Analysis
-
max time kernel
92s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01/09/2024, 22:34
Static task
static1
Behavioral task
behavioral1
Sample
2b9cb01b69b3972d69a545523f3b2820N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2b9cb01b69b3972d69a545523f3b2820N.exe
Resource
win10v2004-20240802-en
General
-
Target
2b9cb01b69b3972d69a545523f3b2820N.exe
-
Size
84KB
-
MD5
2b9cb01b69b3972d69a545523f3b2820
-
SHA1
161d7dc7f4f4a0cfdb7ac6ad92e0b57f232878fa
-
SHA256
07252be6bca959e0e804d398a956341c62b3bec82726a34788ea6b0e13fe47d2
-
SHA512
6682a55ff303fc84b54f066a5dbd3e31193db1ccc2b973d4ac61896eccb1d245c656ac0f7c04e4dcf9e4b4b108964f9709aee8ceff1a2d4d752ecf1d6c560087
-
SSDEEP
1536:zXVOxu5G3Ntjmxuw+pH8ANZLvfPDyH6n8dEelLYR7xeGSmUmmmmmmmmmmmmmmdGZ:fIdVU+p/3PDyH6n8djlLYR7xr3
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 30 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dgbdlf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ddonekbl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Djdmffnn.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dejacond.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dejacond.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Deokon32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ddjejl32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ddonekbl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dfnjafap.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cmqmma32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dogogcpo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dfpgffpm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cmqmma32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dfnjafap.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dodbbdbb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dfpgffpm.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dogogcpo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" 2b9cb01b69b3972d69a545523f3b2820N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dfknkg32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dobfld32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dodbbdbb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dgbdlf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dfknkg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ddjejl32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Deokon32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Daekdooc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 2b9cb01b69b3972d69a545523f3b2820N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dobfld32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Daekdooc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Djdmffnn.exe -
Executes dropped EXE 15 IoCs
pid Process 1108 Cmqmma32.exe 2740 Ddjejl32.exe 4812 Djdmffnn.exe 4888 Dejacond.exe 3052 Dfknkg32.exe 4296 Dobfld32.exe 1240 Ddonekbl.exe 4956 Dfnjafap.exe 4040 Dodbbdbb.exe 2620 Deokon32.exe 5104 Dfpgffpm.exe 4584 Dogogcpo.exe 1796 Daekdooc.exe 800 Dgbdlf32.exe 4964 Dmllipeg.exe -
Drops file in System32 directory 45 IoCs
description ioc Process File created C:\Windows\SysWOW64\Daekdooc.exe Dogogcpo.exe File created C:\Windows\SysWOW64\Okgoadbf.dll 2b9cb01b69b3972d69a545523f3b2820N.exe File created C:\Windows\SysWOW64\Ddjejl32.exe Cmqmma32.exe File opened for modification C:\Windows\SysWOW64\Ddjejl32.exe Cmqmma32.exe File created C:\Windows\SysWOW64\Hfanhp32.dll Cmqmma32.exe File opened for modification C:\Windows\SysWOW64\Djdmffnn.exe Ddjejl32.exe File created C:\Windows\SysWOW64\Hdhpgj32.dll Ddjejl32.exe File opened for modification C:\Windows\SysWOW64\Ddonekbl.exe Dobfld32.exe File opened for modification C:\Windows\SysWOW64\Daekdooc.exe Dogogcpo.exe File opened for modification C:\Windows\SysWOW64\Dfnjafap.exe Ddonekbl.exe File created C:\Windows\SysWOW64\Fnmnbf32.dll Dfnjafap.exe File created C:\Windows\SysWOW64\Amfoeb32.dll Dodbbdbb.exe File created C:\Windows\SysWOW64\Dfpgffpm.exe Deokon32.exe File created C:\Windows\SysWOW64\Dgbdlf32.exe Daekdooc.exe File created C:\Windows\SysWOW64\Dmllipeg.exe Dgbdlf32.exe File created C:\Windows\SysWOW64\Dejacond.exe Djdmffnn.exe File opened for modification C:\Windows\SysWOW64\Dobfld32.exe Dfknkg32.exe File created C:\Windows\SysWOW64\Alcidkmm.dll Dfknkg32.exe File created C:\Windows\SysWOW64\Mjelcfha.dll Dobfld32.exe File created C:\Windows\SysWOW64\Dodbbdbb.exe Dfnjafap.exe File opened for modification C:\Windows\SysWOW64\Deokon32.exe Dodbbdbb.exe File created C:\Windows\SysWOW64\Ohmoom32.dll Dogogcpo.exe File opened for modification C:\Windows\SysWOW64\Dejacond.exe Djdmffnn.exe File opened for modification C:\Windows\SysWOW64\Dfknkg32.exe Dejacond.exe File created C:\Windows\SysWOW64\Ddonekbl.exe Dobfld32.exe File created C:\Windows\SysWOW64\Dfnjafap.exe Ddonekbl.exe File created C:\Windows\SysWOW64\Poahbe32.dll Ddonekbl.exe File created C:\Windows\SysWOW64\Kmdjdl32.dll Deokon32.exe File opened for modification C:\Windows\SysWOW64\Dogogcpo.exe Dfpgffpm.exe File opened for modification C:\Windows\SysWOW64\Dmllipeg.exe Dgbdlf32.exe File created C:\Windows\SysWOW64\Hpnkaj32.dll Djdmffnn.exe File created C:\Windows\SysWOW64\Dfknkg32.exe Dejacond.exe File created C:\Windows\SysWOW64\Dobfld32.exe Dfknkg32.exe File opened for modification C:\Windows\SysWOW64\Dgbdlf32.exe Daekdooc.exe File created C:\Windows\SysWOW64\Gfghpl32.dll Daekdooc.exe File created C:\Windows\SysWOW64\Deokon32.exe Dodbbdbb.exe File created C:\Windows\SysWOW64\Lbabpnmn.dll Dfpgffpm.exe File created C:\Windows\SysWOW64\Kngpec32.dll Dgbdlf32.exe File opened for modification C:\Windows\SysWOW64\Cmqmma32.exe 2b9cb01b69b3972d69a545523f3b2820N.exe File opened for modification C:\Windows\SysWOW64\Dfpgffpm.exe Deokon32.exe File created C:\Windows\SysWOW64\Dogogcpo.exe Dfpgffpm.exe File created C:\Windows\SysWOW64\Cmqmma32.exe 2b9cb01b69b3972d69a545523f3b2820N.exe File created C:\Windows\SysWOW64\Djdmffnn.exe Ddjejl32.exe File created C:\Windows\SysWOW64\Cogflbdn.dll Dejacond.exe File opened for modification C:\Windows\SysWOW64\Dodbbdbb.exe Dfnjafap.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 5072 4964 WerFault.exe 98 -
System Location Discovery: System Language Discovery 1 TTPs 16 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ddjejl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Deokon32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dogogcpo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dgbdlf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cmqmma32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Djdmffnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dfnjafap.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Daekdooc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dfknkg32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dobfld32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dfpgffpm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2b9cb01b69b3972d69a545523f3b2820N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dejacond.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ddonekbl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dodbbdbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dmllipeg.exe -
Modifies registry class 48 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID 2b9cb01b69b3972d69a545523f3b2820N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Djdmffnn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cogflbdn.dll" Dejacond.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Poahbe32.dll" Ddonekbl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dodbbdbb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dgbdlf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ddjejl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hpnkaj32.dll" Djdmffnn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dfnjafap.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dfpgffpm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dgbdlf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cmqmma32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dfknkg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Deokon32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lbabpnmn.dll" Dfpgffpm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ohmoom32.dll" Dogogcpo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dogogcpo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kngpec32.dll" Dgbdlf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ddonekbl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 2b9cb01b69b3972d69a545523f3b2820N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} 2b9cb01b69b3972d69a545523f3b2820N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Okgoadbf.dll" 2b9cb01b69b3972d69a545523f3b2820N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cmqmma32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ddjejl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dfknkg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mjelcfha.dll" Dobfld32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Deokon32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dfpgffpm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dogogcpo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dejacond.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dfnjafap.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kmdjdl32.dll" Deokon32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gfghpl32.dll" Daekdooc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Daekdooc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hfanhp32.dll" Cmqmma32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dejacond.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dobfld32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fnmnbf32.dll" Dfnjafap.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Daekdooc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" 2b9cb01b69b3972d69a545523f3b2820N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dobfld32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Amfoeb32.dll" Dodbbdbb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dodbbdbb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node 2b9cb01b69b3972d69a545523f3b2820N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hdhpgj32.dll" Ddjejl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Djdmffnn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Alcidkmm.dll" Dfknkg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ddonekbl.exe -
Suspicious use of WriteProcessMemory 45 IoCs
description pid Process procid_target PID 2616 wrote to memory of 1108 2616 2b9cb01b69b3972d69a545523f3b2820N.exe 83 PID 2616 wrote to memory of 1108 2616 2b9cb01b69b3972d69a545523f3b2820N.exe 83 PID 2616 wrote to memory of 1108 2616 2b9cb01b69b3972d69a545523f3b2820N.exe 83 PID 1108 wrote to memory of 2740 1108 Cmqmma32.exe 84 PID 1108 wrote to memory of 2740 1108 Cmqmma32.exe 84 PID 1108 wrote to memory of 2740 1108 Cmqmma32.exe 84 PID 2740 wrote to memory of 4812 2740 Ddjejl32.exe 85 PID 2740 wrote to memory of 4812 2740 Ddjejl32.exe 85 PID 2740 wrote to memory of 4812 2740 Ddjejl32.exe 85 PID 4812 wrote to memory of 4888 4812 Djdmffnn.exe 86 PID 4812 wrote to memory of 4888 4812 Djdmffnn.exe 86 PID 4812 wrote to memory of 4888 4812 Djdmffnn.exe 86 PID 4888 wrote to memory of 3052 4888 Dejacond.exe 87 PID 4888 wrote to memory of 3052 4888 Dejacond.exe 87 PID 4888 wrote to memory of 3052 4888 Dejacond.exe 87 PID 3052 wrote to memory of 4296 3052 Dfknkg32.exe 88 PID 3052 wrote to memory of 4296 3052 Dfknkg32.exe 88 PID 3052 wrote to memory of 4296 3052 Dfknkg32.exe 88 PID 4296 wrote to memory of 1240 4296 Dobfld32.exe 89 PID 4296 wrote to memory of 1240 4296 Dobfld32.exe 89 PID 4296 wrote to memory of 1240 4296 Dobfld32.exe 89 PID 1240 wrote to memory of 4956 1240 Ddonekbl.exe 90 PID 1240 wrote to memory of 4956 1240 Ddonekbl.exe 90 PID 1240 wrote to memory of 4956 1240 Ddonekbl.exe 90 PID 4956 wrote to memory of 4040 4956 Dfnjafap.exe 91 PID 4956 wrote to memory of 4040 4956 Dfnjafap.exe 91 PID 4956 wrote to memory of 4040 4956 Dfnjafap.exe 91 PID 4040 wrote to memory of 2620 4040 Dodbbdbb.exe 92 PID 4040 wrote to memory of 2620 4040 Dodbbdbb.exe 92 PID 4040 wrote to memory of 2620 4040 Dodbbdbb.exe 92 PID 2620 wrote to memory of 5104 2620 Deokon32.exe 93 PID 2620 wrote to memory of 5104 2620 Deokon32.exe 93 PID 2620 wrote to memory of 5104 2620 Deokon32.exe 93 PID 5104 wrote to memory of 4584 5104 Dfpgffpm.exe 94 PID 5104 wrote to memory of 4584 5104 Dfpgffpm.exe 94 PID 5104 wrote to memory of 4584 5104 Dfpgffpm.exe 94 PID 4584 wrote to memory of 1796 4584 Dogogcpo.exe 95 PID 4584 wrote to memory of 1796 4584 Dogogcpo.exe 95 PID 4584 wrote to memory of 1796 4584 Dogogcpo.exe 95 PID 1796 wrote to memory of 800 1796 Daekdooc.exe 97 PID 1796 wrote to memory of 800 1796 Daekdooc.exe 97 PID 1796 wrote to memory of 800 1796 Daekdooc.exe 97 PID 800 wrote to memory of 4964 800 Dgbdlf32.exe 98 PID 800 wrote to memory of 4964 800 Dgbdlf32.exe 98 PID 800 wrote to memory of 4964 800 Dgbdlf32.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\2b9cb01b69b3972d69a545523f3b2820N.exe"C:\Users\Admin\AppData\Local\Temp\2b9cb01b69b3972d69a545523f3b2820N.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\SysWOW64\Cmqmma32.exeC:\Windows\system32\Cmqmma32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1108 -
C:\Windows\SysWOW64\Ddjejl32.exeC:\Windows\system32\Ddjejl32.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\SysWOW64\Djdmffnn.exeC:\Windows\system32\Djdmffnn.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Windows\SysWOW64\Dejacond.exeC:\Windows\system32\Dejacond.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Windows\SysWOW64\Dfknkg32.exeC:\Windows\system32\Dfknkg32.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\SysWOW64\Dobfld32.exeC:\Windows\system32\Dobfld32.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4296 -
C:\Windows\SysWOW64\Ddonekbl.exeC:\Windows\system32\Ddonekbl.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Windows\SysWOW64\Dfnjafap.exeC:\Windows\system32\Dfnjafap.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Windows\SysWOW64\Dodbbdbb.exeC:\Windows\system32\Dodbbdbb.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4040 -
C:\Windows\SysWOW64\Deokon32.exeC:\Windows\system32\Deokon32.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Windows\SysWOW64\Dfpgffpm.exeC:\Windows\system32\Dfpgffpm.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5104 -
C:\Windows\SysWOW64\Dogogcpo.exeC:\Windows\system32\Dogogcpo.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4584 -
C:\Windows\SysWOW64\Daekdooc.exeC:\Windows\system32\Daekdooc.exe14⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Windows\SysWOW64\Dgbdlf32.exeC:\Windows\system32\Dgbdlf32.exe15⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:800 -
C:\Windows\SysWOW64\Dmllipeg.exeC:\Windows\system32\Dmllipeg.exe16⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4964 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4964 -s 22817⤵
- Program crash
PID:5072
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4964 -ip 49641⤵PID:5048
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD571ce3886f4d4e6a9da32cf990799e9dc
SHA17e68115f115e9661cf602962cf29ba174fa61ef4
SHA2568cb341c53fdedb60b052089e54f8ef8be39847eba2f5e077ddf60cac8236b41b
SHA5124424aec84c4a070b00f9cd74f4c278431ab0ffc615ea6ae26dd3a3e0537467f49ad2397917b051c70ccb130f6d6ecbad4a3e7fb994bc25685f0d7bb76e20f879
-
Filesize
84KB
MD5667198e0d5b6487074776c28fbef9d94
SHA1d43ba5e961fd51b68b5e33467da7ac25e1140e62
SHA25680eca749e481a2921bef7c29d0a1272251e510fe82b3873d66e0ffdff0f01954
SHA51221de24fec849577399567a06a5024378a4f9be774dcd56646266fbe3e76262bc5796b8230430f6314b4bfbdd3beccae064a16d1e1e18dcc0e2e62b44a2d43663
-
Filesize
84KB
MD5d6583f33f04ed3cf849812d6da89aac9
SHA103ec834b2630b256d82d047b8fbd79854d1115a2
SHA256500d8979da0bf0055699ee31f71bec38733dd42af3e59b1d88b961a2b4953095
SHA51268b17e195107420d5845f66d2ab64c4a2989af512eadb5ff7e2516a8acdcc489e21261d82e149fef297c33d064e28ddfaee9b8a76927e74e9d1e30db8d27e055
-
Filesize
84KB
MD55fb13f4edbeb34f3bc955445706c0153
SHA1333a70f35138268feabcb88cf0e74ec09d430da3
SHA25634b3c50356f7a097a9d41963d06f9933a719adc57f1bc74c21387c874e4fedfb
SHA512c4ca1ebb0412680d04a12cde4b6c282da4faaa0a517b2eca75854dc0f2b30836c14aee34b9edc32b0d63b46ae3fd876dbf74104041069dfd7fc30ea3b3c2ad58
-
Filesize
84KB
MD523f9521241f9fb266620fbcf96640e4a
SHA1efaabefdb29ff1d90d9bc0bd3f30b1f4af7538a2
SHA256e4b57f8db9f2d3e3bbabb80717fd910d774cb2e4131ed453a00e84e50407ca3b
SHA512606ca1ed613b5528010e9c3a306053ad5f8cbd4a58884bb05812c2f684b4bbd0fca742b989b9ae35f29ea4853a4ee7835fb4a250793c85a2ce12042b5c7eb91d
-
Filesize
84KB
MD57d982c0c52557d57d2e4cfa3504b3330
SHA1cb07a606ce566222076717d439edb4103352ca72
SHA256759196cffac6e453879a5ca86c2ebc34acf2ebbecfa836813000a12813c14090
SHA5127817adeb6c7283c8c8b4b557111869140f7073bfa23c2c5b059f1f6358a3087ea518054a654ef7e09405b6c22369f491420d5a54997202a21592b923d7e46c6a
-
Filesize
84KB
MD5e5667a6a217038af517228c95c845b59
SHA17c3b42bb83ee710036b9e54c0d76785b74b7743d
SHA256d3141b3b954381621e7d4bd52123934d3aac1a49e1a91d0eb652930271a6a215
SHA512998843b2056d5555e0b51d6ed3047c964cbc08bb306fc157437b26cf7eb70db970545880056b3239450aada3f2246a4ff71f79caee2f2b7ab1245fea103b27d8
-
Filesize
84KB
MD5988f9824af8041efadfa01473319690b
SHA1c49c323f3f50b109323f1281fd768a5fe237a660
SHA2568ab0092a2980c6fd13218ff389b63fbeba2614997f022e27ea8ecc6d778a3494
SHA5124081d82061844944dcd3b3e3612b95161b535165aa7c11d2d5892b6c2ff77e8ebcf33befc8a4b9effb9f14a84bbe71680ef3ec266d482a34acad774f3668fd43
-
Filesize
84KB
MD51b791bf3f6c48d415bc0a1d91b31027a
SHA1ceb66fbcdc10167c4fc25bbd2416e2ef34d43e1e
SHA2565d7a16fb23d95a1d8908f88b35c5c2ffa6ba975c9fa9d268743cab468d39b093
SHA512cd22b2f075b730674311a5b32099bb4e2bebf0aa0d9d59ad5f7917e8c16e979a888bc2ed0394a2c78984dc48925dab83aaa5695fc570f5a83df6097756fe0d27
-
Filesize
84KB
MD557a0080452604b3b768c3e864f91c8ff
SHA18519145b29f929d87eff094b4d176e5504f3ed94
SHA2567decc3993f8283375065b983cf0021ff881dcff8ab3f25b89da0df8a177d8a76
SHA512cadfd38f61f58f62a0b14087eb837950f5a242161d09cfea2171c8fd14465041de3fa5ce6bc28fe6466ae2883aa6a1e3fffccafd8bd602ad98a98eaa26416362
-
Filesize
84KB
MD5e0a9f43ae8fff8d7ec8cfff4b0adc257
SHA18677817fdbe5d54aa91fe035bcf209ea8b53209d
SHA256bb3a8d5e4fa32e52b89176e529d04c30f67a253fc2d048f13cca516921edc987
SHA512f335654664fffcd9914cfc4a99d2ad58920e29cff51772e4bed9e695653f62efafae63165c4f33495a00cc12ee286909de8af624c91aef69d956039fd93347bc
-
Filesize
84KB
MD50c8def88b36e431c0c84ee1e0bc8f8b4
SHA1783b7e1a34e70a9d0457fbcbf9f855a8ded5641f
SHA256f64d3552a95103f052d849277e36e83d459dc855f4ee060a986b9e5ee056a69e
SHA512a943916734a6a872622b580c03c083427c5a756211f2df8fc5b86eb8d415b0955ae979c3dd2824bc2d6b902814ddd7ac47705980a2c702e3624de421dcda4045
-
Filesize
84KB
MD5aea09a9dd464af7c179cf37c033e75b8
SHA1ea14f5ea1cc79502b4d90696fcc02c10274d235d
SHA2566d440a0cc6e62c6d52f9d0305ad67ed267df3691d6ea28fab9768849991659ba
SHA5128551bde0ce6bee8399637973a8df5d06f35018cc6e7637c03bafa85187cc9783471e5498fd21378b288b863394315d0b4cef7f544d33b7ee30832e92657d74ec
-
Filesize
84KB
MD5c1a989f6eba4296de27a99d047d108de
SHA1d53c27fe78f3b6c5d504319f314d9960e14bd765
SHA2568b3025a0a39560e7dc32d466c55393f34ff0d3872d9f6e6b6a297448077da7b8
SHA5126c9ab28efd5640504356c42fe8cc46391e2a8ca330a9e319c3d56778f4b65a5a019f2c33fc9a6186e53cb097aa4d2a3324ad95ef569ebba04b7e6b42b83794bf
-
Filesize
84KB
MD5205d10c50d5e3b8412eaeae33e07190a
SHA13a1341720bab7e938ecff3feaad039adb2b14734
SHA256fca0891664548237317d3a26b267dd766c5cf40319b1e3bc8693e57cb1d0dc9f
SHA5128c6ca5ed7a8a5f1fcd5e9ddb2db21c9d589794171d2ce51c88601f658f9a8fdf8cc307325c497a33fc511d3ba93cd7e6ce9c511c5b068e558401d480766ceeed