Analysis

  • max time kernel
    95s
  • max time network
    97s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/03/2024, 00:18

General

  • Target

    be8f5da78630702e382e60faf693d6bb949667a9092b7b605ce64e78aa338db8.exe

  • Size

    64KB

  • MD5

    be73af6d344e6e5f8445fc1833c87404

  • SHA1

    7668660d38ae133887a5b94111daa3fe73d48bc5

  • SHA256

    be8f5da78630702e382e60faf693d6bb949667a9092b7b605ce64e78aa338db8

  • SHA512

    105a8f319d8a3a9744eabda245a2fedc85ba382894e1d6593ec84b317882cdafcf78c17ee2c29476bc25b9c59b0079cbb5053af21494dbcf2d956e6c80b07b5f

  • SSDEEP

    768:DCWjdRMxLu1hdNVL8I8NH3MlNAt+yezYdQBMFtxZV1DzCFBo2EF191ieDxuHH2pm:DCWAChrQeBNE/XiGxX0XhV1iL+iALMH6

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 30 IoCs
  • Executes dropped EXE 15 IoCs
  • Drops file in System32 directory 45 IoCs
  • Program crash 1 IoCs
  • Modifies registry class 48 IoCs
  • Suspicious use of WriteProcessMemory 45 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\be8f5da78630702e382e60faf693d6bb949667a9092b7b605ce64e78aa338db8.exe
    "C:\Users\Admin\AppData\Local\Temp\be8f5da78630702e382e60faf693d6bb949667a9092b7b605ce64e78aa338db8.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1780
    • C:\Windows\SysWOW64\Ngpjnkpf.exe
      C:\Windows\system32\Ngpjnkpf.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:632
      • C:\Windows\SysWOW64\Njogjfoj.exe
        C:\Windows\system32\Njogjfoj.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Drops file in System32 directory
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2288
        • C:\Windows\SysWOW64\Nafokcol.exe
          C:\Windows\system32\Nafokcol.exe
          4⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Drops file in System32 directory
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:3064
          • C:\Windows\SysWOW64\Nddkgonp.exe
            C:\Windows\system32\Nddkgonp.exe
            5⤵
            • Adds autorun key to be loaded by Explorer.exe on startup
            • Executes dropped EXE
            • Drops file in System32 directory
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:2988
            • C:\Windows\SysWOW64\Ngcgcjnc.exe
              C:\Windows\system32\Ngcgcjnc.exe
              6⤵
              • Adds autorun key to be loaded by Explorer.exe on startup
              • Executes dropped EXE
              • Drops file in System32 directory
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:536
              • C:\Windows\SysWOW64\Nkncdifl.exe
                C:\Windows\system32\Nkncdifl.exe
                7⤵
                • Adds autorun key to be loaded by Explorer.exe on startup
                • Executes dropped EXE
                • Drops file in System32 directory
                • Modifies registry class
                • Suspicious use of WriteProcessMemory
                PID:1356
                • C:\Windows\SysWOW64\Nnmopdep.exe
                  C:\Windows\system32\Nnmopdep.exe
                  8⤵
                  • Adds autorun key to be loaded by Explorer.exe on startup
                  • Executes dropped EXE
                  • Drops file in System32 directory
                  • Modifies registry class
                  • Suspicious use of WriteProcessMemory
                  PID:4100
                  • C:\Windows\SysWOW64\Nbhkac32.exe
                    C:\Windows\system32\Nbhkac32.exe
                    9⤵
                    • Adds autorun key to be loaded by Explorer.exe on startup
                    • Executes dropped EXE
                    • Drops file in System32 directory
                    • Modifies registry class
                    • Suspicious use of WriteProcessMemory
                    PID:2992
                    • C:\Windows\SysWOW64\Ndghmo32.exe
                      C:\Windows\system32\Ndghmo32.exe
                      10⤵
                      • Adds autorun key to be loaded by Explorer.exe on startup
                      • Executes dropped EXE
                      • Drops file in System32 directory
                      • Modifies registry class
                      • Suspicious use of WriteProcessMemory
                      PID:2768
                      • C:\Windows\SysWOW64\Ncihikcg.exe
                        C:\Windows\system32\Ncihikcg.exe
                        11⤵
                        • Adds autorun key to be loaded by Explorer.exe on startup
                        • Executes dropped EXE
                        • Drops file in System32 directory
                        • Modifies registry class
                        • Suspicious use of WriteProcessMemory
                        PID:3088
                        • C:\Windows\SysWOW64\Nkqpjidj.exe
                          C:\Windows\system32\Nkqpjidj.exe
                          12⤵
                          • Adds autorun key to be loaded by Explorer.exe on startup
                          • Executes dropped EXE
                          • Drops file in System32 directory
                          • Modifies registry class
                          • Suspicious use of WriteProcessMemory
                          PID:1908
                          • C:\Windows\SysWOW64\Nnolfdcn.exe
                            C:\Windows\system32\Nnolfdcn.exe
                            13⤵
                            • Adds autorun key to be loaded by Explorer.exe on startup
                            • Executes dropped EXE
                            • Drops file in System32 directory
                            • Modifies registry class
                            • Suspicious use of WriteProcessMemory
                            PID:4916
                            • C:\Windows\SysWOW64\Nqmhbpba.exe
                              C:\Windows\system32\Nqmhbpba.exe
                              14⤵
                              • Adds autorun key to be loaded by Explorer.exe on startup
                              • Executes dropped EXE
                              • Drops file in System32 directory
                              • Modifies registry class
                              • Suspicious use of WriteProcessMemory
                              PID:2308
                              • C:\Windows\SysWOW64\Ndidbn32.exe
                                C:\Windows\system32\Ndidbn32.exe
                                15⤵
                                • Adds autorun key to be loaded by Explorer.exe on startup
                                • Executes dropped EXE
                                • Drops file in System32 directory
                                • Modifies registry class
                                • Suspicious use of WriteProcessMemory
                                PID:4764
                                • C:\Windows\SysWOW64\Nkcmohbg.exe
                                  C:\Windows\system32\Nkcmohbg.exe
                                  16⤵
                                  • Executes dropped EXE
                                  PID:2812
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -u -p 2812 -s 404
                                    17⤵
                                    • Program crash
                                    PID:1712
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2812 -ip 2812
    1⤵
      PID:4724

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Windows\SysWOW64\Nafokcol.exe

            Filesize

            64KB

            MD5

            96dc4349c1a66a2cb5a75b0e3c10b893

            SHA1

            1115d01843510aabada4874f7a9b52c7375e7efc

            SHA256

            582b142964f310d7514c6a34807589f11639274c7a425a1564b33e973a18576c

            SHA512

            ea016f1695d5be3f60c928142700fcd6b4fb88e9b80e002558eb9498528b7e06cb8592cb3c729dd74a34aad0ee492e6927ab126a9f3c6893284172826d4f0831

          • C:\Windows\SysWOW64\Nbhkac32.exe

            Filesize

            64KB

            MD5

            60ed03d3efcdaa27612e7da6a4bd5a36

            SHA1

            46261c7015e32c765d5d25318110fdd60ed2c4fc

            SHA256

            e40293b8582b26f3c6038d4a682b9eba1571e0da9d15663ecf72eea09eecee2b

            SHA512

            53fc8efe1668c4a87d9e557e173520e301e0cee97b90852963485d94f23f62869ce008ced4c048a42d6c2ae70e5aeaf49dc6c6ae86b1ba908a9baf5fcb4ae5bd

          • C:\Windows\SysWOW64\Ncihikcg.exe

            Filesize

            64KB

            MD5

            4970e11a404a97bee1d5bb1803d38c94

            SHA1

            b3edd54c88536c4437f4b944a8f5a80ae1b67cb9

            SHA256

            7105d1b62950d41a8de72ff978bed155f7a28d72aae73f8f147383005c384832

            SHA512

            840ed338f2964554dfd8b6b7d68cf6df7316ca409eb16d17505bb3946c1f74fc086b8ec3310ec2aee45a2e4e87e02a94dadc8621e25a6bbf6e337d484eb076a4

          • C:\Windows\SysWOW64\Nddkgonp.exe

            Filesize

            62KB

            MD5

            bdc5ca5c4b14a31efbd83e1478bb4c91

            SHA1

            c401383c74709085b1ef04214d3ffd20de35ba02

            SHA256

            8c0da6e712b83dc01467026c2173f16a796f0ed51e3f02036716074235ffc8c7

            SHA512

            48260186b933eaf27b9765702a168c7125271a3b717aa7e2c3bc0019d9e73896df0ce7e52062f0845a378c245d9684858aadf28e8acf2c258c28107c79eea2f4

          • C:\Windows\SysWOW64\Nddkgonp.exe

            Filesize

            64KB

            MD5

            2aa7d44965bc0334bb7aca83cceb282f

            SHA1

            db0b43b2d73fb049efba989425aac2b2a458d4ca

            SHA256

            b936c3533789c7adba67dcad4ecd432f8a62decd8f1276458de99b0741e33e30

            SHA512

            69ab8964ddc062b93dc0c61df172fe587f5d0e6da42305124baf75ae10d895a52126d1b08a796fe3257aa8ab7de1c97a70e792df80495de7c014edfcbd9e57f2

          • C:\Windows\SysWOW64\Ndghmo32.exe

            Filesize

            64KB

            MD5

            7948bbfe6155b418e69064ef18e460c9

            SHA1

            027a19876384cf53d1c83a28d828339c4ccddc59

            SHA256

            3f3f3f2281a1b6e05f7d8f72d193bcedda10b6887bbb3f8c0d9ad063bfc186ab

            SHA512

            7b4231982ee471301969d0106bd971b1e26f00167c51ee7ea07f49c9e2d9472122ccfb8c2adc88ddfef4e6536ba5fb1752e2799375c6d9a8cd3a30c0fc094421

          • C:\Windows\SysWOW64\Ndidbn32.exe

            Filesize

            64KB

            MD5

            a72d81f39e111d832aa6a567403289f1

            SHA1

            8aa4663358be2faf1b5b26a9f34bce97f43f11b3

            SHA256

            aa2c3915052ee65f736a3a43a36ee93f22865e05fa8516233d6af729d53d0fc6

            SHA512

            c37e3da5c797a5f6937401374598a1422a9bbc45f119aa8fd6c89c27119ebf755b75cb005c6d15f8c5bb5d19b2d5006ab2313222e493daea3c5e89fdf8007d77

          • C:\Windows\SysWOW64\Ngcgcjnc.exe

            Filesize

            64KB

            MD5

            fec0d7536de9488b1dd3cb0eed9d9dad

            SHA1

            ce37a34cde97585af8d937a0bd9b9fc19291fd06

            SHA256

            e62ac43cea047f555e68d9445ed40dee34d8d2408000f16a1c67bd37677867d3

            SHA512

            6772c5e8ee767cb84529235ace26d653ff2b4803c0354804f761fe1b92ab5481f2cc35d64ba730078a74cb4e319321709f0041fa34d082082705785049748d4a

          • C:\Windows\SysWOW64\Ngpjnkpf.exe

            Filesize

            64KB

            MD5

            0fd08fd44740bb013a55da11ccab2594

            SHA1

            d0038d2f1857a940f52f01a937d9051c528f6681

            SHA256

            2d4ad47afdbe26eba8b611abe86ce34c80f6ca2f46bbc35294aa70fe9d6e366f

            SHA512

            9586ca813a2502a03c3a5f2b050b3cc84c382c1d0347fd136edb17405895eff988d471a4e4561610f4f2dcfa03af424c63beb0794c8f55cbee5e124463a30bb0

          • C:\Windows\SysWOW64\Njogjfoj.exe

            Filesize

            64KB

            MD5

            bfa5aa8bde972f9209a33f589162f0e6

            SHA1

            eb03367e680b029805748d29dbd77e73809fe7be

            SHA256

            47cba7ea27ca7965f982fd7a47456d74a928d14bb10f5ba566690fd5c3f36b06

            SHA512

            2a659ba4c422722916e66361a539bc7929c067ab9c8617c7c8c414bd5ddc28d190ec81c9139adfe1c6cf06553813a0b68ca2b88a03b9c4ae9b6e14e1ab2a9e77

          • C:\Windows\SysWOW64\Nkcmohbg.exe

            Filesize

            64KB

            MD5

            79a6117c304e10e309f4b25118484e86

            SHA1

            a0bc4f9db27785e83ef321e098378e03a63acac1

            SHA256

            e95835509433bc129f005aad811471bca1806378241ecad2ea4e2903d199d50e

            SHA512

            a261c3acf77cdea66b818fcf92bc2e3a9b3c358c8c43634ac9a7fb1f1b866fe6ca4aab5cb037dd3da5f7855c828759632de9d7774948110b1b6d132e88c38f81

          • C:\Windows\SysWOW64\Nkncdifl.exe

            Filesize

            64KB

            MD5

            bf844ed38b2c4cf3e07895c37a9d2485

            SHA1

            a574bdb86cf27184ee8f83ad0b3315a62bd75808

            SHA256

            ffb9c1da0e1caf0ba46016c6704b53b183034f410d27cdafddfb2bf720f1a46a

            SHA512

            2b9073ba167dafc65c586ff20a8a6ef8b285c7a747d0605f269554f37bf67e379518d906efac08548d61be3931346747f77d20accdb514172a4d82933d178234

          • C:\Windows\SysWOW64\Nkqpjidj.exe

            Filesize

            64KB

            MD5

            44762895773615f70c3e6988cc6df8b4

            SHA1

            bf7a2ba1c35b54d905dc7c62889d0cea96c5b98a

            SHA256

            cfab649b73d13e531bf790dd60717a098bc033de7b55813cd12212641743d13f

            SHA512

            d2b3085ea35276577b114d7b97845f99d5541371e38e20ef0fbcbdf44fafcd0eb11a474d048e8bed070c61b810892889b9e7d80e21c8a48df4618bba32390648

          • C:\Windows\SysWOW64\Nnmopdep.exe

            Filesize

            64KB

            MD5

            376e87283d769f98f1dd034b2b54e26e

            SHA1

            a5e44452c34445bb71a96ef3489267d3c1b3e8b3

            SHA256

            b5abeaf9c89744b0e14c5060fdfa51e994f8bda6f727aba02e9741683579eec6

            SHA512

            4ad188e20a3e28f8819b009ac537c35655ac164ec7cc61d458aa70767fc6d919a1d47d05eb6ec5fdc1cf6d29fa29756aa80907b6af55f24c207f55d2606956a1

          • C:\Windows\SysWOW64\Nnolfdcn.exe

            Filesize

            64KB

            MD5

            d078fd8a7df882ebee01dcc64e5130d8

            SHA1

            6754422124c9efb92a1053aaa99308e793a9bf6b

            SHA256

            41d263481422d5cba2aa17f6cea97ce95fac69ed7e76315b03807bc071f8ff9f

            SHA512

            285e5a25cc00225b1138c7c241d160e71ade5edc968d44f7fe3ff9f53e5f15fd33a832a949bf8abf0114d5b7f0cd6b2e29401f10fadcff2903dd218306a6984a

          • C:\Windows\SysWOW64\Nqmhbpba.exe

            Filesize

            64KB

            MD5

            73034648c613deb6b592b31c11f10faa

            SHA1

            1c15d80ddde6167be5ef4e9151f445ff86ee5fae

            SHA256

            4efd620bb39ee7470617bab6f76ba55270a9f18872db489fdad2524191d3d783

            SHA512

            72e9f6d04c0bb6b7ab9c3f04a87dd73ce42f9b36dfd4b4eae08fb850b67d52640278e4c8b15699a8c86e9fdcee614cb2f041abbb150d9ffed15b7de6c03875a9

          • memory/536-131-0x0000000000400000-0x0000000000436000-memory.dmp

            Filesize

            216KB

          • memory/536-45-0x0000000000400000-0x0000000000436000-memory.dmp

            Filesize

            216KB

          • memory/632-9-0x0000000000400000-0x0000000000436000-memory.dmp

            Filesize

            216KB

          • memory/632-136-0x0000000000400000-0x0000000000436000-memory.dmp

            Filesize

            216KB

          • memory/1356-49-0x0000000000400000-0x0000000000436000-memory.dmp

            Filesize

            216KB

          • memory/1356-132-0x0000000000400000-0x0000000000436000-memory.dmp

            Filesize

            216KB

          • memory/1780-0-0x0000000000400000-0x0000000000436000-memory.dmp

            Filesize

            216KB

          • memory/1780-5-0x0000000000400000-0x0000000000436000-memory.dmp

            Filesize

            216KB

          • memory/1908-88-0x0000000000400000-0x0000000000436000-memory.dmp

            Filesize

            216KB

          • memory/1908-126-0x0000000000400000-0x0000000000436000-memory.dmp

            Filesize

            216KB

          • memory/2288-135-0x0000000000400000-0x0000000000436000-memory.dmp

            Filesize

            216KB

          • memory/2288-17-0x0000000000400000-0x0000000000436000-memory.dmp

            Filesize

            216KB

          • memory/2308-124-0x0000000000400000-0x0000000000436000-memory.dmp

            Filesize

            216KB

          • memory/2308-105-0x0000000000400000-0x0000000000436000-memory.dmp

            Filesize

            216KB

          • memory/2768-72-0x0000000000400000-0x0000000000436000-memory.dmp

            Filesize

            216KB

          • memory/2768-128-0x0000000000400000-0x0000000000436000-memory.dmp

            Filesize

            216KB

          • memory/2812-122-0x0000000000400000-0x0000000000436000-memory.dmp

            Filesize

            216KB

          • memory/2812-121-0x0000000000400000-0x0000000000436000-memory.dmp

            Filesize

            216KB

          • memory/2988-33-0x0000000000400000-0x0000000000436000-memory.dmp

            Filesize

            216KB

          • memory/2988-134-0x0000000000400000-0x0000000000436000-memory.dmp

            Filesize

            216KB

          • memory/2992-65-0x0000000000400000-0x0000000000436000-memory.dmp

            Filesize

            216KB

          • memory/2992-130-0x0000000000400000-0x0000000000436000-memory.dmp

            Filesize

            216KB

          • memory/3064-25-0x0000000000400000-0x0000000000436000-memory.dmp

            Filesize

            216KB

          • memory/3064-133-0x0000000000400000-0x0000000000436000-memory.dmp

            Filesize

            216KB

          • memory/3088-127-0x0000000000400000-0x0000000000436000-memory.dmp

            Filesize

            216KB

          • memory/3088-81-0x0000000000400000-0x0000000000436000-memory.dmp

            Filesize

            216KB

          • memory/4100-129-0x0000000000400000-0x0000000000436000-memory.dmp

            Filesize

            216KB

          • memory/4100-61-0x0000000000400000-0x0000000000436000-memory.dmp

            Filesize

            216KB

          • memory/4764-123-0x0000000000400000-0x0000000000436000-memory.dmp

            Filesize

            216KB

          • memory/4764-113-0x0000000000400000-0x0000000000436000-memory.dmp

            Filesize

            216KB

          • memory/4916-125-0x0000000000400000-0x0000000000436000-memory.dmp

            Filesize

            216KB

          • memory/4916-97-0x0000000000400000-0x0000000000436000-memory.dmp

            Filesize

            216KB