Analysis

  • max time kernel
    99s
  • max time network
    119s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-08-2024 05:38

General

  • Target

    716225e46e69afb36600682de616f460N.exe

  • Size

    98KB

  • MD5

    716225e46e69afb36600682de616f460

  • SHA1

    dd0c8d0e69f414f2d6ce59033131e9b88eae63dc

  • SHA256

    d833a6440d0064ebe705a21e45e0fc7a837f1216d6ff71f80050e36171d615fe

  • SHA512

    f3f308f0c21fdbeb9a5b510a5a11ff49771023f5efbe5680aa206a06121a6df2f790127854f794a5adefc7efc56283b62f2a626123d5a9408bd44db61b72a706

  • SSDEEP

    3072:GWNU8pVUQMeNAlQAHV1d1p1d1d1B1B1B1iuLETeFKPD375lHzpa1P:R7pnMeNAOA11d1p1d1d1B1B1B1iKETeZ

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 18 IoCs
  • Executes dropped EXE 9 IoCs
  • Drops file in System32 directory 27 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 10 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 30 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\716225e46e69afb36600682de616f460N.exe
    "C:\Users\Admin\AppData\Local\Temp\716225e46e69afb36600682de616f460N.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3556
    • C:\Windows\SysWOW64\Ddonekbl.exe
      C:\Windows\system32\Ddonekbl.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:4184
      • C:\Windows\SysWOW64\Dfnjafap.exe
        C:\Windows\system32\Dfnjafap.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:4748
        • C:\Windows\SysWOW64\Daconoae.exe
          C:\Windows\system32\Daconoae.exe
          4⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:1664
          • C:\Windows\SysWOW64\Dhmgki32.exe
            C:\Windows\system32\Dhmgki32.exe
            5⤵
            • Adds autorun key to be loaded by Explorer.exe on startup
            • Executes dropped EXE
            • Drops file in System32 directory
            • System Location Discovery: System Language Discovery
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:3732
            • C:\Windows\SysWOW64\Dogogcpo.exe
              C:\Windows\system32\Dogogcpo.exe
              6⤵
              • Adds autorun key to be loaded by Explorer.exe on startup
              • Executes dropped EXE
              • Drops file in System32 directory
              • System Location Discovery: System Language Discovery
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:2260
              • C:\Windows\SysWOW64\Daekdooc.exe
                C:\Windows\system32\Daekdooc.exe
                7⤵
                • Adds autorun key to be loaded by Explorer.exe on startup
                • Executes dropped EXE
                • Drops file in System32 directory
                • System Location Discovery: System Language Discovery
                • Modifies registry class
                • Suspicious use of WriteProcessMemory
                PID:1044
                • C:\Windows\SysWOW64\Dddhpjof.exe
                  C:\Windows\system32\Dddhpjof.exe
                  8⤵
                  • Adds autorun key to be loaded by Explorer.exe on startup
                  • Executes dropped EXE
                  • Drops file in System32 directory
                  • System Location Discovery: System Language Discovery
                  • Modifies registry class
                  • Suspicious use of WriteProcessMemory
                  PID:1360
                  • C:\Windows\SysWOW64\Dgbdlf32.exe
                    C:\Windows\system32\Dgbdlf32.exe
                    9⤵
                    • Adds autorun key to be loaded by Explorer.exe on startup
                    • Executes dropped EXE
                    • Drops file in System32 directory
                    • System Location Discovery: System Language Discovery
                    • Modifies registry class
                    • Suspicious use of WriteProcessMemory
                    PID:828
                    • C:\Windows\SysWOW64\Dmllipeg.exe
                      C:\Windows\system32\Dmllipeg.exe
                      10⤵
                      • Executes dropped EXE
                      • System Location Discovery: System Language Discovery
                      PID:4240
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -u -p 4240 -s 408
                        11⤵
                        • Program crash
                        PID:4948
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4240 -ip 4240
    1⤵
      PID:3304

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\SysWOW64\Daconoae.exe

      Filesize

      98KB

      MD5

      e93b357015388682dceae449e5710e46

      SHA1

      9ba37890f4a5db3a9e2da64698b9c1210cf1366e

      SHA256

      c714729342f06a7a984873a9f020fcbe6307fb337e2eaed06481f9806c51e030

      SHA512

      c324a8ee3446d346d71d00e0b7ec1a1f2d839c674d19e11779f29e2a626f51213a61bc531836ad035763f6bb4c1d0ff93e5853618c67622784de9e7467590ab3

    • C:\Windows\SysWOW64\Daekdooc.exe

      Filesize

      98KB

      MD5

      e2d9dcc5fa17dfbc298c6879da6aad66

      SHA1

      f5dd0dc6cf6cb2effec3b03730481591fe6149f8

      SHA256

      c0e997964d56d561132e136aad3f34a6c5318fa717409f6893f85f08a4dbd9f5

      SHA512

      402ac6527414212d1c87fa77cc993713b9c72a64642b8ea4196872a55e78097b16f8c729a45a76c01ff19ebbd054b56b91ae57dd639300bba3b721938d482f81

    • C:\Windows\SysWOW64\Dddhpjof.exe

      Filesize

      98KB

      MD5

      ec29d171e963f44464bf297b667c659b

      SHA1

      6ae204e2839b40de9ab964d7fcbbc403fb359ee5

      SHA256

      3aa275f6e8027e1e61f399694bb307a9b68d6be0c01625d10c885ecea919ac72

      SHA512

      53239b2bfe0840df1140ed571154011adfb3aff6a8c35bede3af85ef4fd89afde47bc57ccbcbee1e1e8504972fe62608fde6cce1d2608a555945e293375c4589

    • C:\Windows\SysWOW64\Ddonekbl.exe

      Filesize

      98KB

      MD5

      3f4ce87f4daaeaaae3a2dd5caa449ee9

      SHA1

      566a9afa7cd486d2c9ce7ab1d4ea8515ebabefe2

      SHA256

      1b5a59a2673f7975055a3e3d59b92af91fa9abd81a5c8913cccaa8e0ff52927e

      SHA512

      5220b5bf3077c31055260e631aeaab82b985383aa7049c64aad61302afd3177eb29fe228591d59b8166dd6488041cba9789676fba9ab30d1bf785fe443bcd02f

    • C:\Windows\SysWOW64\Dfnjafap.exe

      Filesize

      98KB

      MD5

      2029dd8a43d66cd129432541ea93e2ba

      SHA1

      4657ff0a3122a205caaa9d49e713907f61caeac5

      SHA256

      7a1b71f506038ab0ffe2ce1d57cbb81a76afdbd12085233ad47824dec94fe49d

      SHA512

      d27e8ec96f234395ef833490938c37a8950e1daa8da7112fad0bc79fb906656fb836dc0cbc1069400ef942b630040ad3aa8f3d2496465d541e11768361f85c8e

    • C:\Windows\SysWOW64\Dgbdlf32.exe

      Filesize

      98KB

      MD5

      4237f055db4a12398dde69c0ead79000

      SHA1

      42621066f289f32d83120730c357ddf9633a9dd8

      SHA256

      2a21bd01ab4242ba7ea069c04ff2a7b03cb86a77a7cd124804510cb496033b90

      SHA512

      6bb5d42af3ab3559fb7e6523bab9c133555251c7013422a3c4b846d2c18e98f8bde56faf1e8f6acc1ca8a9434e1ce5aaa99e49a494673a77bad73cfdfd817c40

    • C:\Windows\SysWOW64\Dhmgki32.exe

      Filesize

      98KB

      MD5

      27bc6379154635cf5db3454270c476f3

      SHA1

      77878c551108e68af5de37ba6fcddd3b0b431515

      SHA256

      0ab6ea26e815f9cfb0f9f1b12feb1c4e26510cda443a1b8c10924e41ac37c34a

      SHA512

      cb8293e5acb3b266fcb698821a05638d6b60f4bef1f9cbf76018c8ccf829f0f0c63e3dcce7f7ee586abd8a639d4f2a49fcda3cfa7cadded12952b7a264c3e385

    • C:\Windows\SysWOW64\Dmllipeg.exe

      Filesize

      98KB

      MD5

      4e9197f802a18cab8887ed53bb1ec5e2

      SHA1

      ffd90ae87d7db0973fc4c8a654d6372adfbef780

      SHA256

      a3c0fd6296b5c613ce6aba01577a5105ef4e5dae480bef5740691343adbd40a0

      SHA512

      25bd93efe4b7f4d593bae811dc7f14df1d74d1218a8c234720427c74323c48e2960e4b15bc7421ce1f6159a6ee55f75a4607997882cca16c2525f20c082d54bb

    • C:\Windows\SysWOW64\Dogogcpo.exe

      Filesize

      98KB

      MD5

      6da322b96b665c89acd9d8492c9aa56d

      SHA1

      b5ee77eea5d5962927eb3e44f8cec4c9b98fc897

      SHA256

      8017eac98c5b4733ba32cb64deeecf482d56eea4dc45c45477a7c53ec77bb0a1

      SHA512

      d4ef65b2b66dc74dbfb4672569b8ada6d8651f6e9f5aa9272f3b666a4b642234de4b5663238412331a07141631be4f22ca77586b5e1cb1636ef4b416b7ac6078

    • C:\Windows\SysWOW64\Lbabpnmn.dll

      Filesize

      7KB

      MD5

      a9b679a4026efd40296982c152384765

      SHA1

      ae9e3d936b48a9008dcd4a8551b709d2cb46d3c2

      SHA256

      854f97d8c6a570d82fa939d39e2d52c0726fe8c6327803767f7c61a032902d2b

      SHA512

      94e60d04876b9afd64668b03e61b42de5c6ca023d623b009e84f3928891a1a4b2ce27cccfe34573c60825c39b89a8ff5faac1238ecbde014b70b89c47774b94f

    • memory/828-63-0x0000000000400000-0x0000000000443000-memory.dmp

      Filesize

      268KB

    • memory/828-74-0x0000000000400000-0x0000000000443000-memory.dmp

      Filesize

      268KB

    • memory/1044-75-0x0000000000400000-0x0000000000443000-memory.dmp

      Filesize

      268KB

    • memory/1044-48-0x0000000000400000-0x0000000000443000-memory.dmp

      Filesize

      268KB

    • memory/1360-76-0x0000000000400000-0x0000000000443000-memory.dmp

      Filesize

      268KB

    • memory/1360-55-0x0000000000400000-0x0000000000443000-memory.dmp

      Filesize

      268KB

    • memory/1664-23-0x0000000000400000-0x0000000000443000-memory.dmp

      Filesize

      268KB

    • memory/1664-78-0x0000000000400000-0x0000000000443000-memory.dmp

      Filesize

      268KB

    • memory/2260-77-0x0000000000400000-0x0000000000443000-memory.dmp

      Filesize

      268KB

    • memory/2260-39-0x0000000000400000-0x0000000000443000-memory.dmp

      Filesize

      268KB

    • memory/3556-0-0x0000000000400000-0x0000000000443000-memory.dmp

      Filesize

      268KB

    • memory/3556-81-0x0000000000400000-0x0000000000443000-memory.dmp

      Filesize

      268KB

    • memory/3732-80-0x0000000000400000-0x0000000000443000-memory.dmp

      Filesize

      268KB

    • memory/3732-31-0x0000000000400000-0x0000000000443000-memory.dmp

      Filesize

      268KB

    • memory/4184-14-0x0000000000400000-0x0000000000443000-memory.dmp

      Filesize

      268KB

    • memory/4240-71-0x0000000000400000-0x0000000000443000-memory.dmp

      Filesize

      268KB

    • memory/4240-73-0x0000000000400000-0x0000000000443000-memory.dmp

      Filesize

      268KB

    • memory/4748-16-0x0000000000400000-0x0000000000443000-memory.dmp

      Filesize

      268KB

    • memory/4748-79-0x0000000000400000-0x0000000000443000-memory.dmp

      Filesize

      268KB