Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
06/03/2024, 18:39
Static task
static1
Behavioral task
behavioral1
Sample
2e88618b805bdebdbfee52e1d92420feed798fcc0292620dad589d77a51c6fdf.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2e88618b805bdebdbfee52e1d92420feed798fcc0292620dad589d77a51c6fdf.exe
Resource
win10v2004-20240226-en
General
-
Target
2e88618b805bdebdbfee52e1d92420feed798fcc0292620dad589d77a51c6fdf.exe
-
Size
64KB
-
MD5
d418f280d857f7e40643971e9d2c1674
-
SHA1
f6f65d424fef8296c509e84dc7c46d2c4b569f40
-
SHA256
2e88618b805bdebdbfee52e1d92420feed798fcc0292620dad589d77a51c6fdf
-
SHA512
85ece8cf228fcb97c471f98f7f1bb0ed01ffdfef7acb7a76f00ecd7a08c08e7f6e79c80c349c6b65a64da52cf09e21c91d0b1047e13bd918d63948818df8d2a3
-
SSDEEP
1536:443+oKMQ3GtZYjvEZJafUw9wJhbRE5uV1iL+iALMH6:40kzGtZ4v4wKnFE5uV1iL+9Ma
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 30 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 2e88618b805bdebdbfee52e1d92420feed798fcc0292620dad589d77a51c6fdf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hkpnhgge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hlakpp32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hejoiedd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hhjhkq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hacmcfge.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Idceea32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hacmcfge.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ilknfn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" 2e88618b805bdebdbfee52e1d92420feed798fcc0292620dad589d77a51c6fdf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hgbebiao.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hlakpp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hckcmjep.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hhmepp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Idceea32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hejoiedd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hgilchkf.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hhjhkq32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hogmmjfo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hogmmjfo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ilknfn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ioijbj32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hckcmjep.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hlcgeo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hlcgeo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hhmepp32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hgbebiao.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hkpnhgge.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hgilchkf.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ioijbj32.exe -
Executes dropped EXE 15 IoCs
pid Process 2560 Hgbebiao.exe 2480 Hkpnhgge.exe 2800 Hlakpp32.exe 2400 Hckcmjep.exe 2128 Hejoiedd.exe 2296 Hlcgeo32.exe 1580 Hgilchkf.exe 2564 Hhjhkq32.exe 2720 Hacmcfge.exe 1748 Hhmepp32.exe 384 Hogmmjfo.exe 1416 Idceea32.exe 780 Ilknfn32.exe 2736 Ioijbj32.exe 2708 Iagfoe32.exe -
Loads dropped DLL 34 IoCs
pid Process 2188 2e88618b805bdebdbfee52e1d92420feed798fcc0292620dad589d77a51c6fdf.exe 2188 2e88618b805bdebdbfee52e1d92420feed798fcc0292620dad589d77a51c6fdf.exe 2560 Hgbebiao.exe 2560 Hgbebiao.exe 2480 Hkpnhgge.exe 2480 Hkpnhgge.exe 2800 Hlakpp32.exe 2800 Hlakpp32.exe 2400 Hckcmjep.exe 2400 Hckcmjep.exe 2128 Hejoiedd.exe 2128 Hejoiedd.exe 2296 Hlcgeo32.exe 2296 Hlcgeo32.exe 1580 Hgilchkf.exe 1580 Hgilchkf.exe 2564 Hhjhkq32.exe 2564 Hhjhkq32.exe 2720 Hacmcfge.exe 2720 Hacmcfge.exe 1748 Hhmepp32.exe 1748 Hhmepp32.exe 384 Hogmmjfo.exe 384 Hogmmjfo.exe 1416 Idceea32.exe 1416 Idceea32.exe 780 Ilknfn32.exe 780 Ilknfn32.exe 2736 Ioijbj32.exe 2736 Ioijbj32.exe 2856 WerFault.exe 2856 WerFault.exe 2856 WerFault.exe 2856 WerFault.exe -
Drops file in System32 directory 45 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Hlakpp32.exe Hkpnhgge.exe File created C:\Windows\SysWOW64\Hckcmjep.exe Hlakpp32.exe File opened for modification C:\Windows\SysWOW64\Hckcmjep.exe Hlakpp32.exe File created C:\Windows\SysWOW64\Hejoiedd.exe Hckcmjep.exe File created C:\Windows\SysWOW64\Ojhcelga.dll Hhmepp32.exe File created C:\Windows\SysWOW64\Dgnijonn.dll Ilknfn32.exe File created C:\Windows\SysWOW64\Gjenmobn.dll Ioijbj32.exe File opened for modification C:\Windows\SysWOW64\Hejoiedd.exe Hckcmjep.exe File created C:\Windows\SysWOW64\Hlcgeo32.exe Hejoiedd.exe File created C:\Windows\SysWOW64\Hhjhkq32.exe Hgilchkf.exe File opened for modification C:\Windows\SysWOW64\Hhmepp32.exe Hacmcfge.exe File opened for modification C:\Windows\SysWOW64\Hgbebiao.exe 2e88618b805bdebdbfee52e1d92420feed798fcc0292620dad589d77a51c6fdf.exe File created C:\Windows\SysWOW64\Pffgja32.dll Hgbebiao.exe File created C:\Windows\SysWOW64\Hlakpp32.exe Hkpnhgge.exe File created C:\Windows\SysWOW64\Anllbdkl.dll Hkpnhgge.exe File opened for modification C:\Windows\SysWOW64\Hlcgeo32.exe Hejoiedd.exe File opened for modification C:\Windows\SysWOW64\Hhjhkq32.exe Hgilchkf.exe File created C:\Windows\SysWOW64\Hacmcfge.exe Hhjhkq32.exe File opened for modification C:\Windows\SysWOW64\Hacmcfge.exe Hhjhkq32.exe File created C:\Windows\SysWOW64\Alogkm32.dll Hhjhkq32.exe File created C:\Windows\SysWOW64\Hepmggig.dll Hckcmjep.exe File created C:\Windows\SysWOW64\Kjnifgah.dll Hejoiedd.exe File created C:\Windows\SysWOW64\Nbniiffi.dll Hlcgeo32.exe File created C:\Windows\SysWOW64\Pqiqnfej.dll Hogmmjfo.exe File created C:\Windows\SysWOW64\Ioijbj32.exe Ilknfn32.exe File opened for modification C:\Windows\SysWOW64\Ioijbj32.exe Ilknfn32.exe File opened for modification C:\Windows\SysWOW64\Hkpnhgge.exe Hgbebiao.exe File created C:\Windows\SysWOW64\Bdhaablp.dll Hacmcfge.exe File opened for modification C:\Windows\SysWOW64\Ilknfn32.exe Idceea32.exe File opened for modification C:\Windows\SysWOW64\Iagfoe32.exe Ioijbj32.exe File created C:\Windows\SysWOW64\Jjcpjl32.dll 2e88618b805bdebdbfee52e1d92420feed798fcc0292620dad589d77a51c6fdf.exe File created C:\Windows\SysWOW64\Hgilchkf.exe Hlcgeo32.exe File opened for modification C:\Windows\SysWOW64\Hgilchkf.exe Hlcgeo32.exe File created C:\Windows\SysWOW64\Hhmepp32.exe Hacmcfge.exe File created C:\Windows\SysWOW64\Iagfoe32.exe Ioijbj32.exe File created C:\Windows\SysWOW64\Hkpnhgge.exe Hgbebiao.exe File opened for modification C:\Windows\SysWOW64\Hogmmjfo.exe Hhmepp32.exe File opened for modification C:\Windows\SysWOW64\Idceea32.exe Hogmmjfo.exe File created C:\Windows\SysWOW64\Ilknfn32.exe Idceea32.exe File created C:\Windows\SysWOW64\Hgbebiao.exe 2e88618b805bdebdbfee52e1d92420feed798fcc0292620dad589d77a51c6fdf.exe File created C:\Windows\SysWOW64\Cabknqko.dll Hlakpp32.exe File created C:\Windows\SysWOW64\Hojopmqk.dll Hgilchkf.exe File created C:\Windows\SysWOW64\Hogmmjfo.exe Hhmepp32.exe File created C:\Windows\SysWOW64\Idceea32.exe Hogmmjfo.exe File created C:\Windows\SysWOW64\Pdpfph32.dll Idceea32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2856 2708 WerFault.exe 42 -
Modifies registry class 48 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jjcpjl32.dll" 2e88618b805bdebdbfee52e1d92420feed798fcc0292620dad589d77a51c6fdf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hgbebiao.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hkpnhgge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hogmmjfo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gjenmobn.dll" Ioijbj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hckcmjep.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hgilchkf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Alogkm32.dll" Hhjhkq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hacmcfge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hhmepp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ojhcelga.dll" Hhmepp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} 2e88618b805bdebdbfee52e1d92420feed798fcc0292620dad589d77a51c6fdf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" 2e88618b805bdebdbfee52e1d92420feed798fcc0292620dad589d77a51c6fdf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hkpnhgge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hlakpp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hepmggig.dll" Hckcmjep.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Idceea32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ioijbj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 2e88618b805bdebdbfee52e1d92420feed798fcc0292620dad589d77a51c6fdf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node 2e88618b805bdebdbfee52e1d92420feed798fcc0292620dad589d77a51c6fdf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cabknqko.dll" Hlakpp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nbniiffi.dll" Hlcgeo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hlcgeo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID 2e88618b805bdebdbfee52e1d92420feed798fcc0292620dad589d77a51c6fdf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hhjhkq32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hogmmjfo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pqiqnfej.dll" Hogmmjfo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hlakpp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hejoiedd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hgilchkf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bdhaablp.dll" Hacmcfge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ilknfn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dgnijonn.dll" Ilknfn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ioijbj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hgbebiao.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hckcmjep.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hejoiedd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hojopmqk.dll" Hgilchkf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hacmcfge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pdpfph32.dll" Idceea32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pffgja32.dll" Hgbebiao.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Anllbdkl.dll" Hkpnhgge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kjnifgah.dll" Hejoiedd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hlcgeo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hhjhkq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hhmepp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Idceea32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ilknfn32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2188 wrote to memory of 2560 2188 2e88618b805bdebdbfee52e1d92420feed798fcc0292620dad589d77a51c6fdf.exe 28 PID 2188 wrote to memory of 2560 2188 2e88618b805bdebdbfee52e1d92420feed798fcc0292620dad589d77a51c6fdf.exe 28 PID 2188 wrote to memory of 2560 2188 2e88618b805bdebdbfee52e1d92420feed798fcc0292620dad589d77a51c6fdf.exe 28 PID 2188 wrote to memory of 2560 2188 2e88618b805bdebdbfee52e1d92420feed798fcc0292620dad589d77a51c6fdf.exe 28 PID 2560 wrote to memory of 2480 2560 Hgbebiao.exe 29 PID 2560 wrote to memory of 2480 2560 Hgbebiao.exe 29 PID 2560 wrote to memory of 2480 2560 Hgbebiao.exe 29 PID 2560 wrote to memory of 2480 2560 Hgbebiao.exe 29 PID 2480 wrote to memory of 2800 2480 Hkpnhgge.exe 30 PID 2480 wrote to memory of 2800 2480 Hkpnhgge.exe 30 PID 2480 wrote to memory of 2800 2480 Hkpnhgge.exe 30 PID 2480 wrote to memory of 2800 2480 Hkpnhgge.exe 30 PID 2800 wrote to memory of 2400 2800 Hlakpp32.exe 31 PID 2800 wrote to memory of 2400 2800 Hlakpp32.exe 31 PID 2800 wrote to memory of 2400 2800 Hlakpp32.exe 31 PID 2800 wrote to memory of 2400 2800 Hlakpp32.exe 31 PID 2400 wrote to memory of 2128 2400 Hckcmjep.exe 32 PID 2400 wrote to memory of 2128 2400 Hckcmjep.exe 32 PID 2400 wrote to memory of 2128 2400 Hckcmjep.exe 32 PID 2400 wrote to memory of 2128 2400 Hckcmjep.exe 32 PID 2128 wrote to memory of 2296 2128 Hejoiedd.exe 33 PID 2128 wrote to memory of 2296 2128 Hejoiedd.exe 33 PID 2128 wrote to memory of 2296 2128 Hejoiedd.exe 33 PID 2128 wrote to memory of 2296 2128 Hejoiedd.exe 33 PID 2296 wrote to memory of 1580 2296 Hlcgeo32.exe 34 PID 2296 wrote to memory of 1580 2296 Hlcgeo32.exe 34 PID 2296 wrote to memory of 1580 2296 Hlcgeo32.exe 34 PID 2296 wrote to memory of 1580 2296 Hlcgeo32.exe 34 PID 1580 wrote to memory of 2564 1580 Hgilchkf.exe 35 PID 1580 wrote to memory of 2564 1580 Hgilchkf.exe 35 PID 1580 wrote to memory of 2564 1580 Hgilchkf.exe 35 PID 1580 wrote to memory of 2564 1580 Hgilchkf.exe 35 PID 2564 wrote to memory of 2720 2564 Hhjhkq32.exe 36 PID 2564 wrote to memory of 2720 2564 Hhjhkq32.exe 36 PID 2564 wrote to memory of 2720 2564 Hhjhkq32.exe 36 PID 2564 wrote to memory of 2720 2564 Hhjhkq32.exe 36 PID 2720 wrote to memory of 1748 2720 Hacmcfge.exe 37 PID 2720 wrote to memory of 1748 2720 Hacmcfge.exe 37 PID 2720 wrote to memory of 1748 2720 Hacmcfge.exe 37 PID 2720 wrote to memory of 1748 2720 Hacmcfge.exe 37 PID 1748 wrote to memory of 384 1748 Hhmepp32.exe 38 PID 1748 wrote to memory of 384 1748 Hhmepp32.exe 38 PID 1748 wrote to memory of 384 1748 Hhmepp32.exe 38 PID 1748 wrote to memory of 384 1748 Hhmepp32.exe 38 PID 384 wrote to memory of 1416 384 Hogmmjfo.exe 39 PID 384 wrote to memory of 1416 384 Hogmmjfo.exe 39 PID 384 wrote to memory of 1416 384 Hogmmjfo.exe 39 PID 384 wrote to memory of 1416 384 Hogmmjfo.exe 39 PID 1416 wrote to memory of 780 1416 Idceea32.exe 40 PID 1416 wrote to memory of 780 1416 Idceea32.exe 40 PID 1416 wrote to memory of 780 1416 Idceea32.exe 40 PID 1416 wrote to memory of 780 1416 Idceea32.exe 40 PID 780 wrote to memory of 2736 780 Ilknfn32.exe 41 PID 780 wrote to memory of 2736 780 Ilknfn32.exe 41 PID 780 wrote to memory of 2736 780 Ilknfn32.exe 41 PID 780 wrote to memory of 2736 780 Ilknfn32.exe 41 PID 2736 wrote to memory of 2708 2736 Ioijbj32.exe 42 PID 2736 wrote to memory of 2708 2736 Ioijbj32.exe 42 PID 2736 wrote to memory of 2708 2736 Ioijbj32.exe 42 PID 2736 wrote to memory of 2708 2736 Ioijbj32.exe 42 PID 2708 wrote to memory of 2856 2708 Iagfoe32.exe 43 PID 2708 wrote to memory of 2856 2708 Iagfoe32.exe 43 PID 2708 wrote to memory of 2856 2708 Iagfoe32.exe 43 PID 2708 wrote to memory of 2856 2708 Iagfoe32.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\2e88618b805bdebdbfee52e1d92420feed798fcc0292620dad589d77a51c6fdf.exe"C:\Users\Admin\AppData\Local\Temp\2e88618b805bdebdbfee52e1d92420feed798fcc0292620dad589d77a51c6fdf.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\SysWOW64\Hgbebiao.exeC:\Windows\system32\Hgbebiao.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\SysWOW64\Hkpnhgge.exeC:\Windows\system32\Hkpnhgge.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Windows\SysWOW64\Hlakpp32.exeC:\Windows\system32\Hlakpp32.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Windows\SysWOW64\Hckcmjep.exeC:\Windows\system32\Hckcmjep.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Windows\SysWOW64\Hejoiedd.exeC:\Windows\system32\Hejoiedd.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Windows\SysWOW64\Hlcgeo32.exeC:\Windows\system32\Hlcgeo32.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Windows\SysWOW64\Hgilchkf.exeC:\Windows\system32\Hgilchkf.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Windows\SysWOW64\Hhjhkq32.exeC:\Windows\system32\Hhjhkq32.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\SysWOW64\Hacmcfge.exeC:\Windows\system32\Hacmcfge.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\SysWOW64\Hhmepp32.exeC:\Windows\system32\Hhmepp32.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Windows\SysWOW64\Hogmmjfo.exeC:\Windows\system32\Hogmmjfo.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:384 -
C:\Windows\SysWOW64\Idceea32.exeC:\Windows\system32\Idceea32.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Windows\SysWOW64\Ilknfn32.exeC:\Windows\system32\Ilknfn32.exe14⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:780 -
C:\Windows\SysWOW64\Ioijbj32.exeC:\Windows\system32\Ioijbj32.exe15⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\SysWOW64\Iagfoe32.exeC:\Windows\system32\Iagfoe32.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2708 -s 14017⤵
- Loads dropped DLL
- Program crash
PID:2856
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5e6b720819205bbde2e3c5c59cec9271b
SHA1c4fd7f5bed99e0ca494072110136f09750a3db87
SHA2564e94a0bcd660c25adf77ffca94b0a1468606aa9d3cca14c8b9fccb717aae2065
SHA512791cec8d0c8683c715c8a63dfc61d14fc8f2be0b7ade025cc5a81576f2261e4b07e9b44931c89c78e58bc89d5fc786713ba357b3693ba4feed97a77873e403c0
-
Filesize
64KB
MD52dc6b4935097ec4253541fe136cb290b
SHA182fb2b9e70b1498af7c3b7db5f67686e62da4ef4
SHA256e371e99eb6fca5f3bc666ae9f816795ee9c1b756baf042d657a291ccf30f0433
SHA512523bd5fd1a4637eb00f52c5d187f2dfb7797aa51f297cd158a143041c70c64b1707f2fa7cc48a0d9bf5a88374e89cadeda83ca1e047814cf49dd5f2a989cb0da
-
Filesize
64KB
MD5efdcac2a35003a14cbf01e6c521f8e5a
SHA164e928379faaf5bc042d8e6fd646e96f5f49080c
SHA2564c8e0a8f4184df059f7ec42be73a57f3e7cffb15c7559bed527b16bda954388d
SHA5127426841240a4cc6c783d4f01a7c5b16ca5916ee16a8c7ef39a8dcfa41cfc902314dc64280081b86bd32b94612969f4e18d547383980b46123d5358c32a61c6c0
-
Filesize
64KB
MD52c2bcf147a306dc399b512d3be2f1a30
SHA1a10e3d9cee88cecebc2fe92d0946a8af7231a427
SHA2565d944dbdb6237ecdd3c4fc14f0a9a565d3354da7fa30372ac5499eede82cbcf7
SHA5126f7bc9f049f0ecbc4f99909c14a2aa038e13445d2a3c820f98f06ddd2410294de3782f61c01750221450119a0b97ffc90087918d2c9ceb69cc83bb4b58a956d3
-
Filesize
64KB
MD54b5df43249a6914acf6cb6a40d6ba08e
SHA188ae64a74767a7bbcc49175b0b47dd2d23185863
SHA256afcbcc7cce6b0f80f94c4f87609d7eeb38a062aaa3e00b3bbd3f8b4ac0e8594e
SHA512251b0ac7eea1bbf57967480368fbd4a57f44106de287fc5b9031ce14cc56f064243c3466f37bc688199537ba04eb5b0380a2fb0fa7c4efe8fe2be46e49acfe33
-
Filesize
64KB
MD5d3b237a23698919030d3fba4b8023bcc
SHA15e1dbeb39bfc438eece5d81c8e31c63c0c40d423
SHA2560f742ee039da07ad99eec975bf132a3cde5a6e401e0876bfe14febc9d18d8b11
SHA512a98940432810a04e0239f90cd35f192064bcd4879d4bf2d04b30a711eae823cf0a5efaf9d7e2c100d8b57967dcfa8a0603113ddf391ea8516b5886b45c14d286
-
Filesize
64KB
MD521e3bc7df85a05d6d174ad139476895d
SHA1f36dc1f4b863abb22c135a6cfcfd46a687b44a88
SHA256062bff07312af363e4103feaffe68c632e3fb10a4947205d0c34e31056ca6d68
SHA512e36bca84ca272bbf730de50f110554a3d8a5e2e27e0cc1d5c01668c54b290b1f08c0a82b5a88659db16f81786368edd98a56d80215f2732834838b842a2db57c
-
Filesize
64KB
MD55570e6e17f8ec9bd1ecd73777dbc100e
SHA1c6c0ba03a51c86beb507d3c2deae3fa5f3035f78
SHA256cd4bea0e27dc3bb5d77ad5a3ad238eaf0afcb8a335c0f0f8936428cdce9b6702
SHA5124f78da6fa7932f4ced6b3bf149291c141d7632782f3d37bed6672b0fa08769744cc0bab3fbc2139019e0e657ed443aa7d1ff8e794fef2f375058b178b20aaee4
-
Filesize
64KB
MD55926056e70ff628c4b35214fc4ae1079
SHA1290d6d391a09d7a08d509abd71796f6cdb10624c
SHA256f12728ff9a5082eb424f172ee338015f709196de2dfa60efadd975b64a2d06ff
SHA512e913acbfb6cdfd747ec94b98ebf1557879804e592a74c23c976ea2ba934f540442598e44a5b4282b5ee9151ed6e9fa7f73c7d83040a31cfac9e8886539c3fc13
-
Filesize
64KB
MD58d7a58e1b1a482334b75365b78de6eb9
SHA1b1572912e676251517cc2166ac2915f993c2419c
SHA2564d5eb01f8f0e76675c1b5a8225ae92c369063c25fbea978a65c113a1b773a2f7
SHA512c417a965864e826700a484f3527ca17b85fc5203e04bb868b5b83b18edec222ab8bf859d50d8506e435f19ea9f8fdd498dc564b1ed577426ffaab7cf790d8cf0
-
Filesize
64KB
MD51c9b9cd4bc2023bb34a975684a225cbe
SHA1f9ad7a0f8c1d1366d659c1719a59954dabc7a0c8
SHA2567b0344f34f856cc90441408cb61d9d02248379b53f11cbfda4c4fce3c6355171
SHA5121ff3a29eb6b88311932bb6ab424f3b11baa4d76cc4751df387fe9d51419a986d8511d404fb27c2a8f56c8099fc151e119c420512c28fef96f69dd49a9939376f
-
Filesize
64KB
MD527d9da684661fcf746d031470a65abde
SHA1c8cbb1bb3b9bbb44671dfb157fdeff89d48df3e1
SHA2565df288cfb07fe5ff324289c158f5501873dfe7ec7ae5f203e05203497bb5cfff
SHA512e4506f6f84ecb28088717d85238285aa37d967aa5a63b8ae7b792b68cad75ba055069c53e870893e32abc78d5e3186d74b40b712b963fb04ccb74d5980c5b458
-
Filesize
64KB
MD53bfdc5cd6db772084968c28b7556b56f
SHA16e3f27fe7d5a56dfe3b9d9cf96b5a02cd7d4294d
SHA25673d21a4cd2fed386df0c5069130c52ab50b51a1894a7769a1d35db1cdcfcc1f5
SHA512442570485de29184df6ed0d0a3c32b2c02f784f97b66d7d0b57dc62a550ba9c8e73f9cc274614cac860e34ec73861994eae2961dd9a243ad763eb878e750c3e9
-
Filesize
64KB
MD55b272ad0267d22abcbf4351ae345ff88
SHA130d919fbaf77d17598032c47a24c040f70859b36
SHA2566c0ef3a2e99509beac3328b5094a22ce18ef1d0f78228823697b55d1c5c8ff3f
SHA512064b509ed0058f9d14328c81cfc69137a25459771df7d95ed62dca79309ac3977ebefd0cbfd1b65ce152b91a8645b3803ee71ded0435ea43e997830dabd3db94
-
Filesize
64KB
MD5b2cd90bbe614702884e8cff6632d03e3
SHA134e0a7336a17aba22f44c7cac94ab279587b8ec8
SHA25625302cf39cb4ddc9392ea062252e3412a2214a006c2a316d0d43ec465e5ecb59
SHA512c4efcf1f9c9933bd78bb556731d0d328224ac0fd8b36893d77e3fbff27b709c407604960a0d8a82081164411f9f63d3178469c55ebccd8935a2f4a368066bffa