Analysis

  • max time kernel
    111s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    20/08/2024, 11:35

General

  • Target

    2359f21f63359c6751d72ee60c254480N.exe

  • Size

    446KB

  • MD5

    2359f21f63359c6751d72ee60c254480

  • SHA1

    92d2ef77f445d7129705a9b6b0b8674ce41d117f

  • SHA256

    88dc75e072104a5ecd3e9e65f1134ea47ea8337ad7feb00403fa382a22137c1a

  • SHA512

    39e915ee0f392d071b0c502b58c21c10274371fb1a134feb018e7848b3c291182309fa77e40ac6d9fb869b621a9662a6ae3b7f84798fe613542b5f8dab9238e2

  • SSDEEP

    6144:E0yPcbdKGPOwXYrMdlvkGr0f+uPOwXYrMdlsLS7De:cCEwIaJwIdSy

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 12 IoCs
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 16 IoCs
  • Drops file in System32 directory 18 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 21 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2359f21f63359c6751d72ee60c254480N.exe
    "C:\Users\Admin\AppData\Local\Temp\2359f21f63359c6751d72ee60c254480N.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1648
    • C:\Windows\SysWOW64\Noepdo32.exe
      C:\Windows\system32\Noepdo32.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2300
      • C:\Windows\SysWOW64\Nacmpj32.exe
        C:\Windows\system32\Nacmpj32.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2788
        • C:\Windows\SysWOW64\Ndbile32.exe
          C:\Windows\system32\Ndbile32.exe
          4⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:2704
          • C:\Windows\SysWOW64\Nklaipbj.exe
            C:\Windows\system32\Nklaipbj.exe
            5⤵
            • Adds autorun key to be loaded by Explorer.exe on startup
            • Executes dropped EXE
            • Loads dropped DLL
            • Drops file in System32 directory
            • System Location Discovery: System Language Discovery
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:2936
            • C:\Windows\SysWOW64\Ndiomdde.exe
              C:\Windows\system32\Ndiomdde.exe
              6⤵
              • Adds autorun key to be loaded by Explorer.exe on startup
              • Executes dropped EXE
              • Loads dropped DLL
              • Drops file in System32 directory
              • System Location Discovery: System Language Discovery
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:868
              • C:\Windows\SysWOW64\Opblgehg.exe
                C:\Windows\system32\Opblgehg.exe
                7⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:2148
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2148 -s 140
                  8⤵
                  • Loads dropped DLL
                  • Program crash
                  PID:2084

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\Nacmpj32.exe

    Filesize

    446KB

    MD5

    ec607ff2dffa22ec6a987d94f43e9251

    SHA1

    4baa948cae39654f86f9f7bd4f90996b6a7eae8f

    SHA256

    8ab613140a08094fea8bdebebefce44c5ce0045fb6a6740fe57e55994eaf42a0

    SHA512

    152c9571b8a9654ca1bb42957be7beb9e380dbbdc6eeb61fb39db5b02dfb1908ade6b038a69135bbd43659d163f930d25d34d34af9c8a7fb3a9da0f23083255c

  • C:\Windows\SysWOW64\Ndbile32.exe

    Filesize

    446KB

    MD5

    fab7f9ec876f02f8f1f632148b7926c1

    SHA1

    528b26ff2724d82704618c1050399b1b5540ccfa

    SHA256

    d855bf4f369624910f97c9af7939670264111869e98e09d235378452f9843e56

    SHA512

    95477e0b2fed075c5fbad2896f0c360cb74d11375bfc826c6e2ee52de3839526af7978d798695707b5f3d282754078b51a5fb851b40d8d964355da14cadc13b1

  • C:\Windows\SysWOW64\Noepdo32.exe

    Filesize

    446KB

    MD5

    34d52043b039b5cff9db30041b9e8497

    SHA1

    3b0c57d020beb3ca7d41afb9d42d406079e56c66

    SHA256

    db2585e37f514bc4958c3a91ab0cab8f1cf8d46d12e58801c8adfcbd342065de

    SHA512

    29607a651512346ee8ada8592a9da90f901c04f2d7ce104bc22e5b9f126cc1dd910e75550b0a26db77b12cb2ecd950496199b4760b3a5d1b38bd3b6b341b678c

  • \Windows\SysWOW64\Ndiomdde.exe

    Filesize

    446KB

    MD5

    b8049b799b5d3d26e497152d072024bf

    SHA1

    99c590372635ab0936f9a27c4b2d2f24e160f82b

    SHA256

    bf31469b3ff619158f7d02d9e47fb78d82017799a27f392a56eb266c28cb4763

    SHA512

    c8dc74c13acf03ea5f476e0a540a1035e8b68175288c46a86235c22ec7edcca56d0760f8ccd30ebb637c73f54c08d0dec249d470def194de69bea3aa2eab7d32

  • \Windows\SysWOW64\Nklaipbj.exe

    Filesize

    446KB

    MD5

    944ad7eefc072ef3360fb72f0dbf8d56

    SHA1

    513860cca42c74ab07fca5e1c75d083515bc33b8

    SHA256

    2a2431414fe35e4cb1a7edfb80865c1e6ed3c2652d61035421a0441c0db66376

    SHA512

    37ff1887e5d303e251ba51b0850ece90d1ff4ee35ba91a15d3ac7671c87987e9328b700d6531d57ab4a12fcfd3e311c2bcf174e450c2e274ba8fde1671b1ac60

  • \Windows\SysWOW64\Opblgehg.exe

    Filesize

    446KB

    MD5

    951e266785082f554603faeea3ebac07

    SHA1

    e400b8be0a52e317cc15f3b5bc0d2324b20ee1e5

    SHA256

    e2f7f23a4a5b491b97617bd434bc95297ae9d295365f38bf91e10a55cb14b1d0

    SHA512

    c336ffa4750aa70523f9611720c7960f57d6b210d18691a5f8bfcb217169c7ad2acfce8b2977c62ded98b422b2d8aece1a5aba9181b7e439785c081aa88c943f

  • memory/868-95-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/868-71-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/868-79-0x0000000000280000-0x00000000002B3000-memory.dmp

    Filesize

    204KB

  • memory/1648-0-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/1648-90-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/1648-12-0x0000000000250000-0x0000000000283000-memory.dmp

    Filesize

    204KB

  • memory/1648-11-0x0000000000250000-0x0000000000283000-memory.dmp

    Filesize

    204KB

  • memory/2148-85-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2300-91-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2300-32-0x0000000000250000-0x0000000000283000-memory.dmp

    Filesize

    204KB

  • memory/2300-14-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2704-47-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2704-60-0x00000000002D0000-0x0000000000303000-memory.dmp

    Filesize

    204KB

  • memory/2788-33-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2788-46-0x0000000000250000-0x0000000000283000-memory.dmp

    Filesize

    204KB

  • memory/2936-61-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2936-69-0x00000000002F0000-0x0000000000323000-memory.dmp

    Filesize

    204KB

  • memory/2936-64-0x00000000002F0000-0x0000000000323000-memory.dmp

    Filesize

    204KB