Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
22/07/2024, 12:12
Static task
static1
Behavioral task
behavioral1
Sample
ad5aed362b6b2e30c197993a321308e0N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
ad5aed362b6b2e30c197993a321308e0N.exe
Resource
win10v2004-20240709-en
General
-
Target
ad5aed362b6b2e30c197993a321308e0N.exe
-
Size
82KB
-
MD5
ad5aed362b6b2e30c197993a321308e0
-
SHA1
c505c06e23fac2c77b40fd6b74527bc60c0d74b7
-
SHA256
d48dcf6bcc919c0c645e33cb2e66adf790f1eec008c566082e4bf53591f6c212
-
SHA512
a2ba963d7ae2cfb04e0da88595ac6d445f5b262a3e299e1d742d6e8ed3d3d286d4cc7c96cb9dae019445e1de87a96762972c0f01be5c03fbbc211f3ada802f82
-
SSDEEP
768:agO5xRYi+SfSWHHNvvG5bnl/NqNwsKVDstHxYD0p1aXKynF0vQmYZS0HdJnfWOE:RshfSWHHNvoLqNwDDGw02eQmh0HjWOE
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3120 rundll32.exe -
Modifies system executable filetype association 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command ad5aed362b6b2e30c197993a321308e0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" ad5aed362b6b2e30c197993a321308e0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" ad5aed362b6b2e30c197993a321308e0N.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\¢«.exe ad5aed362b6b2e30c197993a321308e0N.exe File created C:\Windows\SysWOW64\¢«.exe ad5aed362b6b2e30c197993a321308e0N.exe File opened for modification C:\Windows\SysWOW64\notepad¢¬.exe ad5aed362b6b2e30c197993a321308e0N.exe File created C:\Windows\SysWOW64\notepad¢¬.exe ad5aed362b6b2e30c197993a321308e0N.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system\rundll32.exe ad5aed362b6b2e30c197993a321308e0N.exe File created C:\Windows\system\rundll32.exe ad5aed362b6b2e30c197993a321308e0N.exe -
Modifies registry class 15 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" ad5aed362b6b2e30c197993a321308e0N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainSetup = "1721650381" rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainUp = "1721650381" rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainVer = "506" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command ad5aed362b6b2e30c197993a321308e0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad.exe %1" ad5aed362b6b2e30c197993a321308e0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" ad5aed362b6b2e30c197993a321308e0N.exe Key created \REGISTRY\MACHINE\Software\Classes\MSipv rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command ad5aed362b6b2e30c197993a321308e0N.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\MSipv ad5aed362b6b2e30c197993a321308e0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" ad5aed362b6b2e30c197993a321308e0N.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 216 ad5aed362b6b2e30c197993a321308e0N.exe 216 ad5aed362b6b2e30c197993a321308e0N.exe 216 ad5aed362b6b2e30c197993a321308e0N.exe 216 ad5aed362b6b2e30c197993a321308e0N.exe 216 ad5aed362b6b2e30c197993a321308e0N.exe 216 ad5aed362b6b2e30c197993a321308e0N.exe 216 ad5aed362b6b2e30c197993a321308e0N.exe 216 ad5aed362b6b2e30c197993a321308e0N.exe 216 ad5aed362b6b2e30c197993a321308e0N.exe 216 ad5aed362b6b2e30c197993a321308e0N.exe 216 ad5aed362b6b2e30c197993a321308e0N.exe 216 ad5aed362b6b2e30c197993a321308e0N.exe 216 ad5aed362b6b2e30c197993a321308e0N.exe 216 ad5aed362b6b2e30c197993a321308e0N.exe 216 ad5aed362b6b2e30c197993a321308e0N.exe 216 ad5aed362b6b2e30c197993a321308e0N.exe 216 ad5aed362b6b2e30c197993a321308e0N.exe 216 ad5aed362b6b2e30c197993a321308e0N.exe 216 ad5aed362b6b2e30c197993a321308e0N.exe 216 ad5aed362b6b2e30c197993a321308e0N.exe 216 ad5aed362b6b2e30c197993a321308e0N.exe 216 ad5aed362b6b2e30c197993a321308e0N.exe 216 ad5aed362b6b2e30c197993a321308e0N.exe 216 ad5aed362b6b2e30c197993a321308e0N.exe 216 ad5aed362b6b2e30c197993a321308e0N.exe 216 ad5aed362b6b2e30c197993a321308e0N.exe 216 ad5aed362b6b2e30c197993a321308e0N.exe 216 ad5aed362b6b2e30c197993a321308e0N.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3120 rundll32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 216 ad5aed362b6b2e30c197993a321308e0N.exe 3120 rundll32.exe 3120 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 216 wrote to memory of 3120 216 ad5aed362b6b2e30c197993a321308e0N.exe 87 PID 216 wrote to memory of 3120 216 ad5aed362b6b2e30c197993a321308e0N.exe 87 PID 216 wrote to memory of 3120 216 ad5aed362b6b2e30c197993a321308e0N.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad5aed362b6b2e30c197993a321308e0N.exe"C:\Users\Admin\AppData\Local\Temp\ad5aed362b6b2e30c197993a321308e0N.exe"1⤵
- Modifies system executable filetype association
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Windows\system\rundll32.exeC:\Windows\system\rundll32.exe2⤵
- Executes dropped EXE
- Modifies system executable filetype association
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3120
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
73KB
MD55999d31197fcc66298430f845c0b8547
SHA14124876e664791b44016466ac5644754aa21f13c
SHA2562699b4ab327499c3ca3fadc48ae6f1962abb0605a173c8a31e07ae5d1c4d42c3
SHA512e33f008a6a93b47f8ca740085de4b4fa0dadda48c77e177a2a6a5ab1ed76a22f99223a71853a7c8380b40f2a2904464bd7483cbeed8e7cf9bb86f0ac739e39a5
-
Filesize
74KB
MD53d776ca4c0cf2df1bf16adfe764517ad
SHA1c98687bca3291921552482a7c4b3f698b3c09efc
SHA256a4ac9a46997c9fcc2de75a470035b87dcd95f7f92ef29c824db8b4b547053ffc
SHA5128d38906974433dd88a0a72f4c96a7b19b3bf210d60b8f797359b6130132876770115b211a2ce96dc97c52451836061d80df64dc1c9164b970365bdff7e8d7e79