Analysis
-
max time kernel
92s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29-03-2024 03:22
Static task
static1
Behavioral task
behavioral1
Sample
d7e3b53cf50f6875489ad66919e1d75a8dbbd5a6cb37dbd5d4a5f0fc3cfb8788.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d7e3b53cf50f6875489ad66919e1d75a8dbbd5a6cb37dbd5d4a5f0fc3cfb8788.exe
Resource
win10v2004-20231215-en
General
-
Target
d7e3b53cf50f6875489ad66919e1d75a8dbbd5a6cb37dbd5d4a5f0fc3cfb8788.exe
-
Size
760KB
-
MD5
0f908d49ffe45824b59d062abdeb1116
-
SHA1
e79653e156755231f5cf621b03b3a2c4a502d119
-
SHA256
d7e3b53cf50f6875489ad66919e1d75a8dbbd5a6cb37dbd5d4a5f0fc3cfb8788
-
SHA512
2ffd761927f1aedb0d2b37bbd60d3ec35da65cda1d7ab13744df84f1d1da7cc40dc621a002a98f6d4fd7deb2240b5dcc73453faf024e53ecc227662b75ac7ed4
-
SSDEEP
12288:We3epU3cOK3NPh2kkkkK4kXkkkkkkkkl888888888888888888nusMH0QiRLsq:R3eGyNPh2kkkkK4kXkkkkkkkkhLx
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 14 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Nceonl32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nddkgonp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ngedij32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nceonl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ngedij32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Nggqoj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nqfbaq32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nggqoj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad d7e3b53cf50f6875489ad66919e1d75a8dbbd5a6cb37dbd5d4a5f0fc3cfb8788.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" d7e3b53cf50f6875489ad66919e1d75a8dbbd5a6cb37dbd5d4a5f0fc3cfb8788.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Nqfbaq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Nddkgonp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Njcpee32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Njcpee32.exe -
Executes dropped EXE 7 IoCs
pid Process 1268 Nqfbaq32.exe 4076 Nceonl32.exe 4648 Nddkgonp.exe 836 Ngedij32.exe 4684 Njcpee32.exe 4380 Nggqoj32.exe 4100 Nkcmohbg.exe -
Drops file in System32 directory 21 IoCs
description ioc Process File created C:\Windows\SysWOW64\Nceonl32.exe Nqfbaq32.exe File created C:\Windows\SysWOW64\Paadnmaq.dll Nddkgonp.exe File opened for modification C:\Windows\SysWOW64\Njcpee32.exe Ngedij32.exe File created C:\Windows\SysWOW64\Nkcmohbg.exe Nggqoj32.exe File created C:\Windows\SysWOW64\Nqfbaq32.exe d7e3b53cf50f6875489ad66919e1d75a8dbbd5a6cb37dbd5d4a5f0fc3cfb8788.exe File opened for modification C:\Windows\SysWOW64\Nqfbaq32.exe d7e3b53cf50f6875489ad66919e1d75a8dbbd5a6cb37dbd5d4a5f0fc3cfb8788.exe File opened for modification C:\Windows\SysWOW64\Nceonl32.exe Nqfbaq32.exe File opened for modification C:\Windows\SysWOW64\Ngedij32.exe Nddkgonp.exe File created C:\Windows\SysWOW64\Njcpee32.exe Ngedij32.exe File opened for modification C:\Windows\SysWOW64\Nkcmohbg.exe Nggqoj32.exe File created C:\Windows\SysWOW64\Npckna32.dll d7e3b53cf50f6875489ad66919e1d75a8dbbd5a6cb37dbd5d4a5f0fc3cfb8788.exe File created C:\Windows\SysWOW64\Fcdjjo32.dll Nqfbaq32.exe File created C:\Windows\SysWOW64\Nddkgonp.exe Nceonl32.exe File opened for modification C:\Windows\SysWOW64\Nddkgonp.exe Nceonl32.exe File created C:\Windows\SysWOW64\Addjcmqn.dll Njcpee32.exe File created C:\Windows\SysWOW64\Jlnpomfk.dll Nceonl32.exe File created C:\Windows\SysWOW64\Ngedij32.exe Nddkgonp.exe File created C:\Windows\SysWOW64\Ddpfgd32.dll Ngedij32.exe File created C:\Windows\SysWOW64\Nggqoj32.exe Njcpee32.exe File opened for modification C:\Windows\SysWOW64\Nggqoj32.exe Njcpee32.exe File created C:\Windows\SysWOW64\Hnibdpde.dll Nggqoj32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3184 4100 WerFault.exe 90 -
Modifies registry class 24 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Addjcmqn.dll" Njcpee32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Njcpee32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 d7e3b53cf50f6875489ad66919e1d75a8dbbd5a6cb37dbd5d4a5f0fc3cfb8788.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID d7e3b53cf50f6875489ad66919e1d75a8dbbd5a6cb37dbd5d4a5f0fc3cfb8788.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fcdjjo32.dll" Nqfbaq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jlnpomfk.dll" Nceonl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Paadnmaq.dll" Nddkgonp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Nceonl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Nddkgonp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ddpfgd32.dll" Ngedij32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ngedij32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Nggqoj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node d7e3b53cf50f6875489ad66919e1d75a8dbbd5a6cb37dbd5d4a5f0fc3cfb8788.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717} d7e3b53cf50f6875489ad66919e1d75a8dbbd5a6cb37dbd5d4a5f0fc3cfb8788.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Nqfbaq32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Njcpee32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ngedij32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Nggqoj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hnibdpde.dll" Nggqoj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Npckna32.dll" d7e3b53cf50f6875489ad66919e1d75a8dbbd5a6cb37dbd5d4a5f0fc3cfb8788.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" d7e3b53cf50f6875489ad66919e1d75a8dbbd5a6cb37dbd5d4a5f0fc3cfb8788.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Nqfbaq32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Nceonl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Nddkgonp.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2396 wrote to memory of 1268 2396 d7e3b53cf50f6875489ad66919e1d75a8dbbd5a6cb37dbd5d4a5f0fc3cfb8788.exe 84 PID 2396 wrote to memory of 1268 2396 d7e3b53cf50f6875489ad66919e1d75a8dbbd5a6cb37dbd5d4a5f0fc3cfb8788.exe 84 PID 2396 wrote to memory of 1268 2396 d7e3b53cf50f6875489ad66919e1d75a8dbbd5a6cb37dbd5d4a5f0fc3cfb8788.exe 84 PID 1268 wrote to memory of 4076 1268 Nqfbaq32.exe 85 PID 1268 wrote to memory of 4076 1268 Nqfbaq32.exe 85 PID 1268 wrote to memory of 4076 1268 Nqfbaq32.exe 85 PID 4076 wrote to memory of 4648 4076 Nceonl32.exe 86 PID 4076 wrote to memory of 4648 4076 Nceonl32.exe 86 PID 4076 wrote to memory of 4648 4076 Nceonl32.exe 86 PID 4648 wrote to memory of 836 4648 Nddkgonp.exe 87 PID 4648 wrote to memory of 836 4648 Nddkgonp.exe 87 PID 4648 wrote to memory of 836 4648 Nddkgonp.exe 87 PID 836 wrote to memory of 4684 836 Ngedij32.exe 88 PID 836 wrote to memory of 4684 836 Ngedij32.exe 88 PID 836 wrote to memory of 4684 836 Ngedij32.exe 88 PID 4684 wrote to memory of 4380 4684 Njcpee32.exe 89 PID 4684 wrote to memory of 4380 4684 Njcpee32.exe 89 PID 4684 wrote to memory of 4380 4684 Njcpee32.exe 89 PID 4380 wrote to memory of 4100 4380 Nggqoj32.exe 90 PID 4380 wrote to memory of 4100 4380 Nggqoj32.exe 90 PID 4380 wrote to memory of 4100 4380 Nggqoj32.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\d7e3b53cf50f6875489ad66919e1d75a8dbbd5a6cb37dbd5d4a5f0fc3cfb8788.exe"C:\Users\Admin\AppData\Local\Temp\d7e3b53cf50f6875489ad66919e1d75a8dbbd5a6cb37dbd5d4a5f0fc3cfb8788.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Windows\SysWOW64\Nqfbaq32.exeC:\Windows\system32\Nqfbaq32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Windows\SysWOW64\Nceonl32.exeC:\Windows\system32\Nceonl32.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4076 -
C:\Windows\SysWOW64\Nddkgonp.exeC:\Windows\system32\Nddkgonp.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4648 -
C:\Windows\SysWOW64\Ngedij32.exeC:\Windows\system32\Ngedij32.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Windows\SysWOW64\Njcpee32.exeC:\Windows\system32\Njcpee32.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4684 -
C:\Windows\SysWOW64\Nggqoj32.exeC:\Windows\system32\Nggqoj32.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Windows\SysWOW64\Nkcmohbg.exeC:\Windows\system32\Nkcmohbg.exe8⤵
- Executes dropped EXE
PID:4100 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4100 -s 4129⤵
- Program crash
PID:3184
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4100 -ip 41001⤵PID:3452
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7KB
MD54570e7b1c878299ff398462957717b43
SHA18e64aac53cc74fe8023414f4028024e5cf9b24e6
SHA256c086fbe258cd5a022c8ec9ba82131f4765032736f79a6d89dea7d82b99ad662d
SHA512909627a5a9462c6f1cce3f75fbb9c1173028a71ae66df44b869917aaa4e54edfb273ab14c9af3ee29e0f0f61f7456277fab0a377c7a95858523c2050464b5b1e
-
Filesize
760KB
MD56ec9875f55237f18bf949503686d5b86
SHA1cea4339e48359a9b185e8c94f24758b893fa3a58
SHA256cb445dbe8a247913af85694497da1582c4cdcec60e14e6304c93cf37e64a29fe
SHA512a3b81460f2b4a0339259cb6b528a776d646366fc6ec6c5da6e004866668fb97b5743d502e740b2d372bb87246c51a26488f0af2f8d92538a321a824e3fee93af
-
Filesize
760KB
MD5715b6e0445826102d101dcf311799a83
SHA1eae63502b430e834807ac4819d402635d29e73a3
SHA256ccc0c14436c360faad40607883d1a96862e60835c95733034108ecda3658283d
SHA5125495b7fb93ff6c8ecd2b306a9032ab612ed2049fc6387d91bda643b6f978d2308eecf3372f82045590b9a4d9fd1fd07ec5b8b80fcaa6aa1ad19cbd365c63809e
-
Filesize
760KB
MD5fd09af74ce5d08b2131126cc657494cb
SHA1c905830544204c7dcd452a20d7cbd4f92ce378b0
SHA2564beac5ef67caa81856ef59b2d3f191d5e81e8ced68face5c525798348d284ce0
SHA5128caa3d5c2307e2ea9e51ce4e84065419836c208b68dad90c4698b7a112542231ca8029082f105a0edca9ea61b820dda90c9f383ec0de15430e02c1e6fc09d0de
-
Filesize
760KB
MD539c15a94ab8e3291feb8f79bfc8c8679
SHA1c13f4767783cbd65bd9701be5fd66617730a7bad
SHA256cff5c84e63116e3c967d1c309946c6f9775ee7985e101c9b81ece55fc188f3b0
SHA512f3edb35fd965379a3960429f1537dbdf8e0bd52764154ad35504441a65744070cfbfdb75c2c46e6ea4f951750bc1d4e54c07a2931ea18cf527ee1b0854a53205
-
Filesize
760KB
MD5e5e4b385ffa9b73271d3e57664fd3efd
SHA1b664f8aa086d34edd6479167fb055bce65035c0e
SHA256bb1ac6804dbc97af472db330a4d74c9d302fa5a02c1b58ae39babb81c901ebcd
SHA512e0f0dbfa21ddb3054e39acb90d20dcc183af651a0543673e71e88862652f9c1a01a4c0eaf0edc521cf8938e1a670e2315a7a1bc7dd6bc25ac07ea435fd24a1b8
-
Filesize
760KB
MD5711282a552787e3c17f97c3dd9a92612
SHA1e7abe0b7481ec6c7ea8cf3ac7fff77b7607aa4a1
SHA2568277b480a32e6fcd66fd7af863e867ab6a2d6e716a733b1475e0d36925b8d3bb
SHA51205ce7adbf0f2ad2a71c560996285bcdb764e522994d078baa3bfbeae22d68353a811e548ecda068c1807a0a0a0977503958f1f77c58d8dc6ca92023b6c290d5b
-
Filesize
760KB
MD57eef0c128d0e2d35cd7f5ea9dd7047bb
SHA131e1a49edba19109b1219a808d8c7946d8f3679f
SHA2564095731af699d72a4694e51272212dac6240ac16133e51d2270783aa6b41f8c6
SHA512df78f614ec48429206612f89781ed441dadc7af06cf0293b9875d80795cfbb0b926049f2ca9bcf963d6666849e074fc91acdfb3dfdae6d50a06f4a33b4944581