Analysis

  • max time kernel
    142s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    10-01-2024 18:22

General

  • Target

    f10b7a7c480084a265bad0c598867db9.exe

  • Size

    448KB

  • MD5

    f10b7a7c480084a265bad0c598867db9

  • SHA1

    d99cbd5e7ff922087f54bbeed8d637f5a84f2dfd

  • SHA256

    690b60be2d5fe3707ebd3eca073a0dd832ec3fe8b8530d4eef9060038e0bd3a1

  • SHA512

    51fefc5cada0fbfe74d3dc9408b9648cf3f4e08d6f138baedc8fa6320662670510a63b28c560a8aff7578c0b609a71c3a8f5d3bf59de7eab4a4bf1fff7dd27ed

  • SSDEEP

    6144:vQ36wFBMJ8apdD5CWkdWxCzJ8apdD5CWfqkGLwmPJ8apdD5CWkdWxCzJ8apdD5CW:S28aedx8aFqkGLwm8aedx8a

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 28 IoCs
  • Executes dropped EXE 14 IoCs
  • Loads dropped DLL 32 IoCs
  • Drops file in System32 directory 42 IoCs
  • Program crash 1 IoCs
  • Modifies registry class 45 IoCs
  • Suspicious use of WriteProcessMemory 60 IoCs

Processes

  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -u -p 2320 -s 140
    1⤵
    • Loads dropped DLL
    • Program crash
    PID:2944
  • C:\Windows\SysWOW64\Fkckeh32.exe
    C:\Windows\system32\Fkckeh32.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:2320
  • C:\Windows\SysWOW64\Eibbcm32.exe
    C:\Windows\system32\Eibbcm32.exe
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Executes dropped EXE
    • Loads dropped DLL
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1640
  • C:\Windows\SysWOW64\Enhacojl.exe
    C:\Windows\system32\Enhacojl.exe
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Executes dropped EXE
    • Loads dropped DLL
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2748
  • C:\Windows\SysWOW64\Enfenplo.exe
    C:\Windows\system32\Enfenplo.exe
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Executes dropped EXE
    • Loads dropped DLL
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1060
  • C:\Windows\SysWOW64\Ejkima32.exe
    C:\Windows\system32\Ejkima32.exe
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Executes dropped EXE
    • Loads dropped DLL
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:880
  • C:\Windows\SysWOW64\Eqbddk32.exe
    C:\Windows\system32\Eqbddk32.exe
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Executes dropped EXE
    • Loads dropped DLL
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1696
  • C:\Windows\SysWOW64\Ehgppi32.exe
    C:\Windows\system32\Ehgppi32.exe
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Executes dropped EXE
    • Loads dropped DLL
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2912
  • C:\Windows\SysWOW64\Dookgcij.exe
    C:\Windows\system32\Dookgcij.exe
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Executes dropped EXE
    • Loads dropped DLL
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:548
  • C:\Windows\SysWOW64\Ddigjkid.exe
    C:\Windows\system32\Ddigjkid.exe
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Executes dropped EXE
    • Loads dropped DLL
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2204
  • C:\Windows\SysWOW64\Dlnbeh32.exe
    C:\Windows\system32\Dlnbeh32.exe
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Executes dropped EXE
    • Loads dropped DLL
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2680
  • C:\Windows\SysWOW64\Dcenlceh.exe
    C:\Windows\system32\Dcenlceh.exe
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Executes dropped EXE
    • Loads dropped DLL
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2824
  • C:\Windows\SysWOW64\Dhpiojfb.exe
    C:\Windows\system32\Dhpiojfb.exe
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Executes dropped EXE
    • Loads dropped DLL
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2700
  • C:\Windows\SysWOW64\Dccagcgk.exe
    C:\Windows\system32\Dccagcgk.exe
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Executes dropped EXE
    • Loads dropped DLL
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2776
  • C:\Windows\SysWOW64\Dhnmij32.exe
    C:\Windows\system32\Dhnmij32.exe
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Executes dropped EXE
    • Loads dropped DLL
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2844
  • C:\Users\Admin\AppData\Local\Temp\f10b7a7c480084a265bad0c598867db9.exe
    "C:\Users\Admin\AppData\Local\Temp\f10b7a7c480084a265bad0c598867db9.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Loads dropped DLL
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2652

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/548-207-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/548-95-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/548-107-0x0000000000220000-0x0000000000254000-memory.dmp

    Filesize

    208KB

  • memory/880-210-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/880-137-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/880-151-0x00000000002D0000-0x0000000000304000-memory.dmp

    Filesize

    208KB

  • memory/880-155-0x00000000002D0000-0x0000000000304000-memory.dmp

    Filesize

    208KB

  • memory/1060-164-0x0000000000230000-0x0000000000264000-memory.dmp

    Filesize

    208KB

  • memory/1060-211-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/1060-156-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/1640-195-0x00000000001B0000-0x00000000001E4000-memory.dmp

    Filesize

    208KB

  • memory/1640-181-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/1640-192-0x00000000001B0000-0x00000000001E4000-memory.dmp

    Filesize

    208KB

  • memory/1640-213-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/1696-123-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/1696-209-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2204-87-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2320-214-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2320-194-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2652-200-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2652-0-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2652-6-0x0000000000220000-0x0000000000254000-memory.dmp

    Filesize

    208KB

  • memory/2652-13-0x0000000000220000-0x0000000000254000-memory.dmp

    Filesize

    208KB

  • memory/2680-81-0x0000000000220000-0x0000000000254000-memory.dmp

    Filesize

    208KB

  • memory/2680-205-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2700-203-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2700-49-0x0000000000220000-0x0000000000254000-memory.dmp

    Filesize

    208KB

  • memory/2700-44-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2748-167-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2748-212-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2748-174-0x00000000001B0000-0x00000000001E4000-memory.dmp

    Filesize

    208KB

  • memory/2776-35-0x0000000000220000-0x0000000000254000-memory.dmp

    Filesize

    208KB

  • memory/2776-202-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2824-204-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2824-55-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2824-63-0x0000000000220000-0x0000000000254000-memory.dmp

    Filesize

    208KB

  • memory/2844-19-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2844-22-0x0000000000220000-0x0000000000254000-memory.dmp

    Filesize

    208KB

  • memory/2912-114-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2912-121-0x00000000001B0000-0x00000000001E4000-memory.dmp

    Filesize

    208KB

  • memory/2912-130-0x00000000001B0000-0x00000000001E4000-memory.dmp

    Filesize

    208KB