Analysis
-
max time kernel
30s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
25-08-2024 14:03
Static task
static1
Behavioral task
behavioral1
Sample
f519abd854b81d72ccdd1530079243f0N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
f519abd854b81d72ccdd1530079243f0N.exe
Resource
win10v2004-20240802-en
General
-
Target
f519abd854b81d72ccdd1530079243f0N.exe
-
Size
368KB
-
MD5
f519abd854b81d72ccdd1530079243f0
-
SHA1
a126c87331bacbd90d14bdb888a3ac1a943ca3ef
-
SHA256
1984c5fc683d9e4d7678b6000b98a65a23d5d957232fae303a62b487b3cd9734
-
SHA512
ca62d86ff8e9ece5b56a42e16a11726b58a41d32c99287cb7f4911df6d76d0fea56f67bb1c80e3437bae2192e33ada29172463acd6dccce8f454a24197491dcd
-
SSDEEP
6144:avLLuEhi7h7DQO+zrWnAdqjeOpKfduBX2QO+zrWnAdqjsqwHlGrh/tOz:avHuEhiR/+zrWAI5KFum/+zrWAIAqWiO
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad f519abd854b81d72ccdd1530079243f0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" f519abd854b81d72ccdd1530079243f0N.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lbbodk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Lbbodk32.exe -
Executes dropped EXE 2 IoCs
pid Process 2512 Lbbodk32.exe 1460 Lfnkejeg.exe -
Loads dropped DLL 8 IoCs
pid Process 1036 f519abd854b81d72ccdd1530079243f0N.exe 1036 f519abd854b81d72ccdd1530079243f0N.exe 2512 Lbbodk32.exe 2512 Lbbodk32.exe 2636 WerFault.exe 2636 WerFault.exe 2636 WerFault.exe 2636 WerFault.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\Ionahd32.dll Lbbodk32.exe File created C:\Windows\SysWOW64\Lbbodk32.exe f519abd854b81d72ccdd1530079243f0N.exe File opened for modification C:\Windows\SysWOW64\Lbbodk32.exe f519abd854b81d72ccdd1530079243f0N.exe File created C:\Windows\SysWOW64\Dhlelc32.dll f519abd854b81d72ccdd1530079243f0N.exe File created C:\Windows\SysWOW64\Lfnkejeg.exe Lbbodk32.exe File opened for modification C:\Windows\SysWOW64\Lfnkejeg.exe Lbbodk32.exe -
Program crash 1 IoCs
pid pid_target Process 2636 1460 WerFault.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f519abd854b81d72ccdd1530079243f0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lbbodk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lfnkejeg.exe -
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node f519abd854b81d72ccdd1530079243f0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717} f519abd854b81d72ccdd1530079243f0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dhlelc32.dll" f519abd854b81d72ccdd1530079243f0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" f519abd854b81d72ccdd1530079243f0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ionahd32.dll" Lbbodk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Lbbodk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 f519abd854b81d72ccdd1530079243f0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID f519abd854b81d72ccdd1530079243f0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Lbbodk32.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1036 wrote to memory of 2512 1036 f519abd854b81d72ccdd1530079243f0N.exe 29 PID 1036 wrote to memory of 2512 1036 f519abd854b81d72ccdd1530079243f0N.exe 29 PID 1036 wrote to memory of 2512 1036 f519abd854b81d72ccdd1530079243f0N.exe 29 PID 1036 wrote to memory of 2512 1036 f519abd854b81d72ccdd1530079243f0N.exe 29 PID 2512 wrote to memory of 1460 2512 Lbbodk32.exe 30 PID 2512 wrote to memory of 1460 2512 Lbbodk32.exe 30 PID 2512 wrote to memory of 1460 2512 Lbbodk32.exe 30 PID 2512 wrote to memory of 1460 2512 Lbbodk32.exe 30 PID 1460 wrote to memory of 2636 1460 Lfnkejeg.exe 31 PID 1460 wrote to memory of 2636 1460 Lfnkejeg.exe 31 PID 1460 wrote to memory of 2636 1460 Lfnkejeg.exe 31 PID 1460 wrote to memory of 2636 1460 Lfnkejeg.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\f519abd854b81d72ccdd1530079243f0N.exe"C:\Users\Admin\AppData\Local\Temp\f519abd854b81d72ccdd1530079243f0N.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Windows\SysWOW64\Lbbodk32.exeC:\Windows\system32\Lbbodk32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Windows\SysWOW64\Lfnkejeg.exeC:\Windows\system32\Lfnkejeg.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1460 -s 1404⤵
- Loads dropped DLL
- Program crash
PID:2636
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
368KB
MD592e42910e054f7abd9536b33ab6426e4
SHA1249770944c1970f28e2af13b5e761ba0e2201da5
SHA256c5482408bbbcc1bc76da86dda53a9c0cbf7ccf7d3dec64fbc36df1e0085e8d85
SHA5125d3bde2e6b41ad3edd5779437b59118f646e9615c65d25d9fa42b0ba8cf8cb2aec18f9ee729178564d74606cc9707627acdac0f5f3d9c36030d8d2ce7e2c9033
-
Filesize
368KB
MD516b0e5503167a89cb7edf0ebaed5a5ab
SHA1d37620ac6b38d4420867a3f5ae4bf239cfbe1e94
SHA25636d389d7e8dd320363086b18e253d6140e17eb5645546a0de0363bb9f8acce62
SHA512c9a4b9d355fdf098b42c15d9efba2a6fe71219486875ea9a65a275ef9d34e3bbae44b0797010b0b72812123f7367b78e11a1b7be62d8828c3aa5024b6bed8779