Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    94s
  • max time network
    97s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/08/2024, 22:22

General

  • Target

    16871d2e1adaed1d36f8d0d5c74032e0N.exe

  • Size

    55KB

  • MD5

    16871d2e1adaed1d36f8d0d5c74032e0

  • SHA1

    a34a8ec8ebc4d0e744d16d913628e6ba11e03d73

  • SHA256

    7acedc2b228619e05d5d61d029b7a53c70117799737b338e2809355a75668566

  • SHA512

    2707f900ecb937e7006f4d7bd99c84f572554a78bcecedeaf5bae047284a19134bb1822416cab49670af5891f85d07dde7e3d093274e25f06a1cbc67a7b8f43a

  • SSDEEP

    768:ivgjQWoVO29zzohW3vPjnwtIBqb089tmYF6fun+u327MwyWDN2p/1H5ZXdnh:2+QWoAOz5bnwtu87mYF+0v27vym2LV

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 20 IoCs
  • Executes dropped EXE 10 IoCs
  • Drops file in System32 directory 30 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 11 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 33 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\16871d2e1adaed1d36f8d0d5c74032e0N.exe
    "C:\Users\Admin\AppData\Local\Temp\16871d2e1adaed1d36f8d0d5c74032e0N.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4820
    • C:\Windows\SysWOW64\Ddonekbl.exe
      C:\Windows\system32\Ddonekbl.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:3488
      • C:\Windows\SysWOW64\Dfnjafap.exe
        C:\Windows\system32\Dfnjafap.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2260
        • C:\Windows\SysWOW64\Dodbbdbb.exe
          C:\Windows\system32\Dodbbdbb.exe
          4⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:2828
          • C:\Windows\SysWOW64\Daconoae.exe
            C:\Windows\system32\Daconoae.exe
            5⤵
            • Adds autorun key to be loaded by Explorer.exe on startup
            • Executes dropped EXE
            • Drops file in System32 directory
            • System Location Discovery: System Language Discovery
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:540
            • C:\Windows\SysWOW64\Dfpgffpm.exe
              C:\Windows\system32\Dfpgffpm.exe
              6⤵
              • Adds autorun key to be loaded by Explorer.exe on startup
              • Executes dropped EXE
              • Drops file in System32 directory
              • System Location Discovery: System Language Discovery
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:3724
              • C:\Windows\SysWOW64\Dogogcpo.exe
                C:\Windows\system32\Dogogcpo.exe
                7⤵
                • Adds autorun key to be loaded by Explorer.exe on startup
                • Executes dropped EXE
                • Drops file in System32 directory
                • System Location Discovery: System Language Discovery
                • Modifies registry class
                • Suspicious use of WriteProcessMemory
                PID:3144
                • C:\Windows\SysWOW64\Daekdooc.exe
                  C:\Windows\system32\Daekdooc.exe
                  8⤵
                  • Adds autorun key to be loaded by Explorer.exe on startup
                  • Executes dropped EXE
                  • Drops file in System32 directory
                  • System Location Discovery: System Language Discovery
                  • Modifies registry class
                  • Suspicious use of WriteProcessMemory
                  PID:4212
                  • C:\Windows\SysWOW64\Dhocqigp.exe
                    C:\Windows\system32\Dhocqigp.exe
                    9⤵
                    • Adds autorun key to be loaded by Explorer.exe on startup
                    • Executes dropped EXE
                    • Drops file in System32 directory
                    • System Location Discovery: System Language Discovery
                    • Modifies registry class
                    • Suspicious use of WriteProcessMemory
                    PID:3996
                    • C:\Windows\SysWOW64\Dknpmdfc.exe
                      C:\Windows\system32\Dknpmdfc.exe
                      10⤵
                      • Adds autorun key to be loaded by Explorer.exe on startup
                      • Executes dropped EXE
                      • Drops file in System32 directory
                      • System Location Discovery: System Language Discovery
                      • Modifies registry class
                      • Suspicious use of WriteProcessMemory
                      PID:1604
                      • C:\Windows\SysWOW64\Dmllipeg.exe
                        C:\Windows\system32\Dmllipeg.exe
                        11⤵
                        • Executes dropped EXE
                        • System Location Discovery: System Language Discovery
                        PID:2208
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -u -p 2208 -s 396
                          12⤵
                          • Program crash
                          PID:3896
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2208 -ip 2208
    1⤵
      PID:4928

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\SysWOW64\Daconoae.exe

      Filesize

      55KB

      MD5

      87b6b52500f35adf7fcd638dea643334

      SHA1

      07d7ad5575393dcde19569638eb2e3cd6fd72554

      SHA256

      e463521d972ec9cc02ba54e8c918a470bd7988fcd5d24e3e3c38e8e3590f1630

      SHA512

      3e5f8d367c089b640ebcc8cd0fb53b9b90afc60c20c064eaf993183cf260a256775f0215982ef8559353aaae064dede898b670f2a8622a330038d44f3223534e

    • C:\Windows\SysWOW64\Daekdooc.exe

      Filesize

      55KB

      MD5

      946f0381b31542a9ce04d2bf5c7bdab0

      SHA1

      c6ddcdb4b5c5f57c20a2c6d3d7d3846d83a24d2b

      SHA256

      3351530825f0d9ec8c6fdd2fb1a1f64ba813eb39895cdb5d0fb9c11471736d6f

      SHA512

      ee97da660adbfda1a981e804a37d616129e770958916c8b5022c540241089543110fa66c07598dda10f23ce4288b9103f69ace6e4fd5dfd82c4472cc3601e259

    • C:\Windows\SysWOW64\Ddonekbl.exe

      Filesize

      55KB

      MD5

      bf719d7bef1bb7e9b7609fb57f1aa9a3

      SHA1

      56e0694b382b1dbe7aaf8e0e3a4bb401be7509b6

      SHA256

      6be259e8ccf3767cae443d2f7d90fe6fcd11ba64a2e86260864b158e2fcbaad9

      SHA512

      6bd6587264f209a69410d0e87173d38c4dcc7b8fab3e09c4cb83bc78e4a821fa26d501100558b8d6c0846e28622261341e3168b0397417bde17bba7c2d5c8877

    • C:\Windows\SysWOW64\Dfnjafap.exe

      Filesize

      55KB

      MD5

      f31fa4cd57a5d70eb88f5b370e14cda3

      SHA1

      6ee12901928211a2fa4865a419cf9a25327294dd

      SHA256

      d7313ea73482379904afb3fe4e5667f7798baf30cc94fd3aef4fbe8a26ac47a7

      SHA512

      86a834e5a5dac015d545a75d63848ffcbacb45a4fc635d994010fa83f04182c151351da779698e3140cdbb8568554071a2bfe7d7298a517d5553293fb324a98d

    • C:\Windows\SysWOW64\Dfpgffpm.exe

      Filesize

      55KB

      MD5

      bde72853667533efeb05e2dbb836dbf2

      SHA1

      e33e5260e69293291fd78ad0df98242b34bb8054

      SHA256

      a5edec8173511243d4ae14424926792ca24614c8ddb7899f77e6cfd66cf29348

      SHA512

      74a9b8caeeced22e1b5dc3b9dd61905b2360420e40b25d8933c28deaa58f5421753896d2a8b7e5d8d838e34426f6072955b88dee91bc9a99de3f3d9a5a336889

    • C:\Windows\SysWOW64\Dhocqigp.exe

      Filesize

      55KB

      MD5

      3729caa53cfd6764f49751445ed9b196

      SHA1

      9b92d3f35006e176a372c77156c77f77be54a4ff

      SHA256

      ff544be9802182c8826cbc749c7d9d65d060308838b80aea72834e2de826a07e

      SHA512

      ba364dacab124df5d37d2d20c1629892889ce84e170ecf14f79d98f9388b14d4a15b6854c3562039d9ffb70c6058cea8e37b25054fcf86671dcefddee4b291d6

    • C:\Windows\SysWOW64\Dknpmdfc.exe

      Filesize

      55KB

      MD5

      23241f21527d2c702b590f42fec8c61e

      SHA1

      a33eb25927a4ac1f2e9aae2f625ccf2f7010be32

      SHA256

      3858f45f6290e465d77638e53420244920d93973c991fd4552870b5081d5a4db

      SHA512

      cec5af2971f3f4d83020e92e238497bb266612186316edd01e1df75e7b579ad99251724b645b7c29d98fe23a303224572cbb8a0830270db688e7e71c8dd5e049

    • C:\Windows\SysWOW64\Dmllipeg.exe

      Filesize

      55KB

      MD5

      bcdd7e3531a5aad5f6e0cf9b1f874245

      SHA1

      3b7e10d9e432adc5ac3d6d64db78b5a99483c949

      SHA256

      4ba9076d4734a0fb729aace45c87444c56a697b90793f074eef68e855e0df82a

      SHA512

      ec0e950f389588ede9986be8ef29ae445d6884158d4e068110ac8f375b7f6fbd07d3559a67c86f04a35a2b1a9c5005d8cce154ac5afeb13d763646614b68c432

    • C:\Windows\SysWOW64\Dodbbdbb.exe

      Filesize

      55KB

      MD5

      60d7b870493bebe7e7be93c2b80b94e9

      SHA1

      a7b3240825f43d54a60628a5db16b8ddcf3a7a63

      SHA256

      724742b4dc3aa25d34f04d61fd64bd0fecad6d268e180cbdce9385f8293e481d

      SHA512

      7a48ed2f147cbf51e46ad96286bf6bc3cd9723ed0da5da96cb4a80374346328a7435eb55c802d234f2f4133d9d3a670ea8442b119f1d92323d20027c3a5f5ba6

    • C:\Windows\SysWOW64\Dogogcpo.exe

      Filesize

      55KB

      MD5

      a08d6b2c7e82f94e565cad93ae1f1a52

      SHA1

      938fba4d59806eba405d34b99b8b127e38618c9d

      SHA256

      539cb6f8f865ea945789ce3af65d5f3a1c44f2929c35e59319582512b4beda55

      SHA512

      251ef22da5feb4f88db4003b4fa462d73248b3a1bc82f299af0718eace17645275d4631f319e42fb8ae59f286731b2fce6428928d307ed52f69210a65b0f4ac5

    • memory/540-98-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/540-32-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/1604-85-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/1604-73-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/2208-81-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/2208-84-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/2260-21-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/2828-29-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/3144-53-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/3488-13-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/3488-96-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/3724-40-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/3724-92-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/3996-64-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/3996-87-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/4212-56-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/4212-89-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/4820-0-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/4820-100-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/4820-5-0x0000000000431000-0x0000000000432000-memory.dmp

      Filesize

      4KB