Analysis
-
max time kernel
92s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2024, 14:32
Static task
static1
Behavioral task
behavioral1
Sample
b974c5ddc6dfd0f4885bc1057cd381f91f7cd6a996e51df7617e2f2d07f89782N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b974c5ddc6dfd0f4885bc1057cd381f91f7cd6a996e51df7617e2f2d07f89782N.exe
Resource
win10v2004-20240802-en
General
-
Target
b974c5ddc6dfd0f4885bc1057cd381f91f7cd6a996e51df7617e2f2d07f89782N.exe
-
Size
350KB
-
MD5
b631e6f223da2fd90fc4ff20c047d7d0
-
SHA1
a2d72f1a84a2229a2314bd680544a2063443b762
-
SHA256
b974c5ddc6dfd0f4885bc1057cd381f91f7cd6a996e51df7617e2f2d07f89782
-
SHA512
1d860fdb2e589a7ef4dcc1f1085f1ba63f9d6c9d2dcd8ea05dd147965d2f117bbcf0d98396d7aa7c8405ce9b414775c2d0f5784fd49a5bf662811968898971fc
-
SSDEEP
6144:IDDrFtpHVILifyeYVDcfflXpX6LRifyeYVDc:epHyefyeYCdXpXZfyeY
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 14 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dogogcpo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dhhnpjmh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dhhnpjmh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ddakjkqi.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dhocqigp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dhocqigp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Djgjlelk.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dkifae32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dogogcpo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad b974c5ddc6dfd0f4885bc1057cd381f91f7cd6a996e51df7617e2f2d07f89782N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dkifae32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" b974c5ddc6dfd0f4885bc1057cd381f91f7cd6a996e51df7617e2f2d07f89782N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Djgjlelk.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ddakjkqi.exe -
Executes dropped EXE 7 IoCs
pid Process 2940 Dhhnpjmh.exe 4492 Djgjlelk.exe 4772 Dkifae32.exe 1224 Ddakjkqi.exe 3596 Dogogcpo.exe 1948 Dhocqigp.exe 1344 Dmllipeg.exe -
Drops file in System32 directory 21 IoCs
description ioc Process File created C:\Windows\SysWOW64\Djgjlelk.exe Dhhnpjmh.exe File created C:\Windows\SysWOW64\Beeppfin.dll Dhhnpjmh.exe File created C:\Windows\SysWOW64\Pdheac32.dll Djgjlelk.exe File created C:\Windows\SysWOW64\Elkadb32.dll Dogogcpo.exe File created C:\Windows\SysWOW64\Nbgngp32.dll b974c5ddc6dfd0f4885bc1057cd381f91f7cd6a996e51df7617e2f2d07f89782N.exe File created C:\Windows\SysWOW64\Lbabpnmn.dll Ddakjkqi.exe File created C:\Windows\SysWOW64\Dmllipeg.exe Dhocqigp.exe File created C:\Windows\SysWOW64\Dhhnpjmh.exe b974c5ddc6dfd0f4885bc1057cd381f91f7cd6a996e51df7617e2f2d07f89782N.exe File opened for modification C:\Windows\SysWOW64\Dhhnpjmh.exe b974c5ddc6dfd0f4885bc1057cd381f91f7cd6a996e51df7617e2f2d07f89782N.exe File created C:\Windows\SysWOW64\Dkifae32.exe Djgjlelk.exe File opened for modification C:\Windows\SysWOW64\Dkifae32.exe Djgjlelk.exe File opened for modification C:\Windows\SysWOW64\Ddakjkqi.exe Dkifae32.exe File created C:\Windows\SysWOW64\Gifhkeje.dll Dkifae32.exe File opened for modification C:\Windows\SysWOW64\Dhocqigp.exe Dogogcpo.exe File created C:\Windows\SysWOW64\Kngpec32.dll Dhocqigp.exe File opened for modification C:\Windows\SysWOW64\Djgjlelk.exe Dhhnpjmh.exe File created C:\Windows\SysWOW64\Ddakjkqi.exe Dkifae32.exe File created C:\Windows\SysWOW64\Dogogcpo.exe Ddakjkqi.exe File opened for modification C:\Windows\SysWOW64\Dogogcpo.exe Ddakjkqi.exe File created C:\Windows\SysWOW64\Dhocqigp.exe Dogogcpo.exe File opened for modification C:\Windows\SysWOW64\Dmllipeg.exe Dhocqigp.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2464 1344 WerFault.exe 88 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dmllipeg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b974c5ddc6dfd0f4885bc1057cd381f91f7cd6a996e51df7617e2f2d07f89782N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dhhnpjmh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Djgjlelk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dkifae32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ddakjkqi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dogogcpo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dhocqigp.exe -
Modifies registry class 24 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ddakjkqi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 b974c5ddc6dfd0f4885bc1057cd381f91f7cd6a996e51df7617e2f2d07f89782N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" b974c5ddc6dfd0f4885bc1057cd381f91f7cd6a996e51df7617e2f2d07f89782N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dhhnpjmh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dkifae32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dogogcpo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lbabpnmn.dll" Ddakjkqi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ddakjkqi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dogogcpo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Elkadb32.dll" Dogogcpo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pdheac32.dll" Djgjlelk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Djgjlelk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gifhkeje.dll" Dkifae32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dkifae32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node b974c5ddc6dfd0f4885bc1057cd381f91f7cd6a996e51df7617e2f2d07f89782N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} b974c5ddc6dfd0f4885bc1057cd381f91f7cd6a996e51df7617e2f2d07f89782N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nbgngp32.dll" b974c5ddc6dfd0f4885bc1057cd381f91f7cd6a996e51df7617e2f2d07f89782N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Djgjlelk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kngpec32.dll" Dhocqigp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dhocqigp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID b974c5ddc6dfd0f4885bc1057cd381f91f7cd6a996e51df7617e2f2d07f89782N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Beeppfin.dll" Dhhnpjmh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dhhnpjmh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dhocqigp.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2960 wrote to memory of 2940 2960 b974c5ddc6dfd0f4885bc1057cd381f91f7cd6a996e51df7617e2f2d07f89782N.exe 82 PID 2960 wrote to memory of 2940 2960 b974c5ddc6dfd0f4885bc1057cd381f91f7cd6a996e51df7617e2f2d07f89782N.exe 82 PID 2960 wrote to memory of 2940 2960 b974c5ddc6dfd0f4885bc1057cd381f91f7cd6a996e51df7617e2f2d07f89782N.exe 82 PID 2940 wrote to memory of 4492 2940 Dhhnpjmh.exe 83 PID 2940 wrote to memory of 4492 2940 Dhhnpjmh.exe 83 PID 2940 wrote to memory of 4492 2940 Dhhnpjmh.exe 83 PID 4492 wrote to memory of 4772 4492 Djgjlelk.exe 84 PID 4492 wrote to memory of 4772 4492 Djgjlelk.exe 84 PID 4492 wrote to memory of 4772 4492 Djgjlelk.exe 84 PID 4772 wrote to memory of 1224 4772 Dkifae32.exe 85 PID 4772 wrote to memory of 1224 4772 Dkifae32.exe 85 PID 4772 wrote to memory of 1224 4772 Dkifae32.exe 85 PID 1224 wrote to memory of 3596 1224 Ddakjkqi.exe 86 PID 1224 wrote to memory of 3596 1224 Ddakjkqi.exe 86 PID 1224 wrote to memory of 3596 1224 Ddakjkqi.exe 86 PID 3596 wrote to memory of 1948 3596 Dogogcpo.exe 87 PID 3596 wrote to memory of 1948 3596 Dogogcpo.exe 87 PID 3596 wrote to memory of 1948 3596 Dogogcpo.exe 87 PID 1948 wrote to memory of 1344 1948 Dhocqigp.exe 88 PID 1948 wrote to memory of 1344 1948 Dhocqigp.exe 88 PID 1948 wrote to memory of 1344 1948 Dhocqigp.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\b974c5ddc6dfd0f4885bc1057cd381f91f7cd6a996e51df7617e2f2d07f89782N.exe"C:\Users\Admin\AppData\Local\Temp\b974c5ddc6dfd0f4885bc1057cd381f91f7cd6a996e51df7617e2f2d07f89782N.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Windows\SysWOW64\Dhhnpjmh.exeC:\Windows\system32\Dhhnpjmh.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Windows\SysWOW64\Djgjlelk.exeC:\Windows\system32\Djgjlelk.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4492 -
C:\Windows\SysWOW64\Dkifae32.exeC:\Windows\system32\Dkifae32.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Windows\SysWOW64\Ddakjkqi.exeC:\Windows\system32\Ddakjkqi.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Windows\SysWOW64\Dogogcpo.exeC:\Windows\system32\Dogogcpo.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3596 -
C:\Windows\SysWOW64\Dhocqigp.exeC:\Windows\system32\Dhocqigp.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Windows\SysWOW64\Dmllipeg.exeC:\Windows\system32\Dmllipeg.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1344 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1344 -s 4049⤵
- Program crash
PID:2464
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1344 -ip 13441⤵PID:4684
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
350KB
MD58d50cdae1fa378cbc4e6b4cd3e013bc6
SHA1011dd4d7d7d7964d902cfbc5e5c56a502ae340e5
SHA25696bc31d8c9fada13ffaf9b2cf49030db5c8a10e17f332fab8db48a2ff059987b
SHA512a26c129cdaf9eb92888885e8f42b0e20bd1e9572ed4d257af2f17202031c40c17cba501da33a4008d91a2d42654fbec6164647de30812c5699d7a35a3985e7b2
-
Filesize
350KB
MD55c50ab0861780efb110af6e27286dfbc
SHA1085785239be89b791b3180fbfded6f179771425e
SHA256dd7d81388c7f3f441b8df7311c0b6355b4b1ced12ce0cba41eb131125d04ce72
SHA51227f455cf3ebfb4a62156baa9b6eec5e36c6d91caa38fe7b8e870da07583dfffe6b25f40981475b2551be7cdf47c894d03e80a8dd8d593788c6291acd967a03d3
-
Filesize
350KB
MD5147cfc8a12b15cbc941968711dbaa5d6
SHA1134fa743cb0ee3469d6d8ab5c1668e3a454cff07
SHA2565db6f0d50db40799db24a10d68fa108c6bba33690fd0599baa8aec38fb063a4a
SHA512e98d4f22629c2c0769063596449f1fa7cecd879fe04f56fba3b347eb250c4eb99a1c463ccc91b11135685bf8e83e78a2ff399c7ed4b98b1fcc9905d62a99792b
-
Filesize
350KB
MD5d5c77851e1c680f11502988c5110d11d
SHA17409edf49565766cad81fc419bb2a7aaecf21622
SHA256f5e6f909cdc716b8f5098b0195173bdb6b84679978b41cadc6d54ed0ad1e63ef
SHA512aaebf72e67b9a4a4b560dc789efe4d936f1454585088df94268b9ab69606f665eac11214d088816e55de5ace358a96ad74481ea4e4b75c32593b68a289d26f12
-
Filesize
350KB
MD57f3329dc5df14dd30ea49ea49f2f88f9
SHA19d6a382e30d798d7d73a9b63a68502a6b25eef46
SHA2566c93449bfa64b29a7f7e66db5993046353e0f1c2834423ffdd5ddbbd42ebae06
SHA5129721905a9a4e4313d4d7c0e9833c7f5cc6b40e24bd531fa87012c612b815137614df6cfda074fce8ed34fde2a462517817436a6e7370d7af422708f0419e67de
-
Filesize
350KB
MD58d1f7b3129fb9d222e573b991e598c93
SHA122487805907f787f58cdaa0676327248ef372155
SHA256c5c76c7846019d071f2c124900b326a6672c660e416700201fae2a6128c6ffd5
SHA5127ccb39d58fc311667ee2325bc390396640dac35ebb100e9b87989da04c0d91714605794345334d9ee9022d5d05081d0aa707846c2324a2c33d42f2f0080e24a3
-
Filesize
350KB
MD50298a28744ff407cf8ece5cdb7404939
SHA1aebb5b1533713ad4ab3138b2f1008be1e77ef802
SHA25667e6e5ee1d375b3b8d877dff9f5e2101a5891f7c87e1802c3a327d1b92f790c4
SHA512ed4f3826616f31b77b7a5681073bb8867a46054c007ff78a4e2d08fa24a911bc5cae2d57f6ab223ab36690288498723dfdee982615e03c2e74328e9d79db8d2a