Analysis
-
max time kernel
79s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
01-11-2023 09:57
Behavioral task
behavioral1
Sample
NEAS.0299570b14805e6f5d46fe2e34a03cc0_JC.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.0299570b14805e6f5d46fe2e34a03cc0_JC.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.0299570b14805e6f5d46fe2e34a03cc0_JC.exe
-
Size
161KB
-
MD5
0299570b14805e6f5d46fe2e34a03cc0
-
SHA1
4a1f7f483eeab149957eef27cd935f60ef311f62
-
SHA256
43676b2bcca6882c3875a4712b2ed760e609ea08c9d584c0fffaf76f1f7e6833
-
SHA512
01e41137533a540472ac30b7e2879a621b273fdcc4c613d4a1ac82b3ca0be5970dac1d8468f3424d26b8af9fb87c248211cbadad496ce4ed18f5906a58f1eb90
-
SSDEEP
3072:0esahcjcuQ3/V8wkMVwtCJXeex7rrIRZK8K8/kv:05j3wkMVwtmeetrIyR
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Phneqf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jonlimkg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jmamba32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dhfcae32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Klgend32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fakfglhm.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lkbmih32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Phpbffnp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ogbbqo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Akenij32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bgodjiio.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oqmhlego.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Imjddmpl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Odocbmfd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Lelajb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jloibkhh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Acaanp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Iqaiga32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Iofpnhmc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ikmpcicg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mjcghm32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Agcikk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Imofip32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Nmmqgo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Adkelplc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Qckbggad.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kdbjbfjl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bojohp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Fjcjpb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Process not Found Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Feifgnki.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aaofedkl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bimoecio.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Piocecgj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ecanojgl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Himgjbii.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Hejono32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bipcei32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Apnndj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gbhpajlj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ioafchai.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jedjkkmo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Lmcejbbd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Hmlbij32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ebbinp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Cpljehpo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jnmglk32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bfghlhmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jfokff32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Lmiljn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Pnhjig32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Adjnaj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Gdkbdllj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Foclgq32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fqiiamjp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qcbmegol.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Mokdllim.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ppphkq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Process not Found Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gkdjaf32.exe -
Malware Backdoor - Berbew 64 IoCs
Berbew is a malware infection classified as a 'backdoor' Trojan. This malicious program's primary function is to cause chain infections - it can download/install additional malware such as other Trojans, ransomware, and cryptominers.
resource yara_rule behavioral2/files/0x0006000000022cf1-6.dat family_berbew behavioral2/files/0x0006000000022cf1-8.dat family_berbew behavioral2/files/0x0006000000022cfb-13.dat family_berbew behavioral2/files/0x0006000000022cfb-15.dat family_berbew behavioral2/files/0x0006000000022cfd-22.dat family_berbew behavioral2/files/0x0006000000022cfd-24.dat family_berbew behavioral2/files/0x0006000000022d03-25.dat family_berbew behavioral2/files/0x0006000000022d03-30.dat family_berbew behavioral2/files/0x0006000000022d03-32.dat family_berbew behavioral2/files/0x0006000000022d05-38.dat family_berbew behavioral2/files/0x0006000000022d05-40.dat family_berbew behavioral2/files/0x0007000000022cf6-46.dat family_berbew behavioral2/files/0x0007000000022cf6-48.dat family_berbew behavioral2/files/0x0007000000022cf8-54.dat family_berbew behavioral2/files/0x0007000000022cf8-56.dat family_berbew behavioral2/files/0x0009000000022d08-57.dat family_berbew behavioral2/files/0x0009000000022d08-62.dat family_berbew behavioral2/files/0x0009000000022d08-64.dat family_berbew behavioral2/files/0x0006000000022d0b-71.dat family_berbew behavioral2/files/0x0006000000022d0b-73.dat family_berbew behavioral2/files/0x0006000000022d0d-79.dat family_berbew behavioral2/files/0x0006000000022d0d-81.dat family_berbew behavioral2/files/0x0006000000022d0f-82.dat family_berbew behavioral2/files/0x0006000000022d0f-87.dat family_berbew behavioral2/files/0x0006000000022d0f-89.dat family_berbew behavioral2/files/0x0006000000022d11-96.dat family_berbew behavioral2/files/0x0006000000022d11-98.dat family_berbew behavioral2/files/0x0007000000022d12-105.dat family_berbew behavioral2/files/0x0007000000022d12-107.dat family_berbew behavioral2/files/0x0006000000022d15-109.dat family_berbew behavioral2/files/0x0006000000022d15-114.dat family_berbew behavioral2/files/0x0006000000022d15-117.dat family_berbew behavioral2/files/0x0007000000022d02-123.dat family_berbew behavioral2/files/0x0007000000022d02-125.dat family_berbew behavioral2/files/0x0006000000022d18-132.dat family_berbew behavioral2/files/0x0006000000022d18-134.dat family_berbew behavioral2/files/0x0006000000022d1a-136.dat family_berbew behavioral2/files/0x0006000000022d1a-141.dat family_berbew behavioral2/files/0x0006000000022d1a-143.dat family_berbew behavioral2/files/0x0006000000022d1c-150.dat family_berbew behavioral2/files/0x0006000000022d1c-151.dat family_berbew behavioral2/files/0x0007000000022d01-158.dat family_berbew behavioral2/files/0x0007000000022d01-161.dat family_berbew behavioral2/files/0x0006000000022d1e-168.dat family_berbew behavioral2/files/0x0006000000022d1e-170.dat family_berbew behavioral2/files/0x0006000000022d20-178.dat family_berbew behavioral2/files/0x0006000000022d20-180.dat family_berbew behavioral2/files/0x0006000000022d22-186.dat family_berbew behavioral2/files/0x0006000000022d22-188.dat family_berbew behavioral2/files/0x0006000000022d24-190.dat family_berbew behavioral2/files/0x0006000000022d24-195.dat family_berbew behavioral2/files/0x0006000000022d24-198.dat family_berbew behavioral2/files/0x0006000000022d26-204.dat family_berbew behavioral2/files/0x0006000000022d26-206.dat family_berbew behavioral2/files/0x0006000000022d28-208.dat family_berbew behavioral2/files/0x0006000000022d28-213.dat family_berbew behavioral2/files/0x0006000000022d28-215.dat family_berbew behavioral2/files/0x0006000000022d2a-222.dat family_berbew behavioral2/files/0x0006000000022d2a-224.dat family_berbew behavioral2/files/0x0006000000022d2c-231.dat family_berbew behavioral2/files/0x0006000000022d2c-234.dat family_berbew behavioral2/files/0x0006000000022d2e-240.dat family_berbew behavioral2/files/0x0006000000022d2e-242.dat family_berbew behavioral2/files/0x0006000000022d30-248.dat family_berbew -
Executes dropped EXE 64 IoCs
pid Process 1744 Foclgq32.exe 1452 Gbnhoj32.exe 2344 Gijmad32.exe 4004 Hnnljj32.exe 4008 Haaaaeim.exe 1952 Ibgdlg32.exe 448 Jhnojl32.exe 3996 Kakmna32.exe 4680 Klggli32.exe 3456 Lljdai32.exe 884 Lcfidb32.exe 1424 Lancko32.exe 5008 Mlhqcgnk.exe 1972 Njbgmjgl.exe 4868 Ojqcnhkl.exe 2712 Ocihgnam.exe 4508 Piocecgj.exe 4768 Qapnmopa.exe 216 Aaiqcnhg.exe 1908 Apnndj32.exe 4900 Bfaigclq.exe 2524 Cpljehpo.exe 4440 Ckdkhq32.exe 4640 Ckidcpjl.exe 4808 Dnljkk32.exe 2548 Egbken32.exe 4044 Fggdpnkf.exe 2168 Fcbnpnme.exe 1924 Fnhbmgmk.exe 2216 Gclafmej.exe 1396 Gkhbbi32.exe 2948 Haidfpki.exe 2068 Hkaeih32.exe 4560 Iapjgo32.exe 4392 Ibbcfa32.exe 5116 Idhiii32.exe 4964 Jnnnfalp.exe 2192 Jhfbog32.exe 3796 Jdopjh32.exe 4908 Kdhbpf32.exe 3672 Kkgdhp32.exe 392 Lhmafcnf.exe 4424 Lbebilli.exe 2460 Ldfoad32.exe 4372 Lolcnman.exe 4916 Mkepineo.exe 2692 Mlgjhp32.exe 4580 Mepnaf32.exe 1824 Mccokj32.exe 2800 Nhbciqln.exe 3232 Nchhfild.exe 1512 Ookhfigk.exe 2956 Ohcmpn32.exe 3588 Oomelheh.exe 1472 Oooaah32.exe 3048 Ohhfknjf.exe 3216 Pkholi32.exe 3012 Pbbgicnd.exe 4928 Pecpknke.exe 4600 Pehjfm32.exe 836 Pbljoafi.exe 1368 Qihoak32.exe 2796 Qpbgnecp.exe 4608 Aeopfl32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\Bnicai32.exe Beaohcmf.exe File created C:\Windows\SysWOW64\Moqknklp.dll Jbnopbdl.exe File created C:\Windows\SysWOW64\Akicfe32.dll Gqaeme32.exe File created C:\Windows\SysWOW64\Ekakihaj.dll Mciokcgg.exe File created C:\Windows\SysWOW64\Ilqfjc32.dll Process not Found File opened for modification C:\Windows\SysWOW64\Fcbnpnme.exe Fggdpnkf.exe File created C:\Windows\SysWOW64\Pifkigic.dll Pnhacn32.exe File created C:\Windows\SysWOW64\Fncbmpcd.dll Gahcgg32.exe File opened for modification C:\Windows\SysWOW64\Mbhina32.exe Mhpeelnd.exe File opened for modification C:\Windows\SysWOW64\Caimachg.exe Process not Found File created C:\Windows\SysWOW64\Gbnhoj32.exe Foclgq32.exe File created C:\Windows\SysWOW64\Iqdmghnp.exe Ienlbf32.exe File created C:\Windows\SysWOW64\Leffdi32.dll Agnkck32.exe File created C:\Windows\SysWOW64\Mdmmih32.dll Bimoecio.exe File created C:\Windows\SysWOW64\Kdqccq32.dll Agndidce.exe File created C:\Windows\SysWOW64\Hecadm32.exe Hknmgd32.exe File created C:\Windows\SysWOW64\Qbdclc32.dll Oeqagi32.exe File opened for modification C:\Windows\SysWOW64\Cfbhhfbg.exe Bnicai32.exe File created C:\Windows\SysWOW64\Booaii32.exe Biaiqb32.exe File created C:\Windows\SysWOW64\Iolgql32.dll Fcbnpnme.exe File created C:\Windows\SysWOW64\Dfcojl32.dll Janpnfee.exe File opened for modification C:\Windows\SysWOW64\Abgcqjhp.exe Agaoca32.exe File created C:\Windows\SysWOW64\Jdkdbgpd.exe Jlponebi.exe File opened for modification C:\Windows\SysWOW64\Kdbjbfjl.exe Klgend32.exe File created C:\Windows\SysWOW64\Blghiiea.dll Egbken32.exe File opened for modification C:\Windows\SysWOW64\Kfbmgo32.exe Koiejemn.exe File created C:\Windows\SysWOW64\Gijcclkf.dll Ekeacmel.exe File opened for modification C:\Windows\SysWOW64\Ffjdjmpf.exe Fqmlbfbo.exe File created C:\Windows\SysWOW64\Bcbeqaia.exe Bmimdg32.exe File created C:\Windows\SysWOW64\Ehdgjjll.dll Gnoacp32.exe File created C:\Windows\SysWOW64\Loiong32.exe Ljkghi32.exe File created C:\Windows\SysWOW64\Ccgjjc32.exe Cmmbmiag.exe File created C:\Windows\SysWOW64\Klnkoc32.exe Kfdcbiol.exe File created C:\Windows\SysWOW64\Oecopk32.dll Abjkmqni.exe File created C:\Windows\SysWOW64\Jmnheggo.exe Jmlkpgia.exe File opened for modification C:\Windows\SysWOW64\Elagjihh.exe Process not Found File created C:\Windows\SysWOW64\Nojgmmgl.dll Ogbbqo32.exe File created C:\Windows\SysWOW64\Hknhkonb.dll Cgcmeh32.exe File opened for modification C:\Windows\SysWOW64\Kfpqap32.exe Kmhlijpm.exe File opened for modification C:\Windows\SysWOW64\Klnkoc32.exe Kfdcbiol.exe File created C:\Windows\SysWOW64\Lfbpcgbl.exe Lmjkka32.exe File created C:\Windows\SysWOW64\Mlgjhp32.exe Mkepineo.exe File opened for modification C:\Windows\SysWOW64\Foakpc32.exe Feifgnki.exe File opened for modification C:\Windows\SysWOW64\Jmamba32.exe Jfgefg32.exe File created C:\Windows\SysWOW64\Dmphdomb.dll Eaqdpjia.exe File created C:\Windows\SysWOW64\Dqbadf32.exe Dkehlo32.exe File created C:\Windows\SysWOW64\Lbpfpc32.dll Imjddmpl.exe File created C:\Windows\SysWOW64\Ppdbfpaa.exe Pijiif32.exe File created C:\Windows\SysWOW64\Agobcjka.dll Pijiif32.exe File created C:\Windows\SysWOW64\Eobepglo.dll Aeffgkkp.exe File created C:\Windows\SysWOW64\Lelajb32.exe Kfkamk32.exe File created C:\Windows\SysWOW64\Fiilblom.exe Fpqgjf32.exe File created C:\Windows\SysWOW64\Ldfoad32.exe Lbebilli.exe File created C:\Windows\SysWOW64\Acaanp32.exe Cfonin32.exe File created C:\Windows\SysWOW64\Aggempll.dll Bckddn32.exe File opened for modification C:\Windows\SysWOW64\Jokpcmmj.exe Ifckkhfi.exe File opened for modification C:\Windows\SysWOW64\Jjhjae32.exe Jqofippg.exe File created C:\Windows\SysWOW64\Bqokhi32.exe Bdhkchlg.exe File opened for modification C:\Windows\SysWOW64\Idhiii32.exe Ibbcfa32.exe File opened for modification C:\Windows\SysWOW64\Ephlnn32.exe Eincadmf.exe File opened for modification C:\Windows\SysWOW64\Aokcjngj.exe Abgcqjhp.exe File created C:\Windows\SysWOW64\Pfjhdhal.dll Eincadmf.exe File created C:\Windows\SysWOW64\Bbniai32.exe Bfghlhmd.exe File created C:\Windows\SysWOW64\Ajjcoqdl.exe Acpkbf32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 11564 1600 Process not Found 1849 -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ojqcnhkl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ajggjq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mjddehlk.dll" Mhpeelnd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Okkidceh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ifnbph32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Lihpdj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 NEAS.0299570b14805e6f5d46fe2e34a03cc0_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mkojhm32.dll" Idhiii32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dfcojl32.dll" Janpnfee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ahinbo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Pehnboko.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Aaiqcnhg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dmphdomb.dll" Eaqdpjia.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Pocpqcpm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kkfpcj32.dll" Immhdc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Qdflaa32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Jondojna.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mdmmih32.dll" Bimoecio.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Gcmpgpkp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Oiehhjjp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Boijog32.dll" Fbnmkk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Afnpjk32.dll" Ijigfaol.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Qckbggad.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Egbdjhlp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hfcnchpa.dll" Djlkhe32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Lnfgmc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Fnbjpf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Anmmkd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Iofpnhmc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Hoonjjgk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Qecgcfmf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ldfoad32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Gahcgg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ljjicl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Mjcljk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Lplpcc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Jojboa32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Jedjkkmo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Famhnjcj.dll" Momqblgj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Bmimdg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ohhfknjf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Loodqn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Edfaonkb.dll" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hkhcdb32.dll" Gijmad32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ikcmmjkb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Bmhibi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ekbiaigk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Jjqdafmp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Lkbmih32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lhjafhlf.dll" Dacebkko.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Bichcc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Iameid32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Bdfnmhnj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dblbno32.dll" Cmmbmiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ddkpoelb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jdhcdlco.dll" Dkehlo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ibgdlg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Flddoa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Dpemjifi.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2904 wrote to memory of 1744 2904 NEAS.0299570b14805e6f5d46fe2e34a03cc0_JC.exe 90 PID 2904 wrote to memory of 1744 2904 NEAS.0299570b14805e6f5d46fe2e34a03cc0_JC.exe 90 PID 2904 wrote to memory of 1744 2904 NEAS.0299570b14805e6f5d46fe2e34a03cc0_JC.exe 90 PID 1744 wrote to memory of 1452 1744 Foclgq32.exe 92 PID 1744 wrote to memory of 1452 1744 Foclgq32.exe 92 PID 1744 wrote to memory of 1452 1744 Foclgq32.exe 92 PID 1452 wrote to memory of 2344 1452 Gbnhoj32.exe 93 PID 1452 wrote to memory of 2344 1452 Gbnhoj32.exe 93 PID 1452 wrote to memory of 2344 1452 Gbnhoj32.exe 93 PID 2344 wrote to memory of 4004 2344 Gijmad32.exe 94 PID 2344 wrote to memory of 4004 2344 Gijmad32.exe 94 PID 2344 wrote to memory of 4004 2344 Gijmad32.exe 94 PID 4004 wrote to memory of 4008 4004 Hnnljj32.exe 95 PID 4004 wrote to memory of 4008 4004 Hnnljj32.exe 95 PID 4004 wrote to memory of 4008 4004 Hnnljj32.exe 95 PID 4008 wrote to memory of 1952 4008 Haaaaeim.exe 96 PID 4008 wrote to memory of 1952 4008 Haaaaeim.exe 96 PID 4008 wrote to memory of 1952 4008 Haaaaeim.exe 96 PID 1952 wrote to memory of 448 1952 Ibgdlg32.exe 97 PID 1952 wrote to memory of 448 1952 Ibgdlg32.exe 97 PID 1952 wrote to memory of 448 1952 Ibgdlg32.exe 97 PID 448 wrote to memory of 3996 448 Jhnojl32.exe 98 PID 448 wrote to memory of 3996 448 Jhnojl32.exe 98 PID 448 wrote to memory of 3996 448 Jhnojl32.exe 98 PID 3996 wrote to memory of 4680 3996 Kakmna32.exe 99 PID 3996 wrote to memory of 4680 3996 Kakmna32.exe 99 PID 3996 wrote to memory of 4680 3996 Kakmna32.exe 99 PID 4680 wrote to memory of 3456 4680 Klggli32.exe 100 PID 4680 wrote to memory of 3456 4680 Klggli32.exe 100 PID 4680 wrote to memory of 3456 4680 Klggli32.exe 100 PID 3456 wrote to memory of 884 3456 Lljdai32.exe 101 PID 3456 wrote to memory of 884 3456 Lljdai32.exe 101 PID 3456 wrote to memory of 884 3456 Lljdai32.exe 101 PID 884 wrote to memory of 1424 884 Lcfidb32.exe 102 PID 884 wrote to memory of 1424 884 Lcfidb32.exe 102 PID 884 wrote to memory of 1424 884 Lcfidb32.exe 102 PID 1424 wrote to memory of 5008 1424 Lancko32.exe 103 PID 1424 wrote to memory of 5008 1424 Lancko32.exe 103 PID 1424 wrote to memory of 5008 1424 Lancko32.exe 103 PID 5008 wrote to memory of 1972 5008 Mlhqcgnk.exe 104 PID 5008 wrote to memory of 1972 5008 Mlhqcgnk.exe 104 PID 5008 wrote to memory of 1972 5008 Mlhqcgnk.exe 104 PID 1972 wrote to memory of 4868 1972 Njbgmjgl.exe 105 PID 1972 wrote to memory of 4868 1972 Njbgmjgl.exe 105 PID 1972 wrote to memory of 4868 1972 Njbgmjgl.exe 105 PID 4868 wrote to memory of 2712 4868 Ojqcnhkl.exe 106 PID 4868 wrote to memory of 2712 4868 Ojqcnhkl.exe 106 PID 4868 wrote to memory of 2712 4868 Ojqcnhkl.exe 106 PID 2712 wrote to memory of 4508 2712 Ocihgnam.exe 107 PID 2712 wrote to memory of 4508 2712 Ocihgnam.exe 107 PID 2712 wrote to memory of 4508 2712 Ocihgnam.exe 107 PID 4508 wrote to memory of 4768 4508 Piocecgj.exe 108 PID 4508 wrote to memory of 4768 4508 Piocecgj.exe 108 PID 4508 wrote to memory of 4768 4508 Piocecgj.exe 108 PID 4768 wrote to memory of 216 4768 Qapnmopa.exe 109 PID 4768 wrote to memory of 216 4768 Qapnmopa.exe 109 PID 4768 wrote to memory of 216 4768 Qapnmopa.exe 109 PID 216 wrote to memory of 1908 216 Aaiqcnhg.exe 110 PID 216 wrote to memory of 1908 216 Aaiqcnhg.exe 110 PID 216 wrote to memory of 1908 216 Aaiqcnhg.exe 110 PID 1908 wrote to memory of 4900 1908 Apnndj32.exe 111 PID 1908 wrote to memory of 4900 1908 Apnndj32.exe 111 PID 1908 wrote to memory of 4900 1908 Apnndj32.exe 111 PID 4900 wrote to memory of 2524 4900 Bfaigclq.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.0299570b14805e6f5d46fe2e34a03cc0_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.0299570b14805e6f5d46fe2e34a03cc0_JC.exe"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\SysWOW64\Foclgq32.exeC:\Windows\system32\Foclgq32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Windows\SysWOW64\Gbnhoj32.exeC:\Windows\system32\Gbnhoj32.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Windows\SysWOW64\Gijmad32.exeC:\Windows\system32\Gijmad32.exe4⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Windows\SysWOW64\Hnnljj32.exeC:\Windows\system32\Hnnljj32.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4004 -
C:\Windows\SysWOW64\Haaaaeim.exeC:\Windows\system32\Haaaaeim.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4008 -
C:\Windows\SysWOW64\Ibgdlg32.exeC:\Windows\system32\Ibgdlg32.exe7⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Windows\SysWOW64\Jhnojl32.exeC:\Windows\system32\Jhnojl32.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:448 -
C:\Windows\SysWOW64\Kakmna32.exeC:\Windows\system32\Kakmna32.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3996 -
C:\Windows\SysWOW64\Klggli32.exeC:\Windows\system32\Klggli32.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4680 -
C:\Windows\SysWOW64\Lljdai32.exeC:\Windows\system32\Lljdai32.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3456 -
C:\Windows\SysWOW64\Lcfidb32.exeC:\Windows\system32\Lcfidb32.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:884 -
C:\Windows\SysWOW64\Lancko32.exeC:\Windows\system32\Lancko32.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Windows\SysWOW64\Mlhqcgnk.exeC:\Windows\system32\Mlhqcgnk.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Windows\SysWOW64\Njbgmjgl.exeC:\Windows\system32\Njbgmjgl.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\SysWOW64\Ojqcnhkl.exeC:\Windows\system32\Ojqcnhkl.exe16⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Windows\SysWOW64\Ocihgnam.exeC:\Windows\system32\Ocihgnam.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\SysWOW64\Piocecgj.exeC:\Windows\system32\Piocecgj.exe18⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4508 -
C:\Windows\SysWOW64\Qapnmopa.exeC:\Windows\system32\Qapnmopa.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4768 -
C:\Windows\SysWOW64\Aaiqcnhg.exeC:\Windows\system32\Aaiqcnhg.exe20⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Windows\SysWOW64\Apnndj32.exeC:\Windows\system32\Apnndj32.exe21⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Windows\SysWOW64\Bfaigclq.exeC:\Windows\system32\Bfaigclq.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Windows\SysWOW64\Cpljehpo.exeC:\Windows\system32\Cpljehpo.exe23⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2524 -
C:\Windows\SysWOW64\Ckdkhq32.exeC:\Windows\system32\Ckdkhq32.exe24⤵
- Executes dropped EXE
PID:4440 -
C:\Windows\SysWOW64\Ckidcpjl.exeC:\Windows\system32\Ckidcpjl.exe25⤵
- Executes dropped EXE
PID:4640 -
C:\Windows\SysWOW64\Dnljkk32.exeC:\Windows\system32\Dnljkk32.exe26⤵
- Executes dropped EXE
PID:4808 -
C:\Windows\SysWOW64\Egbken32.exeC:\Windows\system32\Egbken32.exe27⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2548 -
C:\Windows\SysWOW64\Fggdpnkf.exeC:\Windows\system32\Fggdpnkf.exe28⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4044 -
C:\Windows\SysWOW64\Fcbnpnme.exeC:\Windows\system32\Fcbnpnme.exe29⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2168 -
C:\Windows\SysWOW64\Fnhbmgmk.exeC:\Windows\system32\Fnhbmgmk.exe30⤵
- Executes dropped EXE
PID:1924 -
C:\Windows\SysWOW64\Gclafmej.exeC:\Windows\system32\Gclafmej.exe31⤵
- Executes dropped EXE
PID:2216 -
C:\Windows\SysWOW64\Gkhbbi32.exeC:\Windows\system32\Gkhbbi32.exe32⤵
- Executes dropped EXE
PID:1396 -
C:\Windows\SysWOW64\Haidfpki.exeC:\Windows\system32\Haidfpki.exe33⤵
- Executes dropped EXE
PID:2948 -
C:\Windows\SysWOW64\Hkaeih32.exeC:\Windows\system32\Hkaeih32.exe34⤵
- Executes dropped EXE
PID:2068 -
C:\Windows\SysWOW64\Iapjgo32.exeC:\Windows\system32\Iapjgo32.exe35⤵
- Executes dropped EXE
PID:4560 -
C:\Windows\SysWOW64\Ibbcfa32.exeC:\Windows\system32\Ibbcfa32.exe36⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4392 -
C:\Windows\SysWOW64\Idhiii32.exeC:\Windows\system32\Idhiii32.exe37⤵
- Executes dropped EXE
- Modifies registry class
PID:5116 -
C:\Windows\SysWOW64\Jnnnfalp.exeC:\Windows\system32\Jnnnfalp.exe38⤵
- Executes dropped EXE
PID:4964 -
C:\Windows\SysWOW64\Jhfbog32.exeC:\Windows\system32\Jhfbog32.exe39⤵
- Executes dropped EXE
PID:2192 -
C:\Windows\SysWOW64\Jdopjh32.exeC:\Windows\system32\Jdopjh32.exe40⤵
- Executes dropped EXE
PID:3796 -
C:\Windows\SysWOW64\Kdhbpf32.exeC:\Windows\system32\Kdhbpf32.exe41⤵
- Executes dropped EXE
PID:4908 -
C:\Windows\SysWOW64\Kkgdhp32.exeC:\Windows\system32\Kkgdhp32.exe42⤵
- Executes dropped EXE
PID:3672 -
C:\Windows\SysWOW64\Lhmafcnf.exeC:\Windows\system32\Lhmafcnf.exe43⤵
- Executes dropped EXE
PID:392 -
C:\Windows\SysWOW64\Lbebilli.exeC:\Windows\system32\Lbebilli.exe44⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4424 -
C:\Windows\SysWOW64\Ldfoad32.exeC:\Windows\system32\Ldfoad32.exe45⤵
- Executes dropped EXE
- Modifies registry class
PID:2460 -
C:\Windows\SysWOW64\Lolcnman.exeC:\Windows\system32\Lolcnman.exe46⤵
- Executes dropped EXE
PID:4372 -
C:\Windows\SysWOW64\Mkepineo.exeC:\Windows\system32\Mkepineo.exe47⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4916 -
C:\Windows\SysWOW64\Mlgjhp32.exeC:\Windows\system32\Mlgjhp32.exe48⤵
- Executes dropped EXE
PID:2692 -
C:\Windows\SysWOW64\Mepnaf32.exeC:\Windows\system32\Mepnaf32.exe49⤵
- Executes dropped EXE
PID:4580 -
C:\Windows\SysWOW64\Mccokj32.exeC:\Windows\system32\Mccokj32.exe50⤵
- Executes dropped EXE
PID:1824 -
C:\Windows\SysWOW64\Nhbciqln.exeC:\Windows\system32\Nhbciqln.exe51⤵
- Executes dropped EXE
PID:2800 -
C:\Windows\SysWOW64\Nchhfild.exeC:\Windows\system32\Nchhfild.exe52⤵
- Executes dropped EXE
PID:3232 -
C:\Windows\SysWOW64\Ookhfigk.exeC:\Windows\system32\Ookhfigk.exe53⤵
- Executes dropped EXE
PID:1512 -
C:\Windows\SysWOW64\Ohcmpn32.exeC:\Windows\system32\Ohcmpn32.exe54⤵
- Executes dropped EXE
PID:2956 -
C:\Windows\SysWOW64\Oomelheh.exeC:\Windows\system32\Oomelheh.exe55⤵
- Executes dropped EXE
PID:3588 -
C:\Windows\SysWOW64\Oooaah32.exeC:\Windows\system32\Oooaah32.exe56⤵
- Executes dropped EXE
PID:1472 -
C:\Windows\SysWOW64\Ohhfknjf.exeC:\Windows\system32\Ohhfknjf.exe57⤵
- Executes dropped EXE
- Modifies registry class
PID:3048 -
C:\Windows\SysWOW64\Pkholi32.exeC:\Windows\system32\Pkholi32.exe58⤵
- Executes dropped EXE
PID:3216 -
C:\Windows\SysWOW64\Pbbgicnd.exeC:\Windows\system32\Pbbgicnd.exe59⤵
- Executes dropped EXE
PID:3012 -
C:\Windows\SysWOW64\Pecpknke.exeC:\Windows\system32\Pecpknke.exe60⤵
- Executes dropped EXE
PID:4928 -
C:\Windows\SysWOW64\Pehjfm32.exeC:\Windows\system32\Pehjfm32.exe61⤵
- Executes dropped EXE
PID:4600 -
C:\Windows\SysWOW64\Pbljoafi.exeC:\Windows\system32\Pbljoafi.exe62⤵
- Executes dropped EXE
PID:836 -
C:\Windows\SysWOW64\Qihoak32.exeC:\Windows\system32\Qihoak32.exe63⤵
- Executes dropped EXE
PID:1368 -
C:\Windows\SysWOW64\Qpbgnecp.exeC:\Windows\system32\Qpbgnecp.exe64⤵
- Executes dropped EXE
PID:2796 -
C:\Windows\SysWOW64\Aeopfl32.exeC:\Windows\system32\Aeopfl32.exe65⤵
- Executes dropped EXE
PID:4608 -
C:\Windows\SysWOW64\Apddce32.exeC:\Windows\system32\Apddce32.exe66⤵PID:4644
-
C:\Windows\SysWOW64\Aecialmb.exeC:\Windows\system32\Aecialmb.exe67⤵PID:3852
-
C:\Windows\SysWOW64\Aeffgkkp.exeC:\Windows\system32\Aeffgkkp.exe68⤵
- Drops file in System32 directory
PID:4936 -
C:\Windows\SysWOW64\Alpnde32.exeC:\Windows\system32\Alpnde32.exe69⤵PID:3748
-
C:\Windows\SysWOW64\Afeban32.exeC:\Windows\system32\Afeban32.exe70⤵PID:3668
-
C:\Windows\SysWOW64\Albkieqj.exeC:\Windows\system32\Albkieqj.exe71⤵PID:3488
-
C:\Windows\SysWOW64\Bblcfo32.exeC:\Windows\system32\Bblcfo32.exe72⤵PID:1900
-
C:\Windows\SysWOW64\Bmddihfj.exeC:\Windows\system32\Bmddihfj.exe73⤵PID:4740
-
C:\Windows\SysWOW64\Bmimdg32.exeC:\Windows\system32\Bmimdg32.exe74⤵
- Drops file in System32 directory
- Modifies registry class
PID:3564 -
C:\Windows\SysWOW64\Bcbeqaia.exeC:\Windows\system32\Bcbeqaia.exe75⤵PID:5048
-
C:\Windows\SysWOW64\Bipnihgi.exeC:\Windows\system32\Bipnihgi.exe76⤵PID:2728
-
C:\Windows\SysWOW64\Cdebfago.exeC:\Windows\system32\Cdebfago.exe77⤵PID:3116
-
C:\Windows\SysWOW64\Dpgbgpbe.exeC:\Windows\system32\Dpgbgpbe.exe78⤵PID:4988
-
C:\Windows\SysWOW64\Dfakcj32.exeC:\Windows\system32\Dfakcj32.exe79⤵PID:4200
-
C:\Windows\SysWOW64\Defheg32.exeC:\Windows\system32\Defheg32.exe80⤵PID:4764
-
C:\Windows\SysWOW64\Dlqpaafg.exeC:\Windows\system32\Dlqpaafg.exe81⤵PID:1616
-
C:\Windows\SysWOW64\Dgfdojfm.exeC:\Windows\system32\Dgfdojfm.exe82⤵PID:2104
-
C:\Windows\SysWOW64\Dmplkd32.exeC:\Windows\system32\Dmplkd32.exe83⤵PID:3020
-
C:\Windows\SysWOW64\Ecoaijio.exeC:\Windows\system32\Ecoaijio.exe84⤵PID:2280
-
C:\Windows\SysWOW64\Emeffcid.exeC:\Windows\system32\Emeffcid.exe85⤵PID:2228
-
C:\Windows\SysWOW64\Ecanojgl.exeC:\Windows\system32\Ecanojgl.exe86⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3632 -
C:\Windows\SysWOW64\Emgblc32.exeC:\Windows\system32\Emgblc32.exe87⤵PID:4648
-
C:\Windows\SysWOW64\Eincadmf.exeC:\Windows\system32\Eincadmf.exe88⤵
- Drops file in System32 directory
PID:5132 -
C:\Windows\SysWOW64\Ephlnn32.exeC:\Windows\system32\Ephlnn32.exe89⤵PID:5176
-
C:\Windows\SysWOW64\Egbdjhlp.exeC:\Windows\system32\Egbdjhlp.exe90⤵
- Modifies registry class
PID:5220 -
C:\Windows\SysWOW64\Enllgbcl.exeC:\Windows\system32\Enllgbcl.exe91⤵PID:5264
-
C:\Windows\SysWOW64\Fdhail32.exeC:\Windows\system32\Fdhail32.exe92⤵PID:5308
-
C:\Windows\SysWOW64\Fgkfqgce.exeC:\Windows\system32\Fgkfqgce.exe93⤵PID:5348
-
C:\Windows\SysWOW64\Fneoma32.exeC:\Windows\system32\Fneoma32.exe94⤵PID:5392
-
C:\Windows\SysWOW64\Ggdigekj.exeC:\Windows\system32\Ggdigekj.exe95⤵PID:5436
-
C:\Windows\SysWOW64\Gnoacp32.exeC:\Windows\system32\Gnoacp32.exe96⤵
- Drops file in System32 directory
PID:5480 -
C:\Windows\SysWOW64\Gdhjpjjd.exeC:\Windows\system32\Gdhjpjjd.exe97⤵PID:5524
-
C:\Windows\SysWOW64\Gfjfhbpb.exeC:\Windows\system32\Gfjfhbpb.exe98⤵PID:5568
-
C:\Windows\SysWOW64\Hnehdo32.exeC:\Windows\system32\Hnehdo32.exe99⤵PID:5616
-
C:\Windows\SysWOW64\Hcbpme32.exeC:\Windows\system32\Hcbpme32.exe100⤵PID:5656
-
C:\Windows\SysWOW64\Hfamia32.exeC:\Windows\system32\Hfamia32.exe101⤵PID:5704
-
C:\Windows\SysWOW64\Hqfqfj32.exeC:\Windows\system32\Hqfqfj32.exe102⤵PID:5748
-
C:\Windows\SysWOW64\Hgpibdam.exeC:\Windows\system32\Hgpibdam.exe103⤵PID:5788
-
C:\Windows\SysWOW64\Hmmakk32.exeC:\Windows\system32\Hmmakk32.exe104⤵PID:5836
-
C:\Windows\SysWOW64\Hcgjhega.exeC:\Windows\system32\Hcgjhega.exe105⤵PID:5884
-
C:\Windows\SysWOW64\Hdicggla.exeC:\Windows\system32\Hdicggla.exe106⤵PID:5928
-
C:\Windows\SysWOW64\Idkpmgjo.exeC:\Windows\system32\Idkpmgjo.exe107⤵PID:5972
-
C:\Windows\SysWOW64\Incdem32.exeC:\Windows\system32\Incdem32.exe108⤵PID:6016
-
C:\Windows\SysWOW64\Ienlbf32.exeC:\Windows\system32\Ienlbf32.exe109⤵
- Drops file in System32 directory
PID:6060 -
C:\Windows\SysWOW64\Iqdmghnp.exeC:\Windows\system32\Iqdmghnp.exe110⤵PID:6104
-
C:\Windows\SysWOW64\Iqgjmg32.exeC:\Windows\system32\Iqgjmg32.exe111⤵PID:4076
-
C:\Windows\SysWOW64\Iaifbg32.exeC:\Windows\system32\Iaifbg32.exe112⤵PID:5188
-
C:\Windows\SysWOW64\Jnmglk32.exeC:\Windows\system32\Jnmglk32.exe113⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5252 -
C:\Windows\SysWOW64\Janpnfee.exeC:\Windows\system32\Janpnfee.exe114⤵
- Drops file in System32 directory
- Modifies registry class
PID:5292 -
C:\Windows\SysWOW64\Jnapgjdo.exeC:\Windows\system32\Jnapgjdo.exe115⤵PID:5380
-
C:\Windows\SysWOW64\Jndmlj32.exeC:\Windows\system32\Jndmlj32.exe116⤵PID:5448
-
C:\Windows\SysWOW64\Jfoaam32.exeC:\Windows\system32\Jfoaam32.exe117⤵PID:5512
-
C:\Windows\SysWOW64\Jaefne32.exeC:\Windows\system32\Jaefne32.exe118⤵PID:5584
-
C:\Windows\SysWOW64\Kfanflne.exeC:\Windows\system32\Kfanflne.exe119⤵PID:5648
-
C:\Windows\SysWOW64\Keekjc32.exeC:\Windows\system32\Keekjc32.exe120⤵PID:5732
-
C:\Windows\SysWOW64\Kallod32.exeC:\Windows\system32\Kallod32.exe121⤵PID:5812
-
C:\Windows\SysWOW64\Khfdlnab.exeC:\Windows\system32\Khfdlnab.exe122⤵PID:5868
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-