Analysis

  • max time kernel
    30s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    24-08-2024 01:13

General

  • Target

    b0e11f9a2a47fe23616303a26194fc561faee4feebf9422efe9bbf56dd79b22b.exe

  • Size

    96KB

  • MD5

    10b20493a2e1fc88062758fbc042ffbc

  • SHA1

    65555e1a8378760d7051ba7df2266b7b01817447

  • SHA256

    b0e11f9a2a47fe23616303a26194fc561faee4feebf9422efe9bbf56dd79b22b

  • SHA512

    c95f0b6fee8fd95adfe0eab5093433b5c3da0b41a377ef4f2f15581ddcfd5f6d4727ff4549c87a98877fc56f968f0a6407868786a530b6cda63e4d266945481a

  • SSDEEP

    1536:ifujY4I4da1Qtz+HaYrk5Jtk/26R/BOmsCMy0QiLiizHNQNdq:ifAY4I4IQEHM6R5OmsCMyELiAHONdq

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 4 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 8 IoCs
  • Drops file in System32 directory 6 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b0e11f9a2a47fe23616303a26194fc561faee4feebf9422efe9bbf56dd79b22b.exe
    "C:\Users\Admin\AppData\Local\Temp\b0e11f9a2a47fe23616303a26194fc561faee4feebf9422efe9bbf56dd79b22b.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2480
    • C:\Windows\SysWOW64\Lcooinfc.exe
      C:\Windows\system32\Lcooinfc.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:1948
      • C:\Windows\SysWOW64\Lfnkejeg.exe
        C:\Windows\system32\Lfnkejeg.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2320
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2320 -s 140
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:1068

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\Lcooinfc.exe

    Filesize

    96KB

    MD5

    d0b93267f759f7892666dc53a2b64167

    SHA1

    3e18bc56229957561fafea17be4a965b31cd1f14

    SHA256

    fde4094587fa1f05f25825450a2bec8cea2eb1a2bb89c616517117de4bf8d248

    SHA512

    0374d28ec438c00b7a356c5583d51c5fb49329c461cda13ec424b76604c20fd4efe22f44b3ac6700c4d9cfbe51989404caa99094059fe4f04a20402f228ffcbe

  • C:\Windows\SysWOW64\Lfnkejeg.exe

    Filesize

    96KB

    MD5

    99cde72934def982572fb09f8f4eee01

    SHA1

    3f7034b621b77bcf168b29b249395be79b3f2018

    SHA256

    2eab27cacad2e68bb38c25898c86f55022c4d8829fa1d4827a3e64e4519aad68

    SHA512

    e05c4a129d4d53ba658c06797bbc9148836e5ef416e6ab5a6605905387a10e0af05f5280e2e03dd058018c54d31fd8ad1f31cc50f45287d98ec6d66a1b0c57f6

  • memory/1948-19-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/2320-27-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/2320-34-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/2480-0-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/2480-18-0x0000000000250000-0x000000000028F000-memory.dmp

    Filesize

    252KB

  • memory/2480-17-0x0000000000250000-0x000000000028F000-memory.dmp

    Filesize

    252KB

  • memory/2480-32-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/2480-33-0x0000000000250000-0x000000000028F000-memory.dmp

    Filesize

    252KB