Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    23-07-2024 12:42

General

  • Target

    b86aa3e4ba3e0e4977950e009634f5a0N.exe

  • Size

    397KB

  • MD5

    b86aa3e4ba3e0e4977950e009634f5a0

  • SHA1

    38c99c57e3c2326e5da8c052821ce85b91b48de8

  • SHA256

    38a2f1457897c0448c0bfdbd62cc10e055a62c62ead2a8e899578514088c907e

  • SHA512

    f5ed95f7cacf6ebecb06ad782c739baebd707aa97051bc06b9816bfc696a9200057389d3b3eca2c1ec4620944f96d9c0258cee5adb23f73b0827be5901288aa4

  • SSDEEP

    6144:jxD/5S6COFM6234lKm3mo8Yvi4KsLTFM6234lKm3pT11Tgkz1581hW:dfJFB24lwR45FB24lzx1skz15L

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 16 IoCs
  • Executes dropped EXE 8 IoCs
  • Loads dropped DLL 20 IoCs
  • Drops file in System32 directory 24 IoCs
  • Program crash 1 IoCs
  • Modifies registry class 27 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b86aa3e4ba3e0e4977950e009634f5a0N.exe
    "C:\Users\Admin\AppData\Local\Temp\b86aa3e4ba3e0e4977950e009634f5a0N.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Loads dropped DLL
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2212
    • C:\Windows\SysWOW64\Kipmhc32.exe
      C:\Windows\system32\Kipmhc32.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2688
      • C:\Windows\SysWOW64\Kageia32.exe
        C:\Windows\system32\Kageia32.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in System32 directory
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2672
        • C:\Windows\SysWOW64\Lplbjm32.exe
          C:\Windows\system32\Lplbjm32.exe
          4⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in System32 directory
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:2752
          • C:\Windows\SysWOW64\Llbconkd.exe
            C:\Windows\system32\Llbconkd.exe
            5⤵
            • Adds autorun key to be loaded by Explorer.exe on startup
            • Executes dropped EXE
            • Loads dropped DLL
            • Drops file in System32 directory
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:2660
            • C:\Windows\SysWOW64\Loaokjjg.exe
              C:\Windows\system32\Loaokjjg.exe
              6⤵
              • Adds autorun key to be loaded by Explorer.exe on startup
              • Executes dropped EXE
              • Loads dropped DLL
              • Drops file in System32 directory
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:2668
              • C:\Windows\SysWOW64\Lcohahpn.exe
                C:\Windows\system32\Lcohahpn.exe
                7⤵
                • Adds autorun key to be loaded by Explorer.exe on startup
                • Executes dropped EXE
                • Loads dropped DLL
                • Drops file in System32 directory
                • Modifies registry class
                • Suspicious use of WriteProcessMemory
                PID:976
                • C:\Windows\SysWOW64\Lhlqjone.exe
                  C:\Windows\system32\Lhlqjone.exe
                  8⤵
                  • Adds autorun key to be loaded by Explorer.exe on startup
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Drops file in System32 directory
                  • Modifies registry class
                  • Suspicious use of WriteProcessMemory
                  PID:2988
                  • C:\Windows\SysWOW64\Lepaccmo.exe
                    C:\Windows\system32\Lepaccmo.exe
                    9⤵
                    • Executes dropped EXE
                    • Suspicious use of WriteProcessMemory
                    PID:2936
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 2936 -s 140
                      10⤵
                      • Loads dropped DLL
                      • Program crash
                      PID:584

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\Jingpl32.dll

    Filesize

    7KB

    MD5

    56ae32b5da982568e69e3fa5c3b650b7

    SHA1

    7bd70a9e011b231480bd35d03e245fc51dae63ae

    SHA256

    a271a98f0378672dd5d9459b70625a09c12a0fbb73d927b058fe63eac0a7cd20

    SHA512

    b87e4890a11a6bb528d8756295ede823e5922fc0bd270730efa5b764e7a24d4aa90f1629abc9ac1c746135490f7e7061efda75019e020dfc0a3af4da7d73c103

  • C:\Windows\SysWOW64\Kipmhc32.exe

    Filesize

    397KB

    MD5

    b62bb7e152d81d5ea6d699bf4a1ce710

    SHA1

    41757d8c24c9897840d0fe1698e1f12deadc0ada

    SHA256

    6066464f9a6cc0b25ef90e74bb66d29bbb15d146bb3b6bc632e79dac9b965abf

    SHA512

    ae0597ffe9f6aa6dd8bd25917e1afeb28ca9197d79631739509fc6b9462a200d389e2c766636c061f73cc610fd39e32b8e7692453785aa98ea0420bb4a1b8666

  • C:\Windows\SysWOW64\Lhlqjone.exe

    Filesize

    397KB

    MD5

    c064e47f18b599729fe8cd84e79de4ce

    SHA1

    67391f91c25a31c500ec96e46bb548e941e0f8c7

    SHA256

    2bdf6dcfd232c15225cdb8709bd37a92b7889ba4a8d4c032bdbb6da0a1bfe0af

    SHA512

    ef05450ad186496bef5e49ecd7f695052819ddb0f97d7fcb3dcba4fe21920dee2464b1a810412312582b5c9a9c530f76b5a6a3b6e4107d1ca81f19c1df9943b6

  • C:\Windows\SysWOW64\Loaokjjg.exe

    Filesize

    397KB

    MD5

    b68129e262546f7965de9346c8fe06c8

    SHA1

    9e1906e53ab6afc59633bf75d4d717f4dbd3a3f6

    SHA256

    e5246a4ca8bcf0d2621b494142314e9ba7ace8e1562261a5ac79115000c7e214

    SHA512

    e8ad08a7af1094985643390d125fac92957e305828eaa1ce0c9e7f24c20a64dd630a6a8d547b2c04816ffc442fa893ec1d5a1bca2a44ca9535721b91f72006a6

  • \Windows\SysWOW64\Kageia32.exe

    Filesize

    397KB

    MD5

    cc64223d5600e761e8ffbde21bfb7f86

    SHA1

    3a96cf52dc4686204e709b765450fc805df212e1

    SHA256

    32ff98676811a120549ecda48f7beeea6889d13635e7c9565ffba17e01725754

    SHA512

    5e73be6594fff4ddad4092cc769947edac9cac305c13633adff1ae72dc56c00222014020e4b8f1f49857f524e8805af6aff365f5d5e390f86676466142cbdde2

  • \Windows\SysWOW64\Lcohahpn.exe

    Filesize

    397KB

    MD5

    1065691998fbaa43ea860f75a7982552

    SHA1

    875860fd4ce8f87e42c25522f063e913f3c3b47f

    SHA256

    b36f703f376a20e6af06dd21e9ddb83ca33badab130db8f5961ecd34a2522831

    SHA512

    acf7ca835387598f1fc2cb26e5bd0a6c20bc2667797186bd969f1bffb24baca53778f6e289e612e897059fb75cd50121a08ee0c500473e30694bfb13cd8675d3

  • \Windows\SysWOW64\Lepaccmo.exe

    Filesize

    397KB

    MD5

    11ffceb2328bbd82b83961a973c06afa

    SHA1

    db28cc5be0c3618fe91409101ac849452a518e3c

    SHA256

    0001fb1485dfa13b8e3160534806d22253165a85c42243edb18b27abd54ba49e

    SHA512

    3c871f8bd4868c58a6148d16250d622272a19ed2cef9f19f155420a742df93e57a772b80f1fb345ce02582729be7c0a804b55e82ba633bddb24636d0ac120f4d

  • \Windows\SysWOW64\Llbconkd.exe

    Filesize

    397KB

    MD5

    c6bbe0ed4bba104e5e8dc83a4268ca07

    SHA1

    4c31cc68f9bae994ecef4498c46758a0b304046d

    SHA256

    f632f0b58b06ba6730d4c1b5d2b09618c3b29340d220b48f8ba498d462599e2c

    SHA512

    a6c5dcb5bb40b798ac67d4cdaeb60a0ec58fbfc02a6210bfd7c6db6b188313e0918aa8222d5b1866cc7290e909f572bcedb3b91e0adfed5a341171b94be63068

  • \Windows\SysWOW64\Lplbjm32.exe

    Filesize

    397KB

    MD5

    e6e9776891a5a45768ada9bd0dee5ff6

    SHA1

    201082f04b5c9b6c0a9a8df724abdb043dfd15c3

    SHA256

    c1f1ad434d70a04a7521e03f2ce08aebff9391e8021c1319f13ab1d5392be7c5

    SHA512

    a2a0ab7ce04d04f436f1c743ec7d9d8a45dd920c5c6aa3229d4f20cf665ef8757a640c01be8eec00c108f8baf8e19c40b8cd084891030eb4eefbd608bbc8486c

  • memory/976-91-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/976-99-0x0000000000440000-0x0000000000473000-memory.dmp

    Filesize

    204KB

  • memory/2212-12-0x0000000000250000-0x0000000000283000-memory.dmp

    Filesize

    204KB

  • memory/2212-0-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2212-119-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2212-13-0x0000000000250000-0x0000000000283000-memory.dmp

    Filesize

    204KB

  • memory/2660-71-0x0000000000450000-0x0000000000483000-memory.dmp

    Filesize

    204KB

  • memory/2660-63-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2668-72-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2668-124-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2668-80-0x00000000006A0000-0x00000000006D3000-memory.dmp

    Filesize

    204KB

  • memory/2672-37-0x0000000000250000-0x0000000000283000-memory.dmp

    Filesize

    204KB

  • memory/2672-121-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2672-29-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2688-27-0x0000000000250000-0x0000000000283000-memory.dmp

    Filesize

    204KB

  • memory/2688-120-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2688-28-0x0000000000250000-0x0000000000283000-memory.dmp

    Filesize

    204KB

  • memory/2688-14-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2752-55-0x0000000000280000-0x00000000002B3000-memory.dmp

    Filesize

    204KB

  • memory/2752-56-0x0000000000280000-0x00000000002B3000-memory.dmp

    Filesize

    204KB

  • memory/2752-43-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2752-122-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2936-114-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2988-100-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2988-108-0x00000000002D0000-0x0000000000303000-memory.dmp

    Filesize

    204KB

  • memory/2988-126-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB