Analysis
-
max time kernel
96s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30-09-2024 13:52
Static task
static1
Behavioral task
behavioral1
Sample
13473833d4c6da2891aec651638157a6560fe266b9ca3ee62579b1599c516df6N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
13473833d4c6da2891aec651638157a6560fe266b9ca3ee62579b1599c516df6N.exe
Resource
win10v2004-20240802-en
General
-
Target
13473833d4c6da2891aec651638157a6560fe266b9ca3ee62579b1599c516df6N.exe
-
Size
128KB
-
MD5
9b8632e5517597234b84333bd3ae91b0
-
SHA1
4515c612495d933f55426fa95a37e9384b111f4e
-
SHA256
13473833d4c6da2891aec651638157a6560fe266b9ca3ee62579b1599c516df6
-
SHA512
1a2e56976bd1e48fb84f8531e4d91e6cecf86328528d6f7709a10a7e502dd502edcad40a7e72d43dd18321340480aac22cc3c00b69001272446c8fb343a7f15b
-
SSDEEP
3072:ZesZ6Z0IVD6vK4VlbeA27DxSvITW/cbFGS9n:wsq0I4vvXiAChCw9n
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 14 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dhocqigp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 13473833d4c6da2891aec651638157a6560fe266b9ca3ee62579b1599c516df6N.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Daconoae.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Daconoae.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dkkcge32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" 13473833d4c6da2891aec651638157a6560fe266b9ca3ee62579b1599c516df6N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Dfnjafap.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Dmjocp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Dhocqigp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ddakjkqi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ddakjkqi.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dfnjafap.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Dkkcge32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dmjocp32.exe -
Executes dropped EXE 7 IoCs
pid Process 3260 Dfnjafap.exe 4812 Daconoae.exe 4480 Ddakjkqi.exe 3820 Dkkcge32.exe 2940 Dmjocp32.exe 2684 Dhocqigp.exe 4772 Dmllipeg.exe -
Drops file in System32 directory 21 IoCs
description ioc Process File created C:\Windows\SysWOW64\Dmjocp32.exe Dkkcge32.exe File created C:\Windows\SysWOW64\Dmllipeg.exe Dhocqigp.exe File opened for modification C:\Windows\SysWOW64\Dfnjafap.exe 13473833d4c6da2891aec651638157a6560fe266b9ca3ee62579b1599c516df6N.exe File created C:\Windows\SysWOW64\Gifhkeje.dll Daconoae.exe File opened for modification C:\Windows\SysWOW64\Ddakjkqi.exe Daconoae.exe File created C:\Windows\SysWOW64\Dkkcge32.exe Ddakjkqi.exe File opened for modification C:\Windows\SysWOW64\Daconoae.exe Dfnjafap.exe File created C:\Windows\SysWOW64\Ddakjkqi.exe Daconoae.exe File created C:\Windows\SysWOW64\Jcbdhp32.dll Ddakjkqi.exe File created C:\Windows\SysWOW64\Dhocqigp.exe Dmjocp32.exe File opened for modification C:\Windows\SysWOW64\Dhocqigp.exe Dmjocp32.exe File created C:\Windows\SysWOW64\Kngpec32.dll Dhocqigp.exe File created C:\Windows\SysWOW64\Daconoae.exe Dfnjafap.exe File opened for modification C:\Windows\SysWOW64\Dkkcge32.exe Ddakjkqi.exe File created C:\Windows\SysWOW64\Oammoc32.dll Dfnjafap.exe File opened for modification C:\Windows\SysWOW64\Dmjocp32.exe Dkkcge32.exe File created C:\Windows\SysWOW64\Bobiobnp.dll Dkkcge32.exe File created C:\Windows\SysWOW64\Elkadb32.dll Dmjocp32.exe File opened for modification C:\Windows\SysWOW64\Dmllipeg.exe Dhocqigp.exe File created C:\Windows\SysWOW64\Dfnjafap.exe 13473833d4c6da2891aec651638157a6560fe266b9ca3ee62579b1599c516df6N.exe File created C:\Windows\SysWOW64\Poahbe32.dll 13473833d4c6da2891aec651638157a6560fe266b9ca3ee62579b1599c516df6N.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3676 4772 WerFault.exe 88 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Daconoae.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ddakjkqi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dkkcge32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dmjocp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dhocqigp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dmllipeg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 13473833d4c6da2891aec651638157a6560fe266b9ca3ee62579b1599c516df6N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dfnjafap.exe -
Modifies registry class 24 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID 13473833d4c6da2891aec651638157a6560fe266b9ca3ee62579b1599c516df6N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Poahbe32.dll" 13473833d4c6da2891aec651638157a6560fe266b9ca3ee62579b1599c516df6N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Dkkcge32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Elkadb32.dll" Dmjocp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 13473833d4c6da2891aec651638157a6560fe266b9ca3ee62579b1599c516df6N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node 13473833d4c6da2891aec651638157a6560fe266b9ca3ee62579b1599c516df6N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bobiobnp.dll" Dkkcge32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Dkkcge32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Dhocqigp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kngpec32.dll" Dhocqigp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Dfnjafap.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oammoc32.dll" Dfnjafap.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Ddakjkqi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Ddakjkqi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Dmjocp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Dhocqigp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Daconoae.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gifhkeje.dll" Daconoae.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Dfnjafap.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Daconoae.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jcbdhp32.dll" Ddakjkqi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Dmjocp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831} 13473833d4c6da2891aec651638157a6560fe266b9ca3ee62579b1599c516df6N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" 13473833d4c6da2891aec651638157a6560fe266b9ca3ee62579b1599c516df6N.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 3836 wrote to memory of 3260 3836 13473833d4c6da2891aec651638157a6560fe266b9ca3ee62579b1599c516df6N.exe 82 PID 3836 wrote to memory of 3260 3836 13473833d4c6da2891aec651638157a6560fe266b9ca3ee62579b1599c516df6N.exe 82 PID 3836 wrote to memory of 3260 3836 13473833d4c6da2891aec651638157a6560fe266b9ca3ee62579b1599c516df6N.exe 82 PID 3260 wrote to memory of 4812 3260 Dfnjafap.exe 83 PID 3260 wrote to memory of 4812 3260 Dfnjafap.exe 83 PID 3260 wrote to memory of 4812 3260 Dfnjafap.exe 83 PID 4812 wrote to memory of 4480 4812 Daconoae.exe 84 PID 4812 wrote to memory of 4480 4812 Daconoae.exe 84 PID 4812 wrote to memory of 4480 4812 Daconoae.exe 84 PID 4480 wrote to memory of 3820 4480 Ddakjkqi.exe 85 PID 4480 wrote to memory of 3820 4480 Ddakjkqi.exe 85 PID 4480 wrote to memory of 3820 4480 Ddakjkqi.exe 85 PID 3820 wrote to memory of 2940 3820 Dkkcge32.exe 86 PID 3820 wrote to memory of 2940 3820 Dkkcge32.exe 86 PID 3820 wrote to memory of 2940 3820 Dkkcge32.exe 86 PID 2940 wrote to memory of 2684 2940 Dmjocp32.exe 87 PID 2940 wrote to memory of 2684 2940 Dmjocp32.exe 87 PID 2940 wrote to memory of 2684 2940 Dmjocp32.exe 87 PID 2684 wrote to memory of 4772 2684 Dhocqigp.exe 88 PID 2684 wrote to memory of 4772 2684 Dhocqigp.exe 88 PID 2684 wrote to memory of 4772 2684 Dhocqigp.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\13473833d4c6da2891aec651638157a6560fe266b9ca3ee62579b1599c516df6N.exe"C:\Users\Admin\AppData\Local\Temp\13473833d4c6da2891aec651638157a6560fe266b9ca3ee62579b1599c516df6N.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3836 -
C:\Windows\SysWOW64\Dfnjafap.exeC:\Windows\system32\Dfnjafap.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3260 -
C:\Windows\SysWOW64\Daconoae.exeC:\Windows\system32\Daconoae.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Windows\SysWOW64\Ddakjkqi.exeC:\Windows\system32\Ddakjkqi.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Windows\SysWOW64\Dkkcge32.exeC:\Windows\system32\Dkkcge32.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3820 -
C:\Windows\SysWOW64\Dmjocp32.exeC:\Windows\system32\Dmjocp32.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Windows\SysWOW64\Dhocqigp.exeC:\Windows\system32\Dhocqigp.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\SysWOW64\Dmllipeg.exeC:\Windows\system32\Dmllipeg.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4772 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4772 -s 4129⤵
- Program crash
PID:3676
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4772 -ip 47721⤵PID:4872
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7KB
MD51163e93fe0f4b194c5b7358549142d21
SHA1b7bd9900e147fb103986d582207ddb38d1d9647c
SHA2569bd42a59d53bbd763f7fd7e656f95d05b891e60e7333b1d8c14b411fbaf44bac
SHA51201192aeb49340260aa973d3e76dfe2e8d701878f6237053df944ff8d85eefd58d009b7401763c5c3c8bdfcbca011ca77e96651edfeca42a7eb4ced0a200e5f1f
-
Filesize
128KB
MD50c5f1322603d47c1746da8de8f73002d
SHA11bd4a6a545e69ff906ccb0855b04785c1038e43c
SHA256a1d0599a972c2788c432c037b5bbf3b005d0b30d0d2424f63d7da19415d3205e
SHA512380a1e86aef3932fdab1e53f33853b47815317d14599b4541c9fd600e3f57a9e11db83653b63cb503cdfc71fb0ec482346a28ce295027bf207f01feea20058ee
-
Filesize
128KB
MD551a30e5a2dad2bcbe3961fa69451e3ab
SHA124c051ce14167934af579491eee80a7dfc589a23
SHA256570e9b2dcaee65bd22c6eca4a335af817f008aa5f63b029c50f8d587248dded6
SHA512d23225c11b3c6768c570803a687045a7c6b58ac296388c15fdff480b40378cccf35b20b339ca70bd2705f91efe66f55db71b35c71fa592ec714e1b1b9e1d0f7a
-
Filesize
128KB
MD553c91c305123658f81e7c3ae79fc2d8a
SHA11d906c1c79b23979fdda0b3a06cad05b87ced34f
SHA256806250fcbd1844c4e7bb6ed101a7afbe80840c606e67504b7d560aa584641d56
SHA512ebb7047fba0b3e1e32206a727ade669d4b1cbf0467f1b2d147caad50dd3dd36f2352951102eddb3d540d3583cf2868d02dd1f7a7a69f603f7d516cb60acd1e9f
-
Filesize
128KB
MD5c5f83b1af60a8324249a1dce121e36c6
SHA1880ede1972e3b25d3ffb48c4519c52524694991e
SHA256dd7606d4db9c6076d2b3de4ede7339f5acfaec14803b41a2ef3c540bada87b75
SHA512121d68d9de166c784c2572843b093da027315f71b6ca8846121c2fbf5e2bc972d3915d6260a0e81ac2df5ce2be6f7134e9b9c30fe3c05d9f73e72b4a1bb35394
-
Filesize
128KB
MD582c0029734387436330b87a97bcf11aa
SHA152c6fc9a5b596d95dfe54e5880b14b5816d65a5b
SHA256c4a25eefab0ff60cb2228450e658679f88a0a1b9d865b1cb3c00b1123cd51d4b
SHA5124b7897d066ebe5730e8536ec9733f32f0e054e9ca13bbf3e64f1d72466432ba43691fa5ef3a9baf31ef69977b79844a8d6a208a78e795dfecc5e5f7d9d57119d
-
Filesize
128KB
MD511fe7f012929c84395af792b69807503
SHA1f833262087f7f767f4345aeda22ea61d82e64b92
SHA256cd3f397df1f0df60ca91564ca4026298da20afa2682e7061d759622660ca181e
SHA512b19c8ccceab6787c52b38e299200dda5b7c50dc621ae2f54ecab2d16101e3359cd08f04c2bee0e4177ca1974736ca821164d459d81f969031a71d2d72f440e84
-
Filesize
128KB
MD5fac4f1ebd9b383b8113d98a4b89e2b2b
SHA1581dff83a8d604fe1a183e38ee351c6da73cd373
SHA256a9b174e15c3fa3efe7cba65da4a9846f7868bd3496ede610f18b32585e86c1d0
SHA51227b3fc6ad42d4762a79598b1f5133aab69511dcf9c263cc87712bfd7584c72c3a856d4be959b5a4d96fa9019822267f6e56c6383de94621c38ea033f2ce37c29