Analysis
-
max time kernel
93s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
20-10-2022 00:00
Static task
static1
Behavioral task
behavioral1
Sample
350800de31cc1bba31ad8c2541dee5aaef3975ae886967c4bb50ca3e90925bbe.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
350800de31cc1bba31ad8c2541dee5aaef3975ae886967c4bb50ca3e90925bbe.exe
Resource
win10v2004-20220812-en
General
-
Target
350800de31cc1bba31ad8c2541dee5aaef3975ae886967c4bb50ca3e90925bbe.exe
-
Size
64KB
-
MD5
7c97cd5530dc844164ab5aac674f74eb
-
SHA1
8d0161652f007edbea8e8cefb3a8938eba92df86
-
SHA256
350800de31cc1bba31ad8c2541dee5aaef3975ae886967c4bb50ca3e90925bbe
-
SHA512
ae3a4067c92f8730fd4c7761c23e15de645b219bdfeb506c6b97d2eaf480535db0cd85be52f52d476b6a6d47ace345dbe8180e0fa3d47e08ce97367b5584bc9e
-
SSDEEP
1536:YHnjJExQyk9nbK6Bmvf5SuE8YuEbg7JNTwyLd:YHnNQDvs05Susbg7HTFJ
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 28 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fpqcncgg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gganfooo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Galodddm.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ganljdbj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dmmdpkjl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cciplgni.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Efjbdpmg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fjkqgk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ganljdbj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ipaelnjb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hphbfpbm.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hhagmm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cciplgni.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Encgkmkg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Galodddm.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hphbfpbm.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dmmdpkjl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fpqcncgg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 350800de31cc1bba31ad8c2541dee5aaef3975ae886967c4bb50ca3e90925bbe.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fjkqgk32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gganfooo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hhagmm32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ifkmihbo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Encgkmkg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Efjbdpmg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ipaelnjb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ifkmihbo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" 350800de31cc1bba31ad8c2541dee5aaef3975ae886967c4bb50ca3e90925bbe.exe -
Executes dropped EXE 14 IoCs
pid Process 5060 Cciplgni.exe 5024 Dmmdpkjl.exe 920 Efjbdpmg.exe 1452 Encgkmkg.exe 488 Fpqcncgg.exe 4752 Fjkqgk32.exe 2136 Gganfooo.exe 1704 Galodddm.exe 1320 Ganljdbj.exe 312 Hphbfpbm.exe 3852 Hhagmm32.exe 1244 Ipaelnjb.exe 4668 Ifkmihbo.exe 3520 Ifnjnhpl.exe -
Drops file in System32 directory 42 IoCs
description ioc Process File created C:\Windows\SysWOW64\Dmmdpkjl.exe Cciplgni.exe File opened for modification C:\Windows\SysWOW64\Galodddm.exe Gganfooo.exe File created C:\Windows\SysWOW64\Ifkmihbo.exe Ipaelnjb.exe File opened for modification C:\Windows\SysWOW64\Ifkmihbo.exe Ipaelnjb.exe File created C:\Windows\SysWOW64\Nbifgbmb.dll Hhagmm32.exe File created C:\Windows\SysWOW64\Nijgle32.dll 350800de31cc1bba31ad8c2541dee5aaef3975ae886967c4bb50ca3e90925bbe.exe File opened for modification C:\Windows\SysWOW64\Efjbdpmg.exe Dmmdpkjl.exe File created C:\Windows\SysWOW64\Encgkmkg.exe Efjbdpmg.exe File created C:\Windows\SysWOW64\Hdbnlfih.dll Gganfooo.exe File created C:\Windows\SysWOW64\Hphbfpbm.exe Ganljdbj.exe File created C:\Windows\SysWOW64\Fpqcncgg.exe Encgkmkg.exe File created C:\Windows\SysWOW64\Iqbjof32.dll Fjkqgk32.exe File created C:\Windows\SysWOW64\Galodddm.exe Gganfooo.exe File opened for modification C:\Windows\SysWOW64\Ganljdbj.exe Galodddm.exe File opened for modification C:\Windows\SysWOW64\Ipaelnjb.exe Hhagmm32.exe File opened for modification C:\Windows\SysWOW64\Ifnjnhpl.exe Ifkmihbo.exe File created C:\Windows\SysWOW64\Efjbdpmg.exe Dmmdpkjl.exe File created C:\Windows\SysWOW64\Nmqpmi32.dll Efjbdpmg.exe File opened for modification C:\Windows\SysWOW64\Fpqcncgg.exe Encgkmkg.exe File created C:\Windows\SysWOW64\Fjkqgk32.exe Fpqcncgg.exe File opened for modification C:\Windows\SysWOW64\Gganfooo.exe Fjkqgk32.exe File created C:\Windows\SysWOW64\Cngaci32.dll Cciplgni.exe File created C:\Windows\SysWOW64\Ddlhfg32.dll Galodddm.exe File created C:\Windows\SysWOW64\Hhagmm32.exe Hphbfpbm.exe File created C:\Windows\SysWOW64\Ipaelnjb.exe Hhagmm32.exe File created C:\Windows\SysWOW64\Ifnjnhpl.exe Ifkmihbo.exe File created C:\Windows\SysWOW64\Gganfooo.exe Fjkqgk32.exe File opened for modification C:\Windows\SysWOW64\Hphbfpbm.exe Ganljdbj.exe File created C:\Windows\SysWOW64\Fncikdnp.dll Ganljdbj.exe File opened for modification C:\Windows\SysWOW64\Hhagmm32.exe Hphbfpbm.exe File created C:\Windows\SysWOW64\Pmlofmoa.dll Ipaelnjb.exe File created C:\Windows\SysWOW64\Cciplgni.exe 350800de31cc1bba31ad8c2541dee5aaef3975ae886967c4bb50ca3e90925bbe.exe File created C:\Windows\SysWOW64\Phgqkmbo.dll Dmmdpkjl.exe File opened for modification C:\Windows\SysWOW64\Encgkmkg.exe Efjbdpmg.exe File created C:\Windows\SysWOW64\Dpolpaag.dll Encgkmkg.exe File opened for modification C:\Windows\SysWOW64\Fjkqgk32.exe Fpqcncgg.exe File created C:\Windows\SysWOW64\Ncllhiab.dll Ifkmihbo.exe File opened for modification C:\Windows\SysWOW64\Cciplgni.exe 350800de31cc1bba31ad8c2541dee5aaef3975ae886967c4bb50ca3e90925bbe.exe File opened for modification C:\Windows\SysWOW64\Dmmdpkjl.exe Cciplgni.exe File created C:\Windows\SysWOW64\Dipolgbc.dll Fpqcncgg.exe File created C:\Windows\SysWOW64\Ganljdbj.exe Galodddm.exe File created C:\Windows\SysWOW64\Jnefeijp.dll Hphbfpbm.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 4480 3520 WerFault.exe 95 2848 3520 WerFault.exe 95 -
Modifies registry class 45 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ncllhiab.dll" Ifkmihbo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ifkmihbo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nijgle32.dll" 350800de31cc1bba31ad8c2541dee5aaef3975ae886967c4bb50ca3e90925bbe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dipolgbc.dll" Fpqcncgg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Iqbjof32.dll" Fjkqgk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ganljdbj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hphbfpbm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Efjbdpmg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Encgkmkg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gganfooo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} 350800de31cc1bba31ad8c2541dee5aaef3975ae886967c4bb50ca3e90925bbe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cciplgni.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dmmdpkjl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Phgqkmbo.dll" Dmmdpkjl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dmmdpkjl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ganljdbj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hhagmm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pmlofmoa.dll" Ipaelnjb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ipaelnjb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 350800de31cc1bba31ad8c2541dee5aaef3975ae886967c4bb50ca3e90925bbe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fpqcncgg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fjkqgk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gganfooo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" 350800de31cc1bba31ad8c2541dee5aaef3975ae886967c4bb50ca3e90925bbe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fncikdnp.dll" Ganljdbj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ipaelnjb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nbifgbmb.dll" Hhagmm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Efjbdpmg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fpqcncgg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Galodddm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jnefeijp.dll" Hphbfpbm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hhagmm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nmqpmi32.dll" Efjbdpmg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dpolpaag.dll" Encgkmkg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hphbfpbm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node 350800de31cc1bba31ad8c2541dee5aaef3975ae886967c4bb50ca3e90925bbe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cngaci32.dll" Cciplgni.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hdbnlfih.dll" Gganfooo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ifkmihbo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ddlhfg32.dll" Galodddm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID 350800de31cc1bba31ad8c2541dee5aaef3975ae886967c4bb50ca3e90925bbe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cciplgni.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Encgkmkg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fjkqgk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Galodddm.exe -
Suspicious use of WriteProcessMemory 45 IoCs
description pid Process procid_target PID 4856 wrote to memory of 5060 4856 350800de31cc1bba31ad8c2541dee5aaef3975ae886967c4bb50ca3e90925bbe.exe 82 PID 4856 wrote to memory of 5060 4856 350800de31cc1bba31ad8c2541dee5aaef3975ae886967c4bb50ca3e90925bbe.exe 82 PID 4856 wrote to memory of 5060 4856 350800de31cc1bba31ad8c2541dee5aaef3975ae886967c4bb50ca3e90925bbe.exe 82 PID 5060 wrote to memory of 5024 5060 Cciplgni.exe 83 PID 5060 wrote to memory of 5024 5060 Cciplgni.exe 83 PID 5060 wrote to memory of 5024 5060 Cciplgni.exe 83 PID 5024 wrote to memory of 920 5024 Dmmdpkjl.exe 84 PID 5024 wrote to memory of 920 5024 Dmmdpkjl.exe 84 PID 5024 wrote to memory of 920 5024 Dmmdpkjl.exe 84 PID 920 wrote to memory of 1452 920 Efjbdpmg.exe 85 PID 920 wrote to memory of 1452 920 Efjbdpmg.exe 85 PID 920 wrote to memory of 1452 920 Efjbdpmg.exe 85 PID 1452 wrote to memory of 488 1452 Encgkmkg.exe 86 PID 1452 wrote to memory of 488 1452 Encgkmkg.exe 86 PID 1452 wrote to memory of 488 1452 Encgkmkg.exe 86 PID 488 wrote to memory of 4752 488 Fpqcncgg.exe 87 PID 488 wrote to memory of 4752 488 Fpqcncgg.exe 87 PID 488 wrote to memory of 4752 488 Fpqcncgg.exe 87 PID 4752 wrote to memory of 2136 4752 Fjkqgk32.exe 88 PID 4752 wrote to memory of 2136 4752 Fjkqgk32.exe 88 PID 4752 wrote to memory of 2136 4752 Fjkqgk32.exe 88 PID 2136 wrote to memory of 1704 2136 Gganfooo.exe 89 PID 2136 wrote to memory of 1704 2136 Gganfooo.exe 89 PID 2136 wrote to memory of 1704 2136 Gganfooo.exe 89 PID 1704 wrote to memory of 1320 1704 Galodddm.exe 90 PID 1704 wrote to memory of 1320 1704 Galodddm.exe 90 PID 1704 wrote to memory of 1320 1704 Galodddm.exe 90 PID 1320 wrote to memory of 312 1320 Ganljdbj.exe 91 PID 1320 wrote to memory of 312 1320 Ganljdbj.exe 91 PID 1320 wrote to memory of 312 1320 Ganljdbj.exe 91 PID 312 wrote to memory of 3852 312 Hphbfpbm.exe 92 PID 312 wrote to memory of 3852 312 Hphbfpbm.exe 92 PID 312 wrote to memory of 3852 312 Hphbfpbm.exe 92 PID 3852 wrote to memory of 1244 3852 Hhagmm32.exe 93 PID 3852 wrote to memory of 1244 3852 Hhagmm32.exe 93 PID 3852 wrote to memory of 1244 3852 Hhagmm32.exe 93 PID 1244 wrote to memory of 4668 1244 Ipaelnjb.exe 94 PID 1244 wrote to memory of 4668 1244 Ipaelnjb.exe 94 PID 1244 wrote to memory of 4668 1244 Ipaelnjb.exe 94 PID 4668 wrote to memory of 3520 4668 Ifkmihbo.exe 95 PID 4668 wrote to memory of 3520 4668 Ifkmihbo.exe 95 PID 4668 wrote to memory of 3520 4668 Ifkmihbo.exe 95 PID 3520 wrote to memory of 4480 3520 Ifnjnhpl.exe 97 PID 3520 wrote to memory of 4480 3520 Ifnjnhpl.exe 97 PID 3520 wrote to memory of 4480 3520 Ifnjnhpl.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\350800de31cc1bba31ad8c2541dee5aaef3975ae886967c4bb50ca3e90925bbe.exe"C:\Users\Admin\AppData\Local\Temp\350800de31cc1bba31ad8c2541dee5aaef3975ae886967c4bb50ca3e90925bbe.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Windows\SysWOW64\Cciplgni.exeC:\Windows\system32\Cciplgni.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Windows\SysWOW64\Dmmdpkjl.exeC:\Windows\system32\Dmmdpkjl.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5024 -
C:\Windows\SysWOW64\Efjbdpmg.exeC:\Windows\system32\Efjbdpmg.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:920 -
C:\Windows\SysWOW64\Encgkmkg.exeC:\Windows\system32\Encgkmkg.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Windows\SysWOW64\Fpqcncgg.exeC:\Windows\system32\Fpqcncgg.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:488 -
C:\Windows\SysWOW64\Fjkqgk32.exeC:\Windows\system32\Fjkqgk32.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4752 -
C:\Windows\SysWOW64\Gganfooo.exeC:\Windows\system32\Gganfooo.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Windows\SysWOW64\Galodddm.exeC:\Windows\system32\Galodddm.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\SysWOW64\Ganljdbj.exeC:\Windows\system32\Ganljdbj.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Windows\SysWOW64\Hphbfpbm.exeC:\Windows\system32\Hphbfpbm.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:312 -
C:\Windows\SysWOW64\Hhagmm32.exeC:\Windows\system32\Hhagmm32.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3852 -
C:\Windows\SysWOW64\Ipaelnjb.exeC:\Windows\system32\Ipaelnjb.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Windows\SysWOW64\Ifkmihbo.exeC:\Windows\system32\Ifkmihbo.exe14⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4668 -
C:\Windows\SysWOW64\Ifnjnhpl.exeC:\Windows\system32\Ifnjnhpl.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3520 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3520 -s 40816⤵
- Program crash
PID:4480
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3520 -s 40816⤵
- Program crash
PID:2848
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 3520 -ip 35201⤵PID:3720
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD584fd41f322ebf3923b0f9d663ba9c9bd
SHA1d75de837fb8f52783a9ebea0c305b7a6e0875bc1
SHA2562c18124b0b8f3b7c790354ba12c5406472ad72d7faad81c7b3fef64104b86d1d
SHA5125e2f21748dfa2c9384f4b264c1e25db1217b77d0a7571a8ad03e5a4743ac995b051fa3ded6bb7b17c0bb25787969ede4383faa87a8a409972dd0657a2545e3d1
-
Filesize
64KB
MD584fd41f322ebf3923b0f9d663ba9c9bd
SHA1d75de837fb8f52783a9ebea0c305b7a6e0875bc1
SHA2562c18124b0b8f3b7c790354ba12c5406472ad72d7faad81c7b3fef64104b86d1d
SHA5125e2f21748dfa2c9384f4b264c1e25db1217b77d0a7571a8ad03e5a4743ac995b051fa3ded6bb7b17c0bb25787969ede4383faa87a8a409972dd0657a2545e3d1
-
Filesize
64KB
MD577a1a4f43309ffb584a9ae0c0ad9add2
SHA150cec05423cef748c633dedb407eba23b5d16ea4
SHA256da51ad931cbbce66ea511b612bdfb41c4a3dbb1abb4bb626212f9071847aceba
SHA512d41828f81a4f097a3af4a8f2f859c891bd5f69a006bf0f272dde8d3db683b5bacbe910a4937e2da0b65ad6152fce56c9886d1c6e8c85db54e46d02a4c28bb113
-
Filesize
64KB
MD577a1a4f43309ffb584a9ae0c0ad9add2
SHA150cec05423cef748c633dedb407eba23b5d16ea4
SHA256da51ad931cbbce66ea511b612bdfb41c4a3dbb1abb4bb626212f9071847aceba
SHA512d41828f81a4f097a3af4a8f2f859c891bd5f69a006bf0f272dde8d3db683b5bacbe910a4937e2da0b65ad6152fce56c9886d1c6e8c85db54e46d02a4c28bb113
-
Filesize
64KB
MD55ee2fbd2ab6abac13d7708a765cb7e9c
SHA17ce8f1956ff993f34c61874f3dc59d6c59d98c49
SHA256dc15f0d9a21f1d6aa6e75466fe9cc6988aa3543bf409187e4e866d85c6e3908d
SHA512030c69acfc422fdc31737f526b8a0e0b343fc9d74451dd5e3af61799b7c5248877c2054883e6b954f7abb5d2acf9877aed80ef46afccc251198ba0276a7151c6
-
Filesize
64KB
MD55ee2fbd2ab6abac13d7708a765cb7e9c
SHA17ce8f1956ff993f34c61874f3dc59d6c59d98c49
SHA256dc15f0d9a21f1d6aa6e75466fe9cc6988aa3543bf409187e4e866d85c6e3908d
SHA512030c69acfc422fdc31737f526b8a0e0b343fc9d74451dd5e3af61799b7c5248877c2054883e6b954f7abb5d2acf9877aed80ef46afccc251198ba0276a7151c6
-
Filesize
64KB
MD567fe772ae0e816f03f8c871c044cfb7a
SHA1fcd671601722f0761a63f8a1bbf8c66f4eb113e0
SHA256662fd2145626347aac97740fdbac484d2dce2eae1ffc0fc3a3fbdfc0255585b3
SHA512918cea06ca426dc1c5b8f6a880392141e517358ac969b5e7a376d85521cfd61d80cb84f1d30dc86fd85bcef3fc3b7023b6efe7a81f887cae32493947dd6fbcfa
-
Filesize
64KB
MD567fe772ae0e816f03f8c871c044cfb7a
SHA1fcd671601722f0761a63f8a1bbf8c66f4eb113e0
SHA256662fd2145626347aac97740fdbac484d2dce2eae1ffc0fc3a3fbdfc0255585b3
SHA512918cea06ca426dc1c5b8f6a880392141e517358ac969b5e7a376d85521cfd61d80cb84f1d30dc86fd85bcef3fc3b7023b6efe7a81f887cae32493947dd6fbcfa
-
Filesize
64KB
MD5711e03c5c3ee8df5308c411590ff4eda
SHA16fa451bc5b3c0374e9c999ff8c6875e2627a4740
SHA256eee1fb36defe7202625636bb116accba3d0d5e888732504fc6248bce90c94cf2
SHA512476cb87f1b17c2046b6a3734fba7c34c57983b00e5e3071e4eccaa3ed51c3657013b7f570f181306d0c68dd7489f3ae3482289791dc152fe70db7ed3a713fc03
-
Filesize
64KB
MD5711e03c5c3ee8df5308c411590ff4eda
SHA16fa451bc5b3c0374e9c999ff8c6875e2627a4740
SHA256eee1fb36defe7202625636bb116accba3d0d5e888732504fc6248bce90c94cf2
SHA512476cb87f1b17c2046b6a3734fba7c34c57983b00e5e3071e4eccaa3ed51c3657013b7f570f181306d0c68dd7489f3ae3482289791dc152fe70db7ed3a713fc03
-
Filesize
64KB
MD591125a5811ffe17725d1d30b1c14f493
SHA125a83af54015d81b6ae7d8d08ff8741317f8ea83
SHA25660815b7b405835fe2a67351de04e323a64f01627fb961b204331745d53684f3c
SHA51238adbb1dbdfb3ba774ca6ce60489bfe0ab83cbac3f52f5cfb3d9db83a6ac2da5b56ce0e322e41a9e426903334bda0bdcae331844e045a5239c855457b0ecae30
-
Filesize
64KB
MD591125a5811ffe17725d1d30b1c14f493
SHA125a83af54015d81b6ae7d8d08ff8741317f8ea83
SHA25660815b7b405835fe2a67351de04e323a64f01627fb961b204331745d53684f3c
SHA51238adbb1dbdfb3ba774ca6ce60489bfe0ab83cbac3f52f5cfb3d9db83a6ac2da5b56ce0e322e41a9e426903334bda0bdcae331844e045a5239c855457b0ecae30
-
Filesize
64KB
MD5742c8915c97f21a15a8f681ccea836c6
SHA17b10305e83b4232ddc3c2215a01482383924f8e8
SHA256208fc3e9edd0705359b12552018e4b484afda1fb96d5940c5d85259c898f746a
SHA51210b73be0f31d13e1965ae1aeb1f0570d696c36128767173629f447f5025fd3b859fd14b26d7c8b2eb4c95118f41789e4fbdddb057f596463874f8269a1a0742a
-
Filesize
64KB
MD5742c8915c97f21a15a8f681ccea836c6
SHA17b10305e83b4232ddc3c2215a01482383924f8e8
SHA256208fc3e9edd0705359b12552018e4b484afda1fb96d5940c5d85259c898f746a
SHA51210b73be0f31d13e1965ae1aeb1f0570d696c36128767173629f447f5025fd3b859fd14b26d7c8b2eb4c95118f41789e4fbdddb057f596463874f8269a1a0742a
-
Filesize
64KB
MD51f438b613351b164657af7666e481df4
SHA1d80d02fb7e77582ec4da55211794d3aa5df3cd45
SHA256b72e606219ba36c6f37cbf9c27dda3c48fe4268ea949ff9444cd0ed354691237
SHA512468ccb306a5dca7366ae14ff62252fd2affac9cbf75b55f370d13c6fbd14d1d8b06d428cea25d18b57d0ae799dec713b9efe2917ac0e9021daded53d43f9d98d
-
Filesize
64KB
MD51f438b613351b164657af7666e481df4
SHA1d80d02fb7e77582ec4da55211794d3aa5df3cd45
SHA256b72e606219ba36c6f37cbf9c27dda3c48fe4268ea949ff9444cd0ed354691237
SHA512468ccb306a5dca7366ae14ff62252fd2affac9cbf75b55f370d13c6fbd14d1d8b06d428cea25d18b57d0ae799dec713b9efe2917ac0e9021daded53d43f9d98d
-
Filesize
64KB
MD5101e625585eaa1bf9accc87524b6c086
SHA1c1faeadbea0af602abca653400a24c3108e5f766
SHA2564d9a92373e687bf894fc6097fba9f72a5f047ef19d76da137685ae4cacfb531d
SHA5129223c95cacc1aae5dae340d5f5d4552bd352b9dc482433c12e2bc2525b1bedf939c8adaa75258984bb7f162fcd54a5c0034a783b7ce38fde73cb259fb638c894
-
Filesize
64KB
MD5101e625585eaa1bf9accc87524b6c086
SHA1c1faeadbea0af602abca653400a24c3108e5f766
SHA2564d9a92373e687bf894fc6097fba9f72a5f047ef19d76da137685ae4cacfb531d
SHA5129223c95cacc1aae5dae340d5f5d4552bd352b9dc482433c12e2bc2525b1bedf939c8adaa75258984bb7f162fcd54a5c0034a783b7ce38fde73cb259fb638c894
-
Filesize
64KB
MD580c4718e6f08c1e6d64403d49188b730
SHA122e1f7d6771cffb40c72d56e0e12f343fa4bdefc
SHA2566d0a1de5cbb3bedd9ebe020d35537e38acf7ad3be9aef2b278538b13a1cfa82d
SHA5127b426442c597e2d26f70125ac22f3a06360f7ff75cfa5bc4df95260061cf76318b6df82814cd973948fd718025eaf223d0ee327da2fdef309c649da0506c6960
-
Filesize
64KB
MD580c4718e6f08c1e6d64403d49188b730
SHA122e1f7d6771cffb40c72d56e0e12f343fa4bdefc
SHA2566d0a1de5cbb3bedd9ebe020d35537e38acf7ad3be9aef2b278538b13a1cfa82d
SHA5127b426442c597e2d26f70125ac22f3a06360f7ff75cfa5bc4df95260061cf76318b6df82814cd973948fd718025eaf223d0ee327da2fdef309c649da0506c6960
-
Filesize
64KB
MD54c7efa952b12846523edb22b56ffc745
SHA1548ec8f49724c4ebc54b369924ac8635e5effe9a
SHA256bcfab57789448a774a3370c2651438a7a05e5dc04d0b6919b523f77a686315f9
SHA512038a7b7317ee330db2ada2fbdf7c56751c2e348c3c6e4fd54038316c3c77f78579fbda8d45013162bd1fdda1535462ed65407ee99b6e47d892d191319583b979
-
Filesize
64KB
MD54c7efa952b12846523edb22b56ffc745
SHA1548ec8f49724c4ebc54b369924ac8635e5effe9a
SHA256bcfab57789448a774a3370c2651438a7a05e5dc04d0b6919b523f77a686315f9
SHA512038a7b7317ee330db2ada2fbdf7c56751c2e348c3c6e4fd54038316c3c77f78579fbda8d45013162bd1fdda1535462ed65407ee99b6e47d892d191319583b979
-
Filesize
64KB
MD5161b211b98414b43a9b358c05e10efa6
SHA120e05ddd25974bb1d44b39f4db740730576b4654
SHA25639b47d6582a96d9ad549c111a7b0f009d55bbb18c3d5f8fd9b154cd7c0e35532
SHA51240e3148b9c56e6ba69343587822d21cce218fc946f8a8ca10536c3d7c7f5c34b6cbebdc8da1e691cf0695e22a20c9b9bad55a3488595db3e95e0e52c3377f598
-
Filesize
64KB
MD5161b211b98414b43a9b358c05e10efa6
SHA120e05ddd25974bb1d44b39f4db740730576b4654
SHA25639b47d6582a96d9ad549c111a7b0f009d55bbb18c3d5f8fd9b154cd7c0e35532
SHA51240e3148b9c56e6ba69343587822d21cce218fc946f8a8ca10536c3d7c7f5c34b6cbebdc8da1e691cf0695e22a20c9b9bad55a3488595db3e95e0e52c3377f598
-
Filesize
64KB
MD56595cccafa76f28260885dfa090e716d
SHA137de696380f54a85167f967fd6a0831b5d034de5
SHA2563294f8c5b1771f28f05c994ccd696f2a2265a4281d6f794e78844f097e389062
SHA51263234044a585226edd0204c9f9749f66faee5e65795bed8ef7c901803c320c2242dcf5285ab05c85e1f68c2423d5e3ce90ccef44df02dffb34c6ca609daa1bca
-
Filesize
64KB
MD56595cccafa76f28260885dfa090e716d
SHA137de696380f54a85167f967fd6a0831b5d034de5
SHA2563294f8c5b1771f28f05c994ccd696f2a2265a4281d6f794e78844f097e389062
SHA51263234044a585226edd0204c9f9749f66faee5e65795bed8ef7c901803c320c2242dcf5285ab05c85e1f68c2423d5e3ce90ccef44df02dffb34c6ca609daa1bca
-
Filesize
64KB
MD5df375de4856f9c8054f2e5b92c68b0c6
SHA19cdd6254b6e78e1156045497726db7d26f92c033
SHA256675ffd2613b0a016b35a61c24b1c73cd1aa9644bf7a9d0833ca91a3703ed9f85
SHA512e2aefc1add4fc72693f26bbc709750f1c98a682a7ee9a98e770cdff029bba9e48ee6a41ffd3345ef10415374c05f8c38a7c94e82f37264c1656efbff29b6d94a
-
Filesize
64KB
MD5df375de4856f9c8054f2e5b92c68b0c6
SHA19cdd6254b6e78e1156045497726db7d26f92c033
SHA256675ffd2613b0a016b35a61c24b1c73cd1aa9644bf7a9d0833ca91a3703ed9f85
SHA512e2aefc1add4fc72693f26bbc709750f1c98a682a7ee9a98e770cdff029bba9e48ee6a41ffd3345ef10415374c05f8c38a7c94e82f37264c1656efbff29b6d94a