Analysis

  • max time kernel
    140s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    10/05/2024, 00:30

General

  • Target

    9598c7d47b3c8f2ac0299700e2ce5d7a7f8e6eeadb1eea753356abcd754fcaf0.exe

  • Size

    376KB

  • MD5

    cfedb049de2adb3dc581b2596a648821

  • SHA1

    3c77bbcdbef14f539374b93b686c763a04099522

  • SHA256

    9598c7d47b3c8f2ac0299700e2ce5d7a7f8e6eeadb1eea753356abcd754fcaf0

  • SHA512

    40699cbea8380a7f1fd91464509a0f05fc56058c7ced16d056de94fd2e346e0fa1fa6496a5eb607e10b09a75efca7134c90b1734e1e46e682a6aaa4b268ff843

  • SSDEEP

    6144:8Fbl1TeC7oQ0IV/Atl/AtW1OE43V1+25CzRoQ0Ibl4HdE43V1+2:8FB1V50I2mi4lCzb0IF4

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 4 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 8 IoCs
  • Drops file in System32 directory 6 IoCs
  • Program crash 1 IoCs
  • Modifies registry class 9 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9598c7d47b3c8f2ac0299700e2ce5d7a7f8e6eeadb1eea753356abcd754fcaf0.exe
    "C:\Users\Admin\AppData\Local\Temp\9598c7d47b3c8f2ac0299700e2ce5d7a7f8e6eeadb1eea753356abcd754fcaf0.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Loads dropped DLL
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2476
    • C:\Windows\SysWOW64\Ihoafpmp.exe
      C:\Windows\system32\Ihoafpmp.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2104
      • C:\Windows\SysWOW64\Iagfoe32.exe
        C:\Windows\system32\Iagfoe32.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:2712
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2712 -s 140
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:2000

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Windows\SysWOW64\Iagfoe32.exe

    Filesize

    376KB

    MD5

    df9eb837fe8c39fc10347a2c44ec7959

    SHA1

    45f853027133ab91b945d2a3ba6c66d88212cfc7

    SHA256

    9e993f46c5982742448018725c51d7bcd53a8ed639ef2909abfa4150ed123e81

    SHA512

    2a4d05db168a8d451d03eef0e6769749bfe8382a14297119b03cec2a83afce5df06662ec39309f75ecabbd58fe8e9f74ec3ae027cea3d7dca59bc44c86cb0178

  • \Windows\SysWOW64\Ihoafpmp.exe

    Filesize

    376KB

    MD5

    718a5f9ee805109d635273a7b5f835ff

    SHA1

    e2565d1125ad5ee5d4036354a3035f57f77d06fb

    SHA256

    e94e8aadb088eefcc858a2ad7b4521833f49af0ea4ede9dd13a92e020ffa03e0

    SHA512

    f85a9a05ff3618c7ab36bc8a0c865707c79db4fbc66e8849f2537bc006623f8ffba1ee36ceaf6d45de48c1ef6c5a33f71f584967488e3393e9f7b688c96bf285

  • memory/2104-19-0x0000000000400000-0x000000000045E000-memory.dmp

    Filesize

    376KB

  • memory/2104-43-0x0000000000400000-0x000000000045E000-memory.dmp

    Filesize

    376KB

  • memory/2476-4-0x0000000000400000-0x000000000045E000-memory.dmp

    Filesize

    376KB

  • memory/2476-6-0x0000000000250000-0x00000000002AE000-memory.dmp

    Filesize

    376KB

  • memory/2476-12-0x0000000000250000-0x00000000002AE000-memory.dmp

    Filesize

    376KB

  • memory/2476-39-0x0000000000400000-0x000000000045E000-memory.dmp

    Filesize

    376KB

  • memory/2712-27-0x0000000000400000-0x000000000045E000-memory.dmp

    Filesize

    376KB