Analysis
-
max time kernel
125s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
06-07-2024 04:07
Static task
static1
Behavioral task
behavioral1
Sample
3e8f8a9aa579047d92bbfe75994accf0.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3e8f8a9aa579047d92bbfe75994accf0.exe
Resource
win10v2004-20240704-en
General
-
Target
3e8f8a9aa579047d92bbfe75994accf0.exe
-
Size
59KB
-
MD5
3e8f8a9aa579047d92bbfe75994accf0
-
SHA1
1bab61856a162d8e865edbdf762adf7f68c9a63b
-
SHA256
8955345f92aef5a0938caabcee4ed5bac21db7dc40213deeb0b89b9503f9fcb9
-
SHA512
38df2a9a098f23bd42d4cbc5554a034caf8698a33e930702b1d85c3ed86e1533b6bc337391186760e0df6720f25b41cfb9ff4369ce2c390eb30f932ddb94df62
-
SSDEEP
768:pVUPDsu8LAnro9LcQ3dzlJ9b0WofokcUrJp4xY2Nt2p/1H5XHXdnhfXaXdnh:pVUriLAro9LjbgWofdxr4x92LZdO
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 14 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lhpnlclc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lknjhokg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lbebilli.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lajokiaa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" 3e8f8a9aa579047d92bbfe75994accf0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lhpnlclc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ldfoad32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lajokiaa.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 3e8f8a9aa579047d92bbfe75994accf0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lknjhokg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lolcnman.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lbebilli.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ldfoad32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lolcnman.exe -
Executes dropped EXE 7 IoCs
pid Process 4736 Lhpnlclc.exe 1960 Lknjhokg.exe 4852 Lbebilli.exe 3920 Ldfoad32.exe 880 Lolcnman.exe 3508 Lajokiaa.exe 4368 Ldikgdpe.exe -
Drops file in System32 directory 21 IoCs
description ioc Process File created C:\Windows\SysWOW64\Ldfoad32.exe Lbebilli.exe File created C:\Windows\SysWOW64\Lolcnman.exe Ldfoad32.exe File opened for modification C:\Windows\SysWOW64\Lolcnman.exe Ldfoad32.exe File created C:\Windows\SysWOW64\Lajokiaa.exe Lolcnman.exe File created C:\Windows\SysWOW64\Ldikgdpe.exe Lajokiaa.exe File created C:\Windows\SysWOW64\Idhdlmdd.dll 3e8f8a9aa579047d92bbfe75994accf0.exe File created C:\Windows\SysWOW64\Najlgpeb.dll Lhpnlclc.exe File created C:\Windows\SysWOW64\Lbebilli.exe Lknjhokg.exe File created C:\Windows\SysWOW64\Hbfhni32.dll Lolcnman.exe File created C:\Windows\SysWOW64\Bekdaogi.dll Lajokiaa.exe File opened for modification C:\Windows\SysWOW64\Lhpnlclc.exe 3e8f8a9aa579047d92bbfe75994accf0.exe File created C:\Windows\SysWOW64\Okahhpqj.dll Lbebilli.exe File opened for modification C:\Windows\SysWOW64\Lajokiaa.exe Lolcnman.exe File opened for modification C:\Windows\SysWOW64\Ldfoad32.exe Lbebilli.exe File created C:\Windows\SysWOW64\Oofial32.dll Ldfoad32.exe File opened for modification C:\Windows\SysWOW64\Ldikgdpe.exe Lajokiaa.exe File created C:\Windows\SysWOW64\Lhpnlclc.exe 3e8f8a9aa579047d92bbfe75994accf0.exe File created C:\Windows\SysWOW64\Lknjhokg.exe Lhpnlclc.exe File created C:\Windows\SysWOW64\Mnfooh32.dll Lknjhokg.exe File opened for modification C:\Windows\SysWOW64\Lknjhokg.exe Lhpnlclc.exe File opened for modification C:\Windows\SysWOW64\Lbebilli.exe Lknjhokg.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1804 4368 WerFault.exe 97 -
Modifies registry class 24 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ldfoad32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 3e8f8a9aa579047d92bbfe75994accf0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Najlgpeb.dll" Lhpnlclc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lhpnlclc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Okahhpqj.dll" Lbebilli.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ldfoad32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lolcnman.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID 3e8f8a9aa579047d92bbfe75994accf0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Idhdlmdd.dll" 3e8f8a9aa579047d92bbfe75994accf0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lbebilli.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lbebilli.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lajokiaa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" 3e8f8a9aa579047d92bbfe75994accf0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mnfooh32.dll" Lknjhokg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lknjhokg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lolcnman.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oofial32.dll" Ldfoad32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hbfhni32.dll" Lolcnman.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lajokiaa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bekdaogi.dll" Lajokiaa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node 3e8f8a9aa579047d92bbfe75994accf0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} 3e8f8a9aa579047d92bbfe75994accf0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lhpnlclc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lknjhokg.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 4280 wrote to memory of 4736 4280 3e8f8a9aa579047d92bbfe75994accf0.exe 90 PID 4280 wrote to memory of 4736 4280 3e8f8a9aa579047d92bbfe75994accf0.exe 90 PID 4280 wrote to memory of 4736 4280 3e8f8a9aa579047d92bbfe75994accf0.exe 90 PID 4736 wrote to memory of 1960 4736 Lhpnlclc.exe 91 PID 4736 wrote to memory of 1960 4736 Lhpnlclc.exe 91 PID 4736 wrote to memory of 1960 4736 Lhpnlclc.exe 91 PID 1960 wrote to memory of 4852 1960 Lknjhokg.exe 92 PID 1960 wrote to memory of 4852 1960 Lknjhokg.exe 92 PID 1960 wrote to memory of 4852 1960 Lknjhokg.exe 92 PID 4852 wrote to memory of 3920 4852 Lbebilli.exe 93 PID 4852 wrote to memory of 3920 4852 Lbebilli.exe 93 PID 4852 wrote to memory of 3920 4852 Lbebilli.exe 93 PID 3920 wrote to memory of 880 3920 Ldfoad32.exe 94 PID 3920 wrote to memory of 880 3920 Ldfoad32.exe 94 PID 3920 wrote to memory of 880 3920 Ldfoad32.exe 94 PID 880 wrote to memory of 3508 880 Lolcnman.exe 96 PID 880 wrote to memory of 3508 880 Lolcnman.exe 96 PID 880 wrote to memory of 3508 880 Lolcnman.exe 96 PID 3508 wrote to memory of 4368 3508 Lajokiaa.exe 97 PID 3508 wrote to memory of 4368 3508 Lajokiaa.exe 97 PID 3508 wrote to memory of 4368 3508 Lajokiaa.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\3e8f8a9aa579047d92bbfe75994accf0.exe"C:\Users\Admin\AppData\Local\Temp\3e8f8a9aa579047d92bbfe75994accf0.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4280 -
C:\Windows\SysWOW64\Lhpnlclc.exeC:\Windows\system32\Lhpnlclc.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4736 -
C:\Windows\SysWOW64\Lknjhokg.exeC:\Windows\system32\Lknjhokg.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\SysWOW64\Lbebilli.exeC:\Windows\system32\Lbebilli.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Windows\SysWOW64\Ldfoad32.exeC:\Windows\system32\Ldfoad32.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3920 -
C:\Windows\SysWOW64\Lolcnman.exeC:\Windows\system32\Lolcnman.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Windows\SysWOW64\Lajokiaa.exeC:\Windows\system32\Lajokiaa.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3508 -
C:\Windows\SysWOW64\Ldikgdpe.exeC:\Windows\system32\Ldikgdpe.exe8⤵
- Executes dropped EXE
PID:4368 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4368 -s 4009⤵
- Program crash
PID:1804
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4368 -ip 43681⤵PID:3180
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4200,i,17705702031385645742,8200011525621908985,262144 --variations-seed-version --mojo-platform-channel-handle=4652 /prefetch:81⤵PID:1448
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
59KB
MD5088310c81bd51b7fca9a6c9dab833481
SHA18df2f21c80cc26a7ac2a65a770247edd0f5596cb
SHA256d3f2e90826babd8b99fe69bac2ec50e99b8cf126719a76110bad2e61c34285e8
SHA5121a0fb62b55f4cd8fb8e1cc1da47e4c558052a2ce8b7f0553a548fbe93bdb0448fbed0837482c1451bbcb8fb341e2e49145edef9b1e6defe6c6d993cc7cd1fc73
-
Filesize
59KB
MD56012ee866ad6ba6a44de4d3e618dd60f
SHA1760fea4b5d00c3c8c780f6b1e78f7cf4e2b5ce46
SHA2562e632b4f9082f473dba45acb7eadf719a9f93438b61ff7bfcba4710fa2fc55a2
SHA512321de715c33515f1159a62afd0eb248364870ec41c70ce1cf706c764267218f9a48628c104441428a8d53b0a32233d48dc86f578389c377d0b33e06d77bc7e59
-
Filesize
59KB
MD5cbb8002550218243d4f7158e6e8e32ca
SHA1faea696dc18b3916ddb7d694e44ae60c43f495a0
SHA25665185b9a3688da8feb0004d1214cc59addb74bc99f9f79dfec30d430bc1d2a43
SHA512ad117c733185bdcde9ba135a5954b1780c003290ac7d8bd8a72d98bf0b96dd99f424ca073c257b5462e83afd689696e7de33ccdd1b1fbd1cc32c2b17d2ec5066
-
Filesize
59KB
MD5c68a7f3dbc11e7c4753ce370d03da6ff
SHA1b366ac8c9cb1775d57ac76b57117c24bee7d801c
SHA2569fbd2d1a4f75f720b0ea92c130bea079cd4ffcb1ad3f9bbc138217723def3e68
SHA51227ed14cacdced78a294ff22c6c7b095ff207a1a9497855780f7067da9b946a41fdd181f7bb9398f78e8dd13301efc05ec941680380eec69f6caa8cd0e503b1f0
-
Filesize
59KB
MD53a043582cfc2f8387e7adc4c099e7515
SHA16e5746e2155d1a4c4321c7367fee04a5b6a4be26
SHA256c6a15a7f238b72c4cab197cadb3ee8b407ff06de72900ff28cec71e557cbb441
SHA512e1fa07bbfe22da96c52ee6f3832d5a689153984a3183f02be927772d148001efdadefc7bb36998ba997b8dcdbdaa287e95ab884c789ca3fe3daf6931705774ea
-
Filesize
59KB
MD50a6977fee5b883ca60470d4d50818477
SHA1012351cda83ffdee3310e11583da37c83058668e
SHA2565719f59a0de5494518424ec0467cc2230d6f3a1585cb5450ad3ea24a52183891
SHA51242531d11cf6952a2e8d69084b1e90f4c7619da9c7b89d3bbd7b16d270451b24932e1ef289a38210200a6f734f8876468c6cbbd3c768c66e48092aef4f88d92fb
-
Filesize
59KB
MD5d120a9e19ebae7f3d481556c1dcaf915
SHA1f2fc74182a07c35949aa81586ce2d4a0e4f5eeec
SHA2563a3e9323cec33e6f60f171634db6cbb8782e03f2cdfb9baf9a267a1befa0d81e
SHA5121705c6507f211bb2b200b92af98b1875b3379819ce8572c32b43c50d5e3b4735d9b1b01dc1eb5c8bf8ef804f9fad56e538a8c0e88bcf2899fd61c09a7d9c6844