Analysis

  • max time kernel
    101s
  • max time network
    102s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/08/2024, 22:35

General

  • Target

    681603fc8e1adf868e5fe6c81c48e790N.exe

  • Size

    152KB

  • MD5

    681603fc8e1adf868e5fe6c81c48e790

  • SHA1

    01c42c87188f604eb29b3c86728f2d18bc20a577

  • SHA256

    564e5b748005c144d873b01c008ac767c10229d98deb20e9c8199b6649f9f51b

  • SHA512

    f1b336585822eede1c5cdbba06d78d9a527f5a5efd92ab4fa72a946efa8c6aa72f1589f97482e8c5885c03e6ddbdcba56b92888552560520975e97c65c38d9cb

  • SSDEEP

    1536:fqP8p9DJc3Q1rPmSLsdtMWpj1vZDfjuvldZRA5tC:y8p9DGMJgpRZCvldZ0I

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 4 IoCs
  • Executes dropped EXE 2 IoCs
  • Drops file in System32 directory 6 IoCs
  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\681603fc8e1adf868e5fe6c81c48e790N.exe
    "C:\Users\Admin\AppData\Local\Temp\681603fc8e1adf868e5fe6c81c48e790N.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2184
    • C:\Windows\SysWOW64\Daekdooc.exe
      C:\Windows\system32\Daekdooc.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:3500
      • C:\Windows\SysWOW64\Dgbdlf32.exe
        C:\Windows\system32\Dgbdlf32.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:4440
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4440 -s 404
          4⤵
          • Program crash
          PID:2672
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4440 -s 408
          4⤵
          • Program crash
          PID:2332
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4440 -ip 4440
    1⤵
      PID:1372
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 4440 -ip 4440
      1⤵
        PID:2952

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Windows\SysWOW64\Daekdooc.exe

              Filesize

              152KB

              MD5

              2e5cf1cc2a55e215fc8f01e34d1c3533

              SHA1

              9851c73a24ffb4bb104082c6db178273ad736fa6

              SHA256

              01749eff23ef9c28f9056ae589362ffd4eabfc4187a6c6da10af3f1700283c86

              SHA512

              ed1635e8d2d379782b1ba051a37d25722c827a2d979eb3137f5c9a4a8b3981059326d4cff3f81a26786a399744e03e33f6961544ac74b5509847a24d0a70344c

            • C:\Windows\SysWOW64\Dgbdlf32.exe

              Filesize

              152KB

              MD5

              70f1eaded530d83be912dcf736457db2

              SHA1

              f0c84e09cf13d26011abc0aec55b38b900937fcf

              SHA256

              45f100ea004d944b15dbf5cbf54ba1def31f4d8a8815ed2d4be4fe95b1fa503a

              SHA512

              c096ed32805c3a739a1c31ab461b6282129296c58f0fe8f86bc0e26239aa4501f4725f5d6c6dc9cf5e25d8cd1a31b4784bf9d3f80c0ea9118c2f1dd8a85491fb

            • memory/2184-0-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/2184-1-0x0000000000431000-0x0000000000432000-memory.dmp

              Filesize

              4KB

            • memory/2184-22-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/3500-8-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/3500-20-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/4440-17-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB