Analysis
-
max time kernel
100s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24/08/2024, 22:38
Static task
static1
Behavioral task
behavioral1
Sample
7c48c8d6e4ede3a729da845a6ac37f40N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
7c48c8d6e4ede3a729da845a6ac37f40N.exe
Resource
win10v2004-20240802-en
General
-
Target
7c48c8d6e4ede3a729da845a6ac37f40N.exe
-
Size
94KB
-
MD5
7c48c8d6e4ede3a729da845a6ac37f40
-
SHA1
5f36e2163a8d798dd936c87770b0ec71e969c31f
-
SHA256
957ce64f720eb3a1e4fb8da0730c8e72e7d11266690431224efdcb9cd2338a1d
-
SHA512
d3317421f08e5b0e5a958aa73c8807bc1cefbe13114308444d6281097612ae5afca7419ba1a52e2aa6a74a5ffb65a64a234ec25319e058ca30393edda71438ae
-
SSDEEP
1536:fLNdzkogWZOxMYCbzaHpCFWnF5Cit7BR9L4DT2EnINs:TNdx5FWF5Rt6+ob
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 26 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Daqbip32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dmgbnq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Daekdooc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dknpmdfc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Dknpmdfc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dhmgki32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Djgjlelk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Dhkjej32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Dhmgki32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dkkcge32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Delnin32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Dmgbnq32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Daconoae.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dmefhako.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dhkjej32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dddhpjof.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 7c48c8d6e4ede3a729da845a6ac37f40N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Dmefhako.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Dkkcge32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" 7c48c8d6e4ede3a729da845a6ac37f40N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Djgjlelk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Delnin32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Dddhpjof.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Daekdooc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Daqbip32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Daconoae.exe -
Executes dropped EXE 13 IoCs
pid Process 4184 Djgjlelk.exe 3656 Dmefhako.exe 2668 Daqbip32.exe 1232 Delnin32.exe 856 Dhkjej32.exe 3836 Dmgbnq32.exe 2104 Daconoae.exe 3840 Dhmgki32.exe 1692 Dkkcge32.exe 2124 Daekdooc.exe 800 Dddhpjof.exe 4288 Dknpmdfc.exe 1104 Dmllipeg.exe -
Drops file in System32 directory 39 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Djgjlelk.exe 7c48c8d6e4ede3a729da845a6ac37f40N.exe File created C:\Windows\SysWOW64\Dhkjej32.exe Delnin32.exe File opened for modification C:\Windows\SysWOW64\Dhkjej32.exe Delnin32.exe File created C:\Windows\SysWOW64\Dmllipeg.exe Dknpmdfc.exe File created C:\Windows\SysWOW64\Jdipdgch.dll Dmefhako.exe File created C:\Windows\SysWOW64\Gmcfdb32.dll Daqbip32.exe File created C:\Windows\SysWOW64\Jcbdhp32.dll Dhmgki32.exe File created C:\Windows\SysWOW64\Dknpmdfc.exe Dddhpjof.exe File created C:\Windows\SysWOW64\Daqbip32.exe Dmefhako.exe File opened for modification C:\Windows\SysWOW64\Daconoae.exe Dmgbnq32.exe File created C:\Windows\SysWOW64\Ohmoom32.dll Dkkcge32.exe File created C:\Windows\SysWOW64\Ihidnp32.dll Dhkjej32.exe File created C:\Windows\SysWOW64\Dddhpjof.exe Daekdooc.exe File opened for modification C:\Windows\SysWOW64\Dddhpjof.exe Daekdooc.exe File created C:\Windows\SysWOW64\Fpdaoioe.dll Daconoae.exe File opened for modification C:\Windows\SysWOW64\Daekdooc.exe Dkkcge32.exe File created C:\Windows\SysWOW64\Amjknl32.dll Daekdooc.exe File opened for modification C:\Windows\SysWOW64\Dknpmdfc.exe Dddhpjof.exe File opened for modification C:\Windows\SysWOW64\Dmllipeg.exe Dknpmdfc.exe File opened for modification C:\Windows\SysWOW64\Dmefhako.exe Djgjlelk.exe File created C:\Windows\SysWOW64\Delnin32.exe Daqbip32.exe File opened for modification C:\Windows\SysWOW64\Dmgbnq32.exe Dhkjej32.exe File created C:\Windows\SysWOW64\Oammoc32.dll Dmgbnq32.exe File opened for modification C:\Windows\SysWOW64\Dhmgki32.exe Daconoae.exe File opened for modification C:\Windows\SysWOW64\Dkkcge32.exe Dhmgki32.exe File created C:\Windows\SysWOW64\Kngpec32.dll Dknpmdfc.exe File opened for modification C:\Windows\SysWOW64\Daqbip32.exe Dmefhako.exe File created C:\Windows\SysWOW64\Jbpbca32.dll Delnin32.exe File created C:\Windows\SysWOW64\Dmgbnq32.exe Dhkjej32.exe File created C:\Windows\SysWOW64\Daconoae.exe Dmgbnq32.exe File created C:\Windows\SysWOW64\Dkkcge32.exe Dhmgki32.exe File created C:\Windows\SysWOW64\Daekdooc.exe Dkkcge32.exe File created C:\Windows\SysWOW64\Nokpao32.dll Dddhpjof.exe File created C:\Windows\SysWOW64\Djgjlelk.exe 7c48c8d6e4ede3a729da845a6ac37f40N.exe File created C:\Windows\SysWOW64\Beeppfin.dll 7c48c8d6e4ede3a729da845a6ac37f40N.exe File created C:\Windows\SysWOW64\Dmefhako.exe Djgjlelk.exe File created C:\Windows\SysWOW64\Gidbim32.dll Djgjlelk.exe File opened for modification C:\Windows\SysWOW64\Delnin32.exe Daqbip32.exe File created C:\Windows\SysWOW64\Dhmgki32.exe Daconoae.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3316 1104 WerFault.exe 96 -
System Location Discovery: System Language Discovery 1 TTPs 14 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dddhpjof.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7c48c8d6e4ede3a729da845a6ac37f40N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Daqbip32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dmgbnq32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dhmgki32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dmefhako.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Delnin32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dkkcge32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Daekdooc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Djgjlelk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Daconoae.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dmllipeg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dhkjej32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dknpmdfc.exe -
Modifies registry class 42 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Dkkcge32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 7c48c8d6e4ede3a729da845a6ac37f40N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Daqbip32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Daqbip32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Delnin32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Dhmgki32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Beeppfin.dll" 7c48c8d6e4ede3a729da845a6ac37f40N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gmcfdb32.dll" Daqbip32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Dmgbnq32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Daekdooc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jbpbca32.dll" Delnin32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Daconoae.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Amjknl32.dll" Daekdooc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Dddhpjof.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Dknpmdfc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ihidnp32.dll" Dhkjej32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fpdaoioe.dll" Daconoae.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Dhmgki32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ohmoom32.dll" Dkkcge32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Daekdooc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Dkkcge32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node 7c48c8d6e4ede3a729da845a6ac37f40N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gidbim32.dll" Djgjlelk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Dhkjej32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Daconoae.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jcbdhp32.dll" Dhmgki32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID 7c48c8d6e4ede3a729da845a6ac37f40N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717} 7c48c8d6e4ede3a729da845a6ac37f40N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jdipdgch.dll" Dmefhako.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Dmgbnq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kngpec32.dll" Dknpmdfc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" 7c48c8d6e4ede3a729da845a6ac37f40N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Djgjlelk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oammoc32.dll" Dmgbnq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Dddhpjof.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nokpao32.dll" Dddhpjof.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Dknpmdfc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Djgjlelk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Dmefhako.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Dmefhako.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Delnin32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Dhkjej32.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 3596 wrote to memory of 4184 3596 7c48c8d6e4ede3a729da845a6ac37f40N.exe 84 PID 3596 wrote to memory of 4184 3596 7c48c8d6e4ede3a729da845a6ac37f40N.exe 84 PID 3596 wrote to memory of 4184 3596 7c48c8d6e4ede3a729da845a6ac37f40N.exe 84 PID 4184 wrote to memory of 3656 4184 Djgjlelk.exe 85 PID 4184 wrote to memory of 3656 4184 Djgjlelk.exe 85 PID 4184 wrote to memory of 3656 4184 Djgjlelk.exe 85 PID 3656 wrote to memory of 2668 3656 Dmefhako.exe 86 PID 3656 wrote to memory of 2668 3656 Dmefhako.exe 86 PID 3656 wrote to memory of 2668 3656 Dmefhako.exe 86 PID 2668 wrote to memory of 1232 2668 Daqbip32.exe 87 PID 2668 wrote to memory of 1232 2668 Daqbip32.exe 87 PID 2668 wrote to memory of 1232 2668 Daqbip32.exe 87 PID 1232 wrote to memory of 856 1232 Delnin32.exe 88 PID 1232 wrote to memory of 856 1232 Delnin32.exe 88 PID 1232 wrote to memory of 856 1232 Delnin32.exe 88 PID 856 wrote to memory of 3836 856 Dhkjej32.exe 89 PID 856 wrote to memory of 3836 856 Dhkjej32.exe 89 PID 856 wrote to memory of 3836 856 Dhkjej32.exe 89 PID 3836 wrote to memory of 2104 3836 Dmgbnq32.exe 90 PID 3836 wrote to memory of 2104 3836 Dmgbnq32.exe 90 PID 3836 wrote to memory of 2104 3836 Dmgbnq32.exe 90 PID 2104 wrote to memory of 3840 2104 Daconoae.exe 91 PID 2104 wrote to memory of 3840 2104 Daconoae.exe 91 PID 2104 wrote to memory of 3840 2104 Daconoae.exe 91 PID 3840 wrote to memory of 1692 3840 Dhmgki32.exe 92 PID 3840 wrote to memory of 1692 3840 Dhmgki32.exe 92 PID 3840 wrote to memory of 1692 3840 Dhmgki32.exe 92 PID 1692 wrote to memory of 2124 1692 Dkkcge32.exe 93 PID 1692 wrote to memory of 2124 1692 Dkkcge32.exe 93 PID 1692 wrote to memory of 2124 1692 Dkkcge32.exe 93 PID 2124 wrote to memory of 800 2124 Daekdooc.exe 94 PID 2124 wrote to memory of 800 2124 Daekdooc.exe 94 PID 2124 wrote to memory of 800 2124 Daekdooc.exe 94 PID 800 wrote to memory of 4288 800 Dddhpjof.exe 95 PID 800 wrote to memory of 4288 800 Dddhpjof.exe 95 PID 800 wrote to memory of 4288 800 Dddhpjof.exe 95 PID 4288 wrote to memory of 1104 4288 Dknpmdfc.exe 96 PID 4288 wrote to memory of 1104 4288 Dknpmdfc.exe 96 PID 4288 wrote to memory of 1104 4288 Dknpmdfc.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\7c48c8d6e4ede3a729da845a6ac37f40N.exe"C:\Users\Admin\AppData\Local\Temp\7c48c8d6e4ede3a729da845a6ac37f40N.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3596 -
C:\Windows\SysWOW64\Djgjlelk.exeC:\Windows\system32\Djgjlelk.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4184 -
C:\Windows\SysWOW64\Dmefhako.exeC:\Windows\system32\Dmefhako.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3656 -
C:\Windows\SysWOW64\Daqbip32.exeC:\Windows\system32\Daqbip32.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\SysWOW64\Delnin32.exeC:\Windows\system32\Delnin32.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Windows\SysWOW64\Dhkjej32.exeC:\Windows\system32\Dhkjej32.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Windows\SysWOW64\Dmgbnq32.exeC:\Windows\system32\Dmgbnq32.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3836 -
C:\Windows\SysWOW64\Daconoae.exeC:\Windows\system32\Daconoae.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Windows\SysWOW64\Dhmgki32.exeC:\Windows\system32\Dhmgki32.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3840 -
C:\Windows\SysWOW64\Dkkcge32.exeC:\Windows\system32\Dkkcge32.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Windows\SysWOW64\Daekdooc.exeC:\Windows\system32\Daekdooc.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Windows\SysWOW64\Dddhpjof.exeC:\Windows\system32\Dddhpjof.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:800 -
C:\Windows\SysWOW64\Dknpmdfc.exeC:\Windows\system32\Dknpmdfc.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4288 -
C:\Windows\SysWOW64\Dmllipeg.exeC:\Windows\system32\Dmllipeg.exe14⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1104 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1104 -s 41615⤵
- Program crash
PID:3316
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1104 -ip 11041⤵PID:4464
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
94KB
MD59535889ed9b846cf5c65f6c7f4488774
SHA1586b19590fc739f53f39ff57b53e2fcb3a21c58b
SHA2563f0b1157f2739e286fea2d812023a5cef0adba17fe26d717f32b58eff727b8b6
SHA5126d77afe372c8a1a13a0223163c2dfa7a4517052de2382eb3213ba67139757536bcb745810b8e7e3df08e169d905078b1f8dfceb5b2d8f53614552543eec0798a
-
Filesize
94KB
MD59dfda0765f866a9ad4574a689e1efa54
SHA19fee3c4da9235a941b157b16c261c68be833ece5
SHA2568444fd27127a682f3e8a49c9b8049d48ace924723395b634125d52904e01f2fc
SHA512adb51c5d299e6186956a378982f43a168a34b1c228bf19f1568cbfb626c37f6cd41a264392dfb99f1d665ad871376b9ce026846be231dd790a8b2be1a1309b7c
-
Filesize
94KB
MD56fd7ac18ef8ab9e3829de849bf550e9e
SHA1e755a300dbe6317e2ed8444eb0cfffe096750a25
SHA256404c410a5398d7b4f85cd2299c594da3425c35e339aea8f01f6a3394c85ace73
SHA5121b7b6522b54e58d126695592cdf7a91e5c0c16b12314cdaad0f6a496d584e71b67fd8a33fb91f7c9d65e1052167c390fc76caaff238ccab52ec4c66bbbaf70d9
-
Filesize
94KB
MD5f7edcba3509eab46dfccb51c9b7d70bc
SHA162adc272ace889f0a2f9257101537641f847847b
SHA25680d546e96ee0c987745b9eefc634d7cf4637fe48c06952f150d7ce6042c6a6a3
SHA5127b51e284af375e0e410f800bde008eee627cabb5d5ecb17d33e52808aa9522044bafc66e6f2c2ba02244c98599c9a1ff11d2523d488ffd798bf2e2951b680e33
-
Filesize
94KB
MD5f419e1d35c06369426acfe776d51594c
SHA117e365345fe4e57f1665cd39c92fa31470b3f593
SHA256d0d07af4ccc3129923917e049eb62e3dcad3b4cc0bbef2790fc37ba3e89c3423
SHA512ef39ab42fb843d6061425800548c4b0360a6edd3616c522e52336729ee71f95599db2e7addcb7880c815f375111980e0498070c6dad909ae75ca10cfd1becb48
-
Filesize
94KB
MD5435b91f34bd6d32381742cbf2db475cf
SHA1c45d948d57cf532e216be963a222f867cb61fb56
SHA256fd51f1461fbfcdb18056fa459da215db57bcd5c29f8716cb6215b6e9194cf52c
SHA512f3f477abb7b02052653f20145f09a37136908abf051ccf8095e0e5b036432854d544a51ad9cb7b7da61507ba8efc9eceb8fbc9221709927b7e5eecc11c39b69a
-
Filesize
94KB
MD506ad6ee3b6dd8d2e5141ca81f6edf081
SHA1c017e2d72b528da56555f17a1d4398c1f5644f20
SHA2562bcd777607297fc32c670c570c3a9d308fa69dcb26885d0456e25cb53846b21a
SHA5127956fd4b42175bbd6fb8c1ac53e28611a444f78e6103b80a5dfe958de7c11c742188fd7e96d52745b75dc5f237d6b51d440a325c6cb6f0596e4a136529592828
-
Filesize
94KB
MD52ef02e527e0f911a412b5e7a238c1cd2
SHA1712aaaa0edfbd01e51b0d50c1d3fa1a97148e581
SHA256e9ca06161eaec1d8022dc086b496ac5203814d3e640586d87b3f97a3c5c3a20a
SHA5126ea9a25cf0e0046b6c909b129d96a01b7fac96bc4d25ba53ee7846f576e1e1103cf16c814a64ce2501189141b59cd5d1df94aecd44cea7447e821d9c7ad35bca
-
Filesize
94KB
MD566fa25722ffa2d224d24ac1a2ba2a8fa
SHA17887db8dbf31d625f7a5bdc0812400465e796da7
SHA25693255da03b68228a073e73738d8b73287e6b0c0257c6720d7f5b74aebcfae043
SHA512794b9f857d147ef57e03f0a7f20c0bc0845d13617992f1bd2d7905e713ab2eb4ba079660e891296f832e96bddde1d33bc71ec18882a5da4afd1c77c6f9cdeae4
-
Filesize
94KB
MD53bf01aed3f23e0dd1b2000a07a5ed2e7
SHA148df664f9c6470a4555c1dda2da357c73d0b8bc5
SHA2567f1845ccf3bef4dc40b9fa817f4ec5d62bc457a3f607533e8ce57f02bbe0c505
SHA51293288d7662e7036a208609c8267764a90da55769607286a63c6e375316f48183d4b4ae3061e5ad6df1ca6f0eee5fea9ac4f876e6017a7cd589de14f8e3ebf0a9
-
Filesize
94KB
MD57991cb102d571fc7bb99c1548104ce39
SHA18c2717702bd3b5833d12ddf8825a488b0b18e5e1
SHA256f768fee9097d3cf9ac996f1bdae497831ad113136dae98103ca7eae89358cd63
SHA512052229bcf9a23fdda77b6a0690d88cca1adfa6776f1ff65c86900f55519fc674d5447f5b71e650da4a515fa0f40d3e0a00bf07c95eda2ccc55473ff78cd8ef32
-
Filesize
94KB
MD5d878aeee24913ff478d366210963e92c
SHA14745890985f3a4cef97296efa455c0a6b02f86c9
SHA2562ce802869018c38213dc63afd457a71619cebbc65d3f2fe4b19c049b7356fdb4
SHA5126f5e842df8a26c3a6d0ee643855fbfe955d6ae414fe27bca5a4818991daf3d1f05e24e8d19fe9c8dc07a93c1588938ac1377a3deeb74cbe43661f86d39e04a52
-
Filesize
94KB
MD5e90cea01fba61013bfef840aa1333ef4
SHA14a682a4bcdcc38f443c225fff77a2a9992d7d8f1
SHA2568284dd4a9fe36fbc2312b93cd4f520dcfeb1f067cce9a5c4aafc2788ed9b812e
SHA5122ae588e61f3b09b164b7d517fef24ebf19a3aa8a1808e4453dfcae4188bc2f33fcc4a1d5ae453c27c3358eb5178a76136ceb335e51d0c7eadb89ae7a93431b7f
-
Filesize
7KB
MD58c0533226ac3e76774c3738db48cb9b1
SHA1d25c7106ada76e283b7e2142a4aef56331382465
SHA256120498ef0eb50dafe3123bdf3349a87b3dcb8c7e9cdbd97f3a288f05d39bfb3b
SHA512d7fb4494e31be90b75fa132118f925d6aa124f17479ceeefabe432ce04519bffce90c4f92dabd0a680959b391b91cc0c147a732912a70fa2ff18eae483550f7d