Analysis

  • max time kernel
    92s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/10/2024, 14:32

General

  • Target

    b974c5ddc6dfd0f4885bc1057cd381f91f7cd6a996e51df7617e2f2d07f89782N.exe

  • Size

    350KB

  • MD5

    b631e6f223da2fd90fc4ff20c047d7d0

  • SHA1

    a2d72f1a84a2229a2314bd680544a2063443b762

  • SHA256

    b974c5ddc6dfd0f4885bc1057cd381f91f7cd6a996e51df7617e2f2d07f89782

  • SHA512

    1d860fdb2e589a7ef4dcc1f1085f1ba63f9d6c9d2dcd8ea05dd147965d2f117bbcf0d98396d7aa7c8405ce9b414775c2d0f5784fd49a5bf662811968898971fc

  • SSDEEP

    6144:IDDrFtpHVILifyeYVDcfflXpX6LRifyeYVDc:epHyefyeYCdXpXZfyeY

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 14 IoCs
  • Executes dropped EXE 7 IoCs
  • Drops file in System32 directory 21 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 24 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b974c5ddc6dfd0f4885bc1057cd381f91f7cd6a996e51df7617e2f2d07f89782N.exe
    "C:\Users\Admin\AppData\Local\Temp\b974c5ddc6dfd0f4885bc1057cd381f91f7cd6a996e51df7617e2f2d07f89782N.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2960
    • C:\Windows\SysWOW64\Dhhnpjmh.exe
      C:\Windows\system32\Dhhnpjmh.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2940
      • C:\Windows\SysWOW64\Djgjlelk.exe
        C:\Windows\system32\Djgjlelk.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:4492
        • C:\Windows\SysWOW64\Dkifae32.exe
          C:\Windows\system32\Dkifae32.exe
          4⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:4772
          • C:\Windows\SysWOW64\Ddakjkqi.exe
            C:\Windows\system32\Ddakjkqi.exe
            5⤵
            • Adds autorun key to be loaded by Explorer.exe on startup
            • Executes dropped EXE
            • Drops file in System32 directory
            • System Location Discovery: System Language Discovery
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:1224
            • C:\Windows\SysWOW64\Dogogcpo.exe
              C:\Windows\system32\Dogogcpo.exe
              6⤵
              • Adds autorun key to be loaded by Explorer.exe on startup
              • Executes dropped EXE
              • Drops file in System32 directory
              • System Location Discovery: System Language Discovery
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:3596
              • C:\Windows\SysWOW64\Dhocqigp.exe
                C:\Windows\system32\Dhocqigp.exe
                7⤵
                • Adds autorun key to be loaded by Explorer.exe on startup
                • Executes dropped EXE
                • Drops file in System32 directory
                • System Location Discovery: System Language Discovery
                • Modifies registry class
                • Suspicious use of WriteProcessMemory
                PID:1948
                • C:\Windows\SysWOW64\Dmllipeg.exe
                  C:\Windows\system32\Dmllipeg.exe
                  8⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  PID:1344
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 1344 -s 404
                    9⤵
                    • Program crash
                    PID:2464
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1344 -ip 1344
    1⤵
      PID:4684

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\SysWOW64\Ddakjkqi.exe

      Filesize

      350KB

      MD5

      8d50cdae1fa378cbc4e6b4cd3e013bc6

      SHA1

      011dd4d7d7d7964d902cfbc5e5c56a502ae340e5

      SHA256

      96bc31d8c9fada13ffaf9b2cf49030db5c8a10e17f332fab8db48a2ff059987b

      SHA512

      a26c129cdaf9eb92888885e8f42b0e20bd1e9572ed4d257af2f17202031c40c17cba501da33a4008d91a2d42654fbec6164647de30812c5699d7a35a3985e7b2

    • C:\Windows\SysWOW64\Dhhnpjmh.exe

      Filesize

      350KB

      MD5

      5c50ab0861780efb110af6e27286dfbc

      SHA1

      085785239be89b791b3180fbfded6f179771425e

      SHA256

      dd7d81388c7f3f441b8df7311c0b6355b4b1ced12ce0cba41eb131125d04ce72

      SHA512

      27f455cf3ebfb4a62156baa9b6eec5e36c6d91caa38fe7b8e870da07583dfffe6b25f40981475b2551be7cdf47c894d03e80a8dd8d593788c6291acd967a03d3

    • C:\Windows\SysWOW64\Dhocqigp.exe

      Filesize

      350KB

      MD5

      147cfc8a12b15cbc941968711dbaa5d6

      SHA1

      134fa743cb0ee3469d6d8ab5c1668e3a454cff07

      SHA256

      5db6f0d50db40799db24a10d68fa108c6bba33690fd0599baa8aec38fb063a4a

      SHA512

      e98d4f22629c2c0769063596449f1fa7cecd879fe04f56fba3b347eb250c4eb99a1c463ccc91b11135685bf8e83e78a2ff399c7ed4b98b1fcc9905d62a99792b

    • C:\Windows\SysWOW64\Djgjlelk.exe

      Filesize

      350KB

      MD5

      d5c77851e1c680f11502988c5110d11d

      SHA1

      7409edf49565766cad81fc419bb2a7aaecf21622

      SHA256

      f5e6f909cdc716b8f5098b0195173bdb6b84679978b41cadc6d54ed0ad1e63ef

      SHA512

      aaebf72e67b9a4a4b560dc789efe4d936f1454585088df94268b9ab69606f665eac11214d088816e55de5ace358a96ad74481ea4e4b75c32593b68a289d26f12

    • C:\Windows\SysWOW64\Dkifae32.exe

      Filesize

      350KB

      MD5

      7f3329dc5df14dd30ea49ea49f2f88f9

      SHA1

      9d6a382e30d798d7d73a9b63a68502a6b25eef46

      SHA256

      6c93449bfa64b29a7f7e66db5993046353e0f1c2834423ffdd5ddbbd42ebae06

      SHA512

      9721905a9a4e4313d4d7c0e9833c7f5cc6b40e24bd531fa87012c612b815137614df6cfda074fce8ed34fde2a462517817436a6e7370d7af422708f0419e67de

    • C:\Windows\SysWOW64\Dmllipeg.exe

      Filesize

      350KB

      MD5

      8d1f7b3129fb9d222e573b991e598c93

      SHA1

      22487805907f787f58cdaa0676327248ef372155

      SHA256

      c5c76c7846019d071f2c124900b326a6672c660e416700201fae2a6128c6ffd5

      SHA512

      7ccb39d58fc311667ee2325bc390396640dac35ebb100e9b87989da04c0d91714605794345334d9ee9022d5d05081d0aa707846c2324a2c33d42f2f0080e24a3

    • C:\Windows\SysWOW64\Dogogcpo.exe

      Filesize

      350KB

      MD5

      0298a28744ff407cf8ece5cdb7404939

      SHA1

      aebb5b1533713ad4ab3138b2f1008be1e77ef802

      SHA256

      67e6e5ee1d375b3b8d877dff9f5e2101a5891f7c87e1802c3a327d1b92f790c4

      SHA512

      ed4f3826616f31b77b7a5681073bb8867a46054c007ff78a4e2d08fa24a911bc5cae2d57f6ab223ab36690288498723dfdee982615e03c2e74328e9d79db8d2a

    • memory/1224-65-0x0000000000400000-0x0000000000459000-memory.dmp

      Filesize

      356KB

    • memory/1224-32-0x0000000000400000-0x0000000000459000-memory.dmp

      Filesize

      356KB

    • memory/1344-60-0x0000000000400000-0x0000000000459000-memory.dmp

      Filesize

      356KB

    • memory/1344-56-0x0000000000400000-0x0000000000459000-memory.dmp

      Filesize

      356KB

    • memory/1948-49-0x0000000000400000-0x0000000000459000-memory.dmp

      Filesize

      356KB

    • memory/1948-61-0x0000000000400000-0x0000000000459000-memory.dmp

      Filesize

      356KB

    • memory/2940-70-0x0000000000400000-0x0000000000459000-memory.dmp

      Filesize

      356KB

    • memory/2940-13-0x0000000000400000-0x0000000000459000-memory.dmp

      Filesize

      356KB

    • memory/2960-0-0x0000000000400000-0x0000000000459000-memory.dmp

      Filesize

      356KB

    • memory/2960-1-0x0000000000431000-0x0000000000432000-memory.dmp

      Filesize

      4KB

    • memory/2960-73-0x0000000000400000-0x0000000000459000-memory.dmp

      Filesize

      356KB

    • memory/3596-40-0x0000000000400000-0x0000000000459000-memory.dmp

      Filesize

      356KB

    • memory/3596-63-0x0000000000400000-0x0000000000459000-memory.dmp

      Filesize

      356KB

    • memory/4492-17-0x0000000000400000-0x0000000000459000-memory.dmp

      Filesize

      356KB

    • memory/4492-71-0x0000000000400000-0x0000000000459000-memory.dmp

      Filesize

      356KB

    • memory/4772-69-0x0000000000400000-0x0000000000459000-memory.dmp

      Filesize

      356KB

    • memory/4772-25-0x0000000000400000-0x0000000000459000-memory.dmp

      Filesize

      356KB