Analysis

  • max time kernel
    149s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/06/2024, 11:29

General

  • Target

    893a8d13f3a2f4101c86296a40c0fb9a4c3c26308bf93ed6a0d0abcb30ab4c7f.exe

  • Size

    83KB

  • MD5

    3a966e7988c75c3e59bef954191e2ba2

  • SHA1

    c80075f0e1443a4aab117e1eb9689fea4edef4f9

  • SHA256

    893a8d13f3a2f4101c86296a40c0fb9a4c3c26308bf93ed6a0d0abcb30ab4c7f

  • SHA512

    2f8eb208e52324afbb3e1dbd607fae007aceff19e460c04813adb3b92a5328e93a72e3a9f6e90eb04bd455b7721483bd5c34fe0fb64e2f86e9fb45d86a23e5f6

  • SSDEEP

    1536:RshfSWHHNvoLqNwDDGw02eQmh0HjWOB+raXsl:GhfxHNIreQm+HiG+raXsl

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Modifies system executable filetype association 2 TTPs 5 IoCs
  • Drops file in System32 directory 4 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies registry class 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 28 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\893a8d13f3a2f4101c86296a40c0fb9a4c3c26308bf93ed6a0d0abcb30ab4c7f.exe
    "C:\Users\Admin\AppData\Local\Temp\893a8d13f3a2f4101c86296a40c0fb9a4c3c26308bf93ed6a0d0abcb30ab4c7f.exe"
    1⤵
    • Modifies system executable filetype association
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2676
    • C:\Windows\system\rundll32.exe
      C:\Windows\system\rundll32.exe
      2⤵
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:1308

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\notepad¢¬.exe

    Filesize

    79KB

    MD5

    1cffe46b55ef9342735594c04d66a5ec

    SHA1

    58843920258604a3e7be86c6dd31bd70314122cd

    SHA256

    1800752e247fc35bcebccc34c3902211de183336755b11ad6e5cabe36ec0817a

    SHA512

    aea43d5f03c4acb0ba04d0a4c728a123c53300711531e433871b02e3aaf7dcaabc3ebfcd31df3303a6366154f20d59d508de4bd0b2aa3287213f1b790436f969

  • C:\Windows\System\rundll32.exe

    Filesize

    82KB

    MD5

    8185d05a49de47a308450796fad8fca8

    SHA1

    9092fb3280a80382094b93045f590bad06c3c233

    SHA256

    25c9326c18fad171af3f13fd338ff407ccc02e98a4187ad23616773c949d6add

    SHA512

    603f1735684ebe6faca341d79d37bc14b86b6358a4e201466ed3313fdcd9b821425f2f8205d74a7af718522291a318cf88194b0ca11b81c4ec2995acf371dd1c

  • memory/2676-0-0x0000000000400000-0x0000000000415A00-memory.dmp

    Filesize

    86KB

  • memory/2676-13-0x0000000000400000-0x0000000000415A00-memory.dmp

    Filesize

    86KB