Analysis
-
max time kernel
149s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11/08/2024, 10:59
Static task
static1
Behavioral task
behavioral1
Sample
6e0b16dde4cd5adac66a04d620efbebb6ee5be0d2e0f03ee915ddfc69043bd54.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
6e0b16dde4cd5adac66a04d620efbebb6ee5be0d2e0f03ee915ddfc69043bd54.exe
Resource
win10v2004-20240802-en
General
-
Target
6e0b16dde4cd5adac66a04d620efbebb6ee5be0d2e0f03ee915ddfc69043bd54.exe
-
Size
81KB
-
MD5
9dac4d08b69e1a7f5aee87d7adf47038
-
SHA1
0ac2042459ceeaaadd98ba1d50a6246944b20784
-
SHA256
6e0b16dde4cd5adac66a04d620efbebb6ee5be0d2e0f03ee915ddfc69043bd54
-
SHA512
f6b66a9b0bfbaedbaf0813fc01122b6abc854f4b8a3674132901cabbd25ca06266fe6eedfd7409bb49e66e80d7cf6489755e5a77844f316a1a75ea41ee5a518a
-
SSDEEP
1536:RshfSWHHNvoLqNwDDGw02eQmh0HjWOKl:GhfxHNIreQm+Hixl
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4932 rundll32.exe -
Modifies system executable filetype association 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command 6e0b16dde4cd5adac66a04d620efbebb6ee5be0d2e0f03ee915ddfc69043bd54.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 6e0b16dde4cd5adac66a04d620efbebb6ee5be0d2e0f03ee915ddfc69043bd54.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" 6e0b16dde4cd5adac66a04d620efbebb6ee5be0d2e0f03ee915ddfc69043bd54.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\¢«.exe 6e0b16dde4cd5adac66a04d620efbebb6ee5be0d2e0f03ee915ddfc69043bd54.exe File created C:\Windows\SysWOW64\¢«.exe 6e0b16dde4cd5adac66a04d620efbebb6ee5be0d2e0f03ee915ddfc69043bd54.exe File opened for modification C:\Windows\SysWOW64\notepad¢¬.exe 6e0b16dde4cd5adac66a04d620efbebb6ee5be0d2e0f03ee915ddfc69043bd54.exe File created C:\Windows\SysWOW64\notepad¢¬.exe 6e0b16dde4cd5adac66a04d620efbebb6ee5be0d2e0f03ee915ddfc69043bd54.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system\rundll32.exe 6e0b16dde4cd5adac66a04d620efbebb6ee5be0d2e0f03ee915ddfc69043bd54.exe File created C:\Windows\system\rundll32.exe 6e0b16dde4cd5adac66a04d620efbebb6ee5be0d2e0f03ee915ddfc69043bd54.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6e0b16dde4cd5adac66a04d620efbebb6ee5be0d2e0f03ee915ddfc69043bd54.exe -
Modifies registry class 15 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainVer = "506" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\MSipv rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainSetup = "1723373964" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 6e0b16dde4cd5adac66a04d620efbebb6ee5be0d2e0f03ee915ddfc69043bd54.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command 6e0b16dde4cd5adac66a04d620efbebb6ee5be0d2e0f03ee915ddfc69043bd54.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad.exe %1" 6e0b16dde4cd5adac66a04d620efbebb6ee5be0d2e0f03ee915ddfc69043bd54.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" 6e0b16dde4cd5adac66a04d620efbebb6ee5be0d2e0f03ee915ddfc69043bd54.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainUp = "1723373964" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\MSipv 6e0b16dde4cd5adac66a04d620efbebb6ee5be0d2e0f03ee915ddfc69043bd54.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" 6e0b16dde4cd5adac66a04d620efbebb6ee5be0d2e0f03ee915ddfc69043bd54.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command 6e0b16dde4cd5adac66a04d620efbebb6ee5be0d2e0f03ee915ddfc69043bd54.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 2040 6e0b16dde4cd5adac66a04d620efbebb6ee5be0d2e0f03ee915ddfc69043bd54.exe 2040 6e0b16dde4cd5adac66a04d620efbebb6ee5be0d2e0f03ee915ddfc69043bd54.exe 2040 6e0b16dde4cd5adac66a04d620efbebb6ee5be0d2e0f03ee915ddfc69043bd54.exe 2040 6e0b16dde4cd5adac66a04d620efbebb6ee5be0d2e0f03ee915ddfc69043bd54.exe 2040 6e0b16dde4cd5adac66a04d620efbebb6ee5be0d2e0f03ee915ddfc69043bd54.exe 2040 6e0b16dde4cd5adac66a04d620efbebb6ee5be0d2e0f03ee915ddfc69043bd54.exe 2040 6e0b16dde4cd5adac66a04d620efbebb6ee5be0d2e0f03ee915ddfc69043bd54.exe 2040 6e0b16dde4cd5adac66a04d620efbebb6ee5be0d2e0f03ee915ddfc69043bd54.exe 2040 6e0b16dde4cd5adac66a04d620efbebb6ee5be0d2e0f03ee915ddfc69043bd54.exe 2040 6e0b16dde4cd5adac66a04d620efbebb6ee5be0d2e0f03ee915ddfc69043bd54.exe 2040 6e0b16dde4cd5adac66a04d620efbebb6ee5be0d2e0f03ee915ddfc69043bd54.exe 2040 6e0b16dde4cd5adac66a04d620efbebb6ee5be0d2e0f03ee915ddfc69043bd54.exe 2040 6e0b16dde4cd5adac66a04d620efbebb6ee5be0d2e0f03ee915ddfc69043bd54.exe 2040 6e0b16dde4cd5adac66a04d620efbebb6ee5be0d2e0f03ee915ddfc69043bd54.exe 2040 6e0b16dde4cd5adac66a04d620efbebb6ee5be0d2e0f03ee915ddfc69043bd54.exe 2040 6e0b16dde4cd5adac66a04d620efbebb6ee5be0d2e0f03ee915ddfc69043bd54.exe 2040 6e0b16dde4cd5adac66a04d620efbebb6ee5be0d2e0f03ee915ddfc69043bd54.exe 2040 6e0b16dde4cd5adac66a04d620efbebb6ee5be0d2e0f03ee915ddfc69043bd54.exe 2040 6e0b16dde4cd5adac66a04d620efbebb6ee5be0d2e0f03ee915ddfc69043bd54.exe 2040 6e0b16dde4cd5adac66a04d620efbebb6ee5be0d2e0f03ee915ddfc69043bd54.exe 2040 6e0b16dde4cd5adac66a04d620efbebb6ee5be0d2e0f03ee915ddfc69043bd54.exe 2040 6e0b16dde4cd5adac66a04d620efbebb6ee5be0d2e0f03ee915ddfc69043bd54.exe 2040 6e0b16dde4cd5adac66a04d620efbebb6ee5be0d2e0f03ee915ddfc69043bd54.exe 2040 6e0b16dde4cd5adac66a04d620efbebb6ee5be0d2e0f03ee915ddfc69043bd54.exe 2040 6e0b16dde4cd5adac66a04d620efbebb6ee5be0d2e0f03ee915ddfc69043bd54.exe 2040 6e0b16dde4cd5adac66a04d620efbebb6ee5be0d2e0f03ee915ddfc69043bd54.exe 2040 6e0b16dde4cd5adac66a04d620efbebb6ee5be0d2e0f03ee915ddfc69043bd54.exe 2040 6e0b16dde4cd5adac66a04d620efbebb6ee5be0d2e0f03ee915ddfc69043bd54.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4932 rundll32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2040 6e0b16dde4cd5adac66a04d620efbebb6ee5be0d2e0f03ee915ddfc69043bd54.exe 4932 rundll32.exe 4932 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2040 wrote to memory of 4932 2040 6e0b16dde4cd5adac66a04d620efbebb6ee5be0d2e0f03ee915ddfc69043bd54.exe 87 PID 2040 wrote to memory of 4932 2040 6e0b16dde4cd5adac66a04d620efbebb6ee5be0d2e0f03ee915ddfc69043bd54.exe 87 PID 2040 wrote to memory of 4932 2040 6e0b16dde4cd5adac66a04d620efbebb6ee5be0d2e0f03ee915ddfc69043bd54.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\6e0b16dde4cd5adac66a04d620efbebb6ee5be0d2e0f03ee915ddfc69043bd54.exe"C:\Users\Admin\AppData\Local\Temp\6e0b16dde4cd5adac66a04d620efbebb6ee5be0d2e0f03ee915ddfc69043bd54.exe"1⤵
- Modifies system executable filetype association
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\system\rundll32.exeC:\Windows\system\rundll32.exe2⤵
- Executes dropped EXE
- Modifies system executable filetype association
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:4932
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74KB
MD56d141a0608390ce80c7cfe8ee5a5b54e
SHA1f634649ef5108060175ec7a3e4ddcdae51d93c28
SHA2560d1adfb47dc47b3272a4c2f8ba35c2085f23283bbd303603e5b88424e09145d5
SHA5129857024110370914e50e2c123983929df90fc6a21b7b9943f27c7ac11efdea1043645259af0af5157b98c48c848fe1e0ac20836053819c4e81d377f38c8af7bc
-
Filesize
73KB
MD5d8b6da9ace59155f6e3d2bbc4cab8320
SHA1d8c138aad5ad5991a3bfd0ede25053387c457503
SHA256d9c0aed6cdcc22be8b28cab24b045847dac7543a6f32be390c3ff8dffb015c47
SHA5123aadea7c1ee4698e785ec0314230479c0a884538fbf81e6cb436efc37df584f120da6e59da50083f96c375095a18098cfdf9106f601747b6111f536d8244158d