Analysis
-
max time kernel
92s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
05/07/2024, 04:50
Static task
static1
Behavioral task
behavioral1
Sample
f60654d526dba4c74fd7810e35a396ad0f6ec13a4477285102e3ca1e17ed9a72.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
f60654d526dba4c74fd7810e35a396ad0f6ec13a4477285102e3ca1e17ed9a72.exe
Resource
win10v2004-20240704-en
General
-
Target
f60654d526dba4c74fd7810e35a396ad0f6ec13a4477285102e3ca1e17ed9a72.exe
-
Size
128KB
-
MD5
cca2748d004fb614c3ab92a5bd63393f
-
SHA1
b85001e5472c53ae2a03985986cb73e5aacd9eac
-
SHA256
f60654d526dba4c74fd7810e35a396ad0f6ec13a4477285102e3ca1e17ed9a72
-
SHA512
c42554cd1f86012b1ba0633c59f60d8d9fd0bf1746b2a4445d55dc6b6862edb061da4459b19a2e398c9d005497790de5816d07ea2b7293afd26729ec511b2cc7
-
SSDEEP
3072:Itryv3Ysj/hF4Ezee5Wx7cEGrhkngpDvchkqbAIQxgFM9MD:KWvIM4e15Wx4brq2Ah1FM6D
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 10 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Dfnjafap.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Dogogcpo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dddhpjof.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Dddhpjof.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad f60654d526dba4c74fd7810e35a396ad0f6ec13a4477285102e3ca1e17ed9a72.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dfnjafap.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dmgbnq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Dmgbnq32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dogogcpo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" f60654d526dba4c74fd7810e35a396ad0f6ec13a4477285102e3ca1e17ed9a72.exe -
Executes dropped EXE 5 IoCs
pid Process 3272 Dfnjafap.exe 4492 Dmgbnq32.exe 2940 Dogogcpo.exe 2380 Dddhpjof.exe 2872 Dmllipeg.exe -
Drops file in System32 directory 15 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Dmllipeg.exe Dddhpjof.exe File created C:\Windows\SysWOW64\Poahbe32.dll f60654d526dba4c74fd7810e35a396ad0f6ec13a4477285102e3ca1e17ed9a72.exe File opened for modification C:\Windows\SysWOW64\Dddhpjof.exe Dogogcpo.exe File created C:\Windows\SysWOW64\Amjknl32.dll Dogogcpo.exe File created C:\Windows\SysWOW64\Lbabpnmn.dll Dmgbnq32.exe File created C:\Windows\SysWOW64\Dmllipeg.exe Dddhpjof.exe File created C:\Windows\SysWOW64\Dfnjafap.exe f60654d526dba4c74fd7810e35a396ad0f6ec13a4477285102e3ca1e17ed9a72.exe File created C:\Windows\SysWOW64\Dmgbnq32.exe Dfnjafap.exe File created C:\Windows\SysWOW64\Ihidnp32.dll Dfnjafap.exe File created C:\Windows\SysWOW64\Dogogcpo.exe Dmgbnq32.exe File opened for modification C:\Windows\SysWOW64\Dogogcpo.exe Dmgbnq32.exe File created C:\Windows\SysWOW64\Kngpec32.dll Dddhpjof.exe File opened for modification C:\Windows\SysWOW64\Dfnjafap.exe f60654d526dba4c74fd7810e35a396ad0f6ec13a4477285102e3ca1e17ed9a72.exe File opened for modification C:\Windows\SysWOW64\Dmgbnq32.exe Dfnjafap.exe File created C:\Windows\SysWOW64\Dddhpjof.exe Dogogcpo.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3428 2872 WerFault.exe 87 -
Modifies registry class 18 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 f60654d526dba4c74fd7810e35a396ad0f6ec13a4477285102e3ca1e17ed9a72.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Poahbe32.dll" f60654d526dba4c74fd7810e35a396ad0f6ec13a4477285102e3ca1e17ed9a72.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Dddhpjof.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Dfnjafap.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Amjknl32.dll" Dogogcpo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Dogogcpo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Dfnjafap.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ihidnp32.dll" Dfnjafap.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Dmgbnq32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Dogogcpo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kngpec32.dll" Dddhpjof.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node f60654d526dba4c74fd7810e35a396ad0f6ec13a4477285102e3ca1e17ed9a72.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831} f60654d526dba4c74fd7810e35a396ad0f6ec13a4477285102e3ca1e17ed9a72.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" f60654d526dba4c74fd7810e35a396ad0f6ec13a4477285102e3ca1e17ed9a72.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Dddhpjof.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID f60654d526dba4c74fd7810e35a396ad0f6ec13a4477285102e3ca1e17ed9a72.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Dmgbnq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lbabpnmn.dll" Dmgbnq32.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 5048 wrote to memory of 3272 5048 f60654d526dba4c74fd7810e35a396ad0f6ec13a4477285102e3ca1e17ed9a72.exe 82 PID 5048 wrote to memory of 3272 5048 f60654d526dba4c74fd7810e35a396ad0f6ec13a4477285102e3ca1e17ed9a72.exe 82 PID 5048 wrote to memory of 3272 5048 f60654d526dba4c74fd7810e35a396ad0f6ec13a4477285102e3ca1e17ed9a72.exe 82 PID 3272 wrote to memory of 4492 3272 Dfnjafap.exe 83 PID 3272 wrote to memory of 4492 3272 Dfnjafap.exe 83 PID 3272 wrote to memory of 4492 3272 Dfnjafap.exe 83 PID 4492 wrote to memory of 2940 4492 Dmgbnq32.exe 85 PID 4492 wrote to memory of 2940 4492 Dmgbnq32.exe 85 PID 4492 wrote to memory of 2940 4492 Dmgbnq32.exe 85 PID 2940 wrote to memory of 2380 2940 Dogogcpo.exe 86 PID 2940 wrote to memory of 2380 2940 Dogogcpo.exe 86 PID 2940 wrote to memory of 2380 2940 Dogogcpo.exe 86 PID 2380 wrote to memory of 2872 2380 Dddhpjof.exe 87 PID 2380 wrote to memory of 2872 2380 Dddhpjof.exe 87 PID 2380 wrote to memory of 2872 2380 Dddhpjof.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\f60654d526dba4c74fd7810e35a396ad0f6ec13a4477285102e3ca1e17ed9a72.exe"C:\Users\Admin\AppData\Local\Temp\f60654d526dba4c74fd7810e35a396ad0f6ec13a4477285102e3ca1e17ed9a72.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Windows\SysWOW64\Dfnjafap.exeC:\Windows\system32\Dfnjafap.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3272 -
C:\Windows\SysWOW64\Dmgbnq32.exeC:\Windows\system32\Dmgbnq32.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4492 -
C:\Windows\SysWOW64\Dogogcpo.exeC:\Windows\system32\Dogogcpo.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Windows\SysWOW64\Dddhpjof.exeC:\Windows\system32\Dddhpjof.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Windows\SysWOW64\Dmllipeg.exeC:\Windows\system32\Dmllipeg.exe6⤵
- Executes dropped EXE
PID:2872 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2872 -s 4087⤵
- Program crash
PID:3428
-
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2872 -ip 28721⤵PID:1064
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
128KB
MD54a9ddf5e615838399ec66f6869870e93
SHA1d93232076a2422b75c8fdf2c5f828a536eca52ce
SHA2564ff8c0c2ca73c414f62dabab0fb024177fcf77c58f9a71116a5668f648095a31
SHA512ae7dee91e0ffec386d6cb59277443010c70aa55239263e257f041c7dab8dd5de3de971933e4898022f8c05475a4232ce83db5d33584befc1a80535b724282298
-
Filesize
128KB
MD5044ba23c6eaca93e51f36b599162dc73
SHA18a951ab1931972e214c445301f9291991557e9b9
SHA25609434b4398378796196fb836c5686da273f05618312ef5fab6458de85567101b
SHA51279036d7f2bb89eff9350e1223cd9122750aa4a9ee37cd7d60cb0bcfc8ebe9ef06c9c1db199e4d199738abaf7464be7b611d4c8079650d702d8b61e799f3496c8
-
Filesize
128KB
MD514499bb77d1d531d3c0fe8c3c428e608
SHA1c53e0b6b9bdd75f44d92bfd4addd33c294879831
SHA2569d718894683a0642c9708c5011cadfbfcde87fe37f2360acf6086c291961799e
SHA512ecef34b176b8aa4388d6864cb1b5fba3db66a32e9ccf6f73162078912232efe2af4b616dee2f8d5c392e90a1bbc593534b78aa306bf9eeb3bca1fca9281565bc
-
Filesize
128KB
MD5d4e411dad53ac662913c968aece8eb37
SHA16e7d90e47c405f7591cdb16be932b7bcad5f917f
SHA2569679671925672dd4eae69f0ca4a0f342b1ae9f8fa13298e15dfb2d22a89024de
SHA5126e5b15149eb8eefa1543c73a1a1f0e8925c1ea4fb57d58edf306597153f63c9aeac879c6e60b85fcf03082782ef6288df42e27152e61b574b80d616521368834
-
Filesize
128KB
MD545dadac6e6aadeb317b95fce339269b7
SHA11b6fd27c78f65d3b423a2366137aa4316f5893c4
SHA256e2056852b9417800d066e86ba6df8ad3a0e6d68c9f00c9eed8207687fba6dff1
SHA512a683b39a881858461c8b578632ce08febdb136dfb596bf0a5b6500f6f38c10ac23f75edb977d5d8e9de090e666d43df40f5c4b0a164a4d31a460ce66dbf11bb5
-
Filesize
7KB
MD5d961c70e75a8fc675d785f0647fb2f00
SHA1350bcb9b5cb704792182eec8a86ef2e30e45c5f7
SHA256c360548935127c901a30b6131ea503681196d96a7fe45784fc80515cfdf75d24
SHA512650f0df4dd8d32d9a341d67ba9bfc931e33ff45192d60d439b9762ecb296e90939e58761d2048cab48bcbb8804f30bf26316002d0243c4a67523d919296520fd