Analysis
-
max time kernel
150s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
19/07/2024, 07:14
Static task
static1
Behavioral task
behavioral1
Sample
f6cdb54eaf254208abadf289ddfd5503a19f4b4457e06c0bc6a3ff797c84cb8c.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
f6cdb54eaf254208abadf289ddfd5503a19f4b4457e06c0bc6a3ff797c84cb8c.exe
Resource
win10v2004-20240709-en
General
-
Target
f6cdb54eaf254208abadf289ddfd5503a19f4b4457e06c0bc6a3ff797c84cb8c.exe
-
Size
81KB
-
MD5
69a7c30bfad60ee4931541bacd6a09b3
-
SHA1
24b245af0654f34a29e0ccfdfd63c73e5e7c5e77
-
SHA256
f6cdb54eaf254208abadf289ddfd5503a19f4b4457e06c0bc6a3ff797c84cb8c
-
SHA512
b8c8d89f758f723537622d909ab196dfdee9c62ab23a907d55fbcd6ee24fb9a6657b698970acf7ab1bd787f36a15ddc0c8b2be8a40ffb4eb9298128cc019b6dd
-
SSDEEP
1536:RshfSWHHNvoLqNwDDGw02eQmh0HjWOKJUxXb:GhfxHNIreQm+Hi1JUxXb
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2640 rundll32.exe -
Loads dropped DLL 2 IoCs
pid Process 712 f6cdb54eaf254208abadf289ddfd5503a19f4b4457e06c0bc6a3ff797c84cb8c.exe 712 f6cdb54eaf254208abadf289ddfd5503a19f4b4457e06c0bc6a3ff797c84cb8c.exe -
Modifies system executable filetype association 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" f6cdb54eaf254208abadf289ddfd5503a19f4b4457e06c0bc6a3ff797c84cb8c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" f6cdb54eaf254208abadf289ddfd5503a19f4b4457e06c0bc6a3ff797c84cb8c.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command f6cdb54eaf254208abadf289ddfd5503a19f4b4457e06c0bc6a3ff797c84cb8c.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\¢«.exe f6cdb54eaf254208abadf289ddfd5503a19f4b4457e06c0bc6a3ff797c84cb8c.exe File created C:\Windows\SysWOW64\¢«.exe f6cdb54eaf254208abadf289ddfd5503a19f4b4457e06c0bc6a3ff797c84cb8c.exe File opened for modification C:\Windows\SysWOW64\notepad¢¬.exe f6cdb54eaf254208abadf289ddfd5503a19f4b4457e06c0bc6a3ff797c84cb8c.exe File created C:\Windows\SysWOW64\notepad¢¬.exe f6cdb54eaf254208abadf289ddfd5503a19f4b4457e06c0bc6a3ff797c84cb8c.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system\rundll32.exe f6cdb54eaf254208abadf289ddfd5503a19f4b4457e06c0bc6a3ff797c84cb8c.exe File created C:\Windows\system\rundll32.exe f6cdb54eaf254208abadf289ddfd5503a19f4b4457e06c0bc6a3ff797c84cb8c.exe -
Modifies registry class 15 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainSetup = "1721373264" rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainVer = "506" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command f6cdb54eaf254208abadf289ddfd5503a19f4b4457e06c0bc6a3ff797c84cb8c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" f6cdb54eaf254208abadf289ddfd5503a19f4b4457e06c0bc6a3ff797c84cb8c.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\MSipv f6cdb54eaf254208abadf289ddfd5503a19f4b4457e06c0bc6a3ff797c84cb8c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" f6cdb54eaf254208abadf289ddfd5503a19f4b4457e06c0bc6a3ff797c84cb8c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command f6cdb54eaf254208abadf289ddfd5503a19f4b4457e06c0bc6a3ff797c84cb8c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad.exe %1" f6cdb54eaf254208abadf289ddfd5503a19f4b4457e06c0bc6a3ff797c84cb8c.exe Key created \REGISTRY\MACHINE\Software\Classes\MSipv rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainUp = "1721373264" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" f6cdb54eaf254208abadf289ddfd5503a19f4b4457e06c0bc6a3ff797c84cb8c.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 712 f6cdb54eaf254208abadf289ddfd5503a19f4b4457e06c0bc6a3ff797c84cb8c.exe 712 f6cdb54eaf254208abadf289ddfd5503a19f4b4457e06c0bc6a3ff797c84cb8c.exe 712 f6cdb54eaf254208abadf289ddfd5503a19f4b4457e06c0bc6a3ff797c84cb8c.exe 712 f6cdb54eaf254208abadf289ddfd5503a19f4b4457e06c0bc6a3ff797c84cb8c.exe 712 f6cdb54eaf254208abadf289ddfd5503a19f4b4457e06c0bc6a3ff797c84cb8c.exe 712 f6cdb54eaf254208abadf289ddfd5503a19f4b4457e06c0bc6a3ff797c84cb8c.exe 712 f6cdb54eaf254208abadf289ddfd5503a19f4b4457e06c0bc6a3ff797c84cb8c.exe 712 f6cdb54eaf254208abadf289ddfd5503a19f4b4457e06c0bc6a3ff797c84cb8c.exe 712 f6cdb54eaf254208abadf289ddfd5503a19f4b4457e06c0bc6a3ff797c84cb8c.exe 712 f6cdb54eaf254208abadf289ddfd5503a19f4b4457e06c0bc6a3ff797c84cb8c.exe 712 f6cdb54eaf254208abadf289ddfd5503a19f4b4457e06c0bc6a3ff797c84cb8c.exe 712 f6cdb54eaf254208abadf289ddfd5503a19f4b4457e06c0bc6a3ff797c84cb8c.exe 712 f6cdb54eaf254208abadf289ddfd5503a19f4b4457e06c0bc6a3ff797c84cb8c.exe 712 f6cdb54eaf254208abadf289ddfd5503a19f4b4457e06c0bc6a3ff797c84cb8c.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2640 rundll32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 712 f6cdb54eaf254208abadf289ddfd5503a19f4b4457e06c0bc6a3ff797c84cb8c.exe 2640 rundll32.exe 2640 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 712 wrote to memory of 2640 712 f6cdb54eaf254208abadf289ddfd5503a19f4b4457e06c0bc6a3ff797c84cb8c.exe 30 PID 712 wrote to memory of 2640 712 f6cdb54eaf254208abadf289ddfd5503a19f4b4457e06c0bc6a3ff797c84cb8c.exe 30 PID 712 wrote to memory of 2640 712 f6cdb54eaf254208abadf289ddfd5503a19f4b4457e06c0bc6a3ff797c84cb8c.exe 30 PID 712 wrote to memory of 2640 712 f6cdb54eaf254208abadf289ddfd5503a19f4b4457e06c0bc6a3ff797c84cb8c.exe 30 PID 712 wrote to memory of 2640 712 f6cdb54eaf254208abadf289ddfd5503a19f4b4457e06c0bc6a3ff797c84cb8c.exe 30 PID 712 wrote to memory of 2640 712 f6cdb54eaf254208abadf289ddfd5503a19f4b4457e06c0bc6a3ff797c84cb8c.exe 30 PID 712 wrote to memory of 2640 712 f6cdb54eaf254208abadf289ddfd5503a19f4b4457e06c0bc6a3ff797c84cb8c.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\f6cdb54eaf254208abadf289ddfd5503a19f4b4457e06c0bc6a3ff797c84cb8c.exe"C:\Users\Admin\AppData\Local\Temp\f6cdb54eaf254208abadf289ddfd5503a19f4b4457e06c0bc6a3ff797c84cb8c.exe"1⤵
- Loads dropped DLL
- Modifies system executable filetype association
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:712 -
C:\Windows\system\rundll32.exeC:\Windows\system\rundll32.exe2⤵
- Executes dropped EXE
- Modifies system executable filetype association
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2640
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
77KB
MD5b9bf0168d4b46ff108c200c6f768865a
SHA1e1280ef604ee8b9eee56dabb40802ca8ff44be1b
SHA25657301abbf41514563eb566f6209b29debbf7682d451292953fc47cbff31a9d8d
SHA5122716f491c2962f57ab02ab80714fb0404cb7af78b016f1029f426a601d907a1c9fa455f7f5ff3a4559cd3b3022d039e763381a5ce07ac5855566a835be63762d
-
Filesize
77KB
MD5f46dd30f7f61257482402e93f8ffabfe
SHA12f59155c6606936dc7bcd26aa3e6cbdd6e0e56be
SHA256b43d5354a30360ec83e50460a9c1e833d110fa923fbaa9c6c0d9b6d062d33a32
SHA512adca5c6ae0b19ddb3e5633bf715bf5354d39cb3c199fd77651f740bf0432b7a664ab13fe75a3d7b7e2bc463d6fd9667ca8b3cbca7ab83451df63a72e9fbd8bdb