Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
27/07/2024, 01:34
Static task
static1
Behavioral task
behavioral1
Sample
a08de0adeb44d5ef1db6a7091e23c482602ea1879a1528efc1e8d3c89eae4611.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a08de0adeb44d5ef1db6a7091e23c482602ea1879a1528efc1e8d3c89eae4611.exe
Resource
win10v2004-20240709-en
General
-
Target
a08de0adeb44d5ef1db6a7091e23c482602ea1879a1528efc1e8d3c89eae4611.exe
-
Size
64KB
-
MD5
4652c4944c929cd7c139763a224196ed
-
SHA1
fbc7084554f04f2466f1a56b0663d3dec45d3c98
-
SHA256
a08de0adeb44d5ef1db6a7091e23c482602ea1879a1528efc1e8d3c89eae4611
-
SHA512
abeec373da8f0aa4c0afb1c60227d58cbf174f26b4d3deba7a4eb3bf0fd7868c95b5d6a77279059d0c74fc2a782813745abdec4d3205a37e3863b1652ebd8a34
-
SSDEEP
768:OMpAHWgvLP2/EGH7p+egEQ1iJ/daUGUoEPO/34OvYLPXlSv/1H54b6XJ1IwEGp9k:OM6Wgip+enDaRpEPcIOv3BGWXUwXfzwv
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 22 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Afnagk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Afnagk32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bdmddc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" a08de0adeb44d5ef1db6a7091e23c482602ea1879a1528efc1e8d3c89eae4611.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qqeicede.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Aecaidjl.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bonoflae.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bdmddc32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad a08de0adeb44d5ef1db6a7091e23c482602ea1879a1528efc1e8d3c89eae4611.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qngmgjeb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ajbggjfq.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ajecmj32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aijpnfif.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bonoflae.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cpceidcn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cpceidcn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qngmgjeb.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qqeicede.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aecaidjl.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ajbggjfq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ajecmj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Aijpnfif.exe -
Executes dropped EXE 11 IoCs
pid Process 3020 Qngmgjeb.exe 2916 Qqeicede.exe 2656 Aecaidjl.exe 2220 Ajbggjfq.exe 780 Ajecmj32.exe 852 Aijpnfif.exe 2428 Afnagk32.exe 2672 Bonoflae.exe 868 Bdmddc32.exe 2192 Cpceidcn.exe 1268 Cacacg32.exe -
Loads dropped DLL 26 IoCs
pid Process 2884 a08de0adeb44d5ef1db6a7091e23c482602ea1879a1528efc1e8d3c89eae4611.exe 2884 a08de0adeb44d5ef1db6a7091e23c482602ea1879a1528efc1e8d3c89eae4611.exe 3020 Qngmgjeb.exe 3020 Qngmgjeb.exe 2916 Qqeicede.exe 2916 Qqeicede.exe 2656 Aecaidjl.exe 2656 Aecaidjl.exe 2220 Ajbggjfq.exe 2220 Ajbggjfq.exe 780 Ajecmj32.exe 780 Ajecmj32.exe 852 Aijpnfif.exe 852 Aijpnfif.exe 2428 Afnagk32.exe 2428 Afnagk32.exe 2672 Bonoflae.exe 2672 Bonoflae.exe 868 Bdmddc32.exe 868 Bdmddc32.exe 2192 Cpceidcn.exe 2192 Cpceidcn.exe 112 WerFault.exe 112 WerFault.exe 112 WerFault.exe 112 WerFault.exe -
Drops file in System32 directory 33 IoCs
description ioc Process File created C:\Windows\SysWOW64\Afnagk32.exe Aijpnfif.exe File created C:\Windows\SysWOW64\Mgjcep32.dll Aijpnfif.exe File created C:\Windows\SysWOW64\Bdmddc32.exe Bonoflae.exe File opened for modification C:\Windows\SysWOW64\Cacacg32.exe Cpceidcn.exe File created C:\Windows\SysWOW64\Imjcfnhk.dll Qngmgjeb.exe File opened for modification C:\Windows\SysWOW64\Ajbggjfq.exe Aecaidjl.exe File created C:\Windows\SysWOW64\Fekagf32.dll Ajbggjfq.exe File created C:\Windows\SysWOW64\Fdlpjk32.dll Cpceidcn.exe File created C:\Windows\SysWOW64\Aecaidjl.exe Qqeicede.exe File opened for modification C:\Windows\SysWOW64\Ajecmj32.exe Ajbggjfq.exe File opened for modification C:\Windows\SysWOW64\Bdmddc32.exe Bonoflae.exe File opened for modification C:\Windows\SysWOW64\Qngmgjeb.exe a08de0adeb44d5ef1db6a7091e23c482602ea1879a1528efc1e8d3c89eae4611.exe File created C:\Windows\SysWOW64\Eignpade.dll Afnagk32.exe File opened for modification C:\Windows\SysWOW64\Afnagk32.exe Aijpnfif.exe File opened for modification C:\Windows\SysWOW64\Bonoflae.exe Afnagk32.exe File created C:\Windows\SysWOW64\Qqeicede.exe Qngmgjeb.exe File opened for modification C:\Windows\SysWOW64\Aecaidjl.exe Qqeicede.exe File created C:\Windows\SysWOW64\Ajecmj32.exe Ajbggjfq.exe File created C:\Windows\SysWOW64\Ajbggjfq.exe Aecaidjl.exe File created C:\Windows\SysWOW64\Aijpnfif.exe Ajecmj32.exe File created C:\Windows\SysWOW64\Bonoflae.exe Afnagk32.exe File created C:\Windows\SysWOW64\Cpceidcn.exe Bdmddc32.exe File opened for modification C:\Windows\SysWOW64\Cpceidcn.exe Bdmddc32.exe File created C:\Windows\SysWOW64\Cmelgapq.dll a08de0adeb44d5ef1db6a7091e23c482602ea1879a1528efc1e8d3c89eae4611.exe File opened for modification C:\Windows\SysWOW64\Qqeicede.exe Qngmgjeb.exe File created C:\Windows\SysWOW64\Hjphijco.dll Ajecmj32.exe File opened for modification C:\Windows\SysWOW64\Aijpnfif.exe Ajecmj32.exe File created C:\Windows\SysWOW64\Cjnolikh.dll Bonoflae.exe File created C:\Windows\SysWOW64\Ndmjqgdd.dll Bdmddc32.exe File created C:\Windows\SysWOW64\Cacacg32.exe Cpceidcn.exe File created C:\Windows\SysWOW64\Qngmgjeb.exe a08de0adeb44d5ef1db6a7091e23c482602ea1879a1528efc1e8d3c89eae4611.exe File created C:\Windows\SysWOW64\Emfmdo32.dll Qqeicede.exe File created C:\Windows\SysWOW64\Cenaioaq.dll Aecaidjl.exe -
Program crash 1 IoCs
pid pid_target Process 112 1268 WerFault.exe -
System Location Discovery: System Language Discovery 1 TTPs 12 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a08de0adeb44d5ef1db6a7091e23c482602ea1879a1528efc1e8d3c89eae4611.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qqeicede.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Aijpnfif.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Afnagk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bonoflae.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cpceidcn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cacacg32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qngmgjeb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Aecaidjl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ajbggjfq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ajecmj32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bdmddc32.exe -
Modifies registry class 36 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Qqeicede.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eignpade.dll" Afnagk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bonoflae.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ndmjqgdd.dll" Bdmddc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Qngmgjeb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Emfmdo32.dll" Qqeicede.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ajbggjfq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Aijpnfif.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bdmddc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cpceidcn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cmelgapq.dll" a08de0adeb44d5ef1db6a7091e23c482602ea1879a1528efc1e8d3c89eae4611.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hjphijco.dll" Ajecmj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Afnagk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bonoflae.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fdlpjk32.dll" Cpceidcn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cpceidcn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node a08de0adeb44d5ef1db6a7091e23c482602ea1879a1528efc1e8d3c89eae4611.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Afnagk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" a08de0adeb44d5ef1db6a7091e23c482602ea1879a1528efc1e8d3c89eae4611.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Imjcfnhk.dll" Qngmgjeb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Qqeicede.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ajecmj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID a08de0adeb44d5ef1db6a7091e23c482602ea1879a1528efc1e8d3c89eae4611.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Aecaidjl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cenaioaq.dll" Aecaidjl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cjnolikh.dll" Bonoflae.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Qngmgjeb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} a08de0adeb44d5ef1db6a7091e23c482602ea1879a1528efc1e8d3c89eae4611.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Aecaidjl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ajbggjfq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mgjcep32.dll" Aijpnfif.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bdmddc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 a08de0adeb44d5ef1db6a7091e23c482602ea1879a1528efc1e8d3c89eae4611.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ajecmj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Aijpnfif.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fekagf32.dll" Ajbggjfq.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 2884 wrote to memory of 3020 2884 a08de0adeb44d5ef1db6a7091e23c482602ea1879a1528efc1e8d3c89eae4611.exe 30 PID 2884 wrote to memory of 3020 2884 a08de0adeb44d5ef1db6a7091e23c482602ea1879a1528efc1e8d3c89eae4611.exe 30 PID 2884 wrote to memory of 3020 2884 a08de0adeb44d5ef1db6a7091e23c482602ea1879a1528efc1e8d3c89eae4611.exe 30 PID 2884 wrote to memory of 3020 2884 a08de0adeb44d5ef1db6a7091e23c482602ea1879a1528efc1e8d3c89eae4611.exe 30 PID 3020 wrote to memory of 2916 3020 Qngmgjeb.exe 31 PID 3020 wrote to memory of 2916 3020 Qngmgjeb.exe 31 PID 3020 wrote to memory of 2916 3020 Qngmgjeb.exe 31 PID 3020 wrote to memory of 2916 3020 Qngmgjeb.exe 31 PID 2916 wrote to memory of 2656 2916 Qqeicede.exe 32 PID 2916 wrote to memory of 2656 2916 Qqeicede.exe 32 PID 2916 wrote to memory of 2656 2916 Qqeicede.exe 32 PID 2916 wrote to memory of 2656 2916 Qqeicede.exe 32 PID 2656 wrote to memory of 2220 2656 Aecaidjl.exe 33 PID 2656 wrote to memory of 2220 2656 Aecaidjl.exe 33 PID 2656 wrote to memory of 2220 2656 Aecaidjl.exe 33 PID 2656 wrote to memory of 2220 2656 Aecaidjl.exe 33 PID 2220 wrote to memory of 780 2220 Ajbggjfq.exe 34 PID 2220 wrote to memory of 780 2220 Ajbggjfq.exe 34 PID 2220 wrote to memory of 780 2220 Ajbggjfq.exe 34 PID 2220 wrote to memory of 780 2220 Ajbggjfq.exe 34 PID 780 wrote to memory of 852 780 Ajecmj32.exe 35 PID 780 wrote to memory of 852 780 Ajecmj32.exe 35 PID 780 wrote to memory of 852 780 Ajecmj32.exe 35 PID 780 wrote to memory of 852 780 Ajecmj32.exe 35 PID 852 wrote to memory of 2428 852 Aijpnfif.exe 36 PID 852 wrote to memory of 2428 852 Aijpnfif.exe 36 PID 852 wrote to memory of 2428 852 Aijpnfif.exe 36 PID 852 wrote to memory of 2428 852 Aijpnfif.exe 36 PID 2428 wrote to memory of 2672 2428 Afnagk32.exe 37 PID 2428 wrote to memory of 2672 2428 Afnagk32.exe 37 PID 2428 wrote to memory of 2672 2428 Afnagk32.exe 37 PID 2428 wrote to memory of 2672 2428 Afnagk32.exe 37 PID 2672 wrote to memory of 868 2672 Bonoflae.exe 38 PID 2672 wrote to memory of 868 2672 Bonoflae.exe 38 PID 2672 wrote to memory of 868 2672 Bonoflae.exe 38 PID 2672 wrote to memory of 868 2672 Bonoflae.exe 38 PID 868 wrote to memory of 2192 868 Bdmddc32.exe 39 PID 868 wrote to memory of 2192 868 Bdmddc32.exe 39 PID 868 wrote to memory of 2192 868 Bdmddc32.exe 39 PID 868 wrote to memory of 2192 868 Bdmddc32.exe 39 PID 2192 wrote to memory of 1268 2192 Cpceidcn.exe 40 PID 2192 wrote to memory of 1268 2192 Cpceidcn.exe 40 PID 2192 wrote to memory of 1268 2192 Cpceidcn.exe 40 PID 2192 wrote to memory of 1268 2192 Cpceidcn.exe 40 PID 1268 wrote to memory of 112 1268 Cacacg32.exe 41 PID 1268 wrote to memory of 112 1268 Cacacg32.exe 41 PID 1268 wrote to memory of 112 1268 Cacacg32.exe 41 PID 1268 wrote to memory of 112 1268 Cacacg32.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\a08de0adeb44d5ef1db6a7091e23c482602ea1879a1528efc1e8d3c89eae4611.exe"C:\Users\Admin\AppData\Local\Temp\a08de0adeb44d5ef1db6a7091e23c482602ea1879a1528efc1e8d3c89eae4611.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Windows\SysWOW64\Qngmgjeb.exeC:\Windows\system32\Qngmgjeb.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\SysWOW64\Qqeicede.exeC:\Windows\system32\Qqeicede.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Windows\SysWOW64\Aecaidjl.exeC:\Windows\system32\Aecaidjl.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\SysWOW64\Ajbggjfq.exeC:\Windows\system32\Ajbggjfq.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\SysWOW64\Ajecmj32.exeC:\Windows\system32\Ajecmj32.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:780 -
C:\Windows\SysWOW64\Aijpnfif.exeC:\Windows\system32\Aijpnfif.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Windows\SysWOW64\Afnagk32.exeC:\Windows\system32\Afnagk32.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Windows\SysWOW64\Bonoflae.exeC:\Windows\system32\Bonoflae.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\SysWOW64\Bdmddc32.exeC:\Windows\system32\Bdmddc32.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:868 -
C:\Windows\SysWOW64\Cpceidcn.exeC:\Windows\system32\Cpceidcn.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\SysWOW64\Cacacg32.exeC:\Windows\system32\Cacacg32.exe12⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1268 -s 14013⤵
- Loads dropped DLL
- Program crash
PID:112
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5002912c1894813888954197568201925
SHA142cabe88635cdd576e383e172324a5c95c71f55c
SHA2569a2904ee08d7e5f425182c201dca8770a473b3d5ff2e4474d24231f701bbe9e9
SHA512a8d1427949a923a17cd257068cdba1fe695e6679d20320adf0035101f6189007c23749989e39755dac9c284a2f28fcc0c9133eb02cc31f5c421f51da9f370ed8
-
Filesize
64KB
MD52222f50ef1e46982f48a4b8a378687d6
SHA195b6c0540c39c7e223afe62df104e245ab0e08b7
SHA25669f011100c80a05cfdcdf59b557529379cc897a0fd7138d8d7be55e4697940ce
SHA512f126463cdcf0a3e4a0f3d9c4e42b283fa15c8179f5c2f880db72db481127bf1175bff6f583ff3a2f53e380829d6f284c58d696a757b51720c8dbe654fbbd5e5e
-
Filesize
64KB
MD59ce5eafd3eb978510bcd27a9467871bb
SHA104bfd6158cce4e56c192080d58a6abe4c3bfb555
SHA256eecb38907e6dbc5138c65dce1aa5dc7ea0f4c574dd8e4779ac029c99b977cd73
SHA51247f09e30e9b088c6584053b362ffaa2bcb08c63c62cc65f5649c9741e5965bd21a3a8ff352446a25c416b934d6d84e0d24d8ac09a70156eccdfe88eeb95e09f2
-
Filesize
64KB
MD54a9808aae9747c3f920c25fa4e157923
SHA10cbb9e7e3157a832ba9a672e8c9f70d21c5df1fd
SHA2561333f157790f04a8c991a20307a7333ff0fe679a8ead278ee9a364de8bdf5b73
SHA51216413be7c7076c749a50ecfb6f43e655f4c4dca6d57b21dae5d3776193e52cfe25d01942b9a83a637f88079da8b49d7ff69b6d8f34e832a3eadb979675e2dd48
-
Filesize
64KB
MD5faa43a5b54bbf6125ad38f4c8fe09bd4
SHA11a08e32f4a2142ffaf245103326a1dc1dbc8b8b9
SHA25603d6edf572cc80dcd9db45fc9a54ed501a08a8cfd30b629f40e2c0030244468f
SHA512fbd3291c3d6223dafa45ac07a636fdc61e369adfe21cc6ebef2399bf82f0926f8a5566521b9cdd422fdfb64608af71982e5f0043a28ca3271e6513db52cdf1f0
-
Filesize
64KB
MD5ead2faa01f4c6ff5041c36a300137e07
SHA1715e8ee90ea5fe64cff78dc82d0ae9013b6a64a9
SHA256343ba283728bdf10a8fae195abbc01349b298c6c76ee4a9a5fbf8689c1051ffa
SHA512e5a67f4614555f1ad8d06b1004c4833ea6d2c944f22743b64bba01b458c64f1c696ca88b4448780e118ac97f3513182300fc307acd0bc53c0dba31c2acb0bd00
-
Filesize
64KB
MD5e030e47ced14157a707e6ad2f169260e
SHA19589c4e37bb8333691033ea1208a3818965d902a
SHA25627f0852f6972a5d3cac0fd52cb583b0d00ef5a774cbc08595a8e0e3bfae5466d
SHA512b6a2d0fb4cb488907cc91ae9bafd8afc66eaa20ebcb747c6c6436cac3ec333d86ff1e58bcc9d13d8c8f88c8179a057de5a1070f98b8f8071e77be9ebd58a96d7
-
Filesize
64KB
MD511ead56c705b56b13adb5824e174b79a
SHA12cb415e7fc0a880754be7ae4e14e623d59864f3f
SHA256736c3e90e34200e321de09e3821018f181c9e53f38528c091ae28272b3396ed2
SHA51259f41078e1eb73d269829ca0d5cc629463e9726473919e028d303dcd0cccb3a43958a9411aadd60c7618b47e5e385d403b563faf4f15e29fcf32dccc9a4a1014
-
Filesize
64KB
MD5e89d5fd02d6d4efac876138379123ec9
SHA1ab3695db7a4cb3c80153206885c5dbec6eb6d837
SHA2567255b6aa6f181b11e0f6266e62d9c512124ab910af945a422b94552610bf64c7
SHA5128a82ac24d9d33e9d52b198b68263f64ced05944c2650c6b29051cce82c32ad4951f79596019c719cbef79f6e9a8d4988d09720675e7b069802fe4ac6225bdbe9
-
Filesize
64KB
MD52e008b783074b4aca43db8d8aed56622
SHA1e1d988a7afc202c0ea2e7eb334755db1cb0be622
SHA2560975f46802efb652ecfc44e2e34f92a832f8cd0f1b30aaf25d36fe7962cd063a
SHA512f095344e1e18aedbcd4b4f317580b7d0b7c27cdd8e3a5ed351e16d6db958d0344921bbd841828b34438036883922fe0eb5d615f5afc566c859ad882343177bb0
-
Filesize
64KB
MD5c8f66ebd941889ada6d5ec9c30c48ede
SHA1b2caf528593e064602a3d941768b6e499be7d172
SHA256d44cf0b25ace1e20a1ab7aa7e0f791f8c9eae6d78199708a639a8a5b72a5672f
SHA51244dd8d3b9176b20817450f54ed982772a7a5f0f2f4a7efc41c07b23051332423db9b5aa8072fc740324044169d0c432cedad635016d4f571019049eec4f49e21