Analysis
-
max time kernel
141s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
07-08-2024 00:48
Static task
static1
Behavioral task
behavioral1
Sample
972ab9875da0a045b9b707acbf89b85605564dc2e90340228a43429522f30415.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
972ab9875da0a045b9b707acbf89b85605564dc2e90340228a43429522f30415.exe
Resource
win10v2004-20240802-en
General
-
Target
972ab9875da0a045b9b707acbf89b85605564dc2e90340228a43429522f30415.exe
-
Size
242KB
-
MD5
02abe855e20480627247ac4427f98888
-
SHA1
9aa1a64d769b32ae632015e8d50d99f0e312a425
-
SHA256
972ab9875da0a045b9b707acbf89b85605564dc2e90340228a43429522f30415
-
SHA512
df92da28fe50e3ddb495961b76aa6091d297e74b9ef62ad49947a6e0a7a4328a56ce3f657042d6ddee449dc46df1fbc35012e24a75311fed86341a6e80488418
-
SSDEEP
3072:/xI+xHcS9qX0cFqV6V8ZLB6V16VKcWmjRrzKbKcWmjRrzK8VHkdYaM88KC:/xIAHcTxqV66LB6X62UyHEYa0
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 30 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Baealp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cobhdhha.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Capdpcge.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 972ab9875da0a045b9b707acbf89b85605564dc2e90340228a43429522f30415.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cobhdhha.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Capdpcge.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cabaec32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cabaec32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bodhjdcc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Clfhml32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bkkioeig.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bpmkbl32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cbkgog32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cbkgog32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Baealp32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ckkenikc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Caenkc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" 972ab9875da0a045b9b707acbf89b85605564dc2e90340228a43429522f30415.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bkkioeig.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Biqfpb32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Blobmm32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Biccfalm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ckkenikc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bodhjdcc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Blobmm32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Caenkc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Biqfpb32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bpmkbl32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Clfhml32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Biccfalm.exe -
Executes dropped EXE 15 IoCs
pid Process 2396 Bodhjdcc.exe 2240 Bkkioeig.exe 2912 Baealp32.exe 2804 Biqfpb32.exe 2816 Blobmm32.exe 2624 Biccfalm.exe 1936 Bpmkbl32.exe 2964 Cbkgog32.exe 2720 Cobhdhha.exe 2996 Capdpcge.exe 2800 Clfhml32.exe 2844 Cabaec32.exe 2176 Ckkenikc.exe 1716 Caenkc32.exe 3036 Coindgbi.exe -
Loads dropped DLL 30 IoCs
pid Process 1672 972ab9875da0a045b9b707acbf89b85605564dc2e90340228a43429522f30415.exe 1672 972ab9875da0a045b9b707acbf89b85605564dc2e90340228a43429522f30415.exe 2396 Bodhjdcc.exe 2396 Bodhjdcc.exe 2240 Bkkioeig.exe 2240 Bkkioeig.exe 2912 Baealp32.exe 2912 Baealp32.exe 2804 Biqfpb32.exe 2804 Biqfpb32.exe 2816 Blobmm32.exe 2816 Blobmm32.exe 2624 Biccfalm.exe 2624 Biccfalm.exe 1936 Bpmkbl32.exe 1936 Bpmkbl32.exe 2964 Cbkgog32.exe 2964 Cbkgog32.exe 2720 Cobhdhha.exe 2720 Cobhdhha.exe 2996 Capdpcge.exe 2996 Capdpcge.exe 2800 Clfhml32.exe 2800 Clfhml32.exe 2844 Cabaec32.exe 2844 Cabaec32.exe 2176 Ckkenikc.exe 2176 Ckkenikc.exe 1716 Caenkc32.exe 1716 Caenkc32.exe -
Drops file in System32 directory 45 IoCs
description ioc Process File created C:\Windows\SysWOW64\Blobmm32.exe Biqfpb32.exe File opened for modification C:\Windows\SysWOW64\Blobmm32.exe Biqfpb32.exe File created C:\Windows\SysWOW64\Cbkgog32.exe Bpmkbl32.exe File created C:\Windows\SysWOW64\Jlmhimhb.dll Bpmkbl32.exe File created C:\Windows\SysWOW64\Hkfggj32.dll Cbkgog32.exe File created C:\Windows\SysWOW64\Bodhjdcc.exe 972ab9875da0a045b9b707acbf89b85605564dc2e90340228a43429522f30415.exe File opened for modification C:\Windows\SysWOW64\Baealp32.exe Bkkioeig.exe File opened for modification C:\Windows\SysWOW64\Biqfpb32.exe Baealp32.exe File created C:\Windows\SysWOW64\Aceakpbh.dll Cabaec32.exe File opened for modification C:\Windows\SysWOW64\Coindgbi.exe Caenkc32.exe File opened for modification C:\Windows\SysWOW64\Cbkgog32.exe Bpmkbl32.exe File created C:\Windows\SysWOW64\Capdpcge.exe Cobhdhha.exe File created C:\Windows\SysWOW64\Clfhml32.exe Capdpcge.exe File created C:\Windows\SysWOW64\Cabaec32.exe Clfhml32.exe File created C:\Windows\SysWOW64\Fbflbd32.dll Bodhjdcc.exe File created C:\Windows\SysWOW64\Biccfalm.exe Blobmm32.exe File created C:\Windows\SysWOW64\Hjnhlm32.dll Biccfalm.exe File opened for modification C:\Windows\SysWOW64\Ckkenikc.exe Cabaec32.exe File created C:\Windows\SysWOW64\Coindgbi.exe Caenkc32.exe File opened for modification C:\Windows\SysWOW64\Bpmkbl32.exe Biccfalm.exe File opened for modification C:\Windows\SysWOW64\Capdpcge.exe Cobhdhha.exe File opened for modification C:\Windows\SysWOW64\Cabaec32.exe Clfhml32.exe File created C:\Windows\SysWOW64\Cmfjgc32.dll Cobhdhha.exe File created C:\Windows\SysWOW64\Jqlidcln.dll Clfhml32.exe File opened for modification C:\Windows\SysWOW64\Bkkioeig.exe Bodhjdcc.exe File opened for modification C:\Windows\SysWOW64\Biccfalm.exe Blobmm32.exe File created C:\Windows\SysWOW64\Cobhdhha.exe Cbkgog32.exe File created C:\Windows\SysWOW64\Knoegqbp.dll Baealp32.exe File opened for modification C:\Windows\SysWOW64\Cobhdhha.exe Cbkgog32.exe File created C:\Windows\SysWOW64\Hakhbifq.dll Ckkenikc.exe File created C:\Windows\SysWOW64\Ohodgb32.dll Caenkc32.exe File opened for modification C:\Windows\SysWOW64\Bodhjdcc.exe 972ab9875da0a045b9b707acbf89b85605564dc2e90340228a43429522f30415.exe File created C:\Windows\SysWOW64\Bkkioeig.exe Bodhjdcc.exe File created C:\Windows\SysWOW64\Biqfpb32.exe Baealp32.exe File created C:\Windows\SysWOW64\Bpmkbl32.exe Biccfalm.exe File opened for modification C:\Windows\SysWOW64\Clfhml32.exe Capdpcge.exe File created C:\Windows\SysWOW64\Baealp32.exe Bkkioeig.exe File created C:\Windows\SysWOW64\Mjhdbb32.dll Bkkioeig.exe File created C:\Windows\SysWOW64\Hlggmcob.dll Blobmm32.exe File created C:\Windows\SysWOW64\Ckkenikc.exe Cabaec32.exe File created C:\Windows\SysWOW64\Caenkc32.exe Ckkenikc.exe File opened for modification C:\Windows\SysWOW64\Caenkc32.exe Ckkenikc.exe File created C:\Windows\SysWOW64\Acdlnnal.dll 972ab9875da0a045b9b707acbf89b85605564dc2e90340228a43429522f30415.exe File created C:\Windows\SysWOW64\Ljkaejba.dll Biqfpb32.exe File created C:\Windows\SysWOW64\Hjlkkhne.dll Capdpcge.exe -
System Location Discovery: System Language Discovery 1 TTPs 16 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cbkgog32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Coindgbi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Capdpcge.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cabaec32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Caenkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 972ab9875da0a045b9b707acbf89b85605564dc2e90340228a43429522f30415.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Biqfpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Blobmm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Biccfalm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cobhdhha.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Clfhml32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ckkenikc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bodhjdcc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bkkioeig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Baealp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bpmkbl32.exe -
Modifies registry class 48 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cabaec32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 972ab9875da0a045b9b707acbf89b85605564dc2e90340228a43429522f30415.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node 972ab9875da0a045b9b707acbf89b85605564dc2e90340228a43429522f30415.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bpmkbl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hkfggj32.dll" Cbkgog32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Capdpcge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Clfhml32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bkkioeig.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mjhdbb32.dll" Bkkioeig.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Baealp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jlmhimhb.dll" Bpmkbl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Caenkc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bkkioeig.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cobhdhha.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Clfhml32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ckkenikc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cmfjgc32.dll" Cobhdhha.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ckkenikc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Caenkc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fbflbd32.dll" Bodhjdcc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Baealp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bpmkbl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cbkgog32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ohodgb32.dll" Caenkc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} 972ab9875da0a045b9b707acbf89b85605564dc2e90340228a43429522f30415.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Knoegqbp.dll" Baealp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Biqfpb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Biccfalm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cbkgog32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jqlidcln.dll" Clfhml32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID 972ab9875da0a045b9b707acbf89b85605564dc2e90340228a43429522f30415.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Acdlnnal.dll" 972ab9875da0a045b9b707acbf89b85605564dc2e90340228a43429522f30415.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bodhjdcc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ljkaejba.dll" Biqfpb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" 972ab9875da0a045b9b707acbf89b85605564dc2e90340228a43429522f30415.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hjnhlm32.dll" Biccfalm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cobhdhha.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cabaec32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Blobmm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Biccfalm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Capdpcge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hjlkkhne.dll" Capdpcge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bodhjdcc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Biqfpb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Blobmm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hlggmcob.dll" Blobmm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aceakpbh.dll" Cabaec32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hakhbifq.dll" Ckkenikc.exe -
Suspicious use of WriteProcessMemory 60 IoCs
description pid Process procid_target PID 1672 wrote to memory of 2396 1672 972ab9875da0a045b9b707acbf89b85605564dc2e90340228a43429522f30415.exe 30 PID 1672 wrote to memory of 2396 1672 972ab9875da0a045b9b707acbf89b85605564dc2e90340228a43429522f30415.exe 30 PID 1672 wrote to memory of 2396 1672 972ab9875da0a045b9b707acbf89b85605564dc2e90340228a43429522f30415.exe 30 PID 1672 wrote to memory of 2396 1672 972ab9875da0a045b9b707acbf89b85605564dc2e90340228a43429522f30415.exe 30 PID 2396 wrote to memory of 2240 2396 Bodhjdcc.exe 31 PID 2396 wrote to memory of 2240 2396 Bodhjdcc.exe 31 PID 2396 wrote to memory of 2240 2396 Bodhjdcc.exe 31 PID 2396 wrote to memory of 2240 2396 Bodhjdcc.exe 31 PID 2240 wrote to memory of 2912 2240 Bkkioeig.exe 32 PID 2240 wrote to memory of 2912 2240 Bkkioeig.exe 32 PID 2240 wrote to memory of 2912 2240 Bkkioeig.exe 32 PID 2240 wrote to memory of 2912 2240 Bkkioeig.exe 32 PID 2912 wrote to memory of 2804 2912 Baealp32.exe 33 PID 2912 wrote to memory of 2804 2912 Baealp32.exe 33 PID 2912 wrote to memory of 2804 2912 Baealp32.exe 33 PID 2912 wrote to memory of 2804 2912 Baealp32.exe 33 PID 2804 wrote to memory of 2816 2804 Biqfpb32.exe 34 PID 2804 wrote to memory of 2816 2804 Biqfpb32.exe 34 PID 2804 wrote to memory of 2816 2804 Biqfpb32.exe 34 PID 2804 wrote to memory of 2816 2804 Biqfpb32.exe 34 PID 2816 wrote to memory of 2624 2816 Blobmm32.exe 35 PID 2816 wrote to memory of 2624 2816 Blobmm32.exe 35 PID 2816 wrote to memory of 2624 2816 Blobmm32.exe 35 PID 2816 wrote to memory of 2624 2816 Blobmm32.exe 35 PID 2624 wrote to memory of 1936 2624 Biccfalm.exe 36 PID 2624 wrote to memory of 1936 2624 Biccfalm.exe 36 PID 2624 wrote to memory of 1936 2624 Biccfalm.exe 36 PID 2624 wrote to memory of 1936 2624 Biccfalm.exe 36 PID 1936 wrote to memory of 2964 1936 Bpmkbl32.exe 37 PID 1936 wrote to memory of 2964 1936 Bpmkbl32.exe 37 PID 1936 wrote to memory of 2964 1936 Bpmkbl32.exe 37 PID 1936 wrote to memory of 2964 1936 Bpmkbl32.exe 37 PID 2964 wrote to memory of 2720 2964 Cbkgog32.exe 38 PID 2964 wrote to memory of 2720 2964 Cbkgog32.exe 38 PID 2964 wrote to memory of 2720 2964 Cbkgog32.exe 38 PID 2964 wrote to memory of 2720 2964 Cbkgog32.exe 38 PID 2720 wrote to memory of 2996 2720 Cobhdhha.exe 39 PID 2720 wrote to memory of 2996 2720 Cobhdhha.exe 39 PID 2720 wrote to memory of 2996 2720 Cobhdhha.exe 39 PID 2720 wrote to memory of 2996 2720 Cobhdhha.exe 39 PID 2996 wrote to memory of 2800 2996 Capdpcge.exe 40 PID 2996 wrote to memory of 2800 2996 Capdpcge.exe 40 PID 2996 wrote to memory of 2800 2996 Capdpcge.exe 40 PID 2996 wrote to memory of 2800 2996 Capdpcge.exe 40 PID 2800 wrote to memory of 2844 2800 Clfhml32.exe 41 PID 2800 wrote to memory of 2844 2800 Clfhml32.exe 41 PID 2800 wrote to memory of 2844 2800 Clfhml32.exe 41 PID 2800 wrote to memory of 2844 2800 Clfhml32.exe 41 PID 2844 wrote to memory of 2176 2844 Cabaec32.exe 42 PID 2844 wrote to memory of 2176 2844 Cabaec32.exe 42 PID 2844 wrote to memory of 2176 2844 Cabaec32.exe 42 PID 2844 wrote to memory of 2176 2844 Cabaec32.exe 42 PID 2176 wrote to memory of 1716 2176 Ckkenikc.exe 43 PID 2176 wrote to memory of 1716 2176 Ckkenikc.exe 43 PID 2176 wrote to memory of 1716 2176 Ckkenikc.exe 43 PID 2176 wrote to memory of 1716 2176 Ckkenikc.exe 43 PID 1716 wrote to memory of 3036 1716 Caenkc32.exe 44 PID 1716 wrote to memory of 3036 1716 Caenkc32.exe 44 PID 1716 wrote to memory of 3036 1716 Caenkc32.exe 44 PID 1716 wrote to memory of 3036 1716 Caenkc32.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\972ab9875da0a045b9b707acbf89b85605564dc2e90340228a43429522f30415.exe"C:\Users\Admin\AppData\Local\Temp\972ab9875da0a045b9b707acbf89b85605564dc2e90340228a43429522f30415.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Windows\SysWOW64\Bodhjdcc.exeC:\Windows\system32\Bodhjdcc.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Windows\SysWOW64\Bkkioeig.exeC:\Windows\system32\Bkkioeig.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Windows\SysWOW64\Baealp32.exeC:\Windows\system32\Baealp32.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Windows\SysWOW64\Biqfpb32.exeC:\Windows\system32\Biqfpb32.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\SysWOW64\Blobmm32.exeC:\Windows\system32\Blobmm32.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Windows\SysWOW64\Biccfalm.exeC:\Windows\system32\Biccfalm.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Windows\SysWOW64\Bpmkbl32.exeC:\Windows\system32\Bpmkbl32.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Windows\SysWOW64\Cbkgog32.exeC:\Windows\system32\Cbkgog32.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Windows\SysWOW64\Cobhdhha.exeC:\Windows\system32\Cobhdhha.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\SysWOW64\Capdpcge.exeC:\Windows\system32\Capdpcge.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Windows\SysWOW64\Clfhml32.exeC:\Windows\system32\Clfhml32.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Windows\SysWOW64\Cabaec32.exeC:\Windows\system32\Cabaec32.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\SysWOW64\Ckkenikc.exeC:\Windows\system32\Ckkenikc.exe14⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Windows\SysWOW64\Caenkc32.exeC:\Windows\system32\Caenkc32.exe15⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Windows\SysWOW64\Coindgbi.exeC:\Windows\system32\Coindgbi.exe16⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3036
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
242KB
MD58098236a26ed80e86be7bef8ae101c47
SHA14a2a9567720a655a5cf41bdd4c27793b261eb16b
SHA2568163ff613316e643a4efcf10255e5c1202e3d95c6c77934964dbf0e2713e4362
SHA512f56afd365b4f712733d2c7b9951a80fba6b5e86dd36045c210ed129db34840377e46bbf549c3f56340f12eaa5f14f6c367860dc86288190651d38694a3717317
-
Filesize
242KB
MD5e7262e69b090d2bd1af5afd5d5a538f4
SHA12df1ca70e61ff8a8e831ccc11c3c698e7e6fdbbc
SHA256589c23e0b7ff67cae0693882ddbdce09153350d9f787237e8edf56a964c69ca2
SHA51251744cfacd31ef042620332570bf4bab480543569517e379e8c048c1a01564613002f3617542d3ba0362c3f900371d14090f9c4e316eb62eaf78bb069dec97fc
-
Filesize
242KB
MD5823451cdc8a12728b1398dc7fddfbddc
SHA19c360036d74552b971071f629e0feee65fc5d2c9
SHA2563095c5782280023343b85430ef23e7ff4e1e09ffd0daed9d3802b0cf93331237
SHA512ec3ae4ff2d8d16ff6fc63ecf2a5c0f4102b4a31d89b58c35cb0a9745421d4b417e32f19070caa4ac043d40de97c6947182bf4841e28eda87f0da33eb3f62dc37
-
Filesize
242KB
MD50bf9b050d81615d44594b24e131d483b
SHA126bdb048e6f67ba6d3f67ba6403247720fce5780
SHA25633be265b7cb5e1c332a72ffbd2ed542d04d1caec999768f06e640cd94989dbb4
SHA512efc0d0f001d3df25ba31fd3b3042b5f96a1b2a003a93ae666085e25a92463b2c34c1358996a5ce174228d43ef4efead7656262548a1727d25f96d024aca4130d
-
Filesize
242KB
MD533054edc06de6bc7fe165cfe90eda878
SHA1cff3d149ed6287e144a1d09b501a13edbcb450bc
SHA2568bf4e70a8d954c97f28fd76d9324a02f6db65079b048514782dd050398688646
SHA5128be523dd3cdb490a0febdd00818e188208e74351c2f6bf9671ae5d29e06d72778d4a532fd37601cf0aa27fe2e58eb8649fdd362e2759c6b8926fdaa44b0fa361
-
Filesize
242KB
MD5417228a30d69d9484316763a65654c99
SHA189084abd1d8c79aded96f927296e506682ea242a
SHA256874ccf1cf536d06f07ba8c4002a4e1bf455cf17812cf3fa117c47dc83e0e1af4
SHA51222bc44157ee9488f4a59296f53391f389e0cdf7fbfe1eddfb76526cca979ff6e16d3d0a5752f2a681d6dbb8ef6e077b162d2a61ee81735dda4e84c20880fbb2f
-
Filesize
242KB
MD5e8e1a43b8ea035a490b2015d6e91e334
SHA1e46f3b2696c1d55a20c4b541ca629be5294f6ed6
SHA2562ce47dded5a29e21e8a5232a63a4b7b450f01ee89e8499a633e285b8e7f50682
SHA5122c2eb26ed79991f3520b01c655b5dd5b4c9da1f0beb89893f2dddefe2db26cdcb7528203dfdad7befea075ace5a3970d5ca989e0eed646b3e6a2ee044cc0e541
-
Filesize
242KB
MD5f356aff70f6fb7dfb709eead91252024
SHA10511f3c405d2702c5361a96ec82382be0e001b63
SHA2560535cf3ee5f71876d21639753831f368b5adcbc575fc8f93cc127f7f58ceb34d
SHA5122e503b99def1a2d701a52d84c5eb9ab49a881da14218d35f380a6c51db691f77277b45ddb7cf392efec5be9d71aa53940aaeda4fa767024f6432737a09c9c114
-
Filesize
242KB
MD56e2055bdba55d864ee96ce0a6e13bf46
SHA1ddffe0e81e06282d52964dbfccc62bf0f584269b
SHA2563e73076311199870808cdc9f0b9ed63559e55b2498eae4746981d4c1f4ac4f94
SHA51205fb73ba3aa2fea896798cdf92540981fb8dfd22db32cd39332f69586a3e93df3de34b587cd97f37b33fe95fbe47354e31adb0c2737a511c8953e34ee7a06dcc
-
Filesize
242KB
MD5258f81a5336326d0c0e906b8329f92c1
SHA12fa08cecf26d19cf3250a372f34cb62abda82284
SHA25670c86ab2063b749b04cbcb4ab7127220dea904bc271666402966bb4f896631a4
SHA512104127a124be90f34b6f397954184a40b7965262a87dc27e801aeb1c8360485889ceb276b94f4e735168fe850923f5ba52eda0a20e8dc031b212a9efa6ae4e4c
-
Filesize
242KB
MD5c3ef5c20e3ead31579a7d310b4983215
SHA1e1578551efbbdf0e52308db413357142f397d8ab
SHA256648c327cbc47027184005c345f751e1dd11b94bc221e96c75f5f063b31b04f49
SHA512a00b00776a9bff054c1be4dc334e4f732ab3d81cc1b82df1efde6dae0fa2a3cce6900bed21eab8f222740bda18d508e5f3b5559afa5edb8f54569d210491b06c
-
Filesize
242KB
MD5b3e90269c849459648a1b66d614ec71c
SHA1037b4a3d74e3ecc25a842a992e4a8e40a1178e6a
SHA25602a322d7d11758f05467e5a5c67b9e08f946fa648d805df2c80a25381b1b176d
SHA512056da6e3192921ae42e0d2627d8ce4d4bcea6f952fa5a0cbcbdd5ffcf1e151db442ee3c76c22c554c760c2f9c608dbb66243bf6989b7d30a3d1c6e0bbf4ef46d
-
Filesize
242KB
MD57a493e5fb0e8d523bce854d3ea3ae787
SHA1f034d5dd3e8431162fabc5caa3610808efaa6c27
SHA256a6c3cc8c561f03329669bea2edff692b55c74e8f04d6cb6d35276fcd4f1fed29
SHA512ecc82914af6fdf256a22f935cb125dd06e2a47d122d50fd4c5b16acb87ce3d90aecbc4e7fa14551268a535791d9e1a3ce25b239eea0894652caf3d1806d71d42
-
Filesize
242KB
MD5986e4d04a938abeefabfa764f47465d9
SHA14423ae907692d74beb18615c419daed85b62bce4
SHA25683abf61c337c28f5562246d1efd438585503d8069a18bd62975f7f83651cccb6
SHA512ed7570ee62a3ac95ceaa29ec6383184cdb74894a1203b00a753dd2a3be98edd4256ff2e21acc9c1748d75109a0b28b2d66446b98313c78e3673000f008d54a9a
-
Filesize
242KB
MD56976fa4cd236d3256766a952ef424836
SHA13f2f9141ce2de3a2458df4ff2b290d5d9dba25da
SHA25644ed544b5be3d7cba5ba15a46946eb2d2be3ec6fc5b2030ea128a30062dc85e0
SHA51227d0faadf9d6ce651366365b7a24e95086d92efeba0d893ac47c58c970dd6a9ba2db00c1c24e293abe34b64db21c9adde96d073e67a882be49e1ab1becbdb449