Analysis
-
max time kernel
141s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
28-08-2024 23:31
Static task
static1
Behavioral task
behavioral1
Sample
77e87ed84ce81f7f48cc2036f5432f32e7e855879d05a0c4e9e4d54c562aed9d.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
77e87ed84ce81f7f48cc2036f5432f32e7e855879d05a0c4e9e4d54c562aed9d.exe
Resource
win10v2004-20240802-en
General
-
Target
77e87ed84ce81f7f48cc2036f5432f32e7e855879d05a0c4e9e4d54c562aed9d.exe
-
Size
148KB
-
MD5
0a5d924669963971925563ca25e5f09c
-
SHA1
aa94bf12f687f9dbb08b327935d041d328637bf4
-
SHA256
77e87ed84ce81f7f48cc2036f5432f32e7e855879d05a0c4e9e4d54c562aed9d
-
SHA512
bfe6fa6cd51dfaf17e267bac92a1f9461410564692462671ca3813c52681f94a0a5209d500a92a4bbb1312e15ce06ec449144f7937dddae6e9595c7a5155d296
-
SSDEEP
3072:Ul8EsEohQuY5OdzOdjKtlDoNQQ9wlHOdj+UCRQKOdj+U:UlEThQuKOdzOdkOdezOd
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" 77e87ed84ce81f7f48cc2036f5432f32e7e855879d05a0c4e9e4d54c562aed9d.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kbmome32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Koflgf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kageia32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lidgcclp.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Llepen32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Llepen32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 77e87ed84ce81f7f48cc2036f5432f32e7e855879d05a0c4e9e4d54c562aed9d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kbmome32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Koflgf32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kageia32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lidgcclp.exe -
Executes dropped EXE 6 IoCs
pid Process 3020 Kbmome32.exe 3048 Koflgf32.exe 2708 Kageia32.exe 2732 Lidgcclp.exe 2056 Llepen32.exe 2548 Lepaccmo.exe -
Loads dropped DLL 16 IoCs
pid Process 2356 77e87ed84ce81f7f48cc2036f5432f32e7e855879d05a0c4e9e4d54c562aed9d.exe 2356 77e87ed84ce81f7f48cc2036f5432f32e7e855879d05a0c4e9e4d54c562aed9d.exe 3020 Kbmome32.exe 3020 Kbmome32.exe 3048 Koflgf32.exe 3048 Koflgf32.exe 2708 Kageia32.exe 2708 Kageia32.exe 2732 Lidgcclp.exe 2732 Lidgcclp.exe 2056 Llepen32.exe 2056 Llepen32.exe 2536 WerFault.exe 2536 WerFault.exe 2536 WerFault.exe 2536 WerFault.exe -
Drops file in System32 directory 18 IoCs
description ioc Process File created C:\Windows\SysWOW64\Mkehop32.dll 77e87ed84ce81f7f48cc2036f5432f32e7e855879d05a0c4e9e4d54c562aed9d.exe File created C:\Windows\SysWOW64\Mcbniafn.dll Lidgcclp.exe File opened for modification C:\Windows\SysWOW64\Llepen32.exe Lidgcclp.exe File created C:\Windows\SysWOW64\Oldhgaef.dll Llepen32.exe File opened for modification C:\Windows\SysWOW64\Kbmome32.exe 77e87ed84ce81f7f48cc2036f5432f32e7e855879d05a0c4e9e4d54c562aed9d.exe File created C:\Windows\SysWOW64\Pehbqi32.dll Kbmome32.exe File created C:\Windows\SysWOW64\Lidgcclp.exe Kageia32.exe File opened for modification C:\Windows\SysWOW64\Lidgcclp.exe Kageia32.exe File created C:\Windows\SysWOW64\Dneoankp.dll Kageia32.exe File created C:\Windows\SysWOW64\Llepen32.exe Lidgcclp.exe File created C:\Windows\SysWOW64\Lepaccmo.exe Llepen32.exe File created C:\Windows\SysWOW64\Kbmome32.exe 77e87ed84ce81f7f48cc2036f5432f32e7e855879d05a0c4e9e4d54c562aed9d.exe File created C:\Windows\SysWOW64\Kageia32.exe Koflgf32.exe File created C:\Windows\SysWOW64\Jlflfm32.dll Koflgf32.exe File opened for modification C:\Windows\SysWOW64\Lepaccmo.exe Llepen32.exe File created C:\Windows\SysWOW64\Koflgf32.exe Kbmome32.exe File opened for modification C:\Windows\SysWOW64\Koflgf32.exe Kbmome32.exe File opened for modification C:\Windows\SysWOW64\Kageia32.exe Koflgf32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2536 2548 WerFault.exe 35 -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kbmome32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Koflgf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kageia32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lidgcclp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Llepen32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lepaccmo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 77e87ed84ce81f7f48cc2036f5432f32e7e855879d05a0c4e9e4d54c562aed9d.exe -
Modifies registry class 21 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID 77e87ed84ce81f7f48cc2036f5432f32e7e855879d05a0c4e9e4d54c562aed9d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Koflgf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lidgcclp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mcbniafn.dll" Lidgcclp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oldhgaef.dll" Llepen32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Llepen32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 77e87ed84ce81f7f48cc2036f5432f32e7e855879d05a0c4e9e4d54c562aed9d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pehbqi32.dll" Kbmome32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jlflfm32.dll" Koflgf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kageia32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lidgcclp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node 77e87ed84ce81f7f48cc2036f5432f32e7e855879d05a0c4e9e4d54c562aed9d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} 77e87ed84ce81f7f48cc2036f5432f32e7e855879d05a0c4e9e4d54c562aed9d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mkehop32.dll" 77e87ed84ce81f7f48cc2036f5432f32e7e855879d05a0c4e9e4d54c562aed9d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kbmome32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kbmome32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dneoankp.dll" Kageia32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kageia32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" 77e87ed84ce81f7f48cc2036f5432f32e7e855879d05a0c4e9e4d54c562aed9d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Koflgf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Llepen32.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2356 wrote to memory of 3020 2356 77e87ed84ce81f7f48cc2036f5432f32e7e855879d05a0c4e9e4d54c562aed9d.exe 30 PID 2356 wrote to memory of 3020 2356 77e87ed84ce81f7f48cc2036f5432f32e7e855879d05a0c4e9e4d54c562aed9d.exe 30 PID 2356 wrote to memory of 3020 2356 77e87ed84ce81f7f48cc2036f5432f32e7e855879d05a0c4e9e4d54c562aed9d.exe 30 PID 2356 wrote to memory of 3020 2356 77e87ed84ce81f7f48cc2036f5432f32e7e855879d05a0c4e9e4d54c562aed9d.exe 30 PID 3020 wrote to memory of 3048 3020 Kbmome32.exe 31 PID 3020 wrote to memory of 3048 3020 Kbmome32.exe 31 PID 3020 wrote to memory of 3048 3020 Kbmome32.exe 31 PID 3020 wrote to memory of 3048 3020 Kbmome32.exe 31 PID 3048 wrote to memory of 2708 3048 Koflgf32.exe 32 PID 3048 wrote to memory of 2708 3048 Koflgf32.exe 32 PID 3048 wrote to memory of 2708 3048 Koflgf32.exe 32 PID 3048 wrote to memory of 2708 3048 Koflgf32.exe 32 PID 2708 wrote to memory of 2732 2708 Kageia32.exe 33 PID 2708 wrote to memory of 2732 2708 Kageia32.exe 33 PID 2708 wrote to memory of 2732 2708 Kageia32.exe 33 PID 2708 wrote to memory of 2732 2708 Kageia32.exe 33 PID 2732 wrote to memory of 2056 2732 Lidgcclp.exe 34 PID 2732 wrote to memory of 2056 2732 Lidgcclp.exe 34 PID 2732 wrote to memory of 2056 2732 Lidgcclp.exe 34 PID 2732 wrote to memory of 2056 2732 Lidgcclp.exe 34 PID 2056 wrote to memory of 2548 2056 Llepen32.exe 35 PID 2056 wrote to memory of 2548 2056 Llepen32.exe 35 PID 2056 wrote to memory of 2548 2056 Llepen32.exe 35 PID 2056 wrote to memory of 2548 2056 Llepen32.exe 35 PID 2548 wrote to memory of 2536 2548 Lepaccmo.exe 36 PID 2548 wrote to memory of 2536 2548 Lepaccmo.exe 36 PID 2548 wrote to memory of 2536 2548 Lepaccmo.exe 36 PID 2548 wrote to memory of 2536 2548 Lepaccmo.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\77e87ed84ce81f7f48cc2036f5432f32e7e855879d05a0c4e9e4d54c562aed9d.exe"C:\Users\Admin\AppData\Local\Temp\77e87ed84ce81f7f48cc2036f5432f32e7e855879d05a0c4e9e4d54c562aed9d.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\SysWOW64\Kbmome32.exeC:\Windows\system32\Kbmome32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\SysWOW64\Koflgf32.exeC:\Windows\system32\Koflgf32.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Windows\SysWOW64\Kageia32.exeC:\Windows\system32\Kageia32.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\SysWOW64\Lidgcclp.exeC:\Windows\system32\Lidgcclp.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\SysWOW64\Llepen32.exeC:\Windows\system32\Llepen32.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\SysWOW64\Lepaccmo.exeC:\Windows\system32\Lepaccmo.exe7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2548 -s 1408⤵
- Loads dropped DLL
- Program crash
PID:2536
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
148KB
MD5b2f5158b89d388ea2324f13c10dbd355
SHA1deb4a4e6db8065a85ff5fb16d47cecd6352de14d
SHA256546a09c8fee7b33b43cd61adfcac075ba355c0f9aca35c540a5edd36d598ad20
SHA51220195d645e141060586c953a1d79f9ddfb1173646c96b8f6e28ded94ff7127474c5b0b7b467ab90787b4089083b945b794ce401c2ffec84791e603db2bc1cd9a
-
Filesize
148KB
MD5fe28be2d4c66e697b7e74e5f82ff858f
SHA1010ee0686c4a2912d4297b640e82148e23958185
SHA256bc41dea0297612f5e2677e01d0e0920e022be7276f28137ee829993788f6091c
SHA512f40663cec18472128f8fe1e654173dc225a5f9c56c464e21b3095829b96ab7199ac835accc8e2188e63c0f2f33342dc74a5c876acd4e31e852908ad64bcbfa7a
-
Filesize
148KB
MD54f814d60cfa0fda3a78c5e4141dd5ff2
SHA1dc5e4cf402d87fdab44faf5ed500bdc29a10e605
SHA2562488a6f964b20f8b3b36c00de9c6d608f54f8a651f602115baac127a1b4b19e4
SHA5121d0675c23c02aa8d61453517ca57dc642c8c18601ab1b0cdb9941651cd16d5eb04a312aca5cb10d2595c57d3456e29285f6c266a11fdae7d6ac922e61d097d4f
-
Filesize
148KB
MD5b2169435ccba957bff2a5d7f05480389
SHA11388f16f670be19f069389c2df97b3c50739ace8
SHA25617b357c638430ca48d0652b7e3e1727262d92232b01860efe24a5aaf47a98cb4
SHA512da9cc7494a388cf4cb96b6f4fd010ff0d575681654c9cb354a214377913818683f475f236c847a9ab253b72e414ffa0a1ae8ff56da03ef7ca98dad853ccbd9a5
-
Filesize
148KB
MD5a913c8406fe174d654fefe9d4b8eeb8b
SHA18dba8bfe8c9e7cc33a82fc9cf59d5766fdf14d3c
SHA256b741a936067c580a3570151995b1726dd48cd0ad9b3436f2aef1641f2a34d66b
SHA512202571408fd6457b46f0faef4dc54663b0593fd0da3caaf4e73f64ebdc6873092463f0e02b540169bc7a7298ce1b790a2bccdfd5cfed08b864936f5862be58d3
-
Filesize
148KB
MD565a906bb6d4fdb83814ae8a2c7663993
SHA16d88d30dc72d4d2bd47751df8985ed68d579f167
SHA256de5ea1627f49bad0ba55a5a966ba7f2f8d93596d1a7dc29080525836eb3f68fc
SHA51269d3476664c2a49151415bcc831bd15c037f3f72ad876c81eefbfe85ca8fa14f06dae2d07a08a86b1bb42d224a75aa18dbd07870088ed3f562a26018c971631b