Analysis
-
max time kernel
116s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 19:30
Static task
static1
Behavioral task
behavioral1
Sample
d5eff474fbfaff1dcdfb2337c453ef40N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d5eff474fbfaff1dcdfb2337c453ef40N.exe
Resource
win10v2004-20240802-en
General
-
Target
d5eff474fbfaff1dcdfb2337c453ef40N.exe
-
Size
512KB
-
MD5
d5eff474fbfaff1dcdfb2337c453ef40
-
SHA1
b5810b25fe82d3f6b59bd5ce47ce9b903a7391ac
-
SHA256
9c00a896438c9e46b610af3d06d73f067c47e966d779ecb66550a69a6fd3f805
-
SHA512
6eb79265123df3d3aec4dae76dca67e25e58472f0615fd7b16fda315f65e68881a85d50b2117946567514eac1e12d833f8db070b7ae0cdf456883af3ba5286a7
-
SSDEEP
12288:WmZCGyXu1jGG1ws5iETdqvZNemWrsiLk6mqgSg9:TZCGyXsGG1ws5ipr
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 52 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Maiqfl32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pnnfkb32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kkefoc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Abdeoe32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ojbnkp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Acohnhab.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bmelpa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ongckp32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pnfpjc32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Abdeoe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bacefpbg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cobhdhha.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lenffl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Pkmmigjo.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Blaobmkq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Blaobmkq.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mmdkfmjc.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bacefpbg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Pnnfkb32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lfdpjp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Lenffl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Nhqhmj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" d5eff474fbfaff1dcdfb2337c453ef40N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Aeenapck.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Qanolm32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aeenapck.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Poacighp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Mmdkfmjc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ojbnkp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Pnfpjc32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pkmmigjo.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Acohnhab.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Maiqfl32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Noagjc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Poacighp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bmelpa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Lfdpjp32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Caenkc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Cobhdhha.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ofdeeb32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ccpqjfnh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ccpqjfnh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Kkefoc32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aicfgn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Caenkc32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nhqhmj32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ongckp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Noagjc32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qanolm32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad d5eff474fbfaff1dcdfb2337c453ef40N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Aicfgn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ofdeeb32.exe -
Executes dropped EXE 26 IoCs
pid Process 2820 Kkefoc32.exe 2712 Lfdpjp32.exe 2860 Lenffl32.exe 2624 Maiqfl32.exe 1520 Mmdkfmjc.exe 3004 Nhqhmj32.exe 2264 Noagjc32.exe 2912 Ongckp32.exe 568 Ofdeeb32.exe 944 Ojbnkp32.exe 2244 Poacighp.exe 2228 Pnfpjc32.exe 2424 Pkmmigjo.exe 2456 Pnnfkb32.exe 1072 Qanolm32.exe 780 Acohnhab.exe 2536 Abdeoe32.exe 1364 Aeenapck.exe 676 Aicfgn32.exe 1816 Bmelpa32.exe 1664 Bacefpbg.exe 2468 Blaobmkq.exe 1836 Cobhdhha.exe 1732 Ccpqjfnh.exe 1488 Caenkc32.exe 1680 Coindgbi.exe -
Loads dropped DLL 52 IoCs
pid Process 2140 d5eff474fbfaff1dcdfb2337c453ef40N.exe 2140 d5eff474fbfaff1dcdfb2337c453ef40N.exe 2820 Kkefoc32.exe 2820 Kkefoc32.exe 2712 Lfdpjp32.exe 2712 Lfdpjp32.exe 2860 Lenffl32.exe 2860 Lenffl32.exe 2624 Maiqfl32.exe 2624 Maiqfl32.exe 1520 Mmdkfmjc.exe 1520 Mmdkfmjc.exe 3004 Nhqhmj32.exe 3004 Nhqhmj32.exe 2264 Noagjc32.exe 2264 Noagjc32.exe 2912 Ongckp32.exe 2912 Ongckp32.exe 568 Ofdeeb32.exe 568 Ofdeeb32.exe 944 Ojbnkp32.exe 944 Ojbnkp32.exe 2244 Poacighp.exe 2244 Poacighp.exe 2228 Pnfpjc32.exe 2228 Pnfpjc32.exe 2424 Pkmmigjo.exe 2424 Pkmmigjo.exe 2456 Pnnfkb32.exe 2456 Pnnfkb32.exe 1072 Qanolm32.exe 1072 Qanolm32.exe 780 Acohnhab.exe 780 Acohnhab.exe 2536 Abdeoe32.exe 2536 Abdeoe32.exe 1364 Aeenapck.exe 1364 Aeenapck.exe 676 Aicfgn32.exe 676 Aicfgn32.exe 1816 Bmelpa32.exe 1816 Bmelpa32.exe 1664 Bacefpbg.exe 1664 Bacefpbg.exe 2468 Blaobmkq.exe 2468 Blaobmkq.exe 1836 Cobhdhha.exe 1836 Cobhdhha.exe 1732 Ccpqjfnh.exe 1732 Ccpqjfnh.exe 1488 Caenkc32.exe 1488 Caenkc32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\Kkefoc32.exe d5eff474fbfaff1dcdfb2337c453ef40N.exe File opened for modification C:\Windows\SysWOW64\Ongckp32.exe Noagjc32.exe File created C:\Windows\SysWOW64\Abdeoe32.exe Acohnhab.exe File created C:\Windows\SysWOW64\Djcnme32.dll Abdeoe32.exe File created C:\Windows\SysWOW64\Bacefpbg.exe Bmelpa32.exe File created C:\Windows\SysWOW64\Jfdkkkqh.dll Bmelpa32.exe File created C:\Windows\SysWOW64\Coindgbi.exe Caenkc32.exe File opened for modification C:\Windows\SysWOW64\Bmelpa32.exe Aicfgn32.exe File opened for modification C:\Windows\SysWOW64\Cobhdhha.exe Blaobmkq.exe File created C:\Windows\SysWOW64\Ohodgb32.dll Caenkc32.exe File created C:\Windows\SysWOW64\Noagjc32.exe Nhqhmj32.exe File created C:\Windows\SysWOW64\Hcedgp32.dll Ojbnkp32.exe File opened for modification C:\Windows\SysWOW64\Pnnfkb32.exe Pkmmigjo.exe File created C:\Windows\SysWOW64\Hmecge32.dll Aeenapck.exe File opened for modification C:\Windows\SysWOW64\Bacefpbg.exe Bmelpa32.exe File created C:\Windows\SysWOW64\Ggqbii32.dll Cobhdhha.exe File created C:\Windows\SysWOW64\Mlbpgjjo.dll Nhqhmj32.exe File created C:\Windows\SysWOW64\Fmdpcpjb.dll Ofdeeb32.exe File created C:\Windows\SysWOW64\Egikbd32.dll Poacighp.exe File opened for modification C:\Windows\SysWOW64\Qanolm32.exe Pnnfkb32.exe File opened for modification C:\Windows\SysWOW64\Blaobmkq.exe Bacefpbg.exe File opened for modification C:\Windows\SysWOW64\Coindgbi.exe Caenkc32.exe File opened for modification C:\Windows\SysWOW64\Maiqfl32.exe Lenffl32.exe File created C:\Windows\SysWOW64\Aemmee32.dll Qanolm32.exe File opened for modification C:\Windows\SysWOW64\Kkefoc32.exe d5eff474fbfaff1dcdfb2337c453ef40N.exe File created C:\Windows\SysWOW64\Igjeji32.dll Noagjc32.exe File created C:\Windows\SysWOW64\Poacighp.exe Ojbnkp32.exe File created C:\Windows\SysWOW64\Qanolm32.exe Pnnfkb32.exe File opened for modification C:\Windows\SysWOW64\Lfdpjp32.exe Kkefoc32.exe File created C:\Windows\SysWOW64\Maiqfl32.exe Lenffl32.exe File created C:\Windows\SysWOW64\Acohnhab.exe Qanolm32.exe File created C:\Windows\SysWOW64\Cobhdhha.exe Blaobmkq.exe File created C:\Windows\SysWOW64\Chbegkhg.dll Lenffl32.exe File created C:\Windows\SysWOW64\Nhqhmj32.exe Mmdkfmjc.exe File created C:\Windows\SysWOW64\Pkmmigjo.exe Pnfpjc32.exe File created C:\Windows\SysWOW64\Pnnfkb32.exe Pkmmigjo.exe File created C:\Windows\SysWOW64\Lfdpjp32.exe Kkefoc32.exe File created C:\Windows\SysWOW64\Pnfpjc32.exe Poacighp.exe File created C:\Windows\SysWOW64\Kacclb32.dll Bacefpbg.exe File created C:\Windows\SysWOW64\Bhhjdb32.dll Aicfgn32.exe File created C:\Windows\SysWOW64\Hginmm32.dll Kkefoc32.exe File opened for modification C:\Windows\SysWOW64\Nhqhmj32.exe Mmdkfmjc.exe File created C:\Windows\SysWOW64\Ongckp32.exe Noagjc32.exe File opened for modification C:\Windows\SysWOW64\Pnfpjc32.exe Poacighp.exe File created C:\Windows\SysWOW64\Mqpfnk32.dll Pkmmigjo.exe File created C:\Windows\SysWOW64\Lnfbic32.dll Pnnfkb32.exe File opened for modification C:\Windows\SysWOW64\Aicfgn32.exe Aeenapck.exe File created C:\Windows\SysWOW64\Blaobmkq.exe Bacefpbg.exe File opened for modification C:\Windows\SysWOW64\Ofdeeb32.exe Ongckp32.exe File created C:\Windows\SysWOW64\Monann32.dll d5eff474fbfaff1dcdfb2337c453ef40N.exe File created C:\Windows\SysWOW64\Lenffl32.exe Lfdpjp32.exe File opened for modification C:\Windows\SysWOW64\Lenffl32.exe Lfdpjp32.exe File opened for modification C:\Windows\SysWOW64\Mmdkfmjc.exe Maiqfl32.exe File created C:\Windows\SysWOW64\Ibaaeg32.dll Maiqfl32.exe File opened for modification C:\Windows\SysWOW64\Noagjc32.exe Nhqhmj32.exe File created C:\Windows\SysWOW64\Ofdeeb32.exe Ongckp32.exe File opened for modification C:\Windows\SysWOW64\Poacighp.exe Ojbnkp32.exe File opened for modification C:\Windows\SysWOW64\Abdeoe32.exe Acohnhab.exe File created C:\Windows\SysWOW64\Caenkc32.exe Ccpqjfnh.exe File created C:\Windows\SysWOW64\Ojbnkp32.exe Ofdeeb32.exe File created C:\Windows\SysWOW64\Eiibij32.dll Acohnhab.exe File created C:\Windows\SysWOW64\Aeenapck.exe Abdeoe32.exe File created C:\Windows\SysWOW64\Ccpqjfnh.exe Cobhdhha.exe File created C:\Windows\SysWOW64\Mmdkfmjc.exe Maiqfl32.exe -
System Location Discovery: System Language Discovery 1 TTPs 27 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lenffl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d5eff474fbfaff1dcdfb2337c453ef40N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bmelpa32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nhqhmj32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Aeenapck.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Coindgbi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ongckp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Poacighp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Abdeoe32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ofdeeb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ojbnkp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Aicfgn32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bacefpbg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cobhdhha.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ccpqjfnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Noagjc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Caenkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Acohnhab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lfdpjp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Maiqfl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mmdkfmjc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pkmmigjo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pnnfkb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qanolm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kkefoc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pnfpjc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Blaobmkq.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ibaaeg32.dll" Maiqfl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ojbnkp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Poacighp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Acohnhab.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Blaobmkq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ggqbii32.dll" Cobhdhha.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gimpofjk.dll" Mmdkfmjc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Chkfjj32.dll" Ongckp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hbglqg32.dll" Pnfpjc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Acohnhab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jfdkkkqh.dll" Bmelpa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ongckp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ojbnkp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Pkmmigjo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Lfdpjp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Lenffl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Maiqfl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mlbpgjjo.dll" Nhqhmj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Igjeji32.dll" Noagjc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Bmelpa32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Bacefpbg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Kkefoc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ofdeeb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Egikbd32.dll" Poacighp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Abdeoe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Caenkc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Chbegkhg.dll" Lenffl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Cobhdhha.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Mmdkfmjc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lnfbic32.dll" Pnnfkb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Pnnfkb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Aeenapck.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Blaobmkq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hakhbifq.dll" Ccpqjfnh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Lenffl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Nhqhmj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Noagjc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Pnfpjc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aemmee32.dll" Qanolm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Bmelpa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kacclb32.dll" Bacefpbg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Bacefpbg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hginmm32.dll" Kkefoc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ongckp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Poacighp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Pkmmigjo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hmecge32.dll" Aeenapck.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ohodgb32.dll" Caenkc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 d5eff474fbfaff1dcdfb2337c453ef40N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID d5eff474fbfaff1dcdfb2337c453ef40N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" d5eff474fbfaff1dcdfb2337c453ef40N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Pnfpjc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Cobhdhha.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717} d5eff474fbfaff1dcdfb2337c453ef40N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Monann32.dll" d5eff474fbfaff1dcdfb2337c453ef40N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hcedgp32.dll" Ojbnkp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Abdeoe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ofdeeb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Djcnme32.dll" Abdeoe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Aicfgn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Maiqfl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Nhqhmj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hkfggj32.dll" Blaobmkq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Mmdkfmjc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2140 wrote to memory of 2820 2140 d5eff474fbfaff1dcdfb2337c453ef40N.exe 30 PID 2140 wrote to memory of 2820 2140 d5eff474fbfaff1dcdfb2337c453ef40N.exe 30 PID 2140 wrote to memory of 2820 2140 d5eff474fbfaff1dcdfb2337c453ef40N.exe 30 PID 2140 wrote to memory of 2820 2140 d5eff474fbfaff1dcdfb2337c453ef40N.exe 30 PID 2820 wrote to memory of 2712 2820 Kkefoc32.exe 31 PID 2820 wrote to memory of 2712 2820 Kkefoc32.exe 31 PID 2820 wrote to memory of 2712 2820 Kkefoc32.exe 31 PID 2820 wrote to memory of 2712 2820 Kkefoc32.exe 31 PID 2712 wrote to memory of 2860 2712 Lfdpjp32.exe 32 PID 2712 wrote to memory of 2860 2712 Lfdpjp32.exe 32 PID 2712 wrote to memory of 2860 2712 Lfdpjp32.exe 32 PID 2712 wrote to memory of 2860 2712 Lfdpjp32.exe 32 PID 2860 wrote to memory of 2624 2860 Lenffl32.exe 33 PID 2860 wrote to memory of 2624 2860 Lenffl32.exe 33 PID 2860 wrote to memory of 2624 2860 Lenffl32.exe 33 PID 2860 wrote to memory of 2624 2860 Lenffl32.exe 33 PID 2624 wrote to memory of 1520 2624 Maiqfl32.exe 34 PID 2624 wrote to memory of 1520 2624 Maiqfl32.exe 34 PID 2624 wrote to memory of 1520 2624 Maiqfl32.exe 34 PID 2624 wrote to memory of 1520 2624 Maiqfl32.exe 34 PID 1520 wrote to memory of 3004 1520 Mmdkfmjc.exe 35 PID 1520 wrote to memory of 3004 1520 Mmdkfmjc.exe 35 PID 1520 wrote to memory of 3004 1520 Mmdkfmjc.exe 35 PID 1520 wrote to memory of 3004 1520 Mmdkfmjc.exe 35 PID 3004 wrote to memory of 2264 3004 Nhqhmj32.exe 36 PID 3004 wrote to memory of 2264 3004 Nhqhmj32.exe 36 PID 3004 wrote to memory of 2264 3004 Nhqhmj32.exe 36 PID 3004 wrote to memory of 2264 3004 Nhqhmj32.exe 36 PID 2264 wrote to memory of 2912 2264 Noagjc32.exe 37 PID 2264 wrote to memory of 2912 2264 Noagjc32.exe 37 PID 2264 wrote to memory of 2912 2264 Noagjc32.exe 37 PID 2264 wrote to memory of 2912 2264 Noagjc32.exe 37 PID 2912 wrote to memory of 568 2912 Ongckp32.exe 38 PID 2912 wrote to memory of 568 2912 Ongckp32.exe 38 PID 2912 wrote to memory of 568 2912 Ongckp32.exe 38 PID 2912 wrote to memory of 568 2912 Ongckp32.exe 38 PID 568 wrote to memory of 944 568 Ofdeeb32.exe 39 PID 568 wrote to memory of 944 568 Ofdeeb32.exe 39 PID 568 wrote to memory of 944 568 Ofdeeb32.exe 39 PID 568 wrote to memory of 944 568 Ofdeeb32.exe 39 PID 944 wrote to memory of 2244 944 Ojbnkp32.exe 40 PID 944 wrote to memory of 2244 944 Ojbnkp32.exe 40 PID 944 wrote to memory of 2244 944 Ojbnkp32.exe 40 PID 944 wrote to memory of 2244 944 Ojbnkp32.exe 40 PID 2244 wrote to memory of 2228 2244 Poacighp.exe 41 PID 2244 wrote to memory of 2228 2244 Poacighp.exe 41 PID 2244 wrote to memory of 2228 2244 Poacighp.exe 41 PID 2244 wrote to memory of 2228 2244 Poacighp.exe 41 PID 2228 wrote to memory of 2424 2228 Pnfpjc32.exe 42 PID 2228 wrote to memory of 2424 2228 Pnfpjc32.exe 42 PID 2228 wrote to memory of 2424 2228 Pnfpjc32.exe 42 PID 2228 wrote to memory of 2424 2228 Pnfpjc32.exe 42 PID 2424 wrote to memory of 2456 2424 Pkmmigjo.exe 43 PID 2424 wrote to memory of 2456 2424 Pkmmigjo.exe 43 PID 2424 wrote to memory of 2456 2424 Pkmmigjo.exe 43 PID 2424 wrote to memory of 2456 2424 Pkmmigjo.exe 43 PID 2456 wrote to memory of 1072 2456 Pnnfkb32.exe 44 PID 2456 wrote to memory of 1072 2456 Pnnfkb32.exe 44 PID 2456 wrote to memory of 1072 2456 Pnnfkb32.exe 44 PID 2456 wrote to memory of 1072 2456 Pnnfkb32.exe 44 PID 1072 wrote to memory of 780 1072 Qanolm32.exe 45 PID 1072 wrote to memory of 780 1072 Qanolm32.exe 45 PID 1072 wrote to memory of 780 1072 Qanolm32.exe 45 PID 1072 wrote to memory of 780 1072 Qanolm32.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\d5eff474fbfaff1dcdfb2337c453ef40N.exe"C:\Users\Admin\AppData\Local\Temp\d5eff474fbfaff1dcdfb2337c453ef40N.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Windows\SysWOW64\Kkefoc32.exeC:\Windows\system32\Kkefoc32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\SysWOW64\Lfdpjp32.exeC:\Windows\system32\Lfdpjp32.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\SysWOW64\Lenffl32.exeC:\Windows\system32\Lenffl32.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Windows\SysWOW64\Maiqfl32.exeC:\Windows\system32\Maiqfl32.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Windows\SysWOW64\Mmdkfmjc.exeC:\Windows\system32\Mmdkfmjc.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Windows\SysWOW64\Nhqhmj32.exeC:\Windows\system32\Nhqhmj32.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Windows\SysWOW64\Noagjc32.exeC:\Windows\system32\Noagjc32.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\SysWOW64\Ongckp32.exeC:\Windows\system32\Ongckp32.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Windows\SysWOW64\Ofdeeb32.exeC:\Windows\system32\Ofdeeb32.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:568 -
C:\Windows\SysWOW64\Ojbnkp32.exeC:\Windows\system32\Ojbnkp32.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Windows\SysWOW64\Poacighp.exeC:\Windows\system32\Poacighp.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Windows\SysWOW64\Pnfpjc32.exeC:\Windows\system32\Pnfpjc32.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Windows\SysWOW64\Pkmmigjo.exeC:\Windows\system32\Pkmmigjo.exe14⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Windows\SysWOW64\Pnnfkb32.exeC:\Windows\system32\Pnnfkb32.exe15⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Windows\SysWOW64\Qanolm32.exeC:\Windows\system32\Qanolm32.exe16⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Windows\SysWOW64\Acohnhab.exeC:\Windows\system32\Acohnhab.exe17⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:780 -
C:\Windows\SysWOW64\Abdeoe32.exeC:\Windows\system32\Abdeoe32.exe18⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2536 -
C:\Windows\SysWOW64\Aeenapck.exeC:\Windows\system32\Aeenapck.exe19⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1364 -
C:\Windows\SysWOW64\Aicfgn32.exeC:\Windows\system32\Aicfgn32.exe20⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:676 -
C:\Windows\SysWOW64\Bmelpa32.exeC:\Windows\system32\Bmelpa32.exe21⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1816 -
C:\Windows\SysWOW64\Bacefpbg.exeC:\Windows\system32\Bacefpbg.exe22⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1664 -
C:\Windows\SysWOW64\Blaobmkq.exeC:\Windows\system32\Blaobmkq.exe23⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2468 -
C:\Windows\SysWOW64\Cobhdhha.exeC:\Windows\system32\Cobhdhha.exe24⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1836 -
C:\Windows\SysWOW64\Ccpqjfnh.exeC:\Windows\system32\Ccpqjfnh.exe25⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1732 -
C:\Windows\SysWOW64\Caenkc32.exeC:\Windows\system32\Caenkc32.exe26⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1488 -
C:\Windows\SysWOW64\Coindgbi.exeC:\Windows\system32\Coindgbi.exe27⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1680
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512KB
MD59a39d2cf9a2e231157da5419603e6356
SHA1fbbcd8eb5b8a2b892a9b5c5106cf71299719fb75
SHA256594420880c5a332b71f2b8b5997f64c41940a9aa4a3fd01ddff7f958a3a84b01
SHA512f7018d4bdf3baa16ec984c189e6a4985682abf3be4e864694b94cdc06e348eb038b4686a2ec1063394aeae0966a051fa8e8d0d91f9b2e6b62e77b744281e2715
-
Filesize
512KB
MD560979761bf4f65d578a1625430570723
SHA1dd3f0e844a162ec8b3b27741dbcbbf14badf882b
SHA256808cdf12f3776d1adeda32e43d695662425d02bb6921411d368d90476e34f5f8
SHA512e70c7daaf39523d59e9971a02d8513061d0a8a9cc16db136067e0621a8a88138acf2eec19c766d4ea3564e59188d860ea02b6ebaf68b84d3d3c6f7dbd251aa6c
-
Filesize
512KB
MD535318f1d104616402e0f9a3978a983b3
SHA1fe419dad1bf10da2a057440c52407ec10bc69fc5
SHA256b6d8a325f6072d204b408bd20d02461588328a2217a02c852c3a5092eb2e3ed5
SHA5127b5c56d81da9f937e3e8be3597e6411401b1dc18d34bc7136b4ab427c92410208ec11e82f1bf8e3060d46c3c2e788c888209e04110db1edde5398320d56ad592
-
Filesize
512KB
MD506d2d599ba962d0d3a603ffae4994339
SHA1c9765dcec0b644d7ec00ddf4b1be2956c856a89a
SHA2569eb6ea6fcb1b8847c7f7dc73d597d37d574eff8c74fbc4c768f773abfe4a7dac
SHA5129e437dbebf57e5f1b2ecd3b94271546a7da855955f2a2451862d878ea809834ed091c02f57960f51e981215f6200c2eb97166dc55b999aa25860a03c6bcfbc1c
-
Filesize
512KB
MD594e0fa80fbb31eebc1ef2d0d0483b390
SHA1988f9ab23db44ee3e8620c6dd0a0884ed9f7e677
SHA256915a445a52d30d31ab494696068d2d31b4ea647eb0cd8605247d53b1d299edd8
SHA512653d685bbba376b4b53f7b732f97e45a242f77bf45def5efa1f1055570c24cb0a8abc93a01b26850e62db42950b6b2067bb344dae0e3a6d3f02c7993b35f1a95
-
Filesize
512KB
MD5e8e7bb717fbf87481736442d8063ea04
SHA14baa9e5e6881044d0b865d04fcc91176d8dd0e57
SHA2563368725a5e095a56a336c81f5374fd626a8fe8c6a5b4789d8e27765fe3e21c16
SHA512ce1efc5fe59c2f28fcad1fb69afe7fda3e594c722b615ebe562222ca2f620175dc26e2e1ab3813eb3b52406802ac6cba3362bed5382649bfe0154afd270d805e
-
Filesize
512KB
MD55cd7093216cd3694d1d4923335c47d7e
SHA18dcf20525849b42d477859fe37fc45b43c2bd3da
SHA256069c3f9d32465d2ecac888127d8ffe4110a0ec5a81a1b2e4ea784f2e0049d520
SHA5127fac9b35faf48d7b50fda191871314e7fd56c2777e05371d0b78b50364c347f8e46644fff61b6e418c58d5ee5dac6a7d738917b812a1c1aa1c63293e8a65c08b
-
Filesize
512KB
MD51ba154995fb91bef52bc86f170b01b3f
SHA12a7a3f94d63dfd2c2b4badbce239db1ced116a38
SHA256bc94940d6ffc4f5998daf02e14a486f493dcf17df320482547600b7593138b96
SHA512ffda496f8d21225e68e91a6a6c0a6d561a318fb729afe19fbf3606c601beb66a099a3f69a4c81703c75a392cd6cca0cd3700f9c0ea1f0741b750d7764f8fba84
-
Filesize
512KB
MD57be2a18d4b51b0f0f48412fe7161b6ba
SHA14d0a252ce2ba2873a8d6e4fd1bfc8b6ccbf3f207
SHA256a2895381eeb0df72e3b17527ada0cd0baee714a4fa960777de423d6608d71d47
SHA512647b3e82bbe9fd2069062fb412763910e2812c8dd2f7cbd2024e75b97715caee68f8314d62df1fd7db80f2eb02a4f4e2607abd4bb7f5c44e84ff3f06ae914821
-
Filesize
512KB
MD52c3d2e14be5527c52241ca8b085f64fc
SHA1f67210085b43ff3556458b543ef12e12489bc280
SHA256192eeb641801cdb476dc9db1ea4103bf76cc2f65e8e95191f42486c13b86addc
SHA512185aae4867c2c7ec454a80afbe769dc2cf78de38159d979c1de2ff593878111e210bd19d53d54b0f55320c686524715a4c6f1505ee75766c0efcb3c374adfae9
-
Filesize
512KB
MD5abe66ae8f5f837f3083b340d914bcc64
SHA1af92463c03770490215756bd1901a9ae70e2a590
SHA256f77e47885ef9d3aee50c6ec901ab6c69aa50224de81b17e6e69fa31466a5899a
SHA5120b4711b7ca11c3b099dc6fbc96e7cd166ac06d8a1ed6888d08e5e4e2f6675fedafa82b056ba0f9dad1089b58afb6b70855fc8b76c72a56178a1ba49c0945882f
-
Filesize
7KB
MD50fdaa6edff010a61e5eff7f41dc0123a
SHA10fe1a4c5aaed3f1cf909c4a577bb70acca25f149
SHA25639d587d0a5019408e8dffcebc2a6ae28f87bd52d2567f9ee5c0c31d645000705
SHA512006885cee0a2a80d0a6f87281b5cabae0980381d58a878d2afeee4ae71a5cd5e8ff812e2a10f2f5119e560359bdfd039bfe73e1642a66fb1db352917520772a5
-
Filesize
512KB
MD56ca40996dcee17fda896934e1cddd7c4
SHA1b1a6746d60ac6814ff7f693b9db80d4fe3cea93e
SHA25686f6b9be5cedb540bd649239c9883777fe3d58fb645a244c3139d116cf269a18
SHA51226397c7dff14ce478c231942b2b5779e011aa5da92f65a83e0f75ae2906fa7658e8a676061521fb0ad33ab5a82a5da1fbe455c6d3226636bbff8f28c077f51cf
-
Filesize
512KB
MD52d556c62c559ac0990051177f4f1d70e
SHA1f8e1dd3f7015a1512a8625d5cb0a6a91100e5d54
SHA2569a816d91f100fe2d7a747259e6293fdb8fcf789e5fc35fbd7aacee6d24ed4fb9
SHA512802f58f9d40ffaa58f99e74f76a88833b69c7f23a7d4fe09cf25f7271dd3241d50c5d09369f52a8679a3f088cb2f28db139f7949c91f05616e09de088f1a0c1c
-
Filesize
512KB
MD588e79eba1768dd6a13af4787b5e1df4b
SHA1fe13dec899d2fbcc5b2baf51e7d5c174862741d8
SHA2562fd2050fe9678c1f67fe3ced9c32b8a3f2197e1781f20b46f68fe701904d8448
SHA5121e456f0140c3e8cb558072b02868629e696fd4b38d3a7c96296b64a824e9d543c42a759ff8e98405d4c65d73a77c57e8d27b6e613f9b8d1bcbe0d6e76dc6c4a7
-
Filesize
512KB
MD5ff3dec3d6cc2c5dbd83ac4f311813a44
SHA18eb4ecb8220e26d741cc95ac2819bfe44ebe32c7
SHA256278be18515a286766d5ea15043f8d7f5ad324358ecb35f210375351550f715fd
SHA5128e60e8aec71bb8dbcc52d4890708e3fbc594d4f26a92b967a1770a0096b5813b1256bee5eea831e3c818081edd7978a2642bf34c88e062d44a73f162c2dd0b3d
-
Filesize
512KB
MD50795ad2c84e29987182be51f768ad220
SHA1532345bcdd2c132b81b666cccb6cc2baf41641e9
SHA256d3ec3c532bfed753dfaf6b1b9fd7de2b13e0441fdd9f0b5c353eea5ce5c72ec2
SHA5127e4bcb7225b36be411b618adfb6457d59064a75a1ecee12a26830b7911f70d85dbd7eccb4bec551b94e715775b078a83caa7eaac620e2f3a7c3ac59441cea1e8
-
Filesize
512KB
MD56ad9e07e64f6cd3515f1dafdba64cb11
SHA1fe2ad31ef0d6d79cb127f285261a22a5e9072b48
SHA256fe269707f5ae51527f6f1313afdd84bfb06b24c49b7138ee4227dab8afadc340
SHA5128a38e284a2c96f474703168a98f412436027e8be7d931775a549ef84c0aa1ea4f58cf93f4ef9a3dddf8327da213816b210ac88cb4ce17ae41037918ca899e5c2
-
Filesize
512KB
MD562c6af97cfd4ba7f977af8f467777499
SHA1ec1247986a38fbc5fa29ed846d6c45db6307c671
SHA25609422e9a97b362088d50c9b721a40b81ddbcd523e87ec632b22240b13407f272
SHA512781d50f4ca22b9a0f5cabcef0761d16efb7c00321285cebbce34247c4edc98711d1550d9cf309c159e52bb7d5dc674952c55c223f8500d73031faac69ca7efcf
-
Filesize
512KB
MD540a4c4b12f3e74d5f79188a543564c6b
SHA1c58859ca5797d1a738516ea7e0e0df27f85052c7
SHA256c0b233a9679f8912b2c8d7d6a054c4130bf19e610e8c8ce58b3f192a6d74b054
SHA512f34df47b3958b00b28f62f299a7ecc927f394e3b780260b4cded5aa9c5fc96dd2abfde93fcf07c9d135409cd2801eeb0c13d18dc4e7fe2ce1db21c8d3544f374
-
Filesize
512KB
MD5860c39ee0c3658d31d874a478ee37190
SHA14d2e21d3f6ed31ee5c2e6e1bf28b4686d42811ed
SHA256fabdac97ee0c8627b23f8edcdf4d623d66adf7b0403813c3f4f6897c0ebf6dd9
SHA512cf2e37bac7c784ca9d1a27c88bc1ff74373ecde0148f2f5ca028051c3f542096bcfe425dc1b973d5648601ea094685cb4f4e1d38146326d9680658a21723a822
-
Filesize
512KB
MD5fd0c415ade01f461d420e75de0c03a62
SHA19325dc08916792d73cc50310cafd7b36b6877c95
SHA256d774fba4c90d12d2c7df83511254f710071d843b6eef9cf5969d899bbf3142c2
SHA512113a863f2200e3cbb06d068f235a740965944be1cb4a552a76915fe80ca2a859bf84390c28ab4bfb54502d76ee8123d6be94e3f9ce4007a9e1e2c27f4c9c1047
-
Filesize
512KB
MD599f8b957a2640862676c95f75b9eb9e2
SHA185d7e51e6770780e36f55bfda5c791f251a4f292
SHA256874931689b5145312a73f115cc9a0d27cef0df366146c23c977c4420809d5dda
SHA512d96555c7a559497f3751940905929115a6240b8b674ef5a5cb7bc227fa792e41f431151d9f1c2eb52057404dd57b869fab6f384a663ac80f9094b79002bd30e8
-
Filesize
512KB
MD5459953cb73191bde74883c27ba12345a
SHA1e26526c8bf623479727c8b53cc1b89d10afb63fd
SHA2560a3ab9621935d1a1d569ba6be75e2618dee0e2dee8e29d1f1ddbc0de523e801a
SHA5129181710c8c1e2498645e36a93d18d5b337aec83f2199309732fc599e59ef489fcbd2adcd3daad1604046e1c5f4e5a717066a71764234850c538ba208912b2dea
-
Filesize
512KB
MD5c5acc53499681b8fbd656e40ad590fda
SHA1b1cb3443dab477f1095a204a56a79218cbddbf0d
SHA25651cf110753071eb3ee8ced4eb780ca7496672be00b6e04d7d78acd47421376b4
SHA512f6992f700b8b47d71fc3ce2e0d967cb24b4b8a6c2fa7c60447c3c98725be062e37b503309bdcd5921d164f7ca459659bda01afb0267b074663d246bd353c0495
-
Filesize
512KB
MD5dd65121ebfa4666cbee6d14c3bb8d02f
SHA1656087009f55ecfe83904ca63b644194ce691711
SHA2568300ebec1284ea692df0a7b7ad3c51a1af873790519c120e71b789ca962abd31
SHA512a31f1caab0a687a222c0bd314baab5cb25eb8d897cb0f25c3d97f276166b3cf077e8679d4142561c8b3b0d38f76841f762a11c3b8c2e58aec1991d2616416291
-
Filesize
512KB
MD56f8f988ecf12ee7b546bd2163d4e1cc9
SHA1756fb2b879e61123bead0dea3d2a657a745e3754
SHA2566da80364c59ff1c38247e79777b746cec8830df7ec9193252409d5e882d74290
SHA512e6cfaec83ba319658b18027ae028c2783fc8eac62e15a309c13349fa0552d7d90db2dc903501944ed46f60f218c6e8e9be093048e5854df970db1b8b3d7fbe6a