Analysis
-
max time kernel
32s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
20/08/2024, 23:11
Static task
static1
Behavioral task
behavioral1
Sample
be73a02543c991d34fb0f7c1a53efeb0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
be73a02543c991d34fb0f7c1a53efeb0N.exe
Resource
win10v2004-20240802-en
General
-
Target
be73a02543c991d34fb0f7c1a53efeb0N.exe
-
Size
1.2MB
-
MD5
be73a02543c991d34fb0f7c1a53efeb0
-
SHA1
1a4cbce2a0dec71f7ebdd95192a8eeecf4f28aa5
-
SHA256
2275d5df602fbd6932adcedb4522dd841fc0cd03b5b881fcf4e2fbfb81d969e0
-
SHA512
06da716aad88f0a6316772a55ee840d884c370261eed13a3722f9248eb8b233e9692e68cc94ece77823450e2cd63d6581f814ce496dc5cbc8e14d9b688bde8aa
-
SSDEEP
24576:xgu5YyCtCCm0BmmvFimm00h2kkkkK4kXkkkkkkkkhLX3a20R0v50+YR:xgu5RCtCmizbazR0vk
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad be73a02543c991d34fb0f7c1a53efeb0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" be73a02543c991d34fb0f7c1a53efeb0N.exe -
Executes dropped EXE 1 IoCs
pid Process 2680 Fkckeh32.exe -
Loads dropped DLL 6 IoCs
pid Process 2432 be73a02543c991d34fb0f7c1a53efeb0N.exe 2432 be73a02543c991d34fb0f7c1a53efeb0N.exe 2800 WerFault.exe 2800 WerFault.exe 2800 WerFault.exe 2800 WerFault.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\Fkckeh32.exe be73a02543c991d34fb0f7c1a53efeb0N.exe File opened for modification C:\Windows\SysWOW64\Fkckeh32.exe be73a02543c991d34fb0f7c1a53efeb0N.exe File created C:\Windows\SysWOW64\Clkmne32.dll be73a02543c991d34fb0f7c1a53efeb0N.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2800 2680 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language be73a02543c991d34fb0f7c1a53efeb0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fkckeh32.exe -
Modifies registry class 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717} be73a02543c991d34fb0f7c1a53efeb0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Clkmne32.dll" be73a02543c991d34fb0f7c1a53efeb0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" be73a02543c991d34fb0f7c1a53efeb0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 be73a02543c991d34fb0f7c1a53efeb0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node be73a02543c991d34fb0f7c1a53efeb0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID be73a02543c991d34fb0f7c1a53efeb0N.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2432 wrote to memory of 2680 2432 be73a02543c991d34fb0f7c1a53efeb0N.exe 30 PID 2432 wrote to memory of 2680 2432 be73a02543c991d34fb0f7c1a53efeb0N.exe 30 PID 2432 wrote to memory of 2680 2432 be73a02543c991d34fb0f7c1a53efeb0N.exe 30 PID 2432 wrote to memory of 2680 2432 be73a02543c991d34fb0f7c1a53efeb0N.exe 30 PID 2680 wrote to memory of 2800 2680 Fkckeh32.exe 31 PID 2680 wrote to memory of 2800 2680 Fkckeh32.exe 31 PID 2680 wrote to memory of 2800 2680 Fkckeh32.exe 31 PID 2680 wrote to memory of 2800 2680 Fkckeh32.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\be73a02543c991d34fb0f7c1a53efeb0N.exe"C:\Users\Admin\AppData\Local\Temp\be73a02543c991d34fb0f7c1a53efeb0N.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Windows\SysWOW64\Fkckeh32.exeC:\Windows\system32\Fkckeh32.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2680 -s 1403⤵
- Loads dropped DLL
- Program crash
PID:2800
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD59c7bdbc31b5cb583ac7c5887b7d27f2b
SHA1043cf6cf39bc63cd6c1dc200b127fefe779fb8f3
SHA256ed04d9b98bbcf0569e37e18eeea3bd2663c81ee534c026ae99f6026730909cbc
SHA51221e69167703aff2c7c307f37fe3f45337a26179ae10f05cd817d585c7e4cb4539dc5bff9ae0b04d060670dda0e1af44c86c56b53830f52350f15a7c9798ebe6f