Analysis

  • max time kernel
    149s
  • max time network
    101s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-05-2024 04:52

General

  • Target

    501e2e935a748a6ca8b93a7430538871339ad867e9064523607818c2b7405bee.exe

  • Size

    84KB

  • MD5

    bb34e19bcb5a9cabc242df84aae4a4b6

  • SHA1

    e509b00f7de4e5f5e562e4f6fefeb80229271805

  • SHA256

    501e2e935a748a6ca8b93a7430538871339ad867e9064523607818c2b7405bee

  • SHA512

    dd025ed58572a630727e2392b6a3e3fa6989a2098dc519fcbbb420c14b095fe00680afecec0ec5773982992282bf296a6a05bb8cd7fef11c6708e24c10d59b75

  • SSDEEP

    1536:RshfSWHHNvoLqNwDDGw02eQmh0HjWOriOp48Zs:GhfxHNIreQm+HiAiOp48Zs

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Modifies system executable filetype association 2 TTPs 5 IoCs
  • Drops file in System32 directory 4 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies registry class 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 28 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\501e2e935a748a6ca8b93a7430538871339ad867e9064523607818c2b7405bee.exe
    "C:\Users\Admin\AppData\Local\Temp\501e2e935a748a6ca8b93a7430538871339ad867e9064523607818c2b7405bee.exe"
    1⤵
    • Modifies system executable filetype association
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3928
    • C:\Windows\system\rundll32.exe
      C:\Windows\system\rundll32.exe
      2⤵
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:336

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\notepad¢¬.exe

    Filesize

    74KB

    MD5

    637c053ddfc769eab631020805d5e820

    SHA1

    45fdd055d6a7032a14fd5b9874b57a23b942619f

    SHA256

    2f3cbb89497e365c91d2378599d45b8f81d9b441dde5504b2a77da7861c7ab0f

    SHA512

    58bc3ea871c20315cd8a82d68cd78255664f06de005457829964b66fbd4d4dc437dcae01c5270c52cf77c14ee2c547af56b6696c29313bd8f28daff3cfacd7ad

  • C:\Windows\System\rundll32.exe

    Filesize

    75KB

    MD5

    4886ce3beee33a11610df912c6da10fe

    SHA1

    3e60eb7897e3298cd4b7ef4b4aae0223953c2d77

    SHA256

    433abe2ec5670451561d7f103a03b09c0f109f8cecafdabad2f55d4e6948eab7

    SHA512

    963a6d105d1f7b67b0e4fac73b1a9ceea03c808e3e8fa13d71247413441c9fd6ee97779917ec26c221635b5db67cc0f50c263c0a68af4018fd3e160f12449233

  • memory/336-13-0x0000000000400000-0x0000000000415A00-memory.dmp

    Filesize

    86KB

  • memory/3928-0-0x0000000000400000-0x0000000000415A00-memory.dmp

    Filesize

    86KB

  • memory/3928-14-0x0000000000400000-0x0000000000415A00-memory.dmp

    Filesize

    86KB