Analysis

  • max time kernel
    149s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    28-05-2024 03:55

General

  • Target

    e76fc06fc2f8e1c6feb20c335186c6b4b7654a4fefc2478e4dc0546c3fb4cc5a.exe

  • Size

    76KB

  • MD5

    0de4e2ae3207ce9c25028a19fd8de8b2

  • SHA1

    b6eef348ff38f63bdd67d497c56baa401b09149f

  • SHA256

    e76fc06fc2f8e1c6feb20c335186c6b4b7654a4fefc2478e4dc0546c3fb4cc5a

  • SHA512

    c64ac97c00a837f596e79dde2f2a8c81c7ba7032c6de48727a936568c45ab4aa79a124a427a0796e4b9e9591ad2a701f2bb63f78ae54eaea6b7265e903660ed5

  • SSDEEP

    1536:RshfSWHHNvoLqNwDDGw02eQmh0HjWO+pS:GhfxHNIreQm+HihpS

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Modifies system executable filetype association 2 TTPs 5 IoCs
  • Drops file in System32 directory 4 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies registry class 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e76fc06fc2f8e1c6feb20c335186c6b4b7654a4fefc2478e4dc0546c3fb4cc5a.exe
    "C:\Users\Admin\AppData\Local\Temp\e76fc06fc2f8e1c6feb20c335186c6b4b7654a4fefc2478e4dc0546c3fb4cc5a.exe"
    1⤵
    • Loads dropped DLL
    • Modifies system executable filetype association
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1948
    • C:\Windows\system\rundll32.exe
      C:\Windows\system\rundll32.exe
      2⤵
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:1172

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\notepad¢¬.exe

    Filesize

    81KB

    MD5

    a02aa005a411d7fe342dd1630d7ed4f2

    SHA1

    06d925a82daaae65ae0f49bb1fda648e3a85d702

    SHA256

    6f88383f817dedc9106ea1b12f887462fc69f123c546c050742ddea03deffdee

    SHA512

    1841ac932382cc2853c142515ebaf83e718197c1e2a2b878bc09f8d873f51d91307767582dfc37b706fbed792bbe945be0e41c930449a00b88354c8051c102a0

  • \Windows\system\rundll32.exe

    Filesize

    73KB

    MD5

    b22aea9ede39249dfb8d4ce4370f0fbb

    SHA1

    7abdcea4385ef2d6d6e57ddff46b3473e4ee726b

    SHA256

    9417eec9625f121bd0fc153ea97ecb9827bb0eeedafc1b34b938fe0ebb0e095e

    SHA512

    773ed5309b7c50467791ccc1ba390197325ba9922b9273a1587d990c88ec2d77fa690dc782a13a53d5813c4c6be3eabc81ee0c5b5d4773ec35511aba5713240e

  • memory/1172-19-0x0000000000400000-0x0000000000415A00-memory.dmp

    Filesize

    86KB

  • memory/1948-0-0x0000000000400000-0x0000000000415A00-memory.dmp

    Filesize

    86KB

  • memory/1948-18-0x00000000002F0000-0x0000000000306000-memory.dmp

    Filesize

    88KB

  • memory/1948-17-0x00000000002F0000-0x0000000000306000-memory.dmp

    Filesize

    88KB

  • memory/1948-22-0x00000000002F0000-0x00000000002F2000-memory.dmp

    Filesize

    8KB

  • memory/1948-21-0x0000000000400000-0x0000000000415A00-memory.dmp

    Filesize

    86KB