Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 01:07
Static task
static1
Behavioral task
behavioral1
Sample
6932aa1620adaf79a22126660707ab14e68f5a48b13b442b3ece1f81c02a9398.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
6932aa1620adaf79a22126660707ab14e68f5a48b13b442b3ece1f81c02a9398.exe
Resource
win10v2004-20240226-en
General
-
Target
6932aa1620adaf79a22126660707ab14e68f5a48b13b442b3ece1f81c02a9398.exe
-
Size
128KB
-
MD5
0853840bd78999fb653966990875e2d0
-
SHA1
42431b86ab78710bd94ec53f2a631b114270c608
-
SHA256
6932aa1620adaf79a22126660707ab14e68f5a48b13b442b3ece1f81c02a9398
-
SHA512
670d7f196606437d5971f8f6759cb661f9d1d3e70eb0bacf6423ad87bdf90da99093119f4dc9f9170499722c2e500183469f2be5c7b70a7e657223356c1ab93a
-
SSDEEP
3072:S1l978RGcSroM8ieIN908uFafmHURHAVgnvedh6:ED78RGroxiz908uF8YU8gnve7
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 2 IoCs
Processes:
6932aa1620adaf79a22126660707ab14e68f5a48b13b442b3ece1f81c02a9398.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 6932aa1620adaf79a22126660707ab14e68f5a48b13b442b3ece1f81c02a9398.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" 6932aa1620adaf79a22126660707ab14e68f5a48b13b442b3ece1f81c02a9398.exe -
Executes dropped EXE 1 IoCs
Processes:
Iagfoe32.exepid process 3012 Iagfoe32.exe -
Loads dropped DLL 6 IoCs
Processes:
6932aa1620adaf79a22126660707ab14e68f5a48b13b442b3ece1f81c02a9398.exeWerFault.exepid process 2908 6932aa1620adaf79a22126660707ab14e68f5a48b13b442b3ece1f81c02a9398.exe 2908 6932aa1620adaf79a22126660707ab14e68f5a48b13b442b3ece1f81c02a9398.exe 2256 WerFault.exe 2256 WerFault.exe 2256 WerFault.exe 2256 WerFault.exe -
Drops file in System32 directory 3 IoCs
Processes:
6932aa1620adaf79a22126660707ab14e68f5a48b13b442b3ece1f81c02a9398.exedescription ioc process File created C:\Windows\SysWOW64\Gjenmobn.dll 6932aa1620adaf79a22126660707ab14e68f5a48b13b442b3ece1f81c02a9398.exe File created C:\Windows\SysWOW64\Iagfoe32.exe 6932aa1620adaf79a22126660707ab14e68f5a48b13b442b3ece1f81c02a9398.exe File opened for modification C:\Windows\SysWOW64\Iagfoe32.exe 6932aa1620adaf79a22126660707ab14e68f5a48b13b442b3ece1f81c02a9398.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2256 3012 WerFault.exe Iagfoe32.exe -
Modifies registry class 6 IoCs
Processes:
6932aa1620adaf79a22126660707ab14e68f5a48b13b442b3ece1f81c02a9398.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 6932aa1620adaf79a22126660707ab14e68f5a48b13b442b3ece1f81c02a9398.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node 6932aa1620adaf79a22126660707ab14e68f5a48b13b442b3ece1f81c02a9398.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID 6932aa1620adaf79a22126660707ab14e68f5a48b13b442b3ece1f81c02a9398.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717} 6932aa1620adaf79a22126660707ab14e68f5a48b13b442b3ece1f81c02a9398.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gjenmobn.dll" 6932aa1620adaf79a22126660707ab14e68f5a48b13b442b3ece1f81c02a9398.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" 6932aa1620adaf79a22126660707ab14e68f5a48b13b442b3ece1f81c02a9398.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
6932aa1620adaf79a22126660707ab14e68f5a48b13b442b3ece1f81c02a9398.exeIagfoe32.exedescription pid process target process PID 2908 wrote to memory of 3012 2908 6932aa1620adaf79a22126660707ab14e68f5a48b13b442b3ece1f81c02a9398.exe Iagfoe32.exe PID 2908 wrote to memory of 3012 2908 6932aa1620adaf79a22126660707ab14e68f5a48b13b442b3ece1f81c02a9398.exe Iagfoe32.exe PID 2908 wrote to memory of 3012 2908 6932aa1620adaf79a22126660707ab14e68f5a48b13b442b3ece1f81c02a9398.exe Iagfoe32.exe PID 2908 wrote to memory of 3012 2908 6932aa1620adaf79a22126660707ab14e68f5a48b13b442b3ece1f81c02a9398.exe Iagfoe32.exe PID 3012 wrote to memory of 2256 3012 Iagfoe32.exe WerFault.exe PID 3012 wrote to memory of 2256 3012 Iagfoe32.exe WerFault.exe PID 3012 wrote to memory of 2256 3012 Iagfoe32.exe WerFault.exe PID 3012 wrote to memory of 2256 3012 Iagfoe32.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6932aa1620adaf79a22126660707ab14e68f5a48b13b442b3ece1f81c02a9398.exe"C:\Users\Admin\AppData\Local\Temp\6932aa1620adaf79a22126660707ab14e68f5a48b13b442b3ece1f81c02a9398.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Windows\SysWOW64\Iagfoe32.exeC:\Windows\system32\Iagfoe32.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3012 -s 1403⤵
- Loads dropped DLL
- Program crash
PID:2256
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
128KB
MD5a80c755f7c44b611295920e568445e63
SHA14e21555a40acaf0bf6ad3c654c8b578131f6ef73
SHA25680bbdd231830f8536724decf49c1a97a5b3397e1cef9ea9dc64825e6fa73c5b3
SHA5120a7e92c86f58ab14775a283866985f9f821eaf4ddc7dcdfb587408a3a7eca624ca46d5218f0716fb3a5084b6ac5bd2b9eb2828ec1bb6fb6e365cf2cf50f2248c