Analysis

  • max time kernel
    150s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    05/10/2024, 08:02

General

  • Target

    d4478f3204d94491fd7046a0d6a2cd81dbc508764cc1ae876cd390ebc3fd3010.exe

  • Size

    76KB

  • MD5

    a5ab627c3553105ae4ff04c4f2b3a993

  • SHA1

    491f4efed725e3f51543e7a2f4765472d76e3cc4

  • SHA256

    d4478f3204d94491fd7046a0d6a2cd81dbc508764cc1ae876cd390ebc3fd3010

  • SHA512

    6c10fb1c9988fff9ab72686555880f0ab46c4ce843bc5f276f2c0cdf051631736700aaa65f14d6f84d48685376fa4f1ba73b3c8b63c33dce244fdc73da02189e

  • SSDEEP

    1536:RshfSWHHNvoLqNwDDGw02eQmh0HjWOXCS:GhfxHNIreQm+HiQCS

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Modifies system executable filetype association 2 TTPs 5 IoCs
  • Drops file in System32 directory 4 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d4478f3204d94491fd7046a0d6a2cd81dbc508764cc1ae876cd390ebc3fd3010.exe
    "C:\Users\Admin\AppData\Local\Temp\d4478f3204d94491fd7046a0d6a2cd81dbc508764cc1ae876cd390ebc3fd3010.exe"
    1⤵
    • Loads dropped DLL
    • Modifies system executable filetype association
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1792
    • C:\Windows\system\rundll32.exe
      C:\Windows\system\rundll32.exe
      2⤵
      • Executes dropped EXE
      • Modifies system executable filetype association
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:1592

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\notepad¢¬.exe

    Filesize

    83KB

    MD5

    8f69745727287fc236202adff0b3857b

    SHA1

    9c4dbcd0a1cb87ab5ae1e0a49f386daa17df78cc

    SHA256

    c3fa564397815dc00a61d19d58a2c00d5a1882d7baeeb36bdbf53e8e90fd3713

    SHA512

    dd2cfeb61dac0fce36615dd68a59fa249f9b99aa1c6af440b63cc9abc03341ecd9c74c40a8caa62585a0ceff771015a26de619f9f7e3d5b361b8b37ba8363cd7

  • \Windows\system\rundll32.exe

    Filesize

    74KB

    MD5

    7bc1870219724bac2d6ddfb5dd9f5107

    SHA1

    614dbcf2e1c981dba158a8313ec63d95eb990b38

    SHA256

    3383f75ea3ade1062eab5967b0afebaa1ffb7ba00fefa0571558495a0e6d4dd1

    SHA512

    f0709b6c494d3f1140fb4a774c8c4cad7a57267fe1cf5dfbf6965639a59428d61c7c60129006e9336fa01bca9326801ceec941fdf822d2eebc991464b7dbbfbf

  • memory/1592-19-0x0000000000400000-0x0000000000415A00-memory.dmp

    Filesize

    86KB

  • memory/1592-23-0x0000000000400000-0x0000000000415A00-memory.dmp

    Filesize

    86KB

  • memory/1792-0-0x0000000000400000-0x0000000000415A00-memory.dmp

    Filesize

    86KB

  • memory/1792-12-0x0000000000260000-0x0000000000276000-memory.dmp

    Filesize

    88KB

  • memory/1792-17-0x0000000000260000-0x0000000000276000-memory.dmp

    Filesize

    88KB

  • memory/1792-21-0x0000000000400000-0x0000000000415A00-memory.dmp

    Filesize

    86KB

  • memory/1792-22-0x0000000000260000-0x0000000000262000-memory.dmp

    Filesize

    8KB