Analysis

  • max time kernel
    111s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    01-08-2024 21:00

General

  • Target

    033fa9fef6d04d64b04d40946fe41500N.exe

  • Size

    464KB

  • MD5

    033fa9fef6d04d64b04d40946fe41500

  • SHA1

    8f6151a53d8dde717ecec0058c362fe4a2fdb61f

  • SHA256

    c78e508e0d9b8d1ee5c8fc3961e3019153f76c028a594f794ea19840c4ab0b9a

  • SHA512

    44246002a9b15a3cc61f3f5110072d251b031d656ade967414f22ba934eb33f3f420a3dc8b00927dc433b32d1b0d96c5e46cc01745322fa1c306abd0827ec8be

  • SSDEEP

    6144:UoRnSVgowEOIIIPCn4EOIuIPJEOOcHTETKEOIIIPC:hhSiEVI2C4EVu2JEVcBEVI2C

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 6 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 10 IoCs
  • Drops file in System32 directory 9 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 12 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\033fa9fef6d04d64b04d40946fe41500N.exe
    "C:\Users\Admin\AppData\Local\Temp\033fa9fef6d04d64b04d40946fe41500N.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2256
    • C:\Windows\SysWOW64\Kmkihbho.exe
      C:\Windows\system32\Kmkihbho.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2260
      • C:\Windows\SysWOW64\Kkojbf32.exe
        C:\Windows\system32\Kkojbf32.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2584
        • C:\Windows\SysWOW64\Lepaccmo.exe
          C:\Windows\system32\Lepaccmo.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2704
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2704 -s 140
            5⤵
            • Loads dropped DLL
            • Program crash
            PID:2500

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\Kkojbf32.exe

    Filesize

    464KB

    MD5

    0f8ce3b6730dcf41e0c0c9f40c2dc1ef

    SHA1

    3ea3b7be33c7a70bded23ff4d2000c598acf1a8c

    SHA256

    f65d442f389f4a8b1f11cc27236c1244b7315f9d544ef520fea9579c7d429569

    SHA512

    84b10056119113207d660d9e33d61d54ccc970a3c1b8b7704c3303ea9a89b7f8f957bd2d589fb8de150f7bd06c6da6dcff9752d007b2b4a8062a0bcab005b617

  • C:\Windows\SysWOW64\Kmkihbho.exe

    Filesize

    464KB

    MD5

    1a534dba852a6cc6eeda1f0adb32c4b2

    SHA1

    3387068b9fd346a8f7b9ab49f01cffb63bfea7f4

    SHA256

    cf4948ea26df913c8bafaa246bb45d9c01a3fd26111a9bfd82000848c259d500

    SHA512

    78667afaea2781dc11bf7d4e90c76b0a9cffd9e42ab95499ec23ac08db83e1c339a278fd8bb693eb539bcdf13478127462b2c92a870cb80794d5efb6307a086a

  • \Windows\SysWOW64\Lepaccmo.exe

    Filesize

    464KB

    MD5

    a4316d87858c9475134c00c4c2907c18

    SHA1

    ad9a2731121d260eb3391ea182900d87f23a34f1

    SHA256

    8730528b1549097762e03cb25e3832128719aa5cd6a6072e4bac35e5ea3c2701

    SHA512

    d48afe14607dde16f09103069b3b9f99276a95ffa7e8560926e668420860738f89619ff82588285c63e6a1c812b3e1c2f7b87e8c9b68448f3d9ef487fa841d29

  • memory/2256-0-0x0000000000400000-0x000000000049D000-memory.dmp

    Filesize

    628KB

  • memory/2256-12-0x0000000001CF0000-0x0000000001D8D000-memory.dmp

    Filesize

    628KB

  • memory/2256-54-0x0000000000400000-0x000000000049D000-memory.dmp

    Filesize

    628KB

  • memory/2260-17-0x0000000000400000-0x000000000049D000-memory.dmp

    Filesize

    628KB

  • memory/2260-56-0x0000000000400000-0x000000000049D000-memory.dmp

    Filesize

    628KB

  • memory/2584-31-0x0000000000400000-0x000000000049D000-memory.dmp

    Filesize

    628KB

  • memory/2584-39-0x0000000000220000-0x00000000002BD000-memory.dmp

    Filesize

    628KB

  • memory/2584-60-0x0000000000400000-0x000000000049D000-memory.dmp

    Filesize

    628KB

  • memory/2704-40-0x0000000000400000-0x000000000049D000-memory.dmp

    Filesize

    628KB