Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
28-05-2024 03:55
Static task
static1
Behavioral task
behavioral1
Sample
3f6982905e1e50402dbb1a7542b50e01bf83bceb394739b67d72b1869bc54328.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
3f6982905e1e50402dbb1a7542b50e01bf83bceb394739b67d72b1869bc54328.exe
Resource
win10v2004-20240508-en
General
-
Target
3f6982905e1e50402dbb1a7542b50e01bf83bceb394739b67d72b1869bc54328.exe
-
Size
83KB
-
MD5
257b8fff8e3a223b375842371cddf31d
-
SHA1
3a5c2d9e29b2c472a3f399930f9be46c6702f49f
-
SHA256
3f6982905e1e50402dbb1a7542b50e01bf83bceb394739b67d72b1869bc54328
-
SHA512
0fc793389398f13e159bc1b7aa194bae4d8c8e2d19b6182d6ab37885d47752418f78fc9f01b75d2af4f55fee6ebd22b7b58ad331d21d021738ddf3bb66c0f354
-
SSDEEP
768:agO5xRYi+SfSWHHNvvG5bnl/NqNwsKVDstHxYD0p1aXKynF0vQmYZS0HdJnfWOGb:RshfSWHHNvoLqNwDDGw02eQmh0HjWOGb
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2212 rundll32.exe -
Loads dropped DLL 2 IoCs
pid Process 2380 3f6982905e1e50402dbb1a7542b50e01bf83bceb394739b67d72b1869bc54328.exe 2380 3f6982905e1e50402dbb1a7542b50e01bf83bceb394739b67d72b1869bc54328.exe -
Modifies system executable filetype association 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command 3f6982905e1e50402dbb1a7542b50e01bf83bceb394739b67d72b1869bc54328.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 3f6982905e1e50402dbb1a7542b50e01bf83bceb394739b67d72b1869bc54328.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" 3f6982905e1e50402dbb1a7542b50e01bf83bceb394739b67d72b1869bc54328.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\¢«.exe 3f6982905e1e50402dbb1a7542b50e01bf83bceb394739b67d72b1869bc54328.exe File opened for modification C:\Windows\SysWOW64\notepad¢¬.exe 3f6982905e1e50402dbb1a7542b50e01bf83bceb394739b67d72b1869bc54328.exe File created C:\Windows\SysWOW64\notepad¢¬.exe 3f6982905e1e50402dbb1a7542b50e01bf83bceb394739b67d72b1869bc54328.exe File opened for modification C:\Windows\SysWOW64\¢«.exe 3f6982905e1e50402dbb1a7542b50e01bf83bceb394739b67d72b1869bc54328.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system\rundll32.exe 3f6982905e1e50402dbb1a7542b50e01bf83bceb394739b67d72b1869bc54328.exe File created C:\Windows\system\rundll32.exe 3f6982905e1e50402dbb1a7542b50e01bf83bceb394739b67d72b1869bc54328.exe -
Modifies registry class 15 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command 3f6982905e1e50402dbb1a7542b50e01bf83bceb394739b67d72b1869bc54328.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 3f6982905e1e50402dbb1a7542b50e01bf83bceb394739b67d72b1869bc54328.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command 3f6982905e1e50402dbb1a7542b50e01bf83bceb394739b67d72b1869bc54328.exe Key created \REGISTRY\MACHINE\Software\Classes\MSipv rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainSetup = "1716868547" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" 3f6982905e1e50402dbb1a7542b50e01bf83bceb394739b67d72b1869bc54328.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\MSipv 3f6982905e1e50402dbb1a7542b50e01bf83bceb394739b67d72b1869bc54328.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad.exe %1" 3f6982905e1e50402dbb1a7542b50e01bf83bceb394739b67d72b1869bc54328.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" 3f6982905e1e50402dbb1a7542b50e01bf83bceb394739b67d72b1869bc54328.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainUp = "1716868547" rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainVer = "506" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command rundll32.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2380 3f6982905e1e50402dbb1a7542b50e01bf83bceb394739b67d72b1869bc54328.exe 2380 3f6982905e1e50402dbb1a7542b50e01bf83bceb394739b67d72b1869bc54328.exe 2380 3f6982905e1e50402dbb1a7542b50e01bf83bceb394739b67d72b1869bc54328.exe 2380 3f6982905e1e50402dbb1a7542b50e01bf83bceb394739b67d72b1869bc54328.exe 2380 3f6982905e1e50402dbb1a7542b50e01bf83bceb394739b67d72b1869bc54328.exe 2380 3f6982905e1e50402dbb1a7542b50e01bf83bceb394739b67d72b1869bc54328.exe 2380 3f6982905e1e50402dbb1a7542b50e01bf83bceb394739b67d72b1869bc54328.exe 2380 3f6982905e1e50402dbb1a7542b50e01bf83bceb394739b67d72b1869bc54328.exe 2380 3f6982905e1e50402dbb1a7542b50e01bf83bceb394739b67d72b1869bc54328.exe 2380 3f6982905e1e50402dbb1a7542b50e01bf83bceb394739b67d72b1869bc54328.exe 2380 3f6982905e1e50402dbb1a7542b50e01bf83bceb394739b67d72b1869bc54328.exe 2380 3f6982905e1e50402dbb1a7542b50e01bf83bceb394739b67d72b1869bc54328.exe 2380 3f6982905e1e50402dbb1a7542b50e01bf83bceb394739b67d72b1869bc54328.exe 2380 3f6982905e1e50402dbb1a7542b50e01bf83bceb394739b67d72b1869bc54328.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2212 rundll32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2380 3f6982905e1e50402dbb1a7542b50e01bf83bceb394739b67d72b1869bc54328.exe 2212 rundll32.exe 2212 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2380 wrote to memory of 2212 2380 3f6982905e1e50402dbb1a7542b50e01bf83bceb394739b67d72b1869bc54328.exe 28 PID 2380 wrote to memory of 2212 2380 3f6982905e1e50402dbb1a7542b50e01bf83bceb394739b67d72b1869bc54328.exe 28 PID 2380 wrote to memory of 2212 2380 3f6982905e1e50402dbb1a7542b50e01bf83bceb394739b67d72b1869bc54328.exe 28 PID 2380 wrote to memory of 2212 2380 3f6982905e1e50402dbb1a7542b50e01bf83bceb394739b67d72b1869bc54328.exe 28 PID 2380 wrote to memory of 2212 2380 3f6982905e1e50402dbb1a7542b50e01bf83bceb394739b67d72b1869bc54328.exe 28 PID 2380 wrote to memory of 2212 2380 3f6982905e1e50402dbb1a7542b50e01bf83bceb394739b67d72b1869bc54328.exe 28 PID 2380 wrote to memory of 2212 2380 3f6982905e1e50402dbb1a7542b50e01bf83bceb394739b67d72b1869bc54328.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\3f6982905e1e50402dbb1a7542b50e01bf83bceb394739b67d72b1869bc54328.exe"C:\Users\Admin\AppData\Local\Temp\3f6982905e1e50402dbb1a7542b50e01bf83bceb394739b67d72b1869bc54328.exe"1⤵
- Loads dropped DLL
- Modifies system executable filetype association
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Windows\system\rundll32.exeC:\Windows\system\rundll32.exe2⤵
- Executes dropped EXE
- Modifies system executable filetype association
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2212
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
78KB
MD53c90056ec77d02b598e5228dc5bb1d1d
SHA1e50836838c3b0b0a50c45ff5fb25a175f0791fee
SHA256c7651f985b562eccb1d0bb66f724ec01164c2edb93d7e68a897b8cb32c6f9a69
SHA512d8fc860e3ad29d18768d4e88c3a4e9fb82b98bb70a1cb873ef2a898943f5dd72f43abddab611e9c3f3ab57f971b016ef6a42413e9a018eb69d930aa5342bdefd
-
Filesize
78KB
MD5b79ae9cf0781e2c42871d41d7fddcf56
SHA14eaed4d691861b23fafedf1474061ca500c72a6c
SHA2568b3d35114277b178ed4f4e2edfad8f056515dce8ab9141c7def29d3e3490616a
SHA51208ce991a2d1fdf423695b80484f3819f97bd3fdd491ae760449e936a7ce7c099d032280a735dbd91072b79bfa25b93969f689c37b49530b53a43d3da61361123