Analysis
-
max time kernel
141s -
max time network
108s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15/05/2024, 18:48
Static task
static1
Behavioral task
behavioral1
Sample
0ee7ce18e9719fcb98756d52601564c2e5e13b92b4f4a499821460418e343ddb.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0ee7ce18e9719fcb98756d52601564c2e5e13b92b4f4a499821460418e343ddb.exe
Resource
win10v2004-20240508-en
General
-
Target
0ee7ce18e9719fcb98756d52601564c2e5e13b92b4f4a499821460418e343ddb.exe
-
Size
335KB
-
MD5
a3b92319a583947964e6534449b0eed6
-
SHA1
f213a11bc18648e17fa8b88409d7b6aa337ea291
-
SHA256
0ee7ce18e9719fcb98756d52601564c2e5e13b92b4f4a499821460418e343ddb
-
SHA512
26e80d4cd14c4782b56cedf4252493928cae3d2c1e668bef99f164708d654fec8606c09ec477ecbbd1aa8c3cc9b17df629a67371282b4d90fe09c26db9e9a565
-
SSDEEP
6144:0daWYbmowPevLvwU/4qwvwU/4qvvwevwU/4q+vwk/4q7:BWa
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 62 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kphmie32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lkgdml32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kibnhjgj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mglack32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ifmcdblq.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lklnhlfb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mkbchk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mkepnjng.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nbhkac32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ngedij32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kibnhjgj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mgekbljc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lnhmng32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nqfbaq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nceonl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jibeql32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kpmfddnf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lpcmec32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lklnhlfb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nqfbaq32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nceonl32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jibeql32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lnhmng32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mdpalp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jiphkm32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kmjqmi32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mkbchk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nnhfee32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ifmcdblq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jigollag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lkgdml32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mglack32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nbhkac32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kdaldd32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kpmfddnf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mgekbljc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jbmfoa32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jigollag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kdaldd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kckbqpnj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jaimbj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mkepnjng.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" 0ee7ce18e9719fcb98756d52601564c2e5e13b92b4f4a499821460418e343ddb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jbmfoa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kmjqmi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lpappc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lpcmec32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lknjmkdo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lknjmkdo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nnhfee32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jiphkm32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jaimbj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jangmibi.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kphmie32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kckbqpnj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ngedij32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 0ee7ce18e9719fcb98756d52601564c2e5e13b92b4f4a499821460418e343ddb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ijkljp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ijkljp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jangmibi.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lpappc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mdpalp32.exe -
Executes dropped EXE 31 IoCs
pid Process 3380 Ifmcdblq.exe 2768 Ijkljp32.exe 1364 Jiphkm32.exe 2512 Jibeql32.exe 1408 Jaimbj32.exe 1256 Jbmfoa32.exe 2208 Jigollag.exe 1284 Jangmibi.exe 4636 Kdaldd32.exe 344 Kmjqmi32.exe 2852 Kphmie32.exe 2464 Kibnhjgj.exe 4796 Kpmfddnf.exe 404 Kckbqpnj.exe 3948 Lpappc32.exe 4352 Lkgdml32.exe 4264 Lpcmec32.exe 3960 Lnhmng32.exe 5096 Lklnhlfb.exe 5036 Lknjmkdo.exe 1588 Mgekbljc.exe 3092 Mkbchk32.exe 3612 Mkepnjng.exe 2900 Mglack32.exe 3476 Mdpalp32.exe 3096 Nnhfee32.exe 4228 Nqfbaq32.exe 1832 Nceonl32.exe 3844 Nbhkac32.exe 1280 Ngedij32.exe 3080 Nkcmohbg.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\Nkcmohbg.exe Ngedij32.exe File opened for modification C:\Windows\SysWOW64\Kdaldd32.exe Jangmibi.exe File created C:\Windows\SysWOW64\Fhpdhp32.dll Mglack32.exe File created C:\Windows\SysWOW64\Nceonl32.exe Nqfbaq32.exe File created C:\Windows\SysWOW64\Bnckcnhb.dll Jangmibi.exe File opened for modification C:\Windows\SysWOW64\Mkepnjng.exe Mkbchk32.exe File created C:\Windows\SysWOW64\Ijkljp32.exe Ifmcdblq.exe File opened for modification C:\Windows\SysWOW64\Jaimbj32.exe Jibeql32.exe File created C:\Windows\SysWOW64\Jangmibi.exe Jigollag.exe File created C:\Windows\SysWOW64\Mglack32.exe Mkepnjng.exe File opened for modification C:\Windows\SysWOW64\Mdpalp32.exe Mglack32.exe File created C:\Windows\SysWOW64\Jiphkm32.exe Ijkljp32.exe File created C:\Windows\SysWOW64\Kdaldd32.exe Jangmibi.exe File created C:\Windows\SysWOW64\Gqffnmfa.dll Mgekbljc.exe File created C:\Windows\SysWOW64\Ggpfjejo.dll Jbmfoa32.exe File created C:\Windows\SysWOW64\Lknjmkdo.exe Lklnhlfb.exe File created C:\Windows\SysWOW64\Paadnmaq.dll Nbhkac32.exe File opened for modification C:\Windows\SysWOW64\Mglack32.exe Mkepnjng.exe File created C:\Windows\SysWOW64\Leqcod32.dll Jibeql32.exe File created C:\Windows\SysWOW64\Kibnhjgj.exe Kphmie32.exe File opened for modification C:\Windows\SysWOW64\Lklnhlfb.exe Lnhmng32.exe File created C:\Windows\SysWOW64\Qcldhk32.dll Mkbchk32.exe File opened for modification C:\Windows\SysWOW64\Nnhfee32.exe Mdpalp32.exe File opened for modification C:\Windows\SysWOW64\Jiphkm32.exe Ijkljp32.exe File created C:\Windows\SysWOW64\Jdkind32.dll Ijkljp32.exe File created C:\Windows\SysWOW64\Bheenp32.dll Lnhmng32.exe File opened for modification C:\Windows\SysWOW64\Jibeql32.exe Jiphkm32.exe File created C:\Windows\SysWOW64\Lklnhlfb.exe Lnhmng32.exe File opened for modification C:\Windows\SysWOW64\Nbhkac32.exe Nceonl32.exe File opened for modification C:\Windows\SysWOW64\Jigollag.exe Jbmfoa32.exe File created C:\Windows\SysWOW64\Hnibdpde.dll Ngedij32.exe File opened for modification C:\Windows\SysWOW64\Jbmfoa32.exe Jaimbj32.exe File created C:\Windows\SysWOW64\Jeiooj32.dll Jaimbj32.exe File created C:\Windows\SysWOW64\Jigollag.exe Jbmfoa32.exe File created C:\Windows\SysWOW64\Lpappc32.exe Kckbqpnj.exe File created C:\Windows\SysWOW64\Kpdobeck.dll Lknjmkdo.exe File created C:\Windows\SysWOW64\Ipkobd32.dll Nceonl32.exe File created C:\Windows\SysWOW64\Hfkkgo32.dll Ifmcdblq.exe File created C:\Windows\SysWOW64\Bclhoo32.dll Jiphkm32.exe File created C:\Windows\SysWOW64\Bnjdmn32.dll Kibnhjgj.exe File opened for modification C:\Windows\SysWOW64\Lknjmkdo.exe Lklnhlfb.exe File opened for modification C:\Windows\SysWOW64\Mgekbljc.exe Lknjmkdo.exe File opened for modification C:\Windows\SysWOW64\Nqfbaq32.exe Nnhfee32.exe File created C:\Windows\SysWOW64\Jaimbj32.exe Jibeql32.exe File created C:\Windows\SysWOW64\Kphmie32.exe Kmjqmi32.exe File opened for modification C:\Windows\SysWOW64\Lnhmng32.exe Lpcmec32.exe File created C:\Windows\SysWOW64\Mkepnjng.exe Mkbchk32.exe File created C:\Windows\SysWOW64\Nnhfee32.exe Mdpalp32.exe File created C:\Windows\SysWOW64\Hlmobp32.dll Mdpalp32.exe File created C:\Windows\SysWOW64\Nqfbaq32.exe Nnhfee32.exe File opened for modification C:\Windows\SysWOW64\Nkcmohbg.exe Ngedij32.exe File created C:\Windows\SysWOW64\Ifmcdblq.exe 0ee7ce18e9719fcb98756d52601564c2e5e13b92b4f4a499821460418e343ddb.exe File created C:\Windows\SysWOW64\Mkeebhjc.dll Kmjqmi32.exe File created C:\Windows\SysWOW64\Ogndib32.dll Kckbqpnj.exe File created C:\Windows\SysWOW64\Bpcbnd32.dll Kphmie32.exe File opened for modification C:\Windows\SysWOW64\Kpmfddnf.exe Kibnhjgj.exe File created C:\Windows\SysWOW64\Lnhmng32.exe Lpcmec32.exe File created C:\Windows\SysWOW64\Dnapla32.dll Lpcmec32.exe File created C:\Windows\SysWOW64\Mgekbljc.exe Lknjmkdo.exe File opened for modification C:\Windows\SysWOW64\Ifmcdblq.exe 0ee7ce18e9719fcb98756d52601564c2e5e13b92b4f4a499821460418e343ddb.exe File opened for modification C:\Windows\SysWOW64\Jangmibi.exe Jigollag.exe File opened for modification C:\Windows\SysWOW64\Kmjqmi32.exe Kdaldd32.exe File created C:\Windows\SysWOW64\Ngedij32.exe Nbhkac32.exe File opened for modification C:\Windows\SysWOW64\Lpcmec32.exe Lkgdml32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1232 3080 WerFault.exe 115 -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lklnhlfb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oaehlf32.dll" Mkepnjng.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ipkobd32.dll" Nceonl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" 0ee7ce18e9719fcb98756d52601564c2e5e13b92b4f4a499821460418e343ddb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ijkljp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jdkind32.dll" Ijkljp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jbmfoa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lpappc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node 0ee7ce18e9719fcb98756d52601564c2e5e13b92b4f4a499821460418e343ddb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Leqcod32.dll" Jibeql32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jbmfoa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ajgblndm.dll" Kdaldd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mkepnjng.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kibnhjgj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mkbchk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ngedij32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bclhoo32.dll" Jiphkm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jiphkm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jibeql32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jaimbj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mkeebhjc.dll" Kmjqmi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nnhfee32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kibnhjgj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lpcmec32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lnhmng32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nnhfee32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Npckna32.dll" Nnhfee32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jaimbj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lknjmkdo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hlmobp32.dll" Mdpalp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kphmie32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bnjdmn32.dll" Kibnhjgj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Baefid32.dll" Lkgdml32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID 0ee7ce18e9719fcb98756d52601564c2e5e13b92b4f4a499821460418e343ddb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ijkljp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jigollag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lppaheqp.dll" Jigollag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kmjqmi32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lnhmng32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mgekbljc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nqfbaq32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nceonl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nbhkac32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kdaldd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lklnhlfb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nqfbaq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mkepnjng.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mdpalp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 0ee7ce18e9719fcb98756d52601564c2e5e13b92b4f4a499821460418e343ddb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hiaohfpc.dll" 0ee7ce18e9719fcb98756d52601564c2e5e13b92b4f4a499821460418e343ddb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jibeql32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jnngob32.dll" Lklnhlfb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qcldhk32.dll" Mkbchk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hfkkgo32.dll" Ifmcdblq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kckbqpnj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ogndib32.dll" Kckbqpnj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hnibdpde.dll" Ngedij32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} 0ee7ce18e9719fcb98756d52601564c2e5e13b92b4f4a499821460418e343ddb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jiphkm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dngdgf32.dll" Lpappc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mkbchk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fcdjjo32.dll" Nqfbaq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ifmcdblq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jeiooj32.dll" Jaimbj32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 560 wrote to memory of 3380 560 0ee7ce18e9719fcb98756d52601564c2e5e13b92b4f4a499821460418e343ddb.exe 81 PID 560 wrote to memory of 3380 560 0ee7ce18e9719fcb98756d52601564c2e5e13b92b4f4a499821460418e343ddb.exe 81 PID 560 wrote to memory of 3380 560 0ee7ce18e9719fcb98756d52601564c2e5e13b92b4f4a499821460418e343ddb.exe 81 PID 3380 wrote to memory of 2768 3380 Ifmcdblq.exe 82 PID 3380 wrote to memory of 2768 3380 Ifmcdblq.exe 82 PID 3380 wrote to memory of 2768 3380 Ifmcdblq.exe 82 PID 2768 wrote to memory of 1364 2768 Ijkljp32.exe 83 PID 2768 wrote to memory of 1364 2768 Ijkljp32.exe 83 PID 2768 wrote to memory of 1364 2768 Ijkljp32.exe 83 PID 1364 wrote to memory of 2512 1364 Jiphkm32.exe 84 PID 1364 wrote to memory of 2512 1364 Jiphkm32.exe 84 PID 1364 wrote to memory of 2512 1364 Jiphkm32.exe 84 PID 2512 wrote to memory of 1408 2512 Jibeql32.exe 85 PID 2512 wrote to memory of 1408 2512 Jibeql32.exe 85 PID 2512 wrote to memory of 1408 2512 Jibeql32.exe 85 PID 1408 wrote to memory of 1256 1408 Jaimbj32.exe 87 PID 1408 wrote to memory of 1256 1408 Jaimbj32.exe 87 PID 1408 wrote to memory of 1256 1408 Jaimbj32.exe 87 PID 1256 wrote to memory of 2208 1256 Jbmfoa32.exe 88 PID 1256 wrote to memory of 2208 1256 Jbmfoa32.exe 88 PID 1256 wrote to memory of 2208 1256 Jbmfoa32.exe 88 PID 2208 wrote to memory of 1284 2208 Jigollag.exe 89 PID 2208 wrote to memory of 1284 2208 Jigollag.exe 89 PID 2208 wrote to memory of 1284 2208 Jigollag.exe 89 PID 1284 wrote to memory of 4636 1284 Jangmibi.exe 92 PID 1284 wrote to memory of 4636 1284 Jangmibi.exe 92 PID 1284 wrote to memory of 4636 1284 Jangmibi.exe 92 PID 4636 wrote to memory of 344 4636 Kdaldd32.exe 93 PID 4636 wrote to memory of 344 4636 Kdaldd32.exe 93 PID 4636 wrote to memory of 344 4636 Kdaldd32.exe 93 PID 344 wrote to memory of 2852 344 Kmjqmi32.exe 94 PID 344 wrote to memory of 2852 344 Kmjqmi32.exe 94 PID 344 wrote to memory of 2852 344 Kmjqmi32.exe 94 PID 2852 wrote to memory of 2464 2852 Kphmie32.exe 95 PID 2852 wrote to memory of 2464 2852 Kphmie32.exe 95 PID 2852 wrote to memory of 2464 2852 Kphmie32.exe 95 PID 2464 wrote to memory of 4796 2464 Kibnhjgj.exe 96 PID 2464 wrote to memory of 4796 2464 Kibnhjgj.exe 96 PID 2464 wrote to memory of 4796 2464 Kibnhjgj.exe 96 PID 4796 wrote to memory of 404 4796 Kpmfddnf.exe 97 PID 4796 wrote to memory of 404 4796 Kpmfddnf.exe 97 PID 4796 wrote to memory of 404 4796 Kpmfddnf.exe 97 PID 404 wrote to memory of 3948 404 Kckbqpnj.exe 98 PID 404 wrote to memory of 3948 404 Kckbqpnj.exe 98 PID 404 wrote to memory of 3948 404 Kckbqpnj.exe 98 PID 3948 wrote to memory of 4352 3948 Lpappc32.exe 99 PID 3948 wrote to memory of 4352 3948 Lpappc32.exe 99 PID 3948 wrote to memory of 4352 3948 Lpappc32.exe 99 PID 4352 wrote to memory of 4264 4352 Lkgdml32.exe 100 PID 4352 wrote to memory of 4264 4352 Lkgdml32.exe 100 PID 4352 wrote to memory of 4264 4352 Lkgdml32.exe 100 PID 4264 wrote to memory of 3960 4264 Lpcmec32.exe 101 PID 4264 wrote to memory of 3960 4264 Lpcmec32.exe 101 PID 4264 wrote to memory of 3960 4264 Lpcmec32.exe 101 PID 3960 wrote to memory of 5096 3960 Lnhmng32.exe 102 PID 3960 wrote to memory of 5096 3960 Lnhmng32.exe 102 PID 3960 wrote to memory of 5096 3960 Lnhmng32.exe 102 PID 5096 wrote to memory of 5036 5096 Lklnhlfb.exe 103 PID 5096 wrote to memory of 5036 5096 Lklnhlfb.exe 103 PID 5096 wrote to memory of 5036 5096 Lklnhlfb.exe 103 PID 5036 wrote to memory of 1588 5036 Lknjmkdo.exe 104 PID 5036 wrote to memory of 1588 5036 Lknjmkdo.exe 104 PID 5036 wrote to memory of 1588 5036 Lknjmkdo.exe 104 PID 1588 wrote to memory of 3092 1588 Mgekbljc.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\0ee7ce18e9719fcb98756d52601564c2e5e13b92b4f4a499821460418e343ddb.exe"C:\Users\Admin\AppData\Local\Temp\0ee7ce18e9719fcb98756d52601564c2e5e13b92b4f4a499821460418e343ddb.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:560 -
C:\Windows\SysWOW64\Ifmcdblq.exeC:\Windows\system32\Ifmcdblq.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3380 -
C:\Windows\SysWOW64\Ijkljp32.exeC:\Windows\system32\Ijkljp32.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Windows\SysWOW64\Jiphkm32.exeC:\Windows\system32\Jiphkm32.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Windows\SysWOW64\Jibeql32.exeC:\Windows\system32\Jibeql32.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Windows\SysWOW64\Jaimbj32.exeC:\Windows\system32\Jaimbj32.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Windows\SysWOW64\Jbmfoa32.exeC:\Windows\system32\Jbmfoa32.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Windows\SysWOW64\Jigollag.exeC:\Windows\system32\Jigollag.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\SysWOW64\Jangmibi.exeC:\Windows\system32\Jangmibi.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Windows\SysWOW64\Kdaldd32.exeC:\Windows\system32\Kdaldd32.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4636 -
C:\Windows\SysWOW64\Kmjqmi32.exeC:\Windows\system32\Kmjqmi32.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:344 -
C:\Windows\SysWOW64\Kphmie32.exeC:\Windows\system32\Kphmie32.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Windows\SysWOW64\Kibnhjgj.exeC:\Windows\system32\Kibnhjgj.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Windows\SysWOW64\Kpmfddnf.exeC:\Windows\system32\Kpmfddnf.exe14⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Windows\SysWOW64\Kckbqpnj.exeC:\Windows\system32\Kckbqpnj.exe15⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:404 -
C:\Windows\SysWOW64\Lpappc32.exeC:\Windows\system32\Lpappc32.exe16⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3948 -
C:\Windows\SysWOW64\Lkgdml32.exeC:\Windows\system32\Lkgdml32.exe17⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4352 -
C:\Windows\SysWOW64\Lpcmec32.exeC:\Windows\system32\Lpcmec32.exe18⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4264 -
C:\Windows\SysWOW64\Lnhmng32.exeC:\Windows\system32\Lnhmng32.exe19⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3960 -
C:\Windows\SysWOW64\Lklnhlfb.exeC:\Windows\system32\Lklnhlfb.exe20⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Windows\SysWOW64\Lknjmkdo.exeC:\Windows\system32\Lknjmkdo.exe21⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Windows\SysWOW64\Mgekbljc.exeC:\Windows\system32\Mgekbljc.exe22⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1588 -
C:\Windows\SysWOW64\Mkbchk32.exeC:\Windows\system32\Mkbchk32.exe23⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:3092 -
C:\Windows\SysWOW64\Mkepnjng.exeC:\Windows\system32\Mkepnjng.exe24⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:3612 -
C:\Windows\SysWOW64\Mglack32.exeC:\Windows\system32\Mglack32.exe25⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:2900 -
C:\Windows\SysWOW64\Mdpalp32.exeC:\Windows\system32\Mdpalp32.exe26⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:3476 -
C:\Windows\SysWOW64\Nnhfee32.exeC:\Windows\system32\Nnhfee32.exe27⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:3096 -
C:\Windows\SysWOW64\Nqfbaq32.exeC:\Windows\system32\Nqfbaq32.exe28⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:4228 -
C:\Windows\SysWOW64\Nceonl32.exeC:\Windows\system32\Nceonl32.exe29⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1832 -
C:\Windows\SysWOW64\Nbhkac32.exeC:\Windows\system32\Nbhkac32.exe30⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:3844 -
C:\Windows\SysWOW64\Ngedij32.exeC:\Windows\system32\Ngedij32.exe31⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1280 -
C:\Windows\SysWOW64\Nkcmohbg.exeC:\Windows\system32\Nkcmohbg.exe32⤵
- Executes dropped EXE
PID:3080 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3080 -s 40033⤵
- Program crash
PID:1232
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3080 -ip 30801⤵PID:2356
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
335KB
MD5bfdd582917b0fef4d5c95b4f63d566ae
SHA1571950d0528ec6de0f933293c6c8137fe2b9b775
SHA2561b971b462739a2a3453e00b550a782d2399cb63b851369e4013733d2f5a541c5
SHA51223da03816f5e530dd4c0e82bf7c4ab14a550211da32b8c5507b9d41b31be3a8b42da64488701dbdecb3a5d42e0ac189b9947e909ea73f87daa932362bf9acfc8
-
Filesize
335KB
MD5e2c53341a582dfa9503d4d47704e5295
SHA1d8e0a3865909b0557e87ed39be9c4702093d4f14
SHA256261ba172c23d8d80b3b4a5d02c3f64e489f11f8f166dff35a35363c102d6223f
SHA512e0885acb3b2dbee963673b080d854ee37bf82d8ea54568f305f34d08ca55b63fb42958af8907c7f02df6c08786295f69c02be7ecd913ae847244c7da1de88c36
-
Filesize
335KB
MD512e8a03e77b0d7f0fafc48ffc68f18cf
SHA15aa3d4d52ff435f72cd71792c63986c828cadf56
SHA256bca5a39480d95bd183cf509693b55cf1facba28c07a02d636e4a1df3c3ed4a3d
SHA5126de15b2836d3942d82d4e412fc2fbf2a69c21bc0f5dded044e844161e29a82fcf6e0fd05bda9d71300a2cfdb4e51ec511420655e8aa6d98a28c750528f9d3a41
-
Filesize
335KB
MD538a139d683ee12974e9934b2138a36b8
SHA12145634ef050f78af1577b4f81c0f1702bdfbc07
SHA2561f28910c8f454db19771f1340f988d63704238c4f9df376e4f74d7592109d23f
SHA512fe2b281eccc4a14b6471ac003729d249b440aedf17fa14b8f56ded2725f9708bdf9f65a3af7ca1ef4b234407ec5a78b8fb7fc46ed7dd0d53be5d4de830120fa6
-
Filesize
335KB
MD593221845001c960fa9b344e439bf2991
SHA1f0e77c441fc3a2311714dc59dac5449eef56bc8a
SHA2567f577aa65398c90e2e7378417695f62bc3420b1fca44dd6056c2224c9d45dfe7
SHA512b7096dd82cda1610b34111e44f5603b72aa31aa65ca9287c941aa1078e055c85b09aa7054d5f4d663c2f63feb721f2af18fba48bd76c5fb7d974ada9af38efb2
-
Filesize
335KB
MD55549b00e07ad94472794eaa06536f913
SHA190b51d3d299655a42d67e22131aaf0c9fac9e6c0
SHA25608b64d146c45d0cb448490810c99beb92f883d14de23dc96ace616aaaab11699
SHA5124685ef17a35fe6f02304c92a69d32bf3e091e23e193f0e0a17c7a84fe22506bf0f3034501c93f999f20c1d0651b37252c2079a75d881b68f0f87df824959a2f0
-
Filesize
335KB
MD5d2d3fe6f4cd95a5bfdbee62c961e35a0
SHA1c48f042540ed02153314db13af4fa72312bfbb88
SHA256c8d6657db541aa6230c24fdfd22c2a35c0d31fc584765300fbb88336c259b201
SHA512f72a840328fc4a5fc1aedb75a6845fe018cbda552244913e8be4cddb63a1aaed32585c593c1d5ce010e83a9f2ec7cfce61a79c76fd6c43c3e5fdbe06343118a4
-
Filesize
335KB
MD5827040eeb9794d56427ed4042297c765
SHA1abd8e4741822f30f29f374f82132239189de19e9
SHA256f1dbf389a9b48af63bde17ce434dc4d15f1eb83007c2ac8721c161dc35e65708
SHA51264cf5b673e2928058a6d0471e3d03ec1092894e59f789d56ba2dba91756eb9da98c95389a2dc6d460bd30d108726de3e05f40dbaae39f8e5c12a630af6978d19
-
Filesize
335KB
MD56ab6a9292cc0db5f3dfa2747ffae02f9
SHA11bfc44bc3820b72590be713b2193b4ddcc0780dc
SHA25668faee0a14c3634654528bcd0eaf2a06cad297af9f9addf471985c59c584ff3f
SHA512bd76c2800768292288116610f491e57c6097a6ec6f00307459b7811547d678af416affe15458d144feb12f14530680b378ac60cb28e10b3c4ee476ad20387b9a
-
Filesize
335KB
MD5cd6a73214dc304f8a043e211e215016b
SHA1fa22b282e6f14a75acec42b43426cb4dd90c3041
SHA25678b986af7ca0336c0252cfd845d098711c82be9fdadf2d7deed88cd471575138
SHA512996aa803bcfb9305de70f494dd9fbe7be6f34460ea591dc6ee3b2340c1ccaa54372535cfcbc56e7a7ee23af8089746b7be9039bcfb4245f42f2c2d57795b2572
-
Filesize
335KB
MD5ff4f6ac50412de7ac4fc3daadd13f1e4
SHA16f3efc66967c1430fb83fd7225cb4fff2808b7a1
SHA256979601499d68f977b16acfe66dbe71a1b8f6d8a32bb4347e482dbd15ebda61b3
SHA512dfed3d2bdbe3e14baa2f1f9890ddffdf743f7cdcc3a4464b5161411b65e36af486973450d27b337efa090d1bc73fcf874b01da62dc6c1f191ae29463f03687f3
-
Filesize
335KB
MD5af1eb08e8eeea22d40e0f9ad67351388
SHA134065b15050df501c478233961a216b816a668de
SHA2561dd5be87a9920ed7ce8f8d401f4e5946089722273aae4d1914759f86cbcd9834
SHA5125d76065befe2ccb1f901e59da82f68bf83ea78a91bf24683b27022f94492e33668dce0aca50c025f4a29a56a6dd7e707a67c37ee3458dca95002542028976818
-
Filesize
335KB
MD5552b885d5ee2ff69b16dfe8f52376b86
SHA1085b162d551897438b9e9f96b2e0c71936975d94
SHA256ef141c974b903730318af09a0822dad8ab9388eef47c23ad4182147ebb8d5da1
SHA512854ad4988023e0d605d8ad5f0c0e4a352d979181222f447de4e4cac76a468242703bf53e08d5de68381d52aeca92c696a78a75c4fd410e65c908bea98096cf89
-
Filesize
335KB
MD51e0ed6a535b48df03dac6a8836222a1e
SHA1b8ae4a250fd2ad7eafe2d7cbe1fd864aef0b0714
SHA2561341c7770cf7f5514d183074f214b231ba0c40b57242bab90974e9c42d982be5
SHA512a3bd44d20701516f0f6bb5c3653a4f3c909edea45d1bb5c1c75e7a82cb28515468702e36648663c1e1dd1edd9ba945c43380a2120e15ca0d41dd3db39050dcb2
-
Filesize
335KB
MD5a5dc279741e360d8de590e621ec06806
SHA12b913e7ef43363dc932eaba7192303777d84d44e
SHA25645a877d93d11efb44169f6e9306eb9158418531a64e0a355ee495ec3bb732c92
SHA51222483fe2807b5a37bed5e6a12a1d6fad6e56da6993fc14d6a4ee7be6f33e0ea9618ceebfd10f1b3313f180697f7f9bc0baf0438d3c64f00ee499404f572b19b1
-
Filesize
335KB
MD5840b304db0cf10b716b0c98425da698f
SHA1787f9072e04e5801fc154b449508ddaf2c047885
SHA256254eb8b96dcb9a74cac516eabd1b2a8c30ab16de98d16a029fe10edbf00003cb
SHA512258c44163c5416b636e9c677d898d0edc679282350b73813d1ef11bb46f76e65c0c3872b4783a37addeae09850f77ea88491c742b9143d56e7c676b3dd3829c9
-
Filesize
335KB
MD55b386fa53bfc4d6e6c58bb30173d6ca8
SHA15ecef2efd4346d88784eb7c849ec531c2e25ee25
SHA2562e0212b91842743e5a151d8af3b5a142b64945f0f4b3808e7027002ea367cddd
SHA512d265bf2f378230515e13c45218fcaf618420d64ff606db2881a874c9304d3a336442c2ee9c56c4a97c38cced7546ab258a755648a042602d3149ed31df61be9f
-
Filesize
335KB
MD57dd10160e68f6f9080c6c060714ad58a
SHA11c843bb7bd0203705d99b6a627b31f1e842c98c1
SHA2563080af8795b12f8e9bf33713053e8a2566b5abe7cecfdab08f648ad84ea4a014
SHA512041cdb870fa87a917bbb686e09c7c14cbb476044fddf5d6e881bdcc3805fc8b6e465146e3ac8dc3b466c5c099bdf45c202b2dfe6093186498307ee7ad95098bb
-
Filesize
335KB
MD5967943f76ad8be56e3b6f16d1dce0181
SHA18362ca6035677787e2b7b52f1db7bb8a4c2383cd
SHA2568186201643f64fd77f850c87193630a04dce48335114622bf703b31ef32abd40
SHA512dbf6c70ddf514df7812a422d2c6ef952e2a322ae66a6609367ffe7c75f67ff89544cb03f61c9527452d58654207638dcd7dce024301920d529eead3a6b1a6102
-
Filesize
335KB
MD59d0a59933ca182221c6c17a57a2b2034
SHA1ef4e8b0d9a319c9cbeb50c84daf20caaaea6d203
SHA25688d8def544ef5daee245c2ade39e471cfa520ea6a968766964e8eccc20ea5034
SHA51229b64c88e32908a8a8ce9916529fcdd3e67f7281b021f6d5a7db80f617ff966dbce2b1726ce29b6bb9de043121dbd49cd558f7876490adda6b434a3c8c4bd83c
-
Filesize
335KB
MD5bf702ef8fb0aec7a928870326054b35b
SHA15603234abbde835741e626225ad8915ac34a8ac6
SHA256ec28658a9d82b76098161befa8d3b107c9cb15cd0646b7e9a57b0f791c9f9ef1
SHA512e41ac816e6e0f19876657397d0bc91a8ce683273b5ee499fe57cbafa5d96844ac30cfde452a1d585ea56eaf256ce43c1dd13d04cb1506e50637263dd4bc33673
-
Filesize
335KB
MD57aeb86aafe421bc016333ea423463159
SHA140d24ebf3fc592adb8ed2d4cec523bdb117708c0
SHA2566eaf09814af9acaba028d3a710ad8037f312dd7fa59fa338dbbef08c2ba7a49c
SHA512f7b0c69635525f2a5efce4952b4df7ff8ea205ca2b57b727006fbfdfb0885c5ccf701cf1bda782442c748527e88706c403a3e467dd2f34e9c6e5e71672bc8351
-
Filesize
335KB
MD5cbc4b11ddd96a8aa7140d34d8fc339c5
SHA12434d44b37ea2c9ff643d27c1b665e423a4d73a2
SHA256be114b935f8f22af66b7d6f4a1763f88bca51960a0573425a48ea5c21b83980d
SHA512cd14d9c6261cddd4d7af51a657a077ea907d2e3b7cf09d4c41efad4f8e7128a32eecfde948e57640c36de072003eedbfdca32dfc140e692564f2b94d35dba13d
-
Filesize
335KB
MD5c0dc53ce643b3c3adebfff3decf3901d
SHA1dd6223dfa91a137cb9843f689f8c35d11384690f
SHA256471fd170d9ad4b240259bafaaebe74d1a5da56ae4c1f78e96ea6678f5bc10201
SHA512a84233a4c893d45f4836875532ac44c910a9a41403036e7c76ef3d12178c59d2674c5072dd9b40f0a696c7ef30adb4b40875ecfe4c9c8d6564eadde7d8af3bdd
-
Filesize
335KB
MD53bd155663a7036a0e079e9f94177401f
SHA1781da6c6c6ce4de3a163ea5c4648339bcbd28ca5
SHA256900f24b4230ea78b8f10d407337c2a1dc9c96ad3a53caea3b11579a1cf5a16a3
SHA512ccd248c477ff51f7e7c50aa617dd88ab6ae438c1b51be89a41bb522483bb0852464eff2743730bccad08e9cde5002dc2e4a3ba795b821c5077459925fab9fbed
-
Filesize
335KB
MD5e0b4e5e34fe48f556879b4a20df36fb1
SHA13c756e2d55f45a56750b74de42ebd32709925f80
SHA25680689f41e8eca8c062ff1d764227fae044207394a8c0a69c816ae413c3bdbc5c
SHA512a1c2190bab7d274ef4481c5d3b7cc9d0fa5898f6de63ffe6de176dd9f16d117b4fb06999fff0a7afede2d6ac80b36951109dd2a6e4e5b19612f7944f54eedce6
-
Filesize
335KB
MD584b8c8c1805bff9b59fe2da5ecf36ead
SHA1db5011135572a72e84500d7956cdd77d2238153f
SHA25609d2efafad917668282499971259a458f3298c4f00a1d3254ac46dc713989c83
SHA512af0881359c9615849ac628bd8d550a02fcf62c5304c618f6fb38d3a21c55cdede6d79dbb5ec3ea6835bed08f010997b70d1e78de3aa86eb5494bc22a7759101e
-
Filesize
335KB
MD5ae02b43e1ce33ad36df9698ad4593456
SHA1b0e4a3ad30e0076afc31d2e38936fb6263144e75
SHA256109df8b3b2ed91b6a730aad8c48276c55a8d76856f85b7548ce7aee8e677ad7c
SHA5129c2f1473638564ed08e85d368ca535a29706a5e7fe4eee618e515a4e087c89c23a53d7724abb7b604f981a69db00cf89bccda9205d2c54ef2aa5090430604552
-
Filesize
335KB
MD5c4c13ba773d80ddb4e533172573c0ca8
SHA168946743fc8cca0eb15f3818f0e1ce614d203144
SHA256d2b1db1d2525cf2dbcfc486a8bb7f42886c0d774912ae938a7920a0fd6207d62
SHA51271ddc4bbf52895a44783fee080200495930272db4b02e21f95816c4c7050a1c77cab665f08d3f2a2ebe606fe5a34e45fe8f006c4e554ccf616519201f08301c5
-
Filesize
335KB
MD5b57145acf39530878a662ef93344c7a7
SHA120a1a543a4fd3a89ca6e6844322276bc7674f140
SHA2566bfcd06b45263ab0d1f2156d9f41f464bf10cf931927c6d346ca46cb02cfa5b9
SHA512d7ff1eca6285d37ae57da5be442721344b1db1418ad1ae06ea49dce0e00a495bb23cb294703a5801c943c671660cea810a13f6940446790149088d8aa57b9c2c
-
Filesize
335KB
MD5c09aa16d92999639388f26c17b78e802
SHA17277429abc114d44b854bd3529893c31332ce570
SHA256f401173844cf6b8ac124436447c13a864b05c4c539124d6e4402720a7e6cff47
SHA512abdf10a08aa9add49248ae891fae2bd827a12f06aef4d4c4cc256ec92758426547e3a19350a8bfad37c5c484059302f725855168abd96102d7b6bc409893cfe0