Analysis
-
max time kernel
145s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
17/06/2024, 02:14
Static task
static1
Behavioral task
behavioral1
Sample
c9ee84c8999683dc08fe6589d30a08d8fbe209d2c36e4a6163b419503e14fe0e.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
c9ee84c8999683dc08fe6589d30a08d8fbe209d2c36e4a6163b419503e14fe0e.exe
Resource
win10v2004-20240611-en
General
-
Target
c9ee84c8999683dc08fe6589d30a08d8fbe209d2c36e4a6163b419503e14fe0e.exe
-
Size
512KB
-
MD5
73ee1864047665bdcfe61716b639b239
-
SHA1
5f798881c939b4a12471bd6fce39b777ec4775a0
-
SHA256
c9ee84c8999683dc08fe6589d30a08d8fbe209d2c36e4a6163b419503e14fe0e
-
SHA512
4072bec33c068e2ca197e447a29b9ef15a9037c9ea3183631f41cc629bfa0d0859480de36436e7cd7df5abef1cfcef2160179278eb22d6b7f95b2559fb2a8b1d
-
SSDEEP
6144:SjFpVCDmUrdQt383PQ///NR5fKr2n0MO3LPlkUCmVs5bPQ///NR5fjlt01PB93G4:S7oDYr/Ng1/Nblt01PBExK
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 32 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Homclekn.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ifkacb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lgjfkk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mhhfdo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mhloponc.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Idcokkak.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Idcokkak.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kmgbdo32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mhloponc.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Homclekn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kmgbdo32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mhhfdo32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mdcpdp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mdcpdp32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kklpekno.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kklpekno.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Knpemf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Knpemf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Npagjpcd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" c9ee84c8999683dc08fe6589d30a08d8fbe209d2c36e4a6163b419503e14fe0e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hdqbekcm.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jgcdki32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lgjfkk32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mooaljkh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mooaljkh.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad c9ee84c8999683dc08fe6589d30a08d8fbe209d2c36e4a6163b419503e14fe0e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jgcdki32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Npagjpcd.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hdqbekcm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ifkacb32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jkmcfhkc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jkmcfhkc.exe -
Executes dropped EXE 16 IoCs
pid Process 2192 Homclekn.exe 2604 Hdqbekcm.exe 2656 Idcokkak.exe 2708 Ifkacb32.exe 2500 Jkmcfhkc.exe 2984 Jgcdki32.exe 516 Kmgbdo32.exe 3012 Kklpekno.exe 2676 Knpemf32.exe 2804 Lgjfkk32.exe 2560 Mooaljkh.exe 628 Mhhfdo32.exe 2856 Mhloponc.exe 2080 Mdcpdp32.exe 1888 Npagjpcd.exe 2016 Nlhgoqhh.exe -
Loads dropped DLL 36 IoCs
pid Process 2440 c9ee84c8999683dc08fe6589d30a08d8fbe209d2c36e4a6163b419503e14fe0e.exe 2440 c9ee84c8999683dc08fe6589d30a08d8fbe209d2c36e4a6163b419503e14fe0e.exe 2192 Homclekn.exe 2192 Homclekn.exe 2604 Hdqbekcm.exe 2604 Hdqbekcm.exe 2656 Idcokkak.exe 2656 Idcokkak.exe 2708 Ifkacb32.exe 2708 Ifkacb32.exe 2500 Jkmcfhkc.exe 2500 Jkmcfhkc.exe 2984 Jgcdki32.exe 2984 Jgcdki32.exe 516 Kmgbdo32.exe 516 Kmgbdo32.exe 3012 Kklpekno.exe 3012 Kklpekno.exe 2676 Knpemf32.exe 2676 Knpemf32.exe 2804 Lgjfkk32.exe 2804 Lgjfkk32.exe 2560 Mooaljkh.exe 2560 Mooaljkh.exe 628 Mhhfdo32.exe 628 Mhhfdo32.exe 2856 Mhloponc.exe 2856 Mhloponc.exe 2080 Mdcpdp32.exe 2080 Mdcpdp32.exe 1888 Npagjpcd.exe 1888 Npagjpcd.exe 2404 WerFault.exe 2404 WerFault.exe 2404 WerFault.exe 2404 WerFault.exe -
Drops file in System32 directory 48 IoCs
description ioc Process File created C:\Windows\SysWOW64\Ifkacb32.exe Idcokkak.exe File opened for modification C:\Windows\SysWOW64\Jkmcfhkc.exe Ifkacb32.exe File created C:\Windows\SysWOW64\Kklpekno.exe Kmgbdo32.exe File created C:\Windows\SysWOW64\Hdqbekcm.exe Homclekn.exe File created C:\Windows\SysWOW64\Nookinfk.dll Idcokkak.exe File created C:\Windows\SysWOW64\Jgcdki32.exe Jkmcfhkc.exe File created C:\Windows\SysWOW64\Kcacch32.dll Jgcdki32.exe File opened for modification C:\Windows\SysWOW64\Kklpekno.exe Kmgbdo32.exe File created C:\Windows\SysWOW64\Mmdcie32.dll Knpemf32.exe File opened for modification C:\Windows\SysWOW64\Mhhfdo32.exe Mooaljkh.exe File opened for modification C:\Windows\SysWOW64\Mhloponc.exe Mhhfdo32.exe File opened for modification C:\Windows\SysWOW64\Hdqbekcm.exe Homclekn.exe File opened for modification C:\Windows\SysWOW64\Npagjpcd.exe Mdcpdp32.exe File created C:\Windows\SysWOW64\Npagjpcd.exe Mdcpdp32.exe File opened for modification C:\Windows\SysWOW64\Idcokkak.exe Hdqbekcm.exe File created C:\Windows\SysWOW64\Nelkpj32.dll Jkmcfhkc.exe File created C:\Windows\SysWOW64\Aeaceffc.dll Mhloponc.exe File created C:\Windows\SysWOW64\Homclekn.exe c9ee84c8999683dc08fe6589d30a08d8fbe209d2c36e4a6163b419503e14fe0e.exe File created C:\Windows\SysWOW64\Jjnbaf32.dll Kmgbdo32.exe File created C:\Windows\SysWOW64\Lgjfkk32.exe Knpemf32.exe File opened for modification C:\Windows\SysWOW64\Mdcpdp32.exe Mhloponc.exe File opened for modification C:\Windows\SysWOW64\Jgcdki32.exe Jkmcfhkc.exe File created C:\Windows\SysWOW64\Knpemf32.exe Kklpekno.exe File created C:\Windows\SysWOW64\Ihclng32.dll Kklpekno.exe File created C:\Windows\SysWOW64\Mhhfdo32.exe Mooaljkh.exe File created C:\Windows\SysWOW64\Mdcpdp32.exe Mhloponc.exe File created C:\Windows\SysWOW64\Mahqjm32.dll Mdcpdp32.exe File opened for modification C:\Windows\SysWOW64\Nlhgoqhh.exe Npagjpcd.exe File created C:\Windows\SysWOW64\Lamajm32.dll Npagjpcd.exe File created C:\Windows\SysWOW64\Kmgbdo32.exe Jgcdki32.exe File created C:\Windows\SysWOW64\Dlpajg32.dll Homclekn.exe File created C:\Windows\SysWOW64\Jkmcfhkc.exe Ifkacb32.exe File opened for modification C:\Windows\SysWOW64\Knpemf32.exe Kklpekno.exe File opened for modification C:\Windows\SysWOW64\Lgjfkk32.exe Knpemf32.exe File opened for modification C:\Windows\SysWOW64\Mooaljkh.exe Lgjfkk32.exe File created C:\Windows\SysWOW64\Diaagb32.dll Lgjfkk32.exe File created C:\Windows\SysWOW64\Fnqkpajk.dll Mhhfdo32.exe File created C:\Windows\SysWOW64\Giicle32.dll c9ee84c8999683dc08fe6589d30a08d8fbe209d2c36e4a6163b419503e14fe0e.exe File created C:\Windows\SysWOW64\Nlhgoqhh.exe Npagjpcd.exe File opened for modification C:\Windows\SysWOW64\Kmgbdo32.exe Jgcdki32.exe File created C:\Windows\SysWOW64\Mooaljkh.exe Lgjfkk32.exe File opened for modification C:\Windows\SysWOW64\Homclekn.exe c9ee84c8999683dc08fe6589d30a08d8fbe209d2c36e4a6163b419503e14fe0e.exe File created C:\Windows\SysWOW64\Ngbkba32.dll Hdqbekcm.exe File opened for modification C:\Windows\SysWOW64\Ifkacb32.exe Idcokkak.exe File created C:\Windows\SysWOW64\Jpfdhnai.dll Ifkacb32.exe File created C:\Windows\SysWOW64\Ggfblnnh.dll Mooaljkh.exe File created C:\Windows\SysWOW64\Mhloponc.exe Mhhfdo32.exe File created C:\Windows\SysWOW64\Idcokkak.exe Hdqbekcm.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2404 2016 WerFault.exe 43 -
Modifies registry class 51 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nelkpj32.dll" Jkmcfhkc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aeaceffc.dll" Mhloponc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kklpekno.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mmdcie32.dll" Knpemf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fnqkpajk.dll" Mhhfdo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mdcpdp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jgcdki32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Idcokkak.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Giicle32.dll" c9ee84c8999683dc08fe6589d30a08d8fbe209d2c36e4a6163b419503e14fe0e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dlpajg32.dll" Homclekn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kmgbdo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kklpekno.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Npagjpcd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} c9ee84c8999683dc08fe6589d30a08d8fbe209d2c36e4a6163b419503e14fe0e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hdqbekcm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hdqbekcm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ihclng32.dll" Kklpekno.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Diaagb32.dll" Lgjfkk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mooaljkh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lgjfkk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mhhfdo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ifkacb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Knpemf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lgjfkk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mdcpdp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ggfblnnh.dll" Mooaljkh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mhloponc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID c9ee84c8999683dc08fe6589d30a08d8fbe209d2c36e4a6163b419503e14fe0e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mhloponc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lamajm32.dll" Npagjpcd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ngbkba32.dll" Hdqbekcm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Idcokkak.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ifkacb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" c9ee84c8999683dc08fe6589d30a08d8fbe209d2c36e4a6163b419503e14fe0e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jkmcfhkc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jkmcfhkc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jgcdki32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kcacch32.dll" Jgcdki32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Knpemf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Homclekn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jpfdhnai.dll" Ifkacb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kmgbdo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mooaljkh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mahqjm32.dll" Mdcpdp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node c9ee84c8999683dc08fe6589d30a08d8fbe209d2c36e4a6163b419503e14fe0e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jjnbaf32.dll" Kmgbdo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Npagjpcd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 c9ee84c8999683dc08fe6589d30a08d8fbe209d2c36e4a6163b419503e14fe0e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Homclekn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nookinfk.dll" Idcokkak.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mhhfdo32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2440 wrote to memory of 2192 2440 c9ee84c8999683dc08fe6589d30a08d8fbe209d2c36e4a6163b419503e14fe0e.exe 28 PID 2440 wrote to memory of 2192 2440 c9ee84c8999683dc08fe6589d30a08d8fbe209d2c36e4a6163b419503e14fe0e.exe 28 PID 2440 wrote to memory of 2192 2440 c9ee84c8999683dc08fe6589d30a08d8fbe209d2c36e4a6163b419503e14fe0e.exe 28 PID 2440 wrote to memory of 2192 2440 c9ee84c8999683dc08fe6589d30a08d8fbe209d2c36e4a6163b419503e14fe0e.exe 28 PID 2192 wrote to memory of 2604 2192 Homclekn.exe 29 PID 2192 wrote to memory of 2604 2192 Homclekn.exe 29 PID 2192 wrote to memory of 2604 2192 Homclekn.exe 29 PID 2192 wrote to memory of 2604 2192 Homclekn.exe 29 PID 2604 wrote to memory of 2656 2604 Hdqbekcm.exe 30 PID 2604 wrote to memory of 2656 2604 Hdqbekcm.exe 30 PID 2604 wrote to memory of 2656 2604 Hdqbekcm.exe 30 PID 2604 wrote to memory of 2656 2604 Hdqbekcm.exe 30 PID 2656 wrote to memory of 2708 2656 Idcokkak.exe 31 PID 2656 wrote to memory of 2708 2656 Idcokkak.exe 31 PID 2656 wrote to memory of 2708 2656 Idcokkak.exe 31 PID 2656 wrote to memory of 2708 2656 Idcokkak.exe 31 PID 2708 wrote to memory of 2500 2708 Ifkacb32.exe 32 PID 2708 wrote to memory of 2500 2708 Ifkacb32.exe 32 PID 2708 wrote to memory of 2500 2708 Ifkacb32.exe 32 PID 2708 wrote to memory of 2500 2708 Ifkacb32.exe 32 PID 2500 wrote to memory of 2984 2500 Jkmcfhkc.exe 33 PID 2500 wrote to memory of 2984 2500 Jkmcfhkc.exe 33 PID 2500 wrote to memory of 2984 2500 Jkmcfhkc.exe 33 PID 2500 wrote to memory of 2984 2500 Jkmcfhkc.exe 33 PID 2984 wrote to memory of 516 2984 Jgcdki32.exe 34 PID 2984 wrote to memory of 516 2984 Jgcdki32.exe 34 PID 2984 wrote to memory of 516 2984 Jgcdki32.exe 34 PID 2984 wrote to memory of 516 2984 Jgcdki32.exe 34 PID 516 wrote to memory of 3012 516 Kmgbdo32.exe 35 PID 516 wrote to memory of 3012 516 Kmgbdo32.exe 35 PID 516 wrote to memory of 3012 516 Kmgbdo32.exe 35 PID 516 wrote to memory of 3012 516 Kmgbdo32.exe 35 PID 3012 wrote to memory of 2676 3012 Kklpekno.exe 36 PID 3012 wrote to memory of 2676 3012 Kklpekno.exe 36 PID 3012 wrote to memory of 2676 3012 Kklpekno.exe 36 PID 3012 wrote to memory of 2676 3012 Kklpekno.exe 36 PID 2676 wrote to memory of 2804 2676 Knpemf32.exe 37 PID 2676 wrote to memory of 2804 2676 Knpemf32.exe 37 PID 2676 wrote to memory of 2804 2676 Knpemf32.exe 37 PID 2676 wrote to memory of 2804 2676 Knpemf32.exe 37 PID 2804 wrote to memory of 2560 2804 Lgjfkk32.exe 38 PID 2804 wrote to memory of 2560 2804 Lgjfkk32.exe 38 PID 2804 wrote to memory of 2560 2804 Lgjfkk32.exe 38 PID 2804 wrote to memory of 2560 2804 Lgjfkk32.exe 38 PID 2560 wrote to memory of 628 2560 Mooaljkh.exe 39 PID 2560 wrote to memory of 628 2560 Mooaljkh.exe 39 PID 2560 wrote to memory of 628 2560 Mooaljkh.exe 39 PID 2560 wrote to memory of 628 2560 Mooaljkh.exe 39 PID 628 wrote to memory of 2856 628 Mhhfdo32.exe 40 PID 628 wrote to memory of 2856 628 Mhhfdo32.exe 40 PID 628 wrote to memory of 2856 628 Mhhfdo32.exe 40 PID 628 wrote to memory of 2856 628 Mhhfdo32.exe 40 PID 2856 wrote to memory of 2080 2856 Mhloponc.exe 41 PID 2856 wrote to memory of 2080 2856 Mhloponc.exe 41 PID 2856 wrote to memory of 2080 2856 Mhloponc.exe 41 PID 2856 wrote to memory of 2080 2856 Mhloponc.exe 41 PID 2080 wrote to memory of 1888 2080 Mdcpdp32.exe 42 PID 2080 wrote to memory of 1888 2080 Mdcpdp32.exe 42 PID 2080 wrote to memory of 1888 2080 Mdcpdp32.exe 42 PID 2080 wrote to memory of 1888 2080 Mdcpdp32.exe 42 PID 1888 wrote to memory of 2016 1888 Npagjpcd.exe 43 PID 1888 wrote to memory of 2016 1888 Npagjpcd.exe 43 PID 1888 wrote to memory of 2016 1888 Npagjpcd.exe 43 PID 1888 wrote to memory of 2016 1888 Npagjpcd.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\c9ee84c8999683dc08fe6589d30a08d8fbe209d2c36e4a6163b419503e14fe0e.exe"C:\Users\Admin\AppData\Local\Temp\c9ee84c8999683dc08fe6589d30a08d8fbe209d2c36e4a6163b419503e14fe0e.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Windows\SysWOW64\Homclekn.exeC:\Windows\system32\Homclekn.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\SysWOW64\Hdqbekcm.exeC:\Windows\system32\Hdqbekcm.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\SysWOW64\Idcokkak.exeC:\Windows\system32\Idcokkak.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\SysWOW64\Ifkacb32.exeC:\Windows\system32\Ifkacb32.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\SysWOW64\Jkmcfhkc.exeC:\Windows\system32\Jkmcfhkc.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Windows\SysWOW64\Jgcdki32.exeC:\Windows\system32\Jgcdki32.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Windows\SysWOW64\Kmgbdo32.exeC:\Windows\system32\Kmgbdo32.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:516 -
C:\Windows\SysWOW64\Kklpekno.exeC:\Windows\system32\Kklpekno.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Windows\SysWOW64\Knpemf32.exeC:\Windows\system32\Knpemf32.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Windows\SysWOW64\Lgjfkk32.exeC:\Windows\system32\Lgjfkk32.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\SysWOW64\Mooaljkh.exeC:\Windows\system32\Mooaljkh.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\SysWOW64\Mhhfdo32.exeC:\Windows\system32\Mhhfdo32.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Windows\SysWOW64\Mhloponc.exeC:\Windows\system32\Mhloponc.exe14⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Windows\SysWOW64\Mdcpdp32.exeC:\Windows\system32\Mdcpdp32.exe15⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Windows\SysWOW64\Npagjpcd.exeC:\Windows\system32\Npagjpcd.exe16⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Windows\SysWOW64\Nlhgoqhh.exeC:\Windows\system32\Nlhgoqhh.exe17⤵
- Executes dropped EXE
PID:2016 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2016 -s 14018⤵
- Loads dropped DLL
- Program crash
PID:2404
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512KB
MD5415bd3596ee56b8425ad7578868d9947
SHA13a15cebcf7b6b4301404b8856382bcab51ffaa62
SHA256c24326c4d5038bc02c82bf967a6d4669bbde51d54d3c26c3aeca7124434c70a5
SHA512f2e9dfc5abe761a08bfceb6e2c612f97c299698f804c1ee64778b784ad69a3e699e05c19667455f3774f04b2aeeb81ca1de4b60ae3023cdec39c28555ab93bf6
-
Filesize
512KB
MD539b28b09882a4022676e22b726e4f608
SHA1e381f3ce20f14e31cf52cd0bf51df3c0d0b9906c
SHA2566632cd7911032803431036870b65af29b9cc87c8b69497175de529f8bc95c7f3
SHA512e13449aaf29188d0e5f629dd85a2be6b546ecb7e32b6593f3451d36d21a3d6f111d062bc950e491d162363124c6b029f96c29d949c69e2cf7c6397f7033e7bd1
-
Filesize
512KB
MD5024690d651dfe2154c32b083b1eecf59
SHA19c28ee9bfcdd61a07151c5316033914ef2b7a136
SHA256dfc29e4df49a44fd93234ab8cda9c1cd9771f936ddb6b0774584492032dae6eb
SHA512964060d269452f9889493f07c8f4c8ecf6578c2af1cb388a87fb76f4a06a971473d036a15e34d272d9febd92cd5f676193cb25e4d84a653c510d3e11cd1f714c
-
Filesize
512KB
MD58a8e6965b30e4154c9fb12c32d7ad83b
SHA163f45342fb9f6f0abc74aa6b55c1adebe966e985
SHA2568537a8855b83bf0fecba6b9658f73656cba7316d9ece1f974c9eb4ed8aa5fd06
SHA512d42cd3496944a05b6c3f930da5aa6f01a4c433d831969df26a0aec53b5ee4807d7c635ec0d212186c92b5a39bc42c071f6ae2581c7a6a4a56c51518c7d6d40b8
-
Filesize
512KB
MD5704b3704cff72655ff7dca2f6cd43705
SHA116224a48bf025821fac3123429bda6b5e4343a29
SHA2564e64a18413193a1be7985decd59b1e564f6ad1bb9b3c514627dc7f9fd01aae27
SHA512cd03c618bfe408fecadae5457b8b94e926c37b8319cf8c7527433803932920189228327b56c7eaac2d9350f05981ace5fdac8268cfb6e13802335b7250d6eb52
-
Filesize
512KB
MD52dc5fb60905f59d75e5d35a57eda0efa
SHA19c46c050cdcf54c1120cb2989606ce0c9bc733a7
SHA25670059f7672b30388e9d9c78e3b170dc931018ec885f8f2fe646621c2c8f04d5a
SHA512c4c48a059d125f61cd2fe0db2b97f8acb3e7c7b45ba0b80a1ee291f5b74a5c76327140d8e8ece4c00c363558007ae5e05cd95bf519166c77419e1400975d05f7
-
Filesize
512KB
MD5bf949c7ef349ec73267bdc8f5272c8bd
SHA16e513690b0b8b9abc5cbdfc1d9f1b2da553946c5
SHA256662356a1bba76873d110137f06a92df34b8bccdada94d13c75ffa2b6cb112225
SHA512a46cbf39494dfeeb14226598a44964fb65f0410ee5e47ef46f7ebabe614fe54ced557a53e807cec78b9af35e786a2275340d2028b7aee0bf0cdf6beea923d2bd
-
Filesize
512KB
MD5144bb919b66dd003e35415ce8750c65e
SHA107fc7a43238261246a80ea10f91eab082e473953
SHA2565c93b3737a9dc914047c83931288b657a2fd75f6658a34b041ad5d68d44ec552
SHA512b870035dc2a8d0d80865b9de563762511310c8ffcf7f8d39519736b99b10300dd7e508147b46d9b68cfd91c61a2cc7f3e43c1d2a2b7c7cef1153da834b8e1e6f
-
Filesize
512KB
MD572e0f23c02176ca4132040f22c0484d0
SHA10e8dff110ff20682a0ffe0104278e4babe701e9a
SHA25684ae84a151a413b4acd83825b609f1860715f90fea9bc7f1b28cf1dc56ce92d6
SHA512dd63f6d447c70a9540796b7a8162121437cdfe84d3f4e64ee1043ced2bfa3edc20d4be530d78c06f2a260dc8bc310efa87c66f5825a4817800e724d95a74129f
-
Filesize
512KB
MD5e69a6c07a496a51eadea1df18a72c829
SHA137481eb4d596a74935f24f19d500fa72238930af
SHA256b4a8b0dabb0e62053a06bda35f8d1cd891c9e0dfa022ed70185eb7974b4fc8ea
SHA512541e5a2e940e50680b852d2cfa943cf560d5a7237195dda727fa14a694c9d1f61a82665b5bccc1e69d97f8ddc830560c53626802beb59e38144e36e6e970eaec
-
Filesize
512KB
MD527b9c8c6f5af40e43211de26ed02333a
SHA10b4a86e5a3a887dd91fdafc073a130ed64fea68a
SHA256cbdf8f6a71d9536c1362b3f531665500cf5fcabe28a20202552067507e2ac0d0
SHA51266edaaef3bd173e5b7659ec9daf93b252b64289c3fbd471f35d1ac08a6af489f63664550213cde04414a2f94e20f2a75e14d7ccfac927683e26a47e016ffddd6
-
Filesize
512KB
MD54eaf4a25363f7c8787986766cbaf7737
SHA107b2b8b6a8a1b8418c058cd2df7031cffb01ae0b
SHA256cecff6bc4ee6c9b353de61c9d77a2b5e4b0da7864501cd4cab81bd90c2884c3a
SHA512710b466e50b6f6adced4e248bd4689a9e1add2ad620ac7c7e8ffa7b14fdfb5ce5e7f14fe7827d6e5b6139e56f2f3f8b59797edf4b287929874d89d97ade83439
-
Filesize
512KB
MD5bf0d9f8446115a6badba54059f9cf1ea
SHA1b20ce8e7b908f7bae9705d7efca8a0a02a5da6f1
SHA256fbbe3dce2c966a68cdce87a81ce796518ad8e3e89b8d64054ae765dbe2d3e3df
SHA5122508d4b26d1d8158534bfd28305407917661a4848c56c11477f60e02b3ef461b27c48d4dfa16eb845df923bb872bdf424afdbbe0f9c458e8de185bc3861b0999
-
Filesize
512KB
MD50689331c7b59eb36d179c591f5799197
SHA1b875eb24fbc90ba89302017be3e500270afb09d5
SHA2564283236b21002c0a940c89daee27df0fac48a9c29778a2d3a12ac87ac37c1012
SHA512be9b7f619faec4f5c475e39cc04d5a0cb8aa147df43928867c4db2004e70ab714b045b868cecb2ee0ce5efc631f10d76be61c67f1e4a222e5aa9ccb7ee292dea
-
Filesize
512KB
MD55bfef64fa98e0a791f78d42952f090f6
SHA18a40d492e9431efc898b639fbecbf88cd64a2b70
SHA256f12eae59bfad8bdecdc9da73bf86bf3c7ed5da8fc213c755d2f1e9e5b0d1e126
SHA51215dbfe6c45d2abc57745cb698e4672f15076dba98eed2b4c4004c9497e76c6ca07097ae5037fb89360bdf0b5256e17ff3ebe1cde26d9988a1ff091a20e3a8a66
-
Filesize
512KB
MD55781ddf8111dc7a8ec3ccb921ba6388b
SHA17b2c55ffcbfe50d01cd777997f41d8b88a1e9832
SHA2564f6fe9ddefde9c63b95bc33a6b76c80b415c55b4cdce41196b71587cbc1e14bc
SHA512fc0a4d758b30ab94b5531578229e28c6503060f340683132b38141d3b85bcce4543257dce3662c80d4ffb2865485add3acd70f81ca628bc38eb41434ee172ba6