Analysis

  • max time kernel
    118s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    13/09/2024, 05:30

General

  • Target

    c521414bfdd0f8a58cd27419ece93390N.exe

  • Size

    318KB

  • MD5

    c521414bfdd0f8a58cd27419ece93390

  • SHA1

    6adb6923a62a1b5a2ee705c6b8991b4b4db9c76a

  • SHA256

    0fdabfe9c16935308a1a81b43988597bfcb4b39a70bfbffb26ae197abff5977b

  • SHA512

    6314e227b6d1bd88359cf86a0569dbe9b2f1abb64497de2bf48fecf85d8b68bc70bdcada94224ee754939cd2d1a959ca6f80f8d8a2eb06e2b706c13378734e02

  • SSDEEP

    6144:EO8OL/FRVEQHdMcm4FmowdHoS7c5cm4FmowdHoSrNF9xRVEQHd4:P8ORO4wFHoS04wFHoSrZx8

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 12 IoCs
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 16 IoCs
  • Drops file in System32 directory 18 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 21 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c521414bfdd0f8a58cd27419ece93390N.exe
    "C:\Users\Admin\AppData\Local\Temp\c521414bfdd0f8a58cd27419ece93390N.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2948
    • C:\Windows\SysWOW64\Kjhcag32.exe
      C:\Windows\system32\Kjhcag32.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2692
      • C:\Windows\SysWOW64\Koflgf32.exe
        C:\Windows\system32\Koflgf32.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2968
        • C:\Windows\SysWOW64\Kfaalh32.exe
          C:\Windows\system32\Kfaalh32.exe
          4⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:2832
          • C:\Windows\SysWOW64\Kmkihbho.exe
            C:\Windows\system32\Kmkihbho.exe
            5⤵
            • Adds autorun key to be loaded by Explorer.exe on startup
            • Executes dropped EXE
            • Loads dropped DLL
            • Drops file in System32 directory
            • System Location Discovery: System Language Discovery
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:2608
            • C:\Windows\SysWOW64\Llpfjomf.exe
              C:\Windows\system32\Llpfjomf.exe
              6⤵
              • Adds autorun key to be loaded by Explorer.exe on startup
              • Executes dropped EXE
              • Loads dropped DLL
              • Drops file in System32 directory
              • System Location Discovery: System Language Discovery
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:2636
              • C:\Windows\SysWOW64\Lbjofi32.exe
                C:\Windows\system32\Lbjofi32.exe
                7⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:1484
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 1484 -s 140
                  8⤵
                  • Loads dropped DLL
                  • Program crash
                  PID:2184

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\Llpfjomf.exe

    Filesize

    318KB

    MD5

    d4af5dc4e9218bf7b89ecdb9b4d701fc

    SHA1

    1946f16b50a4725edcfd6a9bd5bbd8b57aaf1f26

    SHA256

    9ad33201a9d91ee463c1e1a2030d41b0b5be41efd785343ee3bb551bec70ec6e

    SHA512

    e2a8f14f222772d71f143389565f91065b84d2e7090214866b9003d5def77da195525243a1e8c0726133c9c224ce16c0803f3a3c315a352ed67b72e59f0ba412

  • \Windows\SysWOW64\Kfaalh32.exe

    Filesize

    318KB

    MD5

    19867468f98abc007ede0150aac2b457

    SHA1

    84ede4a5013ad4a996a888faf5dffed677c0dcb1

    SHA256

    687c7d6013611f7c06574922eec00fc42f98ae5921306d6b982907c0d928e3a9

    SHA512

    a1c458d671d32ee3867aa6255eab38b2c204d7e75235d6a24bf3ecbdded3d5cf0804d4e2b0a3719a426103c6d93cf6b9950f03bb67944dc73e935463ca990e00

  • \Windows\SysWOW64\Kjhcag32.exe

    Filesize

    318KB

    MD5

    4d660108341186740ac01ebfe2126ed1

    SHA1

    ac82eff20100e03a953882a595ac947929852582

    SHA256

    47654be9c90966bdd2a70aa62e25242526195c71657d7fc458f9f52ca39c873f

    SHA512

    895c5652688f34e89cf2a995e6931905276fe336ad5bd7e2f28977dbec40670ba6d453d1cbf518363073a46e262fbb27b6b658d36e147548237343d647c4d80b

  • \Windows\SysWOW64\Kmkihbho.exe

    Filesize

    318KB

    MD5

    7326ec7e7c0c718f2e137395fa86d251

    SHA1

    f7401f2fc6b3c8d522876cb759f7efbc655089f6

    SHA256

    e21ff4c56081c7641120b54b8e56b0b8c5bb60628d0cc655995372d8b1626bea

    SHA512

    fe03d9e3ed0be9bc3b49178a73218513a0357fa3b6f65396d7c94834cc97bbef8336f90c18ed4644ba4d9c1cab9be04d37c75d10fc48825eae16f290b317aa4f

  • \Windows\SysWOW64\Koflgf32.exe

    Filesize

    318KB

    MD5

    c9b444e41edfd9fcd7202c9de0943a0d

    SHA1

    fd1aba8464553b707b3959c0a5ce9940efcafc99

    SHA256

    c7a86ac929a6d08ac7c341208cb65ea4bc007746173235d422a31f99b4bf5f1e

    SHA512

    aaef893d5a33ebe9fe3f50d07b4a699614e7e7ebf01b8b22d8de43b1ff6a0ae622c80d3409b43a5f34a5b12af9e1e853cca8f28f35af3996ff0b8fc44dfca845

  • \Windows\SysWOW64\Lbjofi32.exe

    Filesize

    318KB

    MD5

    7e54f070468e3f08a7a8f07d1be097c1

    SHA1

    b5ce95968adaa2809ef77c78af9907df607700cf

    SHA256

    fa3288883dabdde634466e7b0306be7cdcb87a2420033d87b2ed4a4778dcdad4

    SHA512

    7353e11f151261533120fe7d206a45dd1cbfbda59c37be924f4a10349f24cd9ff0aac7675cfa3e9aa494b8de16972cfa2876e60ddbef95b2ab1d7536d473ec42

  • memory/2608-58-0x0000000000400000-0x0000000000479000-memory.dmp

    Filesize

    484KB

  • memory/2608-112-0x0000000000400000-0x0000000000479000-memory.dmp

    Filesize

    484KB

  • memory/2608-67-0x00000000002F0000-0x0000000000369000-memory.dmp

    Filesize

    484KB

  • memory/2636-114-0x0000000000400000-0x0000000000479000-memory.dmp

    Filesize

    484KB

  • memory/2636-75-0x0000000000250000-0x00000000002C9000-memory.dmp

    Filesize

    484KB

  • memory/2692-103-0x0000000000400000-0x0000000000479000-memory.dmp

    Filesize

    484KB

  • memory/2692-14-0x0000000000400000-0x0000000000479000-memory.dmp

    Filesize

    484KB

  • memory/2692-32-0x0000000000480000-0x00000000004F9000-memory.dmp

    Filesize

    484KB

  • memory/2832-41-0x0000000000400000-0x0000000000479000-memory.dmp

    Filesize

    484KB

  • memory/2832-107-0x0000000000400000-0x0000000000479000-memory.dmp

    Filesize

    484KB

  • memory/2948-13-0x00000000002E0000-0x0000000000359000-memory.dmp

    Filesize

    484KB

  • memory/2948-12-0x00000000002E0000-0x0000000000359000-memory.dmp

    Filesize

    484KB

  • memory/2948-101-0x0000000000400000-0x0000000000479000-memory.dmp

    Filesize

    484KB

  • memory/2948-0-0x0000000000400000-0x0000000000479000-memory.dmp

    Filesize

    484KB

  • memory/2968-105-0x0000000000400000-0x0000000000479000-memory.dmp

    Filesize

    484KB

  • memory/2968-33-0x0000000000400000-0x0000000000479000-memory.dmp

    Filesize

    484KB