Analysis

  • max time kernel
    149s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    18-10-2024 07:21

General

  • Target

    2130041c7a42ad6d0ee8a55d1ce7c27f3e199bcdafb9e494b3d3a08686e1e4e9.exe

  • Size

    78KB

  • MD5

    87585e2d7c543767a11e862c6a17f687

  • SHA1

    f68f259058034530bbed73867004a7c799611d07

  • SHA256

    2130041c7a42ad6d0ee8a55d1ce7c27f3e199bcdafb9e494b3d3a08686e1e4e9

  • SHA512

    f279a112137e7f0a1050b79e489e91219c77862a16ccdd6894473b3b51025e5dbf0a5b441282c154a05cbeb4a08b905f145f0743bc80c7c92370e52b9ed12cde

  • SSDEEP

    1536:RshfSWHHNvoLqNwDDGw02eQmh0HjWOQjd7:GhfxHNIreQm+HibN

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Modifies system executable filetype association 2 TTPs 5 IoCs
  • Drops file in System32 directory 4 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2130041c7a42ad6d0ee8a55d1ce7c27f3e199bcdafb9e494b3d3a08686e1e4e9.exe
    "C:\Users\Admin\AppData\Local\Temp\2130041c7a42ad6d0ee8a55d1ce7c27f3e199bcdafb9e494b3d3a08686e1e4e9.exe"
    1⤵
    • Loads dropped DLL
    • Modifies system executable filetype association
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2848
    • C:\Windows\system\rundll32.exe
      C:\Windows\system\rundll32.exe
      2⤵
      • Executes dropped EXE
      • Modifies system executable filetype association
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:1568

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\notepad¢¬.exe

    Filesize

    77KB

    MD5

    610fe5ad40f80b0e0c120a8fcf55c5be

    SHA1

    d68c5d87bf1823517dd62d0066ef27f9b6d5b0c0

    SHA256

    20e1bf14f5cf8dcb3b4187535c38bdd293e102bf7fa814b0cbcac27d2739af29

    SHA512

    860ff3b0f374c89d5397b78e4c6daf735cb630b69f07d2c6f91c5be5f69663fb1b122f8616177499d3b7a8251658d4368dc1bff7ce0b2873f23f4d96e5f39e58

  • \Windows\system\rundll32.exe

    Filesize

    78KB

    MD5

    9eae18a1071cd61fea4e0bb1e95c974c

    SHA1

    20ad392eddddfc7f410de3bd7ef9a85747e0c061

    SHA256

    b10b5b4a4abf0e1a1278d37f36c98fabb011257acdc503090abc56682a639f1f

    SHA512

    fe0b979fd86522b37a9a851134ba94e17053395137c66f80de141bb8a877018d764330dd179b940db7e90c1046cc35ea42e6758ffca50855e291ea586ca0c0b3

  • memory/1568-21-0x0000000000400000-0x0000000000415A00-memory.dmp

    Filesize

    86KB

  • memory/2848-0-0x0000000000400000-0x0000000000415A00-memory.dmp

    Filesize

    86KB

  • memory/2848-12-0x0000000000360000-0x0000000000376000-memory.dmp

    Filesize

    88KB

  • memory/2848-19-0x0000000000400000-0x0000000000415A00-memory.dmp

    Filesize

    86KB

  • memory/2848-20-0x0000000000360000-0x0000000000362000-memory.dmp

    Filesize

    8KB