Analysis
-
max time kernel
8s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
01-07-2024 00:51
Static task
static1
Behavioral task
behavioral1
Sample
287ad1a2e0b0ed9a83fc1ad0baa2da179cf3ad553824899dfbe732f2a3fc93f1_NeikiAnalytics.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
287ad1a2e0b0ed9a83fc1ad0baa2da179cf3ad553824899dfbe732f2a3fc93f1_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
General
-
Target
287ad1a2e0b0ed9a83fc1ad0baa2da179cf3ad553824899dfbe732f2a3fc93f1_NeikiAnalytics.exe
-
Size
443KB
-
MD5
0dd6093915aaa19cfc3a06a743438860
-
SHA1
c9b41ba540b87b90923cdfa95b39e60df21d256d
-
SHA256
287ad1a2e0b0ed9a83fc1ad0baa2da179cf3ad553824899dfbe732f2a3fc93f1
-
SHA512
bf840f0efb6582785b87b004d93322712a0b338c0e8c1559e6e137c1ec6009b6498cb04408d09afeaedad4a9a6a8a9d411731d34d948c52a5a28b08493f87dc0
-
SSDEEP
6144:ITS2bpAlLK7zeXmRL13n4GAI13n4GAvs0PEpNF0pNO021fv13n4GA3uKjwszeXmP:B2+lS1J1HJ1Uj+HiPj
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 22 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kgflcifg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" 287ad1a2e0b0ed9a83fc1ad0baa2da179cf3ad553824899dfbe732f2a3fc93f1_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fechomko.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gbchdp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Glkmmefl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hmdlmg32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ibhkfm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ibhkfm32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 287ad1a2e0b0ed9a83fc1ad0baa2da179cf3ad553824899dfbe732f2a3fc93f1_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gbchdp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Klhnfo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Eifaim32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kgflcifg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Joahqn32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eifaim32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fechomko.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fiaael32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fiaael32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Glkmmefl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hmdlmg32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Joahqn32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Klhnfo32.exe -
Executes dropped EXE 11 IoCs
pid Process 2076 Eifaim32.exe 2680 Fechomko.exe 2500 Fiaael32.exe 2440 Gbchdp32.exe 1356 Glkmmefl.exe 1576 Hmdlmg32.exe 1596 Ibhkfm32.exe 372 Joahqn32.exe 2632 Kgflcifg.exe 2888 Klhnfo32.exe 2176 Lfbped32.exe -
Drops file in System32 directory 33 IoCs
description ioc Process File created C:\Windows\SysWOW64\Kgflcifg.exe Joahqn32.exe File created C:\Windows\SysWOW64\Lfbped32.exe Klhnfo32.exe File created C:\Windows\SysWOW64\Lfmmaj32.dll Gbchdp32.exe File created C:\Windows\SysWOW64\Gmhgag32.dll Glkmmefl.exe File opened for modification C:\Windows\SysWOW64\Joahqn32.exe Ibhkfm32.exe File created C:\Windows\SysWOW64\Dmcnoekk.dll Ibhkfm32.exe File created C:\Windows\SysWOW64\Jbhfhgch.dll Kgflcifg.exe File opened for modification C:\Windows\SysWOW64\Eifaim32.exe 287ad1a2e0b0ed9a83fc1ad0baa2da179cf3ad553824899dfbe732f2a3fc93f1_NeikiAnalytics.exe File created C:\Windows\SysWOW64\Gbchdp32.exe Fiaael32.exe File created C:\Windows\SysWOW64\Glkmmefl.exe Gbchdp32.exe File opened for modification C:\Windows\SysWOW64\Ibhkfm32.exe Hmdlmg32.exe File created C:\Windows\SysWOW64\Fiaael32.exe Fechomko.exe File opened for modification C:\Windows\SysWOW64\Gbchdp32.exe Fiaael32.exe File opened for modification C:\Windows\SysWOW64\Klhnfo32.exe Kgflcifg.exe File created C:\Windows\SysWOW64\Ipgijcij.dll Klhnfo32.exe File created C:\Windows\SysWOW64\Eifaim32.exe 287ad1a2e0b0ed9a83fc1ad0baa2da179cf3ad553824899dfbe732f2a3fc93f1_NeikiAnalytics.exe File created C:\Windows\SysWOW64\Nlnhqepf.dll 287ad1a2e0b0ed9a83fc1ad0baa2da179cf3ad553824899dfbe732f2a3fc93f1_NeikiAnalytics.exe File created C:\Windows\SysWOW64\Linhgilm.dll Eifaim32.exe File opened for modification C:\Windows\SysWOW64\Glkmmefl.exe Gbchdp32.exe File created C:\Windows\SysWOW64\Mlelal32.dll Hmdlmg32.exe File created C:\Windows\SysWOW64\Klhnfo32.exe Kgflcifg.exe File created C:\Windows\SysWOW64\Hmdlmg32.exe Glkmmefl.exe File created C:\Windows\SysWOW64\Ibhkfm32.exe Hmdlmg32.exe File created C:\Windows\SysWOW64\Kffonkgk.dll Joahqn32.exe File opened for modification C:\Windows\SysWOW64\Lfbped32.exe Klhnfo32.exe File opened for modification C:\Windows\SysWOW64\Fechomko.exe Eifaim32.exe File opened for modification C:\Windows\SysWOW64\Fiaael32.exe Fechomko.exe File opened for modification C:\Windows\SysWOW64\Hmdlmg32.exe Glkmmefl.exe File opened for modification C:\Windows\SysWOW64\Kgflcifg.exe Joahqn32.exe File created C:\Windows\SysWOW64\Fechomko.exe Eifaim32.exe File created C:\Windows\SysWOW64\Konidd32.dll Fechomko.exe File created C:\Windows\SysWOW64\Ndoell32.dll Fiaael32.exe File created C:\Windows\SysWOW64\Joahqn32.exe Ibhkfm32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2012 4932 WerFault.exe 130 -
Modifies registry class 36 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gbchdp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kgflcifg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fiaael32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kffonkgk.dll" Joahqn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Klhnfo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lfmmaj32.dll" Gbchdp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mlelal32.dll" Hmdlmg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kgflcifg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ipgijcij.dll" Klhnfo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" 287ad1a2e0b0ed9a83fc1ad0baa2da179cf3ad553824899dfbe732f2a3fc93f1_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Eifaim32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fechomko.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fiaael32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Klhnfo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} 287ad1a2e0b0ed9a83fc1ad0baa2da179cf3ad553824899dfbe732f2a3fc93f1_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Glkmmefl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Joahqn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nlnhqepf.dll" 287ad1a2e0b0ed9a83fc1ad0baa2da179cf3ad553824899dfbe732f2a3fc93f1_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ndoell32.dll" Fiaael32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 287ad1a2e0b0ed9a83fc1ad0baa2da179cf3ad553824899dfbe732f2a3fc93f1_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node 287ad1a2e0b0ed9a83fc1ad0baa2da179cf3ad553824899dfbe732f2a3fc93f1_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gbchdp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jbhfhgch.dll" Kgflcifg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Glkmmefl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hmdlmg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dmcnoekk.dll" Ibhkfm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID 287ad1a2e0b0ed9a83fc1ad0baa2da179cf3ad553824899dfbe732f2a3fc93f1_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Eifaim32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Linhgilm.dll" Eifaim32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fechomko.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ibhkfm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Joahqn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Konidd32.dll" Fechomko.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gmhgag32.dll" Glkmmefl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hmdlmg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ibhkfm32.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 4296 wrote to memory of 2076 4296 287ad1a2e0b0ed9a83fc1ad0baa2da179cf3ad553824899dfbe732f2a3fc93f1_NeikiAnalytics.exe 91 PID 4296 wrote to memory of 2076 4296 287ad1a2e0b0ed9a83fc1ad0baa2da179cf3ad553824899dfbe732f2a3fc93f1_NeikiAnalytics.exe 91 PID 4296 wrote to memory of 2076 4296 287ad1a2e0b0ed9a83fc1ad0baa2da179cf3ad553824899dfbe732f2a3fc93f1_NeikiAnalytics.exe 91 PID 2076 wrote to memory of 2680 2076 Eifaim32.exe 92 PID 2076 wrote to memory of 2680 2076 Eifaim32.exe 92 PID 2076 wrote to memory of 2680 2076 Eifaim32.exe 92 PID 2680 wrote to memory of 2500 2680 Fechomko.exe 93 PID 2680 wrote to memory of 2500 2680 Fechomko.exe 93 PID 2680 wrote to memory of 2500 2680 Fechomko.exe 93 PID 2500 wrote to memory of 2440 2500 Fiaael32.exe 94 PID 2500 wrote to memory of 2440 2500 Fiaael32.exe 94 PID 2500 wrote to memory of 2440 2500 Fiaael32.exe 94 PID 2440 wrote to memory of 1356 2440 Gbchdp32.exe 95 PID 2440 wrote to memory of 1356 2440 Gbchdp32.exe 95 PID 2440 wrote to memory of 1356 2440 Gbchdp32.exe 95 PID 1356 wrote to memory of 1576 1356 Glkmmefl.exe 96 PID 1356 wrote to memory of 1576 1356 Glkmmefl.exe 96 PID 1356 wrote to memory of 1576 1356 Glkmmefl.exe 96 PID 1576 wrote to memory of 1596 1576 Hmdlmg32.exe 97 PID 1576 wrote to memory of 1596 1576 Hmdlmg32.exe 97 PID 1576 wrote to memory of 1596 1576 Hmdlmg32.exe 97 PID 1596 wrote to memory of 372 1596 Ibhkfm32.exe 98 PID 1596 wrote to memory of 372 1596 Ibhkfm32.exe 98 PID 1596 wrote to memory of 372 1596 Ibhkfm32.exe 98 PID 372 wrote to memory of 2632 372 Joahqn32.exe 99 PID 372 wrote to memory of 2632 372 Joahqn32.exe 99 PID 372 wrote to memory of 2632 372 Joahqn32.exe 99 PID 2632 wrote to memory of 2888 2632 Kgflcifg.exe 100 PID 2632 wrote to memory of 2888 2632 Kgflcifg.exe 100 PID 2632 wrote to memory of 2888 2632 Kgflcifg.exe 100 PID 2888 wrote to memory of 2176 2888 Klhnfo32.exe 101 PID 2888 wrote to memory of 2176 2888 Klhnfo32.exe 101 PID 2888 wrote to memory of 2176 2888 Klhnfo32.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\287ad1a2e0b0ed9a83fc1ad0baa2da179cf3ad553824899dfbe732f2a3fc93f1_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\287ad1a2e0b0ed9a83fc1ad0baa2da179cf3ad553824899dfbe732f2a3fc93f1_NeikiAnalytics.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4296 -
C:\Windows\SysWOW64\Eifaim32.exeC:\Windows\system32\Eifaim32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Windows\SysWOW64\Fechomko.exeC:\Windows\system32\Fechomko.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\SysWOW64\Fiaael32.exeC:\Windows\system32\Fiaael32.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Windows\SysWOW64\Gbchdp32.exeC:\Windows\system32\Gbchdp32.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Windows\SysWOW64\Glkmmefl.exeC:\Windows\system32\Glkmmefl.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Windows\SysWOW64\Hmdlmg32.exeC:\Windows\system32\Hmdlmg32.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Windows\SysWOW64\Ibhkfm32.exeC:\Windows\system32\Ibhkfm32.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Windows\SysWOW64\Joahqn32.exeC:\Windows\system32\Joahqn32.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:372 -
C:\Windows\SysWOW64\Kgflcifg.exeC:\Windows\system32\Kgflcifg.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Windows\SysWOW64\Klhnfo32.exeC:\Windows\system32\Klhnfo32.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Windows\SysWOW64\Lfbped32.exeC:\Windows\system32\Lfbped32.exe12⤵
- Executes dropped EXE
PID:2176 -
C:\Windows\SysWOW64\Lqkqhm32.exeC:\Windows\system32\Lqkqhm32.exe13⤵PID:4264
-
C:\Windows\SysWOW64\Mqdcnl32.exeC:\Windows\system32\Mqdcnl32.exe14⤵PID:4272
-
C:\Windows\SysWOW64\Mcifkf32.exeC:\Windows\system32\Mcifkf32.exe15⤵PID:4732
-
C:\Windows\SysWOW64\Ncnofeof.exeC:\Windows\system32\Ncnofeof.exe16⤵PID:5032
-
C:\Windows\SysWOW64\Npgmpf32.exeC:\Windows\system32\Npgmpf32.exe17⤵PID:4040
-
C:\Windows\SysWOW64\Onkidm32.exeC:\Windows\system32\Onkidm32.exe18⤵PID:5064
-
C:\Windows\SysWOW64\Oakbehfe.exeC:\Windows\system32\Oakbehfe.exe19⤵PID:1624
-
C:\Windows\SysWOW64\Oanokhdb.exeC:\Windows\system32\Oanokhdb.exe20⤵PID:1728
-
C:\Windows\SysWOW64\Opclldhj.exeC:\Windows\system32\Opclldhj.exe21⤵PID:4656
-
C:\Windows\SysWOW64\Opeiadfg.exeC:\Windows\system32\Opeiadfg.exe22⤵PID:2280
-
C:\Windows\SysWOW64\Pmiikh32.exeC:\Windows\system32\Pmiikh32.exe23⤵PID:3148
-
C:\Windows\SysWOW64\Qaqegecm.exeC:\Windows\system32\Qaqegecm.exe24⤵PID:572
-
C:\Windows\SysWOW64\Qodeajbg.exeC:\Windows\system32\Qodeajbg.exe25⤵PID:876
-
C:\Windows\SysWOW64\Afpjel32.exeC:\Windows\system32\Afpjel32.exe26⤵PID:3056
-
C:\Windows\SysWOW64\Aaenbd32.exeC:\Windows\system32\Aaenbd32.exe27⤵PID:4856
-
C:\Windows\SysWOW64\Aknbkjfh.exeC:\Windows\system32\Aknbkjfh.exe28⤵PID:840
-
C:\Windows\SysWOW64\Aggpfkjj.exeC:\Windows\system32\Aggpfkjj.exe29⤵PID:2920
-
C:\Windows\SysWOW64\Akdilipp.exeC:\Windows\system32\Akdilipp.exe30⤵PID:3000
-
C:\Windows\SysWOW64\Bgkiaj32.exeC:\Windows\system32\Bgkiaj32.exe31⤵PID:4004
-
C:\Windows\SysWOW64\Bgpcliao.exeC:\Windows\system32\Bgpcliao.exe32⤵PID:4816
-
C:\Windows\SysWOW64\Boihcf32.exeC:\Windows\system32\Boihcf32.exe33⤵PID:2688
-
C:\Windows\SysWOW64\Boldhf32.exeC:\Windows\system32\Boldhf32.exe34⤵PID:2596
-
C:\Windows\SysWOW64\Cdkifmjq.exeC:\Windows\system32\Cdkifmjq.exe35⤵PID:1884
-
C:\Windows\SysWOW64\Cpbjkn32.exeC:\Windows\system32\Cpbjkn32.exe36⤵PID:3248
-
C:\Windows\SysWOW64\Cpdgqmnb.exeC:\Windows\system32\Cpdgqmnb.exe37⤵PID:3544
-
C:\Windows\SysWOW64\Cnhgjaml.exeC:\Windows\system32\Cnhgjaml.exe38⤵PID:864
-
C:\Windows\SysWOW64\Cklhcfle.exeC:\Windows\system32\Cklhcfle.exe39⤵PID:4384
-
C:\Windows\SysWOW64\Dnmaea32.exeC:\Windows\system32\Dnmaea32.exe40⤵PID:1616
-
C:\Windows\SysWOW64\Dkqaoe32.exeC:\Windows\system32\Dkqaoe32.exe41⤵PID:4932
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4932 -s 40042⤵
- Program crash
PID:2012
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4932 -ip 49321⤵PID:4404
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1028 --field-trial-handle=2744,i,16362475727591565961,3676688664819797550,262144 --variations-seed-version /prefetch:81⤵PID:1044
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
443KB
MD533f215222c59e7785ddbe556b08b8b15
SHA175df2d16ee6471f279240f358afb51186f366d20
SHA25669b907365a712ae9353460597e2ffcf03858e6bf1f87bcbd12ca1d50bd066603
SHA5125ab90dc05e61d2f682900872eac813a48eb64b76b77d6b55196958a54df6dc349d9d9fa7f22f6146c529e90c8f6f2fe051c3193df43637c40f93ebb7dbf12024
-
Filesize
443KB
MD53cf98923119d021eb78022c5c49ec609
SHA1fec8ec202393d7ffb13787e9a306207c2be856ea
SHA25637b2b605116a54a70edfac3c457c2dc253bd7544e746f1f391df73db9136f9d6
SHA51218773d03a4af00b43f4df49aa9fa6a796ffd667f2c9856dd04200e92bf9e136799333791814834a3019b01d1e2f0fcb290213f731381a50ab964a704a5c9291a
-
Filesize
443KB
MD55e509c61b04eaa03b0e61665cde971f0
SHA145cb98603c72bc1f1c3bb27fdc7581b3ef64c19e
SHA2566a76cdf3fc8591a4b4fbcde2c2ee1186a5c4c9cf2ae1267bf984f14ed6feff4b
SHA5120983094546eef93658b41779331a4133be0287e1f98e00d3b92589a024d35915785ba4c57dcec72fb70fbe491e03ffb95fefc21edbfdd24974d1dd63efec632b
-
Filesize
443KB
MD5a3fd8bfe8fa43dcad4769c3248accf35
SHA1b103b2e0dabbd95ac631df7d6e65333423b0a852
SHA256d1ae4bc77dbb821f914a1fa7cde809e99be44cf8319128d0a2ef75165e080a3e
SHA5122312738faf2eca7fd7bdc952500b6599cf7fa4ea4a531f19d8029e1ff6472ada25525d74478277d6959e1be6cea9b43583b45cce863409f108864555a4a594e2
-
Filesize
443KB
MD5a0751832843b2e3614d2f0fb84bbbf4f
SHA17f027586648d08064a246abe873e9228ef0a82f4
SHA25651cf3ac89df5b872b61a69914375ddf07d7a91c958771b6c720340b39758a207
SHA51253a5d631cef3eb933e6e79e275762c2eeb5b6d7113c221b7173bcb5a78e5ae868b633f433220b2fe42989c2f078c6c1f7f606c1905f5b957cd539c8c0fb1f8b5
-
Filesize
443KB
MD526a9bec6e6346bf3a33a12cd8262aef5
SHA1133b33f9c892d1920dd4d772d8f979bc29e7e2e7
SHA256e1ecc214219078f8da08f295995a6cd57829a2485ed9ddaa4139e1379fa11f5b
SHA5126339a5c689d20dd1e6a7933b59731f1e466e931bac9a40133c0897919e27c517a577aa5585e9af4a02a8f433c95b8f733e1ebdc49f70943fbcbc9c5a5a57013b
-
Filesize
443KB
MD5627851506620b647e2780f3590b3e6b0
SHA16e2aa1e9ec0fb325c74f04c2a53696a9283c7451
SHA2569253109b0e314b7478cb7c93d28c94a0c4160a75c0d66828ed61d8c99f5ee327
SHA512d9b55c03f3e8b7e98f81e003b7135848ed13ba63a7daba6860b567fdb299d8d1ce5d6d1eda69f7efa1c09d73e9698fa35c854a99a441c17bba2d87278febe56d
-
Filesize
443KB
MD5ebc7205d70c235f5933416a7a8bc12b1
SHA11e3efbc4c9422b1d7893c15c489187333760d322
SHA256234a7cc20261e940b8ea8a98d7c0f1b8657a82967bdff1bcc4fb4ff7554dc78c
SHA5124b6f23e67f326c84c65e902265a8c857874bf62b64cb0b4b67e16ea4d124d535027a2e09b05332a08eacec0505603a673ab033a1ae259ec6713bdb5e1f43f11c
-
Filesize
443KB
MD5f195b4336d81a9f348ac6a8d3594e312
SHA1602d16889e0af850f591c4eb759cdef5d423fe80
SHA2564be539bed5bfd6b489393f688d4830dd471d0d78dc4113b0f7283a737493fb0e
SHA51239c2c449f31c0de74780c865f4f30917549e791d22f5f6bb2264a91fa7c0f6a090e86d767dbae4686407b60f52b02ca40afc4e8edbf0c6c584f797c2d93d1dbe
-
Filesize
443KB
MD52bbec3e5a673f55aafe2d4036acafc8c
SHA114ff9ae016e575eef5677396449664648833d49f
SHA25656f88547d2b4242faab08a02f8b4c9d72c2c06b7c28cd922b7b1b445815ae7bd
SHA5124491297b2814b5547dbad91d57e1883be2c8fe4beea90da6e24889174b7e350c22fb93e4f583d44eeb8b8434845d32f725c15cce05684684d1ff85364b464327
-
Filesize
443KB
MD568b82c920bf40d2c9014c44d9395d547
SHA117bb64180da1b560a765f90026b376a887631739
SHA2565584e0d03f2db09615e98e4ab769250de23e33eb1a6b56fa705d63da74e018e1
SHA512cf7ac1d3bda21067387d9335cdbe35928fa33af084307f06bf0f19881090a069905e1d6f267a097af55f0065b6c88c803433ce7c7cd35abf14781ae4e8213bd5
-
Filesize
443KB
MD563d985fe01ccf4576d812b34740fd992
SHA1b6779d942e583a85f4633fafb53780e757d92d20
SHA2561c16a22d184c68457e9709c4fad275b2ba9857bbbd97535a732fc7e531698206
SHA512f8a34989c77362c1132977d1a4f2f6ec3f3d336587126546b8b89819417ff9f445657e68bdb1eac4fe67049db9e8c6aa39b6e979a56bb1408115c704b4538066
-
Filesize
443KB
MD5d54c9669bf2b54ca0644f3cce18040f1
SHA17de29b00a1c5950636cb040e200224072ac345f1
SHA2568a29c8254a6b3231ce0d2e2f31a091cc928b1a06c6f5e4279cc4b43840ec3d7f
SHA512911a2ad1406debad042f05f67b93b1ec915f82a25d61bda7cbd8d893d85a8dff0cd779b9902c75b7576a4a986329a722896bf808a060b7617e806c61826dcd78
-
Filesize
443KB
MD502c4344e094e06751c2eccd95692d683
SHA1b1bbb866a59c4f60510e612b59643c03d64db831
SHA2565296f8fc3f1dc4540202f8780f8744ee929678ae1f1ebe764a97ca0bc70f1b03
SHA512d003380f08baaf444a95ce254accecfc515fb31661e0f91fe6b40f5793df24abf8be1aa9c8cd48158768f84b3bbf3d0904e9648900cfe53813bf79baaaadd6de
-
Filesize
443KB
MD586f55e2f6c9cc0df292a9f13edf37c39
SHA1a25038a98cb86094dfb49216435215149806f90a
SHA25612101f0f0c269a9b75ebac70d83b68bb937fd6f12febc4b65f97c81349128b11
SHA5124432afdb3ff2f85962372a23f2c75a361dea176a6b5b94a72c38d5d3f1b1370d9a416ec8873a14275b5e977fa232f23333a86e14792207c610e612fbbd1e276b
-
Filesize
443KB
MD5ce40229f9c3292878fc58b102675caf6
SHA1a188226345eb778d0ea742448efeed3b9c4176fb
SHA256cf70c12f0593641b5a3ef42c4f3b750d9d5c0aaa1dbcc328c0516f8c0c313ef2
SHA5129209fcfc853eba864ba03b32ddcb443c5d33426217fbf4b1a36675d296c644d99bbc1ba828a07fb80c3d10e994e3ca9412b3a3d658585e28ecdf796651b2973d
-
Filesize
443KB
MD5e22a84a11655461bd9ec382b295b7b2a
SHA1e68d1c91b40917efb00650b95c267467f255a2b3
SHA2568c22002e2abcbde23fb0345327504e07fd1f20d567034662fd4bec9455d49d4d
SHA5128fb21dc829b176fa410bbe0ee036a8c6005ed8ffc9b62c4a833b0c1b0e21fdeeb0d9f4ff867a537e25314b5e48247e28e2b3663fdcac5bfee3ff0b02b5162913
-
Filesize
443KB
MD52094610bcdf3b76bfa4556221a582ae9
SHA1eefc271f86c59dc97f7a08e4dd8149b87d1900b2
SHA25633e5c3dde1af6ff7998bf108d1b0d8e408c659a69648d34eef7f63ae986a3722
SHA512b0d3322f73cfd000d0929a680ca890c1207eaf72d07dc87f1e80b29974b908fb0302e4287d17526a4318ee5e5ff4f7a0e9bebbb85a51ad375b781c8900fc95ef
-
Filesize
443KB
MD5ab524e8932430e575a50899351bdbcf4
SHA120034bff76551d12893edf2e7f5cb1c660de0794
SHA25650f724a14e5d48b02c469614979d9fec6a6b8ddd1e5c13967eff28f15e6f0415
SHA512b73c449dd656f45267adb9e5f51045d299ab85b1c5fdac58bcf03f30d65a8d389d9f14e2810dbe7f08e3a1c800913e818e5abdac56e7ce5de5ed63ce191541e3
-
Filesize
443KB
MD523515bde2a3e16f9dcf5fa283e6985ed
SHA1a9e8be0956c93c4b7b55fa6702269f24c0ec6c40
SHA256b986811efb5ec4a44b3648ad5dd753e03622b1dae1aaac0a5c38be88c3a1459a
SHA5125f380a3bc1517ec04551b351080f3e29cea0f27ec16223a8b02db588a8ad97061be61e287afb5bb4a9203069e3f9867ef7ddde234338707f816015e1b01d30bd
-
Filesize
443KB
MD54bc1b2d98d7cfcba9fd19417bcb02698
SHA123b7397ad72011d4bf4b25edb2ff6e7d8945e1bf
SHA256016c74d5dc9f3734ed35af1ba05fd747c4da94cc280d9103c8ff240635e71931
SHA51237bb6f380c9d5b4dcef9504305e9984416e23587add9247d117726c8db954c13ce0c0327e4035ca012322fc8427957f7b387f8fdfb669c38caca701ad0f8e1e8
-
Filesize
443KB
MD5febbfeaf978a6b8ad8644e26a294be25
SHA125e602d144c07869408bd0c320712a955843c774
SHA2561673d10002fbee24d3776b52d0768971a7dcce4ac8ea816cb6a992eac576b17b
SHA512680efabe7d45f41cd656aadcfcb7993ce5f3747320b6c1df3211318f273c32279239c488cbb99bf2141925e594e17ad77bc2c00dcfe78d1c37dc56cd62dbd2f9
-
Filesize
443KB
MD5aad7b1241c69f9c679cf19955c7b10dd
SHA1575e7693740db7fe8bfc6abec56d323521ee6676
SHA256cff3553586c1f84b1f973f602c7aa6a721ff1bbce38c3e187bff4ff1dfc12903
SHA5127c3ff5cc50fe381dc3461a4d56912938d39e00ea9e5fc3601220d318ccc3e12de517c26aff55a0babaec9eba98dffdabf6410de87d7bd0abb04b491bf7641758
-
Filesize
443KB
MD5598c2d6d34b68e124ed639297ae66f87
SHA19cb008f4807900281127abbcd67fdeb380cfda7e
SHA256364735ccb6b12f77d2ab29fa43b68d7e6bc44a7141df4020bf1238edfb1f5c70
SHA51266b17639b1a9b76e5b191f796f95bd7f7123cc28afaf76b60fefb4773124d791009e5f64d9ecc21f4ba0b4b2c3abcc58a922983cb51530a48ee560bc0772d598
-
Filesize
443KB
MD5a12c5dad363f288889299ebe2d21f3b9
SHA1c0977ce59348d8f5678dc75ea6cac99e533f7723
SHA2569e24ba824a56c5dad8d63a324c5982fbdba5fdeb160f396847a13cbf4771f65c
SHA5129b1754dc801fe6e5e1519387d8cf5392978dd4a0500cc1d78b2a76f55f4b4494299410a8cf37e7c93ad0496cb801b5e99f414fd996d57f8465ee706dc17a11b9
-
Filesize
443KB
MD57457e1ff42adb9e42349bc0b5ac8b08a
SHA1aee78d227df2bf9dfa9ece2e25ef63b3d6077338
SHA25660b84fe2f948062b921ee89684f903fc112181b723cc18f4ad698ed71464b029
SHA512e8cd472e2d0e8474bf87f99d44a8e56a9e9ed6368e7b8bcd97b0b94140425ebd84b6820204797a5abe1e89beab9151f4ddaf9c810c1d48ca3bdeda5893fc981c
-
Filesize
443KB
MD5e450a54d1a423d50b635ab40609da959
SHA117d6ec1b57f12e2bff087357bf2b6d4979c9f90c
SHA2565cacb792bb77b928532e36cb67941f9c5eb57151b83d5ba0bb609a224479a7df
SHA5127e504f702e3ce45d61705c770d13f784d105e533c75bb47122ab3699cc6c0f2d861f2312fdcc9e124b67bc1048cd20950992e5c0b59eb9ff06d897cce1aeafc5
-
Filesize
443KB
MD5c80088c9f4598546ef23062de09f66b9
SHA16eb35a884b76d03206c2f88ae8b8cf574d1129c5
SHA256c8303100beb5dfc68f8ff518014ab211e05c5be0763a135fec26b00d7ab61cc0
SHA512a9807526e18bb8671f454128594b54b251269090c345a184eae6b3624496b4a4b75fd3dda08ef0cb20b0dcadc291630bca132d731badfa0c9d0d8adf4c5cc176
-
Filesize
443KB
MD5d78e67c8b2cbad8596eab29ff157c197
SHA1a6016f9ae973505a1098c36aadef84bb1ecd901f
SHA2563aa0c44ce699bb4999c8c3d227720f02976b1b0b0cf23dc499f188eff37a13a5
SHA5129d076f17afb46aaa2f6cd64baf5966be1aa6bc4f2d2cfba187b044eaf0015ee76f88dc5fb7b1d7b2249c5a5839e306a85709f92a8f23aae4f12186341603f77f
-
Filesize
443KB
MD59e0c331fbf3f5da33886d6aaf22db56a
SHA1c897ecb39704dc9306856198571fcba9964dd6c2
SHA25699dac2e4563628c15aa5f0077df12e5368192b4c0a6a05c19c30e0fe72ba03d7
SHA5125b4ab9a5a303ea9007e12ae7d8fccb0c95dd47f66456c1e0d2f9702aa3d45ddcbab2c60051c64f7272d7565d890f59243bf950b8e3d6da055e871b249614e436
-
Filesize
443KB
MD5dd22ce6cd942597b1fdaea545d2a3138
SHA1c5a828bf105241b8ea7502af8dbf1e5edd34e96f
SHA256a3c8788af7738896f85d03454ffa0480dc784ce56ea506d0fb3624cf6dea0f14
SHA512dbcfd301ca8f788d7c8072a60acf4d20526fa5c0e14632d58cd02d53f9f3cebe38c78bef34b9d4a096be371079a4ca3cdd3ed0d75ba235db9c402b1be7a6c22d
-
Filesize
443KB
MD5dfc2ad873ab0fae8a36c20481efb5f88
SHA18e075fde9c5b97968049ee64425255728accd3d8
SHA2568368f879f279930f4ca522f5d33a7aea85fae5c5ec1c9fe917c944476acd8106
SHA51279ab470a7f159eabfded3c21e8ff3416d1a9fcea050fcac3027a6b861dedbdb2bfb92321f5008df8bd0ff828ce2b460ad91b81d351fbd3f7fb8c5d0afa2b939e
-
Filesize
443KB
MD546bf9335e1b1d6355f478f5d56a8cb32
SHA1c5249c9461e87e3e097a5f9b09e3594dd9e03484
SHA256dea1ea3458af4abc1b993a2a6c358ce2ef9a923f0096ae2b07b7d8fefaab2abe
SHA512a5cd36462c49361833b19488e0eff01a8af487997d189ff5277ec24f54bcc001a1fd2669cfb70ac8b5925f1e8a7a6fdf09eff3ef226524442c061eba18ddd263
-
Filesize
443KB
MD5bc7e7f8b649949d8735fb9100db1b7c4
SHA1d563a35674ce333d3d4240544b125a1b3d506e5c
SHA2566c11328f95a1e5c87fa7ce852c88383953c593eb377405df4d34f85bd1e3b353
SHA512eb4e2a0d51990d2ab14ddfcc10ffd57d3df5aa63039a86fff543b8c7a4c15675b559a9c227e8e92176f6ba5c11c1df8537098b032836de5b34cd3a1892f259cb