Analysis

  • max time kernel
    143s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/10/2023, 19:45

General

  • Target

    c715b4e6ebebc84e3671f6392e628aa0_exe32.exe

  • Size

    96KB

  • MD5

    c715b4e6ebebc84e3671f6392e628aa0

  • SHA1

    dbc3dc9d4040223906ad0830e343ef1c9bddf462

  • SHA256

    3072ec2a2067ba40bab69858eae7eea162ace18b2c4c0468609581f7bc4df08b

  • SHA512

    f274dea8445cd624f3a496ab9018f1a80965812c1b21b96f25b2de75b248cf84f075750798fe167c18ab74b2a469e6b5a5b812e6d32f644bd4521e9e1e68736a

  • SSDEEP

    1536:20tRqvN5pzgJUuShYYMfLzWlc7OVAPgnDNBrcN4i6tBYuR3PlNPMAZ:zspzjuShYYMzzWlEOVAPgxed6BYudlNd

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 8 IoCs
  • Executes dropped EXE 4 IoCs
  • Drops file in System32 directory 12 IoCs
  • Program crash 1 IoCs
  • Modifies registry class 15 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c715b4e6ebebc84e3671f6392e628aa0_exe32.exe
    "C:\Users\Admin\AppData\Local\Temp\c715b4e6ebebc84e3671f6392e628aa0_exe32.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4900
    • C:\Windows\SysWOW64\Daconoae.exe
      C:\Windows\system32\Daconoae.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:3644
      • C:\Windows\SysWOW64\Dfpgffpm.exe
        C:\Windows\system32\Dfpgffpm.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Drops file in System32 directory
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2356
        • C:\Windows\SysWOW64\Dddhpjof.exe
          C:\Windows\system32\Dddhpjof.exe
          4⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Drops file in System32 directory
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:4580
          • C:\Windows\SysWOW64\Dmllipeg.exe
            C:\Windows\system32\Dmllipeg.exe
            5⤵
            • Executes dropped EXE
            PID:216
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 216 -s 396
              6⤵
              • Program crash
              PID:1612
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 216 -ip 216
    1⤵
      PID:4368

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Windows\SysWOW64\Daconoae.exe

            Filesize

            96KB

            MD5

            4c48a763c83afb6c6d1471311087b54c

            SHA1

            7f7ceec87149bd4e3226ad9e4baf532cede5ff92

            SHA256

            10cc7519289804e30706de64b509fe0df33a2ffffcf264062b520f16e9d696ee

            SHA512

            32c6a1f4119dec7910e736f6733dac33eb1e08c8bce32f6487b949ad6770b4c7c0f7d310bb7730af8639651a1a6b2fa148307a6fcafadd133a6e4f35fd0f38ad

          • C:\Windows\SysWOW64\Daconoae.exe

            Filesize

            96KB

            MD5

            4c48a763c83afb6c6d1471311087b54c

            SHA1

            7f7ceec87149bd4e3226ad9e4baf532cede5ff92

            SHA256

            10cc7519289804e30706de64b509fe0df33a2ffffcf264062b520f16e9d696ee

            SHA512

            32c6a1f4119dec7910e736f6733dac33eb1e08c8bce32f6487b949ad6770b4c7c0f7d310bb7730af8639651a1a6b2fa148307a6fcafadd133a6e4f35fd0f38ad

          • C:\Windows\SysWOW64\Dddhpjof.exe

            Filesize

            96KB

            MD5

            498b0bcf93019f81d0632da62fb12a5d

            SHA1

            39e8aac782fb2bb6925e6e160f0292fa82d61503

            SHA256

            681cac52b5a4b6e65ca7e3ba84a332668dd6450b2d3fb46770390e6a7c5e3cbb

            SHA512

            b356a429eecdc1d8e536480dac5b1d7d8739b6b72f139803676bcf7c31b10d1b0ea15cdbf2362aae64487fb11f7f714e39c3bb0ae113950383d766d354ed5ca2

          • C:\Windows\SysWOW64\Dddhpjof.exe

            Filesize

            96KB

            MD5

            498b0bcf93019f81d0632da62fb12a5d

            SHA1

            39e8aac782fb2bb6925e6e160f0292fa82d61503

            SHA256

            681cac52b5a4b6e65ca7e3ba84a332668dd6450b2d3fb46770390e6a7c5e3cbb

            SHA512

            b356a429eecdc1d8e536480dac5b1d7d8739b6b72f139803676bcf7c31b10d1b0ea15cdbf2362aae64487fb11f7f714e39c3bb0ae113950383d766d354ed5ca2

          • C:\Windows\SysWOW64\Dddhpjof.exe

            Filesize

            96KB

            MD5

            498b0bcf93019f81d0632da62fb12a5d

            SHA1

            39e8aac782fb2bb6925e6e160f0292fa82d61503

            SHA256

            681cac52b5a4b6e65ca7e3ba84a332668dd6450b2d3fb46770390e6a7c5e3cbb

            SHA512

            b356a429eecdc1d8e536480dac5b1d7d8739b6b72f139803676bcf7c31b10d1b0ea15cdbf2362aae64487fb11f7f714e39c3bb0ae113950383d766d354ed5ca2

          • C:\Windows\SysWOW64\Dfpgffpm.exe

            Filesize

            96KB

            MD5

            85923a8ba9bfaf206ad2cf9c98395a51

            SHA1

            24dbda9d071c2851d3afe6d8483b9b07a4e1f832

            SHA256

            be5fe438579bf4c8ed16acc5e97e12332e5263b8ce611a0c1d3fe1ba07d6c5d8

            SHA512

            76fe721a2d9d765755ed492fa2f23eda0c13717b61c2d8e81e1596c05c04f2db4d4eb40bf0269389b47d75cff9c411027ad4f718c3e790e6cdabcda9e642cd28

          • C:\Windows\SysWOW64\Dfpgffpm.exe

            Filesize

            96KB

            MD5

            85923a8ba9bfaf206ad2cf9c98395a51

            SHA1

            24dbda9d071c2851d3afe6d8483b9b07a4e1f832

            SHA256

            be5fe438579bf4c8ed16acc5e97e12332e5263b8ce611a0c1d3fe1ba07d6c5d8

            SHA512

            76fe721a2d9d765755ed492fa2f23eda0c13717b61c2d8e81e1596c05c04f2db4d4eb40bf0269389b47d75cff9c411027ad4f718c3e790e6cdabcda9e642cd28

          • C:\Windows\SysWOW64\Dmllipeg.exe

            Filesize

            96KB

            MD5

            a572f07fa1cf03ff50c46cc8086d92a3

            SHA1

            50869bc18037b4f8ec706c62f5af23d55faa14a9

            SHA256

            933f38cf88d59eb8f29bda1ee819943bd270e5af957ce2f301d3a656651b0cc6

            SHA512

            4b31ee1a1bc22d6447b1f4b45ce1b775231b0bb7c74921c95f7edae687296a3b5a63e21a440e9bf9b09210aa19e0ec391b6ccb9f1834fd62cecdc9a4a7b73df2

          • C:\Windows\SysWOW64\Dmllipeg.exe

            Filesize

            96KB

            MD5

            a572f07fa1cf03ff50c46cc8086d92a3

            SHA1

            50869bc18037b4f8ec706c62f5af23d55faa14a9

            SHA256

            933f38cf88d59eb8f29bda1ee819943bd270e5af957ce2f301d3a656651b0cc6

            SHA512

            4b31ee1a1bc22d6447b1f4b45ce1b775231b0bb7c74921c95f7edae687296a3b5a63e21a440e9bf9b09210aa19e0ec391b6ccb9f1834fd62cecdc9a4a7b73df2

          • memory/216-34-0x0000000000400000-0x0000000000444000-memory.dmp

            Filesize

            272KB

          • memory/216-33-0x0000000000400000-0x0000000000444000-memory.dmp

            Filesize

            272KB

          • memory/2356-16-0x0000000000400000-0x0000000000444000-memory.dmp

            Filesize

            272KB

          • memory/2356-37-0x0000000000400000-0x0000000000444000-memory.dmp

            Filesize

            272KB

          • memory/3644-9-0x0000000000400000-0x0000000000444000-memory.dmp

            Filesize

            272KB

          • memory/3644-36-0x0000000000400000-0x0000000000444000-memory.dmp

            Filesize

            272KB

          • memory/4580-24-0x0000000000400000-0x0000000000444000-memory.dmp

            Filesize

            272KB

          • memory/4580-35-0x0000000000400000-0x0000000000444000-memory.dmp

            Filesize

            272KB

          • memory/4900-0-0x0000000000400000-0x0000000000444000-memory.dmp

            Filesize

            272KB

          • memory/4900-5-0x0000000000400000-0x0000000000444000-memory.dmp

            Filesize

            272KB

          • memory/4900-38-0x0000000000400000-0x0000000000444000-memory.dmp

            Filesize

            272KB