Analysis
-
max time kernel
95s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05/09/2024, 17:23
Static task
static1
Behavioral task
behavioral1
Sample
6408983f42434783f2207d9be476ae80N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
6408983f42434783f2207d9be476ae80N.exe
Resource
win10v2004-20240802-en
General
-
Target
6408983f42434783f2207d9be476ae80N.exe
-
Size
479KB
-
MD5
6408983f42434783f2207d9be476ae80
-
SHA1
4b580e39413bfa3b151e5a994e7069d5afc9446a
-
SHA256
0917eb0aa14fad67ebe544724c5b92d198a7b8b4a1cc902584e2b1d6d71d7282
-
SHA512
af925de2ea593590ca1526784be26c465b6193ba4e51af2bc4c7c3c0d65a6f75f57477265016faec11a0fa3091ef6cd432ec86a324e063de94e86b3f890f1184
-
SSDEEP
6144:ax7ujcGIRJ6EQnT2leTLgNPx33fpu2leTLg:ahuSRJ6EQ6Q2drQ
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" 6408983f42434783f2207d9be476ae80N.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dmjocp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dmjocp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 6408983f42434783f2207d9be476ae80N.exe -
Executes dropped EXE 2 IoCs
pid Process 1508 Dmjocp32.exe 980 Dmllipeg.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\Dmjocp32.exe 6408983f42434783f2207d9be476ae80N.exe File opened for modification C:\Windows\SysWOW64\Dmjocp32.exe 6408983f42434783f2207d9be476ae80N.exe File created C:\Windows\SysWOW64\Bobiobnp.dll 6408983f42434783f2207d9be476ae80N.exe File created C:\Windows\SysWOW64\Dmllipeg.exe Dmjocp32.exe File opened for modification C:\Windows\SysWOW64\Dmllipeg.exe Dmjocp32.exe File created C:\Windows\SysWOW64\Kngpec32.dll Dmjocp32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3016 980 WerFault.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6408983f42434783f2207d9be476ae80N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dmjocp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dmllipeg.exe -
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 6408983f42434783f2207d9be476ae80N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID 6408983f42434783f2207d9be476ae80N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kngpec32.dll" Dmjocp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dmjocp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node 6408983f42434783f2207d9be476ae80N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} 6408983f42434783f2207d9be476ae80N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bobiobnp.dll" 6408983f42434783f2207d9be476ae80N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" 6408983f42434783f2207d9be476ae80N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dmjocp32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3404 wrote to memory of 1508 3404 6408983f42434783f2207d9be476ae80N.exe 85 PID 3404 wrote to memory of 1508 3404 6408983f42434783f2207d9be476ae80N.exe 85 PID 3404 wrote to memory of 1508 3404 6408983f42434783f2207d9be476ae80N.exe 85 PID 1508 wrote to memory of 980 1508 Dmjocp32.exe 86 PID 1508 wrote to memory of 980 1508 Dmjocp32.exe 86 PID 1508 wrote to memory of 980 1508 Dmjocp32.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\6408983f42434783f2207d9be476ae80N.exe"C:\Users\Admin\AppData\Local\Temp\6408983f42434783f2207d9be476ae80N.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3404 -
C:\Windows\SysWOW64\Dmjocp32.exeC:\Windows\system32\Dmjocp32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Windows\SysWOW64\Dmllipeg.exeC:\Windows\system32\Dmllipeg.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:980 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 980 -s 4084⤵
- Program crash
PID:3016
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 980 -ip 9801⤵PID:3656
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
479KB
MD537a0cd15e754fcf594948ea3661f6a65
SHA16d5202d79d953077b26541cc957e9601be805fe0
SHA2565ea83183c2194f8a0795c4f674623a6d6260a1019fc2108f114b731bbf977892
SHA5122b683e10b0efa5f50e8810f135e7896e27326700d22e3f0af0c5f25515ef2ad60e91856ef47d8d15f6f4eec5b08c66106bc9b198b176649e800a3f1d860bf06e
-
Filesize
479KB
MD519b15c5808204ca99da31ec4a9137f76
SHA1ad07e35db1ecefc289e07f90370a8152bb2c16b3
SHA25614eb4d78a40034cea811faebeea23bf2fa2d1699631920c090957953a292f6cb
SHA512584cdc3529db3cd6dc17c3324c7ca959bf72c5ef0a4d2c207c06585ef6fc27c2c95a8472aa35bfd7b404f333ebe19fad4cfe2df829f235cd97fe99167b4b0bd4