Analysis

  • max time kernel
    145s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    17/06/2024, 02:14

General

  • Target

    c9ee84c8999683dc08fe6589d30a08d8fbe209d2c36e4a6163b419503e14fe0e.exe

  • Size

    512KB

  • MD5

    73ee1864047665bdcfe61716b639b239

  • SHA1

    5f798881c939b4a12471bd6fce39b777ec4775a0

  • SHA256

    c9ee84c8999683dc08fe6589d30a08d8fbe209d2c36e4a6163b419503e14fe0e

  • SHA512

    4072bec33c068e2ca197e447a29b9ef15a9037c9ea3183631f41cc629bfa0d0859480de36436e7cd7df5abef1cfcef2160179278eb22d6b7f95b2559fb2a8b1d

  • SSDEEP

    6144:SjFpVCDmUrdQt383PQ///NR5fKr2n0MO3LPlkUCmVs5bPQ///NR5fjlt01PB93G4:S7oDYr/Ng1/Nblt01PBExK

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 32 IoCs
  • Executes dropped EXE 16 IoCs
  • Loads dropped DLL 36 IoCs
  • Drops file in System32 directory 48 IoCs
  • Program crash 1 IoCs
  • Modifies registry class 51 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c9ee84c8999683dc08fe6589d30a08d8fbe209d2c36e4a6163b419503e14fe0e.exe
    "C:\Users\Admin\AppData\Local\Temp\c9ee84c8999683dc08fe6589d30a08d8fbe209d2c36e4a6163b419503e14fe0e.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Loads dropped DLL
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2440
    • C:\Windows\SysWOW64\Homclekn.exe
      C:\Windows\system32\Homclekn.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2192
      • C:\Windows\SysWOW64\Hdqbekcm.exe
        C:\Windows\system32\Hdqbekcm.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in System32 directory
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2604
        • C:\Windows\SysWOW64\Idcokkak.exe
          C:\Windows\system32\Idcokkak.exe
          4⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in System32 directory
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:2656
          • C:\Windows\SysWOW64\Ifkacb32.exe
            C:\Windows\system32\Ifkacb32.exe
            5⤵
            • Adds autorun key to be loaded by Explorer.exe on startup
            • Executes dropped EXE
            • Loads dropped DLL
            • Drops file in System32 directory
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:2708
            • C:\Windows\SysWOW64\Jkmcfhkc.exe
              C:\Windows\system32\Jkmcfhkc.exe
              6⤵
              • Adds autorun key to be loaded by Explorer.exe on startup
              • Executes dropped EXE
              • Loads dropped DLL
              • Drops file in System32 directory
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:2500
              • C:\Windows\SysWOW64\Jgcdki32.exe
                C:\Windows\system32\Jgcdki32.exe
                7⤵
                • Adds autorun key to be loaded by Explorer.exe on startup
                • Executes dropped EXE
                • Loads dropped DLL
                • Drops file in System32 directory
                • Modifies registry class
                • Suspicious use of WriteProcessMemory
                PID:2984
                • C:\Windows\SysWOW64\Kmgbdo32.exe
                  C:\Windows\system32\Kmgbdo32.exe
                  8⤵
                  • Adds autorun key to be loaded by Explorer.exe on startup
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Drops file in System32 directory
                  • Modifies registry class
                  • Suspicious use of WriteProcessMemory
                  PID:516
                  • C:\Windows\SysWOW64\Kklpekno.exe
                    C:\Windows\system32\Kklpekno.exe
                    9⤵
                    • Adds autorun key to be loaded by Explorer.exe on startup
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Drops file in System32 directory
                    • Modifies registry class
                    • Suspicious use of WriteProcessMemory
                    PID:3012
                    • C:\Windows\SysWOW64\Knpemf32.exe
                      C:\Windows\system32\Knpemf32.exe
                      10⤵
                      • Adds autorun key to be loaded by Explorer.exe on startup
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • Drops file in System32 directory
                      • Modifies registry class
                      • Suspicious use of WriteProcessMemory
                      PID:2676
                      • C:\Windows\SysWOW64\Lgjfkk32.exe
                        C:\Windows\system32\Lgjfkk32.exe
                        11⤵
                        • Adds autorun key to be loaded by Explorer.exe on startup
                        • Executes dropped EXE
                        • Loads dropped DLL
                        • Drops file in System32 directory
                        • Modifies registry class
                        • Suspicious use of WriteProcessMemory
                        PID:2804
                        • C:\Windows\SysWOW64\Mooaljkh.exe
                          C:\Windows\system32\Mooaljkh.exe
                          12⤵
                          • Adds autorun key to be loaded by Explorer.exe on startup
                          • Executes dropped EXE
                          • Loads dropped DLL
                          • Drops file in System32 directory
                          • Modifies registry class
                          • Suspicious use of WriteProcessMemory
                          PID:2560
                          • C:\Windows\SysWOW64\Mhhfdo32.exe
                            C:\Windows\system32\Mhhfdo32.exe
                            13⤵
                            • Adds autorun key to be loaded by Explorer.exe on startup
                            • Executes dropped EXE
                            • Loads dropped DLL
                            • Drops file in System32 directory
                            • Modifies registry class
                            • Suspicious use of WriteProcessMemory
                            PID:628
                            • C:\Windows\SysWOW64\Mhloponc.exe
                              C:\Windows\system32\Mhloponc.exe
                              14⤵
                              • Adds autorun key to be loaded by Explorer.exe on startup
                              • Executes dropped EXE
                              • Loads dropped DLL
                              • Drops file in System32 directory
                              • Modifies registry class
                              • Suspicious use of WriteProcessMemory
                              PID:2856
                              • C:\Windows\SysWOW64\Mdcpdp32.exe
                                C:\Windows\system32\Mdcpdp32.exe
                                15⤵
                                • Adds autorun key to be loaded by Explorer.exe on startup
                                • Executes dropped EXE
                                • Loads dropped DLL
                                • Drops file in System32 directory
                                • Modifies registry class
                                • Suspicious use of WriteProcessMemory
                                PID:2080
                                • C:\Windows\SysWOW64\Npagjpcd.exe
                                  C:\Windows\system32\Npagjpcd.exe
                                  16⤵
                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  • Drops file in System32 directory
                                  • Modifies registry class
                                  • Suspicious use of WriteProcessMemory
                                  PID:1888
                                  • C:\Windows\SysWOW64\Nlhgoqhh.exe
                                    C:\Windows\system32\Nlhgoqhh.exe
                                    17⤵
                                    • Executes dropped EXE
                                    PID:2016
                                    • C:\Windows\SysWOW64\WerFault.exe
                                      C:\Windows\SysWOW64\WerFault.exe -u -p 2016 -s 140
                                      18⤵
                                      • Loads dropped DLL
                                      • Program crash
                                      PID:2404

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\Ifkacb32.exe

    Filesize

    512KB

    MD5

    415bd3596ee56b8425ad7578868d9947

    SHA1

    3a15cebcf7b6b4301404b8856382bcab51ffaa62

    SHA256

    c24326c4d5038bc02c82bf967a6d4669bbde51d54d3c26c3aeca7124434c70a5

    SHA512

    f2e9dfc5abe761a08bfceb6e2c612f97c299698f804c1ee64778b784ad69a3e699e05c19667455f3774f04b2aeeb81ca1de4b60ae3023cdec39c28555ab93bf6

  • C:\Windows\SysWOW64\Lgjfkk32.exe

    Filesize

    512KB

    MD5

    39b28b09882a4022676e22b726e4f608

    SHA1

    e381f3ce20f14e31cf52cd0bf51df3c0d0b9906c

    SHA256

    6632cd7911032803431036870b65af29b9cc87c8b69497175de529f8bc95c7f3

    SHA512

    e13449aaf29188d0e5f629dd85a2be6b546ecb7e32b6593f3451d36d21a3d6f111d062bc950e491d162363124c6b029f96c29d949c69e2cf7c6397f7033e7bd1

  • \Windows\SysWOW64\Hdqbekcm.exe

    Filesize

    512KB

    MD5

    024690d651dfe2154c32b083b1eecf59

    SHA1

    9c28ee9bfcdd61a07151c5316033914ef2b7a136

    SHA256

    dfc29e4df49a44fd93234ab8cda9c1cd9771f936ddb6b0774584492032dae6eb

    SHA512

    964060d269452f9889493f07c8f4c8ecf6578c2af1cb388a87fb76f4a06a971473d036a15e34d272d9febd92cd5f676193cb25e4d84a653c510d3e11cd1f714c

  • \Windows\SysWOW64\Homclekn.exe

    Filesize

    512KB

    MD5

    8a8e6965b30e4154c9fb12c32d7ad83b

    SHA1

    63f45342fb9f6f0abc74aa6b55c1adebe966e985

    SHA256

    8537a8855b83bf0fecba6b9658f73656cba7316d9ece1f974c9eb4ed8aa5fd06

    SHA512

    d42cd3496944a05b6c3f930da5aa6f01a4c433d831969df26a0aec53b5ee4807d7c635ec0d212186c92b5a39bc42c071f6ae2581c7a6a4a56c51518c7d6d40b8

  • \Windows\SysWOW64\Idcokkak.exe

    Filesize

    512KB

    MD5

    704b3704cff72655ff7dca2f6cd43705

    SHA1

    16224a48bf025821fac3123429bda6b5e4343a29

    SHA256

    4e64a18413193a1be7985decd59b1e564f6ad1bb9b3c514627dc7f9fd01aae27

    SHA512

    cd03c618bfe408fecadae5457b8b94e926c37b8319cf8c7527433803932920189228327b56c7eaac2d9350f05981ace5fdac8268cfb6e13802335b7250d6eb52

  • \Windows\SysWOW64\Jgcdki32.exe

    Filesize

    512KB

    MD5

    2dc5fb60905f59d75e5d35a57eda0efa

    SHA1

    9c46c050cdcf54c1120cb2989606ce0c9bc733a7

    SHA256

    70059f7672b30388e9d9c78e3b170dc931018ec885f8f2fe646621c2c8f04d5a

    SHA512

    c4c48a059d125f61cd2fe0db2b97f8acb3e7c7b45ba0b80a1ee291f5b74a5c76327140d8e8ece4c00c363558007ae5e05cd95bf519166c77419e1400975d05f7

  • \Windows\SysWOW64\Jkmcfhkc.exe

    Filesize

    512KB

    MD5

    bf949c7ef349ec73267bdc8f5272c8bd

    SHA1

    6e513690b0b8b9abc5cbdfc1d9f1b2da553946c5

    SHA256

    662356a1bba76873d110137f06a92df34b8bccdada94d13c75ffa2b6cb112225

    SHA512

    a46cbf39494dfeeb14226598a44964fb65f0410ee5e47ef46f7ebabe614fe54ced557a53e807cec78b9af35e786a2275340d2028b7aee0bf0cdf6beea923d2bd

  • \Windows\SysWOW64\Kklpekno.exe

    Filesize

    512KB

    MD5

    144bb919b66dd003e35415ce8750c65e

    SHA1

    07fc7a43238261246a80ea10f91eab082e473953

    SHA256

    5c93b3737a9dc914047c83931288b657a2fd75f6658a34b041ad5d68d44ec552

    SHA512

    b870035dc2a8d0d80865b9de563762511310c8ffcf7f8d39519736b99b10300dd7e508147b46d9b68cfd91c61a2cc7f3e43c1d2a2b7c7cef1153da834b8e1e6f

  • \Windows\SysWOW64\Kmgbdo32.exe

    Filesize

    512KB

    MD5

    72e0f23c02176ca4132040f22c0484d0

    SHA1

    0e8dff110ff20682a0ffe0104278e4babe701e9a

    SHA256

    84ae84a151a413b4acd83825b609f1860715f90fea9bc7f1b28cf1dc56ce92d6

    SHA512

    dd63f6d447c70a9540796b7a8162121437cdfe84d3f4e64ee1043ced2bfa3edc20d4be530d78c06f2a260dc8bc310efa87c66f5825a4817800e724d95a74129f

  • \Windows\SysWOW64\Knpemf32.exe

    Filesize

    512KB

    MD5

    e69a6c07a496a51eadea1df18a72c829

    SHA1

    37481eb4d596a74935f24f19d500fa72238930af

    SHA256

    b4a8b0dabb0e62053a06bda35f8d1cd891c9e0dfa022ed70185eb7974b4fc8ea

    SHA512

    541e5a2e940e50680b852d2cfa943cf560d5a7237195dda727fa14a694c9d1f61a82665b5bccc1e69d97f8ddc830560c53626802beb59e38144e36e6e970eaec

  • \Windows\SysWOW64\Mdcpdp32.exe

    Filesize

    512KB

    MD5

    27b9c8c6f5af40e43211de26ed02333a

    SHA1

    0b4a86e5a3a887dd91fdafc073a130ed64fea68a

    SHA256

    cbdf8f6a71d9536c1362b3f531665500cf5fcabe28a20202552067507e2ac0d0

    SHA512

    66edaaef3bd173e5b7659ec9daf93b252b64289c3fbd471f35d1ac08a6af489f63664550213cde04414a2f94e20f2a75e14d7ccfac927683e26a47e016ffddd6

  • \Windows\SysWOW64\Mhhfdo32.exe

    Filesize

    512KB

    MD5

    4eaf4a25363f7c8787986766cbaf7737

    SHA1

    07b2b8b6a8a1b8418c058cd2df7031cffb01ae0b

    SHA256

    cecff6bc4ee6c9b353de61c9d77a2b5e4b0da7864501cd4cab81bd90c2884c3a

    SHA512

    710b466e50b6f6adced4e248bd4689a9e1add2ad620ac7c7e8ffa7b14fdfb5ce5e7f14fe7827d6e5b6139e56f2f3f8b59797edf4b287929874d89d97ade83439

  • \Windows\SysWOW64\Mhloponc.exe

    Filesize

    512KB

    MD5

    bf0d9f8446115a6badba54059f9cf1ea

    SHA1

    b20ce8e7b908f7bae9705d7efca8a0a02a5da6f1

    SHA256

    fbbe3dce2c966a68cdce87a81ce796518ad8e3e89b8d64054ae765dbe2d3e3df

    SHA512

    2508d4b26d1d8158534bfd28305407917661a4848c56c11477f60e02b3ef461b27c48d4dfa16eb845df923bb872bdf424afdbbe0f9c458e8de185bc3861b0999

  • \Windows\SysWOW64\Mooaljkh.exe

    Filesize

    512KB

    MD5

    0689331c7b59eb36d179c591f5799197

    SHA1

    b875eb24fbc90ba89302017be3e500270afb09d5

    SHA256

    4283236b21002c0a940c89daee27df0fac48a9c29778a2d3a12ac87ac37c1012

    SHA512

    be9b7f619faec4f5c475e39cc04d5a0cb8aa147df43928867c4db2004e70ab714b045b868cecb2ee0ce5efc631f10d76be61c67f1e4a222e5aa9ccb7ee292dea

  • \Windows\SysWOW64\Nlhgoqhh.exe

    Filesize

    512KB

    MD5

    5bfef64fa98e0a791f78d42952f090f6

    SHA1

    8a40d492e9431efc898b639fbecbf88cd64a2b70

    SHA256

    f12eae59bfad8bdecdc9da73bf86bf3c7ed5da8fc213c755d2f1e9e5b0d1e126

    SHA512

    15dbfe6c45d2abc57745cb698e4672f15076dba98eed2b4c4004c9497e76c6ca07097ae5037fb89360bdf0b5256e17ff3ebe1cde26d9988a1ff091a20e3a8a66

  • \Windows\SysWOW64\Npagjpcd.exe

    Filesize

    512KB

    MD5

    5781ddf8111dc7a8ec3ccb921ba6388b

    SHA1

    7b2c55ffcbfe50d01cd777997f41d8b88a1e9832

    SHA256

    4f6fe9ddefde9c63b95bc33a6b76c80b415c55b4cdce41196b71587cbc1e14bc

    SHA512

    fc0a4d758b30ab94b5531578229e28c6503060f340683132b38141d3b85bcce4543257dce3662c80d4ffb2865485add3acd70f81ca628bc38eb41434ee172ba6

  • memory/516-101-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/516-105-0x00000000002C0000-0x00000000002F4000-memory.dmp

    Filesize

    208KB

  • memory/516-232-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/628-185-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/1888-210-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/1888-240-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2016-241-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2016-223-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2080-203-0x0000000000220000-0x0000000000254000-memory.dmp

    Filesize

    208KB

  • memory/2080-195-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2080-239-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2080-209-0x0000000000220000-0x0000000000254000-memory.dmp

    Filesize

    208KB

  • memory/2192-20-0x0000000000220000-0x0000000000254000-memory.dmp

    Filesize

    208KB

  • memory/2192-226-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2440-6-0x00000000002A0000-0x00000000002D4000-memory.dmp

    Filesize

    208KB

  • memory/2440-0-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2440-225-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2500-74-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2500-230-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2500-82-0x0000000000220000-0x0000000000254000-memory.dmp

    Filesize

    208KB

  • memory/2560-155-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2560-236-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2560-184-0x0000000000220000-0x0000000000254000-memory.dmp

    Filesize

    208KB

  • memory/2604-227-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2604-34-0x0000000000220000-0x0000000000254000-memory.dmp

    Filesize

    208KB

  • memory/2604-31-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2656-52-0x0000000000300000-0x0000000000334000-memory.dmp

    Filesize

    208KB

  • memory/2656-45-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2656-53-0x0000000000300000-0x0000000000334000-memory.dmp

    Filesize

    208KB

  • memory/2676-125-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2676-234-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2676-138-0x0000000000220000-0x0000000000254000-memory.dmp

    Filesize

    208KB

  • memory/2708-68-0x0000000000220000-0x0000000000254000-memory.dmp

    Filesize

    208KB

  • memory/2708-55-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2708-229-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2804-147-0x0000000000220000-0x0000000000254000-memory.dmp

    Filesize

    208KB

  • memory/2804-139-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2804-235-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2804-152-0x0000000000220000-0x0000000000254000-memory.dmp

    Filesize

    208KB

  • memory/2856-189-0x0000000000220000-0x0000000000254000-memory.dmp

    Filesize

    208KB

  • memory/2856-186-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2984-90-0x00000000002D0000-0x0000000000304000-memory.dmp

    Filesize

    208KB

  • memory/2984-231-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2984-83-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/3012-123-0x00000000002B0000-0x00000000002E4000-memory.dmp

    Filesize

    208KB

  • memory/3012-233-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/3012-111-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB