Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14-09-2024 23:29
Static task
static1
Behavioral task
behavioral1
Sample
6b7d1cc6056bfbbdb1bc5ff2757323d0N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
6b7d1cc6056bfbbdb1bc5ff2757323d0N.exe
Resource
win10v2004-20240802-en
General
-
Target
6b7d1cc6056bfbbdb1bc5ff2757323d0N.exe
-
Size
77KB
-
MD5
6b7d1cc6056bfbbdb1bc5ff2757323d0
-
SHA1
6fd529ae6a05c9ea04b414ab07991be8f4d234f0
-
SHA256
4b57eef3ebab4ba0b29b8504ed56148992738a407c749923eec82fcc9bd4a541
-
SHA512
db7f01f570882fbc47205973992559f14b4b23c7bd0d0e62e5ac3efb9d1f7fb34c71547de333a348f0d27bd552ecc466239a45fa1fe513705528dad746126b5b
-
SSDEEP
1536:vYE2NgKlzEg2IcBKATVWiOaGS2Cu6myBN5FOd42Ltubwfi+TjRC/:QjNFlzEguKATW2wf1TjY
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" 6b7d1cc6056bfbbdb1bc5ff2757323d0N.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kmimcbja.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kmimcbja.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kfaalh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kfaalh32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kbhbai32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kbhbai32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 6b7d1cc6056bfbbdb1bc5ff2757323d0N.exe -
Executes dropped EXE 4 IoCs
pid Process 2764 Kmimcbja.exe 2696 Kfaalh32.exe 2756 Kbhbai32.exe 2560 Lbjofi32.exe -
Loads dropped DLL 12 IoCs
pid Process 296 6b7d1cc6056bfbbdb1bc5ff2757323d0N.exe 296 6b7d1cc6056bfbbdb1bc5ff2757323d0N.exe 2764 Kmimcbja.exe 2764 Kmimcbja.exe 2696 Kfaalh32.exe 2696 Kfaalh32.exe 2756 Kbhbai32.exe 2756 Kbhbai32.exe 2636 WerFault.exe 2636 WerFault.exe 2636 WerFault.exe 2636 WerFault.exe -
Drops file in System32 directory 12 IoCs
description ioc Process File created C:\Windows\SysWOW64\Kfaalh32.exe Kmimcbja.exe File created C:\Windows\SysWOW64\Phblkn32.dll Kmimcbja.exe File opened for modification C:\Windows\SysWOW64\Kbhbai32.exe Kfaalh32.exe File created C:\Windows\SysWOW64\Bndneq32.dll Kfaalh32.exe File created C:\Windows\SysWOW64\Ipafocdg.dll Kbhbai32.exe File created C:\Windows\SysWOW64\Kmimcbja.exe 6b7d1cc6056bfbbdb1bc5ff2757323d0N.exe File created C:\Windows\SysWOW64\Bodilc32.dll 6b7d1cc6056bfbbdb1bc5ff2757323d0N.exe File created C:\Windows\SysWOW64\Kbhbai32.exe Kfaalh32.exe File created C:\Windows\SysWOW64\Lbjofi32.exe Kbhbai32.exe File opened for modification C:\Windows\SysWOW64\Lbjofi32.exe Kbhbai32.exe File opened for modification C:\Windows\SysWOW64\Kmimcbja.exe 6b7d1cc6056bfbbdb1bc5ff2757323d0N.exe File opened for modification C:\Windows\SysWOW64\Kfaalh32.exe Kmimcbja.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2636 2560 WerFault.exe 33 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6b7d1cc6056bfbbdb1bc5ff2757323d0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kmimcbja.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kfaalh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kbhbai32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lbjofi32.exe -
Modifies registry class 15 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bodilc32.dll" 6b7d1cc6056bfbbdb1bc5ff2757323d0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kfaalh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bndneq32.dll" Kfaalh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node 6b7d1cc6056bfbbdb1bc5ff2757323d0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID 6b7d1cc6056bfbbdb1bc5ff2757323d0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} 6b7d1cc6056bfbbdb1bc5ff2757323d0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Phblkn32.dll" Kmimcbja.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kbhbai32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kbhbai32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 6b7d1cc6056bfbbdb1bc5ff2757323d0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" 6b7d1cc6056bfbbdb1bc5ff2757323d0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kmimcbja.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ipafocdg.dll" Kbhbai32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kmimcbja.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kfaalh32.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 296 wrote to memory of 2764 296 6b7d1cc6056bfbbdb1bc5ff2757323d0N.exe 30 PID 296 wrote to memory of 2764 296 6b7d1cc6056bfbbdb1bc5ff2757323d0N.exe 30 PID 296 wrote to memory of 2764 296 6b7d1cc6056bfbbdb1bc5ff2757323d0N.exe 30 PID 296 wrote to memory of 2764 296 6b7d1cc6056bfbbdb1bc5ff2757323d0N.exe 30 PID 2764 wrote to memory of 2696 2764 Kmimcbja.exe 31 PID 2764 wrote to memory of 2696 2764 Kmimcbja.exe 31 PID 2764 wrote to memory of 2696 2764 Kmimcbja.exe 31 PID 2764 wrote to memory of 2696 2764 Kmimcbja.exe 31 PID 2696 wrote to memory of 2756 2696 Kfaalh32.exe 32 PID 2696 wrote to memory of 2756 2696 Kfaalh32.exe 32 PID 2696 wrote to memory of 2756 2696 Kfaalh32.exe 32 PID 2696 wrote to memory of 2756 2696 Kfaalh32.exe 32 PID 2756 wrote to memory of 2560 2756 Kbhbai32.exe 33 PID 2756 wrote to memory of 2560 2756 Kbhbai32.exe 33 PID 2756 wrote to memory of 2560 2756 Kbhbai32.exe 33 PID 2756 wrote to memory of 2560 2756 Kbhbai32.exe 33 PID 2560 wrote to memory of 2636 2560 Lbjofi32.exe 34 PID 2560 wrote to memory of 2636 2560 Lbjofi32.exe 34 PID 2560 wrote to memory of 2636 2560 Lbjofi32.exe 34 PID 2560 wrote to memory of 2636 2560 Lbjofi32.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\6b7d1cc6056bfbbdb1bc5ff2757323d0N.exe"C:\Users\Admin\AppData\Local\Temp\6b7d1cc6056bfbbdb1bc5ff2757323d0N.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:296 -
C:\Windows\SysWOW64\Kmimcbja.exeC:\Windows\system32\Kmimcbja.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\SysWOW64\Kfaalh32.exeC:\Windows\system32\Kfaalh32.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\SysWOW64\Kbhbai32.exeC:\Windows\system32\Kbhbai32.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\SysWOW64\Lbjofi32.exeC:\Windows\system32\Lbjofi32.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2560 -s 1406⤵
- Loads dropped DLL
- Program crash
PID:2636
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
77KB
MD5e15a7f1a929227dc26bea031b2eb4b59
SHA1a023cc263ed811241f0b2e0a8f9f15ae1f07ea5d
SHA256a235340ad6d68ead36a93ea7aa3e11b62d57a0ad90da3713f3983e3dfa3520b1
SHA512f65f5fd3ea653f385e6593cbbeff43ede3f063926af47db6aa5d59fa404597df824d5c41e1165564b98fd100ea461ef00e964ebd592c609f154375367b2173a7
-
Filesize
77KB
MD5515b65af377f38957afddc92977f350d
SHA12ff3c345fe1ed15c157513b1dbc68e6a22e4064d
SHA256f4c17c3c716975159864684dd8af15217e9ca7ab281b2cd451d0ca76f540569d
SHA5126fdfeff60c5c63cbf9a74737e398a363178730b4a36c111ee8d8c5ac7cf3a2b16de7023e0a78fb101a638797fdda3fcf771bfe31aae988eb1ee768688caa9a66
-
Filesize
77KB
MD583fad597d6c1baecd689b44bf2560ae8
SHA152f7ce48b30990761e522f9f77024ce9695251ed
SHA256456ac48867ef35d53e22b8a62d307b495f6dae7dd9e9a67bb3f08cbee5e69c5e
SHA512a2c2402dacdf2d40dfe122a527fecc8d349ad8c662b5696ab5e0036859fad9201bc624126dc66ad1ccf47420b2f2a64238c3f5812a727a98b3eafa4967c6451b
-
Filesize
77KB
MD54952f065694e8df834e343a9b9e22072
SHA1104a44d921e008a430b8f83fb449c6acefb83e5d
SHA256da20bb5b2883923a0360eb24b450d2947c8e32159b6dd82cbb56eba577d1154b
SHA512cf3d4ee0c67cfc5826915fd17f59a6426df34886631c754ba6445577b67c0f2c79b4ab292f81d178b538dec7071021170238c0cde1de81a5992a856e96314de4