Malware Analysis Report

2025-03-14 22:10

Sample ID 240613-e91zhayakq
Target cda6cf771a14fcbb4b3ce9e5be5492d2f099061affa8b5d8a20687fd865a281f
SHA256 cda6cf771a14fcbb4b3ce9e5be5492d2f099061affa8b5d8a20687fd865a281f
Tags
persistence
score
7/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
7/10

SHA256

cda6cf771a14fcbb4b3ce9e5be5492d2f099061affa8b5d8a20687fd865a281f

Threat Level: Shows suspicious behavior

The file cda6cf771a14fcbb4b3ce9e5be5492d2f099061affa8b5d8a20687fd865a281f was found to be: Shows suspicious behavior.

Malicious Activity Summary

persistence

Modifies system executable filetype association

Executes dropped EXE

Loads dropped DLL

Drops file in System32 directory

Drops file in Windows directory

Unsigned PE

Modifies registry class

Suspicious behavior: EnumeratesProcesses

Suspicious use of WriteProcessMemory

Suspicious behavior: GetForegroundWindowSpam

Suspicious use of SetWindowsHookEx

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-06-13 04:39

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-13 04:39

Reported

2024-06-13 04:41

Platform

win7-20231129-en

Max time kernel

149s

Max time network

119s

Command Line

"C:\Users\Admin\AppData\Local\Temp\cda6cf771a14fcbb4b3ce9e5be5492d2f099061affa8b5d8a20687fd865a281f.exe"

Signatures

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Windows\system\rundll32.exe N/A

Modifies system executable filetype association

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" C:\Users\Admin\AppData\Local\Temp\cda6cf771a14fcbb4b3ce9e5be5492d2f099061affa8b5d8a20687fd865a281f.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" C:\Users\Admin\AppData\Local\Temp\cda6cf771a14fcbb4b3ce9e5be5492d2f099061affa8b5d8a20687fd865a281f.exe N/A
Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command C:\Windows\system\rundll32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" C:\Windows\system\rundll32.exe N/A
Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command C:\Users\Admin\AppData\Local\Temp\cda6cf771a14fcbb4b3ce9e5be5492d2f099061affa8b5d8a20687fd865a281f.exe N/A

Drops file in System32 directory

Description Indicator Process Target
File created C:\Windows\SysWOW64\¢«.exe C:\Users\Admin\AppData\Local\Temp\cda6cf771a14fcbb4b3ce9e5be5492d2f099061affa8b5d8a20687fd865a281f.exe N/A
File opened for modification C:\Windows\SysWOW64\notepad¢¬.exe C:\Users\Admin\AppData\Local\Temp\cda6cf771a14fcbb4b3ce9e5be5492d2f099061affa8b5d8a20687fd865a281f.exe N/A
File created C:\Windows\SysWOW64\notepad¢¬.exe C:\Users\Admin\AppData\Local\Temp\cda6cf771a14fcbb4b3ce9e5be5492d2f099061affa8b5d8a20687fd865a281f.exe N/A
File opened for modification C:\Windows\SysWOW64\¢«.exe C:\Users\Admin\AppData\Local\Temp\cda6cf771a14fcbb4b3ce9e5be5492d2f099061affa8b5d8a20687fd865a281f.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\system\rundll32.exe C:\Users\Admin\AppData\Local\Temp\cda6cf771a14fcbb4b3ce9e5be5492d2f099061affa8b5d8a20687fd865a281f.exe N/A
File created C:\Windows\system\rundll32.exe C:\Users\Admin\AppData\Local\Temp\cda6cf771a14fcbb4b3ce9e5be5492d2f099061affa8b5d8a20687fd865a281f.exe N/A

Modifies registry class

Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" C:\Users\Admin\AppData\Local\Temp\cda6cf771a14fcbb4b3ce9e5be5492d2f099061affa8b5d8a20687fd865a281f.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainUp = "1718253554" C:\Windows\system\rundll32.exe N/A
Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command C:\Windows\system\rundll32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad.exe %1" C:\Users\Admin\AppData\Local\Temp\cda6cf771a14fcbb4b3ce9e5be5492d2f099061affa8b5d8a20687fd865a281f.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" C:\Users\Admin\AppData\Local\Temp\cda6cf771a14fcbb4b3ce9e5be5492d2f099061affa8b5d8a20687fd865a281f.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" C:\Windows\system\rundll32.exe N/A
Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command C:\Users\Admin\AppData\Local\Temp\cda6cf771a14fcbb4b3ce9e5be5492d2f099061affa8b5d8a20687fd865a281f.exe N/A
Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command C:\Users\Admin\AppData\Local\Temp\cda6cf771a14fcbb4b3ce9e5be5492d2f099061affa8b5d8a20687fd865a281f.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" C:\Users\Admin\AppData\Local\Temp\cda6cf771a14fcbb4b3ce9e5be5492d2f099061affa8b5d8a20687fd865a281f.exe N/A
Key created \REGISTRY\MACHINE\Software\Classes\MSipv C:\Windows\system\rundll32.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainVer = "506" C:\Windows\system\rundll32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" C:\Windows\system\rundll32.exe N/A
Key created \REGISTRY\MACHINE\Software\Classes\MSipv C:\Users\Admin\AppData\Local\Temp\cda6cf771a14fcbb4b3ce9e5be5492d2f099061affa8b5d8a20687fd865a281f.exe N/A
Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command C:\Windows\system\rundll32.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainSetup = "1718253554" C:\Windows\system\rundll32.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\cda6cf771a14fcbb4b3ce9e5be5492d2f099061affa8b5d8a20687fd865a281f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\cda6cf771a14fcbb4b3ce9e5be5492d2f099061affa8b5d8a20687fd865a281f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\cda6cf771a14fcbb4b3ce9e5be5492d2f099061affa8b5d8a20687fd865a281f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\cda6cf771a14fcbb4b3ce9e5be5492d2f099061affa8b5d8a20687fd865a281f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\cda6cf771a14fcbb4b3ce9e5be5492d2f099061affa8b5d8a20687fd865a281f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\cda6cf771a14fcbb4b3ce9e5be5492d2f099061affa8b5d8a20687fd865a281f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\cda6cf771a14fcbb4b3ce9e5be5492d2f099061affa8b5d8a20687fd865a281f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\cda6cf771a14fcbb4b3ce9e5be5492d2f099061affa8b5d8a20687fd865a281f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\cda6cf771a14fcbb4b3ce9e5be5492d2f099061affa8b5d8a20687fd865a281f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\cda6cf771a14fcbb4b3ce9e5be5492d2f099061affa8b5d8a20687fd865a281f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\cda6cf771a14fcbb4b3ce9e5be5492d2f099061affa8b5d8a20687fd865a281f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\cda6cf771a14fcbb4b3ce9e5be5492d2f099061affa8b5d8a20687fd865a281f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\cda6cf771a14fcbb4b3ce9e5be5492d2f099061affa8b5d8a20687fd865a281f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\cda6cf771a14fcbb4b3ce9e5be5492d2f099061affa8b5d8a20687fd865a281f.exe N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Windows\system\rundll32.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\cda6cf771a14fcbb4b3ce9e5be5492d2f099061affa8b5d8a20687fd865a281f.exe

"C:\Users\Admin\AppData\Local\Temp\cda6cf771a14fcbb4b3ce9e5be5492d2f099061affa8b5d8a20687fd865a281f.exe"

C:\Windows\system\rundll32.exe

C:\Windows\system\rundll32.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 www.zigui.org udp
HK 103.251.237.123:80 www.zigui.org tcp

Files

memory/2328-0-0x0000000000400000-0x0000000000415A00-memory.dmp

C:\Windows\SysWOW64\notepad¢¬.exe

MD5 54422be0e266f1ebc72d94be406c180a
SHA1 d09a62013b355fd7e1d6241d6d05006e023514bc
SHA256 42b578a7dac2157601ac10c8ea72747c98720b92ad3f7321e3ee0b186bc02208
SHA512 833c67f64c82280bc0f10bd7ce07de00efa048f3840060e4bf98a59bd30be2f1bcde1d920b300504d89e9c593f02359df88e25da08a67ee97bb4b0c8dc2e18d6

\Windows\system\rundll32.exe

MD5 3b34b2d86b06082dbef93b9084f6419d
SHA1 0e7007fe2efc6bea1cf0358befafc1be3aeedae6
SHA256 a95f62bc801f3d0dc4a59e7fbf6d96890174281b9ff8f3fe7c3cf2dd78b9f680
SHA512 6d53ae550a2e7128ac7ffda1cfaf4515f8a80421163f71ac4e8116e93b4fbd67f7a59bfa44137f01fcd981c47ce2f90f4fec7d2c7dc2310718b9105a84c1e7ab

memory/1692-19-0x0000000000400000-0x0000000000415A00-memory.dmp

memory/2328-18-0x00000000002E0000-0x00000000002F6000-memory.dmp

memory/2328-17-0x00000000002E0000-0x00000000002F6000-memory.dmp

memory/2328-21-0x0000000000400000-0x0000000000415A00-memory.dmp

memory/2328-22-0x00000000002E0000-0x00000000002E2000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-13 04:39

Reported

2024-06-13 04:41

Platform

win10v2004-20240508-en

Max time kernel

149s

Max time network

152s

Command Line

"C:\Users\Admin\AppData\Local\Temp\cda6cf771a14fcbb4b3ce9e5be5492d2f099061affa8b5d8a20687fd865a281f.exe"

Signatures

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Windows\system\rundll32.exe N/A

Modifies system executable filetype association

persistence
Description Indicator Process Target
Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command C:\Users\Admin\AppData\Local\Temp\cda6cf771a14fcbb4b3ce9e5be5492d2f099061affa8b5d8a20687fd865a281f.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" C:\Users\Admin\AppData\Local\Temp\cda6cf771a14fcbb4b3ce9e5be5492d2f099061affa8b5d8a20687fd865a281f.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" C:\Users\Admin\AppData\Local\Temp\cda6cf771a14fcbb4b3ce9e5be5492d2f099061affa8b5d8a20687fd865a281f.exe N/A
Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command C:\Windows\system\rundll32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" C:\Windows\system\rundll32.exe N/A

Drops file in System32 directory

Description Indicator Process Target
File opened for modification C:\Windows\SysWOW64\¢«.exe C:\Users\Admin\AppData\Local\Temp\cda6cf771a14fcbb4b3ce9e5be5492d2f099061affa8b5d8a20687fd865a281f.exe N/A
File created C:\Windows\SysWOW64\¢«.exe C:\Users\Admin\AppData\Local\Temp\cda6cf771a14fcbb4b3ce9e5be5492d2f099061affa8b5d8a20687fd865a281f.exe N/A
File opened for modification C:\Windows\SysWOW64\notepad¢¬.exe C:\Users\Admin\AppData\Local\Temp\cda6cf771a14fcbb4b3ce9e5be5492d2f099061affa8b5d8a20687fd865a281f.exe N/A
File created C:\Windows\SysWOW64\notepad¢¬.exe C:\Users\Admin\AppData\Local\Temp\cda6cf771a14fcbb4b3ce9e5be5492d2f099061affa8b5d8a20687fd865a281f.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\system\rundll32.exe C:\Users\Admin\AppData\Local\Temp\cda6cf771a14fcbb4b3ce9e5be5492d2f099061affa8b5d8a20687fd865a281f.exe N/A
File created C:\Windows\system\rundll32.exe C:\Users\Admin\AppData\Local\Temp\cda6cf771a14fcbb4b3ce9e5be5492d2f099061affa8b5d8a20687fd865a281f.exe N/A

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\MACHINE\Software\Classes\MSipv C:\Users\Admin\AppData\Local\Temp\cda6cf771a14fcbb4b3ce9e5be5492d2f099061affa8b5d8a20687fd865a281f.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad.exe %1" C:\Users\Admin\AppData\Local\Temp\cda6cf771a14fcbb4b3ce9e5be5492d2f099061affa8b5d8a20687fd865a281f.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" C:\Users\Admin\AppData\Local\Temp\cda6cf771a14fcbb4b3ce9e5be5492d2f099061affa8b5d8a20687fd865a281f.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" C:\Users\Admin\AppData\Local\Temp\cda6cf771a14fcbb4b3ce9e5be5492d2f099061affa8b5d8a20687fd865a281f.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainUp = "1718253558" C:\Windows\system\rundll32.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainVer = "506" C:\Windows\system\rundll32.exe N/A
Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command C:\Users\Admin\AppData\Local\Temp\cda6cf771a14fcbb4b3ce9e5be5492d2f099061affa8b5d8a20687fd865a281f.exe N/A
Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command C:\Users\Admin\AppData\Local\Temp\cda6cf771a14fcbb4b3ce9e5be5492d2f099061affa8b5d8a20687fd865a281f.exe N/A
Key created \REGISTRY\MACHINE\Software\Classes\MSipv C:\Windows\system\rundll32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" C:\Users\Admin\AppData\Local\Temp\cda6cf771a14fcbb4b3ce9e5be5492d2f099061affa8b5d8a20687fd865a281f.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainSetup = "1718253558" C:\Windows\system\rundll32.exe N/A
Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command C:\Windows\system\rundll32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" C:\Windows\system\rundll32.exe N/A
Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command C:\Windows\system\rundll32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" C:\Windows\system\rundll32.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\cda6cf771a14fcbb4b3ce9e5be5492d2f099061affa8b5d8a20687fd865a281f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\cda6cf771a14fcbb4b3ce9e5be5492d2f099061affa8b5d8a20687fd865a281f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\cda6cf771a14fcbb4b3ce9e5be5492d2f099061affa8b5d8a20687fd865a281f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\cda6cf771a14fcbb4b3ce9e5be5492d2f099061affa8b5d8a20687fd865a281f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\cda6cf771a14fcbb4b3ce9e5be5492d2f099061affa8b5d8a20687fd865a281f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\cda6cf771a14fcbb4b3ce9e5be5492d2f099061affa8b5d8a20687fd865a281f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\cda6cf771a14fcbb4b3ce9e5be5492d2f099061affa8b5d8a20687fd865a281f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\cda6cf771a14fcbb4b3ce9e5be5492d2f099061affa8b5d8a20687fd865a281f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\cda6cf771a14fcbb4b3ce9e5be5492d2f099061affa8b5d8a20687fd865a281f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\cda6cf771a14fcbb4b3ce9e5be5492d2f099061affa8b5d8a20687fd865a281f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\cda6cf771a14fcbb4b3ce9e5be5492d2f099061affa8b5d8a20687fd865a281f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\cda6cf771a14fcbb4b3ce9e5be5492d2f099061affa8b5d8a20687fd865a281f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\cda6cf771a14fcbb4b3ce9e5be5492d2f099061affa8b5d8a20687fd865a281f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\cda6cf771a14fcbb4b3ce9e5be5492d2f099061affa8b5d8a20687fd865a281f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\cda6cf771a14fcbb4b3ce9e5be5492d2f099061affa8b5d8a20687fd865a281f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\cda6cf771a14fcbb4b3ce9e5be5492d2f099061affa8b5d8a20687fd865a281f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\cda6cf771a14fcbb4b3ce9e5be5492d2f099061affa8b5d8a20687fd865a281f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\cda6cf771a14fcbb4b3ce9e5be5492d2f099061affa8b5d8a20687fd865a281f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\cda6cf771a14fcbb4b3ce9e5be5492d2f099061affa8b5d8a20687fd865a281f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\cda6cf771a14fcbb4b3ce9e5be5492d2f099061affa8b5d8a20687fd865a281f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\cda6cf771a14fcbb4b3ce9e5be5492d2f099061affa8b5d8a20687fd865a281f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\cda6cf771a14fcbb4b3ce9e5be5492d2f099061affa8b5d8a20687fd865a281f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\cda6cf771a14fcbb4b3ce9e5be5492d2f099061affa8b5d8a20687fd865a281f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\cda6cf771a14fcbb4b3ce9e5be5492d2f099061affa8b5d8a20687fd865a281f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\cda6cf771a14fcbb4b3ce9e5be5492d2f099061affa8b5d8a20687fd865a281f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\cda6cf771a14fcbb4b3ce9e5be5492d2f099061affa8b5d8a20687fd865a281f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\cda6cf771a14fcbb4b3ce9e5be5492d2f099061affa8b5d8a20687fd865a281f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\cda6cf771a14fcbb4b3ce9e5be5492d2f099061affa8b5d8a20687fd865a281f.exe N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Windows\system\rundll32.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\cda6cf771a14fcbb4b3ce9e5be5492d2f099061affa8b5d8a20687fd865a281f.exe

"C:\Users\Admin\AppData\Local\Temp\cda6cf771a14fcbb4b3ce9e5be5492d2f099061affa8b5d8a20687fd865a281f.exe"

C:\Windows\system\rundll32.exe

C:\Windows\system\rundll32.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 www.zigui.org udp
US 52.111.229.43:443 tcp

Files

memory/4376-0-0x0000000000400000-0x0000000000415A00-memory.dmp

C:\Windows\SysWOW64\notepad¢¬.exe

MD5 cf368ba2a4708ecbfb7b8facdbad135d
SHA1 500eb1209d60f7978849593386d17f972125686b
SHA256 1bb047d3e774d8a87c13af144e55cefcecd5bb24b699190f002a02130ada3079
SHA512 52fb9b6199959fd4b1d9a8b37e35c6138fc7d3e1535517acd7440d78cba9ca9f6f6f0d84165ac8783264783f3c0f4122d58e35fc9ff575882600382b7c5694e7

C:\Windows\System\rundll32.exe

MD5 61f78a1e84a0aaec9bca22e6573e7026
SHA1 a8df3b9a3734673455d6536f94278e3c8f6546d8
SHA256 df8465e00005548118b1834b7966553905fa0a4f85420030807ec381cb705006
SHA512 25188741d2b6144904d061871cce45f3cc6cc11e8175a122486314e623c950630d5f630fbd263f136993e2b127a92d297fdbea00e6be94276359fdd276338dc3

memory/4376-13-0x0000000000400000-0x0000000000415A00-memory.dmp