Analysis
-
max time kernel
94s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20-09-2024 18:10
Static task
static1
Behavioral task
behavioral1
Sample
06abda1bb6cab8d0214f29a18df452f5d73f7754d05dfc227515db420cfc1b03.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
06abda1bb6cab8d0214f29a18df452f5d73f7754d05dfc227515db420cfc1b03.exe
Resource
win10v2004-20240802-en
General
-
Target
06abda1bb6cab8d0214f29a18df452f5d73f7754d05dfc227515db420cfc1b03.exe
-
Size
318KB
-
MD5
b44cad34e23f72dabe7ff2b96a366f46
-
SHA1
80a5e213474c0f78906fa6917d506120460b4bc6
-
SHA256
06abda1bb6cab8d0214f29a18df452f5d73f7754d05dfc227515db420cfc1b03
-
SHA512
090b168f5f4fd2761d1f1a0427b7542093fb1cfaae2becc5607f22921bd544ff138a6911894d19b583058c92053044fc56a8fed0fb8d9a6f0a3896ed5196fecd
-
SSDEEP
6144:2N/JZhRVEQHdMcm4FmowdHoS7c5cm4FmowdHoSrNF9xRVEQHd4:2NxHO4wFHoS04wFHoSrZx8
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 14 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dhfajjoj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Danecp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dfnjafap.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Deokon32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 06abda1bb6cab8d0214f29a18df452f5d73f7754d05dfc227515db420cfc1b03.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dopigd32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dfnjafap.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dknpmdfc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" 06abda1bb6cab8d0214f29a18df452f5d73f7754d05dfc227515db420cfc1b03.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dhfajjoj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dopigd32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Danecp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Deokon32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dknpmdfc.exe -
Executes dropped EXE 7 IoCs
pid Process 1912 Dhfajjoj.exe 1944 Dopigd32.exe 3396 Danecp32.exe 4808 Dfnjafap.exe 2668 Deokon32.exe 1824 Dknpmdfc.exe 3340 Dmllipeg.exe -
Drops file in System32 directory 21 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Dmllipeg.exe Dknpmdfc.exe File created C:\Windows\SysWOW64\Dhfajjoj.exe 06abda1bb6cab8d0214f29a18df452f5d73f7754d05dfc227515db420cfc1b03.exe File created C:\Windows\SysWOW64\Eokchkmi.dll 06abda1bb6cab8d0214f29a18df452f5d73f7754d05dfc227515db420cfc1b03.exe File created C:\Windows\SysWOW64\Nokpao32.dll Deokon32.exe File created C:\Windows\SysWOW64\Danecp32.exe Dopigd32.exe File opened for modification C:\Windows\SysWOW64\Danecp32.exe Dopigd32.exe File created C:\Windows\SysWOW64\Kngpec32.dll Dknpmdfc.exe File created C:\Windows\SysWOW64\Poahbe32.dll Danecp32.exe File opened for modification C:\Windows\SysWOW64\Deokon32.exe Dfnjafap.exe File created C:\Windows\SysWOW64\Dmllipeg.exe Dknpmdfc.exe File created C:\Windows\SysWOW64\Hcjccj32.dll Dhfajjoj.exe File created C:\Windows\SysWOW64\Agjbpg32.dll Dopigd32.exe File created C:\Windows\SysWOW64\Dfnjafap.exe Danecp32.exe File opened for modification C:\Windows\SysWOW64\Dfnjafap.exe Danecp32.exe File created C:\Windows\SysWOW64\Deokon32.exe Dfnjafap.exe File created C:\Windows\SysWOW64\Amfoeb32.dll Dfnjafap.exe File created C:\Windows\SysWOW64\Dknpmdfc.exe Deokon32.exe File opened for modification C:\Windows\SysWOW64\Dknpmdfc.exe Deokon32.exe File opened for modification C:\Windows\SysWOW64\Dhfajjoj.exe 06abda1bb6cab8d0214f29a18df452f5d73f7754d05dfc227515db420cfc1b03.exe File created C:\Windows\SysWOW64\Dopigd32.exe Dhfajjoj.exe File opened for modification C:\Windows\SysWOW64\Dopigd32.exe Dhfajjoj.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3604 3340 WerFault.exe 88 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dmllipeg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 06abda1bb6cab8d0214f29a18df452f5d73f7754d05dfc227515db420cfc1b03.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dhfajjoj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dopigd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Danecp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dfnjafap.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Deokon32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dknpmdfc.exe -
Modifies registry class 24 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dfnjafap.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hcjccj32.dll" Dhfajjoj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Danecp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Poahbe32.dll" Danecp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Agjbpg32.dll" Dopigd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Danecp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Amfoeb32.dll" Dfnjafap.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nokpao32.dll" Deokon32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dknpmdfc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 06abda1bb6cab8d0214f29a18df452f5d73f7754d05dfc227515db420cfc1b03.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node 06abda1bb6cab8d0214f29a18df452f5d73f7754d05dfc227515db420cfc1b03.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dhfajjoj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kngpec32.dll" Dknpmdfc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dknpmdfc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eokchkmi.dll" 06abda1bb6cab8d0214f29a18df452f5d73f7754d05dfc227515db420cfc1b03.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" 06abda1bb6cab8d0214f29a18df452f5d73f7754d05dfc227515db420cfc1b03.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dhfajjoj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dopigd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dfnjafap.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Deokon32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Deokon32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID 06abda1bb6cab8d0214f29a18df452f5d73f7754d05dfc227515db420cfc1b03.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} 06abda1bb6cab8d0214f29a18df452f5d73f7754d05dfc227515db420cfc1b03.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dopigd32.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 4704 wrote to memory of 1912 4704 06abda1bb6cab8d0214f29a18df452f5d73f7754d05dfc227515db420cfc1b03.exe 82 PID 4704 wrote to memory of 1912 4704 06abda1bb6cab8d0214f29a18df452f5d73f7754d05dfc227515db420cfc1b03.exe 82 PID 4704 wrote to memory of 1912 4704 06abda1bb6cab8d0214f29a18df452f5d73f7754d05dfc227515db420cfc1b03.exe 82 PID 1912 wrote to memory of 1944 1912 Dhfajjoj.exe 83 PID 1912 wrote to memory of 1944 1912 Dhfajjoj.exe 83 PID 1912 wrote to memory of 1944 1912 Dhfajjoj.exe 83 PID 1944 wrote to memory of 3396 1944 Dopigd32.exe 84 PID 1944 wrote to memory of 3396 1944 Dopigd32.exe 84 PID 1944 wrote to memory of 3396 1944 Dopigd32.exe 84 PID 3396 wrote to memory of 4808 3396 Danecp32.exe 85 PID 3396 wrote to memory of 4808 3396 Danecp32.exe 85 PID 3396 wrote to memory of 4808 3396 Danecp32.exe 85 PID 4808 wrote to memory of 2668 4808 Dfnjafap.exe 86 PID 4808 wrote to memory of 2668 4808 Dfnjafap.exe 86 PID 4808 wrote to memory of 2668 4808 Dfnjafap.exe 86 PID 2668 wrote to memory of 1824 2668 Deokon32.exe 87 PID 2668 wrote to memory of 1824 2668 Deokon32.exe 87 PID 2668 wrote to memory of 1824 2668 Deokon32.exe 87 PID 1824 wrote to memory of 3340 1824 Dknpmdfc.exe 88 PID 1824 wrote to memory of 3340 1824 Dknpmdfc.exe 88 PID 1824 wrote to memory of 3340 1824 Dknpmdfc.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\06abda1bb6cab8d0214f29a18df452f5d73f7754d05dfc227515db420cfc1b03.exe"C:\Users\Admin\AppData\Local\Temp\06abda1bb6cab8d0214f29a18df452f5d73f7754d05dfc227515db420cfc1b03.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4704 -
C:\Windows\SysWOW64\Dhfajjoj.exeC:\Windows\system32\Dhfajjoj.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Windows\SysWOW64\Dopigd32.exeC:\Windows\system32\Dopigd32.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Windows\SysWOW64\Danecp32.exeC:\Windows\system32\Danecp32.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3396 -
C:\Windows\SysWOW64\Dfnjafap.exeC:\Windows\system32\Dfnjafap.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Windows\SysWOW64\Deokon32.exeC:\Windows\system32\Deokon32.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\SysWOW64\Dknpmdfc.exeC:\Windows\system32\Dknpmdfc.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Windows\SysWOW64\Dmllipeg.exeC:\Windows\system32\Dmllipeg.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3340 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3340 -s 3969⤵
- Program crash
PID:3604
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 3340 -ip 33401⤵PID:1440
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
318KB
MD56d0d82ff57ad6b3266c21e3265368bca
SHA1b85396fd0533773271796831bd965c28af257a86
SHA2567c3259e1d73cd3dcdc50420e2eb8b315bae002796b6ad66f374c24058e742a1b
SHA512052ad2d4b9f2038ce46c66361cf4232484f32102db5d472ca1285e8d627635f890ccbfd3ca6f9396164c29df0a5cbb214f0ed22df9619090e0311c884791b7da
-
Filesize
318KB
MD5b462c067cacc34f1437975fd6ab9e62c
SHA1511ea25f298b11533c26874bbad693774807d79f
SHA2568efc1d77074b589796da45b0d61508152052bee0ce41da66c86a6c3730f37c63
SHA512949dd5529f637b43d8abb2345cf14a208e6cc96adb8c84daebf1d45571f262f8bd8f20dc9701ea506e1cae2c7a39ce8319e7fcb843ba77986862a13a9712d6e8
-
Filesize
318KB
MD5bd5de214fb0f05661b9da05f663fe4b4
SHA155fb31892d388d6fcd59fe7a3dbf9f3d3b86ccaa
SHA256a73fc31b3220e81757e155403c17912ca878260362dba6142b5e1a2a29b35687
SHA5123dda2e50e0c544a4937d6192b58e515bbacd622416f84ddb84be7129bc141150159f2dc6bedf8f3071aa1023e2996ac1933b42f893db57374b8e42e08f278f93
-
Filesize
318KB
MD5e4c7ef3914efd807ea23e72812c8b589
SHA109d27676182e94b85af35e0306ffa9e399a41b03
SHA2565f3da297840c5e00d05a8ba4e353ec3c5a6cae073aaccd64badaf412dd1fa058
SHA51227821f85ea524f20a5e49f4dd4c613b6ed43ed5a395491c3b041e921148abd4b840024bed491a4ff2fac680ea7cf11625ccfca9e7d64af765528999cc340b7ce
-
Filesize
318KB
MD5fd5c3202fd337ca079f405c61554d935
SHA106ffff3c8c76c81cd2fd53c58675a7342931f914
SHA256b4a1cd75e23d240643c555cb02147e487e45dbf186fd1cef879edc070d954465
SHA512d70f531c0b6fa42bcfcc8c65e0db94b99acfb66b663b9603bebc88baf04933e43d7c6d66435b2d01f7a557ef77a9a74b673508f6b151a88709cbf4f4fc33e109
-
Filesize
318KB
MD5c68162bf50ec9092a1b0fc540649025a
SHA151143042399668f255eb5c6ae8d339d806e20cb8
SHA2569cc208714f96c4920dbaf340dcf7abae61ee5facfd806212c2289f8379be2839
SHA51279d13dec4cc5c045aeae0a7e50794b58ab8a7f86e51710a626dfe450a85a013ef7a82bb4aa1b06f489e9695db5f2862123314c78d2990533ab6c83b88c787d60
-
Filesize
318KB
MD543e78b760df2aa36cade9cfb8e16199a
SHA120152ce822db6ab25401d2b5c48807b1453db7d6
SHA2566a8fd2b484c5d7602f64f0cb374f66c6b29fa49de2e510078069d42586bd9ed0
SHA5125cf0ee6b9f4222e4b551fd3dd99e3f52731ed8ed2ea60ddd1c1f8a2a7b7af3ec43142bc75215dad65840e251581c8f11538f3451c5b769e4812a42f7856ebbf9