Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
0s -
max time network
7s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
05/01/2024, 15:00
Static task
static1
Behavioral task
behavioral1
Sample
f0886965890b320b291a2147b085bff4.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
f0886965890b320b291a2147b085bff4.exe
Resource
win10v2004-20231215-en
General
-
Target
f0886965890b320b291a2147b085bff4.exe
-
Size
96KB
-
MD5
f0886965890b320b291a2147b085bff4
-
SHA1
89bf747ff65640ddb55a59b80f1a29083caffa16
-
SHA256
23316c3c06e9701a0999a918c5bba97d8a0ecc210af758442c2a5e100f9e472c
-
SHA512
d59dc361f90998b60986be56e2ea53aafb9440c06adb68cb8d0d2e3f8db8ec6e00ece57a99731d43499af04f5dacfcbd0b07ed218ab6d2c7013357eb6fa67974
-
SSDEEP
1536:LSnK68QNo2VqCXfV2kuMFWH7N78CEGgZ1ap9TFyRQ+ER5R45WtqV9R2R462izMgG:LSvfo2VhXfIB8Ln1avTFye+EHrtG9MWX
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 20 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad f0886965890b320b291a2147b085bff4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Kpepcedo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Kipabjil.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kcifkp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Kcifkp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Kmjqmi32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kphmie32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" f0886965890b320b291a2147b085bff4.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kilhgk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Kilhgk32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kpepcedo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Kgphpo32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kmjqmi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Kgbefoji.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kpjjod32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Kpjjod32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kgphpo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Kphmie32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kgbefoji.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kipabjil.exe -
Executes dropped EXE 10 IoCs
pid Process 4284 Kilhgk32.exe 4064 Kpepcedo.exe 2848 Kgphpo32.exe 3140 Kmjqmi32.exe 2408 Kphmie32.exe 664 Kgbefoji.exe 2524 Kipabjil.exe 2076 Kpjjod32.exe 3940 Kcifkp32.exe 4896 Kibnhjgj.exe -
Drops file in System32 directory 30 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Kpjjod32.exe Kipabjil.exe File created C:\Windows\SysWOW64\Kpepcedo.exe Kilhgk32.exe File created C:\Windows\SysWOW64\Kmjqmi32.exe Kgphpo32.exe File opened for modification C:\Windows\SysWOW64\Kphmie32.exe Kmjqmi32.exe File created C:\Windows\SysWOW64\Mkeebhjc.dll Kmjqmi32.exe File created C:\Windows\SysWOW64\Kgbefoji.exe Kphmie32.exe File created C:\Windows\SysWOW64\Milgab32.dll Kphmie32.exe File created C:\Windows\SysWOW64\Ldobbkdk.dll Kilhgk32.exe File created C:\Windows\SysWOW64\Kgphpo32.exe Kpepcedo.exe File created C:\Windows\SysWOW64\Ghiqbiae.dll Kpjjod32.exe File created C:\Windows\SysWOW64\Kibnhjgj.exe Kcifkp32.exe File created C:\Windows\SysWOW64\Kphmie32.exe Kmjqmi32.exe File created C:\Windows\SysWOW64\Joamagmq.dll Kipabjil.exe File opened for modification C:\Windows\SysWOW64\Kcifkp32.exe Kpjjod32.exe File opened for modification C:\Windows\SysWOW64\Kibnhjgj.exe Kcifkp32.exe File created C:\Windows\SysWOW64\Bpcbnd32.dll Kcifkp32.exe File created C:\Windows\SysWOW64\Kilhgk32.exe f0886965890b320b291a2147b085bff4.exe File created C:\Windows\SysWOW64\Nqjfoc32.dll Kpepcedo.exe File opened for modification C:\Windows\SysWOW64\Kmjqmi32.exe Kgphpo32.exe File created C:\Windows\SysWOW64\Kipabjil.exe Kgbefoji.exe File created C:\Windows\SysWOW64\Kbmfdgkm.dll Kgbefoji.exe File created C:\Windows\SysWOW64\Kpjjod32.exe Kipabjil.exe File created C:\Windows\SysWOW64\Ajgblndm.dll Kgphpo32.exe File opened for modification C:\Windows\SysWOW64\Kgbefoji.exe Kphmie32.exe File opened for modification C:\Windows\SysWOW64\Kipabjil.exe Kgbefoji.exe File opened for modification C:\Windows\SysWOW64\Kilhgk32.exe f0886965890b320b291a2147b085bff4.exe File opened for modification C:\Windows\SysWOW64\Kgphpo32.exe Kpepcedo.exe File created C:\Windows\SysWOW64\Kkdeek32.dll f0886965890b320b291a2147b085bff4.exe File opened for modification C:\Windows\SysWOW64\Kpepcedo.exe Kilhgk32.exe File created C:\Windows\SysWOW64\Kcifkp32.exe Kpjjod32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 5328 5220 WerFault.exe 39 -
Modifies registry class 33 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Kgbefoji.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nqjfoc32.dll" Kpepcedo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Kphmie32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Kphmie32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Milgab32.dll" Kphmie32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ghiqbiae.dll" Kpjjod32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 f0886965890b320b291a2147b085bff4.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node f0886965890b320b291a2147b085bff4.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Kpepcedo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Kmjqmi32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Kpjjod32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Kpepcedo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Kgphpo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Kilhgk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Kgbefoji.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID f0886965890b320b291a2147b085bff4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kkdeek32.dll" f0886965890b320b291a2147b085bff4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Kipabjil.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Kpjjod32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bpcbnd32.dll" Kcifkp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mkeebhjc.dll" Kmjqmi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Kmjqmi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ldobbkdk.dll" Kilhgk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Kilhgk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ajgblndm.dll" Kgphpo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Kipabjil.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Joamagmq.dll" Kipabjil.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Kcifkp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831} f0886965890b320b291a2147b085bff4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" f0886965890b320b291a2147b085bff4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Kcifkp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Kgphpo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kbmfdgkm.dll" Kgbefoji.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 1004 wrote to memory of 4284 1004 f0886965890b320b291a2147b085bff4.exe 77 PID 1004 wrote to memory of 4284 1004 f0886965890b320b291a2147b085bff4.exe 77 PID 1004 wrote to memory of 4284 1004 f0886965890b320b291a2147b085bff4.exe 77 PID 4284 wrote to memory of 4064 4284 Kilhgk32.exe 76 PID 4284 wrote to memory of 4064 4284 Kilhgk32.exe 76 PID 4284 wrote to memory of 4064 4284 Kilhgk32.exe 76 PID 4064 wrote to memory of 2848 4064 Kpepcedo.exe 75 PID 4064 wrote to memory of 2848 4064 Kpepcedo.exe 75 PID 4064 wrote to memory of 2848 4064 Kpepcedo.exe 75 PID 2848 wrote to memory of 3140 2848 Kgphpo32.exe 74 PID 2848 wrote to memory of 3140 2848 Kgphpo32.exe 74 PID 2848 wrote to memory of 3140 2848 Kgphpo32.exe 74 PID 3140 wrote to memory of 2408 3140 Kmjqmi32.exe 72 PID 3140 wrote to memory of 2408 3140 Kmjqmi32.exe 72 PID 3140 wrote to memory of 2408 3140 Kmjqmi32.exe 72 PID 2408 wrote to memory of 664 2408 Kphmie32.exe 70 PID 2408 wrote to memory of 664 2408 Kphmie32.exe 70 PID 2408 wrote to memory of 664 2408 Kphmie32.exe 70 PID 664 wrote to memory of 2524 664 Kgbefoji.exe 69 PID 664 wrote to memory of 2524 664 Kgbefoji.exe 69 PID 664 wrote to memory of 2524 664 Kgbefoji.exe 69 PID 2524 wrote to memory of 2076 2524 Kipabjil.exe 68 PID 2524 wrote to memory of 2076 2524 Kipabjil.exe 68 PID 2524 wrote to memory of 2076 2524 Kipabjil.exe 68 PID 2076 wrote to memory of 3940 2076 Kpjjod32.exe 66 PID 2076 wrote to memory of 3940 2076 Kpjjod32.exe 66 PID 2076 wrote to memory of 3940 2076 Kpjjod32.exe 66 PID 3940 wrote to memory of 4896 3940 Kcifkp32.exe 64 PID 3940 wrote to memory of 4896 3940 Kcifkp32.exe 64 PID 3940 wrote to memory of 4896 3940 Kcifkp32.exe 64
Processes
-
C:\Users\Admin\AppData\Local\Temp\f0886965890b320b291a2147b085bff4.exe"C:\Users\Admin\AppData\Local\Temp\f0886965890b320b291a2147b085bff4.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1004 -
C:\Windows\SysWOW64\Kilhgk32.exeC:\Windows\system32\Kilhgk32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4284
-
-
C:\Windows\SysWOW64\Lgneampk.exeC:\Windows\system32\Lgneampk.exe1⤵PID:2564
-
C:\Windows\SysWOW64\Lnhmng32.exeC:\Windows\system32\Lnhmng32.exe2⤵PID:4764
-
C:\Windows\SysWOW64\Lpfijcfl.exeC:\Windows\system32\Lpfijcfl.exe3⤵PID:3104
-
C:\Windows\SysWOW64\Lgpagm32.exeC:\Windows\system32\Lgpagm32.exe4⤵PID:4016
-
C:\Windows\SysWOW64\Laefdf32.exeC:\Windows\system32\Laefdf32.exe5⤵PID:4796
-
-
-
-
-
C:\Windows\SysWOW64\Mpkbebbf.exeC:\Windows\system32\Mpkbebbf.exe1⤵PID:2556
-
C:\Windows\SysWOW64\Mciobn32.exeC:\Windows\system32\Mciobn32.exe2⤵PID:3236
-
C:\Windows\SysWOW64\Mnocof32.exeC:\Windows\system32\Mnocof32.exe3⤵PID:932
-
C:\Windows\SysWOW64\Mpmokb32.exeC:\Windows\system32\Mpmokb32.exe4⤵PID:5108
-
-
-
-
C:\Windows\SysWOW64\Mpolqa32.exeC:\Windows\system32\Mpolqa32.exe1⤵PID:2384
-
C:\Windows\SysWOW64\Mkepnjng.exeC:\Windows\system32\Mkepnjng.exe2⤵PID:2576
-
C:\Windows\SysWOW64\Mncmjfmk.exeC:\Windows\system32\Mncmjfmk.exe3⤵PID:4608
-
C:\Windows\SysWOW64\Mdmegp32.exeC:\Windows\system32\Mdmegp32.exe4⤵PID:2824
-
C:\Windows\SysWOW64\Mkgmcjld.exeC:\Windows\system32\Mkgmcjld.exe5⤵PID:3648
-
C:\Windows\SysWOW64\Mpdelajl.exeC:\Windows\system32\Mpdelajl.exe6⤵PID:3556
-
C:\Windows\SysWOW64\Nkjjij32.exeC:\Windows\system32\Nkjjij32.exe7⤵PID:3784
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Nacbfdao.exeC:\Windows\system32\Nacbfdao.exe1⤵PID:2380
-
C:\Windows\SysWOW64\Nceonl32.exeC:\Windows\system32\Nceonl32.exe2⤵PID:1448
-
C:\Windows\SysWOW64\Njogjfoj.exeC:\Windows\system32\Njogjfoj.exe3⤵PID:4056
-
-
-
C:\Windows\SysWOW64\Nafokcol.exeC:\Windows\system32\Nafokcol.exe1⤵PID:4252
-
C:\Windows\SysWOW64\Ngcgcjnc.exeC:\Windows\system32\Ngcgcjnc.exe2⤵PID:532
-
C:\Windows\SysWOW64\Nbhkac32.exeC:\Windows\system32\Nbhkac32.exe3⤵PID:2212
-
C:\Windows\SysWOW64\Nkqpjidj.exeC:\Windows\system32\Nkqpjidj.exe4⤵PID:4428
-
-
-
-
C:\Windows\SysWOW64\Nnolfdcn.exeC:\Windows\system32\Nnolfdcn.exe1⤵PID:5140
-
C:\Windows\SysWOW64\Nqmhbpba.exeC:\Windows\system32\Nqmhbpba.exe2⤵PID:5180
-
C:\Windows\SysWOW64\Nkcmohbg.exeC:\Windows\system32\Nkcmohbg.exe3⤵PID:5220
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5220 -s 4324⤵
- Program crash
PID:5328
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 5220 -ip 52201⤵PID:5292
-
C:\Windows\SysWOW64\Mjeddggd.exeC:\Windows\system32\Mjeddggd.exe1⤵PID:4988
-
C:\Windows\SysWOW64\Mgghhlhq.exeC:\Windows\system32\Mgghhlhq.exe1⤵PID:3776
-
C:\Windows\SysWOW64\Mjqjih32.exeC:\Windows\system32\Mjqjih32.exe1⤵PID:2908
-
C:\Windows\SysWOW64\Lcgblncm.exeC:\Windows\system32\Lcgblncm.exe1⤵PID:4092
-
C:\Windows\SysWOW64\Lpcmec32.exeC:\Windows\system32\Lpcmec32.exe1⤵PID:716
-
C:\Windows\SysWOW64\Lijdhiaa.exeC:\Windows\system32\Lijdhiaa.exe1⤵PID:1952
-
C:\Windows\SysWOW64\Lcpllo32.exeC:\Windows\system32\Lcpllo32.exe1⤵PID:3352
-
C:\Windows\SysWOW64\Lpappc32.exeC:\Windows\system32\Lpappc32.exe1⤵PID:464
-
C:\Windows\SysWOW64\Lmccchkn.exeC:\Windows\system32\Lmccchkn.exe1⤵PID:1984
-
C:\Windows\SysWOW64\Lcmofolg.exeC:\Windows\system32\Lcmofolg.exe1⤵PID:772
-
C:\Windows\SysWOW64\Lpocjdld.exeC:\Windows\system32\Lpocjdld.exe1⤵PID:4032
-
C:\Windows\SysWOW64\Kkbkamnl.exeC:\Windows\system32\Kkbkamnl.exe1⤵PID:452
-
C:\Windows\SysWOW64\Kgfoan32.exeC:\Windows\system32\Kgfoan32.exe1⤵PID:3836
-
C:\Windows\SysWOW64\Kpmfddnf.exeC:\Windows\system32\Kpmfddnf.exe1⤵PID:4384
-
C:\Windows\SysWOW64\Kibnhjgj.exeC:\Windows\system32\Kibnhjgj.exe1⤵
- Executes dropped EXE
PID:4896
-
C:\Windows\SysWOW64\Kcifkp32.exeC:\Windows\system32\Kcifkp32.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3940
-
C:\Windows\SysWOW64\Kpjjod32.exeC:\Windows\system32\Kpjjod32.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2076
-
C:\Windows\SysWOW64\Kipabjil.exeC:\Windows\system32\Kipabjil.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2524
-
C:\Windows\SysWOW64\Kgbefoji.exeC:\Windows\system32\Kgbefoji.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:664
-
C:\Windows\SysWOW64\Kphmie32.exeC:\Windows\system32\Kphmie32.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2408
-
C:\Windows\SysWOW64\Kmjqmi32.exeC:\Windows\system32\Kmjqmi32.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3140
-
C:\Windows\SysWOW64\Kgphpo32.exeC:\Windows\system32\Kgphpo32.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2848
-
C:\Windows\SysWOW64\Kpepcedo.exeC:\Windows\system32\Kpepcedo.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4064
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD54621bbc76581d5b8d86649f24b7fdd89
SHA142c33b3aa0489b53513dd0097f135508944fdda8
SHA2568c03bab0a31cae1f3041afa49eb5a487da6f832e939b5cf198a8edf8f9ac8dd7
SHA512bb825ad37ab5dd3da36c4a138e61cf202fd70188bf4c10996d1fd74632147c093391d2a116ae779c241236ae295350730de432882f33df0b792d0fc1c0053b9b
-
Filesize
96KB
MD542bf15be93409755b96b3cea11e4155f
SHA10701b80db4086e47d2c8e55015fdc4428fb43160
SHA256885528ad2dddb5c6d890919f3ff5a72c2a43860ad30160c05c4fc8b6253a1204
SHA5126d52bfb3cb73a965c7e3345ac21e625ff2e2d806e831f45d79e3cf96c269f2340eb400952e6d211eea822c756fd4b15530b9eeb7e82219282f182e39a56c6108
-
Filesize
96KB
MD50dd2ad32d3090409d57745531a30d9f9
SHA1e9283b9e4e091fc24df1753118fbfce06f21993f
SHA25619e82f84704f0b5b8906c2ca5465020555481e683197fe7c851fae0a408694de
SHA512479336e299f4d62b4c51bd9fbf1ff45c6da8cc47796a31f57b4d3dc6c76a9ab82b03f13fb675eeac11bbc33ac3214108d3149a4587f6fa82392e6fa35784fd38
-
Filesize
96KB
MD5c7517f7b06fdb6db088c5a291e0677eb
SHA112fa6aeaeaebe35fdff0fadfe0d184c93a3691ff
SHA2567f0c40d48f446dae6f6a9c93359e6e43105dc8153a481ae021927c6630149dd6
SHA5129e2d44f3ed49b141fbf0bd52297d6e5cc910515deb379de2c02015f3503adec536b4600af52bb2859c590e7f66ff9938f45674bb8654ad2220d122ddcbada310
-
Filesize
96KB
MD5d13e6f993ead4101c003aa53d7cb7a41
SHA1e04099ae9a885b39e37daa844e4750cde3a26a80
SHA256d818d29d6985c745f9e72ca992d9b9cb30651ea47a6a338804b109d9e2e13031
SHA51284a131b6c3776c1e6ae3eb2e46b3ad262016f3ea4ebc03f2cd0519c7e793e428c6557100b73d5e62a9c5e3c998111b35a2153f9332e084c74de1ca534c4a3612
-
Filesize
96KB
MD5d01506303a6578a318dcd41871c0f56d
SHA128067178efd9b420332bf45ec9a9ebf362967994
SHA256c60df698ab1ee1fa9454995b5c64c7c2833a5a39eb76f2ad4a841284b7c506dd
SHA51215e52ec2a857b1d55c2a8d12ead69c59d9b239cae2e2585a1c7b55d32837593ee1f2fd5a9a1e002b36f39d8e31aa2c347e8a6f2bed41baa4bcf9f22884176f58
-
Filesize
92KB
MD56a21b16473f7a023e1dc46211b3ff6f3
SHA1deab997deec14c617359bd712b35b3097ff45b28
SHA2562cf59b17427191405baec02949ad2de59bbcef6c042ff75568a3fbed14cd71db
SHA5124aeb03c765db1d1f34d8d98efa507e7e705a0a3ffcb5c136a08b1813e5034a39d0a09c18214868693b50dc80fe24c30161395389467a19c61a191a4597112ad3
-
Filesize
96KB
MD53e8fb32426dc2c015627e1be6af808ff
SHA1b29be76899bd698a06f20ac70c99d426258b1da9
SHA256b19a49d8a2eb189c26afb2a674fa862467e000cf5e053f33405838f1fc4730bc
SHA512c695126281cf72fc2bcffd3063e4af9ed53e5d68647bab3e21337a6b2a5e8464b17e284f0a13783cdc610b6171f468d10f6a3381ed400f4db745b888b6af7c63
-
Filesize
96KB
MD56867b60825994285df5d8b506511658e
SHA190a8ca960b9e71485a71e6a94eb913d3be722c4b
SHA2561a08087e721571a857762324e4251fdefd00122806a02ee67f127e8c1ae3d3d1
SHA51270916ccc894091e7dd465b0dc2237db29bae898507399f2b8ac8231db4f32cb35991e417c134e084f0691257acd5169a4bfbba5c7963e46d7406f0403c8ca8b3
-
Filesize
96KB
MD52f34273082b3ec24b0a5942e3c54d1e9
SHA15adddce91cfce6b1706c88883c89962f04c4ed54
SHA256b2c741646400980b005574ba3e3e2a9b9b2561f21c110aacdad19219d19bf4eb
SHA51219dc710db24a502ebee5f507a78c0346ce3c4a7d57aa68ffed3635ed7aebafe2d9d8c3e8ad91666870ad307efbff99c76d9546ac29342f24815ad80db98bb970
-
Filesize
96KB
MD5700fa20f03efef90eb4a7a83b23acce6
SHA1a82c1294530804c5593e65bbb60f83f58ca772af
SHA256260f04f31e0e8b39f8939782df3b88669c76b99f03c5d8961b3512b16b5630d0
SHA512b4c3d3d2adcfbca1bb2a16c47ea70f26abc7ce1ec2cb78b19991723a192c2f95af5604fd2a4d8396b55f7be6169edfa2923f242d12b95b82951f36681b816577
-
Filesize
96KB
MD5111e16fc6fc2c5c326482660d736e346
SHA12ed4854ac37d54d7c96a5d8a232469d33b9f5e50
SHA256648a22cb46fd8200bde205fbdb6d502952444577d9ceaaded1ae1eee1da94ac3
SHA5121f4e9d9a191c22c17411ec8d4688a6c573838b078bbec70b4ee16362bc13f508d7d7241c27437795778f31fbb82157fdbc6235f8906bc821e1b1daee2e3ed5a5
-
Filesize
96KB
MD57fe53e882cbcbefac4c79240a1c6e1f6
SHA16190202458b6da78aea31b9eeb991977586e37d3
SHA25614b1af5a38ab0dcc81f11d3a25e3a1e5327550e597eb748ccde8dafe5435c323
SHA512d0ff8e306f2d3fcc775e3b56c02481846e878678dd902177a710bf03f5d98fed3095fb24550a81f5a8b0b7dd873f9391694bbbc6d9c9fafce79c7884bca134ac
-
Filesize
96KB
MD5828c40d60fd43537a2361f40b0f2bb23
SHA12e571535b8ca3e326cfb2133891d11c606303a2d
SHA256bcde0de6305b649274168afb1019a5023df8e6ef14c919e75dd5ad526ccff90b
SHA512793953daef261283e3e07d9f403a3bb4d564b623f36b97a96d4427905e8853160d62b66e48ca96d85fa7f4561c6d56be63e7485b2caa77d5bee1094f067d50ac
-
Filesize
92KB
MD57a2f68d87e4517735f9a6512d9b4d6c0
SHA153562c207f6c0ad230a5f95f60bc1fa8677ceb19
SHA2560c9c766b5143c89f3f7a06ab58cb95aca19750a4789d4573dd777ed441fdf785
SHA51253bbae0ad2df93fa88fabe806548626daffcc9942ee87d6c64e55cb3797bf52fd486bbb5f9bf7b72f3cbc91932aa26c9e26ee91d88fc05c04aa539ee024bb253
-
Filesize
96KB
MD5b723b5873fcaecb64f65c95416d3a12c
SHA1cf6c82ebe8fbd70941dbfcdde5adcd338ef8514e
SHA256df8f0e681618c1dc6849a874781a0c4096fb0178965f66f420ff120a9bb4cb0e
SHA512bad4ce52023847cd7377e76f1b2eb4d3d97961636de4b09ca89cbb966eb8cf96ca2e15cc947ab15aab26afb811e4f6fc3e121cac8188af77e6e0f79cbb280d2b
-
Filesize
96KB
MD5bfee87a4bcae8388b391473d56d94caf
SHA11141ae399f30470ceffe85026c160edf7b550460
SHA25633b9c5567561079f73829dc253509b12280044823bd03e044197c670e15326d0
SHA5129f1b079073c69936b0f1cb62fb80fc161beb734271778c9f2b5f583feae6afebd48c38b3c0d5a78b6c5525d3836059c6d2ae8b0ade60637c14c5c512ef23e2c9
-
Filesize
96KB
MD5378b75c1f631baabf9d4d34d0dc3b47a
SHA1911b23a27c9a72cfc5bf5ce59a84dc73f0905c10
SHA2564b4a334d65eec8f536bf0735ba724024647aee0a69231c2418fef9c004a775b9
SHA51210ece6b2a16bd72eafb11717f8874bf7d5c7d431eb6e646caa25dead0af7290a2139bba1ea5732686fb89eb4da5e77fb0e8918d600f469794033f24ec7d9c5d7
-
Filesize
96KB
MD594e6bce485a4324d37988aafe3960947
SHA18226ee51eded88aaae40904344323704ca8325d9
SHA2568535f407f720fac78d9a6b0a9ee2cdc7867283d334cdaf532c1b2de4d77dc0b8
SHA512234a71590b27b39204907a86d2a51f0afa5aa7969379e7f0e7f344f7f0be3f50f96228559a1582ac5ec8a14bab2b0570d3a3bd6167d0edcb7c851f2d74bb38aa
-
Filesize
96KB
MD5a22f986cdcf6d738db0285adfd33915e
SHA11dba7bc792872dc828c2fe8c37940a6dbd271a34
SHA2563490f5e4649dcda93686347152fb48f9dec36637b4ea822b5f8e12cc1d6a71b5
SHA51213983ddc14d61bd660ac6166d6b7eac84d07ce2680f5ae1c1a3b28c165b6d78bbe0a541d6f5012330c5771d6b91127ba83e261d3c39633dc3e071dfb794998cb
-
Filesize
96KB
MD56fe31854a0ed9632885be5da3eef55dd
SHA1501588ee769828342b956ce6d7ebcf77eb4dbabe
SHA2561687e7cb68ded818e1c3f2ceaabf37f2f37f72f9fb240da13c5500c9d63e160c
SHA512e9036a1bbdcedb3f2d508628cab83e643fa196fbd24684a40a43b3909ff3757760db5f26e765c2c9dceb9dc6d1f248d07e84fd33025b0b9e8fab7aa9c728c008
-
Filesize
96KB
MD53b91916bdc045ac1d3a7c6b85c977785
SHA1f04c294b509511009c8586d1aa681f65531fac02
SHA2562fb836a68c7a59271d42b5d0aef1876066520ad43bfa6889101cad2963cd55f7
SHA512ac18db4d43e214756eb5174ba19aced24e0d5878cc8f5689fc469df63e8e5192097ad033ebdd132a3ff358efde4e36287e0017b41368e4836458d7520e4dbce8
-
Filesize
96KB
MD50bbcd73ccf5549d1ece4054178be7334
SHA18b85feb9cb907e3f7180ba825847908cd996c5f8
SHA2569847836d617825a0bb828556311450cce48905a87c3ef681ccd76e830f6ebef3
SHA5122b59c439e57807a0376fde8284f71bc216a6384a7f24c381fd92b8abb4d46419bf12b8844578f7b98e27a80c551776810d732ce82eedcb3f1f0508ed131f128d
-
Filesize
96KB
MD56c5ad3a7d07229a8eac0fe692e3fbdca
SHA1ac83e78ea2ade1747fabc80718e1fc190b09e490
SHA25642c745c8295e278f0123fda2483ef8a674790adfa6054f8f97ec1dfb848c8310
SHA51283577ea61736b28b674390a2f3e624e6f538bbddae32a94d45bb5ed14dda24f74dce81cd9fc030f216d6a49ac9a7c2b307367dcc61267bd3872d4276e4caef84
-
Filesize
96KB
MD525248b7292ab40f4b60772b164bea5d3
SHA13f7298f042638e759093a9ec0b665e5157b4d212
SHA256afa8c06d689cb3c58b90fb4c37cd1bce944e542c3663de58415d2e1a97dced37
SHA51295ad83f62320175581cb9f864586c9ff0b9e6b90f3f46f0f11e066b50e0bc90c1c502526429f5611ea57f6b16a9d2091052e1c3bd5df5a2abfeb63bc2ef844bf
-
Filesize
96KB
MD50864694ff79165b27b4c9e8b62143e98
SHA1e07b44e1ad8556697429b18d59c40d696b77adc1
SHA256e6833fec5c3f43aa5bac23fd49550c134b9a5a9d081f560824b04962b2042723
SHA5125e5cff8fabf43f54ce64d85d96a27011dde7ca77d5713a990cea2523042f57b985bda951b80b83762ae0b5b2342e6c291596c5a3e2756bb240e749e779b5fb56
-
Filesize
96KB
MD51b785d31026629d9743569e01adf51c1
SHA19b95fe1045983718da4bcba777ab30ec0085ca71
SHA256d1c3a64207a63af99a7815883a13dc033dd99af5de83483ed8faaa7664d8612a
SHA5122a419dcb3127f11fc71c8dc0c2046e7540200afc10ead02353061d83e7b18f1b6d528858a30a1f06f09a0d6cc3c68c8d1772cf87e6591140e7de895d82568e00
-
Filesize
96KB
MD5c5f6c5047f13204d829c86ab6d5cfdab
SHA18404235a475a70a08f1b30ab70f12ae625c340ca
SHA25695b0b27ce8550a37686c2cfc4fa085eac23658a33ed551eec78116a8b1d51abf
SHA512cd24221385769425f740859b56741b12c4afada7ee06295ab98d99d4a8fc4b74445519d8208b702a1924f20e57627a6e438c31836d2dbed74d25803ad0a85956
-
Filesize
96KB
MD5dba6bb9f878764177971d22ecb4a2950
SHA1141dbab325834f883384bb75f71449365d5c8f3e
SHA256f3e86a4a0e929eed0f985d2e1300213ced3d2382b65b375634073d068d22f17f
SHA5121e91f8f1c51f352791d871650a957f518a91a820f23be15ede59967c49cedba207778d6f60eef67dc9ed3ca134228370d0e152db8948a0dd63f50a8e55c0db85
-
Filesize
96KB
MD593d75d94a0efdf12ceee368526013ebe
SHA1305e26e9c4ba274974659f05d67d9404f096800d
SHA2567c0bb5ff31ed130f8016dfdb0286f543b08325260cf567cc37bc91572dfa2585
SHA5126d9def2e80fd36ab8eba5bbbbafc0c1fa7eeb073e1d8cb6b952b0d608c2991436af32130b4f344fa3d0058f713bee3f4cedebf9fbe3bb87cef8bff39170bb411
-
Filesize
96KB
MD5c29624a5caaeeb40bcc2479c2bb45c9c
SHA197d693494d5e11ff679b9dcffe52c35f987f621e
SHA256c859b85f76a05c9f8b6df84e4a630cd2755117f439ba7a034a2d713ce41e6ac6
SHA512928aec40d49ac1b72fcca902ad6a40285d0798c2f7ec902451be844c0c21d0dbf1a9b88b3c22e29c0d151a4925a99d61c528954e6730017f1ebdeded6c01c2dc
-
Filesize
96KB
MD570f07f5b77dd3ea6da674a8d787093b8
SHA1d3d1796f57fc92795f42038ddf650244b51738aa
SHA256199590016e1dd60d5627afff45ea71d71e73f02fe786dab636c079a2fb535f3f
SHA512bfd89eab752fc3eeb1e35bad8055b5f060b44059b3b6b383ca0895a5ef376cbc3701f74c871889d37039bb79be2df1afc889b91b465ac3764506914d642eecd6
-
Filesize
7KB
MD5d57738f17585e2ac760feb10c586ae3b
SHA1b9a07f880cf3ea465ff838e5e4e64f8eceddd1aa
SHA256f672fbbe5922f092f2240d9a524c21541a0f821218330e1e8c07b983bfac7cb4
SHA5120e94a8e5ca4fe5be887426e50e1b6be6e74c5a51cd50c1aafd473455bef1ce429a3779796ff7244ef00fe53d236f5d500725a50440c26d3aa17d4f61ee0615a6
-
Filesize
96KB
MD54f39db00113ae82167eac163154c0a78
SHA1ec200ece7dc25216532fbb91e601ae61f6763746
SHA2563210fe8269286493a35e1b1efaf112eae7341fcdca84dc4407394809219d43e2
SHA512efbffcbe4794f88893f3184353e0a27fb89cdf2d7b9cf956a05f8679af1a0e48d6b8cf98dd1574f83f53f7cb79f472a688633f8e742fd9082666882d4d98af43
-
Filesize
96KB
MD5026368a6006247d00df862ec11680bba
SHA1eed92383c4d547a7ee85b8127c12af362859abb3
SHA2565b9e8796bd3498f43d960166d7d55024bd6ce9f8191a787e3faf0c83b44d7e50
SHA512ffa4258fea43752894be6af5be5ebf002e7c831cc76b35442f50ef6f75b997d019bdde801cd0331cd9355ab5749ef030f5e8d2dc11362c2b9a24d6e2bf005d3e
-
Filesize
96KB
MD5b066d4c7ae3628c8d8c483b76ae42e77
SHA1ea06d0f67e76ac58458e03c88689236144362bde
SHA2562f367cde4f7704d888bbede6f6eebd4e27f48bc86dab4c29e40ad8690e0293db
SHA512e5715a66aa403ef6befadff85e6faf569630a1a0eb9073e6d2b85598111e8a825e8a9bd766ebefb8976e2eb49fe8e0bbf849ae8bbd97a70d50eeb098914867ce
-
Filesize
96KB
MD5a31f6a165a2b5fe5d76b1cec47dccc9f
SHA187ee194a8f51e8d679f8926171d427d5ce1b8644
SHA2562979dfe5f9490b6e9435f0887b2cf4bad160f849fd2825dfe20d7e9187923775
SHA512fc2e7ff42716c4e8af7cf4f4dd1aa3e43d0202bd49b9d5c570e94eb5776d1547e8d882f0e0f861139d8ab394191ff762176e1d065350641278b06d75d851844b
-
Filesize
96KB
MD5e41b0f84ad0b5ea3cea6961f9b68b793
SHA138ba70b9bba4aa457e02b1053328e5e769ca1bc3
SHA256cdc4b2bb08022ac322ceab6dde28c3e31e140c6f5be7648d787e1cd3e1b1812e
SHA512f6c1b297231e79b13ea78b91dcc2a79ff66a784163ef8f095d5f0cb70c782cb4a3b7dbd82b0339d834d2630d354aa2e90bae68019122e683718daec61c06c9a6
-
Filesize
96KB
MD580e6b3c142596c638f410ae18d43214a
SHA1b8e69290c8b38bbc7c9a5c3ced75f9aaa031323a
SHA25630fea3a090df53a889c1d764e61a9605db228eed75c5c409cf995efbd9ebbf2a
SHA51216da865dd95ddfef94b808c8a15b5ff33776e9ba529c61b985eec576c52552cb7241ee6a073aba1d75de31cec39e642bcaf02f47022cc3ac6a3a1e549ff83419