Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11/10/2023, 21:54
Static task
static1
Behavioral task
behavioral1
Sample
3e11595807b8455de73fa4f715bafc42_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
3e11595807b8455de73fa4f715bafc42_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
3e11595807b8455de73fa4f715bafc42_JC.exe
-
Size
362KB
-
MD5
3e11595807b8455de73fa4f715bafc42
-
SHA1
4cb35b9bbdc643b2a903a8f7f9f3a26854000fd5
-
SHA256
70359cf325b3a507dec370073dcc4f0ccf4bc5ebaab95b136146da547fc3525e
-
SHA512
41f58af3a8a0a54c47f3b18bcadf7eb220e01920df11eec48016ca1f394a6b0b26af2925d43ad7d0850f81cb8e6dddf5eafb8711f5c881cf507130dfac01f891
-
SSDEEP
6144:RY9Tyq0hX/0h7tGDuMEUrQVad7nG3mbDp2o+SsmiMyhtHEyr5psPc1aj8DOvlvuF:qdZmX/0VtmuMtrQ07nGWxWSsmiMyh95V
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 3e11595807b8455de73fa4f715bafc42_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" 3e11595807b8455de73fa4f715bafc42_JC.exe -
Executes dropped EXE 1 IoCs
pid Process 2952 Nlhgoqhh.exe -
Loads dropped DLL 6 IoCs
pid Process 2280 3e11595807b8455de73fa4f715bafc42_JC.exe 2280 3e11595807b8455de73fa4f715bafc42_JC.exe 2116 WerFault.exe 2116 WerFault.exe 2116 WerFault.exe 2116 WerFault.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\Nlhgoqhh.exe 3e11595807b8455de73fa4f715bafc42_JC.exe File opened for modification C:\Windows\SysWOW64\Nlhgoqhh.exe 3e11595807b8455de73fa4f715bafc42_JC.exe File created C:\Windows\SysWOW64\Lamajm32.dll 3e11595807b8455de73fa4f715bafc42_JC.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2116 2952 WerFault.exe 28 -
Modifies registry class 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831} 3e11595807b8455de73fa4f715bafc42_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lamajm32.dll" 3e11595807b8455de73fa4f715bafc42_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" 3e11595807b8455de73fa4f715bafc42_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 3e11595807b8455de73fa4f715bafc42_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node 3e11595807b8455de73fa4f715bafc42_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID 3e11595807b8455de73fa4f715bafc42_JC.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2280 wrote to memory of 2952 2280 3e11595807b8455de73fa4f715bafc42_JC.exe 28 PID 2280 wrote to memory of 2952 2280 3e11595807b8455de73fa4f715bafc42_JC.exe 28 PID 2280 wrote to memory of 2952 2280 3e11595807b8455de73fa4f715bafc42_JC.exe 28 PID 2280 wrote to memory of 2952 2280 3e11595807b8455de73fa4f715bafc42_JC.exe 28 PID 2952 wrote to memory of 2116 2952 Nlhgoqhh.exe 29 PID 2952 wrote to memory of 2116 2952 Nlhgoqhh.exe 29 PID 2952 wrote to memory of 2116 2952 Nlhgoqhh.exe 29 PID 2952 wrote to memory of 2116 2952 Nlhgoqhh.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\3e11595807b8455de73fa4f715bafc42_JC.exe"C:\Users\Admin\AppData\Local\Temp\3e11595807b8455de73fa4f715bafc42_JC.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Windows\SysWOW64\Nlhgoqhh.exeC:\Windows\system32\Nlhgoqhh.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2952 -s 1403⤵
- Loads dropped DLL
- Program crash
PID:2116
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
362KB
MD5c42a6c432bf5a6d0bc7a5778ea9285fa
SHA15afe18b71c6a374db0398234f339116b5b423f40
SHA256a6eec35274256d7fba18058da59d73ef1f743c5db8a5b18a6410af7b502494fe
SHA512d850f7a650d544e069e9960f850d62eaecca9bb023ff1ee2158399e402a529e0e9afccade6d01e2dfcd99ac63195f03e3e54305cd1ce24c6a548c82ed2322796
-
Filesize
362KB
MD5c42a6c432bf5a6d0bc7a5778ea9285fa
SHA15afe18b71c6a374db0398234f339116b5b423f40
SHA256a6eec35274256d7fba18058da59d73ef1f743c5db8a5b18a6410af7b502494fe
SHA512d850f7a650d544e069e9960f850d62eaecca9bb023ff1ee2158399e402a529e0e9afccade6d01e2dfcd99ac63195f03e3e54305cd1ce24c6a548c82ed2322796
-
Filesize
362KB
MD5c42a6c432bf5a6d0bc7a5778ea9285fa
SHA15afe18b71c6a374db0398234f339116b5b423f40
SHA256a6eec35274256d7fba18058da59d73ef1f743c5db8a5b18a6410af7b502494fe
SHA512d850f7a650d544e069e9960f850d62eaecca9bb023ff1ee2158399e402a529e0e9afccade6d01e2dfcd99ac63195f03e3e54305cd1ce24c6a548c82ed2322796
-
Filesize
362KB
MD5c42a6c432bf5a6d0bc7a5778ea9285fa
SHA15afe18b71c6a374db0398234f339116b5b423f40
SHA256a6eec35274256d7fba18058da59d73ef1f743c5db8a5b18a6410af7b502494fe
SHA512d850f7a650d544e069e9960f850d62eaecca9bb023ff1ee2158399e402a529e0e9afccade6d01e2dfcd99ac63195f03e3e54305cd1ce24c6a548c82ed2322796
-
Filesize
362KB
MD5c42a6c432bf5a6d0bc7a5778ea9285fa
SHA15afe18b71c6a374db0398234f339116b5b423f40
SHA256a6eec35274256d7fba18058da59d73ef1f743c5db8a5b18a6410af7b502494fe
SHA512d850f7a650d544e069e9960f850d62eaecca9bb023ff1ee2158399e402a529e0e9afccade6d01e2dfcd99ac63195f03e3e54305cd1ce24c6a548c82ed2322796
-
Filesize
362KB
MD5c42a6c432bf5a6d0bc7a5778ea9285fa
SHA15afe18b71c6a374db0398234f339116b5b423f40
SHA256a6eec35274256d7fba18058da59d73ef1f743c5db8a5b18a6410af7b502494fe
SHA512d850f7a650d544e069e9960f850d62eaecca9bb023ff1ee2158399e402a529e0e9afccade6d01e2dfcd99ac63195f03e3e54305cd1ce24c6a548c82ed2322796
-
Filesize
362KB
MD5c42a6c432bf5a6d0bc7a5778ea9285fa
SHA15afe18b71c6a374db0398234f339116b5b423f40
SHA256a6eec35274256d7fba18058da59d73ef1f743c5db8a5b18a6410af7b502494fe
SHA512d850f7a650d544e069e9960f850d62eaecca9bb023ff1ee2158399e402a529e0e9afccade6d01e2dfcd99ac63195f03e3e54305cd1ce24c6a548c82ed2322796
-
Filesize
362KB
MD5c42a6c432bf5a6d0bc7a5778ea9285fa
SHA15afe18b71c6a374db0398234f339116b5b423f40
SHA256a6eec35274256d7fba18058da59d73ef1f743c5db8a5b18a6410af7b502494fe
SHA512d850f7a650d544e069e9960f850d62eaecca9bb023ff1ee2158399e402a529e0e9afccade6d01e2dfcd99ac63195f03e3e54305cd1ce24c6a548c82ed2322796