Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
95s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05/10/2024, 06:26
Static task
static1
Behavioral task
behavioral1
Sample
7d70db6c4e72f059ab7627ceb13e3d23bc4857096b163ee7c196165f2bd5866dN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
7d70db6c4e72f059ab7627ceb13e3d23bc4857096b163ee7c196165f2bd5866dN.exe
Resource
win10v2004-20240802-en
General
-
Target
7d70db6c4e72f059ab7627ceb13e3d23bc4857096b163ee7c196165f2bd5866dN.exe
-
Size
88KB
-
MD5
50c8df282b1d281f592e9d691b258f20
-
SHA1
f482e700ca1b86225f6f452db09f55cd2e894490
-
SHA256
7d70db6c4e72f059ab7627ceb13e3d23bc4857096b163ee7c196165f2bd5866d
-
SHA512
8e4664ef5d7bd536c6394045c11b48e3154e3c0f08082f8a8106438811ae8c11e0649a97908f89d61a0236b44168faa9c132d81b1235311dbc49bae7e96790e0
-
SSDEEP
1536:EKJbOs1Oq1OYqfWvuSwOfrzQ7EcgxQ7YnCuILv13nouy8L:BOs1u1xvRLNXoutL
Malware Config
Extracted
berbew
http://f/wcmd.htm
http://f/ppslog.php
http://f/piplog.php?%s:%i:%i:%s:%09u:%i:%02d:%02d:%02d
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 14 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Dfpgffpm.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Daekdooc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Dhocqigp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Daconoae.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ddakjkqi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Dmjocp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dfpgffpm.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ddakjkqi.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dmjocp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Daekdooc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dhocqigp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 7d70db6c4e72f059ab7627ceb13e3d23bc4857096b163ee7c196165f2bd5866dN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" 7d70db6c4e72f059ab7627ceb13e3d23bc4857096b163ee7c196165f2bd5866dN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Daconoae.exe -
Executes dropped EXE 7 IoCs
pid Process 1888 Daconoae.exe 1064 Ddakjkqi.exe 3096 Dfpgffpm.exe 2232 Dmjocp32.exe 1576 Daekdooc.exe 2828 Dhocqigp.exe 4476 Dmllipeg.exe -
Drops file in System32 directory 21 IoCs
description ioc Process File created C:\Windows\SysWOW64\Daconoae.exe 7d70db6c4e72f059ab7627ceb13e3d23bc4857096b163ee7c196165f2bd5866dN.exe File opened for modification C:\Windows\SysWOW64\Ddakjkqi.exe Daconoae.exe File created C:\Windows\SysWOW64\Gifhkeje.dll Daconoae.exe File created C:\Windows\SysWOW64\Elkadb32.dll Daekdooc.exe File opened for modification C:\Windows\SysWOW64\Daconoae.exe 7d70db6c4e72f059ab7627ceb13e3d23bc4857096b163ee7c196165f2bd5866dN.exe File created C:\Windows\SysWOW64\Ddakjkqi.exe Daconoae.exe File created C:\Windows\SysWOW64\Dfpgffpm.exe Ddakjkqi.exe File created C:\Windows\SysWOW64\Dmjocp32.exe Dfpgffpm.exe File opened for modification C:\Windows\SysWOW64\Daekdooc.exe Dmjocp32.exe File opened for modification C:\Windows\SysWOW64\Dhocqigp.exe Daekdooc.exe File opened for modification C:\Windows\SysWOW64\Dmllipeg.exe Dhocqigp.exe File created C:\Windows\SysWOW64\Oammoc32.dll 7d70db6c4e72f059ab7627ceb13e3d23bc4857096b163ee7c196165f2bd5866dN.exe File created C:\Windows\SysWOW64\Kmdjdl32.dll Ddakjkqi.exe File opened for modification C:\Windows\SysWOW64\Dmjocp32.exe Dfpgffpm.exe File created C:\Windows\SysWOW64\Dhocqigp.exe Daekdooc.exe File created C:\Windows\SysWOW64\Dmllipeg.exe Dhocqigp.exe File opened for modification C:\Windows\SysWOW64\Dfpgffpm.exe Ddakjkqi.exe File created C:\Windows\SysWOW64\Bobiobnp.dll Dfpgffpm.exe File created C:\Windows\SysWOW64\Daekdooc.exe Dmjocp32.exe File created C:\Windows\SysWOW64\Ohmoom32.dll Dmjocp32.exe File created C:\Windows\SysWOW64\Kngpec32.dll Dhocqigp.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1092 4476 WerFault.exe 88 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Daconoae.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ddakjkqi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dfpgffpm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dmjocp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Daekdooc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dhocqigp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dmllipeg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7d70db6c4e72f059ab7627ceb13e3d23bc4857096b163ee7c196165f2bd5866dN.exe -
Modifies registry class 24 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Dmjocp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node 7d70db6c4e72f059ab7627ceb13e3d23bc4857096b163ee7c196165f2bd5866dN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717} 7d70db6c4e72f059ab7627ceb13e3d23bc4857096b163ee7c196165f2bd5866dN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gifhkeje.dll" Daconoae.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kmdjdl32.dll" Ddakjkqi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Dmjocp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Dhocqigp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID 7d70db6c4e72f059ab7627ceb13e3d23bc4857096b163ee7c196165f2bd5866dN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oammoc32.dll" 7d70db6c4e72f059ab7627ceb13e3d23bc4857096b163ee7c196165f2bd5866dN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Dfpgffpm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Dfpgffpm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bobiobnp.dll" Dfpgffpm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ohmoom32.dll" Dmjocp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Daekdooc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Daekdooc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 7d70db6c4e72f059ab7627ceb13e3d23bc4857096b163ee7c196165f2bd5866dN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" 7d70db6c4e72f059ab7627ceb13e3d23bc4857096b163ee7c196165f2bd5866dN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Daconoae.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Daconoae.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Dhocqigp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ddakjkqi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ddakjkqi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Elkadb32.dll" Daekdooc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kngpec32.dll" Dhocqigp.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 4192 wrote to memory of 1888 4192 7d70db6c4e72f059ab7627ceb13e3d23bc4857096b163ee7c196165f2bd5866dN.exe 82 PID 4192 wrote to memory of 1888 4192 7d70db6c4e72f059ab7627ceb13e3d23bc4857096b163ee7c196165f2bd5866dN.exe 82 PID 4192 wrote to memory of 1888 4192 7d70db6c4e72f059ab7627ceb13e3d23bc4857096b163ee7c196165f2bd5866dN.exe 82 PID 1888 wrote to memory of 1064 1888 Daconoae.exe 83 PID 1888 wrote to memory of 1064 1888 Daconoae.exe 83 PID 1888 wrote to memory of 1064 1888 Daconoae.exe 83 PID 1064 wrote to memory of 3096 1064 Ddakjkqi.exe 84 PID 1064 wrote to memory of 3096 1064 Ddakjkqi.exe 84 PID 1064 wrote to memory of 3096 1064 Ddakjkqi.exe 84 PID 3096 wrote to memory of 2232 3096 Dfpgffpm.exe 85 PID 3096 wrote to memory of 2232 3096 Dfpgffpm.exe 85 PID 3096 wrote to memory of 2232 3096 Dfpgffpm.exe 85 PID 2232 wrote to memory of 1576 2232 Dmjocp32.exe 86 PID 2232 wrote to memory of 1576 2232 Dmjocp32.exe 86 PID 2232 wrote to memory of 1576 2232 Dmjocp32.exe 86 PID 1576 wrote to memory of 2828 1576 Daekdooc.exe 87 PID 1576 wrote to memory of 2828 1576 Daekdooc.exe 87 PID 1576 wrote to memory of 2828 1576 Daekdooc.exe 87 PID 2828 wrote to memory of 4476 2828 Dhocqigp.exe 88 PID 2828 wrote to memory of 4476 2828 Dhocqigp.exe 88 PID 2828 wrote to memory of 4476 2828 Dhocqigp.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\7d70db6c4e72f059ab7627ceb13e3d23bc4857096b163ee7c196165f2bd5866dN.exe"C:\Users\Admin\AppData\Local\Temp\7d70db6c4e72f059ab7627ceb13e3d23bc4857096b163ee7c196165f2bd5866dN.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4192 -
C:\Windows\SysWOW64\Daconoae.exeC:\Windows\system32\Daconoae.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Windows\SysWOW64\Ddakjkqi.exeC:\Windows\system32\Ddakjkqi.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Windows\SysWOW64\Dfpgffpm.exeC:\Windows\system32\Dfpgffpm.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3096 -
C:\Windows\SysWOW64\Dmjocp32.exeC:\Windows\system32\Dmjocp32.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\SysWOW64\Daekdooc.exeC:\Windows\system32\Daekdooc.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Windows\SysWOW64\Dhocqigp.exeC:\Windows\system32\Dhocqigp.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\SysWOW64\Dmllipeg.exeC:\Windows\system32\Dmllipeg.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4476 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4476 -s 4169⤵
- Program crash
PID:1092
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4476 -ip 44761⤵PID:4760
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
88KB
MD5eb0d134312ef1077e51bbbbd57d98a25
SHA16b9a731594d636624fe19efa2d25410ae63c7f35
SHA256c69633c4fa9c5aef7c54da9e9c791a92eeab4468240ebe076bc753c3845f7c69
SHA512f2508307ce46230533768b1398472ec3120927d92506d203e2332ffba381a422846c269f6753879ef93371965c192c04e8a98acdc40cdd231c82fef13e4bd729
-
Filesize
88KB
MD501ae0346195ba2c3f8dd3a2a0a7b9ed6
SHA1ccc2e49b7683a3633a6925ec32ca235a1f9fa16b
SHA256bdb8b7c8098fc6e6042e0f07a9e16ef4896ce7f8a22d7c0a640c7cad53e3ae0d
SHA512ed240d4becc0f9641b0e5b289183bf13efd8da7ad73cc839d61cc63e08d7382af73a9dad607be27cb5b928e6c56113918a9cdc15d3a6ca00857ea9ed827899c9
-
Filesize
88KB
MD5a20be87e89e149db7afb3e1804a787ab
SHA149a695a67248b3b5500472e86acd5e0d34957b5f
SHA2567b7069cc8af14af3024ab3f32509b6829184d97c87a3d4ba90250b5509c1cb0d
SHA5120d67d8e5d2cb2f34167bc352717dfd0ddb988c0b920dc1cb5deee7aa62c671acb8a0e2653f12342d26e60ff11c03c3e41d38752701a8f65fbce8e2f59c3fdc07
-
Filesize
88KB
MD5328f6cd08d434d27c50da985d517c1a0
SHA175929f43cd00f8e77e59c7b54c92543e5b49ee04
SHA25691a8f5e54d43ef5ba4dfc6f83efe5d408b46964947551cd1056627102a9545bf
SHA5128828d8d2659f7e67499825359380fb3b93554adcb76bb48a1c3724e80dbbe77080ccedf8bafceb40b7cd80c64ea10ff7837c277cf5a6bc81fe08265d6df859ef
-
Filesize
88KB
MD58dc9b385365a04f59c145e35acc4cccd
SHA10db606db32f782dc6ad8f36f8089557a47e988ba
SHA256347baa36a96695e0376801d33799b6bb8b0f60eaf6b9d24b8e457f3b9eb22b5a
SHA512fc586a181ac437d12d745ce15fca14e1e181dd132ff7e27b5aa59f1cb024f2bd33d5866d4cef6acd167061bb3ebda40e6c14ae120cefe0bbc522fb22feafa4c2
-
Filesize
88KB
MD58dbb3635ed238899b51c04d2add408d6
SHA1c00d2d23e9c02bade09379f58c51ab58781faea6
SHA2562c570df465860dd89180cf4b32a258fd007ab7f709fd6c8b3daf36cdfbf49cd6
SHA512b226f6ffb96aa3974d06787574832223732b7602b1a1d47044e64a86d305155f9cbf1770328bf7de4521171184357a20e67c4748f35d042cdebe8999d87b970e
-
Filesize
88KB
MD5279a344a8b8c89424b4196a0436fed11
SHA1a828a328b0f19ecf82726a700b2814b54707c1a5
SHA2561b34b31828fae043585ce6cb4ce19f87db8f67ac99a00905d428447ed85e06a2
SHA512597b036ac1b9811146a6723de25e5cb3d24108d70bf24c015341e0bc2c96714de8e2825ff1ff4d09b915fba54c3cc6d0d97462aacf76a88c837c487552d97a82
-
Filesize
7KB
MD588e75782878397c9ad3b7ff8481e6727
SHA173c4f3ae23d66661aef9dd5a39b4fd21c8df94cb
SHA256846b5f436092fb38d7efbbfe05d350c978f804f70dd0be4e265b1a42ca3810f1
SHA5122c23281e558b6fa3ee4e1babf96fc91c572ab76b28dbc7478054036d754db728d103b62be36d97abf63728be0a2d23a5b145a40ccf1c6dfa576ea1fee007d07e