Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    06/03/2024, 18:39

General

  • Target

    2e88618b805bdebdbfee52e1d92420feed798fcc0292620dad589d77a51c6fdf.exe

  • Size

    64KB

  • MD5

    d418f280d857f7e40643971e9d2c1674

  • SHA1

    f6f65d424fef8296c509e84dc7c46d2c4b569f40

  • SHA256

    2e88618b805bdebdbfee52e1d92420feed798fcc0292620dad589d77a51c6fdf

  • SHA512

    85ece8cf228fcb97c471f98f7f1bb0ed01ffdfef7acb7a76f00ecd7a08c08e7f6e79c80c349c6b65a64da52cf09e21c91d0b1047e13bd918d63948818df8d2a3

  • SSDEEP

    1536:443+oKMQ3GtZYjvEZJafUw9wJhbRE5uV1iL+iALMH6:40kzGtZ4v4wKnFE5uV1iL+9Ma

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 30 IoCs
  • Executes dropped EXE 15 IoCs
  • Loads dropped DLL 34 IoCs
  • Drops file in System32 directory 45 IoCs
  • Program crash 1 IoCs
  • Modifies registry class 48 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2e88618b805bdebdbfee52e1d92420feed798fcc0292620dad589d77a51c6fdf.exe
    "C:\Users\Admin\AppData\Local\Temp\2e88618b805bdebdbfee52e1d92420feed798fcc0292620dad589d77a51c6fdf.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Loads dropped DLL
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2188
    • C:\Windows\SysWOW64\Hgbebiao.exe
      C:\Windows\system32\Hgbebiao.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2560
      • C:\Windows\SysWOW64\Hkpnhgge.exe
        C:\Windows\system32\Hkpnhgge.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in System32 directory
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2480
        • C:\Windows\SysWOW64\Hlakpp32.exe
          C:\Windows\system32\Hlakpp32.exe
          4⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in System32 directory
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:2800
          • C:\Windows\SysWOW64\Hckcmjep.exe
            C:\Windows\system32\Hckcmjep.exe
            5⤵
            • Adds autorun key to be loaded by Explorer.exe on startup
            • Executes dropped EXE
            • Loads dropped DLL
            • Drops file in System32 directory
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:2400
            • C:\Windows\SysWOW64\Hejoiedd.exe
              C:\Windows\system32\Hejoiedd.exe
              6⤵
              • Adds autorun key to be loaded by Explorer.exe on startup
              • Executes dropped EXE
              • Loads dropped DLL
              • Drops file in System32 directory
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:2128
              • C:\Windows\SysWOW64\Hlcgeo32.exe
                C:\Windows\system32\Hlcgeo32.exe
                7⤵
                • Adds autorun key to be loaded by Explorer.exe on startup
                • Executes dropped EXE
                • Loads dropped DLL
                • Drops file in System32 directory
                • Modifies registry class
                • Suspicious use of WriteProcessMemory
                PID:2296
                • C:\Windows\SysWOW64\Hgilchkf.exe
                  C:\Windows\system32\Hgilchkf.exe
                  8⤵
                  • Adds autorun key to be loaded by Explorer.exe on startup
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Drops file in System32 directory
                  • Modifies registry class
                  • Suspicious use of WriteProcessMemory
                  PID:1580
                  • C:\Windows\SysWOW64\Hhjhkq32.exe
                    C:\Windows\system32\Hhjhkq32.exe
                    9⤵
                    • Adds autorun key to be loaded by Explorer.exe on startup
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Drops file in System32 directory
                    • Modifies registry class
                    • Suspicious use of WriteProcessMemory
                    PID:2564
                    • C:\Windows\SysWOW64\Hacmcfge.exe
                      C:\Windows\system32\Hacmcfge.exe
                      10⤵
                      • Adds autorun key to be loaded by Explorer.exe on startup
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • Drops file in System32 directory
                      • Modifies registry class
                      • Suspicious use of WriteProcessMemory
                      PID:2720
                      • C:\Windows\SysWOW64\Hhmepp32.exe
                        C:\Windows\system32\Hhmepp32.exe
                        11⤵
                        • Adds autorun key to be loaded by Explorer.exe on startup
                        • Executes dropped EXE
                        • Loads dropped DLL
                        • Drops file in System32 directory
                        • Modifies registry class
                        • Suspicious use of WriteProcessMemory
                        PID:1748
                        • C:\Windows\SysWOW64\Hogmmjfo.exe
                          C:\Windows\system32\Hogmmjfo.exe
                          12⤵
                          • Adds autorun key to be loaded by Explorer.exe on startup
                          • Executes dropped EXE
                          • Loads dropped DLL
                          • Drops file in System32 directory
                          • Modifies registry class
                          • Suspicious use of WriteProcessMemory
                          PID:384
                          • C:\Windows\SysWOW64\Idceea32.exe
                            C:\Windows\system32\Idceea32.exe
                            13⤵
                            • Adds autorun key to be loaded by Explorer.exe on startup
                            • Executes dropped EXE
                            • Loads dropped DLL
                            • Drops file in System32 directory
                            • Modifies registry class
                            • Suspicious use of WriteProcessMemory
                            PID:1416
                            • C:\Windows\SysWOW64\Ilknfn32.exe
                              C:\Windows\system32\Ilknfn32.exe
                              14⤵
                              • Adds autorun key to be loaded by Explorer.exe on startup
                              • Executes dropped EXE
                              • Loads dropped DLL
                              • Drops file in System32 directory
                              • Modifies registry class
                              • Suspicious use of WriteProcessMemory
                              PID:780
                              • C:\Windows\SysWOW64\Ioijbj32.exe
                                C:\Windows\system32\Ioijbj32.exe
                                15⤵
                                • Adds autorun key to be loaded by Explorer.exe on startup
                                • Executes dropped EXE
                                • Loads dropped DLL
                                • Drops file in System32 directory
                                • Modifies registry class
                                • Suspicious use of WriteProcessMemory
                                PID:2736
                                • C:\Windows\SysWOW64\Iagfoe32.exe
                                  C:\Windows\system32\Iagfoe32.exe
                                  16⤵
                                  • Executes dropped EXE
                                  • Suspicious use of WriteProcessMemory
                                  PID:2708
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -u -p 2708 -s 140
                                    17⤵
                                    • Loads dropped DLL
                                    • Program crash
                                    PID:2856

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\Hejoiedd.exe

          Filesize

          64KB

          MD5

          e6b720819205bbde2e3c5c59cec9271b

          SHA1

          c4fd7f5bed99e0ca494072110136f09750a3db87

          SHA256

          4e94a0bcd660c25adf77ffca94b0a1468606aa9d3cca14c8b9fccb717aae2065

          SHA512

          791cec8d0c8683c715c8a63dfc61d14fc8f2be0b7ade025cc5a81576f2261e4b07e9b44931c89c78e58bc89d5fc786713ba357b3693ba4feed97a77873e403c0

        • C:\Windows\SysWOW64\Hhmepp32.exe

          Filesize

          64KB

          MD5

          2dc6b4935097ec4253541fe136cb290b

          SHA1

          82fb2b9e70b1498af7c3b7db5f67686e62da4ef4

          SHA256

          e371e99eb6fca5f3bc666ae9f816795ee9c1b756baf042d657a291ccf30f0433

          SHA512

          523bd5fd1a4637eb00f52c5d187f2dfb7797aa51f297cd158a143041c70c64b1707f2fa7cc48a0d9bf5a88374e89cadeda83ca1e047814cf49dd5f2a989cb0da

        • C:\Windows\SysWOW64\Hlakpp32.exe

          Filesize

          64KB

          MD5

          efdcac2a35003a14cbf01e6c521f8e5a

          SHA1

          64e928379faaf5bc042d8e6fd646e96f5f49080c

          SHA256

          4c8e0a8f4184df059f7ec42be73a57f3e7cffb15c7559bed527b16bda954388d

          SHA512

          7426841240a4cc6c783d4f01a7c5b16ca5916ee16a8c7ef39a8dcfa41cfc902314dc64280081b86bd32b94612969f4e18d547383980b46123d5358c32a61c6c0

        • C:\Windows\SysWOW64\Hogmmjfo.exe

          Filesize

          64KB

          MD5

          2c2bcf147a306dc399b512d3be2f1a30

          SHA1

          a10e3d9cee88cecebc2fe92d0946a8af7231a427

          SHA256

          5d944dbdb6237ecdd3c4fc14f0a9a565d3354da7fa30372ac5499eede82cbcf7

          SHA512

          6f7bc9f049f0ecbc4f99909c14a2aa038e13445d2a3c820f98f06ddd2410294de3782f61c01750221450119a0b97ffc90087918d2c9ceb69cc83bb4b58a956d3

        • C:\Windows\SysWOW64\Ioijbj32.exe

          Filesize

          64KB

          MD5

          4b5df43249a6914acf6cb6a40d6ba08e

          SHA1

          88ae64a74767a7bbcc49175b0b47dd2d23185863

          SHA256

          afcbcc7cce6b0f80f94c4f87609d7eeb38a062aaa3e00b3bbd3f8b4ac0e8594e

          SHA512

          251b0ac7eea1bbf57967480368fbd4a57f44106de287fc5b9031ce14cc56f064243c3466f37bc688199537ba04eb5b0380a2fb0fa7c4efe8fe2be46e49acfe33

        • \Windows\SysWOW64\Hacmcfge.exe

          Filesize

          64KB

          MD5

          d3b237a23698919030d3fba4b8023bcc

          SHA1

          5e1dbeb39bfc438eece5d81c8e31c63c0c40d423

          SHA256

          0f742ee039da07ad99eec975bf132a3cde5a6e401e0876bfe14febc9d18d8b11

          SHA512

          a98940432810a04e0239f90cd35f192064bcd4879d4bf2d04b30a711eae823cf0a5efaf9d7e2c100d8b57967dcfa8a0603113ddf391ea8516b5886b45c14d286

        • \Windows\SysWOW64\Hckcmjep.exe

          Filesize

          64KB

          MD5

          21e3bc7df85a05d6d174ad139476895d

          SHA1

          f36dc1f4b863abb22c135a6cfcfd46a687b44a88

          SHA256

          062bff07312af363e4103feaffe68c632e3fb10a4947205d0c34e31056ca6d68

          SHA512

          e36bca84ca272bbf730de50f110554a3d8a5e2e27e0cc1d5c01668c54b290b1f08c0a82b5a88659db16f81786368edd98a56d80215f2732834838b842a2db57c

        • \Windows\SysWOW64\Hgbebiao.exe

          Filesize

          64KB

          MD5

          5570e6e17f8ec9bd1ecd73777dbc100e

          SHA1

          c6c0ba03a51c86beb507d3c2deae3fa5f3035f78

          SHA256

          cd4bea0e27dc3bb5d77ad5a3ad238eaf0afcb8a335c0f0f8936428cdce9b6702

          SHA512

          4f78da6fa7932f4ced6b3bf149291c141d7632782f3d37bed6672b0fa08769744cc0bab3fbc2139019e0e657ed443aa7d1ff8e794fef2f375058b178b20aaee4

        • \Windows\SysWOW64\Hgilchkf.exe

          Filesize

          64KB

          MD5

          5926056e70ff628c4b35214fc4ae1079

          SHA1

          290d6d391a09d7a08d509abd71796f6cdb10624c

          SHA256

          f12728ff9a5082eb424f172ee338015f709196de2dfa60efadd975b64a2d06ff

          SHA512

          e913acbfb6cdfd747ec94b98ebf1557879804e592a74c23c976ea2ba934f540442598e44a5b4282b5ee9151ed6e9fa7f73c7d83040a31cfac9e8886539c3fc13

        • \Windows\SysWOW64\Hhjhkq32.exe

          Filesize

          64KB

          MD5

          8d7a58e1b1a482334b75365b78de6eb9

          SHA1

          b1572912e676251517cc2166ac2915f993c2419c

          SHA256

          4d5eb01f8f0e76675c1b5a8225ae92c369063c25fbea978a65c113a1b773a2f7

          SHA512

          c417a965864e826700a484f3527ca17b85fc5203e04bb868b5b83b18edec222ab8bf859d50d8506e435f19ea9f8fdd498dc564b1ed577426ffaab7cf790d8cf0

        • \Windows\SysWOW64\Hkpnhgge.exe

          Filesize

          64KB

          MD5

          1c9b9cd4bc2023bb34a975684a225cbe

          SHA1

          f9ad7a0f8c1d1366d659c1719a59954dabc7a0c8

          SHA256

          7b0344f34f856cc90441408cb61d9d02248379b53f11cbfda4c4fce3c6355171

          SHA512

          1ff3a29eb6b88311932bb6ab424f3b11baa4d76cc4751df387fe9d51419a986d8511d404fb27c2a8f56c8099fc151e119c420512c28fef96f69dd49a9939376f

        • \Windows\SysWOW64\Hlcgeo32.exe

          Filesize

          64KB

          MD5

          27d9da684661fcf746d031470a65abde

          SHA1

          c8cbb1bb3b9bbb44671dfb157fdeff89d48df3e1

          SHA256

          5df288cfb07fe5ff324289c158f5501873dfe7ec7ae5f203e05203497bb5cfff

          SHA512

          e4506f6f84ecb28088717d85238285aa37d967aa5a63b8ae7b792b68cad75ba055069c53e870893e32abc78d5e3186d74b40b712b963fb04ccb74d5980c5b458

        • \Windows\SysWOW64\Iagfoe32.exe

          Filesize

          64KB

          MD5

          3bfdc5cd6db772084968c28b7556b56f

          SHA1

          6e3f27fe7d5a56dfe3b9d9cf96b5a02cd7d4294d

          SHA256

          73d21a4cd2fed386df0c5069130c52ab50b51a1894a7769a1d35db1cdcfcc1f5

          SHA512

          442570485de29184df6ed0d0a3c32b2c02f784f97b66d7d0b57dc62a550ba9c8e73f9cc274614cac860e34ec73861994eae2961dd9a243ad763eb878e750c3e9

        • \Windows\SysWOW64\Idceea32.exe

          Filesize

          64KB

          MD5

          5b272ad0267d22abcbf4351ae345ff88

          SHA1

          30d919fbaf77d17598032c47a24c040f70859b36

          SHA256

          6c0ef3a2e99509beac3328b5094a22ce18ef1d0f78228823697b55d1c5c8ff3f

          SHA512

          064b509ed0058f9d14328c81cfc69137a25459771df7d95ed62dca79309ac3977ebefd0cbfd1b65ce152b91a8645b3803ee71ded0435ea43e997830dabd3db94

        • \Windows\SysWOW64\Ilknfn32.exe

          Filesize

          64KB

          MD5

          b2cd90bbe614702884e8cff6632d03e3

          SHA1

          34e0a7336a17aba22f44c7cac94ab279587b8ec8

          SHA256

          25302cf39cb4ddc9392ea062252e3412a2214a006c2a316d0d43ec465e5ecb59

          SHA512

          c4efcf1f9c9933bd78bb556731d0d328224ac0fd8b36893d77e3fbff27b709c407604960a0d8a82081164411f9f63d3178469c55ebccd8935a2f4a368066bffa

        • memory/384-154-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB

        • memory/780-180-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB

        • memory/1416-162-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB

        • memory/1580-127-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB

        • memory/1748-196-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB

        • memory/2128-73-0x0000000000290000-0x00000000002C6000-memory.dmp

          Filesize

          216KB

        • memory/2128-65-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB

        • memory/2128-205-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB

        • memory/2188-4-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB

        • memory/2188-6-0x0000000000250000-0x0000000000286000-memory.dmp

          Filesize

          216KB

        • memory/2296-102-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB

        • memory/2400-52-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB

        • memory/2400-204-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB

        • memory/2480-39-0x0000000000440000-0x0000000000476000-memory.dmp

          Filesize

          216KB

        • memory/2480-202-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB

        • memory/2560-201-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB

        • memory/2560-26-0x0000000000260000-0x0000000000296000-memory.dmp

          Filesize

          216KB

        • memory/2560-20-0x0000000000260000-0x0000000000296000-memory.dmp

          Filesize

          216KB

        • memory/2564-195-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB

        • memory/2708-194-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB

        • memory/2720-141-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB

        • memory/2736-193-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB

        • memory/2800-203-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB