Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
0s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
15/04/2024, 19:26
Static task
static1
Behavioral task
behavioral1
Sample
200c44b98984682bd85774bbdc1804ad3404ca010d9ee94ccfd89dd3f17ca489.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
200c44b98984682bd85774bbdc1804ad3404ca010d9ee94ccfd89dd3f17ca489.exe
Resource
win10v2004-20240412-en
General
-
Target
200c44b98984682bd85774bbdc1804ad3404ca010d9ee94ccfd89dd3f17ca489.exe
-
Size
409KB
-
MD5
054219a1fff99ab709a4d3053171e83c
-
SHA1
c9e95a76069dd6c73731d7a4840def2e49a55d58
-
SHA256
200c44b98984682bd85774bbdc1804ad3404ca010d9ee94ccfd89dd3f17ca489
-
SHA512
331bfc39233e2924c73928e9cf708654c631adb21200125f4aac8010f2ddb48a3e2ba2004ba6f7e979753b758072489bf0b6b45fd32dc9f5de60374017dc551c
-
SSDEEP
6144:A0Z3rZ0WdRcm4FmowdHoSuNZgZ0Wd/OWdPS2LStOshOWdPS2Ln:A0Z514wFHoS/F5fC5L
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 22 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lmdpejfq.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lbfahp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lbfahp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lkmjin32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lfmdnp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lodlom32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lmgmjjdn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Labhkh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Loooca32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lmdpejfq.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lfmdnp32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lfmdnp32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lodlom32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Labhkh32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lkmjin32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mcjkcplm.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 200c44b98984682bd85774bbdc1804ad3404ca010d9ee94ccfd89dd3f17ca489.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" 200c44b98984682bd85774bbdc1804ad3404ca010d9ee94ccfd89dd3f17ca489.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lfmdnp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lmgmjjdn.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Loooca32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mcjkcplm.exe -
UPX dump on OEP (original entry point) 64 IoCs
resource yara_rule behavioral1/files/0x0009000000014abe-5.dat UPX behavioral1/files/0x000a0000000155f7-32.dat UPX behavioral1/files/0x0009000000015c78-57.dat UPX behavioral1/files/0x0007000000015c9f-68.dat UPX behavioral1/files/0x0007000000015cce-82.dat UPX behavioral1/files/0x0006000000015cf6-88.dat UPX behavioral1/files/0x0006000000015d31-136.dat UPX behavioral1/files/0x0006000000015f7a-159.dat UPX behavioral1/files/0x0006000000016176-169.dat UPX behavioral1/files/0x0006000000016448-191.dat UPX behavioral1/files/0x00060000000165ae-205.dat UPX behavioral1/files/0x0006000000016cc6-261.dat UPX behavioral1/files/0x0006000000018bab-376.dat UPX behavioral1/files/0x00050000000191c8-414.dat UPX behavioral1/files/0x00050000000191ea-433.dat UPX behavioral1/files/0x00050000000191dd-424.dat UPX behavioral1/files/0x0005000000019305-461.dat UPX behavioral1/files/0x00050000000193ef-501.dat UPX behavioral1/files/0x0005000000019433-509.dat UPX behavioral1/files/0x00050000000193dd-493.dat UPX behavioral1/files/0x0005000000019464-517.dat UPX behavioral1/files/0x00050000000194b1-525.dat UPX behavioral1/files/0x0005000000019a84-557.dat UPX behavioral1/files/0x0005000000019ecb-581.dat UPX behavioral1/files/0x000500000001a2a2-605.dat UPX behavioral1/files/0x000500000001a450-693.dat UPX behavioral1/files/0x000500000001a466-728.dat UPX behavioral1/files/0x000500000001a46e-749.dat UPX behavioral1/files/0x000500000001a47a-773.dat UPX behavioral1/files/0x000500000001a498-789.dat UPX behavioral1/files/0x000500000001a512-797.dat UPX behavioral1/files/0x000500000001c284-813.dat UPX behavioral1/files/0x000500000001c7bd-837.dat UPX behavioral1/files/0x000500000001c7d5-845.dat UPX behavioral1/files/0x000500000001c7ea-861.dat UPX behavioral1/files/0x000500000001c7f5-877.dat UPX behavioral1/files/0x000500000001c806-909.dat UPX behavioral1/files/0x000500000001c812-925.dat UPX behavioral1/files/0x000500000001c822-933.dat UPX behavioral1/files/0x000500000001c843-949.dat UPX behavioral1/files/0x000500000001c847-957.dat UPX behavioral1/files/0x000500000001c850-973.dat UPX behavioral1/files/0x000500000001c85b-989.dat UPX behavioral1/files/0x000500000001c865-1005.dat UPX behavioral1/files/0x000500000001c86d-1021.dat UPX behavioral1/files/0x000400000001c961-1029.dat UPX behavioral1/files/0x000400000001cabc-1053.dat UPX behavioral1/files/0x000400000001cad6-1069.dat UPX behavioral1/files/0x000400000001cb36-1125.dat UPX behavioral1/files/0x000400000001cb44-1141.dat UPX behavioral1/files/0x000400000001cb76-1157.dat UPX behavioral1/files/0x000400000001cb7c-1165.dat UPX behavioral1/files/0x000400000001cb94-1189.dat UPX behavioral1/files/0x000400000001cc18-1221.dat UPX behavioral1/files/0x000400000001ce4d-1333.dat UPX behavioral1/files/0x000400000001cee6-1336.dat UPX behavioral1/files/0x000400000001cf77-1384.dat UPX behavioral1/files/0x000400000001d22b-1429.dat UPX behavioral1/files/0x000400000001d2a5-1445.dat UPX behavioral1/files/0x000400000001d30d-1461.dat UPX behavioral1/files/0x000400000001d31c-1477.dat UPX behavioral1/files/0x000400000001d32f-1501.dat UPX behavioral1/files/0x000400000001d34a-1533.dat UPX behavioral1/files/0x000400000001d492-1581.dat UPX -
Executes dropped EXE 11 IoCs
pid Process 2352 Lmdpejfq.exe 2112 Lfmdnp32.exe 2548 Lfmdnp32.exe 2644 Lodlom32.exe 2428 Lmgmjjdn.exe 2976 Labhkh32.exe 2424 Lbfahp32.exe 2724 Lkmjin32.exe 1892 Loooca32.exe 1996 Mcjkcplm.exe 1648 Meigpkka.exe -
Loads dropped DLL 22 IoCs
pid Process 2316 200c44b98984682bd85774bbdc1804ad3404ca010d9ee94ccfd89dd3f17ca489.exe 2316 200c44b98984682bd85774bbdc1804ad3404ca010d9ee94ccfd89dd3f17ca489.exe 2352 Lmdpejfq.exe 2352 Lmdpejfq.exe 2112 Lfmdnp32.exe 2112 Lfmdnp32.exe 2548 Lfmdnp32.exe 2548 Lfmdnp32.exe 2644 Lodlom32.exe 2644 Lodlom32.exe 2428 Lmgmjjdn.exe 2428 Lmgmjjdn.exe 2976 Labhkh32.exe 2976 Labhkh32.exe 2424 Lbfahp32.exe 2424 Lbfahp32.exe 2724 Lkmjin32.exe 2724 Lkmjin32.exe 1892 Loooca32.exe 1892 Loooca32.exe 1996 Mcjkcplm.exe 1996 Mcjkcplm.exe -
Drops file in System32 directory 32 IoCs
description ioc Process File created C:\Windows\SysWOW64\Hlkljlhn.dll 200c44b98984682bd85774bbdc1804ad3404ca010d9ee94ccfd89dd3f17ca489.exe File created C:\Windows\SysWOW64\Lndipl32.dll Lmdpejfq.exe File created C:\Windows\SysWOW64\Fpidpbna.dll Lfmdnp32.exe File created C:\Windows\SysWOW64\Lcgjec32.dll Lkmjin32.exe File created C:\Windows\SysWOW64\Loooca32.exe Lkmjin32.exe File opened for modification C:\Windows\SysWOW64\Lmdpejfq.exe 200c44b98984682bd85774bbdc1804ad3404ca010d9ee94ccfd89dd3f17ca489.exe File created C:\Windows\SysWOW64\Lfmdnp32.exe Lfmdnp32.exe File created C:\Windows\SysWOW64\Lmgmjjdn.exe Lodlom32.exe File created C:\Windows\SysWOW64\Llkjofpc.dll Lodlom32.exe File created C:\Windows\SysWOW64\Labhkh32.exe Lmgmjjdn.exe File created C:\Windows\SysWOW64\Ieepoa32.dll Lmgmjjdn.exe File created C:\Windows\SysWOW64\Lkmjin32.exe Lbfahp32.exe File created C:\Windows\SysWOW64\Hlbpenqj.dll Loooca32.exe File created C:\Windows\SysWOW64\Meigpkka.exe Mcjkcplm.exe File created C:\Windows\SysWOW64\Lmdpejfq.exe 200c44b98984682bd85774bbdc1804ad3404ca010d9ee94ccfd89dd3f17ca489.exe File opened for modification C:\Windows\SysWOW64\Lfmdnp32.exe Lmdpejfq.exe File opened for modification C:\Windows\SysWOW64\Lodlom32.exe Lfmdnp32.exe File opened for modification C:\Windows\SysWOW64\Meigpkka.exe Mcjkcplm.exe File created C:\Windows\SysWOW64\Lodlom32.exe Lfmdnp32.exe File opened for modification C:\Windows\SysWOW64\Labhkh32.exe Lmgmjjdn.exe File opened for modification C:\Windows\SysWOW64\Loooca32.exe Lkmjin32.exe File created C:\Windows\SysWOW64\Benfcheg.dll Mcjkcplm.exe File opened for modification C:\Windows\SysWOW64\Lmgmjjdn.exe Lodlom32.exe File opened for modification C:\Windows\SysWOW64\Lbfahp32.exe Labhkh32.exe File opened for modification C:\Windows\SysWOW64\Lkmjin32.exe Lbfahp32.exe File created C:\Windows\SysWOW64\Njcmkmii.dll Lbfahp32.exe File opened for modification C:\Windows\SysWOW64\Mcjkcplm.exe Loooca32.exe File created C:\Windows\SysWOW64\Lfmdnp32.exe Lmdpejfq.exe File opened for modification C:\Windows\SysWOW64\Lndipl32.dll Lfmdnp32.exe File created C:\Windows\SysWOW64\Lbfahp32.exe Labhkh32.exe File created C:\Windows\SysWOW64\Dhnakg32.dll Labhkh32.exe File created C:\Windows\SysWOW64\Mcjkcplm.exe Loooca32.exe -
Program crash 1 IoCs
pid pid_target Process 3928 3308 WerFault.exe -
Modifies registry class 36 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ieepoa32.dll" Lmgmjjdn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mcjkcplm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" 200c44b98984682bd85774bbdc1804ad3404ca010d9ee94ccfd89dd3f17ca489.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fpidpbna.dll" Lfmdnp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hlkljlhn.dll" 200c44b98984682bd85774bbdc1804ad3404ca010d9ee94ccfd89dd3f17ca489.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lndipl32.dll" Lmdpejfq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lmgmjjdn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lbfahp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Loooca32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Benfcheg.dll" Mcjkcplm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 200c44b98984682bd85774bbdc1804ad3404ca010d9ee94ccfd89dd3f17ca489.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID 200c44b98984682bd85774bbdc1804ad3404ca010d9ee94ccfd89dd3f17ca489.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mcjkcplm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dhnakg32.dll" Labhkh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lbfahp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lcgjec32.dll" Lkmjin32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hlbpenqj.dll" Loooca32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lmdpejfq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lfmdnp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Labhkh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lkmjin32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lkmjin32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lfmdnp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lmgmjjdn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Llkjofpc.dll" Lodlom32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Loooca32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} 200c44b98984682bd85774bbdc1804ad3404ca010d9ee94ccfd89dd3f17ca489.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lndipl32.dll" Lfmdnp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lfmdnp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lodlom32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lfmdnp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lodlom32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Labhkh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Njcmkmii.dll" Lbfahp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node 200c44b98984682bd85774bbdc1804ad3404ca010d9ee94ccfd89dd3f17ca489.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lmdpejfq.exe -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 2316 wrote to memory of 2352 2316 200c44b98984682bd85774bbdc1804ad3404ca010d9ee94ccfd89dd3f17ca489.exe 28 PID 2316 wrote to memory of 2352 2316 200c44b98984682bd85774bbdc1804ad3404ca010d9ee94ccfd89dd3f17ca489.exe 28 PID 2316 wrote to memory of 2352 2316 200c44b98984682bd85774bbdc1804ad3404ca010d9ee94ccfd89dd3f17ca489.exe 28 PID 2316 wrote to memory of 2352 2316 200c44b98984682bd85774bbdc1804ad3404ca010d9ee94ccfd89dd3f17ca489.exe 28 PID 2352 wrote to memory of 2112 2352 Lmdpejfq.exe 29 PID 2352 wrote to memory of 2112 2352 Lmdpejfq.exe 29 PID 2352 wrote to memory of 2112 2352 Lmdpejfq.exe 29 PID 2352 wrote to memory of 2112 2352 Lmdpejfq.exe 29 PID 2112 wrote to memory of 2548 2112 Lfmdnp32.exe 30 PID 2112 wrote to memory of 2548 2112 Lfmdnp32.exe 30 PID 2112 wrote to memory of 2548 2112 Lfmdnp32.exe 30 PID 2112 wrote to memory of 2548 2112 Lfmdnp32.exe 30 PID 2548 wrote to memory of 2644 2548 Lfmdnp32.exe 31 PID 2548 wrote to memory of 2644 2548 Lfmdnp32.exe 31 PID 2548 wrote to memory of 2644 2548 Lfmdnp32.exe 31 PID 2548 wrote to memory of 2644 2548 Lfmdnp32.exe 31 PID 2644 wrote to memory of 2428 2644 Lodlom32.exe 32 PID 2644 wrote to memory of 2428 2644 Lodlom32.exe 32 PID 2644 wrote to memory of 2428 2644 Lodlom32.exe 32 PID 2644 wrote to memory of 2428 2644 Lodlom32.exe 32 PID 2428 wrote to memory of 2976 2428 Lmgmjjdn.exe 33 PID 2428 wrote to memory of 2976 2428 Lmgmjjdn.exe 33 PID 2428 wrote to memory of 2976 2428 Lmgmjjdn.exe 33 PID 2428 wrote to memory of 2976 2428 Lmgmjjdn.exe 33 PID 2976 wrote to memory of 2424 2976 Labhkh32.exe 34 PID 2976 wrote to memory of 2424 2976 Labhkh32.exe 34 PID 2976 wrote to memory of 2424 2976 Labhkh32.exe 34 PID 2976 wrote to memory of 2424 2976 Labhkh32.exe 34 PID 2424 wrote to memory of 2724 2424 Lbfahp32.exe 35 PID 2424 wrote to memory of 2724 2424 Lbfahp32.exe 35 PID 2424 wrote to memory of 2724 2424 Lbfahp32.exe 35 PID 2424 wrote to memory of 2724 2424 Lbfahp32.exe 35 PID 2724 wrote to memory of 1892 2724 Lkmjin32.exe 36 PID 2724 wrote to memory of 1892 2724 Lkmjin32.exe 36 PID 2724 wrote to memory of 1892 2724 Lkmjin32.exe 36 PID 2724 wrote to memory of 1892 2724 Lkmjin32.exe 36 PID 1892 wrote to memory of 1996 1892 Loooca32.exe 37 PID 1892 wrote to memory of 1996 1892 Loooca32.exe 37 PID 1892 wrote to memory of 1996 1892 Loooca32.exe 37 PID 1892 wrote to memory of 1996 1892 Loooca32.exe 37 PID 1996 wrote to memory of 1648 1996 Mcjkcplm.exe 38 PID 1996 wrote to memory of 1648 1996 Mcjkcplm.exe 38 PID 1996 wrote to memory of 1648 1996 Mcjkcplm.exe 38 PID 1996 wrote to memory of 1648 1996 Mcjkcplm.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\200c44b98984682bd85774bbdc1804ad3404ca010d9ee94ccfd89dd3f17ca489.exe"C:\Users\Admin\AppData\Local\Temp\200c44b98984682bd85774bbdc1804ad3404ca010d9ee94ccfd89dd3f17ca489.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\SysWOW64\Lmdpejfq.exeC:\Windows\system32\Lmdpejfq.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Windows\SysWOW64\Lfmdnp32.exeC:\Windows\system32\Lfmdnp32.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Windows\SysWOW64\Lfmdnp32.exeC:\Windows\system32\Lfmdnp32.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\SysWOW64\Lodlom32.exeC:\Windows\system32\Lodlom32.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\SysWOW64\Lmgmjjdn.exeC:\Windows\system32\Lmgmjjdn.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Windows\SysWOW64\Labhkh32.exeC:\Windows\system32\Labhkh32.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Windows\SysWOW64\Lbfahp32.exeC:\Windows\system32\Lbfahp32.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Windows\SysWOW64\Lkmjin32.exeC:\Windows\system32\Lkmjin32.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\SysWOW64\Loooca32.exeC:\Windows\system32\Loooca32.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Windows\SysWOW64\Mcjkcplm.exeC:\Windows\system32\Mcjkcplm.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Windows\SysWOW64\Meigpkka.exeC:\Windows\system32\Meigpkka.exe12⤵
- Executes dropped EXE
PID:1648 -
C:\Windows\SysWOW64\Mlcple32.exeC:\Windows\system32\Mlcple32.exe13⤵PID:2680
-
C:\Windows\SysWOW64\Moalhq32.exeC:\Windows\system32\Moalhq32.exe14⤵PID:1040
-
C:\Windows\SysWOW64\Maphdl32.exeC:\Windows\system32\Maphdl32.exe15⤵PID:848
-
C:\Windows\SysWOW64\Mofecpnl.exeC:\Windows\system32\Mofecpnl.exe16⤵PID:2836
-
C:\Windows\SysWOW64\Mdcnlglc.exeC:\Windows\system32\Mdcnlglc.exe17⤵PID:1160
-
C:\Windows\SysWOW64\Magnek32.exeC:\Windows\system32\Magnek32.exe18⤵PID:348
-
C:\Windows\SysWOW64\Mdejaf32.exeC:\Windows\system32\Mdejaf32.exe19⤵PID:2088
-
C:\Windows\SysWOW64\Mkobnqan.exeC:\Windows\system32\Mkobnqan.exe20⤵PID:2612
-
C:\Windows\SysWOW64\Nnnojlpa.exeC:\Windows\system32\Nnnojlpa.exe21⤵PID:1440
-
C:\Windows\SysWOW64\Naikkk32.exeC:\Windows\system32\Naikkk32.exe22⤵PID:1008
-
C:\Windows\SysWOW64\Ndgggf32.exeC:\Windows\system32\Ndgggf32.exe23⤵PID:2236
-
C:\Windows\SysWOW64\Njdpomfe.exeC:\Windows\system32\Njdpomfe.exe24⤵PID:952
-
C:\Windows\SysWOW64\Nlblkhei.exeC:\Windows\system32\Nlblkhei.exe25⤵PID:2912
-
C:\Windows\SysWOW64\Ndjdlffl.exeC:\Windows\system32\Ndjdlffl.exe26⤵PID:2844
-
C:\Windows\SysWOW64\Nfkpdn32.exeC:\Windows\system32\Nfkpdn32.exe27⤵PID:1908
-
C:\Windows\SysWOW64\Njgldmdc.exeC:\Windows\system32\Njgldmdc.exe28⤵PID:1224
-
C:\Windows\SysWOW64\Nocemcbj.exeC:\Windows\system32\Nocemcbj.exe29⤵PID:1880
-
C:\Windows\SysWOW64\Ngkmnacm.exeC:\Windows\system32\Ngkmnacm.exe30⤵PID:2576
-
C:\Windows\SysWOW64\Nqcagfim.exeC:\Windows\system32\Nqcagfim.exe31⤵PID:2520
-
C:\Windows\SysWOW64\Nbdnoo32.exeC:\Windows\system32\Nbdnoo32.exe32⤵PID:2732
-
C:\Windows\SysWOW64\Nkmbgdfl.exeC:\Windows\system32\Nkmbgdfl.exe33⤵PID:2796
-
C:\Windows\SysWOW64\Nccjhafn.exeC:\Windows\system32\Nccjhafn.exe34⤵PID:2532
-
C:\Windows\SysWOW64\Nbfjdn32.exeC:\Windows\system32\Nbfjdn32.exe35⤵PID:1172
-
C:\Windows\SysWOW64\Ofbfdmeb.exeC:\Windows\system32\Ofbfdmeb.exe36⤵PID:2648
-
C:\Windows\SysWOW64\Ohqbqhde.exeC:\Windows\system32\Ohqbqhde.exe37⤵PID:2408
-
C:\Windows\SysWOW64\Omloag32.exeC:\Windows\system32\Omloag32.exe38⤵PID:1888
-
C:\Windows\SysWOW64\Obigjnkf.exeC:\Windows\system32\Obigjnkf.exe39⤵PID:2736
-
C:\Windows\SysWOW64\Ofdcjm32.exeC:\Windows\system32\Ofdcjm32.exe40⤵PID:620
-
C:\Windows\SysWOW64\Oicpfh32.exeC:\Windows\system32\Oicpfh32.exe41⤵PID:3060
-
C:\Windows\SysWOW64\Ogfpbeim.exeC:\Windows\system32\Ogfpbeim.exe42⤵PID:1964
-
C:\Windows\SysWOW64\Okalbc32.exeC:\Windows\system32\Okalbc32.exe43⤵PID:1080
-
C:\Windows\SysWOW64\Oomhcbjp.exeC:\Windows\system32\Oomhcbjp.exe44⤵PID:1928
-
C:\Windows\SysWOW64\Obkdonic.exeC:\Windows\system32\Obkdonic.exe45⤵PID:1152
-
C:\Windows\SysWOW64\Oqndkj32.exeC:\Windows\system32\Oqndkj32.exe46⤵PID:2460
-
C:\Windows\SysWOW64\Oiellh32.exeC:\Windows\system32\Oiellh32.exe47⤵PID:2692
-
C:\Windows\SysWOW64\Okchhc32.exeC:\Windows\system32\Okchhc32.exe48⤵PID:1652
-
C:\Windows\SysWOW64\Onbddoog.exeC:\Windows\system32\Onbddoog.exe49⤵PID:892
-
C:\Windows\SysWOW64\Ondajnme.exeC:\Windows\system32\Ondajnme.exe50⤵PID:1848
-
C:\Windows\SysWOW64\Ocajbekl.exeC:\Windows\system32\Ocajbekl.exe51⤵PID:2044
-
C:\Windows\SysWOW64\Ofpfnqjp.exeC:\Windows\system32\Ofpfnqjp.exe52⤵PID:2204
-
C:\Windows\SysWOW64\Ongnonkb.exeC:\Windows\system32\Ongnonkb.exe53⤵PID:2592
-
C:\Windows\SysWOW64\Paejki32.exeC:\Windows\system32\Paejki32.exe54⤵PID:2580
-
C:\Windows\SysWOW64\Pccfge32.exeC:\Windows\system32\Pccfge32.exe55⤵PID:2492
-
C:\Windows\SysWOW64\Pgobhcac.exeC:\Windows\system32\Pgobhcac.exe56⤵PID:3056
-
C:\Windows\SysWOW64\Pfbccp32.exeC:\Windows\system32\Pfbccp32.exe57⤵PID:1912
-
C:\Windows\SysWOW64\Pipopl32.exeC:\Windows\system32\Pipopl32.exe58⤵PID:2308
-
C:\Windows\SysWOW64\Paggai32.exeC:\Windows\system32\Paggai32.exe59⤵PID:2776
-
C:\Windows\SysWOW64\Pcfcmd32.exeC:\Windows\system32\Pcfcmd32.exe60⤵PID:2556
-
C:\Windows\SysWOW64\Pfdpip32.exeC:\Windows\system32\Pfdpip32.exe61⤵PID:2496
-
C:\Windows\SysWOW64\Piblek32.exeC:\Windows\system32\Piblek32.exe62⤵PID:2956
-
C:\Windows\SysWOW64\Plahag32.exeC:\Windows\system32\Plahag32.exe63⤵PID:1952
-
C:\Windows\SysWOW64\Pchpbded.exeC:\Windows\system32\Pchpbded.exe64⤵PID:584
-
C:\Windows\SysWOW64\Peiljl32.exeC:\Windows\system32\Peiljl32.exe65⤵PID:2512
-
C:\Windows\SysWOW64\Ppoqge32.exeC:\Windows\system32\Ppoqge32.exe66⤵PID:2148
-
C:\Windows\SysWOW64\Pnbacbac.exeC:\Windows\system32\Pnbacbac.exe67⤵PID:1468
-
C:\Windows\SysWOW64\Pfiidobe.exeC:\Windows\system32\Pfiidobe.exe68⤵PID:1412
-
C:\Windows\SysWOW64\Pelipl32.exeC:\Windows\system32\Pelipl32.exe69⤵PID:796
-
C:\Windows\SysWOW64\Pigeqkai.exeC:\Windows\system32\Pigeqkai.exe70⤵PID:2328
-
C:\Windows\SysWOW64\Plfamfpm.exeC:\Windows\system32\Plfamfpm.exe71⤵PID:320
-
C:\Windows\SysWOW64\Pbpjiphi.exeC:\Windows\system32\Pbpjiphi.exe72⤵PID:2176
-
C:\Windows\SysWOW64\Qhmbagfa.exeC:\Windows\system32\Qhmbagfa.exe73⤵PID:2772
-
C:\Windows\SysWOW64\Qbbfopeg.exeC:\Windows\system32\Qbbfopeg.exe74⤵PID:2552
-
C:\Windows\SysWOW64\Qdccfh32.exeC:\Windows\system32\Qdccfh32.exe75⤵PID:2420
-
C:\Windows\SysWOW64\Qhooggdn.exeC:\Windows\system32\Qhooggdn.exe76⤵PID:1744
-
C:\Windows\SysWOW64\Qjmkcbcb.exeC:\Windows\system32\Qjmkcbcb.exe77⤵PID:2616
-
C:\Windows\SysWOW64\Qnigda32.exeC:\Windows\system32\Qnigda32.exe78⤵PID:1628
-
C:\Windows\SysWOW64\Qmlgonbe.exeC:\Windows\system32\Qmlgonbe.exe79⤵PID:2396
-
C:\Windows\SysWOW64\Ahakmf32.exeC:\Windows\system32\Ahakmf32.exe80⤵PID:2228
-
C:\Windows\SysWOW64\Ajphib32.exeC:\Windows\system32\Ajphib32.exe81⤵PID:2264
-
C:\Windows\SysWOW64\Ankdiqih.exeC:\Windows\system32\Ankdiqih.exe82⤵PID:2336
-
C:\Windows\SysWOW64\Aajpelhl.exeC:\Windows\system32\Aajpelhl.exe83⤵PID:660
-
C:\Windows\SysWOW64\Aplpai32.exeC:\Windows\system32\Aplpai32.exe84⤵PID:556
-
C:\Windows\SysWOW64\Ahchbf32.exeC:\Windows\system32\Ahchbf32.exe85⤵PID:1864
-
C:\Windows\SysWOW64\Affhncfc.exeC:\Windows\system32\Affhncfc.exe86⤵PID:1192
-
C:\Windows\SysWOW64\Ampqjm32.exeC:\Windows\system32\Ampqjm32.exe87⤵PID:2896
-
C:\Windows\SysWOW64\Apomfh32.exeC:\Windows\system32\Apomfh32.exe88⤵PID:1608
-
C:\Windows\SysWOW64\Abmibdlh.exeC:\Windows\system32\Abmibdlh.exe89⤵PID:2932
-
C:\Windows\SysWOW64\Aigaon32.exeC:\Windows\system32\Aigaon32.exe90⤵PID:2516
-
C:\Windows\SysWOW64\Alenki32.exeC:\Windows\system32\Alenki32.exe91⤵PID:2104
-
C:\Windows\SysWOW64\Admemg32.exeC:\Windows\system32\Admemg32.exe92⤵PID:1656
-
C:\Windows\SysWOW64\Afkbib32.exeC:\Windows\system32\Afkbib32.exe93⤵PID:3068
-
C:\Windows\SysWOW64\Aiinen32.exeC:\Windows\system32\Aiinen32.exe94⤵PID:2608
-
C:\Windows\SysWOW64\Alhjai32.exeC:\Windows\system32\Alhjai32.exe95⤵PID:2780
-
C:\Windows\SysWOW64\Apcfahio.exeC:\Windows\system32\Apcfahio.exe96⤵PID:480
-
C:\Windows\SysWOW64\Abbbnchb.exeC:\Windows\system32\Abbbnchb.exe97⤵PID:3032
-
C:\Windows\SysWOW64\Aepojo32.exeC:\Windows\system32\Aepojo32.exe98⤵PID:968
-
C:\Windows\SysWOW64\Ahokfj32.exeC:\Windows\system32\Ahokfj32.exe99⤵PID:1068
-
C:\Windows\SysWOW64\Boiccdnf.exeC:\Windows\system32\Boiccdnf.exe100⤵PID:2432
-
C:\Windows\SysWOW64\Bagpopmj.exeC:\Windows\system32\Bagpopmj.exe101⤵PID:2700
-
C:\Windows\SysWOW64\Bebkpn32.exeC:\Windows\system32\Bebkpn32.exe102⤵PID:1792
-
C:\Windows\SysWOW64\Blmdlhmp.exeC:\Windows\system32\Blmdlhmp.exe103⤵PID:828
-
C:\Windows\SysWOW64\Bokphdld.exeC:\Windows\system32\Bokphdld.exe104⤵PID:844
-
C:\Windows\SysWOW64\Baildokg.exeC:\Windows\system32\Baildokg.exe105⤵PID:2216
-
C:\Windows\SysWOW64\Bhcdaibd.exeC:\Windows\system32\Bhcdaibd.exe106⤵PID:1992
-
C:\Windows\SysWOW64\Bommnc32.exeC:\Windows\system32\Bommnc32.exe107⤵PID:2916
-
C:\Windows\SysWOW64\Bnpmipql.exeC:\Windows\system32\Bnpmipql.exe108⤵PID:2824
-
C:\Windows\SysWOW64\Bdjefj32.exeC:\Windows\system32\Bdjefj32.exe109⤵PID:1452
-
C:\Windows\SysWOW64\Bghabf32.exeC:\Windows\system32\Bghabf32.exe110⤵PID:2636
-
C:\Windows\SysWOW64\Bnbjopoi.exeC:\Windows\system32\Bnbjopoi.exe111⤵PID:2260
-
C:\Windows\SysWOW64\Bpafkknm.exeC:\Windows\system32\Bpafkknm.exe112⤵PID:2476
-
C:\Windows\SysWOW64\Bgknheej.exeC:\Windows\system32\Bgknheej.exe113⤵PID:1644
-
C:\Windows\SysWOW64\Bkfjhd32.exeC:\Windows\system32\Bkfjhd32.exe114⤵PID:2984
-
C:\Windows\SysWOW64\Baqbenep.exeC:\Windows\system32\Baqbenep.exe115⤵PID:1696
-
C:\Windows\SysWOW64\Bpcbqk32.exeC:\Windows\system32\Bpcbqk32.exe116⤵PID:2384
-
C:\Windows\SysWOW64\Cgmkmecg.exeC:\Windows\system32\Cgmkmecg.exe117⤵PID:912
-
C:\Windows\SysWOW64\Ckignd32.exeC:\Windows\system32\Ckignd32.exe118⤵PID:2544
-
C:\Windows\SysWOW64\Cngcjo32.exeC:\Windows\system32\Cngcjo32.exe119⤵PID:1512
-
C:\Windows\SysWOW64\Cljcelan.exeC:\Windows\system32\Cljcelan.exe120⤵PID:1064
-
C:\Windows\SysWOW64\Ccdlbf32.exeC:\Windows\system32\Ccdlbf32.exe121⤵PID:1180
-
C:\Windows\SysWOW64\Cgpgce32.exeC:\Windows\system32\Cgpgce32.exe122⤵PID:1804
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-