Analysis
-
max time kernel
118s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
26/06/2024, 01:32 UTC
Static task
static1
Behavioral task
behavioral1
Sample
a8a6317bb1cff63001a9a57a5b6e8322bcc2f6203c7b1759bdf7563156defe7b.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a8a6317bb1cff63001a9a57a5b6e8322bcc2f6203c7b1759bdf7563156defe7b.exe
Resource
win10v2004-20240611-en
General
-
Target
a8a6317bb1cff63001a9a57a5b6e8322bcc2f6203c7b1759bdf7563156defe7b.exe
-
Size
93KB
-
MD5
e451a5520b450ab7d43a94f40ea4454a
-
SHA1
a7b2ffc97b0c22f316a4c9adb6fff54eba83ab13
-
SHA256
a8a6317bb1cff63001a9a57a5b6e8322bcc2f6203c7b1759bdf7563156defe7b
-
SHA512
5f22d9a0f233ebe302bb4d2eaf9d3bd52f19185a726c4d28a1874811619a9fc65c2a244f0521d672e7c70a3f41c7c8e91d527f6a3232eb31d44ced35744c65da
-
SSDEEP
1536:y9+y4lu0Him8iOXzpqGzz4dhDijurDaPDkrBR6NiTUjiwg58:yzzpT4ajrrmyNioY58
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ndjfeo32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mkhofjoj.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Maedhd32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nhaikn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Nhaikn32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Niebhf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Niebhf32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad a8a6317bb1cff63001a9a57a5b6e8322bcc2f6203c7b1759bdf7563156defe7b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" a8a6317bb1cff63001a9a57a5b6e8322bcc2f6203c7b1759bdf7563156defe7b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Mkhofjoj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Maedhd32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ndjfeo32.exe -
Executes dropped EXE 6 IoCs
pid Process 1904 Mkhofjoj.exe 2736 Maedhd32.exe 2868 Nhaikn32.exe 2416 Niebhf32.exe 2480 Ndjfeo32.exe 2528 Nlhgoqhh.exe -
Loads dropped DLL 16 IoCs
pid Process 2080 a8a6317bb1cff63001a9a57a5b6e8322bcc2f6203c7b1759bdf7563156defe7b.exe 2080 a8a6317bb1cff63001a9a57a5b6e8322bcc2f6203c7b1759bdf7563156defe7b.exe 1904 Mkhofjoj.exe 1904 Mkhofjoj.exe 2736 Maedhd32.exe 2736 Maedhd32.exe 2868 Nhaikn32.exe 2868 Nhaikn32.exe 2416 Niebhf32.exe 2416 Niebhf32.exe 2480 Ndjfeo32.exe 2480 Ndjfeo32.exe 1236 WerFault.exe 1236 WerFault.exe 1236 WerFault.exe 1236 WerFault.exe -
Drops file in System32 directory 18 IoCs
description ioc Process File created C:\Windows\SysWOW64\Diceon32.dll Maedhd32.exe File created C:\Windows\SysWOW64\Lamajm32.dll Ndjfeo32.exe File created C:\Windows\SysWOW64\Ndjfeo32.exe Niebhf32.exe File opened for modification C:\Windows\SysWOW64\Ndjfeo32.exe Niebhf32.exe File created C:\Windows\SysWOW64\Mkhofjoj.exe a8a6317bb1cff63001a9a57a5b6e8322bcc2f6203c7b1759bdf7563156defe7b.exe File created C:\Windows\SysWOW64\Maedhd32.exe Mkhofjoj.exe File opened for modification C:\Windows\SysWOW64\Nhaikn32.exe Maedhd32.exe File created C:\Windows\SysWOW64\Niebhf32.exe Nhaikn32.exe File opened for modification C:\Windows\SysWOW64\Niebhf32.exe Nhaikn32.exe File created C:\Windows\SysWOW64\Fcihoc32.dll Nhaikn32.exe File created C:\Windows\SysWOW64\Kjbgng32.dll Niebhf32.exe File created C:\Windows\SysWOW64\Nlhgoqhh.exe Ndjfeo32.exe File created C:\Windows\SysWOW64\Lnlmhpjh.dll a8a6317bb1cff63001a9a57a5b6e8322bcc2f6203c7b1759bdf7563156defe7b.exe File created C:\Windows\SysWOW64\Macalohk.dll Mkhofjoj.exe File created C:\Windows\SysWOW64\Nhaikn32.exe Maedhd32.exe File opened for modification C:\Windows\SysWOW64\Nlhgoqhh.exe Ndjfeo32.exe File opened for modification C:\Windows\SysWOW64\Mkhofjoj.exe a8a6317bb1cff63001a9a57a5b6e8322bcc2f6203c7b1759bdf7563156defe7b.exe File opened for modification C:\Windows\SysWOW64\Maedhd32.exe Mkhofjoj.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1236 2528 WerFault.exe 33 -
Modifies registry class 21 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 a8a6317bb1cff63001a9a57a5b6e8322bcc2f6203c7b1759bdf7563156defe7b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node a8a6317bb1cff63001a9a57a5b6e8322bcc2f6203c7b1759bdf7563156defe7b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Maedhd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Diceon32.dll" Maedhd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ndjfeo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717} a8a6317bb1cff63001a9a57a5b6e8322bcc2f6203c7b1759bdf7563156defe7b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fcihoc32.dll" Nhaikn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Nhaikn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ndjfeo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Macalohk.dll" Mkhofjoj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Mkhofjoj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Nhaikn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kjbgng32.dll" Niebhf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Niebhf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID a8a6317bb1cff63001a9a57a5b6e8322bcc2f6203c7b1759bdf7563156defe7b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lnlmhpjh.dll" a8a6317bb1cff63001a9a57a5b6e8322bcc2f6203c7b1759bdf7563156defe7b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" a8a6317bb1cff63001a9a57a5b6e8322bcc2f6203c7b1759bdf7563156defe7b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Mkhofjoj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Maedhd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Niebhf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lamajm32.dll" Ndjfeo32.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2080 wrote to memory of 1904 2080 a8a6317bb1cff63001a9a57a5b6e8322bcc2f6203c7b1759bdf7563156defe7b.exe 28 PID 2080 wrote to memory of 1904 2080 a8a6317bb1cff63001a9a57a5b6e8322bcc2f6203c7b1759bdf7563156defe7b.exe 28 PID 2080 wrote to memory of 1904 2080 a8a6317bb1cff63001a9a57a5b6e8322bcc2f6203c7b1759bdf7563156defe7b.exe 28 PID 2080 wrote to memory of 1904 2080 a8a6317bb1cff63001a9a57a5b6e8322bcc2f6203c7b1759bdf7563156defe7b.exe 28 PID 1904 wrote to memory of 2736 1904 Mkhofjoj.exe 29 PID 1904 wrote to memory of 2736 1904 Mkhofjoj.exe 29 PID 1904 wrote to memory of 2736 1904 Mkhofjoj.exe 29 PID 1904 wrote to memory of 2736 1904 Mkhofjoj.exe 29 PID 2736 wrote to memory of 2868 2736 Maedhd32.exe 30 PID 2736 wrote to memory of 2868 2736 Maedhd32.exe 30 PID 2736 wrote to memory of 2868 2736 Maedhd32.exe 30 PID 2736 wrote to memory of 2868 2736 Maedhd32.exe 30 PID 2868 wrote to memory of 2416 2868 Nhaikn32.exe 31 PID 2868 wrote to memory of 2416 2868 Nhaikn32.exe 31 PID 2868 wrote to memory of 2416 2868 Nhaikn32.exe 31 PID 2868 wrote to memory of 2416 2868 Nhaikn32.exe 31 PID 2416 wrote to memory of 2480 2416 Niebhf32.exe 32 PID 2416 wrote to memory of 2480 2416 Niebhf32.exe 32 PID 2416 wrote to memory of 2480 2416 Niebhf32.exe 32 PID 2416 wrote to memory of 2480 2416 Niebhf32.exe 32 PID 2480 wrote to memory of 2528 2480 Ndjfeo32.exe 33 PID 2480 wrote to memory of 2528 2480 Ndjfeo32.exe 33 PID 2480 wrote to memory of 2528 2480 Ndjfeo32.exe 33 PID 2480 wrote to memory of 2528 2480 Ndjfeo32.exe 33 PID 2528 wrote to memory of 1236 2528 Nlhgoqhh.exe 34 PID 2528 wrote to memory of 1236 2528 Nlhgoqhh.exe 34 PID 2528 wrote to memory of 1236 2528 Nlhgoqhh.exe 34 PID 2528 wrote to memory of 1236 2528 Nlhgoqhh.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\a8a6317bb1cff63001a9a57a5b6e8322bcc2f6203c7b1759bdf7563156defe7b.exe"C:\Users\Admin\AppData\Local\Temp\a8a6317bb1cff63001a9a57a5b6e8322bcc2f6203c7b1759bdf7563156defe7b.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Windows\SysWOW64\Mkhofjoj.exeC:\Windows\system32\Mkhofjoj.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Windows\SysWOW64\Maedhd32.exeC:\Windows\system32\Maedhd32.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\SysWOW64\Nhaikn32.exeC:\Windows\system32\Nhaikn32.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Windows\SysWOW64\Niebhf32.exeC:\Windows\system32\Niebhf32.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Windows\SysWOW64\Ndjfeo32.exeC:\Windows\system32\Ndjfeo32.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Windows\SysWOW64\Nlhgoqhh.exeC:\Windows\system32\Nlhgoqhh.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2528 -s 1408⤵
- Loads dropped DLL
- Program crash
PID:1236
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7KB
MD57fd2ca275cf5eb12a4bc624dadfb4bdf
SHA19f2856cbc3566b20acb199b579795219d7bfcbaa
SHA2568cb9526ca1d32ae321c073e89dbf29550104a9fce80e5982dc26a5c924c436db
SHA51205c786bedd696edbde61075d1ab9b39368bede6753155193e7a710f0b1930ca96572bf5cf89bfdeb3aaa9dfb8c598f732a7f7aba3c840121f3ab3be187279d56
-
Filesize
93KB
MD5430065bbfb2323ad17729ab47fba0811
SHA15fd58442772a795515600dee6663fff60012b3dc
SHA2567e040c5f37cd6c6161d9fb3f8021d8e795a331a87adc7f674c4058245cafb167
SHA512c68be1165ddbc1101b81b0031269db46e8b1ed54c16578d98cce271e0fbd0b81cc189ac5e0453c6add06f6bf8b3338408060ae1afd3c3fb19266b7354585e5ea
-
Filesize
93KB
MD5b7c55375b6f5ec609e27d551e299f4ed
SHA1f7221441e7603d1366cc3a480939f62523b815bb
SHA256f84fa47cb8c5749754e67734ed1193d23a5ff535a9a860f7b45a2ec2c68b1e71
SHA512d84554348bec282f8008ca7a0ed7c2e2f271d2878b9e45ee467252c06be04bf65fddc8080055dd03a24dc3b89fbf9d089438e2e2e0e5ec84f2d8701b12022ab7
-
Filesize
93KB
MD549ce1f6ad3ccb8cb4d19bc058cedf182
SHA1a5621fdf7437c1de9caca8a2735a993d15a2f52f
SHA25608544f4b6ff4e3e31585dd9755a5ce19661117abbcf7bbf7ea4bacc4b05b784f
SHA512e19472fa9cdad3b3a4971019a33bbd0aa3d948c9c5428824b1d9bd76679ef700e5c00cb57991e12f850dafce3b36c4e1c3a9277ac0c5d5946a2adca80845fe20
-
Filesize
93KB
MD55686fd208cea73628fc609fac0e9d2ab
SHA1c7d4a89e61e0e11abefad5c0ab2cc1ec3b479089
SHA25631bf3c232cd741676da9a8f41d4abcb94d6643258acbffcc76dbdee28a7e9d2d
SHA512cc9b270c432d33bc11cbfdf9dffc7d8894001465acf5d9cf601a380736960b7dd634ec4b69f0c537264a302386883e71e09944852eda46a1f5bf737238506785
-
Filesize
93KB
MD5b227ce924bb6d187063ffef2a59cbeb9
SHA12d823fddc3c095ea8975dba61f17ffd6c1babda1
SHA25603cb5f7093c65265148bdbcb0f85f2e5f71a4c5b78dd6bb857f5934262669e37
SHA512011803a285efe69f939be826a940022d24c6a8c8e895cb8142af434d676187a7a41f86a2bcdb36fb19092d64230bd5717d624d805e9b0735954406960b2802a6
-
Filesize
93KB
MD5c68e6a66f7a6cb78185f0420bc2095a0
SHA1718edad8ba46d8685d6cae70cd60ca00e3bfa6e9
SHA2566b75415b65d10b97c77b872bba7eeb6c625d6e1feee4a4c1c022ce5583bc8b79
SHA512bf7a32da5400fdd3efffd6f227049b5081f8e618ace3f3793ce60dbc240478adc6b7878abcbb83d906b493f0c1fd43b1d740576ae7363d822e3ba2c4a7591206