Analysis

  • max time kernel
    119s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    18-08-2024 01:20

General

  • Target

    539fea490774ed5cffb9f22f04903f40N.exe

  • Size

    72KB

  • MD5

    539fea490774ed5cffb9f22f04903f40

  • SHA1

    639169c05c47e85bb9c12a4b5211434cfc6c0478

  • SHA256

    33f0e2e35a1d505742d5aa6e975f99ea2c05737208af762cbce269806f17aa8a

  • SHA512

    d13be9b1f7aebc61e4f35e18b8df0cc440d549c49af1583d26d5ad8869fd4e302fc8f528cf5e7b54eb70f3830b32d9107fa79e9783e99518cdfa6d2ef52fe5f3

  • SSDEEP

    1536:w+PUlN+AdjkWzzDEafNbtXHv+XB2V02L3G6+lWCWQ+:HPUKAV5zzDEWtgB2VNW6+bWQ+

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 6 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 9 IoCs
  • Drops file in System32 directory 11 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 12 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\539fea490774ed5cffb9f22f04903f40N.exe
    "C:\Users\Admin\AppData\Local\Temp\539fea490774ed5cffb9f22f04903f40N.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2088
    • C:\Windows\SysWOW64\Ccjoli32.exe
      C:\Windows\system32\Ccjoli32.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2060
      • C:\Windows\SysWOW64\Djdgic32.exe
        C:\Windows\system32\Djdgic32.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:1992
        • C:\Windows\SysWOW64\Dpapaj32.exe
          C:\Windows\system32\Dpapaj32.exe
          4⤵
          • Executes dropped EXE
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2668
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2668 -s 144
            5⤵
            • Loads dropped DLL
            • Program crash
            PID:2592

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\Ccjoli32.exe

    Filesize

    72KB

    MD5

    6f61978c835db8b203b51f3267eff637

    SHA1

    b7ed6414529cf2c66d10d908b22269efa4f8b5d8

    SHA256

    248e2868846949db152e0512073a0f91d45439af7a8db889b2c14b591ce59f1d

    SHA512

    638c70d7351ccd0d4711830e012998a1c67f938b6a0fe7a895aa121b0f53181dfc4929a4379376af015a73da9f9cba27fae99d86785e94b0646316ad62d472a1

  • C:\Windows\SysWOW64\Djdgic32.exe

    Filesize

    72KB

    MD5

    f0e465f741304a8be5b17c610674f2eb

    SHA1

    523af2506f827d65e53ef1d9b0c7ffe8d21bd48d

    SHA256

    7f098d239c5295e38e29569eef82ffa7dff5548162db4b3de33232965ce50cbb

    SHA512

    2d4a45bffa322a9d5b8beb36ce688758edd33c147f539e6da7a1f794847a540ec713544764e1a76c72d8f9f8464975b57b239199db3f0d15765edbd35598a7b4

  • C:\Windows\SysWOW64\Dpapaj32.exe

    Filesize

    72KB

    MD5

    f717b1c8a57e85a8cffa4afd4bc9ddaa

    SHA1

    0572e56e9cdbce98441867b8b4d16a9dfa370eab

    SHA256

    612f50208d71d28abbb88d3bca7cd60d034ae9696e11b7b833317934d7b1b70d

    SHA512

    d8e5478622c4a9411c093b32d579edd157b5547cda1465cdc7ea3ad7c46e8eee1d4b4dc07569b192d507397755ca2ded2755620d26bc7cee88705f03872c3b58

  • memory/1992-27-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/1992-40-0x0000000000250000-0x0000000000283000-memory.dmp

    Filesize

    204KB

  • memory/1992-51-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2060-26-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2060-28-0x0000000000280000-0x00000000002B3000-memory.dmp

    Filesize

    204KB

  • memory/2088-25-0x0000000000250000-0x0000000000283000-memory.dmp

    Filesize

    204KB

  • memory/2088-24-0x0000000000250000-0x0000000000283000-memory.dmp

    Filesize

    204KB

  • memory/2088-0-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2088-49-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2668-42-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2668-52-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB