Analysis
-
max time kernel
95s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01-09-2024 22:11
Static task
static1
Behavioral task
behavioral1
Sample
244e0c2ad572ccf4ac5d1f5d493774f0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
244e0c2ad572ccf4ac5d1f5d493774f0N.exe
Resource
win10v2004-20240802-en
General
-
Target
244e0c2ad572ccf4ac5d1f5d493774f0N.exe
-
Size
96KB
-
MD5
244e0c2ad572ccf4ac5d1f5d493774f0
-
SHA1
c4f4f8a20d54378dc147f4eb08e1f7b8a9eeb880
-
SHA256
bb768b3a30a17ffcc282d79dd0f0f959b40a2ce229904a405491752639885980
-
SHA512
e52feac7b22e42619a7ac6dd71bdc9685575b969ecd6f8abb5a506f4b01bbce8c87e7e2d49fdc542ff7ecd7a15815b611b5f6d5b4741043b115700c3ba5996e9
-
SSDEEP
1536:EneBkXiNUPWSFEmy9f8QgNYfNjtP3OQqz2LlsBMu/HCmiDcg3MZRP3cEW3AE:EneBYPDFowWfjP+Q9la6miEo
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 244e0c2ad572ccf4ac5d1f5d493774f0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" 244e0c2ad572ccf4ac5d1f5d493774f0N.exe -
Executes dropped EXE 1 IoCs
pid Process 3396 Dmllipeg.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Dmllipeg.exe 244e0c2ad572ccf4ac5d1f5d493774f0N.exe File created C:\Windows\SysWOW64\Kngpec32.dll 244e0c2ad572ccf4ac5d1f5d493774f0N.exe File created C:\Windows\SysWOW64\Dmllipeg.exe 244e0c2ad572ccf4ac5d1f5d493774f0N.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2484 3396 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 244e0c2ad572ccf4ac5d1f5d493774f0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dmllipeg.exe -
Modifies registry class 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 244e0c2ad572ccf4ac5d1f5d493774f0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node 244e0c2ad572ccf4ac5d1f5d493774f0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID 244e0c2ad572ccf4ac5d1f5d493774f0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} 244e0c2ad572ccf4ac5d1f5d493774f0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kngpec32.dll" 244e0c2ad572ccf4ac5d1f5d493774f0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" 244e0c2ad572ccf4ac5d1f5d493774f0N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1856 wrote to memory of 3396 1856 244e0c2ad572ccf4ac5d1f5d493774f0N.exe 85 PID 1856 wrote to memory of 3396 1856 244e0c2ad572ccf4ac5d1f5d493774f0N.exe 85 PID 1856 wrote to memory of 3396 1856 244e0c2ad572ccf4ac5d1f5d493774f0N.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\244e0c2ad572ccf4ac5d1f5d493774f0N.exe"C:\Users\Admin\AppData\Local\Temp\244e0c2ad572ccf4ac5d1f5d493774f0N.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Windows\SysWOW64\Dmllipeg.exeC:\Windows\system32\Dmllipeg.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3396 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3396 -s 4043⤵
- Program crash
PID:2484
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3396 -ip 33961⤵PID:1984
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD51b9fc6bc127313ca58e413629843b4f4
SHA102ff930e0b2250ccbde7938a8c8d1fa3a0234864
SHA256f5fb5ee8bf7b1df5131978f5933eb9a7fb99577a49c7d9ded0cfac757906cca1
SHA512818787ba3c925ce16233d85afe800e6a3bc53a4b8f7a3b41a5a9f54bb7a1a6fb4e1655c978248418a5e150cfb0f67fb98f43b2e25fcde1d322d7bc215f15f5d8