Analysis

  • max time kernel
    111s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    25/08/2024, 21:14

General

  • Target

    828fe4632d9831410ee2c29dd22add80N.exe

  • Size

    64KB

  • MD5

    828fe4632d9831410ee2c29dd22add80

  • SHA1

    b8e97c3e9940be7ec8cb90689296db9f9f9bbfb6

  • SHA256

    86d297c4bbbdf708d68591591f77bf08c454d1380c3d1f90c471c8c9a14d25e0

  • SHA512

    8c615b3afa9aa2f6b25f4d4c8aa0551caa290b07e48025ecb75e3b8cc30e4d183df19132f3b3e0de43ee03596f331146fb6e3b31156f43ff8458a61497d1d39e

  • SSDEEP

    1536:RTi2Iyt0UJyuk9XW8nzcpm/q2LrsBMu/H1:RTAJu6FW8zcpm/3raN

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 12 IoCs
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 16 IoCs
  • Drops file in System32 directory 18 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 21 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\828fe4632d9831410ee2c29dd22add80N.exe
    "C:\Users\Admin\AppData\Local\Temp\828fe4632d9831410ee2c29dd22add80N.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2252
    • C:\Windows\SysWOW64\Ecejkf32.exe
      C:\Windows\system32\Ecejkf32.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2656
      • C:\Windows\SysWOW64\Efcfga32.exe
        C:\Windows\system32\Efcfga32.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2904
        • C:\Windows\SysWOW64\Eqijej32.exe
          C:\Windows\system32\Eqijej32.exe
          4⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:2404
          • C:\Windows\SysWOW64\Ebjglbml.exe
            C:\Windows\system32\Ebjglbml.exe
            5⤵
            • Adds autorun key to be loaded by Explorer.exe on startup
            • Executes dropped EXE
            • Loads dropped DLL
            • Drops file in System32 directory
            • System Location Discovery: System Language Discovery
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:2596
            • C:\Windows\SysWOW64\Fidoim32.exe
              C:\Windows\system32\Fidoim32.exe
              6⤵
              • Adds autorun key to be loaded by Explorer.exe on startup
              • Executes dropped EXE
              • Loads dropped DLL
              • Drops file in System32 directory
              • System Location Discovery: System Language Discovery
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:2672
              • C:\Windows\SysWOW64\Fkckeh32.exe
                C:\Windows\system32\Fkckeh32.exe
                7⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:1160
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 1160 -s 140
                  8⤵
                  • Loads dropped DLL
                  • Program crash
                  PID:816

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\Ebjglbml.exe

    Filesize

    64KB

    MD5

    932a054e9b017d54d114c0bc1a19bcea

    SHA1

    9e71144b3d15e25c3d1aa730c81ee1b759a3b440

    SHA256

    c07b16105f61a598a1d5d77f2664f0c34d4f9a49e4733c1a1bb5647d9b331cda

    SHA512

    d31552a292be1d98a14bac6ed5ffdaa6051a4dc19a34e497edf39b4693fccc6fff60890967a644654485300e8974d6294ad66c4b890c9e4c45f5d55627dc40fb

  • C:\Windows\SysWOW64\Efcfga32.exe

    Filesize

    64KB

    MD5

    03b37e544d22d6eae960de281e0695fc

    SHA1

    97e745ba02765d3dd98f8a4750a9db78dc57c617

    SHA256

    1ef0e6e63613db2374fc6f08794506002d1093e1d34c1e17d0f66c4af3438d64

    SHA512

    3423968b6e963fd7a046c08cb39aaec19a0219cfcc8ace83e09676edf7e29e70bbb7a95c32a203db7722099d014815b75a529a57b93dc2fde8e6ebdf050766e3

  • \Windows\SysWOW64\Ecejkf32.exe

    Filesize

    64KB

    MD5

    5900a30caac6e94d8df5d15fb8f3b6cb

    SHA1

    10235ee493ea90b783db4cceefe62cd750032a93

    SHA256

    20daf837643c59c1f684113465dd118bc2fedd57b51ad1394cc8e3d733d187d4

    SHA512

    8e20624fbc0b781b8b15986e9d3dfc00115ceae71cd8db709422f3a3f8258a9ebac0c3994f69e084b94a44985dfd6eef4852ac42a4bc2a497c46a0d810d3c3f4

  • \Windows\SysWOW64\Eqijej32.exe

    Filesize

    64KB

    MD5

    671311494eb199d4a0a61cebaaf4b22e

    SHA1

    4fae215452ea2839d34bd38d24a3f90f060f3df9

    SHA256

    e17d74ebe8f533ee4dfb396fd29da33273535c8ac5b46870798633fdc9318b2f

    SHA512

    34178f016487c06fcd363b7465228c17bc12b4f5f64243e06271c6f3027701e9430e4ae5472b252094dadde97f8dcab712dfaddd47cbc7f2f55e739e847be211

  • \Windows\SysWOW64\Fidoim32.exe

    Filesize

    64KB

    MD5

    38eff66ef8c90f77ea0438e57fe0d2e3

    SHA1

    821fcecd5d4a7360148f87ff93b08245dd9bdb2e

    SHA256

    72ab548ac6b1944999bbb8c47d6d9b1ac075100771ac000aa8020f3b6adb57b8

    SHA512

    1e15bc6038079e429d9a9e8a57756a029cde0e759653adaff173f1cca752af70c4d1aa6fec5cbb1aa8ebfb2130d2e8c6dd84477ff789f06b180513c70373bde6

  • \Windows\SysWOW64\Fkckeh32.exe

    Filesize

    64KB

    MD5

    ded9002d82c28d0a41b41d16482f2389

    SHA1

    fa23625075248181021ed1025020f9f6daef54af

    SHA256

    e7915750a14fd1e56b55d80161f3e1e48063c60694f2d8b1edef2c092dda6430

    SHA512

    48e7c5ac8743cdc08c07e1f097c81edd800f0a29b0efd17adf275be9ccc8fabb2cf0fd869f0d8604f7c125484640bff76819edf67802644b64efbea31da4039e

  • memory/1160-93-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/1160-82-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2252-0-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2252-12-0x00000000002E0000-0x0000000000313000-memory.dmp

    Filesize

    204KB

  • memory/2252-87-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2252-7-0x00000000002E0000-0x0000000000313000-memory.dmp

    Filesize

    204KB

  • memory/2404-53-0x0000000000250000-0x0000000000283000-memory.dmp

    Filesize

    204KB

  • memory/2404-90-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2596-55-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2596-63-0x0000000000250000-0x0000000000283000-memory.dmp

    Filesize

    204KB

  • memory/2596-91-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2656-26-0x00000000002F0000-0x0000000000323000-memory.dmp

    Filesize

    204KB

  • memory/2656-19-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2672-69-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2672-92-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2904-36-0x0000000000250000-0x0000000000283000-memory.dmp

    Filesize

    204KB

  • memory/2904-28-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2904-89-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB