Overview
overview
7Static
static
1doenerium-main.zip
windows10-1703-x64
1doenerium-...ld.bat
windows10-1703-x64
1doenerium-...ild.js
windows10-1703-x64
1doenerium-...fig.js
windows10-1703-x64
1doenerium-...ium.js
windows10-1703-x64
1doenerium-...ix.bat
windows10-1703-x64
1doenerium-main/fix.js
windows10-1703-x64
1doenerium-...ll.bat
windows10-1703-x64
1doenerium-...ief.py
windows10-1703-x64
3doenerium-...52.exe
windows10-1703-x64
7Analysis
-
max time kernel
127s -
max time network
136s -
platform
windows10-1703_x64 -
resource
win10-20231215-en -
resource tags
arch:x64arch:x86image:win10-20231215-enlocale:en-usos:windows10-1703-x64system -
submitted
24-12-2023 15:11
Static task
static1
Behavioral task
behavioral1
Sample
doenerium-main.zip
Resource
win10-20231215-en
Behavioral task
behavioral2
Sample
doenerium-main/build.bat
Resource
win10-20231215-en
Behavioral task
behavioral3
Sample
doenerium-main/build.js
Resource
win10-20231215-en
Behavioral task
behavioral4
Sample
doenerium-main/config.js
Resource
win10-20231215-en
Behavioral task
behavioral5
Sample
doenerium-main/doenerium.js
Resource
win10-20231215-en
Behavioral task
behavioral6
Sample
doenerium-main/fix.bat
Resource
win10-20231215-en
Behavioral task
behavioral7
Sample
doenerium-main/fix.js
Resource
win10-20231220-en
Behavioral task
behavioral8
Sample
doenerium-main/install.bat
Resource
win10-20231215-en
Behavioral task
behavioral9
Sample
doenerium-main/sigthief.py
Resource
win10-20231220-en
Behavioral task
behavioral10
Sample
doenerium-main/unsigned/Windows10Upgrade9252.exe
Resource
win10-20231215-en
General
-
Target
doenerium-main/unsigned/Windows10Upgrade9252.exe
-
Size
3.2MB
-
MD5
c0b25def4312fbddbcc4f01c6c0f5ba6
-
SHA1
8d16a183d61233e7d6b6af7b3cafc6645ac2acb1
-
SHA256
c0424d0ae06ca1e6e0249b40d33ac40d74075856d543ec0924884664fba52b79
-
SHA512
8c67619747bb108dae5661688ec8fa4c62bc6ac38ee6ff14a4691aab04d7ddd870fee4262cb30624a6bd85ac1f7595af05311496b0336f979e7e5f797791bc0e
-
SSDEEP
98304:GgjXlctych4cCzJ8k2omX8sUf0ht5f/LyXtcH/:JjKtych9CzJqXM32jyX
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3920 Windows10UpgraderApp.exe -
Loads dropped DLL 1 IoCs
pid Process 3920 Windows10UpgraderApp.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 26 IoCs
description ioc Process File created C:\Program Files (x86)\WindowsInstallationAssistant\resources\ux\eula.css Windows10Upgrade9252.exe File created C:\Program Files (x86)\WindowsInstallationAssistant\resources\ux\block.png Windows10Upgrade9252.exe File created C:\Program Files (x86)\WindowsInstallationAssistant\resources\ux\default.css Windows10Upgrade9252.exe File created C:\Program Files (x86)\WindowsInstallationAssistant\resources\ux\default.htm Windows10Upgrade9252.exe File created C:\Program Files (x86)\WindowsInstallationAssistant\WinDlp.dll Windows10Upgrade9252.exe File created C:\Program Files (x86)\WindowsInstallationAssistant\GetCurrentOOBE.dll Windows10Upgrade9252.exe File created C:\Program Files (x86)\WindowsInstallationAssistant\resources\ux\default_sunvalley.htm Windows10Upgrade9252.exe File created C:\Program Files (x86)\WindowsInstallationAssistant\downloader.dll Windows10Upgrade9252.exe File created C:\Program Files (x86)\WindowsInstallationAssistant\resources\ux\Microsoft.WinJS\css\oobe-desktopRS2.css Windows10Upgrade9252.exe File created C:\Program Files (x86)\WindowsInstallationAssistant\resources\ux\Microsoft.WinJS\css\ui-dark.css Windows10Upgrade9252.exe File created C:\Program Files (x86)\WindowsInstallationAssistant\resources\ux\pass.png Windows10Upgrade9252.exe File opened for modification C:\Program Files (x86)\WindowsInstallationAssistant\appraiserxp.dll Windows10Upgrade9252.exe File opened for modification C:\Program Files (x86)\WindowsInstallationAssistant\Configuration.ini Windows10UpgraderApp.exe File created C:\Program Files (x86)\WindowsInstallationAssistant\GetCurrentRollback.EXE Windows10Upgrade9252.exe File created C:\Program Files (x86)\WindowsInstallationAssistant\resources\ux\Microsoft.WinJS\js\base.js Windows10Upgrade9252.exe File created C:\Program Files (x86)\WindowsInstallationAssistant\resources\ux\Microsoft.WinJS\js\ui.js Windows10Upgrade9252.exe File created C:\Program Files (x86)\WindowsInstallationAssistant\ESDHelper.dll Windows10Upgrade9252.exe File created C:\Program Files (x86)\WindowsInstallationAssistant\resources\ux\loading.gif Windows10Upgrade9252.exe File created C:\Program Files (x86)\WindowsInstallationAssistant\resources\ux\logo.png Windows10Upgrade9252.exe File created C:\Program Files (x86)\WindowsInstallationAssistant\resources\ux\marketing.png Windows10Upgrade9252.exe File created C:\Program Files (x86)\WindowsInstallationAssistant\resources\ux\Microsoft.WinJS\css\oobe-desktop.css Windows10Upgrade9252.exe File created C:\Program Files (x86)\WindowsInstallationAssistant\Windows10UpgraderApp.exe Windows10Upgrade9252.exe File created C:\Program Files (x86)\WindowsInstallationAssistant\appraiserxp.dll Windows10Upgrade9252.exe File created C:\Program Files (x86)\WindowsInstallationAssistant\GetCurrentDeploy.dll Windows10Upgrade9252.exe File created C:\Program Files (x86)\WindowsInstallationAssistant\resources\ux\bullet.png Windows10Upgrade9252.exe File opened for modification C:\Program Files (x86)\WindowsInstallationAssistant\Configuration.ini Windows10Upgrade9252.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4268 3920 WerFault.exe 73 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-721438792-2341338383-2410509276-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch Windows10UpgraderApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-721438792-2341338383-2410509276-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" Windows10UpgraderApp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeBackupPrivilege 196 Windows10Upgrade9252.exe Token: SeRestorePrivilege 196 Windows10Upgrade9252.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 3920 Windows10UpgraderApp.exe 3920 Windows10UpgraderApp.exe 3920 Windows10UpgraderApp.exe 3920 Windows10UpgraderApp.exe 3920 Windows10UpgraderApp.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 196 wrote to memory of 3920 196 Windows10Upgrade9252.exe 73 PID 196 wrote to memory of 3920 196 Windows10Upgrade9252.exe 73 PID 196 wrote to memory of 3920 196 Windows10Upgrade9252.exe 73
Processes
-
C:\Users\Admin\AppData\Local\Temp\doenerium-main\unsigned\Windows10Upgrade9252.exe"C:\Users\Admin\AppData\Local\Temp\doenerium-main\unsigned\Windows10Upgrade9252.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:196 -
C:\Program Files (x86)\WindowsInstallationAssistant\Windows10UpgraderApp.exe"C:\Program Files (x86)\WindowsInstallationAssistant\Windows10UpgraderApp.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3920 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3920 -s 18123⤵
- Program crash
PID:4268
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
27B
MD5ca22263c7a6f965df18f5c601f5db7ce
SHA1e4b1a401ed497523a583ae8613646b03778a33a6
SHA256299fa3043627954c524b6171c26fcc3513790310aa2561e6f012eff15254381c
SHA5123cd39b438f7cb34b38f32240b1ba6a5010f49e12123db770460cf74217bc6946e2032355376c203b68863ee85596d21aa7b2d77c94da48a54def111d147311f8
-
Filesize
197KB
MD55b62ad6ae42f32806062ad1bcb3e2de5
SHA18d4a543eac9643931fcb620cd588e2cc1067920a
SHA25696f7b268820511abeeb6bbfad0918cf9161366bc2f558ef7f011331e7de1d6f3
SHA512af5bdbc5019b56eb9a32b6d264388e309e36013d43dbe09c61224ba6fabf1ff905371bc5b6ddaa0d5bfedae99cc5a7051f13fbf26cc756793799e568094eabcf
-
Filesize
1.2MB
MD5b0f44c4b01c9bf541b4c51a38e1f007c
SHA1822b68be5d42c0608284210b71072a8582240155
SHA25604910e3c5da5d8e519d98c9f21fa32453c309421871112d86a87ae55a1efb232
SHA5125b9a2914bab368828cde0299f3cf52d1f9eae2147649bed879304f07c271cc1a3033f7eece24645e08aca93984f98005c8403b57cea16dda0c9265cacbc08c32
-
Filesize
131KB
MD5ee9e3ed4c0bf3980848ed4e40a1bc9d2
SHA16c91eaaabd6b887deea24dbc5a45f1d139948e35
SHA256d29b029eff4256d5b87f8d784cd28ee01940e73f41ce271f97798ec7e1f04c7b
SHA5127e984537e727092068eaffdd6b6470fcb400f8cccc6ff63f7fec9b24cd983a218098b6ae34f5680fc1d6361eb4500d533cc06b1ebc37f8ca74c331014abf9ce9
-
Filesize
1.5MB
MD558a7bc0091ee0df1cd110f67c06730d9
SHA1e0b17accb44766fa3170e43de00e01c3d55f3631
SHA2560bbe00f24bafea1671e7c541a3e4551997737b8960064d0104608ba013b3e2e2
SHA512a5632e5b65adba4e2e05ab4bee33e6abd1047f80c75ca8df9732c1d587b5a0afec1091c121c51fbab07324ce9ba24fbc4a7153353cea7d26791965f31a356835
-
Filesize
82B
MD5b81d1e97c529ac3d7f5a699afce27080
SHA10a981264db289afd71695b4d6849672187e8120f
SHA25635c6e30c7954f7e4b806c883576218621e2620166c8940701b33157bdd0ba225
SHA512e5a8c95d0e9f7464f7bd908cf2f76c89100e69d9bc2e9354c0519bf7da15c5665b3ed97cd676d960d48c024993de0e9eb6683352d902eb86b8af68692334e607
-
Filesize
5KB
MD57f5fcac447cc2150ac90020f8dc8c98b
SHA15710398d65fba59bd91d603fc340bf2a101df40a
SHA256453d8ca4f52fb8fd40d5b4596596911b9fb0794bb89fbf9b60dc27af3eaa2850
SHA512b9fb315fdcf93d028423f49438b1eff40216b377d8c3bc866a20914c17e00bef58a18228bebb8b33c8a64fcaaa34bee84064bb24a525b4c9ac2f26e384edb1ff
-
Filesize
60KB
MD5b2a06af2867a2bb3d4b198a22f7936b3
SHA198a28e15abdd2d6989d667cc578bf6ab954c29f5
SHA25640f468006ab37ef4fcc54c5ff25005644f15d696f1269f67b450c9e3ce5e8d23
SHA512eefc295a7cd517c93bbeadee51ab778f371be8b21a92b0c06339da2e624abd19c34907e0a8965e6bfe81863752c56cc509fcf015a3ee986d208a5fc7cac8bfc5
-
Filesize
16KB
MD51a276cb116bdece96adf8e32c4af4fee
SHA16bc30738fcd0c04370436f4d3340d460d25b788f
SHA2569d9a156c6ca2929f0f22c310260723e28428cb38995c0f940f2617b25e15b618
SHA5125b515b5975fda333a6d9ca0e7de81dbc70311f4ecd8be22770d31c5f159807f653c87acf9df4a72b2d0664f0ef3141088de7f5aa12efc6307715c1c31ba55bb6
-
Filesize
2KB
MD5afeed45df4d74d93c260a86e71e09102
SHA12cc520e3d23f6b371c288645649a482a5db7ccd9
SHA256f5fb1e3a7bca4e2778903e8299c63ab34894e810a174b0143b79183c0fa5072f
SHA512778a6c494eab333c5bb00905adf556c019160c5ab858415c1dd918933f494faf3650e60845d557171c6e1370bcff687672d5af0f647302867b449a2cff9b925d
-
Filesize
420B
MD50968430a52f9f877d83ef2b46b107631
SHA1c1436477b4ee1ee0b0c81c9036eb228e4038b376
SHA256b210f3b072c60c2feb959e56c529e24cec77c1fcf933dcadad1f491f974f5e96
SHA5127a8a15524aecdb48753cc201c215df19bc79950373adc6dd4a8f641e3add53eba31d1309bf671e3b9e696616a3badce65839b211591a2eeebb9306390d81cfcf
-
Filesize
358KB
MD57e4ef3c7eb83012ec087e346d3728a44
SHA1368c054aebc24c1f86339cd4e2598796285e1af4
SHA256ff78232a641d169a21eb248d21fa88459137905f14c8c7d1aa2acbcc1c76b4e7
SHA512d7feb1c742003411409abb1dd71ccfd3d7988e829e01f01ccf80c53ad96ebdebb8910b5d1e83a275ae176af53097d66f593ecf619388cd026683ac6a495ce8ec
-
Filesize
39KB
MD55ad8ceea06e280b9b42e1b8df4b8b407
SHA1693ea7ac3f9fed186e0165e7667d2c41376c5d61
SHA25603a724309e738786023766fde298d17b6ccfcc3d2dbbf5c41725cf93eb891feb
SHA5121694fa3b9102771eef8a42b367d076c691b002de81eb4334ac6bd7befde747b168e7ed8f94f1c8f8877280f51c44adb69947fc1d899943d25b679a1be71dec84