Analysis

  • max time kernel
    149s
  • max time network
    97s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-08-2024 06:54

General

  • Target

    87efac17cb69a28e28eb15540f20ee9c9e1ad56d3f98b983689e5d1f45ca9754.exe

  • Size

    75KB

  • MD5

    eca4fc0f904e6323955bc57dd68ae58f

  • SHA1

    89359b5b5f9103f255fa44e1bba9c2009e3e8d0f

  • SHA256

    87efac17cb69a28e28eb15540f20ee9c9e1ad56d3f98b983689e5d1f45ca9754

  • SHA512

    15bbeb1af9c9f9550e18fba6470e4d28094f0a60a2fda7e555a59bd408fb23bf0511eb94c7d04bab503d08dc99337127662354ed47a2ea209e1ce244259e2137

  • SSDEEP

    768:agO5xRYi+SfSWHHNvvG5bnl/NqNwsKVDstHxYD0p1aXKynF0vQmYZS0HdJnfWOEd:RshfSWHHNvoLqNwDDGw02eQmh0HjWOEd

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Modifies system executable filetype association 2 TTPs 5 IoCs
  • Drops file in System32 directory 4 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 28 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\87efac17cb69a28e28eb15540f20ee9c9e1ad56d3f98b983689e5d1f45ca9754.exe
    "C:\Users\Admin\AppData\Local\Temp\87efac17cb69a28e28eb15540f20ee9c9e1ad56d3f98b983689e5d1f45ca9754.exe"
    1⤵
    • Modifies system executable filetype association
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4016
    • C:\Windows\system\rundll32.exe
      C:\Windows\system\rundll32.exe
      2⤵
      • Executes dropped EXE
      • Modifies system executable filetype association
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:4808

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\notepad¢¬.exe

    Filesize

    80KB

    MD5

    8e578174506bf36199aded356bfc8cf1

    SHA1

    eb7ac4f8b5e66d500bf8683e578fd030b7697565

    SHA256

    799bd0227abe5c7f784991025672201545b31cb2e1ecb8df4e863988bd6782f9

    SHA512

    347f286864ff4c6d8f29e91b9d964180c0fca96ac953a82453459ddf05ef23a3556cc336b74a67a1bac348e6b6d7777954e1ea467b51a93fdbc36dca75ec64a4

  • C:\Windows\System\rundll32.exe

    Filesize

    80KB

    MD5

    5724cc4ab2126ec4a78c7692bb3d163b

    SHA1

    9cd1be38e66bfabef7ba0cce492d102c9ce9d286

    SHA256

    244aba5cc2cd9218e71bd8f039f87a4c3cde5e8a5d2ec71322effc0fc818d9fb

    SHA512

    3b33e8f7c9ec4155300ac5f4597d14b9445a211711e41679c10fb7a6551826f449c8a88fa9fb74f24284136c589a660f059354652773daf06dc831ee464d377b

  • memory/4016-0-0x0000000000400000-0x0000000000415A00-memory.dmp

    Filesize

    86KB

  • memory/4016-13-0x0000000000400000-0x0000000000415A00-memory.dmp

    Filesize

    86KB