Analysis

  • max time kernel
    140s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    08-08-2024 22:16

General

  • Target

    68fdaf88140ee5d381ad0097d545327be911079e0c7391e018a60d58eed3610f.exe

  • Size

    45KB

  • MD5

    ba9361757c07738ecf5fd047e69fe5ad

  • SHA1

    6a238bec38c6eb1f459df2d901b6f3dd7e222d60

  • SHA256

    68fdaf88140ee5d381ad0097d545327be911079e0c7391e018a60d58eed3610f

  • SHA512

    7e043b9af75d9e4a85e0a6052a7d49ad72ea453408b8ba351951a37c9df1c68c5bbe826838389c9e08ea3127a696f927de3cd587f7487a13daa80e1ad4b3a511

  • SSDEEP

    768:MDZ5BAB62EzA4vBcDhRXhI6EMZqyiHS6nTI6Nl7/1H53X:u6B62Es4W+PhbtF

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 14 IoCs
  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 18 IoCs
  • Drops file in System32 directory 21 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 24 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\68fdaf88140ee5d381ad0097d545327be911079e0c7391e018a60d58eed3610f.exe
    "C:\Users\Admin\AppData\Local\Temp\68fdaf88140ee5d381ad0097d545327be911079e0c7391e018a60d58eed3610f.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2252
    • C:\Windows\SysWOW64\Eqgnokip.exe
      C:\Windows\system32\Eqgnokip.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2656
      • C:\Windows\SysWOW64\Ecejkf32.exe
        C:\Windows\system32\Ecejkf32.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2676
        • C:\Windows\SysWOW64\Efcfga32.exe
          C:\Windows\system32\Efcfga32.exe
          4⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:2584
          • C:\Windows\SysWOW64\Emnndlod.exe
            C:\Windows\system32\Emnndlod.exe
            5⤵
            • Adds autorun key to be loaded by Explorer.exe on startup
            • Executes dropped EXE
            • Loads dropped DLL
            • Drops file in System32 directory
            • System Location Discovery: System Language Discovery
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:2596
            • C:\Windows\SysWOW64\Eplkpgnh.exe
              C:\Windows\system32\Eplkpgnh.exe
              6⤵
              • Adds autorun key to be loaded by Explorer.exe on startup
              • Executes dropped EXE
              • Loads dropped DLL
              • Drops file in System32 directory
              • System Location Discovery: System Language Discovery
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:2672
              • C:\Windows\SysWOW64\Fidoim32.exe
                C:\Windows\system32\Fidoim32.exe
                7⤵
                • Adds autorun key to be loaded by Explorer.exe on startup
                • Executes dropped EXE
                • Loads dropped DLL
                • Drops file in System32 directory
                • System Location Discovery: System Language Discovery
                • Modifies registry class
                • Suspicious use of WriteProcessMemory
                PID:1160
                • C:\Windows\SysWOW64\Fkckeh32.exe
                  C:\Windows\system32\Fkckeh32.exe
                  8⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of WriteProcessMemory
                  PID:592
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 592 -s 140
                    9⤵
                    • Loads dropped DLL
                    • Program crash
                    PID:2992

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\Ecejkf32.exe

    Filesize

    45KB

    MD5

    8b35101d0d71fcfe9296862d322432f4

    SHA1

    930e19298623eab6a3e926a87e969f765f5a5ed2

    SHA256

    e1e17e502f12f4d5914a41adcb491f1042054ab42f5d2898965a0c4cec5c9425

    SHA512

    71f7e81f23f63292858c5d0c88126544a950b700e1b5161026580b8765ad5f01ce4609b93fff1cc0cfd959ab7b202423af2a9f1270ad8478f5b72d62c28f8ba1

  • C:\Windows\SysWOW64\Eqgnokip.exe

    Filesize

    45KB

    MD5

    fca17bf6ce4951715834076ec5ffccac

    SHA1

    31aed757085f330c9b1ce66caa42fd561e2e5702

    SHA256

    05aa8ceb25e74965e41576ddd23bf1438718099432b6f4b6fa978063fd903571

    SHA512

    c892a20e64a813cdd652bf570b40d4e464b1ddc019fbcbf0fb88620cd80af144b46748828e0cf6a450910560662537b4ab4aae4a0a99a957aa14c27afa095f0b

  • \Windows\SysWOW64\Efcfga32.exe

    Filesize

    45KB

    MD5

    8b6b149fe0be52e484634103a90b0e36

    SHA1

    d1649bcbe0e183a72ae5e9013bc178dbe1edce01

    SHA256

    f7d3fe7482b61415fbb64b86a94620018e797c819d326a53fc89357774a15417

    SHA512

    b706a6da3dbe5ce29aaf5e4c4308ba26d430cbf1d847522aa58b88d34e73f90a253b169f3aacc047e380694976a10b242fc1a4803ccdc372da33274c88f45ab9

  • \Windows\SysWOW64\Emnndlod.exe

    Filesize

    45KB

    MD5

    dbfaa270822c9624d0d3e77cf4af740a

    SHA1

    0b6871bc0ea6450db1c92f37de1f664169166a5f

    SHA256

    5baf2720a3889b14f4acaa3ab290b1740911828c14b4d4a51ad799cdff1ea157

    SHA512

    1b8b7af1050762429609259edcda54dca052b0cb8a8b71fb1205c16ddbfce7ed2cbd2ccaf4e48a5042ce7cdcf400a8ce58260994c0885979bbd1669de7f04ff0

  • \Windows\SysWOW64\Eplkpgnh.exe

    Filesize

    45KB

    MD5

    c8da8582a3288c739316522c70d5ac48

    SHA1

    a4419c08ad3c3e90d3a5ceb822e5b252066cfffd

    SHA256

    375589c8d499add5fc48234b729e001f86eb5a4a961a7b45fd31c6a733228a17

    SHA512

    4f5f48d354affe59618876937e774bd52c49da42cba4bc55a9d1ab9faeec6a2f11d4a0bd845cac9fb36e5183929a58eaa5b86e272c14002786ef88925156c79c

  • \Windows\SysWOW64\Fidoim32.exe

    Filesize

    45KB

    MD5

    d28bd50d845d71fb9e56cc78aa4bc2be

    SHA1

    48f34c9b6f5a8324a021a94893b12265f88d1651

    SHA256

    a408165cd2d750143178cf03c58c05e029f4f8b935f39e2d7933a0e6f833cdaa

    SHA512

    3b7aa2e0a76c09fef0f9a12ae396b411decd10370bbc892fbe53250363905d049d11bf75e053e82d778dc5d9b7a3b91ba8b57552d76cbcbb6c6aee602f568510

  • \Windows\SysWOW64\Fkckeh32.exe

    Filesize

    45KB

    MD5

    5c32f7732b53fade514538eb46d29287

    SHA1

    c2ca45ffda31baf15e96dca13303463a52eaecae

    SHA256

    7425bb86cf75340db57299342bc66baec600b251628f321d3f346d7b73640ecd

    SHA512

    83a23e4110e18b044cb2d42f07d4d300cbb7b9a85944b7860d2f79d7ed24c217a1115ff4d79c6f6c283b9c1efb5f7600787ddfe705eb1ce0bc0b55d60a5fcb60

  • memory/592-97-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/592-109-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/1160-90-0x0000000000250000-0x000000000027F000-memory.dmp

    Filesize

    188KB

  • memory/1160-108-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/1160-83-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2252-102-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2252-0-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2252-17-0x00000000003D0000-0x00000000003FF000-memory.dmp

    Filesize

    188KB

  • memory/2584-41-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2584-54-0x0000000000260000-0x000000000028F000-memory.dmp

    Filesize

    188KB

  • memory/2584-105-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2596-55-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2596-106-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2596-62-0x0000000000430000-0x000000000045F000-memory.dmp

    Filesize

    188KB

  • memory/2656-18-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2656-26-0x0000000000260000-0x000000000028F000-memory.dmp

    Filesize

    188KB

  • memory/2672-82-0x00000000001E0000-0x000000000020F000-memory.dmp

    Filesize

    188KB

  • memory/2672-107-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2672-69-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2676-104-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2676-40-0x00000000001E0000-0x000000000020F000-memory.dmp

    Filesize

    188KB

  • memory/2676-27-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB