Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
28-05-2024 03:55
Static task
static1
Behavioral task
behavioral1
Sample
e76fc06fc2f8e1c6feb20c335186c6b4b7654a4fefc2478e4dc0546c3fb4cc5a.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
e76fc06fc2f8e1c6feb20c335186c6b4b7654a4fefc2478e4dc0546c3fb4cc5a.exe
Resource
win10v2004-20240426-en
General
-
Target
e76fc06fc2f8e1c6feb20c335186c6b4b7654a4fefc2478e4dc0546c3fb4cc5a.exe
-
Size
76KB
-
MD5
0de4e2ae3207ce9c25028a19fd8de8b2
-
SHA1
b6eef348ff38f63bdd67d497c56baa401b09149f
-
SHA256
e76fc06fc2f8e1c6feb20c335186c6b4b7654a4fefc2478e4dc0546c3fb4cc5a
-
SHA512
c64ac97c00a837f596e79dde2f2a8c81c7ba7032c6de48727a936568c45ab4aa79a124a427a0796e4b9e9591ad2a701f2bb63f78ae54eaea6b7265e903660ed5
-
SSDEEP
1536:RshfSWHHNvoLqNwDDGw02eQmh0HjWO+pS:GhfxHNIreQm+HihpS
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1172 rundll32.exe -
Loads dropped DLL 2 IoCs
pid Process 1948 e76fc06fc2f8e1c6feb20c335186c6b4b7654a4fefc2478e4dc0546c3fb4cc5a.exe 1948 e76fc06fc2f8e1c6feb20c335186c6b4b7654a4fefc2478e4dc0546c3fb4cc5a.exe -
Modifies system executable filetype association 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command e76fc06fc2f8e1c6feb20c335186c6b4b7654a4fefc2478e4dc0546c3fb4cc5a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" e76fc06fc2f8e1c6feb20c335186c6b4b7654a4fefc2478e4dc0546c3fb4cc5a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" e76fc06fc2f8e1c6feb20c335186c6b4b7654a4fefc2478e4dc0546c3fb4cc5a.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\¢«.exe e76fc06fc2f8e1c6feb20c335186c6b4b7654a4fefc2478e4dc0546c3fb4cc5a.exe File opened for modification C:\Windows\SysWOW64\notepad¢¬.exe e76fc06fc2f8e1c6feb20c335186c6b4b7654a4fefc2478e4dc0546c3fb4cc5a.exe File created C:\Windows\SysWOW64\notepad¢¬.exe e76fc06fc2f8e1c6feb20c335186c6b4b7654a4fefc2478e4dc0546c3fb4cc5a.exe File opened for modification C:\Windows\SysWOW64\¢«.exe e76fc06fc2f8e1c6feb20c335186c6b4b7654a4fefc2478e4dc0546c3fb4cc5a.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system\rundll32.exe e76fc06fc2f8e1c6feb20c335186c6b4b7654a4fefc2478e4dc0546c3fb4cc5a.exe File created C:\Windows\system\rundll32.exe e76fc06fc2f8e1c6feb20c335186c6b4b7654a4fefc2478e4dc0546c3fb4cc5a.exe -
Modifies registry class 15 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command e76fc06fc2f8e1c6feb20c335186c6b4b7654a4fefc2478e4dc0546c3fb4cc5a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad.exe %1" e76fc06fc2f8e1c6feb20c335186c6b4b7654a4fefc2478e4dc0546c3fb4cc5a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainSetup = "1716868546" rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainUp = "1716868546" rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainVer = "506" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command e76fc06fc2f8e1c6feb20c335186c6b4b7654a4fefc2478e4dc0546c3fb4cc5a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" e76fc06fc2f8e1c6feb20c335186c6b4b7654a4fefc2478e4dc0546c3fb4cc5a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" e76fc06fc2f8e1c6feb20c335186c6b4b7654a4fefc2478e4dc0546c3fb4cc5a.exe Key created \REGISTRY\MACHINE\Software\Classes\MSipv rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\MSipv e76fc06fc2f8e1c6feb20c335186c6b4b7654a4fefc2478e4dc0546c3fb4cc5a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" e76fc06fc2f8e1c6feb20c335186c6b4b7654a4fefc2478e4dc0546c3fb4cc5a.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 1948 e76fc06fc2f8e1c6feb20c335186c6b4b7654a4fefc2478e4dc0546c3fb4cc5a.exe 1948 e76fc06fc2f8e1c6feb20c335186c6b4b7654a4fefc2478e4dc0546c3fb4cc5a.exe 1948 e76fc06fc2f8e1c6feb20c335186c6b4b7654a4fefc2478e4dc0546c3fb4cc5a.exe 1948 e76fc06fc2f8e1c6feb20c335186c6b4b7654a4fefc2478e4dc0546c3fb4cc5a.exe 1948 e76fc06fc2f8e1c6feb20c335186c6b4b7654a4fefc2478e4dc0546c3fb4cc5a.exe 1948 e76fc06fc2f8e1c6feb20c335186c6b4b7654a4fefc2478e4dc0546c3fb4cc5a.exe 1948 e76fc06fc2f8e1c6feb20c335186c6b4b7654a4fefc2478e4dc0546c3fb4cc5a.exe 1948 e76fc06fc2f8e1c6feb20c335186c6b4b7654a4fefc2478e4dc0546c3fb4cc5a.exe 1948 e76fc06fc2f8e1c6feb20c335186c6b4b7654a4fefc2478e4dc0546c3fb4cc5a.exe 1948 e76fc06fc2f8e1c6feb20c335186c6b4b7654a4fefc2478e4dc0546c3fb4cc5a.exe 1948 e76fc06fc2f8e1c6feb20c335186c6b4b7654a4fefc2478e4dc0546c3fb4cc5a.exe 1948 e76fc06fc2f8e1c6feb20c335186c6b4b7654a4fefc2478e4dc0546c3fb4cc5a.exe 1948 e76fc06fc2f8e1c6feb20c335186c6b4b7654a4fefc2478e4dc0546c3fb4cc5a.exe 1948 e76fc06fc2f8e1c6feb20c335186c6b4b7654a4fefc2478e4dc0546c3fb4cc5a.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1172 rundll32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1948 e76fc06fc2f8e1c6feb20c335186c6b4b7654a4fefc2478e4dc0546c3fb4cc5a.exe 1172 rundll32.exe 1172 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1948 wrote to memory of 1172 1948 e76fc06fc2f8e1c6feb20c335186c6b4b7654a4fefc2478e4dc0546c3fb4cc5a.exe 28 PID 1948 wrote to memory of 1172 1948 e76fc06fc2f8e1c6feb20c335186c6b4b7654a4fefc2478e4dc0546c3fb4cc5a.exe 28 PID 1948 wrote to memory of 1172 1948 e76fc06fc2f8e1c6feb20c335186c6b4b7654a4fefc2478e4dc0546c3fb4cc5a.exe 28 PID 1948 wrote to memory of 1172 1948 e76fc06fc2f8e1c6feb20c335186c6b4b7654a4fefc2478e4dc0546c3fb4cc5a.exe 28 PID 1948 wrote to memory of 1172 1948 e76fc06fc2f8e1c6feb20c335186c6b4b7654a4fefc2478e4dc0546c3fb4cc5a.exe 28 PID 1948 wrote to memory of 1172 1948 e76fc06fc2f8e1c6feb20c335186c6b4b7654a4fefc2478e4dc0546c3fb4cc5a.exe 28 PID 1948 wrote to memory of 1172 1948 e76fc06fc2f8e1c6feb20c335186c6b4b7654a4fefc2478e4dc0546c3fb4cc5a.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\e76fc06fc2f8e1c6feb20c335186c6b4b7654a4fefc2478e4dc0546c3fb4cc5a.exe"C:\Users\Admin\AppData\Local\Temp\e76fc06fc2f8e1c6feb20c335186c6b4b7654a4fefc2478e4dc0546c3fb4cc5a.exe"1⤵
- Loads dropped DLL
- Modifies system executable filetype association
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Windows\system\rundll32.exeC:\Windows\system\rundll32.exe2⤵
- Executes dropped EXE
- Modifies system executable filetype association
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1172
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
81KB
MD5a02aa005a411d7fe342dd1630d7ed4f2
SHA106d925a82daaae65ae0f49bb1fda648e3a85d702
SHA2566f88383f817dedc9106ea1b12f887462fc69f123c546c050742ddea03deffdee
SHA5121841ac932382cc2853c142515ebaf83e718197c1e2a2b878bc09f8d873f51d91307767582dfc37b706fbed792bbe945be0e41c930449a00b88354c8051c102a0
-
Filesize
73KB
MD5b22aea9ede39249dfb8d4ce4370f0fbb
SHA17abdcea4385ef2d6d6e57ddff46b3473e4ee726b
SHA2569417eec9625f121bd0fc153ea97ecb9827bb0eeedafc1b34b938fe0ebb0e095e
SHA512773ed5309b7c50467791ccc1ba390197325ba9922b9273a1587d990c88ec2d77fa690dc782a13a53d5813c4c6be3eabc81ee0c5b5d4773ec35511aba5713240e