Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
82s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
02/09/2024, 13:10
Static task
static1
Behavioral task
behavioral1
Sample
0143c7859f9f06d76079e3e689390d70N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
0143c7859f9f06d76079e3e689390d70N.exe
Resource
win10v2004-20240802-en
General
-
Target
0143c7859f9f06d76079e3e689390d70N.exe
-
Size
89KB
-
MD5
0143c7859f9f06d76079e3e689390d70
-
SHA1
6c80fe5a9687180f37f5a60df9e524605951efc2
-
SHA256
0e9774866669c19e97054730e5bdc27ddf3858b3c0b480affabb15cf3826a993
-
SHA512
51ac2fe531eaac4d50c36ebce961ed4122103a8639647c80e2652d178627d0bd9e0fad00e2365b0210e3f2a6ae6840bd377ad21c155e7415a7dda7173278a1a6
-
SSDEEP
1536:1/vexiQ/bIGCHsalFtVCp/AukzeBecxlExkg8F:1XexiQ/basaOTbBecxlakgw
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 50 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Keioca32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kmimcbja.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Kpgionie.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kageia32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jcciqi32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Koflgf32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Libjncnc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Koflgf32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jipaip32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Kmkihbho.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jjhgbd32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jefbnacn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Kbjbge32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Klecfkff.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jpepkk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jpepkk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jcqlkjae.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kocpbfei.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Kageia32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kkojbf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jmfcop32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Keioca32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Kenhopmf.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 0143c7859f9f06d76079e3e689390d70N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Khgkpl32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Klecfkff.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jipaip32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jlnmel32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Kbmome32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Kdnkdmec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Kkojbf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jefbnacn.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kdnkdmec.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kenhopmf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Kmimcbja.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kmkihbho.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jlnmel32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jhenjmbb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jhenjmbb.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kbmome32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kpgionie.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Khgkpl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jjhgbd32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kbjbge32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Libjncnc.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jcqlkjae.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jcciqi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Kocpbfei.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" 0143c7859f9f06d76079e3e689390d70N.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jmfcop32.exe -
Executes dropped EXE 25 IoCs
pid Process 1880 Jjhgbd32.exe 3048 Jmfcop32.exe 2864 Jpepkk32.exe 2628 Jcqlkjae.exe 2644 Jcciqi32.exe 1792 Jipaip32.exe 1872 Jlnmel32.exe 2100 Jefbnacn.exe 1820 Jhenjmbb.exe 2848 Kbjbge32.exe 448 Keioca32.exe 2956 Khgkpl32.exe 484 Kbmome32.exe 772 Kdnkdmec.exe 2320 Klecfkff.exe 2372 Kocpbfei.exe 1500 Kenhopmf.exe 832 Koflgf32.exe 1748 Kmimcbja.exe 2660 Kpgionie.exe 2664 Kmkihbho.exe 976 Kageia32.exe 880 Kkojbf32.exe 2112 Libjncnc.exe 2796 Lbjofi32.exe -
Loads dropped DLL 54 IoCs
pid Process 2672 0143c7859f9f06d76079e3e689390d70N.exe 2672 0143c7859f9f06d76079e3e689390d70N.exe 1880 Jjhgbd32.exe 1880 Jjhgbd32.exe 3048 Jmfcop32.exe 3048 Jmfcop32.exe 2864 Jpepkk32.exe 2864 Jpepkk32.exe 2628 Jcqlkjae.exe 2628 Jcqlkjae.exe 2644 Jcciqi32.exe 2644 Jcciqi32.exe 1792 Jipaip32.exe 1792 Jipaip32.exe 1872 Jlnmel32.exe 1872 Jlnmel32.exe 2100 Jefbnacn.exe 2100 Jefbnacn.exe 1820 Jhenjmbb.exe 1820 Jhenjmbb.exe 2848 Kbjbge32.exe 2848 Kbjbge32.exe 448 Keioca32.exe 448 Keioca32.exe 2956 Khgkpl32.exe 2956 Khgkpl32.exe 484 Kbmome32.exe 484 Kbmome32.exe 772 Kdnkdmec.exe 772 Kdnkdmec.exe 2320 Klecfkff.exe 2320 Klecfkff.exe 2372 Kocpbfei.exe 2372 Kocpbfei.exe 1500 Kenhopmf.exe 1500 Kenhopmf.exe 832 Koflgf32.exe 832 Koflgf32.exe 1748 Kmimcbja.exe 1748 Kmimcbja.exe 2660 Kpgionie.exe 2660 Kpgionie.exe 2664 Kmkihbho.exe 2664 Kmkihbho.exe 976 Kageia32.exe 976 Kageia32.exe 880 Kkojbf32.exe 880 Kkojbf32.exe 2112 Libjncnc.exe 2112 Libjncnc.exe 1480 WerFault.exe 1480 WerFault.exe 1480 WerFault.exe 1480 WerFault.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\Jhenjmbb.exe Jefbnacn.exe File created C:\Windows\SysWOW64\Jpepkk32.exe Jmfcop32.exe File opened for modification C:\Windows\SysWOW64\Jipaip32.exe Jcciqi32.exe File created C:\Windows\SysWOW64\Klecfkff.exe Kdnkdmec.exe File created C:\Windows\SysWOW64\Pdnfmn32.dll Kdnkdmec.exe File opened for modification C:\Windows\SysWOW64\Kkojbf32.exe Kageia32.exe File created C:\Windows\SysWOW64\Bcbonpco.dll 0143c7859f9f06d76079e3e689390d70N.exe File created C:\Windows\SysWOW64\Jcciqi32.exe Jcqlkjae.exe File created C:\Windows\SysWOW64\Ikbilijo.dll Jcciqi32.exe File created C:\Windows\SysWOW64\Caefjg32.dll Kbmome32.exe File created C:\Windows\SysWOW64\Jpnghhmn.dll Kocpbfei.exe File created C:\Windows\SysWOW64\Jmfcop32.exe Jjhgbd32.exe File created C:\Windows\SysWOW64\Jipaip32.exe Jcciqi32.exe File created C:\Windows\SysWOW64\Mobafhlg.dll Jhenjmbb.exe File created C:\Windows\SysWOW64\Keioca32.exe Kbjbge32.exe File created C:\Windows\SysWOW64\Khgkpl32.exe Keioca32.exe File created C:\Windows\SysWOW64\Bodilc32.dll Koflgf32.exe File created C:\Windows\SysWOW64\Jbdhhp32.dll Kmimcbja.exe File created C:\Windows\SysWOW64\Kmkihbho.exe Kpgionie.exe File created C:\Windows\SysWOW64\Dfaaak32.dll Jmfcop32.exe File created C:\Windows\SysWOW64\Cmojeo32.dll Jpepkk32.exe File opened for modification C:\Windows\SysWOW64\Kmkihbho.exe Kpgionie.exe File created C:\Windows\SysWOW64\Kkojbf32.exe Kageia32.exe File opened for modification C:\Windows\SysWOW64\Kmimcbja.exe Koflgf32.exe File created C:\Windows\SysWOW64\Lbjofi32.exe Libjncnc.exe File created C:\Windows\SysWOW64\Mkehop32.dll Khgkpl32.exe File created C:\Windows\SysWOW64\Ffakjm32.dll Klecfkff.exe File opened for modification C:\Windows\SysWOW64\Jcciqi32.exe Jcqlkjae.exe File opened for modification C:\Windows\SysWOW64\Kpgionie.exe Kmimcbja.exe File created C:\Windows\SysWOW64\Ipafocdg.dll Libjncnc.exe File created C:\Windows\SysWOW64\Jjhgbd32.exe 0143c7859f9f06d76079e3e689390d70N.exe File opened for modification C:\Windows\SysWOW64\Jmfcop32.exe Jjhgbd32.exe File created C:\Windows\SysWOW64\Kbmome32.exe Khgkpl32.exe File created C:\Windows\SysWOW64\Gffdobll.dll Kageia32.exe File created C:\Windows\SysWOW64\Libjncnc.exe Kkojbf32.exe File created C:\Windows\SysWOW64\Aaqbpk32.dll Jcqlkjae.exe File created C:\Windows\SysWOW64\Mnpkephg.dll Jipaip32.exe File opened for modification C:\Windows\SysWOW64\Khgkpl32.exe Keioca32.exe File created C:\Windows\SysWOW64\Ipbkjl32.dll Kkojbf32.exe File created C:\Windows\SysWOW64\Jlnmel32.exe Jipaip32.exe File opened for modification C:\Windows\SysWOW64\Jhenjmbb.exe Jefbnacn.exe File opened for modification C:\Windows\SysWOW64\Kbmome32.exe Khgkpl32.exe File created C:\Windows\SysWOW64\Kenhopmf.exe Kocpbfei.exe File created C:\Windows\SysWOW64\Pehbqi32.dll Kenhopmf.exe File opened for modification C:\Windows\SysWOW64\Jefbnacn.exe Jlnmel32.exe File created C:\Windows\SysWOW64\Pcdapknb.dll Keioca32.exe File opened for modification C:\Windows\SysWOW64\Kdnkdmec.exe Kbmome32.exe File created C:\Windows\SysWOW64\Kpgionie.exe Kmimcbja.exe File created C:\Windows\SysWOW64\Jcqlkjae.exe Jpepkk32.exe File created C:\Windows\SysWOW64\Kbjbge32.exe Jhenjmbb.exe File created C:\Windows\SysWOW64\Kocpbfei.exe Klecfkff.exe File created C:\Windows\SysWOW64\Kmimcbja.exe Koflgf32.exe File opened for modification C:\Windows\SysWOW64\Jlnmel32.exe Jipaip32.exe File opened for modification C:\Windows\SysWOW64\Kageia32.exe Kmkihbho.exe File opened for modification C:\Windows\SysWOW64\Libjncnc.exe Kkojbf32.exe File opened for modification C:\Windows\SysWOW64\Jjhgbd32.exe 0143c7859f9f06d76079e3e689390d70N.exe File created C:\Windows\SysWOW64\Pccohd32.dll Jjhgbd32.exe File created C:\Windows\SysWOW64\Lpgcln32.dll Jefbnacn.exe File opened for modification C:\Windows\SysWOW64\Kenhopmf.exe Kocpbfei.exe File opened for modification C:\Windows\SysWOW64\Lbjofi32.exe Libjncnc.exe File opened for modification C:\Windows\SysWOW64\Jpepkk32.exe Jmfcop32.exe File created C:\Windows\SysWOW64\Jefbnacn.exe Jlnmel32.exe File created C:\Windows\SysWOW64\Koflgf32.exe Kenhopmf.exe File opened for modification C:\Windows\SysWOW64\Keioca32.exe Kbjbge32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1480 2796 WerFault.exe 54 -
System Location Discovery: System Language Discovery 1 TTPs 26 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kpgionie.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0143c7859f9f06d76079e3e689390d70N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jjhgbd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jmfcop32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Khgkpl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kageia32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Klecfkff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lbjofi32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Keioca32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kdnkdmec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Koflgf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kmimcbja.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Libjncnc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jpepkk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jcciqi32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kbjbge32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kocpbfei.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kmkihbho.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jlnmel32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kenhopmf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jcqlkjae.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jipaip32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kkojbf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jefbnacn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jhenjmbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kbmome32.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Jcqlkjae.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Jipaip32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Jipaip32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kmnfciac.dll" Jlnmel32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Jlnmel32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Jefbnacn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 0143c7859f9f06d76079e3e689390d70N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Jpepkk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Kdnkdmec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Kocpbfei.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Libjncnc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Libjncnc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Jhenjmbb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pdnfmn32.dll" Kdnkdmec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Jpepkk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Kbmome32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Kocpbfei.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Kageia32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bcbonpco.dll" 0143c7859f9f06d76079e3e689390d70N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Jmfcop32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mnpkephg.dll" Jipaip32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gffdobll.dll" Kageia32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mobafhlg.dll" Jhenjmbb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bodilc32.dll" Koflgf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aaqbpk32.dll" Jcqlkjae.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Kkojbf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID 0143c7859f9f06d76079e3e689390d70N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Jjhgbd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Keioca32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Kenhopmf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Koflgf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node 0143c7859f9f06d76079e3e689390d70N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dfaaak32.dll" Jmfcop32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Caefjg32.dll" Kbmome32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Kenhopmf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Koflgf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Kmkihbho.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Abqcpo32.dll" Kbjbge32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Kbjbge32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Klecfkff.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ffakjm32.dll" Klecfkff.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Klecfkff.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ipbkjl32.dll" Kkojbf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" 0143c7859f9f06d76079e3e689390d70N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Kbjbge32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Khgkpl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mkehop32.dll" Khgkpl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Kkojbf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717} 0143c7859f9f06d76079e3e689390d70N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Jcciqi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pehbqi32.dll" Kenhopmf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ipafocdg.dll" Libjncnc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pccohd32.dll" Jjhgbd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Khgkpl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lpgcln32.dll" Jefbnacn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Kbmome32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jlflfm32.dll" Kmkihbho.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cmojeo32.dll" Jpepkk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Jefbnacn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Jhenjmbb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pcdapknb.dll" Keioca32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jpnghhmn.dll" Kocpbfei.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Kpgionie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Jjhgbd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2672 wrote to memory of 1880 2672 0143c7859f9f06d76079e3e689390d70N.exe 30 PID 2672 wrote to memory of 1880 2672 0143c7859f9f06d76079e3e689390d70N.exe 30 PID 2672 wrote to memory of 1880 2672 0143c7859f9f06d76079e3e689390d70N.exe 30 PID 2672 wrote to memory of 1880 2672 0143c7859f9f06d76079e3e689390d70N.exe 30 PID 1880 wrote to memory of 3048 1880 Jjhgbd32.exe 31 PID 1880 wrote to memory of 3048 1880 Jjhgbd32.exe 31 PID 1880 wrote to memory of 3048 1880 Jjhgbd32.exe 31 PID 1880 wrote to memory of 3048 1880 Jjhgbd32.exe 31 PID 3048 wrote to memory of 2864 3048 Jmfcop32.exe 32 PID 3048 wrote to memory of 2864 3048 Jmfcop32.exe 32 PID 3048 wrote to memory of 2864 3048 Jmfcop32.exe 32 PID 3048 wrote to memory of 2864 3048 Jmfcop32.exe 32 PID 2864 wrote to memory of 2628 2864 Jpepkk32.exe 33 PID 2864 wrote to memory of 2628 2864 Jpepkk32.exe 33 PID 2864 wrote to memory of 2628 2864 Jpepkk32.exe 33 PID 2864 wrote to memory of 2628 2864 Jpepkk32.exe 33 PID 2628 wrote to memory of 2644 2628 Jcqlkjae.exe 34 PID 2628 wrote to memory of 2644 2628 Jcqlkjae.exe 34 PID 2628 wrote to memory of 2644 2628 Jcqlkjae.exe 34 PID 2628 wrote to memory of 2644 2628 Jcqlkjae.exe 34 PID 2644 wrote to memory of 1792 2644 Jcciqi32.exe 35 PID 2644 wrote to memory of 1792 2644 Jcciqi32.exe 35 PID 2644 wrote to memory of 1792 2644 Jcciqi32.exe 35 PID 2644 wrote to memory of 1792 2644 Jcciqi32.exe 35 PID 1792 wrote to memory of 1872 1792 Jipaip32.exe 36 PID 1792 wrote to memory of 1872 1792 Jipaip32.exe 36 PID 1792 wrote to memory of 1872 1792 Jipaip32.exe 36 PID 1792 wrote to memory of 1872 1792 Jipaip32.exe 36 PID 1872 wrote to memory of 2100 1872 Jlnmel32.exe 37 PID 1872 wrote to memory of 2100 1872 Jlnmel32.exe 37 PID 1872 wrote to memory of 2100 1872 Jlnmel32.exe 37 PID 1872 wrote to memory of 2100 1872 Jlnmel32.exe 37 PID 2100 wrote to memory of 1820 2100 Jefbnacn.exe 38 PID 2100 wrote to memory of 1820 2100 Jefbnacn.exe 38 PID 2100 wrote to memory of 1820 2100 Jefbnacn.exe 38 PID 2100 wrote to memory of 1820 2100 Jefbnacn.exe 38 PID 1820 wrote to memory of 2848 1820 Jhenjmbb.exe 39 PID 1820 wrote to memory of 2848 1820 Jhenjmbb.exe 39 PID 1820 wrote to memory of 2848 1820 Jhenjmbb.exe 39 PID 1820 wrote to memory of 2848 1820 Jhenjmbb.exe 39 PID 2848 wrote to memory of 448 2848 Kbjbge32.exe 40 PID 2848 wrote to memory of 448 2848 Kbjbge32.exe 40 PID 2848 wrote to memory of 448 2848 Kbjbge32.exe 40 PID 2848 wrote to memory of 448 2848 Kbjbge32.exe 40 PID 448 wrote to memory of 2956 448 Keioca32.exe 41 PID 448 wrote to memory of 2956 448 Keioca32.exe 41 PID 448 wrote to memory of 2956 448 Keioca32.exe 41 PID 448 wrote to memory of 2956 448 Keioca32.exe 41 PID 2956 wrote to memory of 484 2956 Khgkpl32.exe 42 PID 2956 wrote to memory of 484 2956 Khgkpl32.exe 42 PID 2956 wrote to memory of 484 2956 Khgkpl32.exe 42 PID 2956 wrote to memory of 484 2956 Khgkpl32.exe 42 PID 484 wrote to memory of 772 484 Kbmome32.exe 43 PID 484 wrote to memory of 772 484 Kbmome32.exe 43 PID 484 wrote to memory of 772 484 Kbmome32.exe 43 PID 484 wrote to memory of 772 484 Kbmome32.exe 43 PID 772 wrote to memory of 2320 772 Kdnkdmec.exe 44 PID 772 wrote to memory of 2320 772 Kdnkdmec.exe 44 PID 772 wrote to memory of 2320 772 Kdnkdmec.exe 44 PID 772 wrote to memory of 2320 772 Kdnkdmec.exe 44 PID 2320 wrote to memory of 2372 2320 Klecfkff.exe 45 PID 2320 wrote to memory of 2372 2320 Klecfkff.exe 45 PID 2320 wrote to memory of 2372 2320 Klecfkff.exe 45 PID 2320 wrote to memory of 2372 2320 Klecfkff.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\0143c7859f9f06d76079e3e689390d70N.exe"C:\Users\Admin\AppData\Local\Temp\0143c7859f9f06d76079e3e689390d70N.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\SysWOW64\Jjhgbd32.exeC:\Windows\system32\Jjhgbd32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Windows\SysWOW64\Jmfcop32.exeC:\Windows\system32\Jmfcop32.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Windows\SysWOW64\Jpepkk32.exeC:\Windows\system32\Jpepkk32.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\SysWOW64\Jcqlkjae.exeC:\Windows\system32\Jcqlkjae.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Windows\SysWOW64\Jcciqi32.exeC:\Windows\system32\Jcciqi32.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\SysWOW64\Jipaip32.exeC:\Windows\system32\Jipaip32.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Windows\SysWOW64\Jlnmel32.exeC:\Windows\system32\Jlnmel32.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Windows\SysWOW64\Jefbnacn.exeC:\Windows\system32\Jefbnacn.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Windows\SysWOW64\Jhenjmbb.exeC:\Windows\system32\Jhenjmbb.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Windows\SysWOW64\Kbjbge32.exeC:\Windows\system32\Kbjbge32.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\SysWOW64\Keioca32.exeC:\Windows\system32\Keioca32.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:448 -
C:\Windows\SysWOW64\Khgkpl32.exeC:\Windows\system32\Khgkpl32.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Windows\SysWOW64\Kbmome32.exeC:\Windows\system32\Kbmome32.exe14⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:484 -
C:\Windows\SysWOW64\Kdnkdmec.exeC:\Windows\system32\Kdnkdmec.exe15⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:772 -
C:\Windows\SysWOW64\Klecfkff.exeC:\Windows\system32\Klecfkff.exe16⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Windows\SysWOW64\Kocpbfei.exeC:\Windows\system32\Kocpbfei.exe17⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2372 -
C:\Windows\SysWOW64\Kenhopmf.exeC:\Windows\system32\Kenhopmf.exe18⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1500 -
C:\Windows\SysWOW64\Koflgf32.exeC:\Windows\system32\Koflgf32.exe19⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:832 -
C:\Windows\SysWOW64\Kmimcbja.exeC:\Windows\system32\Kmimcbja.exe20⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1748 -
C:\Windows\SysWOW64\Kpgionie.exeC:\Windows\system32\Kpgionie.exe21⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2660 -
C:\Windows\SysWOW64\Kmkihbho.exeC:\Windows\system32\Kmkihbho.exe22⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2664 -
C:\Windows\SysWOW64\Kageia32.exeC:\Windows\system32\Kageia32.exe23⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:976 -
C:\Windows\SysWOW64\Kkojbf32.exeC:\Windows\system32\Kkojbf32.exe24⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:880 -
C:\Windows\SysWOW64\Libjncnc.exeC:\Windows\system32\Libjncnc.exe25⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2112 -
C:\Windows\SysWOW64\Lbjofi32.exeC:\Windows\system32\Lbjofi32.exe26⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2796 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2796 -s 14027⤵
- Loads dropped DLL
- Program crash
PID:1480
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7KB
MD550d21a5e6228f03374a504457c0dd9ed
SHA1784633a40e85c84801a16a42349faf401c88fda1
SHA2569c3730df756066a8bbd407a920170a2fc7597b55580290146dafb6c056d632d1
SHA5129552fb5c7ba1d680605e9f8af2c4eff72b5581ec9cf44aae91bedc18d143b6c19f49492e4bd747f21826c6933c02eb29cbfaf5e6c3f09ad49305b3cc03c3ffc0
-
Filesize
89KB
MD5f990d04debcfb53b0f253428d1fb7c89
SHA1fa67f33259486bdfd266fe7ba5dca1729380d7c0
SHA256663de9bbfae832b432e15e8626a1233e154a93618ea7ec283f68faab99429919
SHA512763b80b368ff07659be4fcdb52ef5090eee71934a7cb9546478cd02e624718f0e4bb82660f71948ca3a532e2c800115b99d67d1bf568f3cf0eecae9bca01d601
-
Filesize
89KB
MD5de5ce1eb1f331a9ccf31650904e37150
SHA1057dd173866fd99625a5c03f3a60d68b06da0531
SHA25691794994e7b2c36c0cd2428f1b2a3cb7f390eb15a98d075553a6e69022c4e8b6
SHA5128433ca272a310a82949767be884ac4ea35c4b4612410d5b5bc8abe97a9c847ec39e5ce72b965f46246028c155c6a921603e2b354545227b648ac419c4066d109
-
Filesize
89KB
MD59f230d58b2180dab532cd1bf82cf887d
SHA19dd0f37f3ca6167342829dea0d89949ad4f5501f
SHA256eb29d7ac3f616f2189efa1142508c7ec6ec85147f95e87bc177c2794260294c7
SHA5124eeb8c91c49b2b84cc6fc3e469e796cd49b1c01824b82aabf019f0e40609df43a7056c074833dc90731510a955e1bb00efad91bc680d6181063ac6a7fcf7e319
-
Filesize
89KB
MD536a7c0940181903166efc64c6d09546c
SHA1215da8df15a247648fd549cc74469f593ff5f731
SHA25617468a9d093d4e6a2ef6d1f7b65e3665a79808e2ad6fce950e624804109b6946
SHA51242a3d76ab3436b92fcdc6be071d6f45008a6dc8970c5c3fcac1bc8cd5ccff77d5ffc8ec9c1ac7a967f2a2f9017f3fbd034ca6d41f4a636c7961b63e57d8c6a29
-
Filesize
89KB
MD59b7aeb78b032c0151396f77f445f6360
SHA1799d17772530f5a8070a1db2565ae8686a399f45
SHA256ce3d585f81465c6c24ae6f515211eb28ce8d6e12928d1a72eeb5d2925e87d78e
SHA5123ec78b0ab55d691e09829152a81b3e25f02ee2e1d08613b623a6e99130a65748770dc88d02d20a3072e359c1abcd4e2120cbf191fef1890887f33f597abc9d2d
-
Filesize
89KB
MD55a4a3665daacfcc5a7e3504761cb68e3
SHA118eea23bd3c6cd03849a2c3d6790aa7094af9589
SHA25649222720163c7fe9cfe4836a9a26cfea58fb11be1cfbfb6e860ae24d48e6cde9
SHA5120792355bb5432e83c7e671283e08d90ef2f28f4d46ada81d50e7823f2955e970ca5bf53d00cc120419ea7b644a0495aeba3d4562abdc60f97d471d9c2da4ea93
-
Filesize
89KB
MD5b8800f8a451f263afceb0297d7ebc804
SHA16a6213fcac2a8ef74443e2684c8b10e2a56a4324
SHA2569576cb316f398a33ac8c58bd8daf4f1b0fb6651f578adbfda52c1a9e206e0f95
SHA512636702140078bcc59bbeea138510136cc49c881bd24534bb7c213ba51a8bbee31b6c01fbfac107e8b38b1b099ecc7914b02ed0e27d42d782f2ab1c36e40a8273
-
Filesize
89KB
MD5705a3e6a49c0be3ae6bb7242ec260f88
SHA197f2615c57d5c96b16c4d0cb356426b22a55ecc1
SHA256076e7ab53fc1530e7f7faee612e99217ca98a150687c9f32359f0703338b7bf0
SHA5120203ddd33a92f700823bb14d461e7d2f057a70a9b4411dc5925a34ca30608955c3de81a1872df46512d9c6ff1982ddf1545dacd7e8d86cca8421d067f22e5e23
-
Filesize
89KB
MD58d20921f31d1758bb5bb85ceebbb3fda
SHA135d136fd1603926c1e6df568033c6971f3e203ef
SHA256affa2c7be617799f19c44af736502de311687526d1342ad872d44d5ba634cfd3
SHA512415ecdaaab59c06053baa02fcd9fd4f2e2d7f095ffdc826ea430ab9e8b832a22302718f48a13cf6ba3376c1c741c19ccdfd7a18fe117d353557a1190a5f6fdf1
-
Filesize
89KB
MD5305e1320243db0a941c93557e6fdc821
SHA17ec7c6482f71725711464e2f040dcc14d8427264
SHA2563961eabc7954bb2bbce94295a5479833d31d854177976932f957079aedf4347d
SHA51237c0e0f8bc434367d8414fe2c2ac49da2cdc4ef72ce999f9fd78375c93f06304d08b16b492ace58ab8e2fc01d625621050cccf0ed58a9ac6e378c827114c7b28
-
Filesize
89KB
MD5e945640ca8b98eab1e7b2f573cfe7cb9
SHA17b143fce2e499003e0af04a2590a4cb7072eeb97
SHA256672b1f9308126ce48c77669b5ff2db751ed70fda74d56b2646cc117f032fb43d
SHA5127aee3e573076196063ef2fe7fd62d67e545bcbb3b29c390610b3ee4cf4ea101758801f2e9506b239e113194d860555274382d0feed53c620737e808b6a2d9eaa
-
Filesize
89KB
MD56f0e3d5829396d719123316fe41b714c
SHA1c7c275a12b900824a5737f4110b45714ec83bb51
SHA25685dd4b215c799c374d457cce798c4f3f8868a807067de7e6ca519863389aeaf8
SHA512159f335bcc98ee9aaf7ce717e7dd92c317d87dfb7359f498ed7129729815c4e2f0e2b5ffc151245f7b5600b9f4736b09675bc5f684536c125708c48fdb8ac8ea
-
Filesize
89KB
MD568717731ac64a70d5d18cf5e8590ee2a
SHA16850250d81ab6bae7950d4fb0757a24fa1e9b680
SHA256d7dff5580adbd5a6519ca5912f406bf1e5ede8762784b1887f821d12a995ba29
SHA5128cae40f645d034a7d5203d962bb42dacdaf7875ec080529cfceb262fa703fe772ac5a6c5853f65b594758239843021046b19d3e590e62b711d4d147fdd55b3fa
-
Filesize
89KB
MD53e33d76cc26a58aea591026e123d4d49
SHA1bbdeed4f8246947e2a3d3738893c65e60d3aa63a
SHA256459463484ea092ac908d78f9b216f2af3e41d615b2c5a1865431a104ecd17cd0
SHA5121d58d8c3d16621433433a22e98418cef3751154e38c0f61f0309d88ce60524f5d2d16efa6959baae5cd01ce14c1bb4e5631acaa3cfdd301d63171169c4855204
-
Filesize
89KB
MD50d49175844817b63b4b3ec1b3cd9f468
SHA15af8b3d039a909d7d83e9ab54f98e3ab1912322f
SHA2560d18d247532e5e12dffd2a43d608678ea7034ff0243c0f7248045a95a70bb8fa
SHA51250820517ddfcf76dfcecc2a074c0fcbccdf107aa5fda057d2c55edfccdff7ab1a4e709ce2f6dacc7adbf6734556132d1cd949e97ed6d7abccbd7105e8bb5c58b
-
Filesize
89KB
MD5d4b049e4ca3384ae22319a8d0688c891
SHA1794ab562937a8b8f8cace281814e811bb4324d9a
SHA25602bbcfb9d0ceb78f83332e7def01ce06474794c63ab5cf2092d2ccdadbc84b2c
SHA512e17f915fc00d0a017618234854d621e65785a528a846d6ed9c714f2eac4a1987b4c8aafd78800e6e6776c1bcc8066923ed2a925de296f58acb967e6a2f330aed
-
Filesize
89KB
MD5abc6bf097110b2a7dd3ad6c1a23de85b
SHA1059f5af58f061d88c395542caebd24f39467fd2f
SHA2563409193137fe769c7178510d7ed0268bf1a02136d0e807172b16fe0db4d678a5
SHA512b00d543e5ea128d4a4d7b38ceab0cdbd299e69c10f1e98e9328e1e34f9c6ee61707e0067e484b724692ea6975f36c975cb65e9de3f06ffb5aa27108921d2c9a2
-
Filesize
89KB
MD5b288a6d2fcebe4ecc6efde89e2259707
SHA11850ac8b06472b72a1879966e9d70980d4f09a4b
SHA2562af61b9b07028aee6a7f3da1f12a809365fad39da812bad99b8fe13e68eab37b
SHA512a47a47061c159e907869ce4fb60333a45576d3af794b23c9c950916aad9a9bec3b9d0ee31ddfde54ca75e24b549bacc1eb4e30f7177ee4851d81ee363605c2be
-
Filesize
89KB
MD5100a42789517ee9bdf0715b0fd1f3b8e
SHA12e0dcb502bbfd39d3bb31aa4e594a3b561c51e28
SHA256bc36080d2e941e2d328799e08f51c6fcaf58cf10523186f5ba0100000dfaadc7
SHA512ff622e90354e4cfa6cd77c2183c180cd1abdaa1e2bdf88f598b2a2345c99357ceabc1b233d17638b8234037629e5e804b2dc45dd7a2545eaa7633c38f52bf48e
-
Filesize
89KB
MD59ae5b6a7944ca76e43d9c05c33a0b283
SHA12a20a04ffc7459573fd67055c85dd9599bd56442
SHA256f11c20815654ee33ab3e7ecc5c53208d6323b56f8e770a336b2c5defb362fbee
SHA5123aab0379030047dba223f959307a58cca51e630abc767f3a2296c81a6749d00fd09bee38e36029dfc4c280cbc747a46b1e8721cf87e447d0b9a4255a53d032a1
-
Filesize
89KB
MD5221c229c545ffd93e4d7ab9ea37e9b6e
SHA1c01e4acf37d302d7d0510dc52f7176f0f81e6398
SHA25649bb338961a35c8ab4ff3419f35e5e66a46e25816de25256d258ffbc3cbac7fa
SHA5129aecb12e6452581ef7c7244aa2e2f83bf132ee8cb5f714a790e3317a6ad141b40940ad3365c955e125ed7c084304f3ebe38498b55a4704fefe91fe7519b4ab8c
-
Filesize
89KB
MD5cc09be7b1beaeea8413218862098c2a9
SHA1794be7723e96e7995b55fc74dfffad214ae247d6
SHA256ec897ee6080fb7f2f70928f1bcd5f679c44aa0717ef42d93f952ba4e667771dc
SHA512de5bbf110c6741b58a7dfd9535bfd0d52449cd19ea4cb7ffbb84847f16dc0fe1256f277f444f24a6a04a2a695fd6fcf148995f8828eabf1e84879850b3d64d50
-
Filesize
89KB
MD5a06d92655725a006d79e6681704d1f3b
SHA183bcf5653d0cc34917d9a309da9e60742073b221
SHA25634f449feab69a1249623751e54669b2d5eb32de8d0de3d6d093ba63c34184182
SHA5126e64540e1a92d48182a0c39e49897e3ce7dfbe37bfa4eb3611115ba7041e21cc43374a22043f04027a1b026fa9b8d8e014493c6e197291ff5622c636bfbbb40f
-
Filesize
89KB
MD54e4ade067565af4adddf9639e7f37f3b
SHA1c97d7d6779c1bf8bfcb91ad6dfdd7995c85c8ff5
SHA25633b6c339fd8d2cdc790c1e12685f800880fcadb59ebd76e04f52a8d8b60860a7
SHA512ffb37a4ce91215c8147a80524daf1d79783c3338915675e873ec5610c2a1084ae722b2a7c21d16068e597ea6eb1947db8739f5a0e5515c4c99232669a3c11bb6
-
Filesize
89KB
MD557ce40f0b31770999d6d205f5fc8cb3a
SHA19135b2d2f412301f30abb0a499e1b42cf4cd1c68
SHA2565e4127a8c018e0e08206ec49bfb530223b42f92e71b051bf97d891a222d42afa
SHA512009864418a9b71f65c85b460a06e6bdd883b882204f497a94b56393456c0d96dc85215a08efd8e2f396a53c4fb469ea8bafe98ea70cecdfced84f142d1840678