Analysis

  • max time kernel
    95s
  • max time network
    102s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/09/2024, 17:23

General

  • Target

    6408983f42434783f2207d9be476ae80N.exe

  • Size

    479KB

  • MD5

    6408983f42434783f2207d9be476ae80

  • SHA1

    4b580e39413bfa3b151e5a994e7069d5afc9446a

  • SHA256

    0917eb0aa14fad67ebe544724c5b92d198a7b8b4a1cc902584e2b1d6d71d7282

  • SHA512

    af925de2ea593590ca1526784be26c465b6193ba4e51af2bc4c7c3c0d65a6f75f57477265016faec11a0fa3091ef6cd432ec86a324e063de94e86b3f890f1184

  • SSDEEP

    6144:ax7ujcGIRJ6EQnT2leTLgNPx33fpu2leTLg:ahuSRJ6EQ6Q2drQ

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 4 IoCs
  • Executes dropped EXE 2 IoCs
  • Drops file in System32 directory 6 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6408983f42434783f2207d9be476ae80N.exe
    "C:\Users\Admin\AppData\Local\Temp\6408983f42434783f2207d9be476ae80N.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3404
    • C:\Windows\SysWOW64\Dmjocp32.exe
      C:\Windows\system32\Dmjocp32.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:1508
      • C:\Windows\SysWOW64\Dmllipeg.exe
        C:\Windows\system32\Dmllipeg.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:980
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 980 -s 408
          4⤵
          • Program crash
          PID:3016
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 980 -ip 980
    1⤵
      PID:3656

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Windows\SysWOW64\Dmjocp32.exe

            Filesize

            479KB

            MD5

            37a0cd15e754fcf594948ea3661f6a65

            SHA1

            6d5202d79d953077b26541cc957e9601be805fe0

            SHA256

            5ea83183c2194f8a0795c4f674623a6d6260a1019fc2108f114b731bbf977892

            SHA512

            2b683e10b0efa5f50e8810f135e7896e27326700d22e3f0af0c5f25515ef2ad60e91856ef47d8d15f6f4eec5b08c66106bc9b198b176649e800a3f1d860bf06e

          • C:\Windows\SysWOW64\Dmllipeg.exe

            Filesize

            479KB

            MD5

            19b15c5808204ca99da31ec4a9137f76

            SHA1

            ad07e35db1ecefc289e07f90370a8152bb2c16b3

            SHA256

            14eb4d78a40034cea811faebeea23bf2fa2d1699631920c090957953a292f6cb

            SHA512

            584cdc3529db3cd6dc17c3324c7ca959bf72c5ef0a4d2c207c06585ef6fc27c2c95a8472aa35bfd7b404f333ebe19fad4cfe2df829f235cd97fe99167b4b0bd4

          • memory/980-16-0x0000000000400000-0x0000000000477000-memory.dmp

            Filesize

            476KB

          • memory/980-20-0x0000000000400000-0x0000000000477000-memory.dmp

            Filesize

            476KB

          • memory/1508-8-0x0000000000400000-0x0000000000477000-memory.dmp

            Filesize

            476KB

          • memory/1508-21-0x0000000000400000-0x0000000000477000-memory.dmp

            Filesize

            476KB

          • memory/3404-0-0x0000000000400000-0x0000000000477000-memory.dmp

            Filesize

            476KB

          • memory/3404-1-0x0000000000432000-0x0000000000433000-memory.dmp

            Filesize

            4KB

          • memory/3404-23-0x0000000000400000-0x0000000000477000-memory.dmp

            Filesize

            476KB