Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
02-08-2024 06:12
Static task
static1
Behavioral task
behavioral1
Sample
e5dd276473bec07dd2f8e405453a023b5d9353e7a9a97b0bd820cc5e7d9580da.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
e5dd276473bec07dd2f8e405453a023b5d9353e7a9a97b0bd820cc5e7d9580da.exe
Resource
win10v2004-20240730-en
General
-
Target
e5dd276473bec07dd2f8e405453a023b5d9353e7a9a97b0bd820cc5e7d9580da.exe
-
Size
96KB
-
MD5
9e02aa64213e9102ffc3542d7b0a5b3d
-
SHA1
17a0c3f40e6152fda6bd28a6b2e2434b219ba73b
-
SHA256
e5dd276473bec07dd2f8e405453a023b5d9353e7a9a97b0bd820cc5e7d9580da
-
SHA512
fa6d823227fde4d2144bf0fe99bc2f60be1c72d08346caf45317d5ce59f1db366431f8e16fb839bba93372a7dca310ee3a8dd7fd14dbbc3d9395be42d22a2533
-
SSDEEP
1536:a0zApOuVIZAWjQ4jahxFBomox3Ml2JgukbaAjWbjtKBvU:a0MpO5ZJjabFBzoxcl2+ukbVwtCU
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 56 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ikldqile.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jfjolf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jmkmjoec.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kocpbfei.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kageia32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" e5dd276473bec07dd2f8e405453a023b5d9353e7a9a97b0bd820cc5e7d9580da.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Kkjpggkn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Lcmklh32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jfjolf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jpgmpk32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kbjbge32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kidjdpie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Kidjdpie.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lmmfnb32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lofifi32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lgfjggll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Iaimipjl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Iknafhjb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jcnoejch.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Kkmmlgik.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Kgcnahoo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Llepen32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad e5dd276473bec07dd2f8e405453a023b5d9353e7a9a97b0bd820cc5e7d9580da.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ikldqile.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Kocpbfei.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kdbepm32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iknafhjb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Lgfjggll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Inmmbc32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jmkmjoec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Kdbepm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Kageia32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kgcnahoo.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lcmklh32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jikhnaao.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jpgmpk32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jfcabd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Lmmfnb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Lcohahpn.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iaimipjl.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Inmmbc32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kkmmlgik.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lcohahpn.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Inojhc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jfcabd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Kbjbge32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Kekkiq32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Llepen32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Lofifi32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jcnoejch.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kekkiq32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kkjpggkn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Lhlqjone.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Inojhc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jikhnaao.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lhlqjone.exe -
Executes dropped EXE 28 IoCs
pid Process 1804 Ikldqile.exe 3064 Iaimipjl.exe 2800 Iknafhjb.exe 2808 Inmmbc32.exe 920 Inojhc32.exe 2532 Jfjolf32.exe 2796 Jcnoejch.exe 1416 Jikhnaao.exe 568 Jpgmpk32.exe 2756 Jmkmjoec.exe 2260 Jfcabd32.exe 396 Kbjbge32.exe 2400 Kidjdpie.exe 2068 Kekkiq32.exe 2344 Kocpbfei.exe 940 Kkjpggkn.exe 1508 Kdbepm32.exe 2000 Kkmmlgik.exe 2480 Kageia32.exe 928 Kgcnahoo.exe 1008 Lmmfnb32.exe 860 Lgfjggll.exe 2320 Lcmklh32.exe 1552 Llepen32.exe 740 Lcohahpn.exe 2076 Lhlqjone.exe 2904 Lofifi32.exe 2516 Lepaccmo.exe -
Loads dropped DLL 60 IoCs
pid Process 2424 e5dd276473bec07dd2f8e405453a023b5d9353e7a9a97b0bd820cc5e7d9580da.exe 2424 e5dd276473bec07dd2f8e405453a023b5d9353e7a9a97b0bd820cc5e7d9580da.exe 1804 Ikldqile.exe 1804 Ikldqile.exe 3064 Iaimipjl.exe 3064 Iaimipjl.exe 2800 Iknafhjb.exe 2800 Iknafhjb.exe 2808 Inmmbc32.exe 2808 Inmmbc32.exe 920 Inojhc32.exe 920 Inojhc32.exe 2532 Jfjolf32.exe 2532 Jfjolf32.exe 2796 Jcnoejch.exe 2796 Jcnoejch.exe 1416 Jikhnaao.exe 1416 Jikhnaao.exe 568 Jpgmpk32.exe 568 Jpgmpk32.exe 2756 Jmkmjoec.exe 2756 Jmkmjoec.exe 2260 Jfcabd32.exe 2260 Jfcabd32.exe 396 Kbjbge32.exe 396 Kbjbge32.exe 2400 Kidjdpie.exe 2400 Kidjdpie.exe 2068 Kekkiq32.exe 2068 Kekkiq32.exe 2344 Kocpbfei.exe 2344 Kocpbfei.exe 940 Kkjpggkn.exe 940 Kkjpggkn.exe 1508 Kdbepm32.exe 1508 Kdbepm32.exe 2000 Kkmmlgik.exe 2000 Kkmmlgik.exe 2480 Kageia32.exe 2480 Kageia32.exe 928 Kgcnahoo.exe 928 Kgcnahoo.exe 1008 Lmmfnb32.exe 1008 Lmmfnb32.exe 860 Lgfjggll.exe 860 Lgfjggll.exe 2320 Lcmklh32.exe 2320 Lcmklh32.exe 1552 Llepen32.exe 1552 Llepen32.exe 740 Lcohahpn.exe 740 Lcohahpn.exe 2076 Lhlqjone.exe 2076 Lhlqjone.exe 2904 Lofifi32.exe 2904 Lofifi32.exe 2816 WerFault.exe 2816 WerFault.exe 2816 WerFault.exe 2816 WerFault.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\Kkjpggkn.exe Kocpbfei.exe File created C:\Windows\SysWOW64\Kgcnahoo.exe Kageia32.exe File created C:\Windows\SysWOW64\Annjfl32.dll Llepen32.exe File created C:\Windows\SysWOW64\Ikldqile.exe e5dd276473bec07dd2f8e405453a023b5d9353e7a9a97b0bd820cc5e7d9580da.exe File opened for modification C:\Windows\SysWOW64\Ikldqile.exe e5dd276473bec07dd2f8e405453a023b5d9353e7a9a97b0bd820cc5e7d9580da.exe File created C:\Windows\SysWOW64\Jfcabd32.exe Jmkmjoec.exe File created C:\Windows\SysWOW64\Eplpdepa.dll Jmkmjoec.exe File created C:\Windows\SysWOW64\Aiomcb32.dll Kbjbge32.exe File opened for modification C:\Windows\SysWOW64\Kekkiq32.exe Kidjdpie.exe File created C:\Windows\SysWOW64\Lmmfnb32.exe Kgcnahoo.exe File created C:\Windows\SysWOW64\Iaimipjl.exe Ikldqile.exe File opened for modification C:\Windows\SysWOW64\Jpgmpk32.exe Jikhnaao.exe File opened for modification C:\Windows\SysWOW64\Jmkmjoec.exe Jpgmpk32.exe File created C:\Windows\SysWOW64\Hlekjpbi.dll Kocpbfei.exe File opened for modification C:\Windows\SysWOW64\Kageia32.exe Kkmmlgik.exe File created C:\Windows\SysWOW64\Fkaamgeg.dll Ikldqile.exe File opened for modification C:\Windows\SysWOW64\Jfjolf32.exe Inojhc32.exe File created C:\Windows\SysWOW64\Pbpifm32.dll Inojhc32.exe File created C:\Windows\SysWOW64\Mobafhlg.dll Jfcabd32.exe File created C:\Windows\SysWOW64\Onpeobjf.dll Kdbepm32.exe File created C:\Windows\SysWOW64\Lhlqjone.exe Lcohahpn.exe File created C:\Windows\SysWOW64\Oopqjabc.dll Lhlqjone.exe File created C:\Windows\SysWOW64\Hapbpm32.dll Jpgmpk32.exe File opened for modification C:\Windows\SysWOW64\Kocpbfei.exe Kekkiq32.exe File opened for modification C:\Windows\SysWOW64\Lgfjggll.exe Lmmfnb32.exe File opened for modification C:\Windows\SysWOW64\Lepaccmo.exe Lofifi32.exe File opened for modification C:\Windows\SysWOW64\Lofifi32.exe Lhlqjone.exe File opened for modification C:\Windows\SysWOW64\Iknafhjb.exe Iaimipjl.exe File created C:\Windows\SysWOW64\Jcnoejch.exe Jfjolf32.exe File created C:\Windows\SysWOW64\Jpgmpk32.exe Jikhnaao.exe File created C:\Windows\SysWOW64\Ffakjm32.dll Kekkiq32.exe File created C:\Windows\SysWOW64\Kdbepm32.exe Kkjpggkn.exe File opened for modification C:\Windows\SysWOW64\Lmmfnb32.exe Kgcnahoo.exe File created C:\Windows\SysWOW64\Onkckhkp.dll Lcohahpn.exe File created C:\Windows\SysWOW64\Lpmdgf32.dll e5dd276473bec07dd2f8e405453a023b5d9353e7a9a97b0bd820cc5e7d9580da.exe File opened for modification C:\Windows\SysWOW64\Jfcabd32.exe Jmkmjoec.exe File opened for modification C:\Windows\SysWOW64\Kdbepm32.exe Kkjpggkn.exe File created C:\Windows\SysWOW64\Alhpic32.dll Kkjpggkn.exe File created C:\Windows\SysWOW64\Kageia32.exe Kkmmlgik.exe File opened for modification C:\Windows\SysWOW64\Kgcnahoo.exe Kageia32.exe File opened for modification C:\Windows\SysWOW64\Lhlqjone.exe Lcohahpn.exe File created C:\Windows\SysWOW64\Hnanlhmd.dll Lgfjggll.exe File created C:\Windows\SysWOW64\Kbclpfop.dll Inmmbc32.exe File created C:\Windows\SysWOW64\Jikhnaao.exe Jcnoejch.exe File opened for modification C:\Windows\SysWOW64\Kbjbge32.exe Jfcabd32.exe File created C:\Windows\SysWOW64\Kekkiq32.exe Kidjdpie.exe File created C:\Windows\SysWOW64\Agioom32.dll Kidjdpie.exe File created C:\Windows\SysWOW64\Kkmmlgik.exe Kdbepm32.exe File opened for modification C:\Windows\SysWOW64\Kkmmlgik.exe Kdbepm32.exe File created C:\Windows\SysWOW64\Llepen32.exe Lcmklh32.exe File opened for modification C:\Windows\SysWOW64\Iaimipjl.exe Ikldqile.exe File created C:\Windows\SysWOW64\Jfjolf32.exe Inojhc32.exe File created C:\Windows\SysWOW64\Qmeedp32.dll Jcnoejch.exe File created C:\Windows\SysWOW64\Lcohahpn.exe Llepen32.exe File created C:\Windows\SysWOW64\Faphfl32.dll Iknafhjb.exe File created C:\Windows\SysWOW64\Inojhc32.exe Inmmbc32.exe File created C:\Windows\SysWOW64\Kidjdpie.exe Kbjbge32.exe File created C:\Windows\SysWOW64\Lcmklh32.exe Lgfjggll.exe File opened for modification C:\Windows\SysWOW64\Lcohahpn.exe Llepen32.exe File created C:\Windows\SysWOW64\Oldhgaef.dll Lofifi32.exe File created C:\Windows\SysWOW64\Anafme32.dll Iaimipjl.exe File created C:\Windows\SysWOW64\Jmkmjoec.exe Jpgmpk32.exe File created C:\Windows\SysWOW64\Hfopbgif.dll Lmmfnb32.exe File created C:\Windows\SysWOW64\Mcbniafn.dll Lcmklh32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2816 2516 WerFault.exe 57 -
System Location Discovery: System Language Discovery 1 TTPs 29 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kidjdpie.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kkmmlgik.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Inojhc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jpgmpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jfcabd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kocpbfei.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kgcnahoo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lmmfnb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lofifi32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lepaccmo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Iaimipjl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jfjolf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kekkiq32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Llepen32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lcohahpn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jikhnaao.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kbjbge32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kkjpggkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lhlqjone.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Iknafhjb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jmkmjoec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kdbepm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e5dd276473bec07dd2f8e405453a023b5d9353e7a9a97b0bd820cc5e7d9580da.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Inmmbc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jcnoejch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kageia32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lgfjggll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lcmklh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ikldqile.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID e5dd276473bec07dd2f8e405453a023b5d9353e7a9a97b0bd820cc5e7d9580da.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ikldqile.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Inojhc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Jmkmjoec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Jfcabd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Kageia32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Lgfjggll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mcbniafn.dll" Lcmklh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Onkckhkp.dll" Lcohahpn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Jcnoejch.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Jpgmpk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aiomcb32.dll" Kbjbge32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Agioom32.dll" Kidjdpie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Iaimipjl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Iknafhjb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eplpdepa.dll" Jmkmjoec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Alhpic32.dll" Kkjpggkn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Lmmfnb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hnanlhmd.dll" Lgfjggll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Llepen32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Lofifi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qmeedp32.dll" Jcnoejch.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Lcmklh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Anafme32.dll" Iaimipjl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Iknafhjb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pbpifm32.dll" Inojhc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cgngaoal.dll" Jfjolf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Jpgmpk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hapbpm32.dll" Jpgmpk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Lcohahpn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Lhlqjone.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 e5dd276473bec07dd2f8e405453a023b5d9353e7a9a97b0bd820cc5e7d9580da.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ikldqile.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Faphfl32.dll" Iknafhjb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pgodelnq.dll" Kageia32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Kbjbge32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Kekkiq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ffakjm32.dll" Kekkiq32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Kocpbfei.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Kkjpggkn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Kgcnahoo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Lcohahpn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Inmmbc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Kbjbge32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Kgcnahoo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oldhgaef.dll" Lofifi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Jfjolf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Khljoh32.dll" Jikhnaao.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Jmkmjoec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Kidjdpie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hlekjpbi.dll" Kocpbfei.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Kkmmlgik.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fkaamgeg.dll" Ikldqile.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Inojhc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Kdbepm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Kkmmlgik.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Annjfl32.dll" Llepen32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" e5dd276473bec07dd2f8e405453a023b5d9353e7a9a97b0bd820cc5e7d9580da.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Jfjolf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Jikhnaao.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Kkjpggkn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Onpeobjf.dll" Kdbepm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Lhlqjone.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Kekkiq32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2424 wrote to memory of 1804 2424 e5dd276473bec07dd2f8e405453a023b5d9353e7a9a97b0bd820cc5e7d9580da.exe 30 PID 2424 wrote to memory of 1804 2424 e5dd276473bec07dd2f8e405453a023b5d9353e7a9a97b0bd820cc5e7d9580da.exe 30 PID 2424 wrote to memory of 1804 2424 e5dd276473bec07dd2f8e405453a023b5d9353e7a9a97b0bd820cc5e7d9580da.exe 30 PID 2424 wrote to memory of 1804 2424 e5dd276473bec07dd2f8e405453a023b5d9353e7a9a97b0bd820cc5e7d9580da.exe 30 PID 1804 wrote to memory of 3064 1804 Ikldqile.exe 31 PID 1804 wrote to memory of 3064 1804 Ikldqile.exe 31 PID 1804 wrote to memory of 3064 1804 Ikldqile.exe 31 PID 1804 wrote to memory of 3064 1804 Ikldqile.exe 31 PID 3064 wrote to memory of 2800 3064 Iaimipjl.exe 32 PID 3064 wrote to memory of 2800 3064 Iaimipjl.exe 32 PID 3064 wrote to memory of 2800 3064 Iaimipjl.exe 32 PID 3064 wrote to memory of 2800 3064 Iaimipjl.exe 32 PID 2800 wrote to memory of 2808 2800 Iknafhjb.exe 33 PID 2800 wrote to memory of 2808 2800 Iknafhjb.exe 33 PID 2800 wrote to memory of 2808 2800 Iknafhjb.exe 33 PID 2800 wrote to memory of 2808 2800 Iknafhjb.exe 33 PID 2808 wrote to memory of 920 2808 Inmmbc32.exe 34 PID 2808 wrote to memory of 920 2808 Inmmbc32.exe 34 PID 2808 wrote to memory of 920 2808 Inmmbc32.exe 34 PID 2808 wrote to memory of 920 2808 Inmmbc32.exe 34 PID 920 wrote to memory of 2532 920 Inojhc32.exe 35 PID 920 wrote to memory of 2532 920 Inojhc32.exe 35 PID 920 wrote to memory of 2532 920 Inojhc32.exe 35 PID 920 wrote to memory of 2532 920 Inojhc32.exe 35 PID 2532 wrote to memory of 2796 2532 Jfjolf32.exe 36 PID 2532 wrote to memory of 2796 2532 Jfjolf32.exe 36 PID 2532 wrote to memory of 2796 2532 Jfjolf32.exe 36 PID 2532 wrote to memory of 2796 2532 Jfjolf32.exe 36 PID 2796 wrote to memory of 1416 2796 Jcnoejch.exe 37 PID 2796 wrote to memory of 1416 2796 Jcnoejch.exe 37 PID 2796 wrote to memory of 1416 2796 Jcnoejch.exe 37 PID 2796 wrote to memory of 1416 2796 Jcnoejch.exe 37 PID 1416 wrote to memory of 568 1416 Jikhnaao.exe 38 PID 1416 wrote to memory of 568 1416 Jikhnaao.exe 38 PID 1416 wrote to memory of 568 1416 Jikhnaao.exe 38 PID 1416 wrote to memory of 568 1416 Jikhnaao.exe 38 PID 568 wrote to memory of 2756 568 Jpgmpk32.exe 39 PID 568 wrote to memory of 2756 568 Jpgmpk32.exe 39 PID 568 wrote to memory of 2756 568 Jpgmpk32.exe 39 PID 568 wrote to memory of 2756 568 Jpgmpk32.exe 39 PID 2756 wrote to memory of 2260 2756 Jmkmjoec.exe 40 PID 2756 wrote to memory of 2260 2756 Jmkmjoec.exe 40 PID 2756 wrote to memory of 2260 2756 Jmkmjoec.exe 40 PID 2756 wrote to memory of 2260 2756 Jmkmjoec.exe 40 PID 2260 wrote to memory of 396 2260 Jfcabd32.exe 41 PID 2260 wrote to memory of 396 2260 Jfcabd32.exe 41 PID 2260 wrote to memory of 396 2260 Jfcabd32.exe 41 PID 2260 wrote to memory of 396 2260 Jfcabd32.exe 41 PID 396 wrote to memory of 2400 396 Kbjbge32.exe 42 PID 396 wrote to memory of 2400 396 Kbjbge32.exe 42 PID 396 wrote to memory of 2400 396 Kbjbge32.exe 42 PID 396 wrote to memory of 2400 396 Kbjbge32.exe 42 PID 2400 wrote to memory of 2068 2400 Kidjdpie.exe 43 PID 2400 wrote to memory of 2068 2400 Kidjdpie.exe 43 PID 2400 wrote to memory of 2068 2400 Kidjdpie.exe 43 PID 2400 wrote to memory of 2068 2400 Kidjdpie.exe 43 PID 2068 wrote to memory of 2344 2068 Kekkiq32.exe 44 PID 2068 wrote to memory of 2344 2068 Kekkiq32.exe 44 PID 2068 wrote to memory of 2344 2068 Kekkiq32.exe 44 PID 2068 wrote to memory of 2344 2068 Kekkiq32.exe 44 PID 2344 wrote to memory of 940 2344 Kocpbfei.exe 45 PID 2344 wrote to memory of 940 2344 Kocpbfei.exe 45 PID 2344 wrote to memory of 940 2344 Kocpbfei.exe 45 PID 2344 wrote to memory of 940 2344 Kocpbfei.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\e5dd276473bec07dd2f8e405453a023b5d9353e7a9a97b0bd820cc5e7d9580da.exe"C:\Users\Admin\AppData\Local\Temp\e5dd276473bec07dd2f8e405453a023b5d9353e7a9a97b0bd820cc5e7d9580da.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Windows\SysWOW64\Ikldqile.exeC:\Windows\system32\Ikldqile.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Windows\SysWOW64\Iaimipjl.exeC:\Windows\system32\Iaimipjl.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Windows\SysWOW64\Iknafhjb.exeC:\Windows\system32\Iknafhjb.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Windows\SysWOW64\Inmmbc32.exeC:\Windows\system32\Inmmbc32.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\SysWOW64\Inojhc32.exeC:\Windows\system32\Inojhc32.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:920 -
C:\Windows\SysWOW64\Jfjolf32.exeC:\Windows\system32\Jfjolf32.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Windows\SysWOW64\Jcnoejch.exeC:\Windows\system32\Jcnoejch.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\SysWOW64\Jikhnaao.exeC:\Windows\system32\Jikhnaao.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Windows\SysWOW64\Jpgmpk32.exeC:\Windows\system32\Jpgmpk32.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:568 -
C:\Windows\SysWOW64\Jmkmjoec.exeC:\Windows\system32\Jmkmjoec.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\SysWOW64\Jfcabd32.exeC:\Windows\system32\Jfcabd32.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Windows\SysWOW64\Kbjbge32.exeC:\Windows\system32\Kbjbge32.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:396 -
C:\Windows\SysWOW64\Kidjdpie.exeC:\Windows\system32\Kidjdpie.exe14⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Windows\SysWOW64\Kekkiq32.exeC:\Windows\system32\Kekkiq32.exe15⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Windows\SysWOW64\Kocpbfei.exeC:\Windows\system32\Kocpbfei.exe16⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Windows\SysWOW64\Kkjpggkn.exeC:\Windows\system32\Kkjpggkn.exe17⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:940 -
C:\Windows\SysWOW64\Kdbepm32.exeC:\Windows\system32\Kdbepm32.exe18⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1508 -
C:\Windows\SysWOW64\Kkmmlgik.exeC:\Windows\system32\Kkmmlgik.exe19⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2000 -
C:\Windows\SysWOW64\Kageia32.exeC:\Windows\system32\Kageia32.exe20⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2480 -
C:\Windows\SysWOW64\Kgcnahoo.exeC:\Windows\system32\Kgcnahoo.exe21⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:928 -
C:\Windows\SysWOW64\Lmmfnb32.exeC:\Windows\system32\Lmmfnb32.exe22⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1008 -
C:\Windows\SysWOW64\Lgfjggll.exeC:\Windows\system32\Lgfjggll.exe23⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:860 -
C:\Windows\SysWOW64\Lcmklh32.exeC:\Windows\system32\Lcmklh32.exe24⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2320 -
C:\Windows\SysWOW64\Llepen32.exeC:\Windows\system32\Llepen32.exe25⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1552 -
C:\Windows\SysWOW64\Lcohahpn.exeC:\Windows\system32\Lcohahpn.exe26⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:740 -
C:\Windows\SysWOW64\Lhlqjone.exeC:\Windows\system32\Lhlqjone.exe27⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2076 -
C:\Windows\SysWOW64\Lofifi32.exeC:\Windows\system32\Lofifi32.exe28⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2904 -
C:\Windows\SysWOW64\Lepaccmo.exeC:\Windows\system32\Lepaccmo.exe29⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2516 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2516 -s 14030⤵
- Loads dropped DLL
- Program crash
PID:2816
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD59cd6983fe734d4fa6e586996b262bb17
SHA1771a3b1cbfb87286288ed5a11c500bb90dee1f43
SHA2567a585b3eeb8fdb3fa8371e22c461a4e4af01f1a0320c521951c97ad0fd9325d5
SHA5127423809043aab1cd1b9ae1c3177a7df1520d03e8f1c7dac63aaa37efbea9dce5f64987829ef3117e102c57cc888a67154143579d46665f0ea4125c67f3b62861
-
Filesize
96KB
MD56073628c425238d2c7e4fc8c1f31bc89
SHA1729e5c4ec26147759dd9a3a9a56081090584e9dc
SHA256b8042fd30f8219f586ce6a4737424739d269824a84ef05e3668268185add4670
SHA512886d1d45184b7fe4204223abef76ff397b403839bb775fd281dc93e4bcb4c55b7e393d759963c5165b205856dc11d3f6e64bdb8d0f2113500c26ae3096dd1a44
-
Filesize
96KB
MD5cdbb6cfed2ca54b74fe37969afa88b6a
SHA1cef834b49aa9a5af30cdd12896a5da28616b8097
SHA25642dda72117a48cd81430efc96c439b054fe0a61a45eb56a330b3274c0937f57d
SHA512f99777c7e2be42c9a7309f35534380a65eb748af26fe90b563215e54842903fd5b4872d8be7f05784d814eb21389af46439757656ce10e9acbeed24ca4dafd1a
-
Filesize
96KB
MD5b89199e26fce65d0804e80ee2cc32414
SHA136875adff1d18366eb55dae9dbe7c3760b3026f4
SHA25646b533e9c84bfcc11d47e6399f9d544a269a739771ea0ca2e7155573011fbe44
SHA5125594173745e9f2675990b8f8baf353df839a140a70e80ce1345475236d30f041c8a3899e70fed807ea6c394511ee2bdda6049be69935e4c47ff11dc4e4335760
-
Filesize
96KB
MD5e8f7116e87762703e01da9f1d3560441
SHA1f86d100c18b42c7aedb12239dda7616c08f26452
SHA256d23b842442df12f4b865873240e9d0fb202017e0ae99a68f1a0cba0d83f19413
SHA512587ba6abf28eafc3935cad3552e9fd09d44b12e20595c49881ec910a83cb126ed7993c2fee055f4d45af1e97447f15c0f30208745c10c33869d216a2b379abb0
-
Filesize
96KB
MD5d8d7824c87bd464ac0438127543a193e
SHA1150ac7506bfb1c2866568ef86a78b7877ab907be
SHA25622fb4339f58049cf9fc40b48c913c65d362f5243143c6570c59f33a8377cf9d7
SHA512ed46e411d16648970210fbd89a890631bc3f67bb7a6d7928a39f25101c504aa697bff2d9f8f49e150850ce1b40c600f2fc6d6a7e46e55e5eb75fbc4ae064ae36
-
Filesize
96KB
MD54c7a3b8faef31d00c7b9b5585ed0815a
SHA1c9ed0689f24ad4d0083eef0c9fa0319c63926aae
SHA25660f610ac3e937c37d2e1f6b6ea1158317e96e2b9cf9f06105c1d61cf58f460a1
SHA51269a54606569e9ef9af6852e68f11f832f50ca2268c952c4cba87f676cbb7eccb78796adb33a42b2cfa92fdb230269c4816ea67a457595026236d7665af5ff996
-
Filesize
96KB
MD5a161b382174a8c129963b8f5d90a990a
SHA104cfcb87611db6d8480c71ee86d12494b66076d1
SHA2560e855f0b847af89b1a59f0f277f2d8b1542bb665c353c004639dfbf7bf348a6a
SHA512e385777cd6c3dcd3f62efb0859673bbcf1a4d0fd96385698497b7e9442164710eb0415b4022e7456755eff7775728a2e5788c3331128a937744538d9dfbb7e7e
-
Filesize
7KB
MD583460892ceeee63341ebdc173a638dc8
SHA13dcd4d62ff3559cb154aa073ad64b1079a7eca65
SHA256c4b36d93f494c9d7ee5b43880c768e044c6b21bbbf081703da87f0b0bb44e290
SHA5129ae2ddbc66beaafb6e9dbe8ee1187be4a3a1a698a74d0cfd82862129f99e9682f075e1bade0a9a995f0a07c968dfd433dba99f3e535f8e22d6d6a85ed506e5ce
-
Filesize
96KB
MD564a83dfc50bcd7e47573af86e096e506
SHA1f1d598c01cdb2c0f748569435839b033abd74fb4
SHA25682a67f8ca4b82602c5a5d90fd458c82b5cbfaee708aa9fe39367a836eb8e11f2
SHA512f549b204010c88eb2a5b632a0f8d12ca7dd28c8949db7c6b834c76c6b9953d99c2631fcbe0b0adb6e11065d629ba9e6eaae703daf8c506c05ec607219fa34edd
-
Filesize
96KB
MD5c9c0d2cc6840eeafc1a54a627c0b1e4e
SHA15f50b4cc59555e4d0adb7c5eb12baa0d12829ba5
SHA256167cf4ce8f60a2a74b88e251247e65e0d16962be497f1036a20c14c25475f46f
SHA512d14dc2ad93fd50d97fe00421f80e950ea22ada1f510fd6bf9e30a1f89fd26466d1b12431f3a714d53a66c414099270d1f4cc5ed3fbda4d2d211798ebb9c14c98
-
Filesize
96KB
MD5cd759c9cf6f211fe4d4499530a4bd0e7
SHA142c8a70fde8f655ea6807c1895686609e600a2d7
SHA256bd60d3b8decb338106f0583e4247da554a60e7bc433b0ddef764a94d81b46fc0
SHA512ca017112f5eb0062c915fca2229bc32260368e4b7c7409b5beedc1e7c2c3711bc42e24492774c2b9dabcedf008762c17ca652ce2e4f6d95739c9061365d37f4d
-
Filesize
96KB
MD545480fb83ac6dd29490d9ef7f6539a31
SHA17e3af3c8d24d7f549179645c123d3e89efb20316
SHA2560a343f1018b776a2c77db97b79eda325f3157003ac145befdd2f79db0737286c
SHA5124c3e820b5053d779b27692fd61c2777fbd47e8e3dfab7447a2c0469e58dc2c7c053f7a9b5042f73cfbb181a3e13f044f12dc77d1d443fec332c7d59f9a183685
-
Filesize
96KB
MD58f78fe9ff21a6663f61ec52f6e638a65
SHA1bb194e4dcfebab53923ed99b2409fc3aed69bf55
SHA256727d067c97845acb055576ab561b69b4b60833cbfa557dc94dd06081036bf068
SHA51269002dc2fef9ab46c857d913a3f10f808532db22d5eae578b68cb2453d9952cffa2504e36e25151e7374ce85a47a6e8d5cec1ec38e5bcd0995f60bea32221b0f
-
Filesize
96KB
MD513113a95dae0ac6d6de6b74b416eda6d
SHA107d4e63f8f633a17fe5c5f2cf2ad900dffc299d8
SHA25678202d5c9957e613866f31fc8a7c6f4f066e53f49f3bb14faddda2e449995788
SHA51259b26d0161270c10913320b06ed0dc20758d262a939f67a55400d7ae2746e0e7a26e9e088239df2c410acd07b27f19a3695c6eade84b33b623dca44f6f3f1a6a
-
Filesize
96KB
MD5f86c52bd3a6649dbaca0b5ea383be6cf
SHA1443b8bdf627e9d57fb3ebcc135403766c5ad6276
SHA256f92fd1a905e20c795d0a201a9ff76bb8279699d46c5f672f19fd81a9e6ff7d78
SHA5125e427d92ee94bebe4b49ad935fc7dea795efd3caffb003060d30252f20ab7015ff3dc38d5a78a7bcff46eaeadf263e2a3bcff4a94ef243707718737213ed89b1
-
Filesize
96KB
MD555f9565fcb972584b1195749bf61eb8d
SHA195f311c40192ba7653f361d50e402593ccdc03e5
SHA256ca37bb319a7e5db7e54bb10a0dbba81ed74d0f26d833018935668b80c72fc3ec
SHA5125022840bcab73010a8fec766df949f59f595501426ffa31b0da36444a1e6ecaf13428ee06afbeeb35de7c5720d7aa1a968fb0ade27296538766a54336a7eef0e
-
Filesize
96KB
MD50cc937af99fb6843610410f585739255
SHA1c660bcf2fd3cd168e0e957f66d55851f632daf75
SHA256c6025b790c0483b91463874515388648e372f7eae3338818cbea7996843b8201
SHA5124171b09dc18bd4b4f46374729f0f3b3a25776458621b2fae9b258f99d219e3d0661463b23bb12c0145656272ba0ef33bb6f400b7e095ebd132027c40eab0dfe0
-
Filesize
96KB
MD545fb4a7116555efe22f33481504aa267
SHA119728d59b3404c0671a112a9f91cf13db57a632f
SHA2564c57eda5a812999e380cf6d0b8d2b08675b9789660a095cc5e95318c70a036ff
SHA512b4adf0df73fc9071c4aeb5acf89f60135f3d5c4f2bb72613d3ef4a81c6c8f3f92ccec08a14c793afeb566ca35347ae514093d49ccd57b581d7f5f132aea0f9a2
-
Filesize
96KB
MD56dc5c8d0b0b439ce690bda660502a00e
SHA1829e4b9ed14f63f43bef4aa1c80d92a7d512ed61
SHA25648018048ae1fa99c6f70f2bb234c8ff62144838d6c8a5ebc19395e8c1508e625
SHA512420f0fd5d9abeaf62cdf43dc37e3d364569dee997c8b781977cb7637de98aa072550056dd0ef15584d95e179737cbd5809cb3d37b26f574392b57b557fa6f968
-
Filesize
96KB
MD5146c648ccb3b4863978b0a032bae06ec
SHA16c7a79f067fe3065f92a1708c514620e1a017f98
SHA2568a91e28d7ec7b6a14b35871d146b705c68a539561cc656ab368c0a697b36f7a8
SHA512a17405b6add8ecd230d3272b50c3545215647ceb13de610de0497f6a1c0f52df8a5de0186ca79d1f327b65aa5b7052e4d1d07b718d60326d61f081a91a239caa
-
Filesize
96KB
MD5d1feee3cf96f54ee3841c661cb8a43f3
SHA1a1d93f027effbc8f027216bacb27127f426a0ad0
SHA256a267d5b1edb9bffc6d3190cfcb84af1f1a0df1c0c21a632ef083e11c41441765
SHA51218193dde8d8d429fcfeda1419bb5df2269fa7608a396a633081e26019504893a3e64b9d3b52d71c68b1cdaaa50ce6b4a7c2d2a21eb8612db7dd8387496342d0e
-
Filesize
96KB
MD5a0971cc88f2c66e49608197bb0622734
SHA18ab74539e5ced12139d28f8dff065315607d3003
SHA256a37e59a51b39c1dc6aeac2eb973d6b878f4e24c6825d998421544d197f40496e
SHA51278493ad1d0fe9734305cf1fa34501d1ea022e97bc4e9fc926fd351edd746349604f865c6c73d6fa528b821c5ed5239756dd1deb8e28c1f6d67e7aa4120cbe505
-
Filesize
96KB
MD577f1cdeed16984408b8a843cdc424b64
SHA12d875a3daae0163f743920a0491aece19fa4f8d8
SHA25658461f2666651dac1659d18842e7fa4290c840cdeb68a86a7b6c5467f6e86bf9
SHA512436eb59c2c0585aae406282b6ee8f1611c2fc24d880497d684a71c01f015dabbf8197ef501fb4a1f6a87638dd597c028bda554c4a7c66c6ea07cb219a67c6f4e
-
Filesize
96KB
MD555a05906977bdce9eb62b25e5a7bbbff
SHA14dbe7e4de9317e9dd4a23728ed548e3d0c719762
SHA25653d8195998afc62d39aeb589b62c206c4fdfc31dabd8a971d19860d7b8dbc73a
SHA51252351725f2cda6137eb3a2afaeb5444653c39cdd0b098d0de4fff9b908b632199f718fa7104df25e839a6012fc940b636c56c3672b9a4e6c9c0ad5ec4bb03eab
-
Filesize
96KB
MD513e871d3ade349562c8f84b9da569d58
SHA1df0cfc18005ab167fa3ce86759ba12b318db34af
SHA2563de7e4797e7a8b2bb851c2ce5a79ab0197ae995f9739b7ef479e88d948c1afb2
SHA51284d77a9e5eb2b71d2733657a8733f786f0043f9f0525e18d90898d2229f7de73505886b7e6ad5b9af60f834b33d0e28d9d19a9ef36b7e6809983c0917acdec1a
-
Filesize
96KB
MD5f6864b9fecb8bbcdb2c0abf59e977b2d
SHA15d994b577b5c69010dcaaa6c5bc3208b974e3fac
SHA25618338bef4cf4891de67c70f4062ad49c4a2592cae98111f0af470b28e303ad12
SHA51217183a1653063ad253a648c71b0c8fe36738fe1323d466201ab8eab45a5acc71b3ef66066df100fb1ec077f590e4b684685d766c0425c38cb638a88b81464466
-
Filesize
96KB
MD564a6550e705eff1d76258030bad6b23a
SHA1eed03fc5bbe36aea92ccc6eed9296aee34493003
SHA256d73cf781c18806a0d7f6f6441c19e3e20c9beb76e3f2e92f695267dcf6dcff42
SHA512abeadd6db8e4d99aae54bff82240cae02b7c7e77653e85416fdcc3e76f7313bbcff2e3d9f1c6bfceed9a9f0a35d7782449672508764099dcdc712291601d5c84
-
Filesize
96KB
MD5807b453b765333897dacd0d0fccce7c3
SHA1c781aac141891fc7c3af6ba46ef6e370e2b435e3
SHA25602f49459635e95d6cf0f45f989e8cf7d7b5ac79a071bf294f1e3ad0ae4d1fff9
SHA512423301b6f6fd23e6a274b4975eed040daf3f5eaa44aad537aa78e6e3d4a0e300daad1721ea172a0fc35c16858e77fef68a3951bd077102dcedddff14bc6198ef