Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-05-2024 02:52

General

  • Target

    45317b68ea8fab22336de147359519f3a7c972550002d05e3ab9169ea35586f6.exe

  • Size

    84KB

  • MD5

    498ddf09a13b0c0633399c4361d31291

  • SHA1

    05c2cdedf6dc06267e21235f2a43ac4be3d7ae77

  • SHA256

    45317b68ea8fab22336de147359519f3a7c972550002d05e3ab9169ea35586f6

  • SHA512

    73d43ccdcda28b4e30dffb0f1ac24aac811fe3e9fabb0f04ce7a43b7189c31fa71f4d5471e1a097ff6f6cebb434845167bad12695a49ec83b38c1fc12ff8b520

  • SSDEEP

    1536:RshfSWHHNvoLqNwDDGw02eQmh0HjWOqf0hj2O/P:GhfxHNIreQm+HiZf0hj2O/P

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Modifies system executable filetype association 2 TTPs 5 IoCs
  • Drops file in System32 directory 4 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies registry class 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 28 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\45317b68ea8fab22336de147359519f3a7c972550002d05e3ab9169ea35586f6.exe
    "C:\Users\Admin\AppData\Local\Temp\45317b68ea8fab22336de147359519f3a7c972550002d05e3ab9169ea35586f6.exe"
    1⤵
    • Modifies system executable filetype association
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3076
    • C:\Windows\system\rundll32.exe
      C:\Windows\system\rundll32.exe
      2⤵
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:2988

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\notepad¢¬.exe

    Filesize

    83KB

    MD5

    9b24dab3b936ab52c1c4a8d560a708df

    SHA1

    cfdc7384e668989c55fdc980990164daa1766912

    SHA256

    da3508a393838aa2d0464a90041fd35e8165464c2a1e15e0c6dab7336cbfce53

    SHA512

    5684f49b5ac6bd7431035a4affe549e3e163dc80316bfe0ccfb1f2c35bda6e897a865eb406f350487feb7003f554581407b7e2cfd90327e0e11b8d5c448cbe8b

  • C:\Windows\System\rundll32.exe

    Filesize

    79KB

    MD5

    2b96d96553e15a70025ba6f23e3fc83d

    SHA1

    7596b44d9becebce338e7d8246f6db375711e499

    SHA256

    e37eeff9ff3837153981ff6208bb7e38dcf4158f3ad61ab2920d1e4c63b8c40e

    SHA512

    f386e5e69f7d9357f8a58eda90eaa2da145474721c952902efe71dfead75f46553a9c95fad083fce78accff89d9e0a5ee4f98a34c5cd5a1e0887204acbe70f25

  • memory/3076-0-0x0000000000400000-0x0000000000415A00-memory.dmp

    Filesize

    86KB

  • memory/3076-13-0x0000000000400000-0x0000000000415A00-memory.dmp

    Filesize

    86KB