Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
11/06/2024, 22:29
Static task
static1
Behavioral task
behavioral1
Sample
104bbe02bcdd445eee643ca0ae5572462e801faae347a323b891e041ea328953.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
104bbe02bcdd445eee643ca0ae5572462e801faae347a323b891e041ea328953.exe
Resource
win10v2004-20240508-en
General
-
Target
104bbe02bcdd445eee643ca0ae5572462e801faae347a323b891e041ea328953.exe
-
Size
75KB
-
MD5
a2be3d263e0e3c29eb30663b77dab1ca
-
SHA1
b6d37051e6f3324ec73ea0cbbf513e9e1d65d234
-
SHA256
104bbe02bcdd445eee643ca0ae5572462e801faae347a323b891e041ea328953
-
SHA512
0adf49e2e8888598e1714fb756fbb9778d543e9e1964a13d9970038937d92214318ea49582e694e6bbc83056598ab6efc7af91266d51425259654bd2b659b460
-
SSDEEP
768:agO5xRYi+SfSWHHNvvG5bnl/NqNwsKVDstHxYD0p1aXKynF0vQmYZS0HdJnfWOV:RshfSWHHNvoLqNwDDGw02eQmh0HjWOV
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1360 rundll32.exe -
Modifies system executable filetype association 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command 104bbe02bcdd445eee643ca0ae5572462e801faae347a323b891e041ea328953.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 104bbe02bcdd445eee643ca0ae5572462e801faae347a323b891e041ea328953.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" 104bbe02bcdd445eee643ca0ae5572462e801faae347a323b891e041ea328953.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\¢«.exe 104bbe02bcdd445eee643ca0ae5572462e801faae347a323b891e041ea328953.exe File created C:\Windows\SysWOW64\¢«.exe 104bbe02bcdd445eee643ca0ae5572462e801faae347a323b891e041ea328953.exe File opened for modification C:\Windows\SysWOW64\notepad¢¬.exe 104bbe02bcdd445eee643ca0ae5572462e801faae347a323b891e041ea328953.exe File created C:\Windows\SysWOW64\notepad¢¬.exe 104bbe02bcdd445eee643ca0ae5572462e801faae347a323b891e041ea328953.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system\rundll32.exe 104bbe02bcdd445eee643ca0ae5572462e801faae347a323b891e041ea328953.exe File created C:\Windows\system\rundll32.exe 104bbe02bcdd445eee643ca0ae5572462e801faae347a323b891e041ea328953.exe -
Modifies registry class 15 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" 104bbe02bcdd445eee643ca0ae5572462e801faae347a323b891e041ea328953.exe Key created \REGISTRY\MACHINE\Software\Classes\MSipv rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command 104bbe02bcdd445eee643ca0ae5572462e801faae347a323b891e041ea328953.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 104bbe02bcdd445eee643ca0ae5572462e801faae347a323b891e041ea328953.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad.exe %1" 104bbe02bcdd445eee643ca0ae5572462e801faae347a323b891e041ea328953.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainSetup = "1718144981" rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainUp = "1718144981" rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainVer = "506" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\MSipv 104bbe02bcdd445eee643ca0ae5572462e801faae347a323b891e041ea328953.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" 104bbe02bcdd445eee643ca0ae5572462e801faae347a323b891e041ea328953.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command 104bbe02bcdd445eee643ca0ae5572462e801faae347a323b891e041ea328953.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 4904 104bbe02bcdd445eee643ca0ae5572462e801faae347a323b891e041ea328953.exe 4904 104bbe02bcdd445eee643ca0ae5572462e801faae347a323b891e041ea328953.exe 4904 104bbe02bcdd445eee643ca0ae5572462e801faae347a323b891e041ea328953.exe 4904 104bbe02bcdd445eee643ca0ae5572462e801faae347a323b891e041ea328953.exe 4904 104bbe02bcdd445eee643ca0ae5572462e801faae347a323b891e041ea328953.exe 4904 104bbe02bcdd445eee643ca0ae5572462e801faae347a323b891e041ea328953.exe 4904 104bbe02bcdd445eee643ca0ae5572462e801faae347a323b891e041ea328953.exe 4904 104bbe02bcdd445eee643ca0ae5572462e801faae347a323b891e041ea328953.exe 4904 104bbe02bcdd445eee643ca0ae5572462e801faae347a323b891e041ea328953.exe 4904 104bbe02bcdd445eee643ca0ae5572462e801faae347a323b891e041ea328953.exe 4904 104bbe02bcdd445eee643ca0ae5572462e801faae347a323b891e041ea328953.exe 4904 104bbe02bcdd445eee643ca0ae5572462e801faae347a323b891e041ea328953.exe 4904 104bbe02bcdd445eee643ca0ae5572462e801faae347a323b891e041ea328953.exe 4904 104bbe02bcdd445eee643ca0ae5572462e801faae347a323b891e041ea328953.exe 4904 104bbe02bcdd445eee643ca0ae5572462e801faae347a323b891e041ea328953.exe 4904 104bbe02bcdd445eee643ca0ae5572462e801faae347a323b891e041ea328953.exe 4904 104bbe02bcdd445eee643ca0ae5572462e801faae347a323b891e041ea328953.exe 4904 104bbe02bcdd445eee643ca0ae5572462e801faae347a323b891e041ea328953.exe 4904 104bbe02bcdd445eee643ca0ae5572462e801faae347a323b891e041ea328953.exe 4904 104bbe02bcdd445eee643ca0ae5572462e801faae347a323b891e041ea328953.exe 4904 104bbe02bcdd445eee643ca0ae5572462e801faae347a323b891e041ea328953.exe 4904 104bbe02bcdd445eee643ca0ae5572462e801faae347a323b891e041ea328953.exe 4904 104bbe02bcdd445eee643ca0ae5572462e801faae347a323b891e041ea328953.exe 4904 104bbe02bcdd445eee643ca0ae5572462e801faae347a323b891e041ea328953.exe 4904 104bbe02bcdd445eee643ca0ae5572462e801faae347a323b891e041ea328953.exe 4904 104bbe02bcdd445eee643ca0ae5572462e801faae347a323b891e041ea328953.exe 4904 104bbe02bcdd445eee643ca0ae5572462e801faae347a323b891e041ea328953.exe 4904 104bbe02bcdd445eee643ca0ae5572462e801faae347a323b891e041ea328953.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1360 rundll32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4904 104bbe02bcdd445eee643ca0ae5572462e801faae347a323b891e041ea328953.exe 1360 rundll32.exe 1360 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4904 wrote to memory of 1360 4904 104bbe02bcdd445eee643ca0ae5572462e801faae347a323b891e041ea328953.exe 81 PID 4904 wrote to memory of 1360 4904 104bbe02bcdd445eee643ca0ae5572462e801faae347a323b891e041ea328953.exe 81 PID 4904 wrote to memory of 1360 4904 104bbe02bcdd445eee643ca0ae5572462e801faae347a323b891e041ea328953.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\104bbe02bcdd445eee643ca0ae5572462e801faae347a323b891e041ea328953.exe"C:\Users\Admin\AppData\Local\Temp\104bbe02bcdd445eee643ca0ae5572462e801faae347a323b891e041ea328953.exe"1⤵
- Modifies system executable filetype association
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Windows\system\rundll32.exeC:\Windows\system\rundll32.exe2⤵
- Executes dropped EXE
- Modifies system executable filetype association
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1360
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74KB
MD5ce1bae6d3c19988d38e033457725b5cd
SHA1b234a06ed1205e3e35f1b88634e6016dd35bb6d1
SHA256e59c5ff1cb41b7f359bfdb65a214a89f18f97285386897fc36607e0af7301bfe
SHA512260f4f505b8cf216baab2e06369d59dbafb4d155c941d9c6a296d5e0dd7d9cc48a3a9f7e9bdb0ec2fb1b40d36620490bb1833b2af12a5ebb679bc385ae394f7c
-
Filesize
74KB
MD5d47f16ba371a2c0fa30aa78e6e48042b
SHA19f4a5b4060a033c34abc02ce0b8a6bf597a51e6e
SHA256cf2d5866b013182737bac2fc9fa94733c41cbedcf38f03edc41115c366c73154
SHA51255420fbfb6584894cf27fdcbd32af2fa3630cc9328c15e517c66b76a0b9193820a2eb77c1e4a497cc2a21d39ae4c7c8406f912d65ce6a8d48f2cc2bbebad2c38