Analysis
-
max time kernel
141s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
18-04-2024 01:26
Static task
static1
Behavioral task
behavioral1
Sample
afe46e9b70aa57e35b3d2e4f410da99ca35887f72af07607c5d57a0672173681.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
afe46e9b70aa57e35b3d2e4f410da99ca35887f72af07607c5d57a0672173681.exe
Resource
win10v2004-20240226-en
General
-
Target
afe46e9b70aa57e35b3d2e4f410da99ca35887f72af07607c5d57a0672173681.exe
-
Size
1.7MB
-
MD5
10a35e6cd0a2d3de87b93a78b8a16c2a
-
SHA1
a1ce367a08ad5ceadb11c109a9267994f09d4bb7
-
SHA256
afe46e9b70aa57e35b3d2e4f410da99ca35887f72af07607c5d57a0672173681
-
SHA512
de4e94d551adf828222c7e0311c211d6dc2fc77fbd7b9b86440a5ed6216a43caca905a289867bceb68ef1ba53d97b91aaeb4d2889c08dcc57345b825a1128ed6
-
SSDEEP
49152:Gmix7/ix7yix7/ix7Xcix7/ix7yix7/ix7:GmU/UyU/UXcU/UyU/U
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 10 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" afe46e9b70aa57e35b3d2e4f410da99ca35887f72af07607c5d57a0672173681.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jddiegbm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Khfkfedn.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad afe46e9b70aa57e35b3d2e4f410da99ca35887f72af07607c5d57a0672173681.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Iapjgo32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jddiegbm.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Khfkfedn.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Laffpi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Laffpi32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iapjgo32.exe -
Executes dropped EXE 5 IoCs
pid Process 3628 Iapjgo32.exe 228 Jddiegbm.exe 3892 Khfkfedn.exe 4020 Laffpi32.exe 1264 Ldikgdpe.exe -
Drops file in System32 directory 15 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Jddiegbm.exe Iapjgo32.exe File created C:\Windows\SysWOW64\Ldikgdpe.exe Laffpi32.exe File opened for modification C:\Windows\SysWOW64\Iapjgo32.exe afe46e9b70aa57e35b3d2e4f410da99ca35887f72af07607c5d57a0672173681.exe File created C:\Windows\SysWOW64\Jakjcj32.dll afe46e9b70aa57e35b3d2e4f410da99ca35887f72af07607c5d57a0672173681.exe File created C:\Windows\SysWOW64\Khfkfedn.exe Jddiegbm.exe File created C:\Windows\SysWOW64\Laffpi32.exe Khfkfedn.exe File created C:\Windows\SysWOW64\Jgcnomaa.dll Khfkfedn.exe File created C:\Windows\SysWOW64\Iapjgo32.exe afe46e9b70aa57e35b3d2e4f410da99ca35887f72af07607c5d57a0672173681.exe File created C:\Windows\SysWOW64\Jddiegbm.exe Iapjgo32.exe File opened for modification C:\Windows\SysWOW64\Khfkfedn.exe Jddiegbm.exe File created C:\Windows\SysWOW64\Mobpnd32.dll Jddiegbm.exe File created C:\Windows\SysWOW64\Bekdaogi.dll Laffpi32.exe File created C:\Windows\SysWOW64\Bmapeg32.dll Iapjgo32.exe File opened for modification C:\Windows\SysWOW64\Laffpi32.exe Khfkfedn.exe File opened for modification C:\Windows\SysWOW64\Ldikgdpe.exe Laffpi32.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 2344 1264 WerFault.exe 96 2996 1264 WerFault.exe 96 -
Modifies registry class 18 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jakjcj32.dll" afe46e9b70aa57e35b3d2e4f410da99ca35887f72af07607c5d57a0672173681.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bmapeg32.dll" Iapjgo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Khfkfedn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 afe46e9b70aa57e35b3d2e4f410da99ca35887f72af07607c5d57a0672173681.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID afe46e9b70aa57e35b3d2e4f410da99ca35887f72af07607c5d57a0672173681.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Khfkfedn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jgcnomaa.dll" Khfkfedn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Laffpi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Laffpi32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} afe46e9b70aa57e35b3d2e4f410da99ca35887f72af07607c5d57a0672173681.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Iapjgo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bekdaogi.dll" Laffpi32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node afe46e9b70aa57e35b3d2e4f410da99ca35887f72af07607c5d57a0672173681.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jddiegbm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jddiegbm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mobpnd32.dll" Jddiegbm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" afe46e9b70aa57e35b3d2e4f410da99ca35887f72af07607c5d57a0672173681.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Iapjgo32.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1436 wrote to memory of 3628 1436 afe46e9b70aa57e35b3d2e4f410da99ca35887f72af07607c5d57a0672173681.exe 92 PID 1436 wrote to memory of 3628 1436 afe46e9b70aa57e35b3d2e4f410da99ca35887f72af07607c5d57a0672173681.exe 92 PID 1436 wrote to memory of 3628 1436 afe46e9b70aa57e35b3d2e4f410da99ca35887f72af07607c5d57a0672173681.exe 92 PID 3628 wrote to memory of 228 3628 Iapjgo32.exe 93 PID 3628 wrote to memory of 228 3628 Iapjgo32.exe 93 PID 3628 wrote to memory of 228 3628 Iapjgo32.exe 93 PID 228 wrote to memory of 3892 228 Jddiegbm.exe 94 PID 228 wrote to memory of 3892 228 Jddiegbm.exe 94 PID 228 wrote to memory of 3892 228 Jddiegbm.exe 94 PID 3892 wrote to memory of 4020 3892 Khfkfedn.exe 95 PID 3892 wrote to memory of 4020 3892 Khfkfedn.exe 95 PID 3892 wrote to memory of 4020 3892 Khfkfedn.exe 95 PID 4020 wrote to memory of 1264 4020 Laffpi32.exe 96 PID 4020 wrote to memory of 1264 4020 Laffpi32.exe 96 PID 4020 wrote to memory of 1264 4020 Laffpi32.exe 96 PID 1264 wrote to memory of 2344 1264 Ldikgdpe.exe 101 PID 1264 wrote to memory of 2344 1264 Ldikgdpe.exe 101 PID 1264 wrote to memory of 2344 1264 Ldikgdpe.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\afe46e9b70aa57e35b3d2e4f410da99ca35887f72af07607c5d57a0672173681.exe"C:\Users\Admin\AppData\Local\Temp\afe46e9b70aa57e35b3d2e4f410da99ca35887f72af07607c5d57a0672173681.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Windows\SysWOW64\Iapjgo32.exeC:\Windows\system32\Iapjgo32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3628 -
C:\Windows\SysWOW64\Jddiegbm.exeC:\Windows\system32\Jddiegbm.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Windows\SysWOW64\Khfkfedn.exeC:\Windows\system32\Khfkfedn.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3892 -
C:\Windows\SysWOW64\Laffpi32.exeC:\Windows\system32\Laffpi32.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4020 -
C:\Windows\SysWOW64\Ldikgdpe.exeC:\Windows\system32\Ldikgdpe.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1264 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1264 -s 4007⤵
- Program crash
PID:2344
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1264 -s 4007⤵
- Program crash
PID:2996
-
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1264 -ip 12641⤵PID:1624
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4052 --field-trial-handle=3192,i,2785050981002401924,4037047756083432660,262144 --variations-seed-version /prefetch:81⤵PID:4488
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD582cea86699e0ce22e2c0c61e18ecb0ea
SHA1091321472407cd81b923391030c2e7d85e390a7f
SHA2566ce6ef9008c639ef9e8395e30f8d087ced5414fd54689eb499c090d230737345
SHA5122a01fedbd4fc5b47f9897a4b2956dc1090b6889ec33b2ebff9a266d1b6241b9195ca5d4e2dacb83cd77c69b9967ae3983b9ef543db953e7bfc90754b0cc9336e
-
Filesize
448KB
MD590fbbdbbdaa30e2e9db6d8e4444fca0f
SHA132c0c77842b51999b914668fb4405c03c751a3a3
SHA256895ae1f0ba2637ad75ca0c68c5ebc17c03b1f8d8871e5e437e0593ccb10c9e22
SHA512fbcdf209fde794525440fb81452fb018ff4ed201671d64584869020a1ee0134b5cd53042e13250bc830424dd548e126bda40e928f41ac96772cab07a2a801311
-
Filesize
448KB
MD5231c1282988946a2c18e5d535b56cc2f
SHA1a9ae46d2611edd94c78332b5fe0fb908a57370d9
SHA256d63308e0b436156e8cadaa61df4012d76deaf508cd15911833bda4e161d93075
SHA51246f688f9f6d426f990bfbea9e2555ff51cf65f5a43578ff41c3095df92165e4af2f48f19d9f6f97df94a6ae7023ed4b30fe72e9d2bc6e577ca1443388096d623
-
Filesize
448KB
MD578b8080bbf6510f772e676e964eee23e
SHA1161827503047d62c44edd978af4a9bf1c3f6ffe5
SHA2561620ebab92116214ea6ef02488a699b2cf2fb45261a8417b811371b79dea25cf
SHA5124118c91f7334ebcaed81eab2f3a6bed55265aa326dea3446db4ed459f210b8097ee5482101d0cbda3e220f4e68f14e0455a6e2419f856ecc52449cdb4f7d58b1
-
Filesize
576KB
MD5511b00eb81fdaa694bc25adc482c5bbb
SHA153f0871c93cc88fd0664229a5cc5d1866301d7c1
SHA2565e1e12ae3d811c4145d61455a1438784300ed275fedcf1c75b9e34c0e5a78c0d
SHA51214b780385114236a1557015c04173b2cdc92f42f008b817a8744da0e398244444502ae4e2101abcd65e0820cc8291502c196c94b8002f7272b559b202a4af63f
-
Filesize
448KB
MD5bd4cf0f0a085c15dd7f2ab3f85b1a6c6
SHA1d8e95fa885edf6b8c0460a94c65e4fbb7542d080
SHA2561918662e83962f15ff47d20492f6c90c2d11353c7dcd1f21466af1e24bacb126
SHA512e5fe0fb3e2b80c3e493645c0bfc8c3d77238f730c8478c9a99f6866aaa3ea977416bf922a76f76a7a24d84d05c091bc18722e51c42f0398f5d9dc799903b098b
-
Filesize
1.7MB
MD5be730088d5f28959dea9a890b099ddcf
SHA1bba000eeb3c919caeb4543b33274852f223a1090
SHA256ec79e438dca98c71b08dd6fe7275264ce745b5167f7bcee02a9253e17495b376
SHA51228c073f21fb6b823ab700a0219ab2e339804b85f344b391e88aba88e99942dbfeab31a54d9becedabbeb09f4b8857cedce893c65c3dbb55c709a9a004d41c28e
-
Filesize
448KB
MD51de2c5e140c138454209676e44a3aeb7
SHA1ad53fb21cd9dc9c6146e47ce2bc6c0a978906ff9
SHA256279c42ddf476f762951b7c555a4221ff86672fa0bbbc6457ac19849418783b62
SHA5122cf38ba4d89f05db2c0bdcc6d34126af643217f4b94b5c770b3ae424bd22ee236720052a1500d127ea420bb4e9efcce38194f3a47ac7828e104b94c1cb752ddb