Analysis

  • max time kernel
    140s
  • max time network
    65s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/01/2024, 21:04

General

  • Target

    0c7882c634f6ec38ac9c8f45ff5ca216.exe

  • Size

    98KB

  • MD5

    0c7882c634f6ec38ac9c8f45ff5ca216

  • SHA1

    2cc69b5b08d5456545413db5e63cdefd8843f6e8

  • SHA256

    0df660f81da9b5328402d2951941338b942ddbca8fb0fb2ef2861ae826dcb20f

  • SHA512

    15aee96dfbcd19f5c5761701379c75906d741892c3137dca2be7dc6bb2ed6468d7624f4d211cc2ac75539cf4b266a2e03faef01b648da53d1bdce9cf13ab86cc

  • SSDEEP

    3072:VVNlMq0YfoqHGWFXlRH0jsN1ENeFKPD375lHzpa1P:dlMq0yXvwOENeYr75lHzpaF

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 16 IoCs
  • Executes dropped EXE 8 IoCs
  • Drops file in System32 directory 24 IoCs
  • Program crash 1 IoCs
  • Modifies registry class 27 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1764 -ip 1764
    1⤵
      PID:2004
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1764 -s 420
      1⤵
      • Program crash
      PID:3440
    • C:\Windows\SysWOW64\Nkcmohbg.exe
      C:\Windows\system32\Nkcmohbg.exe
      1⤵
      • Executes dropped EXE
      PID:1764
    • C:\Windows\SysWOW64\Ncldnkae.exe
      C:\Windows\system32\Ncldnkae.exe
      1⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:4708
    • C:\Windows\SysWOW64\Ndidbn32.exe
      C:\Windows\system32\Ndidbn32.exe
      1⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:3308
    • C:\Windows\SysWOW64\Nbkhfc32.exe
      C:\Windows\system32\Nbkhfc32.exe
      1⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:4844
    • C:\Windows\SysWOW64\Nnolfdcn.exe
      C:\Windows\system32\Nnolfdcn.exe
      1⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:640
    • C:\Windows\SysWOW64\Nkqpjidj.exe
      C:\Windows\system32\Nkqpjidj.exe
      1⤵
        PID:4484
      • C:\Windows\SysWOW64\Ngedij32.exe
        C:\Windows\system32\Ngedij32.exe
        1⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Drops file in System32 directory
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:4636
      • C:\Windows\SysWOW64\Ndghmo32.exe
        C:\Windows\system32\Ndghmo32.exe
        1⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Drops file in System32 directory
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:3340
      • C:\Users\Admin\AppData\Local\Temp\0c7882c634f6ec38ac9c8f45ff5ca216.exe
        "C:\Users\Admin\AppData\Local\Temp\0c7882c634f6ec38ac9c8f45ff5ca216.exe"
        1⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Drops file in System32 directory
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2808
      • C:\Windows\system32\backgroundTaskHost.exe
        "C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca
        1⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Drops file in System32 directory
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:4484

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Windows\SysWOW64\Ndghmo32.exe

        Filesize

        92KB

        MD5

        139e0b9317708140ff28f11826595994

        SHA1

        fefe69ae772d014bf05cc38b11c5860d9c963268

        SHA256

        cb45de464d64ac8ef29d9dc38cff5c08f2a49102097f3e490862b2f1db920354

        SHA512

        1b49e76822852b5ae81288756be747adb74358bc9794b45dd871701b6c8ccc02e0902f95939131e67a6b5e50bfb35a13dca6439afb78b0a27da8cb9ccdc2591d

      • memory/640-70-0x0000000000400000-0x0000000000443000-memory.dmp

        Filesize

        268KB

      • memory/640-32-0x0000000000400000-0x0000000000443000-memory.dmp

        Filesize

        268KB

      • memory/1764-64-0x0000000000400000-0x0000000000443000-memory.dmp

        Filesize

        268KB

      • memory/1764-65-0x0000000000400000-0x0000000000443000-memory.dmp

        Filesize

        268KB

      • memory/2808-73-0x0000000000400000-0x0000000000443000-memory.dmp

        Filesize

        268KB

      • memory/2808-0-0x0000000000400000-0x0000000000443000-memory.dmp

        Filesize

        268KB

      • memory/3308-68-0x0000000000400000-0x0000000000443000-memory.dmp

        Filesize

        268KB

      • memory/3308-48-0x0000000000400000-0x0000000000443000-memory.dmp

        Filesize

        268KB

      • memory/3340-71-0x0000000000400000-0x0000000000443000-memory.dmp

        Filesize

        268KB

      • memory/3340-8-0x0000000000400000-0x0000000000443000-memory.dmp

        Filesize

        268KB

      • memory/4484-69-0x0000000000400000-0x0000000000443000-memory.dmp

        Filesize

        268KB

      • memory/4484-24-0x0000000000400000-0x0000000000443000-memory.dmp

        Filesize

        268KB

      • memory/4636-72-0x0000000000400000-0x0000000000443000-memory.dmp

        Filesize

        268KB

      • memory/4636-15-0x0000000000400000-0x0000000000443000-memory.dmp

        Filesize

        268KB

      • memory/4708-66-0x0000000000400000-0x0000000000443000-memory.dmp

        Filesize

        268KB

      • memory/4708-55-0x0000000000400000-0x0000000000443000-memory.dmp

        Filesize

        268KB

      • memory/4844-67-0x0000000000400000-0x0000000000443000-memory.dmp

        Filesize

        268KB

      • memory/4844-40-0x0000000000400000-0x0000000000443000-memory.dmp

        Filesize

        268KB