Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
03/06/2024, 08:29
Static task
static1
Behavioral task
behavioral1
Sample
24fabf6941823abecdd4cb4ebd8cf50dd0c0f800b0c55cd410c0dd3ce1545ff1.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
24fabf6941823abecdd4cb4ebd8cf50dd0c0f800b0c55cd410c0dd3ce1545ff1.exe
Resource
win10v2004-20240426-en
General
-
Target
24fabf6941823abecdd4cb4ebd8cf50dd0c0f800b0c55cd410c0dd3ce1545ff1.exe
-
Size
77KB
-
MD5
ccc81c4d7c88aa9934c8771bdaf72163
-
SHA1
18e712bf1a29744dc552270a48d49c35542eda3a
-
SHA256
24fabf6941823abecdd4cb4ebd8cf50dd0c0f800b0c55cd410c0dd3ce1545ff1
-
SHA512
60367d9161277248d80b23c311c229a8665ff7631a6445be3726df77898236bd9a2e46dd990754ca5bbf12b6535ee83c8e4d0da2578ca92e5df41e3406c9bed1
-
SSDEEP
1536:RshfSWHHNvoLqNwDDGw02eQmh0HjWOckut:GhfxHNIreQm+HiPkut
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2028 rundll32.exe -
Loads dropped DLL 2 IoCs
pid Process 2220 24fabf6941823abecdd4cb4ebd8cf50dd0c0f800b0c55cd410c0dd3ce1545ff1.exe 2220 24fabf6941823abecdd4cb4ebd8cf50dd0c0f800b0c55cd410c0dd3ce1545ff1.exe -
Modifies system executable filetype association 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command 24fabf6941823abecdd4cb4ebd8cf50dd0c0f800b0c55cd410c0dd3ce1545ff1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 24fabf6941823abecdd4cb4ebd8cf50dd0c0f800b0c55cd410c0dd3ce1545ff1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" 24fabf6941823abecdd4cb4ebd8cf50dd0c0f800b0c55cd410c0dd3ce1545ff1.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\¢«.exe 24fabf6941823abecdd4cb4ebd8cf50dd0c0f800b0c55cd410c0dd3ce1545ff1.exe File opened for modification C:\Windows\SysWOW64\notepad¢¬.exe 24fabf6941823abecdd4cb4ebd8cf50dd0c0f800b0c55cd410c0dd3ce1545ff1.exe File created C:\Windows\SysWOW64\notepad¢¬.exe 24fabf6941823abecdd4cb4ebd8cf50dd0c0f800b0c55cd410c0dd3ce1545ff1.exe File opened for modification C:\Windows\SysWOW64\¢«.exe 24fabf6941823abecdd4cb4ebd8cf50dd0c0f800b0c55cd410c0dd3ce1545ff1.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system\rundll32.exe 24fabf6941823abecdd4cb4ebd8cf50dd0c0f800b0c55cd410c0dd3ce1545ff1.exe File created C:\Windows\system\rundll32.exe 24fabf6941823abecdd4cb4ebd8cf50dd0c0f800b0c55cd410c0dd3ce1545ff1.exe -
Modifies registry class 15 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command 24fabf6941823abecdd4cb4ebd8cf50dd0c0f800b0c55cd410c0dd3ce1545ff1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainUp = "1717403373" rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainVer = "506" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" 24fabf6941823abecdd4cb4ebd8cf50dd0c0f800b0c55cd410c0dd3ce1545ff1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainSetup = "1717403373" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" 24fabf6941823abecdd4cb4ebd8cf50dd0c0f800b0c55cd410c0dd3ce1545ff1.exe Key created \REGISTRY\MACHINE\Software\Classes\MSipv rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad.exe %1" 24fabf6941823abecdd4cb4ebd8cf50dd0c0f800b0c55cd410c0dd3ce1545ff1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\MSipv 24fabf6941823abecdd4cb4ebd8cf50dd0c0f800b0c55cd410c0dd3ce1545ff1.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command 24fabf6941823abecdd4cb4ebd8cf50dd0c0f800b0c55cd410c0dd3ce1545ff1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 24fabf6941823abecdd4cb4ebd8cf50dd0c0f800b0c55cd410c0dd3ce1545ff1.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2220 24fabf6941823abecdd4cb4ebd8cf50dd0c0f800b0c55cd410c0dd3ce1545ff1.exe 2220 24fabf6941823abecdd4cb4ebd8cf50dd0c0f800b0c55cd410c0dd3ce1545ff1.exe 2220 24fabf6941823abecdd4cb4ebd8cf50dd0c0f800b0c55cd410c0dd3ce1545ff1.exe 2220 24fabf6941823abecdd4cb4ebd8cf50dd0c0f800b0c55cd410c0dd3ce1545ff1.exe 2220 24fabf6941823abecdd4cb4ebd8cf50dd0c0f800b0c55cd410c0dd3ce1545ff1.exe 2220 24fabf6941823abecdd4cb4ebd8cf50dd0c0f800b0c55cd410c0dd3ce1545ff1.exe 2220 24fabf6941823abecdd4cb4ebd8cf50dd0c0f800b0c55cd410c0dd3ce1545ff1.exe 2220 24fabf6941823abecdd4cb4ebd8cf50dd0c0f800b0c55cd410c0dd3ce1545ff1.exe 2220 24fabf6941823abecdd4cb4ebd8cf50dd0c0f800b0c55cd410c0dd3ce1545ff1.exe 2220 24fabf6941823abecdd4cb4ebd8cf50dd0c0f800b0c55cd410c0dd3ce1545ff1.exe 2220 24fabf6941823abecdd4cb4ebd8cf50dd0c0f800b0c55cd410c0dd3ce1545ff1.exe 2220 24fabf6941823abecdd4cb4ebd8cf50dd0c0f800b0c55cd410c0dd3ce1545ff1.exe 2220 24fabf6941823abecdd4cb4ebd8cf50dd0c0f800b0c55cd410c0dd3ce1545ff1.exe 2220 24fabf6941823abecdd4cb4ebd8cf50dd0c0f800b0c55cd410c0dd3ce1545ff1.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2028 rundll32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2220 24fabf6941823abecdd4cb4ebd8cf50dd0c0f800b0c55cd410c0dd3ce1545ff1.exe 2028 rundll32.exe 2028 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2220 wrote to memory of 2028 2220 24fabf6941823abecdd4cb4ebd8cf50dd0c0f800b0c55cd410c0dd3ce1545ff1.exe 28 PID 2220 wrote to memory of 2028 2220 24fabf6941823abecdd4cb4ebd8cf50dd0c0f800b0c55cd410c0dd3ce1545ff1.exe 28 PID 2220 wrote to memory of 2028 2220 24fabf6941823abecdd4cb4ebd8cf50dd0c0f800b0c55cd410c0dd3ce1545ff1.exe 28 PID 2220 wrote to memory of 2028 2220 24fabf6941823abecdd4cb4ebd8cf50dd0c0f800b0c55cd410c0dd3ce1545ff1.exe 28 PID 2220 wrote to memory of 2028 2220 24fabf6941823abecdd4cb4ebd8cf50dd0c0f800b0c55cd410c0dd3ce1545ff1.exe 28 PID 2220 wrote to memory of 2028 2220 24fabf6941823abecdd4cb4ebd8cf50dd0c0f800b0c55cd410c0dd3ce1545ff1.exe 28 PID 2220 wrote to memory of 2028 2220 24fabf6941823abecdd4cb4ebd8cf50dd0c0f800b0c55cd410c0dd3ce1545ff1.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\24fabf6941823abecdd4cb4ebd8cf50dd0c0f800b0c55cd410c0dd3ce1545ff1.exe"C:\Users\Admin\AppData\Local\Temp\24fabf6941823abecdd4cb4ebd8cf50dd0c0f800b0c55cd410c0dd3ce1545ff1.exe"1⤵
- Loads dropped DLL
- Modifies system executable filetype association
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\system\rundll32.exeC:\Windows\system\rundll32.exe2⤵
- Executes dropped EXE
- Modifies system executable filetype association
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2028
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74KB
MD58c260a1041e673ad62bc06c470314ac7
SHA19a156968807ecdfc374b329e2f79b69434a96a99
SHA256db6e8fe5e0a5b291740e515811f695ce95834acbbd9e0ed3173a3c44e529d3df
SHA51297379a29985094f3d1cf850ff85e8fc4eab827512569d9b2f3b5536a987ac78d1c14584ca245adc318d5e2a828c5df8cd4632d31fcf01d58fc02ec719067d54f
-
Filesize
73KB
MD5e0f89ec66a7485e2e86e8cdef24da332
SHA12041d2f13cb6bb63f95edda28a30a584346790ee
SHA256f27e5ade7d4e9bbfe0171dbc2d9d46d66f6a095cde440143e1daf5a6e8f3c73d
SHA512a75df6d6512c4e4a6521402c0f273836deacd31dbfe3dfca2a6665f05d9c077e713b2179ce26a8993774f4ada72d80388745704f55dd30e8d2395493d710a841