Analysis

  • max time kernel
    30s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    22/08/2024, 08:16

General

  • Target

    c1c984e2d804a70addd1960a82461a90N.exe

  • Size

    78KB

  • MD5

    c1c984e2d804a70addd1960a82461a90

  • SHA1

    9439344328f5c3c4072e42dab5bfe3d7864258e1

  • SHA256

    644b555ad8e3ee9a5b0d111bf704cb3f68c902c616eda6ef83bfc86369d4fbb8

  • SHA512

    3e2f5a26f1c9eadf282581607090ff81825e3ff185e3d29d8ee830d931c7e3556567f859ce118c4ef24fb7d8f6233a9fbb6666dba6391cfdb353d11bede11e25

  • SSDEEP

    1536:ROXyQ0+xQTKTrHT8BpXlYZ1MtniV3N+zL20gJi1ie:RYyQ32Azwp10qtniV3gzL20WKt

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 4 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 8 IoCs
  • Drops file in System32 directory 6 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c1c984e2d804a70addd1960a82461a90N.exe
    "C:\Users\Admin\AppData\Local\Temp\c1c984e2d804a70addd1960a82461a90N.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1368
    • C:\Windows\SysWOW64\Fbfjkj32.exe
      C:\Windows\system32\Fbfjkj32.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2224
      • C:\Windows\SysWOW64\Flnndp32.exe
        C:\Windows\system32\Flnndp32.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2732
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2732 -s 140
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:2828

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\Flnndp32.exe

    Filesize

    78KB

    MD5

    7af4345c66fca04ae4607e0123b7fa7a

    SHA1

    c639fa43f5eafd37fc400df6a7ed1183e038345f

    SHA256

    640c9cd35f7fd46102c66f434f2afa99b6dbfe84f42c0a1ef7500dd7b3b1b175

    SHA512

    45735279e1c91be4eb757a5636462ea623093248ed772af25befe23def8775552a8186514f24f77a70a227a6854cdb4e9c95e4817ca65b6a2133db6695b95f2a

  • \Windows\SysWOW64\Fbfjkj32.exe

    Filesize

    78KB

    MD5

    41be70fead5900e380ea140bf8f00e84

    SHA1

    a7f83ec5f2dec5976d6c6ff25bb7b9b033417c04

    SHA256

    ff1f2f864ff7690b3a7d6edcf74334a2103426fc57de02fe82f2eddcf08d3338

    SHA512

    d00eeb124d3845a9aed57d00d36918ebdfad0d57e4808501ff9a9489120ca91b7b0d904e39dbe3220df1cc46e9584ab685d1230ff856ee26e50601a8c52b8827

  • memory/1368-0-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/1368-13-0x00000000002F0000-0x0000000000331000-memory.dmp

    Filesize

    260KB

  • memory/1368-12-0x00000000002F0000-0x0000000000331000-memory.dmp

    Filesize

    260KB

  • memory/1368-32-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/1368-33-0x00000000002F0000-0x0000000000331000-memory.dmp

    Filesize

    260KB

  • memory/2224-19-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/2224-34-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/2732-27-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/2732-35-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB