Analysis
-
max time kernel
113s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30/09/2024, 16:01
Static task
static1
Behavioral task
behavioral1
Sample
2d5b6ee9858a3b2557f78df99001fc53811b39d1807351d9151e30f04bd8be47N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2d5b6ee9858a3b2557f78df99001fc53811b39d1807351d9151e30f04bd8be47N.exe
Resource
win10v2004-20240802-en
General
-
Target
2d5b6ee9858a3b2557f78df99001fc53811b39d1807351d9151e30f04bd8be47N.exe
-
Size
319KB
-
MD5
7a7e7b05ca9c35113a068ff0b4fc33e0
-
SHA1
eba6421c9599d2c77341a1eb3dbf8dda0a9b7230
-
SHA256
2d5b6ee9858a3b2557f78df99001fc53811b39d1807351d9151e30f04bd8be47
-
SHA512
801a4c9d62303926190a1db4323c9ce3c220d646dacb14c8b84eddd774ba0f88a0dd1a5557878a33a90687125c6c87da5a2df941b6a7209aba4bc5b9360ad599
-
SSDEEP
6144:MEcCB+jGHvHlp4PlXj4IyqrQ///NR5fLYG3eujPQ///NR5f:aCGG/7YxxC/NcZ7/N
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ncnlnaim.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ncnlnaim.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 2d5b6ee9858a3b2557f78df99001fc53811b39d1807351d9151e30f04bd8be47N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" 2d5b6ee9858a3b2557f78df99001fc53811b39d1807351d9151e30f04bd8be47N.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mmkafhnb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mmkafhnb.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nogmin32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nogmin32.exe -
Executes dropped EXE 4 IoCs
pid Process 3028 Mmkafhnb.exe 2760 Nogmin32.exe 2828 Ncnlnaim.exe 1916 Opblgehg.exe -
Loads dropped DLL 12 IoCs
pid Process 2320 2d5b6ee9858a3b2557f78df99001fc53811b39d1807351d9151e30f04bd8be47N.exe 2320 2d5b6ee9858a3b2557f78df99001fc53811b39d1807351d9151e30f04bd8be47N.exe 3028 Mmkafhnb.exe 3028 Mmkafhnb.exe 2760 Nogmin32.exe 2760 Nogmin32.exe 2828 Ncnlnaim.exe 2828 Ncnlnaim.exe 2556 WerFault.exe 2556 WerFault.exe 2556 WerFault.exe 2556 WerFault.exe -
Drops file in System32 directory 12 IoCs
description ioc Process File created C:\Windows\SysWOW64\Ajenah32.dll 2d5b6ee9858a3b2557f78df99001fc53811b39d1807351d9151e30f04bd8be47N.exe File opened for modification C:\Windows\SysWOW64\Nogmin32.exe Mmkafhnb.exe File created C:\Windows\SysWOW64\Ojqeofnd.dll Mmkafhnb.exe File created C:\Windows\SysWOW64\Ncnlnaim.exe Nogmin32.exe File created C:\Windows\SysWOW64\Gcjajedk.dll Nogmin32.exe File opened for modification C:\Windows\SysWOW64\Opblgehg.exe Ncnlnaim.exe File created C:\Windows\SysWOW64\Mmkafhnb.exe 2d5b6ee9858a3b2557f78df99001fc53811b39d1807351d9151e30f04bd8be47N.exe File created C:\Windows\SysWOW64\Nogmin32.exe Mmkafhnb.exe File opened for modification C:\Windows\SysWOW64\Ncnlnaim.exe Nogmin32.exe File created C:\Windows\SysWOW64\Opblgehg.exe Ncnlnaim.exe File created C:\Windows\SysWOW64\Ahmjfimi.dll Ncnlnaim.exe File opened for modification C:\Windows\SysWOW64\Mmkafhnb.exe 2d5b6ee9858a3b2557f78df99001fc53811b39d1807351d9151e30f04bd8be47N.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2556 1916 WerFault.exe 33 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mmkafhnb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nogmin32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ncnlnaim.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Opblgehg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2d5b6ee9858a3b2557f78df99001fc53811b39d1807351d9151e30f04bd8be47N.exe -
Modifies registry class 15 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ajenah32.dll" 2d5b6ee9858a3b2557f78df99001fc53811b39d1807351d9151e30f04bd8be47N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" 2d5b6ee9858a3b2557f78df99001fc53811b39d1807351d9151e30f04bd8be47N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ojqeofnd.dll" Mmkafhnb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nogmin32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ahmjfimi.dll" Ncnlnaim.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mmkafhnb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gcjajedk.dll" Nogmin32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ncnlnaim.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 2d5b6ee9858a3b2557f78df99001fc53811b39d1807351d9151e30f04bd8be47N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} 2d5b6ee9858a3b2557f78df99001fc53811b39d1807351d9151e30f04bd8be47N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nogmin32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ncnlnaim.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node 2d5b6ee9858a3b2557f78df99001fc53811b39d1807351d9151e30f04bd8be47N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID 2d5b6ee9858a3b2557f78df99001fc53811b39d1807351d9151e30f04bd8be47N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mmkafhnb.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2320 wrote to memory of 3028 2320 2d5b6ee9858a3b2557f78df99001fc53811b39d1807351d9151e30f04bd8be47N.exe 30 PID 2320 wrote to memory of 3028 2320 2d5b6ee9858a3b2557f78df99001fc53811b39d1807351d9151e30f04bd8be47N.exe 30 PID 2320 wrote to memory of 3028 2320 2d5b6ee9858a3b2557f78df99001fc53811b39d1807351d9151e30f04bd8be47N.exe 30 PID 2320 wrote to memory of 3028 2320 2d5b6ee9858a3b2557f78df99001fc53811b39d1807351d9151e30f04bd8be47N.exe 30 PID 3028 wrote to memory of 2760 3028 Mmkafhnb.exe 31 PID 3028 wrote to memory of 2760 3028 Mmkafhnb.exe 31 PID 3028 wrote to memory of 2760 3028 Mmkafhnb.exe 31 PID 3028 wrote to memory of 2760 3028 Mmkafhnb.exe 31 PID 2760 wrote to memory of 2828 2760 Nogmin32.exe 32 PID 2760 wrote to memory of 2828 2760 Nogmin32.exe 32 PID 2760 wrote to memory of 2828 2760 Nogmin32.exe 32 PID 2760 wrote to memory of 2828 2760 Nogmin32.exe 32 PID 2828 wrote to memory of 1916 2828 Ncnlnaim.exe 33 PID 2828 wrote to memory of 1916 2828 Ncnlnaim.exe 33 PID 2828 wrote to memory of 1916 2828 Ncnlnaim.exe 33 PID 2828 wrote to memory of 1916 2828 Ncnlnaim.exe 33 PID 1916 wrote to memory of 2556 1916 Opblgehg.exe 34 PID 1916 wrote to memory of 2556 1916 Opblgehg.exe 34 PID 1916 wrote to memory of 2556 1916 Opblgehg.exe 34 PID 1916 wrote to memory of 2556 1916 Opblgehg.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\2d5b6ee9858a3b2557f78df99001fc53811b39d1807351d9151e30f04bd8be47N.exe"C:\Users\Admin\AppData\Local\Temp\2d5b6ee9858a3b2557f78df99001fc53811b39d1807351d9151e30f04bd8be47N.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Windows\SysWOW64\Mmkafhnb.exeC:\Windows\system32\Mmkafhnb.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\SysWOW64\Nogmin32.exeC:\Windows\system32\Nogmin32.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\SysWOW64\Ncnlnaim.exeC:\Windows\system32\Ncnlnaim.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\SysWOW64\Opblgehg.exeC:\Windows\system32\Opblgehg.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1916 -s 1406⤵
- Loads dropped DLL
- Program crash
PID:2556
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
319KB
MD5687eb20bbdf99c08b04d97f8b168f78e
SHA108e87ba2def12d3dc4007f25880fa3ade9c4f6c6
SHA2563bfc25457c9e866c1256dd3256028bdcf98303d24d158a3dc71ea06d2ee40dc9
SHA512c7edb150c4f2b791bf773416d1d4070926f696f9ca09bcbce2a998b1e4c0683965a45cfd4acf1015c137a9751df1f4707e5062f8be4f18768ad5ee1753f06a47
-
Filesize
319KB
MD5c655e99fa43cb1a836c667c38fe1d07b
SHA161ebff74fe729e81b90ef7dd799194790b9e6bcc
SHA2561bb5b325430dfc4f39d6ad3199b559ac4cf7fcf10f547dff006ea3f3a6d2f7a6
SHA512b0f5951387e9fadbc8d7e65fde848edaae7adf4f1b266c7147e29230da50b12dd562d9dfc535a6a003abb98db29cc08d3a2766355ccef49b7caf4a1590edd805
-
Filesize
319KB
MD52831bc0b58d120ec39f68e09a6eabead
SHA1b1886c951bb15ac597633cdc046a54f5e0802941
SHA2568abbd2673537c889cbbbc3919da296c7674561716dfd9c69818909ecd01d2efb
SHA512edcd002b22e71b8e3bd4856818df480ad96af9efa805718a08528410819d8f81247eae98b521936a20d6b170dbed83ae6b11efda937630502c64c683a9269aa8
-
Filesize
319KB
MD594b1845c67dd5e2fdb0bd1d7deeea737
SHA160702bcd93d610c246e8636faf20918b03548e03
SHA2569780eaf038b5bc1f30ee12a9ecb19bf70bc6d600fb90062b4608eca673734ae4
SHA51236cefb3997327958ba9ae6b1612bd609087d7a236a544c7c2feb7d0286b408f1eb71147ab5cb8683181f3711d48aac95f48eea3b3000fc5fdd36138dfd71a5ac