Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/06/2024, 21:29

General

  • Target

    bdf7dca7737fc1ac97a12cb1bdfd1830de7cf0acb428888dc46d04a3e3605a3c.exe

  • Size

    79KB

  • MD5

    8400839cb6371ccc98dd0029407ec8f2

  • SHA1

    82dde165841c284f78bc7648887ca9e4899f97d5

  • SHA256

    bdf7dca7737fc1ac97a12cb1bdfd1830de7cf0acb428888dc46d04a3e3605a3c

  • SHA512

    71c02918decbf19f327cd540ed9157d8fe0f8f1415541b54a418c8dee6aad8dfcce41f2968d79c7422ba6aed32953aadfa471012f84660468f1f97dfa47d849e

  • SSDEEP

    1536:RshfSWHHNvoLqNwDDGw02eQmh0HjWO3mIbHu:GhfxHNIreQm+HiYmI6

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Modifies system executable filetype association 2 TTPs 5 IoCs
  • Drops file in System32 directory 4 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies registry class 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 28 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bdf7dca7737fc1ac97a12cb1bdfd1830de7cf0acb428888dc46d04a3e3605a3c.exe
    "C:\Users\Admin\AppData\Local\Temp\bdf7dca7737fc1ac97a12cb1bdfd1830de7cf0acb428888dc46d04a3e3605a3c.exe"
    1⤵
    • Modifies system executable filetype association
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1424
    • C:\Windows\system\rundll32.exe
      C:\Windows\system\rundll32.exe
      2⤵
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:1560

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\notepad¢¬.exe

          Filesize

          81KB

          MD5

          3c0483fcf1b1367b1c1498aa20f70b23

          SHA1

          8eacc1f9a35231fd2aac9679c517cb9b6160e9b3

          SHA256

          0f37de854c82bf8f0c0e429fdbf3c84fb5a4a8a05d448d6355c3dfc47f7d92a4

          SHA512

          a6132e7495c5de0e08348d220ff965c0bae8acf263de2b15b93365b5c5cfd0d196b13552564630ad434543096423ab5a8f33a0edebcd3b4cb55f78cfc44ae968

        • C:\Windows\System\rundll32.exe

          Filesize

          80KB

          MD5

          4d8045fe3acfd9c49f9db46d3bd4004a

          SHA1

          3b1c476bd7a3b54fc83c44e0ada079fcbbb10d88

          SHA256

          b8f2f925e590454936890dee3fce3cc2bef89b14f6442026935dcfbf1b22c517

          SHA512

          432671073d5c0eff56ddf60cff86168996c610b117e77d87a223c1c5d1c77cca7f2a0d21b9485f049c7b739235d84e64399c911eb2cbf9c6fcf1996711a32976

        • memory/1424-0-0x0000000000400000-0x0000000000415A00-memory.dmp

          Filesize

          86KB

        • memory/1424-13-0x0000000000400000-0x0000000000415A00-memory.dmp

          Filesize

          86KB