Analysis
-
max time kernel
93s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12/09/2024, 01:48
Static task
static1
Behavioral task
behavioral1
Sample
ca90c1f6230e8603d1bf318e1372452e58cc93d800f9098eeae037720a5e408d.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ca90c1f6230e8603d1bf318e1372452e58cc93d800f9098eeae037720a5e408d.exe
Resource
win10v2004-20240802-en
General
-
Target
ca90c1f6230e8603d1bf318e1372452e58cc93d800f9098eeae037720a5e408d.exe
-
Size
1.3MB
-
MD5
ef3c2cfc2eba61535a38d487a0ea253f
-
SHA1
9197482ae9105e309e394bbfcc91f9e2d76a0553
-
SHA256
ca90c1f6230e8603d1bf318e1372452e58cc93d800f9098eeae037720a5e408d
-
SHA512
8e0d5f129bad09d107ea320471270b3732d49a351e669afa5871b7d75c5f63710a2e4c7f94b5841c1acfd39bfcc92c261c56fed76e2665962926690c735f263e
-
SSDEEP
24576:rH8yNPh2kkkkK4kXkkkkkkkkhLX3a20R0v50+YNpsKv2EvZHp3oW:rH8yFbazR0vKLXZ
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dejacond.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Dejacond.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dfknkg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Dfknkg32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dmgbnq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Dmgbnq32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad ca90c1f6230e8603d1bf318e1372452e58cc93d800f9098eeae037720a5e408d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" ca90c1f6230e8603d1bf318e1372452e58cc93d800f9098eeae037720a5e408d.exe -
Executes dropped EXE 4 IoCs
pid Process 2148 Dejacond.exe 3000 Dfknkg32.exe 2012 Dmgbnq32.exe 4444 Dmllipeg.exe -
Drops file in System32 directory 12 IoCs
description ioc Process File created C:\Windows\SysWOW64\Dejacond.exe ca90c1f6230e8603d1bf318e1372452e58cc93d800f9098eeae037720a5e408d.exe File opened for modification C:\Windows\SysWOW64\Dejacond.exe ca90c1f6230e8603d1bf318e1372452e58cc93d800f9098eeae037720a5e408d.exe File created C:\Windows\SysWOW64\Dfknkg32.exe Dejacond.exe File created C:\Windows\SysWOW64\Cogflbdn.dll Dejacond.exe File created C:\Windows\SysWOW64\Dmgbnq32.exe Dfknkg32.exe File opened for modification C:\Windows\SysWOW64\Dmgbnq32.exe Dfknkg32.exe File created C:\Windows\SysWOW64\Ihidnp32.dll Dfknkg32.exe File opened for modification C:\Windows\SysWOW64\Dmllipeg.exe Dmgbnq32.exe File created C:\Windows\SysWOW64\Kngpec32.dll Dmgbnq32.exe File created C:\Windows\SysWOW64\Hpnkaj32.dll ca90c1f6230e8603d1bf318e1372452e58cc93d800f9098eeae037720a5e408d.exe File opened for modification C:\Windows\SysWOW64\Dfknkg32.exe Dejacond.exe File created C:\Windows\SysWOW64\Dmllipeg.exe Dmgbnq32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2572 4444 WerFault.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ca90c1f6230e8603d1bf318e1372452e58cc93d800f9098eeae037720a5e408d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dejacond.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dfknkg32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dmgbnq32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dmllipeg.exe -
Modifies registry class 15 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Dejacond.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cogflbdn.dll" Dejacond.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Dejacond.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Dfknkg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Dmgbnq32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node ca90c1f6230e8603d1bf318e1372452e58cc93d800f9098eeae037720a5e408d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717} ca90c1f6230e8603d1bf318e1372452e58cc93d800f9098eeae037720a5e408d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hpnkaj32.dll" ca90c1f6230e8603d1bf318e1372452e58cc93d800f9098eeae037720a5e408d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ihidnp32.dll" Dfknkg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kngpec32.dll" Dmgbnq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" ca90c1f6230e8603d1bf318e1372452e58cc93d800f9098eeae037720a5e408d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Dfknkg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Dmgbnq32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 ca90c1f6230e8603d1bf318e1372452e58cc93d800f9098eeae037720a5e408d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID ca90c1f6230e8603d1bf318e1372452e58cc93d800f9098eeae037720a5e408d.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1436 wrote to memory of 2148 1436 ca90c1f6230e8603d1bf318e1372452e58cc93d800f9098eeae037720a5e408d.exe 83 PID 1436 wrote to memory of 2148 1436 ca90c1f6230e8603d1bf318e1372452e58cc93d800f9098eeae037720a5e408d.exe 83 PID 1436 wrote to memory of 2148 1436 ca90c1f6230e8603d1bf318e1372452e58cc93d800f9098eeae037720a5e408d.exe 83 PID 2148 wrote to memory of 3000 2148 Dejacond.exe 84 PID 2148 wrote to memory of 3000 2148 Dejacond.exe 84 PID 2148 wrote to memory of 3000 2148 Dejacond.exe 84 PID 3000 wrote to memory of 2012 3000 Dfknkg32.exe 85 PID 3000 wrote to memory of 2012 3000 Dfknkg32.exe 85 PID 3000 wrote to memory of 2012 3000 Dfknkg32.exe 85 PID 2012 wrote to memory of 4444 2012 Dmgbnq32.exe 86 PID 2012 wrote to memory of 4444 2012 Dmgbnq32.exe 86 PID 2012 wrote to memory of 4444 2012 Dmgbnq32.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\ca90c1f6230e8603d1bf318e1372452e58cc93d800f9098eeae037720a5e408d.exe"C:\Users\Admin\AppData\Local\Temp\ca90c1f6230e8603d1bf318e1372452e58cc93d800f9098eeae037720a5e408d.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Windows\SysWOW64\Dejacond.exeC:\Windows\system32\Dejacond.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Windows\SysWOW64\Dfknkg32.exeC:\Windows\system32\Dfknkg32.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\SysWOW64\Dmgbnq32.exeC:\Windows\system32\Dmgbnq32.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\SysWOW64\Dmllipeg.exeC:\Windows\system32\Dmllipeg.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4444 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4444 -s 4086⤵
- Program crash
PID:2572
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4444 -ip 44441⤵PID:4480
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5d2e6d0b0c97d093c46c9285e273c301f
SHA1832707eacb8fabe3bd5884733890c7f0b1cbb282
SHA256bbf11ce1fc388858fba682285c24d4b26edcbf89704891c4148e166ff11cee3b
SHA5120ed79e926c4d08442acd750323f788f11c2338c32c326e2ce3af574e2d275b6134292a5cd0c6af2caabc8736c3be7a6106338dcabce293498905332aebe64619
-
Filesize
1.3MB
MD5f26b3feac67c199b8ccbc4f8eed1f260
SHA139de371b7a91f6d7e7997cc57a17d274d91f7218
SHA256408ef068a8ebadc7b340e8da849c9a35f62e91dfb4c96b0d63e71c3c071cf488
SHA512885bc0eada0f96002fd7af40fcb8b7ba11f8a13c8788dbdff74393b536832df9cf025d2f7ea3834e8c2e05a4ead049bd19568d56e896e773f2d422e1e3f864fe
-
Filesize
1.3MB
MD51a3f764d3db64048dd3b7545fa508150
SHA1dc169a2df3fd8e93ea3400db94ad68cd04d7f7c3
SHA256597d269cb7dabccdf3a2d31536926b71485f294c92caa05558666451849bf333
SHA5125b5fd61839afee23488dd6659de2a2927d0ec5cbec7818908b11384b9e11080e3f24fcdf80ff26ee057e9b8b1c721e7f5f9c906f9358d2c977f5ef75a0941ad2
-
Filesize
1.3MB
MD5f3028fcbc84e871c2fa28935d5c39b6e
SHA114986163f0ac1445ee98fcaa8681f88e737e6145
SHA256380509263516e3fcfc16fac976e97952dd9fa5acf1113e08f999d5bf5e13ac5f
SHA5129c28a0fb2796ba033d503b77b8d49f08538f96f27a9ac55873b9ec8fe57fe0cf2f8b7fd2a03dabd5249ef9a6a3ec39144b1a23b5a9fe06d67e89f3670f5162df