Analysis
-
max time kernel
146s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
19/03/2024, 17:47
Static task
static1
Behavioral task
behavioral1
Sample
122dc58c9f7049c24f48d321b41e4fa4fbce762cb59ea5cc342f135010820f68.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
122dc58c9f7049c24f48d321b41e4fa4fbce762cb59ea5cc342f135010820f68.exe
Resource
win10v2004-20240226-en
General
-
Target
122dc58c9f7049c24f48d321b41e4fa4fbce762cb59ea5cc342f135010820f68.exe
-
Size
59KB
-
MD5
73d524c99cfb7bb9be02f7432c27e66e
-
SHA1
342d8ee8a3de99b4b562c520b48d4bfd6e142dd5
-
SHA256
122dc58c9f7049c24f48d321b41e4fa4fbce762cb59ea5cc342f135010820f68
-
SHA512
1d65fa697ff070372e326bd1b078f3eb62fa57521894c0cf2a97c9620dfd6dd4471379603c4d4cc039596bef22b3cbead4625ac699150037f24cca07ea5712b5
-
SSDEEP
768:xq9I28107t5INJovOUXoCByrE4BdMK0aRRaUW78uqv32p/1H5zXdnhfXaXdnh:xqKpcToSEEXK0a6U7uqP2LLO
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jdopjh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pmeoqlpl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pdqcenmg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bclppboi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bedbhi32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hkaeih32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pfeijqqe.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Afnlpohj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bclppboi.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bedbhi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Aiabhj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bcicjbal.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kdpiqehp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lajokiaa.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pmjhlklg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qkfkng32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Amkabind.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Iajmmm32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Napameoi.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oheienli.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pmeoqlpl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mcabej32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pdqcenmg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qkdohg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qkfkng32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bcicjbal.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kdpiqehp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bfoegm32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 122dc58c9f7049c24f48d321b41e4fa4fbce762cb59ea5cc342f135010820f68.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iajmmm32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ofbdncaj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lajokiaa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nefdbekh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pmjhlklg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bfoegm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cplckbmc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" 122dc58c9f7049c24f48d321b41e4fa4fbce762cb59ea5cc342f135010820f68.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jdopjh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kdhbpf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lddble32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lamlphoo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mojopk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ofbdncaj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Odgqopeb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ijbbfc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lddble32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nfpghccm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Oheienli.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Afnlpohj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nefdbekh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Napameoi.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qkdohg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dfonnk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hkaeih32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aiabhj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cplckbmc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kdhbpf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mojopk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Odgqopeb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lamlphoo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nfpghccm.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ijbbfc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mcabej32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pfeijqqe.exe -
Executes dropped EXE 32 IoCs
pid Process 2408 Hkaeih32.exe 2716 Iajmmm32.exe 768 Ijbbfc32.exe 1252 Jdopjh32.exe 3836 Kdhbpf32.exe 4012 Kdpiqehp.exe 1776 Lddble32.exe 872 Lajokiaa.exe 1344 Lamlphoo.exe 224 Mcabej32.exe 5052 Mojopk32.exe 876 Nefdbekh.exe 1380 Napameoi.exe 3180 Nfpghccm.exe 3308 Ofbdncaj.exe 5040 Odgqopeb.exe 852 Oheienli.exe 4952 Pmeoqlpl.exe 4352 Pdqcenmg.exe 3396 Pmjhlklg.exe 3284 Pfeijqqe.exe 652 Qkdohg32.exe 4420 Qkfkng32.exe 2564 Afnlpohj.exe 4516 Amkabind.exe 3624 Aiabhj32.exe 1996 Bcicjbal.exe 1108 Bfoegm32.exe 1168 Bedbhi32.exe 5160 Cplckbmc.exe 5216 Dfonnk32.exe 5276 Dbkhnk32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\Kdpiqehp.exe Kdhbpf32.exe File opened for modification C:\Windows\SysWOW64\Pdqcenmg.exe Pmeoqlpl.exe File created C:\Windows\SysWOW64\Qkdohg32.exe Pfeijqqe.exe File created C:\Windows\SysWOW64\Amkabind.exe Afnlpohj.exe File opened for modification C:\Windows\SysWOW64\Hkaeih32.exe 122dc58c9f7049c24f48d321b41e4fa4fbce762cb59ea5cc342f135010820f68.exe File created C:\Windows\SysWOW64\Iajmmm32.exe Hkaeih32.exe File created C:\Windows\SysWOW64\Dbnefjjd.dll Ijbbfc32.exe File opened for modification C:\Windows\SysWOW64\Dbkhnk32.exe Dfonnk32.exe File opened for modification C:\Windows\SysWOW64\Qkfkng32.exe Qkdohg32.exe File created C:\Windows\SysWOW64\Aknmjgje.dll Qkfkng32.exe File created C:\Windows\SysWOW64\Agdghm32.dll Bclppboi.exe File opened for modification C:\Windows\SysWOW64\Kdhbpf32.exe Jdopjh32.exe File created C:\Windows\SysWOW64\Ndnoffic.dll Jdopjh32.exe File created C:\Windows\SysWOW64\Afnlpohj.exe Qkfkng32.exe File created C:\Windows\SysWOW64\Efiopa32.dll Bfoegm32.exe File created C:\Windows\SysWOW64\Naefjl32.dll Dfonnk32.exe File created C:\Windows\SysWOW64\Bmaoca32.dll 122dc58c9f7049c24f48d321b41e4fa4fbce762cb59ea5cc342f135010820f68.exe File created C:\Windows\SysWOW64\Bllolf32.dll Nfpghccm.exe File opened for modification C:\Windows\SysWOW64\Odgqopeb.exe Ofbdncaj.exe File opened for modification C:\Windows\SysWOW64\Pmjhlklg.exe Pdqcenmg.exe File created C:\Windows\SysWOW64\Cogcho32.dll Pdqcenmg.exe File created C:\Windows\SysWOW64\Hkaeih32.exe 122dc58c9f7049c24f48d321b41e4fa4fbce762cb59ea5cc342f135010820f68.exe File created C:\Windows\SysWOW64\Iagpbgig.dll Lamlphoo.exe File opened for modification C:\Windows\SysWOW64\Napameoi.exe Nefdbekh.exe File created C:\Windows\SysWOW64\Ofbdncaj.exe Nfpghccm.exe File created C:\Windows\SysWOW64\Cplckbmc.exe Bedbhi32.exe File opened for modification C:\Windows\SysWOW64\Lddble32.exe Kdpiqehp.exe File created C:\Windows\SysWOW64\Hbfhni32.dll Lddble32.exe File created C:\Windows\SysWOW64\Nfpghccm.exe Napameoi.exe File opened for modification C:\Windows\SysWOW64\Cplckbmc.exe Bedbhi32.exe File created C:\Windows\SysWOW64\Adlafb32.dll Cplckbmc.exe File created C:\Windows\SysWOW64\Mojopk32.exe Mcabej32.exe File opened for modification C:\Windows\SysWOW64\Mojopk32.exe Mcabej32.exe File opened for modification C:\Windows\SysWOW64\Aiabhj32.exe Amkabind.exe File opened for modification C:\Windows\SysWOW64\Ofbdncaj.exe Nfpghccm.exe File created C:\Windows\SysWOW64\Iilpao32.dll Qkdohg32.exe File opened for modification C:\Windows\SysWOW64\Bcicjbal.exe Aiabhj32.exe File created C:\Windows\SysWOW64\Bedbhi32.exe Bfoegm32.exe File created C:\Windows\SysWOW64\Lfijgnnj.dll Bedbhi32.exe File opened for modification C:\Windows\SysWOW64\Ijbbfc32.exe Iajmmm32.exe File opened for modification C:\Windows\SysWOW64\Kdpiqehp.exe Kdhbpf32.exe File created C:\Windows\SysWOW64\Oimlepla.dll Mojopk32.exe File created C:\Windows\SysWOW64\Dbkhnk32.exe Dfonnk32.exe File opened for modification C:\Windows\SysWOW64\Bedbhi32.exe Bfoegm32.exe File created C:\Windows\SysWOW64\Dfonnk32.exe Cplckbmc.exe File created C:\Windows\SysWOW64\Napameoi.exe Nefdbekh.exe File opened for modification C:\Windows\SysWOW64\Pmeoqlpl.exe Oheienli.exe File created C:\Windows\SysWOW64\Aiabhj32.exe Amkabind.exe File created C:\Windows\SysWOW64\Kdhbpf32.exe Jdopjh32.exe File opened for modification C:\Windows\SysWOW64\Nefdbekh.exe Mojopk32.exe File opened for modification C:\Windows\SysWOW64\Nfpghccm.exe Napameoi.exe File created C:\Windows\SysWOW64\Odgqopeb.exe Ofbdncaj.exe File created C:\Windows\SysWOW64\Odpldj32.dll Ofbdncaj.exe File created C:\Windows\SysWOW64\Ijbbfc32.exe Iajmmm32.exe File created C:\Windows\SysWOW64\Jdopjh32.exe Ijbbfc32.exe File opened for modification C:\Windows\SysWOW64\Jdopjh32.exe Ijbbfc32.exe File created C:\Windows\SysWOW64\Odlpkg32.dll Pmjhlklg.exe File opened for modification C:\Windows\SysWOW64\Afnlpohj.exe Qkfkng32.exe File opened for modification C:\Windows\SysWOW64\Amkabind.exe Afnlpohj.exe File opened for modification C:\Windows\SysWOW64\Oheienli.exe Odgqopeb.exe File created C:\Windows\SysWOW64\Pmeoqlpl.exe Oheienli.exe File created C:\Windows\SysWOW64\Gkhikf32.dll Pmeoqlpl.exe File created C:\Windows\SysWOW64\Pfeijqqe.exe Pmjhlklg.exe File created C:\Windows\SysWOW64\Dbooabbb.dll Pfeijqqe.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 5416 5276 WerFault.exe 135 -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nefdbekh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Aiabhj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bfoegm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kncgmcgd.dll" Odgqopeb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lajokiaa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bclppboi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lamlphoo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mcabej32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Amkabind.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gpgfeb32.dll" Bcicjbal.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Naefjl32.dll" Dfonnk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qbddhbhn.dll" Iajmmm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lajokiaa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lamlphoo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Iilpao32.dll" Qkdohg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node 122dc58c9f7049c24f48d321b41e4fa4fbce762cb59ea5cc342f135010820f68.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Iagpbgig.dll" Lamlphoo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pdqcenmg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pdqcenmg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pfeijqqe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Napameoi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nfpghccm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Napameoi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oahmla32.dll" Afnlpohj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mcabej32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mojopk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kdpiqehp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dbooabbb.dll" Pfeijqqe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} 122dc58c9f7049c24f48d321b41e4fa4fbce762cb59ea5cc342f135010820f68.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Epqblnhh.dll" Kdhbpf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Aiabhj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Afnlpohj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bclppboi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 122dc58c9f7049c24f48d321b41e4fa4fbce762cb59ea5cc342f135010820f68.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID 122dc58c9f7049c24f48d321b41e4fa4fbce762cb59ea5cc342f135010820f68.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ijbbfc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oimlepla.dll" Mojopk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pfeijqqe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Qkdohg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jdopjh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lddble32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lddble32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pmjhlklg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Qkdohg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bcicjbal.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ijbbfc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bllolf32.dll" Nfpghccm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ofbdncaj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hmjmqdci.dll" Aiabhj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Agdghm32.dll" Bclppboi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dfonnk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kdpiqehp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Odgqopeb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Odlpkg32.dll" Pmjhlklg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aknmjgje.dll" Qkfkng32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hkaeih32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bfoegm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dfonnk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lkafdjmc.dll" Amkabind.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bcicjbal.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nefdbekh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ofbdncaj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Iajmmm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hbfhni32.dll" Lddble32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1744 wrote to memory of 2408 1744 122dc58c9f7049c24f48d321b41e4fa4fbce762cb59ea5cc342f135010820f68.exe 99 PID 1744 wrote to memory of 2408 1744 122dc58c9f7049c24f48d321b41e4fa4fbce762cb59ea5cc342f135010820f68.exe 99 PID 1744 wrote to memory of 2408 1744 122dc58c9f7049c24f48d321b41e4fa4fbce762cb59ea5cc342f135010820f68.exe 99 PID 2408 wrote to memory of 2716 2408 Hkaeih32.exe 100 PID 2408 wrote to memory of 2716 2408 Hkaeih32.exe 100 PID 2408 wrote to memory of 2716 2408 Hkaeih32.exe 100 PID 2716 wrote to memory of 768 2716 Iajmmm32.exe 101 PID 2716 wrote to memory of 768 2716 Iajmmm32.exe 101 PID 2716 wrote to memory of 768 2716 Iajmmm32.exe 101 PID 768 wrote to memory of 1252 768 Ijbbfc32.exe 102 PID 768 wrote to memory of 1252 768 Ijbbfc32.exe 102 PID 768 wrote to memory of 1252 768 Ijbbfc32.exe 102 PID 1252 wrote to memory of 3836 1252 Jdopjh32.exe 103 PID 1252 wrote to memory of 3836 1252 Jdopjh32.exe 103 PID 1252 wrote to memory of 3836 1252 Jdopjh32.exe 103 PID 3836 wrote to memory of 4012 3836 Kdhbpf32.exe 104 PID 3836 wrote to memory of 4012 3836 Kdhbpf32.exe 104 PID 3836 wrote to memory of 4012 3836 Kdhbpf32.exe 104 PID 4012 wrote to memory of 1776 4012 Kdpiqehp.exe 105 PID 4012 wrote to memory of 1776 4012 Kdpiqehp.exe 105 PID 4012 wrote to memory of 1776 4012 Kdpiqehp.exe 105 PID 1776 wrote to memory of 872 1776 Lddble32.exe 106 PID 1776 wrote to memory of 872 1776 Lddble32.exe 106 PID 1776 wrote to memory of 872 1776 Lddble32.exe 106 PID 872 wrote to memory of 1344 872 Lajokiaa.exe 107 PID 872 wrote to memory of 1344 872 Lajokiaa.exe 107 PID 872 wrote to memory of 1344 872 Lajokiaa.exe 107 PID 1344 wrote to memory of 224 1344 Lamlphoo.exe 108 PID 1344 wrote to memory of 224 1344 Lamlphoo.exe 108 PID 1344 wrote to memory of 224 1344 Lamlphoo.exe 108 PID 224 wrote to memory of 5052 224 Mcabej32.exe 109 PID 224 wrote to memory of 5052 224 Mcabej32.exe 109 PID 224 wrote to memory of 5052 224 Mcabej32.exe 109 PID 5052 wrote to memory of 876 5052 Mojopk32.exe 110 PID 5052 wrote to memory of 876 5052 Mojopk32.exe 110 PID 5052 wrote to memory of 876 5052 Mojopk32.exe 110 PID 876 wrote to memory of 1380 876 Nefdbekh.exe 111 PID 876 wrote to memory of 1380 876 Nefdbekh.exe 111 PID 876 wrote to memory of 1380 876 Nefdbekh.exe 111 PID 1380 wrote to memory of 3180 1380 Napameoi.exe 113 PID 1380 wrote to memory of 3180 1380 Napameoi.exe 113 PID 1380 wrote to memory of 3180 1380 Napameoi.exe 113 PID 3180 wrote to memory of 3308 3180 Nfpghccm.exe 114 PID 3180 wrote to memory of 3308 3180 Nfpghccm.exe 114 PID 3180 wrote to memory of 3308 3180 Nfpghccm.exe 114 PID 3308 wrote to memory of 5040 3308 Ofbdncaj.exe 115 PID 3308 wrote to memory of 5040 3308 Ofbdncaj.exe 115 PID 3308 wrote to memory of 5040 3308 Ofbdncaj.exe 115 PID 5040 wrote to memory of 852 5040 Odgqopeb.exe 116 PID 5040 wrote to memory of 852 5040 Odgqopeb.exe 116 PID 5040 wrote to memory of 852 5040 Odgqopeb.exe 116 PID 852 wrote to memory of 4952 852 Oheienli.exe 117 PID 852 wrote to memory of 4952 852 Oheienli.exe 117 PID 852 wrote to memory of 4952 852 Oheienli.exe 117 PID 4952 wrote to memory of 4352 4952 Pmeoqlpl.exe 118 PID 4952 wrote to memory of 4352 4952 Pmeoqlpl.exe 118 PID 4952 wrote to memory of 4352 4952 Pmeoqlpl.exe 118 PID 4352 wrote to memory of 3396 4352 Pdqcenmg.exe 119 PID 4352 wrote to memory of 3396 4352 Pdqcenmg.exe 119 PID 4352 wrote to memory of 3396 4352 Pdqcenmg.exe 119 PID 3396 wrote to memory of 3284 3396 Pmjhlklg.exe 120 PID 3396 wrote to memory of 3284 3396 Pmjhlklg.exe 120 PID 3396 wrote to memory of 3284 3396 Pmjhlklg.exe 120 PID 3284 wrote to memory of 652 3284 Pfeijqqe.exe 121
Processes
-
C:\Users\Admin\AppData\Local\Temp\122dc58c9f7049c24f48d321b41e4fa4fbce762cb59ea5cc342f135010820f68.exe"C:\Users\Admin\AppData\Local\Temp\122dc58c9f7049c24f48d321b41e4fa4fbce762cb59ea5cc342f135010820f68.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Windows\SysWOW64\Hkaeih32.exeC:\Windows\system32\Hkaeih32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Windows\SysWOW64\Iajmmm32.exeC:\Windows\system32\Iajmmm32.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\SysWOW64\Ijbbfc32.exeC:\Windows\system32\Ijbbfc32.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:768 -
C:\Windows\SysWOW64\Jdopjh32.exeC:\Windows\system32\Jdopjh32.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Windows\SysWOW64\Kdhbpf32.exeC:\Windows\system32\Kdhbpf32.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3836 -
C:\Windows\SysWOW64\Kdpiqehp.exeC:\Windows\system32\Kdpiqehp.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4012 -
C:\Windows\SysWOW64\Lddble32.exeC:\Windows\system32\Lddble32.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Windows\SysWOW64\Lajokiaa.exeC:\Windows\system32\Lajokiaa.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:872 -
C:\Windows\SysWOW64\Lamlphoo.exeC:\Windows\system32\Lamlphoo.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Windows\SysWOW64\Mcabej32.exeC:\Windows\system32\Mcabej32.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Windows\SysWOW64\Mojopk32.exeC:\Windows\system32\Mojopk32.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Windows\SysWOW64\Nefdbekh.exeC:\Windows\system32\Nefdbekh.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:876 -
C:\Windows\SysWOW64\Napameoi.exeC:\Windows\system32\Napameoi.exe14⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Windows\SysWOW64\Nfpghccm.exeC:\Windows\system32\Nfpghccm.exe15⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3180 -
C:\Windows\SysWOW64\Ofbdncaj.exeC:\Windows\system32\Ofbdncaj.exe16⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3308 -
C:\Windows\SysWOW64\Odgqopeb.exeC:\Windows\system32\Odgqopeb.exe17⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\Windows\SysWOW64\Oheienli.exeC:\Windows\system32\Oheienli.exe18⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Windows\SysWOW64\Pmeoqlpl.exeC:\Windows\system32\Pmeoqlpl.exe19⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Windows\SysWOW64\Pdqcenmg.exeC:\Windows\system32\Pdqcenmg.exe20⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4352 -
C:\Windows\SysWOW64\Pmjhlklg.exeC:\Windows\system32\Pmjhlklg.exe21⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3396 -
C:\Windows\SysWOW64\Pfeijqqe.exeC:\Windows\system32\Pfeijqqe.exe22⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3284 -
C:\Windows\SysWOW64\Qkdohg32.exeC:\Windows\system32\Qkdohg32.exe23⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:652 -
C:\Windows\SysWOW64\Qkfkng32.exeC:\Windows\system32\Qkfkng32.exe24⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:4420 -
C:\Windows\SysWOW64\Afnlpohj.exeC:\Windows\system32\Afnlpohj.exe25⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2564 -
C:\Windows\SysWOW64\Amkabind.exeC:\Windows\system32\Amkabind.exe26⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:4516 -
C:\Windows\SysWOW64\Aiabhj32.exeC:\Windows\system32\Aiabhj32.exe27⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:3624 -
C:\Windows\SysWOW64\Bcicjbal.exeC:\Windows\system32\Bcicjbal.exe28⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:1996 -
C:\Windows\SysWOW64\Bclppboi.exeC:\Windows\system32\Bclppboi.exe29⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:2360 -
C:\Windows\SysWOW64\Bfoegm32.exeC:\Windows\system32\Bfoegm32.exe30⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1108 -
C:\Windows\SysWOW64\Bedbhi32.exeC:\Windows\system32\Bedbhi32.exe31⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:1168 -
C:\Windows\SysWOW64\Cplckbmc.exeC:\Windows\system32\Cplckbmc.exe32⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:5160 -
C:\Windows\SysWOW64\Dfonnk32.exeC:\Windows\system32\Dfonnk32.exe33⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:5216 -
C:\Windows\SysWOW64\Dbkhnk32.exeC:\Windows\system32\Dbkhnk32.exe34⤵
- Executes dropped EXE
PID:5276 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5276 -s 40035⤵
- Program crash
PID:5416
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 5276 -ip 52761⤵PID:5328
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1340 --field-trial-handle=2356,i,13261194862334667799,7441241219475888176,262144 --variations-seed-version /prefetch:81⤵PID:5676
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
59KB
MD581e142ffd4ec28683021bb55e36bb510
SHA189592de4b27b541a6f1fe1a08cbaa35d2a35c488
SHA256b6805d618666fa5ea0a3c4a5b107ce9e1845f5f8064fbc1789e871e0fb3157c5
SHA512660244475d9f3746fa78a7a507afa3600688ce846c7ad58e2c18c9bce1cbdfc494235233c99e4c4e322ea1a19ea7fda9f00abce44b0d18bd2429ce9cf1183ce2
-
Filesize
59KB
MD53e9dc39622c30ddc4994821ed3a7ff2a
SHA121e602d1f0a5446cfaff6d9891a5ed36ebc4dca3
SHA2563f2d5c4ad6d337a00fbcb162e8b3176517271295aa8842566e3ffc35f8556c59
SHA512813980632ed2f5463af130a450c6b4601da82611078c733b75495c0456c14da4537735f20665db3a8d1ef141be77108f2a5d40362b42f0dd32bc06c6804d7a3e
-
Filesize
59KB
MD59c28728fe04cc45b7a1ee38333c365dd
SHA151815d4fc5af9491519fd3699e564731436a8102
SHA256ca7e16405e618c07047f843392ec075aec1b34d5cc8c44b9f4ceefc2e4a37215
SHA5122fdd7924f248a2486a47c4e78a53afeaf3faf6bc35913858945576c32cdfe73abde2bce228bab820a8feced3021980adeadf56d4037d9023e60e797e62bae7a1
-
Filesize
59KB
MD52af893c445792d60be4386ac398b0daf
SHA14173ddd27d0b0d35bb559529f2c9cf95e6a22cd9
SHA256ec2363fc82a04240705061bb930468b4246d8c3c596ba94c27c64afce405a30f
SHA5129793105a59238b2f3551eff36070a9b547f68783df9c7943a5428648568e3d916064d48622c77bf730ae4b3df23e834f7e956048cd8478d48fdfa090a2f6029d
-
Filesize
59KB
MD5535ebc03c324bf6398e48889d40ad6f9
SHA14c978e27cc3295f90400fd7f0e8dfd27b1894b89
SHA2562258d350a7597759fd75f58d9f533407e36a1664dd84778334ea926bb9dfc1f2
SHA5122eed47cef187c59aebc2be8801ad6a5788821c918257775b2a62190a4d5b133d9fd957271c05643d96395a1c25456aaac796d1175bce7368db20707b9e2fc895
-
Filesize
59KB
MD5349a9fb327ca0d0717dfb7117aa9d0e8
SHA1a17bdad2ff33d4833975835f73b2adab92157f68
SHA256886459b15f03c3f3d09e52fdc098c409d8109eefb389cd3da3fcfb40d52c2e6b
SHA5120102c34fbaf90a7bfecff17f20c6e735e95efbb08c59f1548f22ee8e02c13b239928ff2aaf49dee763361acb1e6c85aadebf8b712b83b0ac132143c19f47df4c
-
Filesize
59KB
MD5670e4265525c9f76cb37846a8f9d9c1c
SHA1c346d0824f33e313f93a2ce0b4c73f066893ee34
SHA256f192f56d0ca259aa59059dc4138cfc1bc826515fcf8e639039c891e08896c0b7
SHA5122f38b5bb66c8c5aa3bfc1f989e567e83aef91104d71fb68de98828b403f0ea0c87ce0e04550d6bb0c72586614e0c606b5fe58e9c84c92718e9e72e63703e1016
-
Filesize
59KB
MD571854cbc5c304764cebf1f3569c991d9
SHA1e33577ae45b1e2f2d2992b5109739d1c0dd8738f
SHA256f8af580a7530912cbbd4ab463c3f99c5927b3f827ea6657903f4c704d18e612a
SHA512097c4fcaa5fe39f543a7d918464afc83cd778cda0386bcb8b5b16fe67ad81c8aa76e9edfaadadfa4eb0b4174535688c5bc0237261e99e8417384cfc24c9372ea
-
Filesize
59KB
MD55bb355b3f67706c59a09f58512979c10
SHA13f6147dce9f39c81a7d502392ebe952fcf5fd992
SHA2565092a9f09fb58fe26bd88edb305752ce7ef50e039c0eebb8075a869066351e0d
SHA5128f66f72319199902f57a8e581efd71ed478a1daa60ea8587e381582594c06715e24ddc2c0c83e08ff1d17c35ebaf5415a0017be74b47aafae5729628595c8d62
-
Filesize
59KB
MD56b6c29982867d06e3ddeb424048459dd
SHA1828958dceb4fab7a26c6fa4c47fea1339a5b693f
SHA256a2b3d54ab11532086518e8f35d678c8dfc339a03168c49460c9be89633c813b0
SHA51283fd19386a1743cad9fba7a21b0a4ccadfb4bb597a92c5f2a589e9945ed1b68163b42ce5458ba92812c95cc7abda40d4024058dbc90bfefaf5b233e912ddbbe4
-
Filesize
59KB
MD5f0d27270708b753f0e28acec70b61be0
SHA117e1ac198a213da270dd99a42a8ef1df37320257
SHA256c7d9688a1e78847aaade20f3fd7234766ff8148512b72f8c08da4af963d35b34
SHA5123e90b1ac6273b8470eb5c096912efaa277bdc31c5af426cdd15087975330f64fc2f6d83c953180d25c91f4363e553821add61bbf43662c59d7b7deb0b9c5a074
-
Filesize
59KB
MD5c2a9dbd11b5d422d2e3c06aa5a4e26f2
SHA14bf1a9c9c6e37e077b52d74389b601b2c887acce
SHA256c921271cad74ee4f120eb37bffd98a945a159c89e507646182c15c12aad84fa5
SHA5128cf714a9c1687dc0fbbed1a34df9682028299a66dadbc5574e9ad971dfe4e7d76d97c92fc3c7e195c69d509f93bd1329c8dc2fb1805341ab7496923a2b32b21a
-
Filesize
59KB
MD5d88ffafa92282345342e2b478312bd4f
SHA123b402e5509b3f47cbdfd0bebdfc76c2e584996d
SHA256601ac2776e3de3aac6edd661d2d5e18f78ba5dd5db62873b959fa9b1828136cc
SHA512a07e3c9d257a20f03804bf12d85a29afa897bc8c2d6f067dce9af525e812177ddbce9eabcb1001b2d48b0db09c9179f14284b532cab49bdd28333f6a0e55f510
-
Filesize
59KB
MD5e90f6b1d8245445de8e142f3e7b4fe62
SHA11a6c57c9d185958eef903163ea77c91e58398118
SHA25642ca816d70f4fa444bfe78b7e0267f16d26b68db41b7c0e462e93037cd006618
SHA512b11a32a3e2fe7c52b6baa1651e1f2e827bcb51dce268ba9c73e1d187e838df63cdd1d31fcb364a2bb42b3793ba267b777f71257ae84a0651f47c49049fe7c7f6
-
Filesize
59KB
MD5705e008c052578cf382723b5864740d2
SHA1f47dba8890ef8a24cc27e2152be3ec2ea6f7aa98
SHA256bc426338a67459b9e44e0c6f6ca3fea6f874a181a8332709ea1269760426704a
SHA51296ee29fb238b87a35679adddeafd5041f11a681d40b865094bd7d157e833eea876423abd9f4d563079ae35447d12fe9b3789412ed7524d42d1ccd3a6d953a49b
-
Filesize
59KB
MD5c000e20b00427d39b4448c12ae86b6f9
SHA168e65e8a0a040bdfb2586ddcd48bea1c6acff544
SHA2560d9987d8056fcdfc115020dff8187892ef6a66302f2e0d49080a30236d71e1b3
SHA512a8f36b347e1f9724be19c505a9dacbd8ed9cf16b5cae184eee5bd361df97fc90fc4deddc3a7495d4fec2eab9a883d4f9d3a315bae6762b692d518c39e52a6695
-
Filesize
59KB
MD58c423a13cf196613dd36500e1f393cfb
SHA188ed81c83b890fa7d3d0285ac8fd8b2d57b038aa
SHA256a52dde0f0ab8e6639fb8ae76bd3cc837f334e00e009c86f5f83574b703261642
SHA5129216e2cf8a21cb3f8aa897f5da06fe15dc7aefef736ee3fabf403a0f61734224021b059f0308c144a1cf426a779d1b9b2d8467a5fc70da126ffff3d6227282b7
-
Filesize
59KB
MD51d2edf0b8bba656451cdfa45a24961a2
SHA1d2bea33642447bdba866c65ea68a0ffdd29c5ba2
SHA256ec97e7064fc21ed712bfa65e5f662b3193571c858b99baa173589b37f6f62f75
SHA512be34a711161c9108da216f8f2714b4b8bf529543e93775759a6a102db85f34fcece01aaef38ca7956a88302572f1f7f9905dee233d422a0c500f41406d7df5fd
-
Filesize
59KB
MD5528d0358a8baf48156ea03b0616eb555
SHA1f4a790fddf30d383e68fd98b006ca8cf7b6ab3b4
SHA25633922c28e107e50fbc79c3cbdc9fcd436e42e6042970a36e8e72b1488f2f6704
SHA5121f8e55a0292b5d1659bee05c4a7f3a5004974a5ff84efff7fbfa6ef0a626805654f3ca82969d81eb33e122c382f0030a0a1031027bc37466238e6e6e73fa81ad
-
Filesize
59KB
MD55d3405c8e51993269e4cc5b75b62b213
SHA1287704afa9024be880ff98a32ad61d21fa1d4092
SHA2560d874137c0c316a39d9c3c115a3126bead7c4c381dbc1071fcf06055b3d90094
SHA51293abe38b7c6f288a579d35bcaa17bb804b65c556648172aea8428c596505e734deaeddb74e6fe29d723774b40141ab50ed4283bb8945d82461f04130d5a50707
-
Filesize
59KB
MD50bc725135eca464090e9013f83c565c9
SHA17775119b4fc881546616d9e28ba9795aa8ff9a3a
SHA256bf128b23d15b1e103ea12084d406bab482522e01c4ec93bee907b3f1c502730b
SHA512535a7157f123ff2801f799537f9ceb9629a99e6a2d7177226c052209261b44045675cdd1935413c645ca6b2fef8a8e069569bf6f6c8d2e8ffc54c0b04722a0ad
-
Filesize
59KB
MD56f5a2e30f0aa8b02b04344178d0c314f
SHA1b856c59b1b2d906909096eeb8cd91931e1dff6df
SHA256cb1b4a5ab4101f6115249968e3208076ea5d75dc3776775331fa86d227ee0e95
SHA5125376143601b47ae217c149b7e27708ed647e4adba487a61e5a28a5d2944474263e9899fe008648951deb427741578cb2f637253df284d69eee5e7d4b9190eee2
-
Filesize
59KB
MD522b307ab3d026c88f733474313284d70
SHA1b9e92ad6af3de7265bb59424705757359e78382b
SHA256c22de53897f6906b570433546ccefc012e1cf1d022d522c2b2b5bb195c8200cb
SHA512a7feca22519b92db40d3177c1c7717acf0322b8a2f9a5fd05cb1fce0f0af4cb48cae8b31db387013f5fbc0b629685ad62253593abf9b4e41744ce9e124ca6cd1
-
Filesize
59KB
MD597c32f2e85fa8475992e4159a9715c5c
SHA12c2277f204fe1f493720a1527f0bb9bae227ab12
SHA256b6175b7cc934d7485652ddb32c977ba718d716c3befac5be572031771a87997f
SHA512de6fd00fff5df10e14593edf288e516d793da7eda8246447b4259db5074e560d80b4af8638155d9fe14c7fe982c27ac04b12a0fc27049a2b9159976996b1b5a3
-
Filesize
59KB
MD5d3c60db49212e9c756417e2fd9c65c22
SHA1c2ccc85a6c06180a22f5306b40237d9985fc0684
SHA256f52c32b149040656ddb9cfaebeb06c6c6961d684f7283bddfa4483890d310664
SHA512c2015e8ade99e2b6bf6a4d236a7661cc942a66469d02fce5efc73780589e957a700b0eaaec6f7a80cc430c2dcb04dc9db5f2a014f459a36b83a298d013ddc3b4
-
Filesize
59KB
MD58fc3fc59bf03cf454884424a45c313f8
SHA1482a4bf416c10baaea3aac1a992b69f8d92f7665
SHA25635cff5894d4f0d163c7524ffbf1d8a142d78a7c23b19281f210bb53688c52fb0
SHA512b1baa5c8b7f0889a5dc0e5a566187e246f4977c7dce87917d791e745652b5a2c60d18cc532defad7a724fa965016e1f8a889072d67e65434a7b2b0ae74bbeb86
-
Filesize
59KB
MD59d3182b16d751485ca06c1d2ebf6a4ed
SHA1c56205410ddd5c6cf011c5d4da53e35a6004b16e
SHA256e89904a7b47bbdd0fca8207facfd750e7b45189d3c0c926a35b7a1064909619b
SHA5127752cf159b446ffa967bd3da4a6069c78d3b4c8dc0454f9be3eaf2b150df0485b7ebdc7461743aee6eb46f0d451855b96ebce7992721baaffb524aeca138e8d9
-
Filesize
59KB
MD56acd4fd37a2baa281cf08cd2f31608db
SHA1ddbae6b9af454bdd488df769f517ef1397df1481
SHA256938bdc24e417d424cd8f57a416712994377c722ea5b4be235fee95eb9c906d10
SHA512b5623173a0d213dd4ef374055cb4c1cb73a67795223a7d33a04866499fe7fe825055a69e00cdd524f80c13c5c939224014d43385d6c9373e13e6894086846bd7
-
Filesize
59KB
MD5fa2f14562c30616376415bf611cbcc05
SHA192256f01a2ffe8b5e7c81447e112fe3ee2618e3b
SHA2560ef94d8a7b41ae4cdddf5fa1ad01913776e83f089aff5618dc63f6adfcbdd518
SHA512202b0959137dc9d39877ddeb9b97ab5d744b807b27160a472078e2dfa78fd402041eefe97a343252ad6e8d2ee86bc515f6d0ba050c677330bfdc235a1550f5f2
-
Filesize
59KB
MD56da7a41c081cf5d24276a1714e616ddc
SHA1f3441864a9945c28c737da017c15b5b6cbc6adfb
SHA256761793aa7fa7baec85a9ec4edeca88445eeb513ee825f8657ae5ebf882e01fc8
SHA5126699c46298e0cc76350c37cedf98b8eed6407287cdb5df01691b911f5ad38dc3acf8892f804736b284f66b1300b4d5819603b005c3b782e767ff9eded4bd3c51
-
Filesize
59KB
MD59d6d4da926dac9284b118c6296b717eb
SHA190001690f29e37c7b1070cb9a4bc0d6a758849ca
SHA256a1294979fc20e9b49512a2af41e787bb3f4e6c269bda5ada32f81be7363cfab9
SHA512d431c5516b3cb95dc541d14b4102616a48546e6cd8d9fe3e9bdd7714d9827ecea2eef09ac2fbdfd074d2fb157fd8a131efdd462c5957f8c51bcbd6eff65d7a3d
-
Filesize
59KB
MD58447787bbe30f9a6ce81c14e92ff4f54
SHA1fdd3900ea6a024e1c7635d563739c5c637707766
SHA256f0364278e5299086b2c42246f38602d44fd00df9d6f3b0bcd9ca9042f9425c0c
SHA512ee381c202234bec075280078ca34ace7043325033a03efeed9be16bf00ac202e293bed27629cfbda841e0ddd3e6d61b08d7a262b407921ba18e529d740e0b471