Analysis

  • max time kernel
    135s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/05/2024, 20:46

General

  • Target

    854ebab3ce8ad1daa8205db3ce3cccd49fe3f91bdf894f5922f5b0dd0e285632.exe

  • Size

    89KB

  • MD5

    0aa3efd9eeae67e9069b518a555f1560

  • SHA1

    7a214f9359ddae4771eb2e560f5925ccbd102ae6

  • SHA256

    854ebab3ce8ad1daa8205db3ce3cccd49fe3f91bdf894f5922f5b0dd0e285632

  • SHA512

    5def0c678dbb69465e491a99baf4389ded903599943a2163a6563b5fad671500aba396700ead4789669b1f9b35e6b40e470c98528616d1f3b6ff01a7034d536f

  • SSDEEP

    1536:ta4noeTEaKhzgyNf7GbqyZMPwT9Na6hJmfua8RcBlExkg8Fk:tPodaIJ9CLZMPwPaAJAcRcBlakgwk

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 16 IoCs
  • Executes dropped EXE 8 IoCs
  • Drops file in System32 directory 24 IoCs
  • Program crash 1 IoCs
  • Modifies registry class 27 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\854ebab3ce8ad1daa8205db3ce3cccd49fe3f91bdf894f5922f5b0dd0e285632.exe
    "C:\Users\Admin\AppData\Local\Temp\854ebab3ce8ad1daa8205db3ce3cccd49fe3f91bdf894f5922f5b0dd0e285632.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4352
    • C:\Windows\SysWOW64\Nqiogp32.exe
      C:\Windows\system32\Nqiogp32.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:116
      • C:\Windows\SysWOW64\Ncgkcl32.exe
        C:\Windows\system32\Ncgkcl32.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Drops file in System32 directory
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2524
        • C:\Windows\SysWOW64\Njacpf32.exe
          C:\Windows\system32\Njacpf32.exe
          4⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Drops file in System32 directory
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:2364
          • C:\Windows\SysWOW64\Nqklmpdd.exe
            C:\Windows\system32\Nqklmpdd.exe
            5⤵
            • Adds autorun key to be loaded by Explorer.exe on startup
            • Executes dropped EXE
            • Drops file in System32 directory
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:1772
            • C:\Windows\SysWOW64\Ngedij32.exe
              C:\Windows\system32\Ngedij32.exe
              6⤵
              • Adds autorun key to be loaded by Explorer.exe on startup
              • Executes dropped EXE
              • Drops file in System32 directory
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:4348
              • C:\Windows\SysWOW64\Nnolfdcn.exe
                C:\Windows\system32\Nnolfdcn.exe
                7⤵
                • Adds autorun key to be loaded by Explorer.exe on startup
                • Executes dropped EXE
                • Drops file in System32 directory
                • Modifies registry class
                • Suspicious use of WriteProcessMemory
                PID:4412
                • C:\Windows\SysWOW64\Ncldnkae.exe
                  C:\Windows\system32\Ncldnkae.exe
                  8⤵
                  • Adds autorun key to be loaded by Explorer.exe on startup
                  • Executes dropped EXE
                  • Drops file in System32 directory
                  • Modifies registry class
                  • Suspicious use of WriteProcessMemory
                  PID:2572
                  • C:\Windows\SysWOW64\Nkcmohbg.exe
                    C:\Windows\system32\Nkcmohbg.exe
                    9⤵
                    • Executes dropped EXE
                    PID:2500
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 2500 -s 412
                      10⤵
                      • Program crash
                      PID:2280
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2500 -ip 2500
    1⤵
      PID:4572

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\SysWOW64\Ncgkcl32.exe

      Filesize

      89KB

      MD5

      d5072e51dee7a6a02542d7f171243800

      SHA1

      0321728476f7466ed915ccce97c588d0d4a39d76

      SHA256

      22d007b6f4e7b1929065c33b630d4687c523363388db0b8ad7d4a7be33495622

      SHA512

      520682099b18212fc39ca8cb09473494f76c386033cfa015f4407ed316c293c263fb04f631e74931ac650abe170f6ea3653718f9d0f1e202e7c6efc75d7c9451

    • C:\Windows\SysWOW64\Ncldnkae.exe

      Filesize

      89KB

      MD5

      4479d715a046764d6639be0eb5f03ac8

      SHA1

      9d7b7ceb27234d86b36be66091593614261dec31

      SHA256

      45535811460f5a0a09685ad530199d457ebc692a7584ce11921f383165e7f3d4

      SHA512

      f004ad5090113cd495cf4318a661353eef30e77d17cee3dad494d7045b345ed0378015cb310782eced443be43d70539a07501453861b29317b34addafea1517b

    • C:\Windows\SysWOW64\Ngedij32.exe

      Filesize

      89KB

      MD5

      51ccd7992431060d088a4315dda7c3aa

      SHA1

      a6f2fbe911604cbe5aa323f13221cce5f3811fc1

      SHA256

      2823042c3fde4f1bf96f5c109e3711202c21afeffd6ca35a044f049765371ee9

      SHA512

      7b60d1db014facd5c5678c002cb3536a5436a26d9de02bd0c111f17841ff73fa76db6c98e14c441f1460d451ed6c0663567e9b05256b32f87de665e48c7132bb

    • C:\Windows\SysWOW64\Njacpf32.exe

      Filesize

      89KB

      MD5

      bef9e575a7fbbdc0b4895cbccb0b8640

      SHA1

      0121bce4c642a4bdebe8fde492c8601bd48bfd0e

      SHA256

      8d3a266860cc6212c21b06ea9988926d622b17dbdf52cc0981edfdd25ddcf816

      SHA512

      02d6ce17973525ddab99a3eed5773bd9d28246c8638617a1ab9002a7aa236eec8f748aa35a131b4cb4f0e860a819473768bc06f5f5275357ada7edc0c5e5d874

    • C:\Windows\SysWOW64\Nkcmohbg.exe

      Filesize

      89KB

      MD5

      4f6f6132f5c524327d041a7d87415c37

      SHA1

      a5d227d3088b8f5e0e23541070801e53624d35fa

      SHA256

      93aca0f6478a073359db8e5e8d0ab577f9d4ac0a2dcce30314298ed6c1f2b6e3

      SHA512

      16aef61ab117321b832040cd8d6148768a0169a8c48684e74538a6677a4edd9c5253ac64425587c9a338860dbb2b9b3e745369432fc7cd811be608c7ef8d28a9

    • C:\Windows\SysWOW64\Nnolfdcn.exe

      Filesize

      89KB

      MD5

      a472d6093db652d1b0395f2e6b8efe75

      SHA1

      1fd65685df333e7fa9c6b5b9c51cc4ab262f1015

      SHA256

      7afb752a51d11b1674b914f21dee4adfa89e549d8132334eb6f07a645739fbbc

      SHA512

      9f56d3591cfc5fe904dd881efec3e665cc9bf16fbb49fb9ada69bb67508fa0e718a73a6af91fcf22d268ba0dac9491cb24aa954c115a81fcdffc7204b18f23c4

    • C:\Windows\SysWOW64\Nqiogp32.exe

      Filesize

      89KB

      MD5

      c35cc24bedf4df0ecb3e5113a770cddd

      SHA1

      23033158fe4aafa043d2f4ec48d41d1fdccd2549

      SHA256

      b232daf39cd14fd46e21231cbdfc2ac8105084954732f6adbd84e8e7443c3861

      SHA512

      67bb1e7be94e7fd3b75167fb0ec1e7a9228853e7ac71bed2dfe37b1e1e2a951bd6788830cf13b8de06cc27f2cc780d8edfefd37d56922ab96f829fff272a652c

    • C:\Windows\SysWOW64\Nqklmpdd.exe

      Filesize

      89KB

      MD5

      df772d10a885c41e22b6cdbf1bf16f26

      SHA1

      2b0207415669eabc3ddeb5a830522f8881a83dfe

      SHA256

      23bdba2676af4714e84857ca958f0f62d8a6cdb3a511083cbef596b0b5bb72e3

      SHA512

      842b6c4724b66b15a59de6f7dbb2dd874b44cd5469c958c4182c3f4ace60196b61fe4e6c169157db8da4942d8bccdcca7e99c32dfbf407d9222f9dd45127e2bc

    • C:\Windows\SysWOW64\Paadnmaq.dll

      Filesize

      7KB

      MD5

      a4252a55d026fee9031e4750030cc3bb

      SHA1

      e75f39ac7c21d12b721f101daccf13749a5dc24d

      SHA256

      e2dd1bd4f4adfde320c1fe4671d67a6defbe777da991dc1625aa5d7507b874e3

      SHA512

      f1f9675466144a1ce4efafc4e3e0360845585cf87f7fb47d1efa48deb6f8c254508fd995d3db04765de5eac3d38bd73828e69b54ac4268b4de9a0ff75a67c310

    • memory/116-71-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB

    • memory/116-12-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB

    • memory/1772-32-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB

    • memory/1772-68-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB

    • memory/2364-23-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB

    • memory/2364-70-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB

    • memory/2500-64-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB

    • memory/2500-65-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB

    • memory/2524-20-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB

    • memory/2572-56-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB

    • memory/2572-66-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB

    • memory/4348-40-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB

    • memory/4348-69-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB

    • memory/4352-72-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB

    • memory/4352-0-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB

    • memory/4412-47-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB

    • memory/4412-67-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB