Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
30/05/2024, 21:29
Static task
static1
Behavioral task
behavioral1
Sample
784211a6b47e3f5f45d71f2d1ffa35b8f2aa81ab6795440f9480ede62d2e8596.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
784211a6b47e3f5f45d71f2d1ffa35b8f2aa81ab6795440f9480ede62d2e8596.exe
Resource
win10v2004-20240508-en
General
-
Target
784211a6b47e3f5f45d71f2d1ffa35b8f2aa81ab6795440f9480ede62d2e8596.exe
-
Size
78KB
-
MD5
77fd45640750cc3dd3f984c9bab09a35
-
SHA1
688003a0ce5b1145f996d0b6ace2d3b9189298e3
-
SHA256
784211a6b47e3f5f45d71f2d1ffa35b8f2aa81ab6795440f9480ede62d2e8596
-
SHA512
aed5f5bf7b341665aac83d4133647dc89d185b98e7af8343e0679b26cc2578022a63709bb5c9b7f796f50ede177d07c8a7fb586026161c9baeb13049b08a23b4
-
SSDEEP
1536:RshfSWHHNvoLqNwDDGw02eQmh0HjWOV+t+d:GhfxHNIreQm+Hic+t+d
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3928 rundll32.exe -
Modifies system executable filetype association 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command 784211a6b47e3f5f45d71f2d1ffa35b8f2aa81ab6795440f9480ede62d2e8596.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 784211a6b47e3f5f45d71f2d1ffa35b8f2aa81ab6795440f9480ede62d2e8596.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" 784211a6b47e3f5f45d71f2d1ffa35b8f2aa81ab6795440f9480ede62d2e8596.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\¢«.exe 784211a6b47e3f5f45d71f2d1ffa35b8f2aa81ab6795440f9480ede62d2e8596.exe File opened for modification C:\Windows\SysWOW64\notepad¢¬.exe 784211a6b47e3f5f45d71f2d1ffa35b8f2aa81ab6795440f9480ede62d2e8596.exe File created C:\Windows\SysWOW64\notepad¢¬.exe 784211a6b47e3f5f45d71f2d1ffa35b8f2aa81ab6795440f9480ede62d2e8596.exe File opened for modification C:\Windows\SysWOW64\¢«.exe 784211a6b47e3f5f45d71f2d1ffa35b8f2aa81ab6795440f9480ede62d2e8596.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system\rundll32.exe 784211a6b47e3f5f45d71f2d1ffa35b8f2aa81ab6795440f9480ede62d2e8596.exe File created C:\Windows\system\rundll32.exe 784211a6b47e3f5f45d71f2d1ffa35b8f2aa81ab6795440f9480ede62d2e8596.exe -
Modifies registry class 15 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command 784211a6b47e3f5f45d71f2d1ffa35b8f2aa81ab6795440f9480ede62d2e8596.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainVer = "506" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\MSipv 784211a6b47e3f5f45d71f2d1ffa35b8f2aa81ab6795440f9480ede62d2e8596.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command 784211a6b47e3f5f45d71f2d1ffa35b8f2aa81ab6795440f9480ede62d2e8596.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" 784211a6b47e3f5f45d71f2d1ffa35b8f2aa81ab6795440f9480ede62d2e8596.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainSetup = "1717104571" rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainUp = "1717104571" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad.exe %1" 784211a6b47e3f5f45d71f2d1ffa35b8f2aa81ab6795440f9480ede62d2e8596.exe Key created \REGISTRY\MACHINE\Software\Classes\MSipv rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 784211a6b47e3f5f45d71f2d1ffa35b8f2aa81ab6795440f9480ede62d2e8596.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" 784211a6b47e3f5f45d71f2d1ffa35b8f2aa81ab6795440f9480ede62d2e8596.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" rundll32.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 4180 784211a6b47e3f5f45d71f2d1ffa35b8f2aa81ab6795440f9480ede62d2e8596.exe 4180 784211a6b47e3f5f45d71f2d1ffa35b8f2aa81ab6795440f9480ede62d2e8596.exe 4180 784211a6b47e3f5f45d71f2d1ffa35b8f2aa81ab6795440f9480ede62d2e8596.exe 4180 784211a6b47e3f5f45d71f2d1ffa35b8f2aa81ab6795440f9480ede62d2e8596.exe 4180 784211a6b47e3f5f45d71f2d1ffa35b8f2aa81ab6795440f9480ede62d2e8596.exe 4180 784211a6b47e3f5f45d71f2d1ffa35b8f2aa81ab6795440f9480ede62d2e8596.exe 4180 784211a6b47e3f5f45d71f2d1ffa35b8f2aa81ab6795440f9480ede62d2e8596.exe 4180 784211a6b47e3f5f45d71f2d1ffa35b8f2aa81ab6795440f9480ede62d2e8596.exe 4180 784211a6b47e3f5f45d71f2d1ffa35b8f2aa81ab6795440f9480ede62d2e8596.exe 4180 784211a6b47e3f5f45d71f2d1ffa35b8f2aa81ab6795440f9480ede62d2e8596.exe 4180 784211a6b47e3f5f45d71f2d1ffa35b8f2aa81ab6795440f9480ede62d2e8596.exe 4180 784211a6b47e3f5f45d71f2d1ffa35b8f2aa81ab6795440f9480ede62d2e8596.exe 4180 784211a6b47e3f5f45d71f2d1ffa35b8f2aa81ab6795440f9480ede62d2e8596.exe 4180 784211a6b47e3f5f45d71f2d1ffa35b8f2aa81ab6795440f9480ede62d2e8596.exe 4180 784211a6b47e3f5f45d71f2d1ffa35b8f2aa81ab6795440f9480ede62d2e8596.exe 4180 784211a6b47e3f5f45d71f2d1ffa35b8f2aa81ab6795440f9480ede62d2e8596.exe 4180 784211a6b47e3f5f45d71f2d1ffa35b8f2aa81ab6795440f9480ede62d2e8596.exe 4180 784211a6b47e3f5f45d71f2d1ffa35b8f2aa81ab6795440f9480ede62d2e8596.exe 4180 784211a6b47e3f5f45d71f2d1ffa35b8f2aa81ab6795440f9480ede62d2e8596.exe 4180 784211a6b47e3f5f45d71f2d1ffa35b8f2aa81ab6795440f9480ede62d2e8596.exe 4180 784211a6b47e3f5f45d71f2d1ffa35b8f2aa81ab6795440f9480ede62d2e8596.exe 4180 784211a6b47e3f5f45d71f2d1ffa35b8f2aa81ab6795440f9480ede62d2e8596.exe 4180 784211a6b47e3f5f45d71f2d1ffa35b8f2aa81ab6795440f9480ede62d2e8596.exe 4180 784211a6b47e3f5f45d71f2d1ffa35b8f2aa81ab6795440f9480ede62d2e8596.exe 4180 784211a6b47e3f5f45d71f2d1ffa35b8f2aa81ab6795440f9480ede62d2e8596.exe 4180 784211a6b47e3f5f45d71f2d1ffa35b8f2aa81ab6795440f9480ede62d2e8596.exe 4180 784211a6b47e3f5f45d71f2d1ffa35b8f2aa81ab6795440f9480ede62d2e8596.exe 4180 784211a6b47e3f5f45d71f2d1ffa35b8f2aa81ab6795440f9480ede62d2e8596.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3928 rundll32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4180 784211a6b47e3f5f45d71f2d1ffa35b8f2aa81ab6795440f9480ede62d2e8596.exe 3928 rundll32.exe 3928 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4180 wrote to memory of 3928 4180 784211a6b47e3f5f45d71f2d1ffa35b8f2aa81ab6795440f9480ede62d2e8596.exe 86 PID 4180 wrote to memory of 3928 4180 784211a6b47e3f5f45d71f2d1ffa35b8f2aa81ab6795440f9480ede62d2e8596.exe 86 PID 4180 wrote to memory of 3928 4180 784211a6b47e3f5f45d71f2d1ffa35b8f2aa81ab6795440f9480ede62d2e8596.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\784211a6b47e3f5f45d71f2d1ffa35b8f2aa81ab6795440f9480ede62d2e8596.exe"C:\Users\Admin\AppData\Local\Temp\784211a6b47e3f5f45d71f2d1ffa35b8f2aa81ab6795440f9480ede62d2e8596.exe"1⤵
- Modifies system executable filetype association
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4180 -
C:\Windows\system\rundll32.exeC:\Windows\system\rundll32.exe2⤵
- Executes dropped EXE
- Modifies system executable filetype association
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3928
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74KB
MD55bcc09890e95895581489d6a19256171
SHA16764053523e5d8e0f80ad8ccbf675195e28c8b38
SHA2563ea2393820536b3899920ff342b72de8851eb9705eea22cb0d7c6aea3343f155
SHA5122f56df6822a031d9e2b7056287b3f7d4fdf89fa693d12ed4aa9562003c2d212dbc940cddbcd7caf6be01b5f73b2895eeeb434156e6f6a03d0ff94d8595a152cf
-
Filesize
80KB
MD544c9d106f69b9b4f414b082e44d01377
SHA1ef76d12855b12db9c9dd8aa074caf6f9f21146d1
SHA25682a567b467ca4962eaac3815b0b91d27e0750f81fc6688a5ee3826843eb9169b
SHA512a940127187b5106752543802a0b214ad355806108360c4659e5b9c23fffa62b526dc6db0a6b2c4df2a453b72977bd78e2469c0ffe5bb1b2b61116e6b6910d521