Analysis
-
max time kernel
90s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29-03-2024 18:34
Static task
static1
Behavioral task
behavioral1
Sample
1b16b0fb02841dfe0aa422cd7164c094a578ff78d5a2f1ab448c9e6c339b83da.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1b16b0fb02841dfe0aa422cd7164c094a578ff78d5a2f1ab448c9e6c339b83da.exe
Resource
win10v2004-20231215-en
General
-
Target
1b16b0fb02841dfe0aa422cd7164c094a578ff78d5a2f1ab448c9e6c339b83da.exe
-
Size
45KB
-
MD5
d339ccbfe37f99005c9ce64a9180fdcd
-
SHA1
679e015800243444bf6e2cb3ae7d7c77df215cbb
-
SHA256
1b16b0fb02841dfe0aa422cd7164c094a578ff78d5a2f1ab448c9e6c339b83da
-
SHA512
d531d6f416899a81de717bd87317dee0da792dd8c5fc765cbe5ab2d379a65b7a9561fe4beebc3e34d27e60cbe818499b768c55094bd55fd8b4c5e9304b1a9a5d
-
SSDEEP
768:H9SmvG3OIMdSZ74PHM08QK2d+SKAtUUhy92Mf4DRPNvUP/1H5a:H9SzOIMQU98QK28SntUUHI4DrYQ
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 48 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mcbahlip.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ngpjnkpf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ngcgcjnc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Maaepd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Maaepd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mkgmcjld.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mcbahlip.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nkjjij32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nqklmpdd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nqmhbpba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mkepnjng.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Maohkd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ngedij32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nqmhbpba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mcnhmm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ngcgcjnc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Njljefql.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nacbfdao.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nnjbke32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nnjbke32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nqiogp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nkncdifl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mcnhmm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nkjjij32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ndbnboqb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mkepnjng.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mpdelajl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ngedij32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nnolfdcn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mdmegp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nacbfdao.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ngpjnkpf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nkncdifl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nnmopdep.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ndidbn32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 1b16b0fb02841dfe0aa422cd7164c094a578ff78d5a2f1ab448c9e6c339b83da.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Maohkd32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mkgmcjld.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mpdelajl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Njljefql.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ndbnboqb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nqiogp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nnmopdep.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" 1b16b0fb02841dfe0aa422cd7164c094a578ff78d5a2f1ab448c9e6c339b83da.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mdmegp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ndidbn32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nqklmpdd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nnolfdcn.exe -
Executes dropped EXE 24 IoCs
pid Process 2008 Mcnhmm32.exe 488 Mkepnjng.exe 1088 Maohkd32.exe 3264 Mdmegp32.exe 1616 Mkgmcjld.exe 1964 Maaepd32.exe 2108 Mpdelajl.exe 2232 Mcbahlip.exe 384 Nkjjij32.exe 2032 Njljefql.exe 1244 Nacbfdao.exe 1584 Ndbnboqb.exe 3380 Ngpjnkpf.exe 2272 Nnjbke32.exe 4968 Nqiogp32.exe 4616 Ngcgcjnc.exe 4424 Nkncdifl.exe 4848 Nnmopdep.exe 4896 Nqklmpdd.exe 436 Ngedij32.exe 3292 Nnolfdcn.exe 372 Nqmhbpba.exe 3004 Ndidbn32.exe 116 Nkcmohbg.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Mkepnjng.exe Mcnhmm32.exe File created C:\Windows\SysWOW64\Mcnhmm32.exe 1b16b0fb02841dfe0aa422cd7164c094a578ff78d5a2f1ab448c9e6c339b83da.exe File created C:\Windows\SysWOW64\Mpdelajl.exe Maaepd32.exe File created C:\Windows\SysWOW64\Mdmegp32.exe Maohkd32.exe File created C:\Windows\SysWOW64\Mkgmcjld.exe Mdmegp32.exe File opened for modification C:\Windows\SysWOW64\Njljefql.exe Nkjjij32.exe File created C:\Windows\SysWOW64\Nqklmpdd.exe Nnmopdep.exe File opened for modification C:\Windows\SysWOW64\Nnolfdcn.exe Ngedij32.exe File created C:\Windows\SysWOW64\Nkcmohbg.exe Ndidbn32.exe File created C:\Windows\SysWOW64\Dgcifj32.dll 1b16b0fb02841dfe0aa422cd7164c094a578ff78d5a2f1ab448c9e6c339b83da.exe File created C:\Windows\SysWOW64\Qcldhk32.dll Mcnhmm32.exe File created C:\Windows\SysWOW64\Pbcfgejn.dll Mkepnjng.exe File created C:\Windows\SysWOW64\Ekipni32.dll Mdmegp32.exe File opened for modification C:\Windows\SysWOW64\Maaepd32.exe Mkgmcjld.exe File created C:\Windows\SysWOW64\Ndbnboqb.exe Nacbfdao.exe File opened for modification C:\Windows\SysWOW64\Maohkd32.exe Mkepnjng.exe File created C:\Windows\SysWOW64\Mcbahlip.exe Mpdelajl.exe File opened for modification C:\Windows\SysWOW64\Nacbfdao.exe Njljefql.exe File created C:\Windows\SysWOW64\Cgfgaq32.dll Nkncdifl.exe File opened for modification C:\Windows\SysWOW64\Ngedij32.exe Nqklmpdd.exe File created C:\Windows\SysWOW64\Fneiph32.dll Maohkd32.exe File opened for modification C:\Windows\SysWOW64\Nkjjij32.exe Mcbahlip.exe File created C:\Windows\SysWOW64\Nacbfdao.exe Njljefql.exe File opened for modification C:\Windows\SysWOW64\Nnjbke32.exe Ngpjnkpf.exe File created C:\Windows\SysWOW64\Hnibdpde.dll Ndidbn32.exe File opened for modification C:\Windows\SysWOW64\Mcnhmm32.exe 1b16b0fb02841dfe0aa422cd7164c094a578ff78d5a2f1ab448c9e6c339b83da.exe File created C:\Windows\SysWOW64\Bebboiqi.dll Mkgmcjld.exe File created C:\Windows\SysWOW64\Majknlkd.dll Nqiogp32.exe File opened for modification C:\Windows\SysWOW64\Nqklmpdd.exe Nnmopdep.exe File created C:\Windows\SysWOW64\Nqmhbpba.exe Nnolfdcn.exe File created C:\Windows\SysWOW64\Nkjjij32.exe Mcbahlip.exe File created C:\Windows\SysWOW64\Legdcg32.dll Njljefql.exe File opened for modification C:\Windows\SysWOW64\Ndbnboqb.exe Nacbfdao.exe File created C:\Windows\SysWOW64\Kmalco32.dll Ngpjnkpf.exe File created C:\Windows\SysWOW64\Jkeang32.dll Ngcgcjnc.exe File created C:\Windows\SysWOW64\Opbnic32.dll Nqmhbpba.exe File opened for modification C:\Windows\SysWOW64\Nkcmohbg.exe Ndidbn32.exe File opened for modification C:\Windows\SysWOW64\Mpdelajl.exe Maaepd32.exe File created C:\Windows\SysWOW64\Gbbkdl32.dll Maaepd32.exe File created C:\Windows\SysWOW64\Bghhihab.dll Nnolfdcn.exe File opened for modification C:\Windows\SysWOW64\Ndidbn32.exe Nqmhbpba.exe File created C:\Windows\SysWOW64\Maohkd32.exe Mkepnjng.exe File created C:\Windows\SysWOW64\Egqcbapl.dll Mcbahlip.exe File created C:\Windows\SysWOW64\Ngpjnkpf.exe Ndbnboqb.exe File created C:\Windows\SysWOW64\Cknpkhch.dll Ngedij32.exe File opened for modification C:\Windows\SysWOW64\Nqmhbpba.exe Nnolfdcn.exe File opened for modification C:\Windows\SysWOW64\Mkgmcjld.exe Mdmegp32.exe File opened for modification C:\Windows\SysWOW64\Mcbahlip.exe Mpdelajl.exe File created C:\Windows\SysWOW64\Kcbibebo.dll Nkjjij32.exe File opened for modification C:\Windows\SysWOW64\Nqiogp32.exe Nnjbke32.exe File opened for modification C:\Windows\SysWOW64\Ngcgcjnc.exe Nqiogp32.exe File opened for modification C:\Windows\SysWOW64\Nkncdifl.exe Ngcgcjnc.exe File opened for modification C:\Windows\SysWOW64\Nnmopdep.exe Nkncdifl.exe File opened for modification C:\Windows\SysWOW64\Mdmegp32.exe Maohkd32.exe File created C:\Windows\SysWOW64\Mlhblb32.dll Ndbnboqb.exe File created C:\Windows\SysWOW64\Nnjbke32.exe Ngpjnkpf.exe File created C:\Windows\SysWOW64\Nnolfdcn.exe Ngedij32.exe File created C:\Windows\SysWOW64\Ndidbn32.exe Nqmhbpba.exe File created C:\Windows\SysWOW64\Mkepnjng.exe Mcnhmm32.exe File created C:\Windows\SysWOW64\Maaepd32.exe Mkgmcjld.exe File created C:\Windows\SysWOW64\Lelgbkio.dll Mpdelajl.exe File created C:\Windows\SysWOW64\Njljefql.exe Nkjjij32.exe File opened for modification C:\Windows\SysWOW64\Ngpjnkpf.exe Ndbnboqb.exe File created C:\Windows\SysWOW64\Ngcgcjnc.exe Nqiogp32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4960 116 WerFault.exe 109 -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mcnhmm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nkncdifl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cknpkhch.dll" Ngedij32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} 1b16b0fb02841dfe0aa422cd7164c094a578ff78d5a2f1ab448c9e6c339b83da.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ngpjnkpf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Majknlkd.dll" Nqiogp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Njljefql.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nnmopdep.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nqklmpdd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Opbnic32.dll" Nqmhbpba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bebboiqi.dll" Mkgmcjld.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ndbnboqb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nqiogp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ngcgcjnc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ndidbn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nnmopdep.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ndidbn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mcnhmm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qcldhk32.dll" Mcnhmm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mcbahlip.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Egqcbapl.dll" Mcbahlip.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nacbfdao.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ngpjnkpf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pponmema.dll" Nnjbke32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nnolfdcn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fneiph32.dll" Maohkd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Maaepd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Njljefql.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Legdcg32.dll" Njljefql.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ndbnboqb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bghhihab.dll" Nnolfdcn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nqmhbpba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nqmhbpba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" 1b16b0fb02841dfe0aa422cd7164c094a578ff78d5a2f1ab448c9e6c339b83da.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Maohkd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mdmegp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mkgmcjld.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mpdelajl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nkncdifl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID 1b16b0fb02841dfe0aa422cd7164c094a578ff78d5a2f1ab448c9e6c339b83da.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Maohkd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mlhblb32.dll" Ndbnboqb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kmalco32.dll" Ngpjnkpf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nnjbke32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dihcoe32.dll" Nacbfdao.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nnjbke32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ngedij32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dgcifj32.dll" 1b16b0fb02841dfe0aa422cd7164c094a578ff78d5a2f1ab448c9e6c339b83da.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nqiogp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 1b16b0fb02841dfe0aa422cd7164c094a578ff78d5a2f1ab448c9e6c339b83da.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mdmegp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nqklmpdd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hnibdpde.dll" Ndidbn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ngcgcjnc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mkepnjng.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gbbkdl32.dll" Maaepd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lelgbkio.dll" Mpdelajl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mcbahlip.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jkeang32.dll" Ngcgcjnc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cgfgaq32.dll" Nkncdifl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ljfemn32.dll" Nnmopdep.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Paadnmaq.dll" Nqklmpdd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node 1b16b0fb02841dfe0aa422cd7164c094a578ff78d5a2f1ab448c9e6c339b83da.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pbcfgejn.dll" Mkepnjng.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4500 wrote to memory of 2008 4500 1b16b0fb02841dfe0aa422cd7164c094a578ff78d5a2f1ab448c9e6c339b83da.exe 86 PID 4500 wrote to memory of 2008 4500 1b16b0fb02841dfe0aa422cd7164c094a578ff78d5a2f1ab448c9e6c339b83da.exe 86 PID 4500 wrote to memory of 2008 4500 1b16b0fb02841dfe0aa422cd7164c094a578ff78d5a2f1ab448c9e6c339b83da.exe 86 PID 2008 wrote to memory of 488 2008 Mcnhmm32.exe 87 PID 2008 wrote to memory of 488 2008 Mcnhmm32.exe 87 PID 2008 wrote to memory of 488 2008 Mcnhmm32.exe 87 PID 488 wrote to memory of 1088 488 Mkepnjng.exe 88 PID 488 wrote to memory of 1088 488 Mkepnjng.exe 88 PID 488 wrote to memory of 1088 488 Mkepnjng.exe 88 PID 1088 wrote to memory of 3264 1088 Maohkd32.exe 89 PID 1088 wrote to memory of 3264 1088 Maohkd32.exe 89 PID 1088 wrote to memory of 3264 1088 Maohkd32.exe 89 PID 3264 wrote to memory of 1616 3264 Mdmegp32.exe 90 PID 3264 wrote to memory of 1616 3264 Mdmegp32.exe 90 PID 3264 wrote to memory of 1616 3264 Mdmegp32.exe 90 PID 1616 wrote to memory of 1964 1616 Mkgmcjld.exe 91 PID 1616 wrote to memory of 1964 1616 Mkgmcjld.exe 91 PID 1616 wrote to memory of 1964 1616 Mkgmcjld.exe 91 PID 1964 wrote to memory of 2108 1964 Maaepd32.exe 92 PID 1964 wrote to memory of 2108 1964 Maaepd32.exe 92 PID 1964 wrote to memory of 2108 1964 Maaepd32.exe 92 PID 2108 wrote to memory of 2232 2108 Mpdelajl.exe 93 PID 2108 wrote to memory of 2232 2108 Mpdelajl.exe 93 PID 2108 wrote to memory of 2232 2108 Mpdelajl.exe 93 PID 2232 wrote to memory of 384 2232 Mcbahlip.exe 94 PID 2232 wrote to memory of 384 2232 Mcbahlip.exe 94 PID 2232 wrote to memory of 384 2232 Mcbahlip.exe 94 PID 384 wrote to memory of 2032 384 Nkjjij32.exe 95 PID 384 wrote to memory of 2032 384 Nkjjij32.exe 95 PID 384 wrote to memory of 2032 384 Nkjjij32.exe 95 PID 2032 wrote to memory of 1244 2032 Njljefql.exe 96 PID 2032 wrote to memory of 1244 2032 Njljefql.exe 96 PID 2032 wrote to memory of 1244 2032 Njljefql.exe 96 PID 1244 wrote to memory of 1584 1244 Nacbfdao.exe 97 PID 1244 wrote to memory of 1584 1244 Nacbfdao.exe 97 PID 1244 wrote to memory of 1584 1244 Nacbfdao.exe 97 PID 1584 wrote to memory of 3380 1584 Ndbnboqb.exe 98 PID 1584 wrote to memory of 3380 1584 Ndbnboqb.exe 98 PID 1584 wrote to memory of 3380 1584 Ndbnboqb.exe 98 PID 3380 wrote to memory of 2272 3380 Ngpjnkpf.exe 99 PID 3380 wrote to memory of 2272 3380 Ngpjnkpf.exe 99 PID 3380 wrote to memory of 2272 3380 Ngpjnkpf.exe 99 PID 2272 wrote to memory of 4968 2272 Nnjbke32.exe 100 PID 2272 wrote to memory of 4968 2272 Nnjbke32.exe 100 PID 2272 wrote to memory of 4968 2272 Nnjbke32.exe 100 PID 4968 wrote to memory of 4616 4968 Nqiogp32.exe 101 PID 4968 wrote to memory of 4616 4968 Nqiogp32.exe 101 PID 4968 wrote to memory of 4616 4968 Nqiogp32.exe 101 PID 4616 wrote to memory of 4424 4616 Ngcgcjnc.exe 102 PID 4616 wrote to memory of 4424 4616 Ngcgcjnc.exe 102 PID 4616 wrote to memory of 4424 4616 Ngcgcjnc.exe 102 PID 4424 wrote to memory of 4848 4424 Nkncdifl.exe 103 PID 4424 wrote to memory of 4848 4424 Nkncdifl.exe 103 PID 4424 wrote to memory of 4848 4424 Nkncdifl.exe 103 PID 4848 wrote to memory of 4896 4848 Nnmopdep.exe 104 PID 4848 wrote to memory of 4896 4848 Nnmopdep.exe 104 PID 4848 wrote to memory of 4896 4848 Nnmopdep.exe 104 PID 4896 wrote to memory of 436 4896 Nqklmpdd.exe 105 PID 4896 wrote to memory of 436 4896 Nqklmpdd.exe 105 PID 4896 wrote to memory of 436 4896 Nqklmpdd.exe 105 PID 436 wrote to memory of 3292 436 Ngedij32.exe 106 PID 436 wrote to memory of 3292 436 Ngedij32.exe 106 PID 436 wrote to memory of 3292 436 Ngedij32.exe 106 PID 3292 wrote to memory of 372 3292 Nnolfdcn.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\1b16b0fb02841dfe0aa422cd7164c094a578ff78d5a2f1ab448c9e6c339b83da.exe"C:\Users\Admin\AppData\Local\Temp\1b16b0fb02841dfe0aa422cd7164c094a578ff78d5a2f1ab448c9e6c339b83da.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\Windows\SysWOW64\Mcnhmm32.exeC:\Windows\system32\Mcnhmm32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Windows\SysWOW64\Mkepnjng.exeC:\Windows\system32\Mkepnjng.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:488 -
C:\Windows\SysWOW64\Maohkd32.exeC:\Windows\system32\Maohkd32.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\Windows\SysWOW64\Mdmegp32.exeC:\Windows\system32\Mdmegp32.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3264 -
C:\Windows\SysWOW64\Mkgmcjld.exeC:\Windows\system32\Mkgmcjld.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Windows\SysWOW64\Maaepd32.exeC:\Windows\system32\Maaepd32.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\SysWOW64\Mpdelajl.exeC:\Windows\system32\Mpdelajl.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\SysWOW64\Mcbahlip.exeC:\Windows\system32\Mcbahlip.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\SysWOW64\Nkjjij32.exeC:\Windows\system32\Nkjjij32.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:384 -
C:\Windows\SysWOW64\Njljefql.exeC:\Windows\system32\Njljefql.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\SysWOW64\Nacbfdao.exeC:\Windows\system32\Nacbfdao.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Windows\SysWOW64\Ndbnboqb.exeC:\Windows\system32\Ndbnboqb.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Windows\SysWOW64\Ngpjnkpf.exeC:\Windows\system32\Ngpjnkpf.exe14⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3380 -
C:\Windows\SysWOW64\Nnjbke32.exeC:\Windows\system32\Nnjbke32.exe15⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Windows\SysWOW64\Nqiogp32.exeC:\Windows\system32\Nqiogp32.exe16⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Windows\SysWOW64\Ngcgcjnc.exeC:\Windows\system32\Ngcgcjnc.exe17⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Windows\SysWOW64\Nkncdifl.exeC:\Windows\system32\Nkncdifl.exe18⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Windows\SysWOW64\Nnmopdep.exeC:\Windows\system32\Nnmopdep.exe19⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Windows\SysWOW64\Nqklmpdd.exeC:\Windows\system32\Nqklmpdd.exe20⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Windows\SysWOW64\Ngedij32.exeC:\Windows\system32\Ngedij32.exe21⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:436 -
C:\Windows\SysWOW64\Nnolfdcn.exeC:\Windows\system32\Nnolfdcn.exe22⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3292 -
C:\Windows\SysWOW64\Nqmhbpba.exeC:\Windows\system32\Nqmhbpba.exe23⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:372 -
C:\Windows\SysWOW64\Ndidbn32.exeC:\Windows\system32\Ndidbn32.exe24⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:3004 -
C:\Windows\SysWOW64\Nkcmohbg.exeC:\Windows\system32\Nkcmohbg.exe25⤵
- Executes dropped EXE
PID:116 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 116 -s 41226⤵
- Program crash
PID:4960
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 200 -p 116 -ip 1161⤵PID:1400
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
45KB
MD5b1025d9a9571de0756c4a5203afe9115
SHA1952744041c8149b4fe345f9294b83b9f4ad9dbb2
SHA25641854bc2a43c8fbe89c22da6f26d1d9dd3e75fa3e8fbc5869702f0b0cf0b9806
SHA51288f1fa3c49f1452761fe4f65d983d29b57b87e6d0ab207c9ce2c3175732004a6858109cc7fc9a99ea7b0e100b544d2bb60a3a76d46d3515de6f676f7f62edf7c
-
Filesize
45KB
MD52a7fa40b13dc39ae5a4da25e992807b0
SHA163fee4fb4a788f944d6b3f0ea3ac063eef1231ac
SHA256e568f6b3f554a3ae66f8a56e356f45852b6ca259403af20d8c0c1a20f17858d3
SHA51206c7688dfa0b4b47b726513d666b3de8300270f415a3f336d107b717992d7f02f5ba39c3d062e500011258633872bf238b94e6d7d5e23ccd560dfcaef7738f3a
-
Filesize
45KB
MD5e2feeb5f44ff396771ccff5b7d4b7f64
SHA16e05fd1217225004e4669349c977a2ded5febb2f
SHA256f3690130471438ee310fe57217cbb46f7c366c969b298251323af8fd08c17666
SHA5125ca71e79e932bb406a5b5dfcf12447b0656b86777007dbee54f643e3e33af462b801a7e3469d6b3af96bac4a153855af19fa4e7c3f9973aa003eb54cfc5c5143
-
Filesize
45KB
MD541709f8fa6cb782382bcf2421beba352
SHA19561857166083441cea0d67bd50a04dc009a4f68
SHA256dc68ec84171ebddba52a2849079c8d4e33c2248a337cf69df090da734b61b20d
SHA512b406b485e468b3bca59db58f148a93b6ce88006e70c699d7e53cc69b50d7f0d5e4016e17e7e211dacb5c894392c590222475e8c2d2760b5332f78ae232429e4c
-
Filesize
45KB
MD5b5f991981a97e399039d408acdcc411d
SHA1b56d26d34b5978460637387ddd75e572020e3867
SHA2567c8b7da9c8ff94a36a339ade6133fdbf58b44945e6d73f8c6cf5639045f994ea
SHA512642cf1356c547735731f24055fedb3e27937434b6bd9633c1a03658cdded11f17f6d0091d0097bffa18dd1bbefd726c786270ae1622dd9d429f22ee25a7bb4c2
-
Filesize
45KB
MD5b3c93175c49a7066ad9d8561d6ce690b
SHA1e0bb9569b36ea6c5af7d3e8aa08a027b6350b861
SHA256b245fa1611f990ea214b61662fc2178bdf9adb4408ce621ef1af872a8f653eca
SHA5122fdc6c395ae4f08c88720cdd52f268302dd8c14e7a040232107e2ae40ee8fc393ead31a47456072644fc615e1f5f8ed850666fb0d69744d8072c67e3d39aec92
-
Filesize
45KB
MD55fdf1023f085ee64700dbe96816854ce
SHA14e936af54a18d551c68a6b1c4cb096aef82277dd
SHA2566fda1cc96dd945a06c90659b792da9d82a3731285b1cdf3a9556c5f8eb901d94
SHA5126d6a6cab6ca23dffe710ba9d1ba19fe07e7b0486ff9eed91cbacdf7196aac3f3038474c6562264d8fc1ac5e2e74d86f3ddac68f357d50fc41233d4defb9e4c6a
-
Filesize
45KB
MD55ec8521a8be9e2e7e5e89fc1c3576075
SHA1ea842f0a632d013bfad53b6a20ac119f2d990e28
SHA25600cdd22655ab5b7844238295767f395bedb499cb7eee490904e12fc84b4d86e6
SHA5128969571d6e768b553b801c944b1439fb3f75a26a2a0567771adeb7adaf6855a0d77dd485c8aa671ab35881d1bcbc7de2c0ee84be7135f36d8c8778b38a3498e7
-
Filesize
45KB
MD54cc91dd6c545a681b509cbae3b9b9afe
SHA113002925e823a8d94cc89fe1d06e235f572db20f
SHA2566f352f213cd6884c94b1241f88ec8bae33c497e011cdd5920de30d74968c1c07
SHA5127704530bdc9838ced03a746d703fcc3776218e4dd6347313deebacac1f0f1bfb7a9597f79a3bff4f7ef0ec761d42a01685f4b425550465e584418e96f709d309
-
Filesize
45KB
MD5b781d7ced69ce2d55bc023db0f01c8b2
SHA1b94369b37d43eff386c0e847710c77971a1d85ba
SHA2567d47e78d3779d08ece11bf70971fa9ce60344b7cf88fb707a97d52cc3703fa96
SHA512c9ad71311077b46853f4c2094294ff23cf51fbce6330e61828813ad568b7a9995a2f4e0824f0dea3815f6e8b9410db17e2e12e204fa7a9da52e97b19d8cacd49
-
Filesize
45KB
MD59601b7242af824453bd24684c6d7bcda
SHA1c16ccf7bc6fd82f56541a691deabfca66859a8df
SHA25648cf12cd69fd2dd4d2343bf6461b5aba6a10b8e86ce5884ac81581409dfbe312
SHA512c951bd0d1cd3a3b514a0567c62eabe1659f84050932096211a3014dc0a03e0f0124d9319feeed5997ba4a33f406efbb78a7e0ddb7ff281f113df71ed61bed0a9
-
Filesize
45KB
MD59883f5d963ed200fbbfe7141f0437556
SHA12f25461a23beffa5a722f6bb20ccce745395a2f4
SHA2566ac92a2663896bf6ada087cee074105d400a886e08a7e46e666c1b91660bf72a
SHA5123555b1b774a5f7dfc9b3ffe14d42f1412740e36cb7b19f24d7ec099edaf94e5909601337678fb2cd10f501b26fbe899f18e720ff9910f48f23ac58ef6b64ff18
-
Filesize
45KB
MD5cd7c15b70261ace3dd87270ec372f919
SHA14268e2f35e69067f9ed0cf40e06d87d588af7a9c
SHA2561faf4c32560914b41bd5d2b0f401c9e105215a7e2ca39601d7363a5522637bce
SHA512c5fd5700a2f2969bf39c470a0a74f12bd8722711ce7d96570bf84b882e1b1199d8f606a4f19a891bb562cf754c44bafb81152410c6943b52bdb941835afbc721
-
Filesize
45KB
MD515ee5408dd10c151998ca7508c35422b
SHA114e54d05c12b10061828f3fc8e0e952d1aef3189
SHA256b5cc4ccf50a26f51d78d0029bc6fba45708b245b9b325bb420ba2fc1727aea49
SHA5120aacbb68bc22d0f26782823a7b82ca40088c0619792cb59f25ea7ad2caf0f73b4bb9c982b8f8e8fcdde220036cfb2860d92d0bec95aed4e6f6fe3f8affd62b6c
-
Filesize
45KB
MD584ec9a90bd1c31661a3217578bccefb9
SHA10dfb882dc2c569bb208434cb434660b89f2176f5
SHA256dc5fe298ad1bb5add02e2fcba9fe6fdb6f440fd478d47e6f2d86207ae75ad7f2
SHA512ceb2b4a24d7d7313eebb8ba71b232d6eb67ee83e664b6b7176e4cd1f4d2a02fabffeeeb747bc42019a1d70d8a6a800307b6508e852fdca933903ee8384fe030e
-
Filesize
45KB
MD5e9cb2d8bfe564708d941a7986b9da406
SHA1558f4d0494533fdf46c889d3c6ac9edc697c2489
SHA2561e75444c01040201431a4bd93707a1a51cbf8a9a612bb174637e64665f638801
SHA51282c8573e73777c53871a64b4759918c1caf1a7b54620b58d748192dfbd3335c50e6ee9fbcceb8708e494aa75a5d38e60c15cdd3a9b391e67e228449dcb156e2f
-
Filesize
45KB
MD572ad5546306294923b7642b295507993
SHA1de237e381cadd2dbedae63c3be11ddadd2b802ee
SHA2568cf2bd01a049224a766dec385d6414e9b7841b8e761c1cf0a807e557d64be67d
SHA512336119f73b35b9be25d4df11207e4044430921779b62011ae20fb91b83898b0da833378032a8d52b0007be35ee44bea47dfabc7ccb44b260c788d36d5d83e51d
-
Filesize
45KB
MD5dc8075ca57eb16c563acdd72bf834692
SHA1e10e8e4b1bcb49aa673473ea374d3b0e5d79dfb8
SHA256a1d6966c586e9a90957d5b6f7c006491dbf909393e3abde8d8b02918aa5c2eb0
SHA5124966338020ccce79e4747ed7adbb65c5c053aaea9d722c88ff58c4ba59ae16c5d9b0368981cc55961f35280b741864abe9ea0c8b43c9563e6aeddcd6bf1fce8b
-
Filesize
45KB
MD587a835a33880e5d34c50ccd4fb595198
SHA1dd744102df74f5cbdaea194716f384366955d808
SHA2564c5246838ca15afb10c13b7fa5d5eaf997125ca8f639358d576b31471f8388f2
SHA512660a07b1fa64271a199f18da9afd9ebf4830dc267e6162f3a3285cdb4799f63df9dc81482401c8ec877939f019c699920de2481c634db3fda62bf5ffb4458f7c
-
Filesize
45KB
MD51a17c304d335b3793f59dcd11fb507f9
SHA16c9a481f54b2c1a2f14dc9a43966b4b6c9ebb9fa
SHA25646127e1b8904535d1fcc634b562ab7491f58145473c6351608f231bde57f482d
SHA5123bdcf11b856cb0b06b6f88c56a5506f6831880f329de79edddba4afdd4c50462eb31ceb5d1a381d07f6d95b17c5e0b71481aecbfc2240124d7978ce4b29fc4a3
-
Filesize
45KB
MD53d0b6855bda497dc508effedb0e6407c
SHA1163da26d86fced31c189a5e81c728dd205a07ef3
SHA256ccb54d11300a65c9684cbe6e0b74fd2039be83a9f19cac7dffc03ba98d7ac66d
SHA51214840f2ee900d40ffc051e51b4e88653748f4a87be39ccfc37024e169783d811a4a7a862f3246a621e6494b0b62d5a914a59951f784f58903a6195765a6e6bf4
-
Filesize
45KB
MD54d938a8a9c448710ccec1e06183ca861
SHA13e8afa161b09112effadc24ed257432f2b9c849b
SHA256f4f6b84c1b69328f8186810fa0a7533b20ac0c524fcbcfed7fbee24aacfb12c9
SHA512f1b8bb6dea6f34c1a8966d366f303216c3db2d0b4ad66d52123fa76965860ba171a21ad9639f4e8feffd9189ebdeada322ff05a64bf5aa9c8ea57dee2249db8c
-
Filesize
45KB
MD513f2e1864f929539d228ba0c78225527
SHA1d02a6a758938ef48310f24b65cdf75100c2b90b5
SHA2563fdc0ee941f5075afab8c746b21eedd7690ce15c5549f0f0ea72f6e6ed925bbb
SHA512f446de7d6c87c6c8dfe43366e48e57019e12783d2fa850d80c9386df4dddde7a0716bc5dd768452ee96fec9a8dfefee152871b63106c6e8e340697a6703688ff
-
Filesize
45KB
MD58e62d5e9a4a44de6c27d4df9c58c4f44
SHA1833de1e70ddabb5fa42a2986295590d3880170a2
SHA256bbe1e1a249d3192e6ea775812afb01a22b4dd1438c5bfce024ab6961fa1ea8ae
SHA5122b1e7ece95eb89e45b14f27cc455e7614de31422144405b9d951124d98dddedc9b93e1921a152a67f06e3e9070cebfd90db1b5763a219ffbbc872252afc0ade9