Analysis

  • max time kernel
    170s
  • max time network
    193s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/09/2023, 11:43

General

  • Target

    5753f681ff8b566751ec681bbbfd1635_JC.exe

  • Size

    407KB

  • MD5

    5753f681ff8b566751ec681bbbfd1635

  • SHA1

    53dbaf188108b4376237b29330a749c6c1e5738d

  • SHA256

    ce28f8f52ed839e12e0027a0d55d05c91d68ca6584d8d2f1b5a884757e55dc21

  • SHA512

    7cc75e555b7b4b13f576a6f511d688991d6c1324737783f61b091c5ccaaaa9b6d49b9359184d333b4d0c7ca975f70519a0c3aff8406cfac0595971930106461c

  • SSDEEP

    12288:ez8bJO/awrSmfyiPFg8prNdw+C7797TnPtLU8deJUP//zk9FGB:Y8bJO/awrSmfyiPFg8prNdw+C7797Tn3

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 16 IoCs
  • Executes dropped EXE 8 IoCs
  • Drops file in System32 directory 24 IoCs
  • Program crash 1 IoCs
  • Modifies registry class 27 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5753f681ff8b566751ec681bbbfd1635_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\5753f681ff8b566751ec681bbbfd1635_JC.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3780
    • C:\Windows\SysWOW64\Fdmaoahm.exe
      C:\Windows\system32\Fdmaoahm.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:4736
      • C:\Windows\SysWOW64\Fnffhgon.exe
        C:\Windows\system32\Fnffhgon.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Drops file in System32 directory
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:3576
        • C:\Windows\SysWOW64\Fcbnpnme.exe
          C:\Windows\system32\Fcbnpnme.exe
          4⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Drops file in System32 directory
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:1980
          • C:\Windows\SysWOW64\Fqfojblo.exe
            C:\Windows\system32\Fqfojblo.exe
            5⤵
            • Adds autorun key to be loaded by Explorer.exe on startup
            • Executes dropped EXE
            • Drops file in System32 directory
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:1700
            • C:\Windows\SysWOW64\Fnjocf32.exe
              C:\Windows\system32\Fnjocf32.exe
              6⤵
              • Adds autorun key to be loaded by Explorer.exe on startup
              • Executes dropped EXE
              • Drops file in System32 directory
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:4340
              • C:\Windows\SysWOW64\Gjcmngnj.exe
                C:\Windows\system32\Gjcmngnj.exe
                7⤵
                • Adds autorun key to be loaded by Explorer.exe on startup
                • Executes dropped EXE
                • Drops file in System32 directory
                • Modifies registry class
                • Suspicious use of WriteProcessMemory
                PID:5016
                • C:\Windows\SysWOW64\Gclafmej.exe
                  C:\Windows\system32\Gclafmej.exe
                  8⤵
                  • Adds autorun key to be loaded by Explorer.exe on startup
                  • Executes dropped EXE
                  • Drops file in System32 directory
                  • Modifies registry class
                  • Suspicious use of WriteProcessMemory
                  PID:60
                  • C:\Windows\SysWOW64\Gbmadd32.exe
                    C:\Windows\system32\Gbmadd32.exe
                    9⤵
                    • Executes dropped EXE
                    PID:1240
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 1240 -s 412
                      10⤵
                      • Program crash
                      PID:3336
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1240 -ip 1240
    1⤵
      PID:4840

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\SysWOW64\Fcbnpnme.exe

      Filesize

      407KB

      MD5

      e170d3edc93762e1dd8a17cca7ff6524

      SHA1

      d3e7fddd2a9ddba860f34985a9acb28f16c6f0e3

      SHA256

      48dad0447c5f246fc273dcef3a37ceca8808c6161c9a00fc327c31bbaf288598

      SHA512

      d2c7e9dcb54fed360b24d8b5be05e2d6863e21b4be2aa0b1160603633249bd548045f6a4f8a93c37ffdcae055b7b82ae246e9e411fb2a064aae7ed7d6c587b81

    • C:\Windows\SysWOW64\Fcbnpnme.exe

      Filesize

      407KB

      MD5

      e170d3edc93762e1dd8a17cca7ff6524

      SHA1

      d3e7fddd2a9ddba860f34985a9acb28f16c6f0e3

      SHA256

      48dad0447c5f246fc273dcef3a37ceca8808c6161c9a00fc327c31bbaf288598

      SHA512

      d2c7e9dcb54fed360b24d8b5be05e2d6863e21b4be2aa0b1160603633249bd548045f6a4f8a93c37ffdcae055b7b82ae246e9e411fb2a064aae7ed7d6c587b81

    • C:\Windows\SysWOW64\Fdmaoahm.exe

      Filesize

      407KB

      MD5

      b4256ae52d70605660c57771c73b3522

      SHA1

      6001aa73680a188ca096e585ed7f10c4947f3960

      SHA256

      a9bec712c384fefecabb56e93a52a48a1e7de8afdeb6f0f0ca2c7a384def9e23

      SHA512

      a67cba497909ef89e2a1d723eabe5b8a592c9d4b24e8b12e13e09f93d89b448a56822019c690dd8b1b85f8e0027eb3ee993e76b09570da2e5571b17b4eb1a01d

    • C:\Windows\SysWOW64\Fdmaoahm.exe

      Filesize

      407KB

      MD5

      b4256ae52d70605660c57771c73b3522

      SHA1

      6001aa73680a188ca096e585ed7f10c4947f3960

      SHA256

      a9bec712c384fefecabb56e93a52a48a1e7de8afdeb6f0f0ca2c7a384def9e23

      SHA512

      a67cba497909ef89e2a1d723eabe5b8a592c9d4b24e8b12e13e09f93d89b448a56822019c690dd8b1b85f8e0027eb3ee993e76b09570da2e5571b17b4eb1a01d

    • C:\Windows\SysWOW64\Fnffhgon.exe

      Filesize

      407KB

      MD5

      9042a4e5003b55abecd07cab006b26d4

      SHA1

      14a11fdf9a9ff29a4e769bdf96583f3746460380

      SHA256

      e5441d14a7c3d9dd36373ef8a4619d15fc4b5902ba587446b2d472d15b066d06

      SHA512

      e761b638cac10d34f51a25b61620e76a158e4a751757ccb0387c096ef25d93a70e1016b309248e58a070283abe01bdbae223c4639a5a64dd3e891e1da05525c2

    • C:\Windows\SysWOW64\Fnffhgon.exe

      Filesize

      407KB

      MD5

      9042a4e5003b55abecd07cab006b26d4

      SHA1

      14a11fdf9a9ff29a4e769bdf96583f3746460380

      SHA256

      e5441d14a7c3d9dd36373ef8a4619d15fc4b5902ba587446b2d472d15b066d06

      SHA512

      e761b638cac10d34f51a25b61620e76a158e4a751757ccb0387c096ef25d93a70e1016b309248e58a070283abe01bdbae223c4639a5a64dd3e891e1da05525c2

    • C:\Windows\SysWOW64\Fnjocf32.exe

      Filesize

      407KB

      MD5

      e8b35d1ad25fe6e4ef1f7fee49ddf5d7

      SHA1

      1e44eaf710efffe52c7507f6942acf322ba73924

      SHA256

      7ee03373a631028b71a4296428d9dc4f12a4da39987da35653001b17c9162cf3

      SHA512

      b0dc42ad43ccb3ab6f9572a11a5822278fb29a4f501143e7f508e191f2faefced015cf224844c8d6eeb2530cd397a35b944ab469fac1721b2c303d9ab2ae92ef

    • C:\Windows\SysWOW64\Fnjocf32.exe

      Filesize

      407KB

      MD5

      e8b35d1ad25fe6e4ef1f7fee49ddf5d7

      SHA1

      1e44eaf710efffe52c7507f6942acf322ba73924

      SHA256

      7ee03373a631028b71a4296428d9dc4f12a4da39987da35653001b17c9162cf3

      SHA512

      b0dc42ad43ccb3ab6f9572a11a5822278fb29a4f501143e7f508e191f2faefced015cf224844c8d6eeb2530cd397a35b944ab469fac1721b2c303d9ab2ae92ef

    • C:\Windows\SysWOW64\Fqfojblo.exe

      Filesize

      407KB

      MD5

      4e45e15dc12b0fdd7dbc4dd130ec2c67

      SHA1

      8dc0cce28e4440d41ba2e0dabca04a16240b856d

      SHA256

      1765ccb60b9cfd3dcb30987fa6f28ca0c769835705e4a87086b2da222f76a873

      SHA512

      b34e099f1d83b783e78d1dec51b40e36f9159d182012c5b656e1a9d2722b267b80f8081b1f42fdaec4c877f0f39fce3b164690d44201340e2dc3131f42f7d238

    • C:\Windows\SysWOW64\Fqfojblo.exe

      Filesize

      407KB

      MD5

      4e45e15dc12b0fdd7dbc4dd130ec2c67

      SHA1

      8dc0cce28e4440d41ba2e0dabca04a16240b856d

      SHA256

      1765ccb60b9cfd3dcb30987fa6f28ca0c769835705e4a87086b2da222f76a873

      SHA512

      b34e099f1d83b783e78d1dec51b40e36f9159d182012c5b656e1a9d2722b267b80f8081b1f42fdaec4c877f0f39fce3b164690d44201340e2dc3131f42f7d238

    • C:\Windows\SysWOW64\Gbmadd32.exe

      Filesize

      407KB

      MD5

      abfcb4863c2ee0d197f92baf87c66abf

      SHA1

      1bcb5ff809b1c62cbafc81d1dfbbf3b3dd90f883

      SHA256

      6273a43a9e82f444173c78614c921e088a0e3ea9972d0965cd0ae7e8075f0ce3

      SHA512

      1f5ab3c1e049cf8bd9a3e5571ac98947076938ab9bf71b1e95bb9e7965abf1f1623ef57ced9ee7c79ed564326ca89f49ddb8fe619b3dd54a9fd19be1e2c7424a

    • C:\Windows\SysWOW64\Gbmadd32.exe

      Filesize

      407KB

      MD5

      abfcb4863c2ee0d197f92baf87c66abf

      SHA1

      1bcb5ff809b1c62cbafc81d1dfbbf3b3dd90f883

      SHA256

      6273a43a9e82f444173c78614c921e088a0e3ea9972d0965cd0ae7e8075f0ce3

      SHA512

      1f5ab3c1e049cf8bd9a3e5571ac98947076938ab9bf71b1e95bb9e7965abf1f1623ef57ced9ee7c79ed564326ca89f49ddb8fe619b3dd54a9fd19be1e2c7424a

    • C:\Windows\SysWOW64\Gclafmej.exe

      Filesize

      407KB

      MD5

      58bcc0900fc3e3fd8bfc7bebda01dd8a

      SHA1

      1bbaa22f39f5aea46045ab7731e2821b0c53d5f8

      SHA256

      b0b30d1ef8214d2e4d3f8991a4202feb07ea4e8f4a731aa1bf122795b3bad0a3

      SHA512

      e1421062eea3f5e47f8133d50ea94f999efe6502fd6d504c2e7fd8495d2b00f4e1905a31003accdcd377ee7b5501ee50174e68df5581672f569d7ea1c235c21f

    • C:\Windows\SysWOW64\Gclafmej.exe

      Filesize

      407KB

      MD5

      58bcc0900fc3e3fd8bfc7bebda01dd8a

      SHA1

      1bbaa22f39f5aea46045ab7731e2821b0c53d5f8

      SHA256

      b0b30d1ef8214d2e4d3f8991a4202feb07ea4e8f4a731aa1bf122795b3bad0a3

      SHA512

      e1421062eea3f5e47f8133d50ea94f999efe6502fd6d504c2e7fd8495d2b00f4e1905a31003accdcd377ee7b5501ee50174e68df5581672f569d7ea1c235c21f

    • C:\Windows\SysWOW64\Gjcmngnj.exe

      Filesize

      407KB

      MD5

      f997074dbebaf1f20ab858a2439938fb

      SHA1

      66155986a6d5cdd748ad77330f6f08967382f0d5

      SHA256

      32a7276248b9a3b9ac901501aae8ab6cb4c44de6be19910254872d5d7e31850d

      SHA512

      6d4892bc76bc9761a4af43badb978d446e65dca78a9e5aad0c9782e1d82a1cb03de92976377af6bc8bca89315d8365ae4a480d774f1a335f33417160611d7189

    • C:\Windows\SysWOW64\Gjcmngnj.exe

      Filesize

      407KB

      MD5

      f997074dbebaf1f20ab858a2439938fb

      SHA1

      66155986a6d5cdd748ad77330f6f08967382f0d5

      SHA256

      32a7276248b9a3b9ac901501aae8ab6cb4c44de6be19910254872d5d7e31850d

      SHA512

      6d4892bc76bc9761a4af43badb978d446e65dca78a9e5aad0c9782e1d82a1cb03de92976377af6bc8bca89315d8365ae4a480d774f1a335f33417160611d7189

    • C:\Windows\SysWOW64\Lhlgjo32.dll

      Filesize

      7KB

      MD5

      22d121a452609754789913ab9287cd60

      SHA1

      ce56c9f8e9cca7bd6910eaf2121f507205806f17

      SHA256

      5e4ed3952106e3912d94b28f3e2750125c33a02499e12c4fce048318f5716d76

      SHA512

      a16296d8dd37cb65af25098f38431b38a06f0e758324a5546967ba8a1441c1ace3e9362a909979d6056f007e7862990a5b30bd6e63d61a6eb492a744e475b406

    • memory/60-57-0x0000000000400000-0x0000000000446000-memory.dmp

      Filesize

      280KB

    • memory/60-71-0x0000000000400000-0x0000000000446000-memory.dmp

      Filesize

      280KB

    • memory/1240-65-0x0000000000400000-0x0000000000446000-memory.dmp

      Filesize

      280KB

    • memory/1240-72-0x0000000000400000-0x0000000000446000-memory.dmp

      Filesize

      280KB

    • memory/1700-32-0x0000000000400000-0x0000000000446000-memory.dmp

      Filesize

      280KB

    • memory/1700-69-0x0000000000400000-0x0000000000446000-memory.dmp

      Filesize

      280KB

    • memory/1980-68-0x0000000000400000-0x0000000000446000-memory.dmp

      Filesize

      280KB

    • memory/1980-24-0x0000000000400000-0x0000000000446000-memory.dmp

      Filesize

      280KB

    • memory/3576-16-0x0000000000400000-0x0000000000446000-memory.dmp

      Filesize

      280KB

    • memory/3576-67-0x0000000000400000-0x0000000000446000-memory.dmp

      Filesize

      280KB

    • memory/3780-0-0x0000000000400000-0x0000000000446000-memory.dmp

      Filesize

      280KB

    • memory/3780-48-0x0000000000400000-0x0000000000446000-memory.dmp

      Filesize

      280KB

    • memory/4340-39-0x0000000000400000-0x0000000000446000-memory.dmp

      Filesize

      280KB

    • memory/4340-70-0x0000000000400000-0x0000000000446000-memory.dmp

      Filesize

      280KB

    • memory/4736-66-0x0000000000400000-0x0000000000446000-memory.dmp

      Filesize

      280KB

    • memory/4736-8-0x0000000000400000-0x0000000000446000-memory.dmp

      Filesize

      280KB

    • memory/5016-54-0x0000000000400000-0x0000000000446000-memory.dmp

      Filesize

      280KB