Analysis
-
max time kernel
36s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
11/10/2022, 15:43
Static task
static1
Behavioral task
behavioral1
Sample
31a5e9cd4a85808ba0f6371668d449adc838368f0e623e2876b8aa43ba148de9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
31a5e9cd4a85808ba0f6371668d449adc838368f0e623e2876b8aa43ba148de9.exe
Resource
win10v2004-20220812-en
General
-
Target
31a5e9cd4a85808ba0f6371668d449adc838368f0e623e2876b8aa43ba148de9.exe
-
Size
50KB
-
MD5
192587ab23f6edb423aa5a5824316970
-
SHA1
4269603372ee6f1de947cfb401d6e9bba9e9811b
-
SHA256
31a5e9cd4a85808ba0f6371668d449adc838368f0e623e2876b8aa43ba148de9
-
SHA512
8ced77fa04c90be3939be69eb357ef78cc110111747b0a2ae53fad48459944672d8f74ce68f5803a628672e3122c7416611d2d2ff8d38846df35863e3eb8e653
-
SSDEEP
768:+i47W3UECAn2au30hUuv3i9xYgpmTATv47h7DBnJUOxWxvm2/1H5d:+vW3U3FUqFmT6vsLJUMuvmsD
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" 31a5e9cd4a85808ba0f6371668d449adc838368f0e623e2876b8aa43ba148de9.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fnolfl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fnolfl32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fgjmdaik.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fgjmdaik.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 31a5e9cd4a85808ba0f6371668d449adc838368f0e623e2876b8aa43ba148de9.exe -
Executes dropped EXE 3 IoCs
pid Process 1928 Fnolfl32.exe 1552 Fgjmdaik.exe 1400 Fccjoall.exe -
Loads dropped DLL 10 IoCs
pid Process 904 31a5e9cd4a85808ba0f6371668d449adc838368f0e623e2876b8aa43ba148de9.exe 904 31a5e9cd4a85808ba0f6371668d449adc838368f0e623e2876b8aa43ba148de9.exe 1928 Fnolfl32.exe 1928 Fnolfl32.exe 1552 Fgjmdaik.exe 1552 Fgjmdaik.exe 1736 WerFault.exe 1736 WerFault.exe 1736 WerFault.exe 1736 WerFault.exe -
Drops file in System32 directory 9 IoCs
description ioc Process File created C:\Windows\SysWOW64\Deokdgoh.dll Fnolfl32.exe File created C:\Windows\SysWOW64\Kpidob32.dll Fgjmdaik.exe File created C:\Windows\SysWOW64\Fnolfl32.exe 31a5e9cd4a85808ba0f6371668d449adc838368f0e623e2876b8aa43ba148de9.exe File opened for modification C:\Windows\SysWOW64\Fgjmdaik.exe Fnolfl32.exe File created C:\Windows\SysWOW64\Fgjmdaik.exe Fnolfl32.exe File created C:\Windows\SysWOW64\Fccjoall.exe Fgjmdaik.exe File opened for modification C:\Windows\SysWOW64\Fccjoall.exe Fgjmdaik.exe File opened for modification C:\Windows\SysWOW64\Fnolfl32.exe 31a5e9cd4a85808ba0f6371668d449adc838368f0e623e2876b8aa43ba148de9.exe File created C:\Windows\SysWOW64\Opanhk32.dll 31a5e9cd4a85808ba0f6371668d449adc838368f0e623e2876b8aa43ba148de9.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1736 1400 WerFault.exe 29 -
Modifies registry class 12 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node 31a5e9cd4a85808ba0f6371668d449adc838368f0e623e2876b8aa43ba148de9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} 31a5e9cd4a85808ba0f6371668d449adc838368f0e623e2876b8aa43ba148de9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fnolfl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fnolfl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fgjmdaik.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kpidob32.dll" Fgjmdaik.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 31a5e9cd4a85808ba0f6371668d449adc838368f0e623e2876b8aa43ba148de9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Opanhk32.dll" 31a5e9cd4a85808ba0f6371668d449adc838368f0e623e2876b8aa43ba148de9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" 31a5e9cd4a85808ba0f6371668d449adc838368f0e623e2876b8aa43ba148de9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Deokdgoh.dll" Fnolfl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fgjmdaik.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID 31a5e9cd4a85808ba0f6371668d449adc838368f0e623e2876b8aa43ba148de9.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 904 wrote to memory of 1928 904 31a5e9cd4a85808ba0f6371668d449adc838368f0e623e2876b8aa43ba148de9.exe 27 PID 904 wrote to memory of 1928 904 31a5e9cd4a85808ba0f6371668d449adc838368f0e623e2876b8aa43ba148de9.exe 27 PID 904 wrote to memory of 1928 904 31a5e9cd4a85808ba0f6371668d449adc838368f0e623e2876b8aa43ba148de9.exe 27 PID 904 wrote to memory of 1928 904 31a5e9cd4a85808ba0f6371668d449adc838368f0e623e2876b8aa43ba148de9.exe 27 PID 1928 wrote to memory of 1552 1928 Fnolfl32.exe 28 PID 1928 wrote to memory of 1552 1928 Fnolfl32.exe 28 PID 1928 wrote to memory of 1552 1928 Fnolfl32.exe 28 PID 1928 wrote to memory of 1552 1928 Fnolfl32.exe 28 PID 1552 wrote to memory of 1400 1552 Fgjmdaik.exe 29 PID 1552 wrote to memory of 1400 1552 Fgjmdaik.exe 29 PID 1552 wrote to memory of 1400 1552 Fgjmdaik.exe 29 PID 1552 wrote to memory of 1400 1552 Fgjmdaik.exe 29 PID 1400 wrote to memory of 1736 1400 Fccjoall.exe 30 PID 1400 wrote to memory of 1736 1400 Fccjoall.exe 30 PID 1400 wrote to memory of 1736 1400 Fccjoall.exe 30 PID 1400 wrote to memory of 1736 1400 Fccjoall.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\31a5e9cd4a85808ba0f6371668d449adc838368f0e623e2876b8aa43ba148de9.exe"C:\Users\Admin\AppData\Local\Temp\31a5e9cd4a85808ba0f6371668d449adc838368f0e623e2876b8aa43ba148de9.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:904 -
C:\Windows\SysWOW64\Fnolfl32.exeC:\Windows\system32\Fnolfl32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Windows\SysWOW64\Fgjmdaik.exeC:\Windows\system32\Fgjmdaik.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Windows\SysWOW64\Fccjoall.exeC:\Windows\system32\Fccjoall.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1400 -s 1405⤵
- Loads dropped DLL
- Program crash
PID:1736
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
50KB
MD599e42536140082c64fddf314152cbd89
SHA1d65bb0a3d5b33184a3f1f46e36ad5d5743d98edb
SHA256a8d85b138371f6a9badaff5b5e733aeafb17beca74962b792a645f9623b542ec
SHA512f9fcb3252c33b6788f6c491adf5ce9db91c30d4c453a97452fe02b193db07c59e9fb31794708d60db0208540193b6291f53f863ea82ecb9ffb6ad73fb4d9d5fe
-
Filesize
50KB
MD5e9b064953a3376ff3706a9e715d52c0e
SHA1427dfcce23b4088f111c03873de6e0bcc1dddcb4
SHA2567a9f7273c3d9cc2c11fc32b955677508ec9e1d47f1c5de6107494f120dd6269c
SHA5127b2d8b15aaccba811dc86fd965986b436ad5a83fe8352f73333222cce2ef4cc0b676c1540daf1deb41bbec907a3cc75118cd0276c2684b7d1901e4abc22f2306
-
Filesize
50KB
MD5e9b064953a3376ff3706a9e715d52c0e
SHA1427dfcce23b4088f111c03873de6e0bcc1dddcb4
SHA2567a9f7273c3d9cc2c11fc32b955677508ec9e1d47f1c5de6107494f120dd6269c
SHA5127b2d8b15aaccba811dc86fd965986b436ad5a83fe8352f73333222cce2ef4cc0b676c1540daf1deb41bbec907a3cc75118cd0276c2684b7d1901e4abc22f2306
-
Filesize
50KB
MD51319ef1790f6af4f63a9add2c6d940c2
SHA1e11751c6cff61d7b73cd00002f7099e3431bfe22
SHA25666c23c0a624843aa6331611246ab5016c3ad13f03c954f6019c9032868dc96b4
SHA512ee1d268cb76037736e3571222f3642d15eb8925d809af8ee876b756eb77a35e4d30cf94dab5825e9777bdac6f93b01a048d1946899fc2bc1d8d55ba57e10b4d6
-
Filesize
50KB
MD51319ef1790f6af4f63a9add2c6d940c2
SHA1e11751c6cff61d7b73cd00002f7099e3431bfe22
SHA25666c23c0a624843aa6331611246ab5016c3ad13f03c954f6019c9032868dc96b4
SHA512ee1d268cb76037736e3571222f3642d15eb8925d809af8ee876b756eb77a35e4d30cf94dab5825e9777bdac6f93b01a048d1946899fc2bc1d8d55ba57e10b4d6
-
Filesize
50KB
MD599e42536140082c64fddf314152cbd89
SHA1d65bb0a3d5b33184a3f1f46e36ad5d5743d98edb
SHA256a8d85b138371f6a9badaff5b5e733aeafb17beca74962b792a645f9623b542ec
SHA512f9fcb3252c33b6788f6c491adf5ce9db91c30d4c453a97452fe02b193db07c59e9fb31794708d60db0208540193b6291f53f863ea82ecb9ffb6ad73fb4d9d5fe
-
Filesize
50KB
MD599e42536140082c64fddf314152cbd89
SHA1d65bb0a3d5b33184a3f1f46e36ad5d5743d98edb
SHA256a8d85b138371f6a9badaff5b5e733aeafb17beca74962b792a645f9623b542ec
SHA512f9fcb3252c33b6788f6c491adf5ce9db91c30d4c453a97452fe02b193db07c59e9fb31794708d60db0208540193b6291f53f863ea82ecb9ffb6ad73fb4d9d5fe
-
Filesize
50KB
MD599e42536140082c64fddf314152cbd89
SHA1d65bb0a3d5b33184a3f1f46e36ad5d5743d98edb
SHA256a8d85b138371f6a9badaff5b5e733aeafb17beca74962b792a645f9623b542ec
SHA512f9fcb3252c33b6788f6c491adf5ce9db91c30d4c453a97452fe02b193db07c59e9fb31794708d60db0208540193b6291f53f863ea82ecb9ffb6ad73fb4d9d5fe
-
Filesize
50KB
MD599e42536140082c64fddf314152cbd89
SHA1d65bb0a3d5b33184a3f1f46e36ad5d5743d98edb
SHA256a8d85b138371f6a9badaff5b5e733aeafb17beca74962b792a645f9623b542ec
SHA512f9fcb3252c33b6788f6c491adf5ce9db91c30d4c453a97452fe02b193db07c59e9fb31794708d60db0208540193b6291f53f863ea82ecb9ffb6ad73fb4d9d5fe
-
Filesize
50KB
MD599e42536140082c64fddf314152cbd89
SHA1d65bb0a3d5b33184a3f1f46e36ad5d5743d98edb
SHA256a8d85b138371f6a9badaff5b5e733aeafb17beca74962b792a645f9623b542ec
SHA512f9fcb3252c33b6788f6c491adf5ce9db91c30d4c453a97452fe02b193db07c59e9fb31794708d60db0208540193b6291f53f863ea82ecb9ffb6ad73fb4d9d5fe
-
Filesize
50KB
MD599e42536140082c64fddf314152cbd89
SHA1d65bb0a3d5b33184a3f1f46e36ad5d5743d98edb
SHA256a8d85b138371f6a9badaff5b5e733aeafb17beca74962b792a645f9623b542ec
SHA512f9fcb3252c33b6788f6c491adf5ce9db91c30d4c453a97452fe02b193db07c59e9fb31794708d60db0208540193b6291f53f863ea82ecb9ffb6ad73fb4d9d5fe
-
Filesize
50KB
MD5e9b064953a3376ff3706a9e715d52c0e
SHA1427dfcce23b4088f111c03873de6e0bcc1dddcb4
SHA2567a9f7273c3d9cc2c11fc32b955677508ec9e1d47f1c5de6107494f120dd6269c
SHA5127b2d8b15aaccba811dc86fd965986b436ad5a83fe8352f73333222cce2ef4cc0b676c1540daf1deb41bbec907a3cc75118cd0276c2684b7d1901e4abc22f2306
-
Filesize
50KB
MD5e9b064953a3376ff3706a9e715d52c0e
SHA1427dfcce23b4088f111c03873de6e0bcc1dddcb4
SHA2567a9f7273c3d9cc2c11fc32b955677508ec9e1d47f1c5de6107494f120dd6269c
SHA5127b2d8b15aaccba811dc86fd965986b436ad5a83fe8352f73333222cce2ef4cc0b676c1540daf1deb41bbec907a3cc75118cd0276c2684b7d1901e4abc22f2306
-
Filesize
50KB
MD51319ef1790f6af4f63a9add2c6d940c2
SHA1e11751c6cff61d7b73cd00002f7099e3431bfe22
SHA25666c23c0a624843aa6331611246ab5016c3ad13f03c954f6019c9032868dc96b4
SHA512ee1d268cb76037736e3571222f3642d15eb8925d809af8ee876b756eb77a35e4d30cf94dab5825e9777bdac6f93b01a048d1946899fc2bc1d8d55ba57e10b4d6
-
Filesize
50KB
MD51319ef1790f6af4f63a9add2c6d940c2
SHA1e11751c6cff61d7b73cd00002f7099e3431bfe22
SHA25666c23c0a624843aa6331611246ab5016c3ad13f03c954f6019c9032868dc96b4
SHA512ee1d268cb76037736e3571222f3642d15eb8925d809af8ee876b756eb77a35e4d30cf94dab5825e9777bdac6f93b01a048d1946899fc2bc1d8d55ba57e10b4d6