Analysis
-
max time kernel
2s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
02/01/2024, 14:54
Static task
static1
Behavioral task
behavioral1
Sample
a7a748ae3f5eb83833eebc2571bd2580.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
a7a748ae3f5eb83833eebc2571bd2580.exe
Resource
win10v2004-20231215-en
General
-
Target
a7a748ae3f5eb83833eebc2571bd2580.exe
-
Size
123KB
-
MD5
a7a748ae3f5eb83833eebc2571bd2580
-
SHA1
c285052bf14451ea0dc88303596a09b2d165ccbb
-
SHA256
3f03262a24c9f053df87fd6ac68f6a9ca2ad3fcc10aa30c3f5df29245fb4ff1d
-
SHA512
eaf1a04a1a132e01ab9299bb87987eb39b03c8cde159012a1a079119b04ae2c0e1d3adb53d7cb2f156ec2a965d413717c2efc6afc772584d2a60c39c52b90532
-
SSDEEP
3072:MtMbGKfZ0DWR0bvC3dTRf96KRYSa9rR85DEn5k7r8:MtMCMZ0vwh96K4rQD85k/8
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 32 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Lkppbl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Mmfbogcn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Llkbap32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mggpgmof.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mkeimlfm.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Maoajf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Maoajf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Mmhodf32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mcegmm32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lkppbl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Mggpgmof.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Mppepcfg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mgljbm32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mmhodf32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Meccii32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mlmlecec.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Llkbap32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mdpjlajk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Mcegmm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" a7a748ae3f5eb83833eebc2571bd2580.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Kpmlkp32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mppepcfg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Mkeimlfm.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mpfkqb32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad a7a748ae3f5eb83833eebc2571bd2580.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kpmlkp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Mgljbm32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mmfbogcn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Mdpjlajk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Mpfkqb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Meccii32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Mlmlecec.exe -
Executes dropped EXE 15 IoCs
pid Process 2188 Kpmlkp32.exe 2324 Llkbap32.exe 3032 Lkppbl32.exe 2804 Mggpgmof.exe 2716 Mppepcfg.exe 2596 Mkeimlfm.exe 2448 Maoajf32.exe 2860 Mgljbm32.exe 2936 Mmfbogcn.exe 1944 Mdpjlajk.exe 1576 Mmhodf32.exe 1056 Mpfkqb32.exe 1628 Mcegmm32.exe 3000 Meccii32.exe 1856 Mlmlecec.exe -
Loads dropped DLL 30 IoCs
pid Process 2056 a7a748ae3f5eb83833eebc2571bd2580.exe 2056 a7a748ae3f5eb83833eebc2571bd2580.exe 2188 Kpmlkp32.exe 2188 Kpmlkp32.exe 2324 Llkbap32.exe 2324 Llkbap32.exe 3032 Lkppbl32.exe 3032 Lkppbl32.exe 2804 Mggpgmof.exe 2804 Mggpgmof.exe 2716 Mppepcfg.exe 2716 Mppepcfg.exe 2596 Mkeimlfm.exe 2596 Mkeimlfm.exe 2448 Maoajf32.exe 2448 Maoajf32.exe 2860 Mgljbm32.exe 2860 Mgljbm32.exe 2936 Mmfbogcn.exe 2936 Mmfbogcn.exe 1944 Mdpjlajk.exe 1944 Mdpjlajk.exe 1576 Mmhodf32.exe 1576 Mmhodf32.exe 1056 Mpfkqb32.exe 1056 Mpfkqb32.exe 1628 Mcegmm32.exe 1628 Mcegmm32.exe 3000 Meccii32.exe 3000 Meccii32.exe -
Drops file in System32 directory 48 IoCs
description ioc Process File created C:\Windows\SysWOW64\Mkeimlfm.exe Mppepcfg.exe File created C:\Windows\SysWOW64\Loolpo32.dll Maoajf32.exe File opened for modification C:\Windows\SysWOW64\Mmhodf32.exe Mdpjlajk.exe File created C:\Windows\SysWOW64\Fbbkkjih.dll Mdpjlajk.exe File created C:\Windows\SysWOW64\Ijlhmj32.dll Mcegmm32.exe File opened for modification C:\Windows\SysWOW64\Llkbap32.exe Kpmlkp32.exe File created C:\Windows\SysWOW64\Mgljbm32.exe Maoajf32.exe File created C:\Windows\SysWOW64\Mdpjlajk.exe Mmfbogcn.exe File created C:\Windows\SysWOW64\Ofbjgh32.dll Mmhodf32.exe File created C:\Windows\SysWOW64\Mcegmm32.exe Mpfkqb32.exe File created C:\Windows\SysWOW64\Dfnfdcqd.dll Mpfkqb32.exe File opened for modification C:\Windows\SysWOW64\Meccii32.exe Mcegmm32.exe File opened for modification C:\Windows\SysWOW64\Mppepcfg.exe Mggpgmof.exe File created C:\Windows\SysWOW64\Lnmfog32.dll Mggpgmof.exe File created C:\Windows\SysWOW64\Najdnj32.exe Mlmlecec.exe File created C:\Windows\SysWOW64\Pqhmfm32.dll Mlmlecec.exe File created C:\Windows\SysWOW64\Llkbap32.exe Kpmlkp32.exe File created C:\Windows\SysWOW64\Lkppbl32.exe Llkbap32.exe File created C:\Windows\SysWOW64\Bmamfo32.dll Lkppbl32.exe File created C:\Windows\SysWOW64\Maoajf32.exe Mkeimlfm.exe File opened for modification C:\Windows\SysWOW64\Mdpjlajk.exe Mmfbogcn.exe File opened for modification C:\Windows\SysWOW64\Lkppbl32.exe Llkbap32.exe File created C:\Windows\SysWOW64\Lkoacn32.dll Mmfbogcn.exe File created C:\Windows\SysWOW64\Mmhodf32.exe Mdpjlajk.exe File created C:\Windows\SysWOW64\Mpfkqb32.exe Mmhodf32.exe File created C:\Windows\SysWOW64\Mlmlecec.exe Meccii32.exe File opened for modification C:\Windows\SysWOW64\Najdnj32.exe Mlmlecec.exe File opened for modification C:\Windows\SysWOW64\Mcegmm32.exe Mpfkqb32.exe File opened for modification C:\Windows\SysWOW64\Kpmlkp32.exe a7a748ae3f5eb83833eebc2571bd2580.exe File created C:\Windows\SysWOW64\Mggpgmof.exe Lkppbl32.exe File opened for modification C:\Windows\SysWOW64\Mggpgmof.exe Lkppbl32.exe File opened for modification C:\Windows\SysWOW64\Mkeimlfm.exe Mppepcfg.exe File created C:\Windows\SysWOW64\Mmfbogcn.exe Mgljbm32.exe File created C:\Windows\SysWOW64\Ohkgmi32.dll Mgljbm32.exe File opened for modification C:\Windows\SysWOW64\Mpfkqb32.exe Mmhodf32.exe File opened for modification C:\Windows\SysWOW64\Mlmlecec.exe Meccii32.exe File created C:\Windows\SysWOW64\Gmndnn32.dll Meccii32.exe File created C:\Windows\SysWOW64\Nfcijc32.dll a7a748ae3f5eb83833eebc2571bd2580.exe File created C:\Windows\SysWOW64\Bbmfll32.dll Llkbap32.exe File created C:\Windows\SysWOW64\Mppepcfg.exe Mggpgmof.exe File created C:\Windows\SysWOW64\Gfadgaio.dll Mppepcfg.exe File created C:\Windows\SysWOW64\Oacima32.dll Mkeimlfm.exe File opened for modification C:\Windows\SysWOW64\Mgljbm32.exe Maoajf32.exe File created C:\Windows\SysWOW64\Meccii32.exe Mcegmm32.exe File created C:\Windows\SysWOW64\Kpmlkp32.exe a7a748ae3f5eb83833eebc2571bd2580.exe File created C:\Windows\SysWOW64\Hbfcml32.dll Kpmlkp32.exe File opened for modification C:\Windows\SysWOW64\Maoajf32.exe Mkeimlfm.exe File opened for modification C:\Windows\SysWOW64\Mmfbogcn.exe Mgljbm32.exe -
Program crash 1 IoCs
pid pid_target Process 3232 3168 WerFault.exe -
Modifies registry class 51 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ijlhmj32.dll" Mcegmm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Maoajf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Mmhodf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Loolpo32.dll" Maoajf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Kpmlkp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Mkeimlfm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Mpfkqb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nfcijc32.dll" a7a748ae3f5eb83833eebc2571bd2580.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hbfcml32.dll" Kpmlkp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Llkbap32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Mdpjlajk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lnmfog32.dll" Mggpgmof.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dfnfdcqd.dll" Mpfkqb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Mgljbm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Mpfkqb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pqhmfm32.dll" Mlmlecec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID a7a748ae3f5eb83833eebc2571bd2580.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Mggpgmof.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bmamfo32.dll" Lkppbl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Mkeimlfm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Mmfbogcn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node a7a748ae3f5eb83833eebc2571bd2580.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Mcegmm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Lkppbl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Mggpgmof.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ohkgmi32.dll" Mgljbm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lkoacn32.dll" Mmfbogcn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 a7a748ae3f5eb83833eebc2571bd2580.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bbmfll32.dll" Llkbap32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Mgljbm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Mppepcfg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oacima32.dll" Mkeimlfm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Meccii32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Mlmlecec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Maoajf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Meccii32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" a7a748ae3f5eb83833eebc2571bd2580.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Mcegmm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Mlmlecec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fbbkkjih.dll" Mdpjlajk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Mmhodf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ofbjgh32.dll" Mmhodf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Llkbap32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Lkppbl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717} a7a748ae3f5eb83833eebc2571bd2580.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gfadgaio.dll" Mppepcfg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Mppepcfg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Mmfbogcn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Kpmlkp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gmndnn32.dll" Meccii32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Mdpjlajk.exe -
Suspicious use of WriteProcessMemory 60 IoCs
description pid Process procid_target PID 2056 wrote to memory of 2188 2056 a7a748ae3f5eb83833eebc2571bd2580.exe 28 PID 2056 wrote to memory of 2188 2056 a7a748ae3f5eb83833eebc2571bd2580.exe 28 PID 2056 wrote to memory of 2188 2056 a7a748ae3f5eb83833eebc2571bd2580.exe 28 PID 2056 wrote to memory of 2188 2056 a7a748ae3f5eb83833eebc2571bd2580.exe 28 PID 2188 wrote to memory of 2324 2188 Kpmlkp32.exe 29 PID 2188 wrote to memory of 2324 2188 Kpmlkp32.exe 29 PID 2188 wrote to memory of 2324 2188 Kpmlkp32.exe 29 PID 2188 wrote to memory of 2324 2188 Kpmlkp32.exe 29 PID 2324 wrote to memory of 3032 2324 Llkbap32.exe 140 PID 2324 wrote to memory of 3032 2324 Llkbap32.exe 140 PID 2324 wrote to memory of 3032 2324 Llkbap32.exe 140 PID 2324 wrote to memory of 3032 2324 Llkbap32.exe 140 PID 3032 wrote to memory of 2804 3032 Lkppbl32.exe 139 PID 3032 wrote to memory of 2804 3032 Lkppbl32.exe 139 PID 3032 wrote to memory of 2804 3032 Lkppbl32.exe 139 PID 3032 wrote to memory of 2804 3032 Lkppbl32.exe 139 PID 2804 wrote to memory of 2716 2804 Mggpgmof.exe 138 PID 2804 wrote to memory of 2716 2804 Mggpgmof.exe 138 PID 2804 wrote to memory of 2716 2804 Mggpgmof.exe 138 PID 2804 wrote to memory of 2716 2804 Mggpgmof.exe 138 PID 2716 wrote to memory of 2596 2716 Mppepcfg.exe 137 PID 2716 wrote to memory of 2596 2716 Mppepcfg.exe 137 PID 2716 wrote to memory of 2596 2716 Mppepcfg.exe 137 PID 2716 wrote to memory of 2596 2716 Mppepcfg.exe 137 PID 2596 wrote to memory of 2448 2596 Mkeimlfm.exe 136 PID 2596 wrote to memory of 2448 2596 Mkeimlfm.exe 136 PID 2596 wrote to memory of 2448 2596 Mkeimlfm.exe 136 PID 2596 wrote to memory of 2448 2596 Mkeimlfm.exe 136 PID 2448 wrote to memory of 2860 2448 Maoajf32.exe 135 PID 2448 wrote to memory of 2860 2448 Maoajf32.exe 135 PID 2448 wrote to memory of 2860 2448 Maoajf32.exe 135 PID 2448 wrote to memory of 2860 2448 Maoajf32.exe 135 PID 2860 wrote to memory of 2936 2860 Mgljbm32.exe 134 PID 2860 wrote to memory of 2936 2860 Mgljbm32.exe 134 PID 2860 wrote to memory of 2936 2860 Mgljbm32.exe 134 PID 2860 wrote to memory of 2936 2860 Mgljbm32.exe 134 PID 2936 wrote to memory of 1944 2936 Mmfbogcn.exe 133 PID 2936 wrote to memory of 1944 2936 Mmfbogcn.exe 133 PID 2936 wrote to memory of 1944 2936 Mmfbogcn.exe 133 PID 2936 wrote to memory of 1944 2936 Mmfbogcn.exe 133 PID 1944 wrote to memory of 1576 1944 Mdpjlajk.exe 132 PID 1944 wrote to memory of 1576 1944 Mdpjlajk.exe 132 PID 1944 wrote to memory of 1576 1944 Mdpjlajk.exe 132 PID 1944 wrote to memory of 1576 1944 Mdpjlajk.exe 132 PID 1576 wrote to memory of 1056 1576 Mmhodf32.exe 131 PID 1576 wrote to memory of 1056 1576 Mmhodf32.exe 131 PID 1576 wrote to memory of 1056 1576 Mmhodf32.exe 131 PID 1576 wrote to memory of 1056 1576 Mmhodf32.exe 131 PID 1056 wrote to memory of 1628 1056 Mpfkqb32.exe 130 PID 1056 wrote to memory of 1628 1056 Mpfkqb32.exe 130 PID 1056 wrote to memory of 1628 1056 Mpfkqb32.exe 130 PID 1056 wrote to memory of 1628 1056 Mpfkqb32.exe 130 PID 1628 wrote to memory of 3000 1628 Mcegmm32.exe 129 PID 1628 wrote to memory of 3000 1628 Mcegmm32.exe 129 PID 1628 wrote to memory of 3000 1628 Mcegmm32.exe 129 PID 1628 wrote to memory of 3000 1628 Mcegmm32.exe 129 PID 3000 wrote to memory of 1856 3000 Meccii32.exe 30 PID 3000 wrote to memory of 1856 3000 Meccii32.exe 30 PID 3000 wrote to memory of 1856 3000 Meccii32.exe 30 PID 3000 wrote to memory of 1856 3000 Meccii32.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\a7a748ae3f5eb83833eebc2571bd2580.exe"C:\Users\Admin\AppData\Local\Temp\a7a748ae3f5eb83833eebc2571bd2580.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\SysWOW64\Kpmlkp32.exeC:\Windows\system32\Kpmlkp32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\SysWOW64\Llkbap32.exeC:\Windows\system32\Llkbap32.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Windows\SysWOW64\Lkppbl32.exeC:\Windows\system32\Lkppbl32.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3032
-
-
-
-
C:\Windows\SysWOW64\Mlmlecec.exeC:\Windows\system32\Mlmlecec.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1856 -
C:\Windows\SysWOW64\Najdnj32.exeC:\Windows\system32\Najdnj32.exe2⤵PID:2948
-
-
C:\Windows\SysWOW64\Nkeelohh.exeC:\Windows\system32\Nkeelohh.exe1⤵PID:1148
-
C:\Windows\SysWOW64\Nncahjgl.exeC:\Windows\system32\Nncahjgl.exe2⤵PID:1648
-
-
C:\Windows\SysWOW64\Ngnbgplj.exeC:\Windows\system32\Ngnbgplj.exe1⤵PID:2764
-
C:\Windows\SysWOW64\Nacgdhlp.exeC:\Windows\system32\Nacgdhlp.exe2⤵PID:2844
-
-
C:\Windows\SysWOW64\Olpdjf32.exeC:\Windows\system32\Olpdjf32.exe1⤵PID:2544
-
C:\Windows\SysWOW64\Oonafa32.exeC:\Windows\system32\Oonafa32.exe2⤵PID:472
-
C:\Windows\SysWOW64\Ofhick32.exeC:\Windows\system32\Ofhick32.exe3⤵PID:2964
-
-
-
C:\Windows\SysWOW64\Oqmmpd32.exeC:\Windows\system32\Oqmmpd32.exe1⤵PID:752
-
C:\Windows\SysWOW64\Oclilp32.exeC:\Windows\system32\Oclilp32.exe2⤵PID:1688
-
C:\Windows\SysWOW64\Ojfaijcc.exeC:\Windows\system32\Ojfaijcc.exe3⤵PID:2224
-
C:\Windows\SysWOW64\Okgnab32.exeC:\Windows\system32\Okgnab32.exe4⤵PID:1552
-
C:\Windows\SysWOW64\Ocnfbo32.exeC:\Windows\system32\Ocnfbo32.exe5⤵PID:596
-
C:\Windows\SysWOW64\Odobjg32.exeC:\Windows\system32\Odobjg32.exe6⤵PID:2856
-
-
-
-
-
-
C:\Windows\SysWOW64\Pogclp32.exeC:\Windows\system32\Pogclp32.exe1⤵PID:2888
-
C:\Windows\SysWOW64\Pbfpik32.exeC:\Windows\system32\Pbfpik32.exe2⤵PID:320
-
-
C:\Windows\SysWOW64\Pedleg32.exeC:\Windows\system32\Pedleg32.exe1⤵PID:2020
-
C:\Windows\SysWOW64\Pjadmnic.exeC:\Windows\system32\Pjadmnic.exe2⤵PID:396
-
C:\Windows\SysWOW64\Pefijfii.exeC:\Windows\system32\Pefijfii.exe3⤵PID:2728
-
-
-
C:\Windows\SysWOW64\Pnomcl32.exeC:\Windows\system32\Pnomcl32.exe1⤵PID:684
-
C:\Windows\SysWOW64\Peiepfgg.exeC:\Windows\system32\Peiepfgg.exe2⤵PID:1556
-
C:\Windows\SysWOW64\Pfjbgnme.exeC:\Windows\system32\Pfjbgnme.exe3⤵PID:2740
-
-
-
C:\Windows\SysWOW64\Pmdjdh32.exeC:\Windows\system32\Pmdjdh32.exe1⤵PID:2072
-
C:\Windows\SysWOW64\Pcnbablo.exeC:\Windows\system32\Pcnbablo.exe2⤵PID:2916
-
-
C:\Windows\SysWOW64\Pikkiijf.exeC:\Windows\system32\Pikkiijf.exe1⤵PID:1124
-
C:\Windows\SysWOW64\Qmfgjh32.exeC:\Windows\system32\Qmfgjh32.exe2⤵PID:2984
-
-
C:\Windows\SysWOW64\Qimhoi32.exeC:\Windows\system32\Qimhoi32.exe1⤵PID:1656
-
C:\Windows\SysWOW64\Qpgpkcpp.exeC:\Windows\system32\Qpgpkcpp.exe2⤵PID:1044
-
-
C:\Windows\SysWOW64\Abhimnma.exeC:\Windows\system32\Abhimnma.exe1⤵PID:1404
-
C:\Windows\SysWOW64\Aefeijle.exeC:\Windows\system32\Aefeijle.exe2⤵PID:2192
-
-
C:\Windows\SysWOW64\Aidnohbk.exeC:\Windows\system32\Aidnohbk.exe1⤵PID:2160
-
C:\Windows\SysWOW64\Albjlcao.exeC:\Windows\system32\Albjlcao.exe2⤵PID:1972
-
C:\Windows\SysWOW64\Abmbhn32.exeC:\Windows\system32\Abmbhn32.exe3⤵PID:2956
-
C:\Windows\SysWOW64\Aekodi32.exeC:\Windows\system32\Aekodi32.exe4⤵PID:960
-
C:\Windows\SysWOW64\Bldcpf32.exeC:\Windows\system32\Bldcpf32.exe5⤵PID:2724
-
C:\Windows\SysWOW64\Bocolb32.exeC:\Windows\system32\Bocolb32.exe6⤵PID:1668
-
C:\Windows\SysWOW64\Biicik32.exeC:\Windows\system32\Biicik32.exe7⤵PID:1652
-
C:\Windows\SysWOW64\Ceodnl32.exeC:\Windows\system32\Ceodnl32.exe8⤵PID:1696
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Aamfnkai.exeC:\Windows\system32\Aamfnkai.exe1⤵PID:2672
-
C:\Windows\SysWOW64\Alpmfdcb.exeC:\Windows\system32\Alpmfdcb.exe1⤵PID:928
-
C:\Windows\SysWOW64\Alnqqd32.exeC:\Windows\system32\Alnqqd32.exe1⤵PID:1540
-
C:\Windows\SysWOW64\Aipddi32.exeC:\Windows\system32\Aipddi32.exe1⤵PID:1900
-
C:\Windows\SysWOW64\Qbelgood.exeC:\Windows\system32\Qbelgood.exe1⤵PID:2796
-
C:\Windows\SysWOW64\Chpmpg32.exeC:\Windows\system32\Chpmpg32.exe1⤵PID:1036
-
C:\Windows\SysWOW64\Cnmehnan.exeC:\Windows\system32\Cnmehnan.exe2⤵PID:1928
-
C:\Windows\SysWOW64\Chbjffad.exeC:\Windows\system32\Chbjffad.exe3⤵PID:1172
-
-
-
C:\Windows\SysWOW64\Cdikkg32.exeC:\Windows\system32\Cdikkg32.exe1⤵PID:2408
-
C:\Windows\SysWOW64\Cnaocmmi.exeC:\Windows\system32\Cnaocmmi.exe2⤵PID:1084
-
C:\Windows\SysWOW64\Djhphncm.exeC:\Windows\system32\Djhphncm.exe3⤵PID:3052
-
-
-
C:\Windows\SysWOW64\Dpbheh32.exeC:\Windows\system32\Dpbheh32.exe1⤵PID:1224
-
C:\Windows\SysWOW64\Dcadac32.exeC:\Windows\system32\Dcadac32.exe2⤵PID:2708
-
C:\Windows\SysWOW64\Djklnnaj.exeC:\Windows\system32\Djklnnaj.exe3⤵PID:1420
-
C:\Windows\SysWOW64\Dhnmij32.exeC:\Windows\system32\Dhnmij32.exe4⤵PID:2792
-
-
-
-
C:\Windows\SysWOW64\Dbfabp32.exeC:\Windows\system32\Dbfabp32.exe1⤵PID:2360
-
C:\Windows\SysWOW64\Dhpiojfb.exeC:\Windows\system32\Dhpiojfb.exe2⤵PID:2100
-
C:\Windows\SysWOW64\Dojald32.exeC:\Windows\system32\Dojald32.exe3⤵PID:272
-
-
-
C:\Windows\SysWOW64\Dfffnn32.exeC:\Windows\system32\Dfffnn32.exe1⤵PID:3248
-
C:\Windows\SysWOW64\Dggcffhg.exeC:\Windows\system32\Dggcffhg.exe2⤵PID:3300
-
-
C:\Windows\SysWOW64\Enakbp32.exeC:\Windows\system32\Enakbp32.exe1⤵PID:3404
-
C:\Windows\SysWOW64\Eqpgol32.exeC:\Windows\system32\Eqpgol32.exe2⤵PID:3452
-
-
C:\Windows\SysWOW64\Ednpej32.exeC:\Windows\system32\Ednpej32.exe1⤵PID:3636
-
C:\Windows\SysWOW64\Ecqqpgli.exeC:\Windows\system32\Ecqqpgli.exe2⤵PID:3696
-
-
C:\Windows\SysWOW64\Emkaol32.exeC:\Windows\system32\Emkaol32.exe1⤵PID:3920
-
C:\Windows\SysWOW64\Eqgnokip.exeC:\Windows\system32\Eqgnokip.exe2⤵PID:3972
-
C:\Windows\SysWOW64\Efcfga32.exeC:\Windows\system32\Efcfga32.exe3⤵PID:4020
-
C:\Windows\SysWOW64\Eibbcm32.exeC:\Windows\system32\Eibbcm32.exe4⤵PID:4076
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3168 -s 1401⤵
- Program crash
PID:3232
-
C:\Windows\SysWOW64\Fkckeh32.exeC:\Windows\system32\Fkckeh32.exe1⤵PID:3168
-
C:\Windows\SysWOW64\Fjaonpnn.exeC:\Windows\system32\Fjaonpnn.exe1⤵PID:3120
-
C:\Windows\SysWOW64\Echfaf32.exeC:\Windows\system32\Echfaf32.exe1⤵PID:1188
-
C:\Windows\SysWOW64\Efaibbij.exeC:\Windows\system32\Efaibbij.exe1⤵PID:3872
-
C:\Windows\SysWOW64\Emieil32.exeC:\Windows\system32\Emieil32.exe1⤵PID:3816
-
C:\Windows\SysWOW64\Enfenplo.exeC:\Windows\system32\Enfenplo.exe1⤵PID:3752
-
C:\Windows\SysWOW64\Ebodiofk.exeC:\Windows\system32\Ebodiofk.exe1⤵PID:3584
-
C:\Windows\SysWOW64\Egjpkffe.exeC:\Windows\system32\Egjpkffe.exe1⤵PID:3540
-
C:\Windows\SysWOW64\Dkcofe32.exeC:\Windows\system32\Dkcofe32.exe1⤵PID:3348
-
C:\Windows\SysWOW64\Dolnad32.exeC:\Windows\system32\Dolnad32.exe1⤵PID:3200
-
C:\Windows\SysWOW64\Ddgjdk32.exeC:\Windows\system32\Ddgjdk32.exe1⤵PID:3136
-
C:\Windows\SysWOW64\Dbhnhp32.exeC:\Windows\system32\Dbhnhp32.exe1⤵PID:3084
-
C:\Windows\SysWOW64\Dccagcgk.exeC:\Windows\system32\Dccagcgk.exe1⤵PID:1608
-
C:\Windows\SysWOW64\Caknol32.exeC:\Windows\system32\Caknol32.exe1⤵PID:2748
-
C:\Windows\SysWOW64\Cnkicn32.exeC:\Windows\system32\Cnkicn32.exe1⤵PID:2908
-
C:\Windows\SysWOW64\Qfokbnip.exeC:\Windows\system32\Qfokbnip.exe1⤵PID:1804
-
C:\Windows\SysWOW64\Qpecfc32.exeC:\Windows\system32\Qpecfc32.exe1⤵PID:1800
-
C:\Windows\SysWOW64\Pimkpfeh.exeC:\Windows\system32\Pimkpfeh.exe1⤵PID:2648
-
C:\Windows\SysWOW64\Obcccl32.exeC:\Windows\system32\Obcccl32.exe1⤵PID:2096
-
C:\Windows\SysWOW64\Ohfeog32.exeC:\Windows\system32\Ohfeog32.exe1⤵PID:2060
-
C:\Windows\SysWOW64\Ogblbo32.exeC:\Windows\system32\Ogblbo32.exe1⤵PID:1676
-
C:\Windows\SysWOW64\Oddpfc32.exeC:\Windows\system32\Oddpfc32.exe1⤵PID:2628
-
C:\Windows\SysWOW64\Onjgiiad.exeC:\Windows\system32\Onjgiiad.exe1⤵PID:2840
-
C:\Windows\SysWOW64\Ngpolo32.exeC:\Windows\system32\Ngpolo32.exe1⤵PID:2704
-
C:\Windows\SysWOW64\Ndpfkdmf.exeC:\Windows\system32\Ndpfkdmf.exe1⤵PID:2036
-
C:\Windows\SysWOW64\Naajoinb.exeC:\Windows\system32\Naajoinb.exe1⤵PID:2172
-
C:\Windows\SysWOW64\Ndmjedoi.exeC:\Windows\system32\Ndmjedoi.exe1⤵PID:2340
-
C:\Windows\SysWOW64\Ndkmpe32.exeC:\Windows\system32\Ndkmpe32.exe1⤵PID:1532
-
C:\Windows\SysWOW64\Ncjqhmkm.exeC:\Windows\system32\Ncjqhmkm.exe1⤵PID:2404
-
C:\Windows\SysWOW64\Nlphkb32.exeC:\Windows\system32\Nlphkb32.exe1⤵PID:2532
-
C:\Windows\SysWOW64\Nefpnhlc.exeC:\Windows\system32\Nefpnhlc.exe1⤵PID:1640
-
C:\Windows\SysWOW64\Meccii32.exeC:\Windows\system32\Meccii32.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3000
-
C:\Windows\SysWOW64\Mcegmm32.exeC:\Windows\system32\Mcegmm32.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1628
-
C:\Windows\SysWOW64\Mpfkqb32.exeC:\Windows\system32\Mpfkqb32.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1056
-
C:\Windows\SysWOW64\Mmhodf32.exeC:\Windows\system32\Mmhodf32.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1576
-
C:\Windows\SysWOW64\Mdpjlajk.exeC:\Windows\system32\Mdpjlajk.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1944
-
C:\Windows\SysWOW64\Mmfbogcn.exeC:\Windows\system32\Mmfbogcn.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2936
-
C:\Windows\SysWOW64\Mgljbm32.exeC:\Windows\system32\Mgljbm32.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2860
-
C:\Windows\SysWOW64\Maoajf32.exeC:\Windows\system32\Maoajf32.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2448
-
C:\Windows\SysWOW64\Mkeimlfm.exeC:\Windows\system32\Mkeimlfm.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2596
-
C:\Windows\SysWOW64\Mppepcfg.exeC:\Windows\system32\Mppepcfg.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2716
-
C:\Windows\SysWOW64\Mggpgmof.exeC:\Windows\system32\Mggpgmof.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2804
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
123KB
MD5fd341ef5505e6c959dfe16a3939c40d2
SHA1f9207cf9eb4dff418665f456f9b5082c1f0c82b1
SHA256bc63ef672e5fd9121a99257afd2e45f361803bf29672baffce8ab9e3745dc4c7
SHA51226acf187f1c7328fbff55a969222fa3ac9c0c7f1fa12e07d54e1181af2d57547be6290153addea5cb71ea046d28ca3cca659b11e310c8056e74f118a7f812f2e
-
Filesize
123KB
MD5e7ca51ee7864c9a51677190a9783cb88
SHA1fb4a21d333073c30a6c2c0b517f3a639cb86e902
SHA2563879cb2d510527b67a8ee05af841412753b3802440944ca3f164a1cb4c6a354b
SHA512e6bab21e57b3261c09b28166ace3f18e6ca90f323455406132b86890b8d79ad372c0a8f9bd7234521b1fbcc1678a2510e2336741bbdea36d910957daf2f17d66
-
Filesize
123KB
MD52f237a55f651e822e820b244b546f307
SHA12f26f417e364360d3aed5511bc3b4d7a7bf4debe
SHA256266e27863822e2e2315da31b8d4e50eca687ea5aba0e03904ee338fca884ea8c
SHA5123f3fda41ddfd18864635bf99ee0a986fd623af1a6ee64b8117c63f41e03a1cda6052f5fc2f11f86e5701ec0faa908283713a6f2178b799990ab3d1a12a3eb3ef
-
Filesize
123KB
MD51bf589b38a28acbab8ec045f5ff2ad66
SHA15557dde42e5dffdfc9bd13b2672876ae847f05c2
SHA2567b6271d800d0aaa1b29299e97f50146d3878a5cc2a609f81190d4094d1b43ba6
SHA512bb9498cde1d3a8863c304534ee18c39b191436f9ad2f45e841691eceea0972db0f725ddd14ccaeb0ee2131b36b5b363405494428cf8623ca78ca281376861c32
-
Filesize
123KB
MD55c33d307570760f41f0494b7e104850b
SHA15ef9fcec851fe7ef982880d9255cf16930120aee
SHA2560927db835ed8adad4a8a388832f93aa793336d18c58500f8d02c0d150e1c9030
SHA512bbd3eb02311cc808b13332740366fe6574e49e9870a8bb0c76eaecc860b5e9793431a242efaf388ba30c94d08c199acaf7690d32f6a7bbf3a6ce1af600024ed8
-
Filesize
123KB
MD58b8af288c7e46ff99b0949404c307c16
SHA1ddb3012f59b634f25bed6c7589097c8699b8a232
SHA256166bac2fb188e4fd4d1daccf792369f34b0b10b410ab180926ac86fd0d395e22
SHA512b9961589b47f497be3fed8a14041908ac8ac44deb87e849f410bf31d74712b8cfc0e7e575cede27273eb5d025154f38d4faaf175161f34d613de60196bb520c4
-
Filesize
96KB
MD5d0b78cc29b516b4bcd8eef28ff79dbad
SHA125c4634564c380c3c3131ead1d3836b4a1832bb5
SHA2566eb053100e8e6de986d7ea563ffe63df7179aa973a66a29f144f5fc25f492415
SHA5125d9449fd6d7828dc179cf9d546a08a7f5124dab342b599abed8558b25e2d996fc387c7200e44e33a09db2cf77909d63309e37cf69c22026f56d88ecf5b887380
-
Filesize
123KB
MD57e4cbd31b807d33cd2597149d0fffc02
SHA17dfef36b6829fb11d79afdf59c127cd802fc8c5d
SHA256e42f0ae5a95db849b57eb5842e71de686032efec347f8f0f3c4ae42af83fd123
SHA512e2639ac21c776b94a7bf614880c645a0226cc82548548c1dadafa7464f6d7d48304affb93bc20e8c8aab851a62df72afdf5f5bedb5454c691563f1b9d984e560
-
Filesize
123KB
MD537b0f5cc743ea79e7e90b94b7b8cf61b
SHA1e96483b2ce8f3662d4b3f497a69c9634bf9d92cc
SHA25686b6c87f24786083d38b3ce7c9d5420aafcf4ad2da642a533d2bfa80ef6da42d
SHA512ab4325dc19f802780c69b6fc05e6e7660b9cd36c0d144e6a422bed9d4ab76a5e1d11ee9943f0174d5fa7b1f2795070fa7c11fd2ee35c9a39c325b88f4efd07ad
-
Filesize
92KB
MD592d46b372c0058f67d55bd85edcdde43
SHA11e2063fb219d1232d49c5476f7c1d6f7e92c4435
SHA2562e0f7eb296e0f70f533d02ba8124e5102658845061046a65cc55ae0d6bb195db
SHA512acd63175d4efe4639e2c86fa8b5421061742ce1e4a0855db57eda9fd27f151ee91c5990e7a9bdb5f40f61611639b59890bd24a53be67c66aa410e2f02b7dad75
-
Filesize
123KB
MD500bcb651986596635f856adc940c0976
SHA1e8c988f407a137881bf0d91497fa2e906f1e9fcc
SHA2562a5e4535459c52f9da762ebdc0aaa87c38428c77c0d3d319e4194b287d3020d7
SHA5122ba80a5992d8e6362fb4db18ac8216005e1be44f8f099d5225bbf18fe2d33d887adc5b4ae8dc32a0ee726193d9ab5cc2d284f068e51257ca7a3874acd384dc63