Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/05/2024, 21:29

General

  • Target

    784211a6b47e3f5f45d71f2d1ffa35b8f2aa81ab6795440f9480ede62d2e8596.exe

  • Size

    78KB

  • MD5

    77fd45640750cc3dd3f984c9bab09a35

  • SHA1

    688003a0ce5b1145f996d0b6ace2d3b9189298e3

  • SHA256

    784211a6b47e3f5f45d71f2d1ffa35b8f2aa81ab6795440f9480ede62d2e8596

  • SHA512

    aed5f5bf7b341665aac83d4133647dc89d185b98e7af8343e0679b26cc2578022a63709bb5c9b7f796f50ede177d07c8a7fb586026161c9baeb13049b08a23b4

  • SSDEEP

    1536:RshfSWHHNvoLqNwDDGw02eQmh0HjWOV+t+d:GhfxHNIreQm+Hic+t+d

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Modifies system executable filetype association 2 TTPs 5 IoCs
  • Drops file in System32 directory 4 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies registry class 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 28 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\784211a6b47e3f5f45d71f2d1ffa35b8f2aa81ab6795440f9480ede62d2e8596.exe
    "C:\Users\Admin\AppData\Local\Temp\784211a6b47e3f5f45d71f2d1ffa35b8f2aa81ab6795440f9480ede62d2e8596.exe"
    1⤵
    • Modifies system executable filetype association
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4180
    • C:\Windows\system\rundll32.exe
      C:\Windows\system\rundll32.exe
      2⤵
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:3928

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\notepad¢¬.exe

          Filesize

          74KB

          MD5

          5bcc09890e95895581489d6a19256171

          SHA1

          6764053523e5d8e0f80ad8ccbf675195e28c8b38

          SHA256

          3ea2393820536b3899920ff342b72de8851eb9705eea22cb0d7c6aea3343f155

          SHA512

          2f56df6822a031d9e2b7056287b3f7d4fdf89fa693d12ed4aa9562003c2d212dbc940cddbcd7caf6be01b5f73b2895eeeb434156e6f6a03d0ff94d8595a152cf

        • C:\Windows\System\rundll32.exe

          Filesize

          80KB

          MD5

          44c9d106f69b9b4f414b082e44d01377

          SHA1

          ef76d12855b12db9c9dd8aa074caf6f9f21146d1

          SHA256

          82a567b467ca4962eaac3815b0b91d27e0750f81fc6688a5ee3826843eb9169b

          SHA512

          a940127187b5106752543802a0b214ad355806108360c4659e5b9c23fffa62b526dc6db0a6b2c4df2a453b72977bd78e2469c0ffe5bb1b2b61116e6b6910d521

        • memory/4180-0-0x0000000000400000-0x0000000000415A00-memory.dmp

          Filesize

          86KB

        • memory/4180-13-0x0000000000400000-0x0000000000415A00-memory.dmp

          Filesize

          86KB