Analysis

  • max time kernel
    119s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/09/2024, 08:53

General

  • Target

    1a011f0a4d8aa5ad5c3b7c09305db93c6f5d382fe3c80bcce8d5ca92ee87c54eN.exe

  • Size

    809KB

  • MD5

    932367707a58f2d485b059753c450330

  • SHA1

    1c2c11879909ff7402cfd7c00392ff308fc7e7d9

  • SHA256

    1a011f0a4d8aa5ad5c3b7c09305db93c6f5d382fe3c80bcce8d5ca92ee87c54e

  • SHA512

    3f586a5ac3fa1708bc54fa2bc568afc8f06516bc8f8a3b79af246ce04f1639e0bb21e8e1f931a4b341e071c32009f5db8423445e4cb81f4868951577716972b0

  • SSDEEP

    768:5BBdFYDgao5/AUrLEEzayTpBJfxBDlxcFNXK8D1Foj/:5pcC/eAayJ3Rx0g

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Modifies system executable filetype association 2 TTPs 5 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 28 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1a011f0a4d8aa5ad5c3b7c09305db93c6f5d382fe3c80bcce8d5ca92ee87c54eN.exe
    "C:\Users\Admin\AppData\Local\Temp\1a011f0a4d8aa5ad5c3b7c09305db93c6f5d382fe3c80bcce8d5ca92ee87c54eN.exe"
    1⤵
    • Modifies system executable filetype association
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1952
    • C:\Windows\system\rundll32.exe
      C:\Windows\system\rundll32.exe
      2⤵
      • Executes dropped EXE
      • Modifies system executable filetype association
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:428

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\System\rundll32.exe

          Filesize

          823KB

          MD5

          6becc905adc89feaf38699691a2c6bab

          SHA1

          e19e48b08087e1feacf27768e582b016a244cb9e

          SHA256

          e747e7db44707b639ffc3acb54d56efc55bcb9b1f10e15b6b4299c4e9cbda482

          SHA512

          3ade6a20ec3f58f01041cc3d305750adc7c668ed8dfd49eb8c67f2cd6f67a612fb90ffffd30d35df16548db6a05292c57c2ad08da951d77cb28437e7ff21ee15

        • memory/428-8-0x0000000000400000-0x0000000000415000-memory.dmp

          Filesize

          84KB

        • memory/1952-0-0x0000000000400000-0x0000000000415000-memory.dmp

          Filesize

          84KB

        • memory/1952-7-0x0000000000400000-0x0000000000415000-memory.dmp

          Filesize

          84KB