Analysis
-
max time kernel
149s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
11/06/2024, 02:29
Static task
static1
Behavioral task
behavioral1
Sample
a3d1dddbfcce8aed41249cbe2965e36b84a2022a595dbb2051a22e8058d0ad99.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
a3d1dddbfcce8aed41249cbe2965e36b84a2022a595dbb2051a22e8058d0ad99.exe
Resource
win10v2004-20240508-en
General
-
Target
a3d1dddbfcce8aed41249cbe2965e36b84a2022a595dbb2051a22e8058d0ad99.exe
-
Size
75KB
-
MD5
9ff77694235c87e182d4081e427a8d4f
-
SHA1
f17daf701e301f4bb6c8d385e9ad735012a389bb
-
SHA256
a3d1dddbfcce8aed41249cbe2965e36b84a2022a595dbb2051a22e8058d0ad99
-
SHA512
ae8ce3f0048202b1bc39615e760ed35a4b1468b29c500554cd007ed14d30d916b92415c968c1a2649dcc5c5bb467d0ec7a1aa016559dfa195dbeebb1a53b0369
-
SSDEEP
1536:RshfSWHHNvoLqNwDDGw02eQmh0HjWOCQD:GhfxHNIreQm+HiVQD
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2508 rundll32.exe -
Loads dropped DLL 2 IoCs
pid Process 2084 a3d1dddbfcce8aed41249cbe2965e36b84a2022a595dbb2051a22e8058d0ad99.exe 2084 a3d1dddbfcce8aed41249cbe2965e36b84a2022a595dbb2051a22e8058d0ad99.exe -
Modifies system executable filetype association 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command a3d1dddbfcce8aed41249cbe2965e36b84a2022a595dbb2051a22e8058d0ad99.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" a3d1dddbfcce8aed41249cbe2965e36b84a2022a595dbb2051a22e8058d0ad99.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" a3d1dddbfcce8aed41249cbe2965e36b84a2022a595dbb2051a22e8058d0ad99.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\¢«.exe a3d1dddbfcce8aed41249cbe2965e36b84a2022a595dbb2051a22e8058d0ad99.exe File created C:\Windows\SysWOW64\¢«.exe a3d1dddbfcce8aed41249cbe2965e36b84a2022a595dbb2051a22e8058d0ad99.exe File opened for modification C:\Windows\SysWOW64\notepad¢¬.exe a3d1dddbfcce8aed41249cbe2965e36b84a2022a595dbb2051a22e8058d0ad99.exe File created C:\Windows\SysWOW64\notepad¢¬.exe a3d1dddbfcce8aed41249cbe2965e36b84a2022a595dbb2051a22e8058d0ad99.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system\rundll32.exe a3d1dddbfcce8aed41249cbe2965e36b84a2022a595dbb2051a22e8058d0ad99.exe File created C:\Windows\system\rundll32.exe a3d1dddbfcce8aed41249cbe2965e36b84a2022a595dbb2051a22e8058d0ad99.exe -
Modifies registry class 15 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\MSipv a3d1dddbfcce8aed41249cbe2965e36b84a2022a595dbb2051a22e8058d0ad99.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command a3d1dddbfcce8aed41249cbe2965e36b84a2022a595dbb2051a22e8058d0ad99.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" a3d1dddbfcce8aed41249cbe2965e36b84a2022a595dbb2051a22e8058d0ad99.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" a3d1dddbfcce8aed41249cbe2965e36b84a2022a595dbb2051a22e8058d0ad99.exe Key created \REGISTRY\MACHINE\Software\Classes\MSipv rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainSetup = "1718072982" rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainUp = "1718072982" rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainVer = "506" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" a3d1dddbfcce8aed41249cbe2965e36b84a2022a595dbb2051a22e8058d0ad99.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad.exe %1" a3d1dddbfcce8aed41249cbe2965e36b84a2022a595dbb2051a22e8058d0ad99.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command a3d1dddbfcce8aed41249cbe2965e36b84a2022a595dbb2051a22e8058d0ad99.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command rundll32.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2084 a3d1dddbfcce8aed41249cbe2965e36b84a2022a595dbb2051a22e8058d0ad99.exe 2084 a3d1dddbfcce8aed41249cbe2965e36b84a2022a595dbb2051a22e8058d0ad99.exe 2084 a3d1dddbfcce8aed41249cbe2965e36b84a2022a595dbb2051a22e8058d0ad99.exe 2084 a3d1dddbfcce8aed41249cbe2965e36b84a2022a595dbb2051a22e8058d0ad99.exe 2084 a3d1dddbfcce8aed41249cbe2965e36b84a2022a595dbb2051a22e8058d0ad99.exe 2084 a3d1dddbfcce8aed41249cbe2965e36b84a2022a595dbb2051a22e8058d0ad99.exe 2084 a3d1dddbfcce8aed41249cbe2965e36b84a2022a595dbb2051a22e8058d0ad99.exe 2084 a3d1dddbfcce8aed41249cbe2965e36b84a2022a595dbb2051a22e8058d0ad99.exe 2084 a3d1dddbfcce8aed41249cbe2965e36b84a2022a595dbb2051a22e8058d0ad99.exe 2084 a3d1dddbfcce8aed41249cbe2965e36b84a2022a595dbb2051a22e8058d0ad99.exe 2084 a3d1dddbfcce8aed41249cbe2965e36b84a2022a595dbb2051a22e8058d0ad99.exe 2084 a3d1dddbfcce8aed41249cbe2965e36b84a2022a595dbb2051a22e8058d0ad99.exe 2084 a3d1dddbfcce8aed41249cbe2965e36b84a2022a595dbb2051a22e8058d0ad99.exe 2084 a3d1dddbfcce8aed41249cbe2965e36b84a2022a595dbb2051a22e8058d0ad99.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2508 rundll32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2084 a3d1dddbfcce8aed41249cbe2965e36b84a2022a595dbb2051a22e8058d0ad99.exe 2508 rundll32.exe 2508 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2084 wrote to memory of 2508 2084 a3d1dddbfcce8aed41249cbe2965e36b84a2022a595dbb2051a22e8058d0ad99.exe 28 PID 2084 wrote to memory of 2508 2084 a3d1dddbfcce8aed41249cbe2965e36b84a2022a595dbb2051a22e8058d0ad99.exe 28 PID 2084 wrote to memory of 2508 2084 a3d1dddbfcce8aed41249cbe2965e36b84a2022a595dbb2051a22e8058d0ad99.exe 28 PID 2084 wrote to memory of 2508 2084 a3d1dddbfcce8aed41249cbe2965e36b84a2022a595dbb2051a22e8058d0ad99.exe 28 PID 2084 wrote to memory of 2508 2084 a3d1dddbfcce8aed41249cbe2965e36b84a2022a595dbb2051a22e8058d0ad99.exe 28 PID 2084 wrote to memory of 2508 2084 a3d1dddbfcce8aed41249cbe2965e36b84a2022a595dbb2051a22e8058d0ad99.exe 28 PID 2084 wrote to memory of 2508 2084 a3d1dddbfcce8aed41249cbe2965e36b84a2022a595dbb2051a22e8058d0ad99.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\a3d1dddbfcce8aed41249cbe2965e36b84a2022a595dbb2051a22e8058d0ad99.exe"C:\Users\Admin\AppData\Local\Temp\a3d1dddbfcce8aed41249cbe2965e36b84a2022a595dbb2051a22e8058d0ad99.exe"1⤵
- Loads dropped DLL
- Modifies system executable filetype association
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\system\rundll32.exeC:\Windows\system\rundll32.exe2⤵
- Executes dropped EXE
- Modifies system executable filetype association
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2508
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
81KB
MD5e149bd5a35384a72592381ce5d9e3fe6
SHA1bdae91a1983a12bfeb060c556384865a5d9e71e3
SHA256df43538e3e2e99df00c7a2b14abf103ff5d4f72df57e51ce3018a056a36ecd6f
SHA512ba157da431157c78a2e82b39d66675df28d44ac1f2dc51eb323922ba3da0b917c372ed476eb8b4fb78f49d6adc28989febfa202d6f1def663ccc87404d35d50c
-
Filesize
76KB
MD5c4cd94af04a475dea5d48e918a8f724e
SHA164b5fb63195fd1082b18ec0ae4eff6df7765652f
SHA2568ad5f87dc4862d38eda1985cc8aeccf6df49c29a77cde4817ce2687685779fca
SHA5124d807de409ae0190bbc0baa6dfdc241e740e45beeaa5f264fab367917e1d5b4680062c6e034ef1e634304ef79a1df45702fa14f28dbb64e8e4dfcd98d3e8b265