Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 05:30
Static task
static1
Behavioral task
behavioral1
Sample
c521414bfdd0f8a58cd27419ece93390N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c521414bfdd0f8a58cd27419ece93390N.exe
Resource
win10v2004-20240802-en
General
-
Target
c521414bfdd0f8a58cd27419ece93390N.exe
-
Size
318KB
-
MD5
c521414bfdd0f8a58cd27419ece93390
-
SHA1
6adb6923a62a1b5a2ee705c6b8991b4b4db9c76a
-
SHA256
0fdabfe9c16935308a1a81b43988597bfcb4b39a70bfbffb26ae197abff5977b
-
SHA512
6314e227b6d1bd88359cf86a0569dbe9b2f1abb64497de2bf48fecf85d8b68bc70bdcada94224ee754939cd2d1a959ca6f80f8d8a2eb06e2b706c13378734e02
-
SSDEEP
6144:EO8OL/FRVEQHdMcm4FmowdHoS7c5cm4FmowdHoSrNF9xRVEQHd4:P8ORO4wFHoS04wFHoSrZx8
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" c521414bfdd0f8a58cd27419ece93390N.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kjhcag32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kfaalh32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kfaalh32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kmkihbho.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kmkihbho.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Llpfjomf.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad c521414bfdd0f8a58cd27419ece93390N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kjhcag32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Koflgf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Koflgf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Llpfjomf.exe -
Executes dropped EXE 6 IoCs
pid Process 2692 Kjhcag32.exe 2968 Koflgf32.exe 2832 Kfaalh32.exe 2608 Kmkihbho.exe 2636 Llpfjomf.exe 1484 Lbjofi32.exe -
Loads dropped DLL 16 IoCs
pid Process 2948 c521414bfdd0f8a58cd27419ece93390N.exe 2948 c521414bfdd0f8a58cd27419ece93390N.exe 2692 Kjhcag32.exe 2692 Kjhcag32.exe 2968 Koflgf32.exe 2968 Koflgf32.exe 2832 Kfaalh32.exe 2832 Kfaalh32.exe 2608 Kmkihbho.exe 2608 Kmkihbho.exe 2636 Llpfjomf.exe 2636 Llpfjomf.exe 2184 WerFault.exe 2184 WerFault.exe 2184 WerFault.exe 2184 WerFault.exe -
Drops file in System32 directory 18 IoCs
description ioc Process File created C:\Windows\SysWOW64\Kjhcag32.exe c521414bfdd0f8a58cd27419ece93390N.exe File created C:\Windows\SysWOW64\Llpfjomf.exe Kmkihbho.exe File created C:\Windows\SysWOW64\Koflgf32.exe Kjhcag32.exe File created C:\Windows\SysWOW64\Pehbqi32.dll Kjhcag32.exe File opened for modification C:\Windows\SysWOW64\Kmkihbho.exe Kfaalh32.exe File created C:\Windows\SysWOW64\Phblkn32.dll Koflgf32.exe File created C:\Windows\SysWOW64\Kmkihbho.exe Kfaalh32.exe File created C:\Windows\SysWOW64\Bccjfi32.dll Kmkihbho.exe File opened for modification C:\Windows\SysWOW64\Lbjofi32.exe Llpfjomf.exe File opened for modification C:\Windows\SysWOW64\Kjhcag32.exe c521414bfdd0f8a58cd27419ece93390N.exe File created C:\Windows\SysWOW64\Kfaalh32.exe Koflgf32.exe File opened for modification C:\Windows\SysWOW64\Kfaalh32.exe Koflgf32.exe File opened for modification C:\Windows\SysWOW64\Llpfjomf.exe Kmkihbho.exe File created C:\Windows\SysWOW64\Lbjofi32.exe Llpfjomf.exe File created C:\Windows\SysWOW64\Ipafocdg.dll Llpfjomf.exe File created C:\Windows\SysWOW64\Gpcafifg.dll c521414bfdd0f8a58cd27419ece93390N.exe File opened for modification C:\Windows\SysWOW64\Koflgf32.exe Kjhcag32.exe File created C:\Windows\SysWOW64\Canhhi32.dll Kfaalh32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2184 1484 WerFault.exe 35 -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kjhcag32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Koflgf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kfaalh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kmkihbho.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Llpfjomf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lbjofi32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c521414bfdd0f8a58cd27419ece93390N.exe -
Modifies registry class 21 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Koflgf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kfaalh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kfaalh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 c521414bfdd0f8a58cd27419ece93390N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} c521414bfdd0f8a58cd27419ece93390N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kjhcag32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kjhcag32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Koflgf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Llpfjomf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID c521414bfdd0f8a58cd27419ece93390N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" c521414bfdd0f8a58cd27419ece93390N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kmkihbho.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ipafocdg.dll" Llpfjomf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Llpfjomf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gpcafifg.dll" c521414bfdd0f8a58cd27419ece93390N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pehbqi32.dll" Kjhcag32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Phblkn32.dll" Koflgf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Canhhi32.dll" Kfaalh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kmkihbho.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node c521414bfdd0f8a58cd27419ece93390N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bccjfi32.dll" Kmkihbho.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2948 wrote to memory of 2692 2948 c521414bfdd0f8a58cd27419ece93390N.exe 30 PID 2948 wrote to memory of 2692 2948 c521414bfdd0f8a58cd27419ece93390N.exe 30 PID 2948 wrote to memory of 2692 2948 c521414bfdd0f8a58cd27419ece93390N.exe 30 PID 2948 wrote to memory of 2692 2948 c521414bfdd0f8a58cd27419ece93390N.exe 30 PID 2692 wrote to memory of 2968 2692 Kjhcag32.exe 31 PID 2692 wrote to memory of 2968 2692 Kjhcag32.exe 31 PID 2692 wrote to memory of 2968 2692 Kjhcag32.exe 31 PID 2692 wrote to memory of 2968 2692 Kjhcag32.exe 31 PID 2968 wrote to memory of 2832 2968 Koflgf32.exe 32 PID 2968 wrote to memory of 2832 2968 Koflgf32.exe 32 PID 2968 wrote to memory of 2832 2968 Koflgf32.exe 32 PID 2968 wrote to memory of 2832 2968 Koflgf32.exe 32 PID 2832 wrote to memory of 2608 2832 Kfaalh32.exe 33 PID 2832 wrote to memory of 2608 2832 Kfaalh32.exe 33 PID 2832 wrote to memory of 2608 2832 Kfaalh32.exe 33 PID 2832 wrote to memory of 2608 2832 Kfaalh32.exe 33 PID 2608 wrote to memory of 2636 2608 Kmkihbho.exe 34 PID 2608 wrote to memory of 2636 2608 Kmkihbho.exe 34 PID 2608 wrote to memory of 2636 2608 Kmkihbho.exe 34 PID 2608 wrote to memory of 2636 2608 Kmkihbho.exe 34 PID 2636 wrote to memory of 1484 2636 Llpfjomf.exe 35 PID 2636 wrote to memory of 1484 2636 Llpfjomf.exe 35 PID 2636 wrote to memory of 1484 2636 Llpfjomf.exe 35 PID 2636 wrote to memory of 1484 2636 Llpfjomf.exe 35 PID 1484 wrote to memory of 2184 1484 Lbjofi32.exe 36 PID 1484 wrote to memory of 2184 1484 Lbjofi32.exe 36 PID 1484 wrote to memory of 2184 1484 Lbjofi32.exe 36 PID 1484 wrote to memory of 2184 1484 Lbjofi32.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\c521414bfdd0f8a58cd27419ece93390N.exe"C:\Users\Admin\AppData\Local\Temp\c521414bfdd0f8a58cd27419ece93390N.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Windows\SysWOW64\Kjhcag32.exeC:\Windows\system32\Kjhcag32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\SysWOW64\Koflgf32.exeC:\Windows\system32\Koflgf32.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Windows\SysWOW64\Kfaalh32.exeC:\Windows\system32\Kfaalh32.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Windows\SysWOW64\Kmkihbho.exeC:\Windows\system32\Kmkihbho.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\SysWOW64\Llpfjomf.exeC:\Windows\system32\Llpfjomf.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Windows\SysWOW64\Lbjofi32.exeC:\Windows\system32\Lbjofi32.exe7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1484 -s 1408⤵
- Loads dropped DLL
- Program crash
PID:2184
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
318KB
MD5d4af5dc4e9218bf7b89ecdb9b4d701fc
SHA11946f16b50a4725edcfd6a9bd5bbd8b57aaf1f26
SHA2569ad33201a9d91ee463c1e1a2030d41b0b5be41efd785343ee3bb551bec70ec6e
SHA512e2a8f14f222772d71f143389565f91065b84d2e7090214866b9003d5def77da195525243a1e8c0726133c9c224ce16c0803f3a3c315a352ed67b72e59f0ba412
-
Filesize
318KB
MD519867468f98abc007ede0150aac2b457
SHA184ede4a5013ad4a996a888faf5dffed677c0dcb1
SHA256687c7d6013611f7c06574922eec00fc42f98ae5921306d6b982907c0d928e3a9
SHA512a1c458d671d32ee3867aa6255eab38b2c204d7e75235d6a24bf3ecbdded3d5cf0804d4e2b0a3719a426103c6d93cf6b9950f03bb67944dc73e935463ca990e00
-
Filesize
318KB
MD54d660108341186740ac01ebfe2126ed1
SHA1ac82eff20100e03a953882a595ac947929852582
SHA25647654be9c90966bdd2a70aa62e25242526195c71657d7fc458f9f52ca39c873f
SHA512895c5652688f34e89cf2a995e6931905276fe336ad5bd7e2f28977dbec40670ba6d453d1cbf518363073a46e262fbb27b6b658d36e147548237343d647c4d80b
-
Filesize
318KB
MD57326ec7e7c0c718f2e137395fa86d251
SHA1f7401f2fc6b3c8d522876cb759f7efbc655089f6
SHA256e21ff4c56081c7641120b54b8e56b0b8c5bb60628d0cc655995372d8b1626bea
SHA512fe03d9e3ed0be9bc3b49178a73218513a0357fa3b6f65396d7c94834cc97bbef8336f90c18ed4644ba4d9c1cab9be04d37c75d10fc48825eae16f290b317aa4f
-
Filesize
318KB
MD5c9b444e41edfd9fcd7202c9de0943a0d
SHA1fd1aba8464553b707b3959c0a5ce9940efcafc99
SHA256c7a86ac929a6d08ac7c341208cb65ea4bc007746173235d422a31f99b4bf5f1e
SHA512aaef893d5a33ebe9fe3f50d07b4a699614e7e7ebf01b8b22d8de43b1ff6a0ae622c80d3409b43a5f34a5b12af9e1e853cca8f28f35af3996ff0b8fc44dfca845
-
Filesize
318KB
MD57e54f070468e3f08a7a8f07d1be097c1
SHA1b5ce95968adaa2809ef77c78af9907df607700cf
SHA256fa3288883dabdde634466e7b0306be7cdcb87a2420033d87b2ed4a4778dcdad4
SHA5127353e11f151261533120fe7d206a45dd1cbfbda59c37be924f4a10349f24cd9ff0aac7675cfa3e9aa494b8de16972cfa2876e60ddbef95b2ab1d7536d473ec42