Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
17-08-2024 19:29
Static task
static1
Behavioral task
behavioral1
Sample
1b562b22247b8a8394d93ee4e8cb9bd77c9b5d12b761f4cbfdaa90db053d1049.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
1b562b22247b8a8394d93ee4e8cb9bd77c9b5d12b761f4cbfdaa90db053d1049.exe
Resource
win10v2004-20240802-en
General
-
Target
1b562b22247b8a8394d93ee4e8cb9bd77c9b5d12b761f4cbfdaa90db053d1049.exe
-
Size
264KB
-
MD5
fd601e2605ed4308c7bb0e1e2aab7070
-
SHA1
0579ebbb0704e2ace3875134416e5b47b6152ced
-
SHA256
1b562b22247b8a8394d93ee4e8cb9bd77c9b5d12b761f4cbfdaa90db053d1049
-
SHA512
e4f2653f715e6e2b5e35e6fb49fd30c56ebc95eee65e2b58d3ee1c71d269cf1024b60e29b0ff98f66d7953bdc5d88e45223dac8bd59623bdd42a5e0f4c39e77d
-
SSDEEP
6144:ARi6tbPx0bVp0/VxWwsohxd2Quohdbd0zscwIGUKfvUJ43ewmxteZekR+1b/KVCD:K/RxdzZdxGwsYI
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 1b562b22247b8a8394d93ee4e8cb9bd77c9b5d12b761f4cbfdaa90db053d1049.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" 1b562b22247b8a8394d93ee4e8cb9bd77c9b5d12b761f4cbfdaa90db053d1049.exe -
Executes dropped EXE 1 IoCs
pid Process 2172 Dmllipeg.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\Dmllipeg.exe 1b562b22247b8a8394d93ee4e8cb9bd77c9b5d12b761f4cbfdaa90db053d1049.exe File opened for modification C:\Windows\SysWOW64\Dmllipeg.exe 1b562b22247b8a8394d93ee4e8cb9bd77c9b5d12b761f4cbfdaa90db053d1049.exe File created C:\Windows\SysWOW64\Kngpec32.dll 1b562b22247b8a8394d93ee4e8cb9bd77c9b5d12b761f4cbfdaa90db053d1049.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3964 2172 WerFault.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1b562b22247b8a8394d93ee4e8cb9bd77c9b5d12b761f4cbfdaa90db053d1049.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dmllipeg.exe -
Modifies registry class 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node 1b562b22247b8a8394d93ee4e8cb9bd77c9b5d12b761f4cbfdaa90db053d1049.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID 1b562b22247b8a8394d93ee4e8cb9bd77c9b5d12b761f4cbfdaa90db053d1049.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} 1b562b22247b8a8394d93ee4e8cb9bd77c9b5d12b761f4cbfdaa90db053d1049.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kngpec32.dll" 1b562b22247b8a8394d93ee4e8cb9bd77c9b5d12b761f4cbfdaa90db053d1049.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" 1b562b22247b8a8394d93ee4e8cb9bd77c9b5d12b761f4cbfdaa90db053d1049.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 1b562b22247b8a8394d93ee4e8cb9bd77c9b5d12b761f4cbfdaa90db053d1049.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 436 wrote to memory of 2172 436 1b562b22247b8a8394d93ee4e8cb9bd77c9b5d12b761f4cbfdaa90db053d1049.exe 86 PID 436 wrote to memory of 2172 436 1b562b22247b8a8394d93ee4e8cb9bd77c9b5d12b761f4cbfdaa90db053d1049.exe 86 PID 436 wrote to memory of 2172 436 1b562b22247b8a8394d93ee4e8cb9bd77c9b5d12b761f4cbfdaa90db053d1049.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\1b562b22247b8a8394d93ee4e8cb9bd77c9b5d12b761f4cbfdaa90db053d1049.exe"C:\Users\Admin\AppData\Local\Temp\1b562b22247b8a8394d93ee4e8cb9bd77c9b5d12b761f4cbfdaa90db053d1049.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:436 -
C:\Windows\SysWOW64\Dmllipeg.exeC:\Windows\system32\Dmllipeg.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2172 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2172 -s 4043⤵
- Program crash
PID:3964
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2172 -ip 21721⤵PID:4920
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264KB
MD58ffb657a20b003eaa5b557a22e68789a
SHA157396daffd9ac7848c6ea1097a752981e2f2269d
SHA256daf94da136e1607ee7ff4ee70678a8923afd7812be5f30b6b4687e69f9b1e682
SHA5128faeeaa528602a239905d4027e4daaec0657abcb96b6ce5fd2a97835fae2024026f7cfd734581b8495772b9fbe8c3d853f37f878ddd53c0ebfdce8df2899440e