Analysis
-
max time kernel
33s -
max time network
20s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
27/07/2024, 18:54
Static task
static1
Behavioral task
behavioral1
Sample
0e22048ae52134c9bdd32d01242d3ac96ae331f2549a9b9512d12e83fc7eae18.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
0e22048ae52134c9bdd32d01242d3ac96ae331f2549a9b9512d12e83fc7eae18.exe
Resource
win10v2004-20240709-en
General
-
Target
0e22048ae52134c9bdd32d01242d3ac96ae331f2549a9b9512d12e83fc7eae18.exe
-
Size
305KB
-
MD5
9835067c125a59397873f190cca7e65a
-
SHA1
57eb5f18a7334a65b8c6ef62b45892e6be4005aa
-
SHA256
0e22048ae52134c9bdd32d01242d3ac96ae331f2549a9b9512d12e83fc7eae18
-
SHA512
c2b87f7cf608ede3ae153669b85644f512f703de5b693df2d7ffe10a7115a7b17b2d221b44f219ed111fc16de1ed3614004a2360fce8983e10305628cb613b9d
-
SSDEEP
3072:dNPyoYF0Na5NpYqAd+lc802eS5pAgYIqGvJ6887lbyMGjXF1kqaholmtbCQVDb0E:ioYF0QpiElc85dZMGXF5ahdt3b0668
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 22 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" 0e22048ae52134c9bdd32d01242d3ac96ae331f2549a9b9512d12e83fc7eae18.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Mmkafhnb.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Moqgiopk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Npiiafpa.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 0e22048ae52134c9bdd32d01242d3ac96ae331f2549a9b9512d12e83fc7eae18.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Kcpcho32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lckflc32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lpddgd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Lpddgd32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mmkafhnb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Moqgiopk.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mhkhgd32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kcpcho32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Nacmpj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Kbqgolpf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Lckflc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Mhkhgd32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nacmpj32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Npiiafpa.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ncloha32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ncloha32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kbqgolpf.exe -
Executes dropped EXE 11 IoCs
pid Process 2976 Kbqgolpf.exe 2712 Kcpcho32.exe 2904 Lckflc32.exe 2856 Lpddgd32.exe 2568 Mmkafhnb.exe 928 Moqgiopk.exe 2372 Mhkhgd32.exe 1980 Nacmpj32.exe 1380 Npiiafpa.exe 2860 Ncloha32.exe 1760 Opblgehg.exe -
Loads dropped DLL 26 IoCs
pid Process 1292 0e22048ae52134c9bdd32d01242d3ac96ae331f2549a9b9512d12e83fc7eae18.exe 1292 0e22048ae52134c9bdd32d01242d3ac96ae331f2549a9b9512d12e83fc7eae18.exe 2976 Kbqgolpf.exe 2976 Kbqgolpf.exe 2712 Kcpcho32.exe 2712 Kcpcho32.exe 2904 Lckflc32.exe 2904 Lckflc32.exe 2856 Lpddgd32.exe 2856 Lpddgd32.exe 2568 Mmkafhnb.exe 2568 Mmkafhnb.exe 928 Moqgiopk.exe 928 Moqgiopk.exe 2372 Mhkhgd32.exe 2372 Mhkhgd32.exe 1980 Nacmpj32.exe 1980 Nacmpj32.exe 1380 Npiiafpa.exe 1380 Npiiafpa.exe 2860 Ncloha32.exe 2860 Ncloha32.exe 324 WerFault.exe 324 WerFault.exe 324 WerFault.exe 324 WerFault.exe -
Drops file in System32 directory 33 IoCs
description ioc Process File created C:\Windows\SysWOW64\Lckflc32.exe Kcpcho32.exe File created C:\Windows\SysWOW64\Npiiafpa.exe Nacmpj32.exe File created C:\Windows\SysWOW64\Ncloha32.exe Npiiafpa.exe File created C:\Windows\SysWOW64\Lbbbnidk.dll Lckflc32.exe File opened for modification C:\Windows\SysWOW64\Mmkafhnb.exe Lpddgd32.exe File created C:\Windows\SysWOW64\Nacmpj32.exe Mhkhgd32.exe File opened for modification C:\Windows\SysWOW64\Moqgiopk.exe Mmkafhnb.exe File opened for modification C:\Windows\SysWOW64\Nacmpj32.exe Mhkhgd32.exe File opened for modification C:\Windows\SysWOW64\Opblgehg.exe Ncloha32.exe File created C:\Windows\SysWOW64\Ahmjfimi.dll Ncloha32.exe File created C:\Windows\SysWOW64\Ajenah32.dll Lpddgd32.exe File created C:\Windows\SysWOW64\Mhkhgd32.exe Moqgiopk.exe File opened for modification C:\Windows\SysWOW64\Mhkhgd32.exe Moqgiopk.exe File opened for modification C:\Windows\SysWOW64\Ncloha32.exe Npiiafpa.exe File created C:\Windows\SysWOW64\Kbqgolpf.exe 0e22048ae52134c9bdd32d01242d3ac96ae331f2549a9b9512d12e83fc7eae18.exe File created C:\Windows\SysWOW64\Kcpcho32.exe Kbqgolpf.exe File created C:\Windows\SysWOW64\Dacppppl.dll Kcpcho32.exe File created C:\Windows\SysWOW64\Lpddgd32.exe Lckflc32.exe File created C:\Windows\SysWOW64\Mnohgfgb.dll Npiiafpa.exe File created C:\Windows\SysWOW64\Gkbafe32.dll Moqgiopk.exe File created C:\Windows\SysWOW64\Kcgpfpbq.dll Mhkhgd32.exe File created C:\Windows\SysWOW64\Moqgiopk.exe Mmkafhnb.exe File created C:\Windows\SysWOW64\Bgbjkg32.dll Mmkafhnb.exe File opened for modification C:\Windows\SysWOW64\Kbqgolpf.exe 0e22048ae52134c9bdd32d01242d3ac96ae331f2549a9b9512d12e83fc7eae18.exe File opened for modification C:\Windows\SysWOW64\Kcpcho32.exe Kbqgolpf.exe File created C:\Windows\SysWOW64\Caolfcmm.dll Kbqgolpf.exe File opened for modification C:\Windows\SysWOW64\Lckflc32.exe Kcpcho32.exe File opened for modification C:\Windows\SysWOW64\Lpddgd32.exe Lckflc32.exe File created C:\Windows\SysWOW64\Mmkafhnb.exe Lpddgd32.exe File opened for modification C:\Windows\SysWOW64\Npiiafpa.exe Nacmpj32.exe File created C:\Windows\SysWOW64\Opblgehg.exe Ncloha32.exe File created C:\Windows\SysWOW64\Jjamcall.dll 0e22048ae52134c9bdd32d01242d3ac96ae331f2549a9b9512d12e83fc7eae18.exe File created C:\Windows\SysWOW64\Qlcbff32.dll Nacmpj32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 324 1760 WerFault.exe 40 -
System Location Discovery: System Language Discovery 1 TTPs 12 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lckflc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lpddgd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nacmpj32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ncloha32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0e22048ae52134c9bdd32d01242d3ac96ae331f2549a9b9512d12e83fc7eae18.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kbqgolpf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kcpcho32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Npiiafpa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Opblgehg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mmkafhnb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Moqgiopk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mhkhgd32.exe -
Modifies registry class 36 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Lckflc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Mmkafhnb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kcgpfpbq.dll" Mhkhgd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ahmjfimi.dll" Ncloha32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node 0e22048ae52134c9bdd32d01242d3ac96ae331f2549a9b9512d12e83fc7eae18.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717} 0e22048ae52134c9bdd32d01242d3ac96ae331f2549a9b9512d12e83fc7eae18.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" 0e22048ae52134c9bdd32d01242d3ac96ae331f2549a9b9512d12e83fc7eae18.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID 0e22048ae52134c9bdd32d01242d3ac96ae331f2549a9b9512d12e83fc7eae18.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Moqgiopk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Nacmpj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Mhkhgd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Npiiafpa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ncloha32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jjamcall.dll" 0e22048ae52134c9bdd32d01242d3ac96ae331f2549a9b9512d12e83fc7eae18.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Caolfcmm.dll" Kbqgolpf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Lpddgd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dacppppl.dll" Kcpcho32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Mmkafhnb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bgbjkg32.dll" Mmkafhnb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Lckflc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Mhkhgd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qlcbff32.dll" Nacmpj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Npiiafpa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mnohgfgb.dll" Npiiafpa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 0e22048ae52134c9bdd32d01242d3ac96ae331f2549a9b9512d12e83fc7eae18.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ajenah32.dll" Lpddgd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gkbafe32.dll" Moqgiopk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Nacmpj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ncloha32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Kbqgolpf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Kbqgolpf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Kcpcho32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Moqgiopk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Kcpcho32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lbbbnidk.dll" Lckflc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Lpddgd32.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 1292 wrote to memory of 2976 1292 0e22048ae52134c9bdd32d01242d3ac96ae331f2549a9b9512d12e83fc7eae18.exe 30 PID 1292 wrote to memory of 2976 1292 0e22048ae52134c9bdd32d01242d3ac96ae331f2549a9b9512d12e83fc7eae18.exe 30 PID 1292 wrote to memory of 2976 1292 0e22048ae52134c9bdd32d01242d3ac96ae331f2549a9b9512d12e83fc7eae18.exe 30 PID 1292 wrote to memory of 2976 1292 0e22048ae52134c9bdd32d01242d3ac96ae331f2549a9b9512d12e83fc7eae18.exe 30 PID 2976 wrote to memory of 2712 2976 Kbqgolpf.exe 31 PID 2976 wrote to memory of 2712 2976 Kbqgolpf.exe 31 PID 2976 wrote to memory of 2712 2976 Kbqgolpf.exe 31 PID 2976 wrote to memory of 2712 2976 Kbqgolpf.exe 31 PID 2712 wrote to memory of 2904 2712 Kcpcho32.exe 32 PID 2712 wrote to memory of 2904 2712 Kcpcho32.exe 32 PID 2712 wrote to memory of 2904 2712 Kcpcho32.exe 32 PID 2712 wrote to memory of 2904 2712 Kcpcho32.exe 32 PID 2904 wrote to memory of 2856 2904 Lckflc32.exe 33 PID 2904 wrote to memory of 2856 2904 Lckflc32.exe 33 PID 2904 wrote to memory of 2856 2904 Lckflc32.exe 33 PID 2904 wrote to memory of 2856 2904 Lckflc32.exe 33 PID 2856 wrote to memory of 2568 2856 Lpddgd32.exe 34 PID 2856 wrote to memory of 2568 2856 Lpddgd32.exe 34 PID 2856 wrote to memory of 2568 2856 Lpddgd32.exe 34 PID 2856 wrote to memory of 2568 2856 Lpddgd32.exe 34 PID 2568 wrote to memory of 928 2568 Mmkafhnb.exe 35 PID 2568 wrote to memory of 928 2568 Mmkafhnb.exe 35 PID 2568 wrote to memory of 928 2568 Mmkafhnb.exe 35 PID 2568 wrote to memory of 928 2568 Mmkafhnb.exe 35 PID 928 wrote to memory of 2372 928 Moqgiopk.exe 36 PID 928 wrote to memory of 2372 928 Moqgiopk.exe 36 PID 928 wrote to memory of 2372 928 Moqgiopk.exe 36 PID 928 wrote to memory of 2372 928 Moqgiopk.exe 36 PID 2372 wrote to memory of 1980 2372 Mhkhgd32.exe 37 PID 2372 wrote to memory of 1980 2372 Mhkhgd32.exe 37 PID 2372 wrote to memory of 1980 2372 Mhkhgd32.exe 37 PID 2372 wrote to memory of 1980 2372 Mhkhgd32.exe 37 PID 1980 wrote to memory of 1380 1980 Nacmpj32.exe 38 PID 1980 wrote to memory of 1380 1980 Nacmpj32.exe 38 PID 1980 wrote to memory of 1380 1980 Nacmpj32.exe 38 PID 1980 wrote to memory of 1380 1980 Nacmpj32.exe 38 PID 1380 wrote to memory of 2860 1380 Npiiafpa.exe 39 PID 1380 wrote to memory of 2860 1380 Npiiafpa.exe 39 PID 1380 wrote to memory of 2860 1380 Npiiafpa.exe 39 PID 1380 wrote to memory of 2860 1380 Npiiafpa.exe 39 PID 2860 wrote to memory of 1760 2860 Ncloha32.exe 40 PID 2860 wrote to memory of 1760 2860 Ncloha32.exe 40 PID 2860 wrote to memory of 1760 2860 Ncloha32.exe 40 PID 2860 wrote to memory of 1760 2860 Ncloha32.exe 40 PID 1760 wrote to memory of 324 1760 Opblgehg.exe 41 PID 1760 wrote to memory of 324 1760 Opblgehg.exe 41 PID 1760 wrote to memory of 324 1760 Opblgehg.exe 41 PID 1760 wrote to memory of 324 1760 Opblgehg.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e22048ae52134c9bdd32d01242d3ac96ae331f2549a9b9512d12e83fc7eae18.exe"C:\Users\Admin\AppData\Local\Temp\0e22048ae52134c9bdd32d01242d3ac96ae331f2549a9b9512d12e83fc7eae18.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Windows\SysWOW64\Kbqgolpf.exeC:\Windows\system32\Kbqgolpf.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Windows\SysWOW64\Kcpcho32.exeC:\Windows\system32\Kcpcho32.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\SysWOW64\Lckflc32.exeC:\Windows\system32\Lckflc32.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\SysWOW64\Lpddgd32.exeC:\Windows\system32\Lpddgd32.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Windows\SysWOW64\Mmkafhnb.exeC:\Windows\system32\Mmkafhnb.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Windows\SysWOW64\Moqgiopk.exeC:\Windows\system32\Moqgiopk.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:928 -
C:\Windows\SysWOW64\Mhkhgd32.exeC:\Windows\system32\Mhkhgd32.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Windows\SysWOW64\Nacmpj32.exeC:\Windows\system32\Nacmpj32.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Windows\SysWOW64\Npiiafpa.exeC:\Windows\system32\Npiiafpa.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Windows\SysWOW64\Ncloha32.exeC:\Windows\system32\Ncloha32.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Windows\SysWOW64\Opblgehg.exeC:\Windows\system32\Opblgehg.exe12⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1760 -s 14013⤵
- Loads dropped DLL
- Program crash
PID:324
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7KB
MD55650beb628309695b62e8d476fd732f7
SHA193d786ab2418dfa5c5a5467d0132eb17c61aa499
SHA25649027e82e89ab11415cfcdc4e7c491cd3be9513ae3c9fe2ed324b7b64d071abb
SHA51201735c92a97f9d9cd7e9710fac360402ac800b8e413c40805e14233335e5a3af3e97f9e16750a424553195d11ce3d5f112668b42a94257ce2acdecd8f1aba9e2
-
Filesize
305KB
MD589fdefcbc825eb4454e5e9029cd99033
SHA115f1bf034e245b2c4e54ff386aa07d33bb4579ed
SHA2569b119df03fb3a18f9a09770fdfce77057e6203c8c46a0ffac8893cf3ee950f3d
SHA512db727f5edd1a504a9381ca9aece80772fe4a327273b02d53714f3636a8d8481d6f87ecd289995ff9b86824698e93ce7a11323eb462f7b6c06744c0c8eb6eea74
-
Filesize
305KB
MD54ee9f6ab9ec9c8913d55ea5ae9936b42
SHA119bd6aee09c345cef47f5d24d62c258d60f390b4
SHA25649d8c5aeadef36cc36ea250a0db3426f79251573c23b7a90a121fabcc365484f
SHA512fc97d375274da51ead75d1d7789653c0091acd81116efdb07429326d5ff0698774c2d0c20e61fe1ee0a5e1193d391b85d1874800b4dd6351040c090f24414ad5
-
Filesize
305KB
MD5333b6e527576b4e7461e9dcc81c4b9d7
SHA131ca1fdf163a28760082940912738fc465752a3b
SHA256ccb2a1c4b0cf139cd781aa4caa6d50012c7308a2630912c22be1cc2d3f9f3137
SHA512dc5768a6bcd8fbab4b652cf775eeb0f7362306f20c6185a51e0a3a41d3f3f2d13014c114b650c281151416e9cafed5d8cc7e6dd4e5d7415aee22b3be33df82cc
-
Filesize
305KB
MD5b5e1581588696bb72731d33f2ba44068
SHA12985fc22f8cb0579e62795454772e99b389f0076
SHA256b353a8ee2c85e824caccdfb196d19990f3fa6a82e18d13074f6e6221b75a6e7f
SHA512f24c651e4ccb7107aa7471a4af1d016f1686ca54c96d7effcf54cc745c8d4b3746711631dbef51a522fd8455cf5da5c760f706230e0e23437fc27e692544b821
-
Filesize
305KB
MD59b3cac6f8483e663f015c6ffa059367b
SHA1641511bcbbc22319f1d7eda7025e58d351e4e100
SHA256b9403addc193a2f808473bf522b3c5530aefc960dedf024d63d92872bb9e7b47
SHA512c0c7fc33a2a33b730c3316872068f8f6bb52e1cc4d8d39a9766f0551958b34c15a31be8f4d66a36a76d82c376ba976847655336e7cf4f18ff3c7f62513cdec51
-
Filesize
305KB
MD5f40bfe5f8c9829fb10ae4db81975b4b2
SHA16e203c0b231b2bb5200f52a35b42e4be68409dfc
SHA25619bafb7aa2420ae61956706b3cdb6f42a4c939176e1a394599ca470681b26918
SHA512d2eeedd916d7908cac7240ca31976ee89f633487d0bf2670cf6b98ba9dea8a24e460345c249a99445226a6d15f891bf3bda69040c2633bb174f0029b7a435f21
-
Filesize
305KB
MD58b0a762a8d72d40e2ab66848a7c97579
SHA1fe98d9d6850cda4b8df7a46c5a5c4865e9377ca8
SHA256cbd6285908f324025f83979d1cdac09b92b6ad04495cc14f7e60279636eb8d9c
SHA5122544e12b9438ecb7e5dd813fa669a1bafe1ffc2c5d4ced8b14dc2cc56579e507dd136c6cc29a712e244cd288a48003108c728fcf1c7cb7c233754c8141493fe9
-
Filesize
305KB
MD568b6a9f02746870e1b11789525426f0a
SHA1bafb01e3bfe170d92b78feb25f68fea07cfe1b31
SHA25671c9bc87148e496e162ed8107489a0a27c2d360b702315e2d4c2e80a464b3a3d
SHA512460466d124fc387702f930be3ce77c327d286a73756c0e4297a0c82bccfa4d154a88b43804ed632286b011c2b14888b8070c761e3c4526e0722dc422ae285ee6
-
Filesize
305KB
MD56ebe6fcbe29205cce0244bcdcb7d2afa
SHA1b629d4b96254fef69853c4892750d81ecf139ea6
SHA2563eea365965b441fb0913c4e495a5cbad2150690815d068e04bde4e483b4cef49
SHA5126caba616a2245d1d873ab2e07808e6acd23a4eeb161860226c609a0a3f81d8e124d20edad78d77e2d6c73eac9fa0950f1beaf6d528cbeb9f0cea08aba6107b46
-
Filesize
305KB
MD517001d57851c9fd0addd479ec16ace19
SHA1685687197b5110adb552ea13f019f38f0bb43ae6
SHA25672aed1952ff59af701302e4afe55393febb48228cbc17bbbfcf084030a445012
SHA5126104c63a697aea3d7befc599722229074d4b297213c848a26383c555eb739ddff3e27aeb17a9a4aa1d225da786897cc2b18bb5a697a12edebf38efcb33e931fb
-
Filesize
305KB
MD577103f56972b2b140838d5db941f02dc
SHA13875de8745a72a94efd08db9d0c0da626543e99c
SHA2569094a8ba735bc642bf9194f57727417d00138b26b0e1fd247ffdfe7065b27ec2
SHA512e72f715106edacf3de4d9693e4d09828b790f7e4197b26ec678c89b249bcc4e77facdd3b2149f40c95384905128a95a57010022388904680c96e123d2e6ecfb3