Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
94s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18/09/2024, 22:44
Static task
static1
Behavioral task
behavioral1
Sample
6e3cc5aa4c872e4a0814620c3a4e13201bdd1399dbae5a7a08a946e5880a8724.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
6e3cc5aa4c872e4a0814620c3a4e13201bdd1399dbae5a7a08a946e5880a8724.exe
Resource
win10v2004-20240802-en
General
-
Target
6e3cc5aa4c872e4a0814620c3a4e13201bdd1399dbae5a7a08a946e5880a8724.exe
-
Size
93KB
-
MD5
5bf1f62ffe11ee65dce666dc793df7a5
-
SHA1
f152b6608e69dfdc5e88b1e971307fcb47e1e738
-
SHA256
6e3cc5aa4c872e4a0814620c3a4e13201bdd1399dbae5a7a08a946e5880a8724
-
SHA512
70a55311fc661b0dbda7b8a497a58405bbc473ec51c6fa657ec6fac052dcbef93348d2d5bbf1cc18dec7df8ccaf4f510c053089efd8f644fdbe93d01c6ea17a8
-
SSDEEP
1536:nc/x3qURCzXb4utGwA9p5eSuxK0w7q0GT87b77f77b77b77D77D77D77bD77777C:c/x3qURsL4uO6K0wG987b77f77b77b7e
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" 6e3cc5aa4c872e4a0814620c3a4e13201bdd1399dbae5a7a08a946e5880a8724.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Daekdooc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Daekdooc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dddhpjof.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Dddhpjof.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 6e3cc5aa4c872e4a0814620c3a4e13201bdd1399dbae5a7a08a946e5880a8724.exe -
Executes dropped EXE 3 IoCs
pid Process 2448 Daekdooc.exe 1544 Dddhpjof.exe 3968 Dmllipeg.exe -
Drops file in System32 directory 9 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Dddhpjof.exe Daekdooc.exe File created C:\Windows\SysWOW64\Amjknl32.dll Daekdooc.exe File created C:\Windows\SysWOW64\Dmllipeg.exe Dddhpjof.exe File created C:\Windows\SysWOW64\Kngpec32.dll Dddhpjof.exe File created C:\Windows\SysWOW64\Daekdooc.exe 6e3cc5aa4c872e4a0814620c3a4e13201bdd1399dbae5a7a08a946e5880a8724.exe File opened for modification C:\Windows\SysWOW64\Daekdooc.exe 6e3cc5aa4c872e4a0814620c3a4e13201bdd1399dbae5a7a08a946e5880a8724.exe File created C:\Windows\SysWOW64\Ohmoom32.dll 6e3cc5aa4c872e4a0814620c3a4e13201bdd1399dbae5a7a08a946e5880a8724.exe File created C:\Windows\SysWOW64\Dddhpjof.exe Daekdooc.exe File opened for modification C:\Windows\SysWOW64\Dmllipeg.exe Dddhpjof.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3020 3968 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6e3cc5aa4c872e4a0814620c3a4e13201bdd1399dbae5a7a08a946e5880a8724.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Daekdooc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dddhpjof.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dmllipeg.exe -
Modifies registry class 12 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID 6e3cc5aa4c872e4a0814620c3a4e13201bdd1399dbae5a7a08a946e5880a8724.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ohmoom32.dll" 6e3cc5aa4c872e4a0814620c3a4e13201bdd1399dbae5a7a08a946e5880a8724.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Daekdooc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node 6e3cc5aa4c872e4a0814620c3a4e13201bdd1399dbae5a7a08a946e5880a8724.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717} 6e3cc5aa4c872e4a0814620c3a4e13201bdd1399dbae5a7a08a946e5880a8724.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" 6e3cc5aa4c872e4a0814620c3a4e13201bdd1399dbae5a7a08a946e5880a8724.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Daekdooc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Amjknl32.dll" Daekdooc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Dddhpjof.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kngpec32.dll" Dddhpjof.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Dddhpjof.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 6e3cc5aa4c872e4a0814620c3a4e13201bdd1399dbae5a7a08a946e5880a8724.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1556 wrote to memory of 2448 1556 6e3cc5aa4c872e4a0814620c3a4e13201bdd1399dbae5a7a08a946e5880a8724.exe 82 PID 1556 wrote to memory of 2448 1556 6e3cc5aa4c872e4a0814620c3a4e13201bdd1399dbae5a7a08a946e5880a8724.exe 82 PID 1556 wrote to memory of 2448 1556 6e3cc5aa4c872e4a0814620c3a4e13201bdd1399dbae5a7a08a946e5880a8724.exe 82 PID 2448 wrote to memory of 1544 2448 Daekdooc.exe 83 PID 2448 wrote to memory of 1544 2448 Daekdooc.exe 83 PID 2448 wrote to memory of 1544 2448 Daekdooc.exe 83 PID 1544 wrote to memory of 3968 1544 Dddhpjof.exe 84 PID 1544 wrote to memory of 3968 1544 Dddhpjof.exe 84 PID 1544 wrote to memory of 3968 1544 Dddhpjof.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\6e3cc5aa4c872e4a0814620c3a4e13201bdd1399dbae5a7a08a946e5880a8724.exe"C:\Users\Admin\AppData\Local\Temp\6e3cc5aa4c872e4a0814620c3a4e13201bdd1399dbae5a7a08a946e5880a8724.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1556 -
C:\Windows\SysWOW64\Daekdooc.exeC:\Windows\system32\Daekdooc.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Windows\SysWOW64\Dddhpjof.exeC:\Windows\system32\Dddhpjof.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Windows\SysWOW64\Dmllipeg.exeC:\Windows\system32\Dmllipeg.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3968 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3968 -s 4085⤵
- Program crash
PID:3020
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 3968 -ip 39681⤵PID:3480
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
93KB
MD568ff691f2bb97fae0be12771dcf82ee9
SHA1ece6e530433b687189d86ca4aed50d8850238a63
SHA2560bed525087a09b20904fb6feec112c58554881135a4625f5f3530a4fa0c385fd
SHA51245d2f33859d18ebecb5d9d8e1defe2dc497143e1d7acf78f9fe610ded0de3ac347ce409d2f9891f5e92f5e52a92afedf4bcc67ea4e4354c66bc897c325b31881
-
Filesize
93KB
MD58ddc9fe77ffdbb3ff91601bb36667191
SHA1af72779485538d02b584735658548873e769161b
SHA25672dd6917bdbe63188a44d4f99ac394afb361cdb8bd0a0ac1645680290e545d3e
SHA512a3888aa767889153c901f8cd6d3c1351e3905b14c25c2ec26afe855f93b209deb481774e2b28943448f9fce9174653b94233a1ce3b3edc4b422aebc5b6c44743
-
Filesize
93KB
MD54c657f0823931346d1138aa678de9ff6
SHA15178f1249d137c3c0adec100d48f28554fc9e2fe
SHA25649852a8f46ae95a84f6bff92b213bfd01596617336431590abf23ac976499198
SHA5124b91a57977b34c512702640f1725679a8c32c88732f9694fc6dba0c527cd4e08a97a1fe649cf6464c4dc7b7521bd14bb5035cc82ad227ad4ca6b3e6822cd6769