Analysis
-
max time kernel
97s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03/09/2024, 02:02
Static task
static1
Behavioral task
behavioral1
Sample
e10ae04f8762fce8b2b04fe66bf59690N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
e10ae04f8762fce8b2b04fe66bf59690N.exe
Resource
win10v2004-20240802-en
General
-
Target
e10ae04f8762fce8b2b04fe66bf59690N.exe
-
Size
96KB
-
MD5
e10ae04f8762fce8b2b04fe66bf59690
-
SHA1
1cba63f63e0aef12c23074efed9365c84d65919b
-
SHA256
3c260ee8b1f29cedbb6891687f8601d8a506419964e19bfd8c3763c1d0d9761d
-
SHA512
3cf189ca7542a85461ea193dcf831cc0fcb5869f8515d036c41e16ed5173384bb5cbb67b8cbda7d40779d2204dfadab0255bb12928102a16c8f8b52c3de592b1
-
SSDEEP
1536:RgA3c2RCQ6l9HfJ2uItcmb2LR7RZObZUUWaegPYA:2F9hAcpRClUUWae
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" e10ae04f8762fce8b2b04fe66bf59690N.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad e10ae04f8762fce8b2b04fe66bf59690N.exe -
Executes dropped EXE 1 IoCs
pid Process 1700 Dmllipeg.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\Dmllipeg.exe e10ae04f8762fce8b2b04fe66bf59690N.exe File opened for modification C:\Windows\SysWOW64\Dmllipeg.exe e10ae04f8762fce8b2b04fe66bf59690N.exe File created C:\Windows\SysWOW64\Kngpec32.dll e10ae04f8762fce8b2b04fe66bf59690N.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 820 1700 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e10ae04f8762fce8b2b04fe66bf59690N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dmllipeg.exe -
Modifies registry class 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID e10ae04f8762fce8b2b04fe66bf59690N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} e10ae04f8762fce8b2b04fe66bf59690N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kngpec32.dll" e10ae04f8762fce8b2b04fe66bf59690N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" e10ae04f8762fce8b2b04fe66bf59690N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 e10ae04f8762fce8b2b04fe66bf59690N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node e10ae04f8762fce8b2b04fe66bf59690N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3216 wrote to memory of 1700 3216 e10ae04f8762fce8b2b04fe66bf59690N.exe 83 PID 3216 wrote to memory of 1700 3216 e10ae04f8762fce8b2b04fe66bf59690N.exe 83 PID 3216 wrote to memory of 1700 3216 e10ae04f8762fce8b2b04fe66bf59690N.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\e10ae04f8762fce8b2b04fe66bf59690N.exe"C:\Users\Admin\AppData\Local\Temp\e10ae04f8762fce8b2b04fe66bf59690N.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3216 -
C:\Windows\SysWOW64\Dmllipeg.exeC:\Windows\system32\Dmllipeg.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1700 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1700 -s 4043⤵
- Program crash
PID:820
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1700 -ip 17001⤵PID:1984
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD54e470a37701fc053a7ff4ddb7e587a80
SHA13a6e47321682d11c85ddc838b2908301f23f16cb
SHA2565ac454cfefeb72e57cef44ed2539913a970282c97355f8abe48e064a38c384eb
SHA51284ccfbf79a8d92c894451bb07acc3c63820f3de98f9cc55e0a45078a6d19b346d69187a4d41e155240ab4bfe51f3030dd33b1230b8a9d5f5e1c0c70f2d06c2d0