Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
94s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
15/09/2024, 11:36
Static task
static1
Behavioral task
behavioral1
Sample
f03ea7917b3d7fffb7abf1fe063ec40428204d87890114cb339c02ad6054e03b.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f03ea7917b3d7fffb7abf1fe063ec40428204d87890114cb339c02ad6054e03b.exe
Resource
win10v2004-20240802-en
General
-
Target
f03ea7917b3d7fffb7abf1fe063ec40428204d87890114cb339c02ad6054e03b.exe
-
Size
59KB
-
MD5
560ec2151e5c1478f6d51a9d3a0e6d36
-
SHA1
cee11cc6b1a3180acecc1bd9ddcece301a55f39f
-
SHA256
f03ea7917b3d7fffb7abf1fe063ec40428204d87890114cb339c02ad6054e03b
-
SHA512
e8837cc6b8218ed92d4881ff95516e17e52a1a6b18221fcbfeb8163002e576fd73f8c523c8dbeb02ad9a8df1ecb321307404051d86a00a9d094f267b5fda00f9
-
SSDEEP
768:U3cj5AdMlyOH3FmTAi4LVC3gsitWHWLXzS6ILqJUXlGZ/1H5y5nf1fZMEBFELvkH:LitOSAiAshuHXzSCJUXaMNCyVso
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dknpmdfc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad f03ea7917b3d7fffb7abf1fe063ec40428204d87890114cb339c02ad6054e03b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" f03ea7917b3d7fffb7abf1fe063ec40428204d87890114cb339c02ad6054e03b.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dddhpjof.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dddhpjof.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dknpmdfc.exe -
Executes dropped EXE 3 IoCs
pid Process 4780 Dddhpjof.exe 3488 Dknpmdfc.exe 1104 Dmllipeg.exe -
Drops file in System32 directory 9 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Dknpmdfc.exe Dddhpjof.exe File created C:\Windows\SysWOW64\Nokpao32.dll Dddhpjof.exe File created C:\Windows\SysWOW64\Dmllipeg.exe Dknpmdfc.exe File opened for modification C:\Windows\SysWOW64\Dmllipeg.exe Dknpmdfc.exe File created C:\Windows\SysWOW64\Kngpec32.dll Dknpmdfc.exe File opened for modification C:\Windows\SysWOW64\Dddhpjof.exe f03ea7917b3d7fffb7abf1fe063ec40428204d87890114cb339c02ad6054e03b.exe File created C:\Windows\SysWOW64\Dknpmdfc.exe Dddhpjof.exe File created C:\Windows\SysWOW64\Dddhpjof.exe f03ea7917b3d7fffb7abf1fe063ec40428204d87890114cb339c02ad6054e03b.exe File created C:\Windows\SysWOW64\Amjknl32.dll f03ea7917b3d7fffb7abf1fe063ec40428204d87890114cb339c02ad6054e03b.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1008 1104 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f03ea7917b3d7fffb7abf1fe063ec40428204d87890114cb339c02ad6054e03b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dddhpjof.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dknpmdfc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dmllipeg.exe -
Modifies registry class 12 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nokpao32.dll" Dddhpjof.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dknpmdfc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" f03ea7917b3d7fffb7abf1fe063ec40428204d87890114cb339c02ad6054e03b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node f03ea7917b3d7fffb7abf1fe063ec40428204d87890114cb339c02ad6054e03b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID f03ea7917b3d7fffb7abf1fe063ec40428204d87890114cb339c02ad6054e03b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} f03ea7917b3d7fffb7abf1fe063ec40428204d87890114cb339c02ad6054e03b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Amjknl32.dll" f03ea7917b3d7fffb7abf1fe063ec40428204d87890114cb339c02ad6054e03b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dddhpjof.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dddhpjof.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dknpmdfc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 f03ea7917b3d7fffb7abf1fe063ec40428204d87890114cb339c02ad6054e03b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kngpec32.dll" Dknpmdfc.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 548 wrote to memory of 4780 548 f03ea7917b3d7fffb7abf1fe063ec40428204d87890114cb339c02ad6054e03b.exe 83 PID 548 wrote to memory of 4780 548 f03ea7917b3d7fffb7abf1fe063ec40428204d87890114cb339c02ad6054e03b.exe 83 PID 548 wrote to memory of 4780 548 f03ea7917b3d7fffb7abf1fe063ec40428204d87890114cb339c02ad6054e03b.exe 83 PID 4780 wrote to memory of 3488 4780 Dddhpjof.exe 84 PID 4780 wrote to memory of 3488 4780 Dddhpjof.exe 84 PID 4780 wrote to memory of 3488 4780 Dddhpjof.exe 84 PID 3488 wrote to memory of 1104 3488 Dknpmdfc.exe 85 PID 3488 wrote to memory of 1104 3488 Dknpmdfc.exe 85 PID 3488 wrote to memory of 1104 3488 Dknpmdfc.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\f03ea7917b3d7fffb7abf1fe063ec40428204d87890114cb339c02ad6054e03b.exe"C:\Users\Admin\AppData\Local\Temp\f03ea7917b3d7fffb7abf1fe063ec40428204d87890114cb339c02ad6054e03b.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:548 -
C:\Windows\SysWOW64\Dddhpjof.exeC:\Windows\system32\Dddhpjof.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Windows\SysWOW64\Dknpmdfc.exeC:\Windows\system32\Dknpmdfc.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3488 -
C:\Windows\SysWOW64\Dmllipeg.exeC:\Windows\system32\Dmllipeg.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1104 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1104 -s 3965⤵
- Program crash
PID:1008
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 1104 -ip 11041⤵PID:2668
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
59KB
MD5ada32bccdbc7ee23ab1e3090d094f10e
SHA10d16704ad59bba1afa3437138c53d403741fd610
SHA25617af5d1b37751bcf5590a921a8ce6bec1dbd3208db9e0b5ebdc7a4c1f4ed0ad5
SHA512cf00cfa7dc2470a6036fe05d43660f6896189628a4e6cbe462ef4c4bfd16cde9be7c7142cefbbe87fd70c1a2d53461c35a2a2bcc09c1cecfd87d791a4dabf06c
-
Filesize
59KB
MD5c88b173cdd0c1fcfd2cf064ce6acc8a4
SHA108d2986bdb1d69cdfec93f738b4cd643c59b6cb0
SHA256b8ed9f38a8f8ed850a3b36069c7e6f5ec01ffc32fea4ff16c9962acd0d48b27e
SHA51248d8898a1c620429ef010cb52a9a0bc1ff36884db8d5334c5cfb80a984d2dbe79403b3ae4ed834f2603b3d9deea4ed9f47a89d9ad98e800a3b93668a0d6ad8e4
-
Filesize
59KB
MD522c1a745aa54c2c202663907691b6514
SHA16d1e66de0aee98337e0a62bd938fa05985114a96
SHA256c84c6fc9fb513e868fd6d3ad72e05ccf937b5f98f87abe67f189b2a09d8df96d
SHA5126216c29c35063f81fb28845d5ba2009e385e972a0397c6f69ac2476da5bfc57c31eb932d857124fc3a99f10eec44f3396f34695ee362ae7f232aabc586c5c90f