Analysis

  • max time kernel
    36s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2022, 15:43

General

  • Target

    31a5e9cd4a85808ba0f6371668d449adc838368f0e623e2876b8aa43ba148de9.exe

  • Size

    50KB

  • MD5

    192587ab23f6edb423aa5a5824316970

  • SHA1

    4269603372ee6f1de947cfb401d6e9bba9e9811b

  • SHA256

    31a5e9cd4a85808ba0f6371668d449adc838368f0e623e2876b8aa43ba148de9

  • SHA512

    8ced77fa04c90be3939be69eb357ef78cc110111747b0a2ae53fad48459944672d8f74ce68f5803a628672e3122c7416611d2d2ff8d38846df35863e3eb8e653

  • SSDEEP

    768:+i47W3UECAn2au30hUuv3i9xYgpmTATv47h7DBnJUOxWxvm2/1H5d:+vW3U3FUqFmT6vsLJUMuvmsD

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 6 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 10 IoCs
  • Drops file in System32 directory 9 IoCs
  • Program crash 1 IoCs
  • Modifies registry class 12 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\31a5e9cd4a85808ba0f6371668d449adc838368f0e623e2876b8aa43ba148de9.exe
    "C:\Users\Admin\AppData\Local\Temp\31a5e9cd4a85808ba0f6371668d449adc838368f0e623e2876b8aa43ba148de9.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Loads dropped DLL
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:904
    • C:\Windows\SysWOW64\Fnolfl32.exe
      C:\Windows\system32\Fnolfl32.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:1928
      • C:\Windows\SysWOW64\Fgjmdaik.exe
        C:\Windows\system32\Fgjmdaik.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in System32 directory
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:1552
        • C:\Windows\SysWOW64\Fccjoall.exe
          C:\Windows\system32\Fccjoall.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:1400
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1400 -s 140
            5⤵
            • Loads dropped DLL
            • Program crash
            PID:1736

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\Fccjoall.exe

    Filesize

    50KB

    MD5

    99e42536140082c64fddf314152cbd89

    SHA1

    d65bb0a3d5b33184a3f1f46e36ad5d5743d98edb

    SHA256

    a8d85b138371f6a9badaff5b5e733aeafb17beca74962b792a645f9623b542ec

    SHA512

    f9fcb3252c33b6788f6c491adf5ce9db91c30d4c453a97452fe02b193db07c59e9fb31794708d60db0208540193b6291f53f863ea82ecb9ffb6ad73fb4d9d5fe

  • C:\Windows\SysWOW64\Fgjmdaik.exe

    Filesize

    50KB

    MD5

    e9b064953a3376ff3706a9e715d52c0e

    SHA1

    427dfcce23b4088f111c03873de6e0bcc1dddcb4

    SHA256

    7a9f7273c3d9cc2c11fc32b955677508ec9e1d47f1c5de6107494f120dd6269c

    SHA512

    7b2d8b15aaccba811dc86fd965986b436ad5a83fe8352f73333222cce2ef4cc0b676c1540daf1deb41bbec907a3cc75118cd0276c2684b7d1901e4abc22f2306

  • C:\Windows\SysWOW64\Fgjmdaik.exe

    Filesize

    50KB

    MD5

    e9b064953a3376ff3706a9e715d52c0e

    SHA1

    427dfcce23b4088f111c03873de6e0bcc1dddcb4

    SHA256

    7a9f7273c3d9cc2c11fc32b955677508ec9e1d47f1c5de6107494f120dd6269c

    SHA512

    7b2d8b15aaccba811dc86fd965986b436ad5a83fe8352f73333222cce2ef4cc0b676c1540daf1deb41bbec907a3cc75118cd0276c2684b7d1901e4abc22f2306

  • C:\Windows\SysWOW64\Fnolfl32.exe

    Filesize

    50KB

    MD5

    1319ef1790f6af4f63a9add2c6d940c2

    SHA1

    e11751c6cff61d7b73cd00002f7099e3431bfe22

    SHA256

    66c23c0a624843aa6331611246ab5016c3ad13f03c954f6019c9032868dc96b4

    SHA512

    ee1d268cb76037736e3571222f3642d15eb8925d809af8ee876b756eb77a35e4d30cf94dab5825e9777bdac6f93b01a048d1946899fc2bc1d8d55ba57e10b4d6

  • C:\Windows\SysWOW64\Fnolfl32.exe

    Filesize

    50KB

    MD5

    1319ef1790f6af4f63a9add2c6d940c2

    SHA1

    e11751c6cff61d7b73cd00002f7099e3431bfe22

    SHA256

    66c23c0a624843aa6331611246ab5016c3ad13f03c954f6019c9032868dc96b4

    SHA512

    ee1d268cb76037736e3571222f3642d15eb8925d809af8ee876b756eb77a35e4d30cf94dab5825e9777bdac6f93b01a048d1946899fc2bc1d8d55ba57e10b4d6

  • \Windows\SysWOW64\Fccjoall.exe

    Filesize

    50KB

    MD5

    99e42536140082c64fddf314152cbd89

    SHA1

    d65bb0a3d5b33184a3f1f46e36ad5d5743d98edb

    SHA256

    a8d85b138371f6a9badaff5b5e733aeafb17beca74962b792a645f9623b542ec

    SHA512

    f9fcb3252c33b6788f6c491adf5ce9db91c30d4c453a97452fe02b193db07c59e9fb31794708d60db0208540193b6291f53f863ea82ecb9ffb6ad73fb4d9d5fe

  • \Windows\SysWOW64\Fccjoall.exe

    Filesize

    50KB

    MD5

    99e42536140082c64fddf314152cbd89

    SHA1

    d65bb0a3d5b33184a3f1f46e36ad5d5743d98edb

    SHA256

    a8d85b138371f6a9badaff5b5e733aeafb17beca74962b792a645f9623b542ec

    SHA512

    f9fcb3252c33b6788f6c491adf5ce9db91c30d4c453a97452fe02b193db07c59e9fb31794708d60db0208540193b6291f53f863ea82ecb9ffb6ad73fb4d9d5fe

  • \Windows\SysWOW64\Fccjoall.exe

    Filesize

    50KB

    MD5

    99e42536140082c64fddf314152cbd89

    SHA1

    d65bb0a3d5b33184a3f1f46e36ad5d5743d98edb

    SHA256

    a8d85b138371f6a9badaff5b5e733aeafb17beca74962b792a645f9623b542ec

    SHA512

    f9fcb3252c33b6788f6c491adf5ce9db91c30d4c453a97452fe02b193db07c59e9fb31794708d60db0208540193b6291f53f863ea82ecb9ffb6ad73fb4d9d5fe

  • \Windows\SysWOW64\Fccjoall.exe

    Filesize

    50KB

    MD5

    99e42536140082c64fddf314152cbd89

    SHA1

    d65bb0a3d5b33184a3f1f46e36ad5d5743d98edb

    SHA256

    a8d85b138371f6a9badaff5b5e733aeafb17beca74962b792a645f9623b542ec

    SHA512

    f9fcb3252c33b6788f6c491adf5ce9db91c30d4c453a97452fe02b193db07c59e9fb31794708d60db0208540193b6291f53f863ea82ecb9ffb6ad73fb4d9d5fe

  • \Windows\SysWOW64\Fccjoall.exe

    Filesize

    50KB

    MD5

    99e42536140082c64fddf314152cbd89

    SHA1

    d65bb0a3d5b33184a3f1f46e36ad5d5743d98edb

    SHA256

    a8d85b138371f6a9badaff5b5e733aeafb17beca74962b792a645f9623b542ec

    SHA512

    f9fcb3252c33b6788f6c491adf5ce9db91c30d4c453a97452fe02b193db07c59e9fb31794708d60db0208540193b6291f53f863ea82ecb9ffb6ad73fb4d9d5fe

  • \Windows\SysWOW64\Fccjoall.exe

    Filesize

    50KB

    MD5

    99e42536140082c64fddf314152cbd89

    SHA1

    d65bb0a3d5b33184a3f1f46e36ad5d5743d98edb

    SHA256

    a8d85b138371f6a9badaff5b5e733aeafb17beca74962b792a645f9623b542ec

    SHA512

    f9fcb3252c33b6788f6c491adf5ce9db91c30d4c453a97452fe02b193db07c59e9fb31794708d60db0208540193b6291f53f863ea82ecb9ffb6ad73fb4d9d5fe

  • \Windows\SysWOW64\Fgjmdaik.exe

    Filesize

    50KB

    MD5

    e9b064953a3376ff3706a9e715d52c0e

    SHA1

    427dfcce23b4088f111c03873de6e0bcc1dddcb4

    SHA256

    7a9f7273c3d9cc2c11fc32b955677508ec9e1d47f1c5de6107494f120dd6269c

    SHA512

    7b2d8b15aaccba811dc86fd965986b436ad5a83fe8352f73333222cce2ef4cc0b676c1540daf1deb41bbec907a3cc75118cd0276c2684b7d1901e4abc22f2306

  • \Windows\SysWOW64\Fgjmdaik.exe

    Filesize

    50KB

    MD5

    e9b064953a3376ff3706a9e715d52c0e

    SHA1

    427dfcce23b4088f111c03873de6e0bcc1dddcb4

    SHA256

    7a9f7273c3d9cc2c11fc32b955677508ec9e1d47f1c5de6107494f120dd6269c

    SHA512

    7b2d8b15aaccba811dc86fd965986b436ad5a83fe8352f73333222cce2ef4cc0b676c1540daf1deb41bbec907a3cc75118cd0276c2684b7d1901e4abc22f2306

  • \Windows\SysWOW64\Fnolfl32.exe

    Filesize

    50KB

    MD5

    1319ef1790f6af4f63a9add2c6d940c2

    SHA1

    e11751c6cff61d7b73cd00002f7099e3431bfe22

    SHA256

    66c23c0a624843aa6331611246ab5016c3ad13f03c954f6019c9032868dc96b4

    SHA512

    ee1d268cb76037736e3571222f3642d15eb8925d809af8ee876b756eb77a35e4d30cf94dab5825e9777bdac6f93b01a048d1946899fc2bc1d8d55ba57e10b4d6

  • \Windows\SysWOW64\Fnolfl32.exe

    Filesize

    50KB

    MD5

    1319ef1790f6af4f63a9add2c6d940c2

    SHA1

    e11751c6cff61d7b73cd00002f7099e3431bfe22

    SHA256

    66c23c0a624843aa6331611246ab5016c3ad13f03c954f6019c9032868dc96b4

    SHA512

    ee1d268cb76037736e3571222f3642d15eb8925d809af8ee876b756eb77a35e4d30cf94dab5825e9777bdac6f93b01a048d1946899fc2bc1d8d55ba57e10b4d6

  • memory/904-74-0x0000000000220000-0x0000000000251000-memory.dmp

    Filesize

    196KB

  • memory/904-73-0x0000000000400000-0x0000000000431000-memory.dmp

    Filesize

    196KB

  • memory/1400-77-0x0000000000400000-0x0000000000431000-memory.dmp

    Filesize

    196KB

  • memory/1552-76-0x0000000000400000-0x0000000000431000-memory.dmp

    Filesize

    196KB

  • memory/1928-75-0x0000000000400000-0x0000000000431000-memory.dmp

    Filesize

    196KB