Analysis
-
max time kernel
95s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12-09-2024 22:51
Static task
static1
Behavioral task
behavioral1
Sample
5a15b3d81b99f3208616c0b7ccd2e62113586c044c69aa4ab665ff45d3587a5c.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5a15b3d81b99f3208616c0b7ccd2e62113586c044c69aa4ab665ff45d3587a5c.exe
Resource
win10v2004-20240802-en
General
-
Target
5a15b3d81b99f3208616c0b7ccd2e62113586c044c69aa4ab665ff45d3587a5c.exe
-
Size
77KB
-
MD5
3589b2980b074ce0f6d9085574c458ca
-
SHA1
23fb9ab259234966d63686b399c3d24aed1db56c
-
SHA256
5a15b3d81b99f3208616c0b7ccd2e62113586c044c69aa4ab665ff45d3587a5c
-
SHA512
88041d2bc0b826b85c92c9f38e7ebbcaea501fa985b55ae04101d9505faff88b78aa3260d2b12729c8d15bf8ca0514b3833298b8bb235a02a969874151a8127b
-
SSDEEP
1536:IYFnJ8BZaO95vX3qLIQpTII2LtIwfi+TjRC/:bP8BAO95vn+pTIZawf1TjY
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 54 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cjpckf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cnnlaehj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Deokon32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dkkcge32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Chmndlge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dhkjej32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dhhnpjmh.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dmgbnq32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Deagdn32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dmjocp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dmjocp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dmcibama.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Daqbip32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dkkcge32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dmgbnq32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Deokon32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cnffqf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cjmgfgdf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dmcibama.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dhocqigp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ceqnmpfo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Djdmffnn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dobfld32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cmnpgb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dhhnpjmh.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Daqbip32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Deagdn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ceqnmpfo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cmlcbbcj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cnnlaehj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cdhhdlid.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 5a15b3d81b99f3208616c0b7ccd2e62113586c044c69aa4ab665ff45d3587a5c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Chmndlge.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cmnpgb32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cjpckf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dhocqigp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dobfld32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dkifae32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cnffqf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cjmgfgdf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Djdmffnn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dknpmdfc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" 5a15b3d81b99f3208616c0b7ccd2e62113586c044c69aa4ab665ff45d3587a5c.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cdfkolkf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Calhnpgn.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cmlcbbcj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Calhnpgn.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dknpmdfc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dkifae32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cdfkolkf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cdhhdlid.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cjbpaf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cjbpaf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dhkjej32.exe -
Executes dropped EXE 27 IoCs
pid Process 1612 Chmndlge.exe 2444 Cnffqf32.exe 2748 Ceqnmpfo.exe 5036 Cjmgfgdf.exe 4508 Cmlcbbcj.exe 3576 Cdfkolkf.exe 2260 Cjpckf32.exe 4484 Cmnpgb32.exe 1512 Cdhhdlid.exe 4600 Cjbpaf32.exe 5040 Cnnlaehj.exe 5024 Calhnpgn.exe 3600 Djdmffnn.exe 3332 Dmcibama.exe 2760 Dhhnpjmh.exe 4524 Dobfld32.exe 2728 Daqbip32.exe 4192 Dhkjej32.exe 3464 Dkifae32.exe 1852 Dmgbnq32.exe 4048 Deokon32.exe 3960 Dkkcge32.exe 1792 Dmjocp32.exe 5008 Deagdn32.exe 4944 Dhocqigp.exe 4000 Dknpmdfc.exe 3908 Dmllipeg.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\Cacamdcd.dll Cdfkolkf.exe File created C:\Windows\SysWOW64\Cmnpgb32.exe Cjpckf32.exe File created C:\Windows\SysWOW64\Ingfla32.dll Cjbpaf32.exe File opened for modification C:\Windows\SysWOW64\Deokon32.exe Dmgbnq32.exe File created C:\Windows\SysWOW64\Dkkcge32.exe Deokon32.exe File opened for modification C:\Windows\SysWOW64\Dmllipeg.exe Dknpmdfc.exe File opened for modification C:\Windows\SysWOW64\Cnffqf32.exe Chmndlge.exe File created C:\Windows\SysWOW64\Cdhhdlid.exe Cmnpgb32.exe File created C:\Windows\SysWOW64\Cjbpaf32.exe Cdhhdlid.exe File opened for modification C:\Windows\SysWOW64\Dkifae32.exe Dhkjej32.exe File opened for modification C:\Windows\SysWOW64\Dkkcge32.exe Deokon32.exe File created C:\Windows\SysWOW64\Dmllipeg.exe Dknpmdfc.exe File created C:\Windows\SysWOW64\Kdqjac32.dll Cnffqf32.exe File created C:\Windows\SysWOW64\Nbgngp32.dll Dmcibama.exe File created C:\Windows\SysWOW64\Deagdn32.exe Dmjocp32.exe File created C:\Windows\SysWOW64\Cjmgfgdf.exe Ceqnmpfo.exe File created C:\Windows\SysWOW64\Jffggf32.dll Cmlcbbcj.exe File created C:\Windows\SysWOW64\Ffpmlcim.dll Cjpckf32.exe File created C:\Windows\SysWOW64\Hdhpgj32.dll Calhnpgn.exe File created C:\Windows\SysWOW64\Dknpmdfc.exe Dhocqigp.exe File opened for modification C:\Windows\SysWOW64\Cdhhdlid.exe Cmnpgb32.exe File opened for modification C:\Windows\SysWOW64\Calhnpgn.exe Cnnlaehj.exe File opened for modification C:\Windows\SysWOW64\Dmcibama.exe Djdmffnn.exe File opened for modification C:\Windows\SysWOW64\Dhhnpjmh.exe Dmcibama.exe File opened for modification C:\Windows\SysWOW64\Dmjocp32.exe Dkkcge32.exe File created C:\Windows\SysWOW64\Nokpao32.dll Dhocqigp.exe File created C:\Windows\SysWOW64\Cjpckf32.exe Cdfkolkf.exe File created C:\Windows\SysWOW64\Lpggmhkg.dll Cmnpgb32.exe File created C:\Windows\SysWOW64\Naeheh32.dll Cnnlaehj.exe File created C:\Windows\SysWOW64\Jcbdhp32.dll Deokon32.exe File created C:\Windows\SysWOW64\Maickled.dll Ceqnmpfo.exe File created C:\Windows\SysWOW64\Cdfkolkf.exe Cmlcbbcj.exe File created C:\Windows\SysWOW64\Djdmffnn.exe Calhnpgn.exe File created C:\Windows\SysWOW64\Dhkjej32.exe Daqbip32.exe File created C:\Windows\SysWOW64\Ihidnp32.dll Dkifae32.exe File opened for modification C:\Windows\SysWOW64\Chmndlge.exe 5a15b3d81b99f3208616c0b7ccd2e62113586c044c69aa4ab665ff45d3587a5c.exe File created C:\Windows\SysWOW64\Ceqnmpfo.exe Cnffqf32.exe File created C:\Windows\SysWOW64\Calhnpgn.exe Cnnlaehj.exe File created C:\Windows\SysWOW64\Dmjocp32.exe Dkkcge32.exe File created C:\Windows\SysWOW64\Bobiobnp.dll Dkkcge32.exe File created C:\Windows\SysWOW64\Kahdohfm.dll Dmjocp32.exe File created C:\Windows\SysWOW64\Lfjhbihm.dll Chmndlge.exe File created C:\Windows\SysWOW64\Cnnlaehj.exe Cjbpaf32.exe File created C:\Windows\SysWOW64\Dmcibama.exe Djdmffnn.exe File created C:\Windows\SysWOW64\Alcidkmm.dll Dhhnpjmh.exe File created C:\Windows\SysWOW64\Daqbip32.exe Dobfld32.exe File opened for modification C:\Windows\SysWOW64\Daqbip32.exe Dobfld32.exe File created C:\Windows\SysWOW64\Elkadb32.dll Deagdn32.exe File opened for modification C:\Windows\SysWOW64\Cjbpaf32.exe Cdhhdlid.exe File created C:\Windows\SysWOW64\Jbpbca32.dll Daqbip32.exe File created C:\Windows\SysWOW64\Amfoeb32.dll Dmgbnq32.exe File opened for modification C:\Windows\SysWOW64\Cmlcbbcj.exe Cjmgfgdf.exe File opened for modification C:\Windows\SysWOW64\Djdmffnn.exe Calhnpgn.exe File created C:\Windows\SysWOW64\Jdipdgch.dll Dobfld32.exe File opened for modification C:\Windows\SysWOW64\Dhkjej32.exe Daqbip32.exe File opened for modification C:\Windows\SysWOW64\Cjmgfgdf.exe Ceqnmpfo.exe File created C:\Windows\SysWOW64\Cmlcbbcj.exe Cjmgfgdf.exe File created C:\Windows\SysWOW64\Jgilhm32.dll Cdhhdlid.exe File created C:\Windows\SysWOW64\Kmfjodai.dll Djdmffnn.exe File created C:\Windows\SysWOW64\Dhhnpjmh.exe Dmcibama.exe File created C:\Windows\SysWOW64\Dobfld32.exe Dhhnpjmh.exe File opened for modification C:\Windows\SysWOW64\Dhocqigp.exe Deagdn32.exe File created C:\Windows\SysWOW64\Fmjkjk32.dll Cjmgfgdf.exe File opened for modification C:\Windows\SysWOW64\Dobfld32.exe Dhhnpjmh.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3568 3908 WerFault.exe 112 -
System Location Discovery: System Language Discovery 1 TTPs 28 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cjmgfgdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cmlcbbcj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cnnlaehj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dkkcge32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dhocqigp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cjpckf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dmcibama.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dhhnpjmh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ceqnmpfo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cdfkolkf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cmnpgb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dhkjej32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Deokon32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Chmndlge.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dmjocp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cnffqf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dobfld32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Daqbip32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cdhhdlid.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dkifae32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dknpmdfc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5a15b3d81b99f3208616c0b7ccd2e62113586c044c69aa4ab665ff45d3587a5c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Deagdn32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dmllipeg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cjbpaf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Calhnpgn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Djdmffnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dmgbnq32.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dhkjej32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pdheac32.dll" Dhkjej32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Elkadb32.dll" Deagdn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} 5a15b3d81b99f3208616c0b7ccd2e62113586c044c69aa4ab665ff45d3587a5c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cmlcbbcj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cjpckf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dmgbnq32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dknpmdfc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kdqjac32.dll" Cnffqf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cmlcbbcj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cjbpaf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jdipdgch.dll" Dobfld32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kahdohfm.dll" Dmjocp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dknpmdfc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID 5a15b3d81b99f3208616c0b7ccd2e62113586c044c69aa4ab665ff45d3587a5c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ceqnmpfo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fmjkjk32.dll" Cjmgfgdf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cacamdcd.dll" Cdfkolkf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cmnpgb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Naeheh32.dll" Cnnlaehj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cnnlaehj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Alcidkmm.dll" Dhhnpjmh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dhkjej32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dkifae32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bobiobnp.dll" Dkkcge32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dhocqigp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node 5a15b3d81b99f3208616c0b7ccd2e62113586c044c69aa4ab665ff45d3587a5c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cjmgfgdf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dkkcge32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Deagdn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Chmndlge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cnnlaehj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dmcibama.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dobfld32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" 5a15b3d81b99f3208616c0b7ccd2e62113586c044c69aa4ab665ff45d3587a5c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ceqnmpfo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cdfkolkf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cjpckf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cjbpaf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jbpbca32.dll" Daqbip32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dkkcge32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cdhhdlid.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Daqbip32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Deagdn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Chmndlge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jffggf32.dll" Cmlcbbcj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Calhnpgn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hdhpgj32.dll" Calhnpgn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dhhnpjmh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ingfla32.dll" Cjbpaf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Deokon32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Deokon32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 5a15b3d81b99f3208616c0b7ccd2e62113586c044c69aa4ab665ff45d3587a5c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aoglcqao.dll" 5a15b3d81b99f3208616c0b7ccd2e62113586c044c69aa4ab665ff45d3587a5c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cnffqf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cjmgfgdf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Calhnpgn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cmnpgb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dhhnpjmh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Maickled.dll" Ceqnmpfo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ffpmlcim.dll" Cjpckf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cdhhdlid.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jgilhm32.dll" Cdhhdlid.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jcbdhp32.dll" Deokon32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1600 wrote to memory of 1612 1600 5a15b3d81b99f3208616c0b7ccd2e62113586c044c69aa4ab665ff45d3587a5c.exe 83 PID 1600 wrote to memory of 1612 1600 5a15b3d81b99f3208616c0b7ccd2e62113586c044c69aa4ab665ff45d3587a5c.exe 83 PID 1600 wrote to memory of 1612 1600 5a15b3d81b99f3208616c0b7ccd2e62113586c044c69aa4ab665ff45d3587a5c.exe 83 PID 1612 wrote to memory of 2444 1612 Chmndlge.exe 84 PID 1612 wrote to memory of 2444 1612 Chmndlge.exe 84 PID 1612 wrote to memory of 2444 1612 Chmndlge.exe 84 PID 2444 wrote to memory of 2748 2444 Cnffqf32.exe 86 PID 2444 wrote to memory of 2748 2444 Cnffqf32.exe 86 PID 2444 wrote to memory of 2748 2444 Cnffqf32.exe 86 PID 2748 wrote to memory of 5036 2748 Ceqnmpfo.exe 87 PID 2748 wrote to memory of 5036 2748 Ceqnmpfo.exe 87 PID 2748 wrote to memory of 5036 2748 Ceqnmpfo.exe 87 PID 5036 wrote to memory of 4508 5036 Cjmgfgdf.exe 88 PID 5036 wrote to memory of 4508 5036 Cjmgfgdf.exe 88 PID 5036 wrote to memory of 4508 5036 Cjmgfgdf.exe 88 PID 4508 wrote to memory of 3576 4508 Cmlcbbcj.exe 89 PID 4508 wrote to memory of 3576 4508 Cmlcbbcj.exe 89 PID 4508 wrote to memory of 3576 4508 Cmlcbbcj.exe 89 PID 3576 wrote to memory of 2260 3576 Cdfkolkf.exe 90 PID 3576 wrote to memory of 2260 3576 Cdfkolkf.exe 90 PID 3576 wrote to memory of 2260 3576 Cdfkolkf.exe 90 PID 2260 wrote to memory of 4484 2260 Cjpckf32.exe 91 PID 2260 wrote to memory of 4484 2260 Cjpckf32.exe 91 PID 2260 wrote to memory of 4484 2260 Cjpckf32.exe 91 PID 4484 wrote to memory of 1512 4484 Cmnpgb32.exe 93 PID 4484 wrote to memory of 1512 4484 Cmnpgb32.exe 93 PID 4484 wrote to memory of 1512 4484 Cmnpgb32.exe 93 PID 1512 wrote to memory of 4600 1512 Cdhhdlid.exe 94 PID 1512 wrote to memory of 4600 1512 Cdhhdlid.exe 94 PID 1512 wrote to memory of 4600 1512 Cdhhdlid.exe 94 PID 4600 wrote to memory of 5040 4600 Cjbpaf32.exe 95 PID 4600 wrote to memory of 5040 4600 Cjbpaf32.exe 95 PID 4600 wrote to memory of 5040 4600 Cjbpaf32.exe 95 PID 5040 wrote to memory of 5024 5040 Cnnlaehj.exe 96 PID 5040 wrote to memory of 5024 5040 Cnnlaehj.exe 96 PID 5040 wrote to memory of 5024 5040 Cnnlaehj.exe 96 PID 5024 wrote to memory of 3600 5024 Calhnpgn.exe 97 PID 5024 wrote to memory of 3600 5024 Calhnpgn.exe 97 PID 5024 wrote to memory of 3600 5024 Calhnpgn.exe 97 PID 3600 wrote to memory of 3332 3600 Djdmffnn.exe 98 PID 3600 wrote to memory of 3332 3600 Djdmffnn.exe 98 PID 3600 wrote to memory of 3332 3600 Djdmffnn.exe 98 PID 3332 wrote to memory of 2760 3332 Dmcibama.exe 100 PID 3332 wrote to memory of 2760 3332 Dmcibama.exe 100 PID 3332 wrote to memory of 2760 3332 Dmcibama.exe 100 PID 2760 wrote to memory of 4524 2760 Dhhnpjmh.exe 101 PID 2760 wrote to memory of 4524 2760 Dhhnpjmh.exe 101 PID 2760 wrote to memory of 4524 2760 Dhhnpjmh.exe 101 PID 4524 wrote to memory of 2728 4524 Dobfld32.exe 102 PID 4524 wrote to memory of 2728 4524 Dobfld32.exe 102 PID 4524 wrote to memory of 2728 4524 Dobfld32.exe 102 PID 2728 wrote to memory of 4192 2728 Daqbip32.exe 103 PID 2728 wrote to memory of 4192 2728 Daqbip32.exe 103 PID 2728 wrote to memory of 4192 2728 Daqbip32.exe 103 PID 4192 wrote to memory of 3464 4192 Dhkjej32.exe 104 PID 4192 wrote to memory of 3464 4192 Dhkjej32.exe 104 PID 4192 wrote to memory of 3464 4192 Dhkjej32.exe 104 PID 3464 wrote to memory of 1852 3464 Dkifae32.exe 105 PID 3464 wrote to memory of 1852 3464 Dkifae32.exe 105 PID 3464 wrote to memory of 1852 3464 Dkifae32.exe 105 PID 1852 wrote to memory of 4048 1852 Dmgbnq32.exe 106 PID 1852 wrote to memory of 4048 1852 Dmgbnq32.exe 106 PID 1852 wrote to memory of 4048 1852 Dmgbnq32.exe 106 PID 4048 wrote to memory of 3960 4048 Deokon32.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\5a15b3d81b99f3208616c0b7ccd2e62113586c044c69aa4ab665ff45d3587a5c.exe"C:\Users\Admin\AppData\Local\Temp\5a15b3d81b99f3208616c0b7ccd2e62113586c044c69aa4ab665ff45d3587a5c.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Windows\SysWOW64\Chmndlge.exeC:\Windows\system32\Chmndlge.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Windows\SysWOW64\Cnffqf32.exeC:\Windows\system32\Cnffqf32.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Windows\SysWOW64\Ceqnmpfo.exeC:\Windows\system32\Ceqnmpfo.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\SysWOW64\Cjmgfgdf.exeC:\Windows\system32\Cjmgfgdf.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Windows\SysWOW64\Cmlcbbcj.exeC:\Windows\system32\Cmlcbbcj.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4508 -
C:\Windows\SysWOW64\Cdfkolkf.exeC:\Windows\system32\Cdfkolkf.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3576 -
C:\Windows\SysWOW64\Cjpckf32.exeC:\Windows\system32\Cjpckf32.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Windows\SysWOW64\Cmnpgb32.exeC:\Windows\system32\Cmnpgb32.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Windows\SysWOW64\Cdhhdlid.exeC:\Windows\system32\Cdhhdlid.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Windows\SysWOW64\Cjbpaf32.exeC:\Windows\system32\Cjbpaf32.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Windows\SysWOW64\Cnnlaehj.exeC:\Windows\system32\Cnnlaehj.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\Windows\SysWOW64\Calhnpgn.exeC:\Windows\system32\Calhnpgn.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5024 -
C:\Windows\SysWOW64\Djdmffnn.exeC:\Windows\system32\Djdmffnn.exe14⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3600 -
C:\Windows\SysWOW64\Dmcibama.exeC:\Windows\system32\Dmcibama.exe15⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3332 -
C:\Windows\SysWOW64\Dhhnpjmh.exeC:\Windows\system32\Dhhnpjmh.exe16⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\SysWOW64\Dobfld32.exeC:\Windows\system32\Dobfld32.exe17⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4524 -
C:\Windows\SysWOW64\Daqbip32.exeC:\Windows\system32\Daqbip32.exe18⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\SysWOW64\Dhkjej32.exeC:\Windows\system32\Dhkjej32.exe19⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4192 -
C:\Windows\SysWOW64\Dkifae32.exeC:\Windows\system32\Dkifae32.exe20⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3464 -
C:\Windows\SysWOW64\Dmgbnq32.exeC:\Windows\system32\Dmgbnq32.exe21⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Windows\SysWOW64\Deokon32.exeC:\Windows\system32\Deokon32.exe22⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4048 -
C:\Windows\SysWOW64\Dkkcge32.exeC:\Windows\system32\Dkkcge32.exe23⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3960 -
C:\Windows\SysWOW64\Dmjocp32.exeC:\Windows\system32\Dmjocp32.exe24⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1792 -
C:\Windows\SysWOW64\Deagdn32.exeC:\Windows\system32\Deagdn32.exe25⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5008 -
C:\Windows\SysWOW64\Dhocqigp.exeC:\Windows\system32\Dhocqigp.exe26⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4944 -
C:\Windows\SysWOW64\Dknpmdfc.exeC:\Windows\system32\Dknpmdfc.exe27⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4000 -
C:\Windows\SysWOW64\Dmllipeg.exeC:\Windows\system32\Dmllipeg.exe28⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3908 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3908 -s 40429⤵
- Program crash
PID:3568
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3908 -ip 39081⤵PID:1100
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
77KB
MD5f476f6c31b3a8b77994e19790bf763c8
SHA1f17d8e6aa5fc407b013ab01a46d50b01ad3dff81
SHA256370dea625baa9e20faf3c39a46650dca26f18556fc1c2eaf92319ae59deb1860
SHA5123adf27adb0832e241c57ea272a95fed8842a3c430a62956c6be2eaec77b95faabb882c22abe2aa5c1b94b92ba19c5d592cf9ca0f2f26502b10f46d12644403b6
-
Filesize
77KB
MD56bf84391d565375d15165c0a6b8899c9
SHA10ce8eddc270e666ce268525529dbb71ad1e9b4a3
SHA256192f493aad5d2c158c4ec3918da7f1eecc7089a42b62e11a864d0c9fd16ca729
SHA51253576bcd7310966d5648780597b19aee6deecca244343af641cb4140d13ad42fd00bb52eed9776bf5420b0bc3ecf65f12f9d9ceb5c310758c407409560dcda21
-
Filesize
77KB
MD5ef1abd258632afc72ce09ef7062efed9
SHA14b261f99ff8109e48c3b9d7204d01af8e0482563
SHA256210ac731dddc88839db40a1e02674bff44ab47d6c3ef2f981bf5e084f0ba3ea2
SHA512c81bca37d740d73faf30d5b74935dfe6f84c21ee7c1a3233d8644dfd9aa051dd8495f148167a907455b98317f0540b8490f42ec59c96a20fd37c408ca20647cb
-
Filesize
77KB
MD5aa3ba8d22947badd23e6265cb681a4b7
SHA1f21de138cf8c437f4d87305570cc5070f9ef2368
SHA25616d68232d0b4fb81700ee238c9a7e2c49e22e50d4e72d14657eebb5b492bc5ae
SHA5125e01c469062acd8c1bc3c781f70a1c97a115a89340016d74b86f7b0b9008ed14c3cdfdfbd009f8e6358a11b5f195743ef43435f157be34d62b31bd9c7642a7e0
-
Filesize
77KB
MD5efa81c207c757e3b1148145a3ed1d25f
SHA17632e6328a6bc07dcc70bdd4b3fc30afb15e8ccd
SHA256fc3ecb61913042897c07d147e9924fb770bc69401c6120900b09402af0a1799b
SHA512e36fb8af4be9a3fabbc72ca7d0049a395aa3cd8456d1cad75a712a83e5f0d3a764d09d9d486e7ab2e6b8bf26365eca8e0237e7238c39de52947b5ba363a9cdee
-
Filesize
77KB
MD5cb60860caf2fd6f36ff61dc9a79f88d7
SHA1fda5347d40f4b16cacde26b94141308a0659a8b6
SHA2562cad0f809e36665365d1f5feebd0874914a89408d841931f9174c01e446eb129
SHA512da523cf981f301b85ceacccd7b553e9d5f0947944758b9728cc9686a31b9523648bcf7456dce03cf681801d87727ed1b1c8f72535c8bfd6cf0b0e5950667cbcf
-
Filesize
77KB
MD558198cf383c724e5064b6ef0374beed1
SHA1747c8bcea3617e4c8d3c7c8fac8343e59641246d
SHA256b1475f2011e4fd3097068b19781d23f0e1e3c9a5b1bb5ecf9c8934d44b4362e3
SHA5127a498d31bc7b4e7c19e59d3776ec1d3a9445672489b525c747d87b26fa578f5b7fa7bdc76c1590bd9014c3d4dd4f31577535e92e370ee6ae4c94639b4422c4c1
-
Filesize
77KB
MD50f72f97dac8248b9bdad73ae7e269ebb
SHA1420895ca0128923488e63a7c8938cf9a797de68d
SHA256381492d8cf47a3d995d522b96eb96806ae10ce14142ea73ac20e41fd585f7527
SHA512bb4af683c05d9bbbb80182ece0e858b3fb2d970847cbf411c7bed64da70b4eb09bc49bc3ce35e6350e99e2684a6088c73712adffca322d8d730015f67b94442e
-
Filesize
77KB
MD5f967f326714a7f1278619799a54537eb
SHA1c6f7f52a2126d605a429662309657943fef8deea
SHA256fcc7e6a02f5442479b9fbcd414dae02ae3df48ab7251a807aa6cf0440e2964be
SHA5122304ffeab3f647c6a00ab5df5dff45625415daabb30fe84e896560719ef5eec698f472e16b340b5c80ea8d2c92e3307b8cad7e619db391c3a4e824002279e6dc
-
Filesize
77KB
MD5c023c7dd80bdaee94d3b6184e9fb319e
SHA1fb92b8adc89d6df2da08c28e0b2e51a26a78c7ee
SHA256e05471d0bca5b2d82475b0c7f6e45968c540f1be2c4d37ce602f64797ce30609
SHA512d68225fa2868972caf722dbed2fca4f39a441529d5b74f4f1379cba7f0b4bb178090f050a2fecdca85053b494c92a71e1175150ee2119803cac8c638e4389c9e
-
Filesize
77KB
MD560f49e52bb95a04572076039acf48264
SHA1f7c87c9b03aa8dad313a12323c9a0cf0c83174a4
SHA256129f3bf702ede888b5ebcccf75c060c840560549eb79860ee1db77567fea9d26
SHA51249cb629674230bee4f68c8ff8d1263b2abdebad3d96b421b54962acb48fefed939a0968fe7e63b2b7ec6cdb09b0c63f03a4afba7cbbf9e714352f01940075568
-
Filesize
77KB
MD5a88d048af45d53728c78f9af55532469
SHA10934ec31145c97e9229ebaa315bdd2d5b9b7262b
SHA256066d781f09a7fedb343c013fb1199adfbd70252598b417828d8c03cd878692e4
SHA51204b83d2d7e759047b21514032642047683bfadb46b7fc5fcc0a75cd1c9583b7b84dddb559cafebeb1f4feb5528b914aabbcb460b3b353a54dbc01f4b682dfdbe
-
Filesize
77KB
MD57d6106676a962633fbd17e6ea815bb2a
SHA1badcde3eb508f23ad6502e8243bfe394df776c09
SHA256f80e69eeed0997888d67324a0069a8488c25b3e72b998a5df9c5e0cae4a9abe2
SHA5121db335b0e090d8e8eb5e9a371e8de4f859683032e84e49f6368b67647435eb7aef4d94abef472efec09e47f05c9138504a504ff48076ca4e08a89529ef79fcf5
-
Filesize
77KB
MD56346941bf94ec8382a5f48e083f1d198
SHA1ed5b2661b42c1da94fac7be7eaa0057cb8955799
SHA256927c3b4925d126453182f37d100b6376e7c655964d419e41c9173fe969938c78
SHA5127d6aae11c4708e249994fb28260d0b73c2000d2da5dac65dab08ce21e8448a2b2d5e0cd22b24b9217d98fbdaffb371919eed4fa1b085a24205c29131f5a39ac0
-
Filesize
77KB
MD53a24721c40d267c17913b89bfc50121c
SHA1a43a4d7cff56ee9d62f637a83e75615298891f12
SHA256cb4ccd57a7b1a380b88da17a10437b9104daf1b3cdcc085d5944ac104429a606
SHA51280dd702fe0cb0eb7e497429bbdb208244da6c72e61550dfb28aacb0916d82fc64842e575c24a4d6278b0ebbbed90620110650773b485390c87988ea68c5aa6e5
-
Filesize
77KB
MD58377b4267326c682f0039fe9e0c50d49
SHA109ecbe19fdf5418c6c2a1f8d85e7412c80d81619
SHA256d3c22f78016f695c5e71ddc37c0b1dce172490238316ff1d8f1f126cb363591d
SHA51246f1323fcc8f84e0ed6254b2be48fb58d848ca8567fa886fae13e1c6a09f261e2d584aa3e258860efb814033bb7956412f1c786a27af2306bc555b58e03fdc48
-
Filesize
77KB
MD5d9362a1b31089db55d60343853a7712f
SHA1529eebc6d16632cad2c5395ae94717cf9b2d112d
SHA256ced55b9071e67553013d863d445ff4532520928056c1753fe844cbdaedc07abe
SHA512d6a3c5081923593b8306811b405b869fcc5630b32bb53954374ced4b7b8cc69d8ded2419f9bab4af59caad2d46f3f515c42124e0544db1b7f053c634d75a5938
-
Filesize
77KB
MD5b1e2d8df6b35e948132f731f31ea788e
SHA1fded242ef2d5f5ad848803135f08501f593a48be
SHA2567ac7d1c31c5e6a2c60113b9278826e1de724d4d2b7cc10d8f5be83f4adec567b
SHA512d726d4dc77f3498785ebf2dbf0dce39b6c3e80c5551d14361cdfdc59a48727e95b3c1d965ce80ab9ad406e803b211a7b3e31e224bc49babb647ee1c74cc64a61
-
Filesize
77KB
MD5a692e99caf0788fd6934ec418a4ec856
SHA11327e5a942982f64c4d4f55c3072cb97e13968bd
SHA256fbb0faa90c1124a20165838e18d8e7968cc195554990cef0cb969c57e62203f6
SHA512d4b16f56b32855d9b90f507f2a3911aad30fb34df631018f65944e5b5bf07292e1962618fb521520bc8fc48a386c491826c1f61ea2dabdb306d9efe1d159011e
-
Filesize
77KB
MD543775d79d594896a5b0d86222f6c51e6
SHA12584dfba2874f914434eeb0256c1430e8a578ac5
SHA256fb467737d96b287079eeb9d5b4014441fe795966c5627b096317f7f3552831b7
SHA512e15ce9baa8c4505495339ba33d6790927557036c5ef75d4da8f1e9a4968092937471972baeabb02224c43462672640db68fcc7c1490c115ceed160109bdfd10b
-
Filesize
77KB
MD5656005fb613414fab531f4d2a733da8c
SHA1ecd540982f44c59eaca953a7d68f719b7b8fb19f
SHA25635272127f25ee5e2728389d755984dcea1d3401243e61a2d9c65d9aa832c744f
SHA5127deb36ec5c1b1575eb014dcebc84dea203b510e61929517e6b7a4ab9be3c377f536be8f79fecdecb0353451a408e044536ec3c0f6e017c0019214398bc605bba
-
Filesize
77KB
MD50f19f73602fc5d4562c1659688edb6f8
SHA1a9371a91d2383230b6d8dab01015fbff6b2d609d
SHA2566bb6fce721eec89bbe07014b7d4ae9d45205c62987918fef7d805ef620f0cdae
SHA512565229cc6dc5fb7461ebbb9978c4f5908ed7f5f6e3c37cd4dc96dcafdcc9bd3d2aa1cb4effaa514d5fdeb37b9e170e2433fd111157d29de579a20df02cc5e1b9
-
Filesize
77KB
MD5c97be91e87304252441c65c75b87233a
SHA1a565950a671eaa43f6f968ec03e08f593e16a013
SHA2568f8cff3152155a43bf81d9d5a5269a16c510f58830aeed1165f5b898411bc2ed
SHA512bba9e2cf1c1401dc7ae7032883dd92c574552e1c408b2cb36e184a7058a4acec782b2a369836f1e353281348a8d86358e964b1a9205be2f79c0703a589974f50
-
Filesize
77KB
MD54d99a63491ffd527587df45291980b82
SHA1e1db6df2fc638fd439472b838e8a9291ec2cb475
SHA256e0bedafe93868943a11afc36ba29ceb140d6487db3973899a42ea5cd0745b9a0
SHA512d41c519c9cb120f92a231a1c833aeebdd884fc2583ceb3edf514c49126f98f5731bcb63eabb9b3c5a830cffe2771e9dec5ac6e98d4492ee465b8193fcf3c1e3c
-
Filesize
77KB
MD5b47d0ef601250a67c312e0e213390ce4
SHA18f240729eaaed0490a3f6772f183eba09c629f78
SHA256f6ea51c9884747a4b5ac855b870f741f302a0dbedfd83d26babd93ff53b321ff
SHA51217c2875c0f9f35865de713a6f87c3280f4857bd226b5e88ae8fbf72b3456388930a15f770a8adfc00e08ec0397d1856f44cceeae85b1c4a0345e72480b5fc175
-
Filesize
77KB
MD56dbd08981ec0ee648d931ddce3126364
SHA1696ed3f2a159e03c8b48b133aaab8174eef27356
SHA256c24628af83fdc647429b050458058220706cd6ba8750e759578f08b97c4e0d34
SHA5129cbcebbcb534d4137bf496f2bf891d7e5224bce9310a48c6a72c2b2808f3430465305befe5db344d2458c6e7db0851fb523fd358465a074cd4d7a991b471c4ed
-
Filesize
77KB
MD5b226017dd55f3f19df5ff33e0974407b
SHA1349dcab71807eaf3ab7177b6d9c0de1cde85f466
SHA2562c83371a5d25c872f241b0ef40600806a3ed27938413f9a0fb09fdde9dfef649
SHA5120b923f7c38a30bc373fe3b04958b6f5d3fa27dea7e1e3761a6bd46a9ef1ace76fda06b205c34ecabf7200ad01708a9a933b606ec27efbabe4393daa298850e56