Analysis

  • max time kernel
    66s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    19/11/2024, 19:38

General

  • Target

    5983abd65865ee5685fd78718adc05131d003737d80c9ded49e56ef8b0172a40.exe

  • Size

    295KB

  • MD5

    64495369fbd2056b65464e32659b9c50

  • SHA1

    420d9d23077df435ff45b655387fa2aaaa50c4d0

  • SHA256

    5983abd65865ee5685fd78718adc05131d003737d80c9ded49e56ef8b0172a40

  • SHA512

    a7781bada599e86d627a3b2992e98567806aa70dd190068d971e3c7ebf020832a4fdaf5f6e3da8113f88920785fe9bb27d3611135067440e047392ab8f4bdb8c

  • SSDEEP

    6144:7o+mlpuj5Fd1PY1PRe19V+tbFOLM77OLY:8jp+6fe0tsN0

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 10 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 14 IoCs
  • Drops file in System32 directory 15 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 18 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5983abd65865ee5685fd78718adc05131d003737d80c9ded49e56ef8b0172a40.exe
    "C:\Users\Admin\AppData\Local\Temp\5983abd65865ee5685fd78718adc05131d003737d80c9ded49e56ef8b0172a40.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1680
    • C:\Windows\SysWOW64\Eddjhb32.exe
      C:\Windows\system32\Eddjhb32.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2908
      • C:\Windows\SysWOW64\Eqkjmcmq.exe
        C:\Windows\system32\Eqkjmcmq.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2944
        • C:\Windows\SysWOW64\Egebjmdn.exe
          C:\Windows\system32\Egebjmdn.exe
          4⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:2848
          • C:\Windows\SysWOW64\Fnjnkkbk.exe
            C:\Windows\system32\Fnjnkkbk.exe
            5⤵
            • Adds autorun key to be loaded by Explorer.exe on startup
            • Executes dropped EXE
            • Loads dropped DLL
            • Drops file in System32 directory
            • System Location Discovery: System Language Discovery
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:2676
            • C:\Windows\SysWOW64\Flnndp32.exe
              C:\Windows\system32\Flnndp32.exe
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:2180
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2180 -s 140
                7⤵
                • Loads dropped DLL
                • Program crash
                PID:2412

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\Eqkjmcmq.exe

    Filesize

    295KB

    MD5

    fa856d1348698030f0aba8fc24bd74a8

    SHA1

    ad08f1e518bd8afc39a198f79bd8603411f3cc27

    SHA256

    a67256bcf4fa6b9ceefb50b932a9975b492bc7e69cb1303c31cade04a2ba71ec

    SHA512

    364063f3bab34d9320b1558485b0d96157c4d07a51ce1f878a78e7d872019fccdb0ec64e74129f418fb0735a13bcac8b73f5b839801912fa638fde3e4ae67960

  • C:\Windows\SysWOW64\Flnndp32.exe

    Filesize

    295KB

    MD5

    d2043711cfe78fbc0b1b96c4edf5d3e6

    SHA1

    5d35af0f504c6b5a7db8ba53f4efcf56dfc75fca

    SHA256

    12fb096bc188c3137e964957839acd15c0dd727b703c16a6a9ed758c4ef2f24b

    SHA512

    75b6eaafca0152905ea2b2e7141ce5ef43d9bbc53d4f1e497745b55922e904a8512b68e4885fde05d5400ceaee0ad8698d80f81d67d89fbf19b7a0f34fc6dca3

  • C:\Windows\SysWOW64\Onndkg32.dll

    Filesize

    7KB

    MD5

    e8abd37c7677702cae6b16d4e95dee0b

    SHA1

    1acaae2ab49139ceb145e5dc30c72f99f71dfb1f

    SHA256

    479ae86b6b876183ff15ada6c06bd1b418eb88ee9efb2be50360aa408e430aec

    SHA512

    088ff95daec8139871ef7794e91f2a7daa156e27f0c4d861d204e87c666daead40635c5af92c36250cc762431d0a0b0825921515ff2d594e256d9591184a1fe8

  • \Windows\SysWOW64\Eddjhb32.exe

    Filesize

    295KB

    MD5

    1ad3e6a83cdfc89869d270563cb85708

    SHA1

    732ecc346303eeda81f35e79a2d666c19ec40c6e

    SHA256

    64f33c4b8ba6f4d3a3b72554a567b6d6c793f93dd8cfae758f5365a6e64ffa51

    SHA512

    e5bd6fd5f665bf88a29c2915158c7829dcfbaaac73b24967f766fa64c7d3d2fdde463be4ceec904e0a4e14723f737c23729486c2b446cf899141d70c6638987d

  • \Windows\SysWOW64\Egebjmdn.exe

    Filesize

    295KB

    MD5

    fa847967818b71f0539d17459188505b

    SHA1

    e5354da4212c86a61812bf0fef337648065cb656

    SHA256

    4ec9d45e6f6cf8d435912c720138c8da04f779e1d5719ff2bd6203a6e48a076d

    SHA512

    3dda8c0caf40cb8b3f8be6f85a1652c6dcf547ba1c42f34a19580142b8245ab71cc7c5ec55b5539494c2e12fef3e8c9fea32598417c7ea070d2606097efb8dd9

  • \Windows\SysWOW64\Fnjnkkbk.exe

    Filesize

    295KB

    MD5

    786f16f72b4fc7774dcca326f671b997

    SHA1

    9a8cf2b925e5389c6a405c49c0ac4aa086f77206

    SHA256

    42952913afa93291d58c441a9bfa01661c5122098370620098ee7170a838221b

    SHA512

    e2d415227e7a6b005d1cffb6b7598be166c3bb719ad0a6c665628fd74cac895a08c676049c7220a7a13b05168b20bb4d1a35d2002c0f2107b224292cfffe61f0

  • memory/1680-0-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/1680-12-0x0000000000220000-0x000000000027F000-memory.dmp

    Filesize

    380KB

  • memory/1680-76-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/1680-11-0x0000000000220000-0x000000000027F000-memory.dmp

    Filesize

    380KB

  • memory/2180-67-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/2180-72-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/2180-74-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/2676-80-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/2848-40-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/2848-53-0x0000000001BF0000-0x0000000001C4F000-memory.dmp

    Filesize

    380KB

  • memory/2848-52-0x0000000001BF0000-0x0000000001C4F000-memory.dmp

    Filesize

    380KB

  • memory/2848-77-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/2908-81-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/2908-19-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/2944-39-0x00000000002D0000-0x000000000032F000-memory.dmp

    Filesize

    380KB

  • memory/2944-83-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB