Analysis

  • max time kernel
    141s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    05-08-2024 19:26

General

  • Target

    216d6ffd55eb3e5e920845a8f501734f000612f208e99c3765e2ed483254557f.exe

  • Size

    1.1MB

  • MD5

    ff85769e985a82f50b956d4f75d822bc

  • SHA1

    21fbc8c55b125895d894de08ca393370f73ec700

  • SHA256

    216d6ffd55eb3e5e920845a8f501734f000612f208e99c3765e2ed483254557f

  • SHA512

    d16b657e70ee1c377297bdae7f7e2c1781273d4f7520337dcabdffc93f57c31f886b301707c6f8c04d032d53790368f85f5348a35cbc46b150db35bdf542b2b3

  • SSDEEP

    12288:v6xLFHRFbeteBFHRFbeWFHRFbeteBFHRFbeN:kBR7BRjBR7BRE

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 10 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 14 IoCs
  • Drops file in System32 directory 15 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 18 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\216d6ffd55eb3e5e920845a8f501734f000612f208e99c3765e2ed483254557f.exe
    "C:\Users\Admin\AppData\Local\Temp\216d6ffd55eb3e5e920845a8f501734f000612f208e99c3765e2ed483254557f.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2940
    • C:\Windows\SysWOW64\Bbgnak32.exe
      C:\Windows\system32\Bbgnak32.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2736
      • C:\Windows\SysWOW64\Beejng32.exe
        C:\Windows\system32\Beejng32.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2984
        • C:\Windows\SysWOW64\Bobhal32.exe
          C:\Windows\system32\Bobhal32.exe
          4⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:2600
          • C:\Windows\SysWOW64\Cdanpb32.exe
            C:\Windows\system32\Cdanpb32.exe
            5⤵
            • Adds autorun key to be loaded by Explorer.exe on startup
            • Executes dropped EXE
            • Loads dropped DLL
            • Drops file in System32 directory
            • System Location Discovery: System Language Discovery
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:2112
            • C:\Windows\SysWOW64\Ceegmj32.exe
              C:\Windows\system32\Ceegmj32.exe
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:560
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 560 -s 140
                7⤵
                • Loads dropped DLL
                • Program crash
                PID:2064

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\Beejng32.exe

    Filesize

    1.1MB

    MD5

    6235519d45ce53e326199b938c798111

    SHA1

    31862628714c6d2601acf9bc7e008cce7ad3c883

    SHA256

    d5d80988dc60456a18f706a71c33ceeca1a2c596b7c8815a61822a283531ac67

    SHA512

    ffd7a1f0bbcd865b03006a3d7ca2da1642e0909a07ae74bf26137816f2deeec7e9845a9fbff5b644f30a66ec842317527ecddfe2e2a605046eeac0ff8059eef1

  • \Windows\SysWOW64\Bbgnak32.exe

    Filesize

    1.1MB

    MD5

    3677c3d897446ca8e9e1c68b2dbf493f

    SHA1

    7a4a882a297e56d75b4a9747ef8efa07f6bdf5ee

    SHA256

    063f0f7ce1593038e3e6e996b0178adec6cc7e4ebd5b4a40d2b05f079d484cac

    SHA512

    0dd39052f9d29983efa6cc5e955b3e3e21eae03445b274bd847b8528cb618758efa1a60b25df7c048d719758f053e09ccd4713e42d082ba44027bed0cd155c11

  • \Windows\SysWOW64\Bobhal32.exe

    Filesize

    1.1MB

    MD5

    2410c31b71f726528c2f42f0137a286b

    SHA1

    c39e180bdc2777ed6b069a2244a93cf7c40fd297

    SHA256

    f2306550c0aec0072bd62a012492825f768aae165f8dfa928e0d473a0fb8b032

    SHA512

    742ebd02ccca75131ae6cdeccba002ee957d94465ac69ed0b3bf2aaeab393047447f06a5cf4d13830f81a856b1a8cbceacf63accaec992d2ef9b6f5d9a88f278

  • \Windows\SysWOW64\Cdanpb32.exe

    Filesize

    1.1MB

    MD5

    e362fc87b39e3ce39e7ebef2bccb24b0

    SHA1

    ee707a2cf757ee2b8e8055f925a028cd0aab659d

    SHA256

    7bbbfe9cd03e6770e91c8e94b8bb96fb0c149249d597882a5416fcfdf15fe9e6

    SHA512

    c2cc54216fbf7067bdbb84b142218fc1444755d7e981ce6a8c58ee18b2fd5021908f5526f3a2fa4b01c1bb3ed806f3b20e632cd95bdf9b6b960e84c023123972

  • \Windows\SysWOW64\Ceegmj32.exe

    Filesize

    1.1MB

    MD5

    131a6e4ed99927882dca66d835e44d37

    SHA1

    7d7342a03e5b870ac5a31cdb10433e2c907340e3

    SHA256

    efc399ea6b644585ae8a91a2975d5f28b97f8273e4671f68185cab777d475b38

    SHA512

    bea872afb8759b5cb103bdc286ae9ac9221fb1dad6a9c06644d7a58db96e20b03fe68deaf25a55fc1fc9a707453e70bc9a3e3b28fd091bd220ac7477774ebbd7

  • memory/560-81-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/560-71-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2112-69-0x0000000000270000-0x00000000002A3000-memory.dmp

    Filesize

    204KB

  • memory/2112-68-0x0000000000270000-0x00000000002A3000-memory.dmp

    Filesize

    204KB

  • memory/2112-80-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2112-56-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2600-79-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2600-50-0x00000000002E0000-0x0000000000313000-memory.dmp

    Filesize

    204KB

  • memory/2736-19-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2736-27-0x0000000000250000-0x0000000000283000-memory.dmp

    Filesize

    204KB

  • memory/2940-11-0x0000000000290000-0x00000000002C3000-memory.dmp

    Filesize

    204KB

  • memory/2940-0-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2940-76-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2940-12-0x0000000000290000-0x00000000002C3000-memory.dmp

    Filesize

    204KB

  • memory/2984-28-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2984-78-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2984-40-0x0000000000290000-0x00000000002C3000-memory.dmp

    Filesize

    204KB

  • memory/2984-41-0x0000000000290000-0x00000000002C3000-memory.dmp

    Filesize

    204KB