Analysis
-
max time kernel
39s -
max time network
20s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
06-07-2024 21:38
Static task
static1
Behavioral task
behavioral1
Sample
17811f53c53b6df195e5492a0453efc0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
17811f53c53b6df195e5492a0453efc0N.exe
Resource
win10v2004-20240704-en
General
-
Target
17811f53c53b6df195e5492a0453efc0N.exe
-
Size
92KB
-
MD5
17811f53c53b6df195e5492a0453efc0
-
SHA1
c4deabf2c848d37cc2a313c19fe12cabd5fc3c79
-
SHA256
68ba9be63aa67aa39409b9a6c703d3c04ff4e2209ac351fcde70b10be4aeb349
-
SHA512
c0b2141188aa0396c3d8ccf03378fcb03da3661878d81430db0662283cc4231df53e501c9b8db6e25798eafddcc36c08594ddf92184724f188244cb357f2bb86
-
SSDEEP
1536:o7JKkKpruISkiujw8ov/KhUThKmtC+KTI+yYjXq+66DFUABABOVLefE3:w8Mkiuj7onKhUV9jp+Xj6+JB8M3
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 60 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bedcembk.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bhnffi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bbannb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ckfeic32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kkhdml32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Opebpdad.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oomlfpdi.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bmdefk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cmaeoo32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ghgjflof.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ghgjflof.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bmdefk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bomhnb32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hnflnfbm.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hfdmhh32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Idcqep32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bimbql32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Opebpdad.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iekgod32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iboghh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Idcqep32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hmkiobge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kmjaddii.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gmlmpo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hlqfqo32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kkhdml32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cdnjaibm.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eplmflde.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hdqhambg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hmpbja32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oibpdico.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bomhnb32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hbknmicj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Eplmflde.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gbmoceol.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gbmoceol.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bhnffi32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bimbql32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hdqhambg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hmkiobge.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hlqfqo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Iekgod32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Iboghh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" 17811f53c53b6df195e5492a0453efc0N.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cmaeoo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gegaeabe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hfdmhh32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hmpbja32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bedcembk.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kmjaddii.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Oomlfpdi.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 17811f53c53b6df195e5492a0453efc0N.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ckfeic32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gegaeabe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hnflnfbm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hbknmicj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Oibpdico.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bbannb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gmlmpo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cdnjaibm.exe -
Executes dropped EXE 30 IoCs
pid Process 1664 Bmdefk32.exe 2780 Bbannb32.exe 3020 Bhnffi32.exe 2800 Bimbql32.exe 2804 Bedcembk.exe 2668 Bomhnb32.exe 2120 Cmaeoo32.exe 2384 Ckfeic32.exe 1384 Cdnjaibm.exe 2052 Eplmflde.exe 3024 Gmlmpo32.exe 1100 Gegaeabe.exe 2336 Ghgjflof.exe 2156 Gbmoceol.exe 2084 Hdqhambg.exe 1692 Hnflnfbm.exe 2520 Hmkiobge.exe 1728 Hfdmhh32.exe 1544 Hlqfqo32.exe 2956 Hbknmicj.exe 1744 Hmpbja32.exe 3056 Iekgod32.exe 2484 Iboghh32.exe 324 Idcqep32.exe 1952 Kkhdml32.exe 2900 Kmjaddii.exe 2232 Opebpdad.exe 2664 Oomlfpdi.exe 2904 Oibpdico.exe 2700 Ockdmn32.exe -
Loads dropped DLL 64 IoCs
pid Process 1612 17811f53c53b6df195e5492a0453efc0N.exe 1612 17811f53c53b6df195e5492a0453efc0N.exe 1664 Bmdefk32.exe 1664 Bmdefk32.exe 2780 Bbannb32.exe 2780 Bbannb32.exe 3020 Bhnffi32.exe 3020 Bhnffi32.exe 2800 Bimbql32.exe 2800 Bimbql32.exe 2804 Bedcembk.exe 2804 Bedcembk.exe 2668 Bomhnb32.exe 2668 Bomhnb32.exe 2120 Cmaeoo32.exe 2120 Cmaeoo32.exe 2384 Ckfeic32.exe 2384 Ckfeic32.exe 1384 Cdnjaibm.exe 1384 Cdnjaibm.exe 2052 Eplmflde.exe 2052 Eplmflde.exe 3024 Gmlmpo32.exe 3024 Gmlmpo32.exe 1100 Gegaeabe.exe 1100 Gegaeabe.exe 2336 Ghgjflof.exe 2336 Ghgjflof.exe 2156 Gbmoceol.exe 2156 Gbmoceol.exe 2084 Hdqhambg.exe 2084 Hdqhambg.exe 1692 Hnflnfbm.exe 1692 Hnflnfbm.exe 2520 Hmkiobge.exe 2520 Hmkiobge.exe 1728 Hfdmhh32.exe 1728 Hfdmhh32.exe 1544 Hlqfqo32.exe 1544 Hlqfqo32.exe 2956 Hbknmicj.exe 2956 Hbknmicj.exe 1744 Hmpbja32.exe 1744 Hmpbja32.exe 3056 Iekgod32.exe 3056 Iekgod32.exe 2484 Iboghh32.exe 2484 Iboghh32.exe 324 Idcqep32.exe 324 Idcqep32.exe 1952 Kkhdml32.exe 1952 Kkhdml32.exe 2900 Kmjaddii.exe 2900 Kmjaddii.exe 2232 Opebpdad.exe 2232 Opebpdad.exe 2664 Oomlfpdi.exe 2664 Oomlfpdi.exe 2904 Oibpdico.exe 2904 Oibpdico.exe 2684 WerFault.exe 2684 WerFault.exe 2684 WerFault.exe 2684 WerFault.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\Fkihmn32.dll Eplmflde.exe File created C:\Windows\SysWOW64\Hlqfqo32.exe Hfdmhh32.exe File opened for modification C:\Windows\SysWOW64\Kkhdml32.exe Idcqep32.exe File opened for modification C:\Windows\SysWOW64\Bbannb32.exe Bmdefk32.exe File created C:\Windows\SysWOW64\Hmpqci32.dll Bedcembk.exe File created C:\Windows\SysWOW64\Cmaeoo32.exe Bomhnb32.exe File created C:\Windows\SysWOW64\Cdnjaibm.exe Ckfeic32.exe File created C:\Windows\SysWOW64\Banaaa32.dll Cdnjaibm.exe File created C:\Windows\SysWOW64\Fgfbnp32.dll Ghgjflof.exe File created C:\Windows\SysWOW64\Hdqhambg.exe Gbmoceol.exe File created C:\Windows\SysWOW64\Phlaof32.dll Hmpbja32.exe File opened for modification C:\Windows\SysWOW64\Bimbql32.exe Bhnffi32.exe File created C:\Windows\SysWOW64\Opebpdad.exe Kmjaddii.exe File created C:\Windows\SysWOW64\Oibpdico.exe Oomlfpdi.exe File created C:\Windows\SysWOW64\Idcqep32.exe Iboghh32.exe File opened for modification C:\Windows\SysWOW64\Gmlmpo32.exe Eplmflde.exe File created C:\Windows\SysWOW64\Ipekokia.dll Gegaeabe.exe File created C:\Windows\SysWOW64\Pkgjak32.dll Kmjaddii.exe File created C:\Windows\SysWOW64\Oomlfpdi.exe Opebpdad.exe File created C:\Windows\SysWOW64\Ockdmn32.exe Oibpdico.exe File created C:\Windows\SysWOW64\Ooocab32.dll Cmaeoo32.exe File created C:\Windows\SysWOW64\Jmlenl32.dll Bomhnb32.exe File created C:\Windows\SysWOW64\Agngpn32.dll Ckfeic32.exe File created C:\Windows\SysWOW64\Ajodjfdi.dll Gbmoceol.exe File created C:\Windows\SysWOW64\Pcmpdp32.dll Hmkiobge.exe File created C:\Windows\SysWOW64\Bmdefk32.exe 17811f53c53b6df195e5492a0453efc0N.exe File opened for modification C:\Windows\SysWOW64\Cdnjaibm.exe Ckfeic32.exe File created C:\Windows\SysWOW64\Iboghh32.exe Iekgod32.exe File opened for modification C:\Windows\SysWOW64\Iboghh32.exe Iekgod32.exe File created C:\Windows\SysWOW64\Eoldfbid.dll Iboghh32.exe File created C:\Windows\SysWOW64\Ckfeic32.exe Cmaeoo32.exe File opened for modification C:\Windows\SysWOW64\Hbknmicj.exe Hlqfqo32.exe File created C:\Windows\SysWOW64\Okmbclmp.dll Bimbql32.exe File created C:\Windows\SysWOW64\Gmlmpo32.exe Eplmflde.exe File created C:\Windows\SysWOW64\Gegaeabe.exe Gmlmpo32.exe File opened for modification C:\Windows\SysWOW64\Hnflnfbm.exe Hdqhambg.exe File created C:\Windows\SysWOW64\Ajmnmj32.dll Hfdmhh32.exe File opened for modification C:\Windows\SysWOW64\Iekgod32.exe Hmpbja32.exe File opened for modification C:\Windows\SysWOW64\Kmjaddii.exe Kkhdml32.exe File opened for modification C:\Windows\SysWOW64\Oomlfpdi.exe Opebpdad.exe File opened for modification C:\Windows\SysWOW64\Eplmflde.exe Cdnjaibm.exe File opened for modification C:\Windows\SysWOW64\Oibpdico.exe Oomlfpdi.exe File opened for modification C:\Windows\SysWOW64\Gbmoceol.exe Ghgjflof.exe File opened for modification C:\Windows\SysWOW64\Hfdmhh32.exe Hmkiobge.exe File created C:\Windows\SysWOW64\Hmpbja32.exe Hbknmicj.exe File opened for modification C:\Windows\SysWOW64\Hmpbja32.exe Hbknmicj.exe File created C:\Windows\SysWOW64\Mfdfng32.dll Opebpdad.exe File opened for modification C:\Windows\SysWOW64\Ckfeic32.exe Cmaeoo32.exe File created C:\Windows\SysWOW64\Folqfbjh.dll Hnflnfbm.exe File created C:\Windows\SysWOW64\Hfdmhh32.exe Hmkiobge.exe File created C:\Windows\SysWOW64\Lbgkic32.dll Kkhdml32.exe File created C:\Windows\SysWOW64\Bedcembk.exe Bimbql32.exe File opened for modification C:\Windows\SysWOW64\Ghgjflof.exe Gegaeabe.exe File created C:\Windows\SysWOW64\Pggocl32.dll Iekgod32.exe File created C:\Windows\SysWOW64\Bimbql32.exe Bhnffi32.exe File created C:\Windows\SysWOW64\Piffca32.dll Bhnffi32.exe File opened for modification C:\Windows\SysWOW64\Cmaeoo32.exe Bomhnb32.exe File opened for modification C:\Windows\SysWOW64\Gegaeabe.exe Gmlmpo32.exe File created C:\Windows\SysWOW64\Dhopbilb.dll Gmlmpo32.exe File created C:\Windows\SysWOW64\Hnflnfbm.exe Hdqhambg.exe File created C:\Windows\SysWOW64\Olbfgj32.dll Hdqhambg.exe File created C:\Windows\SysWOW64\Gijllcml.dll Hlqfqo32.exe File opened for modification C:\Windows\SysWOW64\Bmdefk32.exe 17811f53c53b6df195e5492a0453efc0N.exe File created C:\Windows\SysWOW64\Hgmgcagc.dll Oomlfpdi.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2684 2700 WerFault.exe 59 -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cmaeoo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fgfbnp32.dll" Ghgjflof.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lbgkic32.dll" Kkhdml32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hhgceh32.dll" 17811f53c53b6df195e5492a0453efc0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bmdefk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Folqfbjh.dll" Hnflnfbm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hlqfqo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Idcqep32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gegaeabe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gbmoceol.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ajmnmj32.dll" Hfdmhh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pkgjak32.dll" Kmjaddii.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kmjaddii.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jcqoqi32.dll" Hbknmicj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Oomlfpdi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bhnffi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Banaaa32.dll" Cdnjaibm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ajodjfdi.dll" Gbmoceol.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Olbfgj32.dll" Hdqhambg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hdqhambg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" 17811f53c53b6df195e5492a0453efc0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Eplmflde.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hfdmhh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kdokmeph.dll" Bmdefk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ipekokia.dll" Gegaeabe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kkhdml32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Oibpdico.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Alggph32.dll" Idcqep32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Piffca32.dll" Bhnffi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gegaeabe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ghgjflof.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gbmoceol.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hmpbja32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gijllcml.dll" Hlqfqo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mmepgeck.dll" Bbannb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bbannb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bedcembk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gmlmpo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hnflnfbm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Oomlfpdi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node 17811f53c53b6df195e5492a0453efc0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bbannb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fkihmn32.dll" Eplmflde.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hmkiobge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pcmpdp32.dll" Hmkiobge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eoldfbid.dll" Iboghh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Opebpdad.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hgmgcagc.dll" Oomlfpdi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID 17811f53c53b6df195e5492a0453efc0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Agngpn32.dll" Ckfeic32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dhopbilb.dll" Gmlmpo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ghgjflof.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Iekgod32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kkhdml32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mfdfng32.dll" Opebpdad.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Opebpdad.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 17811f53c53b6df195e5492a0453efc0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cmaeoo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ckfeic32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hlqfqo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Idcqep32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Oibpdico.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Phlaof32.dll" Hmpbja32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bedcembk.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1612 wrote to memory of 1664 1612 17811f53c53b6df195e5492a0453efc0N.exe 30 PID 1612 wrote to memory of 1664 1612 17811f53c53b6df195e5492a0453efc0N.exe 30 PID 1612 wrote to memory of 1664 1612 17811f53c53b6df195e5492a0453efc0N.exe 30 PID 1612 wrote to memory of 1664 1612 17811f53c53b6df195e5492a0453efc0N.exe 30 PID 1664 wrote to memory of 2780 1664 Bmdefk32.exe 31 PID 1664 wrote to memory of 2780 1664 Bmdefk32.exe 31 PID 1664 wrote to memory of 2780 1664 Bmdefk32.exe 31 PID 1664 wrote to memory of 2780 1664 Bmdefk32.exe 31 PID 2780 wrote to memory of 3020 2780 Bbannb32.exe 32 PID 2780 wrote to memory of 3020 2780 Bbannb32.exe 32 PID 2780 wrote to memory of 3020 2780 Bbannb32.exe 32 PID 2780 wrote to memory of 3020 2780 Bbannb32.exe 32 PID 3020 wrote to memory of 2800 3020 Bhnffi32.exe 33 PID 3020 wrote to memory of 2800 3020 Bhnffi32.exe 33 PID 3020 wrote to memory of 2800 3020 Bhnffi32.exe 33 PID 3020 wrote to memory of 2800 3020 Bhnffi32.exe 33 PID 2800 wrote to memory of 2804 2800 Bimbql32.exe 34 PID 2800 wrote to memory of 2804 2800 Bimbql32.exe 34 PID 2800 wrote to memory of 2804 2800 Bimbql32.exe 34 PID 2800 wrote to memory of 2804 2800 Bimbql32.exe 34 PID 2804 wrote to memory of 2668 2804 Bedcembk.exe 35 PID 2804 wrote to memory of 2668 2804 Bedcembk.exe 35 PID 2804 wrote to memory of 2668 2804 Bedcembk.exe 35 PID 2804 wrote to memory of 2668 2804 Bedcembk.exe 35 PID 2668 wrote to memory of 2120 2668 Bomhnb32.exe 36 PID 2668 wrote to memory of 2120 2668 Bomhnb32.exe 36 PID 2668 wrote to memory of 2120 2668 Bomhnb32.exe 36 PID 2668 wrote to memory of 2120 2668 Bomhnb32.exe 36 PID 2120 wrote to memory of 2384 2120 Cmaeoo32.exe 37 PID 2120 wrote to memory of 2384 2120 Cmaeoo32.exe 37 PID 2120 wrote to memory of 2384 2120 Cmaeoo32.exe 37 PID 2120 wrote to memory of 2384 2120 Cmaeoo32.exe 37 PID 2384 wrote to memory of 1384 2384 Ckfeic32.exe 38 PID 2384 wrote to memory of 1384 2384 Ckfeic32.exe 38 PID 2384 wrote to memory of 1384 2384 Ckfeic32.exe 38 PID 2384 wrote to memory of 1384 2384 Ckfeic32.exe 38 PID 1384 wrote to memory of 2052 1384 Cdnjaibm.exe 39 PID 1384 wrote to memory of 2052 1384 Cdnjaibm.exe 39 PID 1384 wrote to memory of 2052 1384 Cdnjaibm.exe 39 PID 1384 wrote to memory of 2052 1384 Cdnjaibm.exe 39 PID 2052 wrote to memory of 3024 2052 Eplmflde.exe 40 PID 2052 wrote to memory of 3024 2052 Eplmflde.exe 40 PID 2052 wrote to memory of 3024 2052 Eplmflde.exe 40 PID 2052 wrote to memory of 3024 2052 Eplmflde.exe 40 PID 3024 wrote to memory of 1100 3024 Gmlmpo32.exe 41 PID 3024 wrote to memory of 1100 3024 Gmlmpo32.exe 41 PID 3024 wrote to memory of 1100 3024 Gmlmpo32.exe 41 PID 3024 wrote to memory of 1100 3024 Gmlmpo32.exe 41 PID 1100 wrote to memory of 2336 1100 Gegaeabe.exe 42 PID 1100 wrote to memory of 2336 1100 Gegaeabe.exe 42 PID 1100 wrote to memory of 2336 1100 Gegaeabe.exe 42 PID 1100 wrote to memory of 2336 1100 Gegaeabe.exe 42 PID 2336 wrote to memory of 2156 2336 Ghgjflof.exe 43 PID 2336 wrote to memory of 2156 2336 Ghgjflof.exe 43 PID 2336 wrote to memory of 2156 2336 Ghgjflof.exe 43 PID 2336 wrote to memory of 2156 2336 Ghgjflof.exe 43 PID 2156 wrote to memory of 2084 2156 Gbmoceol.exe 44 PID 2156 wrote to memory of 2084 2156 Gbmoceol.exe 44 PID 2156 wrote to memory of 2084 2156 Gbmoceol.exe 44 PID 2156 wrote to memory of 2084 2156 Gbmoceol.exe 44 PID 2084 wrote to memory of 1692 2084 Hdqhambg.exe 45 PID 2084 wrote to memory of 1692 2084 Hdqhambg.exe 45 PID 2084 wrote to memory of 1692 2084 Hdqhambg.exe 45 PID 2084 wrote to memory of 1692 2084 Hdqhambg.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\17811f53c53b6df195e5492a0453efc0N.exe"C:\Users\Admin\AppData\Local\Temp\17811f53c53b6df195e5492a0453efc0N.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Windows\SysWOW64\Bmdefk32.exeC:\Windows\system32\Bmdefk32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Windows\SysWOW64\Bbannb32.exeC:\Windows\system32\Bbannb32.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\SysWOW64\Bhnffi32.exeC:\Windows\system32\Bhnffi32.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\SysWOW64\Bimbql32.exeC:\Windows\system32\Bimbql32.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Windows\SysWOW64\Bedcembk.exeC:\Windows\system32\Bedcembk.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\SysWOW64\Bomhnb32.exeC:\Windows\system32\Bomhnb32.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\SysWOW64\Cmaeoo32.exeC:\Windows\system32\Cmaeoo32.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Windows\SysWOW64\Ckfeic32.exeC:\Windows\system32\Ckfeic32.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Windows\SysWOW64\Cdnjaibm.exeC:\Windows\system32\Cdnjaibm.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Windows\SysWOW64\Eplmflde.exeC:\Windows\system32\Eplmflde.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Windows\SysWOW64\Gmlmpo32.exeC:\Windows\system32\Gmlmpo32.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\SysWOW64\Gegaeabe.exeC:\Windows\system32\Gegaeabe.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Windows\SysWOW64\Ghgjflof.exeC:\Windows\system32\Ghgjflof.exe14⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Windows\SysWOW64\Gbmoceol.exeC:\Windows\system32\Gbmoceol.exe15⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Windows\SysWOW64\Hdqhambg.exeC:\Windows\system32\Hdqhambg.exe16⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\SysWOW64\Hnflnfbm.exeC:\Windows\system32\Hnflnfbm.exe17⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:1692 -
C:\Windows\SysWOW64\Hmkiobge.exeC:\Windows\system32\Hmkiobge.exe18⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:2520 -
C:\Windows\SysWOW64\Hfdmhh32.exeC:\Windows\system32\Hfdmhh32.exe19⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:1728 -
C:\Windows\SysWOW64\Hlqfqo32.exeC:\Windows\system32\Hlqfqo32.exe20⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:1544 -
C:\Windows\SysWOW64\Hbknmicj.exeC:\Windows\system32\Hbknmicj.exe21⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:2956 -
C:\Windows\SysWOW64\Hmpbja32.exeC:\Windows\system32\Hmpbja32.exe22⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:1744 -
C:\Windows\SysWOW64\Iekgod32.exeC:\Windows\system32\Iekgod32.exe23⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:3056 -
C:\Windows\SysWOW64\Iboghh32.exeC:\Windows\system32\Iboghh32.exe24⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:2484 -
C:\Windows\SysWOW64\Idcqep32.exeC:\Windows\system32\Idcqep32.exe25⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:324 -
C:\Windows\SysWOW64\Kkhdml32.exeC:\Windows\system32\Kkhdml32.exe26⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:1952 -
C:\Windows\SysWOW64\Kmjaddii.exeC:\Windows\system32\Kmjaddii.exe27⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:2900 -
C:\Windows\SysWOW64\Opebpdad.exeC:\Windows\system32\Opebpdad.exe28⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:2232 -
C:\Windows\SysWOW64\Oomlfpdi.exeC:\Windows\system32\Oomlfpdi.exe29⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:2664 -
C:\Windows\SysWOW64\Oibpdico.exeC:\Windows\system32\Oibpdico.exe30⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:2904 -
C:\Windows\SysWOW64\Ockdmn32.exeC:\Windows\system32\Ockdmn32.exe31⤵
- Executes dropped EXE
PID:2700 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2700 -s 14032⤵
- Loads dropped DLL
- Program crash
PID:2684
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD577f3e0bd4e7885dab0faf5b1965eb66a
SHA16884cf2cc5ead28bfd2c593b904677155aded3c0
SHA25639c16b3a77581fb87a260b23d8a1f8a4b1f92db1d37eda94e9b832091c98ea6a
SHA512c3737ca61e07840a49af39cd93822440ac771e813fa2adb6e858421e7f3a2fbca8b6c42ec09e9f84f43a6c460112f676dac02b67e740aba173e4a7d01e25ef4c
-
Filesize
92KB
MD5b3ae04fa7dcd778d5d860ab2e4e26bac
SHA1750b91df6a2fd52232249cd046243e64bf823d27
SHA2566088b21694a731605fda2b2ec007390485a95fb988b272c6e51a9fa8eb5ff3ba
SHA5125f12ea856bfb9aa8f6cbc09cc2ad3428bf74dcc00cf00d46122bfab556b75a3b27405bbd3bfca179ecb0987d4ba30ee48ce0f4a6c4c3b83b46fac29de0548a4a
-
Filesize
92KB
MD54544748bbac149071eaca0100cde6a94
SHA1ec33a6d322f6694d90c9cf85f78c6e5160e50f2c
SHA2564745d2478346b4fc82e7107a768e359ee1a69379b463aa93e1bd9c4cd83f2a0e
SHA512d8c258e166dc802fd830dd3e03cc6edad84ed47ff7cbed46dba6813e10a3ea4aced91cb6cedbe2615adf7e56e186e1f0154314ce1836a6d9d266e12f200947f4
-
Filesize
92KB
MD53917129bd871b86cca42ddbb068435f3
SHA13ef21c8e7f58aead80564ab4fd5c567a9a1b6fbe
SHA256fd786e25a0abc3e2fd12f87372b9302cde60f0bb5fac9306085dd52cda2c3b7c
SHA512eecfd3471b13a634b4ae16c6077dd73147fc87b55589f370390129775aa0389f0952df8fd9e8dd8b7fd3325c2735b6d9b56d888a92c0db1fbae1337b94fad2b8
-
Filesize
92KB
MD5c90b89e1b809d48e6006372250d8886b
SHA158cf47405bae575ea2b938f10b05f2160519ce38
SHA25639e14e041ca4667ecf58f6623143e3c393fb6776c103c654aba86e3017bc029b
SHA5124b03209272542a17d65cdc13e867cec3709a055bb507bd1dad56c0e01f895190b216a48a0339d4f4b8f6972f7ce24c79582672b8cd16cca6835299066a349f4d
-
Filesize
92KB
MD5347b8cfd572016c2da6f1a5401e471d8
SHA164c55438af5b99fc63f4af6e1738fda89774fc2c
SHA2565c522f13868ff51af75c51cc22cf5d9a76900644fb36a8a983e056903d72e6ae
SHA5122ac2ebdf9ba86dce1b80d963897abf8762ed28f64e44b0230853e7b479147e7f5e00e11078d5c286116cac0a49e8fe5eadd75208ce943a1069ba33e1dec4a9ac
-
Filesize
92KB
MD5cabce447045aba27886c61cb6cb40ebb
SHA139855535a54a658384c24215bcc819acd926676d
SHA256d5d67bd81f7aece23921f3cbdd5da2bbbd8e39397cdc3163298cae28408013f4
SHA512f5eaf7ef477a073359f38ee1f6356bb1a1b340842a4e1d66aad79e4bd80fc548692efa2de9ecaead9cd9663bccbc92b82891ce23a0120da8616c2cf204a85e0e
-
Filesize
92KB
MD5904f3db97a4751a9470ac4eba1a72ecd
SHA1fbe69100427c76d8f868e852e0a0f60fdf148ad3
SHA256f6c05c6cfa2595a594e8e65d47d648235cd383884679caeee478de55d378bc96
SHA5121ac9a2ccc4e2d10a3365872816d481e9f30ab9db92275d9b6ef65e07666ffdb74ad890830fa7758f5844d2eb43be52911c862e87c06a8b92ac11cf3e6324c9c0
-
Filesize
92KB
MD5c85efd3e52db8b324766b667aa67062e
SHA1e25818ab9fb2307b1eacb2207179f9a2684ac444
SHA256d4e971a71362bf65143717a9e4e9198beac96c31ab7024b863757d01e436613d
SHA512d74daba5cae4d2b5022e2caa1a71c582664037f7c5abf30d3dc4098c7e43b9ea87f62809417e47afdea7e82f7cc8f42a0fea3b1addb7df538d9f4e8055cab4d6
-
Filesize
92KB
MD5fe9131f37a65b9b724dbb81b886a22a3
SHA15beb43142930cfcf3193d703db95d05462fa11d4
SHA2565bb7af23dda09b843a100a9d648ed599a26557ba86c9886bc519b84eacbf72ec
SHA5121ed451ffa126187592d6339314b530adce01b9fc9447f509b0acbf4ceba177d28cc1afea927dbf0a43d41dedadf6c20d43eb470158d1d79f05b98e9f0c6ae01e
-
Filesize
92KB
MD5c314a7e675ef1b24d3efd227bc4d25fc
SHA1425120e8084143c15c4291b0cba5ea344a23db25
SHA2567b69a61dc72cc7718ff1454fccab34c6150cf727bdb0d64fa56a78a40253a895
SHA512eb28200ab814f5350c02413c72101d2109eb324338489530ecfc34ab3b3015575b63a5c5d7223d9a28ab6a0ecb0d7e7965c91769927871df7ccd3024cd8a7b53
-
Filesize
92KB
MD5fc5cc0cf1e2214be1ddd6064531dea5b
SHA1c6e555261364555dcd223801a364313da044dbe5
SHA2562b2155aaf3f54fc799a628660c150ecaf029e0a5847a4b7a2022f496eb265a4f
SHA512dad35147f336fdc3e88028de7907466004b0ae2305fb0e3b3f78436ef0d7643102924570153cf78fcb06524c216b44b8ab3a97d4c59a5974eb3bdd40a50bc3e4
-
Filesize
92KB
MD53fa0b5e54eb77ed14805669d10850b18
SHA12f2478844fdc75324947045773775d87d6069b50
SHA25647f7b0132f075e145b2fbcb23ecb63f1bc105b15a57181eb2796a0b64e78ee3a
SHA5121ba9b473cb022e058c1651e37ecffe44e0a0beabd2cf0e9881442c48ea163f1a2115cb7ba0d19829be316a2ea0f4af265208f849b645d4bc6786d2f3d74295ed
-
Filesize
92KB
MD53c15b40ddff8f2ddd4d917e38708f6a4
SHA17facc99a28fbd7ea60ed4c10bf757a0114d08b68
SHA2568d5be20ca6b36e74f381d4e717fefc2d0483fc578e8f3c6e8d2f3c0d4d1c4ebc
SHA512e16cc88a2ee0c8f4f0c882ed7ec9e436d43db72c0a738584d8f8520fac39ecd74809bda14945f49b7e513c7f8e742f42655708305f1d2d4c44144b448145d567
-
Filesize
92KB
MD516a7014d96cefde0ad796b94a1e524af
SHA1bfc25da8e48d7286dc131c9638e35cfbe3e8d190
SHA256975aca1a6129c4d71ba36d44fc32a9bb386668a0c3cd266fa3d81fb784375d50
SHA51200445fed91da422cc006e941dd8fc6d0ea454b62f4192cb531d7e88165d8778b11ada3156b8a2a8ea4b3ca3a1c3cf500d6dc936f0fa4321ef1bd11e71858e5c9
-
Filesize
92KB
MD597df68c8123ef51c11412fcd1152ff26
SHA163e1c1c4353f03e8b104a0033f970f25b8a9159d
SHA2560c6992f34a5ab77205c2ca09034eaf8a221aa9fc2d6e3fb7bfd81184aa45c651
SHA5124fc2f4cf463d0ce34ee317e91d32b9dfef2b2063926c6900cc8853736436c6e8f0a9605f2eedab47567f2cfafe908b98d0fdd86a629bfdc410d3d0458a31d206
-
Filesize
92KB
MD5cf07a7e0bdfe3318a86fe325066c23dc
SHA12c3885e69d66fcaf0de552f86a46afc10065f79d
SHA256d50f94b06191ef20024bf3e2cef919d6fd3a84dc43d2e9e9fd3b00324667cc91
SHA5127983eca5560b36ac6874b02da7ea1c2e10dfd2fd0e6f0a06ff92c3309709434c9932e247532a2b6acacfabfebbdfcc84a026a61f517c79217f3487db268fd0b7
-
Filesize
92KB
MD57bf0fa58d712505f384063dd1445f42a
SHA113ffc442de6aaef405844cfff8eb0964e9819486
SHA256205dcb0ae46554f35fe9c8da6e38d3df8c6dd8b5029b1a2ce75c405d4d0a1f65
SHA5120feaf309068774cefa49aa6f1ccbaef178eb850463d05e26578e7d9ec727e4e36e79b357774115313466d742add2a008cebe4fd38ed671d252be7fdc69a0d3f5
-
Filesize
92KB
MD5341091d3400c42a2ed8534b9fb8eaa12
SHA180c9eebe652d2c02fc2f9567be2d9efea4bde3fb
SHA2569a560baaa3f3b343646a596f4f48045f14b038a36bfa2337d9e4c013a43917c4
SHA512e6289f89764b70d08614c7465700593cd1c4a200597f4aad54bf804bed5615eed0e247a9b05be04b50edcdb2fef84c61c5fde21da03b6ba0f74fde0c1ea6eeed
-
Filesize
92KB
MD529840aba6efb5c63b7ab565ab0da8636
SHA113fe0c8e16b8a8e062d563dcd11bc455daa46992
SHA2569b8df958d46a405d6cf97a94e8d59091d38bc36a1125dc1b426d6eaef709ce3f
SHA51282746f114b65bb6c3793b3dd37a741cf34dc7ebcf75a4654be70e1bbb4ad26d1534b2bbeb4d75cba02d755ae7d11f35a3bb7887cd20c240f5f19a56b35258f8b
-
Filesize
92KB
MD50ab638442633295173d86130e8971802
SHA14c68f5e9b311c1b185de0610407e6cf84d1cb6d3
SHA256b74782fd7dae8d99e50bfdf3c8d3c8c926690f8044d1734afa795825091ef995
SHA5125ede3cdc6871fae61d4c32de1f4a3be88d499170d8a76dac3852aaa91c8325906b0cef36411a32a0d8e9720bbcf04c183c64aba66af5d8d35beaefccaebca28f
-
Filesize
92KB
MD59ceeae7f84ef5c7f0ca0a7c141b8cdc7
SHA1bae67748ca916cb27f7e864d8f87feec87cdbdc6
SHA2560b34218554166a2807d9c724da2f4116d3b46536488627bb24d34dd200f25a66
SHA512a8a5ae9029ad1cd728e77068a77d10d1ed85223d3a5b29758b847bf3c4f0bfd72d0112f15cc8986a5c7f6e02100ab39643354e984052daaf1e0b5414eceedcb4
-
Filesize
92KB
MD50e4d186e731feace9ea52251c12eb2af
SHA1f68461a0fc123f0cc31df68f597d46f651e212fa
SHA25610a13eb1721931b371160ded34bb48fbed3833fffb90b3099ba12071620d7e9f
SHA5122c5f5dbcdbb40a1146f1e987b9cba1a9ab79b583e4fc43fcf770976547a90fab490873ca6e2674400aa42e5ebb791cd7a710713e51fb28e8bbd459efcfd7e332
-
Filesize
92KB
MD57d96e613be5fa5bc106f9d8ea71a0eca
SHA165cc35833b18f1e7f1cd56707fd4926324c96744
SHA256609818cda6cbede857f75cb2a6960c784f6e36562fc772b8dfb1fcf3415c046a
SHA51210b1bf32100db1bd4051e719698f94f9ba0e4ab94b54d4f28ae7bf8207c0daa37597277d35cd8da3f0ccec791e4b2cb8be5ec0cb522f9b6c24cd8803c640883b
-
Filesize
92KB
MD56a7c8ab83d7202d8d04381187ed527fc
SHA163b89ecba9fb3d0f2e8a2ad0ff1598dc90bfbf99
SHA256fafafbfdbd2d5646243a7d7e28a03ac08cedea8ae3b7c166af8e26f80f5ac006
SHA512f057dbd3f797421815514f6950cebe86d9893b447abd21e5a1904b7c925d6dbc96965b957c878f283da22823d40935a2309bd0042ba67894b646891a037a6a95
-
Filesize
92KB
MD58900708ab2f463205ab3cbcf5202cb7a
SHA150ee88d32ec176ae077d0359f72cb4242cb19cd9
SHA25669bf711c20310f4959ac4cf5aa00c75fab3d6baf6908ddc7bd214c8eedea6b4f
SHA512daf564cdbd7bd028668645c9cee820fccdd3eb2634bee761496d05fac0a9cfc6bd0a608a6ea87a1c17de356feb36c36b8df9279cb7b6eb5e27da96f8cf3e99fb
-
Filesize
92KB
MD5af0f7819573c730954e3a24685efb87d
SHA1ef73fb9869c2c72c427fbd2bbea6aff5c7057148
SHA2560f4a9e350528a1d6ab769bdbc88a6221aac996cb3664b66e15010e557639988e
SHA512e9ea8e3f8ff26ce846c412544d049a83e2d717c399f99438721a75fad53b7fa6c37cacd5e7fc24e85aee95c7b66ffb5b5f1fc9419c786c760174e77e24d83444
-
Filesize
92KB
MD5ac1e258cd14a458e4a2173cc3a5c0c26
SHA1458ea64629e6c9bd56ee883f14830e90b4021e83
SHA256ad5985372ac3866703190a7cdf0094931cf5a03bc86006c7d4401de8d11ac96a
SHA5126be32275584bd647a5740d981193deeffa65145fd6163683dbe617375230cead57f2120cae87148447c974335274eced810e3e74b7d0cb7ab2939bd7d712b41a
-
Filesize
92KB
MD57d02ecdc2c6a2832a6e23ce6a6cc89fd
SHA16515710a26f71f31086e388b39ca64ab89247e55
SHA256bbcf78213d8938a13e18e00ec0f5b4b6b53429fe8eadf154217996fa746f62c8
SHA51277514359930623552813120926905834819cabe51ea3ad8929fca4be3a6a76496bd9231a05a54262feeeaa3b9eb970cc86896247793070d9f3ecfee86438625c
-
Filesize
92KB
MD577ac3a640b6b0cbe712663a118793330
SHA12180d7ba415c3483253793a1025e4bddc22e04fe
SHA256e2bb45eeca78f3ddfe96e4b1d7f0449714196be9efcee1b721d23c85803f78e9
SHA5126a68b96f366185f63783e451243e37e9375daa7f455445055a0681f3ad9587d85ed6d1e461d7abdb5783e5b297923361bf129be2858487b95bfe9ab0b12dd108