Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/07/2024, 16:08

General

  • Target

    387ec23c372d8d685be8ca417408b3d9b0456dd5b09eda664897ef8d3b4b9006.exe

  • Size

    80KB

  • MD5

    1abd664ec92c6e9d5e365a0ade7a9fe5

  • SHA1

    d8b2d1b8866f92839246a8af03d637f83466999d

  • SHA256

    387ec23c372d8d685be8ca417408b3d9b0456dd5b09eda664897ef8d3b4b9006

  • SHA512

    e03cd3cd06ba08870a0a57afafeaae9b563122b7ee40d3c669b4d72a5864bfc3be558dfbfd95013e552fcaf1e4c83bcce42f0b48392ceaac20add3d09dddb987

  • SSDEEP

    768:agO5xRYi+SfSWHHNvvG5bnl/NqNwsKVDstHxYD0p1aXKynF0vQmYZS0HdJnfWO4t:RshfSWHHNvoLqNwDDGw02eQmh0HjWO4t

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Modifies system executable filetype association 2 TTPs 5 IoCs
  • Drops file in System32 directory 4 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies registry class 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 28 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\387ec23c372d8d685be8ca417408b3d9b0456dd5b09eda664897ef8d3b4b9006.exe
    "C:\Users\Admin\AppData\Local\Temp\387ec23c372d8d685be8ca417408b3d9b0456dd5b09eda664897ef8d3b4b9006.exe"
    1⤵
    • Modifies system executable filetype association
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3976
    • C:\Windows\system\rundll32.exe
      C:\Windows\system\rundll32.exe
      2⤵
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:1628

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\notepad¢¬.exe

          Filesize

          73KB

          MD5

          17d4799665f0d6deac1c35094709e53f

          SHA1

          06a7c2cbd72d4fc45e9214a8a585d6eda5fefa46

          SHA256

          c1963526f59a37e5accc8efd205f21da378f721a50471f7daac6c57f272b68f2

          SHA512

          f1b131eae73720ae9f6432ea35a1937423e6c0f0feb8dbdb86e7f0a1ae2bde071c02603901a927bdce93203509ba1cf6a6c072ea534ff8ca407ff0ff646d8e96

        • C:\Windows\System\rundll32.exe

          Filesize

          73KB

          MD5

          9f1df7acc1df4375d52bca4c0a0e02f6

          SHA1

          4097985350176199c29ddc23af17cece924dbf18

          SHA256

          baf90564be31dc1ea6d64b8cbc3045e78f31ae22815a3419c8828453629cf708

          SHA512

          c2c10e6eacff568b0492fc503bf98fc700cbb4b96e51dcedc1667f5f690a881f8820e09fe0a0741cd23969893b85037645a20dac8732967dc7fe72192c632d40

        • memory/3976-0-0x0000000000400000-0x0000000000415A00-memory.dmp

          Filesize

          86KB

        • memory/3976-13-0x0000000000400000-0x0000000000415A00-memory.dmp

          Filesize

          86KB