Analysis

  • max time kernel
    159s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/10/2023, 15:25

General

  • Target

    c0cd4c64072c2f9d9b25e18328eafffc_JC.exe

  • Size

    305KB

  • MD5

    c0cd4c64072c2f9d9b25e18328eafffc

  • SHA1

    b39f7d4a07ff3f81a86b11097eb087815ca39c03

  • SHA256

    fe14f58efc862e805c557bfbf9ce8a94fb0690f093769a4a27619424d00e643a

  • SHA512

    eb5df35e5f7e2779f9584f974d4701ff6db8c87c9275bd16735a873dc2b0e60e769734e8eb0994fccfa86d08ac215ebf6e7d8d152e2efb7e148df1518f21e324

  • SSDEEP

    6144:GRj309obsNxunXe8yhrtMsQBvli+RQFdq:GVKvAO8qRMsrOQF

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 14 IoCs
  • Executes dropped EXE 7 IoCs
  • Drops file in System32 directory 21 IoCs
  • Program crash 1 IoCs
  • Modifies registry class 24 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c0cd4c64072c2f9d9b25e18328eafffc_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\c0cd4c64072c2f9d9b25e18328eafffc_JC.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1184
    • C:\Windows\SysWOW64\Cigkdmel.exe
      C:\Windows\system32\Cigkdmel.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:4328
      • C:\Windows\SysWOW64\Dnljkk32.exe
        C:\Windows\system32\Dnljkk32.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Drops file in System32 directory
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:1912
        • C:\Windows\SysWOW64\Dkedonpo.exe
          C:\Windows\system32\Dkedonpo.exe
          4⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Drops file in System32 directory
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:4488
          • C:\Windows\SysWOW64\Ejjaqk32.exe
            C:\Windows\system32\Ejjaqk32.exe
            5⤵
            • Adds autorun key to be loaded by Explorer.exe on startup
            • Executes dropped EXE
            • Drops file in System32 directory
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:3584
            • C:\Windows\SysWOW64\Edfknb32.exe
              C:\Windows\system32\Edfknb32.exe
              6⤵
              • Adds autorun key to be loaded by Explorer.exe on startup
              • Executes dropped EXE
              • Drops file in System32 directory
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:2396
              • C:\Windows\SysWOW64\Fglnkm32.exe
                C:\Windows\system32\Fglnkm32.exe
                7⤵
                • Adds autorun key to be loaded by Explorer.exe on startup
                • Executes dropped EXE
                • Drops file in System32 directory
                • Modifies registry class
                • Suspicious use of WriteProcessMemory
                PID:1056
                • C:\Windows\SysWOW64\Gbmadd32.exe
                  C:\Windows\system32\Gbmadd32.exe
                  8⤵
                  • Executes dropped EXE
                  PID:3004
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 3004 -s 232
                    9⤵
                    • Program crash
                    PID:4180
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3004 -ip 3004
    1⤵
      PID:1224

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Windows\SysWOW64\Aehojk32.dll

            Filesize

            7KB

            MD5

            8972b0324941ca572054590524dc635b

            SHA1

            698e75b22c4820448acf9f45e8d9a9ab24a69858

            SHA256

            791515b70936d725789775dbf25cf1af29af2f06b5bc848b433ced2703f0d6ab

            SHA512

            729bc678027ac1cfe6d9dd5744708e37372f627544793430d34a226adc726c3d202e0e87cf7594969f1eb360e203ee5ddbdadb8f10e024f4a53349a2d15ced80

          • C:\Windows\SysWOW64\Cigkdmel.exe

            Filesize

            305KB

            MD5

            b4b7f3d9d2595c3cb6501af1c743c45a

            SHA1

            2439fc9bd56400221b5696c7d2230581fedc614d

            SHA256

            cec1a1589a71ac218021ea813efa13d9b9df09412e2e58e82c5eb3b5b397ceb0

            SHA512

            04b8d7d2480673109b1ff9e7784d53c473ca75b77cc9b65e34576cd093465f3585d7a2f96d7001af11947f90036837be790054e5b5aaad122f6c41eea67f1022

          • C:\Windows\SysWOW64\Cigkdmel.exe

            Filesize

            305KB

            MD5

            b4b7f3d9d2595c3cb6501af1c743c45a

            SHA1

            2439fc9bd56400221b5696c7d2230581fedc614d

            SHA256

            cec1a1589a71ac218021ea813efa13d9b9df09412e2e58e82c5eb3b5b397ceb0

            SHA512

            04b8d7d2480673109b1ff9e7784d53c473ca75b77cc9b65e34576cd093465f3585d7a2f96d7001af11947f90036837be790054e5b5aaad122f6c41eea67f1022

          • C:\Windows\SysWOW64\Dkedonpo.exe

            Filesize

            305KB

            MD5

            200ca821351c75858d21c0188f53b1f8

            SHA1

            482798c60a760c7a9cf4bdac0796deb8cef49a4e

            SHA256

            ec9259799adddec1968fd906abd232eb1516f44430d6f34f53db9bbaffb2e395

            SHA512

            e0a3d97b8e1fb28e0bacdfa27db85d41c608f48a1f54b0bfa9f41dd96bab4c135e07f4aed1404596e32c43314a36654da04aff93b53dbdd8073e0abf2e20c1e6

          • C:\Windows\SysWOW64\Dkedonpo.exe

            Filesize

            305KB

            MD5

            a1c7616785592c9d4919c2f1d21a18b6

            SHA1

            3275a1236c015276acd63191f05d580ae1097fe0

            SHA256

            6606f2cf47b1691ff6fe2544a1d8977a78ac23dbc40e49631d47943b0796c528

            SHA512

            087e428f4ec403228ffbb644923849047a9f0e9127d59e3fe0fe62200b881845cdfd6b988f823fdc4ad03b961ae162c0748f4ea3e58a1129d261ea9e9386f63d

          • C:\Windows\SysWOW64\Dkedonpo.exe

            Filesize

            305KB

            MD5

            a1c7616785592c9d4919c2f1d21a18b6

            SHA1

            3275a1236c015276acd63191f05d580ae1097fe0

            SHA256

            6606f2cf47b1691ff6fe2544a1d8977a78ac23dbc40e49631d47943b0796c528

            SHA512

            087e428f4ec403228ffbb644923849047a9f0e9127d59e3fe0fe62200b881845cdfd6b988f823fdc4ad03b961ae162c0748f4ea3e58a1129d261ea9e9386f63d

          • C:\Windows\SysWOW64\Dnljkk32.exe

            Filesize

            305KB

            MD5

            91da286931968b545410b7e08f1e6f77

            SHA1

            061fc464e229a4a5b9356ce5995681f22e6812a0

            SHA256

            d63045c9e2cb00b7d11ade2f67a0947f41efca635d918170494416fd3919cb63

            SHA512

            21e9989a6dd0d9d276adfa4560f77dfe0eb9c1efaeabb9af1ef5e0a7c01a10c2d8a013215befc648f809e7361e5660f720c91b7e84bedb24e1e7ffda22666142

          • C:\Windows\SysWOW64\Dnljkk32.exe

            Filesize

            305KB

            MD5

            91da286931968b545410b7e08f1e6f77

            SHA1

            061fc464e229a4a5b9356ce5995681f22e6812a0

            SHA256

            d63045c9e2cb00b7d11ade2f67a0947f41efca635d918170494416fd3919cb63

            SHA512

            21e9989a6dd0d9d276adfa4560f77dfe0eb9c1efaeabb9af1ef5e0a7c01a10c2d8a013215befc648f809e7361e5660f720c91b7e84bedb24e1e7ffda22666142

          • C:\Windows\SysWOW64\Edfknb32.exe

            Filesize

            305KB

            MD5

            9cc55bc5ed312b4c9225618e321c4a24

            SHA1

            f032404e93b7be1cc2e9206a0312918e9d2dc265

            SHA256

            2bafbde537f7d0570afd54f20e38f96ae855baef1458910a93c565a39eb15427

            SHA512

            4863a7abc548cef01b55050e0af683959256693ccefd69f2416fc29c69a1ac6a8af66e56f8f78fb90c84af148e5375ed59739f94f9d80f4b96983199923dd0aa

          • C:\Windows\SysWOW64\Edfknb32.exe

            Filesize

            305KB

            MD5

            9cc55bc5ed312b4c9225618e321c4a24

            SHA1

            f032404e93b7be1cc2e9206a0312918e9d2dc265

            SHA256

            2bafbde537f7d0570afd54f20e38f96ae855baef1458910a93c565a39eb15427

            SHA512

            4863a7abc548cef01b55050e0af683959256693ccefd69f2416fc29c69a1ac6a8af66e56f8f78fb90c84af148e5375ed59739f94f9d80f4b96983199923dd0aa

          • C:\Windows\SysWOW64\Ejjaqk32.exe

            Filesize

            305KB

            MD5

            870622376c4b2806b7457a8789597ead

            SHA1

            3bc28b046ed304d5766762e5229d69df3263a796

            SHA256

            f8ab5c33778ebb8632192efbde5e8f9a2976c92c5890659ec84e70acd273e9ce

            SHA512

            0a8865813854972f949930f53ec347d7825699e0af1678de1bb901bc142036605cadbbd8544ee467dde6e469dbdd25e471c19cb2e3d15346d96a68ae536517e4

          • C:\Windows\SysWOW64\Ejjaqk32.exe

            Filesize

            305KB

            MD5

            870622376c4b2806b7457a8789597ead

            SHA1

            3bc28b046ed304d5766762e5229d69df3263a796

            SHA256

            f8ab5c33778ebb8632192efbde5e8f9a2976c92c5890659ec84e70acd273e9ce

            SHA512

            0a8865813854972f949930f53ec347d7825699e0af1678de1bb901bc142036605cadbbd8544ee467dde6e469dbdd25e471c19cb2e3d15346d96a68ae536517e4

          • C:\Windows\SysWOW64\Fglnkm32.exe

            Filesize

            305KB

            MD5

            31e51535219c5ea76b9757f971cdc83c

            SHA1

            410eab91630bda7538707aad8f673dd07a497b08

            SHA256

            42d1b5ebbf6da087a1ce8a69453aab64fe107fed2737f08b9d3832c6687ec9bc

            SHA512

            7e787fbcfc110ab4293eaee81caf2e85bdde0c0137699c97f8d0fedf65bf4b0af54a2f1df24c48fa027c88cb36b9aafc0744b1d244e8be33a851a1ff696d61f2

          • C:\Windows\SysWOW64\Fglnkm32.exe

            Filesize

            305KB

            MD5

            31e51535219c5ea76b9757f971cdc83c

            SHA1

            410eab91630bda7538707aad8f673dd07a497b08

            SHA256

            42d1b5ebbf6da087a1ce8a69453aab64fe107fed2737f08b9d3832c6687ec9bc

            SHA512

            7e787fbcfc110ab4293eaee81caf2e85bdde0c0137699c97f8d0fedf65bf4b0af54a2f1df24c48fa027c88cb36b9aafc0744b1d244e8be33a851a1ff696d61f2

          • C:\Windows\SysWOW64\Gbmadd32.exe

            Filesize

            305KB

            MD5

            5830650f2be135ea64c4b1216b7bfbd7

            SHA1

            2f2c1c41cbd7ee341d13acd742f244901f4548ef

            SHA256

            fea458f7793016da886d6f9fe24cbbd5c3f4ad1a3f4ef392d6123efbb1531b5e

            SHA512

            4b5339ed56d530814e6e16879d94eb6861ee37c0b98f1970fe4488b411ec4d1fe2f9f4fa2968bba03755669906e7b9209931850bcdbb0b1b2907e6d77ee59e57

          • C:\Windows\SysWOW64\Gbmadd32.exe

            Filesize

            305KB

            MD5

            5830650f2be135ea64c4b1216b7bfbd7

            SHA1

            2f2c1c41cbd7ee341d13acd742f244901f4548ef

            SHA256

            fea458f7793016da886d6f9fe24cbbd5c3f4ad1a3f4ef392d6123efbb1531b5e

            SHA512

            4b5339ed56d530814e6e16879d94eb6861ee37c0b98f1970fe4488b411ec4d1fe2f9f4fa2968bba03755669906e7b9209931850bcdbb0b1b2907e6d77ee59e57

          • memory/1056-57-0x0000000000400000-0x0000000000443000-memory.dmp

            Filesize

            268KB

          • memory/1056-47-0x0000000000400000-0x0000000000443000-memory.dmp

            Filesize

            268KB

          • memory/1184-64-0x0000000000400000-0x0000000000443000-memory.dmp

            Filesize

            268KB

          • memory/1184-0-0x0000000000400000-0x0000000000443000-memory.dmp

            Filesize

            268KB

          • memory/1912-15-0x0000000000400000-0x0000000000443000-memory.dmp

            Filesize

            268KB

          • memory/1912-62-0x0000000000400000-0x0000000000443000-memory.dmp

            Filesize

            268KB

          • memory/2396-39-0x0000000000400000-0x0000000000443000-memory.dmp

            Filesize

            268KB

          • memory/2396-59-0x0000000000400000-0x0000000000443000-memory.dmp

            Filesize

            268KB

          • memory/3004-55-0x0000000000400000-0x0000000000443000-memory.dmp

            Filesize

            268KB

          • memory/3004-58-0x0000000000400000-0x0000000000443000-memory.dmp

            Filesize

            268KB

          • memory/3584-32-0x0000000000400000-0x0000000000443000-memory.dmp

            Filesize

            268KB

          • memory/3584-60-0x0000000000400000-0x0000000000443000-memory.dmp

            Filesize

            268KB

          • memory/4328-63-0x0000000000400000-0x0000000000443000-memory.dmp

            Filesize

            268KB

          • memory/4328-7-0x0000000000400000-0x0000000000443000-memory.dmp

            Filesize

            268KB

          • memory/4488-61-0x0000000000400000-0x0000000000443000-memory.dmp

            Filesize

            268KB

          • memory/4488-23-0x0000000000400000-0x0000000000443000-memory.dmp

            Filesize

            268KB