Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    20/04/2024, 00:06

General

  • Target

    8dbba95008edf4fba7bf229ab780a033160b87934b301f74643eaebe8b3c6029.exe

  • Size

    89KB

  • MD5

    2c61f88b4e5b7e7770667cdcc091042a

  • SHA1

    7f20b0fb0d479972018d5311f6902b22026fca11

  • SHA256

    8dbba95008edf4fba7bf229ab780a033160b87934b301f74643eaebe8b3c6029

  • SHA512

    33393aaebdfd1bd01c5c0450e15c721bb742b3c3e7704a169eb98d26ae4ae2bd56f4359c2924aba239f3ae15025fd68d64549ae14506f1516551d8c9a041bbfb

  • SSDEEP

    1536:kVY3HnUh0LmDLZY485AA46F0VJlduPWGHrxbmsCIK282c8CPGCECa9bC7e3iaqW/:dUf98eA4G0VJld/4xbmhD28Qxnd9GMHD

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 10 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 14 IoCs
  • Drops file in System32 directory 15 IoCs
  • Program crash 1 IoCs
  • Modifies registry class 18 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8dbba95008edf4fba7bf229ab780a033160b87934b301f74643eaebe8b3c6029.exe
    "C:\Users\Admin\AppData\Local\Temp\8dbba95008edf4fba7bf229ab780a033160b87934b301f74643eaebe8b3c6029.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Loads dropped DLL
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2012
    • C:\Windows\SysWOW64\Hodpgjha.exe
      C:\Windows\system32\Hodpgjha.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2220
      • C:\Windows\SysWOW64\Hkkalk32.exe
        C:\Windows\system32\Hkkalk32.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in System32 directory
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2004
        • C:\Windows\SysWOW64\Icbimi32.exe
          C:\Windows\system32\Icbimi32.exe
          4⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in System32 directory
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:2648
          • C:\Windows\SysWOW64\Ilknfn32.exe
            C:\Windows\system32\Ilknfn32.exe
            5⤵
            • Adds autorun key to be loaded by Explorer.exe on startup
            • Executes dropped EXE
            • Loads dropped DLL
            • Drops file in System32 directory
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:2740
            • C:\Windows\SysWOW64\Iagfoe32.exe
              C:\Windows\system32\Iagfoe32.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:2564
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2564 -s 140
                7⤵
                • Loads dropped DLL
                • Program crash
                PID:2640

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\Hkkalk32.exe

    Filesize

    89KB

    MD5

    ff33464cb2f3388de25b1f84f1802471

    SHA1

    aa0c61ee030758009ac40b67ee101ef6ef181e42

    SHA256

    0f78b10e367564548592417056f020699685dd56c328b40b03ae484c926f884d

    SHA512

    b605400eacaf5e11ec6c159e4cb7de2dabc41e67c91e9e5c73b4dbfcb49a593e726abc444180f0167248b236615e0c9b8236838126455bf5b8caba69821ca877

  • C:\Windows\SysWOW64\Icbimi32.exe

    Filesize

    89KB

    MD5

    5fccb102c70cc805a070751a82f6fbf5

    SHA1

    d9d5107c3ba4cc32fd24cddc1e32648862397e89

    SHA256

    dcba2c36224086b2749bb00f54c83a7d86b3868715d795e20650b2f08b317fe9

    SHA512

    e7808960f1059e97d1eeeaea6a6411df3d61e56edcc2c30532b71b99abe0cba5734ea9ff7ce6ff8eddfc7c0e04665a86961b7c39b7ac02c1ea8c477fdad23a94

  • \Windows\SysWOW64\Hodpgjha.exe

    Filesize

    89KB

    MD5

    aadc018b818f23b3dfa13f0b9b26e39e

    SHA1

    d8269312e34e3dde2695e4ec252026ed0c29bfa4

    SHA256

    9a479ac4d11c5f436e5917f3548d49804064ea3a1485f73dd73e97743d4a6b5b

    SHA512

    54cab615eb30a7a7387916bf25de572c67734a0a780259c1bd5a8d0f83e000baf108a7c3b5b5cb58ee08b72ef1b640887d21980976364750f2b5c6af36444483

  • \Windows\SysWOW64\Iagfoe32.exe

    Filesize

    89KB

    MD5

    482d159a1fb01e28a3ba64e36b04c12c

    SHA1

    6c2c702a2fc2900146332cb8c56cac1d5819d62b

    SHA256

    94f10ce9bcb40a2ccc5fdc1faa1bfd26347a7adfb8cc54d6f2addb0b726e1b78

    SHA512

    670badc096b512613c9f90c2c989e2977031990f66218aba0460a4c10889c342637b26a50e27d1c1348dd7d51f8a183610b41ea55a928e40a131aaa6f188af44

  • \Windows\SysWOW64\Ilknfn32.exe

    Filesize

    89KB

    MD5

    b1f80f75a8f9d39de1dc744f675fafd8

    SHA1

    adca92e5be94cd17952dfccdcfa2b74f6f46c468

    SHA256

    a12eadcd7f569451fa7498be64a908b29b12007e42aeacea16ff8fe562bdd83f

    SHA512

    72a29b272eff5fd5d0a178aec01092979c80b54246b942921085252a4a5747d656c33fefdf5f00c805ce2aabbf7fc9ab1edd74a9cf75d17a9161e2c0bdbaa53f

  • memory/2004-37-0x0000000000400000-0x000000000043E000-memory.dmp

    Filesize

    248KB

  • memory/2012-0-0x0000000000400000-0x000000000043E000-memory.dmp

    Filesize

    248KB

  • memory/2012-6-0x0000000000250000-0x000000000028E000-memory.dmp

    Filesize

    248KB

  • memory/2012-70-0x0000000000400000-0x000000000043E000-memory.dmp

    Filesize

    248KB

  • memory/2220-25-0x0000000000250000-0x000000000028E000-memory.dmp

    Filesize

    248KB

  • memory/2220-71-0x0000000000400000-0x000000000043E000-memory.dmp

    Filesize

    248KB

  • memory/2564-65-0x0000000000400000-0x000000000043E000-memory.dmp

    Filesize

    248KB

  • memory/2648-63-0x0000000000400000-0x000000000043E000-memory.dmp

    Filesize

    248KB

  • memory/2740-51-0x0000000000400000-0x000000000043E000-memory.dmp

    Filesize

    248KB

  • memory/2740-72-0x0000000000400000-0x000000000043E000-memory.dmp

    Filesize

    248KB