Analysis

  • max time kernel
    150s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    19/07/2024, 07:14

General

  • Target

    f6cdb54eaf254208abadf289ddfd5503a19f4b4457e06c0bc6a3ff797c84cb8c.exe

  • Size

    81KB

  • MD5

    69a7c30bfad60ee4931541bacd6a09b3

  • SHA1

    24b245af0654f34a29e0ccfdfd63c73e5e7c5e77

  • SHA256

    f6cdb54eaf254208abadf289ddfd5503a19f4b4457e06c0bc6a3ff797c84cb8c

  • SHA512

    b8c8d89f758f723537622d909ab196dfdee9c62ab23a907d55fbcd6ee24fb9a6657b698970acf7ab1bd787f36a15ddc0c8b2be8a40ffb4eb9298128cc019b6dd

  • SSDEEP

    1536:RshfSWHHNvoLqNwDDGw02eQmh0HjWOKJUxXb:GhfxHNIreQm+Hi1JUxXb

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Modifies system executable filetype association 2 TTPs 5 IoCs
  • Drops file in System32 directory 4 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies registry class 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f6cdb54eaf254208abadf289ddfd5503a19f4b4457e06c0bc6a3ff797c84cb8c.exe
    "C:\Users\Admin\AppData\Local\Temp\f6cdb54eaf254208abadf289ddfd5503a19f4b4457e06c0bc6a3ff797c84cb8c.exe"
    1⤵
    • Loads dropped DLL
    • Modifies system executable filetype association
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:712
    • C:\Windows\system\rundll32.exe
      C:\Windows\system\rundll32.exe
      2⤵
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:2640

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\notepad¢¬.exe

    Filesize

    77KB

    MD5

    b9bf0168d4b46ff108c200c6f768865a

    SHA1

    e1280ef604ee8b9eee56dabb40802ca8ff44be1b

    SHA256

    57301abbf41514563eb566f6209b29debbf7682d451292953fc47cbff31a9d8d

    SHA512

    2716f491c2962f57ab02ab80714fb0404cb7af78b016f1029f426a601d907a1c9fa455f7f5ff3a4559cd3b3022d039e763381a5ce07ac5855566a835be63762d

  • \Windows\system\rundll32.exe

    Filesize

    77KB

    MD5

    f46dd30f7f61257482402e93f8ffabfe

    SHA1

    2f59155c6606936dc7bcd26aa3e6cbdd6e0e56be

    SHA256

    b43d5354a30360ec83e50460a9c1e833d110fa923fbaa9c6c0d9b6d062d33a32

    SHA512

    adca5c6ae0b19ddb3e5633bf715bf5354d39cb3c199fd77651f740bf0432b7a664ab13fe75a3d7b7e2bc463d6fd9667ca8b3cbca7ab83451df63a72e9fbd8bdb

  • memory/712-0-0x0000000000400000-0x0000000000415A00-memory.dmp

    Filesize

    86KB

  • memory/712-18-0x0000000000260000-0x0000000000276000-memory.dmp

    Filesize

    88KB

  • memory/712-16-0x0000000000260000-0x0000000000276000-memory.dmp

    Filesize

    88KB

  • memory/712-21-0x0000000000260000-0x0000000000262000-memory.dmp

    Filesize

    8KB

  • memory/712-20-0x0000000000400000-0x0000000000415A00-memory.dmp

    Filesize

    86KB