Analysis

  • max time kernel
    94s
  • max time network
    122s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/09/2024, 22:44

General

  • Target

    6e3cc5aa4c872e4a0814620c3a4e13201bdd1399dbae5a7a08a946e5880a8724.exe

  • Size

    93KB

  • MD5

    5bf1f62ffe11ee65dce666dc793df7a5

  • SHA1

    f152b6608e69dfdc5e88b1e971307fcb47e1e738

  • SHA256

    6e3cc5aa4c872e4a0814620c3a4e13201bdd1399dbae5a7a08a946e5880a8724

  • SHA512

    70a55311fc661b0dbda7b8a497a58405bbc473ec51c6fa657ec6fac052dcbef93348d2d5bbf1cc18dec7df8ccaf4f510c053089efd8f644fdbe93d01c6ea17a8

  • SSDEEP

    1536:nc/x3qURCzXb4utGwA9p5eSuxK0w7q0GT87b77f77b77b77D77D77D77bD77777C:c/x3qURsL4uO6K0wG987b77f77b77b7e

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 6 IoCs
  • Executes dropped EXE 3 IoCs
  • Drops file in System32 directory 9 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 12 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6e3cc5aa4c872e4a0814620c3a4e13201bdd1399dbae5a7a08a946e5880a8724.exe
    "C:\Users\Admin\AppData\Local\Temp\6e3cc5aa4c872e4a0814620c3a4e13201bdd1399dbae5a7a08a946e5880a8724.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1556
    • C:\Windows\SysWOW64\Daekdooc.exe
      C:\Windows\system32\Daekdooc.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2448
      • C:\Windows\SysWOW64\Dddhpjof.exe
        C:\Windows\system32\Dddhpjof.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:1544
        • C:\Windows\SysWOW64\Dmllipeg.exe
          C:\Windows\system32\Dmllipeg.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:3968
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 3968 -s 408
            5⤵
            • Program crash
            PID:3020
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 3968 -ip 3968
    1⤵
      PID:3480

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Windows\SysWOW64\Daekdooc.exe

            Filesize

            93KB

            MD5

            68ff691f2bb97fae0be12771dcf82ee9

            SHA1

            ece6e530433b687189d86ca4aed50d8850238a63

            SHA256

            0bed525087a09b20904fb6feec112c58554881135a4625f5f3530a4fa0c385fd

            SHA512

            45d2f33859d18ebecb5d9d8e1defe2dc497143e1d7acf78f9fe610ded0de3ac347ce409d2f9891f5e92f5e52a92afedf4bcc67ea4e4354c66bc897c325b31881

          • C:\Windows\SysWOW64\Dddhpjof.exe

            Filesize

            93KB

            MD5

            8ddc9fe77ffdbb3ff91601bb36667191

            SHA1

            af72779485538d02b584735658548873e769161b

            SHA256

            72dd6917bdbe63188a44d4f99ac394afb361cdb8bd0a0ac1645680290e545d3e

            SHA512

            a3888aa767889153c901f8cd6d3c1351e3905b14c25c2ec26afe855f93b209deb481774e2b28943448f9fce9174653b94233a1ce3b3edc4b422aebc5b6c44743

          • C:\Windows\SysWOW64\Dmllipeg.exe

            Filesize

            93KB

            MD5

            4c657f0823931346d1138aa678de9ff6

            SHA1

            5178f1249d137c3c0adec100d48f28554fc9e2fe

            SHA256

            49852a8f46ae95a84f6bff92b213bfd01596617336431590abf23ac976499198

            SHA512

            4b91a57977b34c512702640f1725679a8c32c88732f9694fc6dba0c527cd4e08a97a1fe649cf6464c4dc7b7521bd14bb5035cc82ad227ad4ca6b3e6822cd6769

          • memory/1544-15-0x0000000000400000-0x000000000043E000-memory.dmp

            Filesize

            248KB

          • memory/1544-26-0x0000000000400000-0x000000000043E000-memory.dmp

            Filesize

            248KB

          • memory/1556-0-0x0000000000400000-0x000000000043E000-memory.dmp

            Filesize

            248KB

          • memory/1556-28-0x0000000000400000-0x000000000043E000-memory.dmp

            Filesize

            248KB

          • memory/2448-8-0x0000000000400000-0x000000000043E000-memory.dmp

            Filesize

            248KB

          • memory/2448-27-0x0000000000400000-0x000000000043E000-memory.dmp

            Filesize

            248KB

          • memory/3968-23-0x0000000000400000-0x000000000043E000-memory.dmp

            Filesize

            248KB

          • memory/3968-25-0x0000000000400000-0x000000000043E000-memory.dmp

            Filesize

            248KB