Resubmissions

04-07-2024 17:22

240704-vxyavazeql 10

04-07-2024 17:19

240704-vv7rhazenr 10

Analysis

  • max time kernel
    295s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    04-07-2024 17:22

General

  • Target

    [DemonArchives]1df7772347bfd34ecb1685a1ba69c285.exe

  • Size

    3.4MB

  • MD5

    1df7772347bfd34ecb1685a1ba69c285

  • SHA1

    5d1cb39f45e16396c3b1a37689abd0ab05395c19

  • SHA256

    2982676319f7b1823cb9fe19c9092278ca1968d03f1d9002e5a042b3e5ef2d08

  • SHA512

    7a272dc329a5fe7ccb665cc9be8140333b8bf92a20a3615b14bc791edb5c2bbd7a984bb021cb679f857db2461df7579f21603bacc197326dcb699b003c48c6f5

  • SSDEEP

    98304:i0YVP91v92W805IPSOdKgzEoxr157JT6zPKnllYUugy:PQ91v92W805IPSOdKgzEoxr157JT6z6Y

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 32 IoCs
  • Executes dropped EXE 16 IoCs
  • Loads dropped DLL 36 IoCs
  • Drops file in System32 directory 48 IoCs
  • Program crash 1 IoCs
  • Modifies registry class 51 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\[DemonArchives]1df7772347bfd34ecb1685a1ba69c285.exe
    "C:\Users\Admin\AppData\Local\Temp\[DemonArchives]1df7772347bfd34ecb1685a1ba69c285.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Loads dropped DLL
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1700
    • C:\Windows\SysWOW64\Apcfahio.exe
      C:\Windows\system32\Apcfahio.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2328
      • C:\Windows\SysWOW64\Boiccdnf.exe
        C:\Windows\system32\Boiccdnf.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in System32 directory
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:820
        • C:\Windows\SysWOW64\Bbflib32.exe
          C:\Windows\system32\Bbflib32.exe
          4⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in System32 directory
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:2744
          • C:\Windows\SysWOW64\Bhhnli32.exe
            C:\Windows\system32\Bhhnli32.exe
            5⤵
            • Adds autorun key to be loaded by Explorer.exe on startup
            • Executes dropped EXE
            • Loads dropped DLL
            • Drops file in System32 directory
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:2704
            • C:\Windows\SysWOW64\Cngcjo32.exe
              C:\Windows\system32\Cngcjo32.exe
              6⤵
              • Adds autorun key to be loaded by Explorer.exe on startup
              • Executes dropped EXE
              • Loads dropped DLL
              • Drops file in System32 directory
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:2656
              • C:\Windows\SysWOW64\Cgbdhd32.exe
                C:\Windows\system32\Cgbdhd32.exe
                7⤵
                • Adds autorun key to be loaded by Explorer.exe on startup
                • Executes dropped EXE
                • Loads dropped DLL
                • Drops file in System32 directory
                • Modifies registry class
                • Suspicious use of WriteProcessMemory
                PID:2616
                • C:\Windows\SysWOW64\Dgdmmgpj.exe
                  C:\Windows\system32\Dgdmmgpj.exe
                  8⤵
                  • Adds autorun key to be loaded by Explorer.exe on startup
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Drops file in System32 directory
                  • Modifies registry class
                  • Suspicious use of WriteProcessMemory
                  PID:1320
                  • C:\Windows\SysWOW64\Emeopn32.exe
                    C:\Windows\system32\Emeopn32.exe
                    9⤵
                    • Adds autorun key to be loaded by Explorer.exe on startup
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Drops file in System32 directory
                    • Modifies registry class
                    • Suspicious use of WriteProcessMemory
                    PID:1920
                    • C:\Windows\SysWOW64\Ecpgmhai.exe
                      C:\Windows\system32\Ecpgmhai.exe
                      10⤵
                      • Adds autorun key to be loaded by Explorer.exe on startup
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • Drops file in System32 directory
                      • Modifies registry class
                      • Suspicious use of WriteProcessMemory
                      PID:1952
                      • C:\Windows\SysWOW64\Eloemi32.exe
                        C:\Windows\system32\Eloemi32.exe
                        11⤵
                        • Adds autorun key to be loaded by Explorer.exe on startup
                        • Executes dropped EXE
                        • Loads dropped DLL
                        • Drops file in System32 directory
                        • Modifies registry class
                        • Suspicious use of WriteProcessMemory
                        PID:2352
                        • C:\Windows\SysWOW64\Gicbeald.exe
                          C:\Windows\system32\Gicbeald.exe
                          12⤵
                          • Adds autorun key to be loaded by Explorer.exe on startup
                          • Executes dropped EXE
                          • Loads dropped DLL
                          • Drops file in System32 directory
                          • Modifies registry class
                          • Suspicious use of WriteProcessMemory
                          PID:2644
                          • C:\Windows\SysWOW64\Ghkllmoi.exe
                            C:\Windows\system32\Ghkllmoi.exe
                            13⤵
                            • Adds autorun key to be loaded by Explorer.exe on startup
                            • Executes dropped EXE
                            • Loads dropped DLL
                            • Drops file in System32 directory
                            • Modifies registry class
                            • Suspicious use of WriteProcessMemory
                            PID:1048
                            • C:\Windows\SysWOW64\Gkihhhnm.exe
                              C:\Windows\system32\Gkihhhnm.exe
                              14⤵
                              • Adds autorun key to be loaded by Explorer.exe on startup
                              • Executes dropped EXE
                              • Loads dropped DLL
                              • Drops file in System32 directory
                              • Modifies registry class
                              • Suspicious use of WriteProcessMemory
                              PID:2944
                              • C:\Windows\SysWOW64\Hcplhi32.exe
                                C:\Windows\system32\Hcplhi32.exe
                                15⤵
                                • Adds autorun key to be loaded by Explorer.exe on startup
                                • Executes dropped EXE
                                • Loads dropped DLL
                                • Drops file in System32 directory
                                • Modifies registry class
                                • Suspicious use of WriteProcessMemory
                                PID:2912
                                • C:\Windows\SysWOW64\Iaeiieeb.exe
                                  C:\Windows\system32\Iaeiieeb.exe
                                  16⤵
                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  • Drops file in System32 directory
                                  • Modifies registry class
                                  • Suspicious use of WriteProcessMemory
                                  PID:320
                                  • C:\Windows\SysWOW64\Iagfoe32.exe
                                    C:\Windows\system32\Iagfoe32.exe
                                    17⤵
                                    • Executes dropped EXE
                                    PID:1096
                                    • C:\Windows\SysWOW64\WerFault.exe
                                      C:\Windows\SysWOW64\WerFault.exe -u -p 1096 -s 140
                                      18⤵
                                      • Loads dropped DLL
                                      • Program crash
                                      PID:2276

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\Bhhnli32.exe

    Filesize

    3.4MB

    MD5

    555fab10d7decf9e2944916e0c209289

    SHA1

    602d4e6fba11c9218610fd66fb1ad6806dea1949

    SHA256

    255201e75054c91e905fd21b35d389446dd3664d9525328009bc0c39900bd357

    SHA512

    9af49166843d7713e3a695145c7a11987895037971f0a3c7f899801fed11e2c50855b1626130db2c973cc1ba6a562a4aeb7e29b6ca23153bc695bf1a71e0bb7e

  • C:\Windows\SysWOW64\Cgbdhd32.exe

    Filesize

    3.4MB

    MD5

    d51b89ac5bc3f7c0423ca4b2a96af418

    SHA1

    fd88b1b7138de07383fa53ec3693590cedc9ced3

    SHA256

    7376b4e2b2f30a51d7387cbbf86bfd8953533de504d7368724d3141c10f07e8d

    SHA512

    e687e75bc56d3270d1a19ddfcde2abcc60678caa57657656ae6739860c16849130e54fc7b7595ac44252776f13529fa22068784340378c9f3660acccbda64ea7

  • C:\Windows\SysWOW64\Dgdmmgpj.exe

    Filesize

    3.4MB

    MD5

    f576408a7375681050e4df633c4b4cab

    SHA1

    2938360ffe7869d1441ed816ce41f44c50f2aa2a

    SHA256

    d6273bb23575a36c6910bc6cf9cf0f35eb590a9af054e949edf8f860b9003604

    SHA512

    3138748f3a2af7c803ab123962d2d94acebea0d0db5c3561fc41c3caaecc66a18776542c4b14cae00008f5e110b80b7cb3d8db39892e4b5751d86c64d9cff578

  • C:\Windows\SysWOW64\Eloemi32.exe

    Filesize

    3.4MB

    MD5

    30e9258c8380757fd346b6dea6baef60

    SHA1

    ea28745a1e4b1238e89c6e1129e254753808317b

    SHA256

    b0352069bf940c32d6cd4aa7c1d8d996ef1f02ee0c53a4864910078d59f8bb48

    SHA512

    9fcd299a9618939500c43afe1a2af38ebbea4606f0257171aa085fcd9a528bea3333bba76510b3e8100f275f9a6bf20209165ee7cbbda38c3c40f09722aa5b8c

  • C:\Windows\SysWOW64\Emeopn32.exe

    Filesize

    3.4MB

    MD5

    60c5f4b6322f23d9e4637817c1d3195d

    SHA1

    ecabfe44441538cd2385dd781a531b999f76c7da

    SHA256

    f3f74587e4eed6aa172dd1a3b12c5c49b89efec28eccb46e016111bf95bfcd22

    SHA512

    3c3d801c11044de352d9fc7f904ed8231511316958a65ec8c4273f5d2b1b642bd279159eb5c7b8062c15cbb5555359ba7c80b74c7fabaa2dfce32b25d31ada0b

  • C:\Windows\SysWOW64\Ghkllmoi.exe

    Filesize

    3.4MB

    MD5

    8e6e3cb454b96688fa6c84218e474a16

    SHA1

    b0a2c6aa2fe6a3744f2800cf3248eb37861b8ca7

    SHA256

    8e7cf3b42445a4009869e3c2b7ffc6183c50642eb95d7d293231afdc235cce95

    SHA512

    92421e3e5a59c77057525d94bc319b493aa1a072599d9bbc30133206010c5b817f6a9effc98d572575b8ebe80ba9bb76377dd713adc1cb5183d05972ce180dfd

  • C:\Windows\SysWOW64\Gicbeald.exe

    Filesize

    3.4MB

    MD5

    a31c00eb939cfc05ee16acecd73cbd7d

    SHA1

    c8c0930ebe83e6766c5c19b8445dfdd673409641

    SHA256

    e05a15deb7b01bc4800dd6328a845f8a72cfe27e3b9ecf968e9ec3a2a78dd78d

    SHA512

    68526bffb2e3708decd6122135c21acbbd94ba5b8735d3424c776e9a883b32e048f82aec5dc32f8ce0482c40587b5a42cc12688aee0e7fc5f8c541265eecf84b

  • C:\Windows\SysWOW64\Gkihhhnm.exe

    Filesize

    3.4MB

    MD5

    a56dc9224b7cd12662af82afb16a62ea

    SHA1

    e159d5dbbbe712c76b0aa16333688e80caf805b0

    SHA256

    44da8203da76bcddd2eb2d556d1b5d21681d9838a1a87674826a2586de4e8ad4

    SHA512

    210d88af613cf5da8d62033ea4d0707035f7caae5a8ef882e4323ccf530e4cda988033df49a351ae79d392785535782a43f5ed8aef928a26a11d361680cc16c5

  • C:\Windows\SysWOW64\Hcplhi32.exe

    Filesize

    3.4MB

    MD5

    592ede63fb024f7038462d83bbda6251

    SHA1

    d7c287e74a2839c8c9bac8523aa04d634edccf18

    SHA256

    513fda52e6f632fcf9f0abd49c943645c745e9f20cad546cb4453d32f40cb405

    SHA512

    77bb7e9d3a6fccebb27d70d55d0e22b7c36b44a7d44dd91c261b0a90f18933c3e5fef8cf5888f7bcee3b3734d7a104492ed8e95c4b51f24687f21eebe2e949a2

  • C:\Windows\SysWOW64\Iklgpmjo.dll

    Filesize

    7KB

    MD5

    facbee2bfcbaab53bf419bcaae1acbc5

    SHA1

    42ada15dc857493646d2fa640e8c59584738d371

    SHA256

    5a9f22be89a5690c9fab985656377732f6eadb010dcce17b6d7d34b00b9a7c81

    SHA512

    ec14c58e2730ea6755a9eb94b7017fc75d1f94db75794b2331999d830e49a375633abaab6cef689d051476dcbc818209455cc54f46fe44a2ea30f95601b79872

  • \Windows\SysWOW64\Apcfahio.exe

    Filesize

    3.4MB

    MD5

    674bec33e759bb49744a0e928d078773

    SHA1

    2b7e9299c03407f2924d0ac17742cb402f1f46ad

    SHA256

    0526c9cc708a52f98a5d08fe3733e0817b1ad5ec2ce83fd4f4db0295080e8aec

    SHA512

    9145e1e1f2533f254e49339cb57c371e087878f9c39d7c32e47b8fd674c9951c27a363c4acbff2d13bee602acc41c07b22e913d9ea84001409cc31b1ae8edb16

  • \Windows\SysWOW64\Bbflib32.exe

    Filesize

    3.4MB

    MD5

    626fd02cd7589fe565a019c487ca7155

    SHA1

    7e4fd5c4886f9a577beabd724ecca91b102b13e1

    SHA256

    e7013b7f4adc3ba28873520ce29f70d46158796ca565a0fa6423503cbf859a87

    SHA512

    7561bedf8483548de28dea6e6200a5189d52f798fd0f3c0de458cb7357f16f607f2625bab0500cee9a0890485ded82bc1a0bae0948a60666eba45704962f34cd

  • \Windows\SysWOW64\Boiccdnf.exe

    Filesize

    3.4MB

    MD5

    17f29d346c96c89df4e58c3891d607c4

    SHA1

    bd284c1b7560329a1b51d2c1b1c33e17a3042e16

    SHA256

    c6bc387da12240c0d8b73cc942675a4cab52daa829ef3637db4c3aa213706454

    SHA512

    d0528e33f03b7e1f77689258c3b5a68a23deed7a6801fd7d142d92f5395da53874879a3b7e06720ca4ff25a2d0e476f4e5896eb0efeecdf790d2f53fd9599dd0

  • \Windows\SysWOW64\Cngcjo32.exe

    Filesize

    3.4MB

    MD5

    198dd6d54074eed3c209b6b65ac2a059

    SHA1

    92b46c48b2a80517cd901e4a4dee4acd4fa8fde1

    SHA256

    61429a1cf4ea4f6f9f2b5e9baa6e39d4ccd282a37c4577a5f635566cdbb6989b

    SHA512

    620afd507ad6e61175333da26a3cb5877bc4acf5fc92ef952857198567565373887517798d1ac7f7426d6b4502709d38fae3ec32794dc3fd25614f13542ef73b

  • \Windows\SysWOW64\Ecpgmhai.exe

    Filesize

    3.4MB

    MD5

    839a595697f18cf737f15b106813ab25

    SHA1

    333aa346079875c4e347790ac87fbaed7e4ff08a

    SHA256

    a56249767511e90cd3a050ed2a1c8554f873b49a4b896e5f67ebbb4389c01178

    SHA512

    d592eb2bf16cc457cc2f4b3d2822703785d07c9b58e5d464e31a4e6b2e82ca1b641374ea61701fd9a77e24080d7dbecabf05fa74acec22d737f2c297e77497f1

  • \Windows\SysWOW64\Iaeiieeb.exe

    Filesize

    3.4MB

    MD5

    ae1b265f736d7274170e5b193d5d534d

    SHA1

    0fcececd88dcdbc67c893cd1888ddd9df4caa87c

    SHA256

    cb747f606b26ee5872096a17386bcb3b5081d4fe8391e955762043a270aa11e6

    SHA512

    5c556db7afc245f25bdcefaaf8bf5cbc5a709525cd3aa3efcefc013fe29c0cb0f3d6a2a1e16080b4aba40ca97bde739e7435b3f3709343191d5db4c40b432ead

  • \Windows\SysWOW64\Iagfoe32.exe

    Filesize

    3.4MB

    MD5

    1ae8a53f4abf830070802df67edf3517

    SHA1

    c3e959d3835530031bdef4252d1c5606e003d3a9

    SHA256

    27d78214816d9e187fe145e566ed7787e8c2284e0e5b7b2cdaaf61e354ed3602

    SHA512

    e3c65224e8229a9bf18a86628dd7225cf1788ca52b959664d7ccce42790a5d2f228b12a73d66c99a8f7eeaeccf092b4b76dfb69b48960ec253c047fc98fe5e02

  • memory/320-212-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/320-243-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/320-223-0x0000000000250000-0x0000000000283000-memory.dmp

    Filesize

    204KB

  • memory/320-224-0x0000000000250000-0x0000000000283000-memory.dmp

    Filesize

    204KB

  • memory/820-40-0x0000000000290000-0x00000000002C3000-memory.dmp

    Filesize

    204KB

  • memory/820-230-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/820-26-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/820-42-0x0000000000290000-0x00000000002C3000-memory.dmp

    Filesize

    204KB

  • memory/1048-180-0x00000000002D0000-0x0000000000303000-memory.dmp

    Filesize

    204KB

  • memory/1048-172-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/1048-240-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/1096-226-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/1320-235-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/1320-98-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/1700-228-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/1700-0-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/1700-6-0x00000000002B0000-0x00000000002E3000-memory.dmp

    Filesize

    204KB

  • memory/1920-236-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/1920-111-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/1920-118-0x0000000000250000-0x0000000000283000-memory.dmp

    Filesize

    204KB

  • memory/1952-137-0x0000000000440000-0x0000000000473000-memory.dmp

    Filesize

    204KB

  • memory/1952-138-0x0000000000440000-0x0000000000473000-memory.dmp

    Filesize

    204KB

  • memory/1952-130-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2328-229-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2328-20-0x0000000000300000-0x0000000000333000-memory.dmp

    Filesize

    204KB

  • memory/2352-238-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2352-140-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2352-159-0x0000000000440000-0x0000000000473000-memory.dmp

    Filesize

    204KB

  • memory/2352-158-0x0000000000440000-0x0000000000473000-memory.dmp

    Filesize

    204KB

  • memory/2616-96-0x0000000000370000-0x00000000003A3000-memory.dmp

    Filesize

    204KB

  • memory/2616-234-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2616-97-0x0000000000370000-0x00000000003A3000-memory.dmp

    Filesize

    204KB

  • memory/2616-83-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2644-170-0x0000000000310000-0x0000000000343000-memory.dmp

    Filesize

    204KB

  • memory/2644-169-0x0000000000310000-0x0000000000343000-memory.dmp

    Filesize

    204KB

  • memory/2644-160-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2656-75-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2704-232-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2704-74-0x0000000000280000-0x00000000002B3000-memory.dmp

    Filesize

    204KB

  • memory/2704-72-0x0000000000280000-0x00000000002B3000-memory.dmp

    Filesize

    204KB

  • memory/2704-55-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2744-231-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2744-44-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2744-53-0x0000000000360000-0x0000000000393000-memory.dmp

    Filesize

    204KB

  • memory/2912-205-0x0000000000280000-0x00000000002B3000-memory.dmp

    Filesize

    204KB

  • memory/2912-197-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2912-242-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2944-241-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2944-184-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB