4.exe 4692 633790397a4511aafe87bd0d8b49119fe85782d1b049b90674d1a52cbefe5fc4.exe 4692 633790397a4511aafe87bd0d8b49119fe85782d1b049b90674d1a52cbefe5fc4.exe 4692 633790397a4511aafe87bd0d8b49119fe85782d1b049b90674d1a52cbefe5fc4.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3956 rundll32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4692 633790397a4511aafe87bd0d8b49119fe85782d1b049b90674d1a52cbefe5fc4.exe 3956 rundll32.exe 3956 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4692 wrote to memory of 3956 4692 633790397a4511aafe87bd0d8b49119fe85782d1b049b90674d1a52cbefe5fc4.exe 85 PID 4692 wrote to memory of 3956 4692 633790397a4511aafe87bd0d8b49119fe85782d1b049b90674d1a52cbefe5fc4.exe 85 PID 4692 wrote to memory of 3956 4692 633790397a4511aafe87bd0d8b49119fe85782d1b049b90674d1a52cbefe5fc4.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\633790397a4511aafe87bd0d8b49119fe85782d1b049b90674d1a52cbefe5fc4.exe"C:\Users\Admin\AppData\Local\Temp\633790397a4511aafe87bd0d8b49119fe85782d1b049b90674d1a52cbefe5fc4.exe"1⤵
- Modifies system executable filetype association
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Windows\system\rundll32.exeC:\Windows\system\rundll32.exe2⤵
- Executes dropped EXE
- Modifies system executable filetype association
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3956
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
81KB
MD59bd434863bf19c1a64a29d550a74c687
SHA1422cc179fe1a7aa2c1ee1f07dbb05dc3502f9f34
SHA256090dc25855d0815ede62a70590358f34fc88fd403531d9153919dc9bc96a6774
SHA512db473cf6333722ee7cc70fd5b94742da0dbc9f5d9b111af2431c8b8308a0809b88c7bda4978331d27ab606ab47ab390f1c619465b8a9d88f02f653ac5dca5bff
-
Filesize
80KB
MD5929a3390a4ba0b2b192350831720da15
SHA10000e0e12c6dfc51bfe3debc62a3fc088b93df81
SHA256c4649354f2a7dce9186578d6c1f3d73607308cc15f172c554becbbe59fa4d427
SHA5121446d7a94f18eccac1bb55ef4fc3787f6aca323ad6861f7accf62214a2760689ee5375e467ed925cb7b434b96b72c60388f77a474fad82145ef569b10486bf94