Analysis

  • max time kernel
    111s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    07-09-2024 04:43

General

  • Target

    0cd2ef0d79985ec8899bdcc36273e420N.exe

  • Size

    81KB

  • MD5

    0cd2ef0d79985ec8899bdcc36273e420

  • SHA1

    5b686a2355520c7a71f5af26c278f92365cf6101

  • SHA256

    afa3b8587115cae7fab1bb8f2647a080742178186419c500ffb6fd87f17a7a29

  • SHA512

    02bf935ba157ea7c87ca73501cdc1890b52b50f761634ad79375926d382a4c88be96d66e70cfbb34fdecb4ca3d0fa3585f9971ef7b05495fd5c9dced0c0a91ae

  • SSDEEP

    1536:B4Jx8gDltPaWrzXr+w+cSp+f2BZNiJQ+54cocoS7m4LO++/+1m6KadhYxU33HX0L:yx7fPfb+rps2+Q+54nS/LrCimBaH8UHc

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 8 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 12 IoCs
  • Drops file in System32 directory 12 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 15 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0cd2ef0d79985ec8899bdcc36273e420N.exe
    "C:\Users\Admin\AppData\Local\Temp\0cd2ef0d79985ec8899bdcc36273e420N.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1872
    • C:\Windows\SysWOW64\Agdlfd32.exe
      C:\Windows\system32\Agdlfd32.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2288
      • C:\Windows\SysWOW64\Aalaoipc.exe
        C:\Windows\system32\Aalaoipc.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2800
        • C:\Windows\SysWOW64\Aehmoh32.exe
          C:\Windows\system32\Aehmoh32.exe
          4⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:2880
          • C:\Windows\SysWOW64\Bmenijcd.exe
            C:\Windows\system32\Bmenijcd.exe
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2704
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2704 -s 140
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:2812

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\Aalaoipc.exe

    Filesize

    81KB

    MD5

    3d48a14e6cfc3fcd5d821e9f85b662d6

    SHA1

    b06b5b11def8f02a9c0603d0832e3c9efdcb63d5

    SHA256

    0b390f37bf7bd06ac413d5b635437029b5e5ed68844443ecee2a21a4b0dc8f13

    SHA512

    fdd7598d229a3de6b2fe0929a3f555bb11d63591efa059f3df0945b9dfe5a12d3b1b8e377a085f4baa54111649e037958821d624aa87aed31b0666e3db6d55f1

  • C:\Windows\SysWOW64\Agdlfd32.exe

    Filesize

    81KB

    MD5

    5d3afdf45fde1bd226cb76cc0207028f

    SHA1

    93240fd5a744262f3a6e7fd20fa13e464de6645a

    SHA256

    545d574669d4e30396a4bc808f22bdbb2c5aead0868db790e1801430d7e3fd63

    SHA512

    a55794d9d1298370a7c52a53855dc8f9aea3707647f1b99fadadabd4aa9bc7af88e0a11dcfd1c465c8d72a04ef82415c4b5d9d5c1099d836ac6a4cdd10009cb6

  • \Windows\SysWOW64\Aehmoh32.exe

    Filesize

    81KB

    MD5

    472c6f14b43f4adf433697cc26505555

    SHA1

    313363915f019efedd358565ddbf2d794c82bf42

    SHA256

    62387eb8fdab9714881ff9a814304ec0d393a93dbc51610f406411b7823faaa1

    SHA512

    2e6fadd8a774be41d9ceddd62c0e7860c3a488d85deb6bad61c40faeb11978564724483ea03f49742e0f35a063e06302227b57d7e6fb25cab35d15099f567e54

  • \Windows\SysWOW64\Bmenijcd.exe

    Filesize

    81KB

    MD5

    59618fdf41b3a5c21f0ddaea6faa6e40

    SHA1

    43a5a090bac4f694f55d0ad0082a8665908a856e

    SHA256

    c1de055f09db2334ca7f252df1d43c558697e09262d551fed8eeb7e3ae3021cd

    SHA512

    302f660f6aaf39fcda8a1a4cc238370a3b180131b6dc7cb8ae2227cdf93fd89a4e2bad5e54b6923bec95e9c3a275d9ee5fe7c49e66625fbe929ecb02c8b121ed

  • memory/1872-25-0x00000000003A0000-0x00000000003D4000-memory.dmp

    Filesize

    208KB

  • memory/1872-24-0x00000000003A0000-0x00000000003D4000-memory.dmp

    Filesize

    208KB

  • memory/1872-0-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/1872-58-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2288-26-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2704-62-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2800-27-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2800-60-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2880-40-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2880-48-0x0000000000220000-0x0000000000254000-memory.dmp

    Filesize

    208KB

  • memory/2880-61-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB