Analysis
-
max time kernel
141s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08-09-2024 02:47
Static task
static1
Behavioral task
behavioral1
Sample
5f3e438c25da8ebf54e75f57742bd7030342098bee795a42a08a52a8635b1532.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5f3e438c25da8ebf54e75f57742bd7030342098bee795a42a08a52a8635b1532.exe
Resource
win10v2004-20240802-en
General
-
Target
5f3e438c25da8ebf54e75f57742bd7030342098bee795a42a08a52a8635b1532.exe
-
Size
55KB
-
MD5
cbca82e8dcc5f13554b46fa4c69f1939
-
SHA1
71e420fd3905d73499f75f1e039b2604d5e6a7b2
-
SHA256
5f3e438c25da8ebf54e75f57742bd7030342098bee795a42a08a52a8635b1532
-
SHA512
496276b2b9a92eff624c7908fe3f247228c934483f175bd5b51c404ce8cf416dd5c140451f0eabea514e00bd1d8abc22913958410b62dfadb0d45022013f016a
-
SSDEEP
1536:B6kXEX4Y+b7TiMyWLARAP4IYFwvds72Ld:lXM4Y+b7TiMyWLARnFwpd
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dnpciaef.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 5f3e438c25da8ebf54e75f57742bd7030342098bee795a42a08a52a8635b1532.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cegoqlof.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cfhkhd32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dnpciaef.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cmpgpond.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cegoqlof.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cfhkhd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" 5f3e438c25da8ebf54e75f57742bd7030342098bee795a42a08a52a8635b1532.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cgcnghpl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cgcnghpl.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cmpgpond.exe -
Executes dropped EXE 6 IoCs
pid Process 2680 Cgcnghpl.exe 2656 Cmpgpond.exe 2796 Cegoqlof.exe 2664 Cfhkhd32.exe 2672 Dnpciaef.exe 3004 Dpapaj32.exe -
Loads dropped DLL 15 IoCs
pid Process 2084 5f3e438c25da8ebf54e75f57742bd7030342098bee795a42a08a52a8635b1532.exe 2084 5f3e438c25da8ebf54e75f57742bd7030342098bee795a42a08a52a8635b1532.exe 2680 Cgcnghpl.exe 2680 Cgcnghpl.exe 2656 Cmpgpond.exe 2656 Cmpgpond.exe 2796 Cegoqlof.exe 2796 Cegoqlof.exe 2664 Cfhkhd32.exe 2664 Cfhkhd32.exe 2672 Dnpciaef.exe 2672 Dnpciaef.exe 2764 WerFault.exe 2764 WerFault.exe 2764 WerFault.exe -
Drops file in System32 directory 20 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ÿs.e¢e Dpapaj32.exe File created C:\Windows\SysWOW64\Cmpgpond.exe Cgcnghpl.exe File created C:\Windows\SysWOW64\Pcaibd32.dll Cgcnghpl.exe File created C:\Windows\SysWOW64\Cegoqlof.exe Cmpgpond.exe File created C:\Windows\SysWOW64\Dpapaj32.exe Dnpciaef.exe File opened for modification C:\Windows\SysWOW64\Dpapaj32.exe Dnpciaef.exe File opened for modification C:\Windows\SysWOW64\Cmpgpond.exe Cgcnghpl.exe File created C:\Windows\SysWOW64\Nloone32.dll Cmpgpond.exe File created C:\Windows\SysWOW64\Dnpciaef.exe Cfhkhd32.exe File opened for modification C:\Windows\SysWOW64\Dnpciaef.exe Cfhkhd32.exe File created C:\Windows\SysWOW64\Pdkefp32.dll Dnpciaef.exe File created C:\Windows\SysWOW64\Cgcnghpl.exe 5f3e438c25da8ebf54e75f57742bd7030342098bee795a42a08a52a8635b1532.exe File opened for modification C:\Windows\SysWOW64\Cegoqlof.exe Cmpgpond.exe File created C:\Windows\SysWOW64\Cfhkhd32.exe Cegoqlof.exe File created C:\Windows\SysWOW64\Pmiljc32.dll Cfhkhd32.exe File created C:\Windows\SysWOW64\ÿs.e¢e Dpapaj32.exe File opened for modification C:\Windows\SysWOW64\Cgcnghpl.exe 5f3e438c25da8ebf54e75f57742bd7030342098bee795a42a08a52a8635b1532.exe File created C:\Windows\SysWOW64\Omakjj32.dll 5f3e438c25da8ebf54e75f57742bd7030342098bee795a42a08a52a8635b1532.exe File opened for modification C:\Windows\SysWOW64\Cfhkhd32.exe Cegoqlof.exe File created C:\Windows\SysWOW64\Fkdqjn32.dll Cegoqlof.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2764 3004 WerFault.exe 36 -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cegoqlof.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cfhkhd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dnpciaef.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dpapaj32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5f3e438c25da8ebf54e75f57742bd7030342098bee795a42a08a52a8635b1532.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cgcnghpl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cmpgpond.exe -
Modifies registry class 21 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fkdqjn32.dll" Cegoqlof.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dnpciaef.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pdkefp32.dll" Dnpciaef.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" 5f3e438c25da8ebf54e75f57742bd7030342098bee795a42a08a52a8635b1532.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cgcnghpl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cgcnghpl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cmpgpond.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nloone32.dll" Cmpgpond.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cegoqlof.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dnpciaef.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node 5f3e438c25da8ebf54e75f57742bd7030342098bee795a42a08a52a8635b1532.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID 5f3e438c25da8ebf54e75f57742bd7030342098bee795a42a08a52a8635b1532.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} 5f3e438c25da8ebf54e75f57742bd7030342098bee795a42a08a52a8635b1532.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Omakjj32.dll" 5f3e438c25da8ebf54e75f57742bd7030342098bee795a42a08a52a8635b1532.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cegoqlof.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cfhkhd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cfhkhd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 5f3e438c25da8ebf54e75f57742bd7030342098bee795a42a08a52a8635b1532.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pcaibd32.dll" Cgcnghpl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cmpgpond.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pmiljc32.dll" Cfhkhd32.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2084 wrote to memory of 2680 2084 5f3e438c25da8ebf54e75f57742bd7030342098bee795a42a08a52a8635b1532.exe 31 PID 2084 wrote to memory of 2680 2084 5f3e438c25da8ebf54e75f57742bd7030342098bee795a42a08a52a8635b1532.exe 31 PID 2084 wrote to memory of 2680 2084 5f3e438c25da8ebf54e75f57742bd7030342098bee795a42a08a52a8635b1532.exe 31 PID 2084 wrote to memory of 2680 2084 5f3e438c25da8ebf54e75f57742bd7030342098bee795a42a08a52a8635b1532.exe 31 PID 2680 wrote to memory of 2656 2680 Cgcnghpl.exe 32 PID 2680 wrote to memory of 2656 2680 Cgcnghpl.exe 32 PID 2680 wrote to memory of 2656 2680 Cgcnghpl.exe 32 PID 2680 wrote to memory of 2656 2680 Cgcnghpl.exe 32 PID 2656 wrote to memory of 2796 2656 Cmpgpond.exe 33 PID 2656 wrote to memory of 2796 2656 Cmpgpond.exe 33 PID 2656 wrote to memory of 2796 2656 Cmpgpond.exe 33 PID 2656 wrote to memory of 2796 2656 Cmpgpond.exe 33 PID 2796 wrote to memory of 2664 2796 Cegoqlof.exe 34 PID 2796 wrote to memory of 2664 2796 Cegoqlof.exe 34 PID 2796 wrote to memory of 2664 2796 Cegoqlof.exe 34 PID 2796 wrote to memory of 2664 2796 Cegoqlof.exe 34 PID 2664 wrote to memory of 2672 2664 Cfhkhd32.exe 35 PID 2664 wrote to memory of 2672 2664 Cfhkhd32.exe 35 PID 2664 wrote to memory of 2672 2664 Cfhkhd32.exe 35 PID 2664 wrote to memory of 2672 2664 Cfhkhd32.exe 35 PID 2672 wrote to memory of 3004 2672 Dnpciaef.exe 36 PID 2672 wrote to memory of 3004 2672 Dnpciaef.exe 36 PID 2672 wrote to memory of 3004 2672 Dnpciaef.exe 36 PID 2672 wrote to memory of 3004 2672 Dnpciaef.exe 36 PID 3004 wrote to memory of 2764 3004 Dpapaj32.exe 37 PID 3004 wrote to memory of 2764 3004 Dpapaj32.exe 37 PID 3004 wrote to memory of 2764 3004 Dpapaj32.exe 37 PID 3004 wrote to memory of 2764 3004 Dpapaj32.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\5f3e438c25da8ebf54e75f57742bd7030342098bee795a42a08a52a8635b1532.exe"C:\Users\Admin\AppData\Local\Temp\5f3e438c25da8ebf54e75f57742bd7030342098bee795a42a08a52a8635b1532.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\SysWOW64\Cgcnghpl.exeC:\Windows\system32\Cgcnghpl.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\SysWOW64\Cmpgpond.exeC:\Windows\system32\Cmpgpond.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\SysWOW64\Cegoqlof.exeC:\Windows\system32\Cegoqlof.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\SysWOW64\Cfhkhd32.exeC:\Windows\system32\Cfhkhd32.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\SysWOW64\Dnpciaef.exeC:\Windows\system32\Dnpciaef.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\SysWOW64\Dpapaj32.exeC:\Windows\system32\Dpapaj32.exe7⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3004 -s 1448⤵
- Loads dropped DLL
- Program crash
PID:2764
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
55KB
MD597f75003d3cf1ca4d52d1d7652edcfdd
SHA13713f2cd301949834770a58df438346f99bab20f
SHA256fea8e8c5c1c0aa06ba5905a1ff80256228153188c7c2fe7e28bd1ef7ad608e26
SHA512e39b45ee24efb9aab8147a54fc3a02aba53b71440877642da1962cdc8e8dcb5d3a059c197b07d55f68133ad07f3eb81bafd60a605d6a7b64d87c8ecbb3ed3ef3
-
Filesize
55KB
MD57fedb8c0cdafb4e5fe3dc6abfe24abf7
SHA1d50c95f76c41e0faa31e713603e06c809ee7874f
SHA2568e28c5131bbfcbd1a25bcba392e21ec56b24d51125f17a3e64553df0dd0e9daf
SHA512388ee83ad9865a201fc40f1c0101f6a82c6a3feb23f4870aaf3523764e5d4f41c52b2dd2656b23e3e05ba6747c8d79d4a04b091015bbbee60a42776a7d87694f
-
Filesize
55KB
MD5d5b0594c16e710aa7179d583c1a37872
SHA1d3bfbdd77294fae201cee3914d4a7198de861ec1
SHA25640c6e1c0b464dd8ed67a5c8814835efda9b1c663fa7c74ab4e165ec5af33dcc4
SHA51231896d7782a943cf5fe58c4a0f390018ccdc96d28fc417331904fa12ed29177351004e655897245f699a5aa8135a59976d4042d9237a4d258f0d8d59b701fc8a
-
Filesize
55KB
MD5fabe2a2cfdced2eb8c1eb0d6d27710ac
SHA103ebe9d445e61d5428eaf411abb5db992470d61f
SHA25674e90ab82e24a77ffe2e28f4abb7febd47adf64fc9c4bd2a20c7cfebdef466f0
SHA512f14101e2bd18766cdd0ed0f26ac405b5353a7f0b15b81e819e1f650e0fd30cc50f0bb5abf6dc9e7e82f810b59d7222d5f69ea369f7ecf2be4732d30fbcf2dfa5
-
Filesize
55KB
MD5beb8e6fa705ca8636fb1872162394ae9
SHA18ba5c36a29ee37b36cc726563325c7d18a544093
SHA25668e0483e75880f7de6fdd8b468cb6721aeb1dfb57e59e02564a147b3adfd4567
SHA512ba8c827d1b36c8abe4c02b626bc6b15e7692b1691ea41397d4c63f2381638ddadabf3513c67a3ffe6f5e40cf0ee769509b5b5c3fc4c195a68c4d16ec2029a25f
-
Filesize
55KB
MD54a37679ae4e161ad8cda470abf3e19e2
SHA11bf8fed4b61e776e504dbf56b0e31a564862627e
SHA256d08d87eb36ed12e5b9fd17c50f53c3cb7da1c95cab61ca1e442e7e6651810375
SHA512ec82b2d2f44ee2aefc42cb1e2cd200684d4e5626614f5083f0ea8b6d7286b70271cfb13460a5c78dc181c3410f1c8af330e6ee78c0ba4e5d11b2eb4675a1de01