Malware Analysis Report

2025-08-05 20:07

Sample ID 240611-qtjaasydmd
Target 2d4cd31b7a324d8696319891274eaaa9da2802cf9cfc9c78b87ed031fdd73021
SHA256 2d4cd31b7a324d8696319891274eaaa9da2802cf9cfc9c78b87ed031fdd73021
Tags
persistence
score
7/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
7/10

SHA256

2d4cd31b7a324d8696319891274eaaa9da2802cf9cfc9c78b87ed031fdd73021

Threat Level: Shows suspicious behavior

The file 2d4cd31b7a324d8696319891274eaaa9da2802cf9cfc9c78b87ed031fdd73021 was found to be: Shows suspicious behavior.

Malicious Activity Summary

persistence

Loads dropped DLL

Executes dropped EXE

Modifies system executable filetype association

Drops file in System32 directory

Drops file in Windows directory

Unsigned PE

Suspicious use of WriteProcessMemory

Modifies registry class

Suspicious use of SetWindowsHookEx

Suspicious behavior: EnumeratesProcesses

Suspicious behavior: GetForegroundWindowSpam

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-06-11 13:33

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-11 13:33

Reported

2024-06-11 13:35

Platform

win7-20240508-en

Max time kernel

149s

Max time network

122s

Command Line

"C:\Users\Admin\AppData\Local\Temp\2d4cd31b7a324d8696319891274eaaa9da2802cf9cfc9c78b87ed031fdd73021.exe"

Signatures

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Windows\system\rundll32.exe N/A

Modifies system executable filetype association

persistence
Description Indicator Process Target
Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command C:\Users\Admin\AppData\Local\Temp\2d4cd31b7a324d8696319891274eaaa9da2802cf9cfc9c78b87ed031fdd73021.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" C:\Users\Admin\AppData\Local\Temp\2d4cd31b7a324d8696319891274eaaa9da2802cf9cfc9c78b87ed031fdd73021.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" C:\Users\Admin\AppData\Local\Temp\2d4cd31b7a324d8696319891274eaaa9da2802cf9cfc9c78b87ed031fdd73021.exe N/A
Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command C:\Windows\system\rundll32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" C:\Windows\system\rundll32.exe N/A

Drops file in System32 directory

Description Indicator Process Target
File opened for modification C:\Windows\SysWOW64\¢«.exe C:\Users\Admin\AppData\Local\Temp\2d4cd31b7a324d8696319891274eaaa9da2802cf9cfc9c78b87ed031fdd73021.exe N/A
File created C:\Windows\SysWOW64\¢«.exe C:\Users\Admin\AppData\Local\Temp\2d4cd31b7a324d8696319891274eaaa9da2802cf9cfc9c78b87ed031fdd73021.exe N/A
File opened for modification C:\Windows\SysWOW64\notepad¢¬.exe C:\Users\Admin\AppData\Local\Temp\2d4cd31b7a324d8696319891274eaaa9da2802cf9cfc9c78b87ed031fdd73021.exe N/A
File created C:\Windows\SysWOW64\notepad¢¬.exe C:\Users\Admin\AppData\Local\Temp\2d4cd31b7a324d8696319891274eaaa9da2802cf9cfc9c78b87ed031fdd73021.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\system\rundll32.exe C:\Users\Admin\AppData\Local\Temp\2d4cd31b7a324d8696319891274eaaa9da2802cf9cfc9c78b87ed031fdd73021.exe N/A
File created C:\Windows\system\rundll32.exe C:\Users\Admin\AppData\Local\Temp\2d4cd31b7a324d8696319891274eaaa9da2802cf9cfc9c78b87ed031fdd73021.exe N/A

Modifies registry class

Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainSetup = "1718112789" C:\Windows\system\rundll32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" C:\Windows\system\rundll32.exe N/A
Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command C:\Users\Admin\AppData\Local\Temp\2d4cd31b7a324d8696319891274eaaa9da2802cf9cfc9c78b87ed031fdd73021.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainUp = "1718112789" C:\Windows\system\rundll32.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainVer = "506" C:\Windows\system\rundll32.exe N/A
Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command C:\Windows\system\rundll32.exe N/A
Key created \REGISTRY\MACHINE\Software\Classes\MSipv C:\Users\Admin\AppData\Local\Temp\2d4cd31b7a324d8696319891274eaaa9da2802cf9cfc9c78b87ed031fdd73021.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" C:\Users\Admin\AppData\Local\Temp\2d4cd31b7a324d8696319891274eaaa9da2802cf9cfc9c78b87ed031fdd73021.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" C:\Users\Admin\AppData\Local\Temp\2d4cd31b7a324d8696319891274eaaa9da2802cf9cfc9c78b87ed031fdd73021.exe N/A
Key created \REGISTRY\MACHINE\Software\Classes\MSipv C:\Windows\system\rundll32.exe N/A
Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command C:\Users\Admin\AppData\Local\Temp\2d4cd31b7a324d8696319891274eaaa9da2802cf9cfc9c78b87ed031fdd73021.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad.exe %1" C:\Users\Admin\AppData\Local\Temp\2d4cd31b7a324d8696319891274eaaa9da2802cf9cfc9c78b87ed031fdd73021.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" C:\Users\Admin\AppData\Local\Temp\2d4cd31b7a324d8696319891274eaaa9da2802cf9cfc9c78b87ed031fdd73021.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" C:\Windows\system\rundll32.exe N/A
Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command C:\Windows\system\rundll32.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\2d4cd31b7a324d8696319891274eaaa9da2802cf9cfc9c78b87ed031fdd73021.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2d4cd31b7a324d8696319891274eaaa9da2802cf9cfc9c78b87ed031fdd73021.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2d4cd31b7a324d8696319891274eaaa9da2802cf9cfc9c78b87ed031fdd73021.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2d4cd31b7a324d8696319891274eaaa9da2802cf9cfc9c78b87ed031fdd73021.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2d4cd31b7a324d8696319891274eaaa9da2802cf9cfc9c78b87ed031fdd73021.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2d4cd31b7a324d8696319891274eaaa9da2802cf9cfc9c78b87ed031fdd73021.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2d4cd31b7a324d8696319891274eaaa9da2802cf9cfc9c78b87ed031fdd73021.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2d4cd31b7a324d8696319891274eaaa9da2802cf9cfc9c78b87ed031fdd73021.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2d4cd31b7a324d8696319891274eaaa9da2802cf9cfc9c78b87ed031fdd73021.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2d4cd31b7a324d8696319891274eaaa9da2802cf9cfc9c78b87ed031fdd73021.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2d4cd31b7a324d8696319891274eaaa9da2802cf9cfc9c78b87ed031fdd73021.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2d4cd31b7a324d8696319891274eaaa9da2802cf9cfc9c78b87ed031fdd73021.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2d4cd31b7a324d8696319891274eaaa9da2802cf9cfc9c78b87ed031fdd73021.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2d4cd31b7a324d8696319891274eaaa9da2802cf9cfc9c78b87ed031fdd73021.exe N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Windows\system\rundll32.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\2d4cd31b7a324d8696319891274eaaa9da2802cf9cfc9c78b87ed031fdd73021.exe

"C:\Users\Admin\AppData\Local\Temp\2d4cd31b7a324d8696319891274eaaa9da2802cf9cfc9c78b87ed031fdd73021.exe"

C:\Windows\system\rundll32.exe

C:\Windows\system\rundll32.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 www.zigui.org udp

Files

memory/1712-0-0x0000000000400000-0x0000000000415A00-memory.dmp

C:\Windows\SysWOW64\notepad¢¬.exe

MD5 3928a7bb763829bcb4931c88205a73aa
SHA1 18d13482c05ece0d6129f12de12b08cbb3fa9fa1
SHA256 5f43a36f969396a5057ccca3c1478f462b94a16318d286b45ed0ac08b81b5707
SHA512 790fe78f5b2ed460c32047a4b0881395264c503a7006ef2476ee29314b990183e2d8e289d830265af1e568176a112bbc3aa7febf2c8c7e0d54bb0692c2a07261

memory/2568-19-0x0000000000400000-0x0000000000415A00-memory.dmp

memory/1712-18-0x0000000000320000-0x0000000000336000-memory.dmp

memory/1712-17-0x0000000000320000-0x0000000000336000-memory.dmp

C:\Windows\system\rundll32.exe

MD5 a680889a6e4aef0455468f39a4a67ff1
SHA1 6f4494bf18da3ccb625650aa4a36923ef8be5a59
SHA256 aad4af7fde5fe66b032fc1436cda0110552457c8897f17519e3f132f8b0bd2a0
SHA512 6ab89dd1cba57386d81e1fb747625badc5f4f2feb6d9c31ac327dd30c80af750313559d0dca6206518d9dd4f7db21f449b2a365cece5869f7b24e17135ed94f1

memory/1712-21-0x0000000000400000-0x0000000000415A00-memory.dmp

memory/1712-22-0x0000000000320000-0x0000000000322000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-11 13:33

Reported

2024-06-11 13:35

Platform

win10v2004-20240426-en

Max time kernel

150s

Max time network

100s

Command Line

"C:\Users\Admin\AppData\Local\Temp\2d4cd31b7a324d8696319891274eaaa9da2802cf9cfc9c78b87ed031fdd73021.exe"

Signatures

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Windows\system\rundll32.exe N/A

Modifies system executable filetype association

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" C:\Windows\system\rundll32.exe N/A
Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command C:\Users\Admin\AppData\Local\Temp\2d4cd31b7a324d8696319891274eaaa9da2802cf9cfc9c78b87ed031fdd73021.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" C:\Users\Admin\AppData\Local\Temp\2d4cd31b7a324d8696319891274eaaa9da2802cf9cfc9c78b87ed031fdd73021.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" C:\Users\Admin\AppData\Local\Temp\2d4cd31b7a324d8696319891274eaaa9da2802cf9cfc9c78b87ed031fdd73021.exe N/A
Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command C:\Windows\system\rundll32.exe N/A

Drops file in System32 directory

Description Indicator Process Target
File opened for modification C:\Windows\SysWOW64\¢«.exe C:\Users\Admin\AppData\Local\Temp\2d4cd31b7a324d8696319891274eaaa9da2802cf9cfc9c78b87ed031fdd73021.exe N/A
File created C:\Windows\SysWOW64\¢«.exe C:\Users\Admin\AppData\Local\Temp\2d4cd31b7a324d8696319891274eaaa9da2802cf9cfc9c78b87ed031fdd73021.exe N/A
File opened for modification C:\Windows\SysWOW64\notepad¢¬.exe C:\Users\Admin\AppData\Local\Temp\2d4cd31b7a324d8696319891274eaaa9da2802cf9cfc9c78b87ed031fdd73021.exe N/A
File created C:\Windows\SysWOW64\notepad¢¬.exe C:\Users\Admin\AppData\Local\Temp\2d4cd31b7a324d8696319891274eaaa9da2802cf9cfc9c78b87ed031fdd73021.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\system\rundll32.exe C:\Users\Admin\AppData\Local\Temp\2d4cd31b7a324d8696319891274eaaa9da2802cf9cfc9c78b87ed031fdd73021.exe N/A
File opened for modification C:\Windows\system\rundll32.exe C:\Users\Admin\AppData\Local\Temp\2d4cd31b7a324d8696319891274eaaa9da2802cf9cfc9c78b87ed031fdd73021.exe N/A

Modifies registry class

Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainSetup = "1718112791" C:\Windows\system\rundll32.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainUp = "1718112791" C:\Windows\system\rundll32.exe N/A
Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command C:\Windows\system\rundll32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" C:\Windows\system\rundll32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad.exe %1" C:\Users\Admin\AppData\Local\Temp\2d4cd31b7a324d8696319891274eaaa9da2802cf9cfc9c78b87ed031fdd73021.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" C:\Users\Admin\AppData\Local\Temp\2d4cd31b7a324d8696319891274eaaa9da2802cf9cfc9c78b87ed031fdd73021.exe N/A
Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command C:\Windows\system\rundll32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" C:\Users\Admin\AppData\Local\Temp\2d4cd31b7a324d8696319891274eaaa9da2802cf9cfc9c78b87ed031fdd73021.exe N/A
Key created \REGISTRY\MACHINE\Software\Classes\MSipv C:\Windows\system\rundll32.exe N/A
Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command C:\Users\Admin\AppData\Local\Temp\2d4cd31b7a324d8696319891274eaaa9da2802cf9cfc9c78b87ed031fdd73021.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainVer = "506" C:\Windows\system\rundll32.exe N/A
Key created \REGISTRY\MACHINE\Software\Classes\MSipv C:\Users\Admin\AppData\Local\Temp\2d4cd31b7a324d8696319891274eaaa9da2802cf9cfc9c78b87ed031fdd73021.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" C:\Users\Admin\AppData\Local\Temp\2d4cd31b7a324d8696319891274eaaa9da2802cf9cfc9c78b87ed031fdd73021.exe N/A
Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command C:\Users\Admin\AppData\Local\Temp\2d4cd31b7a324d8696319891274eaaa9da2802cf9cfc9c78b87ed031fdd73021.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" C:\Windows\system\rundll32.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\2d4cd31b7a324d8696319891274eaaa9da2802cf9cfc9c78b87ed031fdd73021.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2d4cd31b7a324d8696319891274eaaa9da2802cf9cfc9c78b87ed031fdd73021.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2d4cd31b7a324d8696319891274eaaa9da2802cf9cfc9c78b87ed031fdd73021.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2d4cd31b7a324d8696319891274eaaa9da2802cf9cfc9c78b87ed031fdd73021.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2d4cd31b7a324d8696319891274eaaa9da2802cf9cfc9c78b87ed031fdd73021.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2d4cd31b7a324d8696319891274eaaa9da2802cf9cfc9c78b87ed031fdd73021.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2d4cd31b7a324d8696319891274eaaa9da2802cf9cfc9c78b87ed031fdd73021.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2d4cd31b7a324d8696319891274eaaa9da2802cf9cfc9c78b87ed031fdd73021.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2d4cd31b7a324d8696319891274eaaa9da2802cf9cfc9c78b87ed031fdd73021.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2d4cd31b7a324d8696319891274eaaa9da2802cf9cfc9c78b87ed031fdd73021.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2d4cd31b7a324d8696319891274eaaa9da2802cf9cfc9c78b87ed031fdd73021.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2d4cd31b7a324d8696319891274eaaa9da2802cf9cfc9c78b87ed031fdd73021.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2d4cd31b7a324d8696319891274eaaa9da2802cf9cfc9c78b87ed031fdd73021.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2d4cd31b7a324d8696319891274eaaa9da2802cf9cfc9c78b87ed031fdd73021.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2d4cd31b7a324d8696319891274eaaa9da2802cf9cfc9c78b87ed031fdd73021.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2d4cd31b7a324d8696319891274eaaa9da2802cf9cfc9c78b87ed031fdd73021.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2d4cd31b7a324d8696319891274eaaa9da2802cf9cfc9c78b87ed031fdd73021.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2d4cd31b7a324d8696319891274eaaa9da2802cf9cfc9c78b87ed031fdd73021.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2d4cd31b7a324d8696319891274eaaa9da2802cf9cfc9c78b87ed031fdd73021.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2d4cd31b7a324d8696319891274eaaa9da2802cf9cfc9c78b87ed031fdd73021.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2d4cd31b7a324d8696319891274eaaa9da2802cf9cfc9c78b87ed031fdd73021.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2d4cd31b7a324d8696319891274eaaa9da2802cf9cfc9c78b87ed031fdd73021.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2d4cd31b7a324d8696319891274eaaa9da2802cf9cfc9c78b87ed031fdd73021.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2d4cd31b7a324d8696319891274eaaa9da2802cf9cfc9c78b87ed031fdd73021.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2d4cd31b7a324d8696319891274eaaa9da2802cf9cfc9c78b87ed031fdd73021.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2d4cd31b7a324d8696319891274eaaa9da2802cf9cfc9c78b87ed031fdd73021.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2d4cd31b7a324d8696319891274eaaa9da2802cf9cfc9c78b87ed031fdd73021.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2d4cd31b7a324d8696319891274eaaa9da2802cf9cfc9c78b87ed031fdd73021.exe N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Windows\system\rundll32.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\2d4cd31b7a324d8696319891274eaaa9da2802cf9cfc9c78b87ed031fdd73021.exe

"C:\Users\Admin\AppData\Local\Temp\2d4cd31b7a324d8696319891274eaaa9da2802cf9cfc9c78b87ed031fdd73021.exe"

C:\Windows\system\rundll32.exe

C:\Windows\system\rundll32.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 228.249.119.40.in-addr.arpa udp
US 8.8.8.8:53 www.zigui.org udp
US 8.8.8.8:53 88.210.23.2.in-addr.arpa udp
HK 103.251.237.123:80 www.zigui.org tcp
US 8.8.8.8:53 85.177.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 104.219.191.52.in-addr.arpa udp
US 8.8.8.8:53 209.205.72.20.in-addr.arpa udp
US 8.8.8.8:53 86.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 15.164.165.52.in-addr.arpa udp
US 8.8.8.8:53 216.107.17.2.in-addr.arpa udp
US 52.111.227.11:443 tcp
US 8.8.8.8:53 14.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp

Files

memory/2372-0-0x0000000000400000-0x0000000000415A00-memory.dmp

C:\Windows\SysWOW64\notepad¢¬.exe

MD5 ee951622ddac01d99192b3d93d3f8a09
SHA1 01792dd9128e397514cbb7c53029e6c02294f22d
SHA256 c78267d510923bbba0405ba7e27bada7c20297b08bbf2d4741f5bac957d0dddd
SHA512 e02efeeee9d43432e94b234ee18c55656c7a5f37b53d5a591637793ac1964fe3f4a54d4bda35b4a3d88ff900f0c8d122298ba92b6b8bd13cf0f3a444267832eb

C:\Windows\System\rundll32.exe

MD5 c83dac1ebf567cfc52cf43cf006a1426
SHA1 2b0f3e6f4bf24eef5f69e948c9b50f4124b39087
SHA256 9f40bf3e3d4fc8a1ed963c75a3cafce791ef2b554e195d8c64445781c7341d90
SHA512 f2d748eca99c49a120746d7078e794b2de75c77c62158d5c71ba05595eddacb898a6d4b1d8d77c2f788aae605ae06a51004f21e6d1fc866435115e5dec748d2d

memory/2372-13-0x0000000000400000-0x0000000000415A00-memory.dmp