Analysis
-
max time kernel
95s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05/09/2024, 12:25
Static task
static1
Behavioral task
behavioral1
Sample
e38c449a75187f902ea68d5d26f62170N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e38c449a75187f902ea68d5d26f62170N.exe
Resource
win10v2004-20240802-en
General
-
Target
e38c449a75187f902ea68d5d26f62170N.exe
-
Size
570KB
-
MD5
e38c449a75187f902ea68d5d26f62170
-
SHA1
b3541176874741016f3596033b39cf13281bd332
-
SHA256
e5f6212c0f97d401f66f0fae35be633f471fd80e7a336351dbde49121cdbd706
-
SHA512
15af41d3cbc78af636f5ed015e4f99842236e7394651dff74216c940811c168200b145f60e63b98a7254e09d9c0df294e4120221797b6c822963d6d5ef79e582
-
SSDEEP
12288:XyRwgBRHjPh2kkkkK4kXkkkkkkkkl888888888888888888nusMH0QiRLsRf:BgrHjPh2kkkkK4kXkkkkkkkkhLg
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 24 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dhkjej32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Deokon32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Deagdn32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dogogcpo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Dmjocp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Dhocqigp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dknpmdfc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dhmgki32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad e38c449a75187f902ea68d5d26f62170N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Dhkjej32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Dkifae32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dmgbnq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Dmgbnq32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Deokon32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dmjocp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Deagdn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" e38c449a75187f902ea68d5d26f62170N.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dkifae32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Dhmgki32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dfpgffpm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Dfpgffpm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Dogogcpo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dhocqigp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Dknpmdfc.exe -
Executes dropped EXE 12 IoCs
pid Process 4780 Dhkjej32.exe 4972 Dkifae32.exe 1456 Dmgbnq32.exe 3012 Deokon32.exe 3724 Dhmgki32.exe 4268 Dfpgffpm.exe 1596 Dogogcpo.exe 3768 Dmjocp32.exe 3044 Deagdn32.exe 4592 Dhocqigp.exe 4748 Dknpmdfc.exe 1432 Dmllipeg.exe -
Drops file in System32 directory 36 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Dkifae32.exe Dhkjej32.exe File opened for modification C:\Windows\SysWOW64\Dmgbnq32.exe Dkifae32.exe File created C:\Windows\SysWOW64\Ihidnp32.dll Dkifae32.exe File opened for modification C:\Windows\SysWOW64\Dhkjej32.exe e38c449a75187f902ea68d5d26f62170N.exe File created C:\Windows\SysWOW64\Dfpgffpm.exe Dhmgki32.exe File created C:\Windows\SysWOW64\Kmdjdl32.dll Dhmgki32.exe File opened for modification C:\Windows\SysWOW64\Dknpmdfc.exe Dhocqigp.exe File created C:\Windows\SysWOW64\Kngpec32.dll Dknpmdfc.exe File created C:\Windows\SysWOW64\Jbpbca32.dll e38c449a75187f902ea68d5d26f62170N.exe File opened for modification C:\Windows\SysWOW64\Deokon32.exe Dmgbnq32.exe File opened for modification C:\Windows\SysWOW64\Dfpgffpm.exe Dhmgki32.exe File created C:\Windows\SysWOW64\Lbabpnmn.dll Dfpgffpm.exe File created C:\Windows\SysWOW64\Dhocqigp.exe Deagdn32.exe File created C:\Windows\SysWOW64\Bobiobnp.dll Dogogcpo.exe File created C:\Windows\SysWOW64\Deagdn32.exe Dmjocp32.exe File opened for modification C:\Windows\SysWOW64\Dhocqigp.exe Deagdn32.exe File created C:\Windows\SysWOW64\Dknpmdfc.exe Dhocqigp.exe File created C:\Windows\SysWOW64\Dmllipeg.exe Dknpmdfc.exe File created C:\Windows\SysWOW64\Dhkjej32.exe e38c449a75187f902ea68d5d26f62170N.exe File created C:\Windows\SysWOW64\Pdheac32.dll Dhkjej32.exe File created C:\Windows\SysWOW64\Dogogcpo.exe Dfpgffpm.exe File created C:\Windows\SysWOW64\Nokpao32.dll Dhocqigp.exe File opened for modification C:\Windows\SysWOW64\Dmllipeg.exe Dknpmdfc.exe File created C:\Windows\SysWOW64\Deokon32.exe Dmgbnq32.exe File created C:\Windows\SysWOW64\Fpdaoioe.dll Deokon32.exe File opened for modification C:\Windows\SysWOW64\Dogogcpo.exe Dfpgffpm.exe File created C:\Windows\SysWOW64\Dmjocp32.exe Dogogcpo.exe File created C:\Windows\SysWOW64\Kahdohfm.dll Dmjocp32.exe File created C:\Windows\SysWOW64\Dkifae32.exe Dhkjej32.exe File created C:\Windows\SysWOW64\Dmgbnq32.exe Dkifae32.exe File opened for modification C:\Windows\SysWOW64\Dmjocp32.exe Dogogcpo.exe File created C:\Windows\SysWOW64\Elkadb32.dll Deagdn32.exe File created C:\Windows\SysWOW64\Amfoeb32.dll Dmgbnq32.exe File created C:\Windows\SysWOW64\Dhmgki32.exe Deokon32.exe File opened for modification C:\Windows\SysWOW64\Dhmgki32.exe Deokon32.exe File opened for modification C:\Windows\SysWOW64\Deagdn32.exe Dmjocp32.exe -
Program crash 1 IoCs
pid pid_target Process 3452 1432 WerFault.exe -
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dhmgki32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dmjocp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dhkjej32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dfpgffpm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Deagdn32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Deokon32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dmgbnq32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dhocqigp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dmllipeg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e38c449a75187f902ea68d5d26f62170N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dogogcpo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dknpmdfc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dkifae32.exe -
Modifies registry class 39 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pdheac32.dll" Dhkjej32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Dfpgffpm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kahdohfm.dll" Dmjocp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Dmjocp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Dhocqigp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Dknpmdfc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node e38c449a75187f902ea68d5d26f62170N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fpdaoioe.dll" Deokon32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Dhmgki32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Dogogcpo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Dhocqigp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jbpbca32.dll" e38c449a75187f902ea68d5d26f62170N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kmdjdl32.dll" Dhmgki32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Deagdn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Dknpmdfc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Dhkjej32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Amfoeb32.dll" Dmgbnq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Dmgbnq32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Deokon32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Deokon32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Deagdn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" e38c449a75187f902ea68d5d26f62170N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Dmgbnq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Dhmgki32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Elkadb32.dll" Deagdn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Dhkjej32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Dkifae32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Dfpgffpm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nokpao32.dll" Dhocqigp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ihidnp32.dll" Dkifae32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831} e38c449a75187f902ea68d5d26f62170N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Dkifae32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lbabpnmn.dll" Dfpgffpm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bobiobnp.dll" Dogogcpo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Dmjocp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kngpec32.dll" Dknpmdfc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 e38c449a75187f902ea68d5d26f62170N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Dogogcpo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID e38c449a75187f902ea68d5d26f62170N.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 112 wrote to memory of 4780 112 e38c449a75187f902ea68d5d26f62170N.exe 83 PID 112 wrote to memory of 4780 112 e38c449a75187f902ea68d5d26f62170N.exe 83 PID 112 wrote to memory of 4780 112 e38c449a75187f902ea68d5d26f62170N.exe 83 PID 4780 wrote to memory of 4972 4780 Dhkjej32.exe 84 PID 4780 wrote to memory of 4972 4780 Dhkjej32.exe 84 PID 4780 wrote to memory of 4972 4780 Dhkjej32.exe 84 PID 4972 wrote to memory of 1456 4972 Dkifae32.exe 85 PID 4972 wrote to memory of 1456 4972 Dkifae32.exe 85 PID 4972 wrote to memory of 1456 4972 Dkifae32.exe 85 PID 1456 wrote to memory of 3012 1456 Dmgbnq32.exe 86 PID 1456 wrote to memory of 3012 1456 Dmgbnq32.exe 86 PID 1456 wrote to memory of 3012 1456 Dmgbnq32.exe 86 PID 3012 wrote to memory of 3724 3012 Deokon32.exe 87 PID 3012 wrote to memory of 3724 3012 Deokon32.exe 87 PID 3012 wrote to memory of 3724 3012 Deokon32.exe 87 PID 3724 wrote to memory of 4268 3724 Dhmgki32.exe 88 PID 3724 wrote to memory of 4268 3724 Dhmgki32.exe 88 PID 3724 wrote to memory of 4268 3724 Dhmgki32.exe 88 PID 4268 wrote to memory of 1596 4268 Dfpgffpm.exe 89 PID 4268 wrote to memory of 1596 4268 Dfpgffpm.exe 89 PID 4268 wrote to memory of 1596 4268 Dfpgffpm.exe 89 PID 1596 wrote to memory of 3768 1596 Dogogcpo.exe 90 PID 1596 wrote to memory of 3768 1596 Dogogcpo.exe 90 PID 1596 wrote to memory of 3768 1596 Dogogcpo.exe 90 PID 3768 wrote to memory of 3044 3768 Dmjocp32.exe 91 PID 3768 wrote to memory of 3044 3768 Dmjocp32.exe 91 PID 3768 wrote to memory of 3044 3768 Dmjocp32.exe 91 PID 3044 wrote to memory of 4592 3044 Deagdn32.exe 92 PID 3044 wrote to memory of 4592 3044 Deagdn32.exe 92 PID 3044 wrote to memory of 4592 3044 Deagdn32.exe 92 PID 4592 wrote to memory of 4748 4592 Dhocqigp.exe 93 PID 4592 wrote to memory of 4748 4592 Dhocqigp.exe 93 PID 4592 wrote to memory of 4748 4592 Dhocqigp.exe 93 PID 4748 wrote to memory of 1432 4748 Dknpmdfc.exe 94 PID 4748 wrote to memory of 1432 4748 Dknpmdfc.exe 94 PID 4748 wrote to memory of 1432 4748 Dknpmdfc.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\e38c449a75187f902ea68d5d26f62170N.exe"C:\Users\Admin\AppData\Local\Temp\e38c449a75187f902ea68d5d26f62170N.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:112 -
C:\Windows\SysWOW64\Dhkjej32.exeC:\Windows\system32\Dhkjej32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Windows\SysWOW64\Dkifae32.exeC:\Windows\system32\Dkifae32.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Windows\SysWOW64\Dmgbnq32.exeC:\Windows\system32\Dmgbnq32.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Windows\SysWOW64\Deokon32.exeC:\Windows\system32\Deokon32.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Windows\SysWOW64\Dhmgki32.exeC:\Windows\system32\Dhmgki32.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3724 -
C:\Windows\SysWOW64\Dfpgffpm.exeC:\Windows\system32\Dfpgffpm.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4268 -
C:\Windows\SysWOW64\Dogogcpo.exeC:\Windows\system32\Dogogcpo.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Windows\SysWOW64\Dmjocp32.exeC:\Windows\system32\Dmjocp32.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3768 -
C:\Windows\SysWOW64\Deagdn32.exeC:\Windows\system32\Deagdn32.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\SysWOW64\Dhocqigp.exeC:\Windows\system32\Dhocqigp.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4592 -
C:\Windows\SysWOW64\Dknpmdfc.exeC:\Windows\system32\Dknpmdfc.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4748 -
C:\Windows\SysWOW64\Dmllipeg.exeC:\Windows\system32\Dmllipeg.exe13⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1432 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1432 -s 40814⤵
- Program crash
PID:3452
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1432 -ip 14321⤵PID:3896
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
570KB
MD505ca2dec80d0193f85dd5ef6c9df0b57
SHA1c6bca59168a8272100551d778d40049b6825fe24
SHA256b25025bbbf2c8340e4745f522eb9d2f16b29490901ce1b1e045127c3368eeb8a
SHA512080ea2e377006c30243997911a2ec5f84e2125174373d39582f89b3c2f77c052beda7d27b0fd72055f463d1d994a0598971a6b9e84ea58cb1512f61a811144a7
-
Filesize
570KB
MD531e55ada94fdfcba6529fd53cbe8049f
SHA16970d48ddb8326065c47fdff6d6a5823ef3c7a20
SHA25677657368be29e77a061dbedfe80937d01ab05af248fc92d3743f08c55c81c06f
SHA5129ffbcbb884b0e27a67f48e8af802fb0b46165ad168b0eb2108192162d82465eea3134f520efa59121777b8812ab80353a7d10b633732b291e552114d9594476c
-
Filesize
570KB
MD544b453527d52408042d5993cf6d19f94
SHA192db242b555c6cb6f25e97abdbf9cae2f8ddf4cd
SHA256ad006f541bbf48bbb8218c0fb91ac9e8905658f7fa7ce879318d7f613ef757fe
SHA512a29479d5ec24e5ca482ae0e36d476167a18a15e31c0bb0342f384ff9bc3f5d32fd94aa1dea635b9f9f314ca1d0ac1866a1e373412c4580a5d9300ecf9e650d8d
-
Filesize
570KB
MD5de897cc09d77743e9c27f7f36a2fd2ba
SHA117cbc2bf530a7fd7b3fdcd877bcd5696c9fde992
SHA25656110d3c7e67c6bf8fdb8e9dcb72d0a4b4eeb95d7965ada771fa5090b13358f4
SHA5120dde0d96687f56a9fac27b427e0b95ccf623a632af1a8da8b7d5509bd0fd0a426d945bf6109dae9c2fc77de4ea5dbc95490ea4cb7390b21d2fe80332c65c68d7
-
Filesize
570KB
MD52c1b4054a9f7f7d8e41ad0c092d8502e
SHA12f1648eb641ee7fca16ef325da0a6655ca60d675
SHA256a66aa0dd7a3f020a82fabbc28842bf9839b2bf4f2833a1fabdceac0e865c26e5
SHA5125b9c38be0c9910f1646e8347ff62fd39107829d4284a85b6d364d067d174ecb8b5950f98477e052b6dbde176145c797bbb310df330f6a673c3fbfef22c07c958
-
Filesize
570KB
MD502b42b5c9a0796f48d5d1fa11b126a25
SHA177e5558a02d0f5f44e400b8f1938983e896d9b50
SHA256f2c713febf94c6a6fd165bfb26b06d35800565cd5f9390814530624dc7b2b59d
SHA5123c58360573c7c83ffd42f58a0a86c50c90b6598549e7318f133eeca304957484ffecb73113f6977e1b66ea28b126815c1d514b920abe5dfe880c385d51522826
-
Filesize
570KB
MD534b7236ba882ff95264ffd23aa9f7b69
SHA16ea68740bb7f88ff46502c0e1307fd0df42d6c39
SHA256e6af92c9acfa92da7be91b6116fdc3b11b6104262ed94cb023261a4ef8a1fc42
SHA512d9b555c4b63c3f3d07499f44cfd6845794afa3ea9bccb6f936c6aab9102cad7c2175593a41afaf7c01331dea79d5bcb4f9951be21ea236517eb8c23d6302309f
-
Filesize
570KB
MD50eeb49e9f8ed1bf3e7eb1c4d11e0bae9
SHA18e88997ed975d42a8f7832c6aba1195b883a3732
SHA256d86f8326d4823ee3bc7d99c76f3c278266aa97a07b29a0fa7fa4ba1aea6141f4
SHA5129f01e1dc3e49bb354e3e047e6f396751ccd29e568833cc2e483f2f7f694c56f2a698e83d3fc83ebb54fc0fdc6cc3896fd02d21f85e13a57c199fa831e29cd162
-
Filesize
570KB
MD5a837ab6d1ed7ce957c38591c145032c2
SHA1b5b04e205023b1f051b8c03a3232c4dc0afa8c7c
SHA256c4f20e5a7729b2f5a784c407da33c9dc1d695825b15829ec58fb59900e0c68fd
SHA5124dd24048a2b9ab99ac09c9e7339f45a0141e15fa4f5c27636089b8089d16d16b99679809b484b293a004738376605346c19970f139731cb99d2c502a871ea3f2
-
Filesize
570KB
MD53e27a4eb1595314cbdb91285361f1b72
SHA129eb557e455d136d8c738673943cfb82d48f92e7
SHA25676a82cae41b1db669bbba56d5f550328bcdbf21f0eafa2cd68ed8ac480f11575
SHA512ea27154eab7d60939cf0ccc2b881790cf06ca53e56d6673720dac09428204621ae1246bdd53138aa3da06c9fdc760758e5b986dd297ca0ed24a7a7868cf4f23b
-
Filesize
570KB
MD5cacc73b9d93dfea37d3d402a79ca0172
SHA1937b6269d5d8b9bcb6d56cf422fd0684188fe5ac
SHA2563f0d3f5ed3c6e6ab3712879eb65eaaff2996ef4c184eed3582b81bb870b185f6
SHA51274d3857204154fee5ed66b03803284ed9c094fe4752f099125c978978ef8e0cc5aad61ce9e187ab36600c8a564a7933e5d407bfa64b0f164c07e06a478fbb0ba
-
Filesize
570KB
MD56a377992bc48c662ecfd7b6625a91f7c
SHA1ad696ec6210fd2307d84b681b9cb8637835ca151
SHA256d574de5a5dfdb0a465f11033aa9dfaec1318d4c3723892a9fa91cdb60c53e4a3
SHA51293f806e95b800ff78b4c99f50463687e37adf78b0c2a1f77fb9d7fde1a8a9688fe497d809bbd966915f50c7c9551e096fafe152abf479c0021efcf7b707b2281
-
Filesize
7KB
MD54bd57b2fc3bd565c73b49871d22efe3a
SHA175e91533610e1d0eafe03bd579cf2b882f6d3063
SHA256a0250a181817dfb32593ffddef49c94559b400c76bdc34a4961b0f8e86b9d71e
SHA512221d2e3044f8809d56d0b8a835cd6c82e7bf94415c0563a424df853fbde66902f194c21a2efb6234a6c0a71f845cbd1df6b46ca990c1eafd012c6c7caba73038