Analysis

  • max time kernel
    141s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    07-08-2024 00:48

General

  • Target

    972ab9875da0a045b9b707acbf89b85605564dc2e90340228a43429522f30415.exe

  • Size

    242KB

  • MD5

    02abe855e20480627247ac4427f98888

  • SHA1

    9aa1a64d769b32ae632015e8d50d99f0e312a425

  • SHA256

    972ab9875da0a045b9b707acbf89b85605564dc2e90340228a43429522f30415

  • SHA512

    df92da28fe50e3ddb495961b76aa6091d297e74b9ef62ad49947a6e0a7a4328a56ce3f657042d6ddee449dc46df1fbc35012e24a75311fed86341a6e80488418

  • SSDEEP

    3072:/xI+xHcS9qX0cFqV6V8ZLB6V16VKcWmjRrzKbKcWmjRrzK8VHkdYaM88KC:/xIAHcTxqV66LB6X62UyHEYa0

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 30 IoCs
  • Executes dropped EXE 15 IoCs
  • Loads dropped DLL 30 IoCs
  • Drops file in System32 directory 45 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 16 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 48 IoCs
  • Suspicious use of WriteProcessMemory 60 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\972ab9875da0a045b9b707acbf89b85605564dc2e90340228a43429522f30415.exe
    "C:\Users\Admin\AppData\Local\Temp\972ab9875da0a045b9b707acbf89b85605564dc2e90340228a43429522f30415.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1672
    • C:\Windows\SysWOW64\Bodhjdcc.exe
      C:\Windows\system32\Bodhjdcc.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2396
      • C:\Windows\SysWOW64\Bkkioeig.exe
        C:\Windows\system32\Bkkioeig.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2240
        • C:\Windows\SysWOW64\Baealp32.exe
          C:\Windows\system32\Baealp32.exe
          4⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:2912
          • C:\Windows\SysWOW64\Biqfpb32.exe
            C:\Windows\system32\Biqfpb32.exe
            5⤵
            • Adds autorun key to be loaded by Explorer.exe on startup
            • Executes dropped EXE
            • Loads dropped DLL
            • Drops file in System32 directory
            • System Location Discovery: System Language Discovery
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:2804
            • C:\Windows\SysWOW64\Blobmm32.exe
              C:\Windows\system32\Blobmm32.exe
              6⤵
              • Adds autorun key to be loaded by Explorer.exe on startup
              • Executes dropped EXE
              • Loads dropped DLL
              • Drops file in System32 directory
              • System Location Discovery: System Language Discovery
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:2816
              • C:\Windows\SysWOW64\Biccfalm.exe
                C:\Windows\system32\Biccfalm.exe
                7⤵
                • Adds autorun key to be loaded by Explorer.exe on startup
                • Executes dropped EXE
                • Loads dropped DLL
                • Drops file in System32 directory
                • System Location Discovery: System Language Discovery
                • Modifies registry class
                • Suspicious use of WriteProcessMemory
                PID:2624
                • C:\Windows\SysWOW64\Bpmkbl32.exe
                  C:\Windows\system32\Bpmkbl32.exe
                  8⤵
                  • Adds autorun key to be loaded by Explorer.exe on startup
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Drops file in System32 directory
                  • System Location Discovery: System Language Discovery
                  • Modifies registry class
                  • Suspicious use of WriteProcessMemory
                  PID:1936
                  • C:\Windows\SysWOW64\Cbkgog32.exe
                    C:\Windows\system32\Cbkgog32.exe
                    9⤵
                    • Adds autorun key to be loaded by Explorer.exe on startup
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Drops file in System32 directory
                    • System Location Discovery: System Language Discovery
                    • Modifies registry class
                    • Suspicious use of WriteProcessMemory
                    PID:2964
                    • C:\Windows\SysWOW64\Cobhdhha.exe
                      C:\Windows\system32\Cobhdhha.exe
                      10⤵
                      • Adds autorun key to be loaded by Explorer.exe on startup
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • Drops file in System32 directory
                      • System Location Discovery: System Language Discovery
                      • Modifies registry class
                      • Suspicious use of WriteProcessMemory
                      PID:2720
                      • C:\Windows\SysWOW64\Capdpcge.exe
                        C:\Windows\system32\Capdpcge.exe
                        11⤵
                        • Adds autorun key to be loaded by Explorer.exe on startup
                        • Executes dropped EXE
                        • Loads dropped DLL
                        • Drops file in System32 directory
                        • System Location Discovery: System Language Discovery
                        • Modifies registry class
                        • Suspicious use of WriteProcessMemory
                        PID:2996
                        • C:\Windows\SysWOW64\Clfhml32.exe
                          C:\Windows\system32\Clfhml32.exe
                          12⤵
                          • Adds autorun key to be loaded by Explorer.exe on startup
                          • Executes dropped EXE
                          • Loads dropped DLL
                          • Drops file in System32 directory
                          • System Location Discovery: System Language Discovery
                          • Modifies registry class
                          • Suspicious use of WriteProcessMemory
                          PID:2800
                          • C:\Windows\SysWOW64\Cabaec32.exe
                            C:\Windows\system32\Cabaec32.exe
                            13⤵
                            • Adds autorun key to be loaded by Explorer.exe on startup
                            • Executes dropped EXE
                            • Loads dropped DLL
                            • Drops file in System32 directory
                            • System Location Discovery: System Language Discovery
                            • Modifies registry class
                            • Suspicious use of WriteProcessMemory
                            PID:2844
                            • C:\Windows\SysWOW64\Ckkenikc.exe
                              C:\Windows\system32\Ckkenikc.exe
                              14⤵
                              • Adds autorun key to be loaded by Explorer.exe on startup
                              • Executes dropped EXE
                              • Loads dropped DLL
                              • Drops file in System32 directory
                              • System Location Discovery: System Language Discovery
                              • Modifies registry class
                              • Suspicious use of WriteProcessMemory
                              PID:2176
                              • C:\Windows\SysWOW64\Caenkc32.exe
                                C:\Windows\system32\Caenkc32.exe
                                15⤵
                                • Adds autorun key to be loaded by Explorer.exe on startup
                                • Executes dropped EXE
                                • Loads dropped DLL
                                • Drops file in System32 directory
                                • System Location Discovery: System Language Discovery
                                • Modifies registry class
                                • Suspicious use of WriteProcessMemory
                                PID:1716
                                • C:\Windows\SysWOW64\Coindgbi.exe
                                  C:\Windows\system32\Coindgbi.exe
                                  16⤵
                                  • Executes dropped EXE
                                  • System Location Discovery: System Language Discovery
                                  PID:3036

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\Blobmm32.exe

    Filesize

    242KB

    MD5

    8098236a26ed80e86be7bef8ae101c47

    SHA1

    4a2a9567720a655a5cf41bdd4c27793b261eb16b

    SHA256

    8163ff613316e643a4efcf10255e5c1202e3d95c6c77934964dbf0e2713e4362

    SHA512

    f56afd365b4f712733d2c7b9951a80fba6b5e86dd36045c210ed129db34840377e46bbf549c3f56340f12eaa5f14f6c367860dc86288190651d38694a3717317

  • C:\Windows\SysWOW64\Ckkenikc.exe

    Filesize

    242KB

    MD5

    e7262e69b090d2bd1af5afd5d5a538f4

    SHA1

    2df1ca70e61ff8a8e831ccc11c3c698e7e6fdbbc

    SHA256

    589c23e0b7ff67cae0693882ddbdce09153350d9f787237e8edf56a964c69ca2

    SHA512

    51744cfacd31ef042620332570bf4bab480543569517e379e8c048c1a01564613002f3617542d3ba0362c3f900371d14090f9c4e316eb62eaf78bb069dec97fc

  • \Windows\SysWOW64\Baealp32.exe

    Filesize

    242KB

    MD5

    823451cdc8a12728b1398dc7fddfbddc

    SHA1

    9c360036d74552b971071f629e0feee65fc5d2c9

    SHA256

    3095c5782280023343b85430ef23e7ff4e1e09ffd0daed9d3802b0cf93331237

    SHA512

    ec3ae4ff2d8d16ff6fc63ecf2a5c0f4102b4a31d89b58c35cb0a9745421d4b417e32f19070caa4ac043d40de97c6947182bf4841e28eda87f0da33eb3f62dc37

  • \Windows\SysWOW64\Biccfalm.exe

    Filesize

    242KB

    MD5

    0bf9b050d81615d44594b24e131d483b

    SHA1

    26bdb048e6f67ba6d3f67ba6403247720fce5780

    SHA256

    33be265b7cb5e1c332a72ffbd2ed542d04d1caec999768f06e640cd94989dbb4

    SHA512

    efc0d0f001d3df25ba31fd3b3042b5f96a1b2a003a93ae666085e25a92463b2c34c1358996a5ce174228d43ef4efead7656262548a1727d25f96d024aca4130d

  • \Windows\SysWOW64\Biqfpb32.exe

    Filesize

    242KB

    MD5

    33054edc06de6bc7fe165cfe90eda878

    SHA1

    cff3d149ed6287e144a1d09b501a13edbcb450bc

    SHA256

    8bf4e70a8d954c97f28fd76d9324a02f6db65079b048514782dd050398688646

    SHA512

    8be523dd3cdb490a0febdd00818e188208e74351c2f6bf9671ae5d29e06d72778d4a532fd37601cf0aa27fe2e58eb8649fdd362e2759c6b8926fdaa44b0fa361

  • \Windows\SysWOW64\Bkkioeig.exe

    Filesize

    242KB

    MD5

    417228a30d69d9484316763a65654c99

    SHA1

    89084abd1d8c79aded96f927296e506682ea242a

    SHA256

    874ccf1cf536d06f07ba8c4002a4e1bf455cf17812cf3fa117c47dc83e0e1af4

    SHA512

    22bc44157ee9488f4a59296f53391f389e0cdf7fbfe1eddfb76526cca979ff6e16d3d0a5752f2a681d6dbb8ef6e077b162d2a61ee81735dda4e84c20880fbb2f

  • \Windows\SysWOW64\Bodhjdcc.exe

    Filesize

    242KB

    MD5

    e8e1a43b8ea035a490b2015d6e91e334

    SHA1

    e46f3b2696c1d55a20c4b541ca629be5294f6ed6

    SHA256

    2ce47dded5a29e21e8a5232a63a4b7b450f01ee89e8499a633e285b8e7f50682

    SHA512

    2c2eb26ed79991f3520b01c655b5dd5b4c9da1f0beb89893f2dddefe2db26cdcb7528203dfdad7befea075ace5a3970d5ca989e0eed646b3e6a2ee044cc0e541

  • \Windows\SysWOW64\Bpmkbl32.exe

    Filesize

    242KB

    MD5

    f356aff70f6fb7dfb709eead91252024

    SHA1

    0511f3c405d2702c5361a96ec82382be0e001b63

    SHA256

    0535cf3ee5f71876d21639753831f368b5adcbc575fc8f93cc127f7f58ceb34d

    SHA512

    2e503b99def1a2d701a52d84c5eb9ab49a881da14218d35f380a6c51db691f77277b45ddb7cf392efec5be9d71aa53940aaeda4fa767024f6432737a09c9c114

  • \Windows\SysWOW64\Cabaec32.exe

    Filesize

    242KB

    MD5

    6e2055bdba55d864ee96ce0a6e13bf46

    SHA1

    ddffe0e81e06282d52964dbfccc62bf0f584269b

    SHA256

    3e73076311199870808cdc9f0b9ed63559e55b2498eae4746981d4c1f4ac4f94

    SHA512

    05fb73ba3aa2fea896798cdf92540981fb8dfd22db32cd39332f69586a3e93df3de34b587cd97f37b33fe95fbe47354e31adb0c2737a511c8953e34ee7a06dcc

  • \Windows\SysWOW64\Caenkc32.exe

    Filesize

    242KB

    MD5

    258f81a5336326d0c0e906b8329f92c1

    SHA1

    2fa08cecf26d19cf3250a372f34cb62abda82284

    SHA256

    70c86ab2063b749b04cbcb4ab7127220dea904bc271666402966bb4f896631a4

    SHA512

    104127a124be90f34b6f397954184a40b7965262a87dc27e801aeb1c8360485889ceb276b94f4e735168fe850923f5ba52eda0a20e8dc031b212a9efa6ae4e4c

  • \Windows\SysWOW64\Capdpcge.exe

    Filesize

    242KB

    MD5

    c3ef5c20e3ead31579a7d310b4983215

    SHA1

    e1578551efbbdf0e52308db413357142f397d8ab

    SHA256

    648c327cbc47027184005c345f751e1dd11b94bc221e96c75f5f063b31b04f49

    SHA512

    a00b00776a9bff054c1be4dc334e4f732ab3d81cc1b82df1efde6dae0fa2a3cce6900bed21eab8f222740bda18d508e5f3b5559afa5edb8f54569d210491b06c

  • \Windows\SysWOW64\Cbkgog32.exe

    Filesize

    242KB

    MD5

    b3e90269c849459648a1b66d614ec71c

    SHA1

    037b4a3d74e3ecc25a842a992e4a8e40a1178e6a

    SHA256

    02a322d7d11758f05467e5a5c67b9e08f946fa648d805df2c80a25381b1b176d

    SHA512

    056da6e3192921ae42e0d2627d8ce4d4bcea6f952fa5a0cbcbdd5ffcf1e151db442ee3c76c22c554c760c2f9c608dbb66243bf6989b7d30a3d1c6e0bbf4ef46d

  • \Windows\SysWOW64\Clfhml32.exe

    Filesize

    242KB

    MD5

    7a493e5fb0e8d523bce854d3ea3ae787

    SHA1

    f034d5dd3e8431162fabc5caa3610808efaa6c27

    SHA256

    a6c3cc8c561f03329669bea2edff692b55c74e8f04d6cb6d35276fcd4f1fed29

    SHA512

    ecc82914af6fdf256a22f935cb125dd06e2a47d122d50fd4c5b16acb87ce3d90aecbc4e7fa14551268a535791d9e1a3ce25b239eea0894652caf3d1806d71d42

  • \Windows\SysWOW64\Cobhdhha.exe

    Filesize

    242KB

    MD5

    986e4d04a938abeefabfa764f47465d9

    SHA1

    4423ae907692d74beb18615c419daed85b62bce4

    SHA256

    83abf61c337c28f5562246d1efd438585503d8069a18bd62975f7f83651cccb6

    SHA512

    ed7570ee62a3ac95ceaa29ec6383184cdb74894a1203b00a753dd2a3be98edd4256ff2e21acc9c1748d75109a0b28b2d66446b98313c78e3673000f008d54a9a

  • \Windows\SysWOW64\Coindgbi.exe

    Filesize

    242KB

    MD5

    6976fa4cd236d3256766a952ef424836

    SHA1

    3f2f9141ce2de3a2458df4ff2b290d5d9dba25da

    SHA256

    44ed544b5be3d7cba5ba15a46946eb2d2be3ec6fc5b2030ea128a30062dc85e0

    SHA512

    27d0faadf9d6ce651366365b7a24e95086d92efeba0d893ac47c58c970dd6a9ba2db00c1c24e293abe34b64db21c9adde96d073e67a882be49e1ab1becbdb449

  • memory/1672-234-0x0000000000400000-0x0000000000467000-memory.dmp

    Filesize

    412KB

  • memory/1672-12-0x0000000000300000-0x0000000000367000-memory.dmp

    Filesize

    412KB

  • memory/1672-4-0x0000000000400000-0x0000000000467000-memory.dmp

    Filesize

    412KB

  • memory/1716-193-0x0000000000250000-0x00000000002B7000-memory.dmp

    Filesize

    412KB

  • memory/1716-199-0x0000000000250000-0x00000000002B7000-memory.dmp

    Filesize

    412KB

  • memory/1716-185-0x0000000000400000-0x0000000000467000-memory.dmp

    Filesize

    412KB

  • memory/1716-265-0x0000000000400000-0x0000000000467000-memory.dmp

    Filesize

    412KB

  • memory/1936-91-0x0000000000400000-0x0000000000467000-memory.dmp

    Filesize

    412KB

  • memory/1936-99-0x0000000000300000-0x0000000000367000-memory.dmp

    Filesize

    412KB

  • memory/1936-248-0x0000000000400000-0x0000000000467000-memory.dmp

    Filesize

    412KB

  • memory/2176-171-0x0000000000400000-0x0000000000467000-memory.dmp

    Filesize

    412KB

  • memory/2176-184-0x0000000000250000-0x00000000002B7000-memory.dmp

    Filesize

    412KB

  • memory/2176-262-0x0000000000400000-0x0000000000467000-memory.dmp

    Filesize

    412KB

  • memory/2176-263-0x0000000000400000-0x0000000000467000-memory.dmp

    Filesize

    412KB

  • memory/2176-183-0x0000000000250000-0x00000000002B7000-memory.dmp

    Filesize

    412KB

  • memory/2240-31-0x0000000000400000-0x0000000000467000-memory.dmp

    Filesize

    412KB

  • memory/2240-238-0x0000000000400000-0x0000000000467000-memory.dmp

    Filesize

    412KB

  • memory/2396-13-0x0000000000400000-0x0000000000467000-memory.dmp

    Filesize

    412KB

  • memory/2396-236-0x0000000000400000-0x0000000000467000-memory.dmp

    Filesize

    412KB

  • memory/2624-90-0x0000000000400000-0x0000000000467000-memory.dmp

    Filesize

    412KB

  • memory/2624-246-0x0000000000400000-0x0000000000467000-memory.dmp

    Filesize

    412KB

  • memory/2720-124-0x0000000000320000-0x0000000000387000-memory.dmp

    Filesize

    412KB

  • memory/2720-252-0x0000000000400000-0x0000000000467000-memory.dmp

    Filesize

    412KB

  • memory/2800-149-0x0000000000330000-0x0000000000397000-memory.dmp

    Filesize

    412KB

  • memory/2800-256-0x0000000000400000-0x0000000000467000-memory.dmp

    Filesize

    412KB

  • memory/2800-154-0x0000000000330000-0x0000000000397000-memory.dmp

    Filesize

    412KB

  • memory/2804-242-0x0000000000400000-0x0000000000467000-memory.dmp

    Filesize

    412KB

  • memory/2816-244-0x0000000000400000-0x0000000000467000-memory.dmp

    Filesize

    412KB

  • memory/2816-65-0x0000000000400000-0x0000000000467000-memory.dmp

    Filesize

    412KB

  • memory/2844-258-0x0000000000400000-0x0000000000467000-memory.dmp

    Filesize

    412KB

  • memory/2844-169-0x0000000000250000-0x00000000002B7000-memory.dmp

    Filesize

    412KB

  • memory/2844-161-0x0000000000400000-0x0000000000467000-memory.dmp

    Filesize

    412KB

  • memory/2912-240-0x0000000000400000-0x0000000000467000-memory.dmp

    Filesize

    412KB

  • memory/2912-39-0x0000000000400000-0x0000000000467000-memory.dmp

    Filesize

    412KB

  • memory/2912-51-0x0000000000250000-0x00000000002B7000-memory.dmp

    Filesize

    412KB

  • memory/2964-250-0x0000000000400000-0x0000000000467000-memory.dmp

    Filesize

    412KB

  • memory/2996-254-0x0000000000400000-0x0000000000467000-memory.dmp

    Filesize

    412KB

  • memory/3036-200-0x0000000000400000-0x0000000000467000-memory.dmp

    Filesize

    412KB