Analysis

  • max time kernel
    102s
  • max time network
    102s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-08-2024 06:44

General

  • Target

    d139a9d89c3be5180d800ac6bfd76770N.exe

  • Size

    82KB

  • MD5

    d139a9d89c3be5180d800ac6bfd76770

  • SHA1

    855f94d3dc18d8cf94b9f5e0d4a41028093b3d5e

  • SHA256

    53fab27dd16a9a7276995c87cc6903b020bced2e5aacdac87e6db56932531a2c

  • SHA512

    21d4b7d6f287a4b9db277430adfc07d119b2c55eeef5d30912819ad24a99195a2316848b43584ad9205f485e7e94f0f6b4db4e353609b6574605924c9d22c058

  • SSDEEP

    1536:sqTvxF3mYCFpyGQy8x4C6E2L7Dpm6+wDSmQFN6TiN1sJtvQu:pTnWHOXt4CU3pm6tm7N6TO1SpD

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 16 IoCs
  • Executes dropped EXE 8 IoCs
  • Drops file in System32 directory 24 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 27 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d139a9d89c3be5180d800ac6bfd76770N.exe
    "C:\Users\Admin\AppData\Local\Temp\d139a9d89c3be5180d800ac6bfd76770N.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:764
    • C:\Windows\SysWOW64\Dmgbnq32.exe
      C:\Windows\system32\Dmgbnq32.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:5068
      • C:\Windows\SysWOW64\Ddakjkqi.exe
        C:\Windows\system32\Ddakjkqi.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:3724
        • C:\Windows\SysWOW64\Dhmgki32.exe
          C:\Windows\system32\Dhmgki32.exe
          4⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:3492
          • C:\Windows\SysWOW64\Dkkcge32.exe
            C:\Windows\system32\Dkkcge32.exe
            5⤵
            • Adds autorun key to be loaded by Explorer.exe on startup
            • Executes dropped EXE
            • Drops file in System32 directory
            • System Location Discovery: System Language Discovery
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:4072
            • C:\Windows\SysWOW64\Deagdn32.exe
              C:\Windows\system32\Deagdn32.exe
              6⤵
              • Adds autorun key to be loaded by Explorer.exe on startup
              • Executes dropped EXE
              • Drops file in System32 directory
              • System Location Discovery: System Language Discovery
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:1824
              • C:\Windows\SysWOW64\Dgbdlf32.exe
                C:\Windows\system32\Dgbdlf32.exe
                7⤵
                • Adds autorun key to be loaded by Explorer.exe on startup
                • Executes dropped EXE
                • Drops file in System32 directory
                • System Location Discovery: System Language Discovery
                • Modifies registry class
                • Suspicious use of WriteProcessMemory
                PID:2312
                • C:\Windows\SysWOW64\Doilmc32.exe
                  C:\Windows\system32\Doilmc32.exe
                  8⤵
                  • Adds autorun key to be loaded by Explorer.exe on startup
                  • Executes dropped EXE
                  • Drops file in System32 directory
                  • System Location Discovery: System Language Discovery
                  • Modifies registry class
                  • Suspicious use of WriteProcessMemory
                  PID:1868
                  • C:\Windows\SysWOW64\Dmllipeg.exe
                    C:\Windows\system32\Dmllipeg.exe
                    9⤵
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    PID:3732
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 3732 -s 404
                      10⤵
                      • Program crash
                      PID:4940
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3732 -ip 3732
    1⤵
      PID:5032

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\SysWOW64\Ddakjkqi.exe

      Filesize

      82KB

      MD5

      0943d9528e395f356fe158dd9204475e

      SHA1

      52e9798fbffbb9865f77d08b8d8153d0f860e336

      SHA256

      6d2a123ce07ba1b0a695e7de4f9769953515293eea12ec3c81a689fbc2661c83

      SHA512

      ed5ed2cdf96bb092aacbd240a7e975ee0ba1b574f0048bdd74e470f62cb6136dfe44bff62d45306932e28b1335dabb443814650c99de0ec6a0c3627be1ea49e3

    • C:\Windows\SysWOW64\Deagdn32.exe

      Filesize

      82KB

      MD5

      ec1bdef038030f1baf04f907f6897264

      SHA1

      9dcb0786f0e2dba7fb5d23faa843760663fe3b0c

      SHA256

      62b38959221927908856960380ecfd74c9e247986c555fe8ffe433dee4ee3a4d

      SHA512

      f5bcbe1e533fdd81a5df0032f5d94fc2a5124d4b0b0bacc05f2111fdbbfb8c3bb9edbea6c8600c056fc72f67cd49652ecdc8a899975d2ab638a1b50cee694f5d

    • C:\Windows\SysWOW64\Dgbdlf32.exe

      Filesize

      82KB

      MD5

      13754c6f7a6d917bef96f3dee9c82578

      SHA1

      81f136c45665eff339ad60e5d76bafa9a0ca5721

      SHA256

      25ef77b1b476e6ec0b41c1954f6991dd9dd6010530c7a3bf56e655c7ea9e84f0

      SHA512

      b8d6156406e2f0e462d218ea5d5395bb030a8ff908ac9aaee8b383c3fa4b697d9a975f36d6189dbb63d2fdb016e3d2a03333caa99e89d5a34c5218c652c723b7

    • C:\Windows\SysWOW64\Dhmgki32.exe

      Filesize

      82KB

      MD5

      b0f970629e00c0e124e904b3bdb51af3

      SHA1

      4e8b78309dd2463518fd80ea0dd6a89312e56c24

      SHA256

      0c125388918c873b56fef24b92c0e0712c7ea7902bb72208ef8581884b094135

      SHA512

      f2b785c32c97fbac57ec110a8823ef4ae2d61ffa12d0cfe4771c157eb3520452ddcc71c090ca225017031657231a4c4266973cedb5bac09dd97f1dfa870917bf

    • C:\Windows\SysWOW64\Dkkcge32.exe

      Filesize

      82KB

      MD5

      de47446fb49da4113df983a503b4ed2a

      SHA1

      c097722c274c40a1cc74c41499e1a2e51d37c722

      SHA256

      07a7b380036801f1197e4250ffe96b24e000f816c5b5d5e6a2cdedc49b23d507

      SHA512

      5511437f7176770c7e53e281b52001872ac621d4aceb129e9757f92794258c58eca1dd7d289afefcff9f551f557933b13ae61b3e4b9dfeacc81735b53817cee6

    • C:\Windows\SysWOW64\Dmgbnq32.exe

      Filesize

      82KB

      MD5

      34b3cea233a3a6feba943462576b6e94

      SHA1

      c44f741d1f6f08444770a96d81c121fd8665d847

      SHA256

      bb7b33755983b308b1e09c14cd894642d498011183167aed752ef43a40a33872

      SHA512

      45539ab7f4e8549a2275782cd2306c8b77fc951be4a4aaf518ef219ec098ec62dd0e9c9d7ac926846e9db740ec2946cb3f6efcdba2a4dae8e2e3254c2b2c9fae

    • C:\Windows\SysWOW64\Dmllipeg.exe

      Filesize

      82KB

      MD5

      672964cbb876f46de87a0a6bdd488bc5

      SHA1

      e4e72546fb4ea64b4f249d6cea83eeedbce523ba

      SHA256

      74fa9db1c330860035a5d8fbc723bb0d88db2b91ffe204227bc5fbefe917b8bc

      SHA512

      eabb8383388f11b18b7ec1a40db25b538c15ff011ae45759c079d390c32ab8e897b3e4e787ce32e2890cd33e5cf6841a90e72f3f484d7130e41a9e16be422cda

    • C:\Windows\SysWOW64\Doilmc32.exe

      Filesize

      82KB

      MD5

      fb9f487f20aa28b8848062244ff1ad71

      SHA1

      fc2cbed9e52a3bc30510318c65cfee18f4bd41fd

      SHA256

      e20a9aa3b372edc41bac7b329fd9014d2fcef2e74f4ac1e27e75671bfd288f99

      SHA512

      f96adaefb5c501649ec375a77efd6b6c141548568b42e2fe3e1e76f9410fe369bdc69a270c3b31fc171fb15aada34c1b5a2530eb1422ec6143530ed263457f27

    • memory/764-0-0x0000000000400000-0x0000000000441000-memory.dmp

      Filesize

      260KB

    • memory/764-66-0x0000000000400000-0x0000000000441000-memory.dmp

      Filesize

      260KB

    • memory/764-1-0x0000000000431000-0x0000000000432000-memory.dmp

      Filesize

      4KB

    • memory/1824-70-0x0000000000400000-0x0000000000441000-memory.dmp

      Filesize

      260KB

    • memory/1824-40-0x0000000000400000-0x0000000000441000-memory.dmp

      Filesize

      260KB

    • memory/1868-68-0x0000000000400000-0x0000000000441000-memory.dmp

      Filesize

      260KB

    • memory/1868-56-0x0000000000400000-0x0000000000441000-memory.dmp

      Filesize

      260KB

    • memory/2312-69-0x0000000000400000-0x0000000000441000-memory.dmp

      Filesize

      260KB

    • memory/2312-48-0x0000000000400000-0x0000000000441000-memory.dmp

      Filesize

      260KB

    • memory/3492-72-0x0000000000400000-0x0000000000441000-memory.dmp

      Filesize

      260KB

    • memory/3492-25-0x0000000000400000-0x0000000000441000-memory.dmp

      Filesize

      260KB

    • memory/3724-21-0x0000000000400000-0x0000000000441000-memory.dmp

      Filesize

      260KB

    • memory/3724-73-0x0000000000400000-0x0000000000441000-memory.dmp

      Filesize

      260KB

    • memory/3732-65-0x0000000000400000-0x0000000000441000-memory.dmp

      Filesize

      260KB

    • memory/3732-67-0x0000000000400000-0x0000000000441000-memory.dmp

      Filesize

      260KB

    • memory/4072-71-0x0000000000400000-0x0000000000441000-memory.dmp

      Filesize

      260KB

    • memory/4072-32-0x0000000000400000-0x0000000000441000-memory.dmp

      Filesize

      260KB

    • memory/5068-74-0x0000000000400000-0x0000000000441000-memory.dmp

      Filesize

      260KB

    • memory/5068-8-0x0000000000400000-0x0000000000441000-memory.dmp

      Filesize

      260KB