Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
101s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13/08/2024, 15:20
Static task
static1
Behavioral task
behavioral1
Sample
d5f03c635287b55e020abc8c4d5bb7a0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d5f03c635287b55e020abc8c4d5bb7a0N.exe
Resource
win10v2004-20240802-en
General
-
Target
d5f03c635287b55e020abc8c4d5bb7a0N.exe
-
Size
1.2MB
-
MD5
d5f03c635287b55e020abc8c4d5bb7a0
-
SHA1
bf60dae88638ba712c4aa964350d7eec8709929d
-
SHA256
d24614186b9641ce12d805ce403e1d06471989b28990d01bb44a0ece5886b23c
-
SHA512
60416bae2aab68a5bf06191e033601f18a3a734615e2c9aa3462d048fab7c67d6498073761df8af31fc09c0062c3009ead278c56379938dbacbcb873006dc7ee
-
SSDEEP
12288:xhUv2DVqvQ6Ivxv26IveDVqvQ6IvpW1nvv6IveDVqvQ6IvYvc6IveDVqvQ6IvGmw:xhF5hwq5hVW1nq5h3q5hL6X1q5h3q5h
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 10 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" d5f03c635287b55e020abc8c4d5bb7a0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dhkjej32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dodbbdbb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dodbbdbb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ddakjkqi.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad d5f03c635287b55e020abc8c4d5bb7a0N.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dhkjej32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ddakjkqi.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dkkcge32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dkkcge32.exe -
Executes dropped EXE 5 IoCs
pid Process 748 Dhkjej32.exe 4864 Dodbbdbb.exe 940 Ddakjkqi.exe 1192 Dkkcge32.exe 1052 Dmllipeg.exe -
Drops file in System32 directory 15 IoCs
description ioc Process File created C:\Windows\SysWOW64\Dmllipeg.exe Dkkcge32.exe File opened for modification C:\Windows\SysWOW64\Dmllipeg.exe Dkkcge32.exe File created C:\Windows\SysWOW64\Dodbbdbb.exe Dhkjej32.exe File opened for modification C:\Windows\SysWOW64\Ddakjkqi.exe Dodbbdbb.exe File created C:\Windows\SysWOW64\Gifhkeje.dll Dodbbdbb.exe File created C:\Windows\SysWOW64\Jcbdhp32.dll Ddakjkqi.exe File opened for modification C:\Windows\SysWOW64\Dhkjej32.exe d5f03c635287b55e020abc8c4d5bb7a0N.exe File created C:\Windows\SysWOW64\Fnmnbf32.dll Dhkjej32.exe File created C:\Windows\SysWOW64\Jbpbca32.dll d5f03c635287b55e020abc8c4d5bb7a0N.exe File created C:\Windows\SysWOW64\Dkkcge32.exe Ddakjkqi.exe File created C:\Windows\SysWOW64\Kngpec32.dll Dkkcge32.exe File created C:\Windows\SysWOW64\Dhkjej32.exe d5f03c635287b55e020abc8c4d5bb7a0N.exe File opened for modification C:\Windows\SysWOW64\Dodbbdbb.exe Dhkjej32.exe File created C:\Windows\SysWOW64\Ddakjkqi.exe Dodbbdbb.exe File opened for modification C:\Windows\SysWOW64\Dkkcge32.exe Ddakjkqi.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1448 1052 WerFault.exe 91 -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dhkjej32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dodbbdbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ddakjkqi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dkkcge32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dmllipeg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d5f03c635287b55e020abc8c4d5bb7a0N.exe -
Modifies registry class 18 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" d5f03c635287b55e020abc8c4d5bb7a0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dhkjej32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dhkjej32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 d5f03c635287b55e020abc8c4d5bb7a0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kngpec32.dll" Dkkcge32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node d5f03c635287b55e020abc8c4d5bb7a0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jbpbca32.dll" d5f03c635287b55e020abc8c4d5bb7a0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dodbbdbb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dkkcge32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID d5f03c635287b55e020abc8c4d5bb7a0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fnmnbf32.dll" Dhkjej32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gifhkeje.dll" Dodbbdbb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dodbbdbb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ddakjkqi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jcbdhp32.dll" Ddakjkqi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ddakjkqi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dkkcge32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} d5f03c635287b55e020abc8c4d5bb7a0N.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3080 wrote to memory of 748 3080 d5f03c635287b55e020abc8c4d5bb7a0N.exe 84 PID 3080 wrote to memory of 748 3080 d5f03c635287b55e020abc8c4d5bb7a0N.exe 84 PID 3080 wrote to memory of 748 3080 d5f03c635287b55e020abc8c4d5bb7a0N.exe 84 PID 748 wrote to memory of 4864 748 Dhkjej32.exe 86 PID 748 wrote to memory of 4864 748 Dhkjej32.exe 86 PID 748 wrote to memory of 4864 748 Dhkjej32.exe 86 PID 4864 wrote to memory of 940 4864 Dodbbdbb.exe 87 PID 4864 wrote to memory of 940 4864 Dodbbdbb.exe 87 PID 4864 wrote to memory of 940 4864 Dodbbdbb.exe 87 PID 940 wrote to memory of 1192 940 Ddakjkqi.exe 90 PID 940 wrote to memory of 1192 940 Ddakjkqi.exe 90 PID 940 wrote to memory of 1192 940 Ddakjkqi.exe 90 PID 1192 wrote to memory of 1052 1192 Dkkcge32.exe 91 PID 1192 wrote to memory of 1052 1192 Dkkcge32.exe 91 PID 1192 wrote to memory of 1052 1192 Dkkcge32.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\d5f03c635287b55e020abc8c4d5bb7a0N.exe"C:\Users\Admin\AppData\Local\Temp\d5f03c635287b55e020abc8c4d5bb7a0N.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3080 -
C:\Windows\SysWOW64\Dhkjej32.exeC:\Windows\system32\Dhkjej32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:748 -
C:\Windows\SysWOW64\Dodbbdbb.exeC:\Windows\system32\Dodbbdbb.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4864 -
C:\Windows\SysWOW64\Ddakjkqi.exeC:\Windows\system32\Ddakjkqi.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:940 -
C:\Windows\SysWOW64\Dkkcge32.exeC:\Windows\system32\Dkkcge32.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Windows\SysWOW64\Dmllipeg.exeC:\Windows\system32\Dmllipeg.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1052 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1052 -s 4047⤵
- Program crash
PID:1448
-
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1052 -ip 10521⤵PID:2668
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5e77ef8e3ef5d1f7acd0caf459fa0d95d
SHA170587307f7cfdbe248af61fcc077ce3a7f603340
SHA25671339a1b607e8102fc113b5b5a66fa67fc034f58c2afa46e5a980f444b838b0d
SHA512ef7f1a3fb613e5ca652ae91dad153e22bc3014483f6cea5047899e25c607c091d63ee7238a3df05700208a208f8793e2a0fc92129fc52deeac16f238a1405985
-
Filesize
1.2MB
MD5079ade361220a6d43ce173aea289a1e1
SHA11dd39dd541bf930710537778ba23ae757af22d11
SHA2568271df1161a51e57859bf95f3100d1e9116dbb340f674593b9b0d808359cf42a
SHA51271111cbcba59ca7bbfddea6a263a448c118ee8274456d8c8c6539c3bd142ddc481c1ed1e3ad71ffa3d59931d3efcd2081502f48df48f238f8b7574a99d9dc02c
-
Filesize
1.2MB
MD508c705a9acb7f259fd7a8c2312692472
SHA16cde40a95e99a85448450a984c35d3800f42ebf9
SHA256b2540c1860c782dd8f49a1e38697c1dbe862f144bfc9496ce89897ed80572e85
SHA51247b62d4cecfd72351485089b36b14b6b9b02df332a9beecca85f8ad051dc80d560899f270135eeac1c0ac3b0816785702c484dd44793e02e58676cb8aa49b821
-
Filesize
1.2MB
MD5c4cac68a4d8c199af38c2d91b287a4ed
SHA1ab901e9e88b80c80b5b523fbaa15eca4f349e972
SHA256127131179da343330e17b1c655003ba71a8482205c8184203efa5e9163ec4f40
SHA5127b26e9253faf1357273178b920bc8b509fd71a74dac7a08ea0ef949de23ec64fda7e67fa9b05071dc0a83f6125ef5ab54f7c2347e98727ad51f104557dfddd86
-
Filesize
1.2MB
MD50ba19a28e2ff655b867ca1dfde983374
SHA18ae49af72153655383f6a80388d1eeed76e14da9
SHA256337ddb936ee95741c04ef5f9af5b3ff6f735e0104d121a1477398c21d3a5a216
SHA5122032407432d115792e620e81169f23e29f0b65d49af3fab118e64a72a529c76b297f50ce6fcf6ac56c1dbcb0c69989960eefc9437c8bfb362f40b92f94d9efed