Analysis

  • max time kernel
    118s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    15/09/2024, 02:58

General

  • Target

    8d92d30fcd26014705f0939f1d584bb0N.exe

  • Size

    89KB

  • MD5

    8d92d30fcd26014705f0939f1d584bb0

  • SHA1

    32bcf7b963115c80baad7f97f097c45e6e5e2c5d

  • SHA256

    2536a5dd6709f7ad8ef0a854c7189fe3ae6b8c69b9bb49e3eed5af696e941732

  • SHA512

    fd31ee931b0ae973289df556c7d64fc79ff8b93517ff88ab4110e6332b0caf76a5946e5f6b289135956908d67c80b2c4895144ba2075eca4936a4a8d53d77821

  • SSDEEP

    1536:ikyVk7A87vk2hYuXRIk01fsJT/Feylb8J6SJl726RQSR+KRFR3RzR1URJrCiuiN7:jy8bXlDIylbK6ql9eSjb5ZXUf2iuOj2s

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 16 IoCs
  • Executes dropped EXE 8 IoCs
  • Loads dropped DLL 20 IoCs
  • Drops file in System32 directory 24 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 27 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8d92d30fcd26014705f0939f1d584bb0N.exe
    "C:\Users\Admin\AppData\Local\Temp\8d92d30fcd26014705f0939f1d584bb0N.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:296
    • C:\Windows\SysWOW64\Khjgel32.exe
      C:\Windows\system32\Khjgel32.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2764
      • C:\Windows\SysWOW64\Kocpbfei.exe
        C:\Windows\system32\Kocpbfei.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2696
        • C:\Windows\SysWOW64\Kmfpmc32.exe
          C:\Windows\system32\Kmfpmc32.exe
          4⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:2740
          • C:\Windows\SysWOW64\Kenhopmf.exe
            C:\Windows\system32\Kenhopmf.exe
            5⤵
            • Adds autorun key to be loaded by Explorer.exe on startup
            • Executes dropped EXE
            • Loads dropped DLL
            • Drops file in System32 directory
            • System Location Discovery: System Language Discovery
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:1256
            • C:\Windows\SysWOW64\Kadica32.exe
              C:\Windows\system32\Kadica32.exe
              6⤵
              • Adds autorun key to be loaded by Explorer.exe on startup
              • Executes dropped EXE
              • Loads dropped DLL
              • Drops file in System32 directory
              • System Location Discovery: System Language Discovery
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:2604
              • C:\Windows\SysWOW64\Kpieengb.exe
                C:\Windows\system32\Kpieengb.exe
                7⤵
                • Adds autorun key to be loaded by Explorer.exe on startup
                • Executes dropped EXE
                • Loads dropped DLL
                • Drops file in System32 directory
                • System Location Discovery: System Language Discovery
                • Modifies registry class
                • Suspicious use of WriteProcessMemory
                PID:1808
                • C:\Windows\SysWOW64\Kbhbai32.exe
                  C:\Windows\system32\Kbhbai32.exe
                  8⤵
                  • Adds autorun key to be loaded by Explorer.exe on startup
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Drops file in System32 directory
                  • System Location Discovery: System Language Discovery
                  • Modifies registry class
                  • Suspicious use of WriteProcessMemory
                  PID:2912
                  • C:\Windows\SysWOW64\Lbjofi32.exe
                    C:\Windows\system32\Lbjofi32.exe
                    9⤵
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of WriteProcessMemory
                    PID:1708
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 1708 -s 140
                      10⤵
                      • Loads dropped DLL
                      • Program crash
                      PID:1620

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\Hhhamf32.dll

    Filesize

    7KB

    MD5

    ae153f78d7b29638d60b688ceadfae54

    SHA1

    a8948e8d9501f44efde7fc0d222419f5626afab1

    SHA256

    341c765c333728900149590817352dbf9616c68aa6745c022397435e5ab6c8c1

    SHA512

    189bc8ae73cd5f034ebb6471e818d27749af760e64495660fd011c03d620906b1184dbd5fb5c62b5dd2da4e10473aaf8e1ecb95e8ca66fcccddc50bc6bb2b238

  • C:\Windows\SysWOW64\Kadica32.exe

    Filesize

    89KB

    MD5

    ffe04bedcc4d455769671aab81c1fb7a

    SHA1

    be2d1f5e1cd98a0c61ec1cafe00a8d81f3ab2185

    SHA256

    a9a4ed949a0ba637aeb5e05d3e8d2e2ae9b6c4596c57379c8b76a932ea52b3de

    SHA512

    92a724c7540ca40a396d30c6a8a3d28117f915e4759def96225f65a83856b50e5df9a0b3de6c3c22e7a372dcb0500655f0133e1a11916199d42efc19c8b8d822

  • C:\Windows\SysWOW64\Kbhbai32.exe

    Filesize

    89KB

    MD5

    f10d847fabcb3286edec6abfb79fa719

    SHA1

    96698a2e57e7f4ea82de35da3390c511d00870fd

    SHA256

    34a345a4c5f67246ba249c2f8939fef1ade1cce35309dcab56f2aa3e66074d33

    SHA512

    0a0b25251bca0a05845358766976732041281d942d26600263f445fa3f9ebb7962459513fc4aaa769e6c714738aa27e7a48f5995730e68629079ef9a3169f50e

  • C:\Windows\SysWOW64\Kenhopmf.exe

    Filesize

    89KB

    MD5

    a13cf2cc91effa37a9d5c8c908f58b13

    SHA1

    98f41df00c3207866b3f2a3bce23ae9ce2d3ef25

    SHA256

    adc1586dd7fefd02b7484fb6e095d5e434659536b87622bed406673d90610ae0

    SHA512

    8d778c8f6434cd8c431579a7e0fbc706fc7c17f37da7606464ad48d3506141a377a7a602246daef83f27578043e2785f2d6366f9f76dbf8eb04d093903083336

  • C:\Windows\SysWOW64\Khjgel32.exe

    Filesize

    89KB

    MD5

    9e65f5ab3b4fbdd680bf5f03b708137d

    SHA1

    9d719018cd796912bc40865558cfbdc3b683d9e2

    SHA256

    12572fff5c4fc80683c7dee4746fa9b8d9a0edaede6b9b3c08585f114c431b89

    SHA512

    0b55c405a933cc113f689de99aad66eb14261ea5e4dfce0098ee36e79b37850b52465d739f0b5486e4381550301252f7b72f570e95b37662ac860d267dffd672

  • C:\Windows\SysWOW64\Kocpbfei.exe

    Filesize

    89KB

    MD5

    446c337239459b02498a7e65745cd391

    SHA1

    6dde6609c4ce41903b56e35dab89294b94eb52be

    SHA256

    421abaaccb0e871ee6c0fe371079e9372228fa40ea48eef5bf9fa8085c4f8553

    SHA512

    9de769063fe0834839940363c905252117be1adff36550873a086b1d32c86b901835bf829adbd5cb44ac785573e2522ee76a127bd22b71feee91daad2169d942

  • \Windows\SysWOW64\Kmfpmc32.exe

    Filesize

    89KB

    MD5

    30dd34cb4894faacdef035f6b0d4fbb2

    SHA1

    060c421def08a0dd2d3209fd2eaae7d5b0519360

    SHA256

    38ce1bf0f2e369a2bd943ae98f5c0bb9f7c718ff768e7abfb326d5d2c3b01677

    SHA512

    4fbbcd28235006955d2e2d3b68d6cc449662c0a8e1d6b9f33ef835edd81142e6de414d832ee1092f25a471b724d59e5da9d1c3ea4a2c06bb27f1c488cc31f339

  • \Windows\SysWOW64\Kpieengb.exe

    Filesize

    89KB

    MD5

    9da6ae5c7376f16cb4e1da4ee6045339

    SHA1

    1214eddb2d12dd9e6885757bb0c4b55b2c4839c1

    SHA256

    9e6c18330d6f1f59642ca212212f253604e3e82a25c416e42770730cb20aca83

    SHA512

    56670e6ae2cd85b3b1daa99032940e2794d12f6a46ea0cda46ea62db83ac895f32de0545c5482fedb5a57236fae962a1b68ef883dbbe152f0579a2fcb537bfea

  • \Windows\SysWOW64\Lbjofi32.exe

    Filesize

    89KB

    MD5

    f011fcaf2e95ca27d01bf6df3c56ba8e

    SHA1

    b8aaa0a7b36414077fd5bcd60046769edf298e25

    SHA256

    03c60c2fdc66a12eaf23ba7cae00ee58075b7355efa00fe353dce06daa6f587a

    SHA512

    a0d31fa3c15956a981d533a6ca93108a7372aa17db4c1c553882c631b1be738b31ca8e63c10b806358c2b6f3312e61121b34c73f8661f9608d44919fcd70a453

  • memory/296-13-0x0000000000290000-0x00000000002D1000-memory.dmp

    Filesize

    260KB

  • memory/296-0-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/296-70-0x0000000000290000-0x00000000002D1000-memory.dmp

    Filesize

    260KB

  • memory/296-69-0x0000000000290000-0x00000000002D1000-memory.dmp

    Filesize

    260KB

  • memory/296-12-0x0000000000290000-0x00000000002D1000-memory.dmp

    Filesize

    260KB

  • memory/296-61-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/1256-60-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/1256-125-0x0000000000260000-0x00000000002A1000-memory.dmp

    Filesize

    260KB

  • memory/1256-72-0x0000000000260000-0x00000000002A1000-memory.dmp

    Filesize

    260KB

  • memory/1256-126-0x0000000000260000-0x00000000002A1000-memory.dmp

    Filesize

    260KB

  • memory/1708-120-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/1808-129-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/1808-102-0x0000000000270000-0x00000000002B1000-memory.dmp

    Filesize

    260KB

  • memory/1808-90-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/1808-130-0x0000000000270000-0x00000000002B1000-memory.dmp

    Filesize

    260KB

  • memory/2604-127-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/2604-73-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/2604-86-0x00000000002E0000-0x0000000000321000-memory.dmp

    Filesize

    260KB

  • memory/2604-85-0x00000000002E0000-0x0000000000321000-memory.dmp

    Filesize

    260KB

  • memory/2604-128-0x00000000002E0000-0x0000000000321000-memory.dmp

    Filesize

    260KB

  • memory/2696-40-0x0000000000450000-0x0000000000491000-memory.dmp

    Filesize

    260KB

  • memory/2696-87-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/2740-111-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/2740-117-0x0000000000450000-0x0000000000491000-memory.dmp

    Filesize

    260KB

  • memory/2740-118-0x0000000000450000-0x0000000000491000-memory.dmp

    Filesize

    260KB

  • memory/2740-42-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/2764-71-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/2764-22-0x0000000000320000-0x0000000000361000-memory.dmp

    Filesize

    260KB

  • memory/2764-28-0x0000000000320000-0x0000000000361000-memory.dmp

    Filesize

    260KB

  • memory/2764-14-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/2912-119-0x00000000003B0000-0x00000000003F1000-memory.dmp

    Filesize

    260KB

  • memory/2912-103-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/2912-131-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/2912-132-0x00000000003B0000-0x00000000003F1000-memory.dmp

    Filesize

    260KB