Analysis
-
max time kernel
111s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21/07/2024, 20:18
Static task
static1
Behavioral task
behavioral1
Sample
057cb3db46651f881bfd293cb7e5c0d0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
057cb3db46651f881bfd293cb7e5c0d0N.exe
Resource
win10v2004-20240709-en
General
-
Target
057cb3db46651f881bfd293cb7e5c0d0N.exe
-
Size
165KB
-
MD5
057cb3db46651f881bfd293cb7e5c0d0
-
SHA1
7bcde8aa2e205c3a4b033247730b3e7b959c8786
-
SHA256
0ab5e53166c0a43a608f29012cae1d8f3fc595b7cc627b68fef47cff7e6d8244
-
SHA512
ac5b78d3d72bf0c9cc07c027065d393f86034d7dee16f2c9d4c7a2988980e8c5c3085b4d523435ef156bc7e983ef56b8028d4c11e9fdff1ca27edde32448b96d
-
SSDEEP
3072:Jup/KaCja+FV8rPJWANROJT3vQfEdArGzHq+egM5bylnO/hZP:JYKaCkhNoJbQMdArGzHregqgnO
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 34 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Beggec32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cggcofkf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Clclhmin.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ckiiiine.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bphaglgo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Beggec32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Clclhmin.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ccpqjfnh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cdamao32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bdfjnkne.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ciepkajj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ciepkajj.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cobhdhha.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cobhdhha.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Chjmmnnb.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cdamao32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Blobmm32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ckiiiine.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Clhecl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cofaog32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Chofhm32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bdfjnkne.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Chjmmnnb.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cofaog32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Blobmm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ccpqjfnh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bopknhjd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cggcofkf.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Chofhm32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bopknhjd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" 057cb3db46651f881bfd293cb7e5c0d0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bphaglgo.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Clhecl32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 057cb3db46651f881bfd293cb7e5c0d0N.exe -
Executes dropped EXE 17 IoCs
pid Process 2332 Bphaglgo.exe 1884 Blobmm32.exe 2980 Bdfjnkne.exe 2964 Beggec32.exe 2724 Bopknhjd.exe 2380 Cggcofkf.exe 2452 Ciepkajj.exe 2204 Clclhmin.exe 2900 Cobhdhha.exe 3008 Chjmmnnb.exe 1908 Ckiiiine.exe 944 Ccpqjfnh.exe 584 Cdamao32.exe 2120 Clhecl32.exe 2280 Cofaog32.exe 1632 Chofhm32.exe 1940 Coindgbi.exe -
Loads dropped DLL 34 IoCs
pid Process 2164 057cb3db46651f881bfd293cb7e5c0d0N.exe 2164 057cb3db46651f881bfd293cb7e5c0d0N.exe 2332 Bphaglgo.exe 2332 Bphaglgo.exe 1884 Blobmm32.exe 1884 Blobmm32.exe 2980 Bdfjnkne.exe 2980 Bdfjnkne.exe 2964 Beggec32.exe 2964 Beggec32.exe 2724 Bopknhjd.exe 2724 Bopknhjd.exe 2380 Cggcofkf.exe 2380 Cggcofkf.exe 2452 Ciepkajj.exe 2452 Ciepkajj.exe 2204 Clclhmin.exe 2204 Clclhmin.exe 2900 Cobhdhha.exe 2900 Cobhdhha.exe 3008 Chjmmnnb.exe 3008 Chjmmnnb.exe 1908 Ckiiiine.exe 1908 Ckiiiine.exe 944 Ccpqjfnh.exe 944 Ccpqjfnh.exe 584 Cdamao32.exe 584 Cdamao32.exe 2120 Clhecl32.exe 2120 Clhecl32.exe 2280 Cofaog32.exe 2280 Cofaog32.exe 1632 Chofhm32.exe 1632 Chofhm32.exe -
Drops file in System32 directory 51 IoCs
description ioc Process File created C:\Windows\SysWOW64\Cobhdhha.exe Clclhmin.exe File created C:\Windows\SysWOW64\Ggqbii32.dll Ckiiiine.exe File opened for modification C:\Windows\SysWOW64\Ccpqjfnh.exe Ckiiiine.exe File opened for modification C:\Windows\SysWOW64\Cdamao32.exe Ccpqjfnh.exe File opened for modification C:\Windows\SysWOW64\Blobmm32.exe Bphaglgo.exe File opened for modification C:\Windows\SysWOW64\Cobhdhha.exe Clclhmin.exe File opened for modification C:\Windows\SysWOW64\Bdfjnkne.exe Blobmm32.exe File created C:\Windows\SysWOW64\Jggdmb32.dll Blobmm32.exe File opened for modification C:\Windows\SysWOW64\Clhecl32.exe Cdamao32.exe File created C:\Windows\SysWOW64\Ciepkajj.exe Cggcofkf.exe File opened for modification C:\Windows\SysWOW64\Ckiiiine.exe Chjmmnnb.exe File opened for modification C:\Windows\SysWOW64\Chofhm32.exe Cofaog32.exe File created C:\Windows\SysWOW64\Cofaog32.exe Clhecl32.exe File opened for modification C:\Windows\SysWOW64\Coindgbi.exe Chofhm32.exe File created C:\Windows\SysWOW64\Beggec32.exe Bdfjnkne.exe File created C:\Windows\SysWOW64\Cggcofkf.exe Bopknhjd.exe File created C:\Windows\SysWOW64\Niienepq.dll Ccpqjfnh.exe File created C:\Windows\SysWOW64\Kbmamh32.dll Bdfjnkne.exe File created C:\Windows\SysWOW64\Pkknia32.dll Cofaog32.exe File opened for modification C:\Windows\SysWOW64\Cofaog32.exe Clhecl32.exe File created C:\Windows\SysWOW64\Chofhm32.exe Cofaog32.exe File created C:\Windows\SysWOW64\Hkfggj32.dll Clclhmin.exe File created C:\Windows\SysWOW64\Ohodgb32.dll Chofhm32.exe File created C:\Windows\SysWOW64\Ljkaejba.dll Bphaglgo.exe File opened for modification C:\Windows\SysWOW64\Beggec32.exe Bdfjnkne.exe File created C:\Windows\SysWOW64\Peapkpkj.dll Bopknhjd.exe File opened for modification C:\Windows\SysWOW64\Bopknhjd.exe Beggec32.exe File opened for modification C:\Windows\SysWOW64\Clclhmin.exe Ciepkajj.exe File created C:\Windows\SysWOW64\Dhhdmc32.dll Ciepkajj.exe File created C:\Windows\SysWOW64\Ccpqjfnh.exe Ckiiiine.exe File created C:\Windows\SysWOW64\Clclhmin.exe Ciepkajj.exe File created C:\Windows\SysWOW64\Jchbfbij.dll Chjmmnnb.exe File created C:\Windows\SysWOW64\Cfjjagic.dll 057cb3db46651f881bfd293cb7e5c0d0N.exe File opened for modification C:\Windows\SysWOW64\Ciepkajj.exe Cggcofkf.exe File created C:\Windows\SysWOW64\Iibogmjf.dll Cggcofkf.exe File created C:\Windows\SysWOW64\Lfehem32.dll Cdamao32.exe File created C:\Windows\SysWOW64\Blobmm32.exe Bphaglgo.exe File created C:\Windows\SysWOW64\Bdfjnkne.exe Blobmm32.exe File opened for modification C:\Windows\SysWOW64\Chjmmnnb.exe Cobhdhha.exe File opened for modification C:\Windows\SysWOW64\Cggcofkf.exe Bopknhjd.exe File created C:\Windows\SysWOW64\Chjmmnnb.exe Cobhdhha.exe File created C:\Windows\SysWOW64\Clhecl32.exe Cdamao32.exe File created C:\Windows\SysWOW64\Bphaglgo.exe 057cb3db46651f881bfd293cb7e5c0d0N.exe File opened for modification C:\Windows\SysWOW64\Bphaglgo.exe 057cb3db46651f881bfd293cb7e5c0d0N.exe File created C:\Windows\SysWOW64\Coindgbi.exe Chofhm32.exe File created C:\Windows\SysWOW64\Ckiiiine.exe Chjmmnnb.exe File created C:\Windows\SysWOW64\Cdamao32.exe Ccpqjfnh.exe File created C:\Windows\SysWOW64\Elnlcjph.dll Clhecl32.exe File created C:\Windows\SysWOW64\Bopknhjd.exe Beggec32.exe File created C:\Windows\SysWOW64\Cbiphidl.dll Beggec32.exe File created C:\Windows\SysWOW64\Clmkgm32.dll Cobhdhha.exe -
Modifies registry class 54 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cbiphidl.dll" Beggec32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Chofhm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Peapkpkj.dll" Bopknhjd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cggcofkf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jchbfbij.dll" Chjmmnnb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pkknia32.dll" Cofaog32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cofaog32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node 057cb3db46651f881bfd293cb7e5c0d0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bphaglgo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cofaog32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bdfjnkne.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cggcofkf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ccpqjfnh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Blobmm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bopknhjd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 057cb3db46651f881bfd293cb7e5c0d0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ciepkajj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Clclhmin.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Chjmmnnb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cdamao32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Blobmm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ciepkajj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Beggec32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bopknhjd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Chofhm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" 057cb3db46651f881bfd293cb7e5c0d0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jggdmb32.dll" Blobmm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ohodgb32.dll" Chofhm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ckiiiine.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lfehem32.dll" Cdamao32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Clmkgm32.dll" Cobhdhha.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ggqbii32.dll" Ckiiiine.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Niienepq.dll" Ccpqjfnh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bdfjnkne.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dhhdmc32.dll" Ciepkajj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hkfggj32.dll" Clclhmin.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Clhecl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cobhdhha.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cdamao32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Clhecl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cfjjagic.dll" 057cb3db46651f881bfd293cb7e5c0d0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ljkaejba.dll" Bphaglgo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} 057cb3db46651f881bfd293cb7e5c0d0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ccpqjfnh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Clclhmin.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cobhdhha.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Chjmmnnb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Elnlcjph.dll" Clhecl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kbmamh32.dll" Bdfjnkne.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Beggec32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Iibogmjf.dll" Cggcofkf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ckiiiine.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID 057cb3db46651f881bfd293cb7e5c0d0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bphaglgo.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2164 wrote to memory of 2332 2164 057cb3db46651f881bfd293cb7e5c0d0N.exe 30 PID 2164 wrote to memory of 2332 2164 057cb3db46651f881bfd293cb7e5c0d0N.exe 30 PID 2164 wrote to memory of 2332 2164 057cb3db46651f881bfd293cb7e5c0d0N.exe 30 PID 2164 wrote to memory of 2332 2164 057cb3db46651f881bfd293cb7e5c0d0N.exe 30 PID 2332 wrote to memory of 1884 2332 Bphaglgo.exe 31 PID 2332 wrote to memory of 1884 2332 Bphaglgo.exe 31 PID 2332 wrote to memory of 1884 2332 Bphaglgo.exe 31 PID 2332 wrote to memory of 1884 2332 Bphaglgo.exe 31 PID 1884 wrote to memory of 2980 1884 Blobmm32.exe 32 PID 1884 wrote to memory of 2980 1884 Blobmm32.exe 32 PID 1884 wrote to memory of 2980 1884 Blobmm32.exe 32 PID 1884 wrote to memory of 2980 1884 Blobmm32.exe 32 PID 2980 wrote to memory of 2964 2980 Bdfjnkne.exe 33 PID 2980 wrote to memory of 2964 2980 Bdfjnkne.exe 33 PID 2980 wrote to memory of 2964 2980 Bdfjnkne.exe 33 PID 2980 wrote to memory of 2964 2980 Bdfjnkne.exe 33 PID 2964 wrote to memory of 2724 2964 Beggec32.exe 34 PID 2964 wrote to memory of 2724 2964 Beggec32.exe 34 PID 2964 wrote to memory of 2724 2964 Beggec32.exe 34 PID 2964 wrote to memory of 2724 2964 Beggec32.exe 34 PID 2724 wrote to memory of 2380 2724 Bopknhjd.exe 35 PID 2724 wrote to memory of 2380 2724 Bopknhjd.exe 35 PID 2724 wrote to memory of 2380 2724 Bopknhjd.exe 35 PID 2724 wrote to memory of 2380 2724 Bopknhjd.exe 35 PID 2380 wrote to memory of 2452 2380 Cggcofkf.exe 36 PID 2380 wrote to memory of 2452 2380 Cggcofkf.exe 36 PID 2380 wrote to memory of 2452 2380 Cggcofkf.exe 36 PID 2380 wrote to memory of 2452 2380 Cggcofkf.exe 36 PID 2452 wrote to memory of 2204 2452 Ciepkajj.exe 37 PID 2452 wrote to memory of 2204 2452 Ciepkajj.exe 37 PID 2452 wrote to memory of 2204 2452 Ciepkajj.exe 37 PID 2452 wrote to memory of 2204 2452 Ciepkajj.exe 37 PID 2204 wrote to memory of 2900 2204 Clclhmin.exe 38 PID 2204 wrote to memory of 2900 2204 Clclhmin.exe 38 PID 2204 wrote to memory of 2900 2204 Clclhmin.exe 38 PID 2204 wrote to memory of 2900 2204 Clclhmin.exe 38 PID 2900 wrote to memory of 3008 2900 Cobhdhha.exe 39 PID 2900 wrote to memory of 3008 2900 Cobhdhha.exe 39 PID 2900 wrote to memory of 3008 2900 Cobhdhha.exe 39 PID 2900 wrote to memory of 3008 2900 Cobhdhha.exe 39 PID 3008 wrote to memory of 1908 3008 Chjmmnnb.exe 40 PID 3008 wrote to memory of 1908 3008 Chjmmnnb.exe 40 PID 3008 wrote to memory of 1908 3008 Chjmmnnb.exe 40 PID 3008 wrote to memory of 1908 3008 Chjmmnnb.exe 40 PID 1908 wrote to memory of 944 1908 Ckiiiine.exe 41 PID 1908 wrote to memory of 944 1908 Ckiiiine.exe 41 PID 1908 wrote to memory of 944 1908 Ckiiiine.exe 41 PID 1908 wrote to memory of 944 1908 Ckiiiine.exe 41 PID 944 wrote to memory of 584 944 Ccpqjfnh.exe 42 PID 944 wrote to memory of 584 944 Ccpqjfnh.exe 42 PID 944 wrote to memory of 584 944 Ccpqjfnh.exe 42 PID 944 wrote to memory of 584 944 Ccpqjfnh.exe 42 PID 584 wrote to memory of 2120 584 Cdamao32.exe 43 PID 584 wrote to memory of 2120 584 Cdamao32.exe 43 PID 584 wrote to memory of 2120 584 Cdamao32.exe 43 PID 584 wrote to memory of 2120 584 Cdamao32.exe 43 PID 2120 wrote to memory of 2280 2120 Clhecl32.exe 44 PID 2120 wrote to memory of 2280 2120 Clhecl32.exe 44 PID 2120 wrote to memory of 2280 2120 Clhecl32.exe 44 PID 2120 wrote to memory of 2280 2120 Clhecl32.exe 44 PID 2280 wrote to memory of 1632 2280 Cofaog32.exe 45 PID 2280 wrote to memory of 1632 2280 Cofaog32.exe 45 PID 2280 wrote to memory of 1632 2280 Cofaog32.exe 45 PID 2280 wrote to memory of 1632 2280 Cofaog32.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\057cb3db46651f881bfd293cb7e5c0d0N.exe"C:\Users\Admin\AppData\Local\Temp\057cb3db46651f881bfd293cb7e5c0d0N.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Windows\SysWOW64\Bphaglgo.exeC:\Windows\system32\Bphaglgo.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Windows\SysWOW64\Blobmm32.exeC:\Windows\system32\Blobmm32.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Windows\SysWOW64\Bdfjnkne.exeC:\Windows\system32\Bdfjnkne.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Windows\SysWOW64\Beggec32.exeC:\Windows\system32\Beggec32.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Windows\SysWOW64\Bopknhjd.exeC:\Windows\system32\Bopknhjd.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\SysWOW64\Cggcofkf.exeC:\Windows\system32\Cggcofkf.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Windows\SysWOW64\Ciepkajj.exeC:\Windows\system32\Ciepkajj.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Windows\SysWOW64\Clclhmin.exeC:\Windows\system32\Clclhmin.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\SysWOW64\Cobhdhha.exeC:\Windows\system32\Cobhdhha.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\SysWOW64\Chjmmnnb.exeC:\Windows\system32\Chjmmnnb.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Windows\SysWOW64\Ckiiiine.exeC:\Windows\system32\Ckiiiine.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Windows\SysWOW64\Ccpqjfnh.exeC:\Windows\system32\Ccpqjfnh.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Windows\SysWOW64\Cdamao32.exeC:\Windows\system32\Cdamao32.exe14⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:584 -
C:\Windows\SysWOW64\Clhecl32.exeC:\Windows\system32\Clhecl32.exe15⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Windows\SysWOW64\Cofaog32.exeC:\Windows\system32\Cofaog32.exe16⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Windows\SysWOW64\Chofhm32.exeC:\Windows\system32\Chofhm32.exe17⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:1632 -
C:\Windows\SysWOW64\Coindgbi.exeC:\Windows\system32\Coindgbi.exe18⤵
- Executes dropped EXE
PID:1940
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
165KB
MD529a74f119a3e370f54c27fd355829f00
SHA1f75184825cb61553134789fbee7d048766ef856c
SHA256aae0f90d24a121c97993af59d7fd68f17df2c099d9b3beb4da76d34cfcecb8dd
SHA5125d433bf5a4dfcb32536b8606dad2f4c34814455e6f1dcdd42a94c651876c95b251fa373b403f8bca9c57f5e043de2d6f761daac9108dca046c50652e1de4821b
-
Filesize
165KB
MD542f7404b38a32f3a4debd679ca312899
SHA1570c4d84615328a6ee27bbd3af6157d7546300e5
SHA25643ff3da881bde95970032ce1ff227f18e71da01c7a8ce96aae55c46273ed4c8c
SHA512b15e67e2cd48b28f9b6882377436804d677ae644b7450de60db83f1d643fcf327ce573f0d64e59939831585e5bf3010388eedf4c2c29f5303beae448c56c9a86
-
Filesize
165KB
MD5794b55b941e2cfb16f52a4758ced4c14
SHA1ec231a4e2bb13184e19d67d7674843ce9c2c70ae
SHA2560ef63dacf29e8da1b6549e18c8a57a9d58c1e5d3f9317584743b0440d22dfef2
SHA512f34e6d3a56563cfa2400b67b441e34030ecda72e2642b5ca025477a93521a989b31dcbcc8d7e46d1dedc5683b22c05a65292082f369018d69e09a0b7a6a85794
-
Filesize
165KB
MD57793cab4837534f39d274ff9a5e59de1
SHA1c8f5cffa633b9156fac1c7d4ca46285a6a8eb546
SHA25603b4a16bde21e8874cd09ad3732ba2635a59d5102569bc90d1bb906b983fa838
SHA512ac9a58719be9bb0d90453e2665d7e573e6cf87563b0c082e1bc6ab1336b2642b06910b82575138cc209dfeb0fe51c73cee25a87d77aebe20775a69d19eaf6e82
-
Filesize
165KB
MD5573a1e22b0040556ef37f26682186ee9
SHA1478e9a1a7b236210f6541614a12c0cd4a516e190
SHA256757fcc8b48d92c6be966e02275286b58831473670f005a9a0b7d640a93fe9bdb
SHA512792794f589b0c8d2fc134acf62133c23fa02ebc40f81179cef18a35dc2600514bcae480fc01ea82ed4783df124ad167ab1af75196a587109ddeab779cd1381e2
-
Filesize
165KB
MD51168dcc6ed4064d05517a2ca48c7ea76
SHA189651155c9e4a582536afa65713581f01bc8a715
SHA256c2a566128cea43011385b902e5197fffe95dc33948fc616aa5cf8e779f54f303
SHA51219dcd4798307d0b0673968e28aa0373fd46760bd96995157e600b41818ffb582b6705b89662b0f5baa06e4350ac7f7852dc50bbce4ca03e541d99c6119e26215
-
Filesize
165KB
MD5dd1700fbfdeb69d7e33d3907af4a26b5
SHA1b84c24ce236d8bb153abf57d9bca4a86ece721b8
SHA25606c82734274d325675ed0b2eb1a2baa6218ddb112e0381c56b66ed3678798437
SHA512044ccfabe5001d7875c5457f1369e46dc469393396e04b511b38bb0cf08218bc24dbb0398e3c7ef51e40e144e278b7581106eff0ca9924cff3d59254971f4cd5
-
Filesize
165KB
MD51f23101e3f011bcf155ede9a52ee2fb1
SHA1ff68a19913155551e5463a317c788f9a4a3e8d3f
SHA2565dfecbc21fdd709cac5c0eb52f995a46616568f0689c99c320d89276363f87e3
SHA51219797608d935d6f34a331d0af68d9ce887fa990ed8a39be2964c180ada8e400095a5c5dec706d8c653a17a94a3af70e8022abe588ce1a177bc69bc2b8d78f42a
-
Filesize
165KB
MD50ba12c981f88d921c00960dee64b9c82
SHA1ddb2c491d29d903f2799e581886416105ce94453
SHA2566d275044ba3d8dcdd2e3835e4a81f1e46c26443fa75b0d0e4e3ffe4c5901f328
SHA512b1d8f534346d9e10bf5c8441f53e099c93adbf7970c85d32741a8c05218c085bde214b428e1e8ab2818d5df4293af210854b2d9eac7dd6174b6e10fde9850402
-
Filesize
165KB
MD534e8f8850109ebce32a91baca8fce276
SHA1e10cacbe403b58ddf0c7183f78c19e0a0f0eeebf
SHA256e18d39c3b278c95d352d92bf728870b61fd1ad9ead47542f846099e85d599a3c
SHA512dc692a929371b55fd674d9622d43f4aa0e85bb9c8c82c9e91d44d82846848918aa4bce93180a0790286b1e52125a77fb6bdded9bb55d886ca1a9c07a9195a589
-
Filesize
165KB
MD5df2667c9597a69baaa61b9d521a492ac
SHA1fd66910466fdc9a7d6bc9f8fbeaefe6d2fea97ec
SHA2562f76e391f4a82c147cfa6c41ac92c973a0f56ac5044cc4848d495073424cb10f
SHA512c39cc18397f4df83e9cc3bca9c42afa793ad3e81b29a9bb4121ed45bddef16c52b27581f67ce2a91f608fc06db62c9c0da8a77fc465a9e6bd315e424411ec311
-
Filesize
165KB
MD509a8d33b5a662464103780d9cdd45dde
SHA11f2662992ac8c85bcc523faf2d638d23bbdb2fae
SHA25600189672825e6e9002c285c2317e3bb1915f01a13f7930e6ffe65bce033b37ae
SHA512435fcb0b22d1260899a7b9d30b8970841c33c8fd6a00fbf7dd736fa9abe2b810f8eb485b3d90dc42935af1e7be5f635fb15c05e8f780708bc0fbcff623d70e70
-
Filesize
165KB
MD5cab2e84430133b971c42000d719e8057
SHA17377452ce51ce7fa63b9488be2d4a8386ce4e443
SHA256a4ac281c47e701555956783367d3d5bcd94f0bb9dc7828fcf6eefc1c4dcecfe4
SHA51255681edefecb002c560d07b12363f00b9857ffa0a21607124216ca8464acc607f192cd6167495c492f62c38c2f503f15e0c45e6faa446d018d88374aca66ee30
-
Filesize
165KB
MD587ea7a6c082535e0d90b471b892501dd
SHA1722cbd17b209def03d564649cb953291cce821ae
SHA256fdaeabfe21ba0481d4680036782e7023dcdf4985b5a53c8361cb22201f15a390
SHA5124b43da973ae03f700cb4cb4649284148e971847d54804b2c6be471bc7555960581ed334630fdef169337158086c6898adad3670e09a7bb5a8e188a3b7463d423
-
Filesize
165KB
MD5591311801efc2bf3fc3e38610c5e0d10
SHA174486eeaa69afe293241e505946557ecd931e222
SHA256077cd040208a64e2d103ea4f6627ea7a0f3a64ddafc626e43b20046716f2a4aa
SHA51278d9f0c93d51a846d63c2db8205fe6c7f33100fe316794c094a8ba004a0f1becb942b676c60d0034f61a689e7e51640e0626af82b2bca62ab0b82a473a6137fd
-
Filesize
165KB
MD51bb9df898e277aa69ec3b39d66b37323
SHA1e8edcd2e972bd80d6bf70f3a22ec1ea4d9301ca9
SHA2565d8a1f60e37e0dc276ccbfe2fde5f5a1ba43e3096da0ba1c2671c3a1f5ded286
SHA512254a25c893db72aa2c25a6659bbb7d850ace920c72e7cbd7df3299d01cbc67aa0107caff6c2dff4c2b725f8b93cf13afa7acc4ee6707dcf6e3f36f42fc554205
-
Filesize
165KB
MD5d6f2663e07d6c2a4e574f2c84093dbfc
SHA1b54e81cc80b126be9ba5b7247c571199dd7f8f5d
SHA256e09c1de5f4ce83e965cffdae7ed8536ac9e355ad5337fa8c9ca6baf28759608d
SHA51262e5df7e24db206c73d767341cbc02ac0293c7d79187e838331757fc33ecdda3f8dd7c5f901251190a8ab39c77468e04fa9099716f92f6cc544e5b9c899decd7