Analysis

  • max time kernel
    35s
  • max time network
    11s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    13-05-2021 12:58

General

  • Target

    c921e602a57a7f00bee04a91057c536923186cff287e5885b5404dd69df1088b.exe

  • Size

    5.7MB

  • MD5

    dd0c228c145084ca7fb7c4c9992db0de

  • SHA1

    fafb80dc4eb5b861efccfa89267c36a7f20f97cb

  • SHA256

    c921e602a57a7f00bee04a91057c536923186cff287e5885b5404dd69df1088b

  • SHA512

    40a459b26ef3c4370f5ac5b6f66d16a4168575859aa27415818ec9d92a4dbe15a17a24b975ccb4dc5aad80457bc0211a66a08237cdf92ae673deac6cc10d4592

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs
  • Executes dropped EXE 8 IoCs
  • Loads dropped DLL 18 IoCs
  • Drops file in System32 directory 27 IoCs
  • Modifies registry class 30 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c921e602a57a7f00bee04a91057c536923186cff287e5885b5404dd69df1088b.exe
    "C:\Users\Admin\AppData\Local\Temp\c921e602a57a7f00bee04a91057c536923186cff287e5885b5404dd69df1088b.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:452
    • C:\Windows\SysWOW64\Femccoka.exe
      C:\Windows\system32\Femccoka.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:1944
      • C:\Windows\SysWOW64\Gafanonb.exe
        C:\Windows\system32\Gafanonb.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in System32 directory
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:1052
        • C:\Windows\SysWOW64\Gppgjkoe.exe
          C:\Windows\system32\Gppgjkoe.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in System32 directory
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:1812
  • C:\Windows\SysWOW64\Hijiipcc.exe
    C:\Windows\system32\Hijiipcc.exe
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1736
    • C:\Windows\SysWOW64\Hhbbolfh.exe
      C:\Windows\system32\Hhbbolfh.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:1216
      • C:\Windows\SysWOW64\Iejldp32.exe
        C:\Windows\system32\Iejldp32.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in System32 directory
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:1500
        • C:\Windows\SysWOW64\Kedknb32.exe
          C:\Windows\system32\Kedknb32.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in System32 directory
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:1440
          • C:\Windows\SysWOW64\Lpgoeo32.exe
            C:\Windows\system32\Lpgoeo32.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Drops file in System32 directory
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:1696
            • C:\Windows\SysWOW64\Mlefjokf.exe
              C:\Windows\system32\Mlefjokf.exe
              6⤵
                PID:468

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\SysWOW64\Femccoka.exe

      MD5

      03c964c4968567ba09c777c8409af21e

      SHA1

      6f5b1a3b64408421273f3219c3d39f18c4427eff

      SHA256

      3f8eb6d1736e3a49a76eaafd8ee6c4572d649b567d198aa7341231e0c21fe18a

      SHA512

      b8a77f723c5b10954d36ac01c7f069ba5402c768879f5edcd60f5e8ef01dfb84dc76c50db87a93f97ce729a3b8639b2de81cfec84d36d536db5d2ad2be1cd3b1

    • C:\Windows\SysWOW64\Femccoka.exe

      MD5

      03c964c4968567ba09c777c8409af21e

      SHA1

      6f5b1a3b64408421273f3219c3d39f18c4427eff

      SHA256

      3f8eb6d1736e3a49a76eaafd8ee6c4572d649b567d198aa7341231e0c21fe18a

      SHA512

      b8a77f723c5b10954d36ac01c7f069ba5402c768879f5edcd60f5e8ef01dfb84dc76c50db87a93f97ce729a3b8639b2de81cfec84d36d536db5d2ad2be1cd3b1

    • C:\Windows\SysWOW64\Gafanonb.exe

      MD5

      1f2a7e81626b5a830cb26f9e33c1e3a6

      SHA1

      ac6a4c4c4b4b1dd62c22500cc942f701a471e449

      SHA256

      1a72d53167f61daa3e454680f08d458705de8556f2d642d6821d5cdd934b660e

      SHA512

      c3892edb382d680ed025ee7d82caeb98313a40dfc8eaa923b5c8867a8ecc6773b84e7230b29434e6f401779ccfe1de02208c6b7b2869d1b85d80faad6e08fba9

    • C:\Windows\SysWOW64\Gafanonb.exe

      MD5

      1f2a7e81626b5a830cb26f9e33c1e3a6

      SHA1

      ac6a4c4c4b4b1dd62c22500cc942f701a471e449

      SHA256

      1a72d53167f61daa3e454680f08d458705de8556f2d642d6821d5cdd934b660e

      SHA512

      c3892edb382d680ed025ee7d82caeb98313a40dfc8eaa923b5c8867a8ecc6773b84e7230b29434e6f401779ccfe1de02208c6b7b2869d1b85d80faad6e08fba9

    • C:\Windows\SysWOW64\Gppgjkoe.exe

      MD5

      37380d28c22360026314c5e0ef41624a

      SHA1

      97b5550eaf5376b8ecab38c4e89cc6f72e1b8ebb

      SHA256

      54e94a5f712b63f428a81f5b4469e398893633e7ceb1b2c0218d306278bb3dac

      SHA512

      b2083d9d5f872c26df1508bed5c990d9bda36fb142ea88c9dc99a9039f3e6472c4342f5fa8d497742e7b99d0494ced286205143442108f0ccdcbe82ad84a9ada

    • C:\Windows\SysWOW64\Gppgjkoe.exe

      MD5

      37380d28c22360026314c5e0ef41624a

      SHA1

      97b5550eaf5376b8ecab38c4e89cc6f72e1b8ebb

      SHA256

      54e94a5f712b63f428a81f5b4469e398893633e7ceb1b2c0218d306278bb3dac

      SHA512

      b2083d9d5f872c26df1508bed5c990d9bda36fb142ea88c9dc99a9039f3e6472c4342f5fa8d497742e7b99d0494ced286205143442108f0ccdcbe82ad84a9ada

    • C:\Windows\SysWOW64\Hhbbolfh.exe

      MD5

      b00ba1579a63311b21349db2faaed1bd

      SHA1

      802bf250eac4fdec1dc2cabf0cb556a028426fd0

      SHA256

      1c8894ba5aa9a9b780de2e9e066c75f07e32d018c801f25321073888e961a9ba

      SHA512

      52a4f21f5eee9b0afd00653ceec2c306a385cbb86b8a622b8d68d5810852b6807667e22c826224146d784bf3c7e970720843a8ff54bbebf26c719081b6bf42d0

    • C:\Windows\SysWOW64\Hhbbolfh.exe

      MD5

      b00ba1579a63311b21349db2faaed1bd

      SHA1

      802bf250eac4fdec1dc2cabf0cb556a028426fd0

      SHA256

      1c8894ba5aa9a9b780de2e9e066c75f07e32d018c801f25321073888e961a9ba

      SHA512

      52a4f21f5eee9b0afd00653ceec2c306a385cbb86b8a622b8d68d5810852b6807667e22c826224146d784bf3c7e970720843a8ff54bbebf26c719081b6bf42d0

    • C:\Windows\SysWOW64\Hijiipcc.exe

      MD5

      5168aa6421490ebb72897347e8fa90b4

      SHA1

      549d8f195c48247b66dd7384a5e8dd6798afe5e8

      SHA256

      df5bea38ed8b675a63f13043b59b9e75942d9386e1a16da5553686cd6e334f94

      SHA512

      51e7fb19175cf71126aa7668875044f2d2fb44cba5b91ca9fd1a6deec2f0c181425889db700df262a76b8e5a1932ba174bbfc49250e2036da02349668305509b

    • C:\Windows\SysWOW64\Hijiipcc.exe

      MD5

      5168aa6421490ebb72897347e8fa90b4

      SHA1

      549d8f195c48247b66dd7384a5e8dd6798afe5e8

      SHA256

      df5bea38ed8b675a63f13043b59b9e75942d9386e1a16da5553686cd6e334f94

      SHA512

      51e7fb19175cf71126aa7668875044f2d2fb44cba5b91ca9fd1a6deec2f0c181425889db700df262a76b8e5a1932ba174bbfc49250e2036da02349668305509b

    • C:\Windows\SysWOW64\Iejldp32.exe

      MD5

      6c8a7bdf95eb215d1bad914bf5e47721

      SHA1

      e369534bab1f0d74f2ab3346f96b0fc10d6a9ff1

      SHA256

      c0432050d62121a4a19c0326a612331d524400ba89d710e94d79e066008ec224

      SHA512

      05ebcf958604d198587c214edebd67d6cf48816cb2b6c1319ee3e12724d1b4eb224ae462f971cf54bfb59965ca455c292ec40b4d228b406748b55000092bbe13

    • C:\Windows\SysWOW64\Iejldp32.exe

      MD5

      6c8a7bdf95eb215d1bad914bf5e47721

      SHA1

      e369534bab1f0d74f2ab3346f96b0fc10d6a9ff1

      SHA256

      c0432050d62121a4a19c0326a612331d524400ba89d710e94d79e066008ec224

      SHA512

      05ebcf958604d198587c214edebd67d6cf48816cb2b6c1319ee3e12724d1b4eb224ae462f971cf54bfb59965ca455c292ec40b4d228b406748b55000092bbe13

    • C:\Windows\SysWOW64\Kedknb32.exe

      MD5

      0fd248f14ee8ef790a9d3b78e3746831

      SHA1

      64c7e052a7cbe77287730ab0bc8bbc999503d32f

      SHA256

      59bb974157823b2042daeb86e7ddc0a3c42a0b39ebd223df2a9f78318e409128

      SHA512

      b025059d6bff3ee420fe0d4e3732a58180bc37ac03d29a4f282d034e1489fa167d5814e1794ae40ab770e9536361d404555a5221cf2a702ded3639c9d81c3734

    • C:\Windows\SysWOW64\Kedknb32.exe

      MD5

      0fd248f14ee8ef790a9d3b78e3746831

      SHA1

      64c7e052a7cbe77287730ab0bc8bbc999503d32f

      SHA256

      59bb974157823b2042daeb86e7ddc0a3c42a0b39ebd223df2a9f78318e409128

      SHA512

      b025059d6bff3ee420fe0d4e3732a58180bc37ac03d29a4f282d034e1489fa167d5814e1794ae40ab770e9536361d404555a5221cf2a702ded3639c9d81c3734

    • C:\Windows\SysWOW64\Lpgoeo32.exe

      MD5

      cf33ace0d61d030cd329dd9334c78eaf

      SHA1

      86ea2bbd29c94795a28c4d47ef92e99a18512260

      SHA256

      847cd626be03f574ebea4d6254439179197131f927a324e7bd3512c3c9f79a12

      SHA512

      a820cb4ff712bc20d7e7a33ffd7d7f9449d27ccd63337d8c03a7ba622078dfc7e1b51ea44d0397e643d97ddb0c50acc42d91eb441f50acbea9039391f8c431f2

    • C:\Windows\SysWOW64\Lpgoeo32.exe

      MD5

      cf33ace0d61d030cd329dd9334c78eaf

      SHA1

      86ea2bbd29c94795a28c4d47ef92e99a18512260

      SHA256

      847cd626be03f574ebea4d6254439179197131f927a324e7bd3512c3c9f79a12

      SHA512

      a820cb4ff712bc20d7e7a33ffd7d7f9449d27ccd63337d8c03a7ba622078dfc7e1b51ea44d0397e643d97ddb0c50acc42d91eb441f50acbea9039391f8c431f2

    • \Windows\SysWOW64\Femccoka.exe

      MD5

      03c964c4968567ba09c777c8409af21e

      SHA1

      6f5b1a3b64408421273f3219c3d39f18c4427eff

      SHA256

      3f8eb6d1736e3a49a76eaafd8ee6c4572d649b567d198aa7341231e0c21fe18a

      SHA512

      b8a77f723c5b10954d36ac01c7f069ba5402c768879f5edcd60f5e8ef01dfb84dc76c50db87a93f97ce729a3b8639b2de81cfec84d36d536db5d2ad2be1cd3b1

    • \Windows\SysWOW64\Femccoka.exe

      MD5

      03c964c4968567ba09c777c8409af21e

      SHA1

      6f5b1a3b64408421273f3219c3d39f18c4427eff

      SHA256

      3f8eb6d1736e3a49a76eaafd8ee6c4572d649b567d198aa7341231e0c21fe18a

      SHA512

      b8a77f723c5b10954d36ac01c7f069ba5402c768879f5edcd60f5e8ef01dfb84dc76c50db87a93f97ce729a3b8639b2de81cfec84d36d536db5d2ad2be1cd3b1

    • \Windows\SysWOW64\Gafanonb.exe

      MD5

      1f2a7e81626b5a830cb26f9e33c1e3a6

      SHA1

      ac6a4c4c4b4b1dd62c22500cc942f701a471e449

      SHA256

      1a72d53167f61daa3e454680f08d458705de8556f2d642d6821d5cdd934b660e

      SHA512

      c3892edb382d680ed025ee7d82caeb98313a40dfc8eaa923b5c8867a8ecc6773b84e7230b29434e6f401779ccfe1de02208c6b7b2869d1b85d80faad6e08fba9

    • \Windows\SysWOW64\Gafanonb.exe

      MD5

      1f2a7e81626b5a830cb26f9e33c1e3a6

      SHA1

      ac6a4c4c4b4b1dd62c22500cc942f701a471e449

      SHA256

      1a72d53167f61daa3e454680f08d458705de8556f2d642d6821d5cdd934b660e

      SHA512

      c3892edb382d680ed025ee7d82caeb98313a40dfc8eaa923b5c8867a8ecc6773b84e7230b29434e6f401779ccfe1de02208c6b7b2869d1b85d80faad6e08fba9

    • \Windows\SysWOW64\Gppgjkoe.exe

      MD5

      37380d28c22360026314c5e0ef41624a

      SHA1

      97b5550eaf5376b8ecab38c4e89cc6f72e1b8ebb

      SHA256

      54e94a5f712b63f428a81f5b4469e398893633e7ceb1b2c0218d306278bb3dac

      SHA512

      b2083d9d5f872c26df1508bed5c990d9bda36fb142ea88c9dc99a9039f3e6472c4342f5fa8d497742e7b99d0494ced286205143442108f0ccdcbe82ad84a9ada

    • \Windows\SysWOW64\Gppgjkoe.exe

      MD5

      37380d28c22360026314c5e0ef41624a

      SHA1

      97b5550eaf5376b8ecab38c4e89cc6f72e1b8ebb

      SHA256

      54e94a5f712b63f428a81f5b4469e398893633e7ceb1b2c0218d306278bb3dac

      SHA512

      b2083d9d5f872c26df1508bed5c990d9bda36fb142ea88c9dc99a9039f3e6472c4342f5fa8d497742e7b99d0494ced286205143442108f0ccdcbe82ad84a9ada

    • \Windows\SysWOW64\Hhbbolfh.exe

      MD5

      b00ba1579a63311b21349db2faaed1bd

      SHA1

      802bf250eac4fdec1dc2cabf0cb556a028426fd0

      SHA256

      1c8894ba5aa9a9b780de2e9e066c75f07e32d018c801f25321073888e961a9ba

      SHA512

      52a4f21f5eee9b0afd00653ceec2c306a385cbb86b8a622b8d68d5810852b6807667e22c826224146d784bf3c7e970720843a8ff54bbebf26c719081b6bf42d0

    • \Windows\SysWOW64\Hhbbolfh.exe

      MD5

      b00ba1579a63311b21349db2faaed1bd

      SHA1

      802bf250eac4fdec1dc2cabf0cb556a028426fd0

      SHA256

      1c8894ba5aa9a9b780de2e9e066c75f07e32d018c801f25321073888e961a9ba

      SHA512

      52a4f21f5eee9b0afd00653ceec2c306a385cbb86b8a622b8d68d5810852b6807667e22c826224146d784bf3c7e970720843a8ff54bbebf26c719081b6bf42d0

    • \Windows\SysWOW64\Hijiipcc.exe

      MD5

      5168aa6421490ebb72897347e8fa90b4

      SHA1

      549d8f195c48247b66dd7384a5e8dd6798afe5e8

      SHA256

      df5bea38ed8b675a63f13043b59b9e75942d9386e1a16da5553686cd6e334f94

      SHA512

      51e7fb19175cf71126aa7668875044f2d2fb44cba5b91ca9fd1a6deec2f0c181425889db700df262a76b8e5a1932ba174bbfc49250e2036da02349668305509b

    • \Windows\SysWOW64\Hijiipcc.exe

      MD5

      5168aa6421490ebb72897347e8fa90b4

      SHA1

      549d8f195c48247b66dd7384a5e8dd6798afe5e8

      SHA256

      df5bea38ed8b675a63f13043b59b9e75942d9386e1a16da5553686cd6e334f94

      SHA512

      51e7fb19175cf71126aa7668875044f2d2fb44cba5b91ca9fd1a6deec2f0c181425889db700df262a76b8e5a1932ba174bbfc49250e2036da02349668305509b

    • \Windows\SysWOW64\Iejldp32.exe

      MD5

      6c8a7bdf95eb215d1bad914bf5e47721

      SHA1

      e369534bab1f0d74f2ab3346f96b0fc10d6a9ff1

      SHA256

      c0432050d62121a4a19c0326a612331d524400ba89d710e94d79e066008ec224

      SHA512

      05ebcf958604d198587c214edebd67d6cf48816cb2b6c1319ee3e12724d1b4eb224ae462f971cf54bfb59965ca455c292ec40b4d228b406748b55000092bbe13

    • \Windows\SysWOW64\Iejldp32.exe

      MD5

      6c8a7bdf95eb215d1bad914bf5e47721

      SHA1

      e369534bab1f0d74f2ab3346f96b0fc10d6a9ff1

      SHA256

      c0432050d62121a4a19c0326a612331d524400ba89d710e94d79e066008ec224

      SHA512

      05ebcf958604d198587c214edebd67d6cf48816cb2b6c1319ee3e12724d1b4eb224ae462f971cf54bfb59965ca455c292ec40b4d228b406748b55000092bbe13

    • \Windows\SysWOW64\Kedknb32.exe

      MD5

      0fd248f14ee8ef790a9d3b78e3746831

      SHA1

      64c7e052a7cbe77287730ab0bc8bbc999503d32f

      SHA256

      59bb974157823b2042daeb86e7ddc0a3c42a0b39ebd223df2a9f78318e409128

      SHA512

      b025059d6bff3ee420fe0d4e3732a58180bc37ac03d29a4f282d034e1489fa167d5814e1794ae40ab770e9536361d404555a5221cf2a702ded3639c9d81c3734

    • \Windows\SysWOW64\Kedknb32.exe

      MD5

      0fd248f14ee8ef790a9d3b78e3746831

      SHA1

      64c7e052a7cbe77287730ab0bc8bbc999503d32f

      SHA256

      59bb974157823b2042daeb86e7ddc0a3c42a0b39ebd223df2a9f78318e409128

      SHA512

      b025059d6bff3ee420fe0d4e3732a58180bc37ac03d29a4f282d034e1489fa167d5814e1794ae40ab770e9536361d404555a5221cf2a702ded3639c9d81c3734

    • \Windows\SysWOW64\Lpgoeo32.exe

      MD5

      cf33ace0d61d030cd329dd9334c78eaf

      SHA1

      86ea2bbd29c94795a28c4d47ef92e99a18512260

      SHA256

      847cd626be03f574ebea4d6254439179197131f927a324e7bd3512c3c9f79a12

      SHA512

      a820cb4ff712bc20d7e7a33ffd7d7f9449d27ccd63337d8c03a7ba622078dfc7e1b51ea44d0397e643d97ddb0c50acc42d91eb441f50acbea9039391f8c431f2

    • \Windows\SysWOW64\Lpgoeo32.exe

      MD5

      cf33ace0d61d030cd329dd9334c78eaf

      SHA1

      86ea2bbd29c94795a28c4d47ef92e99a18512260

      SHA256

      847cd626be03f574ebea4d6254439179197131f927a324e7bd3512c3c9f79a12

      SHA512

      a820cb4ff712bc20d7e7a33ffd7d7f9449d27ccd63337d8c03a7ba622078dfc7e1b51ea44d0397e643d97ddb0c50acc42d91eb441f50acbea9039391f8c431f2

    • \Windows\SysWOW64\Mlefjokf.exe

      MD5

      6241600d4de555a9342c212772683584

      SHA1

      be534aaf58a222704ac436e9e6b996ab64c622d6

      SHA256

      a0234fe12e418fb36887240bb8df84350a6984fb43acf15acab0bcc3999f2a24

      SHA512

      8c1287a4b00f9ebf7ce3712e1028da6f81e76f592c490e4d46e30475ad6eb3c6f54da962f0436f9ab2fb8be416ca5f912f28a69fa1acb74f1e29827b85b36e4f

    • \Windows\SysWOW64\Mlefjokf.exe

      MD5

      6241600d4de555a9342c212772683584

      SHA1

      be534aaf58a222704ac436e9e6b996ab64c622d6

      SHA256

      a0234fe12e418fb36887240bb8df84350a6984fb43acf15acab0bcc3999f2a24

      SHA512

      8c1287a4b00f9ebf7ce3712e1028da6f81e76f592c490e4d46e30475ad6eb3c6f54da962f0436f9ab2fb8be416ca5f912f28a69fa1acb74f1e29827b85b36e4f

    • memory/468-101-0x0000000000000000-mapping.dmp

    • memory/1052-66-0x0000000000000000-mapping.dmp

    • memory/1216-81-0x0000000000000000-mapping.dmp

    • memory/1440-91-0x0000000000000000-mapping.dmp

    • memory/1500-86-0x0000000000000000-mapping.dmp

    • memory/1696-96-0x0000000000000000-mapping.dmp

    • memory/1736-76-0x0000000000000000-mapping.dmp

    • memory/1812-71-0x0000000000000000-mapping.dmp

    • memory/1944-61-0x0000000000000000-mapping.dmp