Overview
overview
7Static
static
398949a479e...1d.exe
windows7-x64
798949a479e...1d.exe
windows10-2004-x64
7$PLUGINSDI...er.dll
windows7-x64
1$PLUGINSDI...er.dll
windows10-2004-x64
1$PLUGINSDI...dl.dll
windows7-x64
3$PLUGINSDI...dl.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/pwgen.dll
windows7-x64
3$PLUGINSDIR/pwgen.dll
windows10-2004-x64
3DomaIQ.exe
windows7-x64
1DomaIQ.exe
windows10-2004-x64
1DomaIQ10.exe
windows7-x64
1DomaIQ10.exe
windows10-2004-x64
1Analysis
-
max time kernel
117s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
13-02-2024 05:22
Static task
static1
Behavioral task
behavioral1
Sample
98949a479e481213c2b747263ad7501d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
98949a479e481213c2b747263ad7501d.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/Banner.dll
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/Banner.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/pwgen.dll
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/pwgen.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral11
Sample
DomaIQ.exe
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
DomaIQ.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral13
Sample
DomaIQ10.exe
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
DomaIQ10.exe
Resource
win10v2004-20231222-en
General
-
Target
98949a479e481213c2b747263ad7501d.exe
-
Size
489KB
-
MD5
98949a479e481213c2b747263ad7501d
-
SHA1
21013b2c7d0efd7c4f065855ef7e646257a775a7
-
SHA256
24ca1ccadea86789ecfa651686910b20bd61a1ae775969b3cbf904d963df778c
-
SHA512
58496db0a59d886f15214270538fe05370fe2e4513ac864a8dbcd5d644573af624ff8d4b10d6c13ffde1b5062b591995eda2e7e6b92d710d149125707384087e
-
SSDEEP
12288:heuo6R5cmgutOGrBtHLdB1+3E5zdWLCr+d6iv9su3uXEl:Iju56pGl/B1Cir+d6i2ukEl
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2756 98949a479e481213c2b747263ad7501d.exe -
Loads dropped DLL 2 IoCs
pid Process 2224 98949a479e481213c2b747263ad7501d.exe 2224 98949a479e481213c2b747263ad7501d.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2224 98949a479e481213c2b747263ad7501d.exe 2224 98949a479e481213c2b747263ad7501d.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2224 wrote to memory of 2756 2224 98949a479e481213c2b747263ad7501d.exe 28 PID 2224 wrote to memory of 2756 2224 98949a479e481213c2b747263ad7501d.exe 28 PID 2224 wrote to memory of 2756 2224 98949a479e481213c2b747263ad7501d.exe 28 PID 2224 wrote to memory of 2756 2224 98949a479e481213c2b747263ad7501d.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\98949a479e481213c2b747263ad7501d.exe"C:\Users\Admin\AppData\Local\Temp\98949a479e481213c2b747263ad7501d.exe"1⤵
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Users\Admin\AppData\Local\Temp\DM\1pNdvVoPM3y2mMB\98949a479e481213c2b747263ad7501d.exeC:\Users\Admin\AppData\Local\Temp\DM\1pNdvVoPM3y2mMB\98949a479e481213c2b747263ad7501d.exe /path="C:\Users\Admin\AppData\Local\Temp\98949a479e481213c2b747263ad7501d.exe"2⤵
- Executes dropped EXE
PID:2756
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
304KB
MD559b5aa3f572455d055c5bf4a4486b258
SHA1b82bd1d4f29aab24511aa72c6b00b56a3801913e
SHA2565bf9ff06bd6be2728d8dc30329d0de3f53fd4b33a5ed76eff4cdb19aa2a45488
SHA512eabe184c09adbb80cebc5bb2fbba71e8fb162c858b3fff39e66b5b8050281df12e84c5cfd707a0de9728f5f6059c79633e599440177d02cd8afa863ec2dc5b06
-
Filesize
361KB
MD5d50392c6002950c8e2fc7ea0c7af4a05
SHA18cd8fd41bbb9fdb2376b1623af9f2e850ef142ce
SHA256bfe0338d37e9cb6ceb5b47742f400f06345c713e2743947afb0db19da9428787
SHA5125e6a2ad58c24eacba09c197ed5d07e6b37c1a897cfde0fc27743087c0d6a47ee14204497c5c6af8696999ced668eb0d858ebe711d14c3f236a2eac5f3cb5addf
-
Filesize
16KB
MD5a555472395178ac8c733d90928e05017
SHA1f44b192d66473f01a6540aaec4b6c9ac4c611d35
SHA25682ae08fced4a1f9a7df123634da5f4cb12af4593a006bef421a54739a2cbd44e
SHA512e6d87b030c45c655d93b2e76d7437ad900df5da2475dd2e6e28b6c872040491e80f540b00b6091d16bc8410bd58a1e82c62ee1b17193ef8500a153d4474bb80a