Analysis
-
max time kernel
111s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
22/07/2024, 21:24
Static task
static1
Behavioral task
behavioral1
Sample
1096161367176fa2adb3fc1e49815580N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
1096161367176fa2adb3fc1e49815580N.exe
Resource
win10v2004-20240709-en
General
-
Target
1096161367176fa2adb3fc1e49815580N.exe
-
Size
248KB
-
MD5
1096161367176fa2adb3fc1e49815580
-
SHA1
e1c1fda7d9ce9388e584df3b19ba62a9ac2d2cd4
-
SHA256
e6620f39cc86dce5c258a85de8d953182d5bb0a1746857f767d9381785882ffe
-
SHA512
f9c3a4dc043eac5e911d5fd2f0ca444ab3929ac8ba3f76a44608079f1817b006ca3bb6f0b2d0c7968cdaf5beedf60f87adaeb6001252e54dc5c40548dc7265eb
-
SSDEEP
3072:f4Fm9KHJyNNcbcsg4LKVAURfE+HXAB0kCySYo0B:OXcMKRs+HXc0uo0B
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 14 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 1096161367176fa2adb3fc1e49815580N.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bigkel32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cebeem32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cebeem32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cchbgi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cileqlmg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Calcpm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" 1096161367176fa2adb3fc1e49815580N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bigkel32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cileqlmg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cchbgi32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cbppnbhm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cbppnbhm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Calcpm32.exe -
Executes dropped EXE 7 IoCs
pid Process 316 Bigkel32.exe 2640 Cbppnbhm.exe 2684 Cileqlmg.exe 2556 Cebeem32.exe 2492 Cchbgi32.exe 2904 Calcpm32.exe 2664 Dpapaj32.exe -
Loads dropped DLL 17 IoCs
pid Process 1692 1096161367176fa2adb3fc1e49815580N.exe 1692 1096161367176fa2adb3fc1e49815580N.exe 316 Bigkel32.exe 316 Bigkel32.exe 2640 Cbppnbhm.exe 2640 Cbppnbhm.exe 2684 Cileqlmg.exe 2684 Cileqlmg.exe 2556 Cebeem32.exe 2556 Cebeem32.exe 2492 Cchbgi32.exe 2492 Cchbgi32.exe 2904 Calcpm32.exe 2904 Calcpm32.exe 2780 WerFault.exe 2780 WerFault.exe 2780 WerFault.exe -
Drops file in System32 directory 23 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Cbppnbhm.exe Bigkel32.exe File opened for modification C:\Windows\SysWOW64\Cebeem32.exe Cileqlmg.exe File created C:\Windows\SysWOW64\Calcpm32.exe Cchbgi32.exe File opened for modification C:\Windows\SysWOW64\Dpapaj32.exe Calcpm32.exe File created C:\Windows\SysWOW64\ÿs.e¢e Dpapaj32.exe File opened for modification C:\Windows\SysWOW64\Bigkel32.exe 1096161367176fa2adb3fc1e49815580N.exe File created C:\Windows\SysWOW64\Oinhifdq.dll 1096161367176fa2adb3fc1e49815580N.exe File created C:\Windows\SysWOW64\Hmdeje32.dll Bigkel32.exe File created C:\Windows\SysWOW64\Cileqlmg.exe Cbppnbhm.exe File created C:\Windows\SysWOW64\Dpapaj32.exe Calcpm32.exe File opened for modification C:\Windows\SysWOW64\ÿs.e¢e Dpapaj32.exe File created C:\Windows\SysWOW64\Bigkel32.exe 1096161367176fa2adb3fc1e49815580N.exe File opened for modification C:\Windows\SysWOW64\Cileqlmg.exe Cbppnbhm.exe File created C:\Windows\SysWOW64\Cebeem32.exe Cileqlmg.exe File created C:\Windows\SysWOW64\Cchbgi32.exe Cebeem32.exe File opened for modification C:\Windows\SysWOW64\Calcpm32.exe Cchbgi32.exe File created C:\Windows\SysWOW64\Ofaejacl.dll Cchbgi32.exe File created C:\Windows\SysWOW64\Cbppnbhm.exe Bigkel32.exe File created C:\Windows\SysWOW64\Fnbkfl32.dll Cileqlmg.exe File opened for modification C:\Windows\SysWOW64\Cchbgi32.exe Cebeem32.exe File created C:\Windows\SysWOW64\Acnenl32.dll Cebeem32.exe File created C:\Windows\SysWOW64\Pdkefp32.dll Calcpm32.exe File created C:\Windows\SysWOW64\Cmbfdl32.dll Cbppnbhm.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2780 2664 WerFault.exe 36 -
Modifies registry class 24 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 1096161367176fa2adb3fc1e49815580N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} 1096161367176fa2adb3fc1e49815580N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fnbkfl32.dll" Cileqlmg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cebeem32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Acnenl32.dll" Cebeem32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cchbgi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hmdeje32.dll" Bigkel32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cmbfdl32.dll" Cbppnbhm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cbppnbhm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cileqlmg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cebeem32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cchbgi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pdkefp32.dll" Calcpm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Calcpm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID 1096161367176fa2adb3fc1e49815580N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oinhifdq.dll" 1096161367176fa2adb3fc1e49815580N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bigkel32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cbppnbhm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ofaejacl.dll" Cchbgi32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Calcpm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node 1096161367176fa2adb3fc1e49815580N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" 1096161367176fa2adb3fc1e49815580N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bigkel32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cileqlmg.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 1692 wrote to memory of 316 1692 1096161367176fa2adb3fc1e49815580N.exe 30 PID 1692 wrote to memory of 316 1692 1096161367176fa2adb3fc1e49815580N.exe 30 PID 1692 wrote to memory of 316 1692 1096161367176fa2adb3fc1e49815580N.exe 30 PID 1692 wrote to memory of 316 1692 1096161367176fa2adb3fc1e49815580N.exe 30 PID 316 wrote to memory of 2640 316 Bigkel32.exe 31 PID 316 wrote to memory of 2640 316 Bigkel32.exe 31 PID 316 wrote to memory of 2640 316 Bigkel32.exe 31 PID 316 wrote to memory of 2640 316 Bigkel32.exe 31 PID 2640 wrote to memory of 2684 2640 Cbppnbhm.exe 32 PID 2640 wrote to memory of 2684 2640 Cbppnbhm.exe 32 PID 2640 wrote to memory of 2684 2640 Cbppnbhm.exe 32 PID 2640 wrote to memory of 2684 2640 Cbppnbhm.exe 32 PID 2684 wrote to memory of 2556 2684 Cileqlmg.exe 33 PID 2684 wrote to memory of 2556 2684 Cileqlmg.exe 33 PID 2684 wrote to memory of 2556 2684 Cileqlmg.exe 33 PID 2684 wrote to memory of 2556 2684 Cileqlmg.exe 33 PID 2556 wrote to memory of 2492 2556 Cebeem32.exe 34 PID 2556 wrote to memory of 2492 2556 Cebeem32.exe 34 PID 2556 wrote to memory of 2492 2556 Cebeem32.exe 34 PID 2556 wrote to memory of 2492 2556 Cebeem32.exe 34 PID 2492 wrote to memory of 2904 2492 Cchbgi32.exe 35 PID 2492 wrote to memory of 2904 2492 Cchbgi32.exe 35 PID 2492 wrote to memory of 2904 2492 Cchbgi32.exe 35 PID 2492 wrote to memory of 2904 2492 Cchbgi32.exe 35 PID 2904 wrote to memory of 2664 2904 Calcpm32.exe 36 PID 2904 wrote to memory of 2664 2904 Calcpm32.exe 36 PID 2904 wrote to memory of 2664 2904 Calcpm32.exe 36 PID 2904 wrote to memory of 2664 2904 Calcpm32.exe 36 PID 2664 wrote to memory of 2780 2664 Dpapaj32.exe 37 PID 2664 wrote to memory of 2780 2664 Dpapaj32.exe 37 PID 2664 wrote to memory of 2780 2664 Dpapaj32.exe 37 PID 2664 wrote to memory of 2780 2664 Dpapaj32.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\1096161367176fa2adb3fc1e49815580N.exe"C:\Users\Admin\AppData\Local\Temp\1096161367176fa2adb3fc1e49815580N.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Windows\SysWOW64\Bigkel32.exeC:\Windows\system32\Bigkel32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Windows\SysWOW64\Cbppnbhm.exeC:\Windows\system32\Cbppnbhm.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\SysWOW64\Cileqlmg.exeC:\Windows\system32\Cileqlmg.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\SysWOW64\Cebeem32.exeC:\Windows\system32\Cebeem32.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Windows\SysWOW64\Cchbgi32.exeC:\Windows\system32\Cchbgi32.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Windows\SysWOW64\Calcpm32.exeC:\Windows\system32\Calcpm32.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\SysWOW64\Dpapaj32.exeC:\Windows\system32\Dpapaj32.exe8⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2664 -s 1449⤵
- Loads dropped DLL
- Program crash
PID:2780
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
248KB
MD550c1f9fb71b4323bdf1436eb4c5e9057
SHA13f43cef952d41e20ff9796cb68274e256435f9d6
SHA256787391865c71bea5608982fa0276f8d8453e2de4af6b852b045eab95eca3333a
SHA51210953700c924ac9690069f5ecc248012c0f6658df868820b70da9088bd80f7bace221f664a15979d1b3c54bc04376f56460d23dfa7f4158ad5ffb4476a7e6dbd
-
Filesize
248KB
MD5979eca677faa4264ed5559bd6c7b8b8a
SHA1cadd1a6b322d99030ce6140d15ad27df4d7f941d
SHA2566739014466dfada31a5be376ebc35200e36cf7fa18909d3fb6642d262417c489
SHA512d6488dd073fb66fea95d37abccdb6ec702b3225d0796eb5f9db10fc1e8acc1d59e45588fb451b339e48fe1dda79679fbf39c6265e33907eaf248179e61fffd91
-
Filesize
248KB
MD5cdef8c4d086c02fb8b71a85a62f5c89c
SHA1b76d2631e07d42716ad2bcfe07e09b1b7cf43397
SHA256564700c4dd22af3da7f21c3fa9b255a930adaf2a4c5bf07d4ddae7c11d5ad092
SHA5126c79311188394de799527e77c62151ea39e2eed8b74206599c40452ccbb7d6aff3963103d0614e7e52fe5991fa86f72f91e696862f518028f6ca629f3510ad35
-
Filesize
248KB
MD548a11f712024e64ee7b40289baf1ddd7
SHA1a6831e56fa674cc89ae13ee82d554642358dcbb7
SHA256e2745457159ce288a16648f0c0c113e283248c88d73b436c21088596f1dcf7d2
SHA512bc21eb42557ff6cd3c801b67692431bbabf47db4d24044ca170e93c915edecb277cb49e1128d0676c312ab7fda5eccdf6d9df0863458fcba112c4b545e5632cb
-
Filesize
248KB
MD5fa440d67cec71ca794383f341b4162ac
SHA15239e1e55279e3a7b32aee60b1ac294287b79e29
SHA2560c09fedbbd1c040e0c51861d32e65848cca631ca9c1042c2053da69d293629c8
SHA5124e2f926fa2caaeae993391f60fc32c18a3981ab305fc7fa5457df16c856f36e6d9b2fd7d074ceced3da7a73f451728299512ad2eb69ea8be3a7d4b1260a7f081
-
Filesize
248KB
MD544b74e7ab24f13eb722d65cbbcd4ba60
SHA13cd7ee090eb4258a163264b93542f427a3474a30
SHA256e89bfc3fed4f60050686a5c822eb0af4101d89fa459b37a22bda402dbdf23775
SHA5125d45491c814e469b10eac058a1868b0251b48884e0cd9c1a5c56605d55b03e1e7afe43662e19fe3e19b19a3e5719e4578ffab95a6d60ea6f360448f263b1f040
-
Filesize
248KB
MD5a3705ad90216d64be9697dd2b522e2fa
SHA1f01ee7f7a05bd91e92825c1e0ccefd7169549e25
SHA256cbcedb3b21c7664d3e2ead7d431ebd0130dcac734693370b1b04d65f60b776eb
SHA512271142fc014a6fad1acab1554808abc4b070e3d036e72184a578ae988ff9c72c2856b54a593a77e1b2a7e3a7088514d100526ee5ab7dd7ab4e65ed85d56ed668