Analysis
-
max time kernel
141s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16/04/2024, 01:48
Static task
static1
Behavioral task
behavioral1
Sample
c4aee7e655dea08a1bf1203d9fc2277230a533e33a3dc2a65c98b1e59c7f4633.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c4aee7e655dea08a1bf1203d9fc2277230a533e33a3dc2a65c98b1e59c7f4633.exe
Resource
win10v2004-20240226-en
General
-
Target
c4aee7e655dea08a1bf1203d9fc2277230a533e33a3dc2a65c98b1e59c7f4633.exe
-
Size
264KB
-
MD5
c6b8a8a6133444f06d76906c264bba76
-
SHA1
dd0a8180710bdeead8575b5c6bb63a650f6ad31f
-
SHA256
c4aee7e655dea08a1bf1203d9fc2277230a533e33a3dc2a65c98b1e59c7f4633
-
SHA512
7a201e775f65816ad80ae5cb0ab0c44c19761a65c783ebffa4471ee4af69f9b5a0f03f6a58b0fc3a63d6488ff37dbbfa91b49cf975d3e52105d6e98d43ff18c9
-
SSDEEP
6144:YnPHa4tpui6yYPaIGck4GJal+O4o0pui6yYPaIGckv:E/pV6yYP4/O4hpV6yYPo
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad c4aee7e655dea08a1bf1203d9fc2277230a533e33a3dc2a65c98b1e59c7f4633.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" c4aee7e655dea08a1bf1203d9fc2277230a533e33a3dc2a65c98b1e59c7f4633.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bmclhi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Bmclhi32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ckiigmcd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ckiigmcd.exe -
Executes dropped EXE 3 IoCs
pid Process 2980 Bmclhi32.exe 2612 Ckiigmcd.exe 2640 Ceegmj32.exe -
Loads dropped DLL 10 IoCs
pid Process 2908 c4aee7e655dea08a1bf1203d9fc2277230a533e33a3dc2a65c98b1e59c7f4633.exe 2908 c4aee7e655dea08a1bf1203d9fc2277230a533e33a3dc2a65c98b1e59c7f4633.exe 2980 Bmclhi32.exe 2980 Bmclhi32.exe 2612 Ckiigmcd.exe 2612 Ckiigmcd.exe 2568 WerFault.exe 2568 WerFault.exe 2568 WerFault.exe 2568 WerFault.exe -
Drops file in System32 directory 9 IoCs
description ioc Process File created C:\Windows\SysWOW64\Ckiigmcd.exe Bmclhi32.exe File created C:\Windows\SysWOW64\Bjpdmqog.dll Bmclhi32.exe File created C:\Windows\SysWOW64\Aoogfhfp.dll Ckiigmcd.exe File created C:\Windows\SysWOW64\Bmclhi32.exe c4aee7e655dea08a1bf1203d9fc2277230a533e33a3dc2a65c98b1e59c7f4633.exe File opened for modification C:\Windows\SysWOW64\Bmclhi32.exe c4aee7e655dea08a1bf1203d9fc2277230a533e33a3dc2a65c98b1e59c7f4633.exe File created C:\Windows\SysWOW64\Opacnnhp.dll c4aee7e655dea08a1bf1203d9fc2277230a533e33a3dc2a65c98b1e59c7f4633.exe File opened for modification C:\Windows\SysWOW64\Ckiigmcd.exe Bmclhi32.exe File created C:\Windows\SysWOW64\Ceegmj32.exe Ckiigmcd.exe File opened for modification C:\Windows\SysWOW64\Ceegmj32.exe Ckiigmcd.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2568 2640 WerFault.exe 30 -
Modifies registry class 12 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831} c4aee7e655dea08a1bf1203d9fc2277230a533e33a3dc2a65c98b1e59c7f4633.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Bmclhi32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Ckiigmcd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aoogfhfp.dll" Ckiigmcd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Ckiigmcd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 c4aee7e655dea08a1bf1203d9fc2277230a533e33a3dc2a65c98b1e59c7f4633.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node c4aee7e655dea08a1bf1203d9fc2277230a533e33a3dc2a65c98b1e59c7f4633.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID c4aee7e655dea08a1bf1203d9fc2277230a533e33a3dc2a65c98b1e59c7f4633.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Opacnnhp.dll" c4aee7e655dea08a1bf1203d9fc2277230a533e33a3dc2a65c98b1e59c7f4633.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" c4aee7e655dea08a1bf1203d9fc2277230a533e33a3dc2a65c98b1e59c7f4633.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Bmclhi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bjpdmqog.dll" Bmclhi32.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2908 wrote to memory of 2980 2908 c4aee7e655dea08a1bf1203d9fc2277230a533e33a3dc2a65c98b1e59c7f4633.exe 28 PID 2908 wrote to memory of 2980 2908 c4aee7e655dea08a1bf1203d9fc2277230a533e33a3dc2a65c98b1e59c7f4633.exe 28 PID 2908 wrote to memory of 2980 2908 c4aee7e655dea08a1bf1203d9fc2277230a533e33a3dc2a65c98b1e59c7f4633.exe 28 PID 2908 wrote to memory of 2980 2908 c4aee7e655dea08a1bf1203d9fc2277230a533e33a3dc2a65c98b1e59c7f4633.exe 28 PID 2980 wrote to memory of 2612 2980 Bmclhi32.exe 29 PID 2980 wrote to memory of 2612 2980 Bmclhi32.exe 29 PID 2980 wrote to memory of 2612 2980 Bmclhi32.exe 29 PID 2980 wrote to memory of 2612 2980 Bmclhi32.exe 29 PID 2612 wrote to memory of 2640 2612 Ckiigmcd.exe 30 PID 2612 wrote to memory of 2640 2612 Ckiigmcd.exe 30 PID 2612 wrote to memory of 2640 2612 Ckiigmcd.exe 30 PID 2612 wrote to memory of 2640 2612 Ckiigmcd.exe 30 PID 2640 wrote to memory of 2568 2640 Ceegmj32.exe 31 PID 2640 wrote to memory of 2568 2640 Ceegmj32.exe 31 PID 2640 wrote to memory of 2568 2640 Ceegmj32.exe 31 PID 2640 wrote to memory of 2568 2640 Ceegmj32.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\c4aee7e655dea08a1bf1203d9fc2277230a533e33a3dc2a65c98b1e59c7f4633.exe"C:\Users\Admin\AppData\Local\Temp\c4aee7e655dea08a1bf1203d9fc2277230a533e33a3dc2a65c98b1e59c7f4633.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Windows\SysWOW64\Bmclhi32.exeC:\Windows\system32\Bmclhi32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Windows\SysWOW64\Ckiigmcd.exeC:\Windows\system32\Ckiigmcd.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Windows\SysWOW64\Ceegmj32.exeC:\Windows\system32\Ceegmj32.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2640 -s 1405⤵
- Loads dropped DLL
- Program crash
PID:2568
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264KB
MD549f4f4ef4e1b11ca8eed5277aacbaa46
SHA175ce285ca36ca8bbdcdc5420e095f92a931deb08
SHA2562651ce18656d948dbd93cee2b1f284e4138521ef02e3ac2451415ae1eb1ba9b3
SHA512f606d1b54e6edb27ffb1c76ef8f1c51fdd664637f78c174e57a2ee28cb82012ae5054911ff2deffe7c50ab4cfecec79a1a1efc6f618ee11d83ee25007400a44e
-
Filesize
264KB
MD5d34a04290f5f5467ba36251049320ba3
SHA1deae0890eddd715b88de6c586ab0b4cf6ddf8b12
SHA256dc629624b5479ac4588841938803086d1026cba07448b82abb5e21ce1eb5b87f
SHA512a0d7cc3d70b790c200d63a1fe6d8f3f99aca927cec209a5c26e5f39a92fd72d46b4b7891aebb579f3c95236ac36a80a6c5353f9923810a0a10fdded1edc377b1
-
Filesize
264KB
MD5f4dcf319e05b0d45c969d5189f0eb726
SHA10937b79834496673c5db3295409940be3d2bde82
SHA2565ff67b5d7ab500579785f0a11da993ef4c423e7070724002db20d44660fb5656
SHA512ddd20c2628d8bffd349b53435c6544d0bdfc26463433b635b9794d27514ea6eedd6a87b0c78fe2835c8fe6cc8e300d4a220a542e1480388521b7c708eaf1f120