Analysis

  • max time kernel
    122s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    09-08-2024 01:42

General

  • Target

    bb66c0d4c9cbe6137c9e08091510808243ad01cef72870ba4eec015edcef3c3a.exe

  • Size

    80KB

  • MD5

    d4f61f82e85c33712be93eba450d5b56

  • SHA1

    75b2fe58cad91844bbe8b7cf31fc2d05e61b0642

  • SHA256

    bb66c0d4c9cbe6137c9e08091510808243ad01cef72870ba4eec015edcef3c3a

  • SHA512

    2844881de3f8dbe280d2a23346b0336b0934f0807b22ec3abcdb1ecc583af43f384121b3a96c69f1029d8282678c7e6d39ee1a11cb8785294d9df83aabf38951

  • SSDEEP

    1536:LfV93OXhpP/A5fVTiEC532Ltnwfi+TjRC/6i:7V9eRpXATTioRwf1TjYL

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 12 IoCs
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 16 IoCs
  • Drops file in System32 directory 18 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 21 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bb66c0d4c9cbe6137c9e08091510808243ad01cef72870ba4eec015edcef3c3a.exe
    "C:\Users\Admin\AppData\Local\Temp\bb66c0d4c9cbe6137c9e08091510808243ad01cef72870ba4eec015edcef3c3a.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2292
    • C:\Windows\SysWOW64\Khgkpl32.exe
      C:\Windows\system32\Khgkpl32.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2316
      • C:\Windows\SysWOW64\Kocpbfei.exe
        C:\Windows\system32\Kocpbfei.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2188
        • C:\Windows\SysWOW64\Kmimcbja.exe
          C:\Windows\system32\Kmimcbja.exe
          4⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:2728
          • C:\Windows\SysWOW64\Kipmhc32.exe
            C:\Windows\system32\Kipmhc32.exe
            5⤵
            • Adds autorun key to be loaded by Explorer.exe on startup
            • Executes dropped EXE
            • Loads dropped DLL
            • Drops file in System32 directory
            • System Location Discovery: System Language Discovery
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:2644
            • C:\Windows\SysWOW64\Kkojbf32.exe
              C:\Windows\system32\Kkojbf32.exe
              6⤵
              • Adds autorun key to be loaded by Explorer.exe on startup
              • Executes dropped EXE
              • Loads dropped DLL
              • Drops file in System32 directory
              • System Location Discovery: System Language Discovery
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:2548
              • C:\Windows\SysWOW64\Lbjofi32.exe
                C:\Windows\system32\Lbjofi32.exe
                7⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:2564
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2564 -s 140
                  8⤵
                  • Loads dropped DLL
                  • Program crash
                  PID:2532

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Windows\SysWOW64\Khgkpl32.exe

    Filesize

    80KB

    MD5

    7592d9cfd74019760ef41f483d0dfd57

    SHA1

    a72705f3b20d3e4d08952b7c40c55f9f574a7e1e

    SHA256

    80c7a6c6b4771f5b44c5e49b837508d26f6cc33f694e6e524f838b762da0cfdd

    SHA512

    a65492cf143e830a721511f127c3c2be3c02dddb99df398f7c5ca450855a7dd4fa0599b3d7bc2230f89b404aac6b3e1610228c41182cbecce0c59161bbd42803

  • \Windows\SysWOW64\Kipmhc32.exe

    Filesize

    80KB

    MD5

    3c1b0d5e6d87681d6f4fc598fbe422f0

    SHA1

    8bdfe64fdd529fcea48f255708c2e443a6cdcd21

    SHA256

    663b85f7363b54c1f9d9e45a27e2b96ca98882f9e8e59b085fbd13d5bb799898

    SHA512

    905428bac7788bed59b4c4d34c3d56baf4b179ddeb70744a39136d1a470aaf993f896e05dbb8d49357d712e57aeede2011a2e2cc9d90b5ff0db3f78b1c68316e

  • \Windows\SysWOW64\Kkojbf32.exe

    Filesize

    80KB

    MD5

    65ca2a452146296f0e3a6ce9785907bf

    SHA1

    46225c8d2bd3d32e53842e1d55e94218a73071ff

    SHA256

    36436a84b5b874e90efcea6d480e0c8aa1532d25d16acf00c6685d99153d0af8

    SHA512

    1b42655c56d5266ad75bc208b1629deeae53b288f3cf1fa941ef85fb480b985b7d716ff050c83c0f22cc900c993773ffbc4b87fc911e97a0ed837fbbb45f470f

  • \Windows\SysWOW64\Kmimcbja.exe

    Filesize

    80KB

    MD5

    2085376bb7c097925179e2a05a6f9e8a

    SHA1

    a74c2de7cf49b2b6c40e91700f06158b04eb65ed

    SHA256

    acdf6c0196adfe70ed8f401152d3f4c013c80b8d4da149ad585825d23fbb1397

    SHA512

    b46e3510cc866e2ef82b702a2865a77cd0bc6e988f9021ba616a5cfcb8b3cbda1a20d28ac66cf230f5c6d9f50688fa3356b8010202878efe5a37c95759c64f4c

  • \Windows\SysWOW64\Kocpbfei.exe

    Filesize

    80KB

    MD5

    68efdff491ab20800805e1714e521347

    SHA1

    0a3f046d8016547e7d2ccf087fd53e5988e0d698

    SHA256

    cef3830376c42f9cf2f5c98c141fb189eeb272a5fd078709dd6e81bfbdb3e4aa

    SHA512

    68f7099906c729c2e8e6102850d7caf563d3420cfc9e970a6630efe5c7dc191beca202e1e2d503d88e5381b2426150821b3a9f583278cfde5622c1b99967cefb

  • \Windows\SysWOW64\Lbjofi32.exe

    Filesize

    80KB

    MD5

    6993307fe7e11bfb94e0e0c8d9a0b6cc

    SHA1

    b8f356d5e16a182cbf56d7e68660d99e98a67885

    SHA256

    b2183bf877abfaac6c97cc9782ed9eb6f984f694001ff8fc5cebf4eef731d138

    SHA512

    dd11099c375c8ad7d57e5e57baf2ffb60aaed69aca30bc1c49f3e3f1ac8bcd977713caad9118abe33d91e7dcc0883614342fbec71ef4832cb5840ab39fced695

  • memory/2188-34-0x00000000002C0000-0x0000000000300000-memory.dmp

    Filesize

    256KB

  • memory/2188-85-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2292-11-0x0000000000220000-0x0000000000260000-memory.dmp

    Filesize

    256KB

  • memory/2292-12-0x0000000000220000-0x0000000000260000-memory.dmp

    Filesize

    256KB

  • memory/2292-0-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2292-83-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2316-21-0x0000000000220000-0x0000000000260000-memory.dmp

    Filesize

    256KB

  • memory/2316-84-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2548-66-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2548-88-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2564-78-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2644-52-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2644-87-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2728-86-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB