Analysis
-
max time kernel
136s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
17/05/2024, 20:40
Static task
static1
Behavioral task
behavioral1
Sample
3bdd83c6068b3a05aae334b9e3877b7b2e5b6a3d3cbefefc4237d18c9e14c285.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3bdd83c6068b3a05aae334b9e3877b7b2e5b6a3d3cbefefc4237d18c9e14c285.exe
Resource
win10v2004-20240508-en
General
-
Target
3bdd83c6068b3a05aae334b9e3877b7b2e5b6a3d3cbefefc4237d18c9e14c285.exe
-
Size
59KB
-
MD5
104a78af90aeb91b136549c14ed663e5
-
SHA1
a2803fe6e4a098322ed1542a675edf4b1892b453
-
SHA256
3bdd83c6068b3a05aae334b9e3877b7b2e5b6a3d3cbefefc4237d18c9e14c285
-
SHA512
6745642570bfecd8bbf9b274c2baa2f54abac0e18f5a28605a8b46d030ca062cabb4e526712d51ea6317fe6624d8519f0010e42d238fa59d9c52d0ddccce7e63
-
SSDEEP
768:8bknhbV9ScpHoP4RIk6frhLt9ydjuNfc48/nR0jJQu6ZZ/1H5v5nf1fZMEBFELv8:jNpIPdkOhmjHZ/R0NQu6RPNCyVso
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ncldnkae.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ncldnkae.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 3bdd83c6068b3a05aae334b9e3877b7b2e5b6a3d3cbefefc4237d18c9e14c285.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" 3bdd83c6068b3a05aae334b9e3877b7b2e5b6a3d3cbefefc4237d18c9e14c285.exe -
Executes dropped EXE 2 IoCs
pid Process 5008 Ncldnkae.exe 4044 Nkcmohbg.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Ncldnkae.exe 3bdd83c6068b3a05aae334b9e3877b7b2e5b6a3d3cbefefc4237d18c9e14c285.exe File created C:\Windows\SysWOW64\Dlddhggk.dll 3bdd83c6068b3a05aae334b9e3877b7b2e5b6a3d3cbefefc4237d18c9e14c285.exe File created C:\Windows\SysWOW64\Nkcmohbg.exe Ncldnkae.exe File opened for modification C:\Windows\SysWOW64\Nkcmohbg.exe Ncldnkae.exe File created C:\Windows\SysWOW64\Hnibdpde.dll Ncldnkae.exe File created C:\Windows\SysWOW64\Ncldnkae.exe 3bdd83c6068b3a05aae334b9e3877b7b2e5b6a3d3cbefefc4237d18c9e14c285.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4884 4044 WerFault.exe 85 -
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ncldnkae.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 3bdd83c6068b3a05aae334b9e3877b7b2e5b6a3d3cbefefc4237d18c9e14c285.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node 3bdd83c6068b3a05aae334b9e3877b7b2e5b6a3d3cbefefc4237d18c9e14c285.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID 3bdd83c6068b3a05aae334b9e3877b7b2e5b6a3d3cbefefc4237d18c9e14c285.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hnibdpde.dll" Ncldnkae.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} 3bdd83c6068b3a05aae334b9e3877b7b2e5b6a3d3cbefefc4237d18c9e14c285.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dlddhggk.dll" 3bdd83c6068b3a05aae334b9e3877b7b2e5b6a3d3cbefefc4237d18c9e14c285.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" 3bdd83c6068b3a05aae334b9e3877b7b2e5b6a3d3cbefefc4237d18c9e14c285.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ncldnkae.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 888 wrote to memory of 5008 888 3bdd83c6068b3a05aae334b9e3877b7b2e5b6a3d3cbefefc4237d18c9e14c285.exe 83 PID 888 wrote to memory of 5008 888 3bdd83c6068b3a05aae334b9e3877b7b2e5b6a3d3cbefefc4237d18c9e14c285.exe 83 PID 888 wrote to memory of 5008 888 3bdd83c6068b3a05aae334b9e3877b7b2e5b6a3d3cbefefc4237d18c9e14c285.exe 83 PID 5008 wrote to memory of 4044 5008 Ncldnkae.exe 85 PID 5008 wrote to memory of 4044 5008 Ncldnkae.exe 85 PID 5008 wrote to memory of 4044 5008 Ncldnkae.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\3bdd83c6068b3a05aae334b9e3877b7b2e5b6a3d3cbefefc4237d18c9e14c285.exe"C:\Users\Admin\AppData\Local\Temp\3bdd83c6068b3a05aae334b9e3877b7b2e5b6a3d3cbefefc4237d18c9e14c285.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:888 -
C:\Windows\SysWOW64\Ncldnkae.exeC:\Windows\system32\Ncldnkae.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Windows\SysWOW64\Nkcmohbg.exeC:\Windows\system32\Nkcmohbg.exe3⤵
- Executes dropped EXE
PID:4044 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4044 -s 4004⤵
- Program crash
PID:4884
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4044 -ip 40441⤵PID:1436
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
59KB
MD52412e7816659ddb95f9501267e2b0068
SHA1e5b2e0e25d3c409607c94d620edae439f3ce9099
SHA256a3ea5eb75e5183bb6bc390714507ff48b1a2a76184ba3081a5c41d6a0569d167
SHA5122f3ab27e3161c588df7129afdf4b74294a79ffbc51edd3108ee1e000c7d1737fb22a62e329d48a14c1ae6760f5652f0179a72fd14a0d70163270ca10f0e5361d
-
Filesize
59KB
MD56400b0dc530313a4d6a6e33857573531
SHA11aeac110adac64c2f3dbffa18eadee228aabf372
SHA2562e17dadc26654d528117bc22ef9c4720c37fd5cf1e70c60def5b1e9a8b61366f
SHA512db781bfd06fac7f9b9e269f3595e3572d68bbd14b97ad3113d86ec72bbdd949035d1024459de657d671868928e8bd569cf6b6bb447c2d7d03f5cfbe427ad831c