Analysis
-
max time kernel
120s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
24/06/2024, 22:24
Static task
static1
Behavioral task
behavioral1
Sample
695ac9e723a42709fb270d89f4ea238085a522b119826c11d264816c7c122d0e.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
695ac9e723a42709fb270d89f4ea238085a522b119826c11d264816c7c122d0e.exe
Resource
win10v2004-20240508-en
General
-
Target
695ac9e723a42709fb270d89f4ea238085a522b119826c11d264816c7c122d0e.exe
-
Size
76KB
-
MD5
6dd7f1f9b542c6a267c6f7c09b3be40d
-
SHA1
115b37722e3190ca479c4754b201ad051b499f28
-
SHA256
695ac9e723a42709fb270d89f4ea238085a522b119826c11d264816c7c122d0e
-
SHA512
096ebfb636e36a0c03080c828135c7e7cebc8672746ae0cdc83a8144b55a74e95903485e1cfcf19817c4ebbdb60caea6070bc2ad102a93447abcf1852b99bc4d
-
SSDEEP
1536:Kc9Qmp8HywDb038NELgFfQ7sHioQV+/eCeyvCQ:0mCH9bWcugFfUsHrk+
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Melfncqb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nmnace32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qeohnd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Aaolidlk.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Meijhc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mofglh32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Odoloalf.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aeqabgoj.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bjbcfn32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aaloddnn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Aaloddnn.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 695ac9e723a42709fb270d89f4ea238085a522b119826c11d264816c7c122d0e.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mofglh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nlekia32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Npccpo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Odoloalf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pndpajgd.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bfpnmj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nlcnda32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pcfefmnk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qkhpkoen.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ckiigmcd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pfbelipa.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pckoam32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Aaheie32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" 695ac9e723a42709fb270d89f4ea238085a522b119826c11d264816c7c122d0e.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ollajp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Baadng32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Melfncqb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pcfefmnk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bkglameg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Behgcf32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bkglameg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Meijhc32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nlcnda32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Npccpo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Oaiibg32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aajbne32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Aajbne32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ollajp32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Baadng32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ckiigmcd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nhohda32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Aeqabgoj.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oaiibg32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oqacic32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pcibkm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pcibkm32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qeohnd32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qgoapp32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pndpajgd.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nlekia32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Oqacic32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pckoam32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qkhpkoen.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nmnace32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pfbelipa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bfpnmj32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Behgcf32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nhohda32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qgoapp32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aaheie32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aaolidlk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bjbcfn32.exe -
Executes dropped EXE 32 IoCs
pid Process 1184 Meijhc32.exe 2624 Melfncqb.exe 2600 Mofglh32.exe 2636 Nmnace32.exe 2644 Nlcnda32.exe 2552 Nlekia32.exe 944 Npccpo32.exe 820 Nhohda32.exe 2660 Ollajp32.exe 1176 Oaiibg32.exe 308 Oqacic32.exe 2544 Odoloalf.exe 624 Pfbelipa.exe 1096 Pcfefmnk.exe 1928 Pcibkm32.exe 2312 Pckoam32.exe 428 Pndpajgd.exe 1668 Qeohnd32.exe 112 Qkhpkoen.exe 1560 Qgoapp32.exe 1336 Aaheie32.exe 284 Aajbne32.exe 2908 Aaloddnn.exe 2388 Aaolidlk.exe 2688 Aeqabgoj.exe 2164 Bfpnmj32.exe 2080 Bjbcfn32.exe 2568 Behgcf32.exe 2724 Bkglameg.exe 2608 Baadng32.exe 2652 Ckiigmcd.exe 2532 Cacacg32.exe -
Loads dropped DLL 64 IoCs
pid Process 2056 695ac9e723a42709fb270d89f4ea238085a522b119826c11d264816c7c122d0e.exe 2056 695ac9e723a42709fb270d89f4ea238085a522b119826c11d264816c7c122d0e.exe 1184 Meijhc32.exe 1184 Meijhc32.exe 2624 Melfncqb.exe 2624 Melfncqb.exe 2600 Mofglh32.exe 2600 Mofglh32.exe 2636 Nmnace32.exe 2636 Nmnace32.exe 2644 Nlcnda32.exe 2644 Nlcnda32.exe 2552 Nlekia32.exe 2552 Nlekia32.exe 944 Npccpo32.exe 944 Npccpo32.exe 820 Nhohda32.exe 820 Nhohda32.exe 2660 Ollajp32.exe 2660 Ollajp32.exe 1176 Oaiibg32.exe 1176 Oaiibg32.exe 308 Oqacic32.exe 308 Oqacic32.exe 2544 Odoloalf.exe 2544 Odoloalf.exe 624 Pfbelipa.exe 624 Pfbelipa.exe 1096 Pcfefmnk.exe 1096 Pcfefmnk.exe 1928 Pcibkm32.exe 1928 Pcibkm32.exe 2312 Pckoam32.exe 2312 Pckoam32.exe 428 Pndpajgd.exe 428 Pndpajgd.exe 1668 Qeohnd32.exe 1668 Qeohnd32.exe 112 Qkhpkoen.exe 112 Qkhpkoen.exe 1560 Qgoapp32.exe 1560 Qgoapp32.exe 1336 Aaheie32.exe 1336 Aaheie32.exe 284 Aajbne32.exe 284 Aajbne32.exe 2908 Aaloddnn.exe 2908 Aaloddnn.exe 2388 Aaolidlk.exe 2388 Aaolidlk.exe 2688 Aeqabgoj.exe 2688 Aeqabgoj.exe 2164 Bfpnmj32.exe 2164 Bfpnmj32.exe 2080 Bjbcfn32.exe 2080 Bjbcfn32.exe 2568 Behgcf32.exe 2568 Behgcf32.exe 2724 Bkglameg.exe 2724 Bkglameg.exe 2608 Baadng32.exe 2608 Baadng32.exe 2652 Ckiigmcd.exe 2652 Ckiigmcd.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Pfbelipa.exe Odoloalf.exe File created C:\Windows\SysWOW64\Ckiigmcd.exe Baadng32.exe File opened for modification C:\Windows\SysWOW64\Cacacg32.exe Ckiigmcd.exe File created C:\Windows\SysWOW64\Fibkpd32.dll Mofglh32.exe File created C:\Windows\SysWOW64\Ollajp32.exe Nhohda32.exe File opened for modification C:\Windows\SysWOW64\Npccpo32.exe Nlekia32.exe File created C:\Windows\SysWOW64\Mhpeoj32.dll Aajbne32.exe File created C:\Windows\SysWOW64\Bfqgjgep.dll Aaloddnn.exe File created C:\Windows\SysWOW64\Ljacemio.dll Bkglameg.exe File created C:\Windows\SysWOW64\Fdlpjk32.dll Ckiigmcd.exe File created C:\Windows\SysWOW64\Nlcnda32.exe Nmnace32.exe File opened for modification C:\Windows\SysWOW64\Nlcnda32.exe Nmnace32.exe File opened for modification C:\Windows\SysWOW64\Qgoapp32.exe Qkhpkoen.exe File created C:\Windows\SysWOW64\Hjojco32.dll Qkhpkoen.exe File created C:\Windows\SysWOW64\Ghmnek32.dll Aaheie32.exe File created C:\Windows\SysWOW64\Aaolidlk.exe Aaloddnn.exe File created C:\Windows\SysWOW64\Jhgkeald.dll Aeqabgoj.exe File created C:\Windows\SysWOW64\Jhpjaq32.dll Oqacic32.exe File opened for modification C:\Windows\SysWOW64\Pndpajgd.exe Pckoam32.exe File created C:\Windows\SysWOW64\Npccpo32.exe Nlekia32.exe File opened for modification C:\Windows\SysWOW64\Oqacic32.exe Oaiibg32.exe File opened for modification C:\Windows\SysWOW64\Aaheie32.exe Qgoapp32.exe File created C:\Windows\SysWOW64\Aaloddnn.exe Aajbne32.exe File created C:\Windows\SysWOW64\Meijhc32.exe 695ac9e723a42709fb270d89f4ea238085a522b119826c11d264816c7c122d0e.exe File created C:\Windows\SysWOW64\Melfncqb.exe Meijhc32.exe File created C:\Windows\SysWOW64\Oackeakj.dll Nlekia32.exe File created C:\Windows\SysWOW64\Odoloalf.exe Oqacic32.exe File opened for modification C:\Windows\SysWOW64\Pcfefmnk.exe Pfbelipa.exe File created C:\Windows\SysWOW64\Aceobl32.dll Pfbelipa.exe File opened for modification C:\Windows\SysWOW64\Pckoam32.exe Pcibkm32.exe File opened for modification C:\Windows\SysWOW64\Aajbne32.exe Aaheie32.exe File created C:\Windows\SysWOW64\Ogjgkqaa.dll Nmnace32.exe File opened for modification C:\Windows\SysWOW64\Nlekia32.exe Nlcnda32.exe File opened for modification C:\Windows\SysWOW64\Ckiigmcd.exe Baadng32.exe File created C:\Windows\SysWOW64\Bjbcfn32.exe Bfpnmj32.exe File created C:\Windows\SysWOW64\Behgcf32.exe Bjbcfn32.exe File opened for modification C:\Windows\SysWOW64\Nhohda32.exe Npccpo32.exe File created C:\Windows\SysWOW64\Pcibkm32.exe Pcfefmnk.exe File created C:\Windows\SysWOW64\Pckoam32.exe Pcibkm32.exe File opened for modification C:\Windows\SysWOW64\Qeohnd32.exe Pndpajgd.exe File created C:\Windows\SysWOW64\Cacacg32.exe Ckiigmcd.exe File opened for modification C:\Windows\SysWOW64\Melfncqb.exe Meijhc32.exe File created C:\Windows\SysWOW64\Nmnace32.exe Mofglh32.exe File created C:\Windows\SysWOW64\Hcgdenbm.dll Npccpo32.exe File opened for modification C:\Windows\SysWOW64\Odoloalf.exe Oqacic32.exe File opened for modification C:\Windows\SysWOW64\Pcibkm32.exe Pcfefmnk.exe File created C:\Windows\SysWOW64\Ffjmmbcg.dll Pcibkm32.exe File created C:\Windows\SysWOW64\Aobcmana.dll Pckoam32.exe File created C:\Windows\SysWOW64\Qeohnd32.exe Pndpajgd.exe File opened for modification C:\Windows\SysWOW64\Meijhc32.exe 695ac9e723a42709fb270d89f4ea238085a522b119826c11d264816c7c122d0e.exe File opened for modification C:\Windows\SysWOW64\Nmnace32.exe Mofglh32.exe File opened for modification C:\Windows\SysWOW64\Aaolidlk.exe Aaloddnn.exe File created C:\Windows\SysWOW64\Aeqabgoj.exe Aaolidlk.exe File created C:\Windows\SysWOW64\Ghkekdhl.dll Oaiibg32.exe File opened for modification C:\Windows\SysWOW64\Qkhpkoen.exe Qeohnd32.exe File created C:\Windows\SysWOW64\Qhiphb32.dll Qeohnd32.exe File created C:\Windows\SysWOW64\Bkglameg.exe Behgcf32.exe File opened for modification C:\Windows\SysWOW64\Bkglameg.exe Behgcf32.exe File created C:\Windows\SysWOW64\Ekebnbmn.dll Melfncqb.exe File created C:\Windows\SysWOW64\Oaiibg32.exe Ollajp32.exe File opened for modification C:\Windows\SysWOW64\Bfpnmj32.exe Aeqabgoj.exe File opened for modification C:\Windows\SysWOW64\Bjbcfn32.exe Bfpnmj32.exe File opened for modification C:\Windows\SysWOW64\Ollajp32.exe Nhohda32.exe File created C:\Windows\SysWOW64\Eioojl32.dll Pndpajgd.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2540 2532 WerFault.exe 59 -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ghmnek32.dll" Aaheie32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ckiigmcd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mofglh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mdqfkmom.dll" Behgcf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Baadng32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fdlpjk32.dll" Ckiigmcd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nlcnda32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Oaiibg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Oqacic32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Aaolidlk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bjpdmqog.dll" Baadng32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hjojco32.dll" Qkhpkoen.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Aaloddnn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oackeakj.dll" Nlekia32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pcibkm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Aaheie32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Qeohnd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nmnace32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kjcceqko.dll" Odoloalf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bfqgjgep.dll" Aaloddnn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Meijhc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nlcnda32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hcgdenbm.dll" Npccpo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Daifmohp.dll" 695ac9e723a42709fb270d89f4ea238085a522b119826c11d264816c7c122d0e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pfbelipa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hqlhpf32.dll" Bfpnmj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID 695ac9e723a42709fb270d89f4ea238085a522b119826c11d264816c7c122d0e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nhohda32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Odoloalf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Behgcf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Qkhpkoen.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pqfjpj32.dll" Aaolidlk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node 695ac9e723a42709fb270d89f4ea238085a522b119826c11d264816c7c122d0e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ekebnbmn.dll" Melfncqb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ghkekdhl.dll" Oaiibg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jhgkeald.dll" Aeqabgoj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ffjmmbcg.dll" Pcibkm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bjbcfn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Qeohnd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Phmkjbfe.dll" Nlcnda32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Npccpo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ollajp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mhdqqjhl.dll" Ollajp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aceobl32.dll" Pfbelipa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Meijhc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nhohda32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bkglameg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fibkpd32.dll" Mofglh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mofglh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Qkhpkoen.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Aaheie32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pndpajgd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eioojl32.dll" Pndpajgd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dhnook32.dll" Bjbcfn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Qgoapp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Aajbne32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nlekia32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pndpajgd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" 695ac9e723a42709fb270d89f4ea238085a522b119826c11d264816c7c122d0e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jhpjaq32.dll" Oqacic32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mhpeoj32.dll" Aajbne32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Aeqabgoj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ckiigmcd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 695ac9e723a42709fb270d89f4ea238085a522b119826c11d264816c7c122d0e.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2056 wrote to memory of 1184 2056 695ac9e723a42709fb270d89f4ea238085a522b119826c11d264816c7c122d0e.exe 28 PID 2056 wrote to memory of 1184 2056 695ac9e723a42709fb270d89f4ea238085a522b119826c11d264816c7c122d0e.exe 28 PID 2056 wrote to memory of 1184 2056 695ac9e723a42709fb270d89f4ea238085a522b119826c11d264816c7c122d0e.exe 28 PID 2056 wrote to memory of 1184 2056 695ac9e723a42709fb270d89f4ea238085a522b119826c11d264816c7c122d0e.exe 28 PID 1184 wrote to memory of 2624 1184 Meijhc32.exe 29 PID 1184 wrote to memory of 2624 1184 Meijhc32.exe 29 PID 1184 wrote to memory of 2624 1184 Meijhc32.exe 29 PID 1184 wrote to memory of 2624 1184 Meijhc32.exe 29 PID 2624 wrote to memory of 2600 2624 Melfncqb.exe 30 PID 2624 wrote to memory of 2600 2624 Melfncqb.exe 30 PID 2624 wrote to memory of 2600 2624 Melfncqb.exe 30 PID 2624 wrote to memory of 2600 2624 Melfncqb.exe 30 PID 2600 wrote to memory of 2636 2600 Mofglh32.exe 31 PID 2600 wrote to memory of 2636 2600 Mofglh32.exe 31 PID 2600 wrote to memory of 2636 2600 Mofglh32.exe 31 PID 2600 wrote to memory of 2636 2600 Mofglh32.exe 31 PID 2636 wrote to memory of 2644 2636 Nmnace32.exe 32 PID 2636 wrote to memory of 2644 2636 Nmnace32.exe 32 PID 2636 wrote to memory of 2644 2636 Nmnace32.exe 32 PID 2636 wrote to memory of 2644 2636 Nmnace32.exe 32 PID 2644 wrote to memory of 2552 2644 Nlcnda32.exe 33 PID 2644 wrote to memory of 2552 2644 Nlcnda32.exe 33 PID 2644 wrote to memory of 2552 2644 Nlcnda32.exe 33 PID 2644 wrote to memory of 2552 2644 Nlcnda32.exe 33 PID 2552 wrote to memory of 944 2552 Nlekia32.exe 34 PID 2552 wrote to memory of 944 2552 Nlekia32.exe 34 PID 2552 wrote to memory of 944 2552 Nlekia32.exe 34 PID 2552 wrote to memory of 944 2552 Nlekia32.exe 34 PID 944 wrote to memory of 820 944 Npccpo32.exe 35 PID 944 wrote to memory of 820 944 Npccpo32.exe 35 PID 944 wrote to memory of 820 944 Npccpo32.exe 35 PID 944 wrote to memory of 820 944 Npccpo32.exe 35 PID 820 wrote to memory of 2660 820 Nhohda32.exe 36 PID 820 wrote to memory of 2660 820 Nhohda32.exe 36 PID 820 wrote to memory of 2660 820 Nhohda32.exe 36 PID 820 wrote to memory of 2660 820 Nhohda32.exe 36 PID 2660 wrote to memory of 1176 2660 Ollajp32.exe 37 PID 2660 wrote to memory of 1176 2660 Ollajp32.exe 37 PID 2660 wrote to memory of 1176 2660 Ollajp32.exe 37 PID 2660 wrote to memory of 1176 2660 Ollajp32.exe 37 PID 1176 wrote to memory of 308 1176 Oaiibg32.exe 38 PID 1176 wrote to memory of 308 1176 Oaiibg32.exe 38 PID 1176 wrote to memory of 308 1176 Oaiibg32.exe 38 PID 1176 wrote to memory of 308 1176 Oaiibg32.exe 38 PID 308 wrote to memory of 2544 308 Oqacic32.exe 39 PID 308 wrote to memory of 2544 308 Oqacic32.exe 39 PID 308 wrote to memory of 2544 308 Oqacic32.exe 39 PID 308 wrote to memory of 2544 308 Oqacic32.exe 39 PID 2544 wrote to memory of 624 2544 Odoloalf.exe 40 PID 2544 wrote to memory of 624 2544 Odoloalf.exe 40 PID 2544 wrote to memory of 624 2544 Odoloalf.exe 40 PID 2544 wrote to memory of 624 2544 Odoloalf.exe 40 PID 624 wrote to memory of 1096 624 Pfbelipa.exe 41 PID 624 wrote to memory of 1096 624 Pfbelipa.exe 41 PID 624 wrote to memory of 1096 624 Pfbelipa.exe 41 PID 624 wrote to memory of 1096 624 Pfbelipa.exe 41 PID 1096 wrote to memory of 1928 1096 Pcfefmnk.exe 42 PID 1096 wrote to memory of 1928 1096 Pcfefmnk.exe 42 PID 1096 wrote to memory of 1928 1096 Pcfefmnk.exe 42 PID 1096 wrote to memory of 1928 1096 Pcfefmnk.exe 42 PID 1928 wrote to memory of 2312 1928 Pcibkm32.exe 43 PID 1928 wrote to memory of 2312 1928 Pcibkm32.exe 43 PID 1928 wrote to memory of 2312 1928 Pcibkm32.exe 43 PID 1928 wrote to memory of 2312 1928 Pcibkm32.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\695ac9e723a42709fb270d89f4ea238085a522b119826c11d264816c7c122d0e.exe"C:\Users\Admin\AppData\Local\Temp\695ac9e723a42709fb270d89f4ea238085a522b119826c11d264816c7c122d0e.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\SysWOW64\Meijhc32.exeC:\Windows\system32\Meijhc32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Windows\SysWOW64\Melfncqb.exeC:\Windows\system32\Melfncqb.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Windows\SysWOW64\Mofglh32.exeC:\Windows\system32\Mofglh32.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Windows\SysWOW64\Nmnace32.exeC:\Windows\system32\Nmnace32.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Windows\SysWOW64\Nlcnda32.exeC:\Windows\system32\Nlcnda32.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\SysWOW64\Nlekia32.exeC:\Windows\system32\Nlekia32.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\SysWOW64\Npccpo32.exeC:\Windows\system32\Npccpo32.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Windows\SysWOW64\Nhohda32.exeC:\Windows\system32\Nhohda32.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:820 -
C:\Windows\SysWOW64\Ollajp32.exeC:\Windows\system32\Ollajp32.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\SysWOW64\Oaiibg32.exeC:\Windows\system32\Oaiibg32.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Windows\SysWOW64\Oqacic32.exeC:\Windows\system32\Oqacic32.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:308 -
C:\Windows\SysWOW64\Odoloalf.exeC:\Windows\system32\Odoloalf.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\SysWOW64\Pfbelipa.exeC:\Windows\system32\Pfbelipa.exe14⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:624 -
C:\Windows\SysWOW64\Pcfefmnk.exeC:\Windows\system32\Pcfefmnk.exe15⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Windows\SysWOW64\Pcibkm32.exeC:\Windows\system32\Pcibkm32.exe16⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Windows\SysWOW64\Pckoam32.exeC:\Windows\system32\Pckoam32.exe17⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2312 -
C:\Windows\SysWOW64\Pndpajgd.exeC:\Windows\system32\Pndpajgd.exe18⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:428 -
C:\Windows\SysWOW64\Qeohnd32.exeC:\Windows\system32\Qeohnd32.exe19⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:1668 -
C:\Windows\SysWOW64\Qkhpkoen.exeC:\Windows\system32\Qkhpkoen.exe20⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:112 -
C:\Windows\SysWOW64\Qgoapp32.exeC:\Windows\system32\Qgoapp32.exe21⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:1560 -
C:\Windows\SysWOW64\Aaheie32.exeC:\Windows\system32\Aaheie32.exe22⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:1336 -
C:\Windows\SysWOW64\Aajbne32.exeC:\Windows\system32\Aajbne32.exe23⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:284 -
C:\Windows\SysWOW64\Aaloddnn.exeC:\Windows\system32\Aaloddnn.exe24⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:2908 -
C:\Windows\SysWOW64\Aaolidlk.exeC:\Windows\system32\Aaolidlk.exe25⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:2388 -
C:\Windows\SysWOW64\Aeqabgoj.exeC:\Windows\system32\Aeqabgoj.exe26⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:2688 -
C:\Windows\SysWOW64\Bfpnmj32.exeC:\Windows\system32\Bfpnmj32.exe27⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:2164 -
C:\Windows\SysWOW64\Bjbcfn32.exeC:\Windows\system32\Bjbcfn32.exe28⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:2080 -
C:\Windows\SysWOW64\Behgcf32.exeC:\Windows\system32\Behgcf32.exe29⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:2568 -
C:\Windows\SysWOW64\Bkglameg.exeC:\Windows\system32\Bkglameg.exe30⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:2724 -
C:\Windows\SysWOW64\Baadng32.exeC:\Windows\system32\Baadng32.exe31⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:2608 -
C:\Windows\SysWOW64\Ckiigmcd.exeC:\Windows\system32\Ckiigmcd.exe32⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:2652 -
C:\Windows\SysWOW64\Cacacg32.exeC:\Windows\system32\Cacacg32.exe33⤵
- Executes dropped EXE
PID:2532 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2532 -s 14034⤵
- Program crash
PID:2540
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76KB
MD5ab147b5fab0498bc3ee69ab7ab23ba81
SHA1bc0b052fdaa2cb515794881004faad5c3431977c
SHA25693b540a9dbaac0fcf6166d950d4533f7485aef17e2b7127a5556319bccf236f8
SHA512c2efaee23200570487c87a49955cc161dacc262a41906fce2ecdc84cccb5b7f83254623ddc742030684d737c443eafafb9f25322394f804a02505df15fb8131b
-
Filesize
76KB
MD532ee0a3157ac9ae628e9b87cd6688c61
SHA18be16a372d1647d47862cda078b631e4e949a79f
SHA256ded10a1fa150788765ecf4e61a392eeafd5d3f920115cdc8c6fc4852685fc934
SHA512e93d88ba16dedd90edd311b7dc4d7a0e4eff45b8cdfb1c9f4b4f76dfef23ee8d599f1320ac2449cd748e8bf6e6fa3360487e89a9886aba091664583290dc7226
-
Filesize
76KB
MD557ba017ffadcb8c940a66ea475f58ca1
SHA12a1c8e41d1983f5cdefe839e9a6363f1f717f8e2
SHA2561b5155b672740694ae0dcebb45727126cbb3bcb1814c738cb81639198a13ac56
SHA5121ce0893593176292fb40ba5e7b62dc7f70e0c93b815a1ee015cedd818ee5ce4e09ef8da8a629c7c4c58bf8f66af6bf46b683df5ddacdf8f5dcdc68c3b0c70510
-
Filesize
76KB
MD52690f5b487a6762f80ceca9b3c461c43
SHA1ab99e32125df66b501614d61aefde4ba72d4d58b
SHA25688c7bcd49aa912c6da0527b2bb47b3e316e8d0835331328e8eb5fafb6b169a49
SHA5123a7f0a64756d46d9aab64be8429b9d535892c96d05d41fbf6535f49cda8cc9ebaa317f267af670f20b8a3c1c7d6f30c9b2fb1e0a3464a9f9e3011ab907a27e08
-
Filesize
76KB
MD54bea99574600f5b54194442b3de6ddf7
SHA1efd5bbaac3922585b2a027e9313180644089dcfe
SHA256764c819924ec672b2b8ecedf7bedcd3a5c87a93969b606544fe168a9f2ed4948
SHA512d3e3ed54bb3659bb95bfa45c8653960c918771c10a1bc2757a6e7d9183cbb1603ec5f8a08b51290067fb7ee2b7bcb234e738a7a4fea3118e3ed6d41ae43fe4c3
-
Filesize
76KB
MD550f633fa96469d96a178efa7b2a641cd
SHA1669f28115b77d2ba567a25bbc8ae571b387a5f2a
SHA2562d82d1c7e5d7593bb2c893131f94e9187927ff889fbd9c90fbad719edc428ada
SHA512f434e630366358bc6efdea3d289abe285089faa37a474238fc251519bfe20cb2b25aa8ed3ce63513369e8fa59e3ed6d25e3fbb2f417691e1d376268d6cfdd1a0
-
Filesize
76KB
MD53565105d21b00f1520e11df14ad72253
SHA14a0b86fe0ce46a4a84dee693ef44ce2a19a398f0
SHA256db0ad5f0988b542b8f14b7c83e2a36f002e5a086d2093943cbebaa151a5bc898
SHA5126165ee03f0563e46ec542d056515e35aa30087d42460081e5dc3c335509a2f40432be9759393d8bde47f39b582384be980ba1f977f183f0b4d763ffcd89f992a
-
Filesize
76KB
MD5d4880e96effdfda5ef2ea0717d4d0aa4
SHA15de71dc29273fc5db699ba15e5ddf19cb057354a
SHA256a2c820806bc02bc330f352fcf67c5c8f909254e3aa305641a2331363bfcaa273
SHA5121cd1242399a9b75356edd088f9698509339fc83c658329ce74bcb8d302a139f8dd2474613d1d4e20e78c556ea39a0db4f1a850ebafe7749d3173f2bc054ca5a0
-
Filesize
76KB
MD5e375a71b47a28f7b7b14a5a4c4fef3a4
SHA1a4298bb9e77adfe9702e4e2b0c873b0ed4cde016
SHA2568895d9d70adac306c71737bc0de11e22da77455a1b380f1e76459f86283272cb
SHA51207bd261a44d058caf432813533b124060e7224c064d607a8f3b776d03ecc69e1ecb97a80dab6ec3efe01222a13c580daccb4472f6cfa8a2f1910789c9eee83af
-
Filesize
76KB
MD58a63d51fa35fbb182d44abd2d28a487f
SHA1fbb6391fba4eea7c6aad5a343d163f29ad4c74ed
SHA256e0fb477233a1dc0ac3004cf621d3964793567725de6f1534a73e618d1df3bb92
SHA51212dcab17aa8494392a3dcede55b5745fe5368cd06b525b9066a241e434eba10f1cd9909f7dcf5622e1bc257b76dbd1742fc25672760c8e374d8ca699f48a0a1b
-
Filesize
76KB
MD5fb473bdcf92e68b227fcbcb4e1209fff
SHA1135395f0844f8ecc237c00db968aaac651d4fbf2
SHA25611d838186a8c57f47ed12f967f5a42202324fdabd1e605fe03b6dd451b53efff
SHA5126e578853c289e2545d68f17955d7b8ae4e17239ff41e493dd26a14b5afbd8d9231db2799ed720830393cf6c8f293ff70d3cc3c450ea68bb2029fd2f1f84717f9
-
Filesize
76KB
MD570e7d80d18c1fabe87979f7485739dd7
SHA1324cb5db949441e4f2cebe1f8127c3d2fe4cfca3
SHA2568581985eda1a211eda238e33e6be669724d2e45a5dfdcdcde873082319f4145d
SHA512bad45941aa68045dbeca48d0bf436179690f7ab641cf4c97277a6b940ec44a11bd81bf237ef81e22122a7be2f6ca41125ecc01f2b9516d94bb289a0a474d6486
-
Filesize
76KB
MD53cca353127b2dade994c15d357f449ab
SHA1ddf48d4acac026c4329153e09e41fe79c1d2cec2
SHA256173e176301b8014552d9787ecc2521615e46d260a8d528a72fdbb968c114c962
SHA512dd1b72ba0dacd987a3e3459a8bf2d35d24271da67940ea950e3b4992bea3804f5a293e4ce3d41e0edb9973580fddcc5d0faf28cf722e368ab61afb94555e5851
-
Filesize
76KB
MD5e1d30d42193cede2ed4a31c36e6d5bb8
SHA19e7c3b53a6bb44ef1355d15d74056b753f02c675
SHA25690afffc9d0f4cda3ce038e1a53961fee158864153f40045d7d2c364f7c5b8a6a
SHA512ce1a4acc052a9b4f52e0dfa648577e8f5e6fb213a8e1083199e187b82b140034160e060d0253ae601982ad259319f75ad48c2eb14479af97f3e7ed2128ebcbf2
-
Filesize
76KB
MD5c88a7333860c1fcbef6a7f5dc92db351
SHA1598fc00012b98ad73a373a22d9720d8f3c0b5968
SHA2560e7ddd6fa01924b3723d12f3063df1f41b54a3d8d8dff3b666641bcf6c6ccba0
SHA51226fec3a822ee44b873340b90f3e6c4b2beac38257437a6941562060e4efd80ba13b91ed6385b247fe8e1dd0f707316d7cdd1399954b9d79caf783dae1ef8c38d
-
Filesize
76KB
MD5830ae30f0ddba7439b61b441a267298c
SHA1bc7c730206bcc07bb7cc561f22c1d23f4de073bc
SHA256c4c0fd50684c043ca92f264e3765b67913fd0e194f328a160a7277824b89a253
SHA512de1d68c0a818e607938be93a298ea2ac6635eff3953d28f68e650511b8d63338319100965e483eabe74ff0ad38ab89f44fac676a9dbe386e661d7a2289d71d99
-
Filesize
76KB
MD5ccce0c375daebf3be3398110951b9576
SHA1f07b7b9d236918e6490e6312971958adf344de71
SHA256feda026521371e5fc4149e65433fd92854de98581b56fc0d0630889eda4e1080
SHA512db11123c900c53651b2a06598fb7ed98e3a392394c9ef857e12e093db55afc180dce69a47a0c7a112eab8fb7c33b9241c0a8868e4e99a99aabde8942b0612f7b
-
Filesize
76KB
MD5dab5c6a58b92258987f4a5e0bcda64db
SHA183456579d9793965ebb3bfdb97623fa04ac854e2
SHA256cac09ead1a20e67d220d5144f94ccf3d298fad2f86cc1d533b2a42d641fa2743
SHA5122216272e36e9f8cf6f93a1192a3814a04fb5aa19d6790b8239eba8460c5ed21d1d6f025e086d30fa0a836cd01c6e41dc31d82a166777bef285b9d973b89d9402
-
Filesize
76KB
MD59f81a5cafa69bb810590b15ecb25c672
SHA174082f558f832d33a42d587b779c87149046d0cd
SHA25606af7a637a8432609aa21babcfad7099f1384bcede6f9fd8882e7afe9b7b235e
SHA5129556933c3a9d6a4eb084c9d3cbac62c7d8ae33ee4ae3039cd24502b0e00c524d937ecae90ebb4fec0c51e714cc1d6d868ff98eed8e77645597cca9eb46f802d7
-
Filesize
76KB
MD5a6d8f055acf7a03f20ef5bd4064c5798
SHA123d8517afa9b5b43960d759a4c253f4e3ed48e4c
SHA256594f5d7c06ff3ba7e30e74eb292e5b552a331bb15d80f8c07510a16607f847f9
SHA5129d9adb080270015dc757b336b5cd12f336352a90769a96b8a5f29a59d16cf4e56c9cdf14c25882bd98f6f736cd4f18d5d4f4e7f4300fdc19c1a5d42ceb818090
-
Filesize
76KB
MD5532f9173d1fa1a680ea0962ff2e26b65
SHA1dae7c4c0650cd8515a5aa79034662cf77a005368
SHA256f914d0b3c29fa78629746e3f8401225834e5a40d5cdcc90202d73cae829e6b61
SHA5126b9279d8a4b4d3f9fb7a713de975d15ba5231f0a490cb3a657da5df90a95731f3dbcce0a0b4bb35474ca028b6d88ef895cfd75b52540b7ba789321709ce522a1
-
Filesize
76KB
MD59fe9403d32d4c650c0e6989537381a4e
SHA16f1d6fe23e6161dde62ff66b929a84fb5d323cab
SHA256808458d5e13875a57d8e31cf4893e9576f6a3cfa0494d460e06ee559166f63c7
SHA5124a9d027314d0d4db2d2fe811dde9b7bf6a2b2d219b8c5a8bce489f199b821e7ca9c94efa0606df01cfa562c5d9f556482f5b6f79bf8916e410369ab6ff4c9c52
-
Filesize
76KB
MD5b175b954b8bbe2bb3b71975b46e8e72c
SHA1a2887b11ce57e57fb266b651d936158c0b3a11a4
SHA2569c45cdc6abb0a13f2c0a87d95c1b7f546c1343c55bc6bd7283f3593410bfb590
SHA512dc3750ef2e5774c918c9fbab355bbb805f672f2e774d7d77c84875113c25eb37aa6dc71210af566076ec2e1b06db633e91381230a5015d9c954069a1d416111b
-
Filesize
76KB
MD5a96f3a00ed961f26971fcdf02a9861c8
SHA1b13c32ee6e0945fb6e63d47bdd0bbce6e8cdb4cd
SHA256071fe6cc5a4e025f99b1dc95d6b9a08af78da6ae3689ce4bcf32a2c5dcff2cbd
SHA512f71ea04f87e8f1a02a2f749b5c33f618b68e8eeff4eec25bd2db1f5056452020e2e6bdf257f5d56b67c2108b8f081c3f7334d7b0fdd46e903c965d10aaba39a1
-
Filesize
76KB
MD5338e753f3ae9368b7d3658f0619ad11c
SHA1f64d8091f5f8a2add4f5e91b2170d84c2fced46f
SHA2565e4d8d16c93da541db75c197daefc1d2b763c092e28b486cbf34c647f84a2100
SHA512ea6d9efbea639bd49b1f501d232eb61b4c3bd7fbb05ed8803868ed247fed67580a423163938962689944c67b6a640a4145b7ec642125130b932e3eba6f641d42
-
Filesize
76KB
MD597976ad675230b1367d8b0219528d662
SHA115b0fe1b92f17c917f0704a91d3545567910735f
SHA256f77272a5f2237998b132e9f966839d03756e3f343f23c2dbca2d5c77cc178669
SHA512e3b431bd946b23d6e828347784b18852afaf87b8ba8844fe778346511d423cfdeb31735ca26eb72dca229f452a0539251d3165ec6bd01a8bbedd7d2cc7d6b430
-
Filesize
76KB
MD50e4838cd01be63045af31c13d8a5af1a
SHA1311a6652554f8a7b715cac9120a9959441a5bd4f
SHA256f34c89b687088b48ff94832be2bc517b5ee5aa838d767e6eab065315ea1f25af
SHA512a5292f57d471b0ee6c1c4e64bf1e4ee796a1f07639bca14b3bd8d816b21cacc9a62fb6c81d768b29ef8292c733c197d4bf31d747945dafd0c1318856c71d77b0
-
Filesize
76KB
MD5b1e57fe53a411b1613d991b942432332
SHA162709c48b1718fc8813c30bf497ea2415951453c
SHA256fce96ddce0ec0b659e070cad2eb6d2944f93dfac32f0cdfd65d3caafd8258d71
SHA5123309ca8a916221b70b22d813707c531093b8f880564dc2bf7d737e06125727893941204765b986f652fbdb7237c6863556938fcd2c10d6571cc78c43add03846
-
Filesize
76KB
MD56d8509fb656d713de881ea02959ac348
SHA1c0a4e6eae7e163bc6bdeec7e3812752eb9cd42fd
SHA256ca66c75097553f33c7ed112f704ff3259e79b88ba504f2522d1306dd10d836c4
SHA5123442835518e47523153959cfa745df1d0354b0abcacd68b414d0c60fd10d30023c30704f0167d1eee5bb23ed2e725fd121f6599c8aba2ebac8992787736831e5
-
Filesize
76KB
MD59dca6bd27b2b208376a8c7da2c9b9e22
SHA1fa995503bad57c118080c062a673f42a57130451
SHA25606432aa4c18b38997d9ef2728e43c957118b8de9199cc9843368a341f53c0499
SHA5126196bbc4f25b92b9416406ced5106c76ba4494d3616af15f9a125c5dd8ab9c7e305952de97a33fb2b542fb6034c6ded549840abefcc0aeaa8739efcd3d8d2610
-
Filesize
76KB
MD59dca8f32df4f3a9f2ba87e2c6a67904a
SHA1502fe865bc136f5f2c760c017f8306851646ca1f
SHA256884258499cfa8a01fb24b8f1b663ae220d5b487265bf3b406ed74c065770bdc2
SHA5129c1ceaf3112ab0c153e3a98cdd51a859f0c0c3ca5ea6f805867a94d301ccafebf4f367c47ada573374fba0b7b639034e1c7efc1216e563f3e8501e3a3fd2638c
-
Filesize
76KB
MD550f0918c10ec28a84b98fddd4c399ae0
SHA1bc4dfaf7df534a7c365f51ff4a54761634e93ef5
SHA2563bdb0f3b65c5bc5b89e4f6a80a3e7ba0fefe2056613272d7c49fc7bfcfa1bb67
SHA51208541c9233b4c798e4959517a9c41f88659fa92460e4134a3678951d6e0589a21be2876ad4d467c9916e98ea17189481e617b8d57ae62c9cc523546c66a4eee1