Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/08/2024, 03:52
Static task
static1
Behavioral task
behavioral1
Sample
dc3f97d7fa1854cc0901b375e1421b4069af175c98aa98beb02aa76fe10e30f7.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
dc3f97d7fa1854cc0901b375e1421b4069af175c98aa98beb02aa76fe10e30f7.exe
Resource
win10v2004-20240802-en
General
-
Target
dc3f97d7fa1854cc0901b375e1421b4069af175c98aa98beb02aa76fe10e30f7.exe
-
Size
96KB
-
MD5
25d8f5841b03b76e44d8bd61137d0d09
-
SHA1
bca20870db65eb4af01ad018d98bb58e7116d662
-
SHA256
dc3f97d7fa1854cc0901b375e1421b4069af175c98aa98beb02aa76fe10e30f7
-
SHA512
8fb6072af27293f32e03f37069373dadc717c89f45f3f25e704fbcfed0163ad3cd5fd9efbb68040e3fa730b5841288eb13bfa6aee6c6f58fd62bf6f9a8ec7e04
-
SSDEEP
1536:ax7A0KIqz0K8uZSXoHV/4fXQc2Lk1vPXuhiTMuZXGTIVefVDkryyAyqX:amF06gXQ/4fAVavPXuhuXGQmVDeCyqX
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Deagdn32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dgbdlf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dgbdlf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad dc3f97d7fa1854cc0901b375e1421b4069af175c98aa98beb02aa76fe10e30f7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" dc3f97d7fa1854cc0901b375e1421b4069af175c98aa98beb02aa76fe10e30f7.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dogogcpo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dogogcpo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Deagdn32.exe -
Executes dropped EXE 4 IoCs
pid Process 1756 Dogogcpo.exe 3024 Deagdn32.exe 3732 Dgbdlf32.exe 1900 Dmllipeg.exe -
Drops file in System32 directory 12 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Dogogcpo.exe dc3f97d7fa1854cc0901b375e1421b4069af175c98aa98beb02aa76fe10e30f7.exe File created C:\Windows\SysWOW64\Kahdohfm.dll Dogogcpo.exe File created C:\Windows\SysWOW64\Gfghpl32.dll Deagdn32.exe File created C:\Windows\SysWOW64\Dmllipeg.exe Dgbdlf32.exe File opened for modification C:\Windows\SysWOW64\Dmllipeg.exe Dgbdlf32.exe File created C:\Windows\SysWOW64\Kngpec32.dll Dgbdlf32.exe File created C:\Windows\SysWOW64\Dogogcpo.exe dc3f97d7fa1854cc0901b375e1421b4069af175c98aa98beb02aa76fe10e30f7.exe File created C:\Windows\SysWOW64\Lbabpnmn.dll dc3f97d7fa1854cc0901b375e1421b4069af175c98aa98beb02aa76fe10e30f7.exe File created C:\Windows\SysWOW64\Deagdn32.exe Dogogcpo.exe File opened for modification C:\Windows\SysWOW64\Deagdn32.exe Dogogcpo.exe File created C:\Windows\SysWOW64\Dgbdlf32.exe Deagdn32.exe File opened for modification C:\Windows\SysWOW64\Dgbdlf32.exe Deagdn32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2156 1900 WerFault.exe 87 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dc3f97d7fa1854cc0901b375e1421b4069af175c98aa98beb02aa76fe10e30f7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dogogcpo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Deagdn32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dgbdlf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dmllipeg.exe -
Modifies registry class 15 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node dc3f97d7fa1854cc0901b375e1421b4069af175c98aa98beb02aa76fe10e30f7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Deagdn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kahdohfm.dll" Dogogcpo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dogogcpo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Deagdn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 dc3f97d7fa1854cc0901b375e1421b4069af175c98aa98beb02aa76fe10e30f7.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID dc3f97d7fa1854cc0901b375e1421b4069af175c98aa98beb02aa76fe10e30f7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" dc3f97d7fa1854cc0901b375e1421b4069af175c98aa98beb02aa76fe10e30f7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gfghpl32.dll" Deagdn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dgbdlf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kngpec32.dll" Dgbdlf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dgbdlf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} dc3f97d7fa1854cc0901b375e1421b4069af175c98aa98beb02aa76fe10e30f7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lbabpnmn.dll" dc3f97d7fa1854cc0901b375e1421b4069af175c98aa98beb02aa76fe10e30f7.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dogogcpo.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2532 wrote to memory of 1756 2532 dc3f97d7fa1854cc0901b375e1421b4069af175c98aa98beb02aa76fe10e30f7.exe 84 PID 2532 wrote to memory of 1756 2532 dc3f97d7fa1854cc0901b375e1421b4069af175c98aa98beb02aa76fe10e30f7.exe 84 PID 2532 wrote to memory of 1756 2532 dc3f97d7fa1854cc0901b375e1421b4069af175c98aa98beb02aa76fe10e30f7.exe 84 PID 1756 wrote to memory of 3024 1756 Dogogcpo.exe 85 PID 1756 wrote to memory of 3024 1756 Dogogcpo.exe 85 PID 1756 wrote to memory of 3024 1756 Dogogcpo.exe 85 PID 3024 wrote to memory of 3732 3024 Deagdn32.exe 86 PID 3024 wrote to memory of 3732 3024 Deagdn32.exe 86 PID 3024 wrote to memory of 3732 3024 Deagdn32.exe 86 PID 3732 wrote to memory of 1900 3732 Dgbdlf32.exe 87 PID 3732 wrote to memory of 1900 3732 Dgbdlf32.exe 87 PID 3732 wrote to memory of 1900 3732 Dgbdlf32.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\dc3f97d7fa1854cc0901b375e1421b4069af175c98aa98beb02aa76fe10e30f7.exe"C:\Users\Admin\AppData\Local\Temp\dc3f97d7fa1854cc0901b375e1421b4069af175c98aa98beb02aa76fe10e30f7.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Windows\SysWOW64\Dogogcpo.exeC:\Windows\system32\Dogogcpo.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Windows\SysWOW64\Deagdn32.exeC:\Windows\system32\Deagdn32.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\SysWOW64\Dgbdlf32.exeC:\Windows\system32\Dgbdlf32.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3732 -
C:\Windows\SysWOW64\Dmllipeg.exeC:\Windows\system32\Dmllipeg.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1900 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1900 -s 3966⤵
- Program crash
PID:2156
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 1900 -ip 19001⤵PID:4828
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5b2f209513287c8b73ed83fb6777ff44f
SHA12221e7f4a54ebba05d4b384bd73794af49ccfb9f
SHA25608229bb1b8677148f9e57f6f73383663ba291782368026c887e553b976bdc00b
SHA5126e5aed213cf5a66da0597115707d0b3235725b361ab139ac6f4beb4862cfe8dbc35f3fc3eaed2aadc8632eea8026e3e0690df6ad1d1db2bb071ef8e6fce4d079
-
Filesize
96KB
MD50ceb53fe0adc4d9b3ca75fbb8a2253d9
SHA1d1be0d93033b8f452502a347eea2048c56fe57af
SHA2569737eb7d77740fe6c58841d8ed319427f73c6eaadebf7187c02d45cb4d5e1dcc
SHA5125482975e66110781bd4543a238fe140311c6f4d558caeec8e6a201635eba4366750857b3a0794ddcc260569c84e29f6077dc9c97926208cf5ea393d446ad91fd
-
Filesize
96KB
MD5910a504d614a3d2029e5ab3d0065d1be
SHA1e6b02b4b595696107b6d06d5f35fa5e45816029a
SHA25653e03e64c4556f224881bf0d17c76afbfdc12b7508cd60705eaf061885a3f943
SHA5129a3b1578ed88629a96fdd234e806ad7cc67f51d8b20859a391e869381d6561cc5e5c4bb0c10712c9bfb724249f4db05027d3432a4d9ae5da87291f7501d40add
-
Filesize
96KB
MD545988c093e0ecd4b8b9a0b7d3be1f96e
SHA18eb757577625ccd4549d481b91f37176b2506de2
SHA256618245dc58c87c434dab75f1c4f82c24e83dd0e3dfc58f87e02f2a7e17039069
SHA512aac600ae63e8f24c057f251c4b67cee4931fd06b115b52b301b6c07d5e7425a737d70480c7618ccac6e51ae2a057815112c53f15b8c739d640260f6063fb7b8b