Overview
overview
7Static
static
3aa0bfa2a66...82.exe
windows7-x64
7aa0bfa2a66...82.exe
windows10-2004-x64
7$PLUGINSDI...er.dll
windows7-x64
1$PLUGINSDI...er.dll
windows10-2004-x64
1$PLUGINSDI...dl.dll
windows7-x64
3$PLUGINSDI...dl.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3DomaIQ.exe
windows7-x64
1DomaIQ.exe
windows10-2004-x64
1DomaIQ10.exe
windows7-x64
1DomaIQ10.exe
windows10-2004-x64
1OfferBroke...03.exe
windows7-x64
6OfferBroke...03.exe
windows10-2004-x64
6config.dll
windows7-x64
1config.dll
windows10-2004-x64
1routes.dll
windows7-x64
1routes.dll
windows10-2004-x64
1Analysis
-
max time kernel
92s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
27/02/2024, 20:06
Static task
static1
Behavioral task
behavioral1
Sample
aa0bfa2a66ac906ce4805abc00fb4982.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
aa0bfa2a66ac906ce4805abc00fb4982.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/Banner.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/Banner.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
DomaIQ.exe
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
DomaIQ.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
DomaIQ10.exe
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
DomaIQ10.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
OfferBrokerage_14003.exe
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
OfferBrokerage_14003.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
config.dll
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
config.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral17
Sample
routes.dll
Resource
win7-20240215-en
Behavioral task
behavioral18
Sample
routes.dll
Resource
win10v2004-20240226-en
General
-
Target
aa0bfa2a66ac906ce4805abc00fb4982.exe
-
Size
955KB
-
MD5
aa0bfa2a66ac906ce4805abc00fb4982
-
SHA1
604382fd16029e37615f592f07c86ce4fd6f4161
-
SHA256
7f77e3fcc3789c8bb2aff6bcd8b25fd575e615bb50fbd9328e404dd1cc41edc1
-
SHA512
104c61cd43300254c20ee0fe17cddc7e3feee9ea6fdcc7187233ce2aadf2ad0a9343020e7580596f933c4f4e827f62f3cb01c5e7e5d1bcba0bb805bf8276cde2
-
SSDEEP
24576:LFtiJgJBteczX6XswGX8hcIF4gN8BoYU/q:uJm6GX8hcI96t
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3888 DomaIQ10.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3888 DomaIQ10.exe 3888 DomaIQ10.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4952 wrote to memory of 3888 4952 aa0bfa2a66ac906ce4805abc00fb4982.exe 91 PID 4952 wrote to memory of 3888 4952 aa0bfa2a66ac906ce4805abc00fb4982.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\aa0bfa2a66ac906ce4805abc00fb4982.exe"C:\Users\Admin\AppData\Local\Temp\aa0bfa2a66ac906ce4805abc00fb4982.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Users\Admin\AppData\Local\Temp\DIQ\flashplayer_151\DomaIQ10.exeC:\Users\Admin\AppData\Local\Temp\DIQ\flashplayer_151\DomaIQ10.exe /path="C:\Users\Admin\AppData\Local\Temp\aa0bfa2a66ac906ce4805abc00fb4982.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3888
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340KB
MD5dfe97aeef7e4bb36a261406bfb2db452
SHA1f683c4b4c286b4c8dbcb809a4e676b43ea872e5b
SHA256eafa2798644ec67fc72b1690e35b6ba2f73d759821f406c827b9f1543ef0d0d7
SHA5129710067c7efe56b89b0540b19f39cb93794e13aee760ebf8ec3c5c4d546acada0741dcd9760f8ece6e4c64f42da5d0d28381b528c03c9fd6451eae3f05b6ef83
-
Filesize
36B
MD502f6e45f4408f64951806d585e6e9c4a
SHA1864ac959cfbcae1513fbf399c151cacfd83daeb3
SHA2568bc898ba04219478b52197de2cb44de8fd26fda76f838531eaea44d24257126d
SHA51231e4017a9b5e7fce76d650c7916926e8319a2bc55e2c00af8685234943c734b7a5765185dd959f69cf4c4b53186a522dc4e434dc22a7b1001738493954ea60cc
-
Filesize
257B
MD58fc132d017671cb9f0322ef97411aed7
SHA1ec7587f1ce58736442912f1152fcc76c735eb26c
SHA256a5d0ce7bd7d4c43cb49c2a76ceef62fe78733c22ad6132da73a871f29aeb5280
SHA5122d5145b253ca05f3b28bb35dac53611cb7513b0502f01307cd47e592789abe85f68e6c8a312e5b319a34a0e10be6fb60b42cbf0b6084c43a07fdb96196192d37