Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    22-11-2024 05:05

General

  • Target

    e3e0b21e41ffb95f19c166a2115f706168a67f2ca5e6b9505f3d9ec13c94165a.exe

  • Size

    470KB

  • MD5

    ca479ab5caa15ac6c9e8e1daa88a45ba

  • SHA1

    815cb07ab2418be4fbf2f073f38659567e1b9980

  • SHA256

    e3e0b21e41ffb95f19c166a2115f706168a67f2ca5e6b9505f3d9ec13c94165a

  • SHA512

    034fe5da2458c983b91f4574d3511208241d8dec37725f08f88400ab7684101ebd85ff95dbdc678dd70da3fd438207127efa8d9471c42a9e6199b85ba839853d

  • SSDEEP

    12288:t/Qc8QVj94nLiFzN3b7CUq1u2ztB1XQKTQInqyS6Rm6TIJ3l7DurTG9c8QVj94n8:t4

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 4 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Drops file in System32 directory 6 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 14 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e3e0b21e41ffb95f19c166a2115f706168a67f2ca5e6b9505f3d9ec13c94165a.exe
    "C:\Users\Admin\AppData\Local\Temp\e3e0b21e41ffb95f19c166a2115f706168a67f2ca5e6b9505f3d9ec13c94165a.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2572
    • C:\Windows\SysWOW64\Dnpciaef.exe
      C:\Windows\system32\Dnpciaef.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:1960
      • C:\Windows\SysWOW64\Dpapaj32.exe
        C:\Windows\system32\Dpapaj32.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        PID:2068

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\Dpapaj32.exe

    Filesize

    470KB

    MD5

    a9358beaa82af4569f98f6808cae8fd4

    SHA1

    f3c8d3d9e3c2cfe3943e42db80c84049e96a0f57

    SHA256

    2e2fab72d6622c112375491a16bf38e223333ad63cf7a49d4d1e47137e8da5e7

    SHA512

    ed32c5494d41bb4b16e49ecf71772ff076bb07d00c72cf9d820c2f512811ed90f6096af90e43d07e283c147f7661e2f2b6d694337542eeb4ee04c0b9ea74af61

  • \Windows\SysWOW64\Dnpciaef.exe

    Filesize

    470KB

    MD5

    cb83606dd37e8ace450c48cfa8aa860b

    SHA1

    9242db33d0bb7854527f77a54c83c74ec006f537

    SHA256

    c8185fd29e36b692df130df79909012a9989a233c54f5d0f30fe2956c4eb1f28

    SHA512

    2fabacd72efa898893081139bb04dd316adf9a5081a06c64c32755586c411bf606ae4898686f63a09acfce564dfbe0e72105af5da89a31972a3a0fcba978300d

  • memory/1960-25-0x0000000000400000-0x000000000049E000-memory.dmp

    Filesize

    632KB

  • memory/1960-34-0x0000000000400000-0x000000000049E000-memory.dmp

    Filesize

    632KB

  • memory/2068-27-0x0000000000400000-0x000000000049E000-memory.dmp

    Filesize

    632KB

  • memory/2068-32-0x0000000000400000-0x000000000049E000-memory.dmp

    Filesize

    632KB

  • memory/2572-0-0x0000000000400000-0x000000000049E000-memory.dmp

    Filesize

    632KB

  • memory/2572-24-0x0000000000330000-0x00000000003CE000-memory.dmp

    Filesize

    632KB

  • memory/2572-23-0x0000000000330000-0x00000000003CE000-memory.dmp

    Filesize

    632KB

  • memory/2572-33-0x0000000000400000-0x000000000049E000-memory.dmp

    Filesize

    632KB

  • memory/2572-35-0x0000000000400000-0x000000000049E000-memory.dmp

    Filesize

    632KB