Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
04/06/2024, 22:29
Static task
static1
Behavioral task
behavioral1
Sample
f6f8cdd1a6b6fef0f8ae27bcbbd15053f7b9d65d767bbaf59734622518b2395d.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f6f8cdd1a6b6fef0f8ae27bcbbd15053f7b9d65d767bbaf59734622518b2395d.exe
Resource
win10v2004-20240508-en
General
-
Target
f6f8cdd1a6b6fef0f8ae27bcbbd15053f7b9d65d767bbaf59734622518b2395d.exe
-
Size
74KB
-
MD5
707df4903d9ee8bcefc445fd6d89014b
-
SHA1
48c1a378b49f9de57fda1e0e9d99e5eb89d8f0b7
-
SHA256
f6f8cdd1a6b6fef0f8ae27bcbbd15053f7b9d65d767bbaf59734622518b2395d
-
SHA512
fa159a8fc768f96701c9655cec3df202dd57729ec098f7bda3205f12f0bfdf1a7530d6495756405da130df19638da89fb3793c75be36ece86fcaa7b892ae2376
-
SSDEEP
768:agO5xRYi+SfSWHHNvvG5bnl/NqNwsKVDstHxYD0p1aXKynF0vQmYZS0HdJnfWO/T:RshfSWHHNvoLqNwDDGw02eQmh0HjWO/T
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3828 rundll32.exe -
Modifies system executable filetype association 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" f6f8cdd1a6b6fef0f8ae27bcbbd15053f7b9d65d767bbaf59734622518b2395d.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command f6f8cdd1a6b6fef0f8ae27bcbbd15053f7b9d65d767bbaf59734622518b2395d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" f6f8cdd1a6b6fef0f8ae27bcbbd15053f7b9d65d767bbaf59734622518b2395d.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\¢«.exe f6f8cdd1a6b6fef0f8ae27bcbbd15053f7b9d65d767bbaf59734622518b2395d.exe File created C:\Windows\SysWOW64\¢«.exe f6f8cdd1a6b6fef0f8ae27bcbbd15053f7b9d65d767bbaf59734622518b2395d.exe File opened for modification C:\Windows\SysWOW64\notepad¢¬.exe f6f8cdd1a6b6fef0f8ae27bcbbd15053f7b9d65d767bbaf59734622518b2395d.exe File created C:\Windows\SysWOW64\notepad¢¬.exe f6f8cdd1a6b6fef0f8ae27bcbbd15053f7b9d65d767bbaf59734622518b2395d.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system\rundll32.exe f6f8cdd1a6b6fef0f8ae27bcbbd15053f7b9d65d767bbaf59734622518b2395d.exe File created C:\Windows\system\rundll32.exe f6f8cdd1a6b6fef0f8ae27bcbbd15053f7b9d65d767bbaf59734622518b2395d.exe -
Modifies registry class 15 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" f6f8cdd1a6b6fef0f8ae27bcbbd15053f7b9d65d767bbaf59734622518b2395d.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command f6f8cdd1a6b6fef0f8ae27bcbbd15053f7b9d65d767bbaf59734622518b2395d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad.exe %1" f6f8cdd1a6b6fef0f8ae27bcbbd15053f7b9d65d767bbaf59734622518b2395d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainVer = "506" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" f6f8cdd1a6b6fef0f8ae27bcbbd15053f7b9d65d767bbaf59734622518b2395d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" f6f8cdd1a6b6fef0f8ae27bcbbd15053f7b9d65d767bbaf59734622518b2395d.exe Key created \REGISTRY\MACHINE\Software\Classes\MSipv rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainSetup = "1717540175" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\MSipv f6f8cdd1a6b6fef0f8ae27bcbbd15053f7b9d65d767bbaf59734622518b2395d.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command f6f8cdd1a6b6fef0f8ae27bcbbd15053f7b9d65d767bbaf59734622518b2395d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainUp = "1717540175" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 2900 f6f8cdd1a6b6fef0f8ae27bcbbd15053f7b9d65d767bbaf59734622518b2395d.exe 2900 f6f8cdd1a6b6fef0f8ae27bcbbd15053f7b9d65d767bbaf59734622518b2395d.exe 2900 f6f8cdd1a6b6fef0f8ae27bcbbd15053f7b9d65d767bbaf59734622518b2395d.exe 2900 f6f8cdd1a6b6fef0f8ae27bcbbd15053f7b9d65d767bbaf59734622518b2395d.exe 2900 f6f8cdd1a6b6fef0f8ae27bcbbd15053f7b9d65d767bbaf59734622518b2395d.exe 2900 f6f8cdd1a6b6fef0f8ae27bcbbd15053f7b9d65d767bbaf59734622518b2395d.exe 2900 f6f8cdd1a6b6fef0f8ae27bcbbd15053f7b9d65d767bbaf59734622518b2395d.exe 2900 f6f8cdd1a6b6fef0f8ae27bcbbd15053f7b9d65d767bbaf59734622518b2395d.exe 2900 f6f8cdd1a6b6fef0f8ae27bcbbd15053f7b9d65d767bbaf59734622518b2395d.exe 2900 f6f8cdd1a6b6fef0f8ae27bcbbd15053f7b9d65d767bbaf59734622518b2395d.exe 2900 f6f8cdd1a6b6fef0f8ae27bcbbd15053f7b9d65d767bbaf59734622518b2395d.exe 2900 f6f8cdd1a6b6fef0f8ae27bcbbd15053f7b9d65d767bbaf59734622518b2395d.exe 2900 f6f8cdd1a6b6fef0f8ae27bcbbd15053f7b9d65d767bbaf59734622518b2395d.exe 2900 f6f8cdd1a6b6fef0f8ae27bcbbd15053f7b9d65d767bbaf59734622518b2395d.exe 2900 f6f8cdd1a6b6fef0f8ae27bcbbd15053f7b9d65d767bbaf59734622518b2395d.exe 2900 f6f8cdd1a6b6fef0f8ae27bcbbd15053f7b9d65d767bbaf59734622518b2395d.exe 2900 f6f8cdd1a6b6fef0f8ae27bcbbd15053f7b9d65d767bbaf59734622518b2395d.exe 2900 f6f8cdd1a6b6fef0f8ae27bcbbd15053f7b9d65d767bbaf59734622518b2395d.exe 2900 f6f8cdd1a6b6fef0f8ae27bcbbd15053f7b9d65d767bbaf59734622518b2395d.exe 2900 f6f8cdd1a6b6fef0f8ae27bcbbd15053f7b9d65d767bbaf59734622518b2395d.exe 2900 f6f8cdd1a6b6fef0f8ae27bcbbd15053f7b9d65d767bbaf59734622518b2395d.exe 2900 f6f8cdd1a6b6fef0f8ae27bcbbd15053f7b9d65d767bbaf59734622518b2395d.exe 2900 f6f8cdd1a6b6fef0f8ae27bcbbd15053f7b9d65d767bbaf59734622518b2395d.exe 2900 f6f8cdd1a6b6fef0f8ae27bcbbd15053f7b9d65d767bbaf59734622518b2395d.exe 2900 f6f8cdd1a6b6fef0f8ae27bcbbd15053f7b9d65d767bbaf59734622518b2395d.exe 2900 f6f8cdd1a6b6fef0f8ae27bcbbd15053f7b9d65d767bbaf59734622518b2395d.exe 2900 f6f8cdd1a6b6fef0f8ae27bcbbd15053f7b9d65d767bbaf59734622518b2395d.exe 2900 f6f8cdd1a6b6fef0f8ae27bcbbd15053f7b9d65d767bbaf59734622518b2395d.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3828 rundll32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2900 f6f8cdd1a6b6fef0f8ae27bcbbd15053f7b9d65d767bbaf59734622518b2395d.exe 3828 rundll32.exe 3828 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2900 wrote to memory of 3828 2900 f6f8cdd1a6b6fef0f8ae27bcbbd15053f7b9d65d767bbaf59734622518b2395d.exe 86 PID 2900 wrote to memory of 3828 2900 f6f8cdd1a6b6fef0f8ae27bcbbd15053f7b9d65d767bbaf59734622518b2395d.exe 86 PID 2900 wrote to memory of 3828 2900 f6f8cdd1a6b6fef0f8ae27bcbbd15053f7b9d65d767bbaf59734622518b2395d.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\f6f8cdd1a6b6fef0f8ae27bcbbd15053f7b9d65d767bbaf59734622518b2395d.exe"C:\Users\Admin\AppData\Local\Temp\f6f8cdd1a6b6fef0f8ae27bcbbd15053f7b9d65d767bbaf59734622518b2395d.exe"1⤵
- Modifies system executable filetype association
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\system\rundll32.exeC:\Windows\system\rundll32.exe2⤵
- Executes dropped EXE
- Modifies system executable filetype association
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3828
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76KB
MD52396cf35a049d083a3fadd6e9af806b9
SHA14ac5c2973b7fedfa4d78b3af50c7f1155bc518a5
SHA256a4e257a60bec0b695d3f8f988f8cb3cd37f3b8772476e66002fdea4b3c6ed345
SHA5123735f3f3b1a1680331e0d7e010b1173a202c518e5822a0db9c43e69a77d60e3ebebd31699437747c3b743b20ace833fe4864a45c4bf3441cd68672a2372996ba
-
Filesize
82KB
MD5aa2e66ec10d86f67519277a2b70ef1bb
SHA185b1af0bec585bce1af6c59c3a2cdd31a6865abd
SHA25678cef7560b151a8964141b903e2118af16448201640de0adddb2c88404c25047
SHA512b812dc8700bbe2f66db1e2916f42d523fdde21cb4d28719868254749b52039ad394b86946a743b0066f55c77496358f1474a99988115c0cfff253eaf19f85c8b