Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
12/06/2024, 22:42
Static task
static1
Behavioral task
behavioral1
Sample
55dd038ef91add9b6699709f4d4ddbfebc8e1589485427799628a9fb8015ded5.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
55dd038ef91add9b6699709f4d4ddbfebc8e1589485427799628a9fb8015ded5.exe
Resource
win10v2004-20240508-en
General
-
Target
55dd038ef91add9b6699709f4d4ddbfebc8e1589485427799628a9fb8015ded5.exe
-
Size
77KB
-
MD5
46a6cc1bdbe38db140241ff344b6c057
-
SHA1
6da34bddde031b2a842a63dca60e21bb98391c5c
-
SHA256
55dd038ef91add9b6699709f4d4ddbfebc8e1589485427799628a9fb8015ded5
-
SHA512
287855ebd1634c0a1eea77e286b922536f1b2d6435edd4d7d3fbaa0325b34776a73c7dadcfdc92d6385ff7598fc217b62885ec7a357175796b42e0b1c5b7e927
-
SSDEEP
1536:RshfSWHHNvoLqNwDDGw02eQmh0HjWOusS:GhfxHNIreQm+HiVsS
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4932 rundll32.exe -
Modifies system executable filetype association 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command 55dd038ef91add9b6699709f4d4ddbfebc8e1589485427799628a9fb8015ded5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 55dd038ef91add9b6699709f4d4ddbfebc8e1589485427799628a9fb8015ded5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" 55dd038ef91add9b6699709f4d4ddbfebc8e1589485427799628a9fb8015ded5.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\¢«.exe 55dd038ef91add9b6699709f4d4ddbfebc8e1589485427799628a9fb8015ded5.exe File created C:\Windows\SysWOW64\¢«.exe 55dd038ef91add9b6699709f4d4ddbfebc8e1589485427799628a9fb8015ded5.exe File opened for modification C:\Windows\SysWOW64\notepad¢¬.exe 55dd038ef91add9b6699709f4d4ddbfebc8e1589485427799628a9fb8015ded5.exe File created C:\Windows\SysWOW64\notepad¢¬.exe 55dd038ef91add9b6699709f4d4ddbfebc8e1589485427799628a9fb8015ded5.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system\rundll32.exe 55dd038ef91add9b6699709f4d4ddbfebc8e1589485427799628a9fb8015ded5.exe File created C:\Windows\system\rundll32.exe 55dd038ef91add9b6699709f4d4ddbfebc8e1589485427799628a9fb8015ded5.exe -
Modifies registry class 15 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainUp = "1718232177" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\MSipv 55dd038ef91add9b6699709f4d4ddbfebc8e1589485427799628a9fb8015ded5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainSetup = "1718232177" rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainVer = "506" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command 55dd038ef91add9b6699709f4d4ddbfebc8e1589485427799628a9fb8015ded5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 55dd038ef91add9b6699709f4d4ddbfebc8e1589485427799628a9fb8015ded5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad.exe %1" 55dd038ef91add9b6699709f4d4ddbfebc8e1589485427799628a9fb8015ded5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command 55dd038ef91add9b6699709f4d4ddbfebc8e1589485427799628a9fb8015ded5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" 55dd038ef91add9b6699709f4d4ddbfebc8e1589485427799628a9fb8015ded5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" 55dd038ef91add9b6699709f4d4ddbfebc8e1589485427799628a9fb8015ded5.exe Key created \REGISTRY\MACHINE\Software\Classes\MSipv rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" rundll32.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 1724 55dd038ef91add9b6699709f4d4ddbfebc8e1589485427799628a9fb8015ded5.exe 1724 55dd038ef91add9b6699709f4d4ddbfebc8e1589485427799628a9fb8015ded5.exe 1724 55dd038ef91add9b6699709f4d4ddbfebc8e1589485427799628a9fb8015ded5.exe 1724 55dd038ef91add9b6699709f4d4ddbfebc8e1589485427799628a9fb8015ded5.exe 1724 55dd038ef91add9b6699709f4d4ddbfebc8e1589485427799628a9fb8015ded5.exe 1724 55dd038ef91add9b6699709f4d4ddbfebc8e1589485427799628a9fb8015ded5.exe 1724 55dd038ef91add9b6699709f4d4ddbfebc8e1589485427799628a9fb8015ded5.exe 1724 55dd038ef91add9b6699709f4d4ddbfebc8e1589485427799628a9fb8015ded5.exe 1724 55dd038ef91add9b6699709f4d4ddbfebc8e1589485427799628a9fb8015ded5.exe 1724 55dd038ef91add9b6699709f4d4ddbfebc8e1589485427799628a9fb8015ded5.exe 1724 55dd038ef91add9b6699709f4d4ddbfebc8e1589485427799628a9fb8015ded5.exe 1724 55dd038ef91add9b6699709f4d4ddbfebc8e1589485427799628a9fb8015ded5.exe 1724 55dd038ef91add9b6699709f4d4ddbfebc8e1589485427799628a9fb8015ded5.exe 1724 55dd038ef91add9b6699709f4d4ddbfebc8e1589485427799628a9fb8015ded5.exe 1724 55dd038ef91add9b6699709f4d4ddbfebc8e1589485427799628a9fb8015ded5.exe 1724 55dd038ef91add9b6699709f4d4ddbfebc8e1589485427799628a9fb8015ded5.exe 1724 55dd038ef91add9b6699709f4d4ddbfebc8e1589485427799628a9fb8015ded5.exe 1724 55dd038ef91add9b6699709f4d4ddbfebc8e1589485427799628a9fb8015ded5.exe 1724 55dd038ef91add9b6699709f4d4ddbfebc8e1589485427799628a9fb8015ded5.exe 1724 55dd038ef91add9b6699709f4d4ddbfebc8e1589485427799628a9fb8015ded5.exe 1724 55dd038ef91add9b6699709f4d4ddbfebc8e1589485427799628a9fb8015ded5.exe 1724 55dd038ef91add9b6699709f4d4ddbfebc8e1589485427799628a9fb8015ded5.exe 1724 55dd038ef91add9b6699709f4d4ddbfebc8e1589485427799628a9fb8015ded5.exe 1724 55dd038ef91add9b6699709f4d4ddbfebc8e1589485427799628a9fb8015ded5.exe 1724 55dd038ef91add9b6699709f4d4ddbfebc8e1589485427799628a9fb8015ded5.exe 1724 55dd038ef91add9b6699709f4d4ddbfebc8e1589485427799628a9fb8015ded5.exe 1724 55dd038ef91add9b6699709f4d4ddbfebc8e1589485427799628a9fb8015ded5.exe 1724 55dd038ef91add9b6699709f4d4ddbfebc8e1589485427799628a9fb8015ded5.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4932 rundll32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1724 55dd038ef91add9b6699709f4d4ddbfebc8e1589485427799628a9fb8015ded5.exe 4932 rundll32.exe 4932 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1724 wrote to memory of 4932 1724 55dd038ef91add9b6699709f4d4ddbfebc8e1589485427799628a9fb8015ded5.exe 87 PID 1724 wrote to memory of 4932 1724 55dd038ef91add9b6699709f4d4ddbfebc8e1589485427799628a9fb8015ded5.exe 87 PID 1724 wrote to memory of 4932 1724 55dd038ef91add9b6699709f4d4ddbfebc8e1589485427799628a9fb8015ded5.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\55dd038ef91add9b6699709f4d4ddbfebc8e1589485427799628a9fb8015ded5.exe"C:\Users\Admin\AppData\Local\Temp\55dd038ef91add9b6699709f4d4ddbfebc8e1589485427799628a9fb8015ded5.exe"1⤵
- Modifies system executable filetype association
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\system\rundll32.exeC:\Windows\system\rundll32.exe2⤵
- Executes dropped EXE
- Modifies system executable filetype association
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:4932
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5534ddb65662ac0b743fe9adab31e8dfb
SHA1219bd6f5e2f1f14eee04475ce7e988f36f0280c1
SHA256e214174a2e6d0cc90f9732d5bdb8ee86edf0f3e0d86e648dfad1b8ef3a142fcd
SHA512ffe7f855ea5afe6af7fbdde8da52ca84fba7576fbfb3955ae3e574849e4a6cb7efc42154d828e09984c9260be657728065bbd5d973df3e7fdae464fa30ccde9e
-
Filesize
80KB
MD59c2f85710211ed18f46ade84f14f8811
SHA1fc04bdfd6c9d5d3fc88fd72c9fdec5429a68825f
SHA25667366f6d1b502ac9d4c95f5220c28e51029560979b68829a4b1ee9c04184943f
SHA51213b8bdcba0647e25fdd989805daf70b14cc7531dbfae4ad4e30de8942f68f1926abbd97c00286dea7c92fd5234e7fee08da5e4668e8bf8dccc708fc90ac746c8