Analysis

  • max time kernel
    103s
  • max time network
    103s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-08-2024 00:03

General

  • Target

    ecfb2f8b58c4fc197344af5ae8a26a50N.exe

  • Size

    101KB

  • MD5

    ecfb2f8b58c4fc197344af5ae8a26a50

  • SHA1

    4b9ad59530aa9b1d45d6c0440cb427e1010d2d7e

  • SHA256

    47d49d1d80c6fe1408a8295aa47bd5d53b5e63b609fc73bb3ec8fcef61dc02ca

  • SHA512

    7382aa54b20ff4089eb48306a7d8b77c29e6e62c716b8b5a97f1695dfe0979fd38a5cee4e1619657bc40a948745e0e62ebf425bb93d1e9728de11ef29454f0d7

  • SSDEEP

    3072:xJO3LMSPm8rxJHOoe9d4yie3U3/zrB3g3k8p4qI4/HQCC:rO3Pr49Ky5QPBZs/HNC

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 16 IoCs
  • Executes dropped EXE 8 IoCs
  • Drops file in System32 directory 24 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 27 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ecfb2f8b58c4fc197344af5ae8a26a50N.exe
    "C:\Users\Admin\AppData\Local\Temp\ecfb2f8b58c4fc197344af5ae8a26a50N.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4040
    • C:\Windows\SysWOW64\Deokon32.exe
      C:\Windows\system32\Deokon32.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:1180
      • C:\Windows\SysWOW64\Dhmgki32.exe
        C:\Windows\system32\Dhmgki32.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:3184
        • C:\Windows\SysWOW64\Dfpgffpm.exe
          C:\Windows\system32\Dfpgffpm.exe
          4⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:1692
          • C:\Windows\SysWOW64\Dogogcpo.exe
            C:\Windows\system32\Dogogcpo.exe
            5⤵
            • Adds autorun key to be loaded by Explorer.exe on startup
            • Executes dropped EXE
            • Drops file in System32 directory
            • System Location Discovery: System Language Discovery
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:1900
            • C:\Windows\SysWOW64\Deagdn32.exe
              C:\Windows\system32\Deagdn32.exe
              6⤵
              • Adds autorun key to be loaded by Explorer.exe on startup
              • Executes dropped EXE
              • Drops file in System32 directory
              • System Location Discovery: System Language Discovery
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:2040
              • C:\Windows\SysWOW64\Dhocqigp.exe
                C:\Windows\system32\Dhocqigp.exe
                7⤵
                • Adds autorun key to be loaded by Explorer.exe on startup
                • Executes dropped EXE
                • Drops file in System32 directory
                • System Location Discovery: System Language Discovery
                • Modifies registry class
                • Suspicious use of WriteProcessMemory
                PID:64
                • C:\Windows\SysWOW64\Doilmc32.exe
                  C:\Windows\system32\Doilmc32.exe
                  8⤵
                  • Adds autorun key to be loaded by Explorer.exe on startup
                  • Executes dropped EXE
                  • Drops file in System32 directory
                  • System Location Discovery: System Language Discovery
                  • Modifies registry class
                  • Suspicious use of WriteProcessMemory
                  PID:4296
                  • C:\Windows\SysWOW64\Dmllipeg.exe
                    C:\Windows\system32\Dmllipeg.exe
                    9⤵
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    PID:3788
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 3788 -s 416
                      10⤵
                      • Program crash
                      PID:2636
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3788 -ip 3788
    1⤵
      PID:1904

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\SysWOW64\Deagdn32.exe

      Filesize

      101KB

      MD5

      cf8e2b7a80ee23b5e380793bc485bac8

      SHA1

      5025d8a19a64129f95a1169446619164d1afb4bb

      SHA256

      2eb21776791c219ca799931fa7cdf94993ea756315668f4c009e47b10e43d1b1

      SHA512

      4dcda30371214a72f3e434c3a6694fa3a232602cd1c8deee843b4ab38c7104bae56519a942fae2701a7cf4d530371f62ecbd29aadc0f50fce664dc23b401a282

    • C:\Windows\SysWOW64\Deokon32.exe

      Filesize

      101KB

      MD5

      580bf0f51dfa46bf4ec1d95f40720bb2

      SHA1

      199587e48ff0952fca58c0fbdf543afb566dc13a

      SHA256

      31b3767cab1a5be3fb29ba5ff4c9cf429296f07651cc9fc8aa7cc46aca471534

      SHA512

      ba120c5c5bde9e202ba1dcd706bd49b8d0558530f90e36cc11060643cdffd0a841b3a2d3266866dcbb9b6234b042bb2b16a34afe292ddb6d95b3ec1cdc0fbcd6

    • C:\Windows\SysWOW64\Dfpgffpm.exe

      Filesize

      101KB

      MD5

      ea9198d71f5b58f0658e70936a9ac398

      SHA1

      fa3a01b266e8ab2d30108de7adcd58fed59893a9

      SHA256

      cf188b06df71b72d3607e5bcd7b2712f449e60c70b4a04bb5be491596dc29ee9

      SHA512

      8948dbe0ac087b400d56e6cd6e9c72034411e5c65c995f1a4e7bf293a4422fc4447d6d3119cf545ffa8fa45ed909c364fc85244383b4185204a1f9492b80fe7c

    • C:\Windows\SysWOW64\Dhmgki32.exe

      Filesize

      101KB

      MD5

      c76f7f0693854c064adc67a6aa9f2556

      SHA1

      2e897e84794dafb661711bd3cda7e3005532d5ac

      SHA256

      ef9d7e7503845568646b2f6705850518bc6318a0d629317ef42f23126589bd37

      SHA512

      ad8b841ec6575d160b78ab4f494421f17eed002f5da3a542fc0760f267abfa2af02426d78203c16dc87c2117ee3bd69d37c3e92027f1b3683cbd33b82ec062ad

    • C:\Windows\SysWOW64\Dhocqigp.exe

      Filesize

      101KB

      MD5

      66ea9af0f13db3652c9b6479479c0491

      SHA1

      e2d0f9fd5c5a73684e9664a78452cfd7fb665517

      SHA256

      99d3d12159f9186d43f13c5dd76a73b70c7881b4b936a9c75371ce3618749265

      SHA512

      e4461e0054a1dfb8a00507ba2b7c0d69eab9e8f3fc4f4e1b4e57139da9c014c741508f3b2c9b3fd64c1c286a7da61a20d894b3ffbaf7050583d345d941d4e8fc

    • C:\Windows\SysWOW64\Dmllipeg.exe

      Filesize

      101KB

      MD5

      d98627eeea9597891a4c6b38d5ff9b82

      SHA1

      e5bafc4a3aabc9ca3dd6fe083e5f09b5f64d63ad

      SHA256

      3380a114c67ac756b50989b2030ee87e7ef9d0debfb0dfd1122b8bc363098754

      SHA512

      b994ba9f6ec219d63d1d75420ed4a2eef0bc8eb0e58916468185887b3efb20a5d30aa45330e6e7e824fe833ccb0f38c9a8c752ab273e7d71439208896bd31c29

    • C:\Windows\SysWOW64\Dogogcpo.exe

      Filesize

      101KB

      MD5

      6b3cb427b52fdd756b06ee0aaebbae5d

      SHA1

      4d234bcb56398ff4b378afc12ba3b067448294a7

      SHA256

      4d5507567682f5503993ad621f79a0207c67615537d2133d09e8cb90749f3208

      SHA512

      9cfac832ab7aacbacf0d9654b843b7e63d253942bd24f6b1f4913639213e2545ee7b2b704411a6d1fb8203c3b5c6677038dbd01d3417a8b5ba924ce76e345fe7

    • C:\Windows\SysWOW64\Doilmc32.exe

      Filesize

      101KB

      MD5

      1f0b91e271d357702c1f6394d2eed4f1

      SHA1

      9560babc726c733d85454f299bdfe4433f1db87a

      SHA256

      8c623d94690e0367f15748cc05db95b0e9f5612827fa81b2b1f6f4229758bedb

      SHA512

      131dc96e1847643020966a559a38650ad5b805c1ad51b1dd77028a63aed054e2eed6dfc7142116f349835c3326d47c1b38f3dca8afea4f9cd5f6766d07a7a244

    • C:\Windows\SysWOW64\Kahdohfm.dll

      Filesize

      7KB

      MD5

      d37fff2dc119460d03d0fc0ec540ff88

      SHA1

      d432e82b0992022ebfacd4c3487a142e9036817f

      SHA256

      9969db0f7346e89feb09377c98f4b0602df840078eb748a6211fa977bde5f982

      SHA512

      43762d14cc157f966fad6ab9da05a6e76d541e2d77fbc1f61f5272baffbd00690dbd6396b73a8baa3f820f12e31152a73088cfacf037ecee0061df1640f03b53

    • memory/64-47-0x0000000000400000-0x0000000000442000-memory.dmp

      Filesize

      264KB

    • memory/64-67-0x0000000000400000-0x0000000000442000-memory.dmp

      Filesize

      264KB

    • memory/1180-12-0x0000000000400000-0x0000000000442000-memory.dmp

      Filesize

      264KB

    • memory/1692-26-0x0000000000400000-0x0000000000442000-memory.dmp

      Filesize

      264KB

    • memory/1692-72-0x0000000000400000-0x0000000000442000-memory.dmp

      Filesize

      264KB

    • memory/1900-31-0x0000000000400000-0x0000000000442000-memory.dmp

      Filesize

      264KB

    • memory/1900-69-0x0000000000400000-0x0000000000442000-memory.dmp

      Filesize

      264KB

    • memory/2040-39-0x0000000000400000-0x0000000000442000-memory.dmp

      Filesize

      264KB

    • memory/2040-68-0x0000000000400000-0x0000000000442000-memory.dmp

      Filesize

      264KB

    • memory/3184-70-0x0000000000400000-0x0000000000442000-memory.dmp

      Filesize

      264KB

    • memory/3184-16-0x0000000000400000-0x0000000000442000-memory.dmp

      Filesize

      264KB

    • memory/3788-64-0x0000000000400000-0x0000000000442000-memory.dmp

      Filesize

      264KB

    • memory/3788-65-0x0000000000400000-0x0000000000442000-memory.dmp

      Filesize

      264KB

    • memory/4040-71-0x0000000000400000-0x0000000000442000-memory.dmp

      Filesize

      264KB

    • memory/4040-0-0x0000000000400000-0x0000000000442000-memory.dmp

      Filesize

      264KB

    • memory/4296-66-0x0000000000400000-0x0000000000442000-memory.dmp

      Filesize

      264KB

    • memory/4296-55-0x0000000000400000-0x0000000000442000-memory.dmp

      Filesize

      264KB