Analysis

  • max time kernel
    94s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-09-2024 18:10

General

  • Target

    06abda1bb6cab8d0214f29a18df452f5d73f7754d05dfc227515db420cfc1b03.exe

  • Size

    318KB

  • MD5

    b44cad34e23f72dabe7ff2b96a366f46

  • SHA1

    80a5e213474c0f78906fa6917d506120460b4bc6

  • SHA256

    06abda1bb6cab8d0214f29a18df452f5d73f7754d05dfc227515db420cfc1b03

  • SHA512

    090b168f5f4fd2761d1f1a0427b7542093fb1cfaae2becc5607f22921bd544ff138a6911894d19b583058c92053044fc56a8fed0fb8d9a6f0a3896ed5196fecd

  • SSDEEP

    6144:2N/JZhRVEQHdMcm4FmowdHoS7c5cm4FmowdHoSrNF9xRVEQHd4:2NxHO4wFHoS04wFHoSrZx8

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 14 IoCs
  • Executes dropped EXE 7 IoCs
  • Drops file in System32 directory 21 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 24 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\06abda1bb6cab8d0214f29a18df452f5d73f7754d05dfc227515db420cfc1b03.exe
    "C:\Users\Admin\AppData\Local\Temp\06abda1bb6cab8d0214f29a18df452f5d73f7754d05dfc227515db420cfc1b03.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4704
    • C:\Windows\SysWOW64\Dhfajjoj.exe
      C:\Windows\system32\Dhfajjoj.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:1912
      • C:\Windows\SysWOW64\Dopigd32.exe
        C:\Windows\system32\Dopigd32.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:1944
        • C:\Windows\SysWOW64\Danecp32.exe
          C:\Windows\system32\Danecp32.exe
          4⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:3396
          • C:\Windows\SysWOW64\Dfnjafap.exe
            C:\Windows\system32\Dfnjafap.exe
            5⤵
            • Adds autorun key to be loaded by Explorer.exe on startup
            • Executes dropped EXE
            • Drops file in System32 directory
            • System Location Discovery: System Language Discovery
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:4808
            • C:\Windows\SysWOW64\Deokon32.exe
              C:\Windows\system32\Deokon32.exe
              6⤵
              • Adds autorun key to be loaded by Explorer.exe on startup
              • Executes dropped EXE
              • Drops file in System32 directory
              • System Location Discovery: System Language Discovery
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:2668
              • C:\Windows\SysWOW64\Dknpmdfc.exe
                C:\Windows\system32\Dknpmdfc.exe
                7⤵
                • Adds autorun key to be loaded by Explorer.exe on startup
                • Executes dropped EXE
                • Drops file in System32 directory
                • System Location Discovery: System Language Discovery
                • Modifies registry class
                • Suspicious use of WriteProcessMemory
                PID:1824
                • C:\Windows\SysWOW64\Dmllipeg.exe
                  C:\Windows\system32\Dmllipeg.exe
                  8⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  PID:3340
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 3340 -s 396
                    9⤵
                    • Program crash
                    PID:3604
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 3340 -ip 3340
    1⤵
      PID:1440

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\SysWOW64\Danecp32.exe

      Filesize

      318KB

      MD5

      6d0d82ff57ad6b3266c21e3265368bca

      SHA1

      b85396fd0533773271796831bd965c28af257a86

      SHA256

      7c3259e1d73cd3dcdc50420e2eb8b315bae002796b6ad66f374c24058e742a1b

      SHA512

      052ad2d4b9f2038ce46c66361cf4232484f32102db5d472ca1285e8d627635f890ccbfd3ca6f9396164c29df0a5cbb214f0ed22df9619090e0311c884791b7da

    • C:\Windows\SysWOW64\Deokon32.exe

      Filesize

      318KB

      MD5

      b462c067cacc34f1437975fd6ab9e62c

      SHA1

      511ea25f298b11533c26874bbad693774807d79f

      SHA256

      8efc1d77074b589796da45b0d61508152052bee0ce41da66c86a6c3730f37c63

      SHA512

      949dd5529f637b43d8abb2345cf14a208e6cc96adb8c84daebf1d45571f262f8bd8f20dc9701ea506e1cae2c7a39ce8319e7fcb843ba77986862a13a9712d6e8

    • C:\Windows\SysWOW64\Dfnjafap.exe

      Filesize

      318KB

      MD5

      bd5de214fb0f05661b9da05f663fe4b4

      SHA1

      55fb31892d388d6fcd59fe7a3dbf9f3d3b86ccaa

      SHA256

      a73fc31b3220e81757e155403c17912ca878260362dba6142b5e1a2a29b35687

      SHA512

      3dda2e50e0c544a4937d6192b58e515bbacd622416f84ddb84be7129bc141150159f2dc6bedf8f3071aa1023e2996ac1933b42f893db57374b8e42e08f278f93

    • C:\Windows\SysWOW64\Dhfajjoj.exe

      Filesize

      318KB

      MD5

      e4c7ef3914efd807ea23e72812c8b589

      SHA1

      09d27676182e94b85af35e0306ffa9e399a41b03

      SHA256

      5f3da297840c5e00d05a8ba4e353ec3c5a6cae073aaccd64badaf412dd1fa058

      SHA512

      27821f85ea524f20a5e49f4dd4c613b6ed43ed5a395491c3b041e921148abd4b840024bed491a4ff2fac680ea7cf11625ccfca9e7d64af765528999cc340b7ce

    • C:\Windows\SysWOW64\Dknpmdfc.exe

      Filesize

      318KB

      MD5

      fd5c3202fd337ca079f405c61554d935

      SHA1

      06ffff3c8c76c81cd2fd53c58675a7342931f914

      SHA256

      b4a1cd75e23d240643c555cb02147e487e45dbf186fd1cef879edc070d954465

      SHA512

      d70f531c0b6fa42bcfcc8c65e0db94b99acfb66b663b9603bebc88baf04933e43d7c6d66435b2d01f7a557ef77a9a74b673508f6b151a88709cbf4f4fc33e109

    • C:\Windows\SysWOW64\Dmllipeg.exe

      Filesize

      318KB

      MD5

      c68162bf50ec9092a1b0fc540649025a

      SHA1

      51143042399668f255eb5c6ae8d339d806e20cb8

      SHA256

      9cc208714f96c4920dbaf340dcf7abae61ee5facfd806212c2289f8379be2839

      SHA512

      79d13dec4cc5c045aeae0a7e50794b58ab8a7f86e51710a626dfe450a85a013ef7a82bb4aa1b06f489e9695db5f2862123314c78d2990533ab6c83b88c787d60

    • C:\Windows\SysWOW64\Dopigd32.exe

      Filesize

      318KB

      MD5

      43e78b760df2aa36cade9cfb8e16199a

      SHA1

      20152ce822db6ab25401d2b5c48807b1453db7d6

      SHA256

      6a8fd2b484c5d7602f64f0cb374f66c6b29fa49de2e510078069d42586bd9ed0

      SHA512

      5cf0ee6b9f4222e4b551fd3dd99e3f52731ed8ed2ea60ddd1c1f8a2a7b7af3ec43142bc75215dad65840e251581c8f11538f3451c5b769e4812a42f7856ebbf9

    • memory/1824-60-0x0000000000400000-0x0000000000479000-memory.dmp

      Filesize

      484KB

    • memory/1824-48-0x0000000000400000-0x0000000000479000-memory.dmp

      Filesize

      484KB

    • memory/1912-8-0x0000000000400000-0x0000000000479000-memory.dmp

      Filesize

      484KB

    • memory/1912-70-0x0000000000400000-0x0000000000479000-memory.dmp

      Filesize

      484KB

    • memory/1944-68-0x0000000000400000-0x0000000000479000-memory.dmp

      Filesize

      484KB

    • memory/1944-20-0x0000000000400000-0x0000000000479000-memory.dmp

      Filesize

      484KB

    • memory/2668-40-0x0000000000400000-0x0000000000479000-memory.dmp

      Filesize

      484KB

    • memory/2668-62-0x0000000000400000-0x0000000000479000-memory.dmp

      Filesize

      484KB

    • memory/3340-55-0x0000000000400000-0x0000000000479000-memory.dmp

      Filesize

      484KB

    • memory/3340-59-0x0000000000400000-0x0000000000479000-memory.dmp

      Filesize

      484KB

    • memory/3396-23-0x0000000000400000-0x0000000000479000-memory.dmp

      Filesize

      484KB

    • memory/3396-66-0x0000000000400000-0x0000000000479000-memory.dmp

      Filesize

      484KB

    • memory/4704-0-0x0000000000400000-0x0000000000479000-memory.dmp

      Filesize

      484KB

    • memory/4704-72-0x0000000000400000-0x0000000000479000-memory.dmp

      Filesize

      484KB

    • memory/4808-36-0x0000000000400000-0x0000000000479000-memory.dmp

      Filesize

      484KB

    • memory/4808-64-0x0000000000400000-0x0000000000479000-memory.dmp

      Filesize

      484KB