Analysis
-
max time kernel
111s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
20/08/2024, 11:35
Static task
static1
Behavioral task
behavioral1
Sample
2359f21f63359c6751d72ee60c254480N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2359f21f63359c6751d72ee60c254480N.exe
Resource
win10v2004-20240802-en
General
-
Target
2359f21f63359c6751d72ee60c254480N.exe
-
Size
446KB
-
MD5
2359f21f63359c6751d72ee60c254480
-
SHA1
92d2ef77f445d7129705a9b6b0b8674ce41d117f
-
SHA256
88dc75e072104a5ecd3e9e65f1134ea47ea8337ad7feb00403fa382a22137c1a
-
SHA512
39e915ee0f392d071b0c502b58c21c10274371fb1a134feb018e7848b3c291182309fa77e40ac6d9fb869b621a9662a6ae3b7f84798fe613542b5f8dab9238e2
-
SSDEEP
6144:E0yPcbdKGPOwXYrMdlvkGr0f+uPOwXYrMdlsLS7De:cCEwIaJwIdSy
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 12 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 2359f21f63359c6751d72ee60c254480N.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Noepdo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Noepdo32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nacmpj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nacmpj32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ndbile32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nklaipbj.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ndiomdde.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ndiomdde.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" 2359f21f63359c6751d72ee60c254480N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ndbile32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nklaipbj.exe -
Executes dropped EXE 6 IoCs
pid Process 2300 Noepdo32.exe 2788 Nacmpj32.exe 2704 Ndbile32.exe 2936 Nklaipbj.exe 868 Ndiomdde.exe 2148 Opblgehg.exe -
Loads dropped DLL 16 IoCs
pid Process 1648 2359f21f63359c6751d72ee60c254480N.exe 1648 2359f21f63359c6751d72ee60c254480N.exe 2300 Noepdo32.exe 2300 Noepdo32.exe 2788 Nacmpj32.exe 2788 Nacmpj32.exe 2704 Ndbile32.exe 2704 Ndbile32.exe 2936 Nklaipbj.exe 2936 Nklaipbj.exe 868 Ndiomdde.exe 868 Ndiomdde.exe 2084 WerFault.exe 2084 WerFault.exe 2084 WerFault.exe 2084 WerFault.exe -
Drops file in System32 directory 18 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Nacmpj32.exe Noepdo32.exe File opened for modification C:\Windows\SysWOW64\Nklaipbj.exe Ndbile32.exe File created C:\Windows\SysWOW64\Hplmnbjm.dll Ndbile32.exe File created C:\Windows\SysWOW64\Ndiomdde.exe Nklaipbj.exe File opened for modification C:\Windows\SysWOW64\Ndiomdde.exe Nklaipbj.exe File created C:\Windows\SysWOW64\Ahmjfimi.dll Ndiomdde.exe File created C:\Windows\SysWOW64\Noepdo32.exe 2359f21f63359c6751d72ee60c254480N.exe File created C:\Windows\SysWOW64\Keoncpnb.dll 2359f21f63359c6751d72ee60c254480N.exe File created C:\Windows\SysWOW64\Hqnpad32.dll Nklaipbj.exe File created C:\Windows\SysWOW64\Nacmpj32.exe Noepdo32.exe File created C:\Windows\SysWOW64\Nklaipbj.exe Ndbile32.exe File created C:\Windows\SysWOW64\Nhclfogi.dll Nacmpj32.exe File opened for modification C:\Windows\SysWOW64\Opblgehg.exe Ndiomdde.exe File created C:\Windows\SysWOW64\Kcgpfpbq.dll Noepdo32.exe File opened for modification C:\Windows\SysWOW64\Ndbile32.exe Nacmpj32.exe File created C:\Windows\SysWOW64\Opblgehg.exe Ndiomdde.exe File opened for modification C:\Windows\SysWOW64\Noepdo32.exe 2359f21f63359c6751d72ee60c254480N.exe File created C:\Windows\SysWOW64\Ndbile32.exe Nacmpj32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2084 2148 WerFault.exe 35 -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nklaipbj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ndiomdde.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Opblgehg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2359f21f63359c6751d72ee60c254480N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Noepdo32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nacmpj32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ndbile32.exe -
Modifies registry class 21 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Noepdo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nacmpj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ndbile32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ndiomdde.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ahmjfimi.dll" Ndiomdde.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 2359f21f63359c6751d72ee60c254480N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kcgpfpbq.dll" Noepdo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Keoncpnb.dll" 2359f21f63359c6751d72ee60c254480N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID 2359f21f63359c6751d72ee60c254480N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} 2359f21f63359c6751d72ee60c254480N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nhclfogi.dll" Nacmpj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hplmnbjm.dll" Ndbile32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nklaipbj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nklaipbj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Noepdo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nacmpj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ndbile32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hqnpad32.dll" Nklaipbj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ndiomdde.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node 2359f21f63359c6751d72ee60c254480N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" 2359f21f63359c6751d72ee60c254480N.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1648 wrote to memory of 2300 1648 2359f21f63359c6751d72ee60c254480N.exe 30 PID 1648 wrote to memory of 2300 1648 2359f21f63359c6751d72ee60c254480N.exe 30 PID 1648 wrote to memory of 2300 1648 2359f21f63359c6751d72ee60c254480N.exe 30 PID 1648 wrote to memory of 2300 1648 2359f21f63359c6751d72ee60c254480N.exe 30 PID 2300 wrote to memory of 2788 2300 Noepdo32.exe 31 PID 2300 wrote to memory of 2788 2300 Noepdo32.exe 31 PID 2300 wrote to memory of 2788 2300 Noepdo32.exe 31 PID 2300 wrote to memory of 2788 2300 Noepdo32.exe 31 PID 2788 wrote to memory of 2704 2788 Nacmpj32.exe 32 PID 2788 wrote to memory of 2704 2788 Nacmpj32.exe 32 PID 2788 wrote to memory of 2704 2788 Nacmpj32.exe 32 PID 2788 wrote to memory of 2704 2788 Nacmpj32.exe 32 PID 2704 wrote to memory of 2936 2704 Ndbile32.exe 33 PID 2704 wrote to memory of 2936 2704 Ndbile32.exe 33 PID 2704 wrote to memory of 2936 2704 Ndbile32.exe 33 PID 2704 wrote to memory of 2936 2704 Ndbile32.exe 33 PID 2936 wrote to memory of 868 2936 Nklaipbj.exe 34 PID 2936 wrote to memory of 868 2936 Nklaipbj.exe 34 PID 2936 wrote to memory of 868 2936 Nklaipbj.exe 34 PID 2936 wrote to memory of 868 2936 Nklaipbj.exe 34 PID 868 wrote to memory of 2148 868 Ndiomdde.exe 35 PID 868 wrote to memory of 2148 868 Ndiomdde.exe 35 PID 868 wrote to memory of 2148 868 Ndiomdde.exe 35 PID 868 wrote to memory of 2148 868 Ndiomdde.exe 35 PID 2148 wrote to memory of 2084 2148 Opblgehg.exe 36 PID 2148 wrote to memory of 2084 2148 Opblgehg.exe 36 PID 2148 wrote to memory of 2084 2148 Opblgehg.exe 36 PID 2148 wrote to memory of 2084 2148 Opblgehg.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\2359f21f63359c6751d72ee60c254480N.exe"C:\Users\Admin\AppData\Local\Temp\2359f21f63359c6751d72ee60c254480N.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Windows\SysWOW64\Noepdo32.exeC:\Windows\system32\Noepdo32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\SysWOW64\Nacmpj32.exeC:\Windows\system32\Nacmpj32.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Windows\SysWOW64\Ndbile32.exeC:\Windows\system32\Ndbile32.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\SysWOW64\Nklaipbj.exeC:\Windows\system32\Nklaipbj.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Windows\SysWOW64\Ndiomdde.exeC:\Windows\system32\Ndiomdde.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:868 -
C:\Windows\SysWOW64\Opblgehg.exeC:\Windows\system32\Opblgehg.exe7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2148 -s 1408⤵
- Loads dropped DLL
- Program crash
PID:2084
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
446KB
MD5ec607ff2dffa22ec6a987d94f43e9251
SHA14baa948cae39654f86f9f7bd4f90996b6a7eae8f
SHA2568ab613140a08094fea8bdebebefce44c5ce0045fb6a6740fe57e55994eaf42a0
SHA512152c9571b8a9654ca1bb42957be7beb9e380dbbdc6eeb61fb39db5b02dfb1908ade6b038a69135bbd43659d163f930d25d34d34af9c8a7fb3a9da0f23083255c
-
Filesize
446KB
MD5fab7f9ec876f02f8f1f632148b7926c1
SHA1528b26ff2724d82704618c1050399b1b5540ccfa
SHA256d855bf4f369624910f97c9af7939670264111869e98e09d235378452f9843e56
SHA51295477e0b2fed075c5fbad2896f0c360cb74d11375bfc826c6e2ee52de3839526af7978d798695707b5f3d282754078b51a5fb851b40d8d964355da14cadc13b1
-
Filesize
446KB
MD534d52043b039b5cff9db30041b9e8497
SHA13b0c57d020beb3ca7d41afb9d42d406079e56c66
SHA256db2585e37f514bc4958c3a91ab0cab8f1cf8d46d12e58801c8adfcbd342065de
SHA51229607a651512346ee8ada8592a9da90f901c04f2d7ce104bc22e5b9f126cc1dd910e75550b0a26db77b12cb2ecd950496199b4760b3a5d1b38bd3b6b341b678c
-
Filesize
446KB
MD5b8049b799b5d3d26e497152d072024bf
SHA199c590372635ab0936f9a27c4b2d2f24e160f82b
SHA256bf31469b3ff619158f7d02d9e47fb78d82017799a27f392a56eb266c28cb4763
SHA512c8dc74c13acf03ea5f476e0a540a1035e8b68175288c46a86235c22ec7edcca56d0760f8ccd30ebb637c73f54c08d0dec249d470def194de69bea3aa2eab7d32
-
Filesize
446KB
MD5944ad7eefc072ef3360fb72f0dbf8d56
SHA1513860cca42c74ab07fca5e1c75d083515bc33b8
SHA2562a2431414fe35e4cb1a7edfb80865c1e6ed3c2652d61035421a0441c0db66376
SHA51237ff1887e5d303e251ba51b0850ece90d1ff4ee35ba91a15d3ac7671c87987e9328b700d6531d57ab4a12fcfd3e311c2bcf174e450c2e274ba8fde1671b1ac60
-
Filesize
446KB
MD5951e266785082f554603faeea3ebac07
SHA1e400b8be0a52e317cc15f3b5bc0d2324b20ee1e5
SHA256e2f7f23a4a5b491b97617bd434bc95297ae9d295365f38bf91e10a55cb14b1d0
SHA512c336ffa4750aa70523f9611720c7960f57d6b210d18691a5f8bfcb217169c7ad2acfce8b2977c62ded98b422b2d8aece1a5aba9181b7e439785c081aa88c943f