Analysis
-
max time kernel
149s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01-11-2024 18:19
Static task
static1
Behavioral task
behavioral1
Sample
a2c8cecd44b208d3d1ceb26855fb375d5e04309931486463782e38c6ef1ea358.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a2c8cecd44b208d3d1ceb26855fb375d5e04309931486463782e38c6ef1ea358.exe
Resource
win10v2004-20241007-en
General
-
Target
a2c8cecd44b208d3d1ceb26855fb375d5e04309931486463782e38c6ef1ea358.exe
-
Size
200KB
-
MD5
88e999ecc8ae895c1aeec91c3c73cdc4
-
SHA1
66f70e66d569ec289f5090a6fa9c385c24c76cbc
-
SHA256
a2c8cecd44b208d3d1ceb26855fb375d5e04309931486463782e38c6ef1ea358
-
SHA512
482a93ed6f5f7a16bbc460125e6a9ec56326af1b8303e83ebefa905a358ede7c6654f5dfc05b4fb8d564b691a679cade160f13edb0ebc3a6630fe97ffafb2e41
-
SSDEEP
6144:W8A7Knvmb7/D26rfo9Am26fBXMZ8R3FXjrCTYTQdq4qJUGQBSpYCbw6I:jA7Knvmb7/D26zZ8R3FXjrC8T8q4qJgP
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
Processes:
a2c8cecd44b208d3d1ceb26855fb375d5e04309931486463782e38c6ef1ea358.exedgpaw.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" a2c8cecd44b208d3d1ceb26855fb375d5e04309931486463782e38c6ef1ea358.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" dgpaw.exe -
Executes dropped EXE 1 IoCs
Processes:
dgpaw.exepid process 2324 dgpaw.exe -
Loads dropped DLL 2 IoCs
Processes:
a2c8cecd44b208d3d1ceb26855fb375d5e04309931486463782e38c6ef1ea358.exepid process 2224 a2c8cecd44b208d3d1ceb26855fb375d5e04309931486463782e38c6ef1ea358.exe 2224 a2c8cecd44b208d3d1ceb26855fb375d5e04309931486463782e38c6ef1ea358.exe -
Adds Run key to start application 2 TTPs 52 IoCs
Processes:
dgpaw.exea2c8cecd44b208d3d1ceb26855fb375d5e04309931486463782e38c6ef1ea358.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\dgpaw = "C:\\Users\\Admin\\dgpaw.exe /h" dgpaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\dgpaw = "C:\\Users\\Admin\\dgpaw.exe /W" dgpaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\dgpaw = "C:\\Users\\Admin\\dgpaw.exe /S" dgpaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\dgpaw = "C:\\Users\\Admin\\dgpaw.exe /e" dgpaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\dgpaw = "C:\\Users\\Admin\\dgpaw.exe /m" dgpaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\dgpaw = "C:\\Users\\Admin\\dgpaw.exe /N" dgpaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\dgpaw = "C:\\Users\\Admin\\dgpaw.exe /I" dgpaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\dgpaw = "C:\\Users\\Admin\\dgpaw.exe /s" dgpaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\dgpaw = "C:\\Users\\Admin\\dgpaw.exe /b" dgpaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\dgpaw = "C:\\Users\\Admin\\dgpaw.exe /H" dgpaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\dgpaw = "C:\\Users\\Admin\\dgpaw.exe /o" dgpaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\dgpaw = "C:\\Users\\Admin\\dgpaw.exe /t" dgpaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\dgpaw = "C:\\Users\\Admin\\dgpaw.exe /D" dgpaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\dgpaw = "C:\\Users\\Admin\\dgpaw.exe /J" dgpaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\dgpaw = "C:\\Users\\Admin\\dgpaw.exe /P" dgpaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\dgpaw = "C:\\Users\\Admin\\dgpaw.exe /E" dgpaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\dgpaw = "C:\\Users\\Admin\\dgpaw.exe /b" a2c8cecd44b208d3d1ceb26855fb375d5e04309931486463782e38c6ef1ea358.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\dgpaw = "C:\\Users\\Admin\\dgpaw.exe /Q" dgpaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\dgpaw = "C:\\Users\\Admin\\dgpaw.exe /p" dgpaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\dgpaw = "C:\\Users\\Admin\\dgpaw.exe /G" dgpaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\dgpaw = "C:\\Users\\Admin\\dgpaw.exe /T" dgpaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\dgpaw = "C:\\Users\\Admin\\dgpaw.exe /R" dgpaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\dgpaw = "C:\\Users\\Admin\\dgpaw.exe /B" dgpaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\dgpaw = "C:\\Users\\Admin\\dgpaw.exe /K" dgpaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\dgpaw = "C:\\Users\\Admin\\dgpaw.exe /l" dgpaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\dgpaw = "C:\\Users\\Admin\\dgpaw.exe /n" dgpaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\dgpaw = "C:\\Users\\Admin\\dgpaw.exe /z" dgpaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\dgpaw = "C:\\Users\\Admin\\dgpaw.exe /F" dgpaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\dgpaw = "C:\\Users\\Admin\\dgpaw.exe /c" dgpaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\dgpaw = "C:\\Users\\Admin\\dgpaw.exe /j" dgpaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\dgpaw = "C:\\Users\\Admin\\dgpaw.exe /u" dgpaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\dgpaw = "C:\\Users\\Admin\\dgpaw.exe /V" dgpaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\dgpaw = "C:\\Users\\Admin\\dgpaw.exe /Y" dgpaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\dgpaw = "C:\\Users\\Admin\\dgpaw.exe /Z" dgpaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\dgpaw = "C:\\Users\\Admin\\dgpaw.exe /a" dgpaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\dgpaw = "C:\\Users\\Admin\\dgpaw.exe /q" dgpaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\dgpaw = "C:\\Users\\Admin\\dgpaw.exe /g" dgpaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\dgpaw = "C:\\Users\\Admin\\dgpaw.exe /k" dgpaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\dgpaw = "C:\\Users\\Admin\\dgpaw.exe /x" dgpaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\dgpaw = "C:\\Users\\Admin\\dgpaw.exe /d" dgpaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\dgpaw = "C:\\Users\\Admin\\dgpaw.exe /X" dgpaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\dgpaw = "C:\\Users\\Admin\\dgpaw.exe /U" dgpaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\dgpaw = "C:\\Users\\Admin\\dgpaw.exe /f" dgpaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\dgpaw = "C:\\Users\\Admin\\dgpaw.exe /O" dgpaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\dgpaw = "C:\\Users\\Admin\\dgpaw.exe /M" dgpaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\dgpaw = "C:\\Users\\Admin\\dgpaw.exe /C" dgpaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\dgpaw = "C:\\Users\\Admin\\dgpaw.exe /L" dgpaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\dgpaw = "C:\\Users\\Admin\\dgpaw.exe /w" dgpaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\dgpaw = "C:\\Users\\Admin\\dgpaw.exe /y" dgpaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\dgpaw = "C:\\Users\\Admin\\dgpaw.exe /A" dgpaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\dgpaw = "C:\\Users\\Admin\\dgpaw.exe /v" dgpaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\dgpaw = "C:\\Users\\Admin\\dgpaw.exe /i" dgpaw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
a2c8cecd44b208d3d1ceb26855fb375d5e04309931486463782e38c6ef1ea358.exedgpaw.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a2c8cecd44b208d3d1ceb26855fb375d5e04309931486463782e38c6ef1ea358.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dgpaw.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
a2c8cecd44b208d3d1ceb26855fb375d5e04309931486463782e38c6ef1ea358.exedgpaw.exepid process 2224 a2c8cecd44b208d3d1ceb26855fb375d5e04309931486463782e38c6ef1ea358.exe 2324 dgpaw.exe 2324 dgpaw.exe 2324 dgpaw.exe 2324 dgpaw.exe 2324 dgpaw.exe 2324 dgpaw.exe 2324 dgpaw.exe 2324 dgpaw.exe 2324 dgpaw.exe 2324 dgpaw.exe 2324 dgpaw.exe 2324 dgpaw.exe 2324 dgpaw.exe 2324 dgpaw.exe 2324 dgpaw.exe 2324 dgpaw.exe 2324 dgpaw.exe 2324 dgpaw.exe 2324 dgpaw.exe 2324 dgpaw.exe 2324 dgpaw.exe 2324 dgpaw.exe 2324 dgpaw.exe 2324 dgpaw.exe 2324 dgpaw.exe 2324 dgpaw.exe 2324 dgpaw.exe 2324 dgpaw.exe 2324 dgpaw.exe 2324 dgpaw.exe 2324 dgpaw.exe 2324 dgpaw.exe 2324 dgpaw.exe 2324 dgpaw.exe 2324 dgpaw.exe 2324 dgpaw.exe 2324 dgpaw.exe 2324 dgpaw.exe 2324 dgpaw.exe 2324 dgpaw.exe 2324 dgpaw.exe 2324 dgpaw.exe 2324 dgpaw.exe 2324 dgpaw.exe 2324 dgpaw.exe 2324 dgpaw.exe 2324 dgpaw.exe 2324 dgpaw.exe 2324 dgpaw.exe 2324 dgpaw.exe 2324 dgpaw.exe 2324 dgpaw.exe 2324 dgpaw.exe 2324 dgpaw.exe 2324 dgpaw.exe 2324 dgpaw.exe 2324 dgpaw.exe 2324 dgpaw.exe 2324 dgpaw.exe 2324 dgpaw.exe 2324 dgpaw.exe 2324 dgpaw.exe 2324 dgpaw.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
a2c8cecd44b208d3d1ceb26855fb375d5e04309931486463782e38c6ef1ea358.exedgpaw.exepid process 2224 a2c8cecd44b208d3d1ceb26855fb375d5e04309931486463782e38c6ef1ea358.exe 2324 dgpaw.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
a2c8cecd44b208d3d1ceb26855fb375d5e04309931486463782e38c6ef1ea358.exedescription pid process target process PID 2224 wrote to memory of 2324 2224 a2c8cecd44b208d3d1ceb26855fb375d5e04309931486463782e38c6ef1ea358.exe dgpaw.exe PID 2224 wrote to memory of 2324 2224 a2c8cecd44b208d3d1ceb26855fb375d5e04309931486463782e38c6ef1ea358.exe dgpaw.exe PID 2224 wrote to memory of 2324 2224 a2c8cecd44b208d3d1ceb26855fb375d5e04309931486463782e38c6ef1ea358.exe dgpaw.exe PID 2224 wrote to memory of 2324 2224 a2c8cecd44b208d3d1ceb26855fb375d5e04309931486463782e38c6ef1ea358.exe dgpaw.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a2c8cecd44b208d3d1ceb26855fb375d5e04309931486463782e38c6ef1ea358.exe"C:\Users\Admin\AppData\Local\Temp\a2c8cecd44b208d3d1ceb26855fb375d5e04309931486463782e38c6ef1ea358.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Users\Admin\dgpaw.exe"C:\Users\Admin\dgpaw.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2324
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
200KB
MD524bfdb587d85adcbd15610c0d1e83def
SHA13a4332ccc9a385df43b4b38e589c610218804800
SHA2562a247b6a75db3b767dde32252035ed3e1458ae440ca9a8900c152777c4791a77
SHA512e5b89ddcf5ca97d5543f3f874c2f9388c15afec089626186441ba5a037f43d770df19084f9ccfd4d8046229dcff3f79395b893ec8e9f43d783da86a912413498