Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
13/10/2024, 09:42
Static task
static1
Behavioral task
behavioral1
Sample
24cdf5d6b6a968caa3f07c6ee507f1455c56aa97d549da7bb703e828399b5b34N.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
24cdf5d6b6a968caa3f07c6ee507f1455c56aa97d549da7bb703e828399b5b34N.exe
Resource
win10v2004-20241007-en
General
-
Target
24cdf5d6b6a968caa3f07c6ee507f1455c56aa97d549da7bb703e828399b5b34N.exe
-
Size
844KB
-
MD5
f6a2744cec4d655785eedeec1a55cb40
-
SHA1
cdc0984915556c51cdafe107a1e58507d20ef420
-
SHA256
24cdf5d6b6a968caa3f07c6ee507f1455c56aa97d549da7bb703e828399b5b34
-
SHA512
b56af25313db7cf5e1e6201da155f9275a836e51a3364ba581e3e3c80ba06f03def71bacee07abeea6de1d7156f392a02c8312532ec5d5daa398b96f51e96f6f
-
SSDEEP
24576:ANmoH5W3TnbQihMpQnqrdX72LbY6x46uR/qYglMi:MmoH5W3TbQihw+cdX2x46uhqllMi
Malware Config
Extracted
berbew
http://f/wcmd.htm
http://f/ppslog.php
http://f/piplog.php?%s:%i:%i:%s:%09u:%i:%02d:%02d:%02d
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 24cdf5d6b6a968caa3f07c6ee507f1455c56aa97d549da7bb703e828399b5b34N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" 24cdf5d6b6a968caa3f07c6ee507f1455c56aa97d549da7bb703e828399b5b34N.exe -
Executes dropped EXE 1 IoCs
pid Process 2140 Ceegmj32.exe -
Loads dropped DLL 6 IoCs
pid Process 2288 24cdf5d6b6a968caa3f07c6ee507f1455c56aa97d549da7bb703e828399b5b34N.exe 2288 24cdf5d6b6a968caa3f07c6ee507f1455c56aa97d549da7bb703e828399b5b34N.exe 2700 WerFault.exe 2700 WerFault.exe 2700 WerFault.exe 2700 WerFault.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\Aoogfhfp.dll 24cdf5d6b6a968caa3f07c6ee507f1455c56aa97d549da7bb703e828399b5b34N.exe File created C:\Windows\SysWOW64\Ceegmj32.exe 24cdf5d6b6a968caa3f07c6ee507f1455c56aa97d549da7bb703e828399b5b34N.exe File opened for modification C:\Windows\SysWOW64\Ceegmj32.exe 24cdf5d6b6a968caa3f07c6ee507f1455c56aa97d549da7bb703e828399b5b34N.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2700 2140 WerFault.exe 28 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ceegmj32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 24cdf5d6b6a968caa3f07c6ee507f1455c56aa97d549da7bb703e828399b5b34N.exe -
Modifies registry class 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node 24cdf5d6b6a968caa3f07c6ee507f1455c56aa97d549da7bb703e828399b5b34N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID 24cdf5d6b6a968caa3f07c6ee507f1455c56aa97d549da7bb703e828399b5b34N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717} 24cdf5d6b6a968caa3f07c6ee507f1455c56aa97d549da7bb703e828399b5b34N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aoogfhfp.dll" 24cdf5d6b6a968caa3f07c6ee507f1455c56aa97d549da7bb703e828399b5b34N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" 24cdf5d6b6a968caa3f07c6ee507f1455c56aa97d549da7bb703e828399b5b34N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 24cdf5d6b6a968caa3f07c6ee507f1455c56aa97d549da7bb703e828399b5b34N.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2288 wrote to memory of 2140 2288 24cdf5d6b6a968caa3f07c6ee507f1455c56aa97d549da7bb703e828399b5b34N.exe 28 PID 2288 wrote to memory of 2140 2288 24cdf5d6b6a968caa3f07c6ee507f1455c56aa97d549da7bb703e828399b5b34N.exe 28 PID 2288 wrote to memory of 2140 2288 24cdf5d6b6a968caa3f07c6ee507f1455c56aa97d549da7bb703e828399b5b34N.exe 28 PID 2288 wrote to memory of 2140 2288 24cdf5d6b6a968caa3f07c6ee507f1455c56aa97d549da7bb703e828399b5b34N.exe 28 PID 2140 wrote to memory of 2700 2140 Ceegmj32.exe 29 PID 2140 wrote to memory of 2700 2140 Ceegmj32.exe 29 PID 2140 wrote to memory of 2700 2140 Ceegmj32.exe 29 PID 2140 wrote to memory of 2700 2140 Ceegmj32.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\24cdf5d6b6a968caa3f07c6ee507f1455c56aa97d549da7bb703e828399b5b34N.exe"C:\Users\Admin\AppData\Local\Temp\24cdf5d6b6a968caa3f07c6ee507f1455c56aa97d549da7bb703e828399b5b34N.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Windows\SysWOW64\Ceegmj32.exeC:\Windows\system32\Ceegmj32.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2140 -s 1403⤵
- Loads dropped DLL
- Program crash
PID:2700
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
844KB
MD55e82de2d7368a452eed8f1b882f7c67d
SHA1d4063125d3b3cc18b40d8c6cbc741fe11c6ba2a8
SHA25663b4d6b2db4b39d63a02c2efabad993d94b82fcd9fb242f34fd3d1c9f46d5ab7
SHA51219cadfbb6c0aefe9f1de3fec9fe5921241e82a8ae0cebef13b77f6977394e152744df7dcbe3833a8ff4327271beef5f00b9339601400c953b5f716f43f4f70f9