Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
112s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
06/08/2024, 13:56
Static task
static1
Behavioral task
behavioral1
Sample
b590f6527582b0b25e2b25cba38054a0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b590f6527582b0b25e2b25cba38054a0N.exe
Resource
win10v2004-20240802-en
General
-
Target
b590f6527582b0b25e2b25cba38054a0N.exe
-
Size
359KB
-
MD5
b590f6527582b0b25e2b25cba38054a0
-
SHA1
f5868d861dad510211e61cccae4f94bdae00e8cc
-
SHA256
bb3954fc12a07bf40af7e3849a814d15c2df5d889d61e55c33fb1d1aae7c11d3
-
SHA512
f35dca5eb5927b7f0be17f8055fba943585c08ef9c5d42e5d8d5501181818a001752c7a01d19236d304a20507500b3c7c2d07f56dadd38f97b3d5982a4512e75
-
SSDEEP
6144:IFa+533HNUaCL4YVrOigcC6oQ6+EcC6oQ6+YahBQyiTACPTRN6+YahBQyiTAgiuf:uN3HiK9E6n9E6vah6yiMCPTRN6vah6y2
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 56 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kjeglh32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ldgnklmi.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad b590f6527582b0b25e2b25cba38054a0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Hjcaha32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ioeclg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Iegeonpc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jmfcop32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hjcaha32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jbhebfck.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Igceej32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Hgqlafap.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Kkjpggkn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Kadica32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jabponba.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kbmome32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Hadcipbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jnagmc32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jmfcop32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Kdbepm32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hadcipbi.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iipejmko.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Igceej32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jmkmjoec.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jlnmel32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Iocgfhhc.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hbofmcij.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Hbofmcij.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Imbjcpnn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Kjeglh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jlnmel32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kambcbhb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Khgkpl32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hdbpekam.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hgqlafap.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iocgfhhc.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ikldqile.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jnagmc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" b590f6527582b0b25e2b25cba38054a0N.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jmkmjoec.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jbhebfck.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Khgkpl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ikldqile.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kadica32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ldgnklmi.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ioeclg32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iegeonpc.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kmimcbja.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kdbepm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Iipejmko.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kkjpggkn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Kmimcbja.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Hdbpekam.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Imbjcpnn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jabponba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Kambcbhb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Kbmome32.exe -
Executes dropped EXE 28 IoCs
pid Process 2208 Hadcipbi.exe 2684 Hdbpekam.exe 2788 Hgqlafap.exe 2612 Hjcaha32.exe 3028 Hbofmcij.exe 2256 Iocgfhhc.exe 1516 Ioeclg32.exe 1224 Ikldqile.exe 1740 Iipejmko.exe 1056 Igceej32.exe 2380 Iegeonpc.exe 292 Imbjcpnn.exe 2352 Jnagmc32.exe 2464 Jmfcop32.exe 616 Jabponba.exe 1620 Jmkmjoec.exe 1492 Jlnmel32.exe 1096 Jbhebfck.exe 1984 Kambcbhb.exe 2996 Khgkpl32.exe 1756 Kjeglh32.exe 1148 Kbmome32.exe 1040 Kkjpggkn.exe 2180 Kmimcbja.exe 1596 Kadica32.exe 2820 Kdbepm32.exe 2796 Ldgnklmi.exe 2824 Lbjofi32.exe -
Loads dropped DLL 60 IoCs
pid Process 2252 b590f6527582b0b25e2b25cba38054a0N.exe 2252 b590f6527582b0b25e2b25cba38054a0N.exe 2208 Hadcipbi.exe 2208 Hadcipbi.exe 2684 Hdbpekam.exe 2684 Hdbpekam.exe 2788 Hgqlafap.exe 2788 Hgqlafap.exe 2612 Hjcaha32.exe 2612 Hjcaha32.exe 3028 Hbofmcij.exe 3028 Hbofmcij.exe 2256 Iocgfhhc.exe 2256 Iocgfhhc.exe 1516 Ioeclg32.exe 1516 Ioeclg32.exe 1224 Ikldqile.exe 1224 Ikldqile.exe 1740 Iipejmko.exe 1740 Iipejmko.exe 1056 Igceej32.exe 1056 Igceej32.exe 2380 Iegeonpc.exe 2380 Iegeonpc.exe 292 Imbjcpnn.exe 292 Imbjcpnn.exe 2352 Jnagmc32.exe 2352 Jnagmc32.exe 2464 Jmfcop32.exe 2464 Jmfcop32.exe 616 Jabponba.exe 616 Jabponba.exe 1620 Jmkmjoec.exe 1620 Jmkmjoec.exe 1492 Jlnmel32.exe 1492 Jlnmel32.exe 1096 Jbhebfck.exe 1096 Jbhebfck.exe 1984 Kambcbhb.exe 1984 Kambcbhb.exe 2996 Khgkpl32.exe 2996 Khgkpl32.exe 1756 Kjeglh32.exe 1756 Kjeglh32.exe 1148 Kbmome32.exe 1148 Kbmome32.exe 1040 Kkjpggkn.exe 1040 Kkjpggkn.exe 2180 Kmimcbja.exe 2180 Kmimcbja.exe 1596 Kadica32.exe 1596 Kadica32.exe 2820 Kdbepm32.exe 2820 Kdbepm32.exe 2796 Ldgnklmi.exe 2796 Ldgnklmi.exe 2696 WerFault.exe 2696 WerFault.exe 2696 WerFault.exe 2696 WerFault.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\Hbofmcij.exe Hjcaha32.exe File created C:\Windows\SysWOW64\Dfcllk32.dll Hbofmcij.exe File opened for modification C:\Windows\SysWOW64\Kmimcbja.exe Kkjpggkn.exe File opened for modification C:\Windows\SysWOW64\Iocgfhhc.exe Hbofmcij.exe File created C:\Windows\SysWOW64\Ioeclg32.exe Iocgfhhc.exe File created C:\Windows\SysWOW64\Alhpic32.dll Kadica32.exe File created C:\Windows\SysWOW64\Ikldqile.exe Ioeclg32.exe File opened for modification C:\Windows\SysWOW64\Jmkmjoec.exe Jabponba.exe File created C:\Windows\SysWOW64\Mkehop32.dll Kjeglh32.exe File created C:\Windows\SysWOW64\Lpmdgf32.dll Ioeclg32.exe File created C:\Windows\SysWOW64\Jmfcop32.exe Jnagmc32.exe File opened for modification C:\Windows\SysWOW64\Jabponba.exe Jmfcop32.exe File created C:\Windows\SysWOW64\Kambcbhb.exe Jbhebfck.exe File created C:\Windows\SysWOW64\Kbmome32.exe Kjeglh32.exe File created C:\Windows\SysWOW64\Hdbpekam.exe Hadcipbi.exe File opened for modification C:\Windows\SysWOW64\Hgqlafap.exe Hdbpekam.exe File opened for modification C:\Windows\SysWOW64\Hjcaha32.exe Hgqlafap.exe File created C:\Windows\SysWOW64\Kmimcbja.exe Kkjpggkn.exe File created C:\Windows\SysWOW64\Pccohd32.dll Jnagmc32.exe File created C:\Windows\SysWOW64\Jmkmjoec.exe Jabponba.exe File created C:\Windows\SysWOW64\Jlnmel32.exe Jmkmjoec.exe File created C:\Windows\SysWOW64\Kkjpggkn.exe Kbmome32.exe File created C:\Windows\SysWOW64\Aibijk32.dll b590f6527582b0b25e2b25cba38054a0N.exe File created C:\Windows\SysWOW64\Flpkcb32.dll Hadcipbi.exe File created C:\Windows\SysWOW64\Bgcmiq32.dll Iipejmko.exe File opened for modification C:\Windows\SysWOW64\Kjeglh32.exe Khgkpl32.exe File created C:\Windows\SysWOW64\Hlekjpbi.dll Kbmome32.exe File created C:\Windows\SysWOW64\Hhhamf32.dll Kmimcbja.exe File created C:\Windows\SysWOW64\Igceej32.exe Iipejmko.exe File opened for modification C:\Windows\SysWOW64\Iegeonpc.exe Igceej32.exe File created C:\Windows\SysWOW64\Hgajdjlj.dll Jlnmel32.exe File opened for modification C:\Windows\SysWOW64\Jnagmc32.exe Imbjcpnn.exe File created C:\Windows\SysWOW64\Ekhnnojb.dll Imbjcpnn.exe File opened for modification C:\Windows\SysWOW64\Khgkpl32.exe Kambcbhb.exe File created C:\Windows\SysWOW64\Ciqmoj32.dll Khgkpl32.exe File opened for modification C:\Windows\SysWOW64\Kdbepm32.exe Kadica32.exe File created C:\Windows\SysWOW64\Hadcipbi.exe b590f6527582b0b25e2b25cba38054a0N.exe File created C:\Windows\SysWOW64\Hjcaha32.exe Hgqlafap.exe File created C:\Windows\SysWOW64\Mlpckqje.dll Iegeonpc.exe File opened for modification C:\Windows\SysWOW64\Jmfcop32.exe Jnagmc32.exe File created C:\Windows\SysWOW64\Kadica32.exe Kmimcbja.exe File created C:\Windows\SysWOW64\Eogffk32.dll Hgqlafap.exe File created C:\Windows\SysWOW64\Iegeonpc.exe Igceej32.exe File opened for modification C:\Windows\SysWOW64\Imbjcpnn.exe Iegeonpc.exe File created C:\Windows\SysWOW64\Eqpkfe32.dll Hdbpekam.exe File created C:\Windows\SysWOW64\Oiahkhpo.dll Jmfcop32.exe File opened for modification C:\Windows\SysWOW64\Kbmome32.exe Kjeglh32.exe File created C:\Windows\SysWOW64\Hapbpm32.dll Jabponba.exe File created C:\Windows\SysWOW64\Khgkpl32.exe Kambcbhb.exe File created C:\Windows\SysWOW64\Kdbepm32.exe Kadica32.exe File opened for modification C:\Windows\SysWOW64\Ldgnklmi.exe Kdbepm32.exe File opened for modification C:\Windows\SysWOW64\Hadcipbi.exe b590f6527582b0b25e2b25cba38054a0N.exe File opened for modification C:\Windows\SysWOW64\Ikldqile.exe Ioeclg32.exe File opened for modification C:\Windows\SysWOW64\Iipejmko.exe Ikldqile.exe File created C:\Windows\SysWOW64\Jabponba.exe Jmfcop32.exe File created C:\Windows\SysWOW64\Mnpkephg.dll Jmkmjoec.exe File opened for modification C:\Windows\SysWOW64\Jbhebfck.exe Jlnmel32.exe File created C:\Windows\SysWOW64\Blbjlj32.dll Jbhebfck.exe File created C:\Windows\SysWOW64\Pcdapknb.dll Kambcbhb.exe File created C:\Windows\SysWOW64\Ifblipqh.dll Iocgfhhc.exe File created C:\Windows\SysWOW64\Iipejmko.exe Ikldqile.exe File created C:\Windows\SysWOW64\Imbjcpnn.exe Iegeonpc.exe File created C:\Windows\SysWOW64\Ipafocdg.dll Ldgnklmi.exe File opened for modification C:\Windows\SysWOW64\Kkjpggkn.exe Kbmome32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2696 2824 WerFault.exe 57 -
System Location Discovery: System Language Discovery 1 TTPs 29 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ikldqile.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jmkmjoec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kdbepm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kbmome32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jnagmc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jlnmel32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jbhebfck.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b590f6527582b0b25e2b25cba38054a0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kadica32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ldgnklmi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hgqlafap.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jabponba.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kmimcbja.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Iegeonpc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kjeglh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hjcaha32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ioeclg32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Iipejmko.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jmfcop32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kkjpggkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hadcipbi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hdbpekam.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Iocgfhhc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kambcbhb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Khgkpl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lbjofi32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hbofmcij.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Igceej32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Imbjcpnn.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Hgqlafap.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ekhnnojb.dll" Imbjcpnn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mnpkephg.dll" Jmkmjoec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hhhamf32.dll" Kmimcbja.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Kadica32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ldgnklmi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID b590f6527582b0b25e2b25cba38054a0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Khgkpl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ioeclg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ioeclg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aibijk32.dll" b590f6527582b0b25e2b25cba38054a0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" b590f6527582b0b25e2b25cba38054a0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eogffk32.dll" Hgqlafap.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Hjcaha32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Hjcaha32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Iocgfhhc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Jnagmc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Jmfcop32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Kjeglh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Hdbpekam.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Iipejmko.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aekabb32.dll" Igceej32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Iegeonpc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Jnagmc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Jmkmjoec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hgajdjlj.dll" Jlnmel32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bodilc32.dll" Kkjpggkn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node b590f6527582b0b25e2b25cba38054a0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Flpkcb32.dll" Hadcipbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Hdbpekam.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Hbofmcij.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dfcllk32.dll" Hbofmcij.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Jmkmjoec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cbamip32.dll" Kdbepm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Hbofmcij.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ifblipqh.dll" Iocgfhhc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bgcmiq32.dll" Iipejmko.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hlekjpbi.dll" Kbmome32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Hadcipbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ikldqile.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Jlnmel32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Kbmome32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Igceej32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Jabponba.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Kkjpggkn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Kmimcbja.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ipafocdg.dll" Ldgnklmi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mjcccnbp.dll" Ikldqile.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Jabponba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Jbhebfck.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Kjeglh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717} b590f6527582b0b25e2b25cba38054a0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Iocgfhhc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lpmdgf32.dll" Ioeclg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Kambcbhb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Kdbepm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eqpkfe32.dll" Hdbpekam.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Iegeonpc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Imbjcpnn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Jmfcop32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 b590f6527582b0b25e2b25cba38054a0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Igceej32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pccohd32.dll" Jnagmc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Kkjpggkn.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2252 wrote to memory of 2208 2252 b590f6527582b0b25e2b25cba38054a0N.exe 30 PID 2252 wrote to memory of 2208 2252 b590f6527582b0b25e2b25cba38054a0N.exe 30 PID 2252 wrote to memory of 2208 2252 b590f6527582b0b25e2b25cba38054a0N.exe 30 PID 2252 wrote to memory of 2208 2252 b590f6527582b0b25e2b25cba38054a0N.exe 30 PID 2208 wrote to memory of 2684 2208 Hadcipbi.exe 31 PID 2208 wrote to memory of 2684 2208 Hadcipbi.exe 31 PID 2208 wrote to memory of 2684 2208 Hadcipbi.exe 31 PID 2208 wrote to memory of 2684 2208 Hadcipbi.exe 31 PID 2684 wrote to memory of 2788 2684 Hdbpekam.exe 32 PID 2684 wrote to memory of 2788 2684 Hdbpekam.exe 32 PID 2684 wrote to memory of 2788 2684 Hdbpekam.exe 32 PID 2684 wrote to memory of 2788 2684 Hdbpekam.exe 32 PID 2788 wrote to memory of 2612 2788 Hgqlafap.exe 33 PID 2788 wrote to memory of 2612 2788 Hgqlafap.exe 33 PID 2788 wrote to memory of 2612 2788 Hgqlafap.exe 33 PID 2788 wrote to memory of 2612 2788 Hgqlafap.exe 33 PID 2612 wrote to memory of 3028 2612 Hjcaha32.exe 34 PID 2612 wrote to memory of 3028 2612 Hjcaha32.exe 34 PID 2612 wrote to memory of 3028 2612 Hjcaha32.exe 34 PID 2612 wrote to memory of 3028 2612 Hjcaha32.exe 34 PID 3028 wrote to memory of 2256 3028 Hbofmcij.exe 35 PID 3028 wrote to memory of 2256 3028 Hbofmcij.exe 35 PID 3028 wrote to memory of 2256 3028 Hbofmcij.exe 35 PID 3028 wrote to memory of 2256 3028 Hbofmcij.exe 35 PID 2256 wrote to memory of 1516 2256 Iocgfhhc.exe 36 PID 2256 wrote to memory of 1516 2256 Iocgfhhc.exe 36 PID 2256 wrote to memory of 1516 2256 Iocgfhhc.exe 36 PID 2256 wrote to memory of 1516 2256 Iocgfhhc.exe 36 PID 1516 wrote to memory of 1224 1516 Ioeclg32.exe 37 PID 1516 wrote to memory of 1224 1516 Ioeclg32.exe 37 PID 1516 wrote to memory of 1224 1516 Ioeclg32.exe 37 PID 1516 wrote to memory of 1224 1516 Ioeclg32.exe 37 PID 1224 wrote to memory of 1740 1224 Ikldqile.exe 38 PID 1224 wrote to memory of 1740 1224 Ikldqile.exe 38 PID 1224 wrote to memory of 1740 1224 Ikldqile.exe 38 PID 1224 wrote to memory of 1740 1224 Ikldqile.exe 38 PID 1740 wrote to memory of 1056 1740 Iipejmko.exe 39 PID 1740 wrote to memory of 1056 1740 Iipejmko.exe 39 PID 1740 wrote to memory of 1056 1740 Iipejmko.exe 39 PID 1740 wrote to memory of 1056 1740 Iipejmko.exe 39 PID 1056 wrote to memory of 2380 1056 Igceej32.exe 40 PID 1056 wrote to memory of 2380 1056 Igceej32.exe 40 PID 1056 wrote to memory of 2380 1056 Igceej32.exe 40 PID 1056 wrote to memory of 2380 1056 Igceej32.exe 40 PID 2380 wrote to memory of 292 2380 Iegeonpc.exe 41 PID 2380 wrote to memory of 292 2380 Iegeonpc.exe 41 PID 2380 wrote to memory of 292 2380 Iegeonpc.exe 41 PID 2380 wrote to memory of 292 2380 Iegeonpc.exe 41 PID 292 wrote to memory of 2352 292 Imbjcpnn.exe 42 PID 292 wrote to memory of 2352 292 Imbjcpnn.exe 42 PID 292 wrote to memory of 2352 292 Imbjcpnn.exe 42 PID 292 wrote to memory of 2352 292 Imbjcpnn.exe 42 PID 2352 wrote to memory of 2464 2352 Jnagmc32.exe 43 PID 2352 wrote to memory of 2464 2352 Jnagmc32.exe 43 PID 2352 wrote to memory of 2464 2352 Jnagmc32.exe 43 PID 2352 wrote to memory of 2464 2352 Jnagmc32.exe 43 PID 2464 wrote to memory of 616 2464 Jmfcop32.exe 44 PID 2464 wrote to memory of 616 2464 Jmfcop32.exe 44 PID 2464 wrote to memory of 616 2464 Jmfcop32.exe 44 PID 2464 wrote to memory of 616 2464 Jmfcop32.exe 44 PID 616 wrote to memory of 1620 616 Jabponba.exe 45 PID 616 wrote to memory of 1620 616 Jabponba.exe 45 PID 616 wrote to memory of 1620 616 Jabponba.exe 45 PID 616 wrote to memory of 1620 616 Jabponba.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\b590f6527582b0b25e2b25cba38054a0N.exe"C:\Users\Admin\AppData\Local\Temp\b590f6527582b0b25e2b25cba38054a0N.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Windows\SysWOW64\Hadcipbi.exeC:\Windows\system32\Hadcipbi.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\SysWOW64\Hdbpekam.exeC:\Windows\system32\Hdbpekam.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\SysWOW64\Hgqlafap.exeC:\Windows\system32\Hgqlafap.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Windows\SysWOW64\Hjcaha32.exeC:\Windows\system32\Hjcaha32.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Windows\SysWOW64\Hbofmcij.exeC:\Windows\system32\Hbofmcij.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\SysWOW64\Iocgfhhc.exeC:\Windows\system32\Iocgfhhc.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Windows\SysWOW64\Ioeclg32.exeC:\Windows\system32\Ioeclg32.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Windows\SysWOW64\Ikldqile.exeC:\Windows\system32\Ikldqile.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Windows\SysWOW64\Iipejmko.exeC:\Windows\system32\Iipejmko.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\SysWOW64\Igceej32.exeC:\Windows\system32\Igceej32.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Windows\SysWOW64\Iegeonpc.exeC:\Windows\system32\Iegeonpc.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Windows\SysWOW64\Imbjcpnn.exeC:\Windows\system32\Imbjcpnn.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:292 -
C:\Windows\SysWOW64\Jnagmc32.exeC:\Windows\system32\Jnagmc32.exe14⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Windows\SysWOW64\Jmfcop32.exeC:\Windows\system32\Jmfcop32.exe15⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Windows\SysWOW64\Jabponba.exeC:\Windows\system32\Jabponba.exe16⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:616 -
C:\Windows\SysWOW64\Jmkmjoec.exeC:\Windows\system32\Jmkmjoec.exe17⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1620 -
C:\Windows\SysWOW64\Jlnmel32.exeC:\Windows\system32\Jlnmel32.exe18⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1492 -
C:\Windows\SysWOW64\Jbhebfck.exeC:\Windows\system32\Jbhebfck.exe19⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1096 -
C:\Windows\SysWOW64\Kambcbhb.exeC:\Windows\system32\Kambcbhb.exe20⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1984 -
C:\Windows\SysWOW64\Khgkpl32.exeC:\Windows\system32\Khgkpl32.exe21⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2996 -
C:\Windows\SysWOW64\Kjeglh32.exeC:\Windows\system32\Kjeglh32.exe22⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1756 -
C:\Windows\SysWOW64\Kbmome32.exeC:\Windows\system32\Kbmome32.exe23⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1148 -
C:\Windows\SysWOW64\Kkjpggkn.exeC:\Windows\system32\Kkjpggkn.exe24⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1040 -
C:\Windows\SysWOW64\Kmimcbja.exeC:\Windows\system32\Kmimcbja.exe25⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2180 -
C:\Windows\SysWOW64\Kadica32.exeC:\Windows\system32\Kadica32.exe26⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1596 -
C:\Windows\SysWOW64\Kdbepm32.exeC:\Windows\system32\Kdbepm32.exe27⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2820 -
C:\Windows\SysWOW64\Ldgnklmi.exeC:\Windows\system32\Ldgnklmi.exe28⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2796 -
C:\Windows\SysWOW64\Lbjofi32.exeC:\Windows\system32\Lbjofi32.exe29⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2824 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2824 -s 14030⤵
- Loads dropped DLL
- Program crash
PID:2696
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7KB
MD5a3d63652b646fe0ccb55e03a996d34b2
SHA1b4e34c8d688abad34da478f3f5204ef96fa8a663
SHA256cfe5236e1d510106bd3e9800d425f6f9e13a0faaf0e0f4e1cf36ca9f0027078b
SHA5123df3992e949ec15c4cb764da4217b34051814f9539d81d6a5c5004fedfb37e2418d649dd6610c564e20724ea04df25aec8581e6f6f9ca6b11e60b6ef86c90fa1
-
Filesize
359KB
MD5fd037f39aece24de3076775e02ea304d
SHA12e0a3aae36721eef64e868fc47bf22f3e4712bfb
SHA25635ef8bf00d8cce5db8e915e576d25ec24d0051f006f6b693e2e48acb40cd5fd8
SHA5129008c5b7ab80bae33cd32c3056d19cf011c8c6645e03996c0de20fe3f69e3561285dee75889dadf3f3a1b067927aad02322afee22f285bbb3cda623708ae7f75
-
Filesize
359KB
MD5d23cb597948c854773d0c7ccb56c1910
SHA187e7644dfebc4b672a6c59bf872b17a937948d13
SHA2566afe9905b829a724afcb8b52e5fb0605ad1c4f0de37709f88083a3fbd11890ae
SHA512a6e62922bae7d90e35b506b5789a3752d74b5d4aa92a3b5b858554f89287464fdfaa981697a009e8f8b26f922d1484823e4f2546567a9753e08cf74834a2c493
-
Filesize
359KB
MD56090ac079c13b9833b0329dea45f177f
SHA133b7f377725acae315b603e9675cfa46909202b9
SHA256d7ef84fdc271900cf3fe12fcb78bc99bcf1646ad370c724b1bb8f9096c4b0732
SHA51269423d6b7aa6c3e11c6f8ad2a48d60add27a52022ffa34327fc81b827afdaabb64bf70c3cad77a5ea74980b1573b7e2a4bd5f6cdea77b69b9faae071b7520b1b
-
Filesize
359KB
MD58fbc92f59a9637c20edc9e0b1eb1dda2
SHA1891abb5cb0417abc496eab83904f21b3b1f70a50
SHA2563ba67ab479d3b55aec5949391a8e34e287982d77e67f84107492aeaa8a2ab3bc
SHA512638a14946521312fed22e24d3dfbca95e07a375f06752e4a70e5a4ef332641a2d0df852463d60ceabbabf9da1b3293dd015f59250aa32542e64543db033f2812
-
Filesize
359KB
MD5d6a6979c8b7eb7f31dde2243842c213c
SHA161f5bd9ea2adc3e9c066e500064ab0c433d944a1
SHA256177ae3abf8b4ff2d079c269e720bace1ca0115d042529becb128022752c60241
SHA5124ae6c9d19b5eec4691565ad8d6f4f88acddffa5fa0ada4017ebd5cb87b5ddbc1277ed14b51ea6bf1a7df00b3db8f74d6a599a56df60c91d30bd0919b88548bd1
-
Filesize
359KB
MD5458c48dc764246e5165936f966751ba0
SHA1b6d7b634fca11ef4096c7cdf808048f0eefdff4d
SHA256f8074bae729c336eba5432dd8eb36650401e065424cc5ad12cdd6cfd5a6b2e14
SHA5121a06e9d0b771bf2b6e60b015545921cfc472aa43a9fad5d0870894fb079e48ae4c0b3f7d3f7b263be311177f5d1e2499ad16b1bc17c04bbd9042cb7f00d95609
-
Filesize
359KB
MD58e22752b3cb220046a4e5959272df0e0
SHA1d3586dc2afb56ad4644a713cb7ad31153106a6f2
SHA256c8dae6d28866156fa542d2bf053edacf3a3a8dada8630aa4919be5fc440731f5
SHA5128499912519dd5339787542163038651afbcf27b6adf58b8411ea81cd1138b541ddea56982bfed9d6c4c28b4dadb47c7a7279bbcea1ef4ca2899a4042c1c70544
-
Filesize
359KB
MD567278125672a8586f8263c5265cf40f3
SHA17563676b94272ce2857e4d599cfe188abcd26d26
SHA256e896264398c26baccac1f4c33980d0c39e6bb3c20a76ee97806edc03131131b4
SHA51211a030bd8fedda0aab44792c7ce950de43a622765a460117e205ecc323707c7049ac68d23539a2e13be3a7475020972a9ca8cd0ce3efc674e316ef5627c9e269
-
Filesize
359KB
MD517a9b17f6b865d145826412cd801ad2f
SHA106f902b6b4627abeedd3b4670b3b9a5f60ac715e
SHA256abbc78050c65e958082772a6aec5ad28f0e74c3ff90df5d929c4b5ee53294912
SHA512cb51705d991e743ce9be29b2153d077d0ea55a5fbf8124b8a06d176ab5c48e5cb768a4fe21385cd99a5dfcaca698c684468a0f3907c7ffff0feffde147a272f0
-
Filesize
359KB
MD593708cfe063217e6307bd0afee3a9996
SHA1f41ad3d3fd080a42539d22412dc18f791e6f527a
SHA256d7f44ba5975de00549f7c725344ac5936fbdb2e89eecd158bd02e43b533f2724
SHA5120bc8f2502bd805335b7596656540f7b47fd3e5262117d7bd707975c5e55c9174fcb17e5184254965e852a12478603a9478ba64ea6f4437c433b093fea49544d7
-
Filesize
359KB
MD501be61cd92a5f79c1b70c6e979d4e418
SHA1db793b1113ad90b43c5d7137bb584b029354f3a4
SHA256d18ac5e39b48174795b61f5c048e76bea230ad26ff5c158a1205a5a8c19f5112
SHA51224c2772d1d8bac66d5e6f95eb5127f0d708cf3cc0ff12cf0fbd05e8faf3c72fa48751deda8af5e3a0a8b440ec72cba405adcda97284dd9f300d2b98bd5d23c87
-
Filesize
359KB
MD531999fe9bc6b400c2afde0d8431b7282
SHA1582d711c8900f61a6955cf9159d9db61c3af48c8
SHA2566c30bba76f48e465b2da4466667264f58c8486907ec59299e9dca68c4fd45d1c
SHA51270d506257a5438a525450829fa69f324705f4f5d39031716740b53dc770d2420d9bd9b3f4421fbfca43076d7210f37a6d8660aaad016acafa1f5d223824000cd
-
Filesize
359KB
MD52b4fd92bc77f4790be7bdef7980f8e50
SHA1e6d4abc87157e79086d96c88fa164c7625fd4142
SHA256d5b37c89bd1ffc74b7a8e8c5b863bb3ebf842e4c61b0ade11a1b540e2f57b287
SHA512e6a303e3f04bbb2834c33421f0994f27835f0a52370023e2e9243deceedbee1bf928898b07476e9c21dfb8473a1f09e6442de9ccb215551cc4a733c5640f22bb
-
Filesize
359KB
MD504f39fd7a2ec77e727b36c2050d2408e
SHA17cb2bf698e21ae99711b1316e9a5448f1760fc6d
SHA2560b1aa38d65cb01dd1fcb223e59d6a6f315c1327ad08c061bd8058374bc27c437
SHA512fad8e913b10d3fd70a04fbd90fcceb4b262b82d052d79c41abc79f6b66ac45e88d9e13fe897f59c3e00763e8392d185276105b6e39f08bcd7f6803e4e30c0d4f
-
Filesize
359KB
MD557d7bce6ecea8518413e9189f4d3407a
SHA1c1651d9fb6c0407a4fd143dbfd570f2baa67a656
SHA256232fdc0d33ca331fa5104a712a336de476be18ce4cdb69f25900a9f7c52e030d
SHA512f16d855c8912316d686eebf708e86ab6610c1224d95da7e7d5913bf27df7cfe459e8a2c43df79b02892854d6208ec11a9be3b7e5062688a1068f350ec922bb0f
-
Filesize
359KB
MD51f874194651614397411df0af35e4617
SHA17addd1e2642e2a938f6c40363098a14593e27ab7
SHA2568269df7028ee90a85ee2c3f352b695bf5aa4a9ce057ab7622bad6e5d2c5146aa
SHA512b25bd317066786a882d61cd9f654d41c2c6a91a0cea77fc75157a2a51df88fb46a6da2d55cbc1f7fbdd5534f4ac1dd0e5d0aa1f01ef52a87e9b9ebf74e9caf8d
-
Filesize
359KB
MD5846758e10b88c932ebd6b160874ee46e
SHA1fb7963db771e8a71e118f44d00020035bc4c24e2
SHA2563dfbe15d1ddfafa8816e77630a682fe09792864e3f1dc172d1df133feb28b12f
SHA512ae78a6e89f290bf3cdf782f4b025a915d0c968d125331ed2d93b782a20591045f3345bd4d08f9f1f9ee368dcc37dfa2aa4b8c84a3adc8d435f60af3deb364602
-
Filesize
359KB
MD5c267ad2a9444a7ac6e8500b602b5dd5d
SHA1d7c5ddd58e943fc3e3ac2627945ebaa575a3a85f
SHA2569a726755d9d86b1e7fa7d271508d322b9714eeed4c01f28a6a50cc924fe803d8
SHA512260b729a405c8d54ee8a7ee942f05bdfa56edaf050f9c02071a59240771a208ea7e2070ecfb68d0b7ac23f1a3af2e1fc458a7e59a10e1e6dbaa1bd4c2eba1980
-
Filesize
359KB
MD5ba36107f9b2ea571f045dfaaed6fcc60
SHA1c850c321e35f67058386619e8449be2b63f19802
SHA256a2ebf0a795e3a12867f4d92035cb866f09db053672094fc20dfc8d8a1ff36d7c
SHA512ee48873d19aff68a1b472ca7b9531fd1ad42d002fd1d405c4fb1ebd4b57b500aca94a19d9cd8a115fe0ba2ea0736b0c35fd6eaf36450840f4439f639b5ec16cc
-
Filesize
359KB
MD53be0bb34689c2ae48b5b9694c2fe9a97
SHA1d573125ac2621f617c503a108569b7d37f834980
SHA256552f2d05102f08ef7f16d5c5463bdbd891a95dcae42b11912246508d0c0f93e8
SHA5126803fdbe82b0d6e5f00629c874189e6ab091d9595d216dc99a5c3c939f2d64ca644f99ab335da8db1bc3c667711fecaca0fb903456beb61775dba282f8a9fe68
-
Filesize
359KB
MD5bdcebe0b0cd1ad2463c862338e346ff0
SHA1c1440b08d4f20f74009aa75c64a9129947dc2a81
SHA25647552d218fe007666f162ff073224636fefcba19bd5e54a2a0b57202d012fac2
SHA51228b12fcd0255ffea4ec8444ee09a3286863014029dcb62a78eb5757ae9c5c9c840ca758afe2f1ca51f61e7d5ef2b3568a160450f37cd36bfbb0998a37ac2b7de
-
Filesize
359KB
MD56252ffd608a8b3c23f8808b7bcce1241
SHA1e5d3a9b8409279475fec67fc3549e834b17346a8
SHA256adb2a80a9768c352497abacf93ca939a177d2c8c0ac4c0b487eb48ac07cbcf82
SHA512fb3659b6c5bda296258c59d2fa739f8063ace35b4e5c85a60997bde767549503ac23b5949eca0ec084a78941dbcb25cec43809dce29029049b11731048d8d88e
-
Filesize
359KB
MD5577d913279d59d38a6618477fa6268c7
SHA1c095da5be5ae695ecaf7a162dfe33dd3143800c0
SHA2562097bb50c59dc8bc8cdc08da65a0e6c49213738d1df535023fa565c78782380e
SHA512db092c39742d2b04df2d443587c131309ef0eb6f5e51c777eaf13155665cc8eaefdb952c3f263fdfcd6b08c0376bfc0990405dea99a0c647ebb95217ff1f6f1f
-
Filesize
359KB
MD5f076e7b4777f6da57dfa17f6f8634d61
SHA1f245340e455012f39aad58966ab3ece1e1c4c01a
SHA256ffdaf629c95ce59b7c4bdbe8d829a06d589c96f5cc89189f06cf04fd967f435f
SHA5127633d0ad0eef69e42723f09f41ba288d86646a94c5cc5e3013bad46a2b1349e011f79f9e13cfd8b409b498cb567176072f5cd245297b2a7493bb5f8b97d2d17e
-
Filesize
359KB
MD5cc7da96976855986e0ba92318b379fb8
SHA1fb2e4ee4c385445851bf92a6192da790a7e3b4c2
SHA2566d8c172ae5fd6fe3c63fbc8c41d3795cfcc62b51c7dab0e220af6f38ed4cac2c
SHA51249078604569c57b83c035e6530a88330afc0b6584d95b2a2baef27953429673ed186533751fb9b46819cbe308f5c3a8201b3a98ca046f10399bc35914781ad14
-
Filesize
359KB
MD52ab79f44855ea1f3b829494ab25004c8
SHA1000df2d62ac79a585b15f73f42807fb163b1affa
SHA256e6ca49f29053a4fb14ed4945eb1fa4d05bb3cdc5ba2244036663e7ff053f1957
SHA512a405ebc982f712eee80574ae783e81bd1b9cf7ebd042ac051ac950cc554255a7512cca28a83f3332cbae656b6192cf80102d2a48e31f44a623cb4856352359d8
-
Filesize
359KB
MD5ed5acf0499586b67950cadeed07e9a7b
SHA1eaae7dcd6fe6e0e7abe3582405f98cffc40fc4b8
SHA256893f12e67de40bb1c5aec9cb348c1a76358ddec34dfbfeb4f08ce83e673bfd51
SHA512015648295f69c32aa2705e1f244bd089bb48a27aaceb4cfa66227e25d1b198d8c4661c44e0744ccc09835d116842fdd8147fa5507db7bf5004dd588b7c2fa32a
-
Filesize
359KB
MD5f5dd3df86fa6abe9ff1b9f2da8bca851
SHA161aaf4164546981e5733fef8573df142ef581532
SHA256925b115329484a42b5c8d36eb8a0ccbea2dc1dba7a4527c0aa9c2c0097ecc657
SHA5123d533c37d3dddcf2832ba6bc52607ca2eaf5cd4ae4b535624699d0fd6b5eed79c75ce175b0c46d0c39bb8e0c7e65e4362810384408a05058f959a612420a39c7