Analysis

  • max time kernel
    144s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    20/06/2024, 00:29

General

  • Target

    8efde698fd255ec2608de2258061268f62cb57a598fd17e2660b680df42cef9d.exe

  • Size

    1.7MB

  • MD5

    54aa0de9a569fab2dc74802cbd14d344

  • SHA1

    743fbddc23627e00b5276f978fd947939936c456

  • SHA256

    8efde698fd255ec2608de2258061268f62cb57a598fd17e2660b680df42cef9d

  • SHA512

    676b9adb5b86ce00d597288d123721866b46a71a88c8e5f7895b2a637410c595bd2c71c3feb0e5203b96c61c07426af40e1a83d9b985ded96bd83bb03a6a7405

  • SSDEEP

    49152:dBsUjUSUjUvI8UjUSUjUEUjUSUjUvI8UjUSUjU:dBskJkWJkJkrkJkWJkJk

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 16 IoCs
  • Executes dropped EXE 8 IoCs
  • Loads dropped DLL 20 IoCs
  • Drops file in System32 directory 24 IoCs
  • Program crash 1 IoCs
  • Modifies registry class 27 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8efde698fd255ec2608de2258061268f62cb57a598fd17e2660b680df42cef9d.exe
    "C:\Users\Admin\AppData\Local\Temp\8efde698fd255ec2608de2258061268f62cb57a598fd17e2660b680df42cef9d.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Loads dropped DLL
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2384
    • C:\Windows\SysWOW64\Nigome32.exe
      C:\Windows\system32\Nigome32.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:1920
      • C:\Windows\SysWOW64\Nljddpfe.exe
        C:\Windows\system32\Nljddpfe.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in System32 directory
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2004
        • C:\Windows\SysWOW64\Ocdmaj32.exe
          C:\Windows\system32\Ocdmaj32.exe
          4⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in System32 directory
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:2652
          • C:\Windows\SysWOW64\Ohaeia32.exe
            C:\Windows\system32\Ohaeia32.exe
            5⤵
            • Adds autorun key to be loaded by Explorer.exe on startup
            • Executes dropped EXE
            • Loads dropped DLL
            • Drops file in System32 directory
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:2484
            • C:\Windows\SysWOW64\Olonpp32.exe
              C:\Windows\system32\Olonpp32.exe
              6⤵
              • Adds autorun key to be loaded by Explorer.exe on startup
              • Executes dropped EXE
              • Loads dropped DLL
              • Drops file in System32 directory
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:2476
              • C:\Windows\SysWOW64\Abphal32.exe
                C:\Windows\system32\Abphal32.exe
                7⤵
                • Adds autorun key to be loaded by Explorer.exe on startup
                • Executes dropped EXE
                • Loads dropped DLL
                • Drops file in System32 directory
                • Modifies registry class
                • Suspicious use of WriteProcessMemory
                PID:2132
                • C:\Windows\SysWOW64\Aijpnfif.exe
                  C:\Windows\system32\Aijpnfif.exe
                  8⤵
                  • Adds autorun key to be loaded by Explorer.exe on startup
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Drops file in System32 directory
                  • Modifies registry class
                  • Suspicious use of WriteProcessMemory
                  PID:592
                  • C:\Windows\SysWOW64\Cacacg32.exe
                    C:\Windows\system32\Cacacg32.exe
                    9⤵
                    • Executes dropped EXE
                    • Suspicious use of WriteProcessMemory
                    PID:1484
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 1484 -s 140
                      10⤵
                      • Loads dropped DLL
                      • Program crash
                      PID:1656

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\Abphal32.exe

          Filesize

          1.7MB

          MD5

          8095cc2a3837a9ec922c4a3f6cb957cb

          SHA1

          128ba5748858c6868cc972496803c5f3062b1d6a

          SHA256

          75c1c0eea822dd7735a3fc0879f148cf05a4b4784f4a4e43caf68d3df1789b25

          SHA512

          34d2f1f8deb3a940af239d6d8ea67552938e5ee664a25ba778f24fb22412ce4720b1572a4f8ea512d6124e53cf2bd499acda0c4f9788bd7c66109baf7eba51d6

        • C:\Windows\SysWOW64\Nljddpfe.exe

          Filesize

          1.7MB

          MD5

          5c891e87a683fffeae0c3cb07a289ec4

          SHA1

          7b2d8329edb0f2bd79359f7142b97fd391dff874

          SHA256

          ad524ba48a4f4431eb2c23f05a376cd242618cad0e8fc57c58eb6e26f967b850

          SHA512

          ffa59f4c3dfd17fc62952338324b195d28751e2e6380d375fd1f652e9a5077d21723ef857e6ae8804be149f204d2ff4325d8da2828df6752a33dcb0adc89c301

        • C:\Windows\SysWOW64\Ohaeia32.exe

          Filesize

          1.7MB

          MD5

          15ef8ad2bcb02763297dd7fd250b0b0e

          SHA1

          eb5497ae31544f48056b55b938f8a542e4dc47b9

          SHA256

          8db6857be3a37c07aaa66d702b3a400ed6eb19e66504e5bb4619964adb5bd4c6

          SHA512

          28d46b3b44dd1402680b3138c3ad919c4c7f47386fdb912527394e5ed175d46c5314e6ea72269258a0ae18a02e36486deb193a7d69a651ea2bdcade8db01b195

        • \Windows\SysWOW64\Aijpnfif.exe

          Filesize

          1.7MB

          MD5

          e2181aed283d06144d5f50be6910e678

          SHA1

          5834745f34c558da2054fc2c54919a58b0e23dc1

          SHA256

          97fe33901b3e4eaa391f588795870f8b0d4f72eb7826d8e729528c3e9388630b

          SHA512

          79111ad2f6d67b7dc955870a48748c783620f6b5c83231ba9703e6568c1ed898e4c460286b2fdff6275e6a5e4188668bfa252ea17f108d93c6d2f65b93404d86

        • \Windows\SysWOW64\Cacacg32.exe

          Filesize

          1.7MB

          MD5

          5faf875f6d9552434081a9ca9778a9c5

          SHA1

          4090aea6ab542ca6d638e52aa9460fb716cab073

          SHA256

          b5c677c8ee2a3c3a98861ffcba502850822d7beddb61aaa3638fa4027318c94c

          SHA512

          3330e7c934120a99ed207158894519d2271aa4851fc003230d497b1b1f3b99c43af9675cb93d2b882952c203eee38756c7b6aec92d89bddf98657639eb2705d0

        • \Windows\SysWOW64\Nigome32.exe

          Filesize

          1.7MB

          MD5

          ce4cbfbb0b7811c96c866051615a26c7

          SHA1

          8666a221e3c71e3ea0be3ae0e1a7272cd133aeef

          SHA256

          3bb5e73d8bee2a9e991f11167adf1c9e8db3fd2c865cbea2c9da7b0494676b6d

          SHA512

          e090dec2bb4da73b21f70ad205be7de0f4c84a7177b9febdfddf68916c2104ebaf708060858f4086eaba15b02022fed4e628c3bdf41190dfbe3040a2d8f508b1

        • \Windows\SysWOW64\Ocdmaj32.exe

          Filesize

          1.7MB

          MD5

          f3dd7629ca6ea48603f3320cc02b1b3d

          SHA1

          9ab1fde29e03a1b90baaa9877b24c45d9d39bf11

          SHA256

          1a37ec092c48ae426d9b04250b5465ac662dd8309d52a49fc227ade63939b998

          SHA512

          be52a11ff6945f9c407181c95bfd85ba4ad7c531106d43abdb8b3349acd213f364893dfe64d3ca1c861d9240951676132a616ee762163e15319075ac32af077a

        • \Windows\SysWOW64\Olonpp32.exe

          Filesize

          1.7MB

          MD5

          19c5637a980e3ea77baea8d22dac5a6c

          SHA1

          2a05c5af32805739458c645bd32b4e03f8baf79b

          SHA256

          775136638fe8fcf33e7c26bd219ce50c8b6b1a97fb5f41ce39b9801cf6e701fe

          SHA512

          ac2ce704faaf0e191e1558a31cf0fef46b3808d1b35924bdc811a53f11c03c903991110ca002ab0977f4128ba872a25d7116f7dcb0e23e0d6c810762ea434c13

        • memory/592-101-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/592-122-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/592-105-0x0000000000220000-0x0000000000253000-memory.dmp

          Filesize

          204KB

        • memory/1484-123-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/1920-56-0x00000000002D0000-0x0000000000303000-memory.dmp

          Filesize

          204KB

        • memory/1920-55-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/2004-59-0x0000000000220000-0x0000000000253000-memory.dmp

          Filesize

          204KB

        • memory/2004-58-0x0000000000220000-0x0000000000253000-memory.dmp

          Filesize

          204KB

        • memory/2004-57-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/2132-95-0x00000000001B0000-0x00000000001E3000-memory.dmp

          Filesize

          204KB

        • memory/2132-83-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/2132-121-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/2384-18-0x0000000000220000-0x0000000000253000-memory.dmp

          Filesize

          204KB

        • memory/2384-6-0x0000000000220000-0x0000000000253000-memory.dmp

          Filesize

          204KB

        • memory/2384-115-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/2384-0-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/2476-82-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/2484-61-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/2484-64-0x00000000003C0000-0x00000000003F3000-memory.dmp

          Filesize

          204KB

        • memory/2652-60-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB