Analysis

  • max time kernel
    142s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    29/04/2024, 02:56

General

  • Target

    da848c96a668af12bd3763c0d65c442943dffd318cc843c0931df6ec4b51d417.exe

  • Size

    88KB

  • MD5

    e70df5bd9c303d84a905421368dde412

  • SHA1

    6cd7916be82fbe2ed51b69eb8487b80a9b18ad57

  • SHA256

    da848c96a668af12bd3763c0d65c442943dffd318cc843c0931df6ec4b51d417

  • SHA512

    fcb1c4badd0eeb8fbc87b7fc8dafced6d887e8b7eeecb60c82a24f9dd8f14ea4e112ae5aa5a71ee4a3268f560f627af5c01fde715dd2db3e9f122eb743c8d58c

  • SSDEEP

    1536:GUm0tHEMR63pzD0Q8LMn8/H/m2izW+MYMfCyOwhqcaRArUXMwHcjqebXTWCnouyw:GYZu3pvWYU/m2izW+MYMfCyOOqcaRArl

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 22 IoCs
  • UPX dump on OEP (original entry point) 11 IoCs
  • Executes dropped EXE 11 IoCs
  • Loads dropped DLL 26 IoCs
  • Drops file in System32 directory 33 IoCs
  • Program crash 1 IoCs
  • Modifies registry class 36 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\da848c96a668af12bd3763c0d65c442943dffd318cc843c0931df6ec4b51d417.exe
    "C:\Users\Admin\AppData\Local\Temp\da848c96a668af12bd3763c0d65c442943dffd318cc843c0931df6ec4b51d417.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Loads dropped DLL
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1540
    • C:\Windows\SysWOW64\Qgmdjp32.exe
      C:\Windows\system32\Qgmdjp32.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2148
      • C:\Windows\SysWOW64\Aganeoip.exe
        C:\Windows\system32\Aganeoip.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in System32 directory
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2604
        • C:\Windows\SysWOW64\Aeenochi.exe
          C:\Windows\system32\Aeenochi.exe
          4⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in System32 directory
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:2632
          • C:\Windows\SysWOW64\Apoooa32.exe
            C:\Windows\system32\Apoooa32.exe
            5⤵
            • Adds autorun key to be loaded by Explorer.exe on startup
            • Executes dropped EXE
            • Loads dropped DLL
            • Drops file in System32 directory
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:2720
            • C:\Windows\SysWOW64\Ajgpbj32.exe
              C:\Windows\system32\Ajgpbj32.exe
              6⤵
              • Adds autorun key to be loaded by Explorer.exe on startup
              • Executes dropped EXE
              • Loads dropped DLL
              • Drops file in System32 directory
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:2636
              • C:\Windows\SysWOW64\Aeqabgoj.exe
                C:\Windows\system32\Aeqabgoj.exe
                7⤵
                • Adds autorun key to be loaded by Explorer.exe on startup
                • Executes dropped EXE
                • Loads dropped DLL
                • Drops file in System32 directory
                • Modifies registry class
                • Suspicious use of WriteProcessMemory
                PID:2836
                • C:\Windows\SysWOW64\Bpfeppop.exe
                  C:\Windows\system32\Bpfeppop.exe
                  8⤵
                  • Adds autorun key to be loaded by Explorer.exe on startup
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Drops file in System32 directory
                  • Modifies registry class
                  • Suspicious use of WriteProcessMemory
                  PID:676
                  • C:\Windows\SysWOW64\Bhdgjb32.exe
                    C:\Windows\system32\Bhdgjb32.exe
                    9⤵
                    • Adds autorun key to be loaded by Explorer.exe on startup
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Drops file in System32 directory
                    • Modifies registry class
                    • Suspicious use of WriteProcessMemory
                    PID:1568
                    • C:\Windows\SysWOW64\Bmclhi32.exe
                      C:\Windows\system32\Bmclhi32.exe
                      10⤵
                      • Adds autorun key to be loaded by Explorer.exe on startup
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • Drops file in System32 directory
                      • Modifies registry class
                      • Suspicious use of WriteProcessMemory
                      PID:276
                      • C:\Windows\SysWOW64\Cdoajb32.exe
                        C:\Windows\system32\Cdoajb32.exe
                        11⤵
                        • Adds autorun key to be loaded by Explorer.exe on startup
                        • Executes dropped EXE
                        • Loads dropped DLL
                        • Drops file in System32 directory
                        • Modifies registry class
                        • Suspicious use of WriteProcessMemory
                        PID:2008
                        • C:\Windows\SysWOW64\Cacacg32.exe
                          C:\Windows\system32\Cacacg32.exe
                          12⤵
                          • Executes dropped EXE
                          • Suspicious use of WriteProcessMemory
                          PID:1404
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -u -p 1404 -s 140
                            13⤵
                            • Loads dropped DLL
                            • Program crash
                            PID:1968

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\Bmnbjfam.dll

          Filesize

          7KB

          MD5

          6a734295fbd5d253ec0f50b544260409

          SHA1

          54e7c40be9e4ced5598510fcaf434bf98a153a30

          SHA256

          516585fa4e5eec101b464e034221aa3e11e25091a18d3eaf30c15317ffa945e5

          SHA512

          0574ca0e4ca5b13c284dc70bb1fba88f9dc6b424478b56df4da823090104d37510ab6209ad8e3208b3d6d28d74c4ade806ef46dd03e8d2600bc664faedddfe70

        • C:\Windows\SysWOW64\Bpfeppop.exe

          Filesize

          88KB

          MD5

          81fa292ce65ab302702f49fcb4f76b79

          SHA1

          2d9c62f60c3debac70b4953c8180e48486f6f493

          SHA256

          aa43be093ed52b429eb7c3e8394e20517cad58fc3d78c7f87524133f44a5d507

          SHA512

          bb20c89b798370b8dee02d4d3c73ff87ea8852e5294d20d7273ed61f47fd9fd01bb218d1446919ff6340feccc62ff9ff0f4fc204a0eb995588a80b6e5a23eb7d

        • \Windows\SysWOW64\Aeenochi.exe

          Filesize

          88KB

          MD5

          a1c3bc26aef1871a5b0609ed2b901755

          SHA1

          e1a309df0d1b5dfb63fccda32abc708f162fae78

          SHA256

          98cc52b3daa5072ae8825c022b7f3b97e2c64b0ca2ac6e927c05a493f3a619f5

          SHA512

          158d5d855a047cb2f72cf9e5cc61b1ea9eed6b3c7a109a158e0973ea9604b71a168b8c260cb2a760d611d97c7c50c9c0890fc87d85310c435df85868a5dbf0f1

        • \Windows\SysWOW64\Aeqabgoj.exe

          Filesize

          88KB

          MD5

          6a9fb406ec2b709b18f51709bcabf342

          SHA1

          4c2e64111d8e9f59fd3a1939f86845fa96d58192

          SHA256

          a06097d1e3e917706579b9479a7cacc7e5fd0fda55bfa4f35d64d083c54e5086

          SHA512

          9c4be62538a8c9cf4ed48fcfd0714abc696ee4eb508949bca37fae2f111d4f140e86b033baef227ec3fb1687a656337c9c1eebe4f46b7a00e975893ea7cda9eb

        • \Windows\SysWOW64\Aganeoip.exe

          Filesize

          88KB

          MD5

          88ae7c8dc35d6c706b5f4b0128e7621e

          SHA1

          f1955c3b862d112150a19090359e7606fbfabd08

          SHA256

          858dcade78cfc44de7cb7f3a8f4a1254e51d23ebc583d53749b24850fe11e9e0

          SHA512

          a8366e9e5906dc6f0ff19b1435b2c40a14824ef615d74fa3ea8e15285cd8f492b178f527996434d9c3e5ce19028d3023bee80e46b884c670ff97143bb0cd9efc

        • \Windows\SysWOW64\Ajgpbj32.exe

          Filesize

          88KB

          MD5

          a96f2c625ef6cf72fb6e5cc8c3d1271a

          SHA1

          592d8dee47388c9a039dcd8862e3b9f90dd611ad

          SHA256

          c751747f05271a41cf0d22c079a717de1a6af4d0a096737b2e3f0199d4c54724

          SHA512

          17ffdc6cbda42713e7ee53ba726df8cb60450a492a8183ce55c80934ccf899b6180cfa9dcd2f57bfeb847a10c361b796206ff441109b8b504a9362cc464104fc

        • \Windows\SysWOW64\Apoooa32.exe

          Filesize

          88KB

          MD5

          fef585a9d55e4ddb31c53494cc95e16f

          SHA1

          46eba1a2ded8a8fbf576c56a3f66b3f55e0b8f00

          SHA256

          1b585d17c6966b1ea0cc0f3a21aab8119bba01073c91f223f08c25105843e053

          SHA512

          3e4dd3e4bf7ae692e6a37bc956469fd09991b704a7191526b48111e64a42930c801748e22b4580c44bd8dfb10eb918d052cda66a96556cd060e49b291be3a04d

        • \Windows\SysWOW64\Bhdgjb32.exe

          Filesize

          88KB

          MD5

          d4b9f4ba7427f669d882a529485c9076

          SHA1

          a736ef42d2564adb8966efd8e45f981854f7be70

          SHA256

          8a9419eeb95cd86456d39a5033498e3fc106012eebb06426a3ffb4bffd80990a

          SHA512

          cdd8d0fc2854baa9b245c9d59f7a7a6869626e03022f46c244a27684a6a3355c42ddb76e3f22e59614d14ff1d3c14e0df63d65ca8e346dd59c731ea9ab7c09c7

        • \Windows\SysWOW64\Bmclhi32.exe

          Filesize

          88KB

          MD5

          c366801b4202eff80f412d9394fd314f

          SHA1

          b9cf4a7a4b94ffabec904166ff5cec7c0298763c

          SHA256

          920f284cea7da17e05013fe83b96ae260ce916da571f50c062f2b29d9f79110a

          SHA512

          678a471c71ec9f8e4efcf69ae5e5eb1e14630616a78d37d0ce9c6db827fdbbede0a6ab040537dd894f8e1afb4b7d3d29cebff38167fa45b4d71f2dca7ddb7f69

        • \Windows\SysWOW64\Cacacg32.exe

          Filesize

          88KB

          MD5

          88d275c08ab5a7ce8a66173ecf920b7f

          SHA1

          8a66ab3cdd32cb4b49e589206fff7731f505b396

          SHA256

          8ca685d067ee549f1a2c090f4c56950a2abf903fc6e8b23484a44006cbbb7a23

          SHA512

          a56a943f0d1a9c1652cd3abab379d5dcfcc83902e259bae8a2b3544d61fd7596dc402f9191eedcab2932ef10b4db45e8931e21f5dc78f895666e5f498d757219

        • \Windows\SysWOW64\Cdoajb32.exe

          Filesize

          88KB

          MD5

          ce210ac9efaf383a3aa84d91de794555

          SHA1

          a7a3968c69cf7d057b710e56b49c851f06c4f561

          SHA256

          edc241984063206bd415c4de4ac9e26d0296944e2b5df4bd89c5b7840e03db7e

          SHA512

          fdb972b51e3dfabd8dace7e075e62f6a98aba062fda7f88e21a44ff677632d7f76b173c483cc19a6833ea0ebc7d48a69b53c3f52e556b2715365439e0336dab2

        • \Windows\SysWOW64\Qgmdjp32.exe

          Filesize

          88KB

          MD5

          8dc303e85ac325cb92f7aa7d61bf126e

          SHA1

          6f7b0880673a0a826f02ad632b8c2e40f1234558

          SHA256

          fcc70a5beb3c4333bbd8f683d7ba69058b6a8025a1fd462bec9b88fef5f3030f

          SHA512

          e835466e45951040f11d6c45d012489f46da1880743f499ba6ddb5c00318dc357d996b01988aa82f420b681bd092e32f637b935069c59c5c2e0231f0cc2e3a6a

        • memory/276-131-0x0000000000220000-0x0000000000254000-memory.dmp

          Filesize

          208KB

        • memory/276-163-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/676-104-0x0000000000220000-0x0000000000254000-memory.dmp

          Filesize

          208KB

        • memory/676-96-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/676-161-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/1404-149-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/1404-165-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/1540-6-0x0000000000220000-0x0000000000254000-memory.dmp

          Filesize

          208KB

        • memory/1540-0-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/1540-154-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/1568-118-0x00000000001B0000-0x00000000001E4000-memory.dmp

          Filesize

          208KB

        • memory/1568-162-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/1568-110-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/2008-164-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/2148-155-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/2148-21-0x00000000002C0000-0x00000000002F4000-memory.dmp

          Filesize

          208KB

        • memory/2148-13-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/2604-36-0x0000000000220000-0x0000000000254000-memory.dmp

          Filesize

          208KB

        • memory/2604-32-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/2632-41-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/2632-157-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/2632-54-0x0000000000270000-0x00000000002A4000-memory.dmp

          Filesize

          208KB

        • memory/2632-53-0x0000000000270000-0x00000000002A4000-memory.dmp

          Filesize

          208KB

        • memory/2636-159-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/2636-68-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/2720-158-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/2836-86-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/2836-160-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/2836-93-0x0000000000220000-0x0000000000254000-memory.dmp

          Filesize

          208KB

        • memory/2836-94-0x0000000000220000-0x0000000000254000-memory.dmp

          Filesize

          208KB