Analysis

  • max time kernel
    101s
  • max time network
    102s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/08/2024, 02:19

General

  • Target

    0713706941bc59dee0513d984f310440N.exe

  • Size

    45KB

  • MD5

    0713706941bc59dee0513d984f310440

  • SHA1

    ac7e0c8e68a93adeb7421def16bda17d3ac15311

  • SHA256

    26af3c046b175ce1971274373d25a363ba98ba79920759ef21b1916943ac6bab

  • SHA512

    69e1e16c6a587db54f30ad0a36903a8473a32525e61080f7161cf85fe2a1da0f87d82b1171495d7ddd7dff2abdb55fef8587b0fb899afde3b384d27ff9090d91

  • SSDEEP

    768:5hORF+w9toQRzPHNc4DQ8zevjN0AVEpzstW/1H5yH:5OF+GLzPKKx6v4z7I

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 14 IoCs
  • Executes dropped EXE 7 IoCs
  • Drops file in System32 directory 21 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 24 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0713706941bc59dee0513d984f310440N.exe
    "C:\Users\Admin\AppData\Local\Temp\0713706941bc59dee0513d984f310440N.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:5104
    • C:\Windows\SysWOW64\Daconoae.exe
      C:\Windows\system32\Daconoae.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:4740
      • C:\Windows\SysWOW64\Dhmgki32.exe
        C:\Windows\system32\Dhmgki32.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:4560
        • C:\Windows\SysWOW64\Dkkcge32.exe
          C:\Windows\system32\Dkkcge32.exe
          4⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:4000
          • C:\Windows\SysWOW64\Dmjocp32.exe
            C:\Windows\system32\Dmjocp32.exe
            5⤵
            • Adds autorun key to be loaded by Explorer.exe on startup
            • Executes dropped EXE
            • Drops file in System32 directory
            • System Location Discovery: System Language Discovery
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:212
            • C:\Windows\SysWOW64\Dddhpjof.exe
              C:\Windows\system32\Dddhpjof.exe
              6⤵
              • Adds autorun key to be loaded by Explorer.exe on startup
              • Executes dropped EXE
              • Drops file in System32 directory
              • System Location Discovery: System Language Discovery
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:2740
              • C:\Windows\SysWOW64\Dgbdlf32.exe
                C:\Windows\system32\Dgbdlf32.exe
                7⤵
                • Adds autorun key to be loaded by Explorer.exe on startup
                • Executes dropped EXE
                • Drops file in System32 directory
                • System Location Discovery: System Language Discovery
                • Modifies registry class
                • Suspicious use of WriteProcessMemory
                PID:700
                • C:\Windows\SysWOW64\Dmllipeg.exe
                  C:\Windows\system32\Dmllipeg.exe
                  8⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  PID:3244
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 3244 -s 220
                    9⤵
                    • Program crash
                    PID:3100
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3244 -ip 3244
    1⤵
      PID:2488

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\SysWOW64\Daconoae.exe

      Filesize

      45KB

      MD5

      65cc29a57765c0ab4738b130d0e22419

      SHA1

      c85bb745382aa2babdc713282484d82f2292e536

      SHA256

      04c9378070d526a54c2999f628b2b4194f64f972ce855851e645cad462abcd4f

      SHA512

      ad52ccf2b977ad3b8698f1b0b2051bb28e43a8091fd58a05945675520978a1db1408ceee1bc5f5f6c323a4bfaf96b65303efc837ef0e0a305bb3c58e5eb454f9

    • C:\Windows\SysWOW64\Dddhpjof.exe

      Filesize

      45KB

      MD5

      c075881342f37c8edfe6048e7c280992

      SHA1

      295a10e38ef01506f7b5b63ac6d4094bbe457e01

      SHA256

      40f946f972e752bd753e083c6856e2b22dcf5d4934262b73d8dc40ee5d55226b

      SHA512

      bfd77237f6fb64e409563a0626a1062081d8f3b061bc1e2be09c8fc8ad4e5afe387119130b0db2c0a44fd64c19b62dc7bbf502d721743531268a04d490a7cf8a

    • C:\Windows\SysWOW64\Dgbdlf32.exe

      Filesize

      45KB

      MD5

      e5b42cd33e9ce75f2c7f5dd6a1b93e77

      SHA1

      c4ad546c9eb4ef7c835ba76c2cc33b8cb2159158

      SHA256

      6b61d928a9d9f88acfcb71b8a01e6928e6484e6393166282d0722f0850862216

      SHA512

      e0ac871bf1282b8372d0deb55b893e8de7aecfccd9e57c7d5884493cf6cd9dedc7ccc9c87ee5a913a3e30389c2c3342c77f590ba3894f353165df64f7da592b7

    • C:\Windows\SysWOW64\Dhmgki32.exe

      Filesize

      45KB

      MD5

      268a8330254576a26d7fe52e41a6cf0e

      SHA1

      93c55a562058012280fd6e40ac8dc4b03c3cf2d4

      SHA256

      dda306f0d6516255ff30dd1908c32578b024410e5e13df3dc1e9d21dc7b7d230

      SHA512

      9a5f96e409b2c148ab940293148793f4c3c57bc2a32168d256d0fed9344b42f495ad464e97d5adbd2a191ec060d02a42833d58cfebe3e1fde53d098ef16478d7

    • C:\Windows\SysWOW64\Dkkcge32.exe

      Filesize

      45KB

      MD5

      bcbe43160564bdfbed8d8214fd6e778d

      SHA1

      82ffeaf84842808de9e5ddb458da34ac58158ba1

      SHA256

      c5191b9e5d6a58321cc7e422f215b89eb77d0c6dee9b41f18f754593ec5cde2f

      SHA512

      01b75b6dc0130951e7b73bdf89e35c1f1d9ba29d9f37ef178004666555785a8103026e8eff0b33f3529c8b1f18031ca734a4d0f97c6c678266344625bd45a9a1

    • C:\Windows\SysWOW64\Dmjocp32.exe

      Filesize

      45KB

      MD5

      73e26be511280bb2472d0c3577fcdb3e

      SHA1

      aa999afb2e9ff485390bc00b33fde9ff776c4fb6

      SHA256

      b8f8307867c94b0679dfbdae747d000fc3c56306a920b72c8d7614bd3fe05b0a

      SHA512

      795f8843caf01924850a05e1133fb59332ea9f2ff65083ba8cfb01e8f16adde21c82c58c582549179a100c45fbf57fbdfd7beaefef6d382cbd6b205e2bbb276f

    • C:\Windows\SysWOW64\Dmllipeg.exe

      Filesize

      45KB

      MD5

      a1d918a5f280485522e8f1d58b3658bf

      SHA1

      24b35435a49dbf8ac9183725840aa345f090ce88

      SHA256

      7a81711bf0e786809da54cbdd59c2eb7aa3f696c3042796640c34cfddbab6ddc

      SHA512

      4eda9da1f866ebf313bf9a155c49755772144d0bada33fb8166ab7ac215ed8fde31d459776bde26938d7326ea5fe4488ad5f1ba45e8e0c681a14b60e4e176b46

    • memory/212-64-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/212-31-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/700-60-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/700-47-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/2740-39-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/2740-62-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/3244-55-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/3244-59-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/4000-24-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/4000-66-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/4560-68-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/4560-16-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/4740-70-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/4740-7-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/5104-0-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/5104-72-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB