Analysis

  • max time kernel
    93s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/02/2024, 06:12

General

  • Target

    Backdoor.Win32.Padodor.exe

  • Size

    128KB

  • MD5

    166276fba5d54b332f47cd3d1240a3ba

  • SHA1

    7ba5dee7637fa07ec298ff7c7f4b9698c2830404

  • SHA256

    1181c1a3eac3e6f2718f273ec4a499e09e0bdef79888bb17b3a23b69ac6813f4

  • SHA512

    64fec8ea1ef0171a8745385f1c824a31cd76e02c118e295298657d03ce6d11373af11cfcab97f2f3ffeea5ff8992db41013f9e6af0b34630ac723d31ac93f8aa

  • SSDEEP

    3072:d6WplA55CPzpZjP2Bg6eA37DxSvITW/cbFGS9n:d6WXA5+tlPwgRArhCw9n

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 3 IoCs
  • Program crash 1 IoCs
  • Modifies registry class 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Backdoor.Win32.Padodor.exe
    "C:\Users\Admin\AppData\Local\Temp\Backdoor.Win32.Padodor.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1636
    • C:\Windows\SysWOW64\Ogmado32.exe
      C:\Windows\system32\Ogmado32.exe
      2⤵
      • Executes dropped EXE
      PID:2972
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2972 -s 412
        3⤵
        • Program crash
        PID:5096
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2972 -ip 2972
    1⤵
      PID:2712

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Windows\SysWOW64\Ogmado32.exe

            Filesize

            128KB

            MD5

            71ea35cf1b7bf38eb15e40b46c023e14

            SHA1

            5b34d20eb8e26803548ae356dc78780c76cd47d6

            SHA256

            fb82e0b9a07853de480d4277448e2f56dceeaa8e4f01b312197b741cc924e577

            SHA512

            fa6f49fc41fe9841afc114dc877f7ace58a09c72e7b63a70180735fa13034bdea0ad49c0fe13d3253e607aa56b6ac99e081032824e131e81a08b18535ebd6043

          • memory/1636-0-0x0000000000400000-0x000000000043C000-memory.dmp

            Filesize

            240KB

          • memory/1636-9-0x0000000000400000-0x000000000043C000-memory.dmp

            Filesize

            240KB

          • memory/2972-8-0x0000000000400000-0x000000000043C000-memory.dmp

            Filesize

            240KB