Analysis
-
max time kernel
149s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
09/06/2024, 18:51
Static task
static1
Behavioral task
behavioral1
Sample
09f439a6bb38ffe09c2428df06fbf0a4ca2aa138e922653ccbed8ccbd1512386.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
09f439a6bb38ffe09c2428df06fbf0a4ca2aa138e922653ccbed8ccbd1512386.exe
Resource
win10v2004-20240508-en
General
-
Target
09f439a6bb38ffe09c2428df06fbf0a4ca2aa138e922653ccbed8ccbd1512386.exe
-
Size
83KB
-
MD5
9632e7941853f0533aa1de7522fbc5f7
-
SHA1
6ce7284b526b08c7b5f196bb0c5a4ec7530a20d9
-
SHA256
09f439a6bb38ffe09c2428df06fbf0a4ca2aa138e922653ccbed8ccbd1512386
-
SHA512
e4f11963c2bb4175c99fc352edeadea1ff23c0eca4588bd236ff6fd2d244bda3ede66af92eacfb1d364925134ca4fb6d305fcc259095068f3aef2e96982f3cab
-
SSDEEP
1536:RshfSWHHNvoLqNwDDGw02eQmh0HjWOoMl:GhfxHNIreQm+HiTMl
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1420 rundll32.exe -
Modifies system executable filetype association 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command 09f439a6bb38ffe09c2428df06fbf0a4ca2aa138e922653ccbed8ccbd1512386.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 09f439a6bb38ffe09c2428df06fbf0a4ca2aa138e922653ccbed8ccbd1512386.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" 09f439a6bb38ffe09c2428df06fbf0a4ca2aa138e922653ccbed8ccbd1512386.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\¢«.exe 09f439a6bb38ffe09c2428df06fbf0a4ca2aa138e922653ccbed8ccbd1512386.exe File created C:\Windows\SysWOW64\¢«.exe 09f439a6bb38ffe09c2428df06fbf0a4ca2aa138e922653ccbed8ccbd1512386.exe File opened for modification C:\Windows\SysWOW64\notepad¢¬.exe 09f439a6bb38ffe09c2428df06fbf0a4ca2aa138e922653ccbed8ccbd1512386.exe File created C:\Windows\SysWOW64\notepad¢¬.exe 09f439a6bb38ffe09c2428df06fbf0a4ca2aa138e922653ccbed8ccbd1512386.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system\rundll32.exe 09f439a6bb38ffe09c2428df06fbf0a4ca2aa138e922653ccbed8ccbd1512386.exe File created C:\Windows\system\rundll32.exe 09f439a6bb38ffe09c2428df06fbf0a4ca2aa138e922653ccbed8ccbd1512386.exe -
Modifies registry class 15 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainVer = "506" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" 09f439a6bb38ffe09c2428df06fbf0a4ca2aa138e922653ccbed8ccbd1512386.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainUp = "1717959087" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\MSipv rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainSetup = "1717959087" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\MSipv 09f439a6bb38ffe09c2428df06fbf0a4ca2aa138e922653ccbed8ccbd1512386.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 09f439a6bb38ffe09c2428df06fbf0a4ca2aa138e922653ccbed8ccbd1512386.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad.exe %1" 09f439a6bb38ffe09c2428df06fbf0a4ca2aa138e922653ccbed8ccbd1512386.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command 09f439a6bb38ffe09c2428df06fbf0a4ca2aa138e922653ccbed8ccbd1512386.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command 09f439a6bb38ffe09c2428df06fbf0a4ca2aa138e922653ccbed8ccbd1512386.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" 09f439a6bb38ffe09c2428df06fbf0a4ca2aa138e922653ccbed8ccbd1512386.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" rundll32.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 3404 09f439a6bb38ffe09c2428df06fbf0a4ca2aa138e922653ccbed8ccbd1512386.exe 3404 09f439a6bb38ffe09c2428df06fbf0a4ca2aa138e922653ccbed8ccbd1512386.exe 3404 09f439a6bb38ffe09c2428df06fbf0a4ca2aa138e922653ccbed8ccbd1512386.exe 3404 09f439a6bb38ffe09c2428df06fbf0a4ca2aa138e922653ccbed8ccbd1512386.exe 3404 09f439a6bb38ffe09c2428df06fbf0a4ca2aa138e922653ccbed8ccbd1512386.exe 3404 09f439a6bb38ffe09c2428df06fbf0a4ca2aa138e922653ccbed8ccbd1512386.exe 3404 09f439a6bb38ffe09c2428df06fbf0a4ca2aa138e922653ccbed8ccbd1512386.exe 3404 09f439a6bb38ffe09c2428df06fbf0a4ca2aa138e922653ccbed8ccbd1512386.exe 3404 09f439a6bb38ffe09c2428df06fbf0a4ca2aa138e922653ccbed8ccbd1512386.exe 3404 09f439a6bb38ffe09c2428df06fbf0a4ca2aa138e922653ccbed8ccbd1512386.exe 3404 09f439a6bb38ffe09c2428df06fbf0a4ca2aa138e922653ccbed8ccbd1512386.exe 3404 09f439a6bb38ffe09c2428df06fbf0a4ca2aa138e922653ccbed8ccbd1512386.exe 3404 09f439a6bb38ffe09c2428df06fbf0a4ca2aa138e922653ccbed8ccbd1512386.exe 3404 09f439a6bb38ffe09c2428df06fbf0a4ca2aa138e922653ccbed8ccbd1512386.exe 3404 09f439a6bb38ffe09c2428df06fbf0a4ca2aa138e922653ccbed8ccbd1512386.exe 3404 09f439a6bb38ffe09c2428df06fbf0a4ca2aa138e922653ccbed8ccbd1512386.exe 3404 09f439a6bb38ffe09c2428df06fbf0a4ca2aa138e922653ccbed8ccbd1512386.exe 3404 09f439a6bb38ffe09c2428df06fbf0a4ca2aa138e922653ccbed8ccbd1512386.exe 3404 09f439a6bb38ffe09c2428df06fbf0a4ca2aa138e922653ccbed8ccbd1512386.exe 3404 09f439a6bb38ffe09c2428df06fbf0a4ca2aa138e922653ccbed8ccbd1512386.exe 3404 09f439a6bb38ffe09c2428df06fbf0a4ca2aa138e922653ccbed8ccbd1512386.exe 3404 09f439a6bb38ffe09c2428df06fbf0a4ca2aa138e922653ccbed8ccbd1512386.exe 3404 09f439a6bb38ffe09c2428df06fbf0a4ca2aa138e922653ccbed8ccbd1512386.exe 3404 09f439a6bb38ffe09c2428df06fbf0a4ca2aa138e922653ccbed8ccbd1512386.exe 3404 09f439a6bb38ffe09c2428df06fbf0a4ca2aa138e922653ccbed8ccbd1512386.exe 3404 09f439a6bb38ffe09c2428df06fbf0a4ca2aa138e922653ccbed8ccbd1512386.exe 3404 09f439a6bb38ffe09c2428df06fbf0a4ca2aa138e922653ccbed8ccbd1512386.exe 3404 09f439a6bb38ffe09c2428df06fbf0a4ca2aa138e922653ccbed8ccbd1512386.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1420 rundll32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3404 09f439a6bb38ffe09c2428df06fbf0a4ca2aa138e922653ccbed8ccbd1512386.exe 1420 rundll32.exe 1420 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3404 wrote to memory of 1420 3404 09f439a6bb38ffe09c2428df06fbf0a4ca2aa138e922653ccbed8ccbd1512386.exe 84 PID 3404 wrote to memory of 1420 3404 09f439a6bb38ffe09c2428df06fbf0a4ca2aa138e922653ccbed8ccbd1512386.exe 84 PID 3404 wrote to memory of 1420 3404 09f439a6bb38ffe09c2428df06fbf0a4ca2aa138e922653ccbed8ccbd1512386.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\09f439a6bb38ffe09c2428df06fbf0a4ca2aa138e922653ccbed8ccbd1512386.exe"C:\Users\Admin\AppData\Local\Temp\09f439a6bb38ffe09c2428df06fbf0a4ca2aa138e922653ccbed8ccbd1512386.exe"1⤵
- Modifies system executable filetype association
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3404 -
C:\Windows\system\rundll32.exeC:\Windows\system\rundll32.exe2⤵
- Executes dropped EXE
- Modifies system executable filetype association
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1420
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
77KB
MD5c6cb55339cf96da38bd0c8ff5ee34123
SHA10490bdf73334cfb70934dfbe8df98688d3eabedd
SHA2563fdadb4ce5ddb0c761f838ac313e7d3ce962084ddbd5a3a2a2258aa181745d1d
SHA5120b521c3b947838eaba601b4f38b3a951043cc657ded78cf7a32fcda762e385721dfdcc22973afc78c6730a6cc64b3dad0c0696e9ecd549558f3df6bd3922bed0
-
Filesize
77KB
MD59ef7364496bb730d309f5c93faf65e89
SHA1402ac06707ca4a7c5886f1e744fa87195ca98f9e
SHA256c975d96bde208b09a3fcc8d646613a60395df9f17a562bd786054610938990b4
SHA512997e99b1b844cb9268167724ea9eebe6ea0d4e7ff74fa1be058e63ea4d0352cc1245983837f77c7e7bcb341bdf681784b3419cb94230276bd4aa1bb6e048d5a4