Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
124s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
09/07/2024, 02:33
Static task
static1
Behavioral task
behavioral1
Sample
21bfb89940c27475155ba34b9c6380a0N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
21bfb89940c27475155ba34b9c6380a0N.exe
Resource
win10v2004-20240704-en
General
-
Target
21bfb89940c27475155ba34b9c6380a0N.exe
-
Size
397KB
-
MD5
21bfb89940c27475155ba34b9c6380a0
-
SHA1
65a5d8491e9f0e2c67cec9762a17b5614ad9aca6
-
SHA256
3914d4baa9d3686d98d1ec48e2865e883425140af90e4954c6547e470a617700
-
SHA512
7e37ac20c2d78e0ae7185a1115bd944891419a41bc662e1bb6ac00ad538ab275c539d6b6fcd0deec4ded20451be1e1d7bf201a113363d09d43b3d86d9aed1071
-
SSDEEP
6144:fewPKi7GKMxjVFM6234lKm3mo8Yvi4KsLTFM6234lKm3pT11Tgkz1581hW:mpi7G5ZFB24lwR45FB24lzx1skz15L
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 34 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eaceghcg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fdmaoahm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Fjmfmh32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 21bfb89940c27475155ba34b9c6380a0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ecbeip32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Edaaccbj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ekngemhd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fklcgk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Enlcahgh.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fqphic32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fkgillpj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fjmfmh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Fbaahf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ecbeip32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ekngemhd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Enlcahgh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Edihdb32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fjhmbihg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ephbhd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ejccgi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Fkgillpj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fbaahf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Edihdb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Fjeplijj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Fklcgk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Eaceghcg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Edaaccbj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Fjhmbihg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Fdmaoahm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" 21bfb89940c27475155ba34b9c6380a0N.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ephbhd32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ejccgi32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fjeplijj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Fqphic32.exe -
Executes dropped EXE 17 IoCs
pid Process 4300 Ecbeip32.exe 884 Eaceghcg.exe 2576 Edaaccbj.exe 4940 Ephbhd32.exe 3424 Ekngemhd.exe 1332 Enlcahgh.exe 1804 Ejccgi32.exe 2320 Edihdb32.exe 1280 Fjeplijj.exe 4412 Fqphic32.exe 4192 Fjhmbihg.exe 3620 Fdmaoahm.exe 3876 Fkgillpj.exe 2968 Fbaahf32.exe 1304 Fjmfmh32.exe 4276 Fklcgk32.exe 3032 Gddgpqbe.exe -
Drops file in System32 directory 51 IoCs
description ioc Process File created C:\Windows\SysWOW64\Fdmaoahm.exe Fjhmbihg.exe File created C:\Windows\SysWOW64\Celhnb32.dll Fjmfmh32.exe File created C:\Windows\SysWOW64\Mfikmmob.dll Ekngemhd.exe File created C:\Windows\SysWOW64\Fjinnekj.dll Fdmaoahm.exe File created C:\Windows\SysWOW64\Fklcgk32.exe Fjmfmh32.exe File created C:\Windows\SysWOW64\Fjeplijj.exe Edihdb32.exe File opened for modification C:\Windows\SysWOW64\Ekngemhd.exe Ephbhd32.exe File opened for modification C:\Windows\SysWOW64\Edihdb32.exe Ejccgi32.exe File created C:\Windows\SysWOW64\Fbaahf32.exe Fkgillpj.exe File created C:\Windows\SysWOW64\Gddgpqbe.exe Fklcgk32.exe File created C:\Windows\SysWOW64\Klfhhpnk.dll Fbaahf32.exe File opened for modification C:\Windows\SysWOW64\Gddgpqbe.exe Fklcgk32.exe File created C:\Windows\SysWOW64\Ephbhd32.exe Edaaccbj.exe File opened for modification C:\Windows\SysWOW64\Ejccgi32.exe Enlcahgh.exe File created C:\Windows\SysWOW64\Cnidqf32.dll Fqphic32.exe File opened for modification C:\Windows\SysWOW64\Fdmaoahm.exe Fjhmbihg.exe File created C:\Windows\SysWOW64\Ofjljj32.dll Ejccgi32.exe File created C:\Windows\SysWOW64\Fkgillpj.exe Fdmaoahm.exe File opened for modification C:\Windows\SysWOW64\Ephbhd32.exe Edaaccbj.exe File created C:\Windows\SysWOW64\Flpbbbdk.dll Ecbeip32.exe File opened for modification C:\Windows\SysWOW64\Fjeplijj.exe Edihdb32.exe File opened for modification C:\Windows\SysWOW64\Fqphic32.exe Fjeplijj.exe File created C:\Windows\SysWOW64\Kplqhmfl.dll Enlcahgh.exe File created C:\Windows\SysWOW64\Iffahdpm.dll Fjeplijj.exe File created C:\Windows\SysWOW64\Egnelfnm.dll Fkgillpj.exe File opened for modification C:\Windows\SysWOW64\Fklcgk32.exe Fjmfmh32.exe File created C:\Windows\SysWOW64\Fllinoed.dll Edaaccbj.exe File created C:\Windows\SysWOW64\Edihdb32.exe Ejccgi32.exe File created C:\Windows\SysWOW64\Eacdhhjj.dll Edihdb32.exe File created C:\Windows\SysWOW64\Cjeejn32.dll Eaceghcg.exe File opened for modification C:\Windows\SysWOW64\Enlcahgh.exe Ekngemhd.exe File created C:\Windows\SysWOW64\Ejccgi32.exe Enlcahgh.exe File created C:\Windows\SysWOW64\Ecbeip32.exe 21bfb89940c27475155ba34b9c6380a0N.exe File created C:\Windows\SysWOW64\Enlcahgh.exe Ekngemhd.exe File created C:\Windows\SysWOW64\Fjhmbihg.exe Fqphic32.exe File created C:\Windows\SysWOW64\Fjmfmh32.exe Fbaahf32.exe File opened for modification C:\Windows\SysWOW64\Fkgillpj.exe Fdmaoahm.exe File opened for modification C:\Windows\SysWOW64\Fbaahf32.exe Fkgillpj.exe File created C:\Windows\SysWOW64\Camgolnm.dll 21bfb89940c27475155ba34b9c6380a0N.exe File created C:\Windows\SysWOW64\Eaceghcg.exe Ecbeip32.exe File created C:\Windows\SysWOW64\Fqphic32.exe Fjeplijj.exe File opened for modification C:\Windows\SysWOW64\Fjhmbihg.exe Fqphic32.exe File created C:\Windows\SysWOW64\Ekngemhd.exe Ephbhd32.exe File created C:\Windows\SysWOW64\Kamonn32.dll Ephbhd32.exe File created C:\Windows\SysWOW64\Djojepof.dll Fjhmbihg.exe File opened for modification C:\Windows\SysWOW64\Edaaccbj.exe Eaceghcg.exe File opened for modification C:\Windows\SysWOW64\Fjmfmh32.exe Fbaahf32.exe File opened for modification C:\Windows\SysWOW64\Ecbeip32.exe 21bfb89940c27475155ba34b9c6380a0N.exe File created C:\Windows\SysWOW64\Jcggmk32.dll Fklcgk32.exe File opened for modification C:\Windows\SysWOW64\Eaceghcg.exe Ecbeip32.exe File created C:\Windows\SysWOW64\Edaaccbj.exe Eaceghcg.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3900 3032 WerFault.exe 108 -
Modifies registry class 54 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Fqphic32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Ecbeip32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Ephbhd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kplqhmfl.dll" Enlcahgh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Ejccgi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Celhnb32.dll" Fjmfmh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Fjmfmh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Enlcahgh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eacdhhjj.dll" Edihdb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831} 21bfb89940c27475155ba34b9c6380a0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Flpbbbdk.dll" Ecbeip32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cjeejn32.dll" Eaceghcg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Edaaccbj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Enlcahgh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Ejccgi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Camgolnm.dll" 21bfb89940c27475155ba34b9c6380a0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Eaceghcg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Djojepof.dll" Fjhmbihg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Fbaahf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 21bfb89940c27475155ba34b9c6380a0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Ekngemhd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Edihdb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Fjhmbihg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Edaaccbj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Ekngemhd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mfikmmob.dll" Ekngemhd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ofjljj32.dll" Ejccgi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fllinoed.dll" Edaaccbj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Iffahdpm.dll" Fjeplijj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cnidqf32.dll" Fqphic32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fjinnekj.dll" Fdmaoahm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Fklcgk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node 21bfb89940c27475155ba34b9c6380a0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Ecbeip32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Fjeplijj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Egnelfnm.dll" Fkgillpj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Eaceghcg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Fjeplijj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Ephbhd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Edihdb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Fjmfmh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Fkgillpj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID 21bfb89940c27475155ba34b9c6380a0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Fqphic32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Fdmaoahm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Fdmaoahm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Fbaahf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Fklcgk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" 21bfb89940c27475155ba34b9c6380a0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Fkgillpj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Klfhhpnk.dll" Fbaahf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kamonn32.dll" Ephbhd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Fjhmbihg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jcggmk32.dll" Fklcgk32.exe -
Suspicious use of WriteProcessMemory 51 IoCs
description pid Process procid_target PID 2400 wrote to memory of 4300 2400 21bfb89940c27475155ba34b9c6380a0N.exe 89 PID 2400 wrote to memory of 4300 2400 21bfb89940c27475155ba34b9c6380a0N.exe 89 PID 2400 wrote to memory of 4300 2400 21bfb89940c27475155ba34b9c6380a0N.exe 89 PID 4300 wrote to memory of 884 4300 Ecbeip32.exe 90 PID 4300 wrote to memory of 884 4300 Ecbeip32.exe 90 PID 4300 wrote to memory of 884 4300 Ecbeip32.exe 90 PID 884 wrote to memory of 2576 884 Eaceghcg.exe 91 PID 884 wrote to memory of 2576 884 Eaceghcg.exe 91 PID 884 wrote to memory of 2576 884 Eaceghcg.exe 91 PID 2576 wrote to memory of 4940 2576 Edaaccbj.exe 92 PID 2576 wrote to memory of 4940 2576 Edaaccbj.exe 92 PID 2576 wrote to memory of 4940 2576 Edaaccbj.exe 92 PID 4940 wrote to memory of 3424 4940 Ephbhd32.exe 93 PID 4940 wrote to memory of 3424 4940 Ephbhd32.exe 93 PID 4940 wrote to memory of 3424 4940 Ephbhd32.exe 93 PID 3424 wrote to memory of 1332 3424 Ekngemhd.exe 95 PID 3424 wrote to memory of 1332 3424 Ekngemhd.exe 95 PID 3424 wrote to memory of 1332 3424 Ekngemhd.exe 95 PID 1332 wrote to memory of 1804 1332 Enlcahgh.exe 97 PID 1332 wrote to memory of 1804 1332 Enlcahgh.exe 97 PID 1332 wrote to memory of 1804 1332 Enlcahgh.exe 97 PID 1804 wrote to memory of 2320 1804 Ejccgi32.exe 98 PID 1804 wrote to memory of 2320 1804 Ejccgi32.exe 98 PID 1804 wrote to memory of 2320 1804 Ejccgi32.exe 98 PID 2320 wrote to memory of 1280 2320 Edihdb32.exe 100 PID 2320 wrote to memory of 1280 2320 Edihdb32.exe 100 PID 2320 wrote to memory of 1280 2320 Edihdb32.exe 100 PID 1280 wrote to memory of 4412 1280 Fjeplijj.exe 101 PID 1280 wrote to memory of 4412 1280 Fjeplijj.exe 101 PID 1280 wrote to memory of 4412 1280 Fjeplijj.exe 101 PID 4412 wrote to memory of 4192 4412 Fqphic32.exe 102 PID 4412 wrote to memory of 4192 4412 Fqphic32.exe 102 PID 4412 wrote to memory of 4192 4412 Fqphic32.exe 102 PID 4192 wrote to memory of 3620 4192 Fjhmbihg.exe 103 PID 4192 wrote to memory of 3620 4192 Fjhmbihg.exe 103 PID 4192 wrote to memory of 3620 4192 Fjhmbihg.exe 103 PID 3620 wrote to memory of 3876 3620 Fdmaoahm.exe 104 PID 3620 wrote to memory of 3876 3620 Fdmaoahm.exe 104 PID 3620 wrote to memory of 3876 3620 Fdmaoahm.exe 104 PID 3876 wrote to memory of 2968 3876 Fkgillpj.exe 105 PID 3876 wrote to memory of 2968 3876 Fkgillpj.exe 105 PID 3876 wrote to memory of 2968 3876 Fkgillpj.exe 105 PID 2968 wrote to memory of 1304 2968 Fbaahf32.exe 106 PID 2968 wrote to memory of 1304 2968 Fbaahf32.exe 106 PID 2968 wrote to memory of 1304 2968 Fbaahf32.exe 106 PID 1304 wrote to memory of 4276 1304 Fjmfmh32.exe 107 PID 1304 wrote to memory of 4276 1304 Fjmfmh32.exe 107 PID 1304 wrote to memory of 4276 1304 Fjmfmh32.exe 107 PID 4276 wrote to memory of 3032 4276 Fklcgk32.exe 108 PID 4276 wrote to memory of 3032 4276 Fklcgk32.exe 108 PID 4276 wrote to memory of 3032 4276 Fklcgk32.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\21bfb89940c27475155ba34b9c6380a0N.exe"C:\Users\Admin\AppData\Local\Temp\21bfb89940c27475155ba34b9c6380a0N.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Windows\SysWOW64\Ecbeip32.exeC:\Windows\system32\Ecbeip32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4300 -
C:\Windows\SysWOW64\Eaceghcg.exeC:\Windows\system32\Eaceghcg.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:884 -
C:\Windows\SysWOW64\Edaaccbj.exeC:\Windows\system32\Edaaccbj.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Windows\SysWOW64\Ephbhd32.exeC:\Windows\system32\Ephbhd32.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Windows\SysWOW64\Ekngemhd.exeC:\Windows\system32\Ekngemhd.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3424 -
C:\Windows\SysWOW64\Enlcahgh.exeC:\Windows\system32\Enlcahgh.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Windows\SysWOW64\Ejccgi32.exeC:\Windows\system32\Ejccgi32.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Windows\SysWOW64\Edihdb32.exeC:\Windows\system32\Edihdb32.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Windows\SysWOW64\Fjeplijj.exeC:\Windows\system32\Fjeplijj.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Windows\SysWOW64\Fqphic32.exeC:\Windows\system32\Fqphic32.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4412 -
C:\Windows\SysWOW64\Fjhmbihg.exeC:\Windows\system32\Fjhmbihg.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4192 -
C:\Windows\SysWOW64\Fdmaoahm.exeC:\Windows\system32\Fdmaoahm.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3620 -
C:\Windows\SysWOW64\Fkgillpj.exeC:\Windows\system32\Fkgillpj.exe14⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3876 -
C:\Windows\SysWOW64\Fbaahf32.exeC:\Windows\system32\Fbaahf32.exe15⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Windows\SysWOW64\Fjmfmh32.exeC:\Windows\system32\Fjmfmh32.exe16⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Windows\SysWOW64\Fklcgk32.exeC:\Windows\system32\Fklcgk32.exe17⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4276 -
C:\Windows\SysWOW64\Gddgpqbe.exeC:\Windows\system32\Gddgpqbe.exe18⤵
- Executes dropped EXE
PID:3032 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3032 -s 41219⤵
- Program crash
PID:3900
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3032 -ip 30321⤵PID:4612
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4432,i,4226873509039249198,15952596839998010243,262144 --variations-seed-version --mojo-platform-channel-handle=4584 /prefetch:81⤵PID:1004
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
397KB
MD5d22ac70ecea86dc07ef29edefd580bf1
SHA18e1069ebce2ca9e285ad0fb9a4af008f4a6989ff
SHA256d53e1f4f6113b4b7783d7f6604529bd8879aa9e1869de593555ff09b371ca77f
SHA5126278c7cecfe3280eba028ad7764b21b7161ff1d62dac340dae0e479a5d6567d36b6613fc4a083a3ea5879d51a4114ef85edfdc97a1771604cd68206b700dddc9
-
Filesize
397KB
MD5646a436a60fba62ec0343798d7b1718c
SHA1582e62d2f4c818c1bff8c5df4d0b6856e4278b79
SHA25687f2f20e9ecf6c17606b097e8512bda06d9c291ce6348d3d7f783a83c9a069da
SHA512bbfd7a962f2394e16323c2ea27d130e077869eb1c304477f3496d8d16b0da2f15845daaa866830e2fcfa113dd88710a3b32a20527be850c9bb630f7f13d214ef
-
Filesize
397KB
MD519ec2b9c6074ece2cef5d79bd383e5e5
SHA1da934e26fc27d8a1b7239daadb8830be5e261fda
SHA2568ebf2f2d73a3d8a707b535fbc540fbe3400cb5ba49336e295d1347ddc341d70d
SHA5122a09218580e0e77a1f6b9ca754931fe462347943b615ddcb22727c01a957fa6e49cebca855bcdf51749a06221f4b164bc54a4cd1060b31f4b52e3ebb80cf9a1a
-
Filesize
397KB
MD5f26ff0b145acf16b4a22f099dbe72fe2
SHA1308f79cc345ef8cdd657306631d530acf74897b1
SHA25647eeff729a5d7627cd2fcfa60e0a3c293a48e5e2493eef6fd6dfca06d462336a
SHA51256233e36170c43a473109b5f106176979792bc8990f6af1e6ae0bc75c1b7bc39322816dca16fa0af0f73faec0cbe362aea26e031cbb716989cdc8dc868df97ed
-
Filesize
397KB
MD557a3b6e11721254a66d8a99638b48f23
SHA143187c5fb3faf5e4cd9cf949b1781e43ea5ebfd7
SHA256448250d5329243f4fa7804a2e2d7a5e19e8ab08653c8e376302b58b88a570741
SHA51245dae8960265f5133b62b0425ae79550f16d866c342e7fc94426f53e3d316fd793f30f6ed5dac358ac0a048d60fb96a4aa4ca658555d5f9a46b43b55a54dfc0d
-
Filesize
397KB
MD5d898e9b71a5bef09a6ffeb91eb8c52ad
SHA1e5fa61112c109375cee7e6f53f63c9bffd844f8e
SHA256c3cab88507a39982621f6d05add7b75aebc1c6d8929cdbfda92e00cd49ce5e8a
SHA512ac12744436d70eb4a1d181916169a35c6926e590c7f87b5b59fd556674f8ff90547245b2069879adf1af7fbec30656038c68ddef3746ccd7f6e201b38cee3e8c
-
Filesize
397KB
MD57f765e3866097ee21ad693632282a86c
SHA180948ff231cd68f01ae18478761c39250f6e39c2
SHA2560bc8e15d6433f4256a3454a5792985b2f6ce1ed2a7ab49902f9efd556f3b378d
SHA512fe043ba1538037bbe5fe68ff9a949311c4663c9b70022ddd3b967ed4b5871585196453f98f6ee6f2b8c5a093cc623b2db5fc3f71b058ed27962061cf82b6fd68
-
Filesize
397KB
MD5223559e64b73c329be20d3e2218e58fb
SHA149ff4c330c2960c8496c7f7a3ee037f329ff6e97
SHA25626f84493148a21ffcbcd2a6907a5492578c36c041974c8ac3da6a8eeb5d89889
SHA512e9e517b45a0a30da38ec20b0a7b12bc4f6b2c4d58b538567af582daa2cb6b58e3c8e20d2aa961298f7f3ab6f682f35b236a20fc913992b65c6923c4dd793112a
-
Filesize
397KB
MD5ab69b6df47c9d527702ea26c2c2cd6b4
SHA1ec77cced8be9d256018d396f5d888ecac1122395
SHA2564386b24c41ddc533cbeb08e4bbd20ea94d054dceb7ab437ad48fd657f2141328
SHA512d7acec8afd9af21e58e67c637ac635fa2c1302c3b4902993ca624aa776e5ee506854d542971d70fec528eeba821bfc22b5bbc17417d16d0d1265e2bc43644b47
-
Filesize
397KB
MD5b254da2ac72700d7beb09ee5be9074bb
SHA1092658efec7b43f286f1dcac2597d203336f45d9
SHA256afd31c2e1124e4b5ac2b246b176cfba743423dfc9980c0c03273e8134414f140
SHA512b2437c6245db1791d4f83bd18d3bd5378a71fbc0a3771c74fac48f02ee25ccac23e89c53440c86c00457bab4479457979f6acd597222daf83a08e13e3f4ff43c
-
Filesize
397KB
MD58679c5511d8a50362ce2160a04398e4e
SHA166045908fb45eaf4e6de5c0bda84fcf6f70c2833
SHA256b9ec7788b04cb7421dc9fcc9349dcdded414a920439725c0b28a677149c86cce
SHA512332385ba1071f4a8e025199f34ad948b2d6fa1eb894f61d97c2c0dd6c3bf3de6b0b00fe853dda50021eb466bf72c0248d4864b26e47a2fba1b321af0978ca8bd
-
Filesize
397KB
MD5d540216d9db5451fbbdcaaaccac9b32e
SHA1ccf56270e330e18f39514906e7cd9a8dbe616343
SHA256a715d1865fdec96552c0cebd284225e716444e61c92cc719b89bc237f87173e7
SHA512c4ca3e8184fc80fde60644e4812ef12d24ac7b9feada961848f454ed5f27389a60bf22a477149a4751ba086831202a1e1ccc16d1139304b540207ef59fc8a530
-
Filesize
397KB
MD5f082c64879f87532a87892e5d85da4f7
SHA17d9cb65e4cfca0b827e0765832d87abad1cc18ed
SHA2565d4f1745b0bdb66877741d03d7c157cf5f466ec7ee78ad37dd6a26715c77fc54
SHA51249b4aae0e39a17f002c70aee8ee9478951ceea019d5622595bcc57674a2c9edd3e0cc6d32e31c22b3301c64d0bc2e931e41fe911106e3eb03c76592d73f26c7a
-
Filesize
397KB
MD59caaecc91f30623efb3aa1300fb5da83
SHA15cbfa62d70eabd6884daf048203250b22abb2f78
SHA2561d0f186a97ae3325dc34c6efd2af95a52c8bc5f9a828bb50efc0661288e64b61
SHA512394120214167ef68c42f539d81cabff07cf9afaf88cefa3adc9a46b714c84aefce8d4e41c4c8524a07e08d32828ce574e58799c36a63eb2f11af84fff3907a83
-
Filesize
397KB
MD5d813b41bfa0654a76c9f2391fded394e
SHA15e28259c88ebb62bf07cca584cd92e841f7b58c6
SHA256d7c773652f1ff072f5453e59dbba86ed71452311ac8522c554624f57756247c4
SHA512af90ca505641c65765b1c9c1be389e77c85314433d71c9ffed0dc38e139660b924327b34bd9e22aad95c9afdca36839a9502158da4049774428e066716c0ab85
-
Filesize
397KB
MD56b4e858757885edebe2eb92d8701a008
SHA12bcfcadf0a0af86360040ceeda93d1d8f2e868d9
SHA2569fbb71d542a5245661ebeb09b560232a77433ffca6fc5994d752819554cf9a01
SHA51226678aadf8ee53ca517726661b005a517481ff59e57fb627ae67bfa59d4086f5dbda1af70801fd85599b2661b535c93e1f34f30e9ff942d46113ae33dd6cb4b0
-
Filesize
397KB
MD566f5e9798e35310ecfbb3f7ac3681a1a
SHA14699f5070f4a3d6fa27622713df024cc0ad9de36
SHA2565cdc1faf9dbdf5732c5b09ae8934fc45871bd410f3088806486f479f8b1313ec
SHA512725934accc560b6daa0fdbed4a77b2d3857e39a3627a0536c0ed1d9fe95d139622a22385ef96bb2f08d86df1d5f400524c1efb0658293786ffda6d50a337b757
-
Filesize
397KB
MD59921ce71f72ffe17c156bc39d7f703b6
SHA1cd3f6cf2ffc4005a795ed1c7a602403157049e1e
SHA2560ed5637ba53b1346dcc83127fa8867d03aa64763fd8aa0971d734d88ac1a1a28
SHA512ae22f5391f884abf4b9079fc9cddddb1ed79c69fa1bc9d2bfd9980d7ef9502ae55160331baa8d34ad8e9ab3cf23ef4f09e01b106950d055eb99478de15779cd3
-
Filesize
7KB
MD5b0d56a461789a628f5dc2c7dfcb0da1d
SHA17038de3913ec9d59f6e7321b4aff4006dd60d62e
SHA256455b57ee3a5cf9adb5f3a72d77347f9a0c9ada38e7c66146b7cb5d29707755d2
SHA512136a8fb17ca46609bc8d3300f55133fb12d18008cd03a26e1be18b87b8ba7c2bd35fbf01821562ffc3b9eae8ef9fbea3f527b2ea848c5b5a6f050cd355c7e0c4