Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
115s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25/08/2024, 23:36
Static task
static1
Behavioral task
behavioral1
Sample
627959cec072f79de6e04cda7fb66b10N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
627959cec072f79de6e04cda7fb66b10N.exe
Resource
win10v2004-20240802-en
General
-
Target
627959cec072f79de6e04cda7fb66b10N.exe
-
Size
71KB
-
MD5
627959cec072f79de6e04cda7fb66b10
-
SHA1
c717066b5ab5feab87240c3892f9a6f64cfcc5e2
-
SHA256
3762ff04571428367c0088ad4cc6c5844e4e4a34890657827b3c486847d71c02
-
SHA512
59de646556a625d89afb2417dc7d36cc1f7bb6e412f47380108eeef17b0cbcecf04acb1e67896d29f4d663fa9ccd65375eeae10f6c464f6f93dcaac676ec625e
-
SSDEEP
1536:FBUUWUfAnqMgrFJ+UNoKnUAlVGnIc+8yTuIIj41DpBRQ6DbEyRCRRRoR4Rk:FiUftgWooUg4Ce41pBeUEy032ya
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 32 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ckggnp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Cmedjl32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cgmhcaac.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dinael32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cdhffg32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bbhildae.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ckggnp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dgpeha32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Dinael32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" 627959cec072f79de6e04cda7fb66b10N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Cacmpj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Cpacqg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Cdhffg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Cpogkhnl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cmedjl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Cpcpfg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ddcebe32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 627959cec072f79de6e04cda7fb66b10N.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cpcpfg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Cgmhcaac.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cpogkhnl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Cajjjk32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cienon32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cpacqg32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ddcebe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Bbhildae.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ckdkhq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Dgpeha32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ckdkhq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Cienon32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cacmpj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cajjjk32.exe -
Executes dropped EXE 16 IoCs
pid Process 3836 Bbhildae.exe 208 Cajjjk32.exe 2284 Cdhffg32.exe 1920 Cienon32.exe 3076 Cpogkhnl.exe 840 Ckdkhq32.exe 3188 Cpacqg32.exe 3328 Ckggnp32.exe 2844 Cmedjl32.exe 3288 Cpcpfg32.exe 4784 Cgmhcaac.exe 1580 Cacmpj32.exe 3548 Dgpeha32.exe 3832 Dinael32.exe 3624 Ddcebe32.exe 4748 Diqnjl32.exe -
Drops file in System32 directory 48 IoCs
description ioc Process File created C:\Windows\SysWOW64\Jmbpjm32.dll Cmedjl32.exe File created C:\Windows\SysWOW64\Cgmhcaac.exe Cpcpfg32.exe File created C:\Windows\SysWOW64\Mfnlgh32.dll Cpcpfg32.exe File created C:\Windows\SysWOW64\Dccfme32.dll Dgpeha32.exe File created C:\Windows\SysWOW64\Bbhildae.exe 627959cec072f79de6e04cda7fb66b10N.exe File created C:\Windows\SysWOW64\Cajjjk32.exe Bbhildae.exe File created C:\Windows\SysWOW64\Pknjieep.dll Bbhildae.exe File created C:\Windows\SysWOW64\Dooaccfg.dll Cpogkhnl.exe File opened for modification C:\Windows\SysWOW64\Ckdkhq32.exe Cpogkhnl.exe File created C:\Windows\SysWOW64\Fohhdm32.dll Cgmhcaac.exe File opened for modification C:\Windows\SysWOW64\Cpacqg32.exe Ckdkhq32.exe File opened for modification C:\Windows\SysWOW64\Cmedjl32.exe Ckggnp32.exe File created C:\Windows\SysWOW64\Qahlom32.dll Ddcebe32.exe File opened for modification C:\Windows\SysWOW64\Bbhildae.exe 627959cec072f79de6e04cda7fb66b10N.exe File opened for modification C:\Windows\SysWOW64\Cpogkhnl.exe Cienon32.exe File created C:\Windows\SysWOW64\Gkbilm32.dll Cienon32.exe File created C:\Windows\SysWOW64\Ckdkhq32.exe Cpogkhnl.exe File opened for modification C:\Windows\SysWOW64\Dgpeha32.exe Cacmpj32.exe File created C:\Windows\SysWOW64\Lpcgahca.dll Cacmpj32.exe File created C:\Windows\SysWOW64\Diqnjl32.exe Ddcebe32.exe File opened for modification C:\Windows\SysWOW64\Diqnjl32.exe Ddcebe32.exe File opened for modification C:\Windows\SysWOW64\Ddcebe32.exe Dinael32.exe File created C:\Windows\SysWOW64\Cpcpfg32.exe Cmedjl32.exe File created C:\Windows\SysWOW64\Cacmpj32.exe Cgmhcaac.exe File created C:\Windows\SysWOW64\Dgpeha32.exe Cacmpj32.exe File opened for modification C:\Windows\SysWOW64\Dinael32.exe Dgpeha32.exe File created C:\Windows\SysWOW64\Cpacqg32.exe Ckdkhq32.exe File opened for modification C:\Windows\SysWOW64\Ckggnp32.exe Cpacqg32.exe File created C:\Windows\SysWOW64\Mbddol32.dll Ckggnp32.exe File opened for modification C:\Windows\SysWOW64\Cpcpfg32.exe Cmedjl32.exe File created C:\Windows\SysWOW64\Bcominjm.dll 627959cec072f79de6e04cda7fb66b10N.exe File opened for modification C:\Windows\SysWOW64\Cienon32.exe Cdhffg32.exe File created C:\Windows\SysWOW64\Hnmanm32.dll Cdhffg32.exe File created C:\Windows\SysWOW64\Cpogkhnl.exe Cienon32.exe File opened for modification C:\Windows\SysWOW64\Cgmhcaac.exe Cpcpfg32.exe File created C:\Windows\SysWOW64\Ddcebe32.exe Dinael32.exe File created C:\Windows\SysWOW64\Aammfkln.dll Dinael32.exe File opened for modification C:\Windows\SysWOW64\Cacmpj32.exe Cgmhcaac.exe File created C:\Windows\SysWOW64\Dinael32.exe Dgpeha32.exe File opened for modification C:\Windows\SysWOW64\Cajjjk32.exe Bbhildae.exe File opened for modification C:\Windows\SysWOW64\Cdhffg32.exe Cajjjk32.exe File created C:\Windows\SysWOW64\Cienon32.exe Cdhffg32.exe File created C:\Windows\SysWOW64\Ckggnp32.exe Cpacqg32.exe File created C:\Windows\SysWOW64\Cmedjl32.exe Ckggnp32.exe File created C:\Windows\SysWOW64\Cdhffg32.exe Cajjjk32.exe File created C:\Windows\SysWOW64\Pnlhmpgg.dll Cajjjk32.exe File created C:\Windows\SysWOW64\Ghfqhkbn.dll Ckdkhq32.exe File created C:\Windows\SysWOW64\Dodebo32.dll Cpacqg32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2344 4748 WerFault.exe 108 -
System Location Discovery: System Language Discovery 1 TTPs 17 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cgmhcaac.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cacmpj32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Diqnjl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cdhffg32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ckggnp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cmedjl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dgpeha32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 627959cec072f79de6e04cda7fb66b10N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cajjjk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cienon32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cpogkhnl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cpacqg32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ddcebe32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bbhildae.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ckdkhq32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cpcpfg32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dinael32.exe -
Modifies registry class 51 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dodebo32.dll" Cpacqg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lpcgahca.dll" Cacmpj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Ddcebe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pnlhmpgg.dll" Cajjjk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Cacmpj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Ddcebe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jmbpjm32.dll" Cmedjl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Cpcpfg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Cajjjk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Cajjjk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gkbilm32.dll" Cienon32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Cdhffg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mbddol32.dll" Ckggnp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Dgpeha32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Dinael32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" 627959cec072f79de6e04cda7fb66b10N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Cdhffg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Cpogkhnl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 627959cec072f79de6e04cda7fb66b10N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Cienon32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ghfqhkbn.dll" Ckdkhq32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Cienon32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Ckdkhq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Cacmpj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Cmedjl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aammfkln.dll" Dinael32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bcominjm.dll" 627959cec072f79de6e04cda7fb66b10N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Cpogkhnl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Ckggnp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Cgmhcaac.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Ckdkhq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Ckggnp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Cpcpfg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Cmedjl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dccfme32.dll" Dgpeha32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Dgpeha32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Dinael32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qahlom32.dll" Ddcebe32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID 627959cec072f79de6e04cda7fb66b10N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hnmanm32.dll" Cdhffg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fohhdm32.dll" Cgmhcaac.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Bbhildae.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Cpacqg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Cpacqg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node 627959cec072f79de6e04cda7fb66b10N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Bbhildae.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pknjieep.dll" Bbhildae.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mfnlgh32.dll" Cpcpfg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831} 627959cec072f79de6e04cda7fb66b10N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dooaccfg.dll" Cpogkhnl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Cgmhcaac.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 4812 wrote to memory of 3836 4812 627959cec072f79de6e04cda7fb66b10N.exe 91 PID 4812 wrote to memory of 3836 4812 627959cec072f79de6e04cda7fb66b10N.exe 91 PID 4812 wrote to memory of 3836 4812 627959cec072f79de6e04cda7fb66b10N.exe 91 PID 3836 wrote to memory of 208 3836 Bbhildae.exe 92 PID 3836 wrote to memory of 208 3836 Bbhildae.exe 92 PID 3836 wrote to memory of 208 3836 Bbhildae.exe 92 PID 208 wrote to memory of 2284 208 Cajjjk32.exe 93 PID 208 wrote to memory of 2284 208 Cajjjk32.exe 93 PID 208 wrote to memory of 2284 208 Cajjjk32.exe 93 PID 2284 wrote to memory of 1920 2284 Cdhffg32.exe 94 PID 2284 wrote to memory of 1920 2284 Cdhffg32.exe 94 PID 2284 wrote to memory of 1920 2284 Cdhffg32.exe 94 PID 1920 wrote to memory of 3076 1920 Cienon32.exe 95 PID 1920 wrote to memory of 3076 1920 Cienon32.exe 95 PID 1920 wrote to memory of 3076 1920 Cienon32.exe 95 PID 3076 wrote to memory of 840 3076 Cpogkhnl.exe 96 PID 3076 wrote to memory of 840 3076 Cpogkhnl.exe 96 PID 3076 wrote to memory of 840 3076 Cpogkhnl.exe 96 PID 840 wrote to memory of 3188 840 Ckdkhq32.exe 97 PID 840 wrote to memory of 3188 840 Ckdkhq32.exe 97 PID 840 wrote to memory of 3188 840 Ckdkhq32.exe 97 PID 3188 wrote to memory of 3328 3188 Cpacqg32.exe 98 PID 3188 wrote to memory of 3328 3188 Cpacqg32.exe 98 PID 3188 wrote to memory of 3328 3188 Cpacqg32.exe 98 PID 3328 wrote to memory of 2844 3328 Ckggnp32.exe 99 PID 3328 wrote to memory of 2844 3328 Ckggnp32.exe 99 PID 3328 wrote to memory of 2844 3328 Ckggnp32.exe 99 PID 2844 wrote to memory of 3288 2844 Cmedjl32.exe 100 PID 2844 wrote to memory of 3288 2844 Cmedjl32.exe 100 PID 2844 wrote to memory of 3288 2844 Cmedjl32.exe 100 PID 3288 wrote to memory of 4784 3288 Cpcpfg32.exe 102 PID 3288 wrote to memory of 4784 3288 Cpcpfg32.exe 102 PID 3288 wrote to memory of 4784 3288 Cpcpfg32.exe 102 PID 4784 wrote to memory of 1580 4784 Cgmhcaac.exe 103 PID 4784 wrote to memory of 1580 4784 Cgmhcaac.exe 103 PID 4784 wrote to memory of 1580 4784 Cgmhcaac.exe 103 PID 1580 wrote to memory of 3548 1580 Cacmpj32.exe 104 PID 1580 wrote to memory of 3548 1580 Cacmpj32.exe 104 PID 1580 wrote to memory of 3548 1580 Cacmpj32.exe 104 PID 3548 wrote to memory of 3832 3548 Dgpeha32.exe 105 PID 3548 wrote to memory of 3832 3548 Dgpeha32.exe 105 PID 3548 wrote to memory of 3832 3548 Dgpeha32.exe 105 PID 3832 wrote to memory of 3624 3832 Dinael32.exe 106 PID 3832 wrote to memory of 3624 3832 Dinael32.exe 106 PID 3832 wrote to memory of 3624 3832 Dinael32.exe 106 PID 3624 wrote to memory of 4748 3624 Ddcebe32.exe 108 PID 3624 wrote to memory of 4748 3624 Ddcebe32.exe 108 PID 3624 wrote to memory of 4748 3624 Ddcebe32.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\627959cec072f79de6e04cda7fb66b10N.exe"C:\Users\Admin\AppData\Local\Temp\627959cec072f79de6e04cda7fb66b10N.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Windows\SysWOW64\Bbhildae.exeC:\Windows\system32\Bbhildae.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3836 -
C:\Windows\SysWOW64\Cajjjk32.exeC:\Windows\system32\Cajjjk32.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:208 -
C:\Windows\SysWOW64\Cdhffg32.exeC:\Windows\system32\Cdhffg32.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Windows\SysWOW64\Cienon32.exeC:\Windows\system32\Cienon32.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Windows\SysWOW64\Cpogkhnl.exeC:\Windows\system32\Cpogkhnl.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3076 -
C:\Windows\SysWOW64\Ckdkhq32.exeC:\Windows\system32\Ckdkhq32.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Windows\SysWOW64\Cpacqg32.exeC:\Windows\system32\Cpacqg32.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3188 -
C:\Windows\SysWOW64\Ckggnp32.exeC:\Windows\system32\Ckggnp32.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3328 -
C:\Windows\SysWOW64\Cmedjl32.exeC:\Windows\system32\Cmedjl32.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\SysWOW64\Cpcpfg32.exeC:\Windows\system32\Cpcpfg32.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3288 -
C:\Windows\SysWOW64\Cgmhcaac.exeC:\Windows\system32\Cgmhcaac.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4784 -
C:\Windows\SysWOW64\Cacmpj32.exeC:\Windows\system32\Cacmpj32.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Windows\SysWOW64\Dgpeha32.exeC:\Windows\system32\Dgpeha32.exe14⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3548 -
C:\Windows\SysWOW64\Dinael32.exeC:\Windows\system32\Dinael32.exe15⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3832 -
C:\Windows\SysWOW64\Ddcebe32.exeC:\Windows\system32\Ddcebe32.exe16⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3624 -
C:\Windows\SysWOW64\Diqnjl32.exeC:\Windows\system32\Diqnjl32.exe17⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4748 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4748 -s 42018⤵
- Program crash
PID:2344
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4748 -ip 47481⤵PID:1656
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4612,i,3210801877307184477,8078594481454001567,262144 --variations-seed-version --mojo-platform-channel-handle=4608 /prefetch:81⤵PID:4352
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
71KB
MD570f91067787e3baf472ca11b933ba222
SHA1a008f8ea41954d4e208156154eeb0144cb39ace3
SHA2569487b924fe557a8da73f854e50775c295931f99552917f6dc111962574f1bc81
SHA512e0fa3e7ad676c63007603c0ec525eea639bd5bad44575e56db5e021df431a009b4baa826e54f66dfb47ad83a89056271c97aaee418e7936c82a3839e21d8d38a
-
Filesize
71KB
MD53d81c734de857bf27a08f710654471af
SHA103edcc2a385c3e5bba0c0ea327941589a1d4f1d9
SHA256bf7a34b87efcc1e35671d10d04f94f67483504a4dd02baad7acda7b2883c92c4
SHA51222be1efc8589f816b592dfc3b285662b8411df6b1f5bc00c4b2e8b73181a74825b4333ad0b87e935e2b800e9156bbecd02a33474b4a093af29179bb984b80c05
-
Filesize
71KB
MD5af938689f53adf73e73942f0ed023e4d
SHA199a69c8d73a134de54e11d5d4c11750e14fefdb5
SHA256bba1909bb183676baa25daffe224a4203f2ec42aa0ed61a536ab34c35e246d66
SHA512364268b4702492f6ed56603acc7b7c8332ed4349dcaf52f268985a7574c21e051e90c07fe66329680834d60c036ca5c8df1cec361bc7ada2a90d9d497a9806f8
-
Filesize
71KB
MD55cba88bf0a1856b1b6b745661cea5b2e
SHA1404f7069da427762fa92acc342dcedf5c7935cc1
SHA25679e43c79aa13f8fc861fa3c60d664da05eba93a84789b6fdc6c97ef47d4c5781
SHA512006211c0ba0e6a390ff18ee4dbd0e5691b95a6136073243b325579dae0667d5e829cbf437618c9981fdcbc0fe3d712969ef4308bcc9aeb495d384b74d71e58da
-
Filesize
71KB
MD5d4da1131f1f7f3b6e170bb30195758d9
SHA19164706c93807c752f40838423ce789a3612b2cb
SHA256cc28d64509570ab8192dfc4339f3e090fb4de1f15131c161a56544e5dac64905
SHA5128fcf5f5e5fa89d5acd6b2c79fb6f80de208d8a75688b852fe60ed8d11dd9822ebb064c780e90bcff0dfd79ef4bfe6a3fd0eb265cfd556d96602f8ce546db161f
-
Filesize
71KB
MD5ed0e25fb1c4fba4b3d9452c2131e5648
SHA1a92f756738d78763bf6ef3cf6c9604868f1d3f44
SHA25686345e40c3edd6aba24ea2057d3648b6a7cefe68aca57d5f6baa2cbcb942a869
SHA512c4e1d6827f16c75657c1670a5ec9285f0a5111a3a8b8e647ba82cf06e8228889af3c052e5056044db869d8acc8a9bd9d5a168a9c8a85f0a6898230d488b12875
-
Filesize
71KB
MD571506688324e896edeca45880158c81b
SHA1f7b76d449f23b32da3022aacc67f5274709ca647
SHA2564c7613d18ed189777ca501b92830935b440624747e8faf50e8fcfbf8fd0fc602
SHA51254f41ef68757df4e469e3109963fd637003041725d298cb67377773e4ab66ff4b02ac0030d4059d694d0bbd2d19aee147575dfa69d2755a11126b868e61c1a20
-
Filesize
71KB
MD5609f06f84e01b1769d7580ea6e1be80e
SHA1fef324e2ea6fffcf70a3401d531714bd6000e736
SHA256cf90eeb2240aa1db2a119a9c76840962cdff2344f10a6d144e8c247d67104bc5
SHA512b53d8793c427eb0655f314b2c319a648cc2ebc75a92073e230817c4427090874a464e5c509770112e6d8f7d154669984021fe28b08c8d2885a3b7da486dc8754
-
Filesize
71KB
MD516053af3c5405725c17bf0f3cdce10c3
SHA178104afbabd1a85da040218bc2dd049de20d933f
SHA25637cf1990cf5198a8f647cfe62909c0fd5037ed506c4637ac20e8af77c14b9bd2
SHA51297974e0bb3798ba59de4bb4b326266f688b1e9d59e3e07115bde0856f18e5ce5a021bf8a81d861abfb4801a67c1368242ed54fb2d0c37577f1ff6c4a4c6593e3
-
Filesize
71KB
MD5e5e96b469d365bb23792999116a62d91
SHA19906f2d9d56e980c97bd506d9ad1bbfc6b2060fc
SHA2562990bd9d0058946f9e7f9be275841be14c48e65df03ce0c3aa594b035850ba9f
SHA5126474ae24435836e1455d82386167f5fade6f5816c73fed60c5642d98177cd60722f05084c27fea302943e4ecb54fc1b4c3235f37068b0ad79ed89836c45bf6ab
-
Filesize
71KB
MD5e6cbfe5a1ed44ba367e272b443af173b
SHA1ab3f5786e0acddabf86196e5ae12d25bc85c5199
SHA256e08078af42bb252edab30024c6f78c83a64e46513548d6d0dbc0e0e4489da35f
SHA512b089ab3d736b641732d25a02649e002f5a86360cf72b030795e19cc6465534deee59d1802f3b8f314b79b01a56cab0334735c788331510361b6a348b87787b02
-
Filesize
71KB
MD5e099fff51e02eb8371d7063d616f246a
SHA1cf22acd32ee8df9144460a01d0f1db51e4988766
SHA256d6860c25b0251faeee08309a04da4ac97723aecd448bfd5397c771a02f2a2948
SHA512bb2ca8d70e591555eded6ced5c7e8978fd26306212158c453e949ac0a97b4b5e951c42daabc979460fe2b5fb77d19e527fe5e8f0afbd24af707816aacb92d96c
-
Filesize
71KB
MD532c8558fbad71a688333bd5983e13bea
SHA12e210f86b05dd3d9a0c8dec5ddd728a738fee205
SHA256cdfffe785b0897629e12e98b1c00dc183bf6f9b82ba701119a3caa3ae4b4cf52
SHA512b6741c6a9f63830f999734f9202946dbb20fd9189de7fc00e01d5bdb8d3f8d0602c4da065be215a10f606a378c05d9afb6ef22ee12177bc2556e653292532cf3
-
Filesize
71KB
MD501f33cd657c363a84ecd27c75e52bac8
SHA1d2cfa1e4003fa98b0b58268bdb024efb981f774e
SHA2564d35bcb6fbe31f93d56869368f8af46828607fc464a78a2b7742c16f9a51195f
SHA512dc4b4494bc2790b91cfd1e0f45cd3b43231f2483cf3d4c80f2b28b2b8963d73a9cd60f3f36d57602994bb7a09abf8216320ad4d59aed1a21681726f542d766d9
-
Filesize
71KB
MD5827caa33d94b7b4ba15b31980fd9bf55
SHA1953ede95f731c1921443f26f028daef407c58345
SHA25618c99fee54b63ad4f7ce078d06db2bd2504071a9d0ec01045407f2e6cb735ab7
SHA512549e5183312484ef8af5d21de726b84ec34af2024deb44300b723917f68e7f6a010113a134b57a0f9b29f07b6deb9557296c01bfb325c56552557052224067a4
-
Filesize
71KB
MD5a8d8653b0c39e40f5a2d471d5809723e
SHA12546cc33af96cd73d0065851fa0ff0b9b836fcbc
SHA2564729464f98b77a0a5b5ecebc0b2da200b4cf2684008fc219d277e7e927236fa3
SHA512276498efe9b5ed68861f086135baa43fb2c8bb006064b315cd01faa32ca3291dade24d2e35b899dfa5bdb490bc97a800dfead505c036b3433abb801a2755e38b
-
Filesize
71KB
MD5c7c3530dc8ca7608874f7ffcaef7d72f
SHA11224eabc41741b35f7718cc9b89fef1263c1b254
SHA256bfd34a3efae2c4c45ded8f8c5768a4dbe086b688a5ee63a23407032164b80315
SHA512c0f3ec2dc7669fe3765ddd7b8d729ccba9caae5e9c7370639f59e88ca4422be734fc9682f30b8de159b1f4cec870ba2dd77f588048c21ef020a2ca5c14c79701
-
Filesize
7KB
MD5d73313d39a7074cc838dfbb197073cf5
SHA166abedd082e660d186d8e952bdb6da0160aa9ebb
SHA256430be544c5bb816081eeaad2f6b155cbbb8934eeac68c92ccd0574e4cc7682a9
SHA5127ffd0997810c3f55f8d7ca630f6901ffa51a6c244a2c6e859d8b662a99dfa6ded57a36cd08f172c5f64639324cf13812efc2b9d6db157419800dff11fea4dc09