Analysis
-
max time kernel
30s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
24-08-2024 01:13
Static task
static1
Behavioral task
behavioral1
Sample
b0e11f9a2a47fe23616303a26194fc561faee4feebf9422efe9bbf56dd79b22b.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
b0e11f9a2a47fe23616303a26194fc561faee4feebf9422efe9bbf56dd79b22b.exe
Resource
win10v2004-20240802-en
General
-
Target
b0e11f9a2a47fe23616303a26194fc561faee4feebf9422efe9bbf56dd79b22b.exe
-
Size
96KB
-
MD5
10b20493a2e1fc88062758fbc042ffbc
-
SHA1
65555e1a8378760d7051ba7df2266b7b01817447
-
SHA256
b0e11f9a2a47fe23616303a26194fc561faee4feebf9422efe9bbf56dd79b22b
-
SHA512
c95f0b6fee8fd95adfe0eab5093433b5c3da0b41a377ef4f2f15581ddcfd5f6d4727ff4549c87a98877fc56f968f0a6407868786a530b6cda63e4d266945481a
-
SSDEEP
1536:ifujY4I4da1Qtz+HaYrk5Jtk/26R/BOmsCMy0QiLiizHNQNdq:ifAY4I4IQEHM6R5OmsCMyELiAHONdq
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lcooinfc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Lcooinfc.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad b0e11f9a2a47fe23616303a26194fc561faee4feebf9422efe9bbf56dd79b22b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" b0e11f9a2a47fe23616303a26194fc561faee4feebf9422efe9bbf56dd79b22b.exe -
Executes dropped EXE 2 IoCs
pid Process 1948 Lcooinfc.exe 2320 Lfnkejeg.exe -
Loads dropped DLL 8 IoCs
pid Process 2480 b0e11f9a2a47fe23616303a26194fc561faee4feebf9422efe9bbf56dd79b22b.exe 2480 b0e11f9a2a47fe23616303a26194fc561faee4feebf9422efe9bbf56dd79b22b.exe 1948 Lcooinfc.exe 1948 Lcooinfc.exe 1068 WerFault.exe 1068 WerFault.exe 1068 WerFault.exe 1068 WerFault.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\Lcooinfc.exe b0e11f9a2a47fe23616303a26194fc561faee4feebf9422efe9bbf56dd79b22b.exe File opened for modification C:\Windows\SysWOW64\Lcooinfc.exe b0e11f9a2a47fe23616303a26194fc561faee4feebf9422efe9bbf56dd79b22b.exe File created C:\Windows\SysWOW64\Bnqnai32.dll b0e11f9a2a47fe23616303a26194fc561faee4feebf9422efe9bbf56dd79b22b.exe File created C:\Windows\SysWOW64\Lfnkejeg.exe Lcooinfc.exe File opened for modification C:\Windows\SysWOW64\Lfnkejeg.exe Lcooinfc.exe File created C:\Windows\SysWOW64\Ionahd32.dll Lcooinfc.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1068 2320 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b0e11f9a2a47fe23616303a26194fc561faee4feebf9422efe9bbf56dd79b22b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lcooinfc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lfnkejeg.exe -
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID b0e11f9a2a47fe23616303a26194fc561faee4feebf9422efe9bbf56dd79b22b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717} b0e11f9a2a47fe23616303a26194fc561faee4feebf9422efe9bbf56dd79b22b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bnqnai32.dll" b0e11f9a2a47fe23616303a26194fc561faee4feebf9422efe9bbf56dd79b22b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ionahd32.dll" Lcooinfc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Lcooinfc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node b0e11f9a2a47fe23616303a26194fc561faee4feebf9422efe9bbf56dd79b22b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" b0e11f9a2a47fe23616303a26194fc561faee4feebf9422efe9bbf56dd79b22b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Lcooinfc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 b0e11f9a2a47fe23616303a26194fc561faee4feebf9422efe9bbf56dd79b22b.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2480 wrote to memory of 1948 2480 b0e11f9a2a47fe23616303a26194fc561faee4feebf9422efe9bbf56dd79b22b.exe 29 PID 2480 wrote to memory of 1948 2480 b0e11f9a2a47fe23616303a26194fc561faee4feebf9422efe9bbf56dd79b22b.exe 29 PID 2480 wrote to memory of 1948 2480 b0e11f9a2a47fe23616303a26194fc561faee4feebf9422efe9bbf56dd79b22b.exe 29 PID 2480 wrote to memory of 1948 2480 b0e11f9a2a47fe23616303a26194fc561faee4feebf9422efe9bbf56dd79b22b.exe 29 PID 1948 wrote to memory of 2320 1948 Lcooinfc.exe 30 PID 1948 wrote to memory of 2320 1948 Lcooinfc.exe 30 PID 1948 wrote to memory of 2320 1948 Lcooinfc.exe 30 PID 1948 wrote to memory of 2320 1948 Lcooinfc.exe 30 PID 2320 wrote to memory of 1068 2320 Lfnkejeg.exe 31 PID 2320 wrote to memory of 1068 2320 Lfnkejeg.exe 31 PID 2320 wrote to memory of 1068 2320 Lfnkejeg.exe 31 PID 2320 wrote to memory of 1068 2320 Lfnkejeg.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\b0e11f9a2a47fe23616303a26194fc561faee4feebf9422efe9bbf56dd79b22b.exe"C:\Users\Admin\AppData\Local\Temp\b0e11f9a2a47fe23616303a26194fc561faee4feebf9422efe9bbf56dd79b22b.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Windows\SysWOW64\Lcooinfc.exeC:\Windows\system32\Lcooinfc.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Windows\SysWOW64\Lfnkejeg.exeC:\Windows\system32\Lfnkejeg.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2320 -s 1404⤵
- Loads dropped DLL
- Program crash
PID:1068
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5d0b93267f759f7892666dc53a2b64167
SHA13e18bc56229957561fafea17be4a965b31cd1f14
SHA256fde4094587fa1f05f25825450a2bec8cea2eb1a2bb89c616517117de4bf8d248
SHA5120374d28ec438c00b7a356c5583d51c5fb49329c461cda13ec424b76604c20fd4efe22f44b3ac6700c4d9cfbe51989404caa99094059fe4f04a20402f228ffcbe
-
Filesize
96KB
MD599cde72934def982572fb09f8f4eee01
SHA13f7034b621b77bcf168b29b249395be79b3f2018
SHA2562eab27cacad2e68bb38c25898c86f55022c4d8829fa1d4827a3e64e4519aad68
SHA512e05c4a129d4d53ba658c06797bbc9148836e5ef416e6ab5a6605905387a10e0af05f5280e2e03dd058018c54d31fd8ad1f31cc50f45287d98ec6d66a1b0c57f6