Analysis

  • max time kernel
    111s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    21/07/2024, 20:18

General

  • Target

    057cb3db46651f881bfd293cb7e5c0d0N.exe

  • Size

    165KB

  • MD5

    057cb3db46651f881bfd293cb7e5c0d0

  • SHA1

    7bcde8aa2e205c3a4b033247730b3e7b959c8786

  • SHA256

    0ab5e53166c0a43a608f29012cae1d8f3fc595b7cc627b68fef47cff7e6d8244

  • SHA512

    ac5b78d3d72bf0c9cc07c027065d393f86034d7dee16f2c9d4c7a2988980e8c5c3085b4d523435ef156bc7e983ef56b8028d4c11e9fdff1ca27edde32448b96d

  • SSDEEP

    3072:Jup/KaCja+FV8rPJWANROJT3vQfEdArGzHq+egM5bylnO/hZP:JYKaCkhNoJbQMdArGzHregqgnO

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 34 IoCs
  • Executes dropped EXE 17 IoCs
  • Loads dropped DLL 34 IoCs
  • Drops file in System32 directory 51 IoCs
  • Modifies registry class 54 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\057cb3db46651f881bfd293cb7e5c0d0N.exe
    "C:\Users\Admin\AppData\Local\Temp\057cb3db46651f881bfd293cb7e5c0d0N.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Loads dropped DLL
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2164
    • C:\Windows\SysWOW64\Bphaglgo.exe
      C:\Windows\system32\Bphaglgo.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2332
      • C:\Windows\SysWOW64\Blobmm32.exe
        C:\Windows\system32\Blobmm32.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in System32 directory
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:1884
        • C:\Windows\SysWOW64\Bdfjnkne.exe
          C:\Windows\system32\Bdfjnkne.exe
          4⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in System32 directory
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:2980
          • C:\Windows\SysWOW64\Beggec32.exe
            C:\Windows\system32\Beggec32.exe
            5⤵
            • Adds autorun key to be loaded by Explorer.exe on startup
            • Executes dropped EXE
            • Loads dropped DLL
            • Drops file in System32 directory
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:2964
            • C:\Windows\SysWOW64\Bopknhjd.exe
              C:\Windows\system32\Bopknhjd.exe
              6⤵
              • Adds autorun key to be loaded by Explorer.exe on startup
              • Executes dropped EXE
              • Loads dropped DLL
              • Drops file in System32 directory
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:2724
              • C:\Windows\SysWOW64\Cggcofkf.exe
                C:\Windows\system32\Cggcofkf.exe
                7⤵
                • Adds autorun key to be loaded by Explorer.exe on startup
                • Executes dropped EXE
                • Loads dropped DLL
                • Drops file in System32 directory
                • Modifies registry class
                • Suspicious use of WriteProcessMemory
                PID:2380
                • C:\Windows\SysWOW64\Ciepkajj.exe
                  C:\Windows\system32\Ciepkajj.exe
                  8⤵
                  • Adds autorun key to be loaded by Explorer.exe on startup
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Drops file in System32 directory
                  • Modifies registry class
                  • Suspicious use of WriteProcessMemory
                  PID:2452
                  • C:\Windows\SysWOW64\Clclhmin.exe
                    C:\Windows\system32\Clclhmin.exe
                    9⤵
                    • Adds autorun key to be loaded by Explorer.exe on startup
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Drops file in System32 directory
                    • Modifies registry class
                    • Suspicious use of WriteProcessMemory
                    PID:2204
                    • C:\Windows\SysWOW64\Cobhdhha.exe
                      C:\Windows\system32\Cobhdhha.exe
                      10⤵
                      • Adds autorun key to be loaded by Explorer.exe on startup
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • Drops file in System32 directory
                      • Modifies registry class
                      • Suspicious use of WriteProcessMemory
                      PID:2900
                      • C:\Windows\SysWOW64\Chjmmnnb.exe
                        C:\Windows\system32\Chjmmnnb.exe
                        11⤵
                        • Adds autorun key to be loaded by Explorer.exe on startup
                        • Executes dropped EXE
                        • Loads dropped DLL
                        • Drops file in System32 directory
                        • Modifies registry class
                        • Suspicious use of WriteProcessMemory
                        PID:3008
                        • C:\Windows\SysWOW64\Ckiiiine.exe
                          C:\Windows\system32\Ckiiiine.exe
                          12⤵
                          • Adds autorun key to be loaded by Explorer.exe on startup
                          • Executes dropped EXE
                          • Loads dropped DLL
                          • Drops file in System32 directory
                          • Modifies registry class
                          • Suspicious use of WriteProcessMemory
                          PID:1908
                          • C:\Windows\SysWOW64\Ccpqjfnh.exe
                            C:\Windows\system32\Ccpqjfnh.exe
                            13⤵
                            • Adds autorun key to be loaded by Explorer.exe on startup
                            • Executes dropped EXE
                            • Loads dropped DLL
                            • Drops file in System32 directory
                            • Modifies registry class
                            • Suspicious use of WriteProcessMemory
                            PID:944
                            • C:\Windows\SysWOW64\Cdamao32.exe
                              C:\Windows\system32\Cdamao32.exe
                              14⤵
                              • Adds autorun key to be loaded by Explorer.exe on startup
                              • Executes dropped EXE
                              • Loads dropped DLL
                              • Drops file in System32 directory
                              • Modifies registry class
                              • Suspicious use of WriteProcessMemory
                              PID:584
                              • C:\Windows\SysWOW64\Clhecl32.exe
                                C:\Windows\system32\Clhecl32.exe
                                15⤵
                                • Adds autorun key to be loaded by Explorer.exe on startup
                                • Executes dropped EXE
                                • Loads dropped DLL
                                • Drops file in System32 directory
                                • Modifies registry class
                                • Suspicious use of WriteProcessMemory
                                PID:2120
                                • C:\Windows\SysWOW64\Cofaog32.exe
                                  C:\Windows\system32\Cofaog32.exe
                                  16⤵
                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  • Drops file in System32 directory
                                  • Modifies registry class
                                  • Suspicious use of WriteProcessMemory
                                  PID:2280
                                  • C:\Windows\SysWOW64\Chofhm32.exe
                                    C:\Windows\system32\Chofhm32.exe
                                    17⤵
                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                    • Executes dropped EXE
                                    • Loads dropped DLL
                                    • Drops file in System32 directory
                                    • Modifies registry class
                                    PID:1632
                                    • C:\Windows\SysWOW64\Coindgbi.exe
                                      C:\Windows\system32\Coindgbi.exe
                                      18⤵
                                      • Executes dropped EXE
                                      PID:1940

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\Blobmm32.exe

    Filesize

    165KB

    MD5

    29a74f119a3e370f54c27fd355829f00

    SHA1

    f75184825cb61553134789fbee7d048766ef856c

    SHA256

    aae0f90d24a121c97993af59d7fd68f17df2c099d9b3beb4da76d34cfcecb8dd

    SHA512

    5d433bf5a4dfcb32536b8606dad2f4c34814455e6f1dcdd42a94c651876c95b251fa373b403f8bca9c57f5e043de2d6f761daac9108dca046c50652e1de4821b

  • C:\Windows\SysWOW64\Bopknhjd.exe

    Filesize

    165KB

    MD5

    42f7404b38a32f3a4debd679ca312899

    SHA1

    570c4d84615328a6ee27bbd3af6157d7546300e5

    SHA256

    43ff3da881bde95970032ce1ff227f18e71da01c7a8ce96aae55c46273ed4c8c

    SHA512

    b15e67e2cd48b28f9b6882377436804d677ae644b7450de60db83f1d643fcf327ce573f0d64e59939831585e5bf3010388eedf4c2c29f5303beae448c56c9a86

  • C:\Windows\SysWOW64\Cggcofkf.exe

    Filesize

    165KB

    MD5

    794b55b941e2cfb16f52a4758ced4c14

    SHA1

    ec231a4e2bb13184e19d67d7674843ce9c2c70ae

    SHA256

    0ef63dacf29e8da1b6549e18c8a57a9d58c1e5d3f9317584743b0440d22dfef2

    SHA512

    f34e6d3a56563cfa2400b67b441e34030ecda72e2642b5ca025477a93521a989b31dcbcc8d7e46d1dedc5683b22c05a65292082f369018d69e09a0b7a6a85794

  • C:\Windows\SysWOW64\Chofhm32.exe

    Filesize

    165KB

    MD5

    7793cab4837534f39d274ff9a5e59de1

    SHA1

    c8f5cffa633b9156fac1c7d4ca46285a6a8eb546

    SHA256

    03b4a16bde21e8874cd09ad3732ba2635a59d5102569bc90d1bb906b983fa838

    SHA512

    ac9a58719be9bb0d90453e2665d7e573e6cf87563b0c082e1bc6ab1336b2642b06910b82575138cc209dfeb0fe51c73cee25a87d77aebe20775a69d19eaf6e82

  • C:\Windows\SysWOW64\Ckiiiine.exe

    Filesize

    165KB

    MD5

    573a1e22b0040556ef37f26682186ee9

    SHA1

    478e9a1a7b236210f6541614a12c0cd4a516e190

    SHA256

    757fcc8b48d92c6be966e02275286b58831473670f005a9a0b7d640a93fe9bdb

    SHA512

    792794f589b0c8d2fc134acf62133c23fa02ebc40f81179cef18a35dc2600514bcae480fc01ea82ed4783df124ad167ab1af75196a587109ddeab779cd1381e2

  • C:\Windows\SysWOW64\Cofaog32.exe

    Filesize

    165KB

    MD5

    1168dcc6ed4064d05517a2ca48c7ea76

    SHA1

    89651155c9e4a582536afa65713581f01bc8a715

    SHA256

    c2a566128cea43011385b902e5197fffe95dc33948fc616aa5cf8e779f54f303

    SHA512

    19dcd4798307d0b0673968e28aa0373fd46760bd96995157e600b41818ffb582b6705b89662b0f5baa06e4350ac7f7852dc50bbce4ca03e541d99c6119e26215

  • C:\Windows\SysWOW64\Coindgbi.exe

    Filesize

    165KB

    MD5

    dd1700fbfdeb69d7e33d3907af4a26b5

    SHA1

    b84c24ce236d8bb153abf57d9bca4a86ece721b8

    SHA256

    06c82734274d325675ed0b2eb1a2baa6218ddb112e0381c56b66ed3678798437

    SHA512

    044ccfabe5001d7875c5457f1369e46dc469393396e04b511b38bb0cf08218bc24dbb0398e3c7ef51e40e144e278b7581106eff0ca9924cff3d59254971f4cd5

  • \Windows\SysWOW64\Bdfjnkne.exe

    Filesize

    165KB

    MD5

    1f23101e3f011bcf155ede9a52ee2fb1

    SHA1

    ff68a19913155551e5463a317c788f9a4a3e8d3f

    SHA256

    5dfecbc21fdd709cac5c0eb52f995a46616568f0689c99c320d89276363f87e3

    SHA512

    19797608d935d6f34a331d0af68d9ce887fa990ed8a39be2964c180ada8e400095a5c5dec706d8c653a17a94a3af70e8022abe588ce1a177bc69bc2b8d78f42a

  • \Windows\SysWOW64\Beggec32.exe

    Filesize

    165KB

    MD5

    0ba12c981f88d921c00960dee64b9c82

    SHA1

    ddb2c491d29d903f2799e581886416105ce94453

    SHA256

    6d275044ba3d8dcdd2e3835e4a81f1e46c26443fa75b0d0e4e3ffe4c5901f328

    SHA512

    b1d8f534346d9e10bf5c8441f53e099c93adbf7970c85d32741a8c05218c085bde214b428e1e8ab2818d5df4293af210854b2d9eac7dd6174b6e10fde9850402

  • \Windows\SysWOW64\Bphaglgo.exe

    Filesize

    165KB

    MD5

    34e8f8850109ebce32a91baca8fce276

    SHA1

    e10cacbe403b58ddf0c7183f78c19e0a0f0eeebf

    SHA256

    e18d39c3b278c95d352d92bf728870b61fd1ad9ead47542f846099e85d599a3c

    SHA512

    dc692a929371b55fd674d9622d43f4aa0e85bb9c8c82c9e91d44d82846848918aa4bce93180a0790286b1e52125a77fb6bdded9bb55d886ca1a9c07a9195a589

  • \Windows\SysWOW64\Ccpqjfnh.exe

    Filesize

    165KB

    MD5

    df2667c9597a69baaa61b9d521a492ac

    SHA1

    fd66910466fdc9a7d6bc9f8fbeaefe6d2fea97ec

    SHA256

    2f76e391f4a82c147cfa6c41ac92c973a0f56ac5044cc4848d495073424cb10f

    SHA512

    c39cc18397f4df83e9cc3bca9c42afa793ad3e81b29a9bb4121ed45bddef16c52b27581f67ce2a91f608fc06db62c9c0da8a77fc465a9e6bd315e424411ec311

  • \Windows\SysWOW64\Cdamao32.exe

    Filesize

    165KB

    MD5

    09a8d33b5a662464103780d9cdd45dde

    SHA1

    1f2662992ac8c85bcc523faf2d638d23bbdb2fae

    SHA256

    00189672825e6e9002c285c2317e3bb1915f01a13f7930e6ffe65bce033b37ae

    SHA512

    435fcb0b22d1260899a7b9d30b8970841c33c8fd6a00fbf7dd736fa9abe2b810f8eb485b3d90dc42935af1e7be5f635fb15c05e8f780708bc0fbcff623d70e70

  • \Windows\SysWOW64\Chjmmnnb.exe

    Filesize

    165KB

    MD5

    cab2e84430133b971c42000d719e8057

    SHA1

    7377452ce51ce7fa63b9488be2d4a8386ce4e443

    SHA256

    a4ac281c47e701555956783367d3d5bcd94f0bb9dc7828fcf6eefc1c4dcecfe4

    SHA512

    55681edefecb002c560d07b12363f00b9857ffa0a21607124216ca8464acc607f192cd6167495c492f62c38c2f503f15e0c45e6faa446d018d88374aca66ee30

  • \Windows\SysWOW64\Ciepkajj.exe

    Filesize

    165KB

    MD5

    87ea7a6c082535e0d90b471b892501dd

    SHA1

    722cbd17b209def03d564649cb953291cce821ae

    SHA256

    fdaeabfe21ba0481d4680036782e7023dcdf4985b5a53c8361cb22201f15a390

    SHA512

    4b43da973ae03f700cb4cb4649284148e971847d54804b2c6be471bc7555960581ed334630fdef169337158086c6898adad3670e09a7bb5a8e188a3b7463d423

  • \Windows\SysWOW64\Clclhmin.exe

    Filesize

    165KB

    MD5

    591311801efc2bf3fc3e38610c5e0d10

    SHA1

    74486eeaa69afe293241e505946557ecd931e222

    SHA256

    077cd040208a64e2d103ea4f6627ea7a0f3a64ddafc626e43b20046716f2a4aa

    SHA512

    78d9f0c93d51a846d63c2db8205fe6c7f33100fe316794c094a8ba004a0f1becb942b676c60d0034f61a689e7e51640e0626af82b2bca62ab0b82a473a6137fd

  • \Windows\SysWOW64\Clhecl32.exe

    Filesize

    165KB

    MD5

    1bb9df898e277aa69ec3b39d66b37323

    SHA1

    e8edcd2e972bd80d6bf70f3a22ec1ea4d9301ca9

    SHA256

    5d8a1f60e37e0dc276ccbfe2fde5f5a1ba43e3096da0ba1c2671c3a1f5ded286

    SHA512

    254a25c893db72aa2c25a6659bbb7d850ace920c72e7cbd7df3299d01cbc67aa0107caff6c2dff4c2b725f8b93cf13afa7acc4ee6707dcf6e3f36f42fc554205

  • \Windows\SysWOW64\Cobhdhha.exe

    Filesize

    165KB

    MD5

    d6f2663e07d6c2a4e574f2c84093dbfc

    SHA1

    b54e81cc80b126be9ba5b7247c571199dd7f8f5d

    SHA256

    e09c1de5f4ce83e965cffdae7ed8536ac9e355ad5337fa8c9ca6baf28759608d

    SHA512

    62e5df7e24db206c73d767341cbc02ac0293c7d79187e838331757fc33ecdda3f8dd7c5f901251190a8ab39c77468e04fa9099716f92f6cc544e5b9c899decd7

  • memory/584-187-0x0000000002000000-0x0000000002052000-memory.dmp

    Filesize

    328KB

  • memory/584-295-0x0000000000400000-0x0000000000452000-memory.dmp

    Filesize

    328KB

  • memory/584-174-0x0000000000400000-0x0000000000452000-memory.dmp

    Filesize

    328KB

  • memory/584-188-0x0000000002000000-0x0000000002052000-memory.dmp

    Filesize

    328KB

  • memory/944-166-0x0000000000400000-0x0000000000452000-memory.dmp

    Filesize

    328KB

  • memory/944-293-0x0000000000400000-0x0000000000452000-memory.dmp

    Filesize

    328KB

  • memory/1632-219-0x0000000000400000-0x0000000000452000-memory.dmp

    Filesize

    328KB

  • memory/1632-304-0x0000000000400000-0x0000000000452000-memory.dmp

    Filesize

    328KB

  • memory/1632-229-0x0000000000260000-0x00000000002B2000-memory.dmp

    Filesize

    328KB

  • memory/1632-230-0x0000000000260000-0x00000000002B2000-memory.dmp

    Filesize

    328KB

  • memory/1884-27-0x0000000000400000-0x0000000000452000-memory.dmp

    Filesize

    328KB

  • memory/1884-273-0x0000000000400000-0x0000000000452000-memory.dmp

    Filesize

    328KB

  • memory/1884-35-0x0000000000250000-0x00000000002A2000-memory.dmp

    Filesize

    328KB

  • memory/1908-291-0x0000000000400000-0x0000000000452000-memory.dmp

    Filesize

    328KB

  • memory/1908-160-0x0000000000250000-0x00000000002A2000-memory.dmp

    Filesize

    328KB

  • memory/1940-231-0x0000000000400000-0x0000000000452000-memory.dmp

    Filesize

    328KB

  • memory/2120-202-0x0000000000250000-0x00000000002A2000-memory.dmp

    Filesize

    328KB

  • memory/2120-203-0x0000000000250000-0x00000000002A2000-memory.dmp

    Filesize

    328KB

  • memory/2120-194-0x0000000000400000-0x0000000000452000-memory.dmp

    Filesize

    328KB

  • memory/2120-297-0x0000000000400000-0x0000000000452000-memory.dmp

    Filesize

    328KB

  • memory/2164-13-0x00000000005F0000-0x0000000000642000-memory.dmp

    Filesize

    328KB

  • memory/2164-11-0x00000000005F0000-0x0000000000642000-memory.dmp

    Filesize

    328KB

  • memory/2164-269-0x0000000000400000-0x0000000000452000-memory.dmp

    Filesize

    328KB

  • memory/2164-0-0x0000000000400000-0x0000000000452000-memory.dmp

    Filesize

    328KB

  • memory/2204-109-0x0000000000400000-0x0000000000452000-memory.dmp

    Filesize

    328KB

  • memory/2204-285-0x0000000000400000-0x0000000000452000-memory.dmp

    Filesize

    328KB

  • memory/2204-121-0x0000000000460000-0x00000000004B2000-memory.dmp

    Filesize

    328KB

  • memory/2280-205-0x0000000000400000-0x0000000000452000-memory.dmp

    Filesize

    328KB

  • memory/2280-217-0x0000000000460000-0x00000000004B2000-memory.dmp

    Filesize

    328KB

  • memory/2280-218-0x0000000000460000-0x00000000004B2000-memory.dmp

    Filesize

    328KB

  • memory/2280-302-0x0000000000400000-0x0000000000452000-memory.dmp

    Filesize

    328KB

  • memory/2332-14-0x0000000000400000-0x0000000000452000-memory.dmp

    Filesize

    328KB

  • memory/2332-271-0x0000000000400000-0x0000000000452000-memory.dmp

    Filesize

    328KB

  • memory/2380-281-0x0000000000400000-0x0000000000452000-memory.dmp

    Filesize

    328KB

  • memory/2380-93-0x0000000000400000-0x0000000000452000-memory.dmp

    Filesize

    328KB

  • memory/2452-94-0x0000000000400000-0x0000000000452000-memory.dmp

    Filesize

    328KB

  • memory/2452-106-0x0000000000250000-0x00000000002A2000-memory.dmp

    Filesize

    328KB

  • memory/2452-283-0x0000000000400000-0x0000000000452000-memory.dmp

    Filesize

    328KB

  • memory/2724-279-0x0000000000400000-0x0000000000452000-memory.dmp

    Filesize

    328KB

  • memory/2724-85-0x0000000000250000-0x00000000002A2000-memory.dmp

    Filesize

    328KB

  • memory/2724-67-0x0000000000400000-0x0000000000452000-memory.dmp

    Filesize

    328KB

  • memory/2900-134-0x0000000000250000-0x00000000002A2000-memory.dmp

    Filesize

    328KB

  • memory/2900-287-0x0000000000400000-0x0000000000452000-memory.dmp

    Filesize

    328KB

  • memory/2900-122-0x0000000000400000-0x0000000000452000-memory.dmp

    Filesize

    328KB

  • memory/2964-277-0x0000000000400000-0x0000000000452000-memory.dmp

    Filesize

    328KB

  • memory/2964-54-0x0000000000400000-0x0000000000452000-memory.dmp

    Filesize

    328KB

  • memory/2980-275-0x0000000000400000-0x0000000000452000-memory.dmp

    Filesize

    328KB

  • memory/2980-41-0x0000000000400000-0x0000000000452000-memory.dmp

    Filesize

    328KB

  • memory/3008-289-0x0000000000400000-0x0000000000452000-memory.dmp

    Filesize

    328KB