Analysis
-
max time kernel
139s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18/08/2024, 21:49
Static task
static1
Behavioral task
behavioral1
Sample
642a91be5044234d6fa5c95d82f735ac742a9fcde9030c35532e7b8a20335702.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
642a91be5044234d6fa5c95d82f735ac742a9fcde9030c35532e7b8a20335702.exe
Resource
win10v2004-20240802-en
General
-
Target
642a91be5044234d6fa5c95d82f735ac742a9fcde9030c35532e7b8a20335702.exe
-
Size
78KB
-
MD5
adac3c9737360cb44ba585eee7b90b5b
-
SHA1
f971e51785ef4c3ff6faabc24c1fb88368779320
-
SHA256
642a91be5044234d6fa5c95d82f735ac742a9fcde9030c35532e7b8a20335702
-
SHA512
5bd8ce73a42ab2c6c5a2d7690354bd92f43f267d81740667576d6a63fdc8f923b6fe881a0e18b8f34a3562f63abbd0a829c0128fb0cf5dea77aba7e9674dd380
-
SSDEEP
1536:NtE267gRhvZsnc6kDsYoACX6HdOiVQRN+zL20gJi1ie:bBfhtDFnCq9OiVmgzL20WKt
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" 642a91be5044234d6fa5c95d82f735ac742a9fcde9030c35532e7b8a20335702.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 642a91be5044234d6fa5c95d82f735ac742a9fcde9030c35532e7b8a20335702.exe -
Executes dropped EXE 1 IoCs
pid Process 2188 Fkkeclfh.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\Chembclp.dll 642a91be5044234d6fa5c95d82f735ac742a9fcde9030c35532e7b8a20335702.exe File created C:\Windows\SysWOW64\Fkkeclfh.exe 642a91be5044234d6fa5c95d82f735ac742a9fcde9030c35532e7b8a20335702.exe File opened for modification C:\Windows\SysWOW64\Fkkeclfh.exe 642a91be5044234d6fa5c95d82f735ac742a9fcde9030c35532e7b8a20335702.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 4940 2188 WerFault.exe 84 4464 2188 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fkkeclfh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 642a91be5044234d6fa5c95d82f735ac742a9fcde9030c35532e7b8a20335702.exe -
Modifies registry class 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 642a91be5044234d6fa5c95d82f735ac742a9fcde9030c35532e7b8a20335702.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node 642a91be5044234d6fa5c95d82f735ac742a9fcde9030c35532e7b8a20335702.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID 642a91be5044234d6fa5c95d82f735ac742a9fcde9030c35532e7b8a20335702.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} 642a91be5044234d6fa5c95d82f735ac742a9fcde9030c35532e7b8a20335702.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Chembclp.dll" 642a91be5044234d6fa5c95d82f735ac742a9fcde9030c35532e7b8a20335702.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" 642a91be5044234d6fa5c95d82f735ac742a9fcde9030c35532e7b8a20335702.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2644 wrote to memory of 2188 2644 642a91be5044234d6fa5c95d82f735ac742a9fcde9030c35532e7b8a20335702.exe 84 PID 2644 wrote to memory of 2188 2644 642a91be5044234d6fa5c95d82f735ac742a9fcde9030c35532e7b8a20335702.exe 84 PID 2644 wrote to memory of 2188 2644 642a91be5044234d6fa5c95d82f735ac742a9fcde9030c35532e7b8a20335702.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\642a91be5044234d6fa5c95d82f735ac742a9fcde9030c35532e7b8a20335702.exe"C:\Users\Admin\AppData\Local\Temp\642a91be5044234d6fa5c95d82f735ac742a9fcde9030c35532e7b8a20335702.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\SysWOW64\Fkkeclfh.exeC:\Windows\system32\Fkkeclfh.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2188 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2188 -s 3963⤵
- Program crash
PID:4940
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2188 -s 4003⤵
- Program crash
PID:4464
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2188 -ip 21881⤵PID:3512
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2188 -ip 21881⤵PID:2292
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
78KB
MD5c19240975db77be2e6f8cc74a3b73b90
SHA11746bdf65ca21e4791ca5c65a981a76df96df4a2
SHA2565adf5d5ead3e49a9bf5da089bc878e7178c02b015d95cbd4b34b4fac9857fce8
SHA512055bc69c9089a8b038f616c5c2d2829b301c0b7e952b17efdcf20577a8a2d9ad66fa1f6723eb6461c73a382edaa7d474e789176c8fd480ae4826c702c648ee1c