Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
29-06-2024 21:33
Static task
static1
Behavioral task
behavioral1
Sample
56f396f3e136945b008442c240e5dac520b16e022dc099ca0617b8c9149ab258.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
56f396f3e136945b008442c240e5dac520b16e022dc099ca0617b8c9149ab258.exe
Resource
win10v2004-20240611-en
General
-
Target
56f396f3e136945b008442c240e5dac520b16e022dc099ca0617b8c9149ab258.exe
-
Size
115KB
-
MD5
f2a2ad507b3ee534b246ce9888c2e38d
-
SHA1
5af3bbcf2a0917390cb6375b0652e0f5c44326ed
-
SHA256
56f396f3e136945b008442c240e5dac520b16e022dc099ca0617b8c9149ab258
-
SHA512
98f4454f50f738efe0081718df876b5c00ff0021afba1b40a92703770a3c215380546ef4c50283f94e0ccbd02bb17958128fbcc6ab8dcf68bd3f21e643d13944
-
SSDEEP
3072:3KOW7k262jPf4cdezc6FW+qJxU4ddbrIR/SoQUP5u30KqTKr4:VWI262jPf4cduNFW3W4dhrIooQUPoDqz
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 58 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gogangdc.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hlcgeo32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hcplhi32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hlhaqogk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hogmmjfo.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Globlmmj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hcnpbi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hhjhkq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ioijbj32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hpmgqnfl.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Feeiob32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gogangdc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hicodd32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hejoiedd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hlcgeo32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ioijbj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" 56f396f3e136945b008442c240e5dac520b16e022dc099ca0617b8c9149ab258.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ghhofmql.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gaqcoc32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gacpdbej.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hcnpbi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gonnhhln.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hgbebiao.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hicodd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hpmgqnfl.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hiekid32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hjhhocjj.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gkihhhnm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gkkemh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hejoiedd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gaqcoc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ghhofmql.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Glaoalkh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hiekid32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hgbebiao.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gelppaof.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 56f396f3e136945b008442c240e5dac520b16e022dc099ca0617b8c9149ab258.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Idceea32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hogmmjfo.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hjhhocjj.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hahjpbad.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hhjhkq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hlhaqogk.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Idceea32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hahjpbad.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gangic32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gonnhhln.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gangic32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gelppaof.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hdfflm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hcplhi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Globlmmj.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Glaoalkh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gkihhhnm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gacpdbej.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Feeiob32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hdfflm32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gkkemh32.exe -
Executes dropped EXE 29 IoCs
pid Process 1724 Feeiob32.exe 1572 Globlmmj.exe 2920 Gonnhhln.exe 2796 Glaoalkh.exe 2724 Gangic32.exe 2552 Ghhofmql.exe 2472 Gaqcoc32.exe 2576 Gelppaof.exe 2824 Gkihhhnm.exe 1244 Gacpdbej.exe 1612 Gkkemh32.exe 1824 Gogangdc.exe 264 Hgbebiao.exe 272 Hahjpbad.exe 892 Hdfflm32.exe 2964 Hicodd32.exe 2812 Hpmgqnfl.exe 1944 Hejoiedd.exe 2852 Hiekid32.exe 1140 Hlcgeo32.exe 3056 Hcnpbi32.exe 1776 Hjhhocjj.exe 492 Hhjhkq32.exe 2120 Hcplhi32.exe 1760 Hlhaqogk.exe 2636 Hogmmjfo.exe 2764 Idceea32.exe 2600 Ioijbj32.exe 1620 Iagfoe32.exe -
Loads dropped DLL 62 IoCs
pid Process 2188 56f396f3e136945b008442c240e5dac520b16e022dc099ca0617b8c9149ab258.exe 2188 56f396f3e136945b008442c240e5dac520b16e022dc099ca0617b8c9149ab258.exe 1724 Feeiob32.exe 1724 Feeiob32.exe 1572 Globlmmj.exe 1572 Globlmmj.exe 2920 Gonnhhln.exe 2920 Gonnhhln.exe 2796 Glaoalkh.exe 2796 Glaoalkh.exe 2724 Gangic32.exe 2724 Gangic32.exe 2552 Ghhofmql.exe 2552 Ghhofmql.exe 2472 Gaqcoc32.exe 2472 Gaqcoc32.exe 2576 Gelppaof.exe 2576 Gelppaof.exe 2824 Gkihhhnm.exe 2824 Gkihhhnm.exe 1244 Gacpdbej.exe 1244 Gacpdbej.exe 1612 Gkkemh32.exe 1612 Gkkemh32.exe 1824 Gogangdc.exe 1824 Gogangdc.exe 264 Hgbebiao.exe 264 Hgbebiao.exe 272 Hahjpbad.exe 272 Hahjpbad.exe 892 Hdfflm32.exe 892 Hdfflm32.exe 2964 Hicodd32.exe 2964 Hicodd32.exe 2812 Hpmgqnfl.exe 2812 Hpmgqnfl.exe 1944 Hejoiedd.exe 1944 Hejoiedd.exe 2852 Hiekid32.exe 2852 Hiekid32.exe 1140 Hlcgeo32.exe 1140 Hlcgeo32.exe 3056 Hcnpbi32.exe 3056 Hcnpbi32.exe 1776 Hjhhocjj.exe 1776 Hjhhocjj.exe 492 Hhjhkq32.exe 492 Hhjhkq32.exe 2120 Hcplhi32.exe 2120 Hcplhi32.exe 1760 Hlhaqogk.exe 1760 Hlhaqogk.exe 2636 Hogmmjfo.exe 2636 Hogmmjfo.exe 2764 Idceea32.exe 2764 Idceea32.exe 2600 Ioijbj32.exe 2600 Ioijbj32.exe 1156 WerFault.exe 1156 WerFault.exe 1156 WerFault.exe 1156 WerFault.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Gonnhhln.exe Globlmmj.exe File created C:\Windows\SysWOW64\Glaoalkh.exe Gonnhhln.exe File created C:\Windows\SysWOW64\Phofkg32.dll Hahjpbad.exe File created C:\Windows\SysWOW64\Gjenmobn.dll Ioijbj32.exe File opened for modification C:\Windows\SysWOW64\Ghhofmql.exe Gangic32.exe File created C:\Windows\SysWOW64\Ahpjhc32.dll Gangic32.exe File created C:\Windows\SysWOW64\Elpbcapg.dll Gkihhhnm.exe File opened for modification C:\Windows\SysWOW64\Hcplhi32.exe Hhjhkq32.exe File created C:\Windows\SysWOW64\Lponfjoo.dll Hhjhkq32.exe File opened for modification C:\Windows\SysWOW64\Hlhaqogk.exe Hcplhi32.exe File created C:\Windows\SysWOW64\Kjnifgah.dll Hiekid32.exe File opened for modification C:\Windows\SysWOW64\Hhjhkq32.exe Hjhhocjj.exe File created C:\Windows\SysWOW64\Pnbgan32.dll Hcplhi32.exe File created C:\Windows\SysWOW64\Ioijbj32.exe Idceea32.exe File opened for modification C:\Windows\SysWOW64\Iagfoe32.exe Ioijbj32.exe File created C:\Windows\SysWOW64\Gonnhhln.exe Globlmmj.exe File opened for modification C:\Windows\SysWOW64\Hahjpbad.exe Hgbebiao.exe File created C:\Windows\SysWOW64\Hiekid32.exe Hejoiedd.exe File created C:\Windows\SysWOW64\Hcplhi32.exe Hhjhkq32.exe File created C:\Windows\SysWOW64\Hlhaqogk.exe Hcplhi32.exe File created C:\Windows\SysWOW64\Fndldonj.dll Ghhofmql.exe File opened for modification C:\Windows\SysWOW64\Gelppaof.exe Gaqcoc32.exe File opened for modification C:\Windows\SysWOW64\Hpmgqnfl.exe Hicodd32.exe File opened for modification C:\Windows\SysWOW64\Feeiob32.exe 56f396f3e136945b008442c240e5dac520b16e022dc099ca0617b8c9149ab258.exe File created C:\Windows\SysWOW64\Hpqpdnop.dll Feeiob32.exe File created C:\Windows\SysWOW64\Gaqcoc32.exe Ghhofmql.exe File created C:\Windows\SysWOW64\Pabakh32.dll Gaqcoc32.exe File created C:\Windows\SysWOW64\Hjhhocjj.exe Hcnpbi32.exe File created C:\Windows\SysWOW64\Idceea32.exe Hogmmjfo.exe File created C:\Windows\SysWOW64\Addnil32.dll Gonnhhln.exe File opened for modification C:\Windows\SysWOW64\Gaqcoc32.exe Ghhofmql.exe File created C:\Windows\SysWOW64\Kcaipkch.dll Gacpdbej.exe File created C:\Windows\SysWOW64\Hogmmjfo.exe Hlhaqogk.exe File opened for modification C:\Windows\SysWOW64\Ioijbj32.exe Idceea32.exe File created C:\Windows\SysWOW64\Iagfoe32.exe Ioijbj32.exe File created C:\Windows\SysWOW64\Ojhcelga.dll Hlhaqogk.exe File created C:\Windows\SysWOW64\Feeiob32.exe 56f396f3e136945b008442c240e5dac520b16e022dc099ca0617b8c9149ab258.exe File created C:\Windows\SysWOW64\Ghhofmql.exe Gangic32.exe File opened for modification C:\Windows\SysWOW64\Gogangdc.exe Gkkemh32.exe File created C:\Windows\SysWOW64\Hllopfgo.dll Gkkemh32.exe File opened for modification C:\Windows\SysWOW64\Hdfflm32.exe Hahjpbad.exe File opened for modification C:\Windows\SysWOW64\Hcnpbi32.exe Hlcgeo32.exe File created C:\Windows\SysWOW64\Globlmmj.exe Feeiob32.exe File created C:\Windows\SysWOW64\Hgpdcgoc.dll Hicodd32.exe File created C:\Windows\SysWOW64\Gangic32.exe Glaoalkh.exe File created C:\Windows\SysWOW64\Hdfflm32.exe Hahjpbad.exe File created C:\Windows\SysWOW64\Hlcgeo32.exe Hiekid32.exe File created C:\Windows\SysWOW64\Hhjhkq32.exe Hjhhocjj.exe File created C:\Windows\SysWOW64\Gelppaof.exe Gaqcoc32.exe File created C:\Windows\SysWOW64\Gacpdbej.exe Gkihhhnm.exe File opened for modification C:\Windows\SysWOW64\Hiekid32.exe Hejoiedd.exe File created C:\Windows\SysWOW64\Hcnpbi32.exe Hlcgeo32.exe File created C:\Windows\SysWOW64\Fenhecef.dll Hcnpbi32.exe File created C:\Windows\SysWOW64\Hojopmqk.dll Hjhhocjj.exe File opened for modification C:\Windows\SysWOW64\Glaoalkh.exe Gonnhhln.exe File created C:\Windows\SysWOW64\Mncnkh32.dll Glaoalkh.exe File created C:\Windows\SysWOW64\Gkihhhnm.exe Gelppaof.exe File opened for modification C:\Windows\SysWOW64\Gkihhhnm.exe Gelppaof.exe File created C:\Windows\SysWOW64\Gkkemh32.exe Gacpdbej.exe File created C:\Windows\SysWOW64\Hejoiedd.exe Hpmgqnfl.exe File created C:\Windows\SysWOW64\Khejeajg.dll Hlcgeo32.exe File opened for modification C:\Windows\SysWOW64\Globlmmj.exe Feeiob32.exe File created C:\Windows\SysWOW64\Oecbjjic.dll Globlmmj.exe File opened for modification C:\Windows\SysWOW64\Gacpdbej.exe Gkihhhnm.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1156 1620 WerFault.exe 56 -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hepmggig.dll" Hpmgqnfl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fenhecef.dll" Hcnpbi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hhjhkq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" 56f396f3e136945b008442c240e5dac520b16e022dc099ca0617b8c9149ab258.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gkihhhnm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gogangdc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hiekid32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pnbgan32.dll" Hcplhi32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gelppaof.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hpmgqnfl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gknfklng.dll" Hejoiedd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gkihhhnm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jjcpjl32.dll" Gogangdc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Njmekj32.dll" Hgbebiao.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hiekid32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hcplhi32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node 56f396f3e136945b008442c240e5dac520b16e022dc099ca0617b8c9149ab258.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID 56f396f3e136945b008442c240e5dac520b16e022dc099ca0617b8c9149ab258.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pabakh32.dll" Gaqcoc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Glaoalkh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ahpjhc32.dll" Gangic32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Idceea32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dgnijonn.dll" Idceea32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Addnil32.dll" Gonnhhln.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hicodd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hpmgqnfl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gogangdc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lponfjoo.dll" Hhjhkq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hogmmjfo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hcplhi32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} 56f396f3e136945b008442c240e5dac520b16e022dc099ca0617b8c9149ab258.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hicodd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hlcgeo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kjnifgah.dll" Hiekid32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hjhhocjj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hogmmjfo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ioijbj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 56f396f3e136945b008442c240e5dac520b16e022dc099ca0617b8c9149ab258.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gonnhhln.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hgbebiao.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hlhaqogk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gaqcoc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hgpdcgoc.dll" Hicodd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hhjhkq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Phofkg32.dll" Hahjpbad.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hcnpbi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Idceea32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Globlmmj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ahcocb32.dll" Gelppaof.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hahjpbad.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fndldonj.dll" Ghhofmql.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gelppaof.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hcnpbi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ojhcelga.dll" Hlhaqogk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ioijbj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kifjcn32.dll" 56f396f3e136945b008442c240e5dac520b16e022dc099ca0617b8c9149ab258.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oecbjjic.dll" Globlmmj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gonnhhln.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hkkmeglp.dll" Hdfflm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hdfflm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hejoiedd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Khejeajg.dll" Hlcgeo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hjhhocjj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Globlmmj.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2188 wrote to memory of 1724 2188 56f396f3e136945b008442c240e5dac520b16e022dc099ca0617b8c9149ab258.exe 28 PID 2188 wrote to memory of 1724 2188 56f396f3e136945b008442c240e5dac520b16e022dc099ca0617b8c9149ab258.exe 28 PID 2188 wrote to memory of 1724 2188 56f396f3e136945b008442c240e5dac520b16e022dc099ca0617b8c9149ab258.exe 28 PID 2188 wrote to memory of 1724 2188 56f396f3e136945b008442c240e5dac520b16e022dc099ca0617b8c9149ab258.exe 28 PID 1724 wrote to memory of 1572 1724 Feeiob32.exe 29 PID 1724 wrote to memory of 1572 1724 Feeiob32.exe 29 PID 1724 wrote to memory of 1572 1724 Feeiob32.exe 29 PID 1724 wrote to memory of 1572 1724 Feeiob32.exe 29 PID 1572 wrote to memory of 2920 1572 Globlmmj.exe 30 PID 1572 wrote to memory of 2920 1572 Globlmmj.exe 30 PID 1572 wrote to memory of 2920 1572 Globlmmj.exe 30 PID 1572 wrote to memory of 2920 1572 Globlmmj.exe 30 PID 2920 wrote to memory of 2796 2920 Gonnhhln.exe 31 PID 2920 wrote to memory of 2796 2920 Gonnhhln.exe 31 PID 2920 wrote to memory of 2796 2920 Gonnhhln.exe 31 PID 2920 wrote to memory of 2796 2920 Gonnhhln.exe 31 PID 2796 wrote to memory of 2724 2796 Glaoalkh.exe 32 PID 2796 wrote to memory of 2724 2796 Glaoalkh.exe 32 PID 2796 wrote to memory of 2724 2796 Glaoalkh.exe 32 PID 2796 wrote to memory of 2724 2796 Glaoalkh.exe 32 PID 2724 wrote to memory of 2552 2724 Gangic32.exe 33 PID 2724 wrote to memory of 2552 2724 Gangic32.exe 33 PID 2724 wrote to memory of 2552 2724 Gangic32.exe 33 PID 2724 wrote to memory of 2552 2724 Gangic32.exe 33 PID 2552 wrote to memory of 2472 2552 Ghhofmql.exe 34 PID 2552 wrote to memory of 2472 2552 Ghhofmql.exe 34 PID 2552 wrote to memory of 2472 2552 Ghhofmql.exe 34 PID 2552 wrote to memory of 2472 2552 Ghhofmql.exe 34 PID 2472 wrote to memory of 2576 2472 Gaqcoc32.exe 35 PID 2472 wrote to memory of 2576 2472 Gaqcoc32.exe 35 PID 2472 wrote to memory of 2576 2472 Gaqcoc32.exe 35 PID 2472 wrote to memory of 2576 2472 Gaqcoc32.exe 35 PID 2576 wrote to memory of 2824 2576 Gelppaof.exe 36 PID 2576 wrote to memory of 2824 2576 Gelppaof.exe 36 PID 2576 wrote to memory of 2824 2576 Gelppaof.exe 36 PID 2576 wrote to memory of 2824 2576 Gelppaof.exe 36 PID 2824 wrote to memory of 1244 2824 Gkihhhnm.exe 37 PID 2824 wrote to memory of 1244 2824 Gkihhhnm.exe 37 PID 2824 wrote to memory of 1244 2824 Gkihhhnm.exe 37 PID 2824 wrote to memory of 1244 2824 Gkihhhnm.exe 37 PID 1244 wrote to memory of 1612 1244 Gacpdbej.exe 38 PID 1244 wrote to memory of 1612 1244 Gacpdbej.exe 38 PID 1244 wrote to memory of 1612 1244 Gacpdbej.exe 38 PID 1244 wrote to memory of 1612 1244 Gacpdbej.exe 38 PID 1612 wrote to memory of 1824 1612 Gkkemh32.exe 39 PID 1612 wrote to memory of 1824 1612 Gkkemh32.exe 39 PID 1612 wrote to memory of 1824 1612 Gkkemh32.exe 39 PID 1612 wrote to memory of 1824 1612 Gkkemh32.exe 39 PID 1824 wrote to memory of 264 1824 Gogangdc.exe 40 PID 1824 wrote to memory of 264 1824 Gogangdc.exe 40 PID 1824 wrote to memory of 264 1824 Gogangdc.exe 40 PID 1824 wrote to memory of 264 1824 Gogangdc.exe 40 PID 264 wrote to memory of 272 264 Hgbebiao.exe 41 PID 264 wrote to memory of 272 264 Hgbebiao.exe 41 PID 264 wrote to memory of 272 264 Hgbebiao.exe 41 PID 264 wrote to memory of 272 264 Hgbebiao.exe 41 PID 272 wrote to memory of 892 272 Hahjpbad.exe 42 PID 272 wrote to memory of 892 272 Hahjpbad.exe 42 PID 272 wrote to memory of 892 272 Hahjpbad.exe 42 PID 272 wrote to memory of 892 272 Hahjpbad.exe 42 PID 892 wrote to memory of 2964 892 Hdfflm32.exe 43 PID 892 wrote to memory of 2964 892 Hdfflm32.exe 43 PID 892 wrote to memory of 2964 892 Hdfflm32.exe 43 PID 892 wrote to memory of 2964 892 Hdfflm32.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\56f396f3e136945b008442c240e5dac520b16e022dc099ca0617b8c9149ab258.exe"C:\Users\Admin\AppData\Local\Temp\56f396f3e136945b008442c240e5dac520b16e022dc099ca0617b8c9149ab258.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\SysWOW64\Feeiob32.exeC:\Windows\system32\Feeiob32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\SysWOW64\Globlmmj.exeC:\Windows\system32\Globlmmj.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Windows\SysWOW64\Gonnhhln.exeC:\Windows\system32\Gonnhhln.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Windows\SysWOW64\Glaoalkh.exeC:\Windows\system32\Glaoalkh.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\SysWOW64\Gangic32.exeC:\Windows\system32\Gangic32.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\SysWOW64\Ghhofmql.exeC:\Windows\system32\Ghhofmql.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\SysWOW64\Gaqcoc32.exeC:\Windows\system32\Gaqcoc32.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Windows\SysWOW64\Gelppaof.exeC:\Windows\system32\Gelppaof.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Windows\SysWOW64\Gkihhhnm.exeC:\Windows\system32\Gkihhhnm.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\SysWOW64\Gacpdbej.exeC:\Windows\system32\Gacpdbej.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Windows\SysWOW64\Gkkemh32.exeC:\Windows\system32\Gkkemh32.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Windows\SysWOW64\Gogangdc.exeC:\Windows\system32\Gogangdc.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Windows\SysWOW64\Hgbebiao.exeC:\Windows\system32\Hgbebiao.exe14⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:264 -
C:\Windows\SysWOW64\Hahjpbad.exeC:\Windows\system32\Hahjpbad.exe15⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:272 -
C:\Windows\SysWOW64\Hdfflm32.exeC:\Windows\system32\Hdfflm32.exe16⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:892 -
C:\Windows\SysWOW64\Hicodd32.exeC:\Windows\system32\Hicodd32.exe17⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:2964 -
C:\Windows\SysWOW64\Hpmgqnfl.exeC:\Windows\system32\Hpmgqnfl.exe18⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:2812 -
C:\Windows\SysWOW64\Hejoiedd.exeC:\Windows\system32\Hejoiedd.exe19⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:1944 -
C:\Windows\SysWOW64\Hiekid32.exeC:\Windows\system32\Hiekid32.exe20⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:2852 -
C:\Windows\SysWOW64\Hlcgeo32.exeC:\Windows\system32\Hlcgeo32.exe21⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:1140 -
C:\Windows\SysWOW64\Hcnpbi32.exeC:\Windows\system32\Hcnpbi32.exe22⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:3056 -
C:\Windows\SysWOW64\Hjhhocjj.exeC:\Windows\system32\Hjhhocjj.exe23⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:1776 -
C:\Windows\SysWOW64\Hhjhkq32.exeC:\Windows\system32\Hhjhkq32.exe24⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:492 -
C:\Windows\SysWOW64\Hcplhi32.exeC:\Windows\system32\Hcplhi32.exe25⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:2120 -
C:\Windows\SysWOW64\Hlhaqogk.exeC:\Windows\system32\Hlhaqogk.exe26⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:1760 -
C:\Windows\SysWOW64\Hogmmjfo.exeC:\Windows\system32\Hogmmjfo.exe27⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:2636 -
C:\Windows\SysWOW64\Idceea32.exeC:\Windows\system32\Idceea32.exe28⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:2764 -
C:\Windows\SysWOW64\Ioijbj32.exeC:\Windows\system32\Ioijbj32.exe29⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:2600 -
C:\Windows\SysWOW64\Iagfoe32.exeC:\Windows\system32\Iagfoe32.exe30⤵
- Executes dropped EXE
PID:1620 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1620 -s 14031⤵
- Loads dropped DLL
- Program crash
PID:1156
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
115KB
MD55975795bd6f51f184df4b82a624a0260
SHA183847680a2ef494bc9dc7b229f2a38319f58ad2c
SHA2563729487ec45c396bc419018ef569b8fafc452394b879f8e89640b0a44a77e010
SHA5124e4a8cd7c4133aa05e370088ca76d1b8cc6668563cea1bc5b4bc5ff96c242b4ef7af390619a73cbc218b9d6edf42e7f9889d45a93ba944611c9cfcb542a5b3b0
-
Filesize
115KB
MD56aad652a7442103fc49b48c2a50e8d90
SHA121c52e915389ff6257932bf70b8a6f05d69d3984
SHA2562aed0226052e4cdea171f2841a83c652d6ffc18366e37d04770990d6efae4d4d
SHA512a42927a4f1b6fbb06998b002960da9464cea6824d3121b9db0fae0249ccfd14f1a91fd3985464422ee5133ad90d39bf4a045dc6e1e1796bd60d291c5298c49ec
-
Filesize
115KB
MD59e35745d8188146a8fd45070be0324e4
SHA110bbc19f0425c9ec8af088a3f4d6f4175d866d11
SHA256281e69b1b4289fd9ef75bc00985d09889f0005d7f15c95b77356041b3ee6ae37
SHA512544d4a255f15b6a2c0f0398109b57368b12ab2b4f6e1acb867ddf44868b8e641804b32a654de7c10c5a3634e27e6fc6c576fdaa1f15d0c4a9ace5f56ef1d6bfc
-
Filesize
115KB
MD5962e14e1a138d0cc5564908d0bdc7232
SHA1db166bd79349b1f62c9edda9ab82032c55cff64f
SHA256bc51eb4400c87c4a77388e9af9efb8c9ecb1e73ff5878fed2e96270d71015c79
SHA512ef42014caec84c51f879b47dd4badecbd46ddaefc8eebceb38e3dd3cc7bb2f4d9a1320e77deb60eb0653010cb57edbd7f314995c712b91addc12e302c9b320ce
-
Filesize
115KB
MD58e48a714cc253246907da6d6fc77bad6
SHA1feb56d49c81ca91d81bb2dc02680c815d3a75dd0
SHA256bf86b5ed100909cbcb6d0676474c9ad0a643373fc49d05463bc8769334ec96cc
SHA5128d971b2d1ff57b2202c27be52ad853566bed0f68c86c3fca3991335bc65e123510cf07e03a4c6cd6503038f49a7e98c8e9a2f92da426a9fc6741db0cb8628c39
-
Filesize
115KB
MD5268fdde36286f4b2a1ba34c096b61ada
SHA16ab8c6ddc0d8632916bd9ecdcd56c9f4550aff68
SHA25667ae2c75591876994de75babe669374eff3cf2351ee9de3ce2839913b0564e3b
SHA51275fa642814fb7f0582ea4a71f43a0330005b8b9c498ab5fa35b9a6ba3b29712617233a4713483c76f9e8c0a69f9e91f50d012202a49138f42c59d4213016b794
-
Filesize
115KB
MD5fe43799e31e470acf62fd5ac6550165b
SHA1419b4306dce648703f895c0e40e855f41eacf76a
SHA256f0628b297577ed70fd2a8340b6c5c1513f945ab7b72e1e5a857a0cd0c581a138
SHA512cc9a7cac8b9cc8184d4a25b98945d48c4a3db02861b0ffcc4858121f9489a97a62821d137c65a64fc25db3bf6a29aa52a5d207a065f8d5bb23b486284b1a5c9b
-
Filesize
115KB
MD55426a16b3d67b0e9ade513dc4b8a7b5f
SHA1e3cc49d1d36fc4b0e1da7de3365bbc1068fe025d
SHA256543e2cce48366534909e2ebb0edddf1cc36d5c7636196a388aac35d47744f2b3
SHA51282c1b92e318772671155f13610b8addbb8321f10b94135b77f7acf85e6e39afc1c906a8148178f42ed2a4b755233dcb5996da9597fdb9f86e02f30b1cd6f4df8
-
Filesize
115KB
MD5b9d1d2582163248de85b794ba1389bdf
SHA1d82cd8c57ba116a8ec588d0ca1ddc879d9df2399
SHA2561e04e9aae99497f50f5be135efc4d7b9e2c43f156e9235beee46a070d13c7406
SHA512bf5898a6bca5a71ea2b2bee7098d4496ff4e30c160af0a6fcbf05a7eae25d9eb74655af6230b7cc5c540b2efb0c53cacb6f68e995f8a58b4f3ac41205c7eb967
-
Filesize
115KB
MD52023601aac865b3471b300fff5193b84
SHA1c3959affadac36f72ce153a089ffe04994cfae62
SHA25657549aaecd358816b1ff5a30a02baee10aa59be030c9fccc1e728b0953b397ce
SHA51224c1f148f2410f19672db8a63ae5a570cf57cf00bb9d72da354411e1d97df036ac9578bf2bf18ff053bd5893de26899c749b36e451f85c88d34c538eecda244c
-
Filesize
115KB
MD57a31f2d5d613b5fa66b09f1eebaf7835
SHA11b7ea1461864733fb53fcde0c3e3e1296eedf707
SHA256dc78bb3efc53b8b430161cfe5d99d332ac556d69849dfab4832890386232bff2
SHA512912d06d801d27a19c993aa7e06be60d3e0274e40e7df5d5a29a785bb83305f38a0dd98ecc2da0a7660c0408631b87e62badb248ac5f9c588b16d453c69881902
-
Filesize
115KB
MD57845a0cc0f8071b9fdc524c8d30eb398
SHA1bedb062fd5157ac1e2e1dc5bef9356da80853c4e
SHA256a470de96ba3290c869aac6b63d64a7f0934430136633d19f14490392c9406aa3
SHA51210ceafdb41c3e956c3105a3b12b535d41bacb68803a0c48b889832714e1d3d770b4f14c25a16666e674121de1723e06c460c069c596e92450b64245bb3aacfed
-
Filesize
115KB
MD52be8cf1a01541422248098a5d4e395fa
SHA18bff456aeea27ff89692a0327fe2de59edd4f4fa
SHA256f861b7044053aed3a7b6a361b966d1a2f3756a24525d0141665f22024aeeb8b1
SHA5123009aca9b607a64e73056cb8fe28f55bb958483204ce126088eb0437c3c8b926dc4b4ce65a3cce4ce0ac860f5031af1e3c78ff9f00d13ea6efb104a346f988d7
-
Filesize
115KB
MD5529891c14f2aa4bf51285ebcf155df57
SHA1b1599fb3001bfe9f5e7e1d824022a18fe9dfd0fd
SHA256920567176b752bb2854cc12d849b38c206994e6c0fcca34601a5aaac89dfea70
SHA5121b982eb143baedc15b8e80c4f7080d61f14c545b7f9083d6fa2eac7402b3a32f7e413c2553f3e2354ac16c7c0f6344ec82bb1ba142e56972774f71b1f6a5ad20
-
Filesize
115KB
MD5612c4014b5629413e68900d7f510c932
SHA1b62a0b86e30f3a0bf22f9443bfafd3190af4de5a
SHA256780791d6f04584832ae7897b1304874a3b29c2a6c8169ec35b5d6f4b72a150cb
SHA5121ebb817be1529f11df7018bd46807ccb620a733f2d38858dfcdee2b5e091d5de9d2c1a55b18e3e66ceff4d89959653fcf40f005a2cb08aafeab54474e55b4866
-
Filesize
115KB
MD532deb3efe5fb38cccedaa1f7bcebf493
SHA145e24782e89e738819c152df6e282d98981022f2
SHA2561726886834719b995d6fda270de68170552a81cd5b65e288f719203cadef5a5f
SHA5127496121db1d6d531b99cdd5f03650cdf8b0177606af3be1c29d048a1a78ba2728a344d163962cd82d1b1e174583ae1105e195f99a072e73d71f001274a27679a
-
Filesize
115KB
MD5571433e1a88a63675a3f091ba3c72c3f
SHA1ea7c2dd4266c31c32ba34eb5729061690f10ef23
SHA256519f90eaef4646a2a9915fc555bac4467c7f6ad9aa4290a9e00509753655b2d7
SHA512b9d870f1c00475579ac5ffebb4ed4dd2753b23dd824724cf5cb028a8b90c76c2877a2cf95a9cd5ac9876d6e9a973b4c7b4ab2440946da908a6955cc2c4612458
-
Filesize
115KB
MD5128c4c6c44be8ab6995a8ed30b57646f
SHA11a32c01425cca31adbd82754535836ca94e8c0be
SHA2563e3e075bcc9a5db26020df77eefd3dc4ed43911f338f6aea3ef56070484e9901
SHA5129f313b68f1afc32361aca2342613588b91de629c72ead6ebbbcfda4e4703c2e61a3a9b11f7fbd0f56900524c3ba45fe066da274fb0d04be0258bfef34b7524af
-
Filesize
115KB
MD508a40cc45047603aaa06fdd081b47d55
SHA12f4fa44680ef4d2aef158215d7d0be932fb0f160
SHA2560e26384dd7dc85e457b6213844a49d21a530fb37655326c8d7a9551cc5da99b5
SHA51241baebc2c8bb324b06acced12b7ac6946c5d65a6bdf0be92ad008f33ab3698e4102ff2a9cc587bf9429d9523e6852dac10be8b293503a49abae4ec380850976d
-
Filesize
115KB
MD5e17588da634838520cb11c243576a3fd
SHA185293516076b456b4ec0289d58e5f42c882d64a1
SHA256652d3fc661f16eda16bf2f54c55f78b86f5dc6dcde4ebe21670525e3985fe73d
SHA512634cf7be116ec6cc59fe080bcc3ded36a6e9c373f1b7d56abbf361a17249055fb150e8986a4c0441104d6037cfe7a994d4f30144f52bf084aea5781d122109a6
-
Filesize
115KB
MD5aaad2b142023dbf762882766a3aa0ca8
SHA19ed754664b3ae8abfec3f0f9a5990f3de6cc4389
SHA25606cbdd1363f1b8bef774f47f9f04f449f6b1d7cc2ab4ef673854fddb6b9ef967
SHA512b2693f21229591b8c270fa344f4047da1a5454a48935e61bef96203c3d659fa00994ddde273dd0bf193b5f89bb4ef4cc65f23e57ce3a046f7058643db7edfc1b
-
Filesize
115KB
MD5226733d2d6b4ee7c7be9eb58796cbeab
SHA1e1361b11a1ad9c58e7d383d952f26d4ebba41a38
SHA256eb1b15b4b9c258d9df7dba2bfdbb8fefc57188bd40a75a566135f5478d166a97
SHA512592deba6a3c518a9d68d10ad618f1479b64397005545113b6454c6dc99732ed6dcbfed935dada029787076b150f21ddfe03b87c514ab7afcf162ef9804f7639c
-
Filesize
115KB
MD5e9482ab0009a3fd8410c072d104ebc08
SHA12a218223645689a0dab4942f82c9f0c76d06f1ae
SHA256002324857a79c027cd411c8da947b92991e28025906435ec1c59846c8280e039
SHA512e77193b941d53c964764cd3d6a6138aa6da678fc3b38a58202d0877c06b3d5cc990e56fbba0b60d08cb1e68c38c20ebeb629bbdcf1172d3e63aabd446273ef71
-
Filesize
115KB
MD545c1a6fbc38b63770073c9a90cc92d23
SHA1a3443dccfe5c694cd9db1910b20311d4087bedd4
SHA256362eaae6d9cf0d9c2b54c08cc57a877eabfa256bc70e66491c0b0f56cfe2e2d3
SHA512364be14a2993fe26c806c208b48a960d259c7488ea46ae454ce927ef58d4f63b2f2d6e546fb116cf4b762f14ae03798e00419bcc4d18a1047b1ca658cd360251
-
Filesize
115KB
MD59af99f010df7f28a2f8ec223e4e1d4e7
SHA15bf37066e8852dae29cd6bb04a69906b093379aa
SHA2560214fc188a91de6ffb1b9b3d2d3b97adcdd7636f17d50090725de277565747aa
SHA51278f060e8e8819d41463caf07a8238b0042856e5bc0b2eeaeb9f0719cf7510b7aa9ac97149671eff7e3ddaafaab0e2307867784613219a0373e9496d47617e28e
-
Filesize
115KB
MD545c3c19a1fbbf22ee3cbf3c3731e8593
SHA15aff6461f68689fe3f9d949d35cb40de033e7bce
SHA256f0fb28cfd91486ab30e7ae39dfcc34a46cca06b681f1b244c4d9f02a11ef8259
SHA5125b98346416b587c060f93dc82cd7f6eba00925b33c3b89ec6b69694d5cd8c5f08752e4dd8bdb71116866195ff4dcf1b1538ef7340d3f7029b81fdd640822b0fa
-
Filesize
115KB
MD5bff7bf2aebc04be55f08858161645019
SHA1af48257673fee6c3097e681326cb0a9791c605af
SHA256f2afb4fc9bf8a9ecaaad8bc4b998f9890f1cddbf795c2f760c437d6d84a7b4b8
SHA512d44676dcbcb182e6fa5f375cea7a54489d3028f83a4a3228b9d092449c8ec5384482904f9aa32a2751045e39c290af142cdd61db6e3a10f79a4619c8220b0ce5
-
Filesize
115KB
MD5a653131906c32a70109472a545fe06b1
SHA1288ff8ec7b55adad623727da44fae7f191ef2c06
SHA2566933f4efb6006760f91ca751ce02eef6ed4b8eb5d86af83b87c1ee9fcd36d8e7
SHA512e43dfe3d93712eb70be77315319ae246ebaff3e8dc0a53bf785874014e4d7f0b75bc9d7372207c50630407497dca78d5f509966dbeffee51b1e532ff74438a75
-
Filesize
115KB
MD5057b5361c4679cd42a1496765eb36c58
SHA1fe65b6eff342e531bbf4ebd3b4f5145b01f958d5
SHA256e60f9b71cec13d76c8f6d0807e0cd3776d29bb4d2751344ae0a5aee277803771
SHA512844b93f6c1c0361e6901ac43ad50c796e80a3a2f574c8e121d392618583749c88b5b6725286b705cd0d47fdf5d92dffe2a6b5218aeac6f14d82b81b27fb40b02