Analysis
-
max time kernel
31s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
01/10/2024, 21:39
Static task
static1
Behavioral task
behavioral1
Sample
2ea01f698fec762266a203be338a500da4be210522487fa725edd055b7135e9eN.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2ea01f698fec762266a203be338a500da4be210522487fa725edd055b7135e9eN.exe
Resource
win10v2004-20240802-en
General
-
Target
2ea01f698fec762266a203be338a500da4be210522487fa725edd055b7135e9eN.exe
-
Size
96KB
-
MD5
b5a0edbb1dbf63ace6087985f676c010
-
SHA1
a6a3e3413fe891b084c43b12dc57576febc9b648
-
SHA256
2ea01f698fec762266a203be338a500da4be210522487fa725edd055b7135e9e
-
SHA512
d1e915cf5d05945fae1d875557de2f747df482934f435efb4e86a3c1048ca0f38a41ae060b2245991526eb7ca6793ccca02de922e06d7dd2680f6ad1c8bfec04
-
SSDEEP
1536:dmA6dgGQVlOTofS0pgI3znJpiYp4B5FIDgIZE7H8uZn9tE98rktaAjWbjtKBvU:dmA6dmlOfJI3znr4hIkxn8IktVwtCU
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nodgel32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Nodgel32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ngkogj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ngkogj32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nhllob32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Nhllob32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 2ea01f698fec762266a203be338a500da4be210522487fa725edd055b7135e9eN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" 2ea01f698fec762266a203be338a500da4be210522487fa725edd055b7135e9eN.exe -
Executes dropped EXE 4 IoCs
pid Process 2784 Nodgel32.exe 2928 Ngkogj32.exe 2600 Nhllob32.exe 2576 Nlhgoqhh.exe -
Loads dropped DLL 12 IoCs
pid Process 2160 2ea01f698fec762266a203be338a500da4be210522487fa725edd055b7135e9eN.exe 2160 2ea01f698fec762266a203be338a500da4be210522487fa725edd055b7135e9eN.exe 2784 Nodgel32.exe 2784 Nodgel32.exe 2928 Ngkogj32.exe 2928 Ngkogj32.exe 2600 Nhllob32.exe 2600 Nhllob32.exe 2696 WerFault.exe 2696 WerFault.exe 2696 WerFault.exe 2696 WerFault.exe -
Drops file in System32 directory 12 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Nlhgoqhh.exe Nhllob32.exe File created C:\Windows\SysWOW64\Lamajm32.dll Nhllob32.exe File opened for modification C:\Windows\SysWOW64\Ngkogj32.exe Nodgel32.exe File created C:\Windows\SysWOW64\Nhllob32.exe Ngkogj32.exe File opened for modification C:\Windows\SysWOW64\Nhllob32.exe Ngkogj32.exe File created C:\Windows\SysWOW64\Fhhiii32.dll Ngkogj32.exe File created C:\Windows\SysWOW64\Kklcab32.dll Nodgel32.exe File created C:\Windows\SysWOW64\Nlhgoqhh.exe Nhllob32.exe File created C:\Windows\SysWOW64\Nodgel32.exe 2ea01f698fec762266a203be338a500da4be210522487fa725edd055b7135e9eN.exe File opened for modification C:\Windows\SysWOW64\Nodgel32.exe 2ea01f698fec762266a203be338a500da4be210522487fa725edd055b7135e9eN.exe File created C:\Windows\SysWOW64\Cnjgia32.dll 2ea01f698fec762266a203be338a500da4be210522487fa725edd055b7135e9eN.exe File created C:\Windows\SysWOW64\Ngkogj32.exe Nodgel32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2696 2576 WerFault.exe 33 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ngkogj32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nhllob32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nlhgoqhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2ea01f698fec762266a203be338a500da4be210522487fa725edd055b7135e9eN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nodgel32.exe -
Modifies registry class 15 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ngkogj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 2ea01f698fec762266a203be338a500da4be210522487fa725edd055b7135e9eN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node 2ea01f698fec762266a203be338a500da4be210522487fa725edd055b7135e9eN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Nodgel32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ngkogj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID 2ea01f698fec762266a203be338a500da4be210522487fa725edd055b7135e9eN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" 2ea01f698fec762266a203be338a500da4be210522487fa725edd055b7135e9eN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lamajm32.dll" Nhllob32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cnjgia32.dll" 2ea01f698fec762266a203be338a500da4be210522487fa725edd055b7135e9eN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kklcab32.dll" Nodgel32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fhhiii32.dll" Ngkogj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Nhllob32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Nhllob32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717} 2ea01f698fec762266a203be338a500da4be210522487fa725edd055b7135e9eN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Nodgel32.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2160 wrote to memory of 2784 2160 2ea01f698fec762266a203be338a500da4be210522487fa725edd055b7135e9eN.exe 30 PID 2160 wrote to memory of 2784 2160 2ea01f698fec762266a203be338a500da4be210522487fa725edd055b7135e9eN.exe 30 PID 2160 wrote to memory of 2784 2160 2ea01f698fec762266a203be338a500da4be210522487fa725edd055b7135e9eN.exe 30 PID 2160 wrote to memory of 2784 2160 2ea01f698fec762266a203be338a500da4be210522487fa725edd055b7135e9eN.exe 30 PID 2784 wrote to memory of 2928 2784 Nodgel32.exe 31 PID 2784 wrote to memory of 2928 2784 Nodgel32.exe 31 PID 2784 wrote to memory of 2928 2784 Nodgel32.exe 31 PID 2784 wrote to memory of 2928 2784 Nodgel32.exe 31 PID 2928 wrote to memory of 2600 2928 Ngkogj32.exe 32 PID 2928 wrote to memory of 2600 2928 Ngkogj32.exe 32 PID 2928 wrote to memory of 2600 2928 Ngkogj32.exe 32 PID 2928 wrote to memory of 2600 2928 Ngkogj32.exe 32 PID 2600 wrote to memory of 2576 2600 Nhllob32.exe 33 PID 2600 wrote to memory of 2576 2600 Nhllob32.exe 33 PID 2600 wrote to memory of 2576 2600 Nhllob32.exe 33 PID 2600 wrote to memory of 2576 2600 Nhllob32.exe 33 PID 2576 wrote to memory of 2696 2576 Nlhgoqhh.exe 34 PID 2576 wrote to memory of 2696 2576 Nlhgoqhh.exe 34 PID 2576 wrote to memory of 2696 2576 Nlhgoqhh.exe 34 PID 2576 wrote to memory of 2696 2576 Nlhgoqhh.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\2ea01f698fec762266a203be338a500da4be210522487fa725edd055b7135e9eN.exe"C:\Users\Admin\AppData\Local\Temp\2ea01f698fec762266a203be338a500da4be210522487fa725edd055b7135e9eN.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Windows\SysWOW64\Nodgel32.exeC:\Windows\system32\Nodgel32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\SysWOW64\Ngkogj32.exeC:\Windows\system32\Ngkogj32.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Windows\SysWOW64\Nhllob32.exeC:\Windows\system32\Nhllob32.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Windows\SysWOW64\Nlhgoqhh.exeC:\Windows\system32\Nlhgoqhh.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2576 -s 1406⤵
- Loads dropped DLL
- Program crash
PID:2696
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5452dfa1ab0399980a816a473a2ab94f4
SHA19ce07a0b1114277e940f57a6f218b4171cdb5dcb
SHA2563de95b923fa0852177301cde2931ec2ad7a8639a68eda212f077da0614185f82
SHA512f8e14feb6efd10e4bc5cc810d5b07ff45ed9bd73ca58b32f1fe2f4db43fa8cdb164a87ef3b4f5bda41ed69c67ddc5d66fd289ea5145f8152e48725fbb22ac344
-
Filesize
96KB
MD5347e967e19ac478bff707db29d82c5fc
SHA115376cb2d810089af90597174c127c169276dca7
SHA256c1b3ab9afeb2ebc3d0ad9947b61faf6ff89c67fbf94523d08df1c17484919e85
SHA51286c09691b70b95754f90ad470dc7ba6e2c6d5af05365001bbe9476ae3e5ff65a2f27613d6b58895ca2b09c630a2b610079c0f05037a31d44f6b5fc36216e39c8
-
Filesize
96KB
MD5bc57e5d62174b4529d275556b6f3fb69
SHA1f43a397678524375161c23d1390dc182d0d61fa5
SHA256aa8e7d10a909bf0877f1246ba49b9c8ec437f03c9466bc0c8637501d1ba2f617
SHA512580f0a1efec2d877437fd5cb6d394d5368d9ed32f71a182c973064161ee314ba911ba069229ccfc6632a0cfbb1b5209cfaa1ca451327313d95e57782a17fc2da
-
Filesize
96KB
MD5c7487e4c4f82140b18b68a56dd51c28e
SHA154add18309829bdb0c21daf26c12888b05fddab2
SHA256c1ad406258a74961ae4f12146a148e57f05d1bc192267d46af5f2237ad979f0d
SHA512853442756175b06c908abc20ced7faacd52f705c85c7441f96b7b317f903b4db33f6253112395b38bcea1fcbd145cd82df6daee88591257c033f6da03e00f45f