Analysis

  • max time kernel
    145s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/09/2022, 07:43

General

  • Target

    8faf3d7287399c8a9dd4155deb2269d00422616757a8faf06c46624719668fa8.exe

  • Size

    208KB

  • MD5

    6b8aa9b897a8f1dff59806389162acaf

  • SHA1

    cfe49742bb39806fcd9c972a9d4e2bd6377d5110

  • SHA256

    8faf3d7287399c8a9dd4155deb2269d00422616757a8faf06c46624719668fa8

  • SHA512

    d809905d0141e6701d99360c4fe639abe850505b72e660114a616444fa3956451b66c805d7b7fd60a28bedd04d774ea51c5b1ceaf796edd1a4daaad00bb01abe

  • SSDEEP

    6144:FEaItlJ4MQHUp2PcBz5LUykMYGNqURD2PmDYV1jFc:FEaEcUkWz5Yyk10qUZ2PYak

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
  • ACProtect 1.3x - 1.4x DLL software 2 IoCs

    Detects file using ACProtect software.

  • Blocklisted process makes network request 4 IoCs
  • Drops file in Drivers directory 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Modifies data under HKEY_USERS 1 IoCs
  • Modifies registry class 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8faf3d7287399c8a9dd4155deb2269d00422616757a8faf06c46624719668fa8.exe
    "C:\Users\Admin\AppData\Local\Temp\8faf3d7287399c8a9dd4155deb2269d00422616757a8faf06c46624719668fa8.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:1692
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe "C:\Windows\system32\ogmm.dll",run
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Blocklisted process makes network request
      • Drops file in Drivers directory
      • Loads dropped DLL
      • Modifies registry class
      PID:644
  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s Netman
    1⤵
    • Modifies data under HKEY_USERS
    PID:5084

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\ogmm.dll

    Filesize

    166KB

    MD5

    ae3210f0cce1d015587bc79d550b86e2

    SHA1

    b59766d2d60711e1a8e0bf729d3ad3fcc2f14add

    SHA256

    00ee5a7a24089a76cc08ab18f4e372f2652a8f6c830dfceda70104a320eaae0a

    SHA512

    bf87ee1f5ee32807c248b4072c994f9f5f0daf7f013f9023d2d4a10e30203a2f07d614b45f7d5f18f8d2df99b7fd372ec7f55a53314f559f3368fc4c5b51231f

  • C:\Windows\SysWOW64\ogmm.dll

    Filesize

    166KB

    MD5

    ae3210f0cce1d015587bc79d550b86e2

    SHA1

    b59766d2d60711e1a8e0bf729d3ad3fcc2f14add

    SHA256

    00ee5a7a24089a76cc08ab18f4e372f2652a8f6c830dfceda70104a320eaae0a

    SHA512

    bf87ee1f5ee32807c248b4072c994f9f5f0daf7f013f9023d2d4a10e30203a2f07d614b45f7d5f18f8d2df99b7fd372ec7f55a53314f559f3368fc4c5b51231f

  • memory/644-139-0x0000000010000000-0x0000000010D2F000-memory.dmp

    Filesize

    13.2MB

  • memory/644-140-0x0000000010000000-0x0000000010D2F000-memory.dmp

    Filesize

    13.2MB

  • memory/1692-134-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/5084-137-0x00007FFDD0A80000-0x00007FFDD0A82000-memory.dmp

    Filesize

    8KB