Analysis

  • max time kernel
    117s
  • max time network
    120s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/09/2024, 08:49

General

  • Target

    ba9487b1ba59d1767b7adcebe1f301f0N.exe

  • Size

    80KB

  • MD5

    ba9487b1ba59d1767b7adcebe1f301f0

  • SHA1

    6b1fbb460b510c39ac2da2c6c4726b5d0bc4234d

  • SHA256

    de245e00c9c24732db9fd79fabcb40a8032e8b4675ffc2f57d696cd9e879ad65

  • SHA512

    6f3cd3c96ebd74e126ee93f719228bdf038f0be8ada8d5521f779fce7b5c85f373aceaf6eb125afdb6293f1d0cec6fe93d6d16f968bc7a3bfcfe1835ba292496

  • SSDEEP

    1536:2lK2ptF/1Zd7l+xmEP92LtR5wfi+TjRC/6i:2T91gxbGL5wf1TjYL

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 14 IoCs
  • Executes dropped EXE 7 IoCs
  • Drops file in System32 directory 21 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 24 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ba9487b1ba59d1767b7adcebe1f301f0N.exe
    "C:\Users\Admin\AppData\Local\Temp\ba9487b1ba59d1767b7adcebe1f301f0N.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2448
    • C:\Windows\SysWOW64\Daconoae.exe
      C:\Windows\system32\Daconoae.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:212
      • C:\Windows\SysWOW64\Ddakjkqi.exe
        C:\Windows\system32\Ddakjkqi.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:3100
        • C:\Windows\SysWOW64\Dkkcge32.exe
          C:\Windows\system32\Dkkcge32.exe
          4⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:3588
          • C:\Windows\SysWOW64\Dogogcpo.exe
            C:\Windows\system32\Dogogcpo.exe
            5⤵
            • Adds autorun key to be loaded by Explorer.exe on startup
            • Executes dropped EXE
            • Drops file in System32 directory
            • System Location Discovery: System Language Discovery
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:2056
            • C:\Windows\SysWOW64\Deagdn32.exe
              C:\Windows\system32\Deagdn32.exe
              6⤵
              • Adds autorun key to be loaded by Explorer.exe on startup
              • Executes dropped EXE
              • Drops file in System32 directory
              • System Location Discovery: System Language Discovery
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:1812
              • C:\Windows\SysWOW64\Dgbdlf32.exe
                C:\Windows\system32\Dgbdlf32.exe
                7⤵
                • Adds autorun key to be loaded by Explorer.exe on startup
                • Executes dropped EXE
                • Drops file in System32 directory
                • System Location Discovery: System Language Discovery
                • Modifies registry class
                • Suspicious use of WriteProcessMemory
                PID:3324
                • C:\Windows\SysWOW64\Dmllipeg.exe
                  C:\Windows\system32\Dmllipeg.exe
                  8⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  PID:4724
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 4724 -s 396
                    9⤵
                    • Program crash
                    PID:2884
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4724 -ip 4724
    1⤵
      PID:1988

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Windows\SysWOW64\Daconoae.exe

            Filesize

            80KB

            MD5

            0d7933fd17ab288d595dec2e115fecec

            SHA1

            64570cb2132eb28c4a496b701978e37911f62e73

            SHA256

            fb592eebe89b48cc136a2288abae05c88601adc93db6a56a8e4d29b03e991801

            SHA512

            1a9ebe06127cd8f9a11cf29d762bb6a1ae95225ae3feb7eccd34c0b6a5f5c66bb6048f8b761dd280c5b78a5e8c0953e7bffa234655b9a7b59a2df275be9953d4

          • C:\Windows\SysWOW64\Ddakjkqi.exe

            Filesize

            80KB

            MD5

            485aaea78e2fbad50abf11c14c59d8e0

            SHA1

            219531406ba4db328e2a56203eabbe4b67cf2686

            SHA256

            29b670d79c3decc7f5536c9b98fe6c95f0ee3016e8e7a02060343f1755f181b0

            SHA512

            ea8f6f6ee52f24f62b7b184706067adc56a150e8fe155dd1e041995378d60e7833e35aee8450f5d3bb454777f593f1c5ade179b228cdcb8dcacefb67963888ff

          • C:\Windows\SysWOW64\Deagdn32.exe

            Filesize

            80KB

            MD5

            769c26640ea615cb1832d80e664ffb23

            SHA1

            b051b7ce9729f51deb5436a78def853e3ac4e8aa

            SHA256

            4deaad1f773cc69967626a072712073f647edf6f610c107f11b0266d6e67aa7e

            SHA512

            919adf6c05c75433839d1ac33fa493e00a1b37ff2bc3651a9a4e4fefa899d06bd1ef957db379be64a2f3ed19dfdf1ed4a42581ff309bf7928916f953cfeebaa0

          • C:\Windows\SysWOW64\Dgbdlf32.exe

            Filesize

            80KB

            MD5

            717be8436c228045204319d94b2f5337

            SHA1

            47d5949294a3659b3da8b4c219b0b33b639a2542

            SHA256

            aa83bd57ad36f1ef4c9c325a23559fcf7cbe5865b92e8c11152b0fcdda531f0e

            SHA512

            d574780005ff2abb8434e1204e4a52cdabc641ed68ee82742e0a71367b0a63d8f914de0673e785fd92ae1517659ab115634760415f27c148365c6bd03ffed965

          • C:\Windows\SysWOW64\Dkkcge32.exe

            Filesize

            80KB

            MD5

            813f8db481f120daf952184fe09254c9

            SHA1

            98e8bf4fdc34a875d1f8bcdc2412644ef09afc5f

            SHA256

            05626c53a1e2398731788073cc39a02dd11fedea792e0ced67dad29a63ebc0b5

            SHA512

            4b6ae18587cb8413b626f00f987eb8301c254a48f1b4c0cb51b3d530edc654ecbeeb65011de180c6889c83bfde4f35322268efad46981814c924d6c0397d000a

          • C:\Windows\SysWOW64\Dmllipeg.exe

            Filesize

            80KB

            MD5

            53926cc5bb2013ac3b58f5c9c4bf8484

            SHA1

            a7baab35089e96b4ca0fc8daeb4cb5518f7bf894

            SHA256

            0338caac0e59187392ff9a6766f0a5efad08d59ba8238c19715cb3d0ab29e4b3

            SHA512

            d2d1896f89f0e7c211aa8cf4f1869b59a9419ac99dd355c80004ae11578fad33c2906c35e1f358848b82649120b2732efcc1535f972f8c72e2bc1a933d4faa28

          • C:\Windows\SysWOW64\Dogogcpo.exe

            Filesize

            80KB

            MD5

            72793a7a37a1d6b496108ded3e7f6942

            SHA1

            351a5a0ef2e8bd950a5ece1411ca119ca7e77aa8

            SHA256

            1ef42c2abd8288c6e951b040ad116c56b75e5bf6f8c2655f1fc1dda1fe1e7676

            SHA512

            304fda82e4171b79a03cbd27763bdae71a7b26670a37057bd7f148a806107e5bc68f8c605925172eac86aa0aea9bfb39ed87dc5afe9d1334135fc17a636e8cfc

          • memory/212-64-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/212-9-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/1812-40-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/1812-60-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/2056-33-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/2056-61-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/2448-1-0x0000000000431000-0x0000000000432000-memory.dmp

            Filesize

            4KB

          • memory/2448-0-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/2448-65-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/3100-17-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/3100-62-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/3324-49-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/3324-59-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/3588-24-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/3588-63-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/4724-56-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/4724-58-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB