Analysis
-
max time kernel
149s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
13/06/2024, 22:36
Static task
static1
Behavioral task
behavioral1
Sample
910b3e48d5d280c33cce0d92695fc0f09da268bf79d617e86e38183c9dd98f61.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
910b3e48d5d280c33cce0d92695fc0f09da268bf79d617e86e38183c9dd98f61.exe
Resource
win10v2004-20240611-en
General
-
Target
910b3e48d5d280c33cce0d92695fc0f09da268bf79d617e86e38183c9dd98f61.exe
-
Size
79KB
-
MD5
2f7abb64af5666e5b9f118aee3796741
-
SHA1
328287d5baa14067c8c0d762bcbe672377ebd057
-
SHA256
910b3e48d5d280c33cce0d92695fc0f09da268bf79d617e86e38183c9dd98f61
-
SHA512
9635b738f9cad9c8b8dfd3a64b74b2f10e944f8c5c01809f5a55201bff96e87f5259d0bd934282eeb4f53ac3b98ef37474cded43bd1bf88d016b0c48d4045d26
-
SSDEEP
1536:RshfSWHHNvoLqNwDDGw02eQmh0HjWO2xfM2:GhfxHNIreQm+HiJxfM2
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2464 rundll32.exe -
Modifies system executable filetype association 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 910b3e48d5d280c33cce0d92695fc0f09da268bf79d617e86e38183c9dd98f61.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" 910b3e48d5d280c33cce0d92695fc0f09da268bf79d617e86e38183c9dd98f61.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command 910b3e48d5d280c33cce0d92695fc0f09da268bf79d617e86e38183c9dd98f61.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\¢«.exe 910b3e48d5d280c33cce0d92695fc0f09da268bf79d617e86e38183c9dd98f61.exe File created C:\Windows\SysWOW64\¢«.exe 910b3e48d5d280c33cce0d92695fc0f09da268bf79d617e86e38183c9dd98f61.exe File opened for modification C:\Windows\SysWOW64\notepad¢¬.exe 910b3e48d5d280c33cce0d92695fc0f09da268bf79d617e86e38183c9dd98f61.exe File created C:\Windows\SysWOW64\notepad¢¬.exe 910b3e48d5d280c33cce0d92695fc0f09da268bf79d617e86e38183c9dd98f61.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\system\rundll32.exe 910b3e48d5d280c33cce0d92695fc0f09da268bf79d617e86e38183c9dd98f61.exe File opened for modification C:\Windows\system\rundll32.exe 910b3e48d5d280c33cce0d92695fc0f09da268bf79d617e86e38183c9dd98f61.exe -
Modifies registry class 15 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad.exe %1" 910b3e48d5d280c33cce0d92695fc0f09da268bf79d617e86e38183c9dd98f61.exe Key created \REGISTRY\MACHINE\Software\Classes\MSipv rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainVer = "506" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\MSipv 910b3e48d5d280c33cce0d92695fc0f09da268bf79d617e86e38183c9dd98f61.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command 910b3e48d5d280c33cce0d92695fc0f09da268bf79d617e86e38183c9dd98f61.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainSetup = "1718318196" rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainUp = "1718318196" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command 910b3e48d5d280c33cce0d92695fc0f09da268bf79d617e86e38183c9dd98f61.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 910b3e48d5d280c33cce0d92695fc0f09da268bf79d617e86e38183c9dd98f61.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" 910b3e48d5d280c33cce0d92695fc0f09da268bf79d617e86e38183c9dd98f61.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" 910b3e48d5d280c33cce0d92695fc0f09da268bf79d617e86e38183c9dd98f61.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 3912 910b3e48d5d280c33cce0d92695fc0f09da268bf79d617e86e38183c9dd98f61.exe 3912 910b3e48d5d280c33cce0d92695fc0f09da268bf79d617e86e38183c9dd98f61.exe 3912 910b3e48d5d280c33cce0d92695fc0f09da268bf79d617e86e38183c9dd98f61.exe 3912 910b3e48d5d280c33cce0d92695fc0f09da268bf79d617e86e38183c9dd98f61.exe 3912 910b3e48d5d280c33cce0d92695fc0f09da268bf79d617e86e38183c9dd98f61.exe 3912 910b3e48d5d280c33cce0d92695fc0f09da268bf79d617e86e38183c9dd98f61.exe 3912 910b3e48d5d280c33cce0d92695fc0f09da268bf79d617e86e38183c9dd98f61.exe 3912 910b3e48d5d280c33cce0d92695fc0f09da268bf79d617e86e38183c9dd98f61.exe 3912 910b3e48d5d280c33cce0d92695fc0f09da268bf79d617e86e38183c9dd98f61.exe 3912 910b3e48d5d280c33cce0d92695fc0f09da268bf79d617e86e38183c9dd98f61.exe 3912 910b3e48d5d280c33cce0d92695fc0f09da268bf79d617e86e38183c9dd98f61.exe 3912 910b3e48d5d280c33cce0d92695fc0f09da268bf79d617e86e38183c9dd98f61.exe 3912 910b3e48d5d280c33cce0d92695fc0f09da268bf79d617e86e38183c9dd98f61.exe 3912 910b3e48d5d280c33cce0d92695fc0f09da268bf79d617e86e38183c9dd98f61.exe 3912 910b3e48d5d280c33cce0d92695fc0f09da268bf79d617e86e38183c9dd98f61.exe 3912 910b3e48d5d280c33cce0d92695fc0f09da268bf79d617e86e38183c9dd98f61.exe 3912 910b3e48d5d280c33cce0d92695fc0f09da268bf79d617e86e38183c9dd98f61.exe 3912 910b3e48d5d280c33cce0d92695fc0f09da268bf79d617e86e38183c9dd98f61.exe 3912 910b3e48d5d280c33cce0d92695fc0f09da268bf79d617e86e38183c9dd98f61.exe 3912 910b3e48d5d280c33cce0d92695fc0f09da268bf79d617e86e38183c9dd98f61.exe 3912 910b3e48d5d280c33cce0d92695fc0f09da268bf79d617e86e38183c9dd98f61.exe 3912 910b3e48d5d280c33cce0d92695fc0f09da268bf79d617e86e38183c9dd98f61.exe 3912 910b3e48d5d280c33cce0d92695fc0f09da268bf79d617e86e38183c9dd98f61.exe 3912 910b3e48d5d280c33cce0d92695fc0f09da268bf79d617e86e38183c9dd98f61.exe 3912 910b3e48d5d280c33cce0d92695fc0f09da268bf79d617e86e38183c9dd98f61.exe 3912 910b3e48d5d280c33cce0d92695fc0f09da268bf79d617e86e38183c9dd98f61.exe 3912 910b3e48d5d280c33cce0d92695fc0f09da268bf79d617e86e38183c9dd98f61.exe 3912 910b3e48d5d280c33cce0d92695fc0f09da268bf79d617e86e38183c9dd98f61.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2464 rundll32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3912 910b3e48d5d280c33cce0d92695fc0f09da268bf79d617e86e38183c9dd98f61.exe 2464 rundll32.exe 2464 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3912 wrote to memory of 2464 3912 910b3e48d5d280c33cce0d92695fc0f09da268bf79d617e86e38183c9dd98f61.exe 85 PID 3912 wrote to memory of 2464 3912 910b3e48d5d280c33cce0d92695fc0f09da268bf79d617e86e38183c9dd98f61.exe 85 PID 3912 wrote to memory of 2464 3912 910b3e48d5d280c33cce0d92695fc0f09da268bf79d617e86e38183c9dd98f61.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\910b3e48d5d280c33cce0d92695fc0f09da268bf79d617e86e38183c9dd98f61.exe"C:\Users\Admin\AppData\Local\Temp\910b3e48d5d280c33cce0d92695fc0f09da268bf79d617e86e38183c9dd98f61.exe"1⤵
- Modifies system executable filetype association
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3912 -
C:\Windows\system\rundll32.exeC:\Windows\system\rundll32.exe2⤵
- Executes dropped EXE
- Modifies system executable filetype association
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2464
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD5832b4e77e1fa4edf31f7ec8691d0766d
SHA1c37824af0e02155918f053449e03aafdacb298dd
SHA2569235ccdc745d3e3e08538d232f5fa8225ce0ca60ca1cb5c76d36fe944ac9b120
SHA512188af007ed946b9e71759a1bf1acd33284dfac0234079937ee8aa8d090adf41611f334017a79f696bf069f1b1961f4a82fc3cf54453b7fd254eede26f058a778
-
Filesize
83KB
MD550355630ce2d9f324586039a24bd04f2
SHA15c6c3bb73e68efa8604db698d70e6190aa93b71f
SHA25655a602fbf14067aacafd76060d96bb6e60444b3c9aedbcad6ecab8d104f19665
SHA512eff86195fa3fd98f77200e8c522802cfcce79c53f5e1a7ebcd9e0df8fdc4c9644a64b381fcfb43c9a97b71e79a3c89b93a2bdea753c86be2869dbbfd73aa3a5b