Analysis
-
max time kernel
32s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
01/09/2024, 20:08
Static task
static1
Behavioral task
behavioral1
Sample
1e616537d920aa1418b04877e02af8d2a35a7feee94659bc71cf7959af088ae3.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
1e616537d920aa1418b04877e02af8d2a35a7feee94659bc71cf7959af088ae3.exe
Resource
win10v2004-20240802-en
General
-
Target
1e616537d920aa1418b04877e02af8d2a35a7feee94659bc71cf7959af088ae3.exe
-
Size
96KB
-
MD5
caa985d471160393cb2409fcd2d59d26
-
SHA1
0cd5503f3991f1f9b5cf4f49afd329332a4e2081
-
SHA256
1e616537d920aa1418b04877e02af8d2a35a7feee94659bc71cf7959af088ae3
-
SHA512
5d425aeac9cf9938e7e2f5e1681533581cc9b6e02178050a73fd673159a4f2c7544dd366959df3f1f7627974a1bbd2cf2a1df46eea9aeda1cb1e172cf3ea9685
-
SSDEEP
1536:D6LNhYF5Dc9NrSb4rIiZM5rDc+/a2LTaIZTJ+7LhkiB0MPiKeEAgH:WLEc9NrSiO5Pc+/nTaMU7uihJ5
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 52 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jkjbml32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Knkkngol.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kakdpb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lhclfphg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" 1e616537d920aa1418b04877e02af8d2a35a7feee94659bc71cf7959af088ae3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jiiikq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jkgfgl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kakdpb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mdqclpgd.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jepjpajn.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lhnckp32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lbfdnijp.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mdqclpgd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jepjpajn.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lghigl32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jkgfgl32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ldljqpli.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mlikkbga.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kpqaanqd.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kpcngnob.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lkahbkgk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jkjbml32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kmkodd32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kmbeecaq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Likbpceb.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jiiikq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kgcpgl32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lanmde32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kgcpgl32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kffpcilf.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lhclfphg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lkahbkgk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lhnckp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lbfdnijp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lanmde32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kffpcilf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Legmpdga.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mlikkbga.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lkfbmj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kpcngnob.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Likbpceb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kmbeecaq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lghigl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ldljqpli.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kmkodd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Knkkngol.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lbdghi32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Legmpdga.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 1e616537d920aa1418b04877e02af8d2a35a7feee94659bc71cf7959af088ae3.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kpqaanqd.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lbdghi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lkfbmj32.exe -
Executes dropped EXE 26 IoCs
pid Process 2520 Jiiikq32.exe 3028 Jkgfgl32.exe 2736 Jepjpajn.exe 2748 Jkjbml32.exe 2708 Kmkodd32.exe 2636 Knkkngol.exe 1040 Kgcpgl32.exe 1972 Kffpcilf.exe 2452 Kakdpb32.exe 2968 Kmbeecaq.exe 1636 Kpqaanqd.exe 2960 Kpcngnob.exe 852 Likbpceb.exe 1980 Lhnckp32.exe 2564 Lbdghi32.exe 2152 Lbfdnijp.exe 1704 Lhclfphg.exe 1528 Lkahbkgk.exe 1516 Legmpdga.exe 1692 Lghigl32.exe 1800 Lanmde32.exe 2360 Ldljqpli.exe 2312 Lkfbmj32.exe 2356 Mlikkbga.exe 2372 Mdqclpgd.exe 2832 Mllhpb32.exe -
Loads dropped DLL 56 IoCs
pid Process 2880 1e616537d920aa1418b04877e02af8d2a35a7feee94659bc71cf7959af088ae3.exe 2880 1e616537d920aa1418b04877e02af8d2a35a7feee94659bc71cf7959af088ae3.exe 2520 Jiiikq32.exe 2520 Jiiikq32.exe 3028 Jkgfgl32.exe 3028 Jkgfgl32.exe 2736 Jepjpajn.exe 2736 Jepjpajn.exe 2748 Jkjbml32.exe 2748 Jkjbml32.exe 2708 Kmkodd32.exe 2708 Kmkodd32.exe 2636 Knkkngol.exe 2636 Knkkngol.exe 1040 Kgcpgl32.exe 1040 Kgcpgl32.exe 1972 Kffpcilf.exe 1972 Kffpcilf.exe 2452 Kakdpb32.exe 2452 Kakdpb32.exe 2968 Kmbeecaq.exe 2968 Kmbeecaq.exe 1636 Kpqaanqd.exe 1636 Kpqaanqd.exe 2960 Kpcngnob.exe 2960 Kpcngnob.exe 852 Likbpceb.exe 852 Likbpceb.exe 1980 Lhnckp32.exe 1980 Lhnckp32.exe 2564 Lbdghi32.exe 2564 Lbdghi32.exe 2152 Lbfdnijp.exe 2152 Lbfdnijp.exe 1704 Lhclfphg.exe 1704 Lhclfphg.exe 1528 Lkahbkgk.exe 1528 Lkahbkgk.exe 1516 Legmpdga.exe 1516 Legmpdga.exe 1692 Lghigl32.exe 1692 Lghigl32.exe 1800 Lanmde32.exe 1800 Lanmde32.exe 2360 Ldljqpli.exe 2360 Ldljqpli.exe 2312 Lkfbmj32.exe 2312 Lkfbmj32.exe 2356 Mlikkbga.exe 2356 Mlikkbga.exe 2372 Mdqclpgd.exe 2372 Mdqclpgd.exe 2860 WerFault.exe 2860 WerFault.exe 2860 WerFault.exe 2860 WerFault.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\Fkbqmd32.dll Mdqclpgd.exe File created C:\Windows\SysWOW64\Jkgfgl32.exe Jiiikq32.exe File opened for modification C:\Windows\SysWOW64\Jepjpajn.exe Jkgfgl32.exe File created C:\Windows\SysWOW64\Qhjdoo32.dll Kpcngnob.exe File opened for modification C:\Windows\SysWOW64\Lanmde32.exe Lghigl32.exe File created C:\Windows\SysWOW64\Lceodl32.dll Kgcpgl32.exe File created C:\Windows\SysWOW64\Apgkaakf.dll Lhnckp32.exe File created C:\Windows\SysWOW64\Idafbjna.dll Lbfdnijp.exe File created C:\Windows\SysWOW64\Jiiikq32.exe 1e616537d920aa1418b04877e02af8d2a35a7feee94659bc71cf7959af088ae3.exe File created C:\Windows\SysWOW64\Jepjpajn.exe Jkgfgl32.exe File created C:\Windows\SysWOW64\Ihmjnmbc.dll Jkgfgl32.exe File created C:\Windows\SysWOW64\Aandhbgj.dll Knkkngol.exe File created C:\Windows\SysWOW64\Kpcngnob.exe Kpqaanqd.exe File opened for modification C:\Windows\SysWOW64\Kpcngnob.exe Kpqaanqd.exe File opened for modification C:\Windows\SysWOW64\Likbpceb.exe Kpcngnob.exe File opened for modification C:\Windows\SysWOW64\Kmbeecaq.exe Kakdpb32.exe File created C:\Windows\SysWOW64\Kpqaanqd.exe Kmbeecaq.exe File created C:\Windows\SysWOW64\Aceapdem.dll Kpqaanqd.exe File opened for modification C:\Windows\SysWOW64\Lghigl32.exe Legmpdga.exe File opened for modification C:\Windows\SysWOW64\Jkjbml32.exe Jepjpajn.exe File created C:\Windows\SysWOW64\Kmkodd32.exe Jkjbml32.exe File opened for modification C:\Windows\SysWOW64\Kmkodd32.exe Jkjbml32.exe File opened for modification C:\Windows\SysWOW64\Kgcpgl32.exe Knkkngol.exe File created C:\Windows\SysWOW64\Lbmgcb32.dll Kmbeecaq.exe File created C:\Windows\SysWOW64\Lanmde32.exe Lghigl32.exe File created C:\Windows\SysWOW64\Ldljqpli.exe Lanmde32.exe File created C:\Windows\SysWOW64\Aepipcbp.dll Lanmde32.exe File created C:\Windows\SysWOW64\Cgqjfn32.dll 1e616537d920aa1418b04877e02af8d2a35a7feee94659bc71cf7959af088ae3.exe File created C:\Windows\SysWOW64\Kkaick32.dll Jiiikq32.exe File created C:\Windows\SysWOW64\Kffpcilf.exe Kgcpgl32.exe File opened for modification C:\Windows\SysWOW64\Kakdpb32.exe Kffpcilf.exe File opened for modification C:\Windows\SysWOW64\Mlikkbga.exe Lkfbmj32.exe File created C:\Windows\SysWOW64\Opbcppkf.dll Mlikkbga.exe File created C:\Windows\SysWOW64\Cnchedie.dll Kmkodd32.exe File created C:\Windows\SysWOW64\Pbdpndec.dll Ldljqpli.exe File created C:\Windows\SysWOW64\Bmjbmidh.dll Lkfbmj32.exe File opened for modification C:\Windows\SysWOW64\Mdqclpgd.exe Mlikkbga.exe File created C:\Windows\SysWOW64\Jkjbml32.exe Jepjpajn.exe File created C:\Windows\SysWOW64\Knkkngol.exe Kmkodd32.exe File opened for modification C:\Windows\SysWOW64\Knkkngol.exe Kmkodd32.exe File opened for modification C:\Windows\SysWOW64\Lbfdnijp.exe Lbdghi32.exe File opened for modification C:\Windows\SysWOW64\Legmpdga.exe Lkahbkgk.exe File created C:\Windows\SysWOW64\Cfmnepnb.dll Legmpdga.exe File opened for modification C:\Windows\SysWOW64\Ldljqpli.exe Lanmde32.exe File opened for modification C:\Windows\SysWOW64\Jiiikq32.exe 1e616537d920aa1418b04877e02af8d2a35a7feee94659bc71cf7959af088ae3.exe File created C:\Windows\SysWOW64\Ifdlmglb.dll Jepjpajn.exe File created C:\Windows\SysWOW64\Kakdpb32.exe Kffpcilf.exe File created C:\Windows\SysWOW64\Lbdghi32.exe Lhnckp32.exe File opened for modification C:\Windows\SysWOW64\Lkahbkgk.exe Lhclfphg.exe File created C:\Windows\SysWOW64\Bgaengmn.dll Lhclfphg.exe File created C:\Windows\SysWOW64\Lkfbmj32.exe Ldljqpli.exe File opened for modification C:\Windows\SysWOW64\Kffpcilf.exe Kgcpgl32.exe File opened for modification C:\Windows\SysWOW64\Lhnckp32.exe Likbpceb.exe File opened for modification C:\Windows\SysWOW64\Lbdghi32.exe Lhnckp32.exe File created C:\Windows\SysWOW64\Mlikkbga.exe Lkfbmj32.exe File created C:\Windows\SysWOW64\Mdqclpgd.exe Mlikkbga.exe File created C:\Windows\SysWOW64\Lhnckp32.exe Likbpceb.exe File created C:\Windows\SysWOW64\Lkahbkgk.exe Lhclfphg.exe File opened for modification C:\Windows\SysWOW64\Lkfbmj32.exe Ldljqpli.exe File opened for modification C:\Windows\SysWOW64\Mllhpb32.exe Mdqclpgd.exe File created C:\Windows\SysWOW64\Kgcpgl32.exe Knkkngol.exe File opened for modification C:\Windows\SysWOW64\Kpqaanqd.exe Kmbeecaq.exe File created C:\Windows\SysWOW64\Emhqjkjh.dll Lbdghi32.exe File opened for modification C:\Windows\SysWOW64\Lhclfphg.exe Lbfdnijp.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2860 2832 WerFault.exe 54 -
System Location Discovery: System Language Discovery 1 TTPs 27 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lanmde32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Knkkngol.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kakdpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kmbeecaq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lhclfphg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lkahbkgk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lghigl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kpqaanqd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lbfdnijp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jepjpajn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kgcpgl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mllhpb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Likbpceb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lkfbmj32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1e616537d920aa1418b04877e02af8d2a35a7feee94659bc71cf7959af088ae3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lbdghi32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jiiikq32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kmkodd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kffpcilf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mlikkbga.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mdqclpgd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jkgfgl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jkjbml32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kpcngnob.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lhnckp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Legmpdga.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ldljqpli.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Knkkngol.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mlikkbga.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cnchedie.dll" Kmkodd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aandhbgj.dll" Knkkngol.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Emhqjkjh.dll" Lbdghi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bgaengmn.dll" Lhclfphg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mdqclpgd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Likbpceb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Likbpceb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cgqjfn32.dll" 1e616537d920aa1418b04877e02af8d2a35a7feee94659bc71cf7959af088ae3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jkgfgl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jepjpajn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jkjbml32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kmbeecaq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lbmgcb32.dll" Kmbeecaq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node 1e616537d920aa1418b04877e02af8d2a35a7feee94659bc71cf7959af088ae3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Imqkdcib.dll" Kakdpb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kpqaanqd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aepipcbp.dll" Lanmde32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lanmde32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bmjbmidh.dll" Lkfbmj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lanmde32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jiiikq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jkjbml32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kmkodd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kakdpb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oodcogfd.dll" Lkahbkgk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lghigl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lceodl32.dll" Kgcpgl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kpcngnob.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Apgkaakf.dll" Lhnckp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ihmjnmbc.dll" Jkgfgl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lbfdnijp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ifdlmglb.dll" Jepjpajn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lghigl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mlikkbga.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" 1e616537d920aa1418b04877e02af8d2a35a7feee94659bc71cf7959af088ae3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jiiikq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jkgfgl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kakdpb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ldljqpli.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mdqclpgd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mfglbp32.dll" Jkjbml32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kgcpgl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lbdghi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lbdghi32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lbfdnijp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Opbcppkf.dll" Mlikkbga.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kmkodd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kmbeecaq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gdljncel.dll" Likbpceb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cfmnepnb.dll" Legmpdga.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ldljqpli.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pbdpndec.dll" Ldljqpli.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} 1e616537d920aa1418b04877e02af8d2a35a7feee94659bc71cf7959af088ae3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kffpcilf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lhclfphg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Legmpdga.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Legmpdga.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lkfbmj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID 1e616537d920aa1418b04877e02af8d2a35a7feee94659bc71cf7959af088ae3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kkaick32.dll" Jiiikq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Knkkngol.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lhnckp32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2880 wrote to memory of 2520 2880 1e616537d920aa1418b04877e02af8d2a35a7feee94659bc71cf7959af088ae3.exe 29 PID 2880 wrote to memory of 2520 2880 1e616537d920aa1418b04877e02af8d2a35a7feee94659bc71cf7959af088ae3.exe 29 PID 2880 wrote to memory of 2520 2880 1e616537d920aa1418b04877e02af8d2a35a7feee94659bc71cf7959af088ae3.exe 29 PID 2880 wrote to memory of 2520 2880 1e616537d920aa1418b04877e02af8d2a35a7feee94659bc71cf7959af088ae3.exe 29 PID 2520 wrote to memory of 3028 2520 Jiiikq32.exe 30 PID 2520 wrote to memory of 3028 2520 Jiiikq32.exe 30 PID 2520 wrote to memory of 3028 2520 Jiiikq32.exe 30 PID 2520 wrote to memory of 3028 2520 Jiiikq32.exe 30 PID 3028 wrote to memory of 2736 3028 Jkgfgl32.exe 31 PID 3028 wrote to memory of 2736 3028 Jkgfgl32.exe 31 PID 3028 wrote to memory of 2736 3028 Jkgfgl32.exe 31 PID 3028 wrote to memory of 2736 3028 Jkgfgl32.exe 31 PID 2736 wrote to memory of 2748 2736 Jepjpajn.exe 32 PID 2736 wrote to memory of 2748 2736 Jepjpajn.exe 32 PID 2736 wrote to memory of 2748 2736 Jepjpajn.exe 32 PID 2736 wrote to memory of 2748 2736 Jepjpajn.exe 32 PID 2748 wrote to memory of 2708 2748 Jkjbml32.exe 33 PID 2748 wrote to memory of 2708 2748 Jkjbml32.exe 33 PID 2748 wrote to memory of 2708 2748 Jkjbml32.exe 33 PID 2748 wrote to memory of 2708 2748 Jkjbml32.exe 33 PID 2708 wrote to memory of 2636 2708 Kmkodd32.exe 34 PID 2708 wrote to memory of 2636 2708 Kmkodd32.exe 34 PID 2708 wrote to memory of 2636 2708 Kmkodd32.exe 34 PID 2708 wrote to memory of 2636 2708 Kmkodd32.exe 34 PID 2636 wrote to memory of 1040 2636 Knkkngol.exe 35 PID 2636 wrote to memory of 1040 2636 Knkkngol.exe 35 PID 2636 wrote to memory of 1040 2636 Knkkngol.exe 35 PID 2636 wrote to memory of 1040 2636 Knkkngol.exe 35 PID 1040 wrote to memory of 1972 1040 Kgcpgl32.exe 36 PID 1040 wrote to memory of 1972 1040 Kgcpgl32.exe 36 PID 1040 wrote to memory of 1972 1040 Kgcpgl32.exe 36 PID 1040 wrote to memory of 1972 1040 Kgcpgl32.exe 36 PID 1972 wrote to memory of 2452 1972 Kffpcilf.exe 37 PID 1972 wrote to memory of 2452 1972 Kffpcilf.exe 37 PID 1972 wrote to memory of 2452 1972 Kffpcilf.exe 37 PID 1972 wrote to memory of 2452 1972 Kffpcilf.exe 37 PID 2452 wrote to memory of 2968 2452 Kakdpb32.exe 38 PID 2452 wrote to memory of 2968 2452 Kakdpb32.exe 38 PID 2452 wrote to memory of 2968 2452 Kakdpb32.exe 38 PID 2452 wrote to memory of 2968 2452 Kakdpb32.exe 38 PID 2968 wrote to memory of 1636 2968 Kmbeecaq.exe 39 PID 2968 wrote to memory of 1636 2968 Kmbeecaq.exe 39 PID 2968 wrote to memory of 1636 2968 Kmbeecaq.exe 39 PID 2968 wrote to memory of 1636 2968 Kmbeecaq.exe 39 PID 1636 wrote to memory of 2960 1636 Kpqaanqd.exe 40 PID 1636 wrote to memory of 2960 1636 Kpqaanqd.exe 40 PID 1636 wrote to memory of 2960 1636 Kpqaanqd.exe 40 PID 1636 wrote to memory of 2960 1636 Kpqaanqd.exe 40 PID 2960 wrote to memory of 852 2960 Kpcngnob.exe 41 PID 2960 wrote to memory of 852 2960 Kpcngnob.exe 41 PID 2960 wrote to memory of 852 2960 Kpcngnob.exe 41 PID 2960 wrote to memory of 852 2960 Kpcngnob.exe 41 PID 852 wrote to memory of 1980 852 Likbpceb.exe 42 PID 852 wrote to memory of 1980 852 Likbpceb.exe 42 PID 852 wrote to memory of 1980 852 Likbpceb.exe 42 PID 852 wrote to memory of 1980 852 Likbpceb.exe 42 PID 1980 wrote to memory of 2564 1980 Lhnckp32.exe 43 PID 1980 wrote to memory of 2564 1980 Lhnckp32.exe 43 PID 1980 wrote to memory of 2564 1980 Lhnckp32.exe 43 PID 1980 wrote to memory of 2564 1980 Lhnckp32.exe 43 PID 2564 wrote to memory of 2152 2564 Lbdghi32.exe 44 PID 2564 wrote to memory of 2152 2564 Lbdghi32.exe 44 PID 2564 wrote to memory of 2152 2564 Lbdghi32.exe 44 PID 2564 wrote to memory of 2152 2564 Lbdghi32.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\1e616537d920aa1418b04877e02af8d2a35a7feee94659bc71cf7959af088ae3.exe"C:\Users\Admin\AppData\Local\Temp\1e616537d920aa1418b04877e02af8d2a35a7feee94659bc71cf7959af088ae3.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Windows\SysWOW64\Jiiikq32.exeC:\Windows\system32\Jiiikq32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\SysWOW64\Jkgfgl32.exeC:\Windows\system32\Jkgfgl32.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\SysWOW64\Jepjpajn.exeC:\Windows\system32\Jepjpajn.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\SysWOW64\Jkjbml32.exeC:\Windows\system32\Jkjbml32.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\SysWOW64\Kmkodd32.exeC:\Windows\system32\Kmkodd32.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\SysWOW64\Knkkngol.exeC:\Windows\system32\Knkkngol.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Windows\SysWOW64\Kgcpgl32.exeC:\Windows\system32\Kgcpgl32.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Windows\SysWOW64\Kffpcilf.exeC:\Windows\system32\Kffpcilf.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\SysWOW64\Kakdpb32.exeC:\Windows\system32\Kakdpb32.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Windows\SysWOW64\Kmbeecaq.exeC:\Windows\system32\Kmbeecaq.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Windows\SysWOW64\Kpqaanqd.exeC:\Windows\system32\Kpqaanqd.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Windows\SysWOW64\Kpcngnob.exeC:\Windows\system32\Kpcngnob.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Windows\SysWOW64\Likbpceb.exeC:\Windows\system32\Likbpceb.exe14⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Windows\SysWOW64\Lhnckp32.exeC:\Windows\system32\Lhnckp32.exe15⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Windows\SysWOW64\Lbdghi32.exeC:\Windows\system32\Lbdghi32.exe16⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\SysWOW64\Lbfdnijp.exeC:\Windows\system32\Lbfdnijp.exe17⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2152 -
C:\Windows\SysWOW64\Lhclfphg.exeC:\Windows\system32\Lhclfphg.exe18⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1704 -
C:\Windows\SysWOW64\Lkahbkgk.exeC:\Windows\system32\Lkahbkgk.exe19⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1528 -
C:\Windows\SysWOW64\Legmpdga.exeC:\Windows\system32\Legmpdga.exe20⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1516 -
C:\Windows\SysWOW64\Lghigl32.exeC:\Windows\system32\Lghigl32.exe21⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1692 -
C:\Windows\SysWOW64\Lanmde32.exeC:\Windows\system32\Lanmde32.exe22⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1800 -
C:\Windows\SysWOW64\Ldljqpli.exeC:\Windows\system32\Ldljqpli.exe23⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2360 -
C:\Windows\SysWOW64\Lkfbmj32.exeC:\Windows\system32\Lkfbmj32.exe24⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2312 -
C:\Windows\SysWOW64\Mlikkbga.exeC:\Windows\system32\Mlikkbga.exe25⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2356 -
C:\Windows\SysWOW64\Mdqclpgd.exeC:\Windows\system32\Mdqclpgd.exe26⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2372 -
C:\Windows\SysWOW64\Mllhpb32.exeC:\Windows\system32\Mllhpb32.exe27⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2832 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2832 -s 14028⤵
- Loads dropped DLL
- Program crash
PID:2860
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5559fd6188545db9544cc10071e392899
SHA19c9a0afed5607b112d931c71840b213622fc5213
SHA2564eedbade32d740f4e99abb63ba97c8056ef0b0f84d12f59e5c75b5ab35b1ec22
SHA512354f1043b13765545c5e64f801f3235a38cb61888c3feba9615ed826852f43bb64245a78b066c1ab1baaa24d7d0878c4894aff3a64ee4336b405e7d665b692da
-
Filesize
96KB
MD52a1e880e0092cd1cc80ec0ab9df312b6
SHA13b46f88d00f173c8a636a0a98e6c8cd2ccc48408
SHA256643b2d43020b594646fdd662674264e90d3a4c649bc0d5ddcafc9e9357349905
SHA512fa56d1fefe1169f4207caf7ae1c03dc0a3fb8f3f39b199980c25aa548e1282281ae93ff75d77bf6b7f66e31d93645bed72deda4c41cbdc616576556256b78545
-
Filesize
96KB
MD5dcca895c8b1bc80502a0b1012f2266a9
SHA15190f3f628ebddb5dbe98c2de8edf4f4daff4811
SHA25687955b553659048bb060e47dc3ce80be980962e71c680771384ca4236d2b3988
SHA512937223f8eb5ec717818b355cad240f1a854c641ea20e3185d12376a7ef3bb62d76e22e4334151714c0bb29637f3972b4b701d094039abc64309dbc6d5e3911be
-
Filesize
96KB
MD528fd4d1f8151037771e95e7cc0accd4e
SHA1168745d3dfe8be27cb4e69cf7fc6d8f197e223ff
SHA256af37300c57dac45d463989f52a0e5a987ad1232c0707d67673a540b70c484f40
SHA512271384459c8cf0f5c281eeb6950addd33c59cbb536136f3fea251e98b78ac54dd75351ba09d837f1e9e37cc8decb37ce6dc0e62ddc934c62913ca6be16e113e4
-
Filesize
96KB
MD51f7ecd7bd5e20acd78352c52e83f441e
SHA142d65df771c8cf53e84001777e379584a48af6a5
SHA2567112d5d958ee28bafdafe86bd1d5cb3a5a2c98806244abad802cf0ea8533b97e
SHA5126ec0476d3cf2fbfdd83e15736477f935cd8ce942d45a0d6764a2eee29e6024944e8fdc2524f902bd7bea67e217e7c3b5091db256ae0cf7b45bd7b6c2aed97779
-
Filesize
96KB
MD5e3ac7d70af03105f66792d2bed611e1b
SHA1de34b9a87b77e7a30f27a4bb2bd95d169d0b56be
SHA256becd27e36db7266bd3ed4b5fe36c0257ae9ff4b295fce910d10d2d205fdff14b
SHA512fc11ea0c771bf13956b33c4991b8aed3542920501c357bf8a2fe14009ad5d52d1889ff95499b9945cdcaf0330886bf409d0034816bcdc570dd934ab19a59be8a
-
Filesize
96KB
MD599a3b5a9cd7a12a2f31fc67f2560dab5
SHA1ca7192ff1aae1104812d3c532cc9a996979c402d
SHA2567f7899bbc2b7e741ca6b0f20c391440489cb9907fc0cd4995a5f9c7b718cfe66
SHA51222a1ea14c6733682c4ddea8b94b46ec75f5fd3af8b9ca36456c8d9e2684cf1f6a2af00a67a2cec767e3f197f22b233f797021a3a3198a3508f406615fa1cddc6
-
Filesize
96KB
MD5ee3e3535ed1c4a00b5b451db91078859
SHA1b5a057478f091ce225dc570f1a34a0c2e814a635
SHA256ac3f0138a45f04f79635c2b6640c3391593232f3b261a8e0db7193844b4c7ae6
SHA512bd6e43e53a6998d7402b6069068009c8dcef4c685f7d80806fa2377dd865b51b6427771991e2c83a5514665658ad09ce1911639477b722854150d275c563ca85
-
Filesize
96KB
MD5b39f78a6d0364e93353f97e24e5fffc1
SHA1adcab22ec31d0a790a9cc9ce45d4b92e75e81b79
SHA256e262ca920cddbf9ed77df57cc087f1208efacd43035d973506104cb117c494d3
SHA51224c38a8296304758c6db14df0cdb4b32295601777146d8d3c4d4095f60b498de74d1b9473b9c010aac41a34c0cf958894e7b4e90077df20e859c5f719e42253c
-
Filesize
96KB
MD5a1c7fbd3b24a3ccb1aff2ee8133183a0
SHA19d443f10b487b59cada259f3310d164b50f66550
SHA256cea2d5a21b73c13d9ece49f42f55ba9804275d73a6e13dbb92e2d968fa60cea0
SHA512e8d37a1baec63603260eeb774d5426cb70fe143e83797fa9660e0db298a5db7141a71d7db2cf6cade2175f862a9f0fdef3295ea04610be5b37c2965e8aa50c47
-
Filesize
96KB
MD5f0f055be5bd36b0fc348e8cd10c3df02
SHA15baf1a70e120aa938416ae10bb5c146cc8d0c93a
SHA2564a301ebec89d3a972db257895af6ef33d8ce50df46ca2d93cbd5705e0fbc1ef2
SHA5127217d5e9078961d5e56d80f3d97de4078d2dd64a18f7f7219d7d524e216e0b03e8b97bc2a9176c3422f6a92a0390071ec0c99f513bb30455425f886e7e0f4f9c
-
Filesize
96KB
MD54bec99a7a2773a76b15295241161a09b
SHA1718e07b1d547a11b4e50dd4c2f004f091259805c
SHA25630874036a29a1a89a92e5f3cb3642844a91f02611886744e36a245688963248f
SHA51225f50b84f393ffca37004ececfd5e6120341f0c894f7fc436056923ab797788e8ef1bd07bebc7488d7fadea742d4071f7a5effa8e2cd25158d056cad0e5fa44f
-
Filesize
96KB
MD56cc9bfb1c58631a91314995f1888136e
SHA1b7d5ac283454ef7d0f73cb0bf043d8c12513b931
SHA2565741cc220971be85807faa2cabfde57faaf394cec9a4560bafcc9643c3480344
SHA5123543752e10a26d3edfe7bd56b43dbabbdcaf471f2ff46becb063167d8112b9e04e4a93e5fb0d5dd22759cfd561b4e527c7a28fd1353f6ae82cee6676b3255ac9
-
Filesize
96KB
MD53bbcf29df30d8aa99fa06b6ea608c84c
SHA174825a32707dacbfd0fbfe90447c230b148436fe
SHA2565361e4e551def02df419411bb3b470b620f79e0402f69d938b63dd9e143d17f9
SHA5126d3a4463eac50d88d3f729da54e023de0a260ddd544c3f2957458bc559ba0268e6d32832be076541e78a9d823ce160ce8c1a5b8ba0ed343d38f21b7ee4288375
-
Filesize
96KB
MD59b3e65d10b805897890e14ae823448df
SHA11e2e9de21f7524b3e2118f137ac7923a9dbf82bc
SHA2562ef58227d6a3b4cc174128a648ec2b343b5d6a42b6426419abc4bdd810bb7d3a
SHA5124c57ba11c2578a432e51536a4d0ae428f944f2ec07040bc3e58e7e57f614141dfe808a2ef429227d7f0520e9197c0749063b0e01feb4032cf16e542dc2a2b353
-
Filesize
96KB
MD556adc955f942a501a298d58f88c42057
SHA16d1391d996526bc850deb09eda822b97aceea027
SHA256c3f25793929a0a726368161aa66e1ae60d72e99b5ed1299f8f955fea5a31826e
SHA5121e7c54908d88a0478b04d2376de55a6972d7a0a65cf61c90994e097e98ff80a09a8da63d040e1d16df28b2621f7d6a2d8d9e87ba2b3887078550c1f143685adf
-
Filesize
96KB
MD529a45dd9a2d14658f375837a1b088774
SHA172dae8a40ac6f1892efaef02b14a9a7667e8f3f2
SHA256512b6e4ddbf55be006c538ef4adf2fb246021d1a04a8a8a8e2f85188588c0e54
SHA51243d30764ddf335377d3ffad53fc1719b39983d511eab9249687ae8898af98656689e30d2184d7e743d202b872532d1f9a879b48160b40acb0409a6e642697578
-
Filesize
96KB
MD501faa19b80dec7c7721a3b5db8873007
SHA19f3c2930d2acfe40b04fab76bfd8710aea598537
SHA256548165e055795d13fd937a14dcdd47554a7eb601f7e2f1e010486d0af9cf7de4
SHA512975ad64e821979d23de4095d9de60f9d2b0edff3b94f1ec1a1abbe029f27bd4d42266e37f820a4ff1d84c98aa4cff914d8c359a98288e218372ff327af0c5d20
-
Filesize
96KB
MD56a0f034ee6287e509b330a4b32bc32c5
SHA1e8357eb9a583429f365583381cbbab2dc540f76a
SHA2560372c0333e541f3eaf2f3e6dbce4be7b45b5f393e77f41ed58b08a68911cb46e
SHA5129c8c6572577f0ba109562b597e638eab793349085da0e98651ccf9033950c802977167552d8c9c9156377f66f36a4e27060aaeb55158492065dc2904c8dd7022
-
Filesize
96KB
MD5a4f1b6a484194132d3a345fb53bbacf3
SHA128194bd83f6f88109ddd3ac82063fefd6843e8c3
SHA256816b714f10219cebda5622aa09a9e5ef2204ba9119551092e6db8400666b1fed
SHA512f937189f466dacde4e55b48e54c7c57a49be921de2c392dc0c9881da15d54446d93dc057b66efcf36079d8ad15955959b7d480095a526be97f5618a9cca75750
-
Filesize
96KB
MD5a0f214227c1ba7ebc343154d18c54814
SHA15466f0b239cbe0ed547ebbca01575fcaaf5f152b
SHA2568835b78b5b1c06c794085cd77bedfc1cc32bfa24620fe0b1fdac33a26ad985e3
SHA512af7b949603e56d2cb335c3ce2c242b094b06a741e6cd5e270468a7c1ab6e59c6d4be2eccaebe12cb365f9c69475ff9e94a7d1f2a96613f65e74b07f55392fa9b
-
Filesize
96KB
MD54c53a921c6895a91d959ad812f9bf0a8
SHA160c45c03426039484df970d0bbd1e64394a683cf
SHA256b0f679a95d252999ad2b81f798864e46d68eb1856fe9bd5c60350da6dbb0decc
SHA512b3a1ab51460e04a3b3ffdc1955f28785dba0eda78a37817d20f78b6ef51a76f282face24e0129f36b265537722de01c463d1b5a080b868f975ee7ac399e99829
-
Filesize
96KB
MD52a0d06c9d1e85b98c309cb0fd7425080
SHA1c506fed1e00ce058bdce0fcb74d8a345103695e7
SHA2568c30bb643cb3ef293936c452dd2412ce2b330f279fb70e829019c5ffce7f782f
SHA512d60d7e687e02eb806f33da8180e093e8a77278b78fcf4080d2c7b5858e7ecb8f51d18829f4deb201d60dd0ecea25db99309c9a6f2404a2249118e77229903ded
-
Filesize
96KB
MD57133885aba451d204cbb26334def9683
SHA1244025bb0f1e18974c0d431b4f4ebbc420f82a15
SHA25671fffaa5333b81f0f517f08825cc2d9dfa572511088e6b8370781483610d0d87
SHA512706ed6439dd144017b612933656235e96af70081082e5eabe85ab328ab034f8d0114af98e7765f765fdce62dba7539b797012f38cca0bfb57562301ba05cbeb0
-
Filesize
96KB
MD55f77a739371cd7abe436b57069156845
SHA1f1ec4a8e68643bbdc6c260e2b6189539838fe638
SHA2563af48c28f0992790f44c06a8563be754e84825f599072039d85adbdfe83c6b85
SHA51216444fd22c2cce9d4f19c0cc58d919a683f5fd8ea84916460917901076bfbea02a807c75c9a46d7df13941fc0e9706c60e2aaf7db3778188923cca38ab5ab8cf
-
Filesize
96KB
MD50e7346cccb611db097a440cd9ab71bf5
SHA1738d04456cdc23eb0065da629379be39387a9e0d
SHA2561beb2465ba05fa151d9424811547b1135e5382564c4a96940054b871345a500a
SHA5121597fb5865b9aa3ea32ad080f66394f3b26cff6b8011f4bb3c0c56ccd971ece49247ee3cd0b281a6c0f0653dfab57b055833b584dacb4395c22f6390994aaba5