Analysis
-
max time kernel
141s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08-05-2024 20:13
Static task
static1
Behavioral task
behavioral1
Sample
21e14ffc365273b956e176844f2435b571f37eb81a1e571308537b9f9ef88391.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
21e14ffc365273b956e176844f2435b571f37eb81a1e571308537b9f9ef88391.exe
Resource
win10v2004-20240508-en
General
-
Target
21e14ffc365273b956e176844f2435b571f37eb81a1e571308537b9f9ef88391.exe
-
Size
163KB
-
MD5
2137ef742d12377c9942d0f885706b08
-
SHA1
bda09bfff8e2feb4f389a3038543f8a45a41d358
-
SHA256
21e14ffc365273b956e176844f2435b571f37eb81a1e571308537b9f9ef88391
-
SHA512
0cd98602bff81e068ce13c9f6486601c34647897d603ee188d94322d49ea6c821df2de72b09f2c3f5140e7d1d3e29190ebaa64a3fa73c6c78c44eee606073b9d
-
SSDEEP
3072:/2r4q/0U64WFO7y7Z/SBmltOrWKDBr+yJb:/2rN/7D7y76mLOf
Malware Config
Extracted
gozi
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 28 IoCs
Processes:
21e14ffc365273b956e176844f2435b571f37eb81a1e571308537b9f9ef88391.exeHckcmjep.exeHejoiedd.exeHlhaqogk.exeIdceea32.exeHobcak32.exeHhjhkq32.exeHcplhi32.exeHenidd32.exeHiqbndpb.exeIcbimi32.exeGphmeo32.exeHellne32.exeHkpnhgge.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" 21e14ffc365273b956e176844f2435b571f37eb81a1e571308537b9f9ef88391.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hckcmjep.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hejoiedd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hejoiedd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hckcmjep.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hlhaqogk.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Idceea32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hobcak32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hhjhkq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hcplhi32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Henidd32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 21e14ffc365273b956e176844f2435b571f37eb81a1e571308537b9f9ef88391.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Henidd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Idceea32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hiqbndpb.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hobcak32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hhjhkq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Icbimi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gphmeo32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hiqbndpb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hellne32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hlhaqogk.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gphmeo32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hkpnhgge.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Icbimi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hkpnhgge.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hellne32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hcplhi32.exe -
Detects executables built or packed with MPress PE compressor 14 IoCs
Processes:
resource yara_rule \Windows\SysWOW64\Gphmeo32.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Hiqbndpb.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Hkpnhgge.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Hckcmjep.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Hejoiedd.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Hobcak32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Hellne32.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Hhjhkq32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Hcplhi32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Henidd32.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Hlhaqogk.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Icbimi32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Idceea32.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Iagfoe32.exe INDICATOR_EXE_Packed_MPress -
UPX dump on OEP (original entry point) 14 IoCs
Processes:
resource yara_rule \Windows\SysWOW64\Gphmeo32.exe UPX \Windows\SysWOW64\Hiqbndpb.exe UPX \Windows\SysWOW64\Hkpnhgge.exe UPX \Windows\SysWOW64\Hckcmjep.exe UPX \Windows\SysWOW64\Hejoiedd.exe UPX \Windows\SysWOW64\Hobcak32.exe UPX C:\Windows\SysWOW64\Hellne32.exe UPX \Windows\SysWOW64\Hhjhkq32.exe UPX C:\Windows\SysWOW64\Hcplhi32.exe UPX C:\Windows\SysWOW64\Henidd32.exe UPX \Windows\SysWOW64\Hlhaqogk.exe UPX C:\Windows\SysWOW64\Icbimi32.exe UPX C:\Windows\SysWOW64\Idceea32.exe UPX \Windows\SysWOW64\Iagfoe32.exe UPX -
Executes dropped EXE 14 IoCs
Processes:
Gphmeo32.exeHiqbndpb.exeHkpnhgge.exeHckcmjep.exeHejoiedd.exeHobcak32.exeHellne32.exeHhjhkq32.exeHcplhi32.exeHenidd32.exeHlhaqogk.exeIcbimi32.exeIdceea32.exeIagfoe32.exepid process 2784 Gphmeo32.exe 2584 Hiqbndpb.exe 2616 Hkpnhgge.exe 2724 Hckcmjep.exe 2588 Hejoiedd.exe 2876 Hobcak32.exe 1568 Hellne32.exe 2664 Hhjhkq32.exe 1188 Hcplhi32.exe 1776 Henidd32.exe 2168 Hlhaqogk.exe 1424 Icbimi32.exe 568 Idceea32.exe 848 Iagfoe32.exe -
Loads dropped DLL 32 IoCs
Processes:
21e14ffc365273b956e176844f2435b571f37eb81a1e571308537b9f9ef88391.exeGphmeo32.exeHiqbndpb.exeHkpnhgge.exeHckcmjep.exeHejoiedd.exeHobcak32.exeHellne32.exeHhjhkq32.exeHcplhi32.exeHenidd32.exeHlhaqogk.exeIcbimi32.exeIdceea32.exeWerFault.exepid process 1692 21e14ffc365273b956e176844f2435b571f37eb81a1e571308537b9f9ef88391.exe 1692 21e14ffc365273b956e176844f2435b571f37eb81a1e571308537b9f9ef88391.exe 2784 Gphmeo32.exe 2784 Gphmeo32.exe 2584 Hiqbndpb.exe 2584 Hiqbndpb.exe 2616 Hkpnhgge.exe 2616 Hkpnhgge.exe 2724 Hckcmjep.exe 2724 Hckcmjep.exe 2588 Hejoiedd.exe 2588 Hejoiedd.exe 2876 Hobcak32.exe 2876 Hobcak32.exe 1568 Hellne32.exe 1568 Hellne32.exe 2664 Hhjhkq32.exe 2664 Hhjhkq32.exe 1188 Hcplhi32.exe 1188 Hcplhi32.exe 1776 Henidd32.exe 1776 Henidd32.exe 2168 Hlhaqogk.exe 2168 Hlhaqogk.exe 1424 Icbimi32.exe 1424 Icbimi32.exe 568 Idceea32.exe 568 Idceea32.exe 2892 WerFault.exe 2892 WerFault.exe 2892 WerFault.exe 2892 WerFault.exe -
Drops file in System32 directory 42 IoCs
Processes:
Hiqbndpb.exeHobcak32.exeHellne32.exe21e14ffc365273b956e176844f2435b571f37eb81a1e571308537b9f9ef88391.exeGphmeo32.exeHckcmjep.exeHhjhkq32.exeHenidd32.exeHlhaqogk.exeIdceea32.exeHcplhi32.exeHkpnhgge.exeHejoiedd.exeIcbimi32.exedescription ioc process File created C:\Windows\SysWOW64\Hkpnhgge.exe Hiqbndpb.exe File created C:\Windows\SysWOW64\Pljpdpao.dll Hobcak32.exe File created C:\Windows\SysWOW64\Hhjhkq32.exe Hellne32.exe File created C:\Windows\SysWOW64\Jmmjdk32.dll 21e14ffc365273b956e176844f2435b571f37eb81a1e571308537b9f9ef88391.exe File created C:\Windows\SysWOW64\Omabcb32.dll Gphmeo32.exe File created C:\Windows\SysWOW64\Hejoiedd.exe Hckcmjep.exe File opened for modification C:\Windows\SysWOW64\Hcplhi32.exe Hhjhkq32.exe File opened for modification C:\Windows\SysWOW64\Hlhaqogk.exe Henidd32.exe File created C:\Windows\SysWOW64\Icbimi32.exe Hlhaqogk.exe File opened for modification C:\Windows\SysWOW64\Iagfoe32.exe Idceea32.exe File created C:\Windows\SysWOW64\Pffgja32.dll Hiqbndpb.exe File created C:\Windows\SysWOW64\Hojopmqk.dll Hellne32.exe File created C:\Windows\SysWOW64\Henidd32.exe Hcplhi32.exe File created C:\Windows\SysWOW64\Gjenmobn.dll Idceea32.exe File created C:\Windows\SysWOW64\Gphmeo32.exe 21e14ffc365273b956e176844f2435b571f37eb81a1e571308537b9f9ef88391.exe File opened for modification C:\Windows\SysWOW64\Gphmeo32.exe 21e14ffc365273b956e176844f2435b571f37eb81a1e571308537b9f9ef88391.exe File created C:\Windows\SysWOW64\Hiqbndpb.exe Gphmeo32.exe File opened for modification C:\Windows\SysWOW64\Hiqbndpb.exe Gphmeo32.exe File created C:\Windows\SysWOW64\Hepmggig.dll Hckcmjep.exe File created C:\Windows\SysWOW64\Ecmkgokh.dll Hlhaqogk.exe File created C:\Windows\SysWOW64\Hckcmjep.exe Hkpnhgge.exe File created C:\Windows\SysWOW64\Cabknqko.dll Hkpnhgge.exe File opened for modification C:\Windows\SysWOW64\Hejoiedd.exe Hckcmjep.exe File opened for modification C:\Windows\SysWOW64\Hobcak32.exe Hejoiedd.exe File created C:\Windows\SysWOW64\Iagfoe32.exe Idceea32.exe File opened for modification C:\Windows\SysWOW64\Hckcmjep.exe Hkpnhgge.exe File created C:\Windows\SysWOW64\Hobcak32.exe Hejoiedd.exe File created C:\Windows\SysWOW64\Hellne32.exe Hobcak32.exe File created C:\Windows\SysWOW64\Hcplhi32.exe Hhjhkq32.exe File opened for modification C:\Windows\SysWOW64\Henidd32.exe Hcplhi32.exe File created C:\Windows\SysWOW64\Polebcgg.dll Hcplhi32.exe File created C:\Windows\SysWOW64\Hlhaqogk.exe Henidd32.exe File created C:\Windows\SysWOW64\Nokeef32.dll Hejoiedd.exe File opened for modification C:\Windows\SysWOW64\Hhjhkq32.exe Hellne32.exe File created C:\Windows\SysWOW64\Lponfjoo.dll Hhjhkq32.exe File created C:\Windows\SysWOW64\Pnbgan32.dll Henidd32.exe File opened for modification C:\Windows\SysWOW64\Icbimi32.exe Hlhaqogk.exe File opened for modification C:\Windows\SysWOW64\Idceea32.exe Icbimi32.exe File opened for modification C:\Windows\SysWOW64\Hkpnhgge.exe Hiqbndpb.exe File opened for modification C:\Windows\SysWOW64\Hellne32.exe Hobcak32.exe File created C:\Windows\SysWOW64\Idceea32.exe Icbimi32.exe File created C:\Windows\SysWOW64\Pqiqnfej.dll Icbimi32.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process 2892 848 WerFault.exe -
Modifies registry class 45 IoCs
Processes:
Icbimi32.exeHejoiedd.exeHellne32.exeHhjhkq32.exeHcplhi32.exeHckcmjep.exe21e14ffc365273b956e176844f2435b571f37eb81a1e571308537b9f9ef88391.exeHiqbndpb.exeHkpnhgge.exeHobcak32.exeGphmeo32.exeHenidd32.exeHlhaqogk.exeIdceea32.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Icbimi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nokeef32.dll" Hejoiedd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hejoiedd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hellne32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hhjhkq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Polebcgg.dll" Hcplhi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hckcmjep.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hejoiedd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" 21e14ffc365273b956e176844f2435b571f37eb81a1e571308537b9f9ef88391.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pffgja32.dll" Hiqbndpb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hiqbndpb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hkpnhgge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hckcmjep.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pljpdpao.dll" Hobcak32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID 21e14ffc365273b956e176844f2435b571f37eb81a1e571308537b9f9ef88391.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} 21e14ffc365273b956e176844f2435b571f37eb81a1e571308537b9f9ef88391.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hojopmqk.dll" Hellne32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lponfjoo.dll" Hhjhkq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gphmeo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hobcak32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hellne32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Henidd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hlhaqogk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Idceea32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node 21e14ffc365273b956e176844f2435b571f37eb81a1e571308537b9f9ef88391.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jmmjdk32.dll" 21e14ffc365273b956e176844f2435b571f37eb81a1e571308537b9f9ef88391.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gjenmobn.dll" Idceea32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pqiqnfej.dll" Icbimi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Icbimi32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 21e14ffc365273b956e176844f2435b571f37eb81a1e571308537b9f9ef88391.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hkpnhgge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pnbgan32.dll" Henidd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hlhaqogk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hhjhkq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hcplhi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Idceea32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gphmeo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hiqbndpb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hepmggig.dll" Hckcmjep.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hobcak32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hcplhi32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Henidd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ecmkgokh.dll" Hlhaqogk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Omabcb32.dll" Gphmeo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cabknqko.dll" Hkpnhgge.exe -
Suspicious use of WriteProcessMemory 60 IoCs
Processes:
21e14ffc365273b956e176844f2435b571f37eb81a1e571308537b9f9ef88391.exeGphmeo32.exeHiqbndpb.exeHkpnhgge.exeHckcmjep.exeHejoiedd.exeHobcak32.exeHellne32.exeHhjhkq32.exeHcplhi32.exeHenidd32.exeHlhaqogk.exeIcbimi32.exeIdceea32.exeIagfoe32.exedescription pid process target process PID 1692 wrote to memory of 2784 1692 21e14ffc365273b956e176844f2435b571f37eb81a1e571308537b9f9ef88391.exe Gphmeo32.exe PID 1692 wrote to memory of 2784 1692 21e14ffc365273b956e176844f2435b571f37eb81a1e571308537b9f9ef88391.exe Gphmeo32.exe PID 1692 wrote to memory of 2784 1692 21e14ffc365273b956e176844f2435b571f37eb81a1e571308537b9f9ef88391.exe Gphmeo32.exe PID 1692 wrote to memory of 2784 1692 21e14ffc365273b956e176844f2435b571f37eb81a1e571308537b9f9ef88391.exe Gphmeo32.exe PID 2784 wrote to memory of 2584 2784 Gphmeo32.exe Hiqbndpb.exe PID 2784 wrote to memory of 2584 2784 Gphmeo32.exe Hiqbndpb.exe PID 2784 wrote to memory of 2584 2784 Gphmeo32.exe Hiqbndpb.exe PID 2784 wrote to memory of 2584 2784 Gphmeo32.exe Hiqbndpb.exe PID 2584 wrote to memory of 2616 2584 Hiqbndpb.exe Hkpnhgge.exe PID 2584 wrote to memory of 2616 2584 Hiqbndpb.exe Hkpnhgge.exe PID 2584 wrote to memory of 2616 2584 Hiqbndpb.exe Hkpnhgge.exe PID 2584 wrote to memory of 2616 2584 Hiqbndpb.exe Hkpnhgge.exe PID 2616 wrote to memory of 2724 2616 Hkpnhgge.exe Hckcmjep.exe PID 2616 wrote to memory of 2724 2616 Hkpnhgge.exe Hckcmjep.exe PID 2616 wrote to memory of 2724 2616 Hkpnhgge.exe Hckcmjep.exe PID 2616 wrote to memory of 2724 2616 Hkpnhgge.exe Hckcmjep.exe PID 2724 wrote to memory of 2588 2724 Hckcmjep.exe Hejoiedd.exe PID 2724 wrote to memory of 2588 2724 Hckcmjep.exe Hejoiedd.exe PID 2724 wrote to memory of 2588 2724 Hckcmjep.exe Hejoiedd.exe PID 2724 wrote to memory of 2588 2724 Hckcmjep.exe Hejoiedd.exe PID 2588 wrote to memory of 2876 2588 Hejoiedd.exe Hobcak32.exe PID 2588 wrote to memory of 2876 2588 Hejoiedd.exe Hobcak32.exe PID 2588 wrote to memory of 2876 2588 Hejoiedd.exe Hobcak32.exe PID 2588 wrote to memory of 2876 2588 Hejoiedd.exe Hobcak32.exe PID 2876 wrote to memory of 1568 2876 Hobcak32.exe Hellne32.exe PID 2876 wrote to memory of 1568 2876 Hobcak32.exe Hellne32.exe PID 2876 wrote to memory of 1568 2876 Hobcak32.exe Hellne32.exe PID 2876 wrote to memory of 1568 2876 Hobcak32.exe Hellne32.exe PID 1568 wrote to memory of 2664 1568 Hellne32.exe Hhjhkq32.exe PID 1568 wrote to memory of 2664 1568 Hellne32.exe Hhjhkq32.exe PID 1568 wrote to memory of 2664 1568 Hellne32.exe Hhjhkq32.exe PID 1568 wrote to memory of 2664 1568 Hellne32.exe Hhjhkq32.exe PID 2664 wrote to memory of 1188 2664 Hhjhkq32.exe Hcplhi32.exe PID 2664 wrote to memory of 1188 2664 Hhjhkq32.exe Hcplhi32.exe PID 2664 wrote to memory of 1188 2664 Hhjhkq32.exe Hcplhi32.exe PID 2664 wrote to memory of 1188 2664 Hhjhkq32.exe Hcplhi32.exe PID 1188 wrote to memory of 1776 1188 Hcplhi32.exe Henidd32.exe PID 1188 wrote to memory of 1776 1188 Hcplhi32.exe Henidd32.exe PID 1188 wrote to memory of 1776 1188 Hcplhi32.exe Henidd32.exe PID 1188 wrote to memory of 1776 1188 Hcplhi32.exe Henidd32.exe PID 1776 wrote to memory of 2168 1776 Henidd32.exe Hlhaqogk.exe PID 1776 wrote to memory of 2168 1776 Henidd32.exe Hlhaqogk.exe PID 1776 wrote to memory of 2168 1776 Henidd32.exe Hlhaqogk.exe PID 1776 wrote to memory of 2168 1776 Henidd32.exe Hlhaqogk.exe PID 2168 wrote to memory of 1424 2168 Hlhaqogk.exe Icbimi32.exe PID 2168 wrote to memory of 1424 2168 Hlhaqogk.exe Icbimi32.exe PID 2168 wrote to memory of 1424 2168 Hlhaqogk.exe Icbimi32.exe PID 2168 wrote to memory of 1424 2168 Hlhaqogk.exe Icbimi32.exe PID 1424 wrote to memory of 568 1424 Icbimi32.exe Idceea32.exe PID 1424 wrote to memory of 568 1424 Icbimi32.exe Idceea32.exe PID 1424 wrote to memory of 568 1424 Icbimi32.exe Idceea32.exe PID 1424 wrote to memory of 568 1424 Icbimi32.exe Idceea32.exe PID 568 wrote to memory of 848 568 Idceea32.exe Iagfoe32.exe PID 568 wrote to memory of 848 568 Idceea32.exe Iagfoe32.exe PID 568 wrote to memory of 848 568 Idceea32.exe Iagfoe32.exe PID 568 wrote to memory of 848 568 Idceea32.exe Iagfoe32.exe PID 848 wrote to memory of 2892 848 Iagfoe32.exe WerFault.exe PID 848 wrote to memory of 2892 848 Iagfoe32.exe WerFault.exe PID 848 wrote to memory of 2892 848 Iagfoe32.exe WerFault.exe PID 848 wrote to memory of 2892 848 Iagfoe32.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\21e14ffc365273b956e176844f2435b571f37eb81a1e571308537b9f9ef88391.exe"C:\Users\Admin\AppData\Local\Temp\21e14ffc365273b956e176844f2435b571f37eb81a1e571308537b9f9ef88391.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Windows\SysWOW64\Gphmeo32.exeC:\Windows\system32\Gphmeo32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\SysWOW64\Hiqbndpb.exeC:\Windows\system32\Hiqbndpb.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Windows\SysWOW64\Hkpnhgge.exeC:\Windows\system32\Hkpnhgge.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\SysWOW64\Hckcmjep.exeC:\Windows\system32\Hckcmjep.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\SysWOW64\Hejoiedd.exeC:\Windows\system32\Hejoiedd.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Windows\SysWOW64\Hobcak32.exeC:\Windows\system32\Hobcak32.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Windows\SysWOW64\Hellne32.exeC:\Windows\system32\Hellne32.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Windows\SysWOW64\Hhjhkq32.exeC:\Windows\system32\Hhjhkq32.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\SysWOW64\Hcplhi32.exeC:\Windows\system32\Hcplhi32.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Windows\SysWOW64\Henidd32.exeC:\Windows\system32\Henidd32.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Windows\SysWOW64\Hlhaqogk.exeC:\Windows\system32\Hlhaqogk.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Windows\SysWOW64\Icbimi32.exeC:\Windows\system32\Icbimi32.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Windows\SysWOW64\Idceea32.exeC:\Windows\system32\Idceea32.exe14⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:568 -
C:\Windows\SysWOW64\Iagfoe32.exeC:\Windows\system32\Iagfoe32.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 848 -s 14016⤵
- Loads dropped DLL
- Program crash
PID:2892
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
163KB
MD5f17bfdab1a01c61359d659ea5baebc6c
SHA1037a53308f3fd7768e59757e6bf151b127bfd82c
SHA2563dfffbfe1c82c2272a339ed2563e914e40dd1236370bd1d4133dab92df9bf00e
SHA5122322c123880ece91e4bba75980536f36cc0fe376e770525c97f4344d5e3b85c9c4d430a4e5d24e29224ae20bc52c212565b2cb3fd1e2c87c521b19873a7897f0
-
Filesize
163KB
MD55a5951908ef80b489863da5c2f12e68c
SHA1561955ea314b2e324b084c18b82e2bdbcb19ebb0
SHA256bb5d07fcfabe96ae9e481aa955030a7149ec8d1ebf3f69b2ca5d747b5ebac8b2
SHA5120b85d54b8177a77075233c7cba809e10d4b9675484db3ff28a106800c5747cbfd36c9ba849004ef044789a78dda9382f59de9eb18c8bf3684ef17f92b683ea16
-
Filesize
163KB
MD5e67f14167bc139231be3e808bc8b5bf6
SHA1dd9135dfde867ec20f7a6f32930324b54421aa55
SHA256f28d7d6a11d143a4a0c8c6a71d15ebd37ffba6167f22e7f249994f737f998f53
SHA51240268d24c36c501e00012f24ecf9abc6a3a7f4ff0690201e525463f985f3af2b1cb452d42b856f1ab5e329283f8c5ac375369023108a037164f7468cfc1280d5
-
Filesize
163KB
MD5cd7229bea590f9d75f1e4754fb0c5b0d
SHA1e1f141a88d2c5204b119501d80fbaae14282c480
SHA25625eddc3e71edf88eb85f86a5045b10feef98ae5b704b9ce652523bcd48f43eb0
SHA51283893c4d4470da917dab6721425aa1d85a542a195b9f75517c067f4c73071cf7efd9d3b331e9a20df5b0863d54c0cce7e81524d4877b1087dda2426a49ea6c7a
-
Filesize
163KB
MD5a46a090c28770dcc515cbd36c40e1c8f
SHA125f8d27bd51adf425a2d66f2b1997a54500e9cd7
SHA25611ffb21f0472a638de3d4e11e858447da69c60fbac5a5367bb5273920a2cc328
SHA5120da5d0b3a8d965708ce3dbaa4a44cf1fb138ce8330034d174931e1bec9303c7fb2d020fa5221f8112125138a9d312d61b2d7f0e21e2f1d3ea64ff9304a9c2a93
-
Filesize
163KB
MD5dd581aeca506acdc49be883426e7def4
SHA116ff6ccec7822bd899d2172322cc685ca33dcd97
SHA256ceb1b775ee0eae4f071ec20e973c36ccf1ddf5a5fe9afdfc578847e3ee9e8922
SHA51228c3602d92fe84ac890d934cb1fbc53dd70f19c75ab341ea816c27a106dd8be42664e8a0c12ab10d132db42a7f298f405f8241bd4c124e50ab4ebee163354103
-
Filesize
163KB
MD5ba89b7db39cd54f515797b9a45a5784b
SHA1c45ce9b3d994d94821a100d1e5b1970dcb10c8cd
SHA2563b1972ed5f9ed296d3739ad0703d8f8c3b1814af335169f71da7c079dc40424a
SHA512fdde0265b4ff692695a949d9848708e70a6c27f065cae0c1004d8a2b30159356e0bcdde3e447af14452d7a00561cc98c57fcd6426c165d980c4760699429df1b
-
Filesize
163KB
MD5010818adc9b964ab4a122de8c110da6c
SHA1a6b07aed4d559e021a671adddba3b2b55c8b059f
SHA256425f901c6c5b76766ae75077bccb69ac3eb0313b021933208ed4584ed1b235f8
SHA5122ab2a2a493d77e1b0a4bed50783c73f56f643648829342336fe5047cb398d92eec4b71e751fd6ca71e31e4a6ed29720b2667ec8b18546439866373957d294dc6
-
Filesize
163KB
MD502bce81aff4f0e21ca6f542671b994a2
SHA1fc36b27123b5cc59e91b096712b0d25cd5dc091a
SHA2563a01f8430bab9171432617105f62596a280134ecbc1085b4fbc509955ede10a0
SHA512481bc9d8885603b5b8a1e673d8b7d82e45d6836ee29fe4020e0de6a28c2bd1ce83b60cb8aac8f77e8a7ce9c7716675d15235b9ee73607f89c1a91e30b8a63c35
-
Filesize
163KB
MD504c1a2c12586c5ac7b187e01f4b49119
SHA147a25cb2a32af14c86a35db93c29c64a88aa8ed2
SHA256313f6b7c35b2eb829abbe2ce2e0cc910dc1acec747cdb6ccbb8b890281592e80
SHA51295a8c3164d24dbab7f0f55e95c58c29b5a4bc131710d13177b6a45e2ad65a0a74e3076e440991df638381d5353e01fb509c5310440addea3003e90f403526abd
-
Filesize
163KB
MD51e4e4033fc578f3f62518d9fc82645b1
SHA161f9ce94f32a15ca0bacb6758d31f04a9a186bd5
SHA2568d70fbd200d679dbef76d48300b1fe76921ab2500b090a106bbdbcdc30d35e50
SHA512c6a9ca40df8fe3f9e024095babd9e706bf599cc0cb28b7ecf83301e81b45627bd1a3c8a8d51c284669da9ec4e313f5783226aff835cd76fd311c85b69911d7c5
-
Filesize
163KB
MD5d4d1e28acbe5f3aa14372dd505473da2
SHA1d6ab7184e4098acaea5d14d79334b02acb996a81
SHA256369ef699711dfe96d679787f214eb0e1b26fc0da6f1f44b7a72c3cf2e54c35e6
SHA51234d52235dcf2e8fbe0772b320cdc0baf220397e31fa73d6798700b6712b16b410d6f1ae872d3470ddd04959a64e7e0343640df7d3550e2ece9ea6228632da745
-
Filesize
163KB
MD58c3de4dd072a4bec42ef6b71aeb9e221
SHA1b9fc089b66d927c5fd5250c766328d5f3a5ed074
SHA256b1f65fc4b4aa8f56d7bca26eddd48421ded5c56b5052696fd75de9d9837b68d9
SHA512bcfaa121b30e65e714f68e2b35f32a572733f412746ff8c6c6bb7cc03f5978e34b762f0e9b426ed1972bafd1fe5b8138b6e4f763ed4f289c781a1eb66adf785b
-
Filesize
163KB
MD5862cc47f8d17bea16596987a098839aa
SHA18376df2f66ec9d860d03e0adf86a7485911d24a4
SHA256835ea056b1a9cdf8f88001f5d648af802ec9f1a4b47b6072ce3411c4647954df
SHA5128c3d66d3dfa79bc79c11667a4ce79b7c35daa84a45135ab45e92482044d6f40fa60853db6b7c6f3629d3af91e21954c691ab0b8840ec8761223a4ed05635d745