Analysis
-
max time kernel
114s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12/09/2024, 19:12
Static task
static1
Behavioral task
behavioral1
Sample
cd9d69625e7c9cb47c662775c8174780N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
cd9d69625e7c9cb47c662775c8174780N.exe
Resource
win10v2004-20240802-en
General
-
Target
cd9d69625e7c9cb47c662775c8174780N.exe
-
Size
1.2MB
-
MD5
cd9d69625e7c9cb47c662775c8174780
-
SHA1
5fa64329ec60101150506f671131c2d21dea3c86
-
SHA256
8e53fd173a089b3e80e7eeae1a80060783a288ecf68f4d3528194780780d3b42
-
SHA512
727e6ff5db824d3fce70b5ec9ad469874645dfc04ac7631537ed2834f865f819a0c1a0accf9a95ac58b2a8ba3a18f0d9209d968495b44df40237989232c62ef2
-
SSDEEP
24576:QN+7gu5YyCtCCm0BKh2kkkkK4kXkkkkkkkkhLX3a20R0v50+YR:bgu5RCtCXbazR0vk
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad cd9d69625e7c9cb47c662775c8174780N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" cd9d69625e7c9cb47c662775c8174780N.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gcghkm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Gcghkm32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gbhhieao.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Gbhhieao.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gclafmej.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Gclafmej.exe -
Executes dropped EXE 4 IoCs
pid Process 4808 Gcghkm32.exe 4720 Gbhhieao.exe 796 Gclafmej.exe 3152 Gbmadd32.exe -
Drops file in System32 directory 12 IoCs
description ioc Process File created C:\Windows\SysWOW64\Gbmadd32.exe Gclafmej.exe File opened for modification C:\Windows\SysWOW64\Gbmadd32.exe Gclafmej.exe File created C:\Windows\SysWOW64\Hjmgbm32.dll Gclafmej.exe File created C:\Windows\SysWOW64\Gcghkm32.exe cd9d69625e7c9cb47c662775c8174780N.exe File opened for modification C:\Windows\SysWOW64\Gcghkm32.exe cd9d69625e7c9cb47c662775c8174780N.exe File created C:\Windows\SysWOW64\Pqgpcnpb.dll cd9d69625e7c9cb47c662775c8174780N.exe File opened for modification C:\Windows\SysWOW64\Gbhhieao.exe Gcghkm32.exe File opened for modification C:\Windows\SysWOW64\Gclafmej.exe Gbhhieao.exe File created C:\Windows\SysWOW64\Gbhhieao.exe Gcghkm32.exe File created C:\Windows\SysWOW64\Jlkklm32.dll Gcghkm32.exe File created C:\Windows\SysWOW64\Gclafmej.exe Gbhhieao.exe File created C:\Windows\SysWOW64\Eocmgd32.dll Gbhhieao.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3880 3152 WerFault.exe 93 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cd9d69625e7c9cb47c662775c8174780N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gcghkm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gbhhieao.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gclafmej.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gbmadd32.exe -
Modifies registry class 15 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node cd9d69625e7c9cb47c662775c8174780N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Gbhhieao.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hjmgbm32.dll" Gclafmej.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 cd9d69625e7c9cb47c662775c8174780N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID cd9d69625e7c9cb47c662775c8174780N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pqgpcnpb.dll" cd9d69625e7c9cb47c662775c8174780N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Gcghkm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717} cd9d69625e7c9cb47c662775c8174780N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" cd9d69625e7c9cb47c662775c8174780N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jlkklm32.dll" Gcghkm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Gcghkm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Gbhhieao.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eocmgd32.dll" Gbhhieao.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Gclafmej.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Gclafmej.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1708 wrote to memory of 4808 1708 cd9d69625e7c9cb47c662775c8174780N.exe 90 PID 1708 wrote to memory of 4808 1708 cd9d69625e7c9cb47c662775c8174780N.exe 90 PID 1708 wrote to memory of 4808 1708 cd9d69625e7c9cb47c662775c8174780N.exe 90 PID 4808 wrote to memory of 4720 4808 Gcghkm32.exe 91 PID 4808 wrote to memory of 4720 4808 Gcghkm32.exe 91 PID 4808 wrote to memory of 4720 4808 Gcghkm32.exe 91 PID 4720 wrote to memory of 796 4720 Gbhhieao.exe 92 PID 4720 wrote to memory of 796 4720 Gbhhieao.exe 92 PID 4720 wrote to memory of 796 4720 Gbhhieao.exe 92 PID 796 wrote to memory of 3152 796 Gclafmej.exe 93 PID 796 wrote to memory of 3152 796 Gclafmej.exe 93 PID 796 wrote to memory of 3152 796 Gclafmej.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\cd9d69625e7c9cb47c662775c8174780N.exe"C:\Users\Admin\AppData\Local\Temp\cd9d69625e7c9cb47c662775c8174780N.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\SysWOW64\Gcghkm32.exeC:\Windows\system32\Gcghkm32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Windows\SysWOW64\Gbhhieao.exeC:\Windows\system32\Gbhhieao.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Windows\SysWOW64\Gclafmej.exeC:\Windows\system32\Gclafmej.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:796 -
C:\Windows\SysWOW64\Gbmadd32.exeC:\Windows\system32\Gbmadd32.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3152 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3152 -s 4166⤵
- Program crash
PID:3880
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3152 -ip 31521⤵PID:3916
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4412,i,1602949858158667699,12464335823361976127,262144 --variations-seed-version --mojo-platform-channel-handle=4448 /prefetch:81⤵PID:4572
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5211aaf60c61acc808b1425a48fd08034
SHA115250bb84c9523562f1a33671f99405940073434
SHA2562a4df7cfea6199de2505c5148dd7b16662365c22181421e16ea91d5af49fa880
SHA51209cb5422584a67f710a373d2829424c8f60af957c901cfc2a43bcfef1a90d528a01b473373befdc002839e900a606a44279bae26a72278e09bc79673245aee63
-
Filesize
1.2MB
MD59506e3fedf94b9b8f8bfe7e5bf9d8447
SHA1073a5f6fab92cba7193d12aea4026cf43be91614
SHA25635fc5cd18973da31e602ff77508abc5dd1d3b31ac9b7bcdf87359e24074c9465
SHA5123c8d81576f25cc2bfc1faa4b30a2d070f3ad4d46236ddfbbefcc2d37f0c74dde6de3648fcd88df3e5b3156eed29c74eb6037c30d76b26c276236faab7159b814
-
Filesize
1.2MB
MD5050f8aa8cc70ded06db314cdb1fa0059
SHA17186707e7336742ba27f66e2f692a603a4468084
SHA25674427ef1b1f39eb50b71e811f937c90e7b5ead27c531dd8349ebc08055eaaeb9
SHA512d6bac99a8f0791a596883d220e3eadb133d75791eb5fc8ea05a94a0a2016246bc610f9ece61c98f5c10ef3924f88e790fd5e58df81c418d7b2bec9ea5453469b
-
Filesize
1.2MB
MD5b4542ef5724ff4d4d00b38303185a257
SHA16e089358f854efbb6af69a0f0e453a95383d0730
SHA256709735e2c84477c917aa83eab626034bf24f49f1e8766231fbf84f92f16a6e6d
SHA5128e1f0ca6565871c8513daaf845abb2e6d2ecf155ce188dc94cec7325157b36dbe5e9c23cee3bb934ef985aafc6b8c8b81bcacad13d1101ac8e8c219ba4dd7d0a