Analysis

  • max time kernel
    55s
  • max time network
    47s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    26-11-2022 09:03

General

  • Target

    a28c5a5b1f1f15f9c6c12f108165d647593fd81df81a69840c41ecddd79614f6.exe

  • Size

    51KB

  • MD5

    fdbc22599f42ed87d841e2b3f31e7ea0

  • SHA1

    7138a958b0be85cf284b01c6b7e84ab97e48930d

  • SHA256

    a28c5a5b1f1f15f9c6c12f108165d647593fd81df81a69840c41ecddd79614f6

  • SHA512

    453e11c5e0f47dfd94cf90b9717b2b1b4a8e7992136b5454c5e767bf72a0b88837d6b4ea5b57960d4926bea9e94f2bbb9cc4b378b9b6b88e459c8cb2fb1375b3

  • SSDEEP

    1536:VIOoM2g6adwmDxYYErVyxhFDZYjV0J6f4uOzBc:p2g6ahDCrVyFDijVMM4u8

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 12 IoCs
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 16 IoCs
  • Drops file in System32 directory 18 IoCs
  • Program crash 1 IoCs
  • Modifies registry class 21 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a28c5a5b1f1f15f9c6c12f108165d647593fd81df81a69840c41ecddd79614f6.exe
    "C:\Users\Admin\AppData\Local\Temp\a28c5a5b1f1f15f9c6c12f108165d647593fd81df81a69840c41ecddd79614f6.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Loads dropped DLL
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2032
    • C:\Windows\SysWOW64\Joglonpi.exe
      C:\Windows\system32\Joglonpi.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:1944
      • C:\Windows\SysWOW64\Jhbnmc32.exe
        C:\Windows\system32\Jhbnmc32.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in System32 directory
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2004
        • C:\Windows\SysWOW64\Jpmbbebb.exe
          C:\Windows\system32\Jpmbbebb.exe
          4⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in System32 directory
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:628
          • C:\Windows\SysWOW64\Kppogepo.exe
            C:\Windows\system32\Kppogepo.exe
            5⤵
            • Adds autorun key to be loaded by Explorer.exe on startup
            • Executes dropped EXE
            • Loads dropped DLL
            • Drops file in System32 directory
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:1532
            • C:\Windows\SysWOW64\Kpblme32.exe
              C:\Windows\system32\Kpblme32.exe
              6⤵
              • Adds autorun key to be loaded by Explorer.exe on startup
              • Executes dropped EXE
              • Loads dropped DLL
              • Drops file in System32 directory
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:992
              • C:\Windows\SysWOW64\Kceadpik.exe
                C:\Windows\system32\Kceadpik.exe
                7⤵
                • Executes dropped EXE
                • Suspicious use of WriteProcessMemory
                PID:268
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 268 -s 140
                  8⤵
                  • Loads dropped DLL
                  • Program crash
                  PID:540

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\Jhbnmc32.exe
    Filesize

    51KB

    MD5

    e4ee25440adc364c6c34586ebd8da805

    SHA1

    0e0ed83af7d536569dcbc2d289a36c665504fc96

    SHA256

    41600880534e6f42aa6de6ef258bc4e88cadf2e260c64e4134bda593b266da22

    SHA512

    947f350fac4edbff4c483ead1e392297e1d9a0252bb86b5842fcbb646e000f61f661bae005e9b6f310e9a2178b54d01a6956702ffbd9c3d00d82182f74270578

  • C:\Windows\SysWOW64\Jhbnmc32.exe
    Filesize

    51KB

    MD5

    e4ee25440adc364c6c34586ebd8da805

    SHA1

    0e0ed83af7d536569dcbc2d289a36c665504fc96

    SHA256

    41600880534e6f42aa6de6ef258bc4e88cadf2e260c64e4134bda593b266da22

    SHA512

    947f350fac4edbff4c483ead1e392297e1d9a0252bb86b5842fcbb646e000f61f661bae005e9b6f310e9a2178b54d01a6956702ffbd9c3d00d82182f74270578

  • C:\Windows\SysWOW64\Joglonpi.exe
    Filesize

    51KB

    MD5

    aac9f354e3fa02a615ae890fe1dc5234

    SHA1

    51bef820457b4f1a5d284f6032a312035e24d28a

    SHA256

    269560f57f0c767e320a62f49a3e447a1612767c9d01348bb4e18f9c958b98ae

    SHA512

    b573f361a21d92d183834235580c565ed793000e25d2bc285743ba92cacc82b583ec11751ba5603bff2dba6a4cc4828e87c9601c41955d8379c1da9706d2bb16

  • C:\Windows\SysWOW64\Joglonpi.exe
    Filesize

    51KB

    MD5

    aac9f354e3fa02a615ae890fe1dc5234

    SHA1

    51bef820457b4f1a5d284f6032a312035e24d28a

    SHA256

    269560f57f0c767e320a62f49a3e447a1612767c9d01348bb4e18f9c958b98ae

    SHA512

    b573f361a21d92d183834235580c565ed793000e25d2bc285743ba92cacc82b583ec11751ba5603bff2dba6a4cc4828e87c9601c41955d8379c1da9706d2bb16

  • C:\Windows\SysWOW64\Jpmbbebb.exe
    Filesize

    51KB

    MD5

    1e37444bd68c0dec44a40f21eef0a2d0

    SHA1

    22285d0fdb628e08e1a87d521122586a94131e4e

    SHA256

    137813a19b999a5b7e1ce8b8aba6dc380e5a8be0959e79364a3ee3884bfc65dc

    SHA512

    5ea51f714c8c4e8b32d4cc22d6069af68b2711f84e155ce777492df6504f1847196470f8d2ec72ff7cecfeee92463d2b8063f4f4bc366fbe52f09c0d162f774e

  • C:\Windows\SysWOW64\Jpmbbebb.exe
    Filesize

    51KB

    MD5

    1e37444bd68c0dec44a40f21eef0a2d0

    SHA1

    22285d0fdb628e08e1a87d521122586a94131e4e

    SHA256

    137813a19b999a5b7e1ce8b8aba6dc380e5a8be0959e79364a3ee3884bfc65dc

    SHA512

    5ea51f714c8c4e8b32d4cc22d6069af68b2711f84e155ce777492df6504f1847196470f8d2ec72ff7cecfeee92463d2b8063f4f4bc366fbe52f09c0d162f774e

  • C:\Windows\SysWOW64\Kceadpik.exe
    Filesize

    51KB

    MD5

    a6dba561764d1b30906805b9f6097099

    SHA1

    f60d1fe79ad9887cecc8be65f2309a011b925377

    SHA256

    c908fafffac7fb321f62186ff091e683d4af07a1cfafe63d1ecf02bf1d223854

    SHA512

    d6d75f29a8b9f272f7beab6e7943dfdb3300bb499374ee55ab5f36c8d037d910d556088f6fcbe6bd5fc37cf3c9102503ff41be98c3e0df06e4f1285454b71e26

  • C:\Windows\SysWOW64\Kpblme32.exe
    Filesize

    51KB

    MD5

    2447480ad0f3d8b8e71fa91a456d052a

    SHA1

    51d939e453b2939488d78af37c3504df091c94fa

    SHA256

    368b7a34847726a00fc8582d74d849d5aa0d5f5a2b98d30a4fca8bf129fb35f2

    SHA512

    eb7d1800320d04f14df9d100f1db0b781cafca179dce24529ff144b411c636ae4d6eeafe93538ccc486752bd4f6653e19b06404df4ccc67cbe0e2fa2b90aa76d

  • C:\Windows\SysWOW64\Kpblme32.exe
    Filesize

    51KB

    MD5

    2447480ad0f3d8b8e71fa91a456d052a

    SHA1

    51d939e453b2939488d78af37c3504df091c94fa

    SHA256

    368b7a34847726a00fc8582d74d849d5aa0d5f5a2b98d30a4fca8bf129fb35f2

    SHA512

    eb7d1800320d04f14df9d100f1db0b781cafca179dce24529ff144b411c636ae4d6eeafe93538ccc486752bd4f6653e19b06404df4ccc67cbe0e2fa2b90aa76d

  • C:\Windows\SysWOW64\Kppogepo.exe
    Filesize

    51KB

    MD5

    c66d442378ba275e3397c7bbdd52c909

    SHA1

    e2fd727601d36cdc66b4c63f8389e7d7273773b1

    SHA256

    0bd031b78f62810952071533278c1b4cc087aa144c61c42e70bcf004b4e52ce3

    SHA512

    b10ea1c29c82630cd708592a68ee0ad65cc0b8982d2839a16a8598553465849577b9a4249f9a761be3d52f65b785cc30a278ab7c9b0491f8199086180205a26a

  • C:\Windows\SysWOW64\Kppogepo.exe
    Filesize

    51KB

    MD5

    c66d442378ba275e3397c7bbdd52c909

    SHA1

    e2fd727601d36cdc66b4c63f8389e7d7273773b1

    SHA256

    0bd031b78f62810952071533278c1b4cc087aa144c61c42e70bcf004b4e52ce3

    SHA512

    b10ea1c29c82630cd708592a68ee0ad65cc0b8982d2839a16a8598553465849577b9a4249f9a761be3d52f65b785cc30a278ab7c9b0491f8199086180205a26a

  • \Windows\SysWOW64\Jhbnmc32.exe
    Filesize

    51KB

    MD5

    e4ee25440adc364c6c34586ebd8da805

    SHA1

    0e0ed83af7d536569dcbc2d289a36c665504fc96

    SHA256

    41600880534e6f42aa6de6ef258bc4e88cadf2e260c64e4134bda593b266da22

    SHA512

    947f350fac4edbff4c483ead1e392297e1d9a0252bb86b5842fcbb646e000f61f661bae005e9b6f310e9a2178b54d01a6956702ffbd9c3d00d82182f74270578

  • \Windows\SysWOW64\Jhbnmc32.exe
    Filesize

    51KB

    MD5

    e4ee25440adc364c6c34586ebd8da805

    SHA1

    0e0ed83af7d536569dcbc2d289a36c665504fc96

    SHA256

    41600880534e6f42aa6de6ef258bc4e88cadf2e260c64e4134bda593b266da22

    SHA512

    947f350fac4edbff4c483ead1e392297e1d9a0252bb86b5842fcbb646e000f61f661bae005e9b6f310e9a2178b54d01a6956702ffbd9c3d00d82182f74270578

  • \Windows\SysWOW64\Joglonpi.exe
    Filesize

    51KB

    MD5

    aac9f354e3fa02a615ae890fe1dc5234

    SHA1

    51bef820457b4f1a5d284f6032a312035e24d28a

    SHA256

    269560f57f0c767e320a62f49a3e447a1612767c9d01348bb4e18f9c958b98ae

    SHA512

    b573f361a21d92d183834235580c565ed793000e25d2bc285743ba92cacc82b583ec11751ba5603bff2dba6a4cc4828e87c9601c41955d8379c1da9706d2bb16

  • \Windows\SysWOW64\Joglonpi.exe
    Filesize

    51KB

    MD5

    aac9f354e3fa02a615ae890fe1dc5234

    SHA1

    51bef820457b4f1a5d284f6032a312035e24d28a

    SHA256

    269560f57f0c767e320a62f49a3e447a1612767c9d01348bb4e18f9c958b98ae

    SHA512

    b573f361a21d92d183834235580c565ed793000e25d2bc285743ba92cacc82b583ec11751ba5603bff2dba6a4cc4828e87c9601c41955d8379c1da9706d2bb16

  • \Windows\SysWOW64\Jpmbbebb.exe
    Filesize

    51KB

    MD5

    1e37444bd68c0dec44a40f21eef0a2d0

    SHA1

    22285d0fdb628e08e1a87d521122586a94131e4e

    SHA256

    137813a19b999a5b7e1ce8b8aba6dc380e5a8be0959e79364a3ee3884bfc65dc

    SHA512

    5ea51f714c8c4e8b32d4cc22d6069af68b2711f84e155ce777492df6504f1847196470f8d2ec72ff7cecfeee92463d2b8063f4f4bc366fbe52f09c0d162f774e

  • \Windows\SysWOW64\Jpmbbebb.exe
    Filesize

    51KB

    MD5

    1e37444bd68c0dec44a40f21eef0a2d0

    SHA1

    22285d0fdb628e08e1a87d521122586a94131e4e

    SHA256

    137813a19b999a5b7e1ce8b8aba6dc380e5a8be0959e79364a3ee3884bfc65dc

    SHA512

    5ea51f714c8c4e8b32d4cc22d6069af68b2711f84e155ce777492df6504f1847196470f8d2ec72ff7cecfeee92463d2b8063f4f4bc366fbe52f09c0d162f774e

  • \Windows\SysWOW64\Kceadpik.exe
    Filesize

    51KB

    MD5

    a6dba561764d1b30906805b9f6097099

    SHA1

    f60d1fe79ad9887cecc8be65f2309a011b925377

    SHA256

    c908fafffac7fb321f62186ff091e683d4af07a1cfafe63d1ecf02bf1d223854

    SHA512

    d6d75f29a8b9f272f7beab6e7943dfdb3300bb499374ee55ab5f36c8d037d910d556088f6fcbe6bd5fc37cf3c9102503ff41be98c3e0df06e4f1285454b71e26

  • \Windows\SysWOW64\Kceadpik.exe
    Filesize

    51KB

    MD5

    a6dba561764d1b30906805b9f6097099

    SHA1

    f60d1fe79ad9887cecc8be65f2309a011b925377

    SHA256

    c908fafffac7fb321f62186ff091e683d4af07a1cfafe63d1ecf02bf1d223854

    SHA512

    d6d75f29a8b9f272f7beab6e7943dfdb3300bb499374ee55ab5f36c8d037d910d556088f6fcbe6bd5fc37cf3c9102503ff41be98c3e0df06e4f1285454b71e26

  • \Windows\SysWOW64\Kceadpik.exe
    Filesize

    51KB

    MD5

    a6dba561764d1b30906805b9f6097099

    SHA1

    f60d1fe79ad9887cecc8be65f2309a011b925377

    SHA256

    c908fafffac7fb321f62186ff091e683d4af07a1cfafe63d1ecf02bf1d223854

    SHA512

    d6d75f29a8b9f272f7beab6e7943dfdb3300bb499374ee55ab5f36c8d037d910d556088f6fcbe6bd5fc37cf3c9102503ff41be98c3e0df06e4f1285454b71e26

  • \Windows\SysWOW64\Kceadpik.exe
    Filesize

    51KB

    MD5

    a6dba561764d1b30906805b9f6097099

    SHA1

    f60d1fe79ad9887cecc8be65f2309a011b925377

    SHA256

    c908fafffac7fb321f62186ff091e683d4af07a1cfafe63d1ecf02bf1d223854

    SHA512

    d6d75f29a8b9f272f7beab6e7943dfdb3300bb499374ee55ab5f36c8d037d910d556088f6fcbe6bd5fc37cf3c9102503ff41be98c3e0df06e4f1285454b71e26

  • \Windows\SysWOW64\Kceadpik.exe
    Filesize

    51KB

    MD5

    a6dba561764d1b30906805b9f6097099

    SHA1

    f60d1fe79ad9887cecc8be65f2309a011b925377

    SHA256

    c908fafffac7fb321f62186ff091e683d4af07a1cfafe63d1ecf02bf1d223854

    SHA512

    d6d75f29a8b9f272f7beab6e7943dfdb3300bb499374ee55ab5f36c8d037d910d556088f6fcbe6bd5fc37cf3c9102503ff41be98c3e0df06e4f1285454b71e26

  • \Windows\SysWOW64\Kceadpik.exe
    Filesize

    51KB

    MD5

    a6dba561764d1b30906805b9f6097099

    SHA1

    f60d1fe79ad9887cecc8be65f2309a011b925377

    SHA256

    c908fafffac7fb321f62186ff091e683d4af07a1cfafe63d1ecf02bf1d223854

    SHA512

    d6d75f29a8b9f272f7beab6e7943dfdb3300bb499374ee55ab5f36c8d037d910d556088f6fcbe6bd5fc37cf3c9102503ff41be98c3e0df06e4f1285454b71e26

  • \Windows\SysWOW64\Kpblme32.exe
    Filesize

    51KB

    MD5

    2447480ad0f3d8b8e71fa91a456d052a

    SHA1

    51d939e453b2939488d78af37c3504df091c94fa

    SHA256

    368b7a34847726a00fc8582d74d849d5aa0d5f5a2b98d30a4fca8bf129fb35f2

    SHA512

    eb7d1800320d04f14df9d100f1db0b781cafca179dce24529ff144b411c636ae4d6eeafe93538ccc486752bd4f6653e19b06404df4ccc67cbe0e2fa2b90aa76d

  • \Windows\SysWOW64\Kpblme32.exe
    Filesize

    51KB

    MD5

    2447480ad0f3d8b8e71fa91a456d052a

    SHA1

    51d939e453b2939488d78af37c3504df091c94fa

    SHA256

    368b7a34847726a00fc8582d74d849d5aa0d5f5a2b98d30a4fca8bf129fb35f2

    SHA512

    eb7d1800320d04f14df9d100f1db0b781cafca179dce24529ff144b411c636ae4d6eeafe93538ccc486752bd4f6653e19b06404df4ccc67cbe0e2fa2b90aa76d

  • \Windows\SysWOW64\Kppogepo.exe
    Filesize

    51KB

    MD5

    c66d442378ba275e3397c7bbdd52c909

    SHA1

    e2fd727601d36cdc66b4c63f8389e7d7273773b1

    SHA256

    0bd031b78f62810952071533278c1b4cc087aa144c61c42e70bcf004b4e52ce3

    SHA512

    b10ea1c29c82630cd708592a68ee0ad65cc0b8982d2839a16a8598553465849577b9a4249f9a761be3d52f65b785cc30a278ab7c9b0491f8199086180205a26a

  • \Windows\SysWOW64\Kppogepo.exe
    Filesize

    51KB

    MD5

    c66d442378ba275e3397c7bbdd52c909

    SHA1

    e2fd727601d36cdc66b4c63f8389e7d7273773b1

    SHA256

    0bd031b78f62810952071533278c1b4cc087aa144c61c42e70bcf004b4e52ce3

    SHA512

    b10ea1c29c82630cd708592a68ee0ad65cc0b8982d2839a16a8598553465849577b9a4249f9a761be3d52f65b785cc30a278ab7c9b0491f8199086180205a26a

  • memory/268-95-0x0000000000400000-0x0000000000432000-memory.dmp
    Filesize

    200KB

  • memory/268-88-0x0000000000000000-mapping.dmp
  • memory/540-90-0x0000000000000000-mapping.dmp
  • memory/628-66-0x0000000000000000-mapping.dmp
  • memory/628-83-0x0000000000400000-0x0000000000432000-memory.dmp
    Filesize

    200KB

  • memory/992-76-0x0000000000000000-mapping.dmp
  • memory/992-85-0x0000000000400000-0x0000000000432000-memory.dmp
    Filesize

    200KB

  • memory/992-94-0x0000000000250000-0x0000000000282000-memory.dmp
    Filesize

    200KB

  • memory/1532-84-0x0000000000400000-0x0000000000432000-memory.dmp
    Filesize

    200KB

  • memory/1532-71-0x0000000000000000-mapping.dmp
  • memory/1944-81-0x0000000000400000-0x0000000000432000-memory.dmp
    Filesize

    200KB

  • memory/1944-56-0x0000000000000000-mapping.dmp
  • memory/2004-82-0x0000000000400000-0x0000000000432000-memory.dmp
    Filesize

    200KB

  • memory/2004-61-0x0000000000000000-mapping.dmp
  • memory/2032-80-0x0000000000220000-0x0000000000252000-memory.dmp
    Filesize

    200KB

  • memory/2032-79-0x0000000000400000-0x0000000000432000-memory.dmp
    Filesize

    200KB