Analysis

  • max time kernel
    149s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    25-09-2024 18:59

General

  • Target

    1723ff59b968969d2693e425108bdb1bfa04c88249fc5a30d58404a96dc75a82.exe

  • Size

    645KB

  • MD5

    8782f3cdb57dd3509a4794eba3493e73

  • SHA1

    2715631be47484dcda80b5ea754d506d1a62e95a

  • SHA256

    1723ff59b968969d2693e425108bdb1bfa04c88249fc5a30d58404a96dc75a82

  • SHA512

    1190058137cedd26f3358109dcc4837f26c37139031f61c8e43ae4aaf26903f5ffc5549a470b7c64af19ea97a59cbdcf5c98a5318f99cc2ccd3ccebbecb6ed2a

  • SSDEEP

    768:5BBdFYDgao5/AUrLEEzayTpBJfxBDlxcFNXK8D1Foj/:5pcC/eAayJ3Rx0g

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Modifies system executable filetype association 2 TTPs 5 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1723ff59b968969d2693e425108bdb1bfa04c88249fc5a30d58404a96dc75a82.exe
    "C:\Users\Admin\AppData\Local\Temp\1723ff59b968969d2693e425108bdb1bfa04c88249fc5a30d58404a96dc75a82.exe"
    1⤵
    • Loads dropped DLL
    • Modifies system executable filetype association
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2972
    • C:\Windows\system\rundll32.exe
      C:\Windows\system\rundll32.exe
      2⤵
      • Executes dropped EXE
      • Modifies system executable filetype association
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:2664

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Windows\system\rundll32.exe

    Filesize

    665KB

    MD5

    e1cc83e004ca4b353fe53f0abf09e063

    SHA1

    436decf2af63de07d8ac8a298298a5f13b9a1724

    SHA256

    b92e8387b608b51f578ecd5d9f6c687e0b069c7d7fc917c998f761747078ca99

    SHA512

    26815aad80a33c51262b08216b379bdd1d1116b3f1c74c6e28fd55420d124412affd6bfc7fe3f3f7d18034601c494fc4ac3c13ee316a757d0333f2798cfdbdde

  • memory/2664-15-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/2972-0-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/2972-10-0x0000000000260000-0x0000000000275000-memory.dmp

    Filesize

    84KB

  • memory/2972-13-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/2972-14-0x0000000000260000-0x0000000000262000-memory.dmp

    Filesize

    8KB