Analysis
-
max time kernel
46s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 18:52
Static task
static1
Behavioral task
behavioral1
Sample
ff9b8d9816bc3aa4ffd9c4809ee89653.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
ff9b8d9816bc3aa4ffd9c4809ee89653.exe
Resource
win10v2004-20231215-en
General
-
Target
ff9b8d9816bc3aa4ffd9c4809ee89653.exe
-
Size
4.5MB
-
MD5
ff9b8d9816bc3aa4ffd9c4809ee89653
-
SHA1
2f2074a83731442f17e46c7500890c3ae69b1050
-
SHA256
86feaca95d0ab508cefa374ed69e08f114c8b450f59679058282cc9b3aac97b6
-
SHA512
937d26d1ffa73200c03808d5805969c9140a7bbe1a6330c66e37dd567286379551e82a5faa909d1879a82077649471c4af65f26740f1a14811ffc364068231d3
-
SSDEEP
49152:6kB9f0VwEIV0MVp5fbVvOB9f0eB9f0S/B9f0HdVAVkB9f0VZHJVkB9f0TTVfdg:6VG0uptJvlyVVHTBlg
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 24 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jaljbmkd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gglfbkin.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Gglfbkin.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Hebcao32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hcjmhk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ibnjkbog.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Inidkb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Inkaqb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Jaljbmkd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Jdmcdhhe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Jnedgq32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad ff9b8d9816bc3aa4ffd9c4809ee89653.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" ff9b8d9816bc3aa4ffd9c4809ee89653.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jdmcdhhe.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hchqbkkm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Hchqbkkm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Inidkb32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Inkaqb32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jjkdlall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Jjkdlall.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hebcao32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Hcjmhk32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ibnjkbog.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jnedgq32.exe -
Executes dropped EXE 12 IoCs
pid Process 3696 Gglfbkin.exe 1692 Hebcao32.exe 3268 Hchqbkkm.exe 3352 Hcjmhk32.exe 2656 Ibnjkbog.exe 4076 Inidkb32.exe 2260 Inkaqb32.exe 4648 Jaljbmkd.exe 1532 Jdmcdhhe.exe 376 Jnedgq32.exe 4328 Jjkdlall.exe 3044 Jjnaaa32.exe -
Drops file in System32 directory 36 IoCs
description ioc Process File created C:\Windows\SysWOW64\Aannbg32.dll Jaljbmkd.exe File created C:\Windows\SysWOW64\Jnedgq32.exe Jdmcdhhe.exe File opened for modification C:\Windows\SysWOW64\Jnedgq32.exe Jdmcdhhe.exe File created C:\Windows\SysWOW64\Jjkdlall.exe Jnedgq32.exe File created C:\Windows\SysWOW64\Gglfbkin.exe ff9b8d9816bc3aa4ffd9c4809ee89653.exe File opened for modification C:\Windows\SysWOW64\Ibnjkbog.exe Hcjmhk32.exe File opened for modification C:\Windows\SysWOW64\Inkaqb32.exe Inidkb32.exe File created C:\Windows\SysWOW64\Ncapfeoc.dll Inidkb32.exe File created C:\Windows\SysWOW64\Jjmannfj.dll Jnedgq32.exe File opened for modification C:\Windows\SysWOW64\Hebcao32.exe Gglfbkin.exe File created C:\Windows\SysWOW64\Dadeofnh.dll Hebcao32.exe File created C:\Windows\SysWOW64\Ejioqkck.dll Hchqbkkm.exe File created C:\Windows\SysWOW64\Ipmgkhgl.dll Jjkdlall.exe File opened for modification C:\Windows\SysWOW64\Hcjmhk32.exe Hchqbkkm.exe File created C:\Windows\SysWOW64\Hgpchp32.dll Hcjmhk32.exe File opened for modification C:\Windows\SysWOW64\Inidkb32.exe Ibnjkbog.exe File created C:\Windows\SysWOW64\Jdmcdhhe.exe Jaljbmkd.exe File created C:\Windows\SysWOW64\Hchqbkkm.exe Hebcao32.exe File created C:\Windows\SysWOW64\Jjnaaa32.exe Jjkdlall.exe File opened for modification C:\Windows\SysWOW64\Jjnaaa32.exe Jjkdlall.exe File opened for modification C:\Windows\SysWOW64\Jdmcdhhe.exe Jaljbmkd.exe File created C:\Windows\SysWOW64\Ibnjkbog.exe Hcjmhk32.exe File created C:\Windows\SysWOW64\Inidkb32.exe Ibnjkbog.exe File created C:\Windows\SysWOW64\Denlcd32.dll Ibnjkbog.exe File created C:\Windows\SysWOW64\Jaljbmkd.exe Inkaqb32.exe File created C:\Windows\SysWOW64\Hebcao32.exe Gglfbkin.exe File created C:\Windows\SysWOW64\Hjjcnl32.dll Gglfbkin.exe File opened for modification C:\Windows\SysWOW64\Hchqbkkm.exe Hebcao32.exe File created C:\Windows\SysWOW64\Qhomgchl.dll Jdmcdhhe.exe File opened for modification C:\Windows\SysWOW64\Gglfbkin.exe ff9b8d9816bc3aa4ffd9c4809ee89653.exe File created C:\Windows\SysWOW64\Glbqbe32.dll ff9b8d9816bc3aa4ffd9c4809ee89653.exe File opened for modification C:\Windows\SysWOW64\Jaljbmkd.exe Inkaqb32.exe File created C:\Windows\SysWOW64\Pakfglam.dll Inkaqb32.exe File created C:\Windows\SysWOW64\Hcjmhk32.exe Hchqbkkm.exe File created C:\Windows\SysWOW64\Inkaqb32.exe Inidkb32.exe File opened for modification C:\Windows\SysWOW64\Jjkdlall.exe Jnedgq32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4000 1148 WerFault.exe 105 -
Modifies registry class 39 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node ff9b8d9816bc3aa4ffd9c4809ee89653.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" ff9b8d9816bc3aa4ffd9c4809ee89653.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ejioqkck.dll" Hchqbkkm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hgpchp32.dll" Hcjmhk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID ff9b8d9816bc3aa4ffd9c4809ee89653.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Gglfbkin.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dadeofnh.dll" Hebcao32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Hcjmhk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ncapfeoc.dll" Inidkb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Jnedgq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Glbqbe32.dll" ff9b8d9816bc3aa4ffd9c4809ee89653.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Gglfbkin.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Hchqbkkm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Hebcao32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Ibnjkbog.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Ibnjkbog.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Inidkb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Inidkb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Jjkdlall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Hcjmhk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Inkaqb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Jaljbmkd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jjmannfj.dll" Jnedgq32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Jjkdlall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831} ff9b8d9816bc3aa4ffd9c4809ee89653.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Denlcd32.dll" Ibnjkbog.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pakfglam.dll" Inkaqb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aannbg32.dll" Jaljbmkd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qhomgchl.dll" Jdmcdhhe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Jdmcdhhe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 ff9b8d9816bc3aa4ffd9c4809ee89653.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hjjcnl32.dll" Gglfbkin.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Hebcao32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Hchqbkkm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Jnedgq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ipmgkhgl.dll" Jjkdlall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Inkaqb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Jaljbmkd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Jdmcdhhe.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 4276 wrote to memory of 3696 4276 ff9b8d9816bc3aa4ffd9c4809ee89653.exe 89 PID 4276 wrote to memory of 3696 4276 ff9b8d9816bc3aa4ffd9c4809ee89653.exe 89 PID 4276 wrote to memory of 3696 4276 ff9b8d9816bc3aa4ffd9c4809ee89653.exe 89 PID 3696 wrote to memory of 1692 3696 Gglfbkin.exe 91 PID 3696 wrote to memory of 1692 3696 Gglfbkin.exe 91 PID 3696 wrote to memory of 1692 3696 Gglfbkin.exe 91 PID 1692 wrote to memory of 3268 1692 Hebcao32.exe 92 PID 1692 wrote to memory of 3268 1692 Hebcao32.exe 92 PID 1692 wrote to memory of 3268 1692 Hebcao32.exe 92 PID 3268 wrote to memory of 3352 3268 Hchqbkkm.exe 93 PID 3268 wrote to memory of 3352 3268 Hchqbkkm.exe 93 PID 3268 wrote to memory of 3352 3268 Hchqbkkm.exe 93 PID 3352 wrote to memory of 2656 3352 Hcjmhk32.exe 94 PID 3352 wrote to memory of 2656 3352 Hcjmhk32.exe 94 PID 3352 wrote to memory of 2656 3352 Hcjmhk32.exe 94 PID 2656 wrote to memory of 4076 2656 Ibnjkbog.exe 95 PID 2656 wrote to memory of 4076 2656 Ibnjkbog.exe 95 PID 2656 wrote to memory of 4076 2656 Ibnjkbog.exe 95 PID 4076 wrote to memory of 2260 4076 Inidkb32.exe 96 PID 4076 wrote to memory of 2260 4076 Inidkb32.exe 96 PID 4076 wrote to memory of 2260 4076 Inidkb32.exe 96 PID 2260 wrote to memory of 4648 2260 Inkaqb32.exe 97 PID 2260 wrote to memory of 4648 2260 Inkaqb32.exe 97 PID 2260 wrote to memory of 4648 2260 Inkaqb32.exe 97 PID 4648 wrote to memory of 1532 4648 Jaljbmkd.exe 98 PID 4648 wrote to memory of 1532 4648 Jaljbmkd.exe 98 PID 4648 wrote to memory of 1532 4648 Jaljbmkd.exe 98 PID 1532 wrote to memory of 376 1532 Jdmcdhhe.exe 101 PID 1532 wrote to memory of 376 1532 Jdmcdhhe.exe 101 PID 1532 wrote to memory of 376 1532 Jdmcdhhe.exe 101 PID 376 wrote to memory of 4328 376 Jnedgq32.exe 99 PID 376 wrote to memory of 4328 376 Jnedgq32.exe 99 PID 376 wrote to memory of 4328 376 Jnedgq32.exe 99 PID 4328 wrote to memory of 3044 4328 Jjkdlall.exe 100 PID 4328 wrote to memory of 3044 4328 Jjkdlall.exe 100 PID 4328 wrote to memory of 3044 4328 Jjkdlall.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\ff9b8d9816bc3aa4ffd9c4809ee89653.exe"C:\Users\Admin\AppData\Local\Temp\ff9b8d9816bc3aa4ffd9c4809ee89653.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4276 -
C:\Windows\SysWOW64\Gglfbkin.exeC:\Windows\system32\Gglfbkin.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3696 -
C:\Windows\SysWOW64\Hebcao32.exeC:\Windows\system32\Hebcao32.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Windows\SysWOW64\Hchqbkkm.exeC:\Windows\system32\Hchqbkkm.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3268 -
C:\Windows\SysWOW64\Hcjmhk32.exeC:\Windows\system32\Hcjmhk32.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3352 -
C:\Windows\SysWOW64\Ibnjkbog.exeC:\Windows\system32\Ibnjkbog.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\SysWOW64\Inidkb32.exeC:\Windows\system32\Inidkb32.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4076 -
C:\Windows\SysWOW64\Inkaqb32.exeC:\Windows\system32\Inkaqb32.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Windows\SysWOW64\Jaljbmkd.exeC:\Windows\system32\Jaljbmkd.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4648 -
C:\Windows\SysWOW64\Jdmcdhhe.exeC:\Windows\system32\Jdmcdhhe.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Windows\SysWOW64\Jnedgq32.exeC:\Windows\system32\Jnedgq32.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:376
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Jjkdlall.exeC:\Windows\system32\Jjkdlall.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4328 -
C:\Windows\SysWOW64\Jjnaaa32.exeC:\Windows\system32\Jjnaaa32.exe2⤵
- Executes dropped EXE
PID:3044 -
C:\Windows\SysWOW64\Kkpnga32.exeC:\Windows\system32\Kkpnga32.exe3⤵PID:3888
-
C:\Windows\SysWOW64\Lhmafcnf.exeC:\Windows\system32\Lhmafcnf.exe4⤵PID:4900
-
C:\Windows\SysWOW64\Leabphmp.exeC:\Windows\system32\Leabphmp.exe5⤵PID:4080
-
-
-
-
-
C:\Windows\SysWOW64\Ledoegkm.exeC:\Windows\system32\Ledoegkm.exe1⤵PID:1948
-
C:\Windows\SysWOW64\Ldikgdpe.exeC:\Windows\system32\Ldikgdpe.exe2⤵PID:1148
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1148 -s 4163⤵
- Program crash
PID:4000
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 1148 -ip 11481⤵PID:2892
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
19KB
MD5d2036d756a38d50a055df17b264ea6ff
SHA1cd2f76678676a470cdfb9ce15fd9b2d0f71d8d37
SHA256ed037c19b7fefe7427960fb48c82bb443c78218b67c15d44587662de0ffabda9
SHA512db6f7203fa8f2d4ceaf7868942aafbe089161a9aef8fd9e007aa467d603b2696f161c29758c96353beb405a5fc4aa5538e6770acbc6607d9bf54c110db23986f
-
Filesize
16KB
MD50a4e5e284fa2feca75607504ec2a71d9
SHA169d8e6692b0c4c3a6e88b9de65e7f24e56bc22fa
SHA256716925e13b4639d81fc8f0793a674f2ea221f75720a837a788c2020067c7f86d
SHA5128260d3c099029473c09d5e700be161b1ac043caab86361d569131d00af99557d17e940dd6051f46fc3a25dcb3ebfbf1f54621daabd990cb8ce4d21793d51cc2d
-
Filesize
17KB
MD5f431d9fc0541fdc51c51cc97ce433ac6
SHA17effebf4ff21b37779945f3e4c723871c2b66057
SHA25613dab139f8a74d626e1d6c5c97c3247fb2e704a012f9461e6cf9b7f2257a5d3b
SHA512199ba113e5f2b3b21c18fce934b38f98176aad67e5b303d72527e7c4beb885cda6c138a892db525618e1bccc184177d43352aee0b9101ceb3e17fa90f1727bab
-
Filesize
20KB
MD57f8c2c3a6e4320bb2d2f3ebca6b68c4b
SHA10b34eab63b30f799ff8bcfbd5b6b0b6a9f05d171
SHA256b56e630c4f4b78b08aaf7d959a6c5b8c1817089c9a19b3a56a7715e85def6580
SHA51223e2f55a4668c1df5b62f10907be71ff42464e7ff5208076f7ade576344526d8fb2e13b3eccf3164fdea3ddb20b695599145d174f85af21172bb5076b3641e4a
-
Filesize
37KB
MD594ef30b7fc1902da9c3a09f8dd1a1d0a
SHA1a28d73fcedd26adba7b010e5b55238a632aca127
SHA2569dddc54d6f5eeee79f7f0692b7e64c12a0d10806d4f125f043eb532bd8182ed7
SHA5128b33f7d3601be7c57306924b7bdce7b05349bdd3f7c39544fd3f535fd8487f25d6fd3d20e793a3a16975f36833d7b0b044ee71fc3d645ae2f775dc3cb759c8ba
-
Filesize
27KB
MD593f2d1af3f9b701e480fdcf95a636861
SHA1c3e87ed61c5e7f28924ababbcbd0cbf89f6b966a
SHA256d1baf6c7f5db942b851ba76fb6243692b59740b6361dad7b82be29c83f10db56
SHA512e1626a4c22e716fb1cf16e57de9b79d0856940210bc606cfe94afb464526be2efe16ac5451362eb34427d78024f5130167ef0368f619994cad759b1f8e65d622
-
Filesize
77KB
MD55a8c2729d31d8da7b57c672dc7f4eae2
SHA1e1d26514dae62f255ec3d4a31b857a086b2abb54
SHA256f2dbdb798a51480fddf6d960d49b3751fe95b9ff5bd314805a70f419feb87527
SHA512a7c26c5512f04ac06d669332e83699d793e1311d7653aba282412f9a65466d6ec702ff1ca33e23ef6e96e6745febced281b32cc86232652a470595e508263cab
-
Filesize
76KB
MD549ab67878465309eed7cdcefd5e2a07c
SHA19aee2565575c57d0ceb5bfbf7b07fe07af05d921
SHA25681f204bfc236240209dc0717f22180cbbbb3b547421f1e09af0fe86f7f473ed7
SHA51278db1e192c0e38b43d1906a5bf4bb7f459d7dc985797c8c7741d6deffd5aecda7c7be34f8cf7a8486ad84d31c188e6750c819acf330acc0646920c6d8f6b5c26
-
Filesize
7KB
MD52b009923d451911abd0597627af23f4d
SHA182638952e552bf6e5ccd62fedecb699e4c7ac159
SHA25609f62ef3e25c01097d59b00d85774bd82b5688d62ccdefb657faacf8f09e2eed
SHA51287c0bccbb57c760b67b43a5c840f70cbc1ed278d2c42fb1a4dee226500c208f9506214ee396afacbbc0665c8d4c3d657c57b751561dbe0e08f34690b9d05a04e
-
Filesize
57KB
MD5ca2c5ef0486f0e706805b4e65982fb46
SHA1705edff40564397fd1be996f219bb1bea6137ffd
SHA2561d4eb9ed8263e7e233100105846540aa5155af3742b5c9b620f3709c826e70a2
SHA512daa54793c86eda19dad829704d7de72b10befa8a367637eba86e264ce14344f83a61de9f441ec894100ba63f3041a61e999ca0768138bfc0f45f6d05fdad4492
-
Filesize
46KB
MD5e43873e421e257e4742534987a7f0772
SHA186614d2209251f279bf2737d9762403e1e5975d1
SHA256e0556f71bed63058f6ceb9bba06358cd553c89833b64c341df5f5782f376ae35
SHA512a7bba92f8febb931f14175a3cf1dde6656ce109f0df33939ee7def7a6b58111df99952a29fd33a9e4265d8655e42f248ab6fa7a16258ee6c061a08a2e034cbb0
-
Filesize
15KB
MD5137f4b1c98e8fd7c853f0a3ccdfa3106
SHA17164a2775ac60cd760f3f7c6b798b4827d915f9f
SHA256cfc93b9b3559c3683e223eb2ca0d9d02ce450d13ae554192c8b5ad4281bf11ae
SHA512a5aa13dc5bfc41466268843710f7f4e12ef9875d27660811e593abb6d91ed984c857b8ae99b416c0fea7dc19a5d51c1d51eba7368e6c3570ac1affdc3166bdb3
-
Filesize
4KB
MD588b9c1507c6401f943566088cc8959f4
SHA1e79579f7b9afcb99a839dff9be71cfeeb889b65a
SHA2563fada91321d64fe748d2e1a7b4c53f227090010faafaef9bb9a4dc625ac95505
SHA5128a448c90cc6c71046322a59fad2c2395a6c6ffa447fbcf67efa0304778c0d491e579c9d086e51d0cae07ffc30c01952bcd17de4dd8a9b209fefb9ff0fc2532d9
-
Filesize
15KB
MD5c5a50e50473706ebe3c10eccf5b18669
SHA1b4399ce19e338e82996cc132eae2be3a75cd639a
SHA25608c5b6db9f413b69f84d20db92090508d81eb4d837bdc29742a8aa82ee6d8e25
SHA512be8add0c186c64db8f36710e1e0cae138488903a0f1fdbfa0deae7c1838eed4083677b033c787dee5a361a911783a827ad10fe91bf8bee26419a382365162854
-
Filesize
47KB
MD56d5c8c3b94a365ae97e1d66d270f5b88
SHA1481f7a3b33fe627a01926f91a40220fba5d7c47e
SHA256120a9772a328e5e5c15895dee0092650fbf0c2ee39585b9766efda053fdc3b32
SHA5125fd24a2f6bbbeb6951602f561990a50dbb1667c5c4852573702cae1d8461cf580630ed912b83fa141c858921a4559b50c45d3be9e60f0ea0b77585ff3f0d9917
-
Filesize
11KB
MD5dba4f0baa3b477e3c78e06396af478be
SHA18bade8346f7fb1e43d3e12f25c5f89251b49f2f4
SHA256850b6fbd89aa7bea86fef0bf96970afd4844e5551513b0fae3e716feb0a2f4be
SHA512202d5dfbef1050bde856eb3927d393001cd39180b38404b50574f636279ba495613acb6b96a57c04a89d6538a2756866ec720ca5c43f54abeadeb1cbb6218a74
-
Filesize
16KB
MD51d9a4633a47a0d001d0549d7bfdeda48
SHA1e84359f2847d09ea71fab399bd32890bbe6bc3d9
SHA2567deeec36951b259210ad725727f483c1b0cd84fa64aaea523490867222ccfe76
SHA512c1366a0a122729ac8cfd69b7fcc4bc47271dd3275a4e3030270f6982ea9bb0e75f652b4de52957a151496a8a472bfbad8764cbbb6b027b271842ae2d2af80180
-
Filesize
45KB
MD5e324424deab542238e16f777957cc052
SHA1a18ed3f1f3e217f992fc1b14db670a5ff43346d6
SHA25677c9cabb0fd8e9fe20d51e106baf8f053a2ede1a910c01f4bdd18090ff89f993
SHA512832ddcc765fa4ba1b83a6541139a5f4704a71120d208de019b5caf0626b6b48f5326c780b3b3ab50e2723cdaf983967d26b7842dd787d6df2ede6ffa1bc414bb
-
Filesize
23KB
MD5e17dfc477d14a2a04859f773653ba03a
SHA136012d1219e0d443ae243a24dbc42a9be8a7aaed
SHA256d87975a0266949f222b482b62288b145208ea2b7c7950ff05ee9ccd81605c6ee
SHA5127f285b09d1f61e0d8fc9f850596763e5f44fac39995a25c968a34d68cef40a58af13aa4b3ab2bee64fc63f9f558e205cea88149edb2e65e0fad0955dfaa42794
-
Filesize
13KB
MD5bc6535d877cdb67d5d1a8d0a5a8c08fa
SHA1d3e0706953eadeea961ef54d28a1931467ab729e
SHA256d5cdb96a85b14ea363e22601230924106ac8ca6075c82e911e47d709b5082868
SHA5122b45f6014ca7fd67c6d2612e8e002a51dbb846111d4b0e692bfb71cbc1407a495820ca96336abe74e8d334f00bb4e2a1d7b78dec5551051a39f90640aeb22528
-
Filesize
26KB
MD5d4ad45ff4b7fe9c1c7cfa05a7d71c2f6
SHA14978a53060638a404429725211cb32410736ad38
SHA256d353720042c18a5a71f34c7b65a77f3af7c21eb816f5c15cb4930b4eacc90f5c
SHA512940d5df19908b735a62278c46f6a5f6d283a9013b5230b4376586d90e90e85f93c98bb18f5c323cbbec09b558f2adeb339ee26d621ad1b55ac2a785a84b5ce62
-
Filesize
17KB
MD5724dfd36a54f25a73445d7010feec512
SHA1eae7dd919a33e83c30aec87801f447388128eadb
SHA256447aeff6ddf94fa40ae40d5c741429de0a5a6329d3e866aa61b42f4494a16c92
SHA512cf8e9d9e89b49726ade1e0c9163ea09f05ff9499cdf53797ecb4648efa295797bce5d74bf5ca85eeaeaa3190102f3bba57b2fcbf27a89ae76c67a3ec24b37894
-
Filesize
5KB
MD5cfccb427f8ddee5feb89f62a8a7bfcca
SHA1ad56098b92ca3cc82612e62f6f62c4869b29384f
SHA25629587fbdfc5e7f18f5901041679521c29efa221e96bae0c96e6f1eff24b382bb
SHA51221ecab6f853b8d0bb7b8ffcaf6f3ab11acea92fa2792302b22fdd87f43372ab69d9c337b29b5a018ecb6b81ab32229b173ade6c6023e98026fedf486535a3e50
-
Filesize
6KB
MD50b178b0241467b5d05b0bcf5431119a3
SHA1b2600139b8a12c03bf53733c462b58f6286dd3ba
SHA256d77880d10fd9b7656294e66aab3acd934d21e62b5048051a5b5c1e2236e841e7
SHA512a26c3fbadd1e5ce8dda9cf9a15ea0f796a965a5c34ea47d608087b1bc6247737e58c8c7f2ccec7b08f94665679b6295d3113c4c78a9fb682c91e71dc2e67af49
-
Filesize
50KB
MD5e2f525f5a3a70e0a7c88f9eca30afebb
SHA1bb0f55182919e0523ef65c975cdaf4c76d9a7629
SHA2565764562e2c08f11797842f2df9f0caf366723e78edb20552ba78828b8e4441ac
SHA5124289fbb12d96aa5ce31d14b554bccbff89ada16e993555e30684f148f0dbce42cd3ccedcdd4629f170539de98037039a2596d8e79167e025474ef9ab3c0312a1
-
Filesize
5KB
MD59744e58b12a9803720932707235dcdb5
SHA1414dac691436bdc71bff06a7992a4ce7fd14f185
SHA2567d9d13a3976067aaaf41a289cac534b71ada6f0258a68d6bbd64db2cb1902c66
SHA5126dfa0b98f512dfd6c702ee1ad5ffab6e2de6e514d8195fc773cd77413c20dc6d3a3f8f81f2d05a750bad2db4d2231fe0c1d069aa723fa12713d4f46a84da6238
-
Filesize
4KB
MD5277e03010956d77fa716153a3c5907a9
SHA1d86b7d501d3a7b784b5ff26b1ad32e3036950a38
SHA256c53bed989890729908770026303bc59ea85a3f2c543275f050bef249d2950a1c
SHA512c8d8fdaebad86ae4c9830f1a2b12123753e7c5ff60c79f5697591725782906b830e91c8328d1ab6e828b9ec2dd896790ffb5e864c5b715c5b18c7f58291daadc
-
Filesize
513KB
MD57ed7573fa38e38d7ddcfd36314e391cd
SHA1e747c3b155dbb10354baecec7f1ea1994b59a3db
SHA256145dd852dfa398d95486506617e9ca1b2dac4d2c48eb6c8fa8f2545851f2d19a
SHA512af6c826e62f169a3cba874eb5e9ed6040ed696c7dad45c1103f64d7ca7b9cdd522d3e02e13c20c85cf9e6ef55a6f48e3960f3c55be2eadcae64da91289ef2117
-
Filesize
203KB
MD5b30bf477fa3425388df63b6fa310bdff
SHA1afe6c845859de74794bd0559a6da522d21c85e2f
SHA256a2a5ae8f37bd0a982cf9dd3b9be6e2cde8bcca8291fe89877bf5949cfd4165ce
SHA51288447a1d245c32e027cdb22783ee7f700c4686a8fd897a69b42912e2464d05211bfaa3a33eb8320fe66402ef5c7b0de765c1599441448c31ae3fcb161797319b
-
Filesize
99KB
MD59bb7d47eefde96c13c1d58ffd4c47a51
SHA16fac4a2fb1751f4f3236e65a026aa878ea0ec5bb
SHA2560a913bccfad74e89ba7f1723231b033981bdb8ae57c46b2e9d5d21e642540b75
SHA512da6f5140187dfd63b19fc0bc5f1b7f091e9036cfc9ddf34cf9bb06c17bbee75ee7d835a68dfef98409ada01b387b05bfb6337c93a6eba21d06d29e35daa324ad
-
Filesize
44KB
MD5d2427e501f51730ea54a0acb71d9341e
SHA1676422259d0cc8572397f88cce8f6f69ca680f11
SHA256953820fbcacd3c4237a267f5899534729b0186ce17e96e9381503b7661afbaff
SHA512128dce6ae7ceaeebdb5fe3bea1986ce8ecee2b9efb44d417cdd71efb13d6910efe17e9d4b63d085386688c2ac478acb4fbfe4f2184a0c5d4f0749b93578a59b5
-
Filesize
31KB
MD5ce9fa82e5c4f66529df3e79ad0f319e0
SHA103acf5364816bc41258ef3ab5857d8e52fda1000
SHA256f7e788e15329f6f4b9e3be07c34a81b1021bd4b512a3db7aacfd7d45a00762e9
SHA5122109df0061a1fedffcf2a49e4ca983f0622067b4ec5f5410f049b52a14da1be76371656bfc24562691d953ea37cd3208c280b2281bfd5c2269042a4cb900015e
-
Filesize
576KB
MD58ca833b83ada574036798359ed03416f
SHA1c9ec1e1f027b9ecf44213dc3f1d2066e2f87bdbc
SHA256fa4a2364e6e318f8af417a75039cc603346bef868d76356498a42185ee073534
SHA5123c8c7e713ba184b59b3c0bfbf37b96fbdc43d396923b735fbda0972c24c09759c663b03fae4e143ea131d5878ca06061df3e8654033af4012e250bea7d34cf9f
-
Filesize
450KB
MD5e67cf9b484075ea312b9a046d0f6c3d8
SHA137e6246da334f9dd0d84024ca7196e5b753147f9
SHA2561092a54d87feed34843e4d0d4c27f7eced00fd1ddf9cd87ca132b6083f1fce49
SHA5127e8aacb51084d46212b7a475f81d01d4841c6848db414b31dafac43147643c8401e5abbdb04df677baaf4d3924a37ae6c98b79421b24de7b9942f44e72d454ba