Analysis

  • max time kernel
    150s
  • max time network
    141s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-05-2024 03:55

General

  • Target

    e76fc06fc2f8e1c6feb20c335186c6b4b7654a4fefc2478e4dc0546c3fb4cc5a.exe

  • Size

    76KB

  • MD5

    0de4e2ae3207ce9c25028a19fd8de8b2

  • SHA1

    b6eef348ff38f63bdd67d497c56baa401b09149f

  • SHA256

    e76fc06fc2f8e1c6feb20c335186c6b4b7654a4fefc2478e4dc0546c3fb4cc5a

  • SHA512

    c64ac97c00a837f596e79dde2f2a8c81c7ba7032c6de48727a936568c45ab4aa79a124a427a0796e4b9e9591ad2a701f2bb63f78ae54eaea6b7265e903660ed5

  • SSDEEP

    1536:RshfSWHHNvoLqNwDDGw02eQmh0HjWO+pS:GhfxHNIreQm+HihpS

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Modifies system executable filetype association 2 TTPs 5 IoCs
  • Drops file in System32 directory 4 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies registry class 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 28 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e76fc06fc2f8e1c6feb20c335186c6b4b7654a4fefc2478e4dc0546c3fb4cc5a.exe
    "C:\Users\Admin\AppData\Local\Temp\e76fc06fc2f8e1c6feb20c335186c6b4b7654a4fefc2478e4dc0546c3fb4cc5a.exe"
    1⤵
    • Modifies system executable filetype association
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:316
    • C:\Windows\system\rundll32.exe
      C:\Windows\system\rundll32.exe
      2⤵
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:2268

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\notepad¢¬.exe

    Filesize

    81KB

    MD5

    5d9b12f03c8ba01271d918cf2210a8fe

    SHA1

    3c88d8303a04929352d741d3f6a5575b30bacc63

    SHA256

    b9c99cb0031824a978ac04466260c97b7d39227663a4216dcba657cb2b8020ee

    SHA512

    6316f6be009a119671059d770a7f1ad778cc71bebad6f1c514e421e273caf1e0bc0899d20c08e39c14246a639e427200984a9ec0fc4d725e181b92d5217f21b6

  • C:\Windows\System\rundll32.exe

    Filesize

    73KB

    MD5

    94d91f9a03149627ab7d4519f4939bde

    SHA1

    d34d5b95bf58412ea69a59c21a7217022bb35abf

    SHA256

    6836112400d63d07b2cd314f1e6bdcb109c1cd646e555858203937724391a37e

    SHA512

    12376cb6de3f8e8bb6509be4355114c51ad8ced4fb5832bf5722d2fac56773179537d226be61c40ca5f7f23fb21e9a45f5037bdf8a3836fe1bbd1334fd50d1bc

  • memory/316-0-0x0000000000400000-0x0000000000415A00-memory.dmp

    Filesize

    86KB

  • memory/316-13-0x0000000000400000-0x0000000000415A00-memory.dmp

    Filesize

    86KB