Analysis

  • max time kernel
    118s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    26/06/2024, 01:32 UTC

General

  • Target

    a8a6317bb1cff63001a9a57a5b6e8322bcc2f6203c7b1759bdf7563156defe7b.exe

  • Size

    93KB

  • MD5

    e451a5520b450ab7d43a94f40ea4454a

  • SHA1

    a7b2ffc97b0c22f316a4c9adb6fff54eba83ab13

  • SHA256

    a8a6317bb1cff63001a9a57a5b6e8322bcc2f6203c7b1759bdf7563156defe7b

  • SHA512

    5f22d9a0f233ebe302bb4d2eaf9d3bd52f19185a726c4d28a1874811619a9fc65c2a244f0521d672e7c70a3f41c7c8e91d527f6a3232eb31d44ced35744c65da

  • SSDEEP

    1536:y9+y4lu0Him8iOXzpqGzz4dhDijurDaPDkrBR6NiTUjiwg58:yzzpT4ajrrmyNioY58

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 12 IoCs
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 16 IoCs
  • Drops file in System32 directory 18 IoCs
  • Program crash 1 IoCs
  • Modifies registry class 21 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a8a6317bb1cff63001a9a57a5b6e8322bcc2f6203c7b1759bdf7563156defe7b.exe
    "C:\Users\Admin\AppData\Local\Temp\a8a6317bb1cff63001a9a57a5b6e8322bcc2f6203c7b1759bdf7563156defe7b.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Loads dropped DLL
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2080
    • C:\Windows\SysWOW64\Mkhofjoj.exe
      C:\Windows\system32\Mkhofjoj.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:1904
      • C:\Windows\SysWOW64\Maedhd32.exe
        C:\Windows\system32\Maedhd32.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in System32 directory
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2736
        • C:\Windows\SysWOW64\Nhaikn32.exe
          C:\Windows\system32\Nhaikn32.exe
          4⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in System32 directory
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:2868
          • C:\Windows\SysWOW64\Niebhf32.exe
            C:\Windows\system32\Niebhf32.exe
            5⤵
            • Adds autorun key to be loaded by Explorer.exe on startup
            • Executes dropped EXE
            • Loads dropped DLL
            • Drops file in System32 directory
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:2416
            • C:\Windows\SysWOW64\Ndjfeo32.exe
              C:\Windows\system32\Ndjfeo32.exe
              6⤵
              • Adds autorun key to be loaded by Explorer.exe on startup
              • Executes dropped EXE
              • Loads dropped DLL
              • Drops file in System32 directory
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:2480
              • C:\Windows\SysWOW64\Nlhgoqhh.exe
                C:\Windows\system32\Nlhgoqhh.exe
                7⤵
                • Executes dropped EXE
                • Suspicious use of WriteProcessMemory
                PID:2528
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2528 -s 140
                  8⤵
                  • Loads dropped DLL
                  • Program crash
                  PID:1236

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\Kjbgng32.dll

    Filesize

    7KB

    MD5

    7fd2ca275cf5eb12a4bc624dadfb4bdf

    SHA1

    9f2856cbc3566b20acb199b579795219d7bfcbaa

    SHA256

    8cb9526ca1d32ae321c073e89dbf29550104a9fce80e5982dc26a5c924c436db

    SHA512

    05c786bedd696edbde61075d1ab9b39368bede6753155193e7a710f0b1930ca96572bf5cf89bfdeb3aaa9dfb8c598f732a7f7aba3c840121f3ab3be187279d56

  • \Windows\SysWOW64\Maedhd32.exe

    Filesize

    93KB

    MD5

    430065bbfb2323ad17729ab47fba0811

    SHA1

    5fd58442772a795515600dee6663fff60012b3dc

    SHA256

    7e040c5f37cd6c6161d9fb3f8021d8e795a331a87adc7f674c4058245cafb167

    SHA512

    c68be1165ddbc1101b81b0031269db46e8b1ed54c16578d98cce271e0fbd0b81cc189ac5e0453c6add06f6bf8b3338408060ae1afd3c3fb19266b7354585e5ea

  • \Windows\SysWOW64\Mkhofjoj.exe

    Filesize

    93KB

    MD5

    b7c55375b6f5ec609e27d551e299f4ed

    SHA1

    f7221441e7603d1366cc3a480939f62523b815bb

    SHA256

    f84fa47cb8c5749754e67734ed1193d23a5ff535a9a860f7b45a2ec2c68b1e71

    SHA512

    d84554348bec282f8008ca7a0ed7c2e2f271d2878b9e45ee467252c06be04bf65fddc8080055dd03a24dc3b89fbf9d089438e2e2e0e5ec84f2d8701b12022ab7

  • \Windows\SysWOW64\Ndjfeo32.exe

    Filesize

    93KB

    MD5

    49ce1f6ad3ccb8cb4d19bc058cedf182

    SHA1

    a5621fdf7437c1de9caca8a2735a993d15a2f52f

    SHA256

    08544f4b6ff4e3e31585dd9755a5ce19661117abbcf7bbf7ea4bacc4b05b784f

    SHA512

    e19472fa9cdad3b3a4971019a33bbd0aa3d948c9c5428824b1d9bd76679ef700e5c00cb57991e12f850dafce3b36c4e1c3a9277ac0c5d5946a2adca80845fe20

  • \Windows\SysWOW64\Nhaikn32.exe

    Filesize

    93KB

    MD5

    5686fd208cea73628fc609fac0e9d2ab

    SHA1

    c7d4a89e61e0e11abefad5c0ab2cc1ec3b479089

    SHA256

    31bf3c232cd741676da9a8f41d4abcb94d6643258acbffcc76dbdee28a7e9d2d

    SHA512

    cc9b270c432d33bc11cbfdf9dffc7d8894001465acf5d9cf601a380736960b7dd634ec4b69f0c537264a302386883e71e09944852eda46a1f5bf737238506785

  • \Windows\SysWOW64\Niebhf32.exe

    Filesize

    93KB

    MD5

    b227ce924bb6d187063ffef2a59cbeb9

    SHA1

    2d823fddc3c095ea8975dba61f17ffd6c1babda1

    SHA256

    03cb5f7093c65265148bdbcb0f85f2e5f71a4c5b78dd6bb857f5934262669e37

    SHA512

    011803a285efe69f939be826a940022d24c6a8c8e895cb8142af434d676187a7a41f86a2bcdb36fb19092d64230bd5717d624d805e9b0735954406960b2802a6

  • \Windows\SysWOW64\Nlhgoqhh.exe

    Filesize

    93KB

    MD5

    c68e6a66f7a6cb78185f0420bc2095a0

    SHA1

    718edad8ba46d8685d6cae70cd60ca00e3bfa6e9

    SHA256

    6b75415b65d10b97c77b872bba7eeb6c625d6e1feee4a4c1c022ce5583bc8b79

    SHA512

    bf7a32da5400fdd3efffd6f227049b5081f8e618ace3f3793ce60dbc240478adc6b7878abcbb83d906b493f0c1fd43b1d740576ae7363d822e3ba2c4a7591206

  • memory/1904-21-0x0000000000220000-0x000000000025F000-memory.dmp

    Filesize

    252KB

  • memory/1904-13-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/1904-86-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/2080-85-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/2080-0-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/2080-6-0x0000000000280000-0x00000000002BF000-memory.dmp

    Filesize

    252KB

  • memory/2416-54-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/2416-89-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/2480-66-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/2480-74-0x00000000002C0000-0x00000000002FF000-memory.dmp

    Filesize

    252KB

  • memory/2480-90-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/2528-80-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/2736-38-0x0000000000220000-0x000000000025F000-memory.dmp

    Filesize

    252KB

  • memory/2736-87-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/2868-40-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/2868-88-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.