Analysis
-
max time kernel
150s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
28-05-2024 03:55
Static task
static1
Behavioral task
behavioral1
Sample
e76fc06fc2f8e1c6feb20c335186c6b4b7654a4fefc2478e4dc0546c3fb4cc5a.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
e76fc06fc2f8e1c6feb20c335186c6b4b7654a4fefc2478e4dc0546c3fb4cc5a.exe
Resource
win10v2004-20240426-en
General
-
Target
e76fc06fc2f8e1c6feb20c335186c6b4b7654a4fefc2478e4dc0546c3fb4cc5a.exe
-
Size
76KB
-
MD5
0de4e2ae3207ce9c25028a19fd8de8b2
-
SHA1
b6eef348ff38f63bdd67d497c56baa401b09149f
-
SHA256
e76fc06fc2f8e1c6feb20c335186c6b4b7654a4fefc2478e4dc0546c3fb4cc5a
-
SHA512
c64ac97c00a837f596e79dde2f2a8c81c7ba7032c6de48727a936568c45ab4aa79a124a427a0796e4b9e9591ad2a701f2bb63f78ae54eaea6b7265e903660ed5
-
SSDEEP
1536:RshfSWHHNvoLqNwDDGw02eQmh0HjWO+pS:GhfxHNIreQm+HihpS
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2268 rundll32.exe -
Modifies system executable filetype association 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command e76fc06fc2f8e1c6feb20c335186c6b4b7654a4fefc2478e4dc0546c3fb4cc5a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" e76fc06fc2f8e1c6feb20c335186c6b4b7654a4fefc2478e4dc0546c3fb4cc5a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" e76fc06fc2f8e1c6feb20c335186c6b4b7654a4fefc2478e4dc0546c3fb4cc5a.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\¢«.exe e76fc06fc2f8e1c6feb20c335186c6b4b7654a4fefc2478e4dc0546c3fb4cc5a.exe File created C:\Windows\SysWOW64\¢«.exe e76fc06fc2f8e1c6feb20c335186c6b4b7654a4fefc2478e4dc0546c3fb4cc5a.exe File opened for modification C:\Windows\SysWOW64\notepad¢¬.exe e76fc06fc2f8e1c6feb20c335186c6b4b7654a4fefc2478e4dc0546c3fb4cc5a.exe File created C:\Windows\SysWOW64\notepad¢¬.exe e76fc06fc2f8e1c6feb20c335186c6b4b7654a4fefc2478e4dc0546c3fb4cc5a.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system\rundll32.exe e76fc06fc2f8e1c6feb20c335186c6b4b7654a4fefc2478e4dc0546c3fb4cc5a.exe File created C:\Windows\system\rundll32.exe e76fc06fc2f8e1c6feb20c335186c6b4b7654a4fefc2478e4dc0546c3fb4cc5a.exe -
Modifies registry class 15 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\MSipv rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad.exe %1" e76fc06fc2f8e1c6feb20c335186c6b4b7654a4fefc2478e4dc0546c3fb4cc5a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" e76fc06fc2f8e1c6feb20c335186c6b4b7654a4fefc2478e4dc0546c3fb4cc5a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainVer = "506" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\MSipv e76fc06fc2f8e1c6feb20c335186c6b4b7654a4fefc2478e4dc0546c3fb4cc5a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainSetup = "1716868549" rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainUp = "1716868549" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" e76fc06fc2f8e1c6feb20c335186c6b4b7654a4fefc2478e4dc0546c3fb4cc5a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" e76fc06fc2f8e1c6feb20c335186c6b4b7654a4fefc2478e4dc0546c3fb4cc5a.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command e76fc06fc2f8e1c6feb20c335186c6b4b7654a4fefc2478e4dc0546c3fb4cc5a.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command e76fc06fc2f8e1c6feb20c335186c6b4b7654a4fefc2478e4dc0546c3fb4cc5a.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 316 e76fc06fc2f8e1c6feb20c335186c6b4b7654a4fefc2478e4dc0546c3fb4cc5a.exe 316 e76fc06fc2f8e1c6feb20c335186c6b4b7654a4fefc2478e4dc0546c3fb4cc5a.exe 316 e76fc06fc2f8e1c6feb20c335186c6b4b7654a4fefc2478e4dc0546c3fb4cc5a.exe 316 e76fc06fc2f8e1c6feb20c335186c6b4b7654a4fefc2478e4dc0546c3fb4cc5a.exe 316 e76fc06fc2f8e1c6feb20c335186c6b4b7654a4fefc2478e4dc0546c3fb4cc5a.exe 316 e76fc06fc2f8e1c6feb20c335186c6b4b7654a4fefc2478e4dc0546c3fb4cc5a.exe 316 e76fc06fc2f8e1c6feb20c335186c6b4b7654a4fefc2478e4dc0546c3fb4cc5a.exe 316 e76fc06fc2f8e1c6feb20c335186c6b4b7654a4fefc2478e4dc0546c3fb4cc5a.exe 316 e76fc06fc2f8e1c6feb20c335186c6b4b7654a4fefc2478e4dc0546c3fb4cc5a.exe 316 e76fc06fc2f8e1c6feb20c335186c6b4b7654a4fefc2478e4dc0546c3fb4cc5a.exe 316 e76fc06fc2f8e1c6feb20c335186c6b4b7654a4fefc2478e4dc0546c3fb4cc5a.exe 316 e76fc06fc2f8e1c6feb20c335186c6b4b7654a4fefc2478e4dc0546c3fb4cc5a.exe 316 e76fc06fc2f8e1c6feb20c335186c6b4b7654a4fefc2478e4dc0546c3fb4cc5a.exe 316 e76fc06fc2f8e1c6feb20c335186c6b4b7654a4fefc2478e4dc0546c3fb4cc5a.exe 316 e76fc06fc2f8e1c6feb20c335186c6b4b7654a4fefc2478e4dc0546c3fb4cc5a.exe 316 e76fc06fc2f8e1c6feb20c335186c6b4b7654a4fefc2478e4dc0546c3fb4cc5a.exe 316 e76fc06fc2f8e1c6feb20c335186c6b4b7654a4fefc2478e4dc0546c3fb4cc5a.exe 316 e76fc06fc2f8e1c6feb20c335186c6b4b7654a4fefc2478e4dc0546c3fb4cc5a.exe 316 e76fc06fc2f8e1c6feb20c335186c6b4b7654a4fefc2478e4dc0546c3fb4cc5a.exe 316 e76fc06fc2f8e1c6feb20c335186c6b4b7654a4fefc2478e4dc0546c3fb4cc5a.exe 316 e76fc06fc2f8e1c6feb20c335186c6b4b7654a4fefc2478e4dc0546c3fb4cc5a.exe 316 e76fc06fc2f8e1c6feb20c335186c6b4b7654a4fefc2478e4dc0546c3fb4cc5a.exe 316 e76fc06fc2f8e1c6feb20c335186c6b4b7654a4fefc2478e4dc0546c3fb4cc5a.exe 316 e76fc06fc2f8e1c6feb20c335186c6b4b7654a4fefc2478e4dc0546c3fb4cc5a.exe 316 e76fc06fc2f8e1c6feb20c335186c6b4b7654a4fefc2478e4dc0546c3fb4cc5a.exe 316 e76fc06fc2f8e1c6feb20c335186c6b4b7654a4fefc2478e4dc0546c3fb4cc5a.exe 316 e76fc06fc2f8e1c6feb20c335186c6b4b7654a4fefc2478e4dc0546c3fb4cc5a.exe 316 e76fc06fc2f8e1c6feb20c335186c6b4b7654a4fefc2478e4dc0546c3fb4cc5a.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2268 rundll32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 316 e76fc06fc2f8e1c6feb20c335186c6b4b7654a4fefc2478e4dc0546c3fb4cc5a.exe 2268 rundll32.exe 2268 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 316 wrote to memory of 2268 316 e76fc06fc2f8e1c6feb20c335186c6b4b7654a4fefc2478e4dc0546c3fb4cc5a.exe 87 PID 316 wrote to memory of 2268 316 e76fc06fc2f8e1c6feb20c335186c6b4b7654a4fefc2478e4dc0546c3fb4cc5a.exe 87 PID 316 wrote to memory of 2268 316 e76fc06fc2f8e1c6feb20c335186c6b4b7654a4fefc2478e4dc0546c3fb4cc5a.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\e76fc06fc2f8e1c6feb20c335186c6b4b7654a4fefc2478e4dc0546c3fb4cc5a.exe"C:\Users\Admin\AppData\Local\Temp\e76fc06fc2f8e1c6feb20c335186c6b4b7654a4fefc2478e4dc0546c3fb4cc5a.exe"1⤵
- Modifies system executable filetype association
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Windows\system\rundll32.exeC:\Windows\system\rundll32.exe2⤵
- Executes dropped EXE
- Modifies system executable filetype association
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2268
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
81KB
MD55d9b12f03c8ba01271d918cf2210a8fe
SHA13c88d8303a04929352d741d3f6a5575b30bacc63
SHA256b9c99cb0031824a978ac04466260c97b7d39227663a4216dcba657cb2b8020ee
SHA5126316f6be009a119671059d770a7f1ad778cc71bebad6f1c514e421e273caf1e0bc0899d20c08e39c14246a639e427200984a9ec0fc4d725e181b92d5217f21b6
-
Filesize
73KB
MD594d91f9a03149627ab7d4519f4939bde
SHA1d34d5b95bf58412ea69a59c21a7217022bb35abf
SHA2566836112400d63d07b2cd314f1e6bdcb109c1cd646e555858203937724391a37e
SHA51212376cb6de3f8e8bb6509be4355114c51ad8ced4fb5832bf5722d2fac56773179537d226be61c40ca5f7f23fb21e9a45f5037bdf8a3836fe1bbd1334fd50d1bc