Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03/09/2024, 06:50
Static task
static1
Behavioral task
behavioral1
Sample
fe01b92794805f41931d81a1958ccd43d986e6a3d012219084c6b4014a420841.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fe01b92794805f41931d81a1958ccd43d986e6a3d012219084c6b4014a420841.exe
Resource
win10v2004-20240802-en
General
-
Target
fe01b92794805f41931d81a1958ccd43d986e6a3d012219084c6b4014a420841.exe
-
Size
67KB
-
MD5
eee4207ed42455d8df6553215c1bfed5
-
SHA1
3bf5161f0d3afea08296728ddb56a3348399ad26
-
SHA256
fe01b92794805f41931d81a1958ccd43d986e6a3d012219084c6b4014a420841
-
SHA512
feecd72f71c7662315c5ac891399b88f39b92662082bc4f598865a84c589fdff4776400d39be38745054419a1157125d9ecadeb5eb3eebe007d20b9abe7fb09b
-
SSDEEP
1536:VbS4S09TPvDyd+cFMinCYkkDZFmR3w+b+qX6SAPNRQxR/Rj:JS4SYjvAFMdYk4K35aw6SAPNexVx
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 28 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Clojhf32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad fe01b92794805f41931d81a1958ccd43d986e6a3d012219084c6b4014a420841.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cbdiia32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cgaaah32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Djdgic32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Clojhf32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Djdgic32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cmpgpond.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cebeem32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ceebklai.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Cmpgpond.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cegoqlof.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Cgoelh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Cbdiia32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Cebeem32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Cnkjnb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Cegoqlof.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cgfkmgnj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Danpemej.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cbblda32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Cbblda32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Cgaaah32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cnkjnb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Cgfkmgnj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" fe01b92794805f41931d81a1958ccd43d986e6a3d012219084c6b4014a420841.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cgoelh32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ceebklai.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Danpemej.exe -
Executes dropped EXE 14 IoCs
pid Process 988 Cbblda32.exe 2192 Cgoelh32.exe 2712 Cbdiia32.exe 2860 Cebeem32.exe 2560 Cgaaah32.exe 2592 Cnkjnb32.exe 2360 Ceebklai.exe 2880 Clojhf32.exe 664 Cmpgpond.exe 2064 Cegoqlof.exe 1008 Cgfkmgnj.exe 1608 Djdgic32.exe 484 Danpemej.exe 2140 Dpapaj32.exe -
Loads dropped DLL 28 IoCs
pid Process 3060 fe01b92794805f41931d81a1958ccd43d986e6a3d012219084c6b4014a420841.exe 3060 fe01b92794805f41931d81a1958ccd43d986e6a3d012219084c6b4014a420841.exe 988 Cbblda32.exe 988 Cbblda32.exe 2192 Cgoelh32.exe 2192 Cgoelh32.exe 2712 Cbdiia32.exe 2712 Cbdiia32.exe 2860 Cebeem32.exe 2860 Cebeem32.exe 2560 Cgaaah32.exe 2560 Cgaaah32.exe 2592 Cnkjnb32.exe 2592 Cnkjnb32.exe 2360 Ceebklai.exe 2360 Ceebklai.exe 2880 Clojhf32.exe 2880 Clojhf32.exe 664 Cmpgpond.exe 664 Cmpgpond.exe 2064 Cegoqlof.exe 2064 Cegoqlof.exe 1008 Cgfkmgnj.exe 1008 Cgfkmgnj.exe 1608 Djdgic32.exe 1608 Djdgic32.exe 484 Danpemej.exe 484 Danpemej.exe -
Drops file in System32 directory 42 IoCs
description ioc Process File created C:\Windows\SysWOW64\Ednoihel.dll fe01b92794805f41931d81a1958ccd43d986e6a3d012219084c6b4014a420841.exe File created C:\Windows\SysWOW64\Cbdiia32.exe Cgoelh32.exe File opened for modification C:\Windows\SysWOW64\Cbdiia32.exe Cgoelh32.exe File opened for modification C:\Windows\SysWOW64\Cebeem32.exe Cbdiia32.exe File created C:\Windows\SysWOW64\Cnkjnb32.exe Cgaaah32.exe File opened for modification C:\Windows\SysWOW64\Cnkjnb32.exe Cgaaah32.exe File created C:\Windows\SysWOW64\Cpmahlfd.dll Cegoqlof.exe File created C:\Windows\SysWOW64\Dpapaj32.exe Danpemej.exe File created C:\Windows\SysWOW64\Cebeem32.exe Cbdiia32.exe File created C:\Windows\SysWOW64\Pcaibd32.dll Clojhf32.exe File created C:\Windows\SysWOW64\Nloone32.dll Cmpgpond.exe File opened for modification C:\Windows\SysWOW64\Cgfkmgnj.exe Cegoqlof.exe File created C:\Windows\SysWOW64\Kgloog32.dll Cnkjnb32.exe File opened for modification C:\Windows\SysWOW64\Clojhf32.exe Ceebklai.exe File opened for modification C:\Windows\SysWOW64\Djdgic32.exe Cgfkmgnj.exe File created C:\Windows\SysWOW64\Ccofjipn.dll Cgfkmgnj.exe File opened for modification C:\Windows\SysWOW64\Dpapaj32.exe Danpemej.exe File created C:\Windows\SysWOW64\Cgoelh32.exe Cbblda32.exe File created C:\Windows\SysWOW64\Jidmcq32.dll Cbblda32.exe File created C:\Windows\SysWOW64\Kaqnpc32.dll Cebeem32.exe File created C:\Windows\SysWOW64\Liempneg.dll Cgaaah32.exe File opened for modification C:\Windows\SysWOW64\Danpemej.exe Djdgic32.exe File created C:\Windows\SysWOW64\Cmpgpond.exe Clojhf32.exe File created C:\Windows\SysWOW64\Djdgic32.exe Cgfkmgnj.exe File created C:\Windows\SysWOW64\Cbehjc32.dll Djdgic32.exe File created C:\Windows\SysWOW64\Cbblda32.exe fe01b92794805f41931d81a1958ccd43d986e6a3d012219084c6b4014a420841.exe File opened for modification C:\Windows\SysWOW64\Cgoelh32.exe Cbblda32.exe File opened for modification C:\Windows\SysWOW64\Cgaaah32.exe Cebeem32.exe File created C:\Windows\SysWOW64\Ceebklai.exe Cnkjnb32.exe File created C:\Windows\SysWOW64\Efeckm32.dll Ceebklai.exe File created C:\Windows\SysWOW64\Pdkefp32.dll Danpemej.exe File created C:\Windows\SysWOW64\Fnbkfl32.dll Cbdiia32.exe File opened for modification C:\Windows\SysWOW64\Cmpgpond.exe Clojhf32.exe File created C:\Windows\SysWOW64\Cegoqlof.exe Cmpgpond.exe File created C:\Windows\SysWOW64\Cgfkmgnj.exe Cegoqlof.exe File opened for modification C:\Windows\SysWOW64\Cegoqlof.exe Cmpgpond.exe File created C:\Windows\SysWOW64\Danpemej.exe Djdgic32.exe File opened for modification C:\Windows\SysWOW64\Cbblda32.exe fe01b92794805f41931d81a1958ccd43d986e6a3d012219084c6b4014a420841.exe File created C:\Windows\SysWOW64\Fhgpia32.dll Cgoelh32.exe File created C:\Windows\SysWOW64\Cgaaah32.exe Cebeem32.exe File opened for modification C:\Windows\SysWOW64\Ceebklai.exe Cnkjnb32.exe File created C:\Windows\SysWOW64\Clojhf32.exe Ceebklai.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\system32†Edggmg32.¾ll Dpapaj32.exe -
System Location Discovery: System Language Discovery 1 TTPs 15 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dpapaj32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cbdiia32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ceebklai.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cgfkmgnj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Djdgic32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Danpemej.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fe01b92794805f41931d81a1958ccd43d986e6a3d012219084c6b4014a420841.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cbblda32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cmpgpond.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cegoqlof.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Clojhf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cgoelh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cebeem32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cgaaah32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cnkjnb32.exe -
Modifies registry class 50 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Efeckm32.dll" Ceebklai.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fhgpia32.dll" Cgoelh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Cgoelh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Cbdiia32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Cgaaah32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Cbblda32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Clojhf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Cgfkmgnj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CL‰ID Dpapaj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Cnkjnb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831} fe01b92794805f41931d81a1958ccd43d986e6a3d012219084c6b4014a420841.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ednoihel.dll" fe01b92794805f41931d81a1958ccd43d986e6a3d012219084c6b4014a420841.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jidmcq32.dll" Cbblda32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fnbkfl32.dll" Cbdiia32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Ceebklai.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Cbblda32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Djdgic32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CL‰ID\ÿs\I´Pro¹Ser¬er3è Dpapaj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nloone32.dll" Cmpgpond.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CL‰ID\ÿs Dpapaj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Cnkjnb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Cgoelh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Cebeem32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID fe01b92794805f41931d81a1958ccd43d986e6a3d012219084c6b4014a420841.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kaqnpc32.dll" Cebeem32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Cgaaah32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cpmahlfd.dll" Cegoqlof.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Cgfkmgnj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CL‰ID\ÿs\I´Pro¹Ser¬er3è\Th¨ead³ngMµdelÚ = "›par®men®" Dpapaj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Cmpgpond.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Cmpgpond.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Cegoqlof.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ccofjipn.dll" Cgfkmgnj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cbehjc32.dll" Djdgic32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Djdgic32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Danpemej.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" fe01b92794805f41931d81a1958ccd43d986e6a3d012219084c6b4014a420841.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Cegoqlof.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node fe01b92794805f41931d81a1958ccd43d986e6a3d012219084c6b4014a420841.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Cbdiia32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Cebeem32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kgloog32.dll" Cnkjnb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pcaibd32.dll" Clojhf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CL‰ID\ÿs\I´Pro¹Ser¬er3è\ = "C:\\Windows\\system32†Edggmg32.¾ll" Dpapaj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 fe01b92794805f41931d81a1958ccd43d986e6a3d012219084c6b4014a420841.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Liempneg.dll" Cgaaah32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Ceebklai.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Clojhf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Danpemej.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pdkefp32.dll" Danpemej.exe -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 3060 wrote to memory of 988 3060 fe01b92794805f41931d81a1958ccd43d986e6a3d012219084c6b4014a420841.exe 31 PID 3060 wrote to memory of 988 3060 fe01b92794805f41931d81a1958ccd43d986e6a3d012219084c6b4014a420841.exe 31 PID 3060 wrote to memory of 988 3060 fe01b92794805f41931d81a1958ccd43d986e6a3d012219084c6b4014a420841.exe 31 PID 3060 wrote to memory of 988 3060 fe01b92794805f41931d81a1958ccd43d986e6a3d012219084c6b4014a420841.exe 31 PID 988 wrote to memory of 2192 988 Cbblda32.exe 32 PID 988 wrote to memory of 2192 988 Cbblda32.exe 32 PID 988 wrote to memory of 2192 988 Cbblda32.exe 32 PID 988 wrote to memory of 2192 988 Cbblda32.exe 32 PID 2192 wrote to memory of 2712 2192 Cgoelh32.exe 33 PID 2192 wrote to memory of 2712 2192 Cgoelh32.exe 33 PID 2192 wrote to memory of 2712 2192 Cgoelh32.exe 33 PID 2192 wrote to memory of 2712 2192 Cgoelh32.exe 33 PID 2712 wrote to memory of 2860 2712 Cbdiia32.exe 34 PID 2712 wrote to memory of 2860 2712 Cbdiia32.exe 34 PID 2712 wrote to memory of 2860 2712 Cbdiia32.exe 34 PID 2712 wrote to memory of 2860 2712 Cbdiia32.exe 34 PID 2860 wrote to memory of 2560 2860 Cebeem32.exe 35 PID 2860 wrote to memory of 2560 2860 Cebeem32.exe 35 PID 2860 wrote to memory of 2560 2860 Cebeem32.exe 35 PID 2860 wrote to memory of 2560 2860 Cebeem32.exe 35 PID 2560 wrote to memory of 2592 2560 Cgaaah32.exe 36 PID 2560 wrote to memory of 2592 2560 Cgaaah32.exe 36 PID 2560 wrote to memory of 2592 2560 Cgaaah32.exe 36 PID 2560 wrote to memory of 2592 2560 Cgaaah32.exe 36 PID 2592 wrote to memory of 2360 2592 Cnkjnb32.exe 37 PID 2592 wrote to memory of 2360 2592 Cnkjnb32.exe 37 PID 2592 wrote to memory of 2360 2592 Cnkjnb32.exe 37 PID 2592 wrote to memory of 2360 2592 Cnkjnb32.exe 37 PID 2360 wrote to memory of 2880 2360 Ceebklai.exe 38 PID 2360 wrote to memory of 2880 2360 Ceebklai.exe 38 PID 2360 wrote to memory of 2880 2360 Ceebklai.exe 38 PID 2360 wrote to memory of 2880 2360 Ceebklai.exe 38 PID 2880 wrote to memory of 664 2880 Clojhf32.exe 39 PID 2880 wrote to memory of 664 2880 Clojhf32.exe 39 PID 2880 wrote to memory of 664 2880 Clojhf32.exe 39 PID 2880 wrote to memory of 664 2880 Clojhf32.exe 39 PID 664 wrote to memory of 2064 664 Cmpgpond.exe 40 PID 664 wrote to memory of 2064 664 Cmpgpond.exe 40 PID 664 wrote to memory of 2064 664 Cmpgpond.exe 40 PID 664 wrote to memory of 2064 664 Cmpgpond.exe 40 PID 2064 wrote to memory of 1008 2064 Cegoqlof.exe 41 PID 2064 wrote to memory of 1008 2064 Cegoqlof.exe 41 PID 2064 wrote to memory of 1008 2064 Cegoqlof.exe 41 PID 2064 wrote to memory of 1008 2064 Cegoqlof.exe 41 PID 1008 wrote to memory of 1608 1008 Cgfkmgnj.exe 42 PID 1008 wrote to memory of 1608 1008 Cgfkmgnj.exe 42 PID 1008 wrote to memory of 1608 1008 Cgfkmgnj.exe 42 PID 1008 wrote to memory of 1608 1008 Cgfkmgnj.exe 42 PID 1608 wrote to memory of 484 1608 Djdgic32.exe 43 PID 1608 wrote to memory of 484 1608 Djdgic32.exe 43 PID 1608 wrote to memory of 484 1608 Djdgic32.exe 43 PID 1608 wrote to memory of 484 1608 Djdgic32.exe 43 PID 484 wrote to memory of 2140 484 Danpemej.exe 44 PID 484 wrote to memory of 2140 484 Danpemej.exe 44 PID 484 wrote to memory of 2140 484 Danpemej.exe 44 PID 484 wrote to memory of 2140 484 Danpemej.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\fe01b92794805f41931d81a1958ccd43d986e6a3d012219084c6b4014a420841.exe"C:\Users\Admin\AppData\Local\Temp\fe01b92794805f41931d81a1958ccd43d986e6a3d012219084c6b4014a420841.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Windows\SysWOW64\Cbblda32.exeC:\Windows\system32\Cbblda32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:988 -
C:\Windows\SysWOW64\Cgoelh32.exeC:\Windows\system32\Cgoelh32.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\SysWOW64\Cbdiia32.exeC:\Windows\system32\Cbdiia32.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\SysWOW64\Cebeem32.exeC:\Windows\system32\Cebeem32.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Windows\SysWOW64\Cgaaah32.exeC:\Windows\system32\Cgaaah32.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\SysWOW64\Cnkjnb32.exeC:\Windows\system32\Cnkjnb32.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Windows\SysWOW64\Ceebklai.exeC:\Windows\system32\Ceebklai.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Windows\SysWOW64\Clojhf32.exeC:\Windows\system32\Clojhf32.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Windows\SysWOW64\Cmpgpond.exeC:\Windows\system32\Cmpgpond.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:664 -
C:\Windows\SysWOW64\Cegoqlof.exeC:\Windows\system32\Cegoqlof.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Windows\SysWOW64\Cgfkmgnj.exeC:\Windows\system32\Cgfkmgnj.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1008 -
C:\Windows\SysWOW64\Djdgic32.exeC:\Windows\system32\Djdgic32.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Windows\SysWOW64\Danpemej.exeC:\Windows\system32\Danpemej.exe14⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:484 -
C:\Windows\SysWOW64\Dpapaj32.exeC:\Windows\system32\Dpapaj32.exe15⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2140
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD58485a024403620415f5da3d199900331
SHA1c0ff222995edbc4878b8274d35c67ad5a89d5399
SHA2563863b147588cc706eca63ee817246decace88bd09e3e15bb7548fee6e63d9daa
SHA512737983046ffcba6f82faa67910fe0fdb3a41100ede3159d6d30c62af11d2b10d46a024027d46c0fe1d6016dead8666120900366625328fb6252f5ca55a36fabc
-
Filesize
67KB
MD55567eff7792f7ff15c1ee0f8b87e4fcc
SHA192e323c40d710f964cb0e2a0d411b898fa588464
SHA256a4991feaa4ecaf784b59f6db8ea111cdd956599798e07213d14e13354b2f1ad3
SHA512a37e9072dbfafc4180431eb950a26349de85e6e6952bf31c557c417ef2258cae21ebc1cabad404d6ba31af5538838bea03ecf34563ec688d3f280d52b653f8f1
-
Filesize
67KB
MD580d301ec775eece739c512270eda4c63
SHA17bc1d81d96554758a830b88d22a8134abc0518f5
SHA256c7eaab98102b7c9f3c5a1de1e2f6fc02a87cd56b87e97086c16eb813bebe8770
SHA5123cbed598f02ea85fb6ace0a8d9491d6ab91828af635bedf815f55606413dc210da0543cfa9515e34437e356982684057091786bf3a0cee00a5f733df37e17176
-
Filesize
67KB
MD5a7b3fc964de13609b8652be2baacbcf6
SHA1c77e8c103ebb3721ea8bfa0a5682f6187a6d0c6d
SHA2563528a917c630530832d8ad6e76c08a08bf470af5a651485b026cca9f4a75607d
SHA5129a19f69eada8965a9ffaf030647c370c54af67f7fa2be77f8b2c316dc643c131edd8d3214530d0f0d07b0140a444c1af23af35bbea62376d1ce9df9d3402f095
-
Filesize
7KB
MD53de74b4ec464db84c3154cc340a17fb1
SHA139760899fc848c33814c77cb904de161b4a4b106
SHA256658abc56034cd15a69c07dbe6e04b458906a263a5281a9010504cf0003ab8f7a
SHA512a59368b2a95b87ceb1bb641b3e1afce834b480bdd7475cb3a61783bae5bf1d041d8f861c1302c215309a6ecbefa83840a30a825c25ba34e18d1895be7caf0b3e
-
Filesize
67KB
MD5f673eee8f349dac8a0e17348b9d36037
SHA19cfd983d1b33e5b3ca22598eb2232bbe5cdf759b
SHA256dbe9a40badd980a03bac9807f487babe991629996323754b2fda8500d5bd8093
SHA5120700c9a3dcea6ae27419c3622a0ef49454a042e54f02f985bf112717e67688399b76df0caa602a005f28b5dd3cea0d87acf3feee1bd912b28cfd7bf3a481b522
-
Filesize
67KB
MD5a0191204253ac0efc8332ca252e34d8c
SHA18024ab2f92f7c89c9aa8bbc49b59372237a2f30b
SHA2562645d55d4c8b67754e9fbab8f7a4b34ba1c2ca952a0c5e435c6bd8b029184cd8
SHA5120baa9421a2aa1cb2e614fadf7aa5fbd873688553d9fb2cd42f954b543c2812458b1f511506b420edb4e2631c890a7c221bb824a87303ec89611585ef5505babc
-
Filesize
67KB
MD5f3b4d282b514774fa27380487b39452e
SHA159da1ecbe883522eae521b448a50636189300733
SHA256a47fe07d9baef66bd668e5bc02efccec1bb8d9777f044c277334bd5013985223
SHA51224d6fbb076319905b451612b65430d9df1b9cd5f660293781a85531239e452525fd2b566a745f2610c382809df8ac5d770640fc8337a797122d4f27240a584a8
-
Filesize
67KB
MD538ba310ee7d820e923282f8b57b5d431
SHA1c12674d9d70f534dc6c2615ed47ece6a18242b32
SHA25687a39f5ca09e2e71b1acd3e34673d9e79892af0c91bcc2761c1c57efcf202b3b
SHA5128905532c03bef2856c9c6161c156c1861561fdd0e576a0b095d17ff013d7913a8c0b50360bdf71b4f6fd4f305c3de7ddc40b8be74e63e736275559c5915920d8
-
Filesize
67KB
MD55e39f6bcd579dc019a2e4c61f63a971e
SHA12c96cd455d1bedf70ee016f99167357ce0ff7de8
SHA256d0c276a5aba5df61283193c909b7d65ff08c1bcb9484638a5e91e9e289b86343
SHA512da1fcfa4674d2acd4e785ec7265686f16f160e809ede23d57984b0201ca040ba97a0426ce50b50a124c1276bb5d77c2e8b1d3ac5170c7bdfa0e42c4ff4e0e8dd
-
Filesize
67KB
MD516a43196511fbf8f260ddcb33f5d9ff1
SHA105898438c8e934598af22f18980a0cce305b2499
SHA2563129e20517f3093aad575b0ea3780376c36189b7e6d5af413180b0fe3b80585b
SHA5129e6c6f2260891d7589d78f7f3d1528b7a1ef79369c7398d1f524c4b6ec5681c992850a5a48f7f69ee6d7fe3c882bd28508ddb7e64f9c1f6cb36f03a140cff27a
-
Filesize
67KB
MD58f6e2a04d451deec0d6f87fe200d1112
SHA15feaf92090af1f38b764fa5b6c6fe0778f2f8e20
SHA25688810fc7bad2428be34fd136680e462bde5acfb42250a10d261af8894bb58f2e
SHA512b505221fffed74328a3f6d8e458c03f1808e6b14275e3568498850795c5e2ea1181478300a0661add43c52d63032238734d5ce8fd85b00218374f408eff2f6af
-
Filesize
67KB
MD571a06bdbd1c73c917d6f62e58c187f75
SHA17ce29f50bedd3739970b56f16358efbb9a0d09dd
SHA256a24091a6781379770284df85c61565a11ed31f6ab2eaa173912c3e737a1f9027
SHA512fc1ee283878c3bc35b57a1904a11d97faa77a481bfba2a5b560abc6d37a8ae1fa4ea6607590a2dd0849d9c74b0a3978f29731132282fa980c4cc533589e663b6
-
Filesize
67KB
MD50105b97f65bdbe1a60fc7fabf327e6d4
SHA137bb4aad4a898862df0bc58460368eb3b448bba2
SHA256ae226d5af77dc43fb5dd5c81132f2c65f292e7c0448cc43089e57187522679db
SHA512098b9f15812ede31bd8df1e74bc2ed0bc9baa6bc90648e761cf39a1681b9b568c72267a08e38897f3f209bf9ac9c2f50bec18fce5663dbe297ea535e3007564e
-
Filesize
67KB
MD5c695cf93f97270a4b26f9d03ec7da960
SHA1a28700cdbcfe43cb038927949553b7f5ba4b9190
SHA256c0e4044118ab794dcb22ebb933a15f4632620a96bd6de22f9886f9cef0b6b9bb
SHA512db7726d4ded1a821421268a150a03aee65e12d57204a6b8dd8a14e9118a447ed07eef9fa29dc8c4d62c4ca2fa18c767955ff31e0148cb252f17c52af0ed2e6a4