Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
10-01-2024 18:26
Static task
static1
Behavioral task
behavioral1
Sample
deaf7cfe5fcb4988b5cfaa8ca39c432b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
deaf7cfe5fcb4988b5cfaa8ca39c432b.exe
Resource
win10v2004-20231215-en
General
-
Target
deaf7cfe5fcb4988b5cfaa8ca39c432b.exe
-
Size
80KB
-
MD5
deaf7cfe5fcb4988b5cfaa8ca39c432b
-
SHA1
d3f8440a3127418365ddeeb2998370bebf8e6deb
-
SHA256
ac14e3d54302cc8713f6ff189f6623c2078e9747fd6d533bca86f3abccbbd087
-
SHA512
8e1e2d42c0b6d07279d0355563c0ce8f4b8ae4d74722a5bd674153315ed3c325bdab2dea7ac44a563563a42550be205d9fb5c9ee8e2d9be27bb80b24e3ba3651
-
SSDEEP
1536:IXtNzHGkoZtu36J81b8Cbci2LdS5DUHRbPa9b6i+sIk:IdVrKQ6qIvdS5DSCopsIk
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 62 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ojoign32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pmoahijl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Caebma32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cdhhdlid.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bchomn32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Beglgani.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cdabcm32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ddmaok32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dgbdlf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ofeilobp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pgefeajb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bapiabak.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cjpckf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pgefeajb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cajlhqjp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ddjejl32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dfnjafap.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cffdpghg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dmcibama.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dmefhako.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Daekdooc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dfnjafap.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Deokon32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Beglgani.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cajlhqjp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cdhhdlid.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Djgjlelk.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ddonekbl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dmgbnq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dgbdlf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Calhnpgn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dkkcge32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cdabcm32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cjmgfgdf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" deaf7cfe5fcb4988b5cfaa8ca39c432b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cfmajipb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad deaf7cfe5fcb4988b5cfaa8ca39c432b.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Deokon32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dkkcge32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pmoahijl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bchomn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cjpckf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ddmaok32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dmefhako.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Daekdooc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bjagjhnc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bapiabak.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Djgjlelk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ddonekbl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Calhnpgn.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ddjejl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ojoign32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bjagjhnc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cfmajipb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Caebma32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cjmgfgdf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Chagok32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dmgbnq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ofeilobp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Chagok32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cffdpghg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dmcibama.exe -
Executes dropped EXE 31 IoCs
pid Process 2604 Ojoign32.exe 3668 Ofeilobp.exe 2844 Pmoahijl.exe 4404 Pgefeajb.exe 1664 Bchomn32.exe 1948 Bjagjhnc.exe 2076 Beglgani.exe 4472 Bapiabak.exe 2644 Cfmajipb.exe 1232 Cdabcm32.exe 4972 Caebma32.exe 316 Cjmgfgdf.exe 2792 Chagok32.exe 1644 Cjpckf32.exe 3168 Cajlhqjp.exe 4408 Cdhhdlid.exe 4856 Cffdpghg.exe 3848 Calhnpgn.exe 2640 Ddjejl32.exe 4640 Dmcibama.exe 1496 Ddmaok32.exe 1820 Djgjlelk.exe 2124 Dmefhako.exe 4764 Ddonekbl.exe 1596 Dfnjafap.exe 2840 Dmgbnq32.exe 3784 Deokon32.exe 1100 Dkkcge32.exe 2360 Daekdooc.exe 3148 Dgbdlf32.exe 2420 Dmllipeg.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\Jhbffb32.dll Beglgani.exe File created C:\Windows\SysWOW64\Bhicommo.dll Cfmajipb.exe File opened for modification C:\Windows\SysWOW64\Cjmgfgdf.exe Caebma32.exe File created C:\Windows\SysWOW64\Qlgene32.dll Cjmgfgdf.exe File created C:\Windows\SysWOW64\Cffdpghg.exe Cdhhdlid.exe File created C:\Windows\SysWOW64\Djgjlelk.exe Ddmaok32.exe File opened for modification C:\Windows\SysWOW64\Chagok32.exe Cjmgfgdf.exe File created C:\Windows\SysWOW64\Ddmaok32.exe Dmcibama.exe File created C:\Windows\SysWOW64\Mjelcfha.dll Dmefhako.exe File created C:\Windows\SysWOW64\Dkkcge32.exe Deokon32.exe File created C:\Windows\SysWOW64\Ojoign32.exe deaf7cfe5fcb4988b5cfaa8ca39c432b.exe File created C:\Windows\SysWOW64\Imbajm32.dll Bapiabak.exe File opened for modification C:\Windows\SysWOW64\Cjpckf32.exe Chagok32.exe File created C:\Windows\SysWOW64\Clghpklj.dll Cjpckf32.exe File created C:\Windows\SysWOW64\Hfanhp32.dll Calhnpgn.exe File opened for modification C:\Windows\SysWOW64\Ddmaok32.exe Dmcibama.exe File opened for modification C:\Windows\SysWOW64\Dmllipeg.exe Dgbdlf32.exe File created C:\Windows\SysWOW64\Qgppolie.dll Ofeilobp.exe File created C:\Windows\SysWOW64\Pgefeajb.exe Pmoahijl.exe File created C:\Windows\SysWOW64\Kbejge32.dll Pgefeajb.exe File created C:\Windows\SysWOW64\Bmhnkg32.dll Bjagjhnc.exe File opened for modification C:\Windows\SysWOW64\Ddjejl32.exe Calhnpgn.exe File opened for modification C:\Windows\SysWOW64\Djgjlelk.exe Ddmaok32.exe File created C:\Windows\SysWOW64\Poahbe32.dll Ddonekbl.exe File created C:\Windows\SysWOW64\Bapiabak.exe Beglgani.exe File created C:\Windows\SysWOW64\Lpggmhkg.dll Cajlhqjp.exe File opened for modification C:\Windows\SysWOW64\Deokon32.exe Dmgbnq32.exe File created C:\Windows\SysWOW64\Ohmoom32.dll Dkkcge32.exe File created C:\Windows\SysWOW64\Ejfenk32.dll Pmoahijl.exe File created C:\Windows\SysWOW64\Beglgani.exe Bjagjhnc.exe File created C:\Windows\SysWOW64\Jjjald32.dll Dmcibama.exe File created C:\Windows\SysWOW64\Deokon32.exe Dmgbnq32.exe File created C:\Windows\SysWOW64\Daekdooc.exe Dkkcge32.exe File opened for modification C:\Windows\SysWOW64\Daekdooc.exe Dkkcge32.exe File opened for modification C:\Windows\SysWOW64\Pgefeajb.exe Pmoahijl.exe File created C:\Windows\SysWOW64\Maickled.dll Caebma32.exe File created C:\Windows\SysWOW64\Cacamdcd.dll Chagok32.exe File opened for modification C:\Windows\SysWOW64\Cdhhdlid.exe Cajlhqjp.exe File created C:\Windows\SysWOW64\Beeppfin.dll Ddmaok32.exe File created C:\Windows\SysWOW64\Dmllipeg.exe Dgbdlf32.exe File opened for modification C:\Windows\SysWOW64\Ofeilobp.exe Ojoign32.exe File opened for modification C:\Windows\SysWOW64\Caebma32.exe Cdabcm32.exe File created C:\Windows\SysWOW64\Cdhhdlid.exe Cajlhqjp.exe File opened for modification C:\Windows\SysWOW64\Dmcibama.exe Ddjejl32.exe File created C:\Windows\SysWOW64\Dfnjafap.exe Ddonekbl.exe File opened for modification C:\Windows\SysWOW64\Dkkcge32.exe Deokon32.exe File created C:\Windows\SysWOW64\Clncadfb.dll deaf7cfe5fcb4988b5cfaa8ca39c432b.exe File created C:\Windows\SysWOW64\Mmcdaagm.dll Ojoign32.exe File opened for modification C:\Windows\SysWOW64\Bjagjhnc.exe Bchomn32.exe File created C:\Windows\SysWOW64\Cdabcm32.exe Cfmajipb.exe File created C:\Windows\SysWOW64\Calhnpgn.exe Cffdpghg.exe File opened for modification C:\Windows\SysWOW64\Dmefhako.exe Djgjlelk.exe File opened for modification C:\Windows\SysWOW64\Ojoign32.exe deaf7cfe5fcb4988b5cfaa8ca39c432b.exe File created C:\Windows\SysWOW64\Pmoahijl.exe Ofeilobp.exe File created C:\Windows\SysWOW64\Bchomn32.exe Pgefeajb.exe File opened for modification C:\Windows\SysWOW64\Bapiabak.exe Beglgani.exe File created C:\Windows\SysWOW64\Cfmajipb.exe Bapiabak.exe File created C:\Windows\SysWOW64\Olfdahne.dll Cdabcm32.exe File created C:\Windows\SysWOW64\Dmefhako.exe Djgjlelk.exe File created C:\Windows\SysWOW64\Jcbdhp32.dll Deokon32.exe File opened for modification C:\Windows\SysWOW64\Pmoahijl.exe Ofeilobp.exe File created C:\Windows\SysWOW64\Bjagjhnc.exe Bchomn32.exe File created C:\Windows\SysWOW64\Chagok32.exe Cjmgfgdf.exe File created C:\Windows\SysWOW64\Dmcibama.exe Ddjejl32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4020 2420 WerFault.exe 103 -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cacamdcd.dll" Chagok32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Chagok32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cajlhqjp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Calhnpgn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ddmaok32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pgefeajb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qlgene32.dll" Cjmgfgdf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cjmgfgdf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dgbdlf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Clncadfb.dll" deaf7cfe5fcb4988b5cfaa8ca39c432b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kmfjodai.dll" Ddjejl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mjelcfha.dll" Dmefhako.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gidbim32.dll" Djgjlelk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dgbdlf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pmoahijl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ddjejl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jjjald32.dll" Dmcibama.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ofeilobp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bapiabak.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Maickled.dll" Caebma32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cdhhdlid.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ddmaok32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Djgjlelk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lpggmhkg.dll" Cajlhqjp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dkkcge32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qgppolie.dll" Ofeilobp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Imbajm32.dll" Bapiabak.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cjpckf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kbejge32.dll" Pgefeajb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cffdpghg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cfmajipb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cjmgfgdf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ihidnp32.dll" Dfnjafap.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dfnjafap.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pgefeajb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bchomn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Beglgani.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ejfenk32.dll" Pmoahijl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Clghpklj.dll" Cjpckf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ddjejl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dmcibama.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Djgjlelk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 deaf7cfe5fcb4988b5cfaa8ca39c432b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID deaf7cfe5fcb4988b5cfaa8ca39c432b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ofeilobp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Poahbe32.dll" Ddonekbl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jcbdhp32.dll" Deokon32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Chagok32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dmefhako.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dkkcge32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gfghpl32.dll" Daekdooc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} deaf7cfe5fcb4988b5cfaa8ca39c432b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Olfdahne.dll" Cdabcm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cdabcm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ddonekbl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Deokon32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Deokon32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Daekdooc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mmcdaagm.dll" Ojoign32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bmhnkg32.dll" Bjagjhnc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hfanhp32.dll" Calhnpgn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dfnjafap.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kngpec32.dll" Dgbdlf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bjagjhnc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3472 wrote to memory of 2604 3472 deaf7cfe5fcb4988b5cfaa8ca39c432b.exe 87 PID 3472 wrote to memory of 2604 3472 deaf7cfe5fcb4988b5cfaa8ca39c432b.exe 87 PID 3472 wrote to memory of 2604 3472 deaf7cfe5fcb4988b5cfaa8ca39c432b.exe 87 PID 2604 wrote to memory of 3668 2604 Ojoign32.exe 88 PID 2604 wrote to memory of 3668 2604 Ojoign32.exe 88 PID 2604 wrote to memory of 3668 2604 Ojoign32.exe 88 PID 3668 wrote to memory of 2844 3668 Ofeilobp.exe 89 PID 3668 wrote to memory of 2844 3668 Ofeilobp.exe 89 PID 3668 wrote to memory of 2844 3668 Ofeilobp.exe 89 PID 2844 wrote to memory of 4404 2844 Pmoahijl.exe 90 PID 2844 wrote to memory of 4404 2844 Pmoahijl.exe 90 PID 2844 wrote to memory of 4404 2844 Pmoahijl.exe 90 PID 4404 wrote to memory of 1664 4404 Pgefeajb.exe 92 PID 4404 wrote to memory of 1664 4404 Pgefeajb.exe 92 PID 4404 wrote to memory of 1664 4404 Pgefeajb.exe 92 PID 1664 wrote to memory of 1948 1664 Bchomn32.exe 93 PID 1664 wrote to memory of 1948 1664 Bchomn32.exe 93 PID 1664 wrote to memory of 1948 1664 Bchomn32.exe 93 PID 1948 wrote to memory of 2076 1948 Bjagjhnc.exe 94 PID 1948 wrote to memory of 2076 1948 Bjagjhnc.exe 94 PID 1948 wrote to memory of 2076 1948 Bjagjhnc.exe 94 PID 2076 wrote to memory of 4472 2076 Beglgani.exe 95 PID 2076 wrote to memory of 4472 2076 Beglgani.exe 95 PID 2076 wrote to memory of 4472 2076 Beglgani.exe 95 PID 4472 wrote to memory of 2644 4472 Bapiabak.exe 97 PID 4472 wrote to memory of 2644 4472 Bapiabak.exe 97 PID 4472 wrote to memory of 2644 4472 Bapiabak.exe 97 PID 2644 wrote to memory of 1232 2644 Cfmajipb.exe 98 PID 2644 wrote to memory of 1232 2644 Cfmajipb.exe 98 PID 2644 wrote to memory of 1232 2644 Cfmajipb.exe 98 PID 1232 wrote to memory of 4972 1232 Cdabcm32.exe 99 PID 1232 wrote to memory of 4972 1232 Cdabcm32.exe 99 PID 1232 wrote to memory of 4972 1232 Cdabcm32.exe 99 PID 4972 wrote to memory of 316 4972 Caebma32.exe 123 PID 4972 wrote to memory of 316 4972 Caebma32.exe 123 PID 4972 wrote to memory of 316 4972 Caebma32.exe 123 PID 316 wrote to memory of 2792 316 Cjmgfgdf.exe 122 PID 316 wrote to memory of 2792 316 Cjmgfgdf.exe 122 PID 316 wrote to memory of 2792 316 Cjmgfgdf.exe 122 PID 2792 wrote to memory of 1644 2792 Chagok32.exe 121 PID 2792 wrote to memory of 1644 2792 Chagok32.exe 121 PID 2792 wrote to memory of 1644 2792 Chagok32.exe 121 PID 1644 wrote to memory of 3168 1644 Cjpckf32.exe 120 PID 1644 wrote to memory of 3168 1644 Cjpckf32.exe 120 PID 1644 wrote to memory of 3168 1644 Cjpckf32.exe 120 PID 3168 wrote to memory of 4408 3168 Cajlhqjp.exe 118 PID 3168 wrote to memory of 4408 3168 Cajlhqjp.exe 118 PID 3168 wrote to memory of 4408 3168 Cajlhqjp.exe 118 PID 4408 wrote to memory of 4856 4408 Cdhhdlid.exe 117 PID 4408 wrote to memory of 4856 4408 Cdhhdlid.exe 117 PID 4408 wrote to memory of 4856 4408 Cdhhdlid.exe 117 PID 4856 wrote to memory of 3848 4856 Cffdpghg.exe 116 PID 4856 wrote to memory of 3848 4856 Cffdpghg.exe 116 PID 4856 wrote to memory of 3848 4856 Cffdpghg.exe 116 PID 3848 wrote to memory of 2640 3848 Calhnpgn.exe 115 PID 3848 wrote to memory of 2640 3848 Calhnpgn.exe 115 PID 3848 wrote to memory of 2640 3848 Calhnpgn.exe 115 PID 2640 wrote to memory of 4640 2640 Ddjejl32.exe 114 PID 2640 wrote to memory of 4640 2640 Ddjejl32.exe 114 PID 2640 wrote to memory of 4640 2640 Ddjejl32.exe 114 PID 4640 wrote to memory of 1496 4640 Dmcibama.exe 113 PID 4640 wrote to memory of 1496 4640 Dmcibama.exe 113 PID 4640 wrote to memory of 1496 4640 Dmcibama.exe 113 PID 1496 wrote to memory of 1820 1496 Ddmaok32.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\deaf7cfe5fcb4988b5cfaa8ca39c432b.exe"C:\Users\Admin\AppData\Local\Temp\deaf7cfe5fcb4988b5cfaa8ca39c432b.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3472 -
C:\Windows\SysWOW64\Ojoign32.exeC:\Windows\system32\Ojoign32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\SysWOW64\Ofeilobp.exeC:\Windows\system32\Ofeilobp.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3668 -
C:\Windows\SysWOW64\Pmoahijl.exeC:\Windows\system32\Pmoahijl.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\SysWOW64\Pgefeajb.exeC:\Windows\system32\Pgefeajb.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4404 -
C:\Windows\SysWOW64\Bchomn32.exeC:\Windows\system32\Bchomn32.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Windows\SysWOW64\Bjagjhnc.exeC:\Windows\system32\Bjagjhnc.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Windows\SysWOW64\Beglgani.exeC:\Windows\system32\Beglgani.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Windows\SysWOW64\Bapiabak.exeC:\Windows\system32\Bapiabak.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4472 -
C:\Windows\SysWOW64\Cfmajipb.exeC:\Windows\system32\Cfmajipb.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\SysWOW64\Cdabcm32.exeC:\Windows\system32\Cdabcm32.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Windows\SysWOW64\Caebma32.exeC:\Windows\system32\Caebma32.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Windows\SysWOW64\Cjmgfgdf.exeC:\Windows\system32\Cjmgfgdf.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:316
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Djgjlelk.exeC:\Windows\system32\Djgjlelk.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1820 -
C:\Windows\SysWOW64\Dmefhako.exeC:\Windows\system32\Dmefhako.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2124
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2420 -ip 24201⤵PID:2400
-
C:\Windows\SysWOW64\Dmllipeg.exeC:\Windows\system32\Dmllipeg.exe1⤵
- Executes dropped EXE
PID:2420 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2420 -s 4042⤵
- Program crash
PID:4020
-
-
C:\Windows\SysWOW64\Dgbdlf32.exeC:\Windows\system32\Dgbdlf32.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:3148
-
C:\Windows\SysWOW64\Daekdooc.exeC:\Windows\system32\Daekdooc.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:2360
-
C:\Windows\SysWOW64\Dkkcge32.exeC:\Windows\system32\Dkkcge32.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1100
-
C:\Windows\SysWOW64\Deokon32.exeC:\Windows\system32\Deokon32.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:3784
-
C:\Windows\SysWOW64\Dmgbnq32.exeC:\Windows\system32\Dmgbnq32.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:2840
-
C:\Windows\SysWOW64\Dfnjafap.exeC:\Windows\system32\Dfnjafap.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:1596
-
C:\Windows\SysWOW64\Ddonekbl.exeC:\Windows\system32\Ddonekbl.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:4764
-
C:\Windows\SysWOW64\Ddmaok32.exeC:\Windows\system32\Ddmaok32.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1496
-
C:\Windows\SysWOW64\Dmcibama.exeC:\Windows\system32\Dmcibama.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4640
-
C:\Windows\SysWOW64\Ddjejl32.exeC:\Windows\system32\Ddjejl32.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2640
-
C:\Windows\SysWOW64\Calhnpgn.exeC:\Windows\system32\Calhnpgn.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3848
-
C:\Windows\SysWOW64\Cffdpghg.exeC:\Windows\system32\Cffdpghg.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4856
-
C:\Windows\SysWOW64\Cdhhdlid.exeC:\Windows\system32\Cdhhdlid.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4408
-
C:\Windows\SysWOW64\Cajlhqjp.exeC:\Windows\system32\Cajlhqjp.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3168
-
C:\Windows\SysWOW64\Cjpckf32.exeC:\Windows\system32\Cjpckf32.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1644
-
C:\Windows\SysWOW64\Chagok32.exeC:\Windows\system32\Chagok32.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2792
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD5f56f9ce0cbd61644f9ac0d467fceecdd
SHA17e528ded58cf97fca3f808fe489cc7b73f4c082a
SHA25620fdaee02bbaeb8a8830a6bc8eba6e8326ac8c643dbddea2a18617dd7aaac932
SHA5125b93f4084e5890f959d0293595fb4a17adf03bdbc214a70d67f6a8c91f55b889b0e39e3dd429001a56444cd723b5715e0db808def50e7d1683598efad7ef669b
-
Filesize
80KB
MD51fb89fb6f8e43fe23da620290f527e12
SHA139545df5b64753b8049b0ad3b97994b71eaea2fe
SHA2563589df57ed137873c03b5eff416fe8ead9b0beace73c2c3df6751721d90068a1
SHA5123a17b51f2a493c1f775d3f6be41413ebdb13d46082f392dd1abc63452ba9d9235df030be19a6fc703b876bea6a7c381ff785314b6ae0895519dfb8636c0ea0b2
-
Filesize
80KB
MD52cc108220806d1f5856c918e253d54de
SHA1f8219d73243a3db5b26026f756cc8547fd562c6c
SHA2567b4fb717b30f2449fc6618595985f21e8b00d6a097be6a7d488ddbff8e6a6c15
SHA512bda9e0f544c6949cbaf488ca45c813e2016c9a04bebb4fd5924da095270693ff131879b8571cb6beb20155c7da106d05f5c89026df9d7f16dfdfed1c24332be6
-
Filesize
80KB
MD5143b234c9befd9c893a2be68461a5b78
SHA1e36141ae91e52a1b05b8aeb188442aed4676b834
SHA256d79317ad484cb53ed1461edc79800ae412d29f144dfd8cf3d30dceab1bce1ed1
SHA5129bdcd61de5c1dae8af8d2094cfeb2a64caacea1bf13b21f4440a9fde4a0945b48d1e187bd5c84792f511a0d9701be7b1ac6bb91f9a652ebe5b8478807a1bd257
-
Filesize
80KB
MD5e685fa5549bb9783c726311dc3d2d9cd
SHA14908ca6eed5fcda2c1f313966206af8d162026cd
SHA256404ed18059fbe825d457695f9a1a3fe14862b6fca74ea097829b81d3a180f85d
SHA5129c117c30ca155ba7fab180f7b08d7008668df055eece247ba249b97cb2ece10bb0d69fb8e6d728286516bcab23843492381c98260347e211f7d6f2cdaddd6927
-
Filesize
80KB
MD51ee43fff27f6f60ff910fae7a74af1e8
SHA196fdc542c47de2d7b68992a459554ad7681d73b4
SHA2563090e463a34fb4d7f02b3dc68c965713c0a7c834597f2ef97110f1c99b07a5cc
SHA5126bee14ac71526dca4516b4184d7e299ee1681c5ead08fbaab3be0b583a29af39a4919b1624f1af1aa2d19d8544febae6d53b3e70328be29e54bf0e8e43299102
-
Filesize
80KB
MD5e1e0daa716ec8bd6a75934a6187ccb99
SHA1ae7d63d634be1956b522e68e7427611d39bb0200
SHA256f5c8d69004afc044470bb2fdef5c0bea44d620c0bbf5bb87d6b30a1e541a5aaa
SHA512c2019991ae98972b6c48afdd7e409a73d94b3861c35aade6e0b6e83c00bae294ccf8ea2fe7806d9053dbda1987c661e01bc3a084edeb4a5cc14751aad2951430
-
Filesize
80KB
MD511d2639d2b40ed0ebd419a0865419d7b
SHA18fbb7574725ac4df4da20ecd365fb0341ae7a195
SHA256a80aeec09b916c304ec9ea0a4af9de9b0e4e1d96237fbd8b0f8465bf6df4ae07
SHA51293e08f0e85a3772a87c7a0acc8a7ae94f26fc7b828cef440edf7cd7d65695e3629222db9ed351c307e27f5ecab21e90321e53ca2189c47c0236c6bbb0d3b7e97
-
Filesize
80KB
MD53b498c48b3a1a2df67155fe2df4b9f97
SHA11ee9cf0ae14c40cb349ed42b3e1d22feb3a50915
SHA2569532be55daa85c7173229ba0c57e461239f0bb5783843669d82c706be9d55347
SHA512bd88cb7d6afdaddf44d3ccfadb1389247a8d6299707a7d9d87a091ff4a8c86f6a5a336c26316a6ec314f19ba1124120ccf41865c95cebbd65f4da6fae98c6100
-
Filesize
80KB
MD597bdb34317bc1951863bb3db69933daa
SHA1bfe762fcc271a556e988b1a23ef176923acd78be
SHA2562f5671b7ac6ea8ac050482c21906e27136c53f3c31ec54d5ad809c7a05517df9
SHA512b767d57108ad768c62847faf153e008bbfb6c1481ef2bcc19b2c10059f34e67836516976b531e7e99202e5a04a424f66130384281b4e9771f0dd92e4afb82c73
-
Filesize
80KB
MD5f4bc6274171fded3ff4f757f4eca44e6
SHA1f5ac79ee61393cb8f3ca91380bf28f13e833dae4
SHA25616a902158f7e666923a9778a2112b5e43a6c72af7550b1ecc2d22638591b604c
SHA512d093bde7efccdda27fea8f8215d749acdc076dfc979f3396ad83a7342e16b390dd49eb8a648b4861a6144f28dc44cf78f317b2c3fd1199cc75ff30f2f5c5e285
-
Filesize
80KB
MD59aa1a772874a4971cee70001631f65e1
SHA10cb511c9cd5fb72c88e46725a362892f5fda41ad
SHA256a29edaaa0bd9f119132d7846d6d2497ae96fa5683053d2ca876ac7f32e233719
SHA51215dcefef24fa101ee9b1cedad10c60bdf2c6d9ef23ba024fbb86555f8aea0212bb24196adadb77cf41dbe5bbf21b00f6046cdfa9604fae1032fc2ba421093eeb
-
Filesize
80KB
MD53436fffe1f7a58c5487725cf0a2206dc
SHA164096d1eef8e2091a8447379dab71ec327d6538b
SHA256044aa5ea082bca656d7f6c3a7d42a66a2cbf9add9b8dac84c179e2079893cb0c
SHA512fb301a7cd49a7828d7789b10e2ced68237df78c779dc006208ac1da2a338beaf8c5d32710539beb837024f5187c89fdbd06bcd683d5e970c3cf7442ddd775fa1
-
Filesize
80KB
MD50f7da82d995677d8c8c6d30da85f626f
SHA17a8e3cb1545b253b22218c4c0e9d1b03cd705c57
SHA2565fe15679d4d431ca9d8b9930c23870ede65b1bae7b68c17e8b81eb8feaed2ae0
SHA512f20e7f0c81d771d7a1b147865dbdb35e74d0cba2c1758647653656f7de16172f0da886e88ecd7c23fa39e22aba9985eb3cd70c067715567470837b43ac72728d
-
Filesize
80KB
MD5542e44137d9989a2d7945a80952afab4
SHA116a82b2bc2dccb0a8be516216dc7d8641e82c7b6
SHA256b17105989f60bfa80a54db6871217d19da458462c2df9492133ec7a36df51b5e
SHA512a5bcaa370ef07b202e6540906b09d34f405aee5cefda5da3556b62b41b47d9bc3c60272b5021e304365824aad9833e5f360208b31c80f3cf12346f52933c2b3b
-
Filesize
80KB
MD51bfe1e1c18ae0b0a5107340e4c568c36
SHA1a94bc465956c949d6528dfa4de2912513ab97364
SHA2568a06b9a1366a935c0e96c4ac20a4f18e508583abb5b8775d32c62672c6fa2678
SHA5125d5b8f3fab9799ff96ae104ffb832f641d9a49abc102d9bbef04502dee5c4c6ae369fa6b54eb8e856c19b9e40dc18c5f3005ea85584cfda8f03af5d14b81a3db
-
Filesize
80KB
MD50d0523fef4ffab0013d6f66c99ac015b
SHA14a8bc342f7c5fb65cbbe29f32d7dbf166e294723
SHA25610a85cd5ef08891df6b627d08b66275070038392482b3645185d18beb763ae34
SHA5122522ee75d415e3d880378a9f5939e2440b8557b6649b5f5d2cc8ed6ff383540b0396a16010abf663a929bcaa68de301c6fd5e3b0569d12aefcd3842873f34e52
-
Filesize
80KB
MD59524c2ae6f0b5af5fd97da02a639ea0d
SHA1bf98143385012f9b5f495f4c3691e74cd67da916
SHA2560ff5e03e7c262ec7b3ec324baaf0209d6ddc9e2831058f045717faac73a7fea8
SHA512cfa723225cdc35d752da81d4b0a393fc07e71d5ff8c36c04e694ab6f4827c4d108c63f17c0b9712d9906207e785f5459b02332c24fae06d2b478425424e5db94
-
Filesize
80KB
MD54dee6d67c932f7e9946737712375d98c
SHA14cf327e0b5f55e5acf145d3d3fe5a86222b00c68
SHA256e2482c7ffb4f435c79b28be65fe915e5b0c1222915b7951b45a2910dd246dd01
SHA5125863b15e5f2bbb10d6a483c078ee4485e80c9d0bbf22c3afd8db5dac2ec08924f2a0c58befbb28107ccf17999dfe7ad4a5647beebca9be6f8d3c9d4ee1c20058
-
Filesize
80KB
MD5e0e9b793d14968511a3c06e95dd4752f
SHA1db25e23be47ad456e25fe612aba7d6107c36792a
SHA2564ebeb3deb85984b9631671f44abd0f63eb2f3b3e2ecee6466233c7bc8b60e751
SHA512db261481eca58ac5b9e81f509157cf94cd875ea4f2a4f2a0262cfe84d1e7de32aee15667ceecff259425b940bb6cf10bb771bd5a53b449a9377b825135863bb6
-
Filesize
80KB
MD506f4407d2f4eff24777c5d858b991458
SHA152795f08ff14ba5df67adf7d9b8f9f3dd01e5685
SHA256bbabf6898e4d48986817c02a3c2fcb5b235ea6fde8f8f6b5e3f40080cd4cc2e6
SHA512976734ed54e9ec7e4e5b7b0f1b9b007598654f635dee85b43ae81a5df436247e22af311f0a61df23a97f81d6b0bef78c6c20a29daacc31cad28e96cc21cd49d3