Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
09-08-2024 01:42
Static task
static1
Behavioral task
behavioral1
Sample
bb66c0d4c9cbe6137c9e08091510808243ad01cef72870ba4eec015edcef3c3a.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bb66c0d4c9cbe6137c9e08091510808243ad01cef72870ba4eec015edcef3c3a.exe
Resource
win10v2004-20240802-en
General
-
Target
bb66c0d4c9cbe6137c9e08091510808243ad01cef72870ba4eec015edcef3c3a.exe
-
Size
80KB
-
MD5
d4f61f82e85c33712be93eba450d5b56
-
SHA1
75b2fe58cad91844bbe8b7cf31fc2d05e61b0642
-
SHA256
bb66c0d4c9cbe6137c9e08091510808243ad01cef72870ba4eec015edcef3c3a
-
SHA512
2844881de3f8dbe280d2a23346b0336b0934f0807b22ec3abcdb1ecc583af43f384121b3a96c69f1029d8282678c7e6d39ee1a11cb8785294d9df83aabf38951
-
SSDEEP
1536:LfV93OXhpP/A5fVTiEC532Ltnwfi+TjRC/6i:7V9eRpXATTioRwf1TjYL
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 12 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Khgkpl32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kocpbfei.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kmimcbja.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kipmhc32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kkojbf32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad bb66c0d4c9cbe6137c9e08091510808243ad01cef72870ba4eec015edcef3c3a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" bb66c0d4c9cbe6137c9e08091510808243ad01cef72870ba4eec015edcef3c3a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Khgkpl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kocpbfei.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kmimcbja.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kipmhc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kkojbf32.exe -
Executes dropped EXE 6 IoCs
pid Process 2316 Khgkpl32.exe 2188 Kocpbfei.exe 2728 Kmimcbja.exe 2644 Kipmhc32.exe 2548 Kkojbf32.exe 2564 Lbjofi32.exe -
Loads dropped DLL 16 IoCs
pid Process 2292 bb66c0d4c9cbe6137c9e08091510808243ad01cef72870ba4eec015edcef3c3a.exe 2292 bb66c0d4c9cbe6137c9e08091510808243ad01cef72870ba4eec015edcef3c3a.exe 2316 Khgkpl32.exe 2316 Khgkpl32.exe 2188 Kocpbfei.exe 2188 Kocpbfei.exe 2728 Kmimcbja.exe 2728 Kmimcbja.exe 2644 Kipmhc32.exe 2644 Kipmhc32.exe 2548 Kkojbf32.exe 2548 Kkojbf32.exe 2532 WerFault.exe 2532 WerFault.exe 2532 WerFault.exe 2532 WerFault.exe -
Drops file in System32 directory 18 IoCs
description ioc Process File created C:\Windows\SysWOW64\Khgkpl32.exe bb66c0d4c9cbe6137c9e08091510808243ad01cef72870ba4eec015edcef3c3a.exe File opened for modification C:\Windows\SysWOW64\Khgkpl32.exe bb66c0d4c9cbe6137c9e08091510808243ad01cef72870ba4eec015edcef3c3a.exe File opened for modification C:\Windows\SysWOW64\Kmimcbja.exe Kocpbfei.exe File created C:\Windows\SysWOW64\Dkpnde32.dll Kmimcbja.exe File opened for modification C:\Windows\SysWOW64\Kkojbf32.exe Kipmhc32.exe File created C:\Windows\SysWOW64\Lbjofi32.exe Kkojbf32.exe File created C:\Windows\SysWOW64\Kocpbfei.exe Khgkpl32.exe File created C:\Windows\SysWOW64\Ffakjm32.dll Khgkpl32.exe File created C:\Windows\SysWOW64\Bodilc32.dll Kocpbfei.exe File created C:\Windows\SysWOW64\Kipmhc32.exe Kmimcbja.exe File opened for modification C:\Windows\SysWOW64\Kipmhc32.exe Kmimcbja.exe File opened for modification C:\Windows\SysWOW64\Kocpbfei.exe Khgkpl32.exe File created C:\Windows\SysWOW64\Kmimcbja.exe Kocpbfei.exe File created C:\Windows\SysWOW64\Gffdobll.dll Kipmhc32.exe File opened for modification C:\Windows\SysWOW64\Lbjofi32.exe Kkojbf32.exe File created C:\Windows\SysWOW64\Pcdapknb.dll bb66c0d4c9cbe6137c9e08091510808243ad01cef72870ba4eec015edcef3c3a.exe File created C:\Windows\SysWOW64\Kkojbf32.exe Kipmhc32.exe File created C:\Windows\SysWOW64\Ipafocdg.dll Kkojbf32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2532 2564 WerFault.exe 35 -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Khgkpl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kocpbfei.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kmimcbja.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kipmhc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kkojbf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lbjofi32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bb66c0d4c9cbe6137c9e08091510808243ad01cef72870ba4eec015edcef3c3a.exe -
Modifies registry class 21 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kocpbfei.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kmimcbja.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kkojbf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Khgkpl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ffakjm32.dll" Khgkpl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kocpbfei.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gffdobll.dll" Kipmhc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 bb66c0d4c9cbe6137c9e08091510808243ad01cef72870ba4eec015edcef3c3a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} bb66c0d4c9cbe6137c9e08091510808243ad01cef72870ba4eec015edcef3c3a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dkpnde32.dll" Kmimcbja.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bodilc32.dll" Kocpbfei.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kmimcbja.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node bb66c0d4c9cbe6137c9e08091510808243ad01cef72870ba4eec015edcef3c3a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID bb66c0d4c9cbe6137c9e08091510808243ad01cef72870ba4eec015edcef3c3a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" bb66c0d4c9cbe6137c9e08091510808243ad01cef72870ba4eec015edcef3c3a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kipmhc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ipafocdg.dll" Kkojbf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kkojbf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pcdapknb.dll" bb66c0d4c9cbe6137c9e08091510808243ad01cef72870ba4eec015edcef3c3a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Khgkpl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kipmhc32.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2292 wrote to memory of 2316 2292 bb66c0d4c9cbe6137c9e08091510808243ad01cef72870ba4eec015edcef3c3a.exe 30 PID 2292 wrote to memory of 2316 2292 bb66c0d4c9cbe6137c9e08091510808243ad01cef72870ba4eec015edcef3c3a.exe 30 PID 2292 wrote to memory of 2316 2292 bb66c0d4c9cbe6137c9e08091510808243ad01cef72870ba4eec015edcef3c3a.exe 30 PID 2292 wrote to memory of 2316 2292 bb66c0d4c9cbe6137c9e08091510808243ad01cef72870ba4eec015edcef3c3a.exe 30 PID 2316 wrote to memory of 2188 2316 Khgkpl32.exe 31 PID 2316 wrote to memory of 2188 2316 Khgkpl32.exe 31 PID 2316 wrote to memory of 2188 2316 Khgkpl32.exe 31 PID 2316 wrote to memory of 2188 2316 Khgkpl32.exe 31 PID 2188 wrote to memory of 2728 2188 Kocpbfei.exe 32 PID 2188 wrote to memory of 2728 2188 Kocpbfei.exe 32 PID 2188 wrote to memory of 2728 2188 Kocpbfei.exe 32 PID 2188 wrote to memory of 2728 2188 Kocpbfei.exe 32 PID 2728 wrote to memory of 2644 2728 Kmimcbja.exe 33 PID 2728 wrote to memory of 2644 2728 Kmimcbja.exe 33 PID 2728 wrote to memory of 2644 2728 Kmimcbja.exe 33 PID 2728 wrote to memory of 2644 2728 Kmimcbja.exe 33 PID 2644 wrote to memory of 2548 2644 Kipmhc32.exe 34 PID 2644 wrote to memory of 2548 2644 Kipmhc32.exe 34 PID 2644 wrote to memory of 2548 2644 Kipmhc32.exe 34 PID 2644 wrote to memory of 2548 2644 Kipmhc32.exe 34 PID 2548 wrote to memory of 2564 2548 Kkojbf32.exe 35 PID 2548 wrote to memory of 2564 2548 Kkojbf32.exe 35 PID 2548 wrote to memory of 2564 2548 Kkojbf32.exe 35 PID 2548 wrote to memory of 2564 2548 Kkojbf32.exe 35 PID 2564 wrote to memory of 2532 2564 Lbjofi32.exe 36 PID 2564 wrote to memory of 2532 2564 Lbjofi32.exe 36 PID 2564 wrote to memory of 2532 2564 Lbjofi32.exe 36 PID 2564 wrote to memory of 2532 2564 Lbjofi32.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\bb66c0d4c9cbe6137c9e08091510808243ad01cef72870ba4eec015edcef3c3a.exe"C:\Users\Admin\AppData\Local\Temp\bb66c0d4c9cbe6137c9e08091510808243ad01cef72870ba4eec015edcef3c3a.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Windows\SysWOW64\Khgkpl32.exeC:\Windows\system32\Khgkpl32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\SysWOW64\Kocpbfei.exeC:\Windows\system32\Kocpbfei.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\SysWOW64\Kmimcbja.exeC:\Windows\system32\Kmimcbja.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\SysWOW64\Kipmhc32.exeC:\Windows\system32\Kipmhc32.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\SysWOW64\Kkojbf32.exeC:\Windows\system32\Kkojbf32.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\SysWOW64\Lbjofi32.exeC:\Windows\system32\Lbjofi32.exe7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2564 -s 1408⤵
- Loads dropped DLL
- Program crash
PID:2532
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD57592d9cfd74019760ef41f483d0dfd57
SHA1a72705f3b20d3e4d08952b7c40c55f9f574a7e1e
SHA25680c7a6c6b4771f5b44c5e49b837508d26f6cc33f694e6e524f838b762da0cfdd
SHA512a65492cf143e830a721511f127c3c2be3c02dddb99df398f7c5ca450855a7dd4fa0599b3d7bc2230f89b404aac6b3e1610228c41182cbecce0c59161bbd42803
-
Filesize
80KB
MD53c1b0d5e6d87681d6f4fc598fbe422f0
SHA18bdfe64fdd529fcea48f255708c2e443a6cdcd21
SHA256663b85f7363b54c1f9d9e45a27e2b96ca98882f9e8e59b085fbd13d5bb799898
SHA512905428bac7788bed59b4c4d34c3d56baf4b179ddeb70744a39136d1a470aaf993f896e05dbb8d49357d712e57aeede2011a2e2cc9d90b5ff0db3f78b1c68316e
-
Filesize
80KB
MD565ca2a452146296f0e3a6ce9785907bf
SHA146225c8d2bd3d32e53842e1d55e94218a73071ff
SHA25636436a84b5b874e90efcea6d480e0c8aa1532d25d16acf00c6685d99153d0af8
SHA5121b42655c56d5266ad75bc208b1629deeae53b288f3cf1fa941ef85fb480b985b7d716ff050c83c0f22cc900c993773ffbc4b87fc911e97a0ed837fbbb45f470f
-
Filesize
80KB
MD52085376bb7c097925179e2a05a6f9e8a
SHA1a74c2de7cf49b2b6c40e91700f06158b04eb65ed
SHA256acdf6c0196adfe70ed8f401152d3f4c013c80b8d4da149ad585825d23fbb1397
SHA512b46e3510cc866e2ef82b702a2865a77cd0bc6e988f9021ba616a5cfcb8b3cbda1a20d28ac66cf230f5c6d9f50688fa3356b8010202878efe5a37c95759c64f4c
-
Filesize
80KB
MD568efdff491ab20800805e1714e521347
SHA10a3f046d8016547e7d2ccf087fd53e5988e0d698
SHA256cef3830376c42f9cf2f5c98c141fb189eeb272a5fd078709dd6e81bfbdb3e4aa
SHA51268f7099906c729c2e8e6102850d7caf563d3420cfc9e970a6630efe5c7dc191beca202e1e2d503d88e5381b2426150821b3a9f583278cfde5622c1b99967cefb
-
Filesize
80KB
MD56993307fe7e11bfb94e0e0c8d9a0b6cc
SHA1b8f356d5e16a182cbf56d7e68660d99e98a67885
SHA256b2183bf877abfaac6c97cc9782ed9eb6f984f694001ff8fc5cebf4eef731d138
SHA512dd11099c375c8ad7d57e5e57baf2ffb60aaed69aca30bc1c49f3e3f1ac8bcd977713caad9118abe33d91e7dcc0883614342fbec71ef4832cb5840ab39fced695