Analysis

  • max time kernel
    143s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    19-03-2024 05:35

General

  • Target

    d554a65253eae36f1ada897a88e292be.exe

  • Size

    488KB

  • MD5

    d554a65253eae36f1ada897a88e292be

  • SHA1

    4551bf02320d9473d2607de14a275ea4699edb76

  • SHA256

    25496bd482fd823bf6dff2b3316072d568341ae64fac9925ef878014a876262d

  • SHA512

    5cc1ecc87575f9c0648424883c2db81590ddf8bb3a415266b74e640027d9af124812f17bde211a1b6467b94425a5416326e571f68a0f1124b69360bee558f4aa

  • SSDEEP

    6144:WpohNdEcp/64on/TNId/1fon/T9P7GSon/TNId/1fon/T2oI0YokOsfY7Uon2KO:Wp4scp/KNIVyeNIVy2oIvPKiKO

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 12 IoCs
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 16 IoCs
  • Drops file in System32 directory 18 IoCs
  • Program crash 1 IoCs
  • Modifies registry class 21 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d554a65253eae36f1ada897a88e292be.exe
    "C:\Users\Admin\AppData\Local\Temp\d554a65253eae36f1ada897a88e292be.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Loads dropped DLL
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2236
    • C:\Windows\SysWOW64\Dhnmij32.exe
      C:\Windows\system32\Dhnmij32.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2516
      • C:\Windows\SysWOW64\Dlnbeh32.exe
        C:\Windows\system32\Dlnbeh32.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in System32 directory
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2652
        • C:\Windows\SysWOW64\Ebmgcohn.exe
          C:\Windows\system32\Ebmgcohn.exe
          4⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in System32 directory
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:2836
          • C:\Windows\SysWOW64\Eqdajkkb.exe
            C:\Windows\system32\Eqdajkkb.exe
            5⤵
            • Adds autorun key to be loaded by Explorer.exe on startup
            • Executes dropped EXE
            • Loads dropped DLL
            • Drops file in System32 directory
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:2644
            • C:\Windows\SysWOW64\Emkaol32.exe
              C:\Windows\system32\Emkaol32.exe
              6⤵
              • Adds autorun key to be loaded by Explorer.exe on startup
              • Executes dropped EXE
              • Loads dropped DLL
              • Drops file in System32 directory
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:2916
              • C:\Windows\SysWOW64\Fkckeh32.exe
                C:\Windows\system32\Fkckeh32.exe
                7⤵
                • Executes dropped EXE
                • Suspicious use of WriteProcessMemory
                PID:1984
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 1984 -s 140
                  8⤵
                  • Loads dropped DLL
                  • Program crash
                  PID:2772

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\Ebmgcohn.exe

    Filesize

    320KB

    MD5

    a0de74a43d0f69a5ee89278d28a1d5a5

    SHA1

    5ed605eafa2b4c12f266cffffd54dd6c28d34762

    SHA256

    cf98aa9c58f306ea2424a7a3d5d61226c18f6401b79c9864a531f720110ce2c9

    SHA512

    53484f93a7523e5208942692037aab633d28f4f3ab809a88da3216d5c9aad7c9ad3c967654b8722f128a9aa83d327de1900209717e9913a278821fecd40dd9e9

  • C:\Windows\SysWOW64\Emkaol32.exe

    Filesize

    488KB

    MD5

    8470fcc5f28b87d8e3ffd58bb191be3f

    SHA1

    30710660ae6f19429fd197522a1596e18254093a

    SHA256

    9fabafe6d5d2e26d00f02b14d56292ab8528112c66e125dc57770d0a8f8dd72f

    SHA512

    6ef0e78738e78abed35534702dd9a56813a52d5dd7833608cb2126b1516443c3a60d5fe2ca61fe7a28b8f42a21a20e45e9e0b149315e447b3e7d4a9ca4a34d6a

  • C:\Windows\SysWOW64\Eqdajkkb.exe

    Filesize

    448KB

    MD5

    03e4071bdc2b116ce79d952a7982520c

    SHA1

    ec3e474866fe7da3c6428430444beeb7caa0c951

    SHA256

    7c1722fa6b38e1aaeb0a44a8bcb10082ee83240488257bba7c5843557c8e306a

    SHA512

    bd741783c096e4e5ba889659b604123be8f0f108c5768e15b60501ebc9971b3fcf1be4fce59fd2004d7fed9f85f2c7b8e623f22736f26617f239441aaad0a660

  • C:\Windows\SysWOW64\Eqdajkkb.exe

    Filesize

    384KB

    MD5

    4a0bcb644037faf57ded8d408f6253f5

    SHA1

    876904c8e7e8e650651b92b2c5519ea85fdfced9

    SHA256

    8d8649bdf64fddd160f90a7c70ac3a7588d3fd743565a8e0c730a8b0afa1a248

    SHA512

    e84bc296f884b997fbac49bf07f1bdc1f748527e520d1499fe81544f65f4b3d205ad2d1015d66ed03ccd6f9d7f33169904d92e88e03cb127de71615940d3f873

  • C:\Windows\SysWOW64\Fkckeh32.exe

    Filesize

    488KB

    MD5

    7404a8d5341821307b1564508c0f6965

    SHA1

    f97882f389fa6ba98850fad5d0fe9f0f05927b82

    SHA256

    06b6d3190e2431cf9ac95cd1c66134072e4c03c36bb3328a31606b028ccc0996

    SHA512

    d8c3cbdda75feb6c06da9e3d63001f5077c2d2f9b637977b4c48eb2ef3ba96d091d90ed4f0a856390d8e8cca5ab345ceef03eb876bbdd8c99d9c1bc6ef22aaba

  • \Windows\SysWOW64\Dhnmij32.exe

    Filesize

    488KB

    MD5

    86b532bdb2ea0fadf8d079d2a4901e61

    SHA1

    304fb3c8bb770450eb6438b70760ad06d4d7338e

    SHA256

    e86af45705589acc4b06e09e15c282608d0bf6c6be3b1fc53adb397aa4b700f1

    SHA512

    4aff5b7f1f91e14d40ff69dc45f6aefdbd0f9454a8af7301b8dbdf65f045769dc6abc21375616ab6be4eff3fb0ce64e608629c8fb8418f08854b4ce5e5d8be4c

  • \Windows\SysWOW64\Dlnbeh32.exe

    Filesize

    488KB

    MD5

    c8cca46221ef2630e9102feb81f2588d

    SHA1

    4fcc2f495489c3d8275f9ff6dd76535d0adad15c

    SHA256

    4aedc30875bf7f5614728eef4bd136cf7ee2662e885eaccf6b14ee1a06b87ea7

    SHA512

    c3232657669da57483cd5e9e741a52806f7205a41bd84f21a9b1ca03a971e6049e823452fcf8be43e984e5ebc0d066990548b3f4c03d995d21ad96deac7a12f3

  • \Windows\SysWOW64\Ebmgcohn.exe

    Filesize

    488KB

    MD5

    b337b81709be1caf3a1c1be4c26b94e6

    SHA1

    0ba063c38d8f26e7a3e8c91179496f9d534a83d1

    SHA256

    14a6d0cf4f3d7ca0e338ac4db780f21162011eb0ab2c15b2a83c068a942676c0

    SHA512

    9f5a878c7d7d15c75d7c2b6216d18b7c33cd4c78fb64c755c34d7dc8c59ff23b477e419db7c6ef51bb442b0dd41ab57dbd1e2e79213df956f42199b09f889922

  • \Windows\SysWOW64\Eqdajkkb.exe

    Filesize

    488KB

    MD5

    84cfe907cae1ed7bc1158e12ff9ce0c5

    SHA1

    548fb8e1f872d2ba5d382c568b74e86e8684e6c1

    SHA256

    9752b46411fc93c21fd6eac187b1d8e909650421bd32f63f75a3fff4119de2bf

    SHA512

    b78e099f65ffda3ed2db6d98f1a96ba220284f61e249ac96df1619ac5042099117ae11392ea0dcca2f266450abb5e19a067670a51d09551274ef8f77bb165828

  • memory/1984-83-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/1984-94-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2236-12-0x00000000005D0000-0x0000000000603000-memory.dmp

    Filesize

    204KB

  • memory/2236-88-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2236-0-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2236-6-0x00000000005D0000-0x0000000000603000-memory.dmp

    Filesize

    204KB

  • memory/2516-32-0x0000000000250000-0x0000000000283000-memory.dmp

    Filesize

    204KB

  • memory/2516-19-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2644-68-0x00000000003A0000-0x00000000003D3000-memory.dmp

    Filesize

    204KB

  • memory/2644-56-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2644-92-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2652-35-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2836-41-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2836-54-0x00000000003A0000-0x00000000003D3000-memory.dmp

    Filesize

    204KB

  • memory/2836-91-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2916-73-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2916-77-0x00000000003C0000-0x00000000003F3000-memory.dmp

    Filesize

    204KB

  • memory/2916-93-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB