Analysis
-
max time kernel
32s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
24/08/2024, 07:30
Static task
static1
Behavioral task
behavioral1
Sample
ea45c1384420b2ff9f7edffb17402640N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
ea45c1384420b2ff9f7edffb17402640N.exe
Resource
win10v2004-20240802-en
General
-
Target
ea45c1384420b2ff9f7edffb17402640N.exe
-
Size
366KB
-
MD5
ea45c1384420b2ff9f7edffb17402640
-
SHA1
56e2f14f54052a7f3943378f9ab23ad7c0593145
-
SHA256
a03f10bc5a7a1c4260a1be8e886b4a9e15dc255afd9a0d0f41ff9c252ad155a4
-
SHA512
f94b3cdbd61ce00798e27d6747f5f4a927156b85e8a6cc391dca6b9fd1fd58dd2fb502f1f685e82570d53629d4673fd5a4a7f2953e08384c4971e5e22b687d4a
-
SSDEEP
3072:IeSEoKimmmL46K24u+5GURlSjgjxxt8vgHq/Wp+YmKfxg:HSEo72O24u+5LRlUivKvUmKy
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 52 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pihgic32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Blaopqpo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Blaopqpo.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bmclhi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Aniimjbo.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Amcpie32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bkglameg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Achojp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Biafnecn.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad ea45c1384420b2ff9f7edffb17402640N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Amcpie32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bnkbam32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bdmddc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Baadng32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Annbhi32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bnkbam32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cfnmfn32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Achojp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Afkdakjb.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Biafnecn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bmclhi32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bkglameg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Annbhi32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Behgcf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Aganeoip.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bjbcfn32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pjbjhgde.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qeohnd32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bjbcfn32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Baadng32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pjpnbg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Pjpnbg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Pihgic32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Qqeicede.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Afkdakjb.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bbdallnd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Cmgechbh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Qeohnd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bdmddc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Pjbjhgde.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bbdallnd.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bhajdblk.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cmgechbh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Cfnmfn32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qqeicede.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aganeoip.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bmhideol.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Behgcf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" ea45c1384420b2ff9f7edffb17402640N.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aniimjbo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bmhideol.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bhajdblk.exe -
Executes dropped EXE 26 IoCs
pid Process 2912 Pjpnbg32.exe 2896 Pjbjhgde.exe 2708 Pihgic32.exe 2648 Qeohnd32.exe 2984 Qqeicede.exe 868 Aniimjbo.exe 2860 Aganeoip.exe 2156 Achojp32.exe 1560 Annbhi32.exe 1952 Amcpie32.exe 1120 Afkdakjb.exe 1848 Bmhideol.exe 2432 Bbdallnd.exe 2216 Bhajdblk.exe 1488 Bnkbam32.exe 2464 Biafnecn.exe 2224 Bjbcfn32.exe 1780 Behgcf32.exe 2484 Blaopqpo.exe 700 Bmclhi32.exe 2512 Bdmddc32.exe 2368 Bkglameg.exe 2080 Baadng32.exe 1960 Cfnmfn32.exe 1588 Cmgechbh.exe 2824 Cacacg32.exe -
Loads dropped DLL 56 IoCs
pid Process 2720 ea45c1384420b2ff9f7edffb17402640N.exe 2720 ea45c1384420b2ff9f7edffb17402640N.exe 2912 Pjpnbg32.exe 2912 Pjpnbg32.exe 2896 Pjbjhgde.exe 2896 Pjbjhgde.exe 2708 Pihgic32.exe 2708 Pihgic32.exe 2648 Qeohnd32.exe 2648 Qeohnd32.exe 2984 Qqeicede.exe 2984 Qqeicede.exe 868 Aniimjbo.exe 868 Aniimjbo.exe 2860 Aganeoip.exe 2860 Aganeoip.exe 2156 Achojp32.exe 2156 Achojp32.exe 1560 Annbhi32.exe 1560 Annbhi32.exe 1952 Amcpie32.exe 1952 Amcpie32.exe 1120 Afkdakjb.exe 1120 Afkdakjb.exe 1848 Bmhideol.exe 1848 Bmhideol.exe 2432 Bbdallnd.exe 2432 Bbdallnd.exe 2216 Bhajdblk.exe 2216 Bhajdblk.exe 1488 Bnkbam32.exe 1488 Bnkbam32.exe 2464 Biafnecn.exe 2464 Biafnecn.exe 2224 Bjbcfn32.exe 2224 Bjbcfn32.exe 1780 Behgcf32.exe 1780 Behgcf32.exe 2484 Blaopqpo.exe 2484 Blaopqpo.exe 700 Bmclhi32.exe 700 Bmclhi32.exe 2512 Bdmddc32.exe 2512 Bdmddc32.exe 2368 Bkglameg.exe 2368 Bkglameg.exe 2080 Baadng32.exe 2080 Baadng32.exe 1960 Cfnmfn32.exe 1960 Cfnmfn32.exe 1588 Cmgechbh.exe 1588 Cmgechbh.exe 2852 WerFault.exe 2852 WerFault.exe 2852 WerFault.exe 2852 WerFault.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Pjpnbg32.exe ea45c1384420b2ff9f7edffb17402640N.exe File created C:\Windows\SysWOW64\Gdplpd32.dll Pjpnbg32.exe File created C:\Windows\SysWOW64\Achojp32.exe Aganeoip.exe File created C:\Windows\SysWOW64\Biafnecn.exe Bnkbam32.exe File opened for modification C:\Windows\SysWOW64\Behgcf32.exe Bjbcfn32.exe File created C:\Windows\SysWOW64\Cfgheegc.dll Behgcf32.exe File opened for modification C:\Windows\SysWOW64\Baadng32.exe Bkglameg.exe File opened for modification C:\Windows\SysWOW64\Achojp32.exe Aganeoip.exe File created C:\Windows\SysWOW64\Bnkbam32.exe Bhajdblk.exe File created C:\Windows\SysWOW64\Opacnnhp.dll Blaopqpo.exe File created C:\Windows\SysWOW64\Bdmddc32.exe Bmclhi32.exe File created C:\Windows\SysWOW64\Hepiihgc.dll Pjbjhgde.exe File created C:\Windows\SysWOW64\Qqeicede.exe Qeohnd32.exe File created C:\Windows\SysWOW64\Aniimjbo.exe Qqeicede.exe File opened for modification C:\Windows\SysWOW64\Aniimjbo.exe Qqeicede.exe File opened for modification C:\Windows\SysWOW64\Aganeoip.exe Aniimjbo.exe File created C:\Windows\SysWOW64\Hqlhpf32.dll Biafnecn.exe File created C:\Windows\SysWOW64\Bmclhi32.exe Blaopqpo.exe File created C:\Windows\SysWOW64\Jmogdj32.dll Qqeicede.exe File opened for modification C:\Windows\SysWOW64\Amcpie32.exe Annbhi32.exe File created C:\Windows\SysWOW64\Bhajdblk.exe Bbdallnd.exe File created C:\Windows\SysWOW64\Deokbacp.dll Bnkbam32.exe File opened for modification C:\Windows\SysWOW64\Bmclhi32.exe Blaopqpo.exe File opened for modification C:\Windows\SysWOW64\Pjbjhgde.exe Pjpnbg32.exe File opened for modification C:\Windows\SysWOW64\Qeohnd32.exe Pihgic32.exe File opened for modification C:\Windows\SysWOW64\Bhajdblk.exe Bbdallnd.exe File created C:\Windows\SysWOW64\Baadng32.exe Bkglameg.exe File created C:\Windows\SysWOW64\Aganeoip.exe Aniimjbo.exe File created C:\Windows\SysWOW64\Lmpanl32.dll Afkdakjb.exe File created C:\Windows\SysWOW64\Cifmcd32.dll Bbdallnd.exe File created C:\Windows\SysWOW64\Bjbcfn32.exe Biafnecn.exe File created C:\Windows\SysWOW64\Dhnook32.dll Bjbcfn32.exe File created C:\Windows\SysWOW64\Jbdipkfe.dll Achojp32.exe File created C:\Windows\SysWOW64\Oilpcd32.dll Annbhi32.exe File created C:\Windows\SysWOW64\Bbdallnd.exe Bmhideol.exe File opened for modification C:\Windows\SysWOW64\Bdmddc32.exe Bmclhi32.exe File created C:\Windows\SysWOW64\Pjbjhgde.exe Pjpnbg32.exe File created C:\Windows\SysWOW64\Hbcicn32.dll Aniimjbo.exe File created C:\Windows\SysWOW64\Blaopqpo.exe Behgcf32.exe File opened for modification C:\Windows\SysWOW64\Qqeicede.exe Qeohnd32.exe File created C:\Windows\SysWOW64\Imjcfnhk.dll Qeohnd32.exe File created C:\Windows\SysWOW64\Pihgic32.exe Pjbjhgde.exe File created C:\Windows\SysWOW64\Qeohnd32.exe Pihgic32.exe File created C:\Windows\SysWOW64\Cacacg32.exe Cmgechbh.exe File opened for modification C:\Windows\SysWOW64\Pihgic32.exe Pjbjhgde.exe File created C:\Windows\SysWOW64\Annbhi32.exe Achojp32.exe File opened for modification C:\Windows\SysWOW64\Annbhi32.exe Achojp32.exe File created C:\Windows\SysWOW64\Bmhideol.exe Afkdakjb.exe File created C:\Windows\SysWOW64\Momeefin.dll Bmhideol.exe File opened for modification C:\Windows\SysWOW64\Bjbcfn32.exe Biafnecn.exe File opened for modification C:\Windows\SysWOW64\Bkglameg.exe Bdmddc32.exe File opened for modification C:\Windows\SysWOW64\Cacacg32.exe Cmgechbh.exe File created C:\Windows\SysWOW64\Fdlpjk32.dll Cmgechbh.exe File created C:\Windows\SysWOW64\Nodmbemj.dll Bhajdblk.exe File created C:\Windows\SysWOW64\Behgcf32.exe Bjbcfn32.exe File created C:\Windows\SysWOW64\Mdqfkmom.dll Bdmddc32.exe File created C:\Windows\SysWOW64\Ljacemio.dll Bkglameg.exe File created C:\Windows\SysWOW64\Cmgechbh.exe Cfnmfn32.exe File created C:\Windows\SysWOW64\Aalpaf32.dll ea45c1384420b2ff9f7edffb17402640N.exe File opened for modification C:\Windows\SysWOW64\Bmhideol.exe Afkdakjb.exe File created C:\Windows\SysWOW64\Cjnolikh.dll Bmclhi32.exe File created C:\Windows\SysWOW64\Bkglameg.exe Bdmddc32.exe File opened for modification C:\Windows\SysWOW64\Cmgechbh.exe Cfnmfn32.exe File opened for modification C:\Windows\SysWOW64\Afkdakjb.exe Amcpie32.exe -
Program crash 1 IoCs
pid pid_target Process 2852 2824 WerFault.exe -
System Location Discovery: System Language Discovery 1 TTPs 27 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bmhideol.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bhajdblk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Behgcf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pihgic32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Aniimjbo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Afkdakjb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Achojp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Amcpie32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qqeicede.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bjbcfn32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cmgechbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bmclhi32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cfnmfn32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bkglameg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qeohnd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bnkbam32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Biafnecn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Blaopqpo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ea45c1384420b2ff9f7edffb17402640N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pjpnbg32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Aganeoip.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pjbjhgde.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Annbhi32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cacacg32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bbdallnd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bdmddc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Baadng32.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Pjbjhgde.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Pihgic32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Imjcfnhk.dll" Qeohnd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Achojp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Cfnmfn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Bnkbam32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Bmclhi32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID ea45c1384420b2ff9f7edffb17402640N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Bmhideol.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Bmhideol.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Bbdallnd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Bbdallnd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Qeohnd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Aganeoip.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Achojp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Amcpie32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Momeefin.dll" Bmhideol.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Pjpnbg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hepiihgc.dll" Pjbjhgde.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Opacnnhp.dll" Blaopqpo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Qeohnd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Afkdakjb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Behgcf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fdlpjk32.dll" Cmgechbh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jbdipkfe.dll" Achojp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oilpcd32.dll" Annbhi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cifmcd32.dll" Bbdallnd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Blaopqpo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Bdmddc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Biafnecn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mdqfkmom.dll" Bdmddc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Bkglameg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717} ea45c1384420b2ff9f7edffb17402640N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Pihgic32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Aganeoip.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lmmlmd32.dll" Amcpie32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Bhajdblk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ljacemio.dll" Bkglameg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gnnffg32.dll" Cfnmfn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Bkglameg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mabanhgg.dll" Baadng32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 ea45c1384420b2ff9f7edffb17402640N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" ea45c1384420b2ff9f7edffb17402640N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Bnkbam32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Biafnecn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Behgcf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Afkdakjb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nodmbemj.dll" Bhajdblk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Bjbcfn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Bmclhi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Cmgechbh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aalpaf32.dll" ea45c1384420b2ff9f7edffb17402640N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gdplpd32.dll" Pjpnbg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eioojl32.dll" Pihgic32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jmogdj32.dll" Qqeicede.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Bdmddc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node ea45c1384420b2ff9f7edffb17402640N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Qqeicede.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Qqeicede.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Annbhi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Bjbcfn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Blaopqpo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Aniimjbo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Aniimjbo.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2720 wrote to memory of 2912 2720 ea45c1384420b2ff9f7edffb17402640N.exe 30 PID 2720 wrote to memory of 2912 2720 ea45c1384420b2ff9f7edffb17402640N.exe 30 PID 2720 wrote to memory of 2912 2720 ea45c1384420b2ff9f7edffb17402640N.exe 30 PID 2720 wrote to memory of 2912 2720 ea45c1384420b2ff9f7edffb17402640N.exe 30 PID 2912 wrote to memory of 2896 2912 Pjpnbg32.exe 31 PID 2912 wrote to memory of 2896 2912 Pjpnbg32.exe 31 PID 2912 wrote to memory of 2896 2912 Pjpnbg32.exe 31 PID 2912 wrote to memory of 2896 2912 Pjpnbg32.exe 31 PID 2896 wrote to memory of 2708 2896 Pjbjhgde.exe 32 PID 2896 wrote to memory of 2708 2896 Pjbjhgde.exe 32 PID 2896 wrote to memory of 2708 2896 Pjbjhgde.exe 32 PID 2896 wrote to memory of 2708 2896 Pjbjhgde.exe 32 PID 2708 wrote to memory of 2648 2708 Pihgic32.exe 33 PID 2708 wrote to memory of 2648 2708 Pihgic32.exe 33 PID 2708 wrote to memory of 2648 2708 Pihgic32.exe 33 PID 2708 wrote to memory of 2648 2708 Pihgic32.exe 33 PID 2648 wrote to memory of 2984 2648 Qeohnd32.exe 34 PID 2648 wrote to memory of 2984 2648 Qeohnd32.exe 34 PID 2648 wrote to memory of 2984 2648 Qeohnd32.exe 34 PID 2648 wrote to memory of 2984 2648 Qeohnd32.exe 34 PID 2984 wrote to memory of 868 2984 Qqeicede.exe 35 PID 2984 wrote to memory of 868 2984 Qqeicede.exe 35 PID 2984 wrote to memory of 868 2984 Qqeicede.exe 35 PID 2984 wrote to memory of 868 2984 Qqeicede.exe 35 PID 868 wrote to memory of 2860 868 Aniimjbo.exe 36 PID 868 wrote to memory of 2860 868 Aniimjbo.exe 36 PID 868 wrote to memory of 2860 868 Aniimjbo.exe 36 PID 868 wrote to memory of 2860 868 Aniimjbo.exe 36 PID 2860 wrote to memory of 2156 2860 Aganeoip.exe 37 PID 2860 wrote to memory of 2156 2860 Aganeoip.exe 37 PID 2860 wrote to memory of 2156 2860 Aganeoip.exe 37 PID 2860 wrote to memory of 2156 2860 Aganeoip.exe 37 PID 2156 wrote to memory of 1560 2156 Achojp32.exe 38 PID 2156 wrote to memory of 1560 2156 Achojp32.exe 38 PID 2156 wrote to memory of 1560 2156 Achojp32.exe 38 PID 2156 wrote to memory of 1560 2156 Achojp32.exe 38 PID 1560 wrote to memory of 1952 1560 Annbhi32.exe 39 PID 1560 wrote to memory of 1952 1560 Annbhi32.exe 39 PID 1560 wrote to memory of 1952 1560 Annbhi32.exe 39 PID 1560 wrote to memory of 1952 1560 Annbhi32.exe 39 PID 1952 wrote to memory of 1120 1952 Amcpie32.exe 40 PID 1952 wrote to memory of 1120 1952 Amcpie32.exe 40 PID 1952 wrote to memory of 1120 1952 Amcpie32.exe 40 PID 1952 wrote to memory of 1120 1952 Amcpie32.exe 40 PID 1120 wrote to memory of 1848 1120 Afkdakjb.exe 41 PID 1120 wrote to memory of 1848 1120 Afkdakjb.exe 41 PID 1120 wrote to memory of 1848 1120 Afkdakjb.exe 41 PID 1120 wrote to memory of 1848 1120 Afkdakjb.exe 41 PID 1848 wrote to memory of 2432 1848 Bmhideol.exe 42 PID 1848 wrote to memory of 2432 1848 Bmhideol.exe 42 PID 1848 wrote to memory of 2432 1848 Bmhideol.exe 42 PID 1848 wrote to memory of 2432 1848 Bmhideol.exe 42 PID 2432 wrote to memory of 2216 2432 Bbdallnd.exe 43 PID 2432 wrote to memory of 2216 2432 Bbdallnd.exe 43 PID 2432 wrote to memory of 2216 2432 Bbdallnd.exe 43 PID 2432 wrote to memory of 2216 2432 Bbdallnd.exe 43 PID 2216 wrote to memory of 1488 2216 Bhajdblk.exe 44 PID 2216 wrote to memory of 1488 2216 Bhajdblk.exe 44 PID 2216 wrote to memory of 1488 2216 Bhajdblk.exe 44 PID 2216 wrote to memory of 1488 2216 Bhajdblk.exe 44 PID 1488 wrote to memory of 2464 1488 Bnkbam32.exe 45 PID 1488 wrote to memory of 2464 1488 Bnkbam32.exe 45 PID 1488 wrote to memory of 2464 1488 Bnkbam32.exe 45 PID 1488 wrote to memory of 2464 1488 Bnkbam32.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\ea45c1384420b2ff9f7edffb17402640N.exe"C:\Users\Admin\AppData\Local\Temp\ea45c1384420b2ff9f7edffb17402640N.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\SysWOW64\Pjpnbg32.exeC:\Windows\system32\Pjpnbg32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Windows\SysWOW64\Pjbjhgde.exeC:\Windows\system32\Pjbjhgde.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Windows\SysWOW64\Pihgic32.exeC:\Windows\system32\Pihgic32.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\SysWOW64\Qeohnd32.exeC:\Windows\system32\Qeohnd32.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\SysWOW64\Qqeicede.exeC:\Windows\system32\Qqeicede.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Windows\SysWOW64\Aniimjbo.exeC:\Windows\system32\Aniimjbo.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:868 -
C:\Windows\SysWOW64\Aganeoip.exeC:\Windows\system32\Aganeoip.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Windows\SysWOW64\Achojp32.exeC:\Windows\system32\Achojp32.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Windows\SysWOW64\Annbhi32.exeC:\Windows\system32\Annbhi32.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Windows\SysWOW64\Amcpie32.exeC:\Windows\system32\Amcpie32.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Windows\SysWOW64\Afkdakjb.exeC:\Windows\system32\Afkdakjb.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Windows\SysWOW64\Bmhideol.exeC:\Windows\system32\Bmhideol.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Windows\SysWOW64\Bbdallnd.exeC:\Windows\system32\Bbdallnd.exe14⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Windows\SysWOW64\Bhajdblk.exeC:\Windows\system32\Bhajdblk.exe15⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Windows\SysWOW64\Bnkbam32.exeC:\Windows\system32\Bnkbam32.exe16⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Windows\SysWOW64\Biafnecn.exeC:\Windows\system32\Biafnecn.exe17⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2464 -
C:\Windows\SysWOW64\Bjbcfn32.exeC:\Windows\system32\Bjbcfn32.exe18⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2224 -
C:\Windows\SysWOW64\Behgcf32.exeC:\Windows\system32\Behgcf32.exe19⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1780 -
C:\Windows\SysWOW64\Blaopqpo.exeC:\Windows\system32\Blaopqpo.exe20⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2484 -
C:\Windows\SysWOW64\Bmclhi32.exeC:\Windows\system32\Bmclhi32.exe21⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:700 -
C:\Windows\SysWOW64\Bdmddc32.exeC:\Windows\system32\Bdmddc32.exe22⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2512 -
C:\Windows\SysWOW64\Bkglameg.exeC:\Windows\system32\Bkglameg.exe23⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2368 -
C:\Windows\SysWOW64\Baadng32.exeC:\Windows\system32\Baadng32.exe24⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2080 -
C:\Windows\SysWOW64\Cfnmfn32.exeC:\Windows\system32\Cfnmfn32.exe25⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1960 -
C:\Windows\SysWOW64\Cmgechbh.exeC:\Windows\system32\Cmgechbh.exe26⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1588 -
C:\Windows\SysWOW64\Cacacg32.exeC:\Windows\system32\Cacacg32.exe27⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2824 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2824 -s 14028⤵
- Loads dropped DLL
- Program crash
PID:2852
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
366KB
MD546defd715b59b166e16650e5d9e588f7
SHA1e2add788e652a99df15d0539e89a8dba8d32870e
SHA2560f339b04488e7949933019bbf11eaa65f5efbbc398e4f2dbb28217f967324e40
SHA51286d001371c5530b44d9a26098442a235d3a110fa01c68d048688b06d7bdfb3372cedd4c538442a578796789eecd4187b30f070fdfccb560ba5123d39915bdf9e
-
Filesize
366KB
MD5e1ed57a04d044ffcb6c1a65362ff776b
SHA116bdfe321994650637d84a7a675c5fd4e879434e
SHA256aa8cab0a206e54bd139f3cec134618ba0ad07e12a15108db5bff7b87e3cf85a1
SHA5122033d885380051b9c278d55c789cd45491e1b6e6dd2f52492164335496106d225dec8f6cc05f07db493e6e39d2570ca8e09212c22f46932092f1fedb39e7718e
-
Filesize
366KB
MD5db74d42abcec3a4e4552a7bc69557113
SHA1cbca63c38a7d36feb221a3f46ba5cc15c96ecc2e
SHA2563b2694b489c7727a4f344540b434c27f8c7738ed37da2dc8689d24e83ba34e86
SHA512d3e7b2fa6023e528c2b82b3acbcbb17c01e2ab493e90fd8ec7123260c0e2d11292c52a6502a795606dee837dfd0cf0914eda4233f21add8fbdf0c0dc6c79a0d5
-
Filesize
366KB
MD5fe9533d27a1c6442c4236fbef8751d08
SHA18a2ec71a5e34bd1be80d12fb21137ff5e9bf5451
SHA256bdce6cb9868c53d0fac7cd39b37742751b11f31b2efb70d4fddc4ef69263d0b0
SHA5127a542602187f27498463a98d238d498d9fc979fe6e880e155c25486905e09f9dd68797eb0431be94bbcdb931666541aeab65b1b19724dd3588b024302332f8be
-
Filesize
366KB
MD5f8d0a97a0f14f05a61284592067c22f4
SHA162101ac733e0be905f15ba4d89f2da30cea0fb73
SHA256c1fc0089db12b4770d63f204c6a6b01589f38d2343babbfb7a545e9e021760ca
SHA512076912d0f85614bd3a20485006cad09355bcfc847da1126d6b4116a8a3cf0b1fcd956dc2d3f792123f625b3953bb8b84fc99c8eca2248654d289621a841160a6
-
Filesize
366KB
MD5be8bcbcf2ead79da635597b4c5db046d
SHA1af5c971584da22b3cd9c0895a5bacf56bcae2c72
SHA256f72309100046da4f7a2d83d1e99dfedefebc967f36fb572e4a5ddd749b3bd7af
SHA5123942219fa391519fa3bb39b77d7974a310b0c21a7028bb060235320f9b4a79ae67aa82bed39dab272d0d1d4529a626b6fe3cd2f3b3813ec587cd5aa2b05002df
-
Filesize
366KB
MD5456ab93c572f35fe2a3b725168e248aa
SHA195591ef2b39170515e47bc95c9e803ddb3f2958c
SHA25692e9494e7c68accb5a8c004b60044c33a5fe59bee605aa4e0e65f0ed5ed59cf0
SHA5125d4ccdb14858cc99449487e449f6d838645aa5eed605293c733f51a34bd1664e7cb6018212797f90eca2183f6a7d131d3f8a78ab27e4ce99f2f637fe7fd050c4
-
Filesize
366KB
MD518488bf5754777f897e471ff61545249
SHA1dfacd9e2d548bad487ea460d8dc06300c9b84253
SHA2560b0790a770e450ceed8f50b8691c2c788728e40b142fd8e405774a2b06465d49
SHA51284eea41b908d0da01ef60e87e4ba39ae89e5bd385e48b94323ac07cad6a9befd875074f0b35e7bf3ba1845d4ce660721e707843270b27fdd25214f18817d0368
-
Filesize
366KB
MD51ae0ab9257cf2fc777c1b1f2fa498dfb
SHA1e97d46849a694d4bfa9ea8bfc3bce3e90d5265cd
SHA256c2bc8cea4ad7f66721a7e9e9b472790e05ee90255dd00bcc370922a2c3fecf10
SHA512f1a63c0f7a0e40977b9a55399b7a8fd926408051875949a546daeb2fa81b7934ece19d5472078e4fc40527bcb45461722f4defec66aba0206ff77bccc1a8ff7e
-
Filesize
366KB
MD567d584e58f9c544161f891f39e5e0d40
SHA1482c15fa7de49c34d7d759ad9e0a74bdb8a40f62
SHA256e2867b13fe77fd647f9f4d3c232444f3845de180a979428048f3957ef637eba3
SHA5128b7237e491dad9fa62f30c2ce7cc0014cba3e1bb768708a8787b95411755a19d9c0b1da53d15eff6a1baa2ff8d7a82711d4efee0d0c82a46469849b710f9187c
-
Filesize
366KB
MD5845b0921cb6895b3a00afac0632326b3
SHA1666cf0c22a97413c5c8cc6741d01ec24f4005029
SHA25693b95959779f3f796e12ab66dd6d7dc7a2b8decd429716b085307ff4a0b15a85
SHA512f9f1ce0255843a939a77538ea152f28a91009b81c5cbd82c54b89f752cbfe9755197563ba96d54549aa54787f867da5aa4cf260c9f4ee8a79e21b103a3f7126f
-
Filesize
366KB
MD5e6fa519254958c719bf1b56afbc01205
SHA1a9216e082ea8e2a6aaac366e530ed408f17ce733
SHA2569477f533e15ec037c9bdf5fbf01628b15307f54adac87b9bfe6ef35ef2baf4e1
SHA512d8d7d1537b0cffd470ca6b4589bfb668a03d78403fd865e2b8d1fd4ed22f49b95c495f7e09d000549e87a94c440c29f73175176a51962d3ed8ba938e4fbc9a4a
-
Filesize
366KB
MD5ecd839da4489b5da50391fef7bf4545c
SHA15e59ab5d087a0b2b212a0ce2464d2b25acf36866
SHA256ff4453d1bcaa395640b1cc688f330e1ca9d4ee68cb252c915b20acaee210371a
SHA5126bc5c77a5adfd4dcc3e8ed521f787846ed640b32379a1dd622def49a931ac68826144ca06b814338ff8bf76c2a01356076399e495135ed9255c718dd3546aba3
-
Filesize
366KB
MD5c140b4a914beab40ba8d985fef184e27
SHA1521c196b6c074aa4bd2310c29382537bccbf1996
SHA25628dfdcd49038ede977ecc0506240733cbd95223993f5d0386ddc73ad14aa4f23
SHA5127ff50912c8e103c85583b6cd91a203764dda538c6daea9aa530ffc9a6b7a7d71053e27584253433bbfad6ecfdc66a661ef5cc5d925f9d1a8af1c992a4921d96f
-
Filesize
366KB
MD5d40e5927bc9324cfb2694fd427a34af3
SHA1d54143c4798f518bbd4fa3e124a6a0bc3a37de4b
SHA256f44c1618d562c14009d02a778dd2ff7d7c2ca19cc6cee2751d779d52c5063b73
SHA512d8730043eb2187fdb6fc5be8db1ba43b30fd339a58b8defb7b7d08e6f618976a493b73b4d1e2311e70ed15f11a808f8c36df4a6c7b526e93eb5bc33d37aae374
-
Filesize
366KB
MD578012313ea76c38badc3ad2aea689047
SHA1567f9865a5225ba78dafda337e89d61b5dea0ba4
SHA25669491398413389a68be3f9a0ca907445afb4bf167eaef69462e1b9a67a411aac
SHA512321d0bfb21cdd0c51511f710ecb31bf27c4119f941d4d95ebb9032503954534ae91b816487c8156678ef680e644e432cf672d53e85a8b999dbc41e06fc033735
-
Filesize
7KB
MD5c1e4fc517106120c12ff1cf61da206d8
SHA10752500a10a45191cc95dbdf96b875a70ccc7042
SHA256b68917df7473b0b85e3ce8a266551d8ca4046943e867ea56aeb4c052ab9f7cbf
SHA512cabaad4f13083be98c9e0ff364cd941be2535e2eff2ad182131d7625608e87639c2fbeb68dad9cea32c37948de2de19c2e5ae83b3b449c9aec2b52f0ffd39229
-
Filesize
366KB
MD5463e76aa0cb03e2f8b0430805d046aa7
SHA1fa295cd96070429e2dc62638df1a6ad4c34e8049
SHA256576b5f1263acca847051d82f61964d58ce2299d30ed79e6f9369d94c651ae616
SHA51201a4cce8f743939f57dc88c43c4e170332963dc28608e1504ade4af288edf23a69a7f5a94c8eabaddece82c9e2350799f5ca725613b4712007f5cbafe7aef08f
-
Filesize
366KB
MD5fef270e01848b249e07a0064181023eb
SHA10861146d3b6a53ccccce2c0726b3b274caa8abba
SHA256d405ef09e92a321925bd8011701b0317b3d0c678691ed77dbd2b43809686af7c
SHA512c8be04e580272f09e230ef6b0dd5a19e772b2275e470b80c538913662aa4d6337afc914ff3163641449af986e8f115754536ca7028830afe402c54305bf117f8
-
Filesize
366KB
MD56fc8d13d9b91b88e02b70a6e2d3f382b
SHA12fe75a68a15b1883fb4b19e9632aa6ede99996f9
SHA2562a580123e8dfce93b92c511d2894023168eeb8283c5956218f5a79eaa4aea688
SHA512b8980ed965ac8eb15a12a5fe11d72436e726070354a5287e9000b4b1fe1a6fc063ad05fc670b53a20de7c78a963905d591c427e4ca6c3fc888273a1e9a532f7a
-
Filesize
366KB
MD55b00b64844cb128b7f0003fa87398ffc
SHA19949f6025124d5f5b068f43cf2e422c08aa8a661
SHA2567bd64f9b6122dd65d34d23066cb2f62c117db9e44006fdeacd4e38c9c236f517
SHA512b80d0665d0a10bbd1a31c47d10c9dba84d4889f4817592a06588c02d09cdb4b05d220cf1f7581bdf3832fe02ffe6102a68e8946029773c01b8a6862da0beb286
-
Filesize
366KB
MD50b52a06c2a1d87e3b36e29f62be01864
SHA156b49dcb3fa5a11dcf2b9b1fa5bf97ae35b37c4d
SHA25613cb501fcdab04aebd4d5a4fd4172460c39a41cbc44c9e68eeee7f95cbd1c986
SHA51289af233ff51f1fb07a28992997d2916b3cf62a57e73f9cc033587906c48309666acc12e775968b849c6cfcddd74dabbf2e6af504eed2cdf94b326d0f06fa16f8
-
Filesize
366KB
MD54be6b532d92a36838a3c05a7578cbe6e
SHA1ecaff99d3cd1673259914ee0ae6847a2bfe6e7b1
SHA256feb730db9f4d232dd261ba9a5bc834e99ce323acb52311e3e50f8e65e887d8ee
SHA5120eaee199a729b792f2973afc3a20d45714a598bc3ee3b8514bafe19f2aafeb7eb5c2667bdbe42d0a5b3f271c07438662a57b51e7442ebeb2de0bccf45d8c8775
-
Filesize
366KB
MD5f42a7389f8d16a7445d39789bf1c83ff
SHA16fc1775831f31a88ee3db533cf7b94773d02b3ea
SHA2560d64543ab1ac49653853fe140d0ea8bb7581e956366bc842ce4f77c0e719e8e0
SHA5125cb1133f463d03c623193af5b2218743a1b2be9a063623a9ccfaa35a176686b5b82fad4f506d298449776d94e4d11e2b5a82417de2b3893b2222f7a767ee100b
-
Filesize
366KB
MD5c07a7516760121c1708e77e2a3a2cf48
SHA1f02f2886c392085de2529de780f851cbd0fb7e9f
SHA256234248223acbab522287ae981ec342d7c686ed32a2f117ae9a36d6c04d4a5e55
SHA51293771a2781fcc22ca0801979acb41be9bac3a07b209ce74937cdbdc7aac332fba5a82c24b026eb31c0b9a6e3c669dc5f9f291f4787a4c9ae17a9daaa57144f3c
-
Filesize
366KB
MD57b26fb3601deaa0a374a3290969f8c01
SHA1709db7566ae75ae370ba519fead6f8119eac9ce1
SHA25637ba7a6ba041a9cc60c7fbe3f04b88fe126666943f9254d604220e15904bc862
SHA512ce723ee9f8cbcb73ae29694616abe651406fab720857fd48ae1d5c15b7ec82ca3d86f17f2403e808136e86fcb6b739fb3a458f656acfe30892c659d6978efdcd
-
Filesize
366KB
MD572b5ac634d88ef9aafff92abafc37ba9
SHA11a40705f051e0315ef51a47f6b481854c696671b
SHA256ffa301b0988d723c27504dcb0c20f83e960a667817b183fa327bf933540fbbcb
SHA512aa6539b4726af86923f4a92f858ba5d3f1112da49f5d3513bc7ec2bf61d629a8ad98b9271290787aaef5bc8b21d20eb9ad0781e878811958f07768fac8252424