Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08/09/2024, 08:49
Static task
static1
Behavioral task
behavioral1
Sample
ba9487b1ba59d1767b7adcebe1f301f0N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ba9487b1ba59d1767b7adcebe1f301f0N.exe
Resource
win10v2004-20240802-en
General
-
Target
ba9487b1ba59d1767b7adcebe1f301f0N.exe
-
Size
80KB
-
MD5
ba9487b1ba59d1767b7adcebe1f301f0
-
SHA1
6b1fbb460b510c39ac2da2c6c4726b5d0bc4234d
-
SHA256
de245e00c9c24732db9fd79fabcb40a8032e8b4675ffc2f57d696cd9e879ad65
-
SHA512
6f3cd3c96ebd74e126ee93f719228bdf038f0be8ada8d5521f779fce7b5c85f373aceaf6eb125afdb6293f1d0cec6fe93d6d16f968bc7a3bfcfe1835ba292496
-
SSDEEP
1536:2lK2ptF/1Zd7l+xmEP92LtR5wfi+TjRC/6i:2T91gxbGL5wf1TjYL
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 14 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Daconoae.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Daconoae.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ddakjkqi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dogogcpo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Deagdn32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dgbdlf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dgbdlf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Deagdn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" ba9487b1ba59d1767b7adcebe1f301f0N.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ddakjkqi.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dkkcge32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dkkcge32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad ba9487b1ba59d1767b7adcebe1f301f0N.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dogogcpo.exe -
Executes dropped EXE 7 IoCs
pid Process 212 Daconoae.exe 3100 Ddakjkqi.exe 3588 Dkkcge32.exe 2056 Dogogcpo.exe 1812 Deagdn32.exe 3324 Dgbdlf32.exe 4724 Dmllipeg.exe -
Drops file in System32 directory 21 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Daconoae.exe ba9487b1ba59d1767b7adcebe1f301f0N.exe File opened for modification C:\Windows\SysWOW64\Ddakjkqi.exe Daconoae.exe File created C:\Windows\SysWOW64\Dogogcpo.exe Dkkcge32.exe File created C:\Windows\SysWOW64\Kahdohfm.dll Dogogcpo.exe File opened for modification C:\Windows\SysWOW64\Dgbdlf32.exe Deagdn32.exe File created C:\Windows\SysWOW64\Dmllipeg.exe Dgbdlf32.exe File created C:\Windows\SysWOW64\Daconoae.exe ba9487b1ba59d1767b7adcebe1f301f0N.exe File created C:\Windows\SysWOW64\Oammoc32.dll ba9487b1ba59d1767b7adcebe1f301f0N.exe File created C:\Windows\SysWOW64\Gifhkeje.dll Daconoae.exe File created C:\Windows\SysWOW64\Jcbdhp32.dll Ddakjkqi.exe File opened for modification C:\Windows\SysWOW64\Dogogcpo.exe Dkkcge32.exe File opened for modification C:\Windows\SysWOW64\Dmllipeg.exe Dgbdlf32.exe File created C:\Windows\SysWOW64\Kngpec32.dll Dgbdlf32.exe File created C:\Windows\SysWOW64\Ddakjkqi.exe Daconoae.exe File opened for modification C:\Windows\SysWOW64\Dkkcge32.exe Ddakjkqi.exe File opened for modification C:\Windows\SysWOW64\Deagdn32.exe Dogogcpo.exe File created C:\Windows\SysWOW64\Dkkcge32.exe Ddakjkqi.exe File created C:\Windows\SysWOW64\Lbabpnmn.dll Dkkcge32.exe File created C:\Windows\SysWOW64\Deagdn32.exe Dogogcpo.exe File created C:\Windows\SysWOW64\Dgbdlf32.exe Deagdn32.exe File created C:\Windows\SysWOW64\Gfghpl32.dll Deagdn32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2884 4724 WerFault.exe 89 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ddakjkqi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dkkcge32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dogogcpo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Deagdn32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dgbdlf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dmllipeg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ba9487b1ba59d1767b7adcebe1f301f0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Daconoae.exe -
Modifies registry class 24 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Daconoae.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ddakjkqi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Deagdn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kngpec32.dll" Dgbdlf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID ba9487b1ba59d1767b7adcebe1f301f0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Daconoae.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dogogcpo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jcbdhp32.dll" Ddakjkqi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dkkcge32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oammoc32.dll" ba9487b1ba59d1767b7adcebe1f301f0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" ba9487b1ba59d1767b7adcebe1f301f0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gifhkeje.dll" Daconoae.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lbabpnmn.dll" Dkkcge32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kahdohfm.dll" Dogogcpo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dogogcpo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 ba9487b1ba59d1767b7adcebe1f301f0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node ba9487b1ba59d1767b7adcebe1f301f0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dgbdlf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gfghpl32.dll" Deagdn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dgbdlf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dkkcge32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Deagdn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} ba9487b1ba59d1767b7adcebe1f301f0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ddakjkqi.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2448 wrote to memory of 212 2448 ba9487b1ba59d1767b7adcebe1f301f0N.exe 83 PID 2448 wrote to memory of 212 2448 ba9487b1ba59d1767b7adcebe1f301f0N.exe 83 PID 2448 wrote to memory of 212 2448 ba9487b1ba59d1767b7adcebe1f301f0N.exe 83 PID 212 wrote to memory of 3100 212 Daconoae.exe 84 PID 212 wrote to memory of 3100 212 Daconoae.exe 84 PID 212 wrote to memory of 3100 212 Daconoae.exe 84 PID 3100 wrote to memory of 3588 3100 Ddakjkqi.exe 85 PID 3100 wrote to memory of 3588 3100 Ddakjkqi.exe 85 PID 3100 wrote to memory of 3588 3100 Ddakjkqi.exe 85 PID 3588 wrote to memory of 2056 3588 Dkkcge32.exe 86 PID 3588 wrote to memory of 2056 3588 Dkkcge32.exe 86 PID 3588 wrote to memory of 2056 3588 Dkkcge32.exe 86 PID 2056 wrote to memory of 1812 2056 Dogogcpo.exe 87 PID 2056 wrote to memory of 1812 2056 Dogogcpo.exe 87 PID 2056 wrote to memory of 1812 2056 Dogogcpo.exe 87 PID 1812 wrote to memory of 3324 1812 Deagdn32.exe 88 PID 1812 wrote to memory of 3324 1812 Deagdn32.exe 88 PID 1812 wrote to memory of 3324 1812 Deagdn32.exe 88 PID 3324 wrote to memory of 4724 3324 Dgbdlf32.exe 89 PID 3324 wrote to memory of 4724 3324 Dgbdlf32.exe 89 PID 3324 wrote to memory of 4724 3324 Dgbdlf32.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\ba9487b1ba59d1767b7adcebe1f301f0N.exe"C:\Users\Admin\AppData\Local\Temp\ba9487b1ba59d1767b7adcebe1f301f0N.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Windows\SysWOW64\Daconoae.exeC:\Windows\system32\Daconoae.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Windows\SysWOW64\Ddakjkqi.exeC:\Windows\system32\Ddakjkqi.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3100 -
C:\Windows\SysWOW64\Dkkcge32.exeC:\Windows\system32\Dkkcge32.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3588 -
C:\Windows\SysWOW64\Dogogcpo.exeC:\Windows\system32\Dogogcpo.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\SysWOW64\Deagdn32.exeC:\Windows\system32\Deagdn32.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Windows\SysWOW64\Dgbdlf32.exeC:\Windows\system32\Dgbdlf32.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3324 -
C:\Windows\SysWOW64\Dmllipeg.exeC:\Windows\system32\Dmllipeg.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4724 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4724 -s 3969⤵
- Program crash
PID:2884
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4724 -ip 47241⤵PID:1988
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD50d7933fd17ab288d595dec2e115fecec
SHA164570cb2132eb28c4a496b701978e37911f62e73
SHA256fb592eebe89b48cc136a2288abae05c88601adc93db6a56a8e4d29b03e991801
SHA5121a9ebe06127cd8f9a11cf29d762bb6a1ae95225ae3feb7eccd34c0b6a5f5c66bb6048f8b761dd280c5b78a5e8c0953e7bffa234655b9a7b59a2df275be9953d4
-
Filesize
80KB
MD5485aaea78e2fbad50abf11c14c59d8e0
SHA1219531406ba4db328e2a56203eabbe4b67cf2686
SHA25629b670d79c3decc7f5536c9b98fe6c95f0ee3016e8e7a02060343f1755f181b0
SHA512ea8f6f6ee52f24f62b7b184706067adc56a150e8fe155dd1e041995378d60e7833e35aee8450f5d3bb454777f593f1c5ade179b228cdcb8dcacefb67963888ff
-
Filesize
80KB
MD5769c26640ea615cb1832d80e664ffb23
SHA1b051b7ce9729f51deb5436a78def853e3ac4e8aa
SHA2564deaad1f773cc69967626a072712073f647edf6f610c107f11b0266d6e67aa7e
SHA512919adf6c05c75433839d1ac33fa493e00a1b37ff2bc3651a9a4e4fefa899d06bd1ef957db379be64a2f3ed19dfdf1ed4a42581ff309bf7928916f953cfeebaa0
-
Filesize
80KB
MD5717be8436c228045204319d94b2f5337
SHA147d5949294a3659b3da8b4c219b0b33b639a2542
SHA256aa83bd57ad36f1ef4c9c325a23559fcf7cbe5865b92e8c11152b0fcdda531f0e
SHA512d574780005ff2abb8434e1204e4a52cdabc641ed68ee82742e0a71367b0a63d8f914de0673e785fd92ae1517659ab115634760415f27c148365c6bd03ffed965
-
Filesize
80KB
MD5813f8db481f120daf952184fe09254c9
SHA198e8bf4fdc34a875d1f8bcdc2412644ef09afc5f
SHA25605626c53a1e2398731788073cc39a02dd11fedea792e0ced67dad29a63ebc0b5
SHA5124b6ae18587cb8413b626f00f987eb8301c254a48f1b4c0cb51b3d530edc654ecbeeb65011de180c6889c83bfde4f35322268efad46981814c924d6c0397d000a
-
Filesize
80KB
MD553926cc5bb2013ac3b58f5c9c4bf8484
SHA1a7baab35089e96b4ca0fc8daeb4cb5518f7bf894
SHA2560338caac0e59187392ff9a6766f0a5efad08d59ba8238c19715cb3d0ab29e4b3
SHA512d2d1896f89f0e7c211aa8cf4f1869b59a9419ac99dd355c80004ae11578fad33c2906c35e1f358848b82649120b2732efcc1535f972f8c72e2bc1a933d4faa28
-
Filesize
80KB
MD572793a7a37a1d6b496108ded3e7f6942
SHA1351a5a0ef2e8bd950a5ece1411ca119ca7e77aa8
SHA2561ef42c2abd8288c6e951b040ad116c56b75e5bf6f8c2655f1fc1dda1fe1e7676
SHA512304fda82e4171b79a03cbd27763bdae71a7b26670a37057bd7f148a806107e5bc68f8c605925172eac86aa0aea9bfb39ed87dc5afe9d1334135fc17a636e8cfc