Analysis
-
max time kernel
149s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
31/05/2024, 06:32
Static task
static1
Behavioral task
behavioral1
Sample
ae40d0b175870a11adb1fa3d9ec17ce6edd3e2daef5afa1202d8bef7d08cc335.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
ae40d0b175870a11adb1fa3d9ec17ce6edd3e2daef5afa1202d8bef7d08cc335.exe
Resource
win10v2004-20240508-en
General
-
Target
ae40d0b175870a11adb1fa3d9ec17ce6edd3e2daef5afa1202d8bef7d08cc335.exe
-
Size
77KB
-
MD5
f5997e9fa0254777e5ed3f63915054cf
-
SHA1
1cd03573fb15e9d687a5c3befd099ff4739fac1f
-
SHA256
ae40d0b175870a11adb1fa3d9ec17ce6edd3e2daef5afa1202d8bef7d08cc335
-
SHA512
98c105e0632848d86b972260aeffa1d4624d2efaa309c2da66fd4d2a0fb7df4b4cb15784152c088f15dc3c782bdd3fb9b95088262afb17483d580c0c5099b07b
-
SSDEEP
1536:RshfSWHHNvoLqNwDDGw02eQmh0HjWO6Zi:GhfxHNIreQm+Hi5Zi
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1664 rundll32.exe -
Loads dropped DLL 2 IoCs
pid Process 2108 ae40d0b175870a11adb1fa3d9ec17ce6edd3e2daef5afa1202d8bef7d08cc335.exe 2108 ae40d0b175870a11adb1fa3d9ec17ce6edd3e2daef5afa1202d8bef7d08cc335.exe -
Modifies system executable filetype association 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" ae40d0b175870a11adb1fa3d9ec17ce6edd3e2daef5afa1202d8bef7d08cc335.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command ae40d0b175870a11adb1fa3d9ec17ce6edd3e2daef5afa1202d8bef7d08cc335.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" ae40d0b175870a11adb1fa3d9ec17ce6edd3e2daef5afa1202d8bef7d08cc335.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\notepad¢¬.exe ae40d0b175870a11adb1fa3d9ec17ce6edd3e2daef5afa1202d8bef7d08cc335.exe File created C:\Windows\SysWOW64\notepad¢¬.exe ae40d0b175870a11adb1fa3d9ec17ce6edd3e2daef5afa1202d8bef7d08cc335.exe File opened for modification C:\Windows\SysWOW64\¢«.exe ae40d0b175870a11adb1fa3d9ec17ce6edd3e2daef5afa1202d8bef7d08cc335.exe File created C:\Windows\SysWOW64\¢«.exe ae40d0b175870a11adb1fa3d9ec17ce6edd3e2daef5afa1202d8bef7d08cc335.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system\rundll32.exe ae40d0b175870a11adb1fa3d9ec17ce6edd3e2daef5afa1202d8bef7d08cc335.exe File created C:\Windows\system\rundll32.exe ae40d0b175870a11adb1fa3d9ec17ce6edd3e2daef5afa1202d8bef7d08cc335.exe -
Modifies registry class 15 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command ae40d0b175870a11adb1fa3d9ec17ce6edd3e2daef5afa1202d8bef7d08cc335.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad.exe %1" ae40d0b175870a11adb1fa3d9ec17ce6edd3e2daef5afa1202d8bef7d08cc335.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" ae40d0b175870a11adb1fa3d9ec17ce6edd3e2daef5afa1202d8bef7d08cc335.exe Key created \REGISTRY\MACHINE\Software\Classes\MSipv rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" ae40d0b175870a11adb1fa3d9ec17ce6edd3e2daef5afa1202d8bef7d08cc335.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainVer = "506" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" ae40d0b175870a11adb1fa3d9ec17ce6edd3e2daef5afa1202d8bef7d08cc335.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\MSipv ae40d0b175870a11adb1fa3d9ec17ce6edd3e2daef5afa1202d8bef7d08cc335.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command ae40d0b175870a11adb1fa3d9ec17ce6edd3e2daef5afa1202d8bef7d08cc335.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainSetup = "1717137139" rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainUp = "1717137139" rundll32.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2108 ae40d0b175870a11adb1fa3d9ec17ce6edd3e2daef5afa1202d8bef7d08cc335.exe 2108 ae40d0b175870a11adb1fa3d9ec17ce6edd3e2daef5afa1202d8bef7d08cc335.exe 2108 ae40d0b175870a11adb1fa3d9ec17ce6edd3e2daef5afa1202d8bef7d08cc335.exe 2108 ae40d0b175870a11adb1fa3d9ec17ce6edd3e2daef5afa1202d8bef7d08cc335.exe 2108 ae40d0b175870a11adb1fa3d9ec17ce6edd3e2daef5afa1202d8bef7d08cc335.exe 2108 ae40d0b175870a11adb1fa3d9ec17ce6edd3e2daef5afa1202d8bef7d08cc335.exe 2108 ae40d0b175870a11adb1fa3d9ec17ce6edd3e2daef5afa1202d8bef7d08cc335.exe 2108 ae40d0b175870a11adb1fa3d9ec17ce6edd3e2daef5afa1202d8bef7d08cc335.exe 2108 ae40d0b175870a11adb1fa3d9ec17ce6edd3e2daef5afa1202d8bef7d08cc335.exe 2108 ae40d0b175870a11adb1fa3d9ec17ce6edd3e2daef5afa1202d8bef7d08cc335.exe 2108 ae40d0b175870a11adb1fa3d9ec17ce6edd3e2daef5afa1202d8bef7d08cc335.exe 2108 ae40d0b175870a11adb1fa3d9ec17ce6edd3e2daef5afa1202d8bef7d08cc335.exe 2108 ae40d0b175870a11adb1fa3d9ec17ce6edd3e2daef5afa1202d8bef7d08cc335.exe 2108 ae40d0b175870a11adb1fa3d9ec17ce6edd3e2daef5afa1202d8bef7d08cc335.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1664 rundll32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2108 ae40d0b175870a11adb1fa3d9ec17ce6edd3e2daef5afa1202d8bef7d08cc335.exe 1664 rundll32.exe 1664 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2108 wrote to memory of 1664 2108 ae40d0b175870a11adb1fa3d9ec17ce6edd3e2daef5afa1202d8bef7d08cc335.exe 29 PID 2108 wrote to memory of 1664 2108 ae40d0b175870a11adb1fa3d9ec17ce6edd3e2daef5afa1202d8bef7d08cc335.exe 29 PID 2108 wrote to memory of 1664 2108 ae40d0b175870a11adb1fa3d9ec17ce6edd3e2daef5afa1202d8bef7d08cc335.exe 29 PID 2108 wrote to memory of 1664 2108 ae40d0b175870a11adb1fa3d9ec17ce6edd3e2daef5afa1202d8bef7d08cc335.exe 29 PID 2108 wrote to memory of 1664 2108 ae40d0b175870a11adb1fa3d9ec17ce6edd3e2daef5afa1202d8bef7d08cc335.exe 29 PID 2108 wrote to memory of 1664 2108 ae40d0b175870a11adb1fa3d9ec17ce6edd3e2daef5afa1202d8bef7d08cc335.exe 29 PID 2108 wrote to memory of 1664 2108 ae40d0b175870a11adb1fa3d9ec17ce6edd3e2daef5afa1202d8bef7d08cc335.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\ae40d0b175870a11adb1fa3d9ec17ce6edd3e2daef5afa1202d8bef7d08cc335.exe"C:\Users\Admin\AppData\Local\Temp\ae40d0b175870a11adb1fa3d9ec17ce6edd3e2daef5afa1202d8bef7d08cc335.exe"1⤵
- Loads dropped DLL
- Modifies system executable filetype association
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\system\rundll32.exeC:\Windows\system\rundll32.exe2⤵
- Executes dropped EXE
- Modifies system executable filetype association
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1664
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD5d01fdbe58dd26fdd7f6f5793abad2505
SHA1e3aff19d0e3d2fc569bb9e6fa43e36662698b919
SHA2562fd14ba4aa3e5f55c6e62d4aa20fc0fec16c76e14f608f5ed1ffb5e583290730
SHA5120a593fa26e486fb892f332259bb3c92545293ce7d9b9a4f23ff45070ec0bcf40fbbbb7fdfb23a149dfdab8c0063687b87ac9a5a9a72b656ed32b50df22b9fa83
-
Filesize
80KB
MD5eea0eda10f1976ca84a4a0ec62e7fcd4
SHA1b19627dd6c303e100dfe864be671e36a7c7f7ff5
SHA2560152e84903b5f20e4c47260bb7b831cf639fd016c436514abfaa8eab1265575e
SHA51289cc8f7410f77c0e63ba353b831ef3099a602f38622eb500ba5908e3ad23c6b9b85c45ad273dd5a0c2ffe88478ead4c30a485cc1f4ff15fe12aa01b03c960ab6