Analysis
-
max time kernel
119s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
18-08-2024 01:20
Static task
static1
Behavioral task
behavioral1
Sample
539fea490774ed5cffb9f22f04903f40N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
539fea490774ed5cffb9f22f04903f40N.exe
Resource
win10v2004-20240802-en
General
-
Target
539fea490774ed5cffb9f22f04903f40N.exe
-
Size
72KB
-
MD5
539fea490774ed5cffb9f22f04903f40
-
SHA1
639169c05c47e85bb9c12a4b5211434cfc6c0478
-
SHA256
33f0e2e35a1d505742d5aa6e975f99ea2c05737208af762cbce269806f17aa8a
-
SHA512
d13be9b1f7aebc61e4f35e18b8df0cc440d549c49af1583d26d5ad8869fd4e302fc8f528cf5e7b54eb70f3830b32d9107fa79e9783e99518cdfa6d2ef52fe5f3
-
SSDEEP
1536:w+PUlN+AdjkWzzDEafNbtXHv+XB2V02L3G6+lWCWQ+:HPUKAV5zzDEWtgB2VNW6+bWQ+
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ccjoli32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ccjoli32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Djdgic32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Djdgic32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 539fea490774ed5cffb9f22f04903f40N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" 539fea490774ed5cffb9f22f04903f40N.exe -
Executes dropped EXE 3 IoCs
pid Process 2060 Ccjoli32.exe 1992 Djdgic32.exe 2668 Dpapaj32.exe -
Loads dropped DLL 9 IoCs
pid Process 2088 539fea490774ed5cffb9f22f04903f40N.exe 2088 539fea490774ed5cffb9f22f04903f40N.exe 2060 Ccjoli32.exe 2060 Ccjoli32.exe 1992 Djdgic32.exe 1992 Djdgic32.exe 2592 WerFault.exe 2592 WerFault.exe 2592 WerFault.exe -
Drops file in System32 directory 11 IoCs
description ioc Process File created C:\Windows\SysWOW64\Ccjoli32.exe 539fea490774ed5cffb9f22f04903f40N.exe File opened for modification C:\Windows\SysWOW64\ÿs.e¢e Dpapaj32.exe File created C:\Windows\SysWOW64\Ccofjipn.dll Ccjoli32.exe File created C:\Windows\SysWOW64\Dpapaj32.exe Djdgic32.exe File opened for modification C:\Windows\SysWOW64\Dpapaj32.exe Djdgic32.exe File created C:\Windows\SysWOW64\Pdkefp32.dll Djdgic32.exe File opened for modification C:\Windows\SysWOW64\Ccjoli32.exe 539fea490774ed5cffb9f22f04903f40N.exe File created C:\Windows\SysWOW64\Ciohdhad.dll 539fea490774ed5cffb9f22f04903f40N.exe File created C:\Windows\SysWOW64\Djdgic32.exe Ccjoli32.exe File opened for modification C:\Windows\SysWOW64\Djdgic32.exe Ccjoli32.exe File created C:\Windows\SysWOW64\ÿs.e¢e Dpapaj32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2592 2668 WerFault.exe 33 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Djdgic32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dpapaj32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 539fea490774ed5cffb9f22f04903f40N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ccjoli32.exe -
Modifies registry class 12 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 539fea490774ed5cffb9f22f04903f40N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} 539fea490774ed5cffb9f22f04903f40N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ciohdhad.dll" 539fea490774ed5cffb9f22f04903f40N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" 539fea490774ed5cffb9f22f04903f40N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ccjoli32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pdkefp32.dll" Djdgic32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Djdgic32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node 539fea490774ed5cffb9f22f04903f40N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID 539fea490774ed5cffb9f22f04903f40N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ccofjipn.dll" Ccjoli32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ccjoli32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Djdgic32.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2088 wrote to memory of 2060 2088 539fea490774ed5cffb9f22f04903f40N.exe 31 PID 2088 wrote to memory of 2060 2088 539fea490774ed5cffb9f22f04903f40N.exe 31 PID 2088 wrote to memory of 2060 2088 539fea490774ed5cffb9f22f04903f40N.exe 31 PID 2088 wrote to memory of 2060 2088 539fea490774ed5cffb9f22f04903f40N.exe 31 PID 2060 wrote to memory of 1992 2060 Ccjoli32.exe 32 PID 2060 wrote to memory of 1992 2060 Ccjoli32.exe 32 PID 2060 wrote to memory of 1992 2060 Ccjoli32.exe 32 PID 2060 wrote to memory of 1992 2060 Ccjoli32.exe 32 PID 1992 wrote to memory of 2668 1992 Djdgic32.exe 33 PID 1992 wrote to memory of 2668 1992 Djdgic32.exe 33 PID 1992 wrote to memory of 2668 1992 Djdgic32.exe 33 PID 1992 wrote to memory of 2668 1992 Djdgic32.exe 33 PID 2668 wrote to memory of 2592 2668 Dpapaj32.exe 34 PID 2668 wrote to memory of 2592 2668 Dpapaj32.exe 34 PID 2668 wrote to memory of 2592 2668 Dpapaj32.exe 34 PID 2668 wrote to memory of 2592 2668 Dpapaj32.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\539fea490774ed5cffb9f22f04903f40N.exe"C:\Users\Admin\AppData\Local\Temp\539fea490774ed5cffb9f22f04903f40N.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Windows\SysWOW64\Ccjoli32.exeC:\Windows\system32\Ccjoli32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Windows\SysWOW64\Djdgic32.exeC:\Windows\system32\Djdgic32.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Windows\SysWOW64\Dpapaj32.exeC:\Windows\system32\Dpapaj32.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2668 -s 1445⤵
- Loads dropped DLL
- Program crash
PID:2592
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD56f61978c835db8b203b51f3267eff637
SHA1b7ed6414529cf2c66d10d908b22269efa4f8b5d8
SHA256248e2868846949db152e0512073a0f91d45439af7a8db889b2c14b591ce59f1d
SHA512638c70d7351ccd0d4711830e012998a1c67f938b6a0fe7a895aa121b0f53181dfc4929a4379376af015a73da9f9cba27fae99d86785e94b0646316ad62d472a1
-
Filesize
72KB
MD5f0e465f741304a8be5b17c610674f2eb
SHA1523af2506f827d65e53ef1d9b0c7ffe8d21bd48d
SHA2567f098d239c5295e38e29569eef82ffa7dff5548162db4b3de33232965ce50cbb
SHA5122d4a45bffa322a9d5b8beb36ce688758edd33c147f539e6da7a1f794847a540ec713544764e1a76c72d8f9f8464975b57b239199db3f0d15765edbd35598a7b4
-
Filesize
72KB
MD5f717b1c8a57e85a8cffa4afd4bc9ddaa
SHA10572e56e9cdbce98441867b8b4d16a9dfa370eab
SHA256612f50208d71d28abbb88d3bca7cd60d034ae9696e11b7b833317934d7b1b70d
SHA512d8e5478622c4a9411c093b32d579edd157b5547cda1465cdc7ea3ad7c46e8eee1d4b4dc07569b192d507397755ca2ded2755620d26bc7cee88705f03872c3b58