Analysis

  • max time kernel
    119s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    12/09/2024, 11:31

General

  • Target

    2ceba4f52ef184d4b20b89c242925d30N.exe

  • Size

    94KB

  • MD5

    2ceba4f52ef184d4b20b89c242925d30

  • SHA1

    af2d9bc3ea6eb9c0fed1a04da4d9e1ad1b5af086

  • SHA256

    fa386f6f14454406e8532bcea7bc592f5fb837e7592608d5b8b3dfcaf8b4759a

  • SHA512

    04c2260051988f977058861469fa921ba01398de610f5279aef44f15f1a4e81eb21a25046a64211c44cb30f94c94b5106c7fc212653e602948c519bbfef4f742

  • SSDEEP

    1536:d+ucDzq52RSL8d6qaFqO1ZpmvQSS+AyI15CUwTAiO7BR9L4DT2EnINs:du3Sg6qQ1ZfP+/IHfAHO6+ob

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 24 IoCs
  • Executes dropped EXE 12 IoCs
  • Loads dropped DLL 27 IoCs
  • Drops file in System32 directory 38 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 13 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 39 IoCs
  • Suspicious use of WriteProcessMemory 52 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2ceba4f52ef184d4b20b89c242925d30N.exe
    "C:\Users\Admin\AppData\Local\Temp\2ceba4f52ef184d4b20b89c242925d30N.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1668
    • C:\Windows\SysWOW64\Cileqlmg.exe
      C:\Windows\system32\Cileqlmg.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2696
      • C:\Windows\SysWOW64\Ckjamgmk.exe
        C:\Windows\system32\Ckjamgmk.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2656
        • C:\Windows\SysWOW64\Cnimiblo.exe
          C:\Windows\system32\Cnimiblo.exe
          4⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:2732
          • C:\Windows\SysWOW64\Ckmnbg32.exe
            C:\Windows\system32\Ckmnbg32.exe
            5⤵
            • Adds autorun key to be loaded by Explorer.exe on startup
            • Executes dropped EXE
            • Loads dropped DLL
            • Drops file in System32 directory
            • System Location Discovery: System Language Discovery
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:2596
            • C:\Windows\SysWOW64\Cjonncab.exe
              C:\Windows\system32\Cjonncab.exe
              6⤵
              • Adds autorun key to be loaded by Explorer.exe on startup
              • Executes dropped EXE
              • Loads dropped DLL
              • Drops file in System32 directory
              • System Location Discovery: System Language Discovery
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:2620
              • C:\Windows\SysWOW64\Caifjn32.exe
                C:\Windows\system32\Caifjn32.exe
                7⤵
                • Adds autorun key to be loaded by Explorer.exe on startup
                • Executes dropped EXE
                • Loads dropped DLL
                • Drops file in System32 directory
                • System Location Discovery: System Language Discovery
                • Modifies registry class
                • Suspicious use of WriteProcessMemory
                PID:3004
                • C:\Windows\SysWOW64\Cgcnghpl.exe
                  C:\Windows\system32\Cgcnghpl.exe
                  8⤵
                  • Adds autorun key to be loaded by Explorer.exe on startup
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Drops file in System32 directory
                  • System Location Discovery: System Language Discovery
                  • Modifies registry class
                  • Suspicious use of WriteProcessMemory
                  PID:2760
                  • C:\Windows\SysWOW64\Cmpgpond.exe
                    C:\Windows\system32\Cmpgpond.exe
                    9⤵
                    • Adds autorun key to be loaded by Explorer.exe on startup
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Drops file in System32 directory
                    • System Location Discovery: System Language Discovery
                    • Modifies registry class
                    • Suspicious use of WriteProcessMemory
                    PID:2080
                    • C:\Windows\SysWOW64\Ccjoli32.exe
                      C:\Windows\system32\Ccjoli32.exe
                      10⤵
                      • Adds autorun key to be loaded by Explorer.exe on startup
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • Drops file in System32 directory
                      • System Location Discovery: System Language Discovery
                      • Modifies registry class
                      • Suspicious use of WriteProcessMemory
                      PID:1596
                      • C:\Windows\SysWOW64\Djdgic32.exe
                        C:\Windows\system32\Djdgic32.exe
                        11⤵
                        • Adds autorun key to be loaded by Explorer.exe on startup
                        • Executes dropped EXE
                        • Loads dropped DLL
                        • Drops file in System32 directory
                        • System Location Discovery: System Language Discovery
                        • Modifies registry class
                        • Suspicious use of WriteProcessMemory
                        PID:1620
                        • C:\Windows\SysWOW64\Dmbcen32.exe
                          C:\Windows\system32\Dmbcen32.exe
                          12⤵
                          • Adds autorun key to be loaded by Explorer.exe on startup
                          • Executes dropped EXE
                          • Loads dropped DLL
                          • Drops file in System32 directory
                          • System Location Discovery: System Language Discovery
                          • Modifies registry class
                          • Suspicious use of WriteProcessMemory
                          PID:2424
                          • C:\Windows\SysWOW64\Dpapaj32.exe
                            C:\Windows\system32\Dpapaj32.exe
                            13⤵
                            • Executes dropped EXE
                            • Drops file in System32 directory
                            • System Location Discovery: System Language Discovery
                            • Suspicious use of WriteProcessMemory
                            PID:320
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -u -p 320 -s 144
                              14⤵
                              • Loads dropped DLL
                              • Program crash
                              PID:2376

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\Cnimiblo.exe

          Filesize

          94KB

          MD5

          72dd01ba7e3d5fa41c7c748a763cd8e3

          SHA1

          a135da0ef3b0c10f098290dc1f9dc3469d965469

          SHA256

          33564117045f96a0957bbcc037133666d3a8c0b22e42f02b83ab105d1c03c753

          SHA512

          f7ace138d341586d89e5770307a88ddc226fa173be2b180c4e229256df61dd48ec61573f17620780d5a550ceb405bc6f4c062da70814ae0df8e8c2f5b2054268

        • C:\Windows\SysWOW64\Dmbcen32.exe

          Filesize

          94KB

          MD5

          eae06c89c8c6dce64b7082a97e8e8bb3

          SHA1

          7f8fc9eb0661e0a86b725234357f8c5d7e2445d8

          SHA256

          57df57313091efc5154bc8094f76a7e55a3220634ca7747ebc9a75f17e506b95

          SHA512

          19e6ff33f35551a699b2851dfcda4e50cbd513b13dda17fe61f88189280b25848c90f94a7ed186dc297fffc5e6891818fd2c4d3e3a0f8bc943c16c2329ab385d

        • C:\Windows\SysWOW64\Oeopijom.dll

          Filesize

          7KB

          MD5

          c4693c79f5b67e1ea312944a1bd4afc6

          SHA1

          dfb08127f586af56e3361942ca85f487d333ab0a

          SHA256

          df6a0f0036ca0bfc541a2b2fe53beb92f2dd4531b2dcc8c85d5dff43c7c8c101

          SHA512

          23c2f6c4d5b8b6a20a755505a9caf54f1731c6d460a90d60f7eb4751cf4b8023a0491f66ab6888749a6aab507514dab9ae67fa7a0bf9f3a7648720b056c30375

        • \Windows\SysWOW64\Caifjn32.exe

          Filesize

          94KB

          MD5

          1ab02211af198da6a569731a7ce15dc7

          SHA1

          ffb2836c0bc6bc6bacca71580facb953b590ef01

          SHA256

          5d88cc815c5ff3b4b3df31f8ebd80b9794976629b4ad87a47e21ae194e04e9c7

          SHA512

          84b00bc3eac06ab32a74c6b15bcf56b8b99138be8685c0127312a65a5b446774f8679ae4cc6bbbfdfd3d7ea704b6cc49aaa7763c3cca809acd5f6116d2331dc7

        • \Windows\SysWOW64\Ccjoli32.exe

          Filesize

          94KB

          MD5

          490952d4676bccd41734a38c86c161cc

          SHA1

          bae90815b72b906f190d95bfde6b962fdfe4a6b3

          SHA256

          4c890b5c24405b0a160fdcb9337f3ec5739b2a20f8539a74b6c6f00aead17512

          SHA512

          5de01abc2ffed68faa386f0045dbbb1dd8b0dba1ba9e0e61c877500bb961fe415aa516d90d2402be259e1fa292be98f4ede4d561dba2e0478bc73e7f3280e30d

        • \Windows\SysWOW64\Cgcnghpl.exe

          Filesize

          94KB

          MD5

          bf31ddf57850cc88f54a4ab3630b3bee

          SHA1

          9766be2d0883cc092321792fe6f3b4e526f52e99

          SHA256

          f656f9878b4320ce9ae35f4999196cfa725266fd8155bc80211b8b10b2978bae

          SHA512

          8aeeb41cae92228b940ae564fbefdbb9b511e57481c9e9d8b8b31c61cbba366738cd237d9948edc7870308e206c4d07b833480648f26928bd174bd07041c8647

        • \Windows\SysWOW64\Cileqlmg.exe

          Filesize

          94KB

          MD5

          0cc452403014947b90fb081863555993

          SHA1

          2c354890ae9109d9301700117ec3e7978661f57f

          SHA256

          e27ea41c5c9bc35a217ee0f7a4e4ce31baca15da396634ac511e0dca5c8764bb

          SHA512

          7280854320b5c99427237045810c26fe592e0119bed607bdf754ed9ada6cd3131aaa7a2ffc3db99354b31fefbead2f9affb8496f5203db62d2a098c58334d630

        • \Windows\SysWOW64\Cjonncab.exe

          Filesize

          94KB

          MD5

          89ccab83e4b85b0632ac807fe4110db0

          SHA1

          201a7eaf0eecf25318eed535b704a77dba19e79e

          SHA256

          d6798e7873a0f07218f968e86560480092df0b1417112cb35fc7117d5fce8cf8

          SHA512

          86ec7b37f92179a29b0647ca4c2e5440f0278fa954666beae4081bb98ffce704447bf47e93ed097232aa62bb7835f154272cc515fa5229ea0e2c869c1b6f5ff7

        • \Windows\SysWOW64\Ckjamgmk.exe

          Filesize

          94KB

          MD5

          efcb3815debd4fa70b4999609a2ae044

          SHA1

          8af64baaa9d6c72bd498f4c1a22bb6ccd4d2de96

          SHA256

          da23b4197e4e7e6086b42bab5fa3531553d282a1417b5ca9bc51a76dc6816ead

          SHA512

          49d05148d29ea003b57b4b21e0d0fe864a40493458a7de9bc403f504d82f08387ce539bcf78bb9a31c5754ea3f39b5e170c431e4b5fc20bac46f1f5715dc2c50

        • \Windows\SysWOW64\Ckmnbg32.exe

          Filesize

          94KB

          MD5

          a2a4d38a3f67c30a3ef3dab53c9d51a3

          SHA1

          51c34ebb66b89f001e9d69e2425e85adda945725

          SHA256

          f3b444d47f9fb440282e2d4aef03c6f3bbc37995f262af8fcfb6d218d1bf8973

          SHA512

          c733d4b7036809270d58b86fd68a2a69d2134c30a33359c6f09cbddfd7265005f80aa391ed34c2889c3816c3bd07bef77e9b56babe69d3e81c129b9b33552025

        • \Windows\SysWOW64\Cmpgpond.exe

          Filesize

          94KB

          MD5

          7e7b54876f728dfa17e13f24110446c6

          SHA1

          b17865818d1f9af337888082002e59ac67ca357f

          SHA256

          fe503d5fc6bef3c0b256f9d6fb21833b9bcad49a9a2bcba1c9f217cf3f714903

          SHA512

          bcb463474c435b18d8c19cc63d75db6259cc3048fc840f8b7899e721cb8a605865fb4ec6f328a032ea0d22544f7f264f0a4d969e76bf3e4f06e9c85f5d1682f7

        • \Windows\SysWOW64\Djdgic32.exe

          Filesize

          94KB

          MD5

          352f27e27a36b61f0f5ee81ac677e5d5

          SHA1

          6037173fa3c15be7c431ea5e5fe3854b3117d57f

          SHA256

          8b81a0dd4088eb6e5f431b67b837caab999a425df63751fce62796b8ebddb3da

          SHA512

          b8f31dd7f682c4b7c41cfe084341f79104f143a4acf8cebb60154e7a618bcf517dc0e4c65a41e2284149180b27b81ed5f289223f832aa9e78e2067d8c9aeb046

        • \Windows\SysWOW64\Dpapaj32.exe

          Filesize

          94KB

          MD5

          07bcc3ab809c88ffc0b102eab5607de0

          SHA1

          7be58f2c8616f59e3597e2ba26231579a168c930

          SHA256

          c8ad7a4687838205186301969d9777a0257ba900f2bc446aec57ac930dc5c88d

          SHA512

          a5ce553024dc805e10b9bc735cf8a7fb804263e6dff8ba112ef7073c16b3d936efbdd38778327d5a77fdb577093521771a425c990fd9294ffd50d62ad8dd0b86

        • memory/320-183-0x0000000000400000-0x0000000000435000-memory.dmp

          Filesize

          212KB

        • memory/1596-136-0x0000000000250000-0x0000000000285000-memory.dmp

          Filesize

          212KB

        • memory/1596-180-0x0000000000400000-0x0000000000435000-memory.dmp

          Filesize

          212KB

        • memory/1596-124-0x0000000000400000-0x0000000000435000-memory.dmp

          Filesize

          212KB

        • memory/1620-181-0x0000000000400000-0x0000000000435000-memory.dmp

          Filesize

          212KB

        • memory/1620-138-0x0000000000400000-0x0000000000435000-memory.dmp

          Filesize

          212KB

        • memory/1620-151-0x0000000000250000-0x0000000000285000-memory.dmp

          Filesize

          212KB

        • memory/1668-172-0x0000000000400000-0x0000000000435000-memory.dmp

          Filesize

          212KB

        • memory/1668-0-0x0000000000400000-0x0000000000435000-memory.dmp

          Filesize

          212KB

        • memory/1668-12-0x0000000000370000-0x00000000003A5000-memory.dmp

          Filesize

          212KB

        • memory/1668-13-0x0000000000370000-0x00000000003A5000-memory.dmp

          Filesize

          212KB

        • memory/2080-110-0x0000000000400000-0x0000000000435000-memory.dmp

          Filesize

          212KB

        • memory/2080-123-0x0000000000250000-0x0000000000285000-memory.dmp

          Filesize

          212KB

        • memory/2080-179-0x0000000000400000-0x0000000000435000-memory.dmp

          Filesize

          212KB

        • memory/2424-160-0x0000000000310000-0x0000000000345000-memory.dmp

          Filesize

          212KB

        • memory/2424-182-0x0000000000400000-0x0000000000435000-memory.dmp

          Filesize

          212KB

        • memory/2424-152-0x0000000000400000-0x0000000000435000-memory.dmp

          Filesize

          212KB

        • memory/2596-67-0x00000000002D0000-0x0000000000305000-memory.dmp

          Filesize

          212KB

        • memory/2596-175-0x0000000000400000-0x0000000000435000-memory.dmp

          Filesize

          212KB

        • memory/2596-58-0x0000000000400000-0x0000000000435000-memory.dmp

          Filesize

          212KB

        • memory/2620-80-0x0000000000290000-0x00000000002C5000-memory.dmp

          Filesize

          212KB

        • memory/2620-68-0x0000000000400000-0x0000000000435000-memory.dmp

          Filesize

          212KB

        • memory/2620-176-0x0000000000400000-0x0000000000435000-memory.dmp

          Filesize

          212KB

        • memory/2656-38-0x0000000000400000-0x0000000000435000-memory.dmp

          Filesize

          212KB

        • memory/2696-14-0x0000000000400000-0x0000000000435000-memory.dmp

          Filesize

          212KB

        • memory/2696-173-0x0000000000400000-0x0000000000435000-memory.dmp

          Filesize

          212KB

        • memory/2732-57-0x0000000000250000-0x0000000000285000-memory.dmp

          Filesize

          212KB

        • memory/2732-174-0x0000000000400000-0x0000000000435000-memory.dmp

          Filesize

          212KB

        • memory/2732-40-0x0000000000400000-0x0000000000435000-memory.dmp

          Filesize

          212KB

        • memory/2760-178-0x0000000000400000-0x0000000000435000-memory.dmp

          Filesize

          212KB

        • memory/2760-103-0x00000000002A0000-0x00000000002D5000-memory.dmp

          Filesize

          212KB

        • memory/2760-96-0x0000000000400000-0x0000000000435000-memory.dmp

          Filesize

          212KB

        • memory/3004-177-0x0000000000400000-0x0000000000435000-memory.dmp

          Filesize

          212KB

        • memory/3004-82-0x0000000000400000-0x0000000000435000-memory.dmp

          Filesize

          212KB

        • memory/3004-90-0x0000000000270000-0x00000000002A5000-memory.dmp

          Filesize

          212KB