Analysis

  • max time kernel
    118s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    26/06/2024, 01:32

General

  • Target

    a8a6317bb1cff63001a9a57a5b6e8322bcc2f6203c7b1759bdf7563156defe7b.exe

  • Size

    93KB

  • MD5

    e451a5520b450ab7d43a94f40ea4454a

  • SHA1

    a7b2ffc97b0c22f316a4c9adb6fff54eba83ab13

  • SHA256

    a8a6317bb1cff63001a9a57a5b6e8322bcc2f6203c7b1759bdf7563156defe7b

  • SHA512

    5f22d9a0f233ebe302bb4d2eaf9d3bd52f19185a726c4d28a1874811619a9fc65c2a244f0521d672e7c70a3f41c7c8e91d527f6a3232eb31d44ced35744c65da

  • SSDEEP

    1536:y9+y4lu0Him8iOXzpqGzz4dhDijurDaPDkrBR6NiTUjiwg58:yzzpT4ajrrmyNioY58

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 12 IoCs
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 16 IoCs
  • Drops file in System32 directory 18 IoCs
  • Program crash 1 IoCs
  • Modifies registry class 21 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a8a6317bb1cff63001a9a57a5b6e8322bcc2f6203c7b1759bdf7563156defe7b.exe
    "C:\Users\Admin\AppData\Local\Temp\a8a6317bb1cff63001a9a57a5b6e8322bcc2f6203c7b1759bdf7563156defe7b.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Loads dropped DLL
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2080
    • C:\Windows\SysWOW64\Mkhofjoj.exe
      C:\Windows\system32\Mkhofjoj.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:1904
      • C:\Windows\SysWOW64\Maedhd32.exe
        C:\Windows\system32\Maedhd32.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in System32 directory
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2736
        • C:\Windows\SysWOW64\Nhaikn32.exe
          C:\Windows\system32\Nhaikn32.exe
          4⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in System32 directory
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:2868
          • C:\Windows\SysWOW64\Niebhf32.exe
            C:\Windows\system32\Niebhf32.exe
            5⤵
            • Adds autorun key to be loaded by Explorer.exe on startup
            • Executes dropped EXE
            • Loads dropped DLL
            • Drops file in System32 directory
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:2416
            • C:\Windows\SysWOW64\Ndjfeo32.exe
              C:\Windows\system32\Ndjfeo32.exe
              6⤵
              • Adds autorun key to be loaded by Explorer.exe on startup
              • Executes dropped EXE
              • Loads dropped DLL
              • Drops file in System32 directory
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:2480
              • C:\Windows\SysWOW64\Nlhgoqhh.exe
                C:\Windows\system32\Nlhgoqhh.exe
                7⤵
                • Executes dropped EXE
                • Suspicious use of WriteProcessMemory
                PID:2528
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2528 -s 140
                  8⤵
                  • Loads dropped DLL
                  • Program crash
                  PID:1236

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\Kjbgng32.dll

          Filesize

          7KB

          MD5

          7fd2ca275cf5eb12a4bc624dadfb4bdf

          SHA1

          9f2856cbc3566b20acb199b579795219d7bfcbaa

          SHA256

          8cb9526ca1d32ae321c073e89dbf29550104a9fce80e5982dc26a5c924c436db

          SHA512

          05c786bedd696edbde61075d1ab9b39368bede6753155193e7a710f0b1930ca96572bf5cf89bfdeb3aaa9dfb8c598f732a7f7aba3c840121f3ab3be187279d56

        • \Windows\SysWOW64\Maedhd32.exe

          Filesize

          93KB

          MD5

          430065bbfb2323ad17729ab47fba0811

          SHA1

          5fd58442772a795515600dee6663fff60012b3dc

          SHA256

          7e040c5f37cd6c6161d9fb3f8021d8e795a331a87adc7f674c4058245cafb167

          SHA512

          c68be1165ddbc1101b81b0031269db46e8b1ed54c16578d98cce271e0fbd0b81cc189ac5e0453c6add06f6bf8b3338408060ae1afd3c3fb19266b7354585e5ea

        • \Windows\SysWOW64\Mkhofjoj.exe

          Filesize

          93KB

          MD5

          b7c55375b6f5ec609e27d551e299f4ed

          SHA1

          f7221441e7603d1366cc3a480939f62523b815bb

          SHA256

          f84fa47cb8c5749754e67734ed1193d23a5ff535a9a860f7b45a2ec2c68b1e71

          SHA512

          d84554348bec282f8008ca7a0ed7c2e2f271d2878b9e45ee467252c06be04bf65fddc8080055dd03a24dc3b89fbf9d089438e2e2e0e5ec84f2d8701b12022ab7

        • \Windows\SysWOW64\Ndjfeo32.exe

          Filesize

          93KB

          MD5

          49ce1f6ad3ccb8cb4d19bc058cedf182

          SHA1

          a5621fdf7437c1de9caca8a2735a993d15a2f52f

          SHA256

          08544f4b6ff4e3e31585dd9755a5ce19661117abbcf7bbf7ea4bacc4b05b784f

          SHA512

          e19472fa9cdad3b3a4971019a33bbd0aa3d948c9c5428824b1d9bd76679ef700e5c00cb57991e12f850dafce3b36c4e1c3a9277ac0c5d5946a2adca80845fe20

        • \Windows\SysWOW64\Nhaikn32.exe

          Filesize

          93KB

          MD5

          5686fd208cea73628fc609fac0e9d2ab

          SHA1

          c7d4a89e61e0e11abefad5c0ab2cc1ec3b479089

          SHA256

          31bf3c232cd741676da9a8f41d4abcb94d6643258acbffcc76dbdee28a7e9d2d

          SHA512

          cc9b270c432d33bc11cbfdf9dffc7d8894001465acf5d9cf601a380736960b7dd634ec4b69f0c537264a302386883e71e09944852eda46a1f5bf737238506785

        • \Windows\SysWOW64\Niebhf32.exe

          Filesize

          93KB

          MD5

          b227ce924bb6d187063ffef2a59cbeb9

          SHA1

          2d823fddc3c095ea8975dba61f17ffd6c1babda1

          SHA256

          03cb5f7093c65265148bdbcb0f85f2e5f71a4c5b78dd6bb857f5934262669e37

          SHA512

          011803a285efe69f939be826a940022d24c6a8c8e895cb8142af434d676187a7a41f86a2bcdb36fb19092d64230bd5717d624d805e9b0735954406960b2802a6

        • \Windows\SysWOW64\Nlhgoqhh.exe

          Filesize

          93KB

          MD5

          c68e6a66f7a6cb78185f0420bc2095a0

          SHA1

          718edad8ba46d8685d6cae70cd60ca00e3bfa6e9

          SHA256

          6b75415b65d10b97c77b872bba7eeb6c625d6e1feee4a4c1c022ce5583bc8b79

          SHA512

          bf7a32da5400fdd3efffd6f227049b5081f8e618ace3f3793ce60dbc240478adc6b7878abcbb83d906b493f0c1fd43b1d740576ae7363d822e3ba2c4a7591206

        • memory/1904-21-0x0000000000220000-0x000000000025F000-memory.dmp

          Filesize

          252KB

        • memory/1904-13-0x0000000000400000-0x000000000043F000-memory.dmp

          Filesize

          252KB

        • memory/1904-86-0x0000000000400000-0x000000000043F000-memory.dmp

          Filesize

          252KB

        • memory/2080-85-0x0000000000400000-0x000000000043F000-memory.dmp

          Filesize

          252KB

        • memory/2080-0-0x0000000000400000-0x000000000043F000-memory.dmp

          Filesize

          252KB

        • memory/2080-6-0x0000000000280000-0x00000000002BF000-memory.dmp

          Filesize

          252KB

        • memory/2416-54-0x0000000000400000-0x000000000043F000-memory.dmp

          Filesize

          252KB

        • memory/2416-89-0x0000000000400000-0x000000000043F000-memory.dmp

          Filesize

          252KB

        • memory/2480-66-0x0000000000400000-0x000000000043F000-memory.dmp

          Filesize

          252KB

        • memory/2480-74-0x00000000002C0000-0x00000000002FF000-memory.dmp

          Filesize

          252KB

        • memory/2480-90-0x0000000000400000-0x000000000043F000-memory.dmp

          Filesize

          252KB

        • memory/2528-80-0x0000000000400000-0x000000000043F000-memory.dmp

          Filesize

          252KB

        • memory/2736-38-0x0000000000220000-0x000000000025F000-memory.dmp

          Filesize

          252KB

        • memory/2736-87-0x0000000000400000-0x000000000043F000-memory.dmp

          Filesize

          252KB

        • memory/2868-40-0x0000000000400000-0x000000000043F000-memory.dmp

          Filesize

          252KB

        • memory/2868-88-0x0000000000400000-0x000000000043F000-memory.dmp

          Filesize

          252KB