Analysis

  • max time kernel
    141s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    08-09-2024 02:47

General

  • Target

    5f3e438c25da8ebf54e75f57742bd7030342098bee795a42a08a52a8635b1532.exe

  • Size

    55KB

  • MD5

    cbca82e8dcc5f13554b46fa4c69f1939

  • SHA1

    71e420fd3905d73499f75f1e039b2604d5e6a7b2

  • SHA256

    5f3e438c25da8ebf54e75f57742bd7030342098bee795a42a08a52a8635b1532

  • SHA512

    496276b2b9a92eff624c7908fe3f247228c934483f175bd5b51c404ce8cf416dd5c140451f0eabea514e00bd1d8abc22913958410b62dfadb0d45022013f016a

  • SSDEEP

    1536:B6kXEX4Y+b7TiMyWLARAP4IYFwvds72Ld:lXM4Y+b7TiMyWLARnFwpd

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 12 IoCs
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 15 IoCs
  • Drops file in System32 directory 20 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 21 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5f3e438c25da8ebf54e75f57742bd7030342098bee795a42a08a52a8635b1532.exe
    "C:\Users\Admin\AppData\Local\Temp\5f3e438c25da8ebf54e75f57742bd7030342098bee795a42a08a52a8635b1532.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2084
    • C:\Windows\SysWOW64\Cgcnghpl.exe
      C:\Windows\system32\Cgcnghpl.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2680
      • C:\Windows\SysWOW64\Cmpgpond.exe
        C:\Windows\system32\Cmpgpond.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2656
        • C:\Windows\SysWOW64\Cegoqlof.exe
          C:\Windows\system32\Cegoqlof.exe
          4⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:2796
          • C:\Windows\SysWOW64\Cfhkhd32.exe
            C:\Windows\system32\Cfhkhd32.exe
            5⤵
            • Adds autorun key to be loaded by Explorer.exe on startup
            • Executes dropped EXE
            • Loads dropped DLL
            • Drops file in System32 directory
            • System Location Discovery: System Language Discovery
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:2664
            • C:\Windows\SysWOW64\Dnpciaef.exe
              C:\Windows\system32\Dnpciaef.exe
              6⤵
              • Adds autorun key to be loaded by Explorer.exe on startup
              • Executes dropped EXE
              • Loads dropped DLL
              • Drops file in System32 directory
              • System Location Discovery: System Language Discovery
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:2672
              • C:\Windows\SysWOW64\Dpapaj32.exe
                C:\Windows\system32\Dpapaj32.exe
                7⤵
                • Executes dropped EXE
                • Drops file in System32 directory
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:3004
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 3004 -s 144
                  8⤵
                  • Loads dropped DLL
                  • Program crash
                  PID:2764

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Windows\SysWOW64\Cegoqlof.exe

    Filesize

    55KB

    MD5

    97f75003d3cf1ca4d52d1d7652edcfdd

    SHA1

    3713f2cd301949834770a58df438346f99bab20f

    SHA256

    fea8e8c5c1c0aa06ba5905a1ff80256228153188c7c2fe7e28bd1ef7ad608e26

    SHA512

    e39b45ee24efb9aab8147a54fc3a02aba53b71440877642da1962cdc8e8dcb5d3a059c197b07d55f68133ad07f3eb81bafd60a605d6a7b64d87c8ecbb3ed3ef3

  • \Windows\SysWOW64\Cfhkhd32.exe

    Filesize

    55KB

    MD5

    7fedb8c0cdafb4e5fe3dc6abfe24abf7

    SHA1

    d50c95f76c41e0faa31e713603e06c809ee7874f

    SHA256

    8e28c5131bbfcbd1a25bcba392e21ec56b24d51125f17a3e64553df0dd0e9daf

    SHA512

    388ee83ad9865a201fc40f1c0101f6a82c6a3feb23f4870aaf3523764e5d4f41c52b2dd2656b23e3e05ba6747c8d79d4a04b091015bbbee60a42776a7d87694f

  • \Windows\SysWOW64\Cgcnghpl.exe

    Filesize

    55KB

    MD5

    d5b0594c16e710aa7179d583c1a37872

    SHA1

    d3bfbdd77294fae201cee3914d4a7198de861ec1

    SHA256

    40c6e1c0b464dd8ed67a5c8814835efda9b1c663fa7c74ab4e165ec5af33dcc4

    SHA512

    31896d7782a943cf5fe58c4a0f390018ccdc96d28fc417331904fa12ed29177351004e655897245f699a5aa8135a59976d4042d9237a4d258f0d8d59b701fc8a

  • \Windows\SysWOW64\Cmpgpond.exe

    Filesize

    55KB

    MD5

    fabe2a2cfdced2eb8c1eb0d6d27710ac

    SHA1

    03ebe9d445e61d5428eaf411abb5db992470d61f

    SHA256

    74e90ab82e24a77ffe2e28f4abb7febd47adf64fc9c4bd2a20c7cfebdef466f0

    SHA512

    f14101e2bd18766cdd0ed0f26ac405b5353a7f0b15b81e819e1f650e0fd30cc50f0bb5abf6dc9e7e82f810b59d7222d5f69ea369f7ecf2be4732d30fbcf2dfa5

  • \Windows\SysWOW64\Dnpciaef.exe

    Filesize

    55KB

    MD5

    beb8e6fa705ca8636fb1872162394ae9

    SHA1

    8ba5c36a29ee37b36cc726563325c7d18a544093

    SHA256

    68e0483e75880f7de6fdd8b468cb6721aeb1dfb57e59e02564a147b3adfd4567

    SHA512

    ba8c827d1b36c8abe4c02b626bc6b15e7692b1691ea41397d4c63f2381638ddadabf3513c67a3ffe6f5e40cf0ee769509b5b5c3fc4c195a68c4d16ec2029a25f

  • \Windows\SysWOW64\Dpapaj32.exe

    Filesize

    55KB

    MD5

    4a37679ae4e161ad8cda470abf3e19e2

    SHA1

    1bf8fed4b61e776e504dbf56b0e31a564862627e

    SHA256

    d08d87eb36ed12e5b9fd17c50f53c3cb7da1c95cab61ca1e442e7e6651810375

    SHA512

    ec82b2d2f44ee2aefc42cb1e2cd200684d4e5626614f5083f0ea8b6d7286b70271cfb13460a5c78dc181c3410f1c8af330e6ee78c0ba4e5d11b2eb4675a1de01

  • memory/2084-87-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2084-0-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2084-7-0x00000000002D0000-0x0000000000303000-memory.dmp

    Filesize

    204KB

  • memory/2656-27-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2656-89-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2664-91-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2664-54-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2664-62-0x0000000000250000-0x0000000000283000-memory.dmp

    Filesize

    204KB

  • memory/2672-75-0x0000000000250000-0x0000000000283000-memory.dmp

    Filesize

    204KB

  • memory/2672-92-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2680-20-0x0000000000250000-0x0000000000283000-memory.dmp

    Filesize

    204KB

  • memory/2680-18-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2796-51-0x0000000001F60000-0x0000000001F93000-memory.dmp

    Filesize

    204KB

  • memory/2796-40-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2796-90-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/3004-93-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB