Analysis

  • max time kernel
    92s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/09/2024, 22:34

General

  • Target

    2b9cb01b69b3972d69a545523f3b2820N.exe

  • Size

    84KB

  • MD5

    2b9cb01b69b3972d69a545523f3b2820

  • SHA1

    161d7dc7f4f4a0cfdb7ac6ad92e0b57f232878fa

  • SHA256

    07252be6bca959e0e804d398a956341c62b3bec82726a34788ea6b0e13fe47d2

  • SHA512

    6682a55ff303fc84b54f066a5dbd3e31193db1ccc2b973d4ac61896eccb1d245c656ac0f7c04e4dcf9e4b4b108964f9709aee8ceff1a2d4d752ecf1d6c560087

  • SSDEEP

    1536:zXVOxu5G3Ntjmxuw+pH8ANZLvfPDyH6n8dEelLYR7xeGSmUmmmmmmmmmmmmmmdGZ:fIdVU+p/3PDyH6n8djlLYR7xr3

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 30 IoCs
  • Executes dropped EXE 15 IoCs
  • Drops file in System32 directory 45 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 16 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 48 IoCs
  • Suspicious use of WriteProcessMemory 45 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2b9cb01b69b3972d69a545523f3b2820N.exe
    "C:\Users\Admin\AppData\Local\Temp\2b9cb01b69b3972d69a545523f3b2820N.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2616
    • C:\Windows\SysWOW64\Cmqmma32.exe
      C:\Windows\system32\Cmqmma32.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:1108
      • C:\Windows\SysWOW64\Ddjejl32.exe
        C:\Windows\system32\Ddjejl32.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2740
        • C:\Windows\SysWOW64\Djdmffnn.exe
          C:\Windows\system32\Djdmffnn.exe
          4⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:4812
          • C:\Windows\SysWOW64\Dejacond.exe
            C:\Windows\system32\Dejacond.exe
            5⤵
            • Adds autorun key to be loaded by Explorer.exe on startup
            • Executes dropped EXE
            • Drops file in System32 directory
            • System Location Discovery: System Language Discovery
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:4888
            • C:\Windows\SysWOW64\Dfknkg32.exe
              C:\Windows\system32\Dfknkg32.exe
              6⤵
              • Adds autorun key to be loaded by Explorer.exe on startup
              • Executes dropped EXE
              • Drops file in System32 directory
              • System Location Discovery: System Language Discovery
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:3052
              • C:\Windows\SysWOW64\Dobfld32.exe
                C:\Windows\system32\Dobfld32.exe
                7⤵
                • Adds autorun key to be loaded by Explorer.exe on startup
                • Executes dropped EXE
                • Drops file in System32 directory
                • System Location Discovery: System Language Discovery
                • Modifies registry class
                • Suspicious use of WriteProcessMemory
                PID:4296
                • C:\Windows\SysWOW64\Ddonekbl.exe
                  C:\Windows\system32\Ddonekbl.exe
                  8⤵
                  • Adds autorun key to be loaded by Explorer.exe on startup
                  • Executes dropped EXE
                  • Drops file in System32 directory
                  • System Location Discovery: System Language Discovery
                  • Modifies registry class
                  • Suspicious use of WriteProcessMemory
                  PID:1240
                  • C:\Windows\SysWOW64\Dfnjafap.exe
                    C:\Windows\system32\Dfnjafap.exe
                    9⤵
                    • Adds autorun key to be loaded by Explorer.exe on startup
                    • Executes dropped EXE
                    • Drops file in System32 directory
                    • System Location Discovery: System Language Discovery
                    • Modifies registry class
                    • Suspicious use of WriteProcessMemory
                    PID:4956
                    • C:\Windows\SysWOW64\Dodbbdbb.exe
                      C:\Windows\system32\Dodbbdbb.exe
                      10⤵
                      • Adds autorun key to be loaded by Explorer.exe on startup
                      • Executes dropped EXE
                      • Drops file in System32 directory
                      • System Location Discovery: System Language Discovery
                      • Modifies registry class
                      • Suspicious use of WriteProcessMemory
                      PID:4040
                      • C:\Windows\SysWOW64\Deokon32.exe
                        C:\Windows\system32\Deokon32.exe
                        11⤵
                        • Adds autorun key to be loaded by Explorer.exe on startup
                        • Executes dropped EXE
                        • Drops file in System32 directory
                        • System Location Discovery: System Language Discovery
                        • Modifies registry class
                        • Suspicious use of WriteProcessMemory
                        PID:2620
                        • C:\Windows\SysWOW64\Dfpgffpm.exe
                          C:\Windows\system32\Dfpgffpm.exe
                          12⤵
                          • Adds autorun key to be loaded by Explorer.exe on startup
                          • Executes dropped EXE
                          • Drops file in System32 directory
                          • System Location Discovery: System Language Discovery
                          • Modifies registry class
                          • Suspicious use of WriteProcessMemory
                          PID:5104
                          • C:\Windows\SysWOW64\Dogogcpo.exe
                            C:\Windows\system32\Dogogcpo.exe
                            13⤵
                            • Adds autorun key to be loaded by Explorer.exe on startup
                            • Executes dropped EXE
                            • Drops file in System32 directory
                            • System Location Discovery: System Language Discovery
                            • Modifies registry class
                            • Suspicious use of WriteProcessMemory
                            PID:4584
                            • C:\Windows\SysWOW64\Daekdooc.exe
                              C:\Windows\system32\Daekdooc.exe
                              14⤵
                              • Adds autorun key to be loaded by Explorer.exe on startup
                              • Executes dropped EXE
                              • Drops file in System32 directory
                              • System Location Discovery: System Language Discovery
                              • Modifies registry class
                              • Suspicious use of WriteProcessMemory
                              PID:1796
                              • C:\Windows\SysWOW64\Dgbdlf32.exe
                                C:\Windows\system32\Dgbdlf32.exe
                                15⤵
                                • Adds autorun key to be loaded by Explorer.exe on startup
                                • Executes dropped EXE
                                • Drops file in System32 directory
                                • System Location Discovery: System Language Discovery
                                • Modifies registry class
                                • Suspicious use of WriteProcessMemory
                                PID:800
                                • C:\Windows\SysWOW64\Dmllipeg.exe
                                  C:\Windows\system32\Dmllipeg.exe
                                  16⤵
                                  • Executes dropped EXE
                                  • System Location Discovery: System Language Discovery
                                  PID:4964
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -u -p 4964 -s 228
                                    17⤵
                                    • Program crash
                                    PID:5072
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4964 -ip 4964
    1⤵
      PID:5048

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\SysWOW64\Cmqmma32.exe

      Filesize

      84KB

      MD5

      71ce3886f4d4e6a9da32cf990799e9dc

      SHA1

      7e68115f115e9661cf602962cf29ba174fa61ef4

      SHA256

      8cb341c53fdedb60b052089e54f8ef8be39847eba2f5e077ddf60cac8236b41b

      SHA512

      4424aec84c4a070b00f9cd74f4c278431ab0ffc615ea6ae26dd3a3e0537467f49ad2397917b051c70ccb130f6d6ecbad4a3e7fb994bc25685f0d7bb76e20f879

    • C:\Windows\SysWOW64\Daekdooc.exe

      Filesize

      84KB

      MD5

      667198e0d5b6487074776c28fbef9d94

      SHA1

      d43ba5e961fd51b68b5e33467da7ac25e1140e62

      SHA256

      80eca749e481a2921bef7c29d0a1272251e510fe82b3873d66e0ffdff0f01954

      SHA512

      21de24fec849577399567a06a5024378a4f9be774dcd56646266fbe3e76262bc5796b8230430f6314b4bfbdd3beccae064a16d1e1e18dcc0e2e62b44a2d43663

    • C:\Windows\SysWOW64\Ddjejl32.exe

      Filesize

      84KB

      MD5

      d6583f33f04ed3cf849812d6da89aac9

      SHA1

      03ec834b2630b256d82d047b8fbd79854d1115a2

      SHA256

      500d8979da0bf0055699ee31f71bec38733dd42af3e59b1d88b961a2b4953095

      SHA512

      68b17e195107420d5845f66d2ab64c4a2989af512eadb5ff7e2516a8acdcc489e21261d82e149fef297c33d064e28ddfaee9b8a76927e74e9d1e30db8d27e055

    • C:\Windows\SysWOW64\Ddonekbl.exe

      Filesize

      84KB

      MD5

      5fb13f4edbeb34f3bc955445706c0153

      SHA1

      333a70f35138268feabcb88cf0e74ec09d430da3

      SHA256

      34b3c50356f7a097a9d41963d06f9933a719adc57f1bc74c21387c874e4fedfb

      SHA512

      c4ca1ebb0412680d04a12cde4b6c282da4faaa0a517b2eca75854dc0f2b30836c14aee34b9edc32b0d63b46ae3fd876dbf74104041069dfd7fc30ea3b3c2ad58

    • C:\Windows\SysWOW64\Dejacond.exe

      Filesize

      84KB

      MD5

      23f9521241f9fb266620fbcf96640e4a

      SHA1

      efaabefdb29ff1d90d9bc0bd3f30b1f4af7538a2

      SHA256

      e4b57f8db9f2d3e3bbabb80717fd910d774cb2e4131ed453a00e84e50407ca3b

      SHA512

      606ca1ed613b5528010e9c3a306053ad5f8cbd4a58884bb05812c2f684b4bbd0fca742b989b9ae35f29ea4853a4ee7835fb4a250793c85a2ce12042b5c7eb91d

    • C:\Windows\SysWOW64\Deokon32.exe

      Filesize

      84KB

      MD5

      7d982c0c52557d57d2e4cfa3504b3330

      SHA1

      cb07a606ce566222076717d439edb4103352ca72

      SHA256

      759196cffac6e453879a5ca86c2ebc34acf2ebbecfa836813000a12813c14090

      SHA512

      7817adeb6c7283c8c8b4b557111869140f7073bfa23c2c5b059f1f6358a3087ea518054a654ef7e09405b6c22369f491420d5a54997202a21592b923d7e46c6a

    • C:\Windows\SysWOW64\Dfknkg32.exe

      Filesize

      84KB

      MD5

      e5667a6a217038af517228c95c845b59

      SHA1

      7c3b42bb83ee710036b9e54c0d76785b74b7743d

      SHA256

      d3141b3b954381621e7d4bd52123934d3aac1a49e1a91d0eb652930271a6a215

      SHA512

      998843b2056d5555e0b51d6ed3047c964cbc08bb306fc157437b26cf7eb70db970545880056b3239450aada3f2246a4ff71f79caee2f2b7ab1245fea103b27d8

    • C:\Windows\SysWOW64\Dfnjafap.exe

      Filesize

      84KB

      MD5

      988f9824af8041efadfa01473319690b

      SHA1

      c49c323f3f50b109323f1281fd768a5fe237a660

      SHA256

      8ab0092a2980c6fd13218ff389b63fbeba2614997f022e27ea8ecc6d778a3494

      SHA512

      4081d82061844944dcd3b3e3612b95161b535165aa7c11d2d5892b6c2ff77e8ebcf33befc8a4b9effb9f14a84bbe71680ef3ec266d482a34acad774f3668fd43

    • C:\Windows\SysWOW64\Dfpgffpm.exe

      Filesize

      84KB

      MD5

      1b791bf3f6c48d415bc0a1d91b31027a

      SHA1

      ceb66fbcdc10167c4fc25bbd2416e2ef34d43e1e

      SHA256

      5d7a16fb23d95a1d8908f88b35c5c2ffa6ba975c9fa9d268743cab468d39b093

      SHA512

      cd22b2f075b730674311a5b32099bb4e2bebf0aa0d9d59ad5f7917e8c16e979a888bc2ed0394a2c78984dc48925dab83aaa5695fc570f5a83df6097756fe0d27

    • C:\Windows\SysWOW64\Dgbdlf32.exe

      Filesize

      84KB

      MD5

      57a0080452604b3b768c3e864f91c8ff

      SHA1

      8519145b29f929d87eff094b4d176e5504f3ed94

      SHA256

      7decc3993f8283375065b983cf0021ff881dcff8ab3f25b89da0df8a177d8a76

      SHA512

      cadfd38f61f58f62a0b14087eb837950f5a242161d09cfea2171c8fd14465041de3fa5ce6bc28fe6466ae2883aa6a1e3fffccafd8bd602ad98a98eaa26416362

    • C:\Windows\SysWOW64\Djdmffnn.exe

      Filesize

      84KB

      MD5

      e0a9f43ae8fff8d7ec8cfff4b0adc257

      SHA1

      8677817fdbe5d54aa91fe035bcf209ea8b53209d

      SHA256

      bb3a8d5e4fa32e52b89176e529d04c30f67a253fc2d048f13cca516921edc987

      SHA512

      f335654664fffcd9914cfc4a99d2ad58920e29cff51772e4bed9e695653f62efafae63165c4f33495a00cc12ee286909de8af624c91aef69d956039fd93347bc

    • C:\Windows\SysWOW64\Dmllipeg.exe

      Filesize

      84KB

      MD5

      0c8def88b36e431c0c84ee1e0bc8f8b4

      SHA1

      783b7e1a34e70a9d0457fbcbf9f855a8ded5641f

      SHA256

      f64d3552a95103f052d849277e36e83d459dc855f4ee060a986b9e5ee056a69e

      SHA512

      a943916734a6a872622b580c03c083427c5a756211f2df8fc5b86eb8d415b0955ae979c3dd2824bc2d6b902814ddd7ac47705980a2c702e3624de421dcda4045

    • C:\Windows\SysWOW64\Dobfld32.exe

      Filesize

      84KB

      MD5

      aea09a9dd464af7c179cf37c033e75b8

      SHA1

      ea14f5ea1cc79502b4d90696fcc02c10274d235d

      SHA256

      6d440a0cc6e62c6d52f9d0305ad67ed267df3691d6ea28fab9768849991659ba

      SHA512

      8551bde0ce6bee8399637973a8df5d06f35018cc6e7637c03bafa85187cc9783471e5498fd21378b288b863394315d0b4cef7f544d33b7ee30832e92657d74ec

    • C:\Windows\SysWOW64\Dodbbdbb.exe

      Filesize

      84KB

      MD5

      c1a989f6eba4296de27a99d047d108de

      SHA1

      d53c27fe78f3b6c5d504319f314d9960e14bd765

      SHA256

      8b3025a0a39560e7dc32d466c55393f34ff0d3872d9f6e6b6a297448077da7b8

      SHA512

      6c9ab28efd5640504356c42fe8cc46391e2a8ca330a9e319c3d56778f4b65a5a019f2c33fc9a6186e53cb097aa4d2a3324ad95ef569ebba04b7e6b42b83794bf

    • C:\Windows\SysWOW64\Dogogcpo.exe

      Filesize

      84KB

      MD5

      205d10c50d5e3b8412eaeae33e07190a

      SHA1

      3a1341720bab7e938ecff3feaad039adb2b14734

      SHA256

      fca0891664548237317d3a26b267dd766c5cf40319b1e3bc8693e57cb1d0dc9f

      SHA512

      8c6ca5ed7a8a5f1fcd5e9ddb2db21c9d589794171d2ce51c88601f658f9a8fdf8cc307325c497a33fc511d3ba93cd7e6ce9c511c5b068e558401d480766ceeed

    • memory/800-111-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/800-124-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/1108-147-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/1108-7-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/1240-55-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/1240-135-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/1796-126-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/1796-103-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/2616-0-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/2616-149-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/2620-130-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/2620-79-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/2740-15-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/2740-145-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/3052-39-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/3052-137-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/4040-134-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/4040-71-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/4296-47-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/4296-139-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/4584-128-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/4584-96-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/4812-23-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/4812-143-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/4888-141-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/4888-31-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/4956-132-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/4956-63-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/4964-122-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/4964-119-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/5104-129-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/5104-88-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB