Analysis
-
max time kernel
143s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19-03-2024 05:35
Static task
static1
Behavioral task
behavioral1
Sample
d554a65253eae36f1ada897a88e292be.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d554a65253eae36f1ada897a88e292be.exe
Resource
win10v2004-20240226-en
General
-
Target
d554a65253eae36f1ada897a88e292be.exe
-
Size
488KB
-
MD5
d554a65253eae36f1ada897a88e292be
-
SHA1
4551bf02320d9473d2607de14a275ea4699edb76
-
SHA256
25496bd482fd823bf6dff2b3316072d568341ae64fac9925ef878014a876262d
-
SHA512
5cc1ecc87575f9c0648424883c2db81590ddf8bb3a415266b74e640027d9af124812f17bde211a1b6467b94425a5416326e571f68a0f1124b69360bee558f4aa
-
SSDEEP
6144:WpohNdEcp/64on/TNId/1fon/T9P7GSon/TNId/1fon/T2oI0YokOsfY7Uon2KO:Wp4scp/KNIVyeNIVy2oIvPKiKO
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ebmgcohn.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Emkaol32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Emkaol32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" d554a65253eae36f1ada897a88e292be.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dhnmij32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dlnbeh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dlnbeh32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ebmgcohn.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad d554a65253eae36f1ada897a88e292be.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dhnmij32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eqdajkkb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Eqdajkkb.exe -
Executes dropped EXE 6 IoCs
pid Process 2516 Dhnmij32.exe 2652 Dlnbeh32.exe 2836 Ebmgcohn.exe 2644 Eqdajkkb.exe 2916 Emkaol32.exe 1984 Fkckeh32.exe -
Loads dropped DLL 16 IoCs
pid Process 2236 d554a65253eae36f1ada897a88e292be.exe 2236 d554a65253eae36f1ada897a88e292be.exe 2516 Dhnmij32.exe 2516 Dhnmij32.exe 2652 Dlnbeh32.exe 2652 Dlnbeh32.exe 2836 Ebmgcohn.exe 2836 Ebmgcohn.exe 2644 Eqdajkkb.exe 2644 Eqdajkkb.exe 2916 Emkaol32.exe 2916 Emkaol32.exe 2772 WerFault.exe 2772 WerFault.exe 2772 WerFault.exe 2772 WerFault.exe -
Drops file in System32 directory 18 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Fkckeh32.exe Emkaol32.exe File opened for modification C:\Windows\SysWOW64\Dhnmij32.exe d554a65253eae36f1ada897a88e292be.exe File created C:\Windows\SysWOW64\Nnfbei32.dll Dhnmij32.exe File created C:\Windows\SysWOW64\Eqdajkkb.exe Ebmgcohn.exe File created C:\Windows\SysWOW64\Emkaol32.exe Eqdajkkb.exe File created C:\Windows\SysWOW64\Cgllco32.dll Eqdajkkb.exe File created C:\Windows\SysWOW64\Fkckeh32.exe Emkaol32.exe File created C:\Windows\SysWOW64\Fileil32.dll d554a65253eae36f1ada897a88e292be.exe File created C:\Windows\SysWOW64\Dlnbeh32.exe Dhnmij32.exe File opened for modification C:\Windows\SysWOW64\Ebmgcohn.exe Dlnbeh32.exe File opened for modification C:\Windows\SysWOW64\Emkaol32.exe Eqdajkkb.exe File created C:\Windows\SysWOW64\Dhnmij32.exe d554a65253eae36f1ada897a88e292be.exe File opened for modification C:\Windows\SysWOW64\Dlnbeh32.exe Dhnmij32.exe File created C:\Windows\SysWOW64\Clialdph.dll Dlnbeh32.exe File created C:\Windows\SysWOW64\Ebmgcohn.exe Dlnbeh32.exe File opened for modification C:\Windows\SysWOW64\Eqdajkkb.exe Ebmgcohn.exe File created C:\Windows\SysWOW64\Qffmipmp.dll Ebmgcohn.exe File created C:\Windows\SysWOW64\Clkmne32.dll Emkaol32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2772 1984 WerFault.exe 33 -
Modifies registry class 21 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ebmgcohn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qffmipmp.dll" Ebmgcohn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ebmgcohn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} d554a65253eae36f1ada897a88e292be.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dlnbeh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Clialdph.dll" Dlnbeh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dlnbeh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Emkaol32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID d554a65253eae36f1ada897a88e292be.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dhnmij32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Eqdajkkb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Emkaol32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 d554a65253eae36f1ada897a88e292be.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" d554a65253eae36f1ada897a88e292be.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dhnmij32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Clkmne32.dll" Emkaol32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cgllco32.dll" Eqdajkkb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node d554a65253eae36f1ada897a88e292be.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fileil32.dll" d554a65253eae36f1ada897a88e292be.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nnfbei32.dll" Dhnmij32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Eqdajkkb.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2236 wrote to memory of 2516 2236 d554a65253eae36f1ada897a88e292be.exe 28 PID 2236 wrote to memory of 2516 2236 d554a65253eae36f1ada897a88e292be.exe 28 PID 2236 wrote to memory of 2516 2236 d554a65253eae36f1ada897a88e292be.exe 28 PID 2236 wrote to memory of 2516 2236 d554a65253eae36f1ada897a88e292be.exe 28 PID 2516 wrote to memory of 2652 2516 Dhnmij32.exe 29 PID 2516 wrote to memory of 2652 2516 Dhnmij32.exe 29 PID 2516 wrote to memory of 2652 2516 Dhnmij32.exe 29 PID 2516 wrote to memory of 2652 2516 Dhnmij32.exe 29 PID 2652 wrote to memory of 2836 2652 Dlnbeh32.exe 30 PID 2652 wrote to memory of 2836 2652 Dlnbeh32.exe 30 PID 2652 wrote to memory of 2836 2652 Dlnbeh32.exe 30 PID 2652 wrote to memory of 2836 2652 Dlnbeh32.exe 30 PID 2836 wrote to memory of 2644 2836 Ebmgcohn.exe 31 PID 2836 wrote to memory of 2644 2836 Ebmgcohn.exe 31 PID 2836 wrote to memory of 2644 2836 Ebmgcohn.exe 31 PID 2836 wrote to memory of 2644 2836 Ebmgcohn.exe 31 PID 2644 wrote to memory of 2916 2644 Eqdajkkb.exe 32 PID 2644 wrote to memory of 2916 2644 Eqdajkkb.exe 32 PID 2644 wrote to memory of 2916 2644 Eqdajkkb.exe 32 PID 2644 wrote to memory of 2916 2644 Eqdajkkb.exe 32 PID 2916 wrote to memory of 1984 2916 Emkaol32.exe 33 PID 2916 wrote to memory of 1984 2916 Emkaol32.exe 33 PID 2916 wrote to memory of 1984 2916 Emkaol32.exe 33 PID 2916 wrote to memory of 1984 2916 Emkaol32.exe 33 PID 1984 wrote to memory of 2772 1984 Fkckeh32.exe 34 PID 1984 wrote to memory of 2772 1984 Fkckeh32.exe 34 PID 1984 wrote to memory of 2772 1984 Fkckeh32.exe 34 PID 1984 wrote to memory of 2772 1984 Fkckeh32.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\d554a65253eae36f1ada897a88e292be.exe"C:\Users\Admin\AppData\Local\Temp\d554a65253eae36f1ada897a88e292be.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\SysWOW64\Dhnmij32.exeC:\Windows\system32\Dhnmij32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Windows\SysWOW64\Dlnbeh32.exeC:\Windows\system32\Dlnbeh32.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\SysWOW64\Ebmgcohn.exeC:\Windows\system32\Ebmgcohn.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Windows\SysWOW64\Eqdajkkb.exeC:\Windows\system32\Eqdajkkb.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\SysWOW64\Emkaol32.exeC:\Windows\system32\Emkaol32.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Windows\SysWOW64\Fkckeh32.exeC:\Windows\system32\Fkckeh32.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1984 -s 1408⤵
- Loads dropped DLL
- Program crash
PID:2772
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
320KB
MD5a0de74a43d0f69a5ee89278d28a1d5a5
SHA15ed605eafa2b4c12f266cffffd54dd6c28d34762
SHA256cf98aa9c58f306ea2424a7a3d5d61226c18f6401b79c9864a531f720110ce2c9
SHA51253484f93a7523e5208942692037aab633d28f4f3ab809a88da3216d5c9aad7c9ad3c967654b8722f128a9aa83d327de1900209717e9913a278821fecd40dd9e9
-
Filesize
488KB
MD58470fcc5f28b87d8e3ffd58bb191be3f
SHA130710660ae6f19429fd197522a1596e18254093a
SHA2569fabafe6d5d2e26d00f02b14d56292ab8528112c66e125dc57770d0a8f8dd72f
SHA5126ef0e78738e78abed35534702dd9a56813a52d5dd7833608cb2126b1516443c3a60d5fe2ca61fe7a28b8f42a21a20e45e9e0b149315e447b3e7d4a9ca4a34d6a
-
Filesize
448KB
MD503e4071bdc2b116ce79d952a7982520c
SHA1ec3e474866fe7da3c6428430444beeb7caa0c951
SHA2567c1722fa6b38e1aaeb0a44a8bcb10082ee83240488257bba7c5843557c8e306a
SHA512bd741783c096e4e5ba889659b604123be8f0f108c5768e15b60501ebc9971b3fcf1be4fce59fd2004d7fed9f85f2c7b8e623f22736f26617f239441aaad0a660
-
Filesize
384KB
MD54a0bcb644037faf57ded8d408f6253f5
SHA1876904c8e7e8e650651b92b2c5519ea85fdfced9
SHA2568d8649bdf64fddd160f90a7c70ac3a7588d3fd743565a8e0c730a8b0afa1a248
SHA512e84bc296f884b997fbac49bf07f1bdc1f748527e520d1499fe81544f65f4b3d205ad2d1015d66ed03ccd6f9d7f33169904d92e88e03cb127de71615940d3f873
-
Filesize
488KB
MD57404a8d5341821307b1564508c0f6965
SHA1f97882f389fa6ba98850fad5d0fe9f0f05927b82
SHA25606b6d3190e2431cf9ac95cd1c66134072e4c03c36bb3328a31606b028ccc0996
SHA512d8c3cbdda75feb6c06da9e3d63001f5077c2d2f9b637977b4c48eb2ef3ba96d091d90ed4f0a856390d8e8cca5ab345ceef03eb876bbdd8c99d9c1bc6ef22aaba
-
Filesize
488KB
MD586b532bdb2ea0fadf8d079d2a4901e61
SHA1304fb3c8bb770450eb6438b70760ad06d4d7338e
SHA256e86af45705589acc4b06e09e15c282608d0bf6c6be3b1fc53adb397aa4b700f1
SHA5124aff5b7f1f91e14d40ff69dc45f6aefdbd0f9454a8af7301b8dbdf65f045769dc6abc21375616ab6be4eff3fb0ce64e608629c8fb8418f08854b4ce5e5d8be4c
-
Filesize
488KB
MD5c8cca46221ef2630e9102feb81f2588d
SHA14fcc2f495489c3d8275f9ff6dd76535d0adad15c
SHA2564aedc30875bf7f5614728eef4bd136cf7ee2662e885eaccf6b14ee1a06b87ea7
SHA512c3232657669da57483cd5e9e741a52806f7205a41bd84f21a9b1ca03a971e6049e823452fcf8be43e984e5ebc0d066990548b3f4c03d995d21ad96deac7a12f3
-
Filesize
488KB
MD5b337b81709be1caf3a1c1be4c26b94e6
SHA10ba063c38d8f26e7a3e8c91179496f9d534a83d1
SHA25614a6d0cf4f3d7ca0e338ac4db780f21162011eb0ab2c15b2a83c068a942676c0
SHA5129f5a878c7d7d15c75d7c2b6216d18b7c33cd4c78fb64c755c34d7dc8c59ff23b477e419db7c6ef51bb442b0dd41ab57dbd1e2e79213df956f42199b09f889922
-
Filesize
488KB
MD584cfe907cae1ed7bc1158e12ff9ce0c5
SHA1548fb8e1f872d2ba5d382c568b74e86e8684e6c1
SHA2569752b46411fc93c21fd6eac187b1d8e909650421bd32f63f75a3fff4119de2bf
SHA512b78e099f65ffda3ed2db6d98f1a96ba220284f61e249ac96df1619ac5042099117ae11392ea0dcca2f266450abb5e19a067670a51d09551274ef8f77bb165828