Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
20/07/2024, 18:52
Static task
static1
Behavioral task
behavioral1
Sample
c77cf54b8e96a21be126502e22fc64becea724aaae2172be7024659d6e0b1b49.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c77cf54b8e96a21be126502e22fc64becea724aaae2172be7024659d6e0b1b49.exe
Resource
win10v2004-20240709-en
General
-
Target
c77cf54b8e96a21be126502e22fc64becea724aaae2172be7024659d6e0b1b49.exe
-
Size
80KB
-
MD5
44d4383b50bf783aaf5a1dee4b6a7c4b
-
SHA1
1f810a8186e83ad622011d74eb26bc01afb3714d
-
SHA256
c77cf54b8e96a21be126502e22fc64becea724aaae2172be7024659d6e0b1b49
-
SHA512
68c1f1454dacc48971707cf122c4d8caeba682cdfd4893e09f2801776258eb1518058227f7fcaf5e6436415af5992254007c1d4258b90d8c24340b1ab22b2a54
-
SSDEEP
1536:RshfSWHHNvoLqNwDDGw02eQmh0HjWOSWXM13:GhfxHNIreQm+HiVWXM13
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2712 rundll32.exe -
Loads dropped DLL 2 IoCs
pid Process 2848 c77cf54b8e96a21be126502e22fc64becea724aaae2172be7024659d6e0b1b49.exe 2848 c77cf54b8e96a21be126502e22fc64becea724aaae2172be7024659d6e0b1b49.exe -
Modifies system executable filetype association 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command c77cf54b8e96a21be126502e22fc64becea724aaae2172be7024659d6e0b1b49.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" c77cf54b8e96a21be126502e22fc64becea724aaae2172be7024659d6e0b1b49.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" c77cf54b8e96a21be126502e22fc64becea724aaae2172be7024659d6e0b1b49.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\notepad¢¬.exe c77cf54b8e96a21be126502e22fc64becea724aaae2172be7024659d6e0b1b49.exe File created C:\Windows\SysWOW64\notepad¢¬.exe c77cf54b8e96a21be126502e22fc64becea724aaae2172be7024659d6e0b1b49.exe File opened for modification C:\Windows\SysWOW64\¢«.exe c77cf54b8e96a21be126502e22fc64becea724aaae2172be7024659d6e0b1b49.exe File created C:\Windows\SysWOW64\¢«.exe c77cf54b8e96a21be126502e22fc64becea724aaae2172be7024659d6e0b1b49.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\system\rundll32.exe c77cf54b8e96a21be126502e22fc64becea724aaae2172be7024659d6e0b1b49.exe File opened for modification C:\Windows\system\rundll32.exe c77cf54b8e96a21be126502e22fc64becea724aaae2172be7024659d6e0b1b49.exe -
Modifies registry class 15 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\MSipv rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainVer = "506" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" c77cf54b8e96a21be126502e22fc64becea724aaae2172be7024659d6e0b1b49.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainUp = "1721501532" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command c77cf54b8e96a21be126502e22fc64becea724aaae2172be7024659d6e0b1b49.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad.exe %1" c77cf54b8e96a21be126502e22fc64becea724aaae2172be7024659d6e0b1b49.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" c77cf54b8e96a21be126502e22fc64becea724aaae2172be7024659d6e0b1b49.exe Key created \REGISTRY\MACHINE\Software\Classes\MSipv c77cf54b8e96a21be126502e22fc64becea724aaae2172be7024659d6e0b1b49.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command c77cf54b8e96a21be126502e22fc64becea724aaae2172be7024659d6e0b1b49.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" c77cf54b8e96a21be126502e22fc64becea724aaae2172be7024659d6e0b1b49.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainSetup = "1721501532" rundll32.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2848 c77cf54b8e96a21be126502e22fc64becea724aaae2172be7024659d6e0b1b49.exe 2848 c77cf54b8e96a21be126502e22fc64becea724aaae2172be7024659d6e0b1b49.exe 2848 c77cf54b8e96a21be126502e22fc64becea724aaae2172be7024659d6e0b1b49.exe 2848 c77cf54b8e96a21be126502e22fc64becea724aaae2172be7024659d6e0b1b49.exe 2848 c77cf54b8e96a21be126502e22fc64becea724aaae2172be7024659d6e0b1b49.exe 2848 c77cf54b8e96a21be126502e22fc64becea724aaae2172be7024659d6e0b1b49.exe 2848 c77cf54b8e96a21be126502e22fc64becea724aaae2172be7024659d6e0b1b49.exe 2848 c77cf54b8e96a21be126502e22fc64becea724aaae2172be7024659d6e0b1b49.exe 2848 c77cf54b8e96a21be126502e22fc64becea724aaae2172be7024659d6e0b1b49.exe 2848 c77cf54b8e96a21be126502e22fc64becea724aaae2172be7024659d6e0b1b49.exe 2848 c77cf54b8e96a21be126502e22fc64becea724aaae2172be7024659d6e0b1b49.exe 2848 c77cf54b8e96a21be126502e22fc64becea724aaae2172be7024659d6e0b1b49.exe 2848 c77cf54b8e96a21be126502e22fc64becea724aaae2172be7024659d6e0b1b49.exe 2848 c77cf54b8e96a21be126502e22fc64becea724aaae2172be7024659d6e0b1b49.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2712 rundll32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2848 c77cf54b8e96a21be126502e22fc64becea724aaae2172be7024659d6e0b1b49.exe 2712 rundll32.exe 2712 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2848 wrote to memory of 2712 2848 c77cf54b8e96a21be126502e22fc64becea724aaae2172be7024659d6e0b1b49.exe 30 PID 2848 wrote to memory of 2712 2848 c77cf54b8e96a21be126502e22fc64becea724aaae2172be7024659d6e0b1b49.exe 30 PID 2848 wrote to memory of 2712 2848 c77cf54b8e96a21be126502e22fc64becea724aaae2172be7024659d6e0b1b49.exe 30 PID 2848 wrote to memory of 2712 2848 c77cf54b8e96a21be126502e22fc64becea724aaae2172be7024659d6e0b1b49.exe 30 PID 2848 wrote to memory of 2712 2848 c77cf54b8e96a21be126502e22fc64becea724aaae2172be7024659d6e0b1b49.exe 30 PID 2848 wrote to memory of 2712 2848 c77cf54b8e96a21be126502e22fc64becea724aaae2172be7024659d6e0b1b49.exe 30 PID 2848 wrote to memory of 2712 2848 c77cf54b8e96a21be126502e22fc64becea724aaae2172be7024659d6e0b1b49.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\c77cf54b8e96a21be126502e22fc64becea724aaae2172be7024659d6e0b1b49.exe"C:\Users\Admin\AppData\Local\Temp\c77cf54b8e96a21be126502e22fc64becea724aaae2172be7024659d6e0b1b49.exe"1⤵
- Loads dropped DLL
- Modifies system executable filetype association
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\system\rundll32.exeC:\Windows\system\rundll32.exe2⤵
- Executes dropped EXE
- Modifies system executable filetype association
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2712
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD545dc94571c4947e5de7a09df6b63886e
SHA18c209b68bb1cfeff11db291fee4d92be0ab93603
SHA2568c8cdd828df9c6bd3ae31c23e977805625a39238022e35a0a42744a98ac31d57
SHA51231dd29fb45c8d680de5234302149f186cf1f74a77f02abbb3f518fb72d3781e377238581e54800bafcdb8d98bdc6d1fb59c46cb91aff6b424c723ddf89d2c64b
-
Filesize
74KB
MD508dc672eddf06aa77c2b03ab0ad76671
SHA1ba5fdb674fb137543c7994c5a52a4949d62c02e7
SHA256ada7a23b5703d6279b5bafaa0acb2563ee9c95ce08518c50ab7645f172a62ae6
SHA512fce58f6ac7e4b98eb8e13948b3ba47e7063a5b9d349894a3def60a0c48278eedd080a750f48dfe039a1f3ed15197423957d41c6e8080307c521cd502803ee48e