Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/09/2024, 01:04

General

  • Target

    b6274aaa9b4ceee12fae5703c3da73aec9ebf7da69462666faeee3f1d891aa33.exe

  • Size

    80KB

  • MD5

    8f27ee7f3c4f3cd2855bbb3bbf53f0ac

  • SHA1

    49c45a1eb3bbe12b07889b18f0f4eb67e6a1e426

  • SHA256

    b6274aaa9b4ceee12fae5703c3da73aec9ebf7da69462666faeee3f1d891aa33

  • SHA512

    2884d750dcdba636c6c825c2d878baee28a640ad9d6703057dfba98fc82bb265df48bedd4a3de1c623297dc69dd68aa1a44094ea078cde71bc43afa9e685883b

  • SSDEEP

    1536:a646whOJCqyXGt+s4ku2LsBJ9VqDlzVxyh+CbxMa:L46whOUqyXq4kzuJ9IDlRxyhTb7

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 16 IoCs
  • Executes dropped EXE 8 IoCs
  • Drops file in System32 directory 24 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 27 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b6274aaa9b4ceee12fae5703c3da73aec9ebf7da69462666faeee3f1d891aa33.exe
    "C:\Users\Admin\AppData\Local\Temp\b6274aaa9b4ceee12fae5703c3da73aec9ebf7da69462666faeee3f1d891aa33.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:412
    • C:\Windows\SysWOW64\Dhkjej32.exe
      C:\Windows\system32\Dhkjej32.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:4776
      • C:\Windows\SysWOW64\Dodbbdbb.exe
        C:\Windows\system32\Dodbbdbb.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:3688
        • C:\Windows\SysWOW64\Daconoae.exe
          C:\Windows\system32\Daconoae.exe
          4⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:3056
          • C:\Windows\SysWOW64\Dfpgffpm.exe
            C:\Windows\system32\Dfpgffpm.exe
            5⤵
            • Adds autorun key to be loaded by Explorer.exe on startup
            • Executes dropped EXE
            • Drops file in System32 directory
            • System Location Discovery: System Language Discovery
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:1068
            • C:\Windows\SysWOW64\Dkkcge32.exe
              C:\Windows\system32\Dkkcge32.exe
              6⤵
              • Adds autorun key to be loaded by Explorer.exe on startup
              • Executes dropped EXE
              • Drops file in System32 directory
              • System Location Discovery: System Language Discovery
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:4180
              • C:\Windows\SysWOW64\Dmjocp32.exe
                C:\Windows\system32\Dmjocp32.exe
                7⤵
                • Adds autorun key to be loaded by Explorer.exe on startup
                • Executes dropped EXE
                • Drops file in System32 directory
                • System Location Discovery: System Language Discovery
                • Modifies registry class
                • Suspicious use of WriteProcessMemory
                PID:2248
                • C:\Windows\SysWOW64\Dhocqigp.exe
                  C:\Windows\system32\Dhocqigp.exe
                  8⤵
                  • Adds autorun key to be loaded by Explorer.exe on startup
                  • Executes dropped EXE
                  • Drops file in System32 directory
                  • System Location Discovery: System Language Discovery
                  • Modifies registry class
                  • Suspicious use of WriteProcessMemory
                  PID:1700
                  • C:\Windows\SysWOW64\Dmllipeg.exe
                    C:\Windows\system32\Dmllipeg.exe
                    9⤵
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    PID:1052
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 1052 -s 404
                      10⤵
                      • Program crash
                      PID:4928
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1052 -ip 1052
    1⤵
      PID:2208

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\SysWOW64\Daconoae.exe

      Filesize

      80KB

      MD5

      d20569055244a8a1a5adc5caae82f4c5

      SHA1

      414fd526d26e1ea321545423bb70454c4c8773d4

      SHA256

      07f10ed56162a8322e7ba88d8338d81f8784c85882a50ca01ce874a8305e2331

      SHA512

      1f3cd4040114cef73c3252bcec6b217e47a9397fc0a79ce69eb11b159602ace7301fee8bc3197b9297b33da1d5a343939b9dbdeb2361ebde1e9dc3d29cda8e0f

    • C:\Windows\SysWOW64\Dfpgffpm.exe

      Filesize

      80KB

      MD5

      478283e5b1806bd59325052de13dd8d1

      SHA1

      eda72cf4935a7fcfd8783b9c1325a632c1573d6f

      SHA256

      97270731456d86711919d8f60d6e41472bd395cecb70b94ef1f863635c272d7a

      SHA512

      f8097fa76631e59bc4e49eea99005a6acda411d7ecad76a5e747d16c16c2d89c5f87a17bdf76016fbced52eba03e38a5b2518ecd9789428b9b56cf5a58098da1

    • C:\Windows\SysWOW64\Dhkjej32.exe

      Filesize

      80KB

      MD5

      05a28cc29a6b87de15f2fa26975b8b9f

      SHA1

      abece8407f53390fd1f69bc8bc609429e7406026

      SHA256

      c81fab89817b4838dd14d5111ad751cebfd338819f9625a89df8e23b75b081bb

      SHA512

      48b47c3b31ffc41bd673d11a8d1df7389a7c187184a028dde0ba27f68b600cd3f675447cd60a32b6a742839bb78af063dcf9fec66e8502dd45969cb6bbba187d

    • C:\Windows\SysWOW64\Dhocqigp.exe

      Filesize

      80KB

      MD5

      37333e4d5d7353441c6d7108e97f0505

      SHA1

      b2d6100f006bea04a9a21901d364e19f62cf3f29

      SHA256

      a8c8fd6c8aa5286d840047033a10e122c1de0109cb508d5068ae7d6ab14b16c4

      SHA512

      b60deb9676e86c6c63629dda66334330de8ae1f50606903f938d483a433689f2226841aa097abd539ee73dbaa8eca99f72f6a976c988e32bc3fb34c90d626b5a

    • C:\Windows\SysWOW64\Dkkcge32.exe

      Filesize

      80KB

      MD5

      cf554fa3f2acd0defcb99bcb76556e8d

      SHA1

      0ce8cbc1d4030bd0984f0850c49ff214a3f6b415

      SHA256

      edbe01d15be95b1dfe7bbbafe2c817d4ff13ff681ec3669cb5ac177479507d06

      SHA512

      4679dfaee9bdd03b969a8f8ad562c9baf4be08e8524f9c40206f38ce4e4bb59b58fe7ae834681a61e6508624d93730c862b7961437d2cc50f5af3c9252dade81

    • C:\Windows\SysWOW64\Dmjocp32.exe

      Filesize

      80KB

      MD5

      65f958b2cce389d934fdc069e1aa4c73

      SHA1

      5c3abb78019a0b488ee87dc2af6ea3322f46090d

      SHA256

      673ac7d8faf2134fbde4fa9760b2bd607e3ef1a6c67a548b84ff41daed410f23

      SHA512

      dae12ac393faebc55e73f55fde2b7208339f6fb793dcea1a7859f2926a35d011539219b29ce624ead6c5faac875a83caa238e7b92d4438f7ec670a8961726cac

    • C:\Windows\SysWOW64\Dmllipeg.exe

      Filesize

      80KB

      MD5

      a284c595939885c4dd6d713d684e7f2b

      SHA1

      56145554964f0184cba97aafc5fa84300ca1915e

      SHA256

      c24a6f659146f8d14c07906c950afecc0bb0a86fbcc0ccae7ea8e5d791050e7f

      SHA512

      941b633f5c75b8a855cfa5015a92677d9bda1f89cdf97022c0d92b6435a8bfa9414acbf1630e12033b464248db3a19147a2ce4edf759336cf790b2c74c147257

    • C:\Windows\SysWOW64\Dodbbdbb.exe

      Filesize

      80KB

      MD5

      929a948563411ccf5d7ea774c835e31b

      SHA1

      7fbe92b644799123e7fdef2eab44e107900ac60d

      SHA256

      385455c7b7e1bf2557d3a471841b5517a2ab0c9085f2694f4a5cd82a0b7f5197

      SHA512

      da9dbb8fb6242196c3a112878d3c81c62e2dc7c91d591c9a4d6857d59618d4848839aa8a1c0b252cfe9376673b8b156e4ce04303d94d12fb827d6e2e8b280d40

    • memory/412-73-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB

    • memory/412-0-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB

    • memory/412-1-0x0000000000431000-0x0000000000432000-memory.dmp

      Filesize

      4KB

    • memory/1052-64-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB

    • memory/1052-66-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB

    • memory/1068-37-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB

    • memory/1700-67-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB

    • memory/1700-56-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB

    • memory/2248-48-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB

    • memory/2248-68-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB

    • memory/3056-24-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB

    • memory/3056-70-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB

    • memory/3688-21-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB

    • memory/3688-71-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB

    • memory/4180-41-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB

    • memory/4180-69-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB

    • memory/4776-72-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB

    • memory/4776-9-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB