Analysis
-
max time kernel
119s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/10/2024, 08:12
Static task
static1
Behavioral task
behavioral1
Sample
d77b1cfbb6dc90482aa3a022c7099e0d585e57cde7195f896a5a87a685b6c990N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d77b1cfbb6dc90482aa3a022c7099e0d585e57cde7195f896a5a87a685b6c990N.exe
Resource
win10v2004-20241007-en
General
-
Target
d77b1cfbb6dc90482aa3a022c7099e0d585e57cde7195f896a5a87a685b6c990N.exe
-
Size
160KB
-
MD5
ebf171354d090a36a19c53591b7a6d50
-
SHA1
3e5abd63a5cb2abe8de76fdb7c8748b726492df1
-
SHA256
d77b1cfbb6dc90482aa3a022c7099e0d585e57cde7195f896a5a87a685b6c990
-
SHA512
c85027a412efd298356fedece0d1bf008eacfc18f31574848133b2b32796e578ebdef2cedf0ae96f628ff2f27874b8c6f77a3aeb0dddd0363b6177f630bddcf6
-
SSDEEP
3072:tjB04DabQyklgAxD8gb3a3+X13XRzrgHq/Wp+YmKfxgQdxvr:JB0s8M957aOl3BzrUmKyIxT
Malware Config
Extracted
berbew
http://f/wcmd.htm
http://f/ppslog.php
http://f/piplog.php?%s:%i:%i:%s:%09u:%i:%02d:%02d:%02d
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ckiigmcd.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad d77b1cfbb6dc90482aa3a022c7099e0d585e57cde7195f896a5a87a685b6c990N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" d77b1cfbb6dc90482aa3a022c7099e0d585e57cde7195f896a5a87a685b6c990N.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ckiigmcd.exe -
Executes dropped EXE 2 IoCs
pid Process 2712 Ckiigmcd.exe 2916 Cacacg32.exe -
Loads dropped DLL 8 IoCs
pid Process 2824 d77b1cfbb6dc90482aa3a022c7099e0d585e57cde7195f896a5a87a685b6c990N.exe 2824 d77b1cfbb6dc90482aa3a022c7099e0d585e57cde7195f896a5a87a685b6c990N.exe 2712 Ckiigmcd.exe 2712 Ckiigmcd.exe 2748 WerFault.exe 2748 WerFault.exe 2748 WerFault.exe 2748 WerFault.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Ckiigmcd.exe d77b1cfbb6dc90482aa3a022c7099e0d585e57cde7195f896a5a87a685b6c990N.exe File created C:\Windows\SysWOW64\Bjpdmqog.dll d77b1cfbb6dc90482aa3a022c7099e0d585e57cde7195f896a5a87a685b6c990N.exe File created C:\Windows\SysWOW64\Cacacg32.exe Ckiigmcd.exe File opened for modification C:\Windows\SysWOW64\Cacacg32.exe Ckiigmcd.exe File created C:\Windows\SysWOW64\Fdlpjk32.dll Ckiigmcd.exe File created C:\Windows\SysWOW64\Ckiigmcd.exe d77b1cfbb6dc90482aa3a022c7099e0d585e57cde7195f896a5a87a685b6c990N.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2748 2916 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cacacg32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d77b1cfbb6dc90482aa3a022c7099e0d585e57cde7195f896a5a87a685b6c990N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ckiigmcd.exe -
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ckiigmcd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 d77b1cfbb6dc90482aa3a022c7099e0d585e57cde7195f896a5a87a685b6c990N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node d77b1cfbb6dc90482aa3a022c7099e0d585e57cde7195f896a5a87a685b6c990N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" d77b1cfbb6dc90482aa3a022c7099e0d585e57cde7195f896a5a87a685b6c990N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ckiigmcd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID d77b1cfbb6dc90482aa3a022c7099e0d585e57cde7195f896a5a87a685b6c990N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717} d77b1cfbb6dc90482aa3a022c7099e0d585e57cde7195f896a5a87a685b6c990N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bjpdmqog.dll" d77b1cfbb6dc90482aa3a022c7099e0d585e57cde7195f896a5a87a685b6c990N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fdlpjk32.dll" Ckiigmcd.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2824 wrote to memory of 2712 2824 d77b1cfbb6dc90482aa3a022c7099e0d585e57cde7195f896a5a87a685b6c990N.exe 30 PID 2824 wrote to memory of 2712 2824 d77b1cfbb6dc90482aa3a022c7099e0d585e57cde7195f896a5a87a685b6c990N.exe 30 PID 2824 wrote to memory of 2712 2824 d77b1cfbb6dc90482aa3a022c7099e0d585e57cde7195f896a5a87a685b6c990N.exe 30 PID 2824 wrote to memory of 2712 2824 d77b1cfbb6dc90482aa3a022c7099e0d585e57cde7195f896a5a87a685b6c990N.exe 30 PID 2712 wrote to memory of 2916 2712 Ckiigmcd.exe 31 PID 2712 wrote to memory of 2916 2712 Ckiigmcd.exe 31 PID 2712 wrote to memory of 2916 2712 Ckiigmcd.exe 31 PID 2712 wrote to memory of 2916 2712 Ckiigmcd.exe 31 PID 2916 wrote to memory of 2748 2916 Cacacg32.exe 32 PID 2916 wrote to memory of 2748 2916 Cacacg32.exe 32 PID 2916 wrote to memory of 2748 2916 Cacacg32.exe 32 PID 2916 wrote to memory of 2748 2916 Cacacg32.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\d77b1cfbb6dc90482aa3a022c7099e0d585e57cde7195f896a5a87a685b6c990N.exe"C:\Users\Admin\AppData\Local\Temp\d77b1cfbb6dc90482aa3a022c7099e0d585e57cde7195f896a5a87a685b6c990N.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\SysWOW64\Ckiigmcd.exeC:\Windows\system32\Ckiigmcd.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\SysWOW64\Cacacg32.exeC:\Windows\system32\Cacacg32.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2916 -s 1404⤵
- Loads dropped DLL
- Program crash
PID:2748
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
160KB
MD5826b851af7943b425a5b731e2b5cc46e
SHA190076c785382113693f3906b7d2d72a6882aa966
SHA25643c07277ca56e30f44e0e74e487571419b8ac7379e15c6470879fe5d3fb0df7f
SHA512b759735f3e41eb16b4324786ca6775c62f23b2b0ae1924721f97c2cee3935ebec03d70fb49ae366daa45d632e5c11319c9133cebe5241113ee3780f35aa9abd5
-
Filesize
160KB
MD53d9c424cb4fd38d81040b47ced510469
SHA1ba6956898c74b8afe33e41c68bde021527455b9e
SHA256010c25e370570c55c0b152cba9a4803055af6081ee01cc2d250a98521777b3e2
SHA51269a5e106545d27f8efdaae6130a21034ced2cee35d02a88e2393861eb9f6c8e1b6c520437f5bb2567db04901e17e7e9f1caf6ac6b2183c05a2534ce7140574c3