Analysis
-
max time kernel
93s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
09-04-2024 19:04
Static task
static1
Behavioral task
behavioral1
Sample
03b9f3a01bbddb3e25c1a8c435d80eee.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
03b9f3a01bbddb3e25c1a8c435d80eee.exe
Resource
win10v2004-20231215-en
General
-
Target
03b9f3a01bbddb3e25c1a8c435d80eee.exe
-
Size
93KB
-
MD5
03b9f3a01bbddb3e25c1a8c435d80eee
-
SHA1
338d7c916c1a5cad338c4fe84c2baff32b21b736
-
SHA256
8dee307e521a3a829a9624cfa188c4228beaa37ced2c353cbb617c3f59435049
-
SHA512
26e33bdd3e9b8c2b446a535b34dd42b930950691a2892228342a8cc6e1e065d7c7f080f6ad5f8b10ba525b5438eb086ede6ffceb756c0d8ce711023d11db5372
-
SSDEEP
1536:PBVAjmwXKECuU/Leyon6Q0zkKj512FNUHuTIFSE1mgLTABTBjiwg58:fAKmJCugqyUMkKj51YNykIFSEg9Y58
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 03b9f3a01bbddb3e25c1a8c435d80eee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" 03b9f3a01bbddb3e25c1a8c435d80eee.exe -
Executes dropped EXE 1 IoCs
pid Process 2140 Nkcmohbg.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\Nkcmohbg.exe 03b9f3a01bbddb3e25c1a8c435d80eee.exe File opened for modification C:\Windows\SysWOW64\Nkcmohbg.exe 03b9f3a01bbddb3e25c1a8c435d80eee.exe File created C:\Windows\SysWOW64\Hnibdpde.dll 03b9f3a01bbddb3e25c1a8c435d80eee.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4468 2140 WerFault.exe 85 -
Modifies registry class 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 03b9f3a01bbddb3e25c1a8c435d80eee.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node 03b9f3a01bbddb3e25c1a8c435d80eee.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID 03b9f3a01bbddb3e25c1a8c435d80eee.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717} 03b9f3a01bbddb3e25c1a8c435d80eee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hnibdpde.dll" 03b9f3a01bbddb3e25c1a8c435d80eee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" 03b9f3a01bbddb3e25c1a8c435d80eee.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1132 wrote to memory of 2140 1132 03b9f3a01bbddb3e25c1a8c435d80eee.exe 85 PID 1132 wrote to memory of 2140 1132 03b9f3a01bbddb3e25c1a8c435d80eee.exe 85 PID 1132 wrote to memory of 2140 1132 03b9f3a01bbddb3e25c1a8c435d80eee.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\03b9f3a01bbddb3e25c1a8c435d80eee.exe"C:\Users\Admin\AppData\Local\Temp\03b9f3a01bbddb3e25c1a8c435d80eee.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Windows\SysWOW64\Nkcmohbg.exeC:\Windows\system32\Nkcmohbg.exe2⤵
- Executes dropped EXE
PID:2140 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2140 -s 4123⤵
- Program crash
PID:4468
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 2140 -ip 21401⤵PID:4128
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
93KB
MD53209d50fe688b02cce61e65a060f527f
SHA1d0565ad813af5bafab0a4f71c6e38c535868f117
SHA256689e26f36ca7b348879ddbfca7f5f453a4f2c36fecd62077182edfc6cd3fc148
SHA51204ad9bf057b24e43500ab790e5901622a7763759e7a9a4f3aba774f7ff0de3889edab2e4cd8033079978007b4239cd4d579b1b8912545b12e2e8bf0481390a05