Analysis

  • max time kernel
    149s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    11/06/2024, 02:29

General

  • Target

    a3d1dddbfcce8aed41249cbe2965e36b84a2022a595dbb2051a22e8058d0ad99.exe

  • Size

    75KB

  • MD5

    9ff77694235c87e182d4081e427a8d4f

  • SHA1

    f17daf701e301f4bb6c8d385e9ad735012a389bb

  • SHA256

    a3d1dddbfcce8aed41249cbe2965e36b84a2022a595dbb2051a22e8058d0ad99

  • SHA512

    ae8ce3f0048202b1bc39615e760ed35a4b1468b29c500554cd007ed14d30d916b92415c968c1a2649dcc5c5bb467d0ec7a1aa016559dfa195dbeebb1a53b0369

  • SSDEEP

    1536:RshfSWHHNvoLqNwDDGw02eQmh0HjWOCQD:GhfxHNIreQm+HiVQD

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Modifies system executable filetype association 2 TTPs 5 IoCs
  • Drops file in System32 directory 4 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies registry class 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a3d1dddbfcce8aed41249cbe2965e36b84a2022a595dbb2051a22e8058d0ad99.exe
    "C:\Users\Admin\AppData\Local\Temp\a3d1dddbfcce8aed41249cbe2965e36b84a2022a595dbb2051a22e8058d0ad99.exe"
    1⤵
    • Loads dropped DLL
    • Modifies system executable filetype association
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2084
    • C:\Windows\system\rundll32.exe
      C:\Windows\system\rundll32.exe
      2⤵
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:2508

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\notepad¢¬.exe

          Filesize

          81KB

          MD5

          e149bd5a35384a72592381ce5d9e3fe6

          SHA1

          bdae91a1983a12bfeb060c556384865a5d9e71e3

          SHA256

          df43538e3e2e99df00c7a2b14abf103ff5d4f72df57e51ce3018a056a36ecd6f

          SHA512

          ba157da431157c78a2e82b39d66675df28d44ac1f2dc51eb323922ba3da0b917c372ed476eb8b4fb78f49d6adc28989febfa202d6f1def663ccc87404d35d50c

        • \Windows\system\rundll32.exe

          Filesize

          76KB

          MD5

          c4cd94af04a475dea5d48e918a8f724e

          SHA1

          64b5fb63195fd1082b18ec0ae4eff6df7765652f

          SHA256

          8ad5f87dc4862d38eda1985cc8aeccf6df49c29a77cde4817ce2687685779fca

          SHA512

          4d807de409ae0190bbc0baa6dfdc241e740e45beeaa5f264fab367917e1d5b4680062c6e034ef1e634304ef79a1df45702fa14f28dbb64e8e4dfcd98d3e8b265

        • memory/2084-0-0x0000000000400000-0x0000000000415A00-memory.dmp

          Filesize

          86KB

        • memory/2084-17-0x00000000002E0000-0x00000000002F6000-memory.dmp

          Filesize

          88KB

        • memory/2084-18-0x00000000002E0000-0x00000000002F6000-memory.dmp

          Filesize

          88KB

        • memory/2084-20-0x0000000000400000-0x0000000000415A00-memory.dmp

          Filesize

          86KB

        • memory/2084-21-0x00000000002E0000-0x00000000002E2000-memory.dmp

          Filesize

          8KB