Analysis

  • max time kernel
    111s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    22/07/2024, 21:24

General

  • Target

    1096161367176fa2adb3fc1e49815580N.exe

  • Size

    248KB

  • MD5

    1096161367176fa2adb3fc1e49815580

  • SHA1

    e1c1fda7d9ce9388e584df3b19ba62a9ac2d2cd4

  • SHA256

    e6620f39cc86dce5c258a85de8d953182d5bb0a1746857f767d9381785882ffe

  • SHA512

    f9c3a4dc043eac5e911d5fd2f0ca444ab3929ac8ba3f76a44608079f1817b006ca3bb6f0b2d0c7968cdaf5beedf60f87adaeb6001252e54dc5c40548dc7265eb

  • SSDEEP

    3072:f4Fm9KHJyNNcbcsg4LKVAURfE+HXAB0kCySYo0B:OXcMKRs+HXc0uo0B

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 14 IoCs
  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 17 IoCs
  • Drops file in System32 directory 23 IoCs
  • Program crash 1 IoCs
  • Modifies registry class 24 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1096161367176fa2adb3fc1e49815580N.exe
    "C:\Users\Admin\AppData\Local\Temp\1096161367176fa2adb3fc1e49815580N.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Loads dropped DLL
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1692
    • C:\Windows\SysWOW64\Bigkel32.exe
      C:\Windows\system32\Bigkel32.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:316
      • C:\Windows\SysWOW64\Cbppnbhm.exe
        C:\Windows\system32\Cbppnbhm.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in System32 directory
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2640
        • C:\Windows\SysWOW64\Cileqlmg.exe
          C:\Windows\system32\Cileqlmg.exe
          4⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in System32 directory
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:2684
          • C:\Windows\SysWOW64\Cebeem32.exe
            C:\Windows\system32\Cebeem32.exe
            5⤵
            • Adds autorun key to be loaded by Explorer.exe on startup
            • Executes dropped EXE
            • Loads dropped DLL
            • Drops file in System32 directory
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:2556
            • C:\Windows\SysWOW64\Cchbgi32.exe
              C:\Windows\system32\Cchbgi32.exe
              6⤵
              • Adds autorun key to be loaded by Explorer.exe on startup
              • Executes dropped EXE
              • Loads dropped DLL
              • Drops file in System32 directory
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:2492
              • C:\Windows\SysWOW64\Calcpm32.exe
                C:\Windows\system32\Calcpm32.exe
                7⤵
                • Adds autorun key to be loaded by Explorer.exe on startup
                • Executes dropped EXE
                • Loads dropped DLL
                • Drops file in System32 directory
                • Modifies registry class
                • Suspicious use of WriteProcessMemory
                PID:2904
                • C:\Windows\SysWOW64\Dpapaj32.exe
                  C:\Windows\system32\Dpapaj32.exe
                  8⤵
                  • Executes dropped EXE
                  • Drops file in System32 directory
                  • Suspicious use of WriteProcessMemory
                  PID:2664
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 2664 -s 144
                    9⤵
                    • Loads dropped DLL
                    • Program crash
                    PID:2780

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\Bigkel32.exe

          Filesize

          248KB

          MD5

          50c1f9fb71b4323bdf1436eb4c5e9057

          SHA1

          3f43cef952d41e20ff9796cb68274e256435f9d6

          SHA256

          787391865c71bea5608982fa0276f8d8453e2de4af6b852b045eab95eca3333a

          SHA512

          10953700c924ac9690069f5ecc248012c0f6658df868820b70da9088bd80f7bace221f664a15979d1b3c54bc04376f56460d23dfa7f4158ad5ffb4476a7e6dbd

        • C:\Windows\SysWOW64\Cileqlmg.exe

          Filesize

          248KB

          MD5

          979eca677faa4264ed5559bd6c7b8b8a

          SHA1

          cadd1a6b322d99030ce6140d15ad27df4d7f941d

          SHA256

          6739014466dfada31a5be376ebc35200e36cf7fa18909d3fb6642d262417c489

          SHA512

          d6488dd073fb66fea95d37abccdb6ec702b3225d0796eb5f9db10fc1e8acc1d59e45588fb451b339e48fe1dda79679fbf39c6265e33907eaf248179e61fffd91

        • \Windows\SysWOW64\Calcpm32.exe

          Filesize

          248KB

          MD5

          cdef8c4d086c02fb8b71a85a62f5c89c

          SHA1

          b76d2631e07d42716ad2bcfe07e09b1b7cf43397

          SHA256

          564700c4dd22af3da7f21c3fa9b255a930adaf2a4c5bf07d4ddae7c11d5ad092

          SHA512

          6c79311188394de799527e77c62151ea39e2eed8b74206599c40452ccbb7d6aff3963103d0614e7e52fe5991fa86f72f91e696862f518028f6ca629f3510ad35

        • \Windows\SysWOW64\Cbppnbhm.exe

          Filesize

          248KB

          MD5

          48a11f712024e64ee7b40289baf1ddd7

          SHA1

          a6831e56fa674cc89ae13ee82d554642358dcbb7

          SHA256

          e2745457159ce288a16648f0c0c113e283248c88d73b436c21088596f1dcf7d2

          SHA512

          bc21eb42557ff6cd3c801b67692431bbabf47db4d24044ca170e93c915edecb277cb49e1128d0676c312ab7fda5eccdf6d9df0863458fcba112c4b545e5632cb

        • \Windows\SysWOW64\Cchbgi32.exe

          Filesize

          248KB

          MD5

          fa440d67cec71ca794383f341b4162ac

          SHA1

          5239e1e55279e3a7b32aee60b1ac294287b79e29

          SHA256

          0c09fedbbd1c040e0c51861d32e65848cca631ca9c1042c2053da69d293629c8

          SHA512

          4e2f926fa2caaeae993391f60fc32c18a3981ab305fc7fa5457df16c856f36e6d9b2fd7d074ceced3da7a73f451728299512ad2eb69ea8be3a7d4b1260a7f081

        • \Windows\SysWOW64\Cebeem32.exe

          Filesize

          248KB

          MD5

          44b74e7ab24f13eb722d65cbbcd4ba60

          SHA1

          3cd7ee090eb4258a163264b93542f427a3474a30

          SHA256

          e89bfc3fed4f60050686a5c822eb0af4101d89fa459b37a22bda402dbdf23775

          SHA512

          5d45491c814e469b10eac058a1868b0251b48884e0cd9c1a5c56605d55b03e1e7afe43662e19fe3e19b19a3e5719e4578ffab95a6d60ea6f360448f263b1f040

        • \Windows\SysWOW64\Dpapaj32.exe

          Filesize

          248KB

          MD5

          a3705ad90216d64be9697dd2b522e2fa

          SHA1

          f01ee7f7a05bd91e92825c1e0ccefd7169549e25

          SHA256

          cbcedb3b21c7664d3e2ead7d431ebd0130dcac734693370b1b04d65f60b776eb

          SHA512

          271142fc014a6fad1acab1554808abc4b070e3d036e72184a578ae988ff9c72c2856b54a593a77e1b2a7e3a7088514d100526ee5ab7dd7ab4e65ed85d56ed668

        • memory/316-25-0x0000000000290000-0x00000000002C3000-memory.dmp

          Filesize

          204KB

        • memory/316-13-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/316-105-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/1692-11-0x0000000000250000-0x0000000000283000-memory.dmp

          Filesize

          204KB

        • memory/1692-104-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/1692-0-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/2492-109-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/2492-82-0x00000000005D0000-0x0000000000603000-memory.dmp

          Filesize

          204KB

        • memory/2492-70-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/2556-108-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/2556-63-0x0000000000250000-0x0000000000283000-memory.dmp

          Filesize

          204KB

        • memory/2556-55-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/2640-40-0x0000000000250000-0x0000000000283000-memory.dmp

          Filesize

          204KB

        • memory/2640-32-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/2664-97-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/2664-111-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/2684-107-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/2684-53-0x0000000000270000-0x00000000002A3000-memory.dmp

          Filesize

          204KB

        • memory/2684-41-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/2904-90-0x0000000000440000-0x0000000000473000-memory.dmp

          Filesize

          204KB

        • memory/2904-83-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/2904-110-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB