Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-09-2024 17:02

General

  • Target

    8b7b79653383122831264451b8b1db1ee7ec0a9a0efbb097a30107b5a236ad7d.exe

  • Size

    76KB

  • MD5

    6ea5f9a503ee8d481cc0d2a85a315a4c

  • SHA1

    97981ac3f97d88b5534ed2a2ad821abca9766c62

  • SHA256

    8b7b79653383122831264451b8b1db1ee7ec0a9a0efbb097a30107b5a236ad7d

  • SHA512

    fcbec4938a37437b6a3bab7b6dd4f9d19b94b8252abd0d5bff8255472f64970b9c4d11dd65a8cf290113d9ecdebe4371aef65566530232c75ccc05834d0f09e4

  • SSDEEP

    1536:RshfSWHHNvoLqNwDDGw02eQmh0HjWOqY+:GhfxHNIreQm+HiRY+

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Modifies system executable filetype association 2 TTPs 5 IoCs
  • Drops file in System32 directory 4 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 28 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8b7b79653383122831264451b8b1db1ee7ec0a9a0efbb097a30107b5a236ad7d.exe
    "C:\Users\Admin\AppData\Local\Temp\8b7b79653383122831264451b8b1db1ee7ec0a9a0efbb097a30107b5a236ad7d.exe"
    1⤵
    • Modifies system executable filetype association
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1008
    • C:\Windows\system\rundll32.exe
      C:\Windows\system\rundll32.exe
      2⤵
      • Executes dropped EXE
      • Modifies system executable filetype association
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:1612

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\notepad¢¬.exe

    Filesize

    73KB

    MD5

    9fb24cbdbb316a63c8eef1c1d5b8ff44

    SHA1

    15e191b92b73eb37271386e4588164b515a62e91

    SHA256

    a02a7a8355a2012aace7778457a46b9f52377780979d8ed8dccc5d9ca36bcc87

    SHA512

    79388b8e0043a5560ae49e22342c10ef3c1a42456dcf854311051f745622b0e4d66b03bda9e8c9e128aed0eae486cd51b472af56fdf31ad232cddf5bff1c1ffb

  • C:\Windows\System\rundll32.exe

    Filesize

    80KB

    MD5

    76d54f000e2d0f70810f0a898bd9b313

    SHA1

    8a014736e3410c94098d2551957369c45eba4018

    SHA256

    289a47fbe8ba87dab1e1aaa3699f9318d36e4bda2808bef9d76d5e8f4cafd5c2

    SHA512

    ca37e699d959b608a041ad54a52382c38d08df1904ace9e1a6410abb9a8d245055c7744500d431d2c4ccb729bd08a6f51860385206c8be2e2d87341f6b22ddb5

  • memory/1008-0-0x0000000000400000-0x0000000000415A00-memory.dmp

    Filesize

    86KB

  • memory/1008-13-0x0000000000400000-0x0000000000415A00-memory.dmp

    Filesize

    86KB

  • memory/1612-14-0x0000000000400000-0x0000000000415A00-memory.dmp

    Filesize

    86KB