Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08-05-2024 04:51
Behavioral task
behavioral1
Sample
d6e5223507fbbe7771bb4e2c7760d3d0_NEIKI.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d6e5223507fbbe7771bb4e2c7760d3d0_NEIKI.exe
Resource
win10v2004-20240419-en
General
-
Target
d6e5223507fbbe7771bb4e2c7760d3d0_NEIKI.exe
-
Size
161KB
-
MD5
d6e5223507fbbe7771bb4e2c7760d3d0
-
SHA1
25a9b18677345f24bbead1d90ebde31e524787d2
-
SHA256
c3379086a35ce0766f8379da7f196574798989be5c7225fe4a39d879cb883b47
-
SHA512
aaeaf23d97a38f0ef2157722f3818854a0651b79a392814b3f9d8ecda243e91561080411214f59a0670e2af58499cb307d617e0f6b9a5ca60101f47d718cea71
-
SSDEEP
3072:R+E67V06MD428AAFfiegxqqqqjCotHkDVwtCJXeex7rrIRZK8K8/kv:ROO84tHkDVwtmeetrIyR
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 24 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Apdhjq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Apdhjq32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bbdallnd.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bphbeplm.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Blobjaba.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Balkchpi.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad d6e5223507fbbe7771bb4e2c7760d3d0_NEIKI.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Afkdakjb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Cpceidcn.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bobhal32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cpceidcn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bbdallnd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Blobjaba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Balkchpi.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Blaopqpo.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aigchgkh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Aigchgkh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Blaopqpo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bobhal32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Afkdakjb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bphbeplm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bilmcf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" d6e5223507fbbe7771bb4e2c7760d3d0_NEIKI.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bilmcf32.exe -
Malware Dropper & Backdoor - Berbew 16 IoCs
Berbew is a backdoor Trojan malware with capabilities to download and install a range of additional malicious software, such as other Trojans, ransomware, and cryptominers.
resource yara_rule behavioral1/files/0x000c000000015a2d-15.dat family_berbew behavioral1/files/0x0009000000015c7c-29.dat family_berbew behavioral1/files/0x0007000000015d88-38.dat family_berbew behavioral1/files/0x00080000000167db-51.dat family_berbew behavioral1/files/0x0006000000018ae8-61.dat family_berbew behavioral1/files/0x0006000000018b33-75.dat family_berbew behavioral1/files/0x0006000000018b6a-104.dat family_berbew behavioral1/files/0x0006000000018b96-121.dat family_berbew behavioral1/files/0x0006000000018d06-132.dat family_berbew behavioral1/files/0x00050000000192f4-156.dat family_berbew behavioral1/files/0x0011000000015c52-164.dat family_berbew behavioral1/files/0x00050000000192f4-146.dat family_berbew behavioral1/files/0x0011000000015c52-174.dat family_berbew behavioral1/files/0x0006000000018b96-118.dat family_berbew behavioral1/files/0x0006000000018b42-99.dat family_berbew behavioral1/files/0x0006000000018b42-96.dat family_berbew -
Executes dropped EXE 12 IoCs
pid Process 2200 Aigchgkh.exe 2544 Afkdakjb.exe 2524 Apdhjq32.exe 2600 Bilmcf32.exe 2588 Bbdallnd.exe 2444 Bphbeplm.exe 2384 Blobjaba.exe 436 Balkchpi.exe 2656 Blaopqpo.exe 2768 Bobhal32.exe 2012 Cpceidcn.exe 2228 Cacacg32.exe -
Loads dropped DLL 28 IoCs
pid Process 2208 d6e5223507fbbe7771bb4e2c7760d3d0_NEIKI.exe 2208 d6e5223507fbbe7771bb4e2c7760d3d0_NEIKI.exe 2200 Aigchgkh.exe 2200 Aigchgkh.exe 2544 Afkdakjb.exe 2544 Afkdakjb.exe 2524 Apdhjq32.exe 2524 Apdhjq32.exe 2600 Bilmcf32.exe 2600 Bilmcf32.exe 2588 Bbdallnd.exe 2588 Bbdallnd.exe 2444 Bphbeplm.exe 2444 Bphbeplm.exe 2384 Blobjaba.exe 2384 Blobjaba.exe 436 Balkchpi.exe 436 Balkchpi.exe 2656 Blaopqpo.exe 2656 Blaopqpo.exe 2768 Bobhal32.exe 2768 Bobhal32.exe 2012 Cpceidcn.exe 2012 Cpceidcn.exe 1844 WerFault.exe 1844 WerFault.exe 1844 WerFault.exe 1844 WerFault.exe -
Drops file in System32 directory 36 IoCs
description ioc Process File created C:\Windows\SysWOW64\Imklkg32.dll Blaopqpo.exe File created C:\Windows\SysWOW64\Apdhjq32.exe Afkdakjb.exe File created C:\Windows\SysWOW64\Ihmnkh32.dll Bphbeplm.exe File created C:\Windows\SysWOW64\Balkchpi.exe Blobjaba.exe File created C:\Windows\SysWOW64\Bobhal32.exe Blaopqpo.exe File created C:\Windows\SysWOW64\Lgahjhop.dll Apdhjq32.exe File created C:\Windows\SysWOW64\Hocjoqin.dll Blobjaba.exe File created C:\Windows\SysWOW64\Ndmjqgdd.dll Bobhal32.exe File created C:\Windows\SysWOW64\Ldhfglad.dll Bbdallnd.exe File opened for modification C:\Windows\SysWOW64\Blobjaba.exe Bphbeplm.exe File opened for modification C:\Windows\SysWOW64\Cpceidcn.exe Bobhal32.exe File created C:\Windows\SysWOW64\Fdlpjk32.dll Cpceidcn.exe File created C:\Windows\SysWOW64\Aigchgkh.exe d6e5223507fbbe7771bb4e2c7760d3d0_NEIKI.exe File opened for modification C:\Windows\SysWOW64\Afkdakjb.exe Aigchgkh.exe File opened for modification C:\Windows\SysWOW64\Apdhjq32.exe Afkdakjb.exe File created C:\Windows\SysWOW64\Momeefin.dll Bilmcf32.exe File created C:\Windows\SysWOW64\Cacacg32.exe Cpceidcn.exe File opened for modification C:\Windows\SysWOW64\Cacacg32.exe Cpceidcn.exe File created C:\Windows\SysWOW64\Afkdakjb.exe Aigchgkh.exe File opened for modification C:\Windows\SysWOW64\Bilmcf32.exe Apdhjq32.exe File opened for modification C:\Windows\SysWOW64\Balkchpi.exe Blobjaba.exe File created C:\Windows\SysWOW64\Cpceidcn.exe Bobhal32.exe File created C:\Windows\SysWOW64\Blobjaba.exe Bphbeplm.exe File created C:\Windows\SysWOW64\Blaopqpo.exe Balkchpi.exe File created C:\Windows\SysWOW64\Hpggbq32.dll d6e5223507fbbe7771bb4e2c7760d3d0_NEIKI.exe File created C:\Windows\SysWOW64\Bphbeplm.exe Bbdallnd.exe File opened for modification C:\Windows\SysWOW64\Bobhal32.exe Blaopqpo.exe File opened for modification C:\Windows\SysWOW64\Aigchgkh.exe d6e5223507fbbe7771bb4e2c7760d3d0_NEIKI.exe File opened for modification C:\Windows\SysWOW64\Bbdallnd.exe Bilmcf32.exe File opened for modification C:\Windows\SysWOW64\Bphbeplm.exe Bbdallnd.exe File opened for modification C:\Windows\SysWOW64\Blaopqpo.exe Balkchpi.exe File created C:\Windows\SysWOW64\Cfgheegc.dll Balkchpi.exe File created C:\Windows\SysWOW64\Lmmlmd32.dll Aigchgkh.exe File created C:\Windows\SysWOW64\Njelgo32.dll Afkdakjb.exe File created C:\Windows\SysWOW64\Bilmcf32.exe Apdhjq32.exe File created C:\Windows\SysWOW64\Bbdallnd.exe Bilmcf32.exe -
Program crash 1 IoCs
pid pid_target Process 1844 2228 WerFault.exe -
Modifies registry class 39 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Blaopqpo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Bobhal32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717} d6e5223507fbbe7771bb4e2c7760d3d0_NEIKI.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Njelgo32.dll" Afkdakjb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Bobhal32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Cpceidcn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node d6e5223507fbbe7771bb4e2c7760d3d0_NEIKI.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Aigchgkh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lmmlmd32.dll" Aigchgkh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Blaopqpo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Afkdakjb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Apdhjq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Blobjaba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cfgheegc.dll" Balkchpi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" d6e5223507fbbe7771bb4e2c7760d3d0_NEIKI.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Afkdakjb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Momeefin.dll" Bilmcf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hocjoqin.dll" Blobjaba.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Balkchpi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Imklkg32.dll" Blaopqpo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Cpceidcn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 d6e5223507fbbe7771bb4e2c7760d3d0_NEIKI.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Aigchgkh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Bilmcf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Bbdallnd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ldhfglad.dll" Bbdallnd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Balkchpi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hpggbq32.dll" d6e5223507fbbe7771bb4e2c7760d3d0_NEIKI.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Bphbeplm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Blobjaba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ihmnkh32.dll" Bphbeplm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ndmjqgdd.dll" Bobhal32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID d6e5223507fbbe7771bb4e2c7760d3d0_NEIKI.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lgahjhop.dll" Apdhjq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Apdhjq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Bilmcf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Bbdallnd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Bphbeplm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fdlpjk32.dll" Cpceidcn.exe -
Suspicious use of WriteProcessMemory 52 IoCs
description pid Process procid_target PID 2208 wrote to memory of 2200 2208 d6e5223507fbbe7771bb4e2c7760d3d0_NEIKI.exe 28 PID 2208 wrote to memory of 2200 2208 d6e5223507fbbe7771bb4e2c7760d3d0_NEIKI.exe 28 PID 2208 wrote to memory of 2200 2208 d6e5223507fbbe7771bb4e2c7760d3d0_NEIKI.exe 28 PID 2208 wrote to memory of 2200 2208 d6e5223507fbbe7771bb4e2c7760d3d0_NEIKI.exe 28 PID 2200 wrote to memory of 2544 2200 Aigchgkh.exe 29 PID 2200 wrote to memory of 2544 2200 Aigchgkh.exe 29 PID 2200 wrote to memory of 2544 2200 Aigchgkh.exe 29 PID 2200 wrote to memory of 2544 2200 Aigchgkh.exe 29 PID 2544 wrote to memory of 2524 2544 Afkdakjb.exe 30 PID 2544 wrote to memory of 2524 2544 Afkdakjb.exe 30 PID 2544 wrote to memory of 2524 2544 Afkdakjb.exe 30 PID 2544 wrote to memory of 2524 2544 Afkdakjb.exe 30 PID 2524 wrote to memory of 2600 2524 Apdhjq32.exe 31 PID 2524 wrote to memory of 2600 2524 Apdhjq32.exe 31 PID 2524 wrote to memory of 2600 2524 Apdhjq32.exe 31 PID 2524 wrote to memory of 2600 2524 Apdhjq32.exe 31 PID 2600 wrote to memory of 2588 2600 Bilmcf32.exe 32 PID 2600 wrote to memory of 2588 2600 Bilmcf32.exe 32 PID 2600 wrote to memory of 2588 2600 Bilmcf32.exe 32 PID 2600 wrote to memory of 2588 2600 Bilmcf32.exe 32 PID 2588 wrote to memory of 2444 2588 Bbdallnd.exe 33 PID 2588 wrote to memory of 2444 2588 Bbdallnd.exe 33 PID 2588 wrote to memory of 2444 2588 Bbdallnd.exe 33 PID 2588 wrote to memory of 2444 2588 Bbdallnd.exe 33 PID 2444 wrote to memory of 2384 2444 Bphbeplm.exe 34 PID 2444 wrote to memory of 2384 2444 Bphbeplm.exe 34 PID 2444 wrote to memory of 2384 2444 Bphbeplm.exe 34 PID 2444 wrote to memory of 2384 2444 Bphbeplm.exe 34 PID 2384 wrote to memory of 436 2384 Blobjaba.exe 35 PID 2384 wrote to memory of 436 2384 Blobjaba.exe 35 PID 2384 wrote to memory of 436 2384 Blobjaba.exe 35 PID 2384 wrote to memory of 436 2384 Blobjaba.exe 35 PID 436 wrote to memory of 2656 436 Balkchpi.exe 36 PID 436 wrote to memory of 2656 436 Balkchpi.exe 36 PID 436 wrote to memory of 2656 436 Balkchpi.exe 36 PID 436 wrote to memory of 2656 436 Balkchpi.exe 36 PID 2656 wrote to memory of 2768 2656 Blaopqpo.exe 37 PID 2656 wrote to memory of 2768 2656 Blaopqpo.exe 37 PID 2656 wrote to memory of 2768 2656 Blaopqpo.exe 37 PID 2656 wrote to memory of 2768 2656 Blaopqpo.exe 37 PID 2768 wrote to memory of 2012 2768 Bobhal32.exe 38 PID 2768 wrote to memory of 2012 2768 Bobhal32.exe 38 PID 2768 wrote to memory of 2012 2768 Bobhal32.exe 38 PID 2768 wrote to memory of 2012 2768 Bobhal32.exe 38 PID 2012 wrote to memory of 2228 2012 Cpceidcn.exe 39 PID 2012 wrote to memory of 2228 2012 Cpceidcn.exe 39 PID 2012 wrote to memory of 2228 2012 Cpceidcn.exe 39 PID 2012 wrote to memory of 2228 2012 Cpceidcn.exe 39 PID 2228 wrote to memory of 1844 2228 Cacacg32.exe 40 PID 2228 wrote to memory of 1844 2228 Cacacg32.exe 40 PID 2228 wrote to memory of 1844 2228 Cacacg32.exe 40 PID 2228 wrote to memory of 1844 2228 Cacacg32.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\d6e5223507fbbe7771bb4e2c7760d3d0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\d6e5223507fbbe7771bb4e2c7760d3d0_NEIKI.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\SysWOW64\Aigchgkh.exeC:\Windows\system32\Aigchgkh.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Windows\SysWOW64\Afkdakjb.exeC:\Windows\system32\Afkdakjb.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\SysWOW64\Apdhjq32.exeC:\Windows\system32\Apdhjq32.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Windows\SysWOW64\Bilmcf32.exeC:\Windows\system32\Bilmcf32.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Windows\SysWOW64\Bbdallnd.exeC:\Windows\system32\Bbdallnd.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Windows\SysWOW64\Bphbeplm.exeC:\Windows\system32\Bphbeplm.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Windows\SysWOW64\Blobjaba.exeC:\Windows\system32\Blobjaba.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Windows\SysWOW64\Balkchpi.exeC:\Windows\system32\Balkchpi.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:436 -
C:\Windows\SysWOW64\Blaopqpo.exeC:\Windows\system32\Blaopqpo.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\SysWOW64\Bobhal32.exeC:\Windows\system32\Bobhal32.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Windows\SysWOW64\Cpceidcn.exeC:\Windows\system32\Cpceidcn.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\SysWOW64\Cacacg32.exeC:\Windows\system32\Cacacg32.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2228 -s 14014⤵
- Loads dropped DLL
- Program crash
PID:1844
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
161KB
MD51ad447c1321e2b6d23bab890a505e8e5
SHA18d3559532464376d64b0cf3c972b8639b67d6f33
SHA256aec96b5bd0ed1144d4577428f1a948575b35f08e7f840f735008c385125136d5
SHA5121e7dd9cd1edf82b160967586df294bcc7781cd4c55fad7955f5a7a247d66884e923c0af9eeeadd65ad5caccdd712ce822e8958df6fe3379a61b85fdc3cfba44b
-
Filesize
161KB
MD503d374c2674c2d9b3757f72bc4f3fb18
SHA16a299f76d1d6a88e8a969e113eb2feae2902ad35
SHA256ad0db9141a34566e36a3e969fdb3746230696d946cec0b6413797a302b0fb6b0
SHA5125436246c74fb0acdde261c3d4a3217be4f063a7617767353cbd118884ae514a443735a89f959db192988ecfa4773ea5fd674fd740699cb13fa347c52b515fbc6
-
Filesize
161KB
MD55cebd0328d92d3dbc3c6b55da5261b4c
SHA1d2f5c58d7b2a71519438aa9777654b6feb02db0d
SHA256894a469d1d8fdf964fa627161d90f91eb4ccdc1401d7246984c01f1b256f7da7
SHA512ea446a8ce82d4f6ff28b70b21b3431c4ccb0aa31f78dd4b85e6009cb1523690ccdf0c8e8c5db475a3f7499c59f2c1008e87923923fb997ae310654cea6af5b06
-
Filesize
161KB
MD596546442cc363715e3c7a673da86baed
SHA1196f34348b743b50bba097c25fc9c08caec9b9d2
SHA25607bac929b31e5a9b1267a6ca3a1e7d4152590a2b7ecb16a079734971f6dd646c
SHA5121a542a69003d95986380e96c36cb35e6e9b458b947fe5fe018b98a79e06538cfd171da10b79a9b05513fbddd3ef142ac5cad5c80cee96628dfc53f339d96e67f
-
Filesize
128KB
MD53ce6b4f65dcb977b62d4c179216b49ec
SHA1cd2cfeedd1faaf81fe9e0cb0411b3cb607999a7c
SHA256c79b3750f24fbc8c52e3d01ff43cf68235f9a3271d0999a0f3d62f009e64d56f
SHA512da092b7c688f8e11f8bd2f51402b42aca4025e2b7d459a714e14225dda8d3e7218492f076af56717af2f8e6495af890b9251d835fd5866c259d5063def50521d
-
Filesize
161KB
MD53349e02804f93666c6474551aa0215e7
SHA1b18c3622cb248670b54d80d822eed0a946eb6c19
SHA2560de50283b82f6684ca63e3ec1617440abf1a5d341aae3dc28fe4981553b61e56
SHA512d26be7455fcbc291db137b4b96c0e4d598d0a6f86f24bfc23ebafcb7f339c71d9ee4c3f035186a3473cffa376c59e10b593c19d100c50e8fce7af1ed95a34312
-
Filesize
128KB
MD52d0d8fd2e2678133a0e9bf17615505ca
SHA175cf3578f88ca2b9c12b9356a06398068ecb8aee
SHA25694ea62e1b040a1f5a6ffbc2aadfa511ee8ca22ebe74156da3eb7205037228b49
SHA5122b2ccdcb0f1ca1791210e9cb89f3acb09ca4414480050a0da114e14802ac1aadbf5b12e305933de0d559bf8070ccf8816fae673efbe7c1f94b0abfa91c504ee8
-
Filesize
128KB
MD5151687822b62b355e963730c68533d95
SHA1dac0a42a3a829b0e85d9e669e5e3d2ba498a2bc4
SHA256190dc709fbd6fd2d4edcb94c54849e13211617eca112f08f4054d2728accce8d
SHA512c1d18e878eb1a555c9ea2719b5e1a1df77d9326c2dd8d1249d03dc1f886214318dc4deb90c764f15a29eafa36e1d4a035766cdf877e19c78e27f52042267e699
-
Filesize
128KB
MD5b114ecfa9b6ba58ae289dd3159cd6d22
SHA1d77b5dc1b25e99c97a7b2018be028ba0cb35996d
SHA256d2a85aa024b63984d34a9317c0c8a512a49f0e9343cf921ada9f7ae0dff5c42b
SHA512e5667d2ba3067c44be76b8abc59527da9853100618964a1dfae51c5c67c58003f2bdc4d04ef7622cd14a23314a61b08c436bafd1310ca035e33a44796a05ffe5
-
Filesize
7KB
MD51b89bc780eeafbc81f1dd8b4db5d7cb7
SHA141e4457b3f1dcd45be4aef8c8437f438af1d7eaf
SHA25617f54b704a329ac88edee0d335ae31c5cda4c06d2e62899843ab8f82e70b224c
SHA512ec1df03d0af974eecd2785ad5f36a7b0450455fccb161f0b1af63700a2781aa83ab1e57f5f30d370face5a4788876fe8798d81b1be5536968354efa17744eb82
-
Filesize
128KB
MD5cf0afaaca894fe5e8be6e929efffa7dc
SHA12dae757f73b1833fdc402ea995460d1ea09fad7d
SHA2562dd75ff98c2b318c806ab2e703fd636bae3acaf9a04fc036f6c7f9a28e895c0c
SHA51213ab242307df2d583ca29299a8e23d1a5fe8a0ed791d731d75434f2e1822a80d1f105c9e7cf0f5e071ea201d816ddbe993a9b5aaca84b44188c4fedf6b518374
-
Filesize
161KB
MD5ea75ecc65705af63236422574f5546bc
SHA156cb6e8da9c55886dd00e10a2a3320cc0ff7c2bc
SHA256f090ad800562326e911c0e36c59ab949185d0329856a7947e7bb2880046ca4b2
SHA5128cfd57d27ad3b30eed9395aa20da5e58cb3624b67fee57bf180b04f1c320e9ac6d75f6c8f9900fe0dc53ac272913b5e3eeb2ecad1e8be77578c6e99a5338e23f
-
Filesize
161KB
MD59038e7878213b5843d16760340d001b9
SHA11b0eacb5845cc4a47f1d1f50540b37dc84f6e835
SHA25660ac9b5b38761fd88ee01e20032d40b2b0923cd4884bb77bcfec197d24101d31
SHA512ca7cace78d9f61351a03a79a115617c6342e7b601d9d1cd0a5af16d8a4f2c13ce7d423eefa0dac11753d4349a605a52800b25a79cac09bec1d22dacf13d56f9f
-
Filesize
128KB
MD5a61af0644ddc99d9afe714c10ae32587
SHA165f862ac91bc34ecafc2f2fe14cc8496ef8111df
SHA2565f94fb38d5fb95947bbb18ce97745ca7868cd426067b39c1393d585cd8aa665e
SHA5127ff4c5319ae2ba1b6fcd5cf8ec84a1614a3b6c4e67534fda7faa1348b55ac5bd6c75920c5de64d9b7aee8ca0981278b2378561384395b443ebc67a3cac8b99e7
-
Filesize
161KB
MD556030875ce422fb1d0af84754f1f3c7c
SHA1dc28212c9ede19ad5a833d907d799b4b7ea0bd00
SHA256b008a0b32ad59df08b4e31bf491617534cc971cf7b859f5c59cadceab6f1f61c
SHA512e2be364c04c9f094e2510fd2de36017df45f5859aa2edfde9c7ba98bd76b22664805007f0dd19e0bd3802868052053390dc47dc483320388a2ff1ece1fd3fdc4
-
Filesize
161KB
MD5c1340bf4cb67dd87d0a05943b082d8f9
SHA1d24005985e67b7e2a2b89a0eff8cd2f8ab7704fc
SHA256600b4d6c5d12ab7dea46ac679465c32967aa54e81e2a1424d6f7f5fb12d92404
SHA512da01f31358efabaa66885586fc41686a98c6fe2a048bcea938a25423ab5d43b3267544f08d8ae63444c8fe9743c0ff5a8a0bcaebc1ba12835e3d1731e0c1b045
-
Filesize
161KB
MD5a6213bfb3e70992b34cb5661a1d1bd8a
SHA18ef6f1a1c4a91fc296db677499b3d87ad45ca590
SHA2567913e001deec9975f1df9d511e1b7788c4b64f2567c63dadde5d760c1e9591a9
SHA51282ba8356edb58d18253eaa3e841a0244fadabb7810794f43b7704b9e63b1f0e99aee151251cc629288e79b427788ced43fed22cc9e7129962900bf9b4f74ac3d