Analysis
-
max time kernel
150s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04-06-2024 06:29
Static task
static1
Behavioral task
behavioral1
Sample
ae3139e55c1451b7d981532909a4887abcc85dde6f7cb2acd6eb9f1dd4dfb79c.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ae3139e55c1451b7d981532909a4887abcc85dde6f7cb2acd6eb9f1dd4dfb79c.exe
Resource
win10v2004-20240508-en
General
-
Target
ae3139e55c1451b7d981532909a4887abcc85dde6f7cb2acd6eb9f1dd4dfb79c.exe
-
Size
81KB
-
MD5
2f4c6b37ef184c88422883a27f49cbc7
-
SHA1
badc98925d9387e0d9e1fde03886e81f0ad82ef7
-
SHA256
ae3139e55c1451b7d981532909a4887abcc85dde6f7cb2acd6eb9f1dd4dfb79c
-
SHA512
af9923a46e12670b252618c620179f42b23f40df4c65ab502a70af60f84b3346bbac405f19c8338eb5f9e701594cffb0a466a4aeac26af54c2f95bc1c0796159
-
SSDEEP
1536:RshfSWHHNvoLqNwDDGw02eQmh0HjWOcUgBK8w:GhfxHNIreQm+HiZUgBK8w
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2908 rundll32.exe -
Loads dropped DLL 2 IoCs
pid Process 2196 ae3139e55c1451b7d981532909a4887abcc85dde6f7cb2acd6eb9f1dd4dfb79c.exe 2196 ae3139e55c1451b7d981532909a4887abcc85dde6f7cb2acd6eb9f1dd4dfb79c.exe -
Modifies system executable filetype association 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command ae3139e55c1451b7d981532909a4887abcc85dde6f7cb2acd6eb9f1dd4dfb79c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" ae3139e55c1451b7d981532909a4887abcc85dde6f7cb2acd6eb9f1dd4dfb79c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" ae3139e55c1451b7d981532909a4887abcc85dde6f7cb2acd6eb9f1dd4dfb79c.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\¢«.exe ae3139e55c1451b7d981532909a4887abcc85dde6f7cb2acd6eb9f1dd4dfb79c.exe File created C:\Windows\SysWOW64\¢«.exe ae3139e55c1451b7d981532909a4887abcc85dde6f7cb2acd6eb9f1dd4dfb79c.exe File opened for modification C:\Windows\SysWOW64\notepad¢¬.exe ae3139e55c1451b7d981532909a4887abcc85dde6f7cb2acd6eb9f1dd4dfb79c.exe File created C:\Windows\SysWOW64\notepad¢¬.exe ae3139e55c1451b7d981532909a4887abcc85dde6f7cb2acd6eb9f1dd4dfb79c.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system\rundll32.exe ae3139e55c1451b7d981532909a4887abcc85dde6f7cb2acd6eb9f1dd4dfb79c.exe File created C:\Windows\system\rundll32.exe ae3139e55c1451b7d981532909a4887abcc85dde6f7cb2acd6eb9f1dd4dfb79c.exe -
Modifies registry class 15 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\MSipv ae3139e55c1451b7d981532909a4887abcc85dde6f7cb2acd6eb9f1dd4dfb79c.exe Key created \REGISTRY\MACHINE\Software\Classes\MSipv rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" ae3139e55c1451b7d981532909a4887abcc85dde6f7cb2acd6eb9f1dd4dfb79c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainUp = "1717482579" rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainVer = "506" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad.exe %1" ae3139e55c1451b7d981532909a4887abcc85dde6f7cb2acd6eb9f1dd4dfb79c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" ae3139e55c1451b7d981532909a4887abcc85dde6f7cb2acd6eb9f1dd4dfb79c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" ae3139e55c1451b7d981532909a4887abcc85dde6f7cb2acd6eb9f1dd4dfb79c.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command ae3139e55c1451b7d981532909a4887abcc85dde6f7cb2acd6eb9f1dd4dfb79c.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command ae3139e55c1451b7d981532909a4887abcc85dde6f7cb2acd6eb9f1dd4dfb79c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainSetup = "1717482579" rundll32.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2196 ae3139e55c1451b7d981532909a4887abcc85dde6f7cb2acd6eb9f1dd4dfb79c.exe 2196 ae3139e55c1451b7d981532909a4887abcc85dde6f7cb2acd6eb9f1dd4dfb79c.exe 2196 ae3139e55c1451b7d981532909a4887abcc85dde6f7cb2acd6eb9f1dd4dfb79c.exe 2196 ae3139e55c1451b7d981532909a4887abcc85dde6f7cb2acd6eb9f1dd4dfb79c.exe 2196 ae3139e55c1451b7d981532909a4887abcc85dde6f7cb2acd6eb9f1dd4dfb79c.exe 2196 ae3139e55c1451b7d981532909a4887abcc85dde6f7cb2acd6eb9f1dd4dfb79c.exe 2196 ae3139e55c1451b7d981532909a4887abcc85dde6f7cb2acd6eb9f1dd4dfb79c.exe 2196 ae3139e55c1451b7d981532909a4887abcc85dde6f7cb2acd6eb9f1dd4dfb79c.exe 2196 ae3139e55c1451b7d981532909a4887abcc85dde6f7cb2acd6eb9f1dd4dfb79c.exe 2196 ae3139e55c1451b7d981532909a4887abcc85dde6f7cb2acd6eb9f1dd4dfb79c.exe 2196 ae3139e55c1451b7d981532909a4887abcc85dde6f7cb2acd6eb9f1dd4dfb79c.exe 2196 ae3139e55c1451b7d981532909a4887abcc85dde6f7cb2acd6eb9f1dd4dfb79c.exe 2196 ae3139e55c1451b7d981532909a4887abcc85dde6f7cb2acd6eb9f1dd4dfb79c.exe 2196 ae3139e55c1451b7d981532909a4887abcc85dde6f7cb2acd6eb9f1dd4dfb79c.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2908 rundll32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2196 ae3139e55c1451b7d981532909a4887abcc85dde6f7cb2acd6eb9f1dd4dfb79c.exe 2908 rundll32.exe 2908 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2196 wrote to memory of 2908 2196 ae3139e55c1451b7d981532909a4887abcc85dde6f7cb2acd6eb9f1dd4dfb79c.exe 28 PID 2196 wrote to memory of 2908 2196 ae3139e55c1451b7d981532909a4887abcc85dde6f7cb2acd6eb9f1dd4dfb79c.exe 28 PID 2196 wrote to memory of 2908 2196 ae3139e55c1451b7d981532909a4887abcc85dde6f7cb2acd6eb9f1dd4dfb79c.exe 28 PID 2196 wrote to memory of 2908 2196 ae3139e55c1451b7d981532909a4887abcc85dde6f7cb2acd6eb9f1dd4dfb79c.exe 28 PID 2196 wrote to memory of 2908 2196 ae3139e55c1451b7d981532909a4887abcc85dde6f7cb2acd6eb9f1dd4dfb79c.exe 28 PID 2196 wrote to memory of 2908 2196 ae3139e55c1451b7d981532909a4887abcc85dde6f7cb2acd6eb9f1dd4dfb79c.exe 28 PID 2196 wrote to memory of 2908 2196 ae3139e55c1451b7d981532909a4887abcc85dde6f7cb2acd6eb9f1dd4dfb79c.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\ae3139e55c1451b7d981532909a4887abcc85dde6f7cb2acd6eb9f1dd4dfb79c.exe"C:\Users\Admin\AppData\Local\Temp\ae3139e55c1451b7d981532909a4887abcc85dde6f7cb2acd6eb9f1dd4dfb79c.exe"1⤵
- Loads dropped DLL
- Modifies system executable filetype association
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Windows\system\rundll32.exeC:\Windows\system\rundll32.exe2⤵
- Executes dropped EXE
- Modifies system executable filetype association
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2908
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
78KB
MD576f5ad93c9afa71d81094f98a8efe875
SHA12b8696d72875717792fa7eb375b68e5e34db9e72
SHA25642a37bfe162aaedf4a7edf3795d1f90c3450c12aa751fb18ebcd75b4d1a0a2a6
SHA5129f565b3e5b69e8a4c99a531c56b9af6db839c5cc00557466998faa7a8aa5864c9cca42bb8f8d478dd0b5c54dd15b8241534370a3d372e72de77a2aa35f12f069
-
Filesize
83KB
MD57f01dda5d6f0cc056b9a6b7fc615fac8
SHA1b73fbb5805c51f8f4d893b026b84e261c83f45ef
SHA256bb0cad63d6011359d96203e9a3966a0f7984cc12c9230097daf393280b0bf695
SHA512e96e8074d6777cd8aea1ef347e1dc36a7d33cfa8c1e9457232426c3f90f711800b97d0da67d63ddc5793c5bb5a7234207f0f76fdc81bf0cf347e5586c7e2e1d8