Analysis
-
max time kernel
0s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
06/01/2024, 20:52
Static task
static1
Behavioral task
behavioral1
Sample
97eddca5c89a08bc05fcabc958049a3c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
97eddca5c89a08bc05fcabc958049a3c.exe
Resource
win10v2004-20231222-en
General
-
Target
97eddca5c89a08bc05fcabc958049a3c.exe
-
Size
80KB
-
MD5
97eddca5c89a08bc05fcabc958049a3c
-
SHA1
750e9d4cfe68ad0154b6ca9036b529490a6b7fe8
-
SHA256
3a054c6a028af225e343de110246b9422def6225694d56d29fa7353307bf083c
-
SHA512
47fb1b9207798a186f1c261177536ee03467774048a30f29dc97c11ce5a2138deb73c6086e74094b0ecd1f0a66e852a231a66ec2b540487e461cf0808524fcc0
-
SSDEEP
1536:QCrmhPNHX8mWT4kvlMrzeHSzMPPI5YMkhohBE8VGh:1CRWFlMXKS6PUUAEQGh
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 22 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kmegbjgn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kacphh32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jfkoeppq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jangmibi.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jdmcidam.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kbapjafe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kilhgk32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 97eddca5c89a08bc05fcabc958049a3c.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jigollag.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jangmibi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jdmcidam.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kacphh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" 97eddca5c89a08bc05fcabc958049a3c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jbmfoa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jigollag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jfkoeppq.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kmegbjgn.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kpccnefa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kpccnefa.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kbapjafe.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jbmfoa32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kilhgk32.exe -
Executes dropped EXE 11 IoCs
pid Process 512 Jbmfoa32.exe 5072 Jigollag.exe 2876 Jangmibi.exe 4196 Jdmcidam.exe 4540 Jfkoeppq.exe 1592 Kmegbjgn.exe 2816 Kpccnefa.exe 4624 Kbapjafe.exe 4108 Kilhgk32.exe 1396 Kacphh32.exe 2144 Kdaldd32.exe -
Drops file in System32 directory 33 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Kpccnefa.exe Kmegbjgn.exe File created C:\Windows\SysWOW64\Nphqml32.dll Kmegbjgn.exe File created C:\Windows\SysWOW64\Kdaldd32.exe Kacphh32.exe File opened for modification C:\Windows\SysWOW64\Jbmfoa32.exe 97eddca5c89a08bc05fcabc958049a3c.exe File created C:\Windows\SysWOW64\Kbapjafe.exe Kpccnefa.exe File created C:\Windows\SysWOW64\Lmmcfa32.dll Kpccnefa.exe File created C:\Windows\SysWOW64\Kkdeek32.dll Kbapjafe.exe File created C:\Windows\SysWOW64\Jeiooj32.dll 97eddca5c89a08bc05fcabc958049a3c.exe File created C:\Windows\SysWOW64\Jfkoeppq.exe Jdmcidam.exe File created C:\Windows\SysWOW64\Kacphh32.exe Kilhgk32.exe File opened for modification C:\Windows\SysWOW64\Kilhgk32.exe Kbapjafe.exe File opened for modification C:\Windows\SysWOW64\Kdaldd32.exe Kacphh32.exe File opened for modification C:\Windows\SysWOW64\Jangmibi.exe Jigollag.exe File created C:\Windows\SysWOW64\Jdmcidam.exe Jangmibi.exe File created C:\Windows\SysWOW64\Ecppdbpl.dll Jangmibi.exe File created C:\Windows\SysWOW64\Kmegbjgn.exe Jfkoeppq.exe File opened for modification C:\Windows\SysWOW64\Jdmcidam.exe Jangmibi.exe File opened for modification C:\Windows\SysWOW64\Jfkoeppq.exe Jdmcidam.exe File created C:\Windows\SysWOW64\Kilhgk32.exe Kbapjafe.exe File created C:\Windows\SysWOW64\Ggpfjejo.dll Jbmfoa32.exe File created C:\Windows\SysWOW64\Jangmibi.exe Jigollag.exe File created C:\Windows\SysWOW64\Mfpoqooh.dll Jdmcidam.exe File opened for modification C:\Windows\SysWOW64\Kacphh32.exe Kilhgk32.exe File opened for modification C:\Windows\SysWOW64\Kbapjafe.exe Kpccnefa.exe File created C:\Windows\SysWOW64\Jbmfoa32.exe 97eddca5c89a08bc05fcabc958049a3c.exe File created C:\Windows\SysWOW64\Lppaheqp.dll Jigollag.exe File created C:\Windows\SysWOW64\Iljnde32.dll Jfkoeppq.exe File created C:\Windows\SysWOW64\Kpccnefa.exe Kmegbjgn.exe File created C:\Windows\SysWOW64\Bnckcnhb.dll Kacphh32.exe File created C:\Windows\SysWOW64\Jigollag.exe Jbmfoa32.exe File opened for modification C:\Windows\SysWOW64\Jigollag.exe Jbmfoa32.exe File opened for modification C:\Windows\SysWOW64\Kmegbjgn.exe Jfkoeppq.exe File created C:\Windows\SysWOW64\Jjblgaie.dll Kilhgk32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 5488 5320 WerFault.exe 38 -
Modifies registry class 36 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} 97eddca5c89a08bc05fcabc958049a3c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jangmibi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jangmibi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jfkoeppq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kpccnefa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" 97eddca5c89a08bc05fcabc958049a3c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jigollag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jdmcidam.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 97eddca5c89a08bc05fcabc958049a3c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jbmfoa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ecppdbpl.dll" Jangmibi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jdmcidam.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kilhgk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node 97eddca5c89a08bc05fcabc958049a3c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID 97eddca5c89a08bc05fcabc958049a3c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mfpoqooh.dll" Jdmcidam.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kacphh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jbmfoa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nphqml32.dll" Kmegbjgn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kpccnefa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lmmcfa32.dll" Kpccnefa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kilhgk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bnckcnhb.dll" Kacphh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jeiooj32.dll" 97eddca5c89a08bc05fcabc958049a3c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lppaheqp.dll" Jigollag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jfkoeppq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kmegbjgn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kbapjafe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kkdeek32.dll" Kbapjafe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jjblgaie.dll" Kilhgk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kacphh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ggpfjejo.dll" Jbmfoa32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jigollag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Iljnde32.dll" Jfkoeppq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kmegbjgn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kbapjafe.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 1372 wrote to memory of 512 1372 97eddca5c89a08bc05fcabc958049a3c.exe 108 PID 1372 wrote to memory of 512 1372 97eddca5c89a08bc05fcabc958049a3c.exe 108 PID 1372 wrote to memory of 512 1372 97eddca5c89a08bc05fcabc958049a3c.exe 108 PID 512 wrote to memory of 5072 512 Jbmfoa32.exe 107 PID 512 wrote to memory of 5072 512 Jbmfoa32.exe 107 PID 512 wrote to memory of 5072 512 Jbmfoa32.exe 107 PID 5072 wrote to memory of 2876 5072 Jigollag.exe 106 PID 5072 wrote to memory of 2876 5072 Jigollag.exe 106 PID 5072 wrote to memory of 2876 5072 Jigollag.exe 106 PID 2876 wrote to memory of 4196 2876 Jangmibi.exe 105 PID 2876 wrote to memory of 4196 2876 Jangmibi.exe 105 PID 2876 wrote to memory of 4196 2876 Jangmibi.exe 105 PID 4196 wrote to memory of 4540 4196 Jdmcidam.exe 104 PID 4196 wrote to memory of 4540 4196 Jdmcidam.exe 104 PID 4196 wrote to memory of 4540 4196 Jdmcidam.exe 104 PID 4540 wrote to memory of 1592 4540 Jfkoeppq.exe 103 PID 4540 wrote to memory of 1592 4540 Jfkoeppq.exe 103 PID 4540 wrote to memory of 1592 4540 Jfkoeppq.exe 103 PID 1592 wrote to memory of 2816 1592 Kmegbjgn.exe 102 PID 1592 wrote to memory of 2816 1592 Kmegbjgn.exe 102 PID 1592 wrote to memory of 2816 1592 Kmegbjgn.exe 102 PID 2816 wrote to memory of 4624 2816 Kpccnefa.exe 101 PID 2816 wrote to memory of 4624 2816 Kpccnefa.exe 101 PID 2816 wrote to memory of 4624 2816 Kpccnefa.exe 101 PID 4624 wrote to memory of 4108 4624 Kbapjafe.exe 100 PID 4624 wrote to memory of 4108 4624 Kbapjafe.exe 100 PID 4624 wrote to memory of 4108 4624 Kbapjafe.exe 100 PID 4108 wrote to memory of 1396 4108 Kilhgk32.exe 99 PID 4108 wrote to memory of 1396 4108 Kilhgk32.exe 99 PID 4108 wrote to memory of 1396 4108 Kilhgk32.exe 99 PID 1396 wrote to memory of 2144 1396 Kacphh32.exe 98 PID 1396 wrote to memory of 2144 1396 Kacphh32.exe 98 PID 1396 wrote to memory of 2144 1396 Kacphh32.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\97eddca5c89a08bc05fcabc958049a3c.exe"C:\Users\Admin\AppData\Local\Temp\97eddca5c89a08bc05fcabc958049a3c.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Windows\SysWOW64\Jbmfoa32.exeC:\Windows\system32\Jbmfoa32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:512
-
-
C:\Windows\SysWOW64\Lmccchkn.exeC:\Windows\system32\Lmccchkn.exe1⤵PID:3284
-
C:\Windows\SysWOW64\Lpappc32.exeC:\Windows\system32\Lpappc32.exe2⤵PID:2548
-
-
C:\Windows\SysWOW64\Lpcmec32.exeC:\Windows\system32\Lpcmec32.exe1⤵PID:5000
-
C:\Windows\SysWOW64\Lcbiao32.exeC:\Windows\system32\Lcbiao32.exe2⤵PID:3712
-
-
C:\Windows\SysWOW64\Lpfijcfl.exeC:\Windows\system32\Lpfijcfl.exe1⤵PID:2880
-
C:\Windows\SysWOW64\Ldaeka32.exeC:\Windows\system32\Ldaeka32.exe2⤵PID:3740
-
-
C:\Windows\SysWOW64\Lgpagm32.exeC:\Windows\system32\Lgpagm32.exe1⤵PID:4164
-
C:\Windows\SysWOW64\Lklnhlfb.exeC:\Windows\system32\Lklnhlfb.exe2⤵PID:4368
-
-
C:\Windows\SysWOW64\Lnjjdgee.exeC:\Windows\system32\Lnjjdgee.exe1⤵PID:4692
-
C:\Windows\SysWOW64\Laefdf32.exeC:\Windows\system32\Laefdf32.exe2⤵PID:380
-
-
C:\Windows\SysWOW64\Lddbqa32.exeC:\Windows\system32\Lddbqa32.exe1⤵PID:4500
-
C:\Windows\SysWOW64\Lcgblncm.exeC:\Windows\system32\Lcgblncm.exe2⤵PID:3288
-
-
C:\Windows\SysWOW64\Mnlfigcc.exeC:\Windows\system32\Mnlfigcc.exe1⤵PID:3988
-
C:\Windows\SysWOW64\Mpkbebbf.exeC:\Windows\system32\Mpkbebbf.exe2⤵PID:392
-
-
C:\Windows\SysWOW64\Mciobn32.exeC:\Windows\system32\Mciobn32.exe1⤵PID:2828
-
C:\Windows\SysWOW64\Mgekbljc.exeC:\Windows\system32\Mgekbljc.exe2⤵PID:1332
-
-
C:\Windows\SysWOW64\Mnocof32.exeC:\Windows\system32\Mnocof32.exe1⤵PID:2724
-
C:\Windows\SysWOW64\Majopeii.exeC:\Windows\system32\Majopeii.exe2⤵PID:2428
-
-
C:\Windows\SysWOW64\Mdiklqhm.exeC:\Windows\system32\Mdiklqhm.exe1⤵PID:2184
-
C:\Windows\SysWOW64\Mgghhlhq.exeC:\Windows\system32\Mgghhlhq.exe2⤵PID:2492
-
C:\Windows\SysWOW64\Mjeddggd.exeC:\Windows\system32\Mjeddggd.exe3⤵PID:4376
-
-
-
C:\Windows\SysWOW64\Mcnhmm32.exeC:\Windows\system32\Mcnhmm32.exe1⤵PID:3664
-
C:\Windows\SysWOW64\Mjhqjg32.exeC:\Windows\system32\Mjhqjg32.exe2⤵PID:5028
-
C:\Windows\SysWOW64\Maohkd32.exeC:\Windows\system32\Maohkd32.exe3⤵PID:1776
-
-
-
C:\Windows\SysWOW64\Mkgmcjld.exeC:\Windows\system32\Mkgmcjld.exe1⤵PID:5172
-
C:\Windows\SysWOW64\Mnfipekh.exeC:\Windows\system32\Mnfipekh.exe2⤵PID:5208
-
-
C:\Windows\SysWOW64\Mdpalp32.exeC:\Windows\system32\Mdpalp32.exe1⤵PID:5292
-
C:\Windows\SysWOW64\Mgnnhk32.exeC:\Windows\system32\Mgnnhk32.exe2⤵PID:5336
-
-
C:\Windows\SysWOW64\Nkjjij32.exeC:\Windows\system32\Nkjjij32.exe1⤵PID:5372
-
C:\Windows\SysWOW64\Nnhfee32.exeC:\Windows\system32\Nnhfee32.exe2⤵PID:5416
-
-
C:\Windows\SysWOW64\Nqfbaq32.exeC:\Windows\system32\Nqfbaq32.exe1⤵PID:5464
-
C:\Windows\SysWOW64\Ndbnboqb.exeC:\Windows\system32\Ndbnboqb.exe2⤵PID:5508
-
-
C:\Windows\SysWOW64\Ngcgcjnc.exeC:\Windows\system32\Ngcgcjnc.exe1⤵PID:5792
-
C:\Windows\SysWOW64\Nkncdifl.exeC:\Windows\system32\Nkncdifl.exe2⤵PID:5828
-
-
C:\Windows\SysWOW64\Nnmopdep.exeC:\Windows\system32\Nnmopdep.exe1⤵PID:5872
-
C:\Windows\SysWOW64\Nbhkac32.exeC:\Windows\system32\Nbhkac32.exe2⤵PID:5912
-
-
C:\Windows\SysWOW64\Nkqpjidj.exeC:\Windows\system32\Nkqpjidj.exe1⤵PID:6044
-
C:\Windows\SysWOW64\Nnolfdcn.exeC:\Windows\system32\Nnolfdcn.exe2⤵PID:6092
-
C:\Windows\SysWOW64\Nqmhbpba.exeC:\Windows\system32\Nqmhbpba.exe3⤵PID:6136
-
-
-
C:\Windows\SysWOW64\Ndidbn32.exeC:\Windows\system32\Ndidbn32.exe1⤵PID:5180
-
C:\Windows\SysWOW64\Nggqoj32.exeC:\Windows\system32\Nggqoj32.exe2⤵PID:5240
-
-
C:\Windows\SysWOW64\Nkcmohbg.exeC:\Windows\system32\Nkcmohbg.exe1⤵PID:5320
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5320 -s 4082⤵
- Program crash
PID:5488
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5320 -ip 53201⤵PID:5424
-
C:\Windows\SysWOW64\Ncihikcg.exeC:\Windows\system32\Ncihikcg.exe1⤵PID:5996
-
C:\Windows\SysWOW64\Nqklmpdd.exeC:\Windows\system32\Nqklmpdd.exe1⤵PID:5952
-
C:\Windows\SysWOW64\Nddkgonp.exeC:\Windows\system32\Nddkgonp.exe1⤵PID:5748
-
C:\Windows\SysWOW64\Nqiogp32.exeC:\Windows\system32\Nqiogp32.exe1⤵PID:5712
-
C:\Windows\SysWOW64\Nnjbke32.exeC:\Windows\system32\Nnjbke32.exe1⤵PID:5664
-
C:\Windows\SysWOW64\Njogjfoj.exeC:\Windows\system32\Njogjfoj.exe1⤵PID:5628
-
C:\Windows\SysWOW64\Ngpjnkpf.exeC:\Windows\system32\Ngpjnkpf.exe1⤵PID:5584
-
C:\Windows\SysWOW64\Nceonl32.exeC:\Windows\system32\Nceonl32.exe1⤵PID:5548
-
C:\Windows\SysWOW64\Mpdelajl.exeC:\Windows\system32\Mpdelajl.exe1⤵PID:5252
-
C:\Windows\SysWOW64\Mdmegp32.exeC:\Windows\system32\Mdmegp32.exe1⤵PID:5128
-
C:\Windows\SysWOW64\Mpolqa32.exeC:\Windows\system32\Mpolqa32.exe1⤵PID:3956
-
C:\Windows\SysWOW64\Mnapdf32.exeC:\Windows\system32\Mnapdf32.exe1⤵PID:3940
-
C:\Windows\SysWOW64\Lknjmkdo.exeC:\Windows\system32\Lknjmkdo.exe1⤵PID:2008
-
C:\Windows\SysWOW64\Lilanioo.exeC:\Windows\system32\Lilanioo.exe1⤵PID:3060
-
C:\Windows\SysWOW64\Lkiqbl32.exeC:\Windows\system32\Lkiqbl32.exe1⤵PID:4684
-
C:\Windows\SysWOW64\Lnepih32.exeC:\Windows\system32\Lnepih32.exe1⤵PID:64
-
C:\Windows\SysWOW64\Lkgdml32.exeC:\Windows\system32\Lkgdml32.exe1⤵PID:1072
-
C:\Windows\SysWOW64\Ldmlpbbj.exeC:\Windows\system32\Ldmlpbbj.exe1⤵PID:4888
-
C:\Windows\SysWOW64\Lgikfn32.exeC:\Windows\system32\Lgikfn32.exe1⤵PID:3140
-
C:\Windows\SysWOW64\Ldkojb32.exeC:\Windows\system32\Ldkojb32.exe1⤵PID:5104
-
C:\Windows\SysWOW64\Lalcng32.exeC:\Windows\system32\Lalcng32.exe1⤵PID:908
-
C:\Windows\SysWOW64\Liekmj32.exeC:\Windows\system32\Liekmj32.exe1⤵PID:2224
-
C:\Windows\SysWOW64\Kgfoan32.exeC:\Windows\system32\Kgfoan32.exe1⤵PID:3036
-
C:\Windows\SysWOW64\Kdhbec32.exeC:\Windows\system32\Kdhbec32.exe1⤵PID:2940
-
C:\Windows\SysWOW64\Kmnjhioc.exeC:\Windows\system32\Kmnjhioc.exe1⤵PID:896
-
C:\Windows\SysWOW64\Kkpnlm32.exeC:\Windows\system32\Kkpnlm32.exe1⤵PID:1880
-
C:\Windows\SysWOW64\Kcifkp32.exeC:\Windows\system32\Kcifkp32.exe1⤵PID:2860
-
C:\Windows\SysWOW64\Kdffocib.exeC:\Windows\system32\Kdffocib.exe1⤵PID:5092
-
C:\Windows\SysWOW64\Kagichjo.exeC:\Windows\system32\Kagichjo.exe1⤵PID:432
-
C:\Windows\SysWOW64\Kgbefoji.exeC:\Windows\system32\Kgbefoji.exe1⤵PID:2856
-
C:\Windows\SysWOW64\Kbfiep32.exeC:\Windows\system32\Kbfiep32.exe1⤵PID:5040
-
C:\Windows\SysWOW64\Kphmie32.exeC:\Windows\system32\Kphmie32.exe1⤵PID:2396
-
C:\Windows\SysWOW64\Kmjqmi32.exeC:\Windows\system32\Kmjqmi32.exe1⤵PID:1848
-
C:\Windows\SysWOW64\Kkkdan32.exeC:\Windows\system32\Kkkdan32.exe1⤵PID:4192
-
C:\Windows\SysWOW64\Kbdmpqcb.exeC:\Windows\system32\Kbdmpqcb.exe1⤵PID:3716
-
C:\Windows\SysWOW64\Kdaldd32.exeC:\Windows\system32\Kdaldd32.exe1⤵
- Executes dropped EXE
PID:2144
-
C:\Windows\SysWOW64\Kacphh32.exeC:\Windows\system32\Kacphh32.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1396
-
C:\Windows\SysWOW64\Kilhgk32.exeC:\Windows\system32\Kilhgk32.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4108
-
C:\Windows\SysWOW64\Kbapjafe.exeC:\Windows\system32\Kbapjafe.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4624
-
C:\Windows\SysWOW64\Kpccnefa.exeC:\Windows\system32\Kpccnefa.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2816
-
C:\Windows\SysWOW64\Kmegbjgn.exeC:\Windows\system32\Kmegbjgn.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1592
-
C:\Windows\SysWOW64\Jfkoeppq.exeC:\Windows\system32\Jfkoeppq.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4540
-
C:\Windows\SysWOW64\Jdmcidam.exeC:\Windows\system32\Jdmcidam.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4196
-
C:\Windows\SysWOW64\Jangmibi.exeC:\Windows\system32\Jangmibi.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2876
-
C:\Windows\SysWOW64\Jigollag.exeC:\Windows\system32\Jigollag.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5072
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD57c5bf20a001c07a91141660a3d3c0f67
SHA1f7d08a477e83ace8463c0e54eb6ef43c2d027970
SHA256c5d98a4501899eb835ba34c995b3d1f869b370295ba828668acc10264df67110
SHA51288230c4efa214b3b03d93fc1c7d36d974a6340912df8095a99774f236140f888a3ce7faae96e4286ae5921e0fa54f088da9798c58017d2f147f4e64bdc716c4c
-
Filesize
80KB
MD5f6422b3d377b4db4d65e42244aeb8d07
SHA1f22b9e1ad285bd36d6e9af7985bd8475ba9b74bd
SHA2565cfa5f013e217f7e489d1be5c82dc6651e8fac983a6749cf971429e9acadacb1
SHA51220c35e3418114930b0ad5041f681a5ce257f0b1913f586a33048e9729868ba59b94b3a35037a0357d07158bc5b0c90f506900203ad4decd483be54524fa266a5
-
Filesize
80KB
MD576a816995f820867fe4bcb7194b124f9
SHA1e7545397574933e864d6c4fc8a437f64ef812859
SHA2562c57bbcacea19eb1388bb2989d5a94e0ca332a7237a8aae628842e25f162a7c7
SHA5122e214a93e4147398e7dbc7b63b7aa079d8e2b71079b1aa5582d9a4909e3c4f450eb0626654fb149982aff3f894bc747d0c3edffaa09021527cf3e2882f0118ab
-
Filesize
80KB
MD5c327400da011afcf7c03fbd611cd7494
SHA120c314707e26e7ddd041278214df2c247264080b
SHA256487fdbc2c9655a42cd07f19780c8f50b11e40990d295ad2f0a7367fee32ba483
SHA51287f8f680091acac06e8f9a24a7202ef4c6f4813e96bb0a5972483277e45d55ad4dd0b225cc86df3618f9a98f2bf794ec8ec886b4e3fb787bbbe5dc58b97f35a6
-
Filesize
80KB
MD5b3aaae0d84d08ea220e3ff2013ffd687
SHA16e7bd7a4679e716df65c1f1e84ee2265759144d5
SHA2568347509eb8a8d020c56f33cc83ae0b3ef1d355e42a443b93c0282d3d1d4a41fb
SHA5129d5b6e3da9e211fc1d9372e5927eb43ff7f0d32930eda95ddd299507b842ff28632bd68a7ac7c794f850477cc8aa0a8ba878f66ba851adbfc0f6029736e735ed
-
Filesize
80KB
MD512e35b4b92032f6200d851ee2e579cb3
SHA17f059e9c89055012bf2ae003e16e27bf703e5dff
SHA25614ef57e93c9d2e2771eec62e13a51ccd945d3969c40919745f611385ec586633
SHA5124302b205c35a715f98d93d364da32cd102a93ba7474045b39bc54d224bf8ce5add4d1f868dfbf66ca77e37df15486ac2d4be7b6950d6c639bc106009173eb6a1
-
Filesize
80KB
MD52e675c7dc039b6897a66979cb4ecab1f
SHA1a6d28fbe934958f405deec2beec293deb04774a5
SHA2567c91b5ae2c3cea05596e8abf3761a515aabb0439ac0d4a57f394cca2f8fc0a24
SHA512d94e2b52826353e21307c36bc9df842870344a51b3467ca259aa35dcffdba33d07fe46879272f2f66d1eb46fe56ca719eddc757c7b8e1d00da0a3af0216b856b
-
Filesize
80KB
MD5aa7a3996ab96236fa3ef0792e322f294
SHA157456fe55ca56cee0a361d71fd6127ef2a678ad1
SHA2560f3e14a4b2c5e30c5d4da44e3eb8d6c1dc2ab94899119d41f27af2d06a3d5675
SHA5128c321bf938c48b198c4abdca4af62d72a58ab23a1761bea6fff452124ec9d28499f76016fb3c8c4b913aeff469c0ff22b022b88e11bbf4061eb4cf13b5b81dae
-
Filesize
80KB
MD58e4575255025d2d80398e2056e52e1ec
SHA1bcba4c825a42a0b9cfa42c74777d121e7d9971be
SHA256d7a899a5d2341787f748e2cf2e64dbb988e573be90ab09761fd2d1742c0ca84f
SHA5128be6524fd2d03344cec6356e3ecb31ce0b924379c6fc11039a0df34eeea8e349f38a11fccaacd88627a18d5a63a62d06705959cc1504ddf3ee3be0119d9308a5
-
Filesize
80KB
MD5fecf4f3003c08dae2d6328da394fb896
SHA1aefc48ad7e62ad579659c1ed4208a9d5de2e251e
SHA256d381c7544e43e9d147e5b5181f147c17ea266c2073ceb0dcaabfd2cda49775d4
SHA51220149699cd09b0299f5c718eac643a46619ba8d61fd16be15197f39f85df39fde170633ab6e765df2ed7cecac5cd23a1aa9e825567932f9764fa50133ae78b13
-
Filesize
80KB
MD5078e4e3811c5c469f92d969e780bc6e1
SHA1cb943f3237d6cb9a3c608ee2e9c68f7f38f0e9d0
SHA256577a68ebf598c6536b88cc8c1b2d48d6dcd9be83d9865f72fc8febbdb835f409
SHA512d8b7ad96e42a5a3eb52c1572878fb5e7b0a8ab057bace174766319471f15e4ea0d49814c0f9e2b9e601c183ffddd8cd379ffa7c71ef799286aa2ee3b201c4399
-
Filesize
80KB
MD5238be63561a2deedae79e09da9da4fb0
SHA11865b64263c057d6ed007a05c558d7781c2d0aa4
SHA256d30562cdb91f130e62d435d8e1136e6c41cbfee7bcc477c1801347329b09a2b6
SHA512782e3fc1b872ca3882c70523fa6a54e9ffb45e7f04938b41e6b3ef5230e7534e69a223c0fc6947c24f2afd363f7abdbdd6775cf46cbff15028f21a1c9cb453bd
-
Filesize
80KB
MD5fbc7abb9fd89c7089af5caa1f90174ae
SHA19624ccc7c4ceb9d99914ce89cc16b7aea1e0d0ec
SHA25661ef1ea911bc70283d8dcffb637e0931290f6bd3b36b8289653b9447a3cefd41
SHA51247f7a3f134f6696cf9c64ce02798ea1abec37584dca94d48569610620ade56a8ea0b695d30e9d041f5f9b6ed51c62a4906f690b4bb9f5c8ff980591101b3bbcc