Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/06/2024, 22:29

General

  • Target

    f6f8cdd1a6b6fef0f8ae27bcbbd15053f7b9d65d767bbaf59734622518b2395d.exe

  • Size

    74KB

  • MD5

    707df4903d9ee8bcefc445fd6d89014b

  • SHA1

    48c1a378b49f9de57fda1e0e9d99e5eb89d8f0b7

  • SHA256

    f6f8cdd1a6b6fef0f8ae27bcbbd15053f7b9d65d767bbaf59734622518b2395d

  • SHA512

    fa159a8fc768f96701c9655cec3df202dd57729ec098f7bda3205f12f0bfdf1a7530d6495756405da130df19638da89fb3793c75be36ece86fcaa7b892ae2376

  • SSDEEP

    768:agO5xRYi+SfSWHHNvvG5bnl/NqNwsKVDstHxYD0p1aXKynF0vQmYZS0HdJnfWO/T:RshfSWHHNvoLqNwDDGw02eQmh0HjWO/T

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Modifies system executable filetype association 2 TTPs 5 IoCs
  • Drops file in System32 directory 4 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies registry class 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 28 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f6f8cdd1a6b6fef0f8ae27bcbbd15053f7b9d65d767bbaf59734622518b2395d.exe
    "C:\Users\Admin\AppData\Local\Temp\f6f8cdd1a6b6fef0f8ae27bcbbd15053f7b9d65d767bbaf59734622518b2395d.exe"
    1⤵
    • Modifies system executable filetype association
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2900
    • C:\Windows\system\rundll32.exe
      C:\Windows\system\rundll32.exe
      2⤵
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:3828

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\notepad¢¬.exe

          Filesize

          76KB

          MD5

          2396cf35a049d083a3fadd6e9af806b9

          SHA1

          4ac5c2973b7fedfa4d78b3af50c7f1155bc518a5

          SHA256

          a4e257a60bec0b695d3f8f988f8cb3cd37f3b8772476e66002fdea4b3c6ed345

          SHA512

          3735f3f3b1a1680331e0d7e010b1173a202c518e5822a0db9c43e69a77d60e3ebebd31699437747c3b743b20ace833fe4864a45c4bf3441cd68672a2372996ba

        • C:\Windows\System\rundll32.exe

          Filesize

          82KB

          MD5

          aa2e66ec10d86f67519277a2b70ef1bb

          SHA1

          85b1af0bec585bce1af6c59c3a2cdd31a6865abd

          SHA256

          78cef7560b151a8964141b903e2118af16448201640de0adddb2c88404c25047

          SHA512

          b812dc8700bbe2f66db1e2916f42d523fdde21cb4d28719868254749b52039ad394b86946a743b0066f55c77496358f1474a99988115c0cfff253eaf19f85c8b

        • memory/2900-0-0x0000000000400000-0x0000000000415A00-memory.dmp

          Filesize

          86KB

        • memory/2900-13-0x0000000000400000-0x0000000000415A00-memory.dmp

          Filesize

          86KB