Analysis

  • max time kernel
    125s
  • max time network
    130s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-07-2024 04:07

General

  • Target

    3e8f8a9aa579047d92bbfe75994accf0.exe

  • Size

    59KB

  • MD5

    3e8f8a9aa579047d92bbfe75994accf0

  • SHA1

    1bab61856a162d8e865edbdf762adf7f68c9a63b

  • SHA256

    8955345f92aef5a0938caabcee4ed5bac21db7dc40213deeb0b89b9503f9fcb9

  • SHA512

    38df2a9a098f23bd42d4cbc5554a034caf8698a33e930702b1d85c3ed86e1533b6bc337391186760e0df6720f25b41cfb9ff4369ce2c390eb30f932ddb94df62

  • SSDEEP

    768:pVUPDsu8LAnro9LcQ3dzlJ9b0WofokcUrJp4xY2Nt2p/1H5XHXdnhfXaXdnh:pVUriLAro9LjbgWofdxr4x92LZdO

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 14 IoCs
  • Executes dropped EXE 7 IoCs
  • Drops file in System32 directory 21 IoCs
  • Program crash 1 IoCs
  • Modifies registry class 24 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3e8f8a9aa579047d92bbfe75994accf0.exe
    "C:\Users\Admin\AppData\Local\Temp\3e8f8a9aa579047d92bbfe75994accf0.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4280
    • C:\Windows\SysWOW64\Lhpnlclc.exe
      C:\Windows\system32\Lhpnlclc.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:4736
      • C:\Windows\SysWOW64\Lknjhokg.exe
        C:\Windows\system32\Lknjhokg.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Drops file in System32 directory
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:1960
        • C:\Windows\SysWOW64\Lbebilli.exe
          C:\Windows\system32\Lbebilli.exe
          4⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Drops file in System32 directory
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:4852
          • C:\Windows\SysWOW64\Ldfoad32.exe
            C:\Windows\system32\Ldfoad32.exe
            5⤵
            • Adds autorun key to be loaded by Explorer.exe on startup
            • Executes dropped EXE
            • Drops file in System32 directory
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:3920
            • C:\Windows\SysWOW64\Lolcnman.exe
              C:\Windows\system32\Lolcnman.exe
              6⤵
              • Adds autorun key to be loaded by Explorer.exe on startup
              • Executes dropped EXE
              • Drops file in System32 directory
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:880
              • C:\Windows\SysWOW64\Lajokiaa.exe
                C:\Windows\system32\Lajokiaa.exe
                7⤵
                • Adds autorun key to be loaded by Explorer.exe on startup
                • Executes dropped EXE
                • Drops file in System32 directory
                • Modifies registry class
                • Suspicious use of WriteProcessMemory
                PID:3508
                • C:\Windows\SysWOW64\Ldikgdpe.exe
                  C:\Windows\system32\Ldikgdpe.exe
                  8⤵
                  • Executes dropped EXE
                  PID:4368
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 4368 -s 400
                    9⤵
                    • Program crash
                    PID:1804
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4368 -ip 4368
    1⤵
      PID:3180
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4200,i,17705702031385645742,8200011525621908985,262144 --variations-seed-version --mojo-platform-channel-handle=4652 /prefetch:8
      1⤵
        PID:1448

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Windows\SysWOW64\Lajokiaa.exe

        Filesize

        59KB

        MD5

        088310c81bd51b7fca9a6c9dab833481

        SHA1

        8df2f21c80cc26a7ac2a65a770247edd0f5596cb

        SHA256

        d3f2e90826babd8b99fe69bac2ec50e99b8cf126719a76110bad2e61c34285e8

        SHA512

        1a0fb62b55f4cd8fb8e1cc1da47e4c558052a2ce8b7f0553a548fbe93bdb0448fbed0837482c1451bbcb8fb341e2e49145edef9b1e6defe6c6d993cc7cd1fc73

      • C:\Windows\SysWOW64\Lbebilli.exe

        Filesize

        59KB

        MD5

        6012ee866ad6ba6a44de4d3e618dd60f

        SHA1

        760fea4b5d00c3c8c780f6b1e78f7cf4e2b5ce46

        SHA256

        2e632b4f9082f473dba45acb7eadf719a9f93438b61ff7bfcba4710fa2fc55a2

        SHA512

        321de715c33515f1159a62afd0eb248364870ec41c70ce1cf706c764267218f9a48628c104441428a8d53b0a32233d48dc86f578389c377d0b33e06d77bc7e59

      • C:\Windows\SysWOW64\Ldfoad32.exe

        Filesize

        59KB

        MD5

        cbb8002550218243d4f7158e6e8e32ca

        SHA1

        faea696dc18b3916ddb7d694e44ae60c43f495a0

        SHA256

        65185b9a3688da8feb0004d1214cc59addb74bc99f9f79dfec30d430bc1d2a43

        SHA512

        ad117c733185bdcde9ba135a5954b1780c003290ac7d8bd8a72d98bf0b96dd99f424ca073c257b5462e83afd689696e7de33ccdd1b1fbd1cc32c2b17d2ec5066

      • C:\Windows\SysWOW64\Ldikgdpe.exe

        Filesize

        59KB

        MD5

        c68a7f3dbc11e7c4753ce370d03da6ff

        SHA1

        b366ac8c9cb1775d57ac76b57117c24bee7d801c

        SHA256

        9fbd2d1a4f75f720b0ea92c130bea079cd4ffcb1ad3f9bbc138217723def3e68

        SHA512

        27ed14cacdced78a294ff22c6c7b095ff207a1a9497855780f7067da9b946a41fdd181f7bb9398f78e8dd13301efc05ec941680380eec69f6caa8cd0e503b1f0

      • C:\Windows\SysWOW64\Lhpnlclc.exe

        Filesize

        59KB

        MD5

        3a043582cfc2f8387e7adc4c099e7515

        SHA1

        6e5746e2155d1a4c4321c7367fee04a5b6a4be26

        SHA256

        c6a15a7f238b72c4cab197cadb3ee8b407ff06de72900ff28cec71e557cbb441

        SHA512

        e1fa07bbfe22da96c52ee6f3832d5a689153984a3183f02be927772d148001efdadefc7bb36998ba997b8dcdbdaa287e95ab884c789ca3fe3daf6931705774ea

      • C:\Windows\SysWOW64\Lknjhokg.exe

        Filesize

        59KB

        MD5

        0a6977fee5b883ca60470d4d50818477

        SHA1

        012351cda83ffdee3310e11583da37c83058668e

        SHA256

        5719f59a0de5494518424ec0467cc2230d6f3a1585cb5450ad3ea24a52183891

        SHA512

        42531d11cf6952a2e8d69084b1e90f4c7619da9c7b89d3bbd7b16d270451b24932e1ef289a38210200a6f734f8876468c6cbbd3c768c66e48092aef4f88d92fb

      • C:\Windows\SysWOW64\Lolcnman.exe

        Filesize

        59KB

        MD5

        d120a9e19ebae7f3d481556c1dcaf915

        SHA1

        f2fc74182a07c35949aa81586ce2d4a0e4f5eeec

        SHA256

        3a3e9323cec33e6f60f171634db6cbb8782e03f2cdfb9baf9a267a1befa0d81e

        SHA512

        1705c6507f211bb2b200b92af98b1875b3379819ce8572c32b43c50d5e3b4735d9b1b01dc1eb5c8bf8ef804f9fad56e538a8c0e88bcf2899fd61c09a7d9c6844

      • memory/880-41-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/880-62-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1960-21-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1960-68-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3508-60-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3508-49-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3920-64-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3920-33-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4280-72-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4280-0-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4280-1-0x0000000000433000-0x0000000000434000-memory.dmp

        Filesize

        4KB

      • memory/4368-56-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4368-61-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4736-13-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4736-70-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4852-24-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4852-66-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB