Analysis

  • max time kernel
    82s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    06-09-2024 19:32

General

  • Target

    a30bcd45a008e2f4172f0de62d3a03c0N.exe

  • Size

    92KB

  • MD5

    a30bcd45a008e2f4172f0de62d3a03c0

  • SHA1

    d24987344d0d892522903aa9263726a602276d71

  • SHA256

    e02e0e813b6e6d24b6fd5a58ddd5537e2475e79900363618652c736180b80050

  • SHA512

    5c154e33627796eb6ecdb69f47744e564900e971ff85c46b6b407e255accd5e537964565f2e182032861b23a3c15ef7b39e4c04eb57a528eaa6f553865b40f0f

  • SSDEEP

    1536:2ML58k78N3oKufLPFnwObQrOp3V36016W5d6IuvmviqOEQnKQrUoR24HsUs:vykQN3oKSLPtwObQSB56016W5d6Iuvm9

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 14 IoCs
  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 18 IoCs
  • Drops file in System32 directory 21 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 24 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a30bcd45a008e2f4172f0de62d3a03c0N.exe
    "C:\Users\Admin\AppData\Local\Temp\a30bcd45a008e2f4172f0de62d3a03c0N.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2368
    • C:\Windows\SysWOW64\Mnakjaoc.exe
      C:\Windows\system32\Mnakjaoc.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2236
      • C:\Windows\SysWOW64\Mhgpgjoj.exe
        C:\Windows\system32\Mhgpgjoj.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2172
        • C:\Windows\SysWOW64\Niilmi32.exe
          C:\Windows\system32\Niilmi32.exe
          4⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:2820
          • C:\Windows\SysWOW64\Nfcfob32.exe
            C:\Windows\system32\Nfcfob32.exe
            5⤵
            • Adds autorun key to be loaded by Explorer.exe on startup
            • Executes dropped EXE
            • Loads dropped DLL
            • Drops file in System32 directory
            • System Location Discovery: System Language Discovery
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:2304
            • C:\Windows\SysWOW64\Nmpkal32.exe
              C:\Windows\system32\Nmpkal32.exe
              6⤵
              • Adds autorun key to be loaded by Explorer.exe on startup
              • Executes dropped EXE
              • Loads dropped DLL
              • Drops file in System32 directory
              • System Location Discovery: System Language Discovery
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:2032
              • C:\Windows\SysWOW64\Olgehh32.exe
                C:\Windows\system32\Olgehh32.exe
                7⤵
                • Adds autorun key to be loaded by Explorer.exe on startup
                • Executes dropped EXE
                • Loads dropped DLL
                • Drops file in System32 directory
                • System Location Discovery: System Language Discovery
                • Modifies registry class
                • Suspicious use of WriteProcessMemory
                PID:2636
                • C:\Windows\SysWOW64\Ohnemidj.exe
                  C:\Windows\system32\Ohnemidj.exe
                  8⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of WriteProcessMemory
                  PID:1236
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 1236 -s 140
                    9⤵
                    • Loads dropped DLL
                    • Program crash
                    PID:2604

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\Idomll32.dll

    Filesize

    7KB

    MD5

    2d83245f173ab90007060e8bb863dcb4

    SHA1

    914046deaf85540bc084fcd6fa552b064151245f

    SHA256

    6e4e8ea154826e7024d1a6de31f893ce719a43c9b72386fa682dd3921446c48b

    SHA512

    4bd7169ddf738e6c275a1ff5723847ee2c786b538a8922cf1722b401bef502be7d7d74a08e7eb3dced631ab6da92ca0146a8f319479557200d3c8e77ab95a67c

  • C:\Windows\SysWOW64\Mnakjaoc.exe

    Filesize

    92KB

    MD5

    1f0d52d23a202fe523c6e76a363c2d05

    SHA1

    a284b252e436eea4bbec0f8122f76ab36a3808c7

    SHA256

    ecb249be805f8ad4d3bd96c4adc006c5b8de99f1628e09eb4f5bd05e61a5edab

    SHA512

    738a8c48d2b9c3398b1ed75f917d65f1ecb03a97859de9ce4b115fa3b26c8bb6bba6542ff4514c94d6c004d3b00af942feb185a919f9da71766ea35ea2e77f28

  • \Windows\SysWOW64\Mhgpgjoj.exe

    Filesize

    92KB

    MD5

    67c6ac750e55711ea33c3cf13fd40964

    SHA1

    bc21e70c02828be3138332aeba00f6ae71c4807f

    SHA256

    9133fcc6796b36d153eb29268426be167fa3304c210f6b95eb3e5a5a52ae34d5

    SHA512

    72bb15180a92c619aa7822f8cb7706409d9e1c4c0cd232879b3293412e818cd36c808d65df03243668e31f83093872498070604a1b7eb0b44e2718e140413fbc

  • \Windows\SysWOW64\Nfcfob32.exe

    Filesize

    92KB

    MD5

    c646f0e6e34c8ad87debbcad0bb64488

    SHA1

    719de4090a218e3481e6ef98a69cd2a9f463dccd

    SHA256

    99975d61d9e3d615480cc00501193ef5e2f7c610fdc1a958714648e47eed79d9

    SHA512

    d72850910826d7ba9547ef36d2c8b5791c69ad4c0756c8d755c31ded4a3808987157002b45c28bb884dfe264d2e80152b3fd44916e26cdd4d07ad379d6cab6f4

  • \Windows\SysWOW64\Niilmi32.exe

    Filesize

    92KB

    MD5

    d238ed9655cb8f874c6dc9c19fee5df1

    SHA1

    414430275307be340069264520e998675c89ce10

    SHA256

    92a8f96555526bd9821332c335396d65a6ffde7a0f7c923e7f0d7ecd582be71c

    SHA512

    df1e2bfdb1dceca9e61f61504f6463358be6bb032461c927cd7a170dd54a163450a204de64430940abbb8bb9822ce1cb66552f3340b98cc7f91e91fd4c79c5eb

  • \Windows\SysWOW64\Nmpkal32.exe

    Filesize

    92KB

    MD5

    73a517a9079b56faf36075a231781720

    SHA1

    7f16bfb47f5f9fcb8278ae55bed0979092d59e88

    SHA256

    b05df998dbf70d3ce790ddaa446de8e9215b80d2e9a3e3d8d7ce973a9642ad0b

    SHA512

    e1f48aebbe0e6e309835aebb14e60faf74ba3fe5e31990a39a1becc922164e62ec980ec53f690632909382b776295ac55b2aa06db09e8748a1fdbe1c9e2688d5

  • \Windows\SysWOW64\Ohnemidj.exe

    Filesize

    92KB

    MD5

    6662ada0c906647ef0bbea7d6dbc6d99

    SHA1

    ba6de788ce369e4f1fa12bc86ff4ead4e0129539

    SHA256

    d94ed4ba4587ee6f3fee49581deab7f4263e036ceaae61440b814655c9701e51

    SHA512

    2e896f36328e19b620abb6d6d225bcda9c49b9dcd00f8674f2613c458909e774784a23374ec33a5ffa79186ee929bb946a6e7516d56ca30647ae88e9fbd955c8

  • \Windows\SysWOW64\Olgehh32.exe

    Filesize

    92KB

    MD5

    ca1aa9e3fbafe2ae1e7873c2678deb43

    SHA1

    34325142418f6c7ad2d0bd42831218c52b67561e

    SHA256

    0ecf1af308415d35e1e8affa95ccd9e8f128a5dc32f76f8e24ad5817e6bb9945

    SHA512

    97f87c9198e8e6c136b0fe239723277a20f93ab9d3df99c2cf9040eae056d0c396753d7635251845601769d76ea804e47c1f6dde0c192c7b01442591e9c188ad

  • memory/1236-106-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/2032-104-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/2172-27-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/2172-41-0x0000000000220000-0x000000000025F000-memory.dmp

    Filesize

    252KB

  • memory/2172-101-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/2172-34-0x0000000000220000-0x000000000025F000-memory.dmp

    Filesize

    252KB

  • memory/2236-100-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/2236-14-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/2304-103-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/2304-55-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/2304-63-0x0000000000220000-0x000000000025F000-memory.dmp

    Filesize

    252KB

  • memory/2368-0-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/2368-99-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/2368-13-0x00000000003A0000-0x00000000003DF000-memory.dmp

    Filesize

    252KB

  • memory/2368-12-0x00000000003A0000-0x00000000003DF000-memory.dmp

    Filesize

    252KB

  • memory/2636-81-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/2636-93-0x0000000000220000-0x000000000025F000-memory.dmp

    Filesize

    252KB

  • memory/2636-105-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/2820-53-0x0000000000220000-0x000000000025F000-memory.dmp

    Filesize

    252KB

  • memory/2820-102-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB