Analysis
-
max time kernel
143s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
26-11-2022 08:59
Static task
static1
Behavioral task
behavioral1
Sample
c8a7af2d91f1b22cc8bc59070e246f6d7bd1a91a45d9729db3a373fb6ce4b198.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c8a7af2d91f1b22cc8bc59070e246f6d7bd1a91a45d9729db3a373fb6ce4b198.exe
Resource
win10v2004-20220901-en
General
-
Target
c8a7af2d91f1b22cc8bc59070e246f6d7bd1a91a45d9729db3a373fb6ce4b198.exe
-
Size
45KB
-
MD5
3e70d9a82e68af43f27dbde3a7492490
-
SHA1
4e46ebea70e6fbecdba8d274daeb43f9b9bdf9f3
-
SHA256
c8a7af2d91f1b22cc8bc59070e246f6d7bd1a91a45d9729db3a373fb6ce4b198
-
SHA512
5e0aed6c743535aba1470149da064f9a9cd18d57202479cc552181687969fd2949a438f74358a0ac63c053ef7fdb6c38040660cfbd078f73ac6ac07e89e9c1b6
-
SSDEEP
768:XZwb9TV5ZDzu83AqN1LZNneGcRnks/iaeS9rmJIga9/U/1H5:XZwb9TvZ3wqnL67RnkMVmeq
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 2 IoCs
Processes:
c8a7af2d91f1b22cc8bc59070e246f6d7bd1a91a45d9729db3a373fb6ce4b198.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad c8a7af2d91f1b22cc8bc59070e246f6d7bd1a91a45d9729db3a373fb6ce4b198.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" c8a7af2d91f1b22cc8bc59070e246f6d7bd1a91a45d9729db3a373fb6ce4b198.exe -
Executes dropped EXE 1 IoCs
Processes:
Gbmqkm32.exepid process 1940 Gbmqkm32.exe -
Loads dropped DLL 2 IoCs
Processes:
c8a7af2d91f1b22cc8bc59070e246f6d7bd1a91a45d9729db3a373fb6ce4b198.exepid process 1760 c8a7af2d91f1b22cc8bc59070e246f6d7bd1a91a45d9729db3a373fb6ce4b198.exe 1760 c8a7af2d91f1b22cc8bc59070e246f6d7bd1a91a45d9729db3a373fb6ce4b198.exe -
Drops file in System32 directory 3 IoCs
Processes:
c8a7af2d91f1b22cc8bc59070e246f6d7bd1a91a45d9729db3a373fb6ce4b198.exedescription ioc process File created C:\Windows\SysWOW64\Gbmqkm32.exe c8a7af2d91f1b22cc8bc59070e246f6d7bd1a91a45d9729db3a373fb6ce4b198.exe File opened for modification C:\Windows\SysWOW64\Gbmqkm32.exe c8a7af2d91f1b22cc8bc59070e246f6d7bd1a91a45d9729db3a373fb6ce4b198.exe File created C:\Windows\SysWOW64\Cmnakm32.dll c8a7af2d91f1b22cc8bc59070e246f6d7bd1a91a45d9729db3a373fb6ce4b198.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
Gbmqkm32.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\BrowseNewProcess Gbmqkm32.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\BrowseNewProcess\BrowseNewProcess = "yes" Gbmqkm32.exe -
Modifies registry class 6 IoCs
Processes:
c8a7af2d91f1b22cc8bc59070e246f6d7bd1a91a45d9729db3a373fb6ce4b198.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 c8a7af2d91f1b22cc8bc59070e246f6d7bd1a91a45d9729db3a373fb6ce4b198.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node c8a7af2d91f1b22cc8bc59070e246f6d7bd1a91a45d9729db3a373fb6ce4b198.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID c8a7af2d91f1b22cc8bc59070e246f6d7bd1a91a45d9729db3a373fb6ce4b198.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} c8a7af2d91f1b22cc8bc59070e246f6d7bd1a91a45d9729db3a373fb6ce4b198.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cmnakm32.dll" c8a7af2d91f1b22cc8bc59070e246f6d7bd1a91a45d9729db3a373fb6ce4b198.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" c8a7af2d91f1b22cc8bc59070e246f6d7bd1a91a45d9729db3a373fb6ce4b198.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Gbmqkm32.exepid process 1940 Gbmqkm32.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
c8a7af2d91f1b22cc8bc59070e246f6d7bd1a91a45d9729db3a373fb6ce4b198.exedescription pid process target process PID 1760 wrote to memory of 1940 1760 c8a7af2d91f1b22cc8bc59070e246f6d7bd1a91a45d9729db3a373fb6ce4b198.exe Gbmqkm32.exe PID 1760 wrote to memory of 1940 1760 c8a7af2d91f1b22cc8bc59070e246f6d7bd1a91a45d9729db3a373fb6ce4b198.exe Gbmqkm32.exe PID 1760 wrote to memory of 1940 1760 c8a7af2d91f1b22cc8bc59070e246f6d7bd1a91a45d9729db3a373fb6ce4b198.exe Gbmqkm32.exe PID 1760 wrote to memory of 1940 1760 c8a7af2d91f1b22cc8bc59070e246f6d7bd1a91a45d9729db3a373fb6ce4b198.exe Gbmqkm32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c8a7af2d91f1b22cc8bc59070e246f6d7bd1a91a45d9729db3a373fb6ce4b198.exe"C:\Users\Admin\AppData\Local\Temp\c8a7af2d91f1b22cc8bc59070e246f6d7bd1a91a45d9729db3a373fb6ce4b198.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Gbmqkm32.exeC:\Windows\system32\Gbmqkm32.exe2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious behavior: GetForegroundWindowSpam
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\SysWOW64\Gbmqkm32.exeFilesize
45KB
MD527adae0e6d1afa6486ccf76472d385f7
SHA143ca9be623bf125311669f5b26cf4e1596af4313
SHA2566989f7207253208d93763281e91ce9d74f8a1b0163f80dcbd6cb0069f0c91f8c
SHA5122465107d16ac40afb7aeedf48172a0d80bdc4377d1bca4d246920a8f461d0556c5f852d40cebc47d3bc3dd85ae49c8f4adbafe083c89e8026432ab6a2b96f64c
-
\Windows\SysWOW64\Gbmqkm32.exeFilesize
45KB
MD527adae0e6d1afa6486ccf76472d385f7
SHA143ca9be623bf125311669f5b26cf4e1596af4313
SHA2566989f7207253208d93763281e91ce9d74f8a1b0163f80dcbd6cb0069f0c91f8c
SHA5122465107d16ac40afb7aeedf48172a0d80bdc4377d1bca4d246920a8f461d0556c5f852d40cebc47d3bc3dd85ae49c8f4adbafe083c89e8026432ab6a2b96f64c
-
\Windows\SysWOW64\Gbmqkm32.exeFilesize
45KB
MD527adae0e6d1afa6486ccf76472d385f7
SHA143ca9be623bf125311669f5b26cf4e1596af4313
SHA2566989f7207253208d93763281e91ce9d74f8a1b0163f80dcbd6cb0069f0c91f8c
SHA5122465107d16ac40afb7aeedf48172a0d80bdc4377d1bca4d246920a8f461d0556c5f852d40cebc47d3bc3dd85ae49c8f4adbafe083c89e8026432ab6a2b96f64c
-
memory/1760-59-0x0000000000430000-0x000000000045F000-memory.dmpFilesize
188KB
-
memory/1760-58-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1940-56-0x0000000000000000-mapping.dmp
-
memory/1940-60-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1940-61-0x0000000076181000-0x0000000076183000-memory.dmpFilesize
8KB
-
memory/1940-62-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB