Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
21/08/2024, 02:45
Static task
static1
Behavioral task
behavioral1
Sample
e290c5902f8b7ce24806c6d5031113f0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
e290c5902f8b7ce24806c6d5031113f0N.exe
Resource
win10v2004-20240802-en
General
-
Target
e290c5902f8b7ce24806c6d5031113f0N.exe
-
Size
378KB
-
MD5
e290c5902f8b7ce24806c6d5031113f0
-
SHA1
9f78b80aeffbdea8a6f30c9ff62fcb58267ebbbc
-
SHA256
3cbe696e4b09a9490ea0611b581ddc3e1f1e6ec87f962232d30edd464413ca3c
-
SHA512
24461c5145ab0efdea64299eeb709dcb1ca1969450f083dbe49340cc9c955cd9754c515a8770ce51fcbf1cd2d4c3b6fc619a086d59b1078521cbe9d4c8fa7ead
-
SSDEEP
6144:0aHw5BILgfEzeYr75lHzpaF2e6UK+42GTQMJSZO5f7M0rx7/hP66qve6UK+42GT9:0AwPIL1zeYr75lTefkY660fIaDZkY66E
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" e290c5902f8b7ce24806c6d5031113f0N.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cepipm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Cepipm32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ckmnbg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ckmnbg32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cmpgpond.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Cmpgpond.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad e290c5902f8b7ce24806c6d5031113f0N.exe -
Executes dropped EXE 4 IoCs
pid Process 2836 Cepipm32.exe 2928 Ckmnbg32.exe 2580 Cmpgpond.exe 2620 Dpapaj32.exe -
Loads dropped DLL 11 IoCs
pid Process 1280 e290c5902f8b7ce24806c6d5031113f0N.exe 1280 e290c5902f8b7ce24806c6d5031113f0N.exe 2836 Cepipm32.exe 2836 Cepipm32.exe 2928 Ckmnbg32.exe 2928 Ckmnbg32.exe 2580 Cmpgpond.exe 2580 Cmpgpond.exe 2660 WerFault.exe 2660 WerFault.exe 2660 WerFault.exe -
Drops file in System32 directory 14 IoCs
description ioc Process File created C:\Windows\SysWOW64\Cepipm32.exe e290c5902f8b7ce24806c6d5031113f0N.exe File created C:\Windows\SysWOW64\Ckmnbg32.exe Cepipm32.exe File created C:\Windows\SysWOW64\Dpapaj32.exe Cmpgpond.exe File created C:\Windows\SysWOW64\Pdkefp32.dll Cmpgpond.exe File created C:\Windows\SysWOW64\ÿs.e¢e Dpapaj32.exe File created C:\Windows\SysWOW64\Gdgqdaoh.dll e290c5902f8b7ce24806c6d5031113f0N.exe File opened for modification C:\Windows\SysWOW64\Ckmnbg32.exe Cepipm32.exe File created C:\Windows\SysWOW64\Jhogdg32.dll Cepipm32.exe File opened for modification C:\Windows\SysWOW64\Cmpgpond.exe Ckmnbg32.exe File created C:\Windows\SysWOW64\Pcaibd32.dll Ckmnbg32.exe File opened for modification C:\Windows\SysWOW64\Cepipm32.exe e290c5902f8b7ce24806c6d5031113f0N.exe File opened for modification C:\Windows\SysWOW64\Dpapaj32.exe Cmpgpond.exe File opened for modification C:\Windows\SysWOW64\ÿs.e¢e Dpapaj32.exe File created C:\Windows\SysWOW64\Cmpgpond.exe Ckmnbg32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2660 2620 WerFault.exe 34 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dpapaj32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e290c5902f8b7ce24806c6d5031113f0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cepipm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ckmnbg32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cmpgpond.exe -
Modifies registry class 15 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node e290c5902f8b7ce24806c6d5031113f0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pcaibd32.dll" Ckmnbg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Cmpgpond.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 e290c5902f8b7ce24806c6d5031113f0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID e290c5902f8b7ce24806c6d5031113f0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gdgqdaoh.dll" e290c5902f8b7ce24806c6d5031113f0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Cepipm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ckmnbg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pdkefp32.dll" Cmpgpond.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717} e290c5902f8b7ce24806c6d5031113f0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" e290c5902f8b7ce24806c6d5031113f0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jhogdg32.dll" Cepipm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Cepipm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ckmnbg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Cmpgpond.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1280 wrote to memory of 2836 1280 e290c5902f8b7ce24806c6d5031113f0N.exe 31 PID 1280 wrote to memory of 2836 1280 e290c5902f8b7ce24806c6d5031113f0N.exe 31 PID 1280 wrote to memory of 2836 1280 e290c5902f8b7ce24806c6d5031113f0N.exe 31 PID 1280 wrote to memory of 2836 1280 e290c5902f8b7ce24806c6d5031113f0N.exe 31 PID 2836 wrote to memory of 2928 2836 Cepipm32.exe 32 PID 2836 wrote to memory of 2928 2836 Cepipm32.exe 32 PID 2836 wrote to memory of 2928 2836 Cepipm32.exe 32 PID 2836 wrote to memory of 2928 2836 Cepipm32.exe 32 PID 2928 wrote to memory of 2580 2928 Ckmnbg32.exe 33 PID 2928 wrote to memory of 2580 2928 Ckmnbg32.exe 33 PID 2928 wrote to memory of 2580 2928 Ckmnbg32.exe 33 PID 2928 wrote to memory of 2580 2928 Ckmnbg32.exe 33 PID 2580 wrote to memory of 2620 2580 Cmpgpond.exe 34 PID 2580 wrote to memory of 2620 2580 Cmpgpond.exe 34 PID 2580 wrote to memory of 2620 2580 Cmpgpond.exe 34 PID 2580 wrote to memory of 2620 2580 Cmpgpond.exe 34 PID 2620 wrote to memory of 2660 2620 Dpapaj32.exe 35 PID 2620 wrote to memory of 2660 2620 Dpapaj32.exe 35 PID 2620 wrote to memory of 2660 2620 Dpapaj32.exe 35 PID 2620 wrote to memory of 2660 2620 Dpapaj32.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\e290c5902f8b7ce24806c6d5031113f0N.exe"C:\Users\Admin\AppData\Local\Temp\e290c5902f8b7ce24806c6d5031113f0N.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Windows\SysWOW64\Cepipm32.exeC:\Windows\system32\Cepipm32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Windows\SysWOW64\Ckmnbg32.exeC:\Windows\system32\Ckmnbg32.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Windows\SysWOW64\Cmpgpond.exeC:\Windows\system32\Cmpgpond.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\SysWOW64\Dpapaj32.exeC:\Windows\system32\Dpapaj32.exe5⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2620 -s 1446⤵
- Loads dropped DLL
- Program crash
PID:2660
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
378KB
MD54186b4304c8e93dbeaf83f4356d3d90a
SHA1e10694875aa7b3be9cff732624d61af035a7e9b6
SHA25628535868b914030baa67ff0b257aa1626a72275fb3633d4502892375194a3108
SHA512c13b8d351544ea88e16b99031a3c503a66bc85e8b959ac8ce47ef3890ecf13c2ade0738bab66f69f648465544990b5be611fe24879342215c430b481b04485bd
-
Filesize
378KB
MD5afa8845cb5e2ec62f2174398a0a2fed9
SHA1224b1fef9fc23a5bd90b5d2e5aa805d8fe6dd592
SHA256d3b6a109709fae078867e44eb67856c9201166f289a9d78dcfc48504ce7543a3
SHA512cd728a30fb879a23251000325fd6b50c6113bc8ac8f70fd44d9eae8385e09cadd5ee63ba24e1ad6a61319ce8f3d941b6df577ddb3f5b955ccea378e49b25ea8b
-
Filesize
378KB
MD500c4a46da60980b8a0b7190e8b0d41cf
SHA10045709082e2914e136ef492f0a357706e0e8bbd
SHA25623eaf735671f12c69bdfd610c4130fc0e4f3ed0ba5abf55c30a79af98aebd479
SHA51201f899fd366d23242433455d335701e064b50db21d4604ae041ee327757fdc10db5afa2b71300bf9e611b2219319865582348c74a1301466b172232d0c13843b
-
Filesize
378KB
MD5ada440e7ddeece1757997c7ef8e4a950
SHA17f29e092736ef506a1413609342c768a52adad5b
SHA256ac965bce43701149d268d21ca5f317310227b2c8995b7109e098cf2b876a3f16
SHA5125a1cf944740b0f81427c385c9958de4d5daa84bd0115f72f39299968d428c7026bc6884b557ef2d2ff6c47e437050cfe9ca741f5728c9dfe5a687fb4d1a64ac9