Analysis

  • max time kernel
    149s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-05-2024 19:52

General

  • Target

    7e13b0b03b56abb7f5bebaf7f79ccaf92e0967b6f57e1e3c73c18ca8240ed621.exe

  • Size

    75KB

  • MD5

    7842bb21efd83e5afe68f969a0f61452

  • SHA1

    261205aee4c78fef74462ae60eb62efe5d347de9

  • SHA256

    7e13b0b03b56abb7f5bebaf7f79ccaf92e0967b6f57e1e3c73c18ca8240ed621

  • SHA512

    0aa674b2ef8d943ef62a3524d577c08c4f3aabd19e8f904199f06f159c89a73140685e38be24dccd1ad8fb5e4725f7eae8c3f6e6cc72120f423dbcd9b6758e58

  • SSDEEP

    768:agO5xRYi+SfSWHHNvvG5bnl/NqNwsKVDstHxYD0p1aXKynF0vQmYZS0HdJnfWO9:RshfSWHHNvoLqNwDDGw02eQmh0HjWO9

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Modifies system executable filetype association 2 TTPs 5 IoCs
  • Drops file in System32 directory 4 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies registry class 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 28 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7e13b0b03b56abb7f5bebaf7f79ccaf92e0967b6f57e1e3c73c18ca8240ed621.exe
    "C:\Users\Admin\AppData\Local\Temp\7e13b0b03b56abb7f5bebaf7f79ccaf92e0967b6f57e1e3c73c18ca8240ed621.exe"
    1⤵
    • Modifies system executable filetype association
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1036
    • C:\Windows\system\rundll32.exe
      C:\Windows\system\rundll32.exe
      2⤵
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:1196

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\notepad¢¬.exe

    Filesize

    79KB

    MD5

    a6c75a883b5834117aa772f0fc20153f

    SHA1

    37788df2809c5f759fd6c8c6ec7a1102551e566f

    SHA256

    4e2d4cd3c1cf1303357639b16b360a883031c039976218e6ef5fa9485593e364

    SHA512

    09f87c72b3aa6bffaebb6cda7254ec614ea47d728ce47338b3d9aeceb4ccf4bc373d84f537d7ec76b891a9bbdf7876c7005ba946eab77079bf426a3259c62888

  • C:\Windows\System\rundll32.exe

    Filesize

    76KB

    MD5

    9174644a560664fabb2ec8d96f713bb2

    SHA1

    c22db789dc3ab28eccb30de06ea7dd0ce4c94950

    SHA256

    05b11b67718954575197489ccaaa080759ff03ad3a0b2f1815cf7458aac5a5b8

    SHA512

    650069f6e26c8d8e36b68decd27d59f05b5e58f34e31ac444b3e2b48dc96a5dd1140cd820295c0dc696ea8fc9b41e9e738973a01e16cd93fb4faa9b596ab18c9

  • memory/1036-0-0x0000000000400000-0x0000000000415A00-memory.dmp

    Filesize

    86KB

  • memory/1036-13-0x0000000000400000-0x0000000000415A00-memory.dmp

    Filesize

    86KB