Analysis
-
max time kernel
111s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
25/08/2024, 21:14
Static task
static1
Behavioral task
behavioral1
Sample
828fe4632d9831410ee2c29dd22add80N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
828fe4632d9831410ee2c29dd22add80N.exe
Resource
win10v2004-20240802-en
General
-
Target
828fe4632d9831410ee2c29dd22add80N.exe
-
Size
64KB
-
MD5
828fe4632d9831410ee2c29dd22add80
-
SHA1
b8e97c3e9940be7ec8cb90689296db9f9f9bbfb6
-
SHA256
86d297c4bbbdf708d68591591f77bf08c454d1380c3d1f90c471c8c9a14d25e0
-
SHA512
8c615b3afa9aa2f6b25f4d4c8aa0551caa290b07e48025ecb75e3b8cc30e4d183df19132f3b3e0de43ee03596f331146fb6e3b31156f43ff8458a61497d1d39e
-
SSDEEP
1536:RTi2Iyt0UJyuk9XW8nzcpm/q2LrsBMu/H1:RTAJu6FW8zcpm/3raN
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fidoim32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Eqijej32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ebjglbml.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fidoim32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ecejkf32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Efcfga32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Efcfga32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eqijej32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ebjglbml.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 828fe4632d9831410ee2c29dd22add80N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" 828fe4632d9831410ee2c29dd22add80N.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ecejkf32.exe -
Executes dropped EXE 6 IoCs
pid Process 2656 Ecejkf32.exe 2904 Efcfga32.exe 2404 Eqijej32.exe 2596 Ebjglbml.exe 2672 Fidoim32.exe 1160 Fkckeh32.exe -
Loads dropped DLL 16 IoCs
pid Process 2252 828fe4632d9831410ee2c29dd22add80N.exe 2252 828fe4632d9831410ee2c29dd22add80N.exe 2656 Ecejkf32.exe 2656 Ecejkf32.exe 2904 Efcfga32.exe 2904 Efcfga32.exe 2404 Eqijej32.exe 2404 Eqijej32.exe 2596 Ebjglbml.exe 2596 Ebjglbml.exe 2672 Fidoim32.exe 2672 Fidoim32.exe 816 WerFault.exe 816 WerFault.exe 816 WerFault.exe 816 WerFault.exe -
Drops file in System32 directory 18 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Ecejkf32.exe 828fe4632d9831410ee2c29dd22add80N.exe File created C:\Windows\SysWOW64\Bdacap32.dll 828fe4632d9831410ee2c29dd22add80N.exe File opened for modification C:\Windows\SysWOW64\Efcfga32.exe Ecejkf32.exe File created C:\Windows\SysWOW64\Eqijej32.exe Efcfga32.exe File created C:\Windows\SysWOW64\Clkmne32.dll Fidoim32.exe File created C:\Windows\SysWOW64\Ecejkf32.exe 828fe4632d9831410ee2c29dd22add80N.exe File created C:\Windows\SysWOW64\Fidoim32.exe Ebjglbml.exe File opened for modification C:\Windows\SysWOW64\Fidoim32.exe Ebjglbml.exe File opened for modification C:\Windows\SysWOW64\Fkckeh32.exe Fidoim32.exe File created C:\Windows\SysWOW64\Efcfga32.exe Ecejkf32.exe File opened for modification C:\Windows\SysWOW64\Ebjglbml.exe Eqijej32.exe File created C:\Windows\SysWOW64\Khknah32.dll Ebjglbml.exe File created C:\Windows\SysWOW64\Klmkof32.dll Efcfga32.exe File opened for modification C:\Windows\SysWOW64\Eqijej32.exe Efcfga32.exe File created C:\Windows\SysWOW64\Ebjglbml.exe Eqijej32.exe File created C:\Windows\SysWOW64\Dmkmmi32.dll Eqijej32.exe File created C:\Windows\SysWOW64\Fkckeh32.exe Fidoim32.exe File created C:\Windows\SysWOW64\Fdilpjih.dll Ecejkf32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 816 1160 WerFault.exe 35 -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ebjglbml.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fidoim32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fkckeh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 828fe4632d9831410ee2c29dd22add80N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ecejkf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Efcfga32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Eqijej32.exe -
Modifies registry class 21 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ecejkf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Khknah32.dll" Ebjglbml.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ebjglbml.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fidoim32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 828fe4632d9831410ee2c29dd22add80N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node 828fe4632d9831410ee2c29dd22add80N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fdilpjih.dll" Ecejkf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Eqijej32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bdacap32.dll" 828fe4632d9831410ee2c29dd22add80N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Efcfga32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Klmkof32.dll" Efcfga32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dmkmmi32.dll" Eqijej32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Eqijej32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ebjglbml.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID 828fe4632d9831410ee2c29dd22add80N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} 828fe4632d9831410ee2c29dd22add80N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Efcfga32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fidoim32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Clkmne32.dll" Fidoim32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" 828fe4632d9831410ee2c29dd22add80N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ecejkf32.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2252 wrote to memory of 2656 2252 828fe4632d9831410ee2c29dd22add80N.exe 30 PID 2252 wrote to memory of 2656 2252 828fe4632d9831410ee2c29dd22add80N.exe 30 PID 2252 wrote to memory of 2656 2252 828fe4632d9831410ee2c29dd22add80N.exe 30 PID 2252 wrote to memory of 2656 2252 828fe4632d9831410ee2c29dd22add80N.exe 30 PID 2656 wrote to memory of 2904 2656 Ecejkf32.exe 31 PID 2656 wrote to memory of 2904 2656 Ecejkf32.exe 31 PID 2656 wrote to memory of 2904 2656 Ecejkf32.exe 31 PID 2656 wrote to memory of 2904 2656 Ecejkf32.exe 31 PID 2904 wrote to memory of 2404 2904 Efcfga32.exe 32 PID 2904 wrote to memory of 2404 2904 Efcfga32.exe 32 PID 2904 wrote to memory of 2404 2904 Efcfga32.exe 32 PID 2904 wrote to memory of 2404 2904 Efcfga32.exe 32 PID 2404 wrote to memory of 2596 2404 Eqijej32.exe 33 PID 2404 wrote to memory of 2596 2404 Eqijej32.exe 33 PID 2404 wrote to memory of 2596 2404 Eqijej32.exe 33 PID 2404 wrote to memory of 2596 2404 Eqijej32.exe 33 PID 2596 wrote to memory of 2672 2596 Ebjglbml.exe 34 PID 2596 wrote to memory of 2672 2596 Ebjglbml.exe 34 PID 2596 wrote to memory of 2672 2596 Ebjglbml.exe 34 PID 2596 wrote to memory of 2672 2596 Ebjglbml.exe 34 PID 2672 wrote to memory of 1160 2672 Fidoim32.exe 35 PID 2672 wrote to memory of 1160 2672 Fidoim32.exe 35 PID 2672 wrote to memory of 1160 2672 Fidoim32.exe 35 PID 2672 wrote to memory of 1160 2672 Fidoim32.exe 35 PID 1160 wrote to memory of 816 1160 Fkckeh32.exe 36 PID 1160 wrote to memory of 816 1160 Fkckeh32.exe 36 PID 1160 wrote to memory of 816 1160 Fkckeh32.exe 36 PID 1160 wrote to memory of 816 1160 Fkckeh32.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\828fe4632d9831410ee2c29dd22add80N.exe"C:\Users\Admin\AppData\Local\Temp\828fe4632d9831410ee2c29dd22add80N.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Windows\SysWOW64\Ecejkf32.exeC:\Windows\system32\Ecejkf32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\SysWOW64\Efcfga32.exeC:\Windows\system32\Efcfga32.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\SysWOW64\Eqijej32.exeC:\Windows\system32\Eqijej32.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Windows\SysWOW64\Ebjglbml.exeC:\Windows\system32\Ebjglbml.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\SysWOW64\Fidoim32.exeC:\Windows\system32\Fidoim32.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\SysWOW64\Fkckeh32.exeC:\Windows\system32\Fkckeh32.exe7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1160 -s 1408⤵
- Loads dropped DLL
- Program crash
PID:816
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5932a054e9b017d54d114c0bc1a19bcea
SHA19e71144b3d15e25c3d1aa730c81ee1b759a3b440
SHA256c07b16105f61a598a1d5d77f2664f0c34d4f9a49e4733c1a1bb5647d9b331cda
SHA512d31552a292be1d98a14bac6ed5ffdaa6051a4dc19a34e497edf39b4693fccc6fff60890967a644654485300e8974d6294ad66c4b890c9e4c45f5d55627dc40fb
-
Filesize
64KB
MD503b37e544d22d6eae960de281e0695fc
SHA197e745ba02765d3dd98f8a4750a9db78dc57c617
SHA2561ef0e6e63613db2374fc6f08794506002d1093e1d34c1e17d0f66c4af3438d64
SHA5123423968b6e963fd7a046c08cb39aaec19a0219cfcc8ace83e09676edf7e29e70bbb7a95c32a203db7722099d014815b75a529a57b93dc2fde8e6ebdf050766e3
-
Filesize
64KB
MD55900a30caac6e94d8df5d15fb8f3b6cb
SHA110235ee493ea90b783db4cceefe62cd750032a93
SHA25620daf837643c59c1f684113465dd118bc2fedd57b51ad1394cc8e3d733d187d4
SHA5128e20624fbc0b781b8b15986e9d3dfc00115ceae71cd8db709422f3a3f8258a9ebac0c3994f69e084b94a44985dfd6eef4852ac42a4bc2a497c46a0d810d3c3f4
-
Filesize
64KB
MD5671311494eb199d4a0a61cebaaf4b22e
SHA14fae215452ea2839d34bd38d24a3f90f060f3df9
SHA256e17d74ebe8f533ee4dfb396fd29da33273535c8ac5b46870798633fdc9318b2f
SHA51234178f016487c06fcd363b7465228c17bc12b4f5f64243e06271c6f3027701e9430e4ae5472b252094dadde97f8dcab712dfaddd47cbc7f2f55e739e847be211
-
Filesize
64KB
MD538eff66ef8c90f77ea0438e57fe0d2e3
SHA1821fcecd5d4a7360148f87ff93b08245dd9bdb2e
SHA25672ab548ac6b1944999bbb8c47d6d9b1ac075100771ac000aa8020f3b6adb57b8
SHA5121e15bc6038079e429d9a9e8a57756a029cde0e759653adaff173f1cca752af70c4d1aa6fec5cbb1aa8ebfb2130d2e8c6dd84477ff789f06b180513c70373bde6
-
Filesize
64KB
MD5ded9002d82c28d0a41b41d16482f2389
SHA1fa23625075248181021ed1025020f9f6daef54af
SHA256e7915750a14fd1e56b55d80161f3e1e48063c60694f2d8b1edef2c092dda6430
SHA51248e7c5ac8743cdc08c07e1f097c81edd800f0a29b0efd17adf275be9ccc8fabb2cf0fd869f0d8604f7c125484640bff76819edf67802644b64efbea31da4039e