Analysis
-
max time kernel
30s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
14-07-2024 21:09
Static task
static1
Behavioral task
behavioral1
Sample
1eb39db482886dc022ff27de79da2520N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
1eb39db482886dc022ff27de79da2520N.exe
Resource
win10v2004-20240709-en
General
-
Target
1eb39db482886dc022ff27de79da2520N.exe
-
Size
57KB
-
MD5
1eb39db482886dc022ff27de79da2520
-
SHA1
e31946a85e07823072bcf7dd5d541ab3f58db65e
-
SHA256
a5874adcc55c4e9c38e271104f14b60baabef353c6845637bbf115b17823b712
-
SHA512
06deb84939e70fee60eabf89c0e234206f924d6bc94cfb42cf9f10a966bd65f72d406984d320d3f2e6c790597a406b2132609ead00d45768975fe50c8d48da4b
-
SSDEEP
1536:thpF5di8ALgnh4qHBSFUwmPGhlQCuGQd:pbhAVz6w4GhD16
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kgcnahoo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kgcnahoo.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kkojbf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kkojbf32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 1eb39db482886dc022ff27de79da2520N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" 1eb39db482886dc022ff27de79da2520N.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kageia32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kageia32.exe -
Executes dropped EXE 4 IoCs
pid Process 2844 Kageia32.exe 2696 Kgcnahoo.exe 2588 Kkojbf32.exe 1488 Lbjofi32.exe -
Loads dropped DLL 13 IoCs
pid Process 2096 1eb39db482886dc022ff27de79da2520N.exe 2096 1eb39db482886dc022ff27de79da2520N.exe 2844 Kageia32.exe 2844 Kageia32.exe 2696 Kgcnahoo.exe 2696 Kgcnahoo.exe 2588 Kkojbf32.exe 2588 Kkojbf32.exe 2624 WerFault.exe 2624 WerFault.exe 2624 WerFault.exe 2624 WerFault.exe 2624 WerFault.exe -
Drops file in System32 directory 12 IoCs
description ioc Process File created C:\Windows\SysWOW64\Kageia32.exe 1eb39db482886dc022ff27de79da2520N.exe File opened for modification C:\Windows\SysWOW64\Kageia32.exe 1eb39db482886dc022ff27de79da2520N.exe File created C:\Windows\SysWOW64\Jlflfm32.dll 1eb39db482886dc022ff27de79da2520N.exe File created C:\Windows\SysWOW64\Kgcnahoo.exe Kageia32.exe File opened for modification C:\Windows\SysWOW64\Kgcnahoo.exe Kageia32.exe File created C:\Windows\SysWOW64\Pgodelnq.dll Kageia32.exe File created C:\Windows\SysWOW64\Gffdobll.dll Kgcnahoo.exe File created C:\Windows\SysWOW64\Kkojbf32.exe Kgcnahoo.exe File opened for modification C:\Windows\SysWOW64\Kkojbf32.exe Kgcnahoo.exe File created C:\Windows\SysWOW64\Lbjofi32.exe Kkojbf32.exe File opened for modification C:\Windows\SysWOW64\Lbjofi32.exe Kkojbf32.exe File created C:\Windows\SysWOW64\Ipafocdg.dll Kkojbf32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2624 1488 WerFault.exe 33 -
Modifies registry class 15 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jlflfm32.dll" 1eb39db482886dc022ff27de79da2520N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" 1eb39db482886dc022ff27de79da2520N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kageia32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node 1eb39db482886dc022ff27de79da2520N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID 1eb39db482886dc022ff27de79da2520N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kageia32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ipafocdg.dll" Kkojbf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kgcnahoo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kkojbf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pgodelnq.dll" Kageia32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kgcnahoo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gffdobll.dll" Kgcnahoo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kkojbf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 1eb39db482886dc022ff27de79da2520N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} 1eb39db482886dc022ff27de79da2520N.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2096 wrote to memory of 2844 2096 1eb39db482886dc022ff27de79da2520N.exe 30 PID 2096 wrote to memory of 2844 2096 1eb39db482886dc022ff27de79da2520N.exe 30 PID 2096 wrote to memory of 2844 2096 1eb39db482886dc022ff27de79da2520N.exe 30 PID 2096 wrote to memory of 2844 2096 1eb39db482886dc022ff27de79da2520N.exe 30 PID 2844 wrote to memory of 2696 2844 Kageia32.exe 31 PID 2844 wrote to memory of 2696 2844 Kageia32.exe 31 PID 2844 wrote to memory of 2696 2844 Kageia32.exe 31 PID 2844 wrote to memory of 2696 2844 Kageia32.exe 31 PID 2696 wrote to memory of 2588 2696 Kgcnahoo.exe 32 PID 2696 wrote to memory of 2588 2696 Kgcnahoo.exe 32 PID 2696 wrote to memory of 2588 2696 Kgcnahoo.exe 32 PID 2696 wrote to memory of 2588 2696 Kgcnahoo.exe 32 PID 2588 wrote to memory of 1488 2588 Kkojbf32.exe 33 PID 2588 wrote to memory of 1488 2588 Kkojbf32.exe 33 PID 2588 wrote to memory of 1488 2588 Kkojbf32.exe 33 PID 2588 wrote to memory of 1488 2588 Kkojbf32.exe 33 PID 1488 wrote to memory of 2624 1488 Lbjofi32.exe 34 PID 1488 wrote to memory of 2624 1488 Lbjofi32.exe 34 PID 1488 wrote to memory of 2624 1488 Lbjofi32.exe 34 PID 1488 wrote to memory of 2624 1488 Lbjofi32.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\1eb39db482886dc022ff27de79da2520N.exe"C:\Users\Admin\AppData\Local\Temp\1eb39db482886dc022ff27de79da2520N.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Windows\SysWOW64\Kageia32.exeC:\Windows\system32\Kageia32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\SysWOW64\Kgcnahoo.exeC:\Windows\system32\Kgcnahoo.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\SysWOW64\Kkojbf32.exeC:\Windows\system32\Kkojbf32.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Windows\SysWOW64\Lbjofi32.exeC:\Windows\system32\Lbjofi32.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1488 -s 1406⤵
- Loads dropped DLL
- Program crash
PID:2624
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
57KB
MD5fd7fb4739c372e7f5a5c530ff08ec623
SHA17fc9bb27a6c61dc21e5f5ad99195098e3ea47fac
SHA256b41c211e5309d7ff99d5e2dcb3c5423becceeb8ad4033ac482802c2d350c3d24
SHA51293376fca47348ecedfd3381e77df04b386125d8412128509da668ba797e78ee833f3fc72b4cba478cc1c57bdfaaf4ddd45cb01cc7c2f844eb7e61d841d643d90
-
Filesize
57KB
MD5120babc4eba4068fea4ad25f9e34cb5f
SHA1fd9943d2f72ff3289942b371435e56fe9f7f2a44
SHA256ffbacbeb86325b99a702f89d1938a342c69879311159a7d6157c058611277e8b
SHA5126d59b97548da477c54b69e0aa7d0b06f659f4106994f8aed728d99b11b5ef15a8f3e5548ea62ad5bc2b65bdc46be777614ddade90350eb2b91e166cd2aaf5fe8
-
Filesize
57KB
MD5e461bd5abc16fc2f87b98615d5769791
SHA1c632a6d81a7dd4b73346dedf2f633c9560f31f54
SHA25691fd8562d932227dd0af555cdfc4c5f36e81b9d97bf20c057e0ba46b1fd049e4
SHA5121bb079638d53f5d32799bd1500f769e65c9f776f971d1f85f4ff58e8929cb5b57b97e2cf34ac81f5caf7da18874b610986e2b147870699d8db66fcb93be3c11b
-
Filesize
57KB
MD54926aebddb0ea5fe207fbcf63339f6be
SHA135b4601492ea47db0c40edcebe82f715beb5eed9
SHA2566e13e001075e1b1266bbf4192da36609a7af8fe66316aff34ab665b4877e565c
SHA512e65a73733fcb141abf9df5783598c622ef4e9be95340875af50f2648b88a940a129aede7db956a87c75a42563aa16657819e5a96f9859e95a5c2d9bc6175844b