Analysis

  • max time kernel
    94s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-08-2024 08:15

General

  • Target

    8031e9336849841877783db2b0aed400N.exe

  • Size

    81KB

  • MD5

    8031e9336849841877783db2b0aed400

  • SHA1

    255b4fb01455aaade9509aa3721ee7eb7daaba9d

  • SHA256

    1201de2290f783939d65e29c79efdc2caff9db9aa411b1787b82606eb579978d

  • SHA512

    db67d48a05a9c9e5ca98192f6072bf216fe45f7460d50284921dcc020714a4483a73432798e0b412f2418836dcd05e862d1a582cc47c87f2fbc78df93cf16077

  • SSDEEP

    1536:BjKyZ6dECLAl//5yhYWTKSFVvkmUFAgBQONrg2wfU/i7m4LO++/+1m6KadhYxU3M:VzZ6uCe5yKyRkBQOfXi/LrCimBaH8UHc

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 16 IoCs
  • Executes dropped EXE 8 IoCs
  • Drops file in System32 directory 24 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 27 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8031e9336849841877783db2b0aed400N.exe
    "C:\Users\Admin\AppData\Local\Temp\8031e9336849841877783db2b0aed400N.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4848
    • C:\Windows\SysWOW64\Dhkjej32.exe
      C:\Windows\system32\Dhkjej32.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:5112
      • C:\Windows\SysWOW64\Dkifae32.exe
        C:\Windows\system32\Dkifae32.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:436
        • C:\Windows\SysWOW64\Daconoae.exe
          C:\Windows\system32\Daconoae.exe
          4⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:3548
          • C:\Windows\SysWOW64\Ddakjkqi.exe
            C:\Windows\system32\Ddakjkqi.exe
            5⤵
            • Adds autorun key to be loaded by Explorer.exe on startup
            • Executes dropped EXE
            • Drops file in System32 directory
            • System Location Discovery: System Language Discovery
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:4156
            • C:\Windows\SysWOW64\Dkkcge32.exe
              C:\Windows\system32\Dkkcge32.exe
              6⤵
              • Adds autorun key to be loaded by Explorer.exe on startup
              • Executes dropped EXE
              • Drops file in System32 directory
              • System Location Discovery: System Language Discovery
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:3464
              • C:\Windows\SysWOW64\Dmjocp32.exe
                C:\Windows\system32\Dmjocp32.exe
                7⤵
                • Adds autorun key to be loaded by Explorer.exe on startup
                • Executes dropped EXE
                • Drops file in System32 directory
                • System Location Discovery: System Language Discovery
                • Modifies registry class
                • Suspicious use of WriteProcessMemory
                PID:3244
                • C:\Windows\SysWOW64\Dhocqigp.exe
                  C:\Windows\system32\Dhocqigp.exe
                  8⤵
                  • Adds autorun key to be loaded by Explorer.exe on startup
                  • Executes dropped EXE
                  • Drops file in System32 directory
                  • System Location Discovery: System Language Discovery
                  • Modifies registry class
                  • Suspicious use of WriteProcessMemory
                  PID:984
                  • C:\Windows\SysWOW64\Dmllipeg.exe
                    C:\Windows\system32\Dmllipeg.exe
                    9⤵
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    PID:3044
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 3044 -s 404
                      10⤵
                      • Program crash
                      PID:3096
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3044 -ip 3044
    1⤵
      PID:648

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\SysWOW64\Daconoae.exe

      Filesize

      81KB

      MD5

      90c1aae9377859758126b4e6ae38ce44

      SHA1

      5c2f449fb8dc8317e5c66ed631e4da94d120419b

      SHA256

      7b3222086d1c91244451ef6ef7d0d68159e0c70783e5bc066481b23063bb6d8b

      SHA512

      6e18118b5b0ff4fcbdec23988a54bacedc6fd5aa5064b35eabab906d2ea2a3b2ab1c7282c9f5a79dacd773675e9512ab0c70c356b4f539df13e7ece45eb4433b

    • C:\Windows\SysWOW64\Ddakjkqi.exe

      Filesize

      81KB

      MD5

      faf40bd5b092c0cc3906b5b95752dcf3

      SHA1

      21e04569d2486095efa03c547d6fde07c5d5c67d

      SHA256

      90bb2b28188160be7a41347c6874079dc3e31739a9e291c8c5e76ae9ea1c54a5

      SHA512

      4d8f24d2371a7a415a82f9ff2ceec465c2ad07052175200fc802e6fcd25429776f29d3cf3210764070b3018fd8b24894ace463f7060227302907cc9219de05e1

    • C:\Windows\SysWOW64\Dhkjej32.exe

      Filesize

      81KB

      MD5

      5b4e6ad71bf0ba646bc485dee6e62b1c

      SHA1

      fe0f0e347c4e5402204b46542bee7e3928df08f6

      SHA256

      6e55528e8726e0995f9b872a9e537faccd1960f7c94a5fac02a73790126d3c0b

      SHA512

      8b9c16a7fa8acef8b48170d5ab66c8affa23eb3dccb6d0d14d079dcde6e8634a16774b12edbbad8b8ed1e2dd2055d840b7d433d65095307d5fc4d94b6ead2ab7

    • C:\Windows\SysWOW64\Dhocqigp.exe

      Filesize

      81KB

      MD5

      a39fc6333e668f39b945e24142468ed6

      SHA1

      aeccf41e660ce79f9d96eebd188543cde19aa06a

      SHA256

      1ac848e05fbf57435d3e0038e67270c34853227b00ac85ad13d42c8f8d7344c1

      SHA512

      1976efb9506f154d5e3ffeec948f2e351b9650df27cfb9cce3ae19facfeb12456aade98f5db8e306006e9671ec6fef736124bf6f24a8ebb415403ca9f0e25d00

    • C:\Windows\SysWOW64\Dkifae32.exe

      Filesize

      81KB

      MD5

      40c30f14d5dfd20b507cc8485038ea56

      SHA1

      0c0dcc25adcdae032ef5fedc97203013fc4c4f76

      SHA256

      6aad14ef68f79aff7121b2a8ae5b905db0912a73ae5ed12051fd16e4a40f70e1

      SHA512

      19d10d3932993db9ba198aa1e5e3686e0ba7c8fcd4de36dc5872cd7fe3387544d2d47c1e82d48705bda03dfc823866dc51cec8d3d92b004cc1f78af168d9a491

    • C:\Windows\SysWOW64\Dkkcge32.exe

      Filesize

      81KB

      MD5

      dc1eab8fa1d55ca54ba495e76d230dab

      SHA1

      072639200770133ce2f481c52a9a994e11163ca6

      SHA256

      440d65bebc8d57cbb08c9774728b6acc40a26a3c7b79300373de2686445f0794

      SHA512

      6825bf23d650f97a4f55bd3a3e04435a67cd6822e495e53b781f4d8cb8c84f2029dc80fd8a909aa1f136962c56d9ae153f3821de8e79fda859018dec05f60351

    • C:\Windows\SysWOW64\Dmjocp32.exe

      Filesize

      81KB

      MD5

      d1e5f176245c12f3b66032093fa9d4df

      SHA1

      c2131f6c1b4ae7afc3e377a8406da2e551f858e9

      SHA256

      86854fffcc74b0256abcc2510e743bf3fe2bee8abe524e1f56c7fcd5a4485fd8

      SHA512

      20ada7944403442c976cb6b8a75511d9ad671fe8ecd61bc4ca766b4fa51e3ea1646dbfbc399aebc5643651067dd019e3c2e50714df2a570781094368ec9d6ee6

    • C:\Windows\SysWOW64\Dmllipeg.exe

      Filesize

      81KB

      MD5

      2bc90e0a04ee684d695dd48cf758fd51

      SHA1

      07cd7a3e36813a797433be3923dae3d29aaafea5

      SHA256

      8906c980cd11e7beea630f03719e984e75282531d6cdf31e0a6d70d544cd563f

      SHA512

      925986036ad27038981adc13f024afcdebe08244d4ab343e0abe5214f48f8fc8e49be034ed683299ef2b692b41eaf15b2be1afd84e45ec305800ef24255718f3

    • memory/436-16-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/436-78-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/984-56-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/984-69-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/3044-68-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/3044-65-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/3244-48-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/3244-71-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/3464-73-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/3464-41-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/3548-25-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/3548-76-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/4156-74-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/4156-32-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/4848-0-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/4848-1-0x0000000000432000-0x0000000000433000-memory.dmp

      Filesize

      4KB

    • memory/4848-81-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/5112-13-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB