Analysis
-
max time kernel
101s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20/08/2024, 22:35
Static task
static1
Behavioral task
behavioral1
Sample
681603fc8e1adf868e5fe6c81c48e790N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
681603fc8e1adf868e5fe6c81c48e790N.exe
Resource
win10v2004-20240802-en
General
-
Target
681603fc8e1adf868e5fe6c81c48e790N.exe
-
Size
152KB
-
MD5
681603fc8e1adf868e5fe6c81c48e790
-
SHA1
01c42c87188f604eb29b3c86728f2d18bc20a577
-
SHA256
564e5b748005c144d873b01c008ac767c10229d98deb20e9c8199b6649f9f51b
-
SHA512
f1b336585822eede1c5cdbba06d78d9a527f5a5efd92ab4fa72a946efa8c6aa72f1589f97482e8c5885c03e6ddbdcba56b92888552560520975e97c65c38d9cb
-
SSDEEP
1536:fqP8p9DJc3Q1rPmSLsdtMWpj1vZDfjuvldZRA5tC:y8p9DGMJgpRZCvldZ0I
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 681603fc8e1adf868e5fe6c81c48e790N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" 681603fc8e1adf868e5fe6c81c48e790N.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Daekdooc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Daekdooc.exe -
Executes dropped EXE 2 IoCs
pid Process 3500 Daekdooc.exe 4440 Dgbdlf32.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\Daekdooc.exe 681603fc8e1adf868e5fe6c81c48e790N.exe File opened for modification C:\Windows\SysWOW64\Daekdooc.exe 681603fc8e1adf868e5fe6c81c48e790N.exe File created C:\Windows\SysWOW64\Ohmoom32.dll 681603fc8e1adf868e5fe6c81c48e790N.exe File created C:\Windows\SysWOW64\Dgbdlf32.exe Daekdooc.exe File opened for modification C:\Windows\SysWOW64\Dgbdlf32.exe Daekdooc.exe File created C:\Windows\SysWOW64\Gfghpl32.dll Daekdooc.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 2672 4440 WerFault.exe 85 2332 4440 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 681603fc8e1adf868e5fe6c81c48e790N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Daekdooc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dgbdlf32.exe -
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ohmoom32.dll" 681603fc8e1adf868e5fe6c81c48e790N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" 681603fc8e1adf868e5fe6c81c48e790N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Daekdooc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID 681603fc8e1adf868e5fe6c81c48e790N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} 681603fc8e1adf868e5fe6c81c48e790N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Daekdooc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gfghpl32.dll" Daekdooc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 681603fc8e1adf868e5fe6c81c48e790N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node 681603fc8e1adf868e5fe6c81c48e790N.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2184 wrote to memory of 3500 2184 681603fc8e1adf868e5fe6c81c48e790N.exe 84 PID 2184 wrote to memory of 3500 2184 681603fc8e1adf868e5fe6c81c48e790N.exe 84 PID 2184 wrote to memory of 3500 2184 681603fc8e1adf868e5fe6c81c48e790N.exe 84 PID 3500 wrote to memory of 4440 3500 Daekdooc.exe 85 PID 3500 wrote to memory of 4440 3500 Daekdooc.exe 85 PID 3500 wrote to memory of 4440 3500 Daekdooc.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\681603fc8e1adf868e5fe6c81c48e790N.exe"C:\Users\Admin\AppData\Local\Temp\681603fc8e1adf868e5fe6c81c48e790N.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Windows\SysWOW64\Daekdooc.exeC:\Windows\system32\Daekdooc.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3500 -
C:\Windows\SysWOW64\Dgbdlf32.exeC:\Windows\system32\Dgbdlf32.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4440 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4440 -s 4044⤵
- Program crash
PID:2672
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4440 -s 4084⤵
- Program crash
PID:2332
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4440 -ip 44401⤵PID:1372
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 4440 -ip 44401⤵PID:2952
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152KB
MD52e5cf1cc2a55e215fc8f01e34d1c3533
SHA19851c73a24ffb4bb104082c6db178273ad736fa6
SHA25601749eff23ef9c28f9056ae589362ffd4eabfc4187a6c6da10af3f1700283c86
SHA512ed1635e8d2d379782b1ba051a37d25722c827a2d979eb3137f5c9a4a8b3981059326d4cff3f81a26786a399744e03e33f6961544ac74b5509847a24d0a70344c
-
Filesize
152KB
MD570f1eaded530d83be912dcf736457db2
SHA1f0c84e09cf13d26011abc0aec55b38b900937fcf
SHA25645f100ea004d944b15dbf5cbf54ba1def31f4d8a8815ed2d4be4fe95b1fa503a
SHA512c096ed32805c3a739a1c31ab461b6282129296c58f0fe8f86bc0e26239aa4501f4725f5d6c6dc9cf5e25d8cd1a31b4784bf9d3f80c0ea9118c2f1dd8a85491fb