Analysis
-
max time kernel
93s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19/11/2024, 16:48
Static task
static1
Behavioral task
behavioral1
Sample
de8f44a224555d04a25dc1d0f24c41396ff57defd8727001b58d88201777f6b3.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
de8f44a224555d04a25dc1d0f24c41396ff57defd8727001b58d88201777f6b3.exe
Resource
win10v2004-20241007-en
General
-
Target
de8f44a224555d04a25dc1d0f24c41396ff57defd8727001b58d88201777f6b3.exe
-
Size
428KB
-
MD5
1158f88f62ef37314db933547e7eca7e
-
SHA1
57ffd7af69a83f88d242488a765638ac931e5cf6
-
SHA256
de8f44a224555d04a25dc1d0f24c41396ff57defd8727001b58d88201777f6b3
-
SHA512
c95680d1e724d00ff4b9892b253e12b565d5c255ec1495266a3caca01e41f8a1619f2e01e3957711b122682fe0bc9f82dbc921bf4cd93fd2e71ce0a1cf96d7cf
-
SSDEEP
12288:sode5hjtFrNF5h0EJtws15tPWu5Ls15tw:sl5hjLZF5h0E/Tg+
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad de8f44a224555d04a25dc1d0f24c41396ff57defd8727001b58d88201777f6b3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" de8f44a224555d04a25dc1d0f24c41396ff57defd8727001b58d88201777f6b3.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dogogcpo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dogogcpo.exe -
Executes dropped EXE 2 IoCs
pid Process 2328 Dogogcpo.exe 1640 Dmllipeg.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\Kngpec32.dll Dogogcpo.exe File created C:\Windows\SysWOW64\Dogogcpo.exe de8f44a224555d04a25dc1d0f24c41396ff57defd8727001b58d88201777f6b3.exe File opened for modification C:\Windows\SysWOW64\Dogogcpo.exe de8f44a224555d04a25dc1d0f24c41396ff57defd8727001b58d88201777f6b3.exe File created C:\Windows\SysWOW64\Lbabpnmn.dll de8f44a224555d04a25dc1d0f24c41396ff57defd8727001b58d88201777f6b3.exe File created C:\Windows\SysWOW64\Dmllipeg.exe Dogogcpo.exe File opened for modification C:\Windows\SysWOW64\Dmllipeg.exe Dogogcpo.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 332 1640 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language de8f44a224555d04a25dc1d0f24c41396ff57defd8727001b58d88201777f6b3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dogogcpo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dmllipeg.exe -
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lbabpnmn.dll" de8f44a224555d04a25dc1d0f24c41396ff57defd8727001b58d88201777f6b3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dogogcpo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kngpec32.dll" Dogogcpo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dogogcpo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 de8f44a224555d04a25dc1d0f24c41396ff57defd8727001b58d88201777f6b3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node de8f44a224555d04a25dc1d0f24c41396ff57defd8727001b58d88201777f6b3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID de8f44a224555d04a25dc1d0f24c41396ff57defd8727001b58d88201777f6b3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} de8f44a224555d04a25dc1d0f24c41396ff57defd8727001b58d88201777f6b3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" de8f44a224555d04a25dc1d0f24c41396ff57defd8727001b58d88201777f6b3.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2376 wrote to memory of 2328 2376 de8f44a224555d04a25dc1d0f24c41396ff57defd8727001b58d88201777f6b3.exe 83 PID 2376 wrote to memory of 2328 2376 de8f44a224555d04a25dc1d0f24c41396ff57defd8727001b58d88201777f6b3.exe 83 PID 2376 wrote to memory of 2328 2376 de8f44a224555d04a25dc1d0f24c41396ff57defd8727001b58d88201777f6b3.exe 83 PID 2328 wrote to memory of 1640 2328 Dogogcpo.exe 84 PID 2328 wrote to memory of 1640 2328 Dogogcpo.exe 84 PID 2328 wrote to memory of 1640 2328 Dogogcpo.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\de8f44a224555d04a25dc1d0f24c41396ff57defd8727001b58d88201777f6b3.exe"C:\Users\Admin\AppData\Local\Temp\de8f44a224555d04a25dc1d0f24c41396ff57defd8727001b58d88201777f6b3.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Windows\SysWOW64\Dogogcpo.exeC:\Windows\system32\Dogogcpo.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Windows\SysWOW64\Dmllipeg.exeC:\Windows\system32\Dmllipeg.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1640 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1640 -s 3964⤵
- Program crash
PID:332
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 1640 -ip 16401⤵PID:3596
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
428KB
MD585b3bab6da67801876e2a38a46f49859
SHA114ce5038fe0d8eb3a733280bc6ac48d6295f8d44
SHA256013395dd72a29e3135c57db4d7a8ef60a831b7936b2c6684aa5f8a0df5e17cb5
SHA5120ca2eb7cf8320f8a0677d0d05c15c227dd9f0a92d1efd7449ac81c7f507836503d9ded8071dc48f47ef6bcc3f4a55b358b68ec41f57cc25dfa0a49ffeb28547f
-
Filesize
428KB
MD5fca6c6629a45dee18adeb3fc20a15a34
SHA109631156d2cfade110fa317c5d12ba3b5316100e
SHA256e001455551efeb1b25c378ace59342695345e3d12bd65fabaa6562fd194fe6fb
SHA51230b8de3cf93dd6920926f189e0abdc8d1247bb5c41c9e0f27e10a26de011d67da8b5f57026d7b9839862289cb5efbb0753cd21fd70c23c0fd6aee3d43e972939