Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
28/06/2024, 01:54
Static task
static1
Behavioral task
behavioral1
Sample
5f8e42eab1f54ba64165f989f5bad517fbd71fa0faa2b028cbc1f55c275d8908_NeikiAnalytics.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
5f8e42eab1f54ba64165f989f5bad517fbd71fa0faa2b028cbc1f55c275d8908_NeikiAnalytics.exe
Resource
win10v2004-20240611-en
General
-
Target
5f8e42eab1f54ba64165f989f5bad517fbd71fa0faa2b028cbc1f55c275d8908_NeikiAnalytics.exe
-
Size
320KB
-
MD5
d40fd3561263c63d38588a460220c220
-
SHA1
5305bd11dc7bc49e479a8bfed5f4e4fbc20103b4
-
SHA256
5f8e42eab1f54ba64165f989f5bad517fbd71fa0faa2b028cbc1f55c275d8908
-
SHA512
474414ba627e30022f5eed1a756f0b9c428e6466f9d63a59a2f77007971f0ed585fac746b3f1b154ebffb67f4b7ddbaf1528702e00d1341ee43cec7ce0c808a5
-
SSDEEP
6144:+w9uBnPBw6/eKxSlKKZ74ueKxff0qjwszeX9z6/ojwx:KxMlr54ujjgj8
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 50 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pqemdbaj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kqqboncb.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Leljop32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aniimjbo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Biojif32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mlhkpm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Niikceid.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bhhpeafc.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lmlhnagm.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nilhhdga.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Biojif32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bhhpeafc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jgfqaiod.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cfnmfn32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cphndc32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kqqboncb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Leljop32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qqeicede.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kbidgeci.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kbidgeci.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lccdel32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mgalqkbk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pqemdbaj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Aniimjbo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ajgpbj32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jgfqaiod.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mponel32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mhjbjopf.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aaolidlk.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 5f8e42eab1f54ba64165f989f5bad517fbd71fa0faa2b028cbc1f55c275d8908_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Niikceid.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nilhhdga.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pcibkm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Aaolidlk.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mgalqkbk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Odhfob32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Odhfob32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mponel32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mhjbjopf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mlhkpm32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Boplllob.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pcibkm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lmlhnagm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cfnmfn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cphndc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lccdel32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qqeicede.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ajgpbj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Boplllob.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" 5f8e42eab1f54ba64165f989f5bad517fbd71fa0faa2b028cbc1f55c275d8908_NeikiAnalytics.exe -
Executes dropped EXE 25 IoCs
pid Process 2592 Jgfqaiod.exe 2780 Kqqboncb.exe 2636 Kbidgeci.exe 2724 Leljop32.exe 2500 Lccdel32.exe 2948 Lmlhnagm.exe 1944 Mponel32.exe 784 Mhjbjopf.exe 756 Mlhkpm32.exe 2000 Mgalqkbk.exe 2028 Niikceid.exe 1572 Nilhhdga.exe 1676 Odhfob32.exe 2384 Pqemdbaj.exe 2880 Pcibkm32.exe 1976 Qqeicede.exe 3012 Aniimjbo.exe 1920 Aaolidlk.exe 1820 Ajgpbj32.exe 1324 Biojif32.exe 2468 Boplllob.exe 2844 Bhhpeafc.exe 1524 Cfnmfn32.exe 2248 Cphndc32.exe 896 Ceegmj32.exe -
Loads dropped DLL 54 IoCs
pid Process 1992 5f8e42eab1f54ba64165f989f5bad517fbd71fa0faa2b028cbc1f55c275d8908_NeikiAnalytics.exe 1992 5f8e42eab1f54ba64165f989f5bad517fbd71fa0faa2b028cbc1f55c275d8908_NeikiAnalytics.exe 2592 Jgfqaiod.exe 2592 Jgfqaiod.exe 2780 Kqqboncb.exe 2780 Kqqboncb.exe 2636 Kbidgeci.exe 2636 Kbidgeci.exe 2724 Leljop32.exe 2724 Leljop32.exe 2500 Lccdel32.exe 2500 Lccdel32.exe 2948 Lmlhnagm.exe 2948 Lmlhnagm.exe 1944 Mponel32.exe 1944 Mponel32.exe 784 Mhjbjopf.exe 784 Mhjbjopf.exe 756 Mlhkpm32.exe 756 Mlhkpm32.exe 2000 Mgalqkbk.exe 2000 Mgalqkbk.exe 2028 Niikceid.exe 2028 Niikceid.exe 1572 Nilhhdga.exe 1572 Nilhhdga.exe 1676 Odhfob32.exe 1676 Odhfob32.exe 2384 Pqemdbaj.exe 2384 Pqemdbaj.exe 2880 Pcibkm32.exe 2880 Pcibkm32.exe 1976 Qqeicede.exe 1976 Qqeicede.exe 3012 Aniimjbo.exe 3012 Aniimjbo.exe 1920 Aaolidlk.exe 1920 Aaolidlk.exe 1820 Ajgpbj32.exe 1820 Ajgpbj32.exe 1324 Biojif32.exe 1324 Biojif32.exe 2468 Boplllob.exe 2468 Boplllob.exe 2844 Bhhpeafc.exe 2844 Bhhpeafc.exe 1524 Cfnmfn32.exe 1524 Cfnmfn32.exe 2248 Cphndc32.exe 2248 Cphndc32.exe 2332 WerFault.exe 2332 WerFault.exe 2332 WerFault.exe 2332 WerFault.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\Niikceid.exe Mgalqkbk.exe File opened for modification C:\Windows\SysWOW64\Niikceid.exe Mgalqkbk.exe File opened for modification C:\Windows\SysWOW64\Nilhhdga.exe Niikceid.exe File created C:\Windows\SysWOW64\Pnalpimd.dll Nilhhdga.exe File opened for modification C:\Windows\SysWOW64\Ceegmj32.exe Cphndc32.exe File opened for modification C:\Windows\SysWOW64\Boplllob.exe Biojif32.exe File created C:\Windows\SysWOW64\Jodjlm32.dll Boplllob.exe File created C:\Windows\SysWOW64\Gcopbn32.dll Kbidgeci.exe File opened for modification C:\Windows\SysWOW64\Mponel32.exe Lmlhnagm.exe File created C:\Windows\SysWOW64\Mlhkpm32.exe Mhjbjopf.exe File opened for modification C:\Windows\SysWOW64\Aniimjbo.exe Qqeicede.exe File created C:\Windows\SysWOW64\Biojif32.exe Ajgpbj32.exe File created C:\Windows\SysWOW64\Mmdgdp32.dll Ajgpbj32.exe File created C:\Windows\SysWOW64\Mponel32.exe Lmlhnagm.exe File opened for modification C:\Windows\SysWOW64\Mhjbjopf.exe Mponel32.exe File created C:\Windows\SysWOW64\Bfenfipk.dll Niikceid.exe File created C:\Windows\SysWOW64\Aniimjbo.exe Qqeicede.exe File created C:\Windows\SysWOW64\Ipjcbn32.dll Lccdel32.exe File created C:\Windows\SysWOW64\Mhjbjopf.exe Mponel32.exe File opened for modification C:\Windows\SysWOW64\Mlhkpm32.exe Mhjbjopf.exe File created C:\Windows\SysWOW64\Pqemdbaj.exe Odhfob32.exe File opened for modification C:\Windows\SysWOW64\Bhhpeafc.exe Boplllob.exe File created C:\Windows\SysWOW64\Badffggh.dll 5f8e42eab1f54ba64165f989f5bad517fbd71fa0faa2b028cbc1f55c275d8908_NeikiAnalytics.exe File created C:\Windows\SysWOW64\Qocjhb32.dll Jgfqaiod.exe File created C:\Windows\SysWOW64\Kbidgeci.exe Kqqboncb.exe File created C:\Windows\SysWOW64\Leljop32.exe Kbidgeci.exe File opened for modification C:\Windows\SysWOW64\Lccdel32.exe Leljop32.exe File created C:\Windows\SysWOW64\Odhfob32.exe Nilhhdga.exe File created C:\Windows\SysWOW64\Bmnbjfam.dll Aaolidlk.exe File opened for modification C:\Windows\SysWOW64\Biojif32.exe Ajgpbj32.exe File created C:\Windows\SysWOW64\Fdbnmk32.dll Leljop32.exe File created C:\Windows\SysWOW64\Qqeicede.exe Pcibkm32.exe File created C:\Windows\SysWOW64\Bfqgjgep.dll Aniimjbo.exe File created C:\Windows\SysWOW64\Cfnmfn32.exe Bhhpeafc.exe File created C:\Windows\SysWOW64\Cphndc32.exe Cfnmfn32.exe File created C:\Windows\SysWOW64\Lccdel32.exe Leljop32.exe File created C:\Windows\SysWOW64\Dnlbnp32.dll Mgalqkbk.exe File created C:\Windows\SysWOW64\Pcibkm32.exe Pqemdbaj.exe File opened for modification C:\Windows\SysWOW64\Pcibkm32.exe Pqemdbaj.exe File created C:\Windows\SysWOW64\Aaolidlk.exe Aniimjbo.exe File created C:\Windows\SysWOW64\Boplllob.exe Biojif32.exe File created C:\Windows\SysWOW64\Jmogdj32.dll Qqeicede.exe File opened for modification C:\Windows\SysWOW64\Ajgpbj32.exe Aaolidlk.exe File created C:\Windows\SysWOW64\Mabanhgg.dll Bhhpeafc.exe File opened for modification C:\Windows\SysWOW64\Kbidgeci.exe Kqqboncb.exe File opened for modification C:\Windows\SysWOW64\Jgfqaiod.exe 5f8e42eab1f54ba64165f989f5bad517fbd71fa0faa2b028cbc1f55c275d8908_NeikiAnalytics.exe File created C:\Windows\SysWOW64\Imbiaa32.dll Mponel32.exe File created C:\Windows\SysWOW64\Lopdpdmj.dll Cfnmfn32.exe File created C:\Windows\SysWOW64\Ceegmj32.exe Cphndc32.exe File created C:\Windows\SysWOW64\Aoogfhfp.dll Cphndc32.exe File opened for modification C:\Windows\SysWOW64\Cphndc32.exe Cfnmfn32.exe File created C:\Windows\SysWOW64\Effqclic.dll Lmlhnagm.exe File created C:\Windows\SysWOW64\Mgecadnb.dll Mhjbjopf.exe File created C:\Windows\SysWOW64\Mgalqkbk.exe Mlhkpm32.exe File created C:\Windows\SysWOW64\Nilhhdga.exe Niikceid.exe File opened for modification C:\Windows\SysWOW64\Pqemdbaj.exe Odhfob32.exe File created C:\Windows\SysWOW64\Jcbemfmf.dll Odhfob32.exe File created C:\Windows\SysWOW64\Jgfqaiod.exe 5f8e42eab1f54ba64165f989f5bad517fbd71fa0faa2b028cbc1f55c275d8908_NeikiAnalytics.exe File opened for modification C:\Windows\SysWOW64\Qqeicede.exe Pcibkm32.exe File opened for modification C:\Windows\SysWOW64\Aaolidlk.exe Aniimjbo.exe File created C:\Windows\SysWOW64\Ajgpbj32.exe Aaolidlk.exe File created C:\Windows\SysWOW64\Liggabfp.dll Biojif32.exe File created C:\Windows\SysWOW64\Pelggd32.dll Kqqboncb.exe File opened for modification C:\Windows\SysWOW64\Mgalqkbk.exe Mlhkpm32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2332 896 WerFault.exe 52 -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ajgpbj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Boplllob.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cfnmfn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kbidgeci.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kbidgeci.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lmlhnagm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mponel32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Liggabfp.dll" Biojif32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Biojif32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bhhpeafc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cphndc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gcopbn32.dll" Kbidgeci.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mhjbjopf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Niikceid.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pqemdbaj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Aniimjbo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jodjlm32.dll" Boplllob.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qocjhb32.dll" Jgfqaiod.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kqqboncb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Imbiaa32.dll" Mponel32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Odhfob32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bfqgjgep.dll" Aniimjbo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mabanhgg.dll" Bhhpeafc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cfnmfn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mponel32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bmnbjfam.dll" Aaolidlk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mmdgdp32.dll" Ajgpbj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Leljop32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mgecadnb.dll" Mhjbjopf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dnlbnp32.dll" Mgalqkbk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Imjcfnhk.dll" Pcibkm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Biojif32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bhhpeafc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aoogfhfp.dll" Cphndc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jgfqaiod.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jgfqaiod.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fdbnmk32.dll" Leljop32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Niikceid.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pcibkm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lccdel32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Qqeicede.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mhjbjopf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bfenfipk.dll" Niikceid.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pnalpimd.dll" Nilhhdga.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lopdpdmj.dll" Cfnmfn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pelggd32.dll" Kqqboncb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lmlhnagm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kqqboncb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Leljop32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nilhhdga.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 5f8e42eab1f54ba64165f989f5bad517fbd71fa0faa2b028cbc1f55c275d8908_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node 5f8e42eab1f54ba64165f989f5bad517fbd71fa0faa2b028cbc1f55c275d8908_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} 5f8e42eab1f54ba64165f989f5bad517fbd71fa0faa2b028cbc1f55c275d8908_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lccdel32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mlhkpm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mgalqkbk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Odhfob32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pcibkm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ipjcbn32.dll" Lccdel32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Effqclic.dll" Lmlhnagm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mlhkpm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mgalqkbk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nilhhdga.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Paenhpdh.dll" Pqemdbaj.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1992 wrote to memory of 2592 1992 5f8e42eab1f54ba64165f989f5bad517fbd71fa0faa2b028cbc1f55c275d8908_NeikiAnalytics.exe 28 PID 1992 wrote to memory of 2592 1992 5f8e42eab1f54ba64165f989f5bad517fbd71fa0faa2b028cbc1f55c275d8908_NeikiAnalytics.exe 28 PID 1992 wrote to memory of 2592 1992 5f8e42eab1f54ba64165f989f5bad517fbd71fa0faa2b028cbc1f55c275d8908_NeikiAnalytics.exe 28 PID 1992 wrote to memory of 2592 1992 5f8e42eab1f54ba64165f989f5bad517fbd71fa0faa2b028cbc1f55c275d8908_NeikiAnalytics.exe 28 PID 2592 wrote to memory of 2780 2592 Jgfqaiod.exe 29 PID 2592 wrote to memory of 2780 2592 Jgfqaiod.exe 29 PID 2592 wrote to memory of 2780 2592 Jgfqaiod.exe 29 PID 2592 wrote to memory of 2780 2592 Jgfqaiod.exe 29 PID 2780 wrote to memory of 2636 2780 Kqqboncb.exe 30 PID 2780 wrote to memory of 2636 2780 Kqqboncb.exe 30 PID 2780 wrote to memory of 2636 2780 Kqqboncb.exe 30 PID 2780 wrote to memory of 2636 2780 Kqqboncb.exe 30 PID 2636 wrote to memory of 2724 2636 Kbidgeci.exe 31 PID 2636 wrote to memory of 2724 2636 Kbidgeci.exe 31 PID 2636 wrote to memory of 2724 2636 Kbidgeci.exe 31 PID 2636 wrote to memory of 2724 2636 Kbidgeci.exe 31 PID 2724 wrote to memory of 2500 2724 Leljop32.exe 32 PID 2724 wrote to memory of 2500 2724 Leljop32.exe 32 PID 2724 wrote to memory of 2500 2724 Leljop32.exe 32 PID 2724 wrote to memory of 2500 2724 Leljop32.exe 32 PID 2500 wrote to memory of 2948 2500 Lccdel32.exe 33 PID 2500 wrote to memory of 2948 2500 Lccdel32.exe 33 PID 2500 wrote to memory of 2948 2500 Lccdel32.exe 33 PID 2500 wrote to memory of 2948 2500 Lccdel32.exe 33 PID 2948 wrote to memory of 1944 2948 Lmlhnagm.exe 34 PID 2948 wrote to memory of 1944 2948 Lmlhnagm.exe 34 PID 2948 wrote to memory of 1944 2948 Lmlhnagm.exe 34 PID 2948 wrote to memory of 1944 2948 Lmlhnagm.exe 34 PID 1944 wrote to memory of 784 1944 Mponel32.exe 35 PID 1944 wrote to memory of 784 1944 Mponel32.exe 35 PID 1944 wrote to memory of 784 1944 Mponel32.exe 35 PID 1944 wrote to memory of 784 1944 Mponel32.exe 35 PID 784 wrote to memory of 756 784 Mhjbjopf.exe 36 PID 784 wrote to memory of 756 784 Mhjbjopf.exe 36 PID 784 wrote to memory of 756 784 Mhjbjopf.exe 36 PID 784 wrote to memory of 756 784 Mhjbjopf.exe 36 PID 756 wrote to memory of 2000 756 Mlhkpm32.exe 37 PID 756 wrote to memory of 2000 756 Mlhkpm32.exe 37 PID 756 wrote to memory of 2000 756 Mlhkpm32.exe 37 PID 756 wrote to memory of 2000 756 Mlhkpm32.exe 37 PID 2000 wrote to memory of 2028 2000 Mgalqkbk.exe 38 PID 2000 wrote to memory of 2028 2000 Mgalqkbk.exe 38 PID 2000 wrote to memory of 2028 2000 Mgalqkbk.exe 38 PID 2000 wrote to memory of 2028 2000 Mgalqkbk.exe 38 PID 2028 wrote to memory of 1572 2028 Niikceid.exe 39 PID 2028 wrote to memory of 1572 2028 Niikceid.exe 39 PID 2028 wrote to memory of 1572 2028 Niikceid.exe 39 PID 2028 wrote to memory of 1572 2028 Niikceid.exe 39 PID 1572 wrote to memory of 1676 1572 Nilhhdga.exe 40 PID 1572 wrote to memory of 1676 1572 Nilhhdga.exe 40 PID 1572 wrote to memory of 1676 1572 Nilhhdga.exe 40 PID 1572 wrote to memory of 1676 1572 Nilhhdga.exe 40 PID 1676 wrote to memory of 2384 1676 Odhfob32.exe 41 PID 1676 wrote to memory of 2384 1676 Odhfob32.exe 41 PID 1676 wrote to memory of 2384 1676 Odhfob32.exe 41 PID 1676 wrote to memory of 2384 1676 Odhfob32.exe 41 PID 2384 wrote to memory of 2880 2384 Pqemdbaj.exe 42 PID 2384 wrote to memory of 2880 2384 Pqemdbaj.exe 42 PID 2384 wrote to memory of 2880 2384 Pqemdbaj.exe 42 PID 2384 wrote to memory of 2880 2384 Pqemdbaj.exe 42 PID 2880 wrote to memory of 1976 2880 Pcibkm32.exe 43 PID 2880 wrote to memory of 1976 2880 Pcibkm32.exe 43 PID 2880 wrote to memory of 1976 2880 Pcibkm32.exe 43 PID 2880 wrote to memory of 1976 2880 Pcibkm32.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\5f8e42eab1f54ba64165f989f5bad517fbd71fa0faa2b028cbc1f55c275d8908_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\5f8e42eab1f54ba64165f989f5bad517fbd71fa0faa2b028cbc1f55c275d8908_NeikiAnalytics.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Windows\SysWOW64\Jgfqaiod.exeC:\Windows\system32\Jgfqaiod.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Windows\SysWOW64\Kqqboncb.exeC:\Windows\system32\Kqqboncb.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\SysWOW64\Kbidgeci.exeC:\Windows\system32\Kbidgeci.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Windows\SysWOW64\Leljop32.exeC:\Windows\system32\Leljop32.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\SysWOW64\Lccdel32.exeC:\Windows\system32\Lccdel32.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Windows\SysWOW64\Lmlhnagm.exeC:\Windows\system32\Lmlhnagm.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Windows\SysWOW64\Mponel32.exeC:\Windows\system32\Mponel32.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Windows\SysWOW64\Mhjbjopf.exeC:\Windows\system32\Mhjbjopf.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:784 -
C:\Windows\SysWOW64\Mlhkpm32.exeC:\Windows\system32\Mlhkpm32.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:756 -
C:\Windows\SysWOW64\Mgalqkbk.exeC:\Windows\system32\Mgalqkbk.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\SysWOW64\Niikceid.exeC:\Windows\system32\Niikceid.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\SysWOW64\Nilhhdga.exeC:\Windows\system32\Nilhhdga.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Windows\SysWOW64\Odhfob32.exeC:\Windows\system32\Odhfob32.exe14⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Windows\SysWOW64\Pqemdbaj.exeC:\Windows\system32\Pqemdbaj.exe15⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Windows\SysWOW64\Pcibkm32.exeC:\Windows\system32\Pcibkm32.exe16⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Windows\SysWOW64\Qqeicede.exeC:\Windows\system32\Qqeicede.exe17⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:1976 -
C:\Windows\SysWOW64\Aniimjbo.exeC:\Windows\system32\Aniimjbo.exe18⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:3012 -
C:\Windows\SysWOW64\Aaolidlk.exeC:\Windows\system32\Aaolidlk.exe19⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:1920 -
C:\Windows\SysWOW64\Ajgpbj32.exeC:\Windows\system32\Ajgpbj32.exe20⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:1820 -
C:\Windows\SysWOW64\Biojif32.exeC:\Windows\system32\Biojif32.exe21⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:1324 -
C:\Windows\SysWOW64\Boplllob.exeC:\Windows\system32\Boplllob.exe22⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:2468 -
C:\Windows\SysWOW64\Bhhpeafc.exeC:\Windows\system32\Bhhpeafc.exe23⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:2844 -
C:\Windows\SysWOW64\Cfnmfn32.exeC:\Windows\system32\Cfnmfn32.exe24⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:1524 -
C:\Windows\SysWOW64\Cphndc32.exeC:\Windows\system32\Cphndc32.exe25⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:2248 -
C:\Windows\SysWOW64\Ceegmj32.exeC:\Windows\system32\Ceegmj32.exe26⤵
- Executes dropped EXE
PID:896 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 896 -s 14027⤵
- Loads dropped DLL
- Program crash
PID:2332
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
320KB
MD5a3c6ff15ae389d537d13cda00e1f42be
SHA1686d834d7b5f39812fc74879315bf2e93b4509e3
SHA25686e00d5f699b51991d4fd055e22e03383c85f5977708658b9fcd2a2d16265922
SHA51216a1998f4905ba38f799d5fff4af13e83f63c43b047c98cb89c7c56d16f6e70365e0baf7d36c90cfa2643bc0923cfd499f0f0033d4ad97effb7f10346638b805
-
Filesize
320KB
MD5f07e2ce4d9e3758f8d9d7e4e2423eceb
SHA15bee85cf94a6328d22221b04bbd6292e85495ad3
SHA2569ab14c2c854ab4813cf96786135f8c18a00f6c9147e5274964a474d5e4a648cc
SHA512d29543b10e6b220f20510721183900fd4fb055e8e040a9ff40a24d8bd7c152b227955c606cc2630361ae40b429b8e5e156603a8ab3165603c98b78ce5fa722c3
-
Filesize
320KB
MD5a2272173336f80342cc6326413fbbdce
SHA1e56d183c1504fda33500fe7e52d72ce43284461f
SHA256584d3e5a38915e9393c87ea4e0f43d1d4945c121a8f7a3ea2a9c8b1629e22b36
SHA512355c40272ba2edad4cee80ba6ff0e3b74d4bfb176f3c818642a0ad8eeffeb123c9f0d1b17473ccf2392085ca93733ca7b750f6a9476161e152502d6198b42881
-
Filesize
320KB
MD5923a9b5ed46a57926cf0508cb9c3a718
SHA1cebeebc67e3ec499859401a71afb1ed8bf63a7af
SHA2566b20b9dd61600d867daf39e66624cf12e24dedfb29b9750f371bb1b0bd998cce
SHA512858d2abb8f1293ea14294171803815c57e0ddc5c734d34efe08cfef39c0b4ed83d902bd9e444257754f1e05313998feece1d3f70067aa8bdaa10f93585995e56
-
Filesize
320KB
MD50bb61962e28c47ffb02ef4dcb08da71c
SHA10ec9b25437eb45c6770a3d8d4970c315b78cbead
SHA256adc276900e98bdc0bff2c46d068bdedb522a7b24374de019b515c46f34d81a84
SHA51271feedf4da9985c8bd3167b918877976b50789e365fd048d9fea54b4827f57fb4ea209db5e70180a96f40ee34d88dcfb489b04040257106707bedda30b48d4d6
-
Filesize
320KB
MD5f7733b1f2600180c54bc4611a3dfe515
SHA1bbec236bd30debbfd308afc858cf7e755113b2ec
SHA256ac43e302434a12ee3625182a29de5b2209d50f8ce5efdff06bb3e520339480e9
SHA512da8ce5a020f43d1d4762c2848310ae61cb5c19f37423c83783b7b196680f1424f10d540bcb945c51e206ed9432bb700067364c1932f23a96a037a208af92d929
-
Filesize
320KB
MD58e6e7342f516c159b5ff2ad628128dd4
SHA110b60bfca9b86781202da71eac2140cbafc004d8
SHA2561c8f595470e1c94a61bb22f9383c9724db8a1e2d361e6093181d69f601ed1ba9
SHA51269f5e58b6f0908b7505b4ea64bca2f3859874de6c6a07c7982f9a7eb9e8abc4e39d2b54b63ccaa3bf5479b2cec9ae66d74088f73a1656dc7ea73823b0a2687ff
-
Filesize
320KB
MD5ae39a6c605749e8e9399f88f788496d5
SHA16d21cb92998e559d92d53172f02119c10874c1fa
SHA2564deaba8a0d65237d9ecd5bd8856442deef1f7a666ca2f9ba4bee9985e7b86983
SHA51245258f43a2c9da6c04c26a06c84e9cd7406bfce324e8ee480f01cb6db94bea9f7cb2659cef6162a4c1fba128a15d8633d77eee32f7f408d5fb17f00919633989
-
Filesize
320KB
MD5d64b7ad35e46b90824d57421a303fdc7
SHA181e323e9a393bc501ad77d293101307586e526d5
SHA256b96cd29078a5b4fb815093f772e7581743d74e2105a2059181a0d36dd78d8ac1
SHA512b8ddfdf1a0c302d22a728f508ffb0ed1b0835f7518c6001d3933668149e2b16be81eb6952985ff490541361683ab58de2700ea6e7a5317189f4234dd3aa5339e
-
Filesize
320KB
MD57ee3a058769679a40176009b11ba02a5
SHA11bb7a72ee1054868d740157dfd392c65866683ec
SHA256f579c89d65dd2508a57cfe791122ba62286a95ed1a451abc4df1499585dfbd5e
SHA512ff408bdb9088b8e675df5130be8d58e461d3626d5e7a49edfcdbbbe5b9ea960a9fcb8d943cd5c45d77ed9b92fd189b45aec70d1f802d50b5818a47261ba8c6e1
-
Filesize
320KB
MD5fd9806b0289bef011b9bdb0980458969
SHA147850292907215b957cb13bc4aa61a5751fc9a5f
SHA256b72bf0b3d5ee3cfbd147d30f8ff83f05ac9f097a3c09886dba4fef7c569f8ce2
SHA512a2e30059e506e6f980b7d7d8fbf78bf564ef4c339d2ac4b0cfd542b645ca20054a66ae88cd8ae8e0dbeb122054343b3895b50fca4be353b3e78046e08094f2dc
-
Filesize
320KB
MD5f089fc70293468c6be6adc6a63250648
SHA135b241487471ec1901fc747724df0670b6101b22
SHA2567cf1244db70301a2a2a4233be9bab1fcbf09a55675896b06f4b3b7930ac047c4
SHA512264217bfb9f1b1106bd351c9502a33f6d5f8ad332ac9ab4115a022b276d417c10c579ab304f4c68b0083a441030835018114f49932a6568e1163b1d41df4a39d
-
Filesize
320KB
MD59376be6b8644bfcff0a89a3e7f804f32
SHA13517df4b7ca2c477265cb98c77784e9975c347c1
SHA256bfc28c905a3e34b54f9235543d07c9fe101bcd4811ecef384ff248d8057c4c7d
SHA5121ce5f4afc6dd0fbf169dca8069777d6d36be0f717de08d222ec3133e65446845cd1bf4b3c8e3b896b0b4a6b4f99c9356afd67c48f1a4033cf21b864ff6188b12
-
Filesize
320KB
MD58f44d347849f07d2940f59f73801c67d
SHA113bf0655ed71745e6012d70d3deacbe7781a0b55
SHA256202e8edf9ad2b153f9e1e542bb16746d43731e7ae34226b34b60bed8f58749fc
SHA51271d0ddd96097c1a79f0133ef0e7ec5211893e5dece631372609837932158214426174e627fa9015ef94c7d2b321aa0fde3944232ecc0315e4cf7bcc854d60683
-
Filesize
320KB
MD553ec217e632c6105184b7c92c2b70306
SHA13ec64bb9ad1ef3b249657d9a617be5570827d683
SHA256a90e47979160e0c177c202a136cb0498f07ef7e6ca818f4e7f3e476ed4143956
SHA512bc13d3aeade628b72b5980e39ec99475f97f09fe7e230fd0494c59c4633ef06883b11f025f07f33931563e98e75b4aab58de97d3193cde8b072d3d28438d2406
-
Filesize
320KB
MD52a0f82e522a5dfc0dd3912b38b795a20
SHA16c1d31b099b2934f9a89899cc813796f299c2864
SHA256309a07eed65f56256925b738af7edd0d3c7f73d9348f89093c227a1738c34b36
SHA5124028aa290698c79ef27bf5b5600699f98f1786efaee260786631529ffaa642e7c06fd2eb62fd03a8c41c7661419548f2b1aa1718d55dadc92702bc882056fb5a
-
Filesize
320KB
MD57707c76e17d0388e35d70af8ee6f5a64
SHA1dfb7b7ba5774931b88a3c82f63514f7f51df0732
SHA256e4d60625b0ebdf90ef9ed2f67fe0472d7d02fdb9f6596a946e8c8622f7c8d0de
SHA51262d8e16a4f745d8772c9f120e40cbdccb05af9cea1893060242a3e32107d78424f397f7918ff28c2e27a81302a128894802fb8a5164d87eedcf04808cea14602
-
Filesize
320KB
MD50680fd3c5be15a2852dfae73a356769f
SHA16506c5b5e32531526f7c8dfd903eb74c75ba72e4
SHA25680dfdceb4e5083d4c0d29883c49a004b19183b14090b53c63ca8c113fd120350
SHA5120097d42b0f09d870c5a283418a0d1168fcbd49c581260e608acf31fdb3ebf4c19c5cf7ceacfa29c611350de2c4eceb98fd98e10930d0df680bbca18123e7c517
-
Filesize
320KB
MD583f00ac07c3d0530e3446d2db8d64785
SHA173df4536f09321e988e510e9213cefbd7d2d945f
SHA256304d4cb5f150f4fea8b39fda11a5b4378cfa1671b3cb9a2f824c6b442aeb082b
SHA512f572f461f3e0c050c22e9b2ef9ce4b3c8b8400a40421305c764f6387b4b28cc2fea2ea559d6a0f7567d93efb7330e6bae733bbf94b23498ea1564a2b2678900e
-
Filesize
320KB
MD5d96ccbd23973f4b0c6bd677ed485e7c6
SHA1241f5a8fd863c2bfe387768ac528ff0de4cbeaff
SHA25654a8be722f58967baf7f25c9ab2884b8502276bf25cf475b73a56c5972567bb9
SHA5129582b8feee8e94ed1085c0cd29c49eab1850c59f66227a9b5c2d905ab2eda89416d96e1aff761fce9aeef9012d6bc02adc04693c708a85fc33aa79ffcc4543fb
-
Filesize
320KB
MD56cf0c4317026e2fdcf4cb2ec8fb912a8
SHA1ae6e02d9be2a0989d69e4f93ab85bdb0cbe4c2c4
SHA256f4fb7cd77c8cdc9ba0fbda2d8492b14b1da521c58b81f56e1e90c4fe73bc1ece
SHA5120d7a90776ed54684f67d4d19419bf68f267943a3a264bcc456c0e2451e5ebfae3f5c6b473f6b8d33a8e5421f8ab40f9ce1373efa89bcc0d40bd34b73fa106ca3
-
Filesize
320KB
MD5660e2df9cc3e317b253be1540da1b409
SHA1488d0959b2e896e236d12d8927510547bbec5661
SHA2569f0d6a07c1c070b5d86f5d97d9fed91f813d4ce5c1a41d6f5fb3086dfaa90aae
SHA512c7945c72a59528f05a27c813c47730b44e65bb0cc59a5785f2291b8e6c76abf614740f34c31de16335e936e4dbe7aeedc62df2682c4372357f96eef1e9b01868
-
Filesize
320KB
MD5806adcb8f7cc449b1527d653d93b0775
SHA1f8175198f0b36f5f7254878925e9e7f1976dbb83
SHA256c7eb8a07ab73b0642e0ab2b1f62bccc53d5b0f54d69a08594ea1d74690476ed2
SHA5123edb99544b02449d6564b5cd6d281874d6ecd70f91f5c2bc68bc7846d0f2e6de75169a86a9becc8e16d6953f790cccc8471c99dfcd0f1bb1397eeefa7e01f772
-
Filesize
320KB
MD59d14afa727b930e79906a5b3ed6c17f8
SHA1346db3bddaf0bf154a3e2d238c953d072d2353bf
SHA256e3c14219f73d67c909c6c1a9ac32416617ebaa0f4480c5246fd4f6e33004d2d5
SHA512fb57b155b0923659dfba474ee3a4e55fe3b408b930143ec2cb224ac9098ec1b6f781ac2110c9cc8ab3806f9dc4ae87a9f3397df706f94ba2aa74b6fc704e6247
-
Filesize
320KB
MD534d997bfe0014f06807bf890cfbde0e9
SHA15097274b40f8f15648a50fff040e3ffcf1906090
SHA256527af7bf8da1a7031c280e84ea7b5e4f70141d36885281780279bc6baaf990c0
SHA51225ed650136c539fa299da5f6cc073e992086a53c87276e57449e89b0dec74b59928d0b7df6f89c329d70ba782de6b60f6c36391a369d4d3fa4ae05683a12a1f8