Analysis
-
max time kernel
93s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
29/02/2024, 06:12
Static task
static1
Behavioral task
behavioral1
Sample
Backdoor.Win32.Padodor.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Backdoor.Win32.Padodor.exe
Resource
win10v2004-20240226-en
General
-
Target
Backdoor.Win32.Padodor.exe
-
Size
128KB
-
MD5
166276fba5d54b332f47cd3d1240a3ba
-
SHA1
7ba5dee7637fa07ec298ff7c7f4b9698c2830404
-
SHA256
1181c1a3eac3e6f2718f273ec4a499e09e0bdef79888bb17b3a23b69ac6813f4
-
SHA512
64fec8ea1ef0171a8745385f1c824a31cd76e02c118e295298657d03ce6d11373af11cfcab97f2f3ffeea5ff8992db41013f9e6af0b34630ac723d31ac93f8aa
-
SSDEEP
3072:d6WplA55CPzpZjP2Bg6eA37DxSvITW/cbFGS9n:d6WXA5+tlPwgRArhCw9n
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Backdoor.Win32.Padodor.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Backdoor.Win32.Padodor.exe -
Executes dropped EXE 1 IoCs
pid Process 2972 Ogmado32.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\Ogmado32.exe Backdoor.Win32.Padodor.exe File opened for modification C:\Windows\SysWOW64\Ogmado32.exe Backdoor.Win32.Padodor.exe File created C:\Windows\SysWOW64\Daifcmfa.dll Backdoor.Win32.Padodor.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 5096 2972 WerFault.exe 88 -
Modifies registry class 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Backdoor.Win32.Padodor.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node Backdoor.Win32.Padodor.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID Backdoor.Win32.Padodor.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831} Backdoor.Win32.Padodor.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Daifcmfa.dll" Backdoor.Win32.Padodor.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Backdoor.Win32.Padodor.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1636 wrote to memory of 2972 1636 Backdoor.Win32.Padodor.exe 88 PID 1636 wrote to memory of 2972 1636 Backdoor.Win32.Padodor.exe 88 PID 1636 wrote to memory of 2972 1636 Backdoor.Win32.Padodor.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\Backdoor.Win32.Padodor.exe"C:\Users\Admin\AppData\Local\Temp\Backdoor.Win32.Padodor.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Windows\SysWOW64\Ogmado32.exeC:\Windows\system32\Ogmado32.exe2⤵
- Executes dropped EXE
PID:2972 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2972 -s 4123⤵
- Program crash
PID:5096
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2972 -ip 29721⤵PID:2712
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
128KB
MD571ea35cf1b7bf38eb15e40b46c023e14
SHA15b34d20eb8e26803548ae356dc78780c76cd47d6
SHA256fb82e0b9a07853de480d4277448e2f56dceeaa8e4f01b312197b741cc924e577
SHA512fa6f49fc41fe9841afc114dc877f7ace58a09c72e7b63a70180735fa13034bdea0ad49c0fe13d3253e607aa56b6ac99e081032824e131e81a08b18535ebd6043