Analysis
-
max time kernel
117s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
10/10/2023, 21:40
Static task
static1
Behavioral task
behavioral1
Sample
91e41f7ba3a86893d5a8b0ff8a293e58_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
91e41f7ba3a86893d5a8b0ff8a293e58_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
91e41f7ba3a86893d5a8b0ff8a293e58_JC.exe
-
Size
128KB
-
MD5
91e41f7ba3a86893d5a8b0ff8a293e58
-
SHA1
30da8b7fbd93e076e4d4b5a142dff692c8394801
-
SHA256
f9833761752945fa7c981f25887d32c0d65e058b06ad50531f1364f410ef1e2e
-
SHA512
825ad1bfd08338c643554e8f36d00bb70d66012839e1019a978600b0e8dfbb2e8e5b701bf15df973f17c24cc545c2edb3c381571ceed93b5f28bd8028ff6c6a2
-
SSDEEP
3072:AquOtqN+2RVIj+f7+/P3Mo6EeiSJdEN0s4WE+3S9pui6yYPaI7DX:A7EUVIAW143ENm+3Mpui6yYPaI/
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fjaonpnn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Fjaonpnn.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 91e41f7ba3a86893d5a8b0ff8a293e58_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" 91e41f7ba3a86893d5a8b0ff8a293e58_JC.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ejobhppq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ejobhppq.exe -
Executes dropped EXE 3 IoCs
pid Process 1304 Ejobhppq.exe 2752 Fjaonpnn.exe 2620 Fkckeh32.exe -
Loads dropped DLL 10 IoCs
pid Process 2120 91e41f7ba3a86893d5a8b0ff8a293e58_JC.exe 2120 91e41f7ba3a86893d5a8b0ff8a293e58_JC.exe 1304 Ejobhppq.exe 1304 Ejobhppq.exe 2752 Fjaonpnn.exe 2752 Fjaonpnn.exe 2524 WerFault.exe 2524 WerFault.exe 2524 WerFault.exe 2524 WerFault.exe -
Drops file in System32 directory 9 IoCs
description ioc Process File created C:\Windows\SysWOW64\Ekgednng.dll 91e41f7ba3a86893d5a8b0ff8a293e58_JC.exe File created C:\Windows\SysWOW64\Fkckeh32.exe Fjaonpnn.exe File opened for modification C:\Windows\SysWOW64\Fkckeh32.exe Fjaonpnn.exe File created C:\Windows\SysWOW64\Clkmne32.dll Fjaonpnn.exe File created C:\Windows\SysWOW64\Ejobhppq.exe 91e41f7ba3a86893d5a8b0ff8a293e58_JC.exe File opened for modification C:\Windows\SysWOW64\Ejobhppq.exe 91e41f7ba3a86893d5a8b0ff8a293e58_JC.exe File created C:\Windows\SysWOW64\Hoogfn32.dll Ejobhppq.exe File created C:\Windows\SysWOW64\Fjaonpnn.exe Ejobhppq.exe File opened for modification C:\Windows\SysWOW64\Fjaonpnn.exe Ejobhppq.exe -
Program crash 1 IoCs
pid pid_target Process 2524 2620 WerFault.exe -
Modifies registry class 12 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 91e41f7ba3a86893d5a8b0ff8a293e58_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID 91e41f7ba3a86893d5a8b0ff8a293e58_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ekgednng.dll" 91e41f7ba3a86893d5a8b0ff8a293e58_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hoogfn32.dll" Ejobhppq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Fjaonpnn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node 91e41f7ba3a86893d5a8b0ff8a293e58_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831} 91e41f7ba3a86893d5a8b0ff8a293e58_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" 91e41f7ba3a86893d5a8b0ff8a293e58_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Ejobhppq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Ejobhppq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Fjaonpnn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Clkmne32.dll" Fjaonpnn.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2120 wrote to memory of 1304 2120 91e41f7ba3a86893d5a8b0ff8a293e58_JC.exe 28 PID 2120 wrote to memory of 1304 2120 91e41f7ba3a86893d5a8b0ff8a293e58_JC.exe 28 PID 2120 wrote to memory of 1304 2120 91e41f7ba3a86893d5a8b0ff8a293e58_JC.exe 28 PID 2120 wrote to memory of 1304 2120 91e41f7ba3a86893d5a8b0ff8a293e58_JC.exe 28 PID 1304 wrote to memory of 2752 1304 Ejobhppq.exe 31 PID 1304 wrote to memory of 2752 1304 Ejobhppq.exe 31 PID 1304 wrote to memory of 2752 1304 Ejobhppq.exe 31 PID 1304 wrote to memory of 2752 1304 Ejobhppq.exe 31 PID 2752 wrote to memory of 2620 2752 Fjaonpnn.exe 30 PID 2752 wrote to memory of 2620 2752 Fjaonpnn.exe 30 PID 2752 wrote to memory of 2620 2752 Fjaonpnn.exe 30 PID 2752 wrote to memory of 2620 2752 Fjaonpnn.exe 30 PID 2620 wrote to memory of 2524 2620 Fkckeh32.exe 29 PID 2620 wrote to memory of 2524 2620 Fkckeh32.exe 29 PID 2620 wrote to memory of 2524 2620 Fkckeh32.exe 29 PID 2620 wrote to memory of 2524 2620 Fkckeh32.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\91e41f7ba3a86893d5a8b0ff8a293e58_JC.exe"C:\Users\Admin\AppData\Local\Temp\91e41f7ba3a86893d5a8b0ff8a293e58_JC.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Windows\SysWOW64\Ejobhppq.exeC:\Windows\system32\Ejobhppq.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Windows\SysWOW64\Fjaonpnn.exeC:\Windows\system32\Fjaonpnn.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2752
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2620 -s 1401⤵
- Loads dropped DLL
- Program crash
PID:2524
-
C:\Windows\SysWOW64\Fkckeh32.exeC:\Windows\system32\Fkckeh32.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2620
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
128KB
MD506d7c9f7873cc9a34555b9af0c62a7ec
SHA1eddaed4dbb9c09a67af62e0ec5c9da4f36b3e7d2
SHA256eabef9b2ed9d85bb6c0ba504fc9d8a3cd5e0f99c584d3720389edd2abe4c110c
SHA512121e5bd65a4871a92ca86a8710a1691b17458b8a9ee5abccea8e407fb6f922d384233233d4887ffa514ea520326492249921493626d91c04195558b7097c9b73
-
Filesize
128KB
MD506d7c9f7873cc9a34555b9af0c62a7ec
SHA1eddaed4dbb9c09a67af62e0ec5c9da4f36b3e7d2
SHA256eabef9b2ed9d85bb6c0ba504fc9d8a3cd5e0f99c584d3720389edd2abe4c110c
SHA512121e5bd65a4871a92ca86a8710a1691b17458b8a9ee5abccea8e407fb6f922d384233233d4887ffa514ea520326492249921493626d91c04195558b7097c9b73
-
Filesize
128KB
MD506d7c9f7873cc9a34555b9af0c62a7ec
SHA1eddaed4dbb9c09a67af62e0ec5c9da4f36b3e7d2
SHA256eabef9b2ed9d85bb6c0ba504fc9d8a3cd5e0f99c584d3720389edd2abe4c110c
SHA512121e5bd65a4871a92ca86a8710a1691b17458b8a9ee5abccea8e407fb6f922d384233233d4887ffa514ea520326492249921493626d91c04195558b7097c9b73
-
Filesize
128KB
MD5b6f820762442e0a04e6c1e69f0a5dc14
SHA101c78606171a41b371ca6fa124659b6c0c3fceab
SHA256180e2f8cd7e60249a1da7ddd572c5d8ae43c065c212bab60632d73ec08929762
SHA51242ead42787aff7fb948556660218735d470619ad4ed5cb57c493238430c5495c17c9fe8b51e5bd2ab94b9b116b4bdb63f15635e848d51bbf6ac75363f8712eec
-
Filesize
128KB
MD5b6f820762442e0a04e6c1e69f0a5dc14
SHA101c78606171a41b371ca6fa124659b6c0c3fceab
SHA256180e2f8cd7e60249a1da7ddd572c5d8ae43c065c212bab60632d73ec08929762
SHA51242ead42787aff7fb948556660218735d470619ad4ed5cb57c493238430c5495c17c9fe8b51e5bd2ab94b9b116b4bdb63f15635e848d51bbf6ac75363f8712eec
-
Filesize
128KB
MD5b6f820762442e0a04e6c1e69f0a5dc14
SHA101c78606171a41b371ca6fa124659b6c0c3fceab
SHA256180e2f8cd7e60249a1da7ddd572c5d8ae43c065c212bab60632d73ec08929762
SHA51242ead42787aff7fb948556660218735d470619ad4ed5cb57c493238430c5495c17c9fe8b51e5bd2ab94b9b116b4bdb63f15635e848d51bbf6ac75363f8712eec
-
Filesize
128KB
MD52f88ef67537268fdadcef987dd292a58
SHA1fa4031360bc0aaeaa42cbd4060ede3c45f814b54
SHA256f858cc0b326708b2a6bc3c9557fd395f85eb48bbf70b25fdd2f78a74ad1e0137
SHA51237233f343a5df45770bf28c05d4312ad214e6c8df61f1e3c4d1be946b8e3e01782f0d7cc036dc8c6022a4294161eeff3ffc949a29cd2ee088f6d15b822def0d3
-
Filesize
128KB
MD52f88ef67537268fdadcef987dd292a58
SHA1fa4031360bc0aaeaa42cbd4060ede3c45f814b54
SHA256f858cc0b326708b2a6bc3c9557fd395f85eb48bbf70b25fdd2f78a74ad1e0137
SHA51237233f343a5df45770bf28c05d4312ad214e6c8df61f1e3c4d1be946b8e3e01782f0d7cc036dc8c6022a4294161eeff3ffc949a29cd2ee088f6d15b822def0d3
-
Filesize
128KB
MD506d7c9f7873cc9a34555b9af0c62a7ec
SHA1eddaed4dbb9c09a67af62e0ec5c9da4f36b3e7d2
SHA256eabef9b2ed9d85bb6c0ba504fc9d8a3cd5e0f99c584d3720389edd2abe4c110c
SHA512121e5bd65a4871a92ca86a8710a1691b17458b8a9ee5abccea8e407fb6f922d384233233d4887ffa514ea520326492249921493626d91c04195558b7097c9b73
-
Filesize
128KB
MD506d7c9f7873cc9a34555b9af0c62a7ec
SHA1eddaed4dbb9c09a67af62e0ec5c9da4f36b3e7d2
SHA256eabef9b2ed9d85bb6c0ba504fc9d8a3cd5e0f99c584d3720389edd2abe4c110c
SHA512121e5bd65a4871a92ca86a8710a1691b17458b8a9ee5abccea8e407fb6f922d384233233d4887ffa514ea520326492249921493626d91c04195558b7097c9b73
-
Filesize
128KB
MD5b6f820762442e0a04e6c1e69f0a5dc14
SHA101c78606171a41b371ca6fa124659b6c0c3fceab
SHA256180e2f8cd7e60249a1da7ddd572c5d8ae43c065c212bab60632d73ec08929762
SHA51242ead42787aff7fb948556660218735d470619ad4ed5cb57c493238430c5495c17c9fe8b51e5bd2ab94b9b116b4bdb63f15635e848d51bbf6ac75363f8712eec
-
Filesize
128KB
MD5b6f820762442e0a04e6c1e69f0a5dc14
SHA101c78606171a41b371ca6fa124659b6c0c3fceab
SHA256180e2f8cd7e60249a1da7ddd572c5d8ae43c065c212bab60632d73ec08929762
SHA51242ead42787aff7fb948556660218735d470619ad4ed5cb57c493238430c5495c17c9fe8b51e5bd2ab94b9b116b4bdb63f15635e848d51bbf6ac75363f8712eec
-
Filesize
128KB
MD52f88ef67537268fdadcef987dd292a58
SHA1fa4031360bc0aaeaa42cbd4060ede3c45f814b54
SHA256f858cc0b326708b2a6bc3c9557fd395f85eb48bbf70b25fdd2f78a74ad1e0137
SHA51237233f343a5df45770bf28c05d4312ad214e6c8df61f1e3c4d1be946b8e3e01782f0d7cc036dc8c6022a4294161eeff3ffc949a29cd2ee088f6d15b822def0d3
-
Filesize
128KB
MD52f88ef67537268fdadcef987dd292a58
SHA1fa4031360bc0aaeaa42cbd4060ede3c45f814b54
SHA256f858cc0b326708b2a6bc3c9557fd395f85eb48bbf70b25fdd2f78a74ad1e0137
SHA51237233f343a5df45770bf28c05d4312ad214e6c8df61f1e3c4d1be946b8e3e01782f0d7cc036dc8c6022a4294161eeff3ffc949a29cd2ee088f6d15b822def0d3
-
Filesize
128KB
MD52f88ef67537268fdadcef987dd292a58
SHA1fa4031360bc0aaeaa42cbd4060ede3c45f814b54
SHA256f858cc0b326708b2a6bc3c9557fd395f85eb48bbf70b25fdd2f78a74ad1e0137
SHA51237233f343a5df45770bf28c05d4312ad214e6c8df61f1e3c4d1be946b8e3e01782f0d7cc036dc8c6022a4294161eeff3ffc949a29cd2ee088f6d15b822def0d3
-
Filesize
128KB
MD52f88ef67537268fdadcef987dd292a58
SHA1fa4031360bc0aaeaa42cbd4060ede3c45f814b54
SHA256f858cc0b326708b2a6bc3c9557fd395f85eb48bbf70b25fdd2f78a74ad1e0137
SHA51237233f343a5df45770bf28c05d4312ad214e6c8df61f1e3c4d1be946b8e3e01782f0d7cc036dc8c6022a4294161eeff3ffc949a29cd2ee088f6d15b822def0d3
-
Filesize
128KB
MD52f88ef67537268fdadcef987dd292a58
SHA1fa4031360bc0aaeaa42cbd4060ede3c45f814b54
SHA256f858cc0b326708b2a6bc3c9557fd395f85eb48bbf70b25fdd2f78a74ad1e0137
SHA51237233f343a5df45770bf28c05d4312ad214e6c8df61f1e3c4d1be946b8e3e01782f0d7cc036dc8c6022a4294161eeff3ffc949a29cd2ee088f6d15b822def0d3
-
Filesize
128KB
MD52f88ef67537268fdadcef987dd292a58
SHA1fa4031360bc0aaeaa42cbd4060ede3c45f814b54
SHA256f858cc0b326708b2a6bc3c9557fd395f85eb48bbf70b25fdd2f78a74ad1e0137
SHA51237233f343a5df45770bf28c05d4312ad214e6c8df61f1e3c4d1be946b8e3e01782f0d7cc036dc8c6022a4294161eeff3ffc949a29cd2ee088f6d15b822def0d3