Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22/05/2024, 12:50
Static task
static1
Behavioral task
behavioral1
Sample
2a4d561c7dfdbb8c84427e3a5d81bd5b4f59b8b9768657ed9ea9ca6fe251b36a.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2a4d561c7dfdbb8c84427e3a5d81bd5b4f59b8b9768657ed9ea9ca6fe251b36a.exe
Resource
win10v2004-20240508-en
General
-
Target
2a4d561c7dfdbb8c84427e3a5d81bd5b4f59b8b9768657ed9ea9ca6fe251b36a.exe
-
Size
101KB
-
MD5
21e6dceeab62c8c165af60b364192110
-
SHA1
957d473d20eedf96c2e5a2ba162b90e8a34d084e
-
SHA256
2a4d561c7dfdbb8c84427e3a5d81bd5b4f59b8b9768657ed9ea9ca6fe251b36a
-
SHA512
7d2bf6d00ea1063baa86880534701ab089928f6235152c80b99ea487031362753a0431fcc690ae88740835d140cdf38ca8e7d0a78db2ecbfd2d74df2ab7244ed
-
SSDEEP
3072:Hnj78D34PnpdsiqTfI19One3Ab3/zrB3g3k8p4qI4/HQCC:Hn8VTfI1JQDPBZs/HNC
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 60 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 2a4d561c7dfdbb8c84427e3a5d81bd5b4f59b8b9768657ed9ea9ca6fe251b36a.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nddkgonp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Nkncdifl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Lkiqbl32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mahbje32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Mgidml32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nceonl32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mnocof32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Mglack32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nnhfee32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" 2a4d561c7dfdbb8c84427e3a5d81bd5b4f59b8b9768657ed9ea9ca6fe251b36a.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lkiqbl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Lpfijcfl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lgbnmm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Mnocof32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nnolfdcn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ndidbn32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ljnnch32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Lddbqa32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nqklmpdd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ngedij32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Mamleegg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Mjeddggd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mgidml32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nkncdifl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Nddkgonp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Nqklmpdd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ndidbn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Mgekbljc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mamleegg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Mjhqjg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Maohkd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Lcbiao32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Lgbnmm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Maaepd32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mgnnhk32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mjjmog32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nnjbke32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Nnolfdcn.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lnjjdgee.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mpmokb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Mpmokb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Nceonl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Mgnnhk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Nnhfee32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lpfijcfl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mgekbljc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mjeddggd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mjhqjg32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lcbiao32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lddbqa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Mahbje32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Maaepd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Nnjbke32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Mjjmog32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ngedij32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ljnnch32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Lnjjdgee.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Maohkd32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mglack32.exe -
Executes dropped EXE 30 IoCs
pid Process 4788 Lcbiao32.exe 4192 Lkiqbl32.exe 3144 Lpfijcfl.exe 3636 Ljnnch32.exe 2132 Lnjjdgee.exe 640 Lddbqa32.exe 2328 Lgbnmm32.exe 4916 Mahbje32.exe 2180 Mgekbljc.exe 3856 Mnocof32.exe 4528 Mpmokb32.exe 3748 Mjeddggd.exe 2984 Mamleegg.exe 5032 Mgidml32.exe 3276 Mjhqjg32.exe 2412 Maohkd32.exe 3960 Mglack32.exe 2184 Mjjmog32.exe 4340 Maaepd32.exe 5060 Mgnnhk32.exe 3688 Nnhfee32.exe 2960 Nceonl32.exe 2256 Nnjbke32.exe 3356 Nddkgonp.exe 2816 Nkncdifl.exe 3696 Nqklmpdd.exe 4840 Ngedij32.exe 3308 Nnolfdcn.exe 396 Ndidbn32.exe 3528 Nkcmohbg.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\Mbaohn32.dll Lkiqbl32.exe File opened for modification C:\Windows\SysWOW64\Lnjjdgee.exe Ljnnch32.exe File created C:\Windows\SysWOW64\Cnacjn32.dll Mamleegg.exe File created C:\Windows\SysWOW64\Gpnkgo32.dll Mgidml32.exe File created C:\Windows\SysWOW64\Pbcfgejn.dll Mjhqjg32.exe File opened for modification C:\Windows\SysWOW64\Maaepd32.exe Mjjmog32.exe File opened for modification C:\Windows\SysWOW64\Ljnnch32.exe Lpfijcfl.exe File opened for modification C:\Windows\SysWOW64\Mgekbljc.exe Mahbje32.exe File opened for modification C:\Windows\SysWOW64\Lkiqbl32.exe Lcbiao32.exe File created C:\Windows\SysWOW64\Jpgeph32.dll Lnjjdgee.exe File opened for modification C:\Windows\SysWOW64\Mnocof32.exe Mgekbljc.exe File created C:\Windows\SysWOW64\Mgidml32.exe Mamleegg.exe File created C:\Windows\SysWOW64\Ekiidlll.dll Lcbiao32.exe File created C:\Windows\SysWOW64\Lpfijcfl.exe Lkiqbl32.exe File created C:\Windows\SysWOW64\Mahbje32.exe Lgbnmm32.exe File opened for modification C:\Windows\SysWOW64\Mgnnhk32.exe Maaepd32.exe File opened for modification C:\Windows\SysWOW64\Nnhfee32.exe Mgnnhk32.exe File created C:\Windows\SysWOW64\Nnjbke32.exe Nceonl32.exe File opened for modification C:\Windows\SysWOW64\Nkncdifl.exe Nddkgonp.exe File created C:\Windows\SysWOW64\Ibhblqpo.dll Lgbnmm32.exe File opened for modification C:\Windows\SysWOW64\Mjeddggd.exe Mpmokb32.exe File opened for modification C:\Windows\SysWOW64\Nnolfdcn.exe Ngedij32.exe File created C:\Windows\SysWOW64\Jlnpomfk.dll Nnjbke32.exe File created C:\Windows\SysWOW64\Lnjjdgee.exe Ljnnch32.exe File created C:\Windows\SysWOW64\Lgbnmm32.exe Lddbqa32.exe File opened for modification C:\Windows\SysWOW64\Lgbnmm32.exe Lddbqa32.exe File created C:\Windows\SysWOW64\Kpdobeck.dll Mahbje32.exe File opened for modification C:\Windows\SysWOW64\Mjhqjg32.exe Mgidml32.exe File created C:\Windows\SysWOW64\Fcdjjo32.dll Nnhfee32.exe File opened for modification C:\Windows\SysWOW64\Nddkgonp.exe Nnjbke32.exe File created C:\Windows\SysWOW64\Nqklmpdd.exe Nkncdifl.exe File opened for modification C:\Windows\SysWOW64\Nkcmohbg.exe Ndidbn32.exe File created C:\Windows\SysWOW64\Lkiqbl32.exe Lcbiao32.exe File opened for modification C:\Windows\SysWOW64\Lpfijcfl.exe Lkiqbl32.exe File opened for modification C:\Windows\SysWOW64\Maohkd32.exe Mjhqjg32.exe File created C:\Windows\SysWOW64\Kmalco32.dll Nceonl32.exe File created C:\Windows\SysWOW64\Ljfemn32.dll Nkncdifl.exe File created C:\Windows\SysWOW64\Ngedij32.exe Nqklmpdd.exe File created C:\Windows\SysWOW64\Paadnmaq.dll Nqklmpdd.exe File created C:\Windows\SysWOW64\Lcbiao32.exe 2a4d561c7dfdbb8c84427e3a5d81bd5b4f59b8b9768657ed9ea9ca6fe251b36a.exe File created C:\Windows\SysWOW64\Bkankc32.dll Mnocof32.exe File created C:\Windows\SysWOW64\Mjeddggd.exe Mpmokb32.exe File opened for modification C:\Windows\SysWOW64\Mglack32.exe Maohkd32.exe File created C:\Windows\SysWOW64\Mgnnhk32.exe Maaepd32.exe File opened for modification C:\Windows\SysWOW64\Ndidbn32.exe Nnolfdcn.exe File created C:\Windows\SysWOW64\Nkcmohbg.exe Ndidbn32.exe File created C:\Windows\SysWOW64\Gefncbmc.dll Lpfijcfl.exe File opened for modification C:\Windows\SysWOW64\Mamleegg.exe Mjeddggd.exe File created C:\Windows\SysWOW64\Oaehlf32.dll Maohkd32.exe File created C:\Windows\SysWOW64\Nnhfee32.exe Mgnnhk32.exe File created C:\Windows\SysWOW64\Nceonl32.exe Nnhfee32.exe File created C:\Windows\SysWOW64\Nddkgonp.exe Nnjbke32.exe File created C:\Windows\SysWOW64\Jkeang32.dll Nddkgonp.exe File created C:\Windows\SysWOW64\Lidmdfdo.dll 2a4d561c7dfdbb8c84427e3a5d81bd5b4f59b8b9768657ed9ea9ca6fe251b36a.exe File created C:\Windows\SysWOW64\Mgekbljc.exe Mahbje32.exe File created C:\Windows\SysWOW64\Mpmokb32.exe Mnocof32.exe File opened for modification C:\Windows\SysWOW64\Nqklmpdd.exe Nkncdifl.exe File created C:\Windows\SysWOW64\Ndidbn32.exe Nnolfdcn.exe File created C:\Windows\SysWOW64\Mecaoggc.dll Lddbqa32.exe File created C:\Windows\SysWOW64\Oedbld32.dll Mgekbljc.exe File created C:\Windows\SysWOW64\Mamleegg.exe Mjeddggd.exe File created C:\Windows\SysWOW64\Mjhqjg32.exe Mgidml32.exe File created C:\Windows\SysWOW64\Mglack32.exe Maohkd32.exe File created C:\Windows\SysWOW64\Hlmobp32.dll Mgnnhk32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1120 3528 WerFault.exe 112 -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mbaohn32.dll" Lkiqbl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gefncbmc.dll" Lpfijcfl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jgengpmj.dll" Mjeddggd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Nnjbke32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Nkncdifl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831} 2a4d561c7dfdbb8c84427e3a5d81bd5b4f59b8b9768657ed9ea9ca6fe251b36a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Lnjjdgee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cknpkhch.dll" Ngedij32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Nqklmpdd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Lnjjdgee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oedbld32.dll" Mgekbljc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Mamleegg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cnacjn32.dll" Mamleegg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Mamleegg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Nnjbke32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Mnocof32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Mjeddggd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Mjeddggd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Nceonl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jlnpomfk.dll" Nnjbke32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Nqklmpdd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jkeang32.dll" Nddkgonp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ljfemn32.dll" Nkncdifl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Lddbqa32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Lgbnmm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Mahbje32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Maohkd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fcdjjo32.dll" Nnhfee32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Nceonl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Ngedij32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bebboiqi.dll" Mjjmog32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Nnhfee32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Mahbje32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Mgekbljc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Mgidml32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Mjhqjg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Mglack32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Mjjmog32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Nnhfee32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kmalco32.dll" Nceonl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hnibdpde.dll" Ndidbn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node 2a4d561c7dfdbb8c84427e3a5d81bd5b4f59b8b9768657ed9ea9ca6fe251b36a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lidmdfdo.dll" 2a4d561c7dfdbb8c84427e3a5d81bd5b4f59b8b9768657ed9ea9ca6fe251b36a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Lkiqbl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kpdobeck.dll" Mahbje32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Opbnic32.dll" Nnolfdcn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Ndidbn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bkankc32.dll" Mnocof32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pbcfgejn.dll" Mjhqjg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Mjhqjg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Nddkgonp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Ngedij32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" 2a4d561c7dfdbb8c84427e3a5d81bd5b4f59b8b9768657ed9ea9ca6fe251b36a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Lkiqbl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Lpfijcfl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Ljnnch32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Lddbqa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hlmobp32.dll" Mgnnhk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Ljnnch32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Mnocof32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Mpmokb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oaehlf32.dll" Maohkd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Mgnnhk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Nnolfdcn.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4768 wrote to memory of 4788 4768 2a4d561c7dfdbb8c84427e3a5d81bd5b4f59b8b9768657ed9ea9ca6fe251b36a.exe 82 PID 4768 wrote to memory of 4788 4768 2a4d561c7dfdbb8c84427e3a5d81bd5b4f59b8b9768657ed9ea9ca6fe251b36a.exe 82 PID 4768 wrote to memory of 4788 4768 2a4d561c7dfdbb8c84427e3a5d81bd5b4f59b8b9768657ed9ea9ca6fe251b36a.exe 82 PID 4788 wrote to memory of 4192 4788 Lcbiao32.exe 83 PID 4788 wrote to memory of 4192 4788 Lcbiao32.exe 83 PID 4788 wrote to memory of 4192 4788 Lcbiao32.exe 83 PID 4192 wrote to memory of 3144 4192 Lkiqbl32.exe 84 PID 4192 wrote to memory of 3144 4192 Lkiqbl32.exe 84 PID 4192 wrote to memory of 3144 4192 Lkiqbl32.exe 84 PID 3144 wrote to memory of 3636 3144 Lpfijcfl.exe 85 PID 3144 wrote to memory of 3636 3144 Lpfijcfl.exe 85 PID 3144 wrote to memory of 3636 3144 Lpfijcfl.exe 85 PID 3636 wrote to memory of 2132 3636 Ljnnch32.exe 86 PID 3636 wrote to memory of 2132 3636 Ljnnch32.exe 86 PID 3636 wrote to memory of 2132 3636 Ljnnch32.exe 86 PID 2132 wrote to memory of 640 2132 Lnjjdgee.exe 87 PID 2132 wrote to memory of 640 2132 Lnjjdgee.exe 87 PID 2132 wrote to memory of 640 2132 Lnjjdgee.exe 87 PID 640 wrote to memory of 2328 640 Lddbqa32.exe 88 PID 640 wrote to memory of 2328 640 Lddbqa32.exe 88 PID 640 wrote to memory of 2328 640 Lddbqa32.exe 88 PID 2328 wrote to memory of 4916 2328 Lgbnmm32.exe 89 PID 2328 wrote to memory of 4916 2328 Lgbnmm32.exe 89 PID 2328 wrote to memory of 4916 2328 Lgbnmm32.exe 89 PID 4916 wrote to memory of 2180 4916 Mahbje32.exe 90 PID 4916 wrote to memory of 2180 4916 Mahbje32.exe 90 PID 4916 wrote to memory of 2180 4916 Mahbje32.exe 90 PID 2180 wrote to memory of 3856 2180 Mgekbljc.exe 91 PID 2180 wrote to memory of 3856 2180 Mgekbljc.exe 91 PID 2180 wrote to memory of 3856 2180 Mgekbljc.exe 91 PID 3856 wrote to memory of 4528 3856 Mnocof32.exe 92 PID 3856 wrote to memory of 4528 3856 Mnocof32.exe 92 PID 3856 wrote to memory of 4528 3856 Mnocof32.exe 92 PID 4528 wrote to memory of 3748 4528 Mpmokb32.exe 93 PID 4528 wrote to memory of 3748 4528 Mpmokb32.exe 93 PID 4528 wrote to memory of 3748 4528 Mpmokb32.exe 93 PID 3748 wrote to memory of 2984 3748 Mjeddggd.exe 94 PID 3748 wrote to memory of 2984 3748 Mjeddggd.exe 94 PID 3748 wrote to memory of 2984 3748 Mjeddggd.exe 94 PID 2984 wrote to memory of 5032 2984 Mamleegg.exe 96 PID 2984 wrote to memory of 5032 2984 Mamleegg.exe 96 PID 2984 wrote to memory of 5032 2984 Mamleegg.exe 96 PID 5032 wrote to memory of 3276 5032 Mgidml32.exe 97 PID 5032 wrote to memory of 3276 5032 Mgidml32.exe 97 PID 5032 wrote to memory of 3276 5032 Mgidml32.exe 97 PID 3276 wrote to memory of 2412 3276 Mjhqjg32.exe 98 PID 3276 wrote to memory of 2412 3276 Mjhqjg32.exe 98 PID 3276 wrote to memory of 2412 3276 Mjhqjg32.exe 98 PID 2412 wrote to memory of 3960 2412 Maohkd32.exe 99 PID 2412 wrote to memory of 3960 2412 Maohkd32.exe 99 PID 2412 wrote to memory of 3960 2412 Maohkd32.exe 99 PID 3960 wrote to memory of 2184 3960 Mglack32.exe 100 PID 3960 wrote to memory of 2184 3960 Mglack32.exe 100 PID 3960 wrote to memory of 2184 3960 Mglack32.exe 100 PID 2184 wrote to memory of 4340 2184 Mjjmog32.exe 101 PID 2184 wrote to memory of 4340 2184 Mjjmog32.exe 101 PID 2184 wrote to memory of 4340 2184 Mjjmog32.exe 101 PID 4340 wrote to memory of 5060 4340 Maaepd32.exe 102 PID 4340 wrote to memory of 5060 4340 Maaepd32.exe 102 PID 4340 wrote to memory of 5060 4340 Maaepd32.exe 102 PID 5060 wrote to memory of 3688 5060 Mgnnhk32.exe 103 PID 5060 wrote to memory of 3688 5060 Mgnnhk32.exe 103 PID 5060 wrote to memory of 3688 5060 Mgnnhk32.exe 103 PID 3688 wrote to memory of 2960 3688 Nnhfee32.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\2a4d561c7dfdbb8c84427e3a5d81bd5b4f59b8b9768657ed9ea9ca6fe251b36a.exe"C:\Users\Admin\AppData\Local\Temp\2a4d561c7dfdbb8c84427e3a5d81bd5b4f59b8b9768657ed9ea9ca6fe251b36a.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4768 -
C:\Windows\SysWOW64\Lcbiao32.exeC:\Windows\system32\Lcbiao32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Windows\SysWOW64\Lkiqbl32.exeC:\Windows\system32\Lkiqbl32.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4192 -
C:\Windows\SysWOW64\Lpfijcfl.exeC:\Windows\system32\Lpfijcfl.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3144 -
C:\Windows\SysWOW64\Ljnnch32.exeC:\Windows\system32\Ljnnch32.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3636 -
C:\Windows\SysWOW64\Lnjjdgee.exeC:\Windows\system32\Lnjjdgee.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Windows\SysWOW64\Lddbqa32.exeC:\Windows\system32\Lddbqa32.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Windows\SysWOW64\Lgbnmm32.exeC:\Windows\system32\Lgbnmm32.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Windows\SysWOW64\Mahbje32.exeC:\Windows\system32\Mahbje32.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4916 -
C:\Windows\SysWOW64\Mgekbljc.exeC:\Windows\system32\Mgekbljc.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\SysWOW64\Mnocof32.exeC:\Windows\system32\Mnocof32.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3856 -
C:\Windows\SysWOW64\Mpmokb32.exeC:\Windows\system32\Mpmokb32.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Windows\SysWOW64\Mjeddggd.exeC:\Windows\system32\Mjeddggd.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3748 -
C:\Windows\SysWOW64\Mamleegg.exeC:\Windows\system32\Mamleegg.exe14⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Windows\SysWOW64\Mgidml32.exeC:\Windows\system32\Mgidml32.exe15⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\Windows\SysWOW64\Mjhqjg32.exeC:\Windows\system32\Mjhqjg32.exe16⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3276 -
C:\Windows\SysWOW64\Maohkd32.exeC:\Windows\system32\Maohkd32.exe17⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Windows\SysWOW64\Mglack32.exeC:\Windows\system32\Mglack32.exe18⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3960 -
C:\Windows\SysWOW64\Mjjmog32.exeC:\Windows\system32\Mjjmog32.exe19⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Windows\SysWOW64\Maaepd32.exeC:\Windows\system32\Maaepd32.exe20⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4340 -
C:\Windows\SysWOW64\Mgnnhk32.exeC:\Windows\system32\Mgnnhk32.exe21⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Windows\SysWOW64\Nnhfee32.exeC:\Windows\system32\Nnhfee32.exe22⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3688 -
C:\Windows\SysWOW64\Nceonl32.exeC:\Windows\system32\Nceonl32.exe23⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2960 -
C:\Windows\SysWOW64\Nnjbke32.exeC:\Windows\system32\Nnjbke32.exe24⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2256 -
C:\Windows\SysWOW64\Nddkgonp.exeC:\Windows\system32\Nddkgonp.exe25⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:3356 -
C:\Windows\SysWOW64\Nkncdifl.exeC:\Windows\system32\Nkncdifl.exe26⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2816 -
C:\Windows\SysWOW64\Nqklmpdd.exeC:\Windows\system32\Nqklmpdd.exe27⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:3696 -
C:\Windows\SysWOW64\Ngedij32.exeC:\Windows\system32\Ngedij32.exe28⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:4840 -
C:\Windows\SysWOW64\Nnolfdcn.exeC:\Windows\system32\Nnolfdcn.exe29⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:3308 -
C:\Windows\SysWOW64\Ndidbn32.exeC:\Windows\system32\Ndidbn32.exe30⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:396 -
C:\Windows\SysWOW64\Nkcmohbg.exeC:\Windows\system32\Nkcmohbg.exe31⤵
- Executes dropped EXE
PID:3528 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3528 -s 41632⤵
- Program crash
PID:1120
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 3528 -ip 35281⤵PID:1416
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7KB
MD59218eeb596723b1ac6d01befec96b7d4
SHA1542be385c64dbab12cd72dd90d350c092e532254
SHA2568063cd0e9d2ea88fcd5bd34a8ff49959dac4837ba2376340d77ef94e53e1645f
SHA51263b57f6c65f8cbcdc0583a4354a5d02f661aa1b782df0865e0ab4ebe769a918e82fd5e1f975479c69e04fe615c5f01aae6488026ff87cbc6f025c3bf6205cac0
-
Filesize
101KB
MD577818ef27fddc27d48aa26d225ba770e
SHA1effc8fb38c7a0924e73fc5f09346c53f93f4ea9e
SHA2568fbb6f4c38596183efbbca271b1dd40cd68df7b08d517ab638def36fbf06acf3
SHA5121577f4860e9a15d7e7956441fe4234d37db99e0c010cf322f91a510c5d7d02aca3850cfd90aeabc01b8e683577a6159384da90bd09270edb572866c290a24100
-
Filesize
101KB
MD5e049828bcb2dc6c21ab12d3a6aa9cacc
SHA195658b81812489c3b71e7587857a49377b975cf0
SHA256384e1643a897b1ef67373b0405c04baf2425c054f851692637081ccffc73c406
SHA512f2ceb2f81e5fd1423b355feaabc0380db0feb500de50cbf10c91d2d824162e4deaade78d757a37262b6bbf2f39caac123768e81b159b64ee473bf9b5c5084270
-
Filesize
101KB
MD51922fbb09c4976d725854ab2a3987042
SHA182999d95ba4a238d587a3a15bedebd9c80bf0e8a
SHA2560f5e3da63985bfe5a162df2537e05f61f3300a42d6928dd279ebf1ac4a616fa7
SHA512197f511b34c1856220e6305367e0f165f35d3560aededdbc11219c64bf94f3749db440dbdf9b653d4337e8f8c64d2dd0b721974ee8bfea1ba6667465c7b5892c
-
Filesize
101KB
MD56ef3f9832cd2d2e081b8f926eeaff9a5
SHA192581845a0a4bfe7283891fae1ffbf4af2352b67
SHA25641a8b361229c6f4fd733f8f5687a4c73f98ee7b923de29460e1ef58acffb0acb
SHA512d65713c49e34c3a8596127babe23534373dd735348548814f8f9e0c1521a95ebfa13086eb82dbfc81460290faa51fa0bea9faa3e48fbd34c60e235ed4c66faec
-
Filesize
101KB
MD56103400169a39ed3d6f5b6a1fe99bf61
SHA14206d61ce3938cb110d80dfb8d32a9c142c7c4b1
SHA256fcdc86274cb4b2e2e7369a3aa1ad0942953801150a40ffd1701dc544dd1ec01a
SHA512e563f0c861e1e37da9c8e747fcc6ddc75463b9fb48a76efcf32608503d5fe69c5849013b3c3dd0ee82947c9bc0c10372422851dd15d0df6561e9ca323c031eae
-
Filesize
101KB
MD5e25afd2fd2dac73402af28c411cc3071
SHA199652f5af58096b4b3184f1febb2e2febdfbefde
SHA25633e09a5f81602c9054b0ba44494dc939aca0fd48a2fea7a3c943b91f32eee8bd
SHA512166b3f609213f808ab24c1012f73880a3401e2721e99d57332e00d5d6010bf2f0f22f37157a33053104208a0e2e3a1a3d6072f78409af2abf9c9920a937175d2
-
Filesize
101KB
MD538fde0d9b6f90f0fb7466cc055366940
SHA105cbeef312b562a4be084ca5a3e900f992a416fb
SHA256346b5a8cbd6692e25166e6392f739cccff01cfd9a309b49da241fd5bf1a7d027
SHA512fce5470ac2ec4a90a8cb9cdf3d5c6d56938ab234f373c38f7917deb54a359cda8f20dcf4847f35d08c49e54aae951314e4885c482784fa6a44bb2f587efad432
-
Filesize
101KB
MD5940e36616f123b2be6262792d941252d
SHA1cfa984b47a64fc3670604df8f521e7ebd63be1a4
SHA256205c9b1fc3b2f0e2d65466c25c893b087ead51f8ea461a5994157ba57ce435a5
SHA51253338d1bc9aa3bb73674580e2660dbdbc58b09fd277b104c56cb46e20bf57102f6feab257678339ed2321ef8dea1f56ee653a56f61ba4355fd58045d756a402f
-
Filesize
101KB
MD51de7436109c5427acd0fc45134d33456
SHA1f66d569bdf63c6d3d2886b72446d1ed67f97e81d
SHA25628b8a2249c6713999b906c43200377b5ba43115ede55b06770482e868a403f83
SHA512e6cb9a75d9e497926489703adbcadcc40d2b807f791d455c14ae89e71a621cd9d2adfba63e6757bdf7998c7a8afef62d3665ace8b000b8304d4cb860527c7ed4
-
Filesize
101KB
MD5bc3087b3951fae538488e6ccf5b97b37
SHA190f6d4a5ba50bdb23f0262bbb18ad798ac5b3f7f
SHA256c8235b44b6d8636ed2cbde68aa7b5b5d3de00b15c80938fb03bd69ee8390ca44
SHA5128e8f3b3d02a36b860087243409c18010cc6d73ad02da64a6fae822c6d4583f5276a746bb31850d207b5da50721015485ea2145563d692462ed36dc41fc2388e3
-
Filesize
101KB
MD52bc913d95a5f41128aaead0b53ea687b
SHA1697e1fcbf0939b194c7c58659bfe9632ae189039
SHA256798c9598ba122d37aa0ecdd883cda08becd796582d88c2616f258c8e9d599c8b
SHA51222ee61dae5f178d51250d620a09a7eb1225ec22738bc0f6a809bfc908710abe35826c7644a5655d485f4bc2423f9b254302d4c53bb895900b7d95b1566abb5a6
-
Filesize
101KB
MD556b15eff8210fef5d1d2d1f816cdd49f
SHA17c557a0e3a1fe1fe5ef49fb0085704d2d203f52c
SHA256574f43db9e8b664ffd4bef39b08d8832be3865a3deba76a7217122cb669e2a9c
SHA51249845d35855fbb71d10d96eabf17a3753e52479d1b1ba4809b288440762dba8c4bd8385dad502b8c79ca6d656ed67e5e3f0ff4c167d8cd6291da5fb334861b9c
-
Filesize
101KB
MD59a4eeddd71bcf8b248367e6baa4c7132
SHA10ca0b2c8e84185ed8d2eefc2ce05884bb0f8537a
SHA256aa36f20ed6b48d26c26c2b165dfc38e29864b680e92f1dc7c47ec9f257a4d113
SHA512f4d312136a173d874445691bd44195a8533eec54e373c9bcb4d3931fe29fae8899a8469e6f81b460cf1377ae4dbd88f5aab145038af25db443247a872315aa9a
-
Filesize
101KB
MD51486ee2813ab1a097fb15010e38968e6
SHA1098ab47a9a793cf4491de52c29e9e6750a20c0ed
SHA256266706ec9a402c8ec774d2cc302ae837f1ab3733ece1a434fbbbabe5797b17d8
SHA51224693ea996c3b47dd6a5d4447af3423268d1620dbd791f7299b5a5bbe9d05142aaaf29f01422e125c6762d53b9436ed6c515a94804501ceab5e177896d5679d3
-
Filesize
101KB
MD5c9a9e604975225cba17a4e26798891b4
SHA1acc5835dcfcf4e161e1df6afa86feeb61362b7b3
SHA25649371a3107f42b918050308f238239047f4ec442aed54d7b8d32d433b8fa33a9
SHA5122e7303303e6b7734e18b415dfa3280930ce8ed2b565da56af67eede5fde1ad9a741fca8d902436e61f98e2805998de7697feb51de153aa65f712b223546cb450
-
Filesize
101KB
MD557dca98ff54104c35e7ff4dd42fcd5fb
SHA192bb863bc26ab6d6c6f6e8b6cf32b5ec749661b2
SHA2567aafe4b922acebb68dc91454849a5beb6b9d2ddf972b34674693e489a5311b0a
SHA5123519d45edf4efca2e5eaf42121f5898df1e1cad30095d7039809bbb52d8b2196595962677c1292553d9ade3e14c2412eda1a86ec9862c2fc0c4e253e4c709b88
-
Filesize
101KB
MD5251384445119d5650649b14498e87af4
SHA1c461bff0ed71d0dd7bfc249575f012146fd13f1a
SHA256649ed41c57d91d75a9680f00bf70152bd775de0a37b5c7394bc80a40fbff2332
SHA512d0f707865e1021eec2640af0d8324e7c16677580dfa905fca59a197fdbcd9eb7aed2206becfc0885ae5f1cd58479615c25036758e149b6d8f890d68660bc3e97
-
Filesize
101KB
MD5b1f77a872f1f51664b922d380bae3e04
SHA15eed442b6a67a460ff653ec3e6ccb4f0c3a0be09
SHA256dc6009fdfd86c6df6a0445d5b71ac0289ae34f83133831f036c83698f929e7d0
SHA5122cdfbd33f42bf5cecb38261247211d5abe22bfd290acf776a4da9ed93c58a4c1e6960033133fabb3a24988a816600d1266a3cb260b69235b7e0d084f4f7d70cd
-
Filesize
101KB
MD5caff13e02d5f40ebc3226911ca665133
SHA17d9b0ce1a0e8ec1476d473ad6c94496d49cee580
SHA256493dbeaf1a04f41b07e03ff79438847460c376cba6eaf26b9828e52f07354272
SHA512f348d09b946b5ede2aeb752299d8b8d18efedc7c266e4bca7e8356e9ee0a1f73303a203d376577c6ea736fe991fd7ba9c38dc8d2d40d8509b47c839f1bffdb22
-
Filesize
101KB
MD59ae949964edd64161a3927c1705a85d8
SHA1a3ac37c0ea004fbce5118884d25be2c96d930e0e
SHA256f82d4f978a6c238513413160fe675cc64cae4c0c557d67829b16c93479111bd2
SHA5124b91b6804c3844de9db34fa483407afadfe1c10b890c22df84c9114be2894ddc83272e2da72e01a9bbd93fc90b9e078e84102c79a56c4a0aaca8b132524c9c5e
-
Filesize
101KB
MD505ef184927d9ecf2f78da4306ba1cf26
SHA1a549a4c79e1b0609f47e70eef15ee9972849e61f
SHA256716951ef4ce1548b6ce2b6e0f5c67c61f20faf175d51004140104051afc35830
SHA512180a59cb02abba002092d4ce9a3b71616a4078ec4b9c087b8c6054a05867b6a5dbd76d959af0f29770c133e4bb37c3dcd0a01f3aa592eec595b65ed31dd1509b
-
Filesize
101KB
MD5f3d7fee2e347ee7bd51f75d18b7f08b4
SHA1a47b4919b9e36b20c5eddc2cafa0030532b3e5f4
SHA2563b038099e1efeea72971622cd602d873ffaebc903bfbcd7606aa8c0ec0f86ee3
SHA512d2f1055f5a929c72817decdf473cc7ab7aaf4c64a79ca49a501e826fa4163142360f5e1dad9420a7dc33ca0b0862aeb1f11fa4b4f86342ff9501b51c025d6a57
-
Filesize
101KB
MD5801ea1a0e4377c727a69d685a79b993b
SHA1246d066f6331a3e5d3d395dd5c2c7a0cc2320d83
SHA256380d8fe1edf11f7942dc1c36fa57e863bbd283999edf703e2d2fa396186e225f
SHA512412c3cabd6b24dfce7c4433885ccd0acf58fe89284ef2be3c9345ad908132e5d26f6f8d009ef6197f45c77d0a332fe70ece11fbcb4148926fffa5de1947c6791
-
Filesize
101KB
MD5e6d788d0027def348432eed037398099
SHA1da8c8b1d1f022441293ff5fc0ed72f04eab27e73
SHA2561d671f108759566e3bd364ebbe78a3a187fc23d817f48c9f459057c88859c990
SHA5129291c798c2c83c776ae7cc2ef7649721d9bb83c1aca75166d8ba784364d738aa3623494e036fd5802b14328c69a3e580557b5a395eb3fba34602c3b1f8a94368
-
Filesize
101KB
MD54332ff644049ab55856970d87a19b5e6
SHA1667323a729b561c461aa6543fb5718db02d11777
SHA256df9ab5f4cd03bb5c06c4c23d2edb412d4ced9878b8c720c07ced5e2b502fde0e
SHA5125d04c586ee55c2813ea47aff2167d6bd963875c6307d9ef2b9a2bec48d3098417fba3969cbd6c39feb6200b29d67a134309d4303de6d6b59ec673ec7e5158e81
-
Filesize
101KB
MD58a2f7c82aab5aacb126257cc7716c0e9
SHA1ab19adff920479a77410662439f70c16c9a71cf3
SHA2566d437012e669032647d853f51103bd4bea643794035a4bf548efb34bb39f9505
SHA51266e67c6caaa0cde876b9acf9dcef126f3f1e30602e744e070d1e1b7b5d45802143d2835e40ca44c587b3394338c36587e11237d726588435b31399b6b9d31dfd
-
Filesize
101KB
MD5f1dd2d64c58d4bde4f8e9496e4e9100d
SHA158ae12637ffcda238ad0d1a404746f0d01916972
SHA2567ace537853256192e8fc7e388abf3713a38b92d61d58bd6416c735d8fa40efdc
SHA512ae5477694d5d4d7d1258cf8f7f181650508a433b39185679fe8226297fc13c7bf53ff9ab4893afae8173b1f97e8e08296fb279d97e8c5aef49f0a207cd711ff0
-
Filesize
101KB
MD5958c3f4f0535e505c83bf29e849804f1
SHA122cf59339ccb3ab9eeda1c7729c46c7fa3cfede2
SHA25651488afd26cbb1b01735e58a307ac56a29e24d723c76f2f76ce2ca61f4126597
SHA512b4123783e922d76a3342baa532e19cc374e96104478c343da7effcb5fdeab36dd89d7992039ca850e359e941e9a5f352c761b665b42735b31aa8035e3be46bcc
-
Filesize
101KB
MD581970b3c9e802817c1547ac309dbfcd8
SHA1364301b6818e70cfacdda02ee0b79e5e1419f3ad
SHA256fc39643010c63881d050f1f28e512bb7b81ca1fe0041519c5969816264a108ea
SHA5126ded329143e22754428d1f4f7c8f307b33fec169ff4cbbf7d1e427bcad68496475ee5f4d8d148bc941a3bc3256691b0b9b26fc45039ac8df64cbedeb48fd42da
-
Filesize
101KB
MD5ca264ae3d19f298dbf9467530ac63d4c
SHA1d6ee60faa19198150d19ab26eb935fac07c5ee75
SHA25652d160cf608b24879c03578512f0e8d8f8af405ac4648120e71633e1a594b9bd
SHA512296211f07074cee6b86d5d156367365758b74ca77a4fb830c507ecc71a6a57d9c82337e9d39fda764751dfd55943ef601732bae32a506bdd8875c3484c424c08