Analysis

  • max time kernel
    142s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    11/03/2024, 18:40

General

  • Target

    035ddc27b57ae620f0ca5f83760888ff1ba9851dcad06c2ba1bebf6a6be451d7.exe

  • Size

    771KB

  • MD5

    870a377db4740fb0cd8cf90dde87747d

  • SHA1

    05dae4a1c572722da762258b16101034980b42f4

  • SHA256

    035ddc27b57ae620f0ca5f83760888ff1ba9851dcad06c2ba1bebf6a6be451d7

  • SHA512

    9c58dc04a7ba0e77647240aa17f2b3a554608a09407bb698cc541c4fdd09ea6bd5fe1220f87f138b309afc764e1833c18bc61dcec3fcf55c2476ecfc7c06e395

  • SSDEEP

    12288:Bis15tLsDeuc8mJEp1cs15tLscgyP34Ab5xTs15tLsDeuc8mJEp1cs15tLs9:PyKuTkEbycgCbwyKuTkEby9

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 12 IoCs
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 16 IoCs
  • Drops file in System32 directory 18 IoCs
  • Program crash 1 IoCs
  • Modifies registry class 21 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\035ddc27b57ae620f0ca5f83760888ff1ba9851dcad06c2ba1bebf6a6be451d7.exe
    "C:\Users\Admin\AppData\Local\Temp\035ddc27b57ae620f0ca5f83760888ff1ba9851dcad06c2ba1bebf6a6be451d7.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Loads dropped DLL
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3012
    • C:\Windows\SysWOW64\Apalea32.exe
      C:\Windows\system32\Apalea32.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2152
      • C:\Windows\SysWOW64\Bnielm32.exe
        C:\Windows\system32\Bnielm32.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in System32 directory
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2616
        • C:\Windows\SysWOW64\Bonoflae.exe
          C:\Windows\system32\Bonoflae.exe
          4⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in System32 directory
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:2412
          • C:\Windows\SysWOW64\Bjdplm32.exe
            C:\Windows\system32\Bjdplm32.exe
            5⤵
            • Adds autorun key to be loaded by Explorer.exe on startup
            • Executes dropped EXE
            • Loads dropped DLL
            • Drops file in System32 directory
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:2736
            • C:\Windows\SysWOW64\Cphndc32.exe
              C:\Windows\system32\Cphndc32.exe
              6⤵
              • Adds autorun key to be loaded by Explorer.exe on startup
              • Executes dropped EXE
              • Loads dropped DLL
              • Drops file in System32 directory
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:2408
              • C:\Windows\SysWOW64\Ceegmj32.exe
                C:\Windows\system32\Ceegmj32.exe
                7⤵
                • Executes dropped EXE
                • Suspicious use of WriteProcessMemory
                PID:1804
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 1804 -s 140
                  8⤵
                  • Loads dropped DLL
                  • Program crash
                  PID:576

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\Apalea32.exe

    Filesize

    551KB

    MD5

    ce8d28b997b26ffc8d02f998f3a2c057

    SHA1

    33e67a1be42b2c1e052a4bbde4e26d7be68d8a50

    SHA256

    7117d046ac37ced665b74d1da1258016d11af5d81fa0d854410eafadca08c429

    SHA512

    1817b834730618b0b8d9e807dff65b5932f75e95105abb30a14ea649ad75785d0ea4e7fdc7773ff87ffc441e84ffed4af2e874e77ac31d111b8a01553b18a1cb

  • C:\Windows\SysWOW64\Apalea32.exe

    Filesize

    464KB

    MD5

    ffe23b3bb8ac6a18fe977e0bb0af873a

    SHA1

    b14a99ddcdf56c9a7ec48dcbe58fdd6c93f4578e

    SHA256

    9700e2b20fc0d2505c379ef74f16bc38a9f5e771cad797f0707f47f2dc63a6dc

    SHA512

    5eb8082db770d5da3c62900293f34731f9bf625c5d51c32cd9bc0c63d24535e79c37b631c5a19551fb81176a1a56dfde379f4c76ce281095f5c13b7fb22d3495

  • C:\Windows\SysWOW64\Apalea32.exe

    Filesize

    757KB

    MD5

    81dab3990321a5a7af47e950fa80bcc2

    SHA1

    a1efec7b4a6df673ce8cd81c54cdee9c80aeda3d

    SHA256

    294fbd4dcdf1a1e31e16b42a4da11a4e38a127963d087291f723a29d332fff12

    SHA512

    01cfe64b91c0e865656e2cb9e94d6735237296f320cf205a69624e360847552fa9668c985b6d0c5d5af8c9b2435ee707dcf47d2e5782621752c720bd03e26915

  • C:\Windows\SysWOW64\Bjdplm32.exe

    Filesize

    771KB

    MD5

    d281f7c9b5e2a30e9b3cb5c93d2bfa3b

    SHA1

    094c967f50e27f63a4e1aef6e97a3ed10d4246a6

    SHA256

    8e6e213eeb9bec861b2fda3afee906de250f9ff4034551bf5d7c42d447fd6788

    SHA512

    a95c28db539bd8d4d15fa8b830a25af5bb6a2d1d26554e8661d183b48e7dfd7e3dd0759d63dda5fb56b863239ce0121273bcd255f02f5309868c75deeadb77cb

  • C:\Windows\SysWOW64\Bjdplm32.exe

    Filesize

    748KB

    MD5

    486af19dc41de0883fcbb27d571950e5

    SHA1

    5cfbc61d8d6ca162e3c1bf4474e06c80defac8d8

    SHA256

    ab49dd30585422dcee8172cd23b4d4e34e82dc1caaadabb2cb401f7ed6627c2a

    SHA512

    df1ea45ee5d0ba0eb6a07e6fe7aa863f9e7f15020a5b056c8a78b89cf394a64975443a17b31e164d98469b9b72943c66262eafd701bde966cdf4da007d344779

  • C:\Windows\SysWOW64\Bjdplm32.exe

    Filesize

    46KB

    MD5

    2d8182bb0dae16186426c48085d14b8b

    SHA1

    246b00d7afdbf05e24485d9571721d0e81055624

    SHA256

    177c4da4a4b9651171927f93bd04757f0ec5905040d2677f8e9e2b2538ac4f82

    SHA512

    9e925ab8b3eceea8bb72ee73fb527d284823c973ed2c376dacc4b888fb29a69b472e06f7a307b4e0ab6f35f8d2d3b58d19a0d3815c8984c3d3c7ea12d4be4ac8

  • C:\Windows\SysWOW64\Bnielm32.exe

    Filesize

    309KB

    MD5

    a9af95fa50f73806efd9a13f5ef715a3

    SHA1

    88bbc7454318faa1a7d1c2624feaf5acd7f17d97

    SHA256

    e264fe2656fe01bc02990f9212253dd59b1502a616a6c0eee154f1d254fa83f4

    SHA512

    c7acd772039cfd99a1c7eee448e250b7ae44ed4b9309fc75aea501529abdae550b67fec26f9725f329a7a1aa921aa4237d2e44090359c712da742dc7e7eea373

  • C:\Windows\SysWOW64\Bnielm32.exe

    Filesize

    502KB

    MD5

    52af863f64557ed096f029691320423c

    SHA1

    54c28b7a4fe169df0fd0c143ff0c068098280d2b

    SHA256

    d9623ba53ae20b74d6cbf4376ffd749942c1d9a278bbaa2957a5b8c3e3ba653c

    SHA512

    0e8ddfb6139d8dd3996729d4b83a621b4de71150b91f8568e786b30367b97fa84f8c58cc3146c5f400344858a1cb93d4c520064b43bbc389458088e11f965bd6

  • C:\Windows\SysWOW64\Bnielm32.exe

    Filesize

    262KB

    MD5

    c95588cf016e7b7225a1a40e036fb4b2

    SHA1

    06dab98cf377ccc34b96db80d9d5476bf0cb81e9

    SHA256

    82dce7e5ce38d3dc02834da3360ebb8b902a788c96521a3986ee14a5fc9457ba

    SHA512

    68366e3800dc9d72fc088ad001904d4645b67b4272d58cd53486e11ead04cfe754964be3c5c27a25f8cfe2f4480c6db7423e5883e8add8619e46cf5f933b0b55

  • C:\Windows\SysWOW64\Bonoflae.exe

    Filesize

    225KB

    MD5

    39c7b9cd7ac7edf9b4007008d6ee5dd0

    SHA1

    831f8c0fd4823096d5e02ae1a23ca11973aac037

    SHA256

    bbce602965386794e45172639d4bc56e4956fb3ac341af56e5457805cf647749

    SHA512

    20c624c241ccf91224954283e02a85c686e5b3798f0ea48dd3b821a2ca37662ec4bbdef31565f8f847679d1b68bd1244b8630dc8b6a8cfb58562f6a37473878e

  • C:\Windows\SysWOW64\Bonoflae.exe

    Filesize

    265KB

    MD5

    4049a02ebd225c25121c84b6055b2829

    SHA1

    f4c8b90cd9ac225cf5c01ba99b541d45e4d80ab0

    SHA256

    e94d5d3e1761ae684a080f33e63dea0646ea84d4f1fecb10b17410664587844b

    SHA512

    35fa5fc730aab52bbf33b6371386938f4088c2948081535c36b89d1e0805eca0b8310ba7d799f09505a9e85429fb2272539d6cc7e78e44a8d2314f25344a8055

  • C:\Windows\SysWOW64\Bonoflae.exe

    Filesize

    172KB

    MD5

    7bb1461f5e5ba48e5bdfb3e9ce89dc53

    SHA1

    e32fcc55976b3295266bcd383258ef1bced22384

    SHA256

    feed5b890306d8687fd000c118d2eb486e64157c47b2950f810010c1d88aaa4f

    SHA512

    5a02eb99e1310c31865440547fa860d7ab139625ad027e51b73c462079058a7b54d55a39f7da969c95f858528ab1ec1a426f75eb20c74b8846501b975a02ee0b

  • C:\Windows\SysWOW64\Ceegmj32.exe

    Filesize

    666KB

    MD5

    9622cc5694a8f718fb6dd8f9ee1f566b

    SHA1

    3c3857126d58db338fb3bc276b4794bffd850614

    SHA256

    92436e52ecc98bfaa068b4ba4e38e7782f6b1176bd19b33b42c90991d9de40bf

    SHA512

    d1b348be2098d41020e0d420575f2083a50a21f02529ac0acdaa2fed3f711c9513413cb4a4e0dfa64d9ac3dab40671c48ec058315ae63cba92eacc61ee7b4c81

  • C:\Windows\SysWOW64\Ceegmj32.exe

    Filesize

    642KB

    MD5

    57e1cdeb876f444904c328e37e38d72d

    SHA1

    fb9474829ffa0c57f7aac6431f9446b8b0cf7c86

    SHA256

    be55eef300a2fb92caa518bdc1054d4f88cec5ac8c25d0ad81dfc3fdede4845e

    SHA512

    cc0055c1605117230d0e8728e5a89cbd408f56647318495f09a21a969d512e3613e15f9234cc8d5220c743c3101c880b60b81ccf343bde55833ce73b425cbac9

  • C:\Windows\SysWOW64\Cphndc32.exe

    Filesize

    644KB

    MD5

    0dd1d4d2d91f21c9997f91bf599b49d1

    SHA1

    cf94818677b31bf9719c82696ac52f12511352ba

    SHA256

    b529f3ea07e4f250b15b07da42103a11995cdb0692ba3c73f49920663de9d78b

    SHA512

    ad5d2da29dd22bbd37c45cddd5473d20bc017b7601864b253eda18d04752bec7cd17dcc291f505167fa42893e2cd37eaa78707c5d7b761da72f7053738a00e8e

  • C:\Windows\SysWOW64\Cphndc32.exe

    Filesize

    718KB

    MD5

    e5afbe1379c2a913f3d59e7c4bd3ef23

    SHA1

    bfed8e45fd64e2764404fc0e793a1ac055a66c73

    SHA256

    32e38eef114a3302c7eacbddc988a6c27fbed7045dedc59bd2249008152d8b3d

    SHA512

    11a3c5e2086716ca411f80fe7aa921e2af95ae6dd9d5257f1d78f5b1e81f51d09d00d5c441803c7972b5a8e0ea92a3ee38489da1ca78649000e0d009809fd276

  • C:\Windows\SysWOW64\Cphndc32.exe

    Filesize

    771KB

    MD5

    13c1d7145c30c075bfb229a7369d136c

    SHA1

    fbea9e87414b573a6b2da0755bd08942074e0695

    SHA256

    7d5ef2a3fbf040cf49c53eaaf71f4e3557ec2f915dd72f50cea75625c33fec83

    SHA512

    416da39585c5938772e54a8624b5bf3adab297a976f66eb2281432eab350278ad92c7637ed543f610339d59b67e0a68a0d6be4a0d68b7ec94f46cbd41077118f

  • \Windows\SysWOW64\Apalea32.exe

    Filesize

    771KB

    MD5

    4cb0e13bad9ca300e9d7ca4010169200

    SHA1

    1dbf145db180c73a5d6bf1ced87e91326eb57ebf

    SHA256

    a245f49f557058baf986c8e704907cb5971bf2528f7d63d655dbf6a5a52e5934

    SHA512

    2a56fc3e48272ce4e23b5b662e0a3478d296d3615ea52d627a381f6f6c13e843519825f430ed6fdab6a5c0a43adabbcd7800567b9eaa9aec5b2128c233a73be2

  • \Windows\SysWOW64\Bnielm32.exe

    Filesize

    280KB

    MD5

    319f5f36e88567c8cfa1a9fcb0120ccd

    SHA1

    a4c2188cca9b6c4961ec6d99d9bdc87f910f2e16

    SHA256

    3a366422814c56c77dbcfb999d3f6a5b32305712de776e8ff55995a14bdbffac

    SHA512

    865b52a63893c47cd14ca7e028376bd59756e3e3280657ef69ffc28dc482938560ff9c7d0e7a0600cd05c8b9c7f992a3b868442603a5c1067f930f3fbac8116c

  • \Windows\SysWOW64\Bnielm32.exe

    Filesize

    368KB

    MD5

    33db2b3ae4efd1abf7356dcf2b196778

    SHA1

    093953bd43ccd8cc87877ba26b8caf7b846c4d72

    SHA256

    71280973082d33fd78ccdf24ab218ad4937ef7dbf3821405f2fd26e9ec8aa0c5

    SHA512

    76231ba26c8521fa5ec823db44ba19eef8d70bea82c8634005d216ffdf5380fabfc6de1d162d55116712656fd84212da72a41033e233c98cc0f6bf9490e94aa6

  • \Windows\SysWOW64\Bonoflae.exe

    Filesize

    214KB

    MD5

    95eb3ebf25e58c468d9ec82e12d1373a

    SHA1

    3ab23367a5db30637196ea54012769c9620df211

    SHA256

    f08bb8a6d3ef0fe348527bebfd2d57d5ae8e494bcfd6357bebba098107165ea5

    SHA512

    0c8ccdacee96d7a7914e65d36872a2d97704c3266ff60633cbbe991c15d0face97be19d9216eb19dfc85e38fe6cac254070914afd83a760c2c41d827dab01987

  • \Windows\SysWOW64\Bonoflae.exe

    Filesize

    248KB

    MD5

    5e52091c5bcaabb3b2775af1afb1426d

    SHA1

    0cabb05eafe1f13846909cebfe4a846abf7c6b76

    SHA256

    3ff3b4250de66a6b9a7eefcc01148fa93a97b52e4bb8355f2427e49ab5aaefe9

    SHA512

    b7c080ff639e5cf48f269f507eddc0c3305a16fc5e131e0a789b0dfda12c809e8cb88a9a390154be1bdf94ed8b363c8fcdf58f099d696f2941ea1683a85adee2

  • \Windows\SysWOW64\Ceegmj32.exe

    Filesize

    542KB

    MD5

    d8b3ee7a890964ccaa2e15403ca4d970

    SHA1

    f1f2d0ec5f1dc52ec2af168d8cf60f2f2bf63aac

    SHA256

    60c09017ac1d450a4555bc80407effb33362a0061707361fa16f34762dff443b

    SHA512

    12bc1d3ebe8885ebcec06957386c5fef38f28e2a42f8defe9ed19933cb1f8d5cf72abe0140c6c5472a38a636bd559c0d77ad04a037caf45669778fe17925f125

  • \Windows\SysWOW64\Ceegmj32.exe

    Filesize

    729KB

    MD5

    8998c8f08db43211d0164a856aa7944a

    SHA1

    8b171b83578b097abfb06a91771d2d311b232d96

    SHA256

    c99d8d62eae17b0bc12879f66d04e85ab87ab869856efca8a890f3ce96c7d0c7

    SHA512

    5592f0f4ae563b48da80fea75b8c77faf34ced973e0742d0127cc4657b8dfd864902863c7a8cf95a38af3b16352d7b821629dbf42d28904ecd441f80dbfa867f

  • \Windows\SysWOW64\Ceegmj32.exe

    Filesize

    544KB

    MD5

    03be49305b897fd83814316160099408

    SHA1

    3dc40d3f0734335e97ac2187d9e5e125756d4382

    SHA256

    27c8cd366297fce2c255630ec17011821e811dfb090146aa70f815c7d6eb59bb

    SHA512

    a7403f50b49d7e8b1fcc163d029eb3a8f16cda5409f32d3c786e7b36153b8da510c0327e4a0ffecc52a130fe31baa9d59e97a14ab9a3f5bfe446bf248f258fc6

  • \Windows\SysWOW64\Ceegmj32.exe

    Filesize

    506KB

    MD5

    6ec0768ef37beaa749a466ab16501e4a

    SHA1

    119492686939cd68f6310c375336b8a2aaa5423e

    SHA256

    60c93ecad6b28c91aabc90c022260ada093299f741a85438cc09cea2940e955f

    SHA512

    eb42d7a8113ffb9dd8cd6578862ffe6bd4ef78a7839951736a32afe5adb62b5bf666a6aefb332b9bd4e1839eb0fb64d5bfbd065d5551fc646fe0d12d778ea406

  • \Windows\SysWOW64\Ceegmj32.exe

    Filesize

    457KB

    MD5

    be860dd7fa386e80edb50d6a8bede5fe

    SHA1

    b25ed27173dfd185e90fa29618a8342aadf58b3c

    SHA256

    e1b9d348b616d75dbfde78c434ff150db37d33e2797330b9aea8c712c679d8dc

    SHA512

    e411908e768c8d4ac506eba2ec31d57414214e3237c5a1e47e7db42488d02a5bf4c413d591414364e67624ab60b38728be239ece38333d569b442aa742bc0c18

  • \Windows\SysWOW64\Ceegmj32.exe

    Filesize

    480KB

    MD5

    a9be18396e2131d034b00e428880c32d

    SHA1

    931dda8d62ce6e763294b9ac47787a0084eb1dc1

    SHA256

    83848316d72b53fab26ab40132a6b50f77eec3c56f42ea12045bc41246d09515

    SHA512

    0137dcc375396c55ba1149888cc3d12be6a83a7fd8ca267ba191fdc2a5e50df0ae3848fb304bae87b59b08bae10cba583fa995f5b1b36e7622c4c6d72e3ff3f7

  • \Windows\SysWOW64\Cphndc32.exe

    Filesize

    32KB

    MD5

    c9cb53272e0bc1e103a79e028b20e3c3

    SHA1

    eef61a18240acea59d28ea97e09237046343a195

    SHA256

    5be0f70652d3f2bd112df324f7ddcfd90b757313421eaae9617667e066090e5e

    SHA512

    a23c4a3d40fb201ab7d38305f5b6d7fc06a2bf7ab5185815b9f1f1cbedc07655ea4c1fa997e460c417040bbbf8ee382272ea6b948a0d4b5bc3939e80ab3e8b7e

  • \Windows\SysWOW64\Cphndc32.exe

    Filesize

    771KB

    MD5

    501ee83b6188822ce9f35d40e99d54e3

    SHA1

    bf6931ff5f14c5f4bec3bd0366035cc94be74b2b

    SHA256

    ced455329b114de9f4e587187b9109dcd800cba966230a417c6cf959b37e27c4

    SHA512

    e24334113d21b857fb284cb49c8ce5538c31a12a87ab9eb33faf835bf79c011c3be8b7f45abc61673df664c4d7c7e71b0daca6e124cdef26f11546d03fe355d5

  • memory/1804-95-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/1804-84-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2152-19-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2152-22-0x0000000000230000-0x000000000025F000-memory.dmp

    Filesize

    188KB

  • memory/2408-83-0x00000000003A0000-0x00000000003CF000-memory.dmp

    Filesize

    188KB

  • memory/2408-75-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2412-50-0x0000000001B50000-0x0000000001B7F000-memory.dmp

    Filesize

    188KB

  • memory/2412-47-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2616-91-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2616-46-0x0000000000220000-0x000000000024F000-memory.dmp

    Filesize

    188KB

  • memory/2616-40-0x0000000000220000-0x000000000024F000-memory.dmp

    Filesize

    188KB

  • memory/2736-68-0x0000000000220000-0x000000000024F000-memory.dmp

    Filesize

    188KB

  • memory/2736-63-0x0000000000220000-0x000000000024F000-memory.dmp

    Filesize

    188KB

  • memory/2736-93-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/3012-12-0x0000000000220000-0x000000000024F000-memory.dmp

    Filesize

    188KB

  • memory/3012-89-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/3012-6-0x0000000000220000-0x000000000024F000-memory.dmp

    Filesize

    188KB

  • memory/3012-0-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB