Analysis
-
max time kernel
93s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08/09/2024, 04:08
Static task
static1
Behavioral task
behavioral1
Sample
bc1c0bf29786dc75d6b4840c0301ab516144f4996faef080e9f3e3d583425a55.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
bc1c0bf29786dc75d6b4840c0301ab516144f4996faef080e9f3e3d583425a55.exe
Resource
win10v2004-20240802-en
General
-
Target
bc1c0bf29786dc75d6b4840c0301ab516144f4996faef080e9f3e3d583425a55.exe
-
Size
94KB
-
MD5
c78aded8944115be330e3360e575114c
-
SHA1
1907360c6921cf91a76762fdc23643e42fc5ac97
-
SHA256
bc1c0bf29786dc75d6b4840c0301ab516144f4996faef080e9f3e3d583425a55
-
SHA512
531d14d207da2a57da4ccb5efaf4b633749135bebdece54c60be2e6ff293b75f7a43d566da72b9e3063d67945a1dbe4cee5d019180fd4b1b601c06f8f7ba3bfc
-
SSDEEP
1536:KNHZBkgy+pyDBmntHc1ooEofGWHplURQDLRfRa9HprmRfRZ:KN5BkgjYDBmntHcCoEo+CgeDL5wkpv
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad bc1c0bf29786dc75d6b4840c0301ab516144f4996faef080e9f3e3d583425a55.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" bc1c0bf29786dc75d6b4840c0301ab516144f4996faef080e9f3e3d583425a55.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dddhpjof.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Dddhpjof.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dknpmdfc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Dknpmdfc.exe -
Executes dropped EXE 3 IoCs
pid Process 4656 Dddhpjof.exe 752 Dknpmdfc.exe 4832 Dmllipeg.exe -
Drops file in System32 directory 9 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Dddhpjof.exe bc1c0bf29786dc75d6b4840c0301ab516144f4996faef080e9f3e3d583425a55.exe File created C:\Windows\SysWOW64\Nokpao32.dll Dddhpjof.exe File opened for modification C:\Windows\SysWOW64\Dmllipeg.exe Dknpmdfc.exe File created C:\Windows\SysWOW64\Kngpec32.dll Dknpmdfc.exe File created C:\Windows\SysWOW64\Dddhpjof.exe bc1c0bf29786dc75d6b4840c0301ab516144f4996faef080e9f3e3d583425a55.exe File created C:\Windows\SysWOW64\Amjknl32.dll bc1c0bf29786dc75d6b4840c0301ab516144f4996faef080e9f3e3d583425a55.exe File created C:\Windows\SysWOW64\Dknpmdfc.exe Dddhpjof.exe File opened for modification C:\Windows\SysWOW64\Dknpmdfc.exe Dddhpjof.exe File created C:\Windows\SysWOW64\Dmllipeg.exe Dknpmdfc.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3880 4832 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bc1c0bf29786dc75d6b4840c0301ab516144f4996faef080e9f3e3d583425a55.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dddhpjof.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dknpmdfc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dmllipeg.exe -
Modifies registry class 12 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" bc1c0bf29786dc75d6b4840c0301ab516144f4996faef080e9f3e3d583425a55.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nokpao32.dll" Dddhpjof.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kngpec32.dll" Dknpmdfc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node bc1c0bf29786dc75d6b4840c0301ab516144f4996faef080e9f3e3d583425a55.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID bc1c0bf29786dc75d6b4840c0301ab516144f4996faef080e9f3e3d583425a55.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831} bc1c0bf29786dc75d6b4840c0301ab516144f4996faef080e9f3e3d583425a55.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Dddhpjof.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Dknpmdfc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Dknpmdfc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 bc1c0bf29786dc75d6b4840c0301ab516144f4996faef080e9f3e3d583425a55.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Amjknl32.dll" bc1c0bf29786dc75d6b4840c0301ab516144f4996faef080e9f3e3d583425a55.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Dddhpjof.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3328 wrote to memory of 4656 3328 bc1c0bf29786dc75d6b4840c0301ab516144f4996faef080e9f3e3d583425a55.exe 83 PID 3328 wrote to memory of 4656 3328 bc1c0bf29786dc75d6b4840c0301ab516144f4996faef080e9f3e3d583425a55.exe 83 PID 3328 wrote to memory of 4656 3328 bc1c0bf29786dc75d6b4840c0301ab516144f4996faef080e9f3e3d583425a55.exe 83 PID 4656 wrote to memory of 752 4656 Dddhpjof.exe 84 PID 4656 wrote to memory of 752 4656 Dddhpjof.exe 84 PID 4656 wrote to memory of 752 4656 Dddhpjof.exe 84 PID 752 wrote to memory of 4832 752 Dknpmdfc.exe 85 PID 752 wrote to memory of 4832 752 Dknpmdfc.exe 85 PID 752 wrote to memory of 4832 752 Dknpmdfc.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\bc1c0bf29786dc75d6b4840c0301ab516144f4996faef080e9f3e3d583425a55.exe"C:\Users\Admin\AppData\Local\Temp\bc1c0bf29786dc75d6b4840c0301ab516144f4996faef080e9f3e3d583425a55.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3328 -
C:\Windows\SysWOW64\Dddhpjof.exeC:\Windows\system32\Dddhpjof.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\Windows\SysWOW64\Dknpmdfc.exeC:\Windows\system32\Dknpmdfc.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Windows\SysWOW64\Dmllipeg.exeC:\Windows\system32\Dmllipeg.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4832 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4832 -s 4165⤵
- Program crash
PID:3880
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4832 -ip 48321⤵PID:4428
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
94KB
MD55eed2c83e7bc67abccb6b75f4ec51529
SHA186d72080c13a9e162f00748faed67e94ec1c46ab
SHA2568c3157449e60574edf11cc72d4637b253fefb451b440fa8e191b8ee12506a5b9
SHA5123ae9e1059aefdea46ccd707e4a9c07a24ec56f0679acc062e5fe4b692f382d438e1e90497e126a2a32ac468582e31e0dceecfa5ab06d43a11ac11fd31e74cbe3
-
Filesize
94KB
MD51d0c53d8babbb3f132928f3d9d41357e
SHA1e54ea83755d0659d94d839017bd916119b0e5963
SHA2567f43cde001c06fe35674ef899a4bfa2dc75b2a5b5bade622d83ef55c2fa4c0cd
SHA5125b5ffa8bb62c2d23bc3be04c23c211e3da0637a90d7bbba33c9f67f96227ce3e89a721d7fa97be999f88760d4f4ebdcc9c4e747918ef2b09ca9294df155f9036
-
Filesize
94KB
MD5117bba748103438ccaa28ab0e1d292f1
SHA1d2e2ede024cc3bd93e9185a25c194f7baa1d8ada
SHA25699c84b0b29ab068b29e1806b6d1c7b5bce57bba3cb0c1fa72cae705d56d1640e
SHA512846975d5e0bf5dc7127bceeda63e72f3fa634cc5acec70197b4e43b745fb4d366e88c6d5918e438851927f37a5a690313107f46ec3847013087083dfaf75b5f4