Analysis
-
max time kernel
101s -
max time network
212s -
platform
windows11-21h2_x64 -
resource
win11-20250313-en -
resource tags
arch:x64arch:x86image:win11-20250313-enlocale:en-usos:windows11-21h2-x64system -
submitted
29/03/2025, 15:31
Static task
static1
Behavioral task
behavioral1
Sample
D0GLUN6.0.exe
Resource
win11-20250313-en
General
-
Target
D0GLUN6.0.exe
-
Size
3.3MB
-
MD5
ae7fd46e6ad1b9c11b5d3701ad4509ee
-
SHA1
37a8c7d8eb861e66dae529d45975b36afc3650dc
-
SHA256
f3f196b264ce23a490f1b8c20176e01027fc735210c13c30e442b2d41a4e5b57
-
SHA512
c171f158aeec300b3c06ec76893f6b491b075e5968369daa82fd1fd19c7342285c752818c32317a3b2b83ec7596feee5437bb64b84e7bede61eb0e08db312c67
-
SSDEEP
98304:Hy9ZkqBhJ5mFgSCg3r8ScOF+Q+VnxELspH3e:gf5qga3ccOxAspH3e
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language D0GLUN6.0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language D0GLUN6.0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language D0GLUN6.0.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 3016 PING.EXE 2188 PING.EXE -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 3016 PING.EXE 2188 PING.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2792 D0GLUN6.0.exe 2792 D0GLUN6.0.exe 1628 D0GLUN6.0.exe 1628 D0GLUN6.0.exe 3664 D0GLUN6.0.exe 3664 D0GLUN6.0.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2792 wrote to memory of 384 2792 D0GLUN6.0.exe 82 PID 2792 wrote to memory of 384 2792 D0GLUN6.0.exe 82 PID 2792 wrote to memory of 384 2792 D0GLUN6.0.exe 82 PID 384 wrote to memory of 3016 384 cmd.exe 84 PID 384 wrote to memory of 3016 384 cmd.exe 84 PID 384 wrote to memory of 3016 384 cmd.exe 84 PID 384 wrote to memory of 1628 384 cmd.exe 85 PID 384 wrote to memory of 1628 384 cmd.exe 85 PID 384 wrote to memory of 1628 384 cmd.exe 85 PID 1628 wrote to memory of 3804 1628 D0GLUN6.0.exe 86 PID 1628 wrote to memory of 3804 1628 D0GLUN6.0.exe 86 PID 1628 wrote to memory of 3804 1628 D0GLUN6.0.exe 86 PID 3804 wrote to memory of 2188 3804 cmd.exe 88 PID 3804 wrote to memory of 2188 3804 cmd.exe 88 PID 3804 wrote to memory of 2188 3804 cmd.exe 88 PID 3804 wrote to memory of 3664 3804 cmd.exe 89 PID 3804 wrote to memory of 3664 3804 cmd.exe 89 PID 3804 wrote to memory of 3664 3804 cmd.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\D0GLUN6.0.exe"C:\Users\Admin\AppData\Local\Temp\D0GLUN6.0.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\Restart.bat2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:384 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 23⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3016
-
-
C:\Users\Admin\AppData\Local\Temp\D0GLUN6.0.exe"C:\Users\Admin\AppData\Local\Temp\D0GLUN~1.EXE"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\Restart.bat4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3804 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 25⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2188
-
-
C:\Users\Admin\AppData\Local\Temp\D0GLUN6.0.exe"C:\Users\Admin\AppData\Local\Temp\D0GLUN~1.EXE"5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3664
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
113B
MD511ffbf51f10f1d6245018df1bcc3be1a
SHA189ca50045fa15ef0bb67e76b45a3ad6d3307f0f2
SHA2565ff59a98108bbe6e28308339fc3d1ffa6cca01b9901f876a7eeaa1645a7c37cd
SHA51284ac505d6948b5bfb5197778aa702854da88a69ead2c14f3899ddd318e7c0f9488f860e1eedf8a762e7f554f92bdbe9ee12fdee1879f14b19f13a7058578eb1f