Analysis

  • max time kernel
    185s
  • max time network
    189s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-11-2022 09:34

General

  • Target

    b461fd7bef412965913c89672a15ae8e1cec3ecfe52d7f3f074156a3a23f2464.exe

  • Size

    56KB

  • MD5

    dc0b1b232b2c594cc5d41fb362875281

  • SHA1

    89e5c7ca66415d79c153684fd76cb3b2f721c2bb

  • SHA256

    b461fd7bef412965913c89672a15ae8e1cec3ecfe52d7f3f074156a3a23f2464

  • SHA512

    52d50d9791d829463f4e7c910565c78b4d00c8491234b1b6b988238c38bdbc3304cc63d2ec30aefd1dc167d11e28791f9e3ebb2102da28004b9baa951559e975

  • SSDEEP

    1536:hjGGBFId/9zA8lcYMsBLn7qTCzZ2bi1lovlPp:hJFIfiYrBrutbiYvlh

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 16 IoCs
  • Executes dropped EXE 8 IoCs
  • Drops file in System32 directory 24 IoCs
  • Program crash 1 IoCs
  • Modifies registry class 27 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b461fd7bef412965913c89672a15ae8e1cec3ecfe52d7f3f074156a3a23f2464.exe
    "C:\Users\Admin\AppData\Local\Temp\b461fd7bef412965913c89672a15ae8e1cec3ecfe52d7f3f074156a3a23f2464.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4988
    • C:\Windows\SysWOW64\Lglofdej.exe
      C:\Windows\system32\Lglofdej.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:5080
      • C:\Windows\SysWOW64\Lpdcpi32.exe
        C:\Windows\system32\Lpdcpi32.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Drops file in System32 directory
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:4960
        • C:\Windows\SysWOW64\Loecma32.exe
          C:\Windows\system32\Loecma32.exe
          4⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Drops file in System32 directory
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:1284
          • C:\Windows\SysWOW64\Ldbleh32.exe
            C:\Windows\system32\Ldbleh32.exe
            5⤵
            • Adds autorun key to be loaded by Explorer.exe on startup
            • Executes dropped EXE
            • Drops file in System32 directory
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:4840
            • C:\Windows\SysWOW64\Lohpcq32.exe
              C:\Windows\system32\Lohpcq32.exe
              6⤵
              • Adds autorun key to be loaded by Explorer.exe on startup
              • Executes dropped EXE
              • Drops file in System32 directory
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:4492
              • C:\Windows\SysWOW64\Lkoaha32.exe
                C:\Windows\system32\Lkoaha32.exe
                7⤵
                • Adds autorun key to be loaded by Explorer.exe on startup
                • Executes dropped EXE
                • Drops file in System32 directory
                • Modifies registry class
                • Suspicious use of WriteProcessMemory
                PID:4624
                • C:\Windows\SysWOW64\Mhbaaf32.exe
                  C:\Windows\system32\Mhbaaf32.exe
                  8⤵
                  • Adds autorun key to be loaded by Explorer.exe on startup
                  • Executes dropped EXE
                  • Drops file in System32 directory
                  • Modifies registry class
                  • Suspicious use of WriteProcessMemory
                  PID:2616
                  • C:\Windows\SysWOW64\Mbkfjkme.exe
                    C:\Windows\system32\Mbkfjkme.exe
                    9⤵
                    • Executes dropped EXE
                    PID:540
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 540 -s 400
                      10⤵
                      • Program crash
                      PID:176
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 540 -ip 540
    1⤵
      PID:1048

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\SysWOW64\Ldbleh32.exe
      Filesize

      56KB

      MD5

      c9c3d05386700dd30e2052479e07dce5

      SHA1

      286a78a739f6b01ce53fb401b8d8c7c7aecddc71

      SHA256

      963dd589a858009057727f5140b0f3ded5fb98bc37b820dcd9e1fa5d48ae11ba

      SHA512

      99ae1d4209254356adc179a4bf7080662b6120de2ab3b74a0d883ddb20ef3aa98b00b50a2a97485280cee63bac057b1d8d684eda240961925f3a206b13570c3d

    • C:\Windows\SysWOW64\Ldbleh32.exe
      Filesize

      56KB

      MD5

      c9c3d05386700dd30e2052479e07dce5

      SHA1

      286a78a739f6b01ce53fb401b8d8c7c7aecddc71

      SHA256

      963dd589a858009057727f5140b0f3ded5fb98bc37b820dcd9e1fa5d48ae11ba

      SHA512

      99ae1d4209254356adc179a4bf7080662b6120de2ab3b74a0d883ddb20ef3aa98b00b50a2a97485280cee63bac057b1d8d684eda240961925f3a206b13570c3d

    • C:\Windows\SysWOW64\Lglofdej.exe
      Filesize

      56KB

      MD5

      29778d8a9f4954433c53e02d15868a1c

      SHA1

      08e4d315c2640d3b10258905155724c0e92bf300

      SHA256

      83f726a246026844a63b857d7b420b88ca6bd3719d15b6314ee46fa23f98da16

      SHA512

      d4e47196862413ae0cdb922a655fe4d8e1f05de4adfa788f5b89132a0762cf4e60fc662b03a0c3529dcfd6995ef1b78e6ac6b9c892efd3212ec47530d1d48647

    • C:\Windows\SysWOW64\Lglofdej.exe
      Filesize

      56KB

      MD5

      29778d8a9f4954433c53e02d15868a1c

      SHA1

      08e4d315c2640d3b10258905155724c0e92bf300

      SHA256

      83f726a246026844a63b857d7b420b88ca6bd3719d15b6314ee46fa23f98da16

      SHA512

      d4e47196862413ae0cdb922a655fe4d8e1f05de4adfa788f5b89132a0762cf4e60fc662b03a0c3529dcfd6995ef1b78e6ac6b9c892efd3212ec47530d1d48647

    • C:\Windows\SysWOW64\Lkoaha32.exe
      Filesize

      56KB

      MD5

      850871c07be9b375733ab9def0abcd28

      SHA1

      78a5c09f501d8d56d0188d0e86b91cffc798c6b8

      SHA256

      912280f00aae9c85b62ae9fc73f9344ce1908a279c7cf9a79bdc40dc0d00c2a7

      SHA512

      e9f9a931ec3eca4f240267795764de6d036bdb3f22d0893c7e1d794ddd0703a0e62b6947c34600d5ff91d022a6b3f881e4d1fc4e39996036ec48ff2f9fd5fe9d

    • C:\Windows\SysWOW64\Lkoaha32.exe
      Filesize

      56KB

      MD5

      850871c07be9b375733ab9def0abcd28

      SHA1

      78a5c09f501d8d56d0188d0e86b91cffc798c6b8

      SHA256

      912280f00aae9c85b62ae9fc73f9344ce1908a279c7cf9a79bdc40dc0d00c2a7

      SHA512

      e9f9a931ec3eca4f240267795764de6d036bdb3f22d0893c7e1d794ddd0703a0e62b6947c34600d5ff91d022a6b3f881e4d1fc4e39996036ec48ff2f9fd5fe9d

    • C:\Windows\SysWOW64\Loecma32.exe
      Filesize

      56KB

      MD5

      ae569e711a260948f7aa81155882b1c4

      SHA1

      ebc96550e9af7e927d4a896f6de3723f9028776e

      SHA256

      2ca0a5c7de056b25791ccbeb2a8f7a3ee92b0bae7557c1349441b42d47f1f725

      SHA512

      1a75efd5ee13ea711abeb4ffd98343445487263707d3dd1c670c56ba24b80c8e47dee9820c673f5c07fe6e3a21297865ce0adeee6235e2cdf505b50fd6f3d9bc

    • C:\Windows\SysWOW64\Loecma32.exe
      Filesize

      56KB

      MD5

      ae569e711a260948f7aa81155882b1c4

      SHA1

      ebc96550e9af7e927d4a896f6de3723f9028776e

      SHA256

      2ca0a5c7de056b25791ccbeb2a8f7a3ee92b0bae7557c1349441b42d47f1f725

      SHA512

      1a75efd5ee13ea711abeb4ffd98343445487263707d3dd1c670c56ba24b80c8e47dee9820c673f5c07fe6e3a21297865ce0adeee6235e2cdf505b50fd6f3d9bc

    • C:\Windows\SysWOW64\Lohpcq32.exe
      Filesize

      56KB

      MD5

      65697251ba5af34711d87749bcbc4796

      SHA1

      25be248b2a0149bdf5d4ff7fe09fb2fe86eac60b

      SHA256

      cdb49a935a24c5e29c8abb723cbedd06e287f7fb219ff2231035e87991a6e544

      SHA512

      0ff8123ad318a66e4179e8842a71543afc7f03c69e14943cba6180a421c3d4cbfc3a538d1122caeffc9bdf1882a8e61d6916584b6d4532f73671da1e9cd11566

    • C:\Windows\SysWOW64\Lohpcq32.exe
      Filesize

      56KB

      MD5

      65697251ba5af34711d87749bcbc4796

      SHA1

      25be248b2a0149bdf5d4ff7fe09fb2fe86eac60b

      SHA256

      cdb49a935a24c5e29c8abb723cbedd06e287f7fb219ff2231035e87991a6e544

      SHA512

      0ff8123ad318a66e4179e8842a71543afc7f03c69e14943cba6180a421c3d4cbfc3a538d1122caeffc9bdf1882a8e61d6916584b6d4532f73671da1e9cd11566

    • C:\Windows\SysWOW64\Lpdcpi32.exe
      Filesize

      56KB

      MD5

      b41ad80c6fe7607bb80d1314fc34d2af

      SHA1

      de097668d3cbb2ff031cbc4a0462e4ebdec4d7bf

      SHA256

      b5467df71f1fead5577a970614110df61a836aa32358e47eb37dfc4e069f9871

      SHA512

      ceb66b13d1815f66f57fc6161c2284f05cb2388749d93a114623c7862da05a96077399a970063045ae558c88beab967d99b41f08ba66f6f28e031f3f41b11b7a

    • C:\Windows\SysWOW64\Lpdcpi32.exe
      Filesize

      56KB

      MD5

      b41ad80c6fe7607bb80d1314fc34d2af

      SHA1

      de097668d3cbb2ff031cbc4a0462e4ebdec4d7bf

      SHA256

      b5467df71f1fead5577a970614110df61a836aa32358e47eb37dfc4e069f9871

      SHA512

      ceb66b13d1815f66f57fc6161c2284f05cb2388749d93a114623c7862da05a96077399a970063045ae558c88beab967d99b41f08ba66f6f28e031f3f41b11b7a

    • C:\Windows\SysWOW64\Mbkfjkme.exe
      Filesize

      56KB

      MD5

      12f50c34c0fd937ac5aeed67efbb9559

      SHA1

      46aa68cb7b85afc7fbf9296c9d22d641bc5a2df7

      SHA256

      08550f15e9d9904097854de7a91cef13c66e1e69eb18192d65e4a9a085b34217

      SHA512

      7a48e6f95cda43ec3e1191ce57f2e9bf950d7d9853e3b143df6c9e7669b94b36ab7073b78cf68491c57cf36c4af35d9a26637643ba5fe31f81edc3c9f8c5af24

    • C:\Windows\SysWOW64\Mbkfjkme.exe
      Filesize

      56KB

      MD5

      12f50c34c0fd937ac5aeed67efbb9559

      SHA1

      46aa68cb7b85afc7fbf9296c9d22d641bc5a2df7

      SHA256

      08550f15e9d9904097854de7a91cef13c66e1e69eb18192d65e4a9a085b34217

      SHA512

      7a48e6f95cda43ec3e1191ce57f2e9bf950d7d9853e3b143df6c9e7669b94b36ab7073b78cf68491c57cf36c4af35d9a26637643ba5fe31f81edc3c9f8c5af24

    • C:\Windows\SysWOW64\Mhbaaf32.exe
      Filesize

      56KB

      MD5

      869d42b688de57f5ca60c01c7afae9d1

      SHA1

      16eeea1bbfe7a0ba878ab1c47d41d6b525cd10e3

      SHA256

      5d1826a36de629b49bd2cb9c6cf22aeae81513af3d74d39b2e7c4fcdebccc54e

      SHA512

      ac157a18cc511fd1cb78048d2fcca03c727e81ea9d9a713692e47ccf42ab07032c6170899cc2a37b0a732a9ea0f387554231ab09f6e17e80ff0137d9f5a418fe

    • C:\Windows\SysWOW64\Mhbaaf32.exe
      Filesize

      56KB

      MD5

      869d42b688de57f5ca60c01c7afae9d1

      SHA1

      16eeea1bbfe7a0ba878ab1c47d41d6b525cd10e3

      SHA256

      5d1826a36de629b49bd2cb9c6cf22aeae81513af3d74d39b2e7c4fcdebccc54e

      SHA512

      ac157a18cc511fd1cb78048d2fcca03c727e81ea9d9a713692e47ccf42ab07032c6170899cc2a37b0a732a9ea0f387554231ab09f6e17e80ff0137d9f5a418fe

    • memory/540-164-0x0000000000400000-0x0000000000433000-memory.dmp
      Filesize

      204KB

    • memory/540-159-0x0000000000000000-mapping.dmp
    • memory/1284-154-0x0000000000400000-0x0000000000433000-memory.dmp
      Filesize

      204KB

    • memory/1284-138-0x0000000000000000-mapping.dmp
    • memory/2616-163-0x0000000000400000-0x0000000000433000-memory.dmp
      Filesize

      204KB

    • memory/2616-152-0x0000000000000000-mapping.dmp
    • memory/4492-144-0x0000000000000000-mapping.dmp
    • memory/4492-158-0x0000000000400000-0x0000000000433000-memory.dmp
      Filesize

      204KB

    • memory/4624-162-0x0000000000400000-0x0000000000433000-memory.dmp
      Filesize

      204KB

    • memory/4624-147-0x0000000000000000-mapping.dmp
    • memory/4840-157-0x0000000000400000-0x0000000000433000-memory.dmp
      Filesize

      204KB

    • memory/4840-141-0x0000000000000000-mapping.dmp
    • memory/4960-153-0x0000000000400000-0x0000000000433000-memory.dmp
      Filesize

      204KB

    • memory/4960-135-0x0000000000000000-mapping.dmp
    • memory/4988-148-0x0000000000400000-0x0000000000433000-memory.dmp
      Filesize

      204KB

    • memory/5080-149-0x0000000000400000-0x0000000000433000-memory.dmp
      Filesize

      204KB

    • memory/5080-132-0x0000000000000000-mapping.dmp