Analysis

  • max time kernel
    141s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    28-08-2024 23:31

General

  • Target

    77e87ed84ce81f7f48cc2036f5432f32e7e855879d05a0c4e9e4d54c562aed9d.exe

  • Size

    148KB

  • MD5

    0a5d924669963971925563ca25e5f09c

  • SHA1

    aa94bf12f687f9dbb08b327935d041d328637bf4

  • SHA256

    77e87ed84ce81f7f48cc2036f5432f32e7e855879d05a0c4e9e4d54c562aed9d

  • SHA512

    bfe6fa6cd51dfaf17e267bac92a1f9461410564692462671ca3813c52681f94a0a5209d500a92a4bbb1312e15ce06ec449144f7937dddae6e9595c7a5155d296

  • SSDEEP

    3072:Ul8EsEohQuY5OdzOdjKtlDoNQQ9wlHOdj+UCRQKOdj+U:UlEThQuKOdzOdkOdezOd

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 12 IoCs
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 16 IoCs
  • Drops file in System32 directory 18 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 21 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\77e87ed84ce81f7f48cc2036f5432f32e7e855879d05a0c4e9e4d54c562aed9d.exe
    "C:\Users\Admin\AppData\Local\Temp\77e87ed84ce81f7f48cc2036f5432f32e7e855879d05a0c4e9e4d54c562aed9d.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2356
    • C:\Windows\SysWOW64\Kbmome32.exe
      C:\Windows\system32\Kbmome32.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:3020
      • C:\Windows\SysWOW64\Koflgf32.exe
        C:\Windows\system32\Koflgf32.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:3048
        • C:\Windows\SysWOW64\Kageia32.exe
          C:\Windows\system32\Kageia32.exe
          4⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:2708
          • C:\Windows\SysWOW64\Lidgcclp.exe
            C:\Windows\system32\Lidgcclp.exe
            5⤵
            • Adds autorun key to be loaded by Explorer.exe on startup
            • Executes dropped EXE
            • Loads dropped DLL
            • Drops file in System32 directory
            • System Location Discovery: System Language Discovery
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:2732
            • C:\Windows\SysWOW64\Llepen32.exe
              C:\Windows\system32\Llepen32.exe
              6⤵
              • Adds autorun key to be loaded by Explorer.exe on startup
              • Executes dropped EXE
              • Loads dropped DLL
              • Drops file in System32 directory
              • System Location Discovery: System Language Discovery
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:2056
              • C:\Windows\SysWOW64\Lepaccmo.exe
                C:\Windows\system32\Lepaccmo.exe
                7⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:2548
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2548 -s 140
                  8⤵
                  • Loads dropped DLL
                  • Program crash
                  PID:2536

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\Kageia32.exe

    Filesize

    148KB

    MD5

    b2f5158b89d388ea2324f13c10dbd355

    SHA1

    deb4a4e6db8065a85ff5fb16d47cecd6352de14d

    SHA256

    546a09c8fee7b33b43cd61adfcac075ba355c0f9aca35c540a5edd36d598ad20

    SHA512

    20195d645e141060586c953a1d79f9ddfb1173646c96b8f6e28ded94ff7127474c5b0b7b467ab90787b4089083b945b794ce401c2ffec84791e603db2bc1cd9a

  • \Windows\SysWOW64\Kbmome32.exe

    Filesize

    148KB

    MD5

    fe28be2d4c66e697b7e74e5f82ff858f

    SHA1

    010ee0686c4a2912d4297b640e82148e23958185

    SHA256

    bc41dea0297612f5e2677e01d0e0920e022be7276f28137ee829993788f6091c

    SHA512

    f40663cec18472128f8fe1e654173dc225a5f9c56c464e21b3095829b96ab7199ac835accc8e2188e63c0f2f33342dc74a5c876acd4e31e852908ad64bcbfa7a

  • \Windows\SysWOW64\Koflgf32.exe

    Filesize

    148KB

    MD5

    4f814d60cfa0fda3a78c5e4141dd5ff2

    SHA1

    dc5e4cf402d87fdab44faf5ed500bdc29a10e605

    SHA256

    2488a6f964b20f8b3b36c00de9c6d608f54f8a651f602115baac127a1b4b19e4

    SHA512

    1d0675c23c02aa8d61453517ca57dc642c8c18601ab1b0cdb9941651cd16d5eb04a312aca5cb10d2595c57d3456e29285f6c266a11fdae7d6ac922e61d097d4f

  • \Windows\SysWOW64\Lepaccmo.exe

    Filesize

    148KB

    MD5

    b2169435ccba957bff2a5d7f05480389

    SHA1

    1388f16f670be19f069389c2df97b3c50739ace8

    SHA256

    17b357c638430ca48d0652b7e3e1727262d92232b01860efe24a5aaf47a98cb4

    SHA512

    da9cc7494a388cf4cb96b6f4fd010ff0d575681654c9cb354a214377913818683f475f236c847a9ab253b72e414ffa0a1ae8ff56da03ef7ca98dad853ccbd9a5

  • \Windows\SysWOW64\Lidgcclp.exe

    Filesize

    148KB

    MD5

    a913c8406fe174d654fefe9d4b8eeb8b

    SHA1

    8dba8bfe8c9e7cc33a82fc9cf59d5766fdf14d3c

    SHA256

    b741a936067c580a3570151995b1726dd48cd0ad9b3436f2aef1641f2a34d66b

    SHA512

    202571408fd6457b46f0faef4dc54663b0593fd0da3caaf4e73f64ebdc6873092463f0e02b540169bc7a7298ce1b790a2bccdfd5cfed08b864936f5862be58d3

  • \Windows\SysWOW64\Llepen32.exe

    Filesize

    148KB

    MD5

    65a906bb6d4fdb83814ae8a2c7663993

    SHA1

    6d88d30dc72d4d2bd47751df8985ed68d579f167

    SHA256

    de5ea1627f49bad0ba55a5a966ba7f2f8d93596d1a7dc29080525836eb3f68fc

    SHA512

    69d3476664c2a49151415bcc831bd15c037f3f72ad876c81eefbfe85ca8fa14f06dae2d07a08a86b1bb42d224a75aa18dbd07870088ed3f562a26018c971631b

  • memory/2056-67-0x0000000000400000-0x0000000000450000-memory.dmp

    Filesize

    320KB

  • memory/2056-79-0x00000000005E0000-0x0000000000630000-memory.dmp

    Filesize

    320KB

  • memory/2056-115-0x0000000000400000-0x0000000000450000-memory.dmp

    Filesize

    320KB

  • memory/2356-105-0x0000000000400000-0x0000000000450000-memory.dmp

    Filesize

    320KB

  • memory/2356-11-0x0000000000220000-0x0000000000270000-memory.dmp

    Filesize

    320KB

  • memory/2356-12-0x0000000000220000-0x0000000000270000-memory.dmp

    Filesize

    320KB

  • memory/2356-0-0x0000000000400000-0x0000000000450000-memory.dmp

    Filesize

    320KB

  • memory/2548-122-0x0000000000400000-0x0000000000450000-memory.dmp

    Filesize

    320KB

  • memory/2548-81-0x0000000000400000-0x0000000000450000-memory.dmp

    Filesize

    320KB

  • memory/2708-49-0x0000000000220000-0x0000000000270000-memory.dmp

    Filesize

    320KB

  • memory/2708-111-0x0000000000400000-0x0000000000450000-memory.dmp

    Filesize

    320KB

  • memory/2708-41-0x0000000000400000-0x0000000000450000-memory.dmp

    Filesize

    320KB

  • memory/2732-113-0x0000000000400000-0x0000000000450000-memory.dmp

    Filesize

    320KB

  • memory/3020-14-0x0000000000400000-0x0000000000450000-memory.dmp

    Filesize

    320KB

  • memory/3020-107-0x0000000000400000-0x0000000000450000-memory.dmp

    Filesize

    320KB

  • memory/3020-22-0x0000000000220000-0x0000000000270000-memory.dmp

    Filesize

    320KB

  • memory/3048-109-0x0000000000400000-0x0000000000450000-memory.dmp

    Filesize

    320KB

  • memory/3048-33-0x0000000000400000-0x0000000000450000-memory.dmp

    Filesize

    320KB