Analysis

  • max time kernel
    96s
  • max time network
    97s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-09-2024 13:52

General

  • Target

    13473833d4c6da2891aec651638157a6560fe266b9ca3ee62579b1599c516df6N.exe

  • Size

    128KB

  • MD5

    9b8632e5517597234b84333bd3ae91b0

  • SHA1

    4515c612495d933f55426fa95a37e9384b111f4e

  • SHA256

    13473833d4c6da2891aec651638157a6560fe266b9ca3ee62579b1599c516df6

  • SHA512

    1a2e56976bd1e48fb84f8531e4d91e6cecf86328528d6f7709a10a7e502dd502edcad40a7e72d43dd18321340480aac22cc3c00b69001272446c8fb343a7f15b

  • SSDEEP

    3072:ZesZ6Z0IVD6vK4VlbeA27DxSvITW/cbFGS9n:wsq0I4vvXiAChCw9n

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 14 IoCs
  • Executes dropped EXE 7 IoCs
  • Drops file in System32 directory 21 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 24 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\13473833d4c6da2891aec651638157a6560fe266b9ca3ee62579b1599c516df6N.exe
    "C:\Users\Admin\AppData\Local\Temp\13473833d4c6da2891aec651638157a6560fe266b9ca3ee62579b1599c516df6N.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3836
    • C:\Windows\SysWOW64\Dfnjafap.exe
      C:\Windows\system32\Dfnjafap.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:3260
      • C:\Windows\SysWOW64\Daconoae.exe
        C:\Windows\system32\Daconoae.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:4812
        • C:\Windows\SysWOW64\Ddakjkqi.exe
          C:\Windows\system32\Ddakjkqi.exe
          4⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:4480
          • C:\Windows\SysWOW64\Dkkcge32.exe
            C:\Windows\system32\Dkkcge32.exe
            5⤵
            • Adds autorun key to be loaded by Explorer.exe on startup
            • Executes dropped EXE
            • Drops file in System32 directory
            • System Location Discovery: System Language Discovery
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:3820
            • C:\Windows\SysWOW64\Dmjocp32.exe
              C:\Windows\system32\Dmjocp32.exe
              6⤵
              • Adds autorun key to be loaded by Explorer.exe on startup
              • Executes dropped EXE
              • Drops file in System32 directory
              • System Location Discovery: System Language Discovery
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:2940
              • C:\Windows\SysWOW64\Dhocqigp.exe
                C:\Windows\system32\Dhocqigp.exe
                7⤵
                • Adds autorun key to be loaded by Explorer.exe on startup
                • Executes dropped EXE
                • Drops file in System32 directory
                • System Location Discovery: System Language Discovery
                • Modifies registry class
                • Suspicious use of WriteProcessMemory
                PID:2684
                • C:\Windows\SysWOW64\Dmllipeg.exe
                  C:\Windows\system32\Dmllipeg.exe
                  8⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  PID:4772
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 4772 -s 412
                    9⤵
                    • Program crash
                    PID:3676
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4772 -ip 4772
    1⤵
      PID:4872

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\SysWOW64\Bobiobnp.dll

      Filesize

      7KB

      MD5

      1163e93fe0f4b194c5b7358549142d21

      SHA1

      b7bd9900e147fb103986d582207ddb38d1d9647c

      SHA256

      9bd42a59d53bbd763f7fd7e656f95d05b891e60e7333b1d8c14b411fbaf44bac

      SHA512

      01192aeb49340260aa973d3e76dfe2e8d701878f6237053df944ff8d85eefd58d009b7401763c5c3c8bdfcbca011ca77e96651edfeca42a7eb4ced0a200e5f1f

    • C:\Windows\SysWOW64\Daconoae.exe

      Filesize

      128KB

      MD5

      0c5f1322603d47c1746da8de8f73002d

      SHA1

      1bd4a6a545e69ff906ccb0855b04785c1038e43c

      SHA256

      a1d0599a972c2788c432c037b5bbf3b005d0b30d0d2424f63d7da19415d3205e

      SHA512

      380a1e86aef3932fdab1e53f33853b47815317d14599b4541c9fd600e3f57a9e11db83653b63cb503cdfc71fb0ec482346a28ce295027bf207f01feea20058ee

    • C:\Windows\SysWOW64\Ddakjkqi.exe

      Filesize

      128KB

      MD5

      51a30e5a2dad2bcbe3961fa69451e3ab

      SHA1

      24c051ce14167934af579491eee80a7dfc589a23

      SHA256

      570e9b2dcaee65bd22c6eca4a335af817f008aa5f63b029c50f8d587248dded6

      SHA512

      d23225c11b3c6768c570803a687045a7c6b58ac296388c15fdff480b40378cccf35b20b339ca70bd2705f91efe66f55db71b35c71fa592ec714e1b1b9e1d0f7a

    • C:\Windows\SysWOW64\Dfnjafap.exe

      Filesize

      128KB

      MD5

      53c91c305123658f81e7c3ae79fc2d8a

      SHA1

      1d906c1c79b23979fdda0b3a06cad05b87ced34f

      SHA256

      806250fcbd1844c4e7bb6ed101a7afbe80840c606e67504b7d560aa584641d56

      SHA512

      ebb7047fba0b3e1e32206a727ade669d4b1cbf0467f1b2d147caad50dd3dd36f2352951102eddb3d540d3583cf2868d02dd1f7a7a69f603f7d516cb60acd1e9f

    • C:\Windows\SysWOW64\Dhocqigp.exe

      Filesize

      128KB

      MD5

      c5f83b1af60a8324249a1dce121e36c6

      SHA1

      880ede1972e3b25d3ffb48c4519c52524694991e

      SHA256

      dd7606d4db9c6076d2b3de4ede7339f5acfaec14803b41a2ef3c540bada87b75

      SHA512

      121d68d9de166c784c2572843b093da027315f71b6ca8846121c2fbf5e2bc972d3915d6260a0e81ac2df5ce2be6f7134e9b9c30fe3c05d9f73e72b4a1bb35394

    • C:\Windows\SysWOW64\Dkkcge32.exe

      Filesize

      128KB

      MD5

      82c0029734387436330b87a97bcf11aa

      SHA1

      52c6fc9a5b596d95dfe54e5880b14b5816d65a5b

      SHA256

      c4a25eefab0ff60cb2228450e658679f88a0a1b9d865b1cb3c00b1123cd51d4b

      SHA512

      4b7897d066ebe5730e8536ec9733f32f0e054e9ca13bbf3e64f1d72466432ba43691fa5ef3a9baf31ef69977b79844a8d6a208a78e795dfecc5e5f7d9d57119d

    • C:\Windows\SysWOW64\Dmjocp32.exe

      Filesize

      128KB

      MD5

      11fe7f012929c84395af792b69807503

      SHA1

      f833262087f7f767f4345aeda22ea61d82e64b92

      SHA256

      cd3f397df1f0df60ca91564ca4026298da20afa2682e7061d759622660ca181e

      SHA512

      b19c8ccceab6787c52b38e299200dda5b7c50dc621ae2f54ecab2d16101e3359cd08f04c2bee0e4177ca1974736ca821164d459d81f969031a71d2d72f440e84

    • C:\Windows\SysWOW64\Dmllipeg.exe

      Filesize

      128KB

      MD5

      fac4f1ebd9b383b8113d98a4b89e2b2b

      SHA1

      581dff83a8d604fe1a183e38ee351c6da73cd373

      SHA256

      a9b174e15c3fa3efe7cba65da4a9846f7868bd3496ede610f18b32585e86c1d0

      SHA512

      27b3fc6ad42d4762a79598b1f5133aab69511dcf9c263cc87712bfd7584c72c3a856d4be959b5a4d96fa9019822267f6e56c6383de94621c38ea033f2ce37c29

    • memory/2684-58-0x0000000000400000-0x000000000043C000-memory.dmp

      Filesize

      240KB

    • memory/2684-47-0x0000000000400000-0x000000000043C000-memory.dmp

      Filesize

      240KB

    • memory/2940-59-0x0000000000400000-0x000000000043C000-memory.dmp

      Filesize

      240KB

    • memory/2940-39-0x0000000000400000-0x000000000043C000-memory.dmp

      Filesize

      240KB

    • memory/3260-7-0x0000000000400000-0x000000000043C000-memory.dmp

      Filesize

      240KB

    • memory/3260-62-0x0000000000400000-0x000000000043C000-memory.dmp

      Filesize

      240KB

    • memory/3820-35-0x0000000000400000-0x000000000043C000-memory.dmp

      Filesize

      240KB

    • memory/3820-60-0x0000000000400000-0x000000000043C000-memory.dmp

      Filesize

      240KB

    • memory/3836-64-0x0000000000400000-0x000000000043C000-memory.dmp

      Filesize

      240KB

    • memory/3836-0-0x0000000000400000-0x000000000043C000-memory.dmp

      Filesize

      240KB

    • memory/4480-63-0x0000000000400000-0x000000000043C000-memory.dmp

      Filesize

      240KB

    • memory/4480-23-0x0000000000400000-0x000000000043C000-memory.dmp

      Filesize

      240KB

    • memory/4772-55-0x0000000000400000-0x000000000043C000-memory.dmp

      Filesize

      240KB

    • memory/4772-57-0x0000000000400000-0x000000000043C000-memory.dmp

      Filesize

      240KB

    • memory/4812-61-0x0000000000400000-0x000000000043C000-memory.dmp

      Filesize

      240KB

    • memory/4812-15-0x0000000000400000-0x000000000043C000-memory.dmp

      Filesize

      240KB