Analysis
-
max time kernel
101s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/08/2024, 02:19
Static task
static1
Behavioral task
behavioral1
Sample
0713706941bc59dee0513d984f310440N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
0713706941bc59dee0513d984f310440N.exe
Resource
win10v2004-20240802-en
General
-
Target
0713706941bc59dee0513d984f310440N.exe
-
Size
45KB
-
MD5
0713706941bc59dee0513d984f310440
-
SHA1
ac7e0c8e68a93adeb7421def16bda17d3ac15311
-
SHA256
26af3c046b175ce1971274373d25a363ba98ba79920759ef21b1916943ac6bab
-
SHA512
69e1e16c6a587db54f30ad0a36903a8473a32525e61080f7161cf85fe2a1da0f87d82b1171495d7ddd7dff2abdb55fef8587b0fb899afde3b384d27ff9090d91
-
SSDEEP
768:5hORF+w9toQRzPHNc4DQ8zevjN0AVEpzstW/1H5yH:5OF+GLzPKKx6v4z7I
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 14 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dddhpjof.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dgbdlf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dkkcge32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dmjocp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dddhpjof.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" 0713706941bc59dee0513d984f310440N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Daconoae.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dhmgki32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dhmgki32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dgbdlf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dmjocp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 0713706941bc59dee0513d984f310440N.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Daconoae.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dkkcge32.exe -
Executes dropped EXE 7 IoCs
pid Process 4740 Daconoae.exe 4560 Dhmgki32.exe 4000 Dkkcge32.exe 212 Dmjocp32.exe 2740 Dddhpjof.exe 700 Dgbdlf32.exe 3244 Dmllipeg.exe -
Drops file in System32 directory 21 IoCs
description ioc Process File created C:\Windows\SysWOW64\Dgbdlf32.exe Dddhpjof.exe File opened for modification C:\Windows\SysWOW64\Dmllipeg.exe Dgbdlf32.exe File created C:\Windows\SysWOW64\Kngpec32.dll Dgbdlf32.exe File opened for modification C:\Windows\SysWOW64\Dmjocp32.exe Dkkcge32.exe File created C:\Windows\SysWOW64\Bobiobnp.dll Dkkcge32.exe File created C:\Windows\SysWOW64\Dddhpjof.exe Dmjocp32.exe File created C:\Windows\SysWOW64\Amjknl32.dll Dmjocp32.exe File created C:\Windows\SysWOW64\Dkkcge32.exe Dhmgki32.exe File created C:\Windows\SysWOW64\Dmllipeg.exe Dgbdlf32.exe File created C:\Windows\SysWOW64\Daconoae.exe 0713706941bc59dee0513d984f310440N.exe File opened for modification C:\Windows\SysWOW64\Dhmgki32.exe Daconoae.exe File created C:\Windows\SysWOW64\Fpdaoioe.dll Daconoae.exe File opened for modification C:\Windows\SysWOW64\Dddhpjof.exe Dmjocp32.exe File created C:\Windows\SysWOW64\Jcbdhp32.dll Dhmgki32.exe File created C:\Windows\SysWOW64\Dmjocp32.exe Dkkcge32.exe File opened for modification C:\Windows\SysWOW64\Dgbdlf32.exe Dddhpjof.exe File created C:\Windows\SysWOW64\Gfghpl32.dll Dddhpjof.exe File opened for modification C:\Windows\SysWOW64\Daconoae.exe 0713706941bc59dee0513d984f310440N.exe File created C:\Windows\SysWOW64\Oammoc32.dll 0713706941bc59dee0513d984f310440N.exe File created C:\Windows\SysWOW64\Dhmgki32.exe Daconoae.exe File opened for modification C:\Windows\SysWOW64\Dkkcge32.exe Dhmgki32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3100 3244 WerFault.exe 92 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dgbdlf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dmllipeg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0713706941bc59dee0513d984f310440N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Daconoae.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dhmgki32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dkkcge32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dmjocp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dddhpjof.exe -
Modifies registry class 24 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dhmgki32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dddhpjof.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dddhpjof.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dgbdlf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bobiobnp.dll" Dkkcge32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kngpec32.dll" Dgbdlf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 0713706941bc59dee0513d984f310440N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node 0713706941bc59dee0513d984f310440N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID 0713706941bc59dee0513d984f310440N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oammoc32.dll" 0713706941bc59dee0513d984f310440N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Daconoae.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dhmgki32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fpdaoioe.dll" Daconoae.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jcbdhp32.dll" Dhmgki32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dkkcge32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Amjknl32.dll" Dmjocp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dmjocp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dgbdlf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} 0713706941bc59dee0513d984f310440N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" 0713706941bc59dee0513d984f310440N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Daconoae.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dkkcge32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dmjocp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gfghpl32.dll" Dddhpjof.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 5104 wrote to memory of 4740 5104 0713706941bc59dee0513d984f310440N.exe 86 PID 5104 wrote to memory of 4740 5104 0713706941bc59dee0513d984f310440N.exe 86 PID 5104 wrote to memory of 4740 5104 0713706941bc59dee0513d984f310440N.exe 86 PID 4740 wrote to memory of 4560 4740 Daconoae.exe 87 PID 4740 wrote to memory of 4560 4740 Daconoae.exe 87 PID 4740 wrote to memory of 4560 4740 Daconoae.exe 87 PID 4560 wrote to memory of 4000 4560 Dhmgki32.exe 88 PID 4560 wrote to memory of 4000 4560 Dhmgki32.exe 88 PID 4560 wrote to memory of 4000 4560 Dhmgki32.exe 88 PID 4000 wrote to memory of 212 4000 Dkkcge32.exe 89 PID 4000 wrote to memory of 212 4000 Dkkcge32.exe 89 PID 4000 wrote to memory of 212 4000 Dkkcge32.exe 89 PID 212 wrote to memory of 2740 212 Dmjocp32.exe 90 PID 212 wrote to memory of 2740 212 Dmjocp32.exe 90 PID 212 wrote to memory of 2740 212 Dmjocp32.exe 90 PID 2740 wrote to memory of 700 2740 Dddhpjof.exe 91 PID 2740 wrote to memory of 700 2740 Dddhpjof.exe 91 PID 2740 wrote to memory of 700 2740 Dddhpjof.exe 91 PID 700 wrote to memory of 3244 700 Dgbdlf32.exe 92 PID 700 wrote to memory of 3244 700 Dgbdlf32.exe 92 PID 700 wrote to memory of 3244 700 Dgbdlf32.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\0713706941bc59dee0513d984f310440N.exe"C:\Users\Admin\AppData\Local\Temp\0713706941bc59dee0513d984f310440N.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5104 -
C:\Windows\SysWOW64\Daconoae.exeC:\Windows\system32\Daconoae.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Windows\SysWOW64\Dhmgki32.exeC:\Windows\system32\Dhmgki32.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4560 -
C:\Windows\SysWOW64\Dkkcge32.exeC:\Windows\system32\Dkkcge32.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4000 -
C:\Windows\SysWOW64\Dmjocp32.exeC:\Windows\system32\Dmjocp32.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Windows\SysWOW64\Dddhpjof.exeC:\Windows\system32\Dddhpjof.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\SysWOW64\Dgbdlf32.exeC:\Windows\system32\Dgbdlf32.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:700 -
C:\Windows\SysWOW64\Dmllipeg.exeC:\Windows\system32\Dmllipeg.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3244 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3244 -s 2209⤵
- Program crash
PID:3100
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3244 -ip 32441⤵PID:2488
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
45KB
MD565cc29a57765c0ab4738b130d0e22419
SHA1c85bb745382aa2babdc713282484d82f2292e536
SHA25604c9378070d526a54c2999f628b2b4194f64f972ce855851e645cad462abcd4f
SHA512ad52ccf2b977ad3b8698f1b0b2051bb28e43a8091fd58a05945675520978a1db1408ceee1bc5f5f6c323a4bfaf96b65303efc837ef0e0a305bb3c58e5eb454f9
-
Filesize
45KB
MD5c075881342f37c8edfe6048e7c280992
SHA1295a10e38ef01506f7b5b63ac6d4094bbe457e01
SHA25640f946f972e752bd753e083c6856e2b22dcf5d4934262b73d8dc40ee5d55226b
SHA512bfd77237f6fb64e409563a0626a1062081d8f3b061bc1e2be09c8fc8ad4e5afe387119130b0db2c0a44fd64c19b62dc7bbf502d721743531268a04d490a7cf8a
-
Filesize
45KB
MD5e5b42cd33e9ce75f2c7f5dd6a1b93e77
SHA1c4ad546c9eb4ef7c835ba76c2cc33b8cb2159158
SHA2566b61d928a9d9f88acfcb71b8a01e6928e6484e6393166282d0722f0850862216
SHA512e0ac871bf1282b8372d0deb55b893e8de7aecfccd9e57c7d5884493cf6cd9dedc7ccc9c87ee5a913a3e30389c2c3342c77f590ba3894f353165df64f7da592b7
-
Filesize
45KB
MD5268a8330254576a26d7fe52e41a6cf0e
SHA193c55a562058012280fd6e40ac8dc4b03c3cf2d4
SHA256dda306f0d6516255ff30dd1908c32578b024410e5e13df3dc1e9d21dc7b7d230
SHA5129a5f96e409b2c148ab940293148793f4c3c57bc2a32168d256d0fed9344b42f495ad464e97d5adbd2a191ec060d02a42833d58cfebe3e1fde53d098ef16478d7
-
Filesize
45KB
MD5bcbe43160564bdfbed8d8214fd6e778d
SHA182ffeaf84842808de9e5ddb458da34ac58158ba1
SHA256c5191b9e5d6a58321cc7e422f215b89eb77d0c6dee9b41f18f754593ec5cde2f
SHA51201b75b6dc0130951e7b73bdf89e35c1f1d9ba29d9f37ef178004666555785a8103026e8eff0b33f3529c8b1f18031ca734a4d0f97c6c678266344625bd45a9a1
-
Filesize
45KB
MD573e26be511280bb2472d0c3577fcdb3e
SHA1aa999afb2e9ff485390bc00b33fde9ff776c4fb6
SHA256b8f8307867c94b0679dfbdae747d000fc3c56306a920b72c8d7614bd3fe05b0a
SHA512795f8843caf01924850a05e1133fb59332ea9f2ff65083ba8cfb01e8f16adde21c82c58c582549179a100c45fbf57fbdfd7beaefef6d382cbd6b205e2bbb276f
-
Filesize
45KB
MD5a1d918a5f280485522e8f1d58b3658bf
SHA124b35435a49dbf8ac9183725840aa345f090ce88
SHA2567a81711bf0e786809da54cbdd59c2eb7aa3f696c3042796640c34cfddbab6ddc
SHA5124eda9da1f866ebf313bf9a155c49755772144d0bada33fb8166ab7ac215ed8fde31d459776bde26938d7326ea5fe4488ad5f1ba45e8e0c681a14b60e4e176b46