Analysis
-
max time kernel
111s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
01-08-2024 21:00
Static task
static1
Behavioral task
behavioral1
Sample
033fa9fef6d04d64b04d40946fe41500N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
033fa9fef6d04d64b04d40946fe41500N.exe
Resource
win10v2004-20240730-en
General
-
Target
033fa9fef6d04d64b04d40946fe41500N.exe
-
Size
464KB
-
MD5
033fa9fef6d04d64b04d40946fe41500
-
SHA1
8f6151a53d8dde717ecec0058c362fe4a2fdb61f
-
SHA256
c78e508e0d9b8d1ee5c8fc3961e3019153f76c028a594f794ea19840c4ab0b9a
-
SHA512
44246002a9b15a3cc61f3f5110072d251b031d656ade967414f22ba934eb33f3f420a3dc8b00927dc433b32d1b0d96c5e46cc01745322fa1c306abd0827ec8be
-
SSDEEP
6144:UoRnSVgowEOIIIPCn4EOIuIPJEOOcHTETKEOIIIPC:hhSiEVI2C4EVu2JEVcBEVI2C
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Kkojbf32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 033fa9fef6d04d64b04d40946fe41500N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" 033fa9fef6d04d64b04d40946fe41500N.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kmkihbho.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Kmkihbho.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kkojbf32.exe -
Executes dropped EXE 3 IoCs
pid Process 2260 Kmkihbho.exe 2584 Kkojbf32.exe 2704 Lepaccmo.exe -
Loads dropped DLL 10 IoCs
pid Process 2256 033fa9fef6d04d64b04d40946fe41500N.exe 2256 033fa9fef6d04d64b04d40946fe41500N.exe 2260 Kmkihbho.exe 2260 Kmkihbho.exe 2584 Kkojbf32.exe 2584 Kkojbf32.exe 2500 WerFault.exe 2500 WerFault.exe 2500 WerFault.exe 2500 WerFault.exe -
Drops file in System32 directory 9 IoCs
description ioc Process File created C:\Windows\SysWOW64\Kmkihbho.exe 033fa9fef6d04d64b04d40946fe41500N.exe File opened for modification C:\Windows\SysWOW64\Kmkihbho.exe 033fa9fef6d04d64b04d40946fe41500N.exe File created C:\Windows\SysWOW64\Canhhi32.dll 033fa9fef6d04d64b04d40946fe41500N.exe File opened for modification C:\Windows\SysWOW64\Lepaccmo.exe Kkojbf32.exe File created C:\Windows\SysWOW64\Oldhgaef.dll Kkojbf32.exe File created C:\Windows\SysWOW64\Kkojbf32.exe Kmkihbho.exe File opened for modification C:\Windows\SysWOW64\Kkojbf32.exe Kmkihbho.exe File created C:\Windows\SysWOW64\Gffdobll.dll Kmkihbho.exe File created C:\Windows\SysWOW64\Lepaccmo.exe Kkojbf32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2500 2704 WerFault.exe 32 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kkojbf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lepaccmo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 033fa9fef6d04d64b04d40946fe41500N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kmkihbho.exe -
Modifies registry class 12 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Kmkihbho.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gffdobll.dll" Kmkihbho.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Kmkihbho.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Kkojbf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" 033fa9fef6d04d64b04d40946fe41500N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oldhgaef.dll" Kkojbf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Kkojbf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 033fa9fef6d04d64b04d40946fe41500N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node 033fa9fef6d04d64b04d40946fe41500N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID 033fa9fef6d04d64b04d40946fe41500N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831} 033fa9fef6d04d64b04d40946fe41500N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Canhhi32.dll" 033fa9fef6d04d64b04d40946fe41500N.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2256 wrote to memory of 2260 2256 033fa9fef6d04d64b04d40946fe41500N.exe 30 PID 2256 wrote to memory of 2260 2256 033fa9fef6d04d64b04d40946fe41500N.exe 30 PID 2256 wrote to memory of 2260 2256 033fa9fef6d04d64b04d40946fe41500N.exe 30 PID 2256 wrote to memory of 2260 2256 033fa9fef6d04d64b04d40946fe41500N.exe 30 PID 2260 wrote to memory of 2584 2260 Kmkihbho.exe 31 PID 2260 wrote to memory of 2584 2260 Kmkihbho.exe 31 PID 2260 wrote to memory of 2584 2260 Kmkihbho.exe 31 PID 2260 wrote to memory of 2584 2260 Kmkihbho.exe 31 PID 2584 wrote to memory of 2704 2584 Kkojbf32.exe 32 PID 2584 wrote to memory of 2704 2584 Kkojbf32.exe 32 PID 2584 wrote to memory of 2704 2584 Kkojbf32.exe 32 PID 2584 wrote to memory of 2704 2584 Kkojbf32.exe 32 PID 2704 wrote to memory of 2500 2704 Lepaccmo.exe 33 PID 2704 wrote to memory of 2500 2704 Lepaccmo.exe 33 PID 2704 wrote to memory of 2500 2704 Lepaccmo.exe 33 PID 2704 wrote to memory of 2500 2704 Lepaccmo.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\033fa9fef6d04d64b04d40946fe41500N.exe"C:\Users\Admin\AppData\Local\Temp\033fa9fef6d04d64b04d40946fe41500N.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Windows\SysWOW64\Kmkihbho.exeC:\Windows\system32\Kmkihbho.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Windows\SysWOW64\Kkojbf32.exeC:\Windows\system32\Kkojbf32.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Windows\SysWOW64\Lepaccmo.exeC:\Windows\system32\Lepaccmo.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2704 -s 1405⤵
- Loads dropped DLL
- Program crash
PID:2500
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
464KB
MD50f8ce3b6730dcf41e0c0c9f40c2dc1ef
SHA13ea3b7be33c7a70bded23ff4d2000c598acf1a8c
SHA256f65d442f389f4a8b1f11cc27236c1244b7315f9d544ef520fea9579c7d429569
SHA51284b10056119113207d660d9e33d61d54ccc970a3c1b8b7704c3303ea9a89b7f8f957bd2d589fb8de150f7bd06c6da6dcff9752d007b2b4a8062a0bcab005b617
-
Filesize
464KB
MD51a534dba852a6cc6eeda1f0adb32c4b2
SHA13387068b9fd346a8f7b9ab49f01cffb63bfea7f4
SHA256cf4948ea26df913c8bafaa246bb45d9c01a3fd26111a9bfd82000848c259d500
SHA51278667afaea2781dc11bf7d4e90c76b0a9cffd9e42ab95499ec23ac08db83e1c339a278fd8bb693eb539bcdf13478127462b2c92a870cb80794d5efb6307a086a
-
Filesize
464KB
MD5a4316d87858c9475134c00c4c2907c18
SHA1ad9a2731121d260eb3391ea182900d87f23a34f1
SHA2568730528b1549097762e03cb25e3832128719aa5cd6a6072e4bac35e5ea3c2701
SHA512d48afe14607dde16f09103069b3b9f99276a95ffa7e8560926e668420860738f89619ff82588285c63e6a1c812b3e1c2f7b87e8c9b68448f3d9ef487fa841d29