Analysis

  • max time kernel
    119s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    23-08-2024 20:29

General

  • Target

    9483da7817d7df10a624ebb1fc8fe530N.exe

  • Size

    164KB

  • MD5

    9483da7817d7df10a624ebb1fc8fe530

  • SHA1

    6173df6d54a84e17b9bcaeac977c95e0dafd8fea

  • SHA256

    93f2a69e1353a93f899e08fa496d3c0fc4e5ae38a3880b25571aa8be0d883718

  • SHA512

    222063d920d8eefa77ddd627aa361946316691d58240f3fdbee74998b4dfe2145e8b9fdf5f77f2ac2460c76c7457fa68a535c349ae66b2c88fb665879f2107b9

  • SSDEEP

    3072:p+mIPu1YyLLKG+WaZUsHq08uFafmHURHAVgnvedh6DRyU:GWey3p16q08uF8YU8gnve7GR

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 8 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 12 IoCs
  • Drops file in System32 directory 12 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 15 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9483da7817d7df10a624ebb1fc8fe530N.exe
    "C:\Users\Admin\AppData\Local\Temp\9483da7817d7df10a624ebb1fc8fe530N.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2640
    • C:\Windows\SysWOW64\Kkmmlgik.exe
      C:\Windows\system32\Kkmmlgik.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2688
      • C:\Windows\SysWOW64\Kdeaelok.exe
        C:\Windows\system32\Kdeaelok.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2652
        • C:\Windows\SysWOW64\Kbhbai32.exe
          C:\Windows\system32\Kbhbai32.exe
          4⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:3040
          • C:\Windows\SysWOW64\Lbjofi32.exe
            C:\Windows\system32\Lbjofi32.exe
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2660
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2660 -s 140
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:2576

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\Kbhbai32.exe

    Filesize

    164KB

    MD5

    f9c8859351f6a712671df1a6be3b212e

    SHA1

    a386af6596633ff1458f61262eb6bd61434ab76e

    SHA256

    f36f4ca41b0ea2ac8a71213b64f7adf74b00c238ceb5c79cb42962384d72c1c7

    SHA512

    af54c333e8d5fe24a8cd37527f980d2fb92704ecd238401ebb20948be3bbd94fe5d04fef2f4f156a1a5cbf55a7b48cec60ae8d6168fa051f63730d81f4d71eba

  • \Windows\SysWOW64\Kdeaelok.exe

    Filesize

    164KB

    MD5

    3a0e7b39c4e1870be0a4f8db576778d9

    SHA1

    c923e7f82c2dbe7060b90eb5daee400430191765

    SHA256

    f4523d95e55b4c10f22238ac2436e6cb6f04c90c58f3f4517bd5eb5f02d427a5

    SHA512

    a33dc96c034475c349d2808bdda73033e8672ca8aea74f0ec76a54dbf0ea7b0fa0d9ec521368dc1c8d81efa5eac3c6802d2856c059f27386054e319cb58645a7

  • \Windows\SysWOW64\Kkmmlgik.exe

    Filesize

    164KB

    MD5

    2166fe46d190042cd9c1de6d8e780d19

    SHA1

    9bc7f147a35fa7f08f961dd92e4ef114d89ecd86

    SHA256

    ecc197554ec749da7654e37261ab8d89c9dd37f9f5da181d9b95739a7033759d

    SHA512

    14b50222716c6d7739052dabeaab006d4164ddd04a59a5442f34096a983898e2e06a773c3622cf26d7a6ed50d466c076dc72975b54a18151c3245f6ee792aa42

  • \Windows\SysWOW64\Lbjofi32.exe

    Filesize

    164KB

    MD5

    38f3176cd0e65433c615f8f9dcc62e3b

    SHA1

    1921801c13aa86899f2abc34157ac821c488bd27

    SHA256

    737c4501a943a7cd6fa0e368d1886c06620492dd86bd5ae02bf84f79047b57a9

    SHA512

    407d4514ff806b2cbc18bee2e611a592f500f16e3b2acc92fa04cd05abb191ce63240a6f651c25ca24f2883ccf4a8c0a7acc2b6aa2ccb1124655386558f2991e

  • memory/2640-11-0x0000000000260000-0x00000000002A5000-memory.dmp

    Filesize

    276KB

  • memory/2640-61-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/2640-12-0x0000000000260000-0x00000000002A5000-memory.dmp

    Filesize

    276KB

  • memory/2640-0-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/2652-34-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/2660-56-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/2660-64-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/2688-14-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/2688-27-0x0000000000260000-0x00000000002A5000-memory.dmp

    Filesize

    276KB

  • memory/2688-28-0x0000000000260000-0x00000000002A5000-memory.dmp

    Filesize

    276KB

  • memory/2688-62-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/3040-42-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/3040-63-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/3040-49-0x0000000000290000-0x00000000002D5000-memory.dmp

    Filesize

    276KB