Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
167s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09/04/2024, 19:31
Static task
static1
Behavioral task
behavioral1
Sample
48618ded3ccbdafe56d4258b89087802.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
48618ded3ccbdafe56d4258b89087802.exe
Resource
win10v2004-20240226-en
General
-
Target
48618ded3ccbdafe56d4258b89087802.exe
-
Size
285KB
-
MD5
48618ded3ccbdafe56d4258b89087802
-
SHA1
60c0481ead458cf9e95ad560ab531e391feec304
-
SHA256
8af15f24f1020fd3cd6b6d82925bf9938b351e551efbc6bfec4f5fc9c5676101
-
SHA512
aa1af8926112503591dc9ec8f1a931e15d87120e3be4f82e32801ac5664630ee5cee50a8884816e926290240526f74c117e3e26fc45f8ee2ed9d3bf0fe659721
-
SSDEEP
3072:KcLKMnonQYLq69Yv3mBxgPCTejKVcbMloVRr3uMg0kAqSxYiJ2QM4GKch:KcLKMnonRL4GgJjKQIoi7tWa
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 26 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Jhkljfok.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ilmedf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Jhfbog32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jhkljfok.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Lkqgno32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ijmhkchl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gjhfif32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Gjhfif32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" 48618ded3ccbdafe56d4258b89087802.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Fqikob32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gjficg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Hnkhjdle.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ilmedf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Kahinkaf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Leabphmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Leabphmp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lkqgno32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Gjficg32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hnkhjdle.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jhfbog32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kahinkaf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fqikob32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ijmhkchl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ldbefe32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 48618ded3ccbdafe56d4258b89087802.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ldbefe32.exe -
Executes dropped EXE 13 IoCs
pid Process 2072 Fqikob32.exe 2544 Gjficg32.exe 2236 Gjhfif32.exe 2600 Hnkhjdle.exe 412 Ijmhkchl.exe 456 Ilmedf32.exe 2256 Jhfbog32.exe 2316 Jhkljfok.exe 4744 Kahinkaf.exe 2764 Ldbefe32.exe 948 Leabphmp.exe 2664 Lkqgno32.exe 656 Ldikgdpe.exe -
Drops file in System32 directory 39 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Jhfbog32.exe Ilmedf32.exe File opened for modification C:\Windows\SysWOW64\Leabphmp.exe Ldbefe32.exe File created C:\Windows\SysWOW64\Emjnfn32.dll Fqikob32.exe File created C:\Windows\SysWOW64\Hpfiln32.dll Gjficg32.exe File opened for modification C:\Windows\SysWOW64\Ilmedf32.exe Ijmhkchl.exe File created C:\Windows\SysWOW64\Qagfppeh.dll Ldbefe32.exe File created C:\Windows\SysWOW64\Bekdaogi.dll Lkqgno32.exe File created C:\Windows\SysWOW64\Mfodpbqp.dll Gjhfif32.exe File created C:\Windows\SysWOW64\Jhkljfok.exe Jhfbog32.exe File created C:\Windows\SysWOW64\Jlbngnmk.dll Jhfbog32.exe File created C:\Windows\SysWOW64\Eopbppjf.dll Hnkhjdle.exe File created C:\Windows\SysWOW64\Mapchaef.dll Ilmedf32.exe File created C:\Windows\SysWOW64\Kahinkaf.exe Jhkljfok.exe File created C:\Windows\SysWOW64\Leabphmp.exe Ldbefe32.exe File created C:\Windows\SysWOW64\Lkqgno32.exe Leabphmp.exe File created C:\Windows\SysWOW64\Gjficg32.exe Fqikob32.exe File created C:\Windows\SysWOW64\Ijmhkchl.exe Hnkhjdle.exe File opened for modification C:\Windows\SysWOW64\Ijmhkchl.exe Hnkhjdle.exe File created C:\Windows\SysWOW64\Ldikgdpe.exe Lkqgno32.exe File opened for modification C:\Windows\SysWOW64\Ldikgdpe.exe Lkqgno32.exe File created C:\Windows\SysWOW64\Epaaihpg.dll Ijmhkchl.exe File created C:\Windows\SysWOW64\Ieaqqigc.dll Leabphmp.exe File created C:\Windows\SysWOW64\Hnkhjdle.exe Gjhfif32.exe File opened for modification C:\Windows\SysWOW64\Hnkhjdle.exe Gjhfif32.exe File created C:\Windows\SysWOW64\Ldbefe32.exe Kahinkaf.exe File opened for modification C:\Windows\SysWOW64\Fqikob32.exe 48618ded3ccbdafe56d4258b89087802.exe File opened for modification C:\Windows\SysWOW64\Gjficg32.exe Fqikob32.exe File created C:\Windows\SysWOW64\Gjhfif32.exe Gjficg32.exe File created C:\Windows\SysWOW64\Ilmedf32.exe Ijmhkchl.exe File opened for modification C:\Windows\SysWOW64\Kahinkaf.exe Jhkljfok.exe File created C:\Windows\SysWOW64\Ljnakk32.dll Jhkljfok.exe File created C:\Windows\SysWOW64\Fqikob32.exe 48618ded3ccbdafe56d4258b89087802.exe File created C:\Windows\SysWOW64\Kminigbj.dll 48618ded3ccbdafe56d4258b89087802.exe File opened for modification C:\Windows\SysWOW64\Gjhfif32.exe Gjficg32.exe File created C:\Windows\SysWOW64\Jhmimi32.dll Kahinkaf.exe File opened for modification C:\Windows\SysWOW64\Lkqgno32.exe Leabphmp.exe File created C:\Windows\SysWOW64\Jhfbog32.exe Ilmedf32.exe File opened for modification C:\Windows\SysWOW64\Jhkljfok.exe Jhfbog32.exe File opened for modification C:\Windows\SysWOW64\Ldbefe32.exe Kahinkaf.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 4424 656 WerFault.exe 107 1432 656 WerFault.exe 107 -
Modifies registry class 42 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qagfppeh.dll" Ldbefe32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID 48618ded3ccbdafe56d4258b89087802.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Fqikob32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Gjhfif32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Hnkhjdle.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Ilmedf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Jhkljfok.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jhmimi32.dll" Kahinkaf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ieaqqigc.dll" Leabphmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Leabphmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Lkqgno32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hpfiln32.dll" Gjficg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Gjhfif32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Epaaihpg.dll" Ijmhkchl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Fqikob32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Ldbefe32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node 48618ded3ccbdafe56d4258b89087802.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eopbppjf.dll" Hnkhjdle.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Hnkhjdle.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Jhkljfok.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ljnakk32.dll" Jhkljfok.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Kahinkaf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Kahinkaf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831} 48618ded3ccbdafe56d4258b89087802.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Gjficg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Gjficg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Jhfbog32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Jhfbog32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Ldbefe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" 48618ded3ccbdafe56d4258b89087802.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Ijmhkchl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Ilmedf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mapchaef.dll" Ilmedf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bekdaogi.dll" Lkqgno32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kminigbj.dll" 48618ded3ccbdafe56d4258b89087802.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 48618ded3ccbdafe56d4258b89087802.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Emjnfn32.dll" Fqikob32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mfodpbqp.dll" Gjhfif32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Ijmhkchl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jlbngnmk.dll" Jhfbog32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Leabphmp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Lkqgno32.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 408 wrote to memory of 2072 408 48618ded3ccbdafe56d4258b89087802.exe 95 PID 408 wrote to memory of 2072 408 48618ded3ccbdafe56d4258b89087802.exe 95 PID 408 wrote to memory of 2072 408 48618ded3ccbdafe56d4258b89087802.exe 95 PID 2072 wrote to memory of 2544 2072 Fqikob32.exe 96 PID 2072 wrote to memory of 2544 2072 Fqikob32.exe 96 PID 2072 wrote to memory of 2544 2072 Fqikob32.exe 96 PID 2544 wrote to memory of 2236 2544 Gjficg32.exe 97 PID 2544 wrote to memory of 2236 2544 Gjficg32.exe 97 PID 2544 wrote to memory of 2236 2544 Gjficg32.exe 97 PID 2236 wrote to memory of 2600 2236 Gjhfif32.exe 98 PID 2236 wrote to memory of 2600 2236 Gjhfif32.exe 98 PID 2236 wrote to memory of 2600 2236 Gjhfif32.exe 98 PID 2600 wrote to memory of 412 2600 Hnkhjdle.exe 99 PID 2600 wrote to memory of 412 2600 Hnkhjdle.exe 99 PID 2600 wrote to memory of 412 2600 Hnkhjdle.exe 99 PID 412 wrote to memory of 456 412 Ijmhkchl.exe 100 PID 412 wrote to memory of 456 412 Ijmhkchl.exe 100 PID 412 wrote to memory of 456 412 Ijmhkchl.exe 100 PID 456 wrote to memory of 2256 456 Ilmedf32.exe 101 PID 456 wrote to memory of 2256 456 Ilmedf32.exe 101 PID 456 wrote to memory of 2256 456 Ilmedf32.exe 101 PID 2256 wrote to memory of 2316 2256 Jhfbog32.exe 102 PID 2256 wrote to memory of 2316 2256 Jhfbog32.exe 102 PID 2256 wrote to memory of 2316 2256 Jhfbog32.exe 102 PID 2316 wrote to memory of 4744 2316 Jhkljfok.exe 103 PID 2316 wrote to memory of 4744 2316 Jhkljfok.exe 103 PID 2316 wrote to memory of 4744 2316 Jhkljfok.exe 103 PID 4744 wrote to memory of 2764 4744 Kahinkaf.exe 104 PID 4744 wrote to memory of 2764 4744 Kahinkaf.exe 104 PID 4744 wrote to memory of 2764 4744 Kahinkaf.exe 104 PID 2764 wrote to memory of 948 2764 Ldbefe32.exe 105 PID 2764 wrote to memory of 948 2764 Ldbefe32.exe 105 PID 2764 wrote to memory of 948 2764 Ldbefe32.exe 105 PID 948 wrote to memory of 2664 948 Leabphmp.exe 106 PID 948 wrote to memory of 2664 948 Leabphmp.exe 106 PID 948 wrote to memory of 2664 948 Leabphmp.exe 106 PID 2664 wrote to memory of 656 2664 Lkqgno32.exe 107 PID 2664 wrote to memory of 656 2664 Lkqgno32.exe 107 PID 2664 wrote to memory of 656 2664 Lkqgno32.exe 107 PID 656 wrote to memory of 4424 656 Ldikgdpe.exe 112 PID 656 wrote to memory of 4424 656 Ldikgdpe.exe 112 PID 656 wrote to memory of 4424 656 Ldikgdpe.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\48618ded3ccbdafe56d4258b89087802.exe"C:\Users\Admin\AppData\Local\Temp\48618ded3ccbdafe56d4258b89087802.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:408 -
C:\Windows\SysWOW64\Fqikob32.exeC:\Windows\system32\Fqikob32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Windows\SysWOW64\Gjficg32.exeC:\Windows\system32\Gjficg32.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\SysWOW64\Gjhfif32.exeC:\Windows\system32\Gjhfif32.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\SysWOW64\Hnkhjdle.exeC:\Windows\system32\Hnkhjdle.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Windows\SysWOW64\Ijmhkchl.exeC:\Windows\system32\Ijmhkchl.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:412 -
C:\Windows\SysWOW64\Ilmedf32.exeC:\Windows\system32\Ilmedf32.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:456 -
C:\Windows\SysWOW64\Jhfbog32.exeC:\Windows\system32\Jhfbog32.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Windows\SysWOW64\Jhkljfok.exeC:\Windows\system32\Jhkljfok.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\SysWOW64\Kahinkaf.exeC:\Windows\system32\Kahinkaf.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Windows\SysWOW64\Ldbefe32.exeC:\Windows\system32\Ldbefe32.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\SysWOW64\Leabphmp.exeC:\Windows\system32\Leabphmp.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:948 -
C:\Windows\SysWOW64\Lkqgno32.exeC:\Windows\system32\Lkqgno32.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\SysWOW64\Ldikgdpe.exeC:\Windows\system32\Ldikgdpe.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:656 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 656 -s 41215⤵
- Program crash
PID:4424
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 656 -s 41215⤵
- Program crash
PID:1432
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 656 -ip 6561⤵PID:2240
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4140 --field-trial-handle=3192,i,2785050981002401924,4037047756083432660,262144 --variations-seed-version /prefetch:81⤵PID:4568
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7KB
MD527ad10cbc14b89e104c0df410a88978a
SHA1a0fff6f3518b563a422f8c902fa76df2528a7eb1
SHA256b41aaca25dcdeda3bc3a3bf53c07d6c2796c2ce4f8ba9d2773dd35ea14ee992c
SHA512158171147d67e00803879c7929babd40ea6bde612119fa7cf32a697c4b383726765337727195ad581a589e6f2e3af35891c01c540fe504d81499f95bb4cf0ca4
-
Filesize
285KB
MD5aa0c69ed66c5dc902c2b2e7c29224673
SHA10957f9d19357e399e14a1ddcdb124aee3b438d29
SHA256f59c6f5ab6975cb76028b14571d9513a5865335f0d3a47fe950ee3aa3778ea92
SHA5120f5442b05a9f5d6628bd2616d9dba87aceb81ad000bd194037c176f91011d094ea9ce2c982365e381746d29b9f356ac43dc259206aea639546f98e9d556483ad
-
Filesize
285KB
MD57acf5c3a1a0c7f31cd6374bb52815ff5
SHA145679548c98dfbb1009fee80f183b503aff110a0
SHA25698ffddc8fb9f4bf807a1cab2ec5b3e5fca9665652c1c709ed56f5fb55d2958dd
SHA51248754d826af149adbf68087c70dab7cb8d021cfd527b576d6ff68b0130098bb31a39ae1f0199d1dc6b306adc8acad23115718fefa195f02c2eab0fd341dcd40f
-
Filesize
285KB
MD532a18d1fc3d7a5a47a44a54d8704a1c5
SHA1e5450c39eb9ee6f67c9005620393e36665490829
SHA256d926b4a6cc0c0d6ce73737cb4cb332f7a7e8c7d26baee5da089b624ff0d48561
SHA51249d36d36d01075729a1e345cd7d5c9d3a65b78bf6e86919ff05f339f653d3944030582a658dbf9d9384b9312fc79d22d9dff9785d0b2ffbc9abda61a104d835b
-
Filesize
285KB
MD52755fb9caf96e34ff8d1d5b5744d91c7
SHA1d4d3d68403850896c8c2e2c1ae2b3dd74fe03f8e
SHA256db0fff403f7ebb4c60a3db8ca7f48cd59564c4d2bc3f2aa3a7ad1b3bfb44d8e5
SHA512bfb469e9c28235319ac9b3d839d44c3108383b0a05a4e0515c7cf46631b3d9f4b309c6bc2dfec16f5e1c2f1ed1728dc65948ce93561adf836acf8c8011ebf8c5
-
Filesize
285KB
MD5b5453114dbf0d72737f1046b37773f73
SHA1dd05551d31b187bfc2833ac970dd402a48861c4c
SHA2565d6a4e3297cdcafae217fed2696b1fc7bae6ca7fe6bf9ea1170745f7af3dc813
SHA5127a23a3c01628d798756fb8d8f22314d6d68477c26ec687833a2750e9a1e04e4a6c91f1a94b2d1dce4c1f3c81e7d95c18c1755e4f19599f68a9f6b1594b4ca03c
-
Filesize
285KB
MD59f58925868bba951dac91917b617084d
SHA1a873c1bd54d171a4884f0067b68344fabdd91c54
SHA256c268b60ca4c3941d61aa60f7d7959d83f9cedd9b38afad6ba6ac6be471cc7877
SHA512b503a65f1334afd8d5d137580af1ff3182ce7b2be55a1caa60361cdbe41222f906705434decad856a570561d5869cb40351273eb1f28f7338a8f7b8f3be762c7
-
Filesize
285KB
MD555baeb33792f88303315974648290a10
SHA141b76beda04f918689ae3a7d4597826aeafb0ccc
SHA25624cbde59ff09e3dc78cfb106a33952601e86fb4074bbce4922b31625cdf9c395
SHA5128615e51d7187408c4649edcaa934f6726ef31e0dba95150ed648ce15dbaab72c68a891bb8d57a44053f91724718bcc940adad3e081ad4c6f986f2c9cb6dcb672
-
Filesize
285KB
MD537020c88c736bc734b63cf162535fc96
SHA13723d46dfe863dc5ede7ae90f54788bb2c460f5d
SHA256c6c4a6a643f6ee9ab7e0479e960de8b21274831c615ba71964373bc6f08fe7c8
SHA512ba5e4bcf8c0ab9fcba19b01b961d64e0a0079e50bd77f15ca63a786d0f8c49736b5ac827f881fb5b619a2b71130a0d966e7226f4dc6cd434b23637075ce0fbc9
-
Filesize
285KB
MD5ed20051a277063f458a2fe79e4ecee2f
SHA16c2b52e2ef2acb71d4a9a730e52342efc72f5d55
SHA256ddafa352dbf88fe271a0e01d2d4b78eea45c08eb5981c7fb16fa051fbb8f6522
SHA51252e9b64b6f0415172f5e20248cb4198cbf3451a97bac6a603b2d1df0100b4a85ee8e40e6d7af93121b4df4b0eee8d95f93e1457af567e49ca249d6f27026c0dc
-
Filesize
285KB
MD5c37791a89b50f4de4857a52e30c83208
SHA165963e1281a06dd399215f78763f468709f52381
SHA256ec52ce3b8d5c41dff33e8061b8847b381d56fdcc2a70cf0649745ba48e9f5571
SHA512ac353b0b544e1ae03fff3f153556a69f518d077f5a7045a5d21099ef13e75b003b55ed49fc072c163476e22060d3203ed5c0a78480c1a4eb01710150715bf709
-
Filesize
285KB
MD5695202b488065689a70749dba8759c86
SHA13d77042447865419893695773296796ffbb5d396
SHA256d6be9c4055cd86ab0a1388a0f8f2609254144f6576ccfc6d53a16036daf259d9
SHA512cab64ea4ff21e174b41aeb2f5fe46c1c2db8d9fddcb042cd4998fd91dc7752ff1aa7c1268505d30a4658967c06d00dfb035c237896e8b8a1be1f98f0a3b39982
-
Filesize
285KB
MD5fcc6f2eb6ab510b0ab39282bd60cbd78
SHA1696e457f0d94a6dfb262b0da1574d730b380a261
SHA256472087f363ce2b24e87242014b2aad2e974c3d193983a1d55e64f66a4a4492f7
SHA5125625097e6e698d8fd076192ccf44f57978a5606a45f191694e30d8e7a0f7e542fb88f17d880babc1dbe250052bbc9d96ed3a81921198c8e58b8fef47b242411f
-
Filesize
285KB
MD548b54deb962c1e439f83a4bb571ebfb8
SHA1de3b57f6fae15377a0910acfc3f3f52dff19f3b9
SHA256804f6fda1148563ab197ab0c4a9da10e1ca385ecdbb324893dde37974223a161
SHA51287fda747ad73e4b80b80612ffdb6eeaabd05008c908f0da7be81da540743d438756433944a36a1a64cdfc66bc16f7ea1aab9c243d99862888e2c0dcea087b867