Analysis

  • max time kernel
    92s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-03-2024 03:22

General

  • Target

    d7e3b53cf50f6875489ad66919e1d75a8dbbd5a6cb37dbd5d4a5f0fc3cfb8788.exe

  • Size

    760KB

  • MD5

    0f908d49ffe45824b59d062abdeb1116

  • SHA1

    e79653e156755231f5cf621b03b3a2c4a502d119

  • SHA256

    d7e3b53cf50f6875489ad66919e1d75a8dbbd5a6cb37dbd5d4a5f0fc3cfb8788

  • SHA512

    2ffd761927f1aedb0d2b37bbd60d3ec35da65cda1d7ab13744df84f1d1da7cc40dc621a002a98f6d4fd7deb2240b5dcc73453faf024e53ecc227662b75ac7ed4

  • SSDEEP

    12288:We3epU3cOK3NPh2kkkkK4kXkkkkkkkkl888888888888888888nusMH0QiRLsq:R3eGyNPh2kkkkK4kXkkkkkkkkhLx

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 14 IoCs
  • Executes dropped EXE 7 IoCs
  • Drops file in System32 directory 21 IoCs
  • Program crash 1 IoCs
  • Modifies registry class 24 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d7e3b53cf50f6875489ad66919e1d75a8dbbd5a6cb37dbd5d4a5f0fc3cfb8788.exe
    "C:\Users\Admin\AppData\Local\Temp\d7e3b53cf50f6875489ad66919e1d75a8dbbd5a6cb37dbd5d4a5f0fc3cfb8788.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2396
    • C:\Windows\SysWOW64\Nqfbaq32.exe
      C:\Windows\system32\Nqfbaq32.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:1268
      • C:\Windows\SysWOW64\Nceonl32.exe
        C:\Windows\system32\Nceonl32.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Drops file in System32 directory
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:4076
        • C:\Windows\SysWOW64\Nddkgonp.exe
          C:\Windows\system32\Nddkgonp.exe
          4⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Drops file in System32 directory
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:4648
          • C:\Windows\SysWOW64\Ngedij32.exe
            C:\Windows\system32\Ngedij32.exe
            5⤵
            • Adds autorun key to be loaded by Explorer.exe on startup
            • Executes dropped EXE
            • Drops file in System32 directory
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:836
            • C:\Windows\SysWOW64\Njcpee32.exe
              C:\Windows\system32\Njcpee32.exe
              6⤵
              • Adds autorun key to be loaded by Explorer.exe on startup
              • Executes dropped EXE
              • Drops file in System32 directory
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:4684
              • C:\Windows\SysWOW64\Nggqoj32.exe
                C:\Windows\system32\Nggqoj32.exe
                7⤵
                • Adds autorun key to be loaded by Explorer.exe on startup
                • Executes dropped EXE
                • Drops file in System32 directory
                • Modifies registry class
                • Suspicious use of WriteProcessMemory
                PID:4380
                • C:\Windows\SysWOW64\Nkcmohbg.exe
                  C:\Windows\system32\Nkcmohbg.exe
                  8⤵
                  • Executes dropped EXE
                  PID:4100
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 4100 -s 412
                    9⤵
                    • Program crash
                    PID:3184
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4100 -ip 4100
    1⤵
      PID:3452

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\SysWOW64\Ddpfgd32.dll

      Filesize

      7KB

      MD5

      4570e7b1c878299ff398462957717b43

      SHA1

      8e64aac53cc74fe8023414f4028024e5cf9b24e6

      SHA256

      c086fbe258cd5a022c8ec9ba82131f4765032736f79a6d89dea7d82b99ad662d

      SHA512

      909627a5a9462c6f1cce3f75fbb9c1173028a71ae66df44b869917aaa4e54edfb273ab14c9af3ee29e0f0f61f7456277fab0a377c7a95858523c2050464b5b1e

    • C:\Windows\SysWOW64\Nceonl32.exe

      Filesize

      760KB

      MD5

      6ec9875f55237f18bf949503686d5b86

      SHA1

      cea4339e48359a9b185e8c94f24758b893fa3a58

      SHA256

      cb445dbe8a247913af85694497da1582c4cdcec60e14e6304c93cf37e64a29fe

      SHA512

      a3b81460f2b4a0339259cb6b528a776d646366fc6ec6c5da6e004866668fb97b5743d502e740b2d372bb87246c51a26488f0af2f8d92538a321a824e3fee93af

    • C:\Windows\SysWOW64\Nddkgonp.exe

      Filesize

      760KB

      MD5

      715b6e0445826102d101dcf311799a83

      SHA1

      eae63502b430e834807ac4819d402635d29e73a3

      SHA256

      ccc0c14436c360faad40607883d1a96862e60835c95733034108ecda3658283d

      SHA512

      5495b7fb93ff6c8ecd2b306a9032ab612ed2049fc6387d91bda643b6f978d2308eecf3372f82045590b9a4d9fd1fd07ec5b8b80fcaa6aa1ad19cbd365c63809e

    • C:\Windows\SysWOW64\Ngedij32.exe

      Filesize

      760KB

      MD5

      fd09af74ce5d08b2131126cc657494cb

      SHA1

      c905830544204c7dcd452a20d7cbd4f92ce378b0

      SHA256

      4beac5ef67caa81856ef59b2d3f191d5e81e8ced68face5c525798348d284ce0

      SHA512

      8caa3d5c2307e2ea9e51ce4e84065419836c208b68dad90c4698b7a112542231ca8029082f105a0edca9ea61b820dda90c9f383ec0de15430e02c1e6fc09d0de

    • C:\Windows\SysWOW64\Nggqoj32.exe

      Filesize

      760KB

      MD5

      39c15a94ab8e3291feb8f79bfc8c8679

      SHA1

      c13f4767783cbd65bd9701be5fd66617730a7bad

      SHA256

      cff5c84e63116e3c967d1c309946c6f9775ee7985e101c9b81ece55fc188f3b0

      SHA512

      f3edb35fd965379a3960429f1537dbdf8e0bd52764154ad35504441a65744070cfbfdb75c2c46e6ea4f951750bc1d4e54c07a2931ea18cf527ee1b0854a53205

    • C:\Windows\SysWOW64\Njcpee32.exe

      Filesize

      760KB

      MD5

      e5e4b385ffa9b73271d3e57664fd3efd

      SHA1

      b664f8aa086d34edd6479167fb055bce65035c0e

      SHA256

      bb1ac6804dbc97af472db330a4d74c9d302fa5a02c1b58ae39babb81c901ebcd

      SHA512

      e0f0dbfa21ddb3054e39acb90d20dcc183af651a0543673e71e88862652f9c1a01a4c0eaf0edc521cf8938e1a670e2315a7a1bc7dd6bc25ac07ea435fd24a1b8

    • C:\Windows\SysWOW64\Nkcmohbg.exe

      Filesize

      760KB

      MD5

      711282a552787e3c17f97c3dd9a92612

      SHA1

      e7abe0b7481ec6c7ea8cf3ac7fff77b7607aa4a1

      SHA256

      8277b480a32e6fcd66fd7af863e867ab6a2d6e716a733b1475e0d36925b8d3bb

      SHA512

      05ce7adbf0f2ad2a71c560996285bcdb764e522994d078baa3bfbeae22d68353a811e548ecda068c1807a0a0a0977503958f1f77c58d8dc6ca92023b6c290d5b

    • C:\Windows\SysWOW64\Nqfbaq32.exe

      Filesize

      760KB

      MD5

      7eef0c128d0e2d35cd7f5ea9dd7047bb

      SHA1

      31e1a49edba19109b1219a808d8c7946d8f3679f

      SHA256

      4095731af699d72a4694e51272212dac6240ac16133e51d2270783aa6b41f8c6

      SHA512

      df78f614ec48429206612f89781ed441dadc7af06cf0293b9875d80795cfbb0b926049f2ca9bcf963d6666849e074fc91acdfb3dfdae6d50a06f4a33b4944581

    • memory/836-60-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/836-32-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/1268-8-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/1268-63-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/2396-0-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/2396-64-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/4076-62-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/4076-16-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/4100-56-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/4380-48-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/4380-58-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/4648-61-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/4648-23-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/4684-39-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/4684-59-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB