Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    94s
  • max time network
    122s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/09/2024, 22:44

General

  • Target

    6e3cc5aa4c872e4a0814620c3a4e13201bdd1399dbae5a7a08a946e5880a8724.exe

  • Size

    93KB

  • MD5

    5bf1f62ffe11ee65dce666dc793df7a5

  • SHA1

    f152b6608e69dfdc5e88b1e971307fcb47e1e738

  • SHA256

    6e3cc5aa4c872e4a0814620c3a4e13201bdd1399dbae5a7a08a946e5880a8724

  • SHA512

    70a55311fc661b0dbda7b8a497a58405bbc473ec51c6fa657ec6fac052dcbef93348d2d5bbf1cc18dec7df8ccaf4f510c053089efd8f644fdbe93d01c6ea17a8

  • SSDEEP

    1536:nc/x3qURCzXb4utGwA9p5eSuxK0w7q0GT87b77f77b77b77D77D77D77bD77777C:c/x3qURsL4uO6K0wG987b77f77b77b7e

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 6 IoCs
  • Executes dropped EXE 3 IoCs
  • Drops file in System32 directory 9 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 12 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6e3cc5aa4c872e4a0814620c3a4e13201bdd1399dbae5a7a08a946e5880a8724.exe
    "C:\Users\Admin\AppData\Local\Temp\6e3cc5aa4c872e4a0814620c3a4e13201bdd1399dbae5a7a08a946e5880a8724.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1556
    • C:\Windows\SysWOW64\Daekdooc.exe
      C:\Windows\system32\Daekdooc.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2448
      • C:\Windows\SysWOW64\Dddhpjof.exe
        C:\Windows\system32\Dddhpjof.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:1544
        • C:\Windows\SysWOW64\Dmllipeg.exe
          C:\Windows\system32\Dmllipeg.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:3968
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 3968 -s 408
            5⤵
            • Program crash
            PID:3020
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 3968 -ip 3968
    1⤵
      PID:3480

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\SysWOW64\Daekdooc.exe

      Filesize

      93KB

      MD5

      68ff691f2bb97fae0be12771dcf82ee9

      SHA1

      ece6e530433b687189d86ca4aed50d8850238a63

      SHA256

      0bed525087a09b20904fb6feec112c58554881135a4625f5f3530a4fa0c385fd

      SHA512

      45d2f33859d18ebecb5d9d8e1defe2dc497143e1d7acf78f9fe610ded0de3ac347ce409d2f9891f5e92f5e52a92afedf4bcc67ea4e4354c66bc897c325b31881

    • C:\Windows\SysWOW64\Dddhpjof.exe

      Filesize

      93KB

      MD5

      8ddc9fe77ffdbb3ff91601bb36667191

      SHA1

      af72779485538d02b584735658548873e769161b

      SHA256

      72dd6917bdbe63188a44d4f99ac394afb361cdb8bd0a0ac1645680290e545d3e

      SHA512

      a3888aa767889153c901f8cd6d3c1351e3905b14c25c2ec26afe855f93b209deb481774e2b28943448f9fce9174653b94233a1ce3b3edc4b422aebc5b6c44743

    • C:\Windows\SysWOW64\Dmllipeg.exe

      Filesize

      93KB

      MD5

      4c657f0823931346d1138aa678de9ff6

      SHA1

      5178f1249d137c3c0adec100d48f28554fc9e2fe

      SHA256

      49852a8f46ae95a84f6bff92b213bfd01596617336431590abf23ac976499198

      SHA512

      4b91a57977b34c512702640f1725679a8c32c88732f9694fc6dba0c527cd4e08a97a1fe649cf6464c4dc7b7521bd14bb5035cc82ad227ad4ca6b3e6822cd6769

    • memory/1544-15-0x0000000000400000-0x000000000043E000-memory.dmp

      Filesize

      248KB

    • memory/1544-26-0x0000000000400000-0x000000000043E000-memory.dmp

      Filesize

      248KB

    • memory/1556-0-0x0000000000400000-0x000000000043E000-memory.dmp

      Filesize

      248KB

    • memory/1556-28-0x0000000000400000-0x000000000043E000-memory.dmp

      Filesize

      248KB

    • memory/2448-8-0x0000000000400000-0x000000000043E000-memory.dmp

      Filesize

      248KB

    • memory/2448-27-0x0000000000400000-0x000000000043E000-memory.dmp

      Filesize

      248KB

    • memory/3968-23-0x0000000000400000-0x000000000043E000-memory.dmp

      Filesize

      248KB

    • memory/3968-25-0x0000000000400000-0x000000000043E000-memory.dmp

      Filesize

      248KB