Analysis
-
max time kernel
84s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/09/2024, 00:33
Static task
static1
Behavioral task
behavioral1
Sample
a8cbc0b3143086a328d8b1d1e24cab47267325dde3cae692302b6705fe4fb681.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a8cbc0b3143086a328d8b1d1e24cab47267325dde3cae692302b6705fe4fb681.exe
Resource
win10v2004-20240802-en
General
-
Target
a8cbc0b3143086a328d8b1d1e24cab47267325dde3cae692302b6705fe4fb681.exe
-
Size
67KB
-
MD5
42499d22801c26b9c187e0fd47e1ec54
-
SHA1
265f9f55fba58dba31350740aea46b61710ad5bf
-
SHA256
a8cbc0b3143086a328d8b1d1e24cab47267325dde3cae692302b6705fe4fb681
-
SHA512
e9cf5f1fa42763e4a39ab2828def1e16bf5273552263e390f13f0e1422f670d6fa47e79b4c9985a724a6f275161d7402e2ed8d24236f45940d08e977bf058ea0
-
SSDEEP
1536:hc2B98P9MK9m3RLrk6BjVIqpvpLB4T44X1Ap4IlneAoXq8KRQ3R/Rj:VB9Wj0RLrHBXpvZBC44FhK+Qe3Vx
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 30 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dbpplglj.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dbbmaf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Dkkajlph.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Banggcka.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Banggcka.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Cfdflfjk.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cfipgf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Bebmgc32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bebmgc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Bedjmcgp.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dfdbkj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" a8cbc0b3143086a328d8b1d1e24cab47267325dde3cae692302b6705fe4fb681.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ahlphpmk.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bakkad32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Bakkad32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ckaodmhb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ckaodmhb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Dbpplglj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Dbbmaf32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad a8cbc0b3143086a328d8b1d1e24cab47267325dde3cae692302b6705fe4fb681.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dchcdn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Dfdbkj32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cfdflfjk.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ahlphpmk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Dchcdn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Cfbifgln.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cfbifgln.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Cfipgf32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dkkajlph.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bedjmcgp.exe -
Executes dropped EXE 15 IoCs
pid Process 1744 Ahlphpmk.exe 3060 Bebmgc32.exe 2700 Bedjmcgp.exe 2716 Bakkad32.exe 1704 Banggcka.exe 2600 Cfbifgln.exe 2640 Cfdflfjk.exe 2840 Ckaodmhb.exe 2056 Cfipgf32.exe 3032 Dbpplglj.exe 2908 Dbbmaf32.exe 2484 Dkkajlph.exe 1644 Dfdbkj32.exe 1100 Dchcdn32.exe 1112 Dbmpejph.exe -
Loads dropped DLL 34 IoCs
pid Process 2436 a8cbc0b3143086a328d8b1d1e24cab47267325dde3cae692302b6705fe4fb681.exe 2436 a8cbc0b3143086a328d8b1d1e24cab47267325dde3cae692302b6705fe4fb681.exe 1744 Ahlphpmk.exe 1744 Ahlphpmk.exe 3060 Bebmgc32.exe 3060 Bebmgc32.exe 2700 Bedjmcgp.exe 2700 Bedjmcgp.exe 2716 Bakkad32.exe 2716 Bakkad32.exe 1704 Banggcka.exe 1704 Banggcka.exe 2600 Cfbifgln.exe 2600 Cfbifgln.exe 2640 Cfdflfjk.exe 2640 Cfdflfjk.exe 2840 Ckaodmhb.exe 2840 Ckaodmhb.exe 2056 Cfipgf32.exe 2056 Cfipgf32.exe 3032 Dbpplglj.exe 3032 Dbpplglj.exe 2908 Dbbmaf32.exe 2908 Dbbmaf32.exe 2484 Dkkajlph.exe 2484 Dkkajlph.exe 1644 Dfdbkj32.exe 1644 Dfdbkj32.exe 1100 Dchcdn32.exe 1100 Dchcdn32.exe 2244 WerFault.exe 2244 WerFault.exe 2244 WerFault.exe 2244 WerFault.exe -
Drops file in System32 directory 45 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Bebmgc32.exe Ahlphpmk.exe File created C:\Windows\SysWOW64\Bakkad32.exe Bedjmcgp.exe File opened for modification C:\Windows\SysWOW64\Ckaodmhb.exe Cfdflfjk.exe File created C:\Windows\SysWOW64\Aiakfn32.dll Cfipgf32.exe File created C:\Windows\SysWOW64\Bdiphm32.dll Dkkajlph.exe File created C:\Windows\SysWOW64\Dchcdn32.exe Dfdbkj32.exe File opened for modification C:\Windows\SysWOW64\Dbmpejph.exe Dchcdn32.exe File opened for modification C:\Windows\SysWOW64\Bedjmcgp.exe Bebmgc32.exe File created C:\Windows\SysWOW64\Banggcka.exe Bakkad32.exe File opened for modification C:\Windows\SysWOW64\Banggcka.exe Bakkad32.exe File created C:\Windows\SysWOW64\Bgmcekbd.dll Cfdflfjk.exe File created C:\Windows\SysWOW64\Dfdbkj32.exe Dkkajlph.exe File opened for modification C:\Windows\SysWOW64\Dfdbkj32.exe Dkkajlph.exe File created C:\Windows\SysWOW64\Dkkpkkoa.dll Bakkad32.exe File created C:\Windows\SysWOW64\Cfdflfjk.exe Cfbifgln.exe File opened for modification C:\Windows\SysWOW64\Cfipgf32.exe Ckaodmhb.exe File created C:\Windows\SysWOW64\Obgogjmp.dll Ckaodmhb.exe File opened for modification C:\Windows\SysWOW64\Dkkajlph.exe Dbbmaf32.exe File created C:\Windows\SysWOW64\Klhjlbpq.dll Dchcdn32.exe File opened for modification C:\Windows\SysWOW64\Ahlphpmk.exe a8cbc0b3143086a328d8b1d1e24cab47267325dde3cae692302b6705fe4fb681.exe File created C:\Windows\SysWOW64\Bebmgc32.exe Ahlphpmk.exe File created C:\Windows\SysWOW64\Pcghicbm.dll Ahlphpmk.exe File opened for modification C:\Windows\SysWOW64\Cfbifgln.exe Banggcka.exe File created C:\Windows\SysWOW64\Cfipgf32.exe Ckaodmhb.exe File created C:\Windows\SysWOW64\Gifikp32.dll Dbpplglj.exe File created C:\Windows\SysWOW64\Cpamgobk.dll Bebmgc32.exe File created C:\Windows\SysWOW64\Jjjljj32.dll Banggcka.exe File created C:\Windows\SysWOW64\Ckaodmhb.exe Cfdflfjk.exe File created C:\Windows\SysWOW64\Nepenl32.dll a8cbc0b3143086a328d8b1d1e24cab47267325dde3cae692302b6705fe4fb681.exe File created C:\Windows\SysWOW64\Dbbmaf32.exe Dbpplglj.exe File created C:\Windows\SysWOW64\Dkkajlph.exe Dbbmaf32.exe File opened for modification C:\Windows\SysWOW64\Dchcdn32.exe Dfdbkj32.exe File created C:\Windows\SysWOW64\Ahlphpmk.exe a8cbc0b3143086a328d8b1d1e24cab47267325dde3cae692302b6705fe4fb681.exe File created C:\Windows\SysWOW64\Gnaqdnnd.dll Bedjmcgp.exe File created C:\Windows\SysWOW64\Fdkkoa32.dll Cfbifgln.exe File created C:\Windows\SysWOW64\Dbpplglj.exe Cfipgf32.exe File created C:\Windows\SysWOW64\Fpecfg32.dll Dfdbkj32.exe File created C:\Windows\SysWOW64\Dbmpejph.exe Dchcdn32.exe File created C:\Windows\SysWOW64\Bedjmcgp.exe Bebmgc32.exe File opened for modification C:\Windows\SysWOW64\Bakkad32.exe Bedjmcgp.exe File created C:\Windows\SysWOW64\Cfbifgln.exe Banggcka.exe File opened for modification C:\Windows\SysWOW64\Cfdflfjk.exe Cfbifgln.exe File opened for modification C:\Windows\SysWOW64\Dbpplglj.exe Cfipgf32.exe File opened for modification C:\Windows\SysWOW64\Dbbmaf32.exe Dbpplglj.exe File created C:\Windows\SysWOW64\Knfplgpp.dll Dbbmaf32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2244 1112 WerFault.exe 43 -
System Location Discovery: System Language Discovery 1 TTPs 16 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Banggcka.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ckaodmhb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dbbmaf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dfdbkj32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dbmpejph.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bebmgc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bakkad32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cfdflfjk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dkkajlph.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cfipgf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dbpplglj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dchcdn32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a8cbc0b3143086a328d8b1d1e24cab47267325dde3cae692302b6705fe4fb681.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ahlphpmk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bedjmcgp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cfbifgln.exe -
Modifies registry class 48 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aiakfn32.dll" Cfipgf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Dfdbkj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" a8cbc0b3143086a328d8b1d1e24cab47267325dde3cae692302b6705fe4fb681.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Bakkad32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Cfbifgln.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Bedjmcgp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Banggcka.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Cfdflfjk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Cfipgf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Dbbmaf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 a8cbc0b3143086a328d8b1d1e24cab47267325dde3cae692302b6705fe4fb681.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node a8cbc0b3143086a328d8b1d1e24cab47267325dde3cae692302b6705fe4fb681.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nepenl32.dll" a8cbc0b3143086a328d8b1d1e24cab47267325dde3cae692302b6705fe4fb681.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Dfdbkj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dkkpkkoa.dll" Bakkad32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Obgogjmp.dll" Ckaodmhb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Ckaodmhb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gifikp32.dll" Dbpplglj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Dbbmaf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831} a8cbc0b3143086a328d8b1d1e24cab47267325dde3cae692302b6705fe4fb681.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Ahlphpmk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Ahlphpmk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Dchcdn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pcghicbm.dll" Ahlphpmk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Banggcka.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bgmcekbd.dll" Cfdflfjk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Dbpplglj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fpecfg32.dll" Dfdbkj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Bebmgc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Bedjmcgp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jjjljj32.dll" Banggcka.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Ckaodmhb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Knfplgpp.dll" Dbbmaf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Dkkajlph.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Dchcdn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID a8cbc0b3143086a328d8b1d1e24cab47267325dde3cae692302b6705fe4fb681.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Bakkad32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Cfbifgln.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Cfdflfjk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Bebmgc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cpamgobk.dll" Bebmgc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fdkkoa32.dll" Cfbifgln.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Dkkajlph.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bdiphm32.dll" Dkkajlph.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Klhjlbpq.dll" Dchcdn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gnaqdnnd.dll" Bedjmcgp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Cfipgf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Dbpplglj.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2436 wrote to memory of 1744 2436 a8cbc0b3143086a328d8b1d1e24cab47267325dde3cae692302b6705fe4fb681.exe 29 PID 2436 wrote to memory of 1744 2436 a8cbc0b3143086a328d8b1d1e24cab47267325dde3cae692302b6705fe4fb681.exe 29 PID 2436 wrote to memory of 1744 2436 a8cbc0b3143086a328d8b1d1e24cab47267325dde3cae692302b6705fe4fb681.exe 29 PID 2436 wrote to memory of 1744 2436 a8cbc0b3143086a328d8b1d1e24cab47267325dde3cae692302b6705fe4fb681.exe 29 PID 1744 wrote to memory of 3060 1744 Ahlphpmk.exe 30 PID 1744 wrote to memory of 3060 1744 Ahlphpmk.exe 30 PID 1744 wrote to memory of 3060 1744 Ahlphpmk.exe 30 PID 1744 wrote to memory of 3060 1744 Ahlphpmk.exe 30 PID 3060 wrote to memory of 2700 3060 Bebmgc32.exe 31 PID 3060 wrote to memory of 2700 3060 Bebmgc32.exe 31 PID 3060 wrote to memory of 2700 3060 Bebmgc32.exe 31 PID 3060 wrote to memory of 2700 3060 Bebmgc32.exe 31 PID 2700 wrote to memory of 2716 2700 Bedjmcgp.exe 32 PID 2700 wrote to memory of 2716 2700 Bedjmcgp.exe 32 PID 2700 wrote to memory of 2716 2700 Bedjmcgp.exe 32 PID 2700 wrote to memory of 2716 2700 Bedjmcgp.exe 32 PID 2716 wrote to memory of 1704 2716 Bakkad32.exe 33 PID 2716 wrote to memory of 1704 2716 Bakkad32.exe 33 PID 2716 wrote to memory of 1704 2716 Bakkad32.exe 33 PID 2716 wrote to memory of 1704 2716 Bakkad32.exe 33 PID 1704 wrote to memory of 2600 1704 Banggcka.exe 34 PID 1704 wrote to memory of 2600 1704 Banggcka.exe 34 PID 1704 wrote to memory of 2600 1704 Banggcka.exe 34 PID 1704 wrote to memory of 2600 1704 Banggcka.exe 34 PID 2600 wrote to memory of 2640 2600 Cfbifgln.exe 35 PID 2600 wrote to memory of 2640 2600 Cfbifgln.exe 35 PID 2600 wrote to memory of 2640 2600 Cfbifgln.exe 35 PID 2600 wrote to memory of 2640 2600 Cfbifgln.exe 35 PID 2640 wrote to memory of 2840 2640 Cfdflfjk.exe 36 PID 2640 wrote to memory of 2840 2640 Cfdflfjk.exe 36 PID 2640 wrote to memory of 2840 2640 Cfdflfjk.exe 36 PID 2640 wrote to memory of 2840 2640 Cfdflfjk.exe 36 PID 2840 wrote to memory of 2056 2840 Ckaodmhb.exe 37 PID 2840 wrote to memory of 2056 2840 Ckaodmhb.exe 37 PID 2840 wrote to memory of 2056 2840 Ckaodmhb.exe 37 PID 2840 wrote to memory of 2056 2840 Ckaodmhb.exe 37 PID 2056 wrote to memory of 3032 2056 Cfipgf32.exe 38 PID 2056 wrote to memory of 3032 2056 Cfipgf32.exe 38 PID 2056 wrote to memory of 3032 2056 Cfipgf32.exe 38 PID 2056 wrote to memory of 3032 2056 Cfipgf32.exe 38 PID 3032 wrote to memory of 2908 3032 Dbpplglj.exe 39 PID 3032 wrote to memory of 2908 3032 Dbpplglj.exe 39 PID 3032 wrote to memory of 2908 3032 Dbpplglj.exe 39 PID 3032 wrote to memory of 2908 3032 Dbpplglj.exe 39 PID 2908 wrote to memory of 2484 2908 Dbbmaf32.exe 40 PID 2908 wrote to memory of 2484 2908 Dbbmaf32.exe 40 PID 2908 wrote to memory of 2484 2908 Dbbmaf32.exe 40 PID 2908 wrote to memory of 2484 2908 Dbbmaf32.exe 40 PID 2484 wrote to memory of 1644 2484 Dkkajlph.exe 41 PID 2484 wrote to memory of 1644 2484 Dkkajlph.exe 41 PID 2484 wrote to memory of 1644 2484 Dkkajlph.exe 41 PID 2484 wrote to memory of 1644 2484 Dkkajlph.exe 41 PID 1644 wrote to memory of 1100 1644 Dfdbkj32.exe 42 PID 1644 wrote to memory of 1100 1644 Dfdbkj32.exe 42 PID 1644 wrote to memory of 1100 1644 Dfdbkj32.exe 42 PID 1644 wrote to memory of 1100 1644 Dfdbkj32.exe 42 PID 1100 wrote to memory of 1112 1100 Dchcdn32.exe 43 PID 1100 wrote to memory of 1112 1100 Dchcdn32.exe 43 PID 1100 wrote to memory of 1112 1100 Dchcdn32.exe 43 PID 1100 wrote to memory of 1112 1100 Dchcdn32.exe 43 PID 1112 wrote to memory of 2244 1112 Dbmpejph.exe 44 PID 1112 wrote to memory of 2244 1112 Dbmpejph.exe 44 PID 1112 wrote to memory of 2244 1112 Dbmpejph.exe 44 PID 1112 wrote to memory of 2244 1112 Dbmpejph.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\a8cbc0b3143086a328d8b1d1e24cab47267325dde3cae692302b6705fe4fb681.exe"C:\Users\Admin\AppData\Local\Temp\a8cbc0b3143086a328d8b1d1e24cab47267325dde3cae692302b6705fe4fb681.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Windows\SysWOW64\Ahlphpmk.exeC:\Windows\system32\Ahlphpmk.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Windows\SysWOW64\Bebmgc32.exeC:\Windows\system32\Bebmgc32.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Windows\SysWOW64\Bedjmcgp.exeC:\Windows\system32\Bedjmcgp.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\SysWOW64\Bakkad32.exeC:\Windows\system32\Bakkad32.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\SysWOW64\Banggcka.exeC:\Windows\system32\Banggcka.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\SysWOW64\Cfbifgln.exeC:\Windows\system32\Cfbifgln.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Windows\SysWOW64\Cfdflfjk.exeC:\Windows\system32\Cfdflfjk.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\SysWOW64\Ckaodmhb.exeC:\Windows\system32\Ckaodmhb.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\SysWOW64\Cfipgf32.exeC:\Windows\system32\Cfipgf32.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\SysWOW64\Dbpplglj.exeC:\Windows\system32\Dbpplglj.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\SysWOW64\Dbbmaf32.exeC:\Windows\system32\Dbbmaf32.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Windows\SysWOW64\Dkkajlph.exeC:\Windows\system32\Dkkajlph.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Windows\SysWOW64\Dfdbkj32.exeC:\Windows\system32\Dfdbkj32.exe14⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Windows\SysWOW64\Dchcdn32.exeC:\Windows\system32\Dchcdn32.exe15⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Windows\SysWOW64\Dbmpejph.exeC:\Windows\system32\Dbmpejph.exe16⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1112 -s 14017⤵
- Loads dropped DLL
- Program crash
PID:2244
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD570ed509d80f479177c1eb4eea96c9260
SHA105cf0a7cd1fd356de26ea1d4189b62f771ae2be5
SHA256ecf5a05ebd15bd346d9b7343fc8f0fced478531543eeb629eee14affd21b7dfa
SHA5123fbd2e4f0df1aba64d3a149a0c2ff101d915d4522e795da3b1a2907e724b52b52d3dd6f1a0dbcedbce6b9131c36e5a43a7dba3d9ab0c8a06ba0607e3b38add30
-
Filesize
7KB
MD58642c2cb46cf24adbd5f95babfd4b804
SHA1c06a74925e45479f83a9980a91e1e757b57976f0
SHA256eb8ce30f50220a35688402537ada6f7dbfe6f4f816a76437311de9105055f018
SHA5125d2740b5474b1b6ade35b9211b8c5a1ec235b7600b12d1e8fa763dbcff2f3dc2fec7207b368bd2c6a8e7d8556ecf3b6789425f19552cec25228258af09e7b98e
-
Filesize
67KB
MD52aac804975302adc248abced2d8fcd08
SHA112eb81b95d3646c289dea9e6b28ac3ac59ce2ffe
SHA25691530bebf86d3b27056102c4731711f6eee8984aa4d6f6de20a05cf8a174b5fb
SHA5122a1cc3e6efb4b47d03c97c10a033632a0bc3d9359224ebff3d80a18f0bf496e11861052a7b45b5bfe4980b86af8d580c500ff463eec8f97f14bd278c2840e1f3
-
Filesize
67KB
MD5d7c6e49fca5eccae3a9af37f9e3176d9
SHA146fa59e3ae245e55cb4cc9c77196ab2d5533fd2b
SHA25655a8a2df2114b440a1fefd79c32ef21520e13dc447aa8e6f42fe5b9e0156516a
SHA51299b6b16e2219c5802603a0fa1e5b8c78b61430e09bfc023b082658403bb180d31c027252762e1271d2ec0a0047033c9bc926cb27ef825c0cdd3f7818abfa0bc9
-
Filesize
67KB
MD5a5e9dcee62861229f47af1a2051084ef
SHA1e27f6215b830cbc6f134e21f5ba2c99e1a5b47c5
SHA256997a87b8919d1fec77865c300f9e063240530c558e17ee1aedfd711056cd3575
SHA5126d2459b1dcf0b120e1620c357710206d32f4f023ff65b5da18f8df9edfb7053e4cddf58daf81818dbe250a8b9dfc8d0a1650baa40650e9bd104a5a3bfb0c6cfb
-
Filesize
67KB
MD52fa4bbc042762c7461e85144adcdda97
SHA10a7b681957a19fe171c6ef3cf2e4ee0d83ad5c28
SHA256aea260a77e5b528e263a8b2c23c3462f7e1e82d524a4f82f77b5bcb7166a8f11
SHA51223396055565d97005af00626e59c716ea62d44619ce22a9a8d693365800f9de16f791bb00a7922888d7c16d141f5456ab64a4e17d6f77f43afcc9f66ec7b9b92
-
Filesize
67KB
MD52b244e68f09c5734b92f82d8637d6cea
SHA113082639ffd2a76c62aaef10b54787956ad46cf0
SHA256ab610a447701ad153a0ae4801ecb6ecd65dae80eb3aabed8a6e9cd013abb219c
SHA5121d01581f828e17ff95a187d6f216ece4cb3f85550e48aad3b0781df26e97b3b865ef8a92ea734f724762fa926ac319bb323c334d1541e0bf1d39ae6cf879b5fd
-
Filesize
67KB
MD549459ff968010a21ad530ccecc4eeed0
SHA189fd924ed1d9498bcb713f555e300e74b525f003
SHA25610c8c15728f70693d4e36fc0dd84d4a0350cc15a158306fe115ec371e2090492
SHA512ae08c7af24c6ac86271b152ff7b4fcf566e7e58361a1e2bab3a2324d192fd11a5036f40002456df213b12ffb2a887ae6a65ad64c24a23a06482252859d5635df
-
Filesize
67KB
MD5c6449045a997a9677f2fe8833bfcde21
SHA171dc13145b9d3294d1aeea932da2b50ca4acb1d2
SHA256c89242f156ce6da20ac3b1ecf0b5fae3f1eacaf501bfead04e288b1797fa2647
SHA512ab787c3049447ce5a9a1fe79c056b5a3748a0bc9ab2f16c9fb148156df65813a17f6ef04106b7149796f0e5492748be119732effcb5ab31f72503763add1e633
-
Filesize
67KB
MD561217916bc91effcae79afaf553042f3
SHA1a85116c42c579563cbb7a087e03897449ed18a28
SHA256356c1a27258c1e714d29af98d27ad609ff946eaadb79446166df7d07f54ecf53
SHA5120c617c0e6e37f2782f24f36929d05ae4886de5c7a46d87b3dd14dbf04e2047965350cd3e65b51b55d0c7230983f082cad39ec28bba618bf853c49139ba91dcd5
-
Filesize
67KB
MD5d4957b721498c118b4e420929acce853
SHA1258321bd0633de43a5b1f3cddf2c9c724349dc95
SHA2561a7c9cb43b980ef2be57e0227651a10fd5d3434d09302ea89d69224b42617469
SHA5121769e9f263ce60819c83a8e82a4942d03dff74f0dbfd77f86ad92b52f416f12a8d4d4b8ce62abbaf3297578336cd3072cb78cfb111a98a31bd865917471fade4
-
Filesize
67KB
MD58c0091fdeeb6f3c4b0b635be7bc522af
SHA13057cf9e5fcac0dbb7b46be2614a8d2b9446836a
SHA256fd4806a701c1c65ca97c023e2c78df60cd2f6d0f1329744ed3ab437c5144dbd1
SHA5125716c1d736d781ab8c3fa29ee7aeb5825194ee5778c434b368655f1bce5f3f052fadc401e1ee293a7a35b47026ced3aa5207208d282a2a1dacf805bbea5135cc
-
Filesize
67KB
MD53531b136e0308eedeb9b78fe3f53e171
SHA150f586511c90e87320d0d27f94f901505beb8da3
SHA2568d2341e0bbe95295538567d917ff0abd53c782c4ea9c63d43b5e3d9c335ddb4f
SHA512d7f19588c8b83fac84b9b93f654f88298530ac05a8e216eb187a4c96414f9324d8264da1314212596b175b8174bedf00dc9367e88235fc7f42f5d7030664d7f7
-
Filesize
67KB
MD593e1ed616fd7b5abb2444bdc5250f45e
SHA10a43a4855b695339ae9e2177f5e292bda080b1f6
SHA2569995ba2168ee0e097cd0aefbe53b5d67125af0dd64a2a3f307544ec40f51ef84
SHA5122dfdaddb5bc0d167d952bd415a34f83adb8068b4f2cf1cfce52e7f97283c1fb67e735e31ef6e23ca17b601724336453dd92c33afae058f5ac1e95e1d07f7d24b
-
Filesize
67KB
MD5ee233c8c0bd27b1b259303ffd148bbe7
SHA1f7bfcec087a934285785b8ec7de764af5599a365
SHA256b3b7c730c00ed39a8540d4c5f39fd7a98a4e354ef903b9b73b21cc962f56fdfc
SHA512515cd9e497fe53a13ec0712deef6db906fe5a679c6d8a4e6037ed7bd438fc90d9e46ec6da6743703ea57367166a08e6c0185f846be6aec1856c47fbf078bc4f1
-
Filesize
67KB
MD5f89ccae8c078d6d670a9609638dec9d2
SHA1bbe3ebdd4c415dbad9f9e6358f5cd9451209bc2f
SHA25690e9f9af3a77f668c77c9fe2c7118a4516abe4748bc9d03df719b5aea0343cdc
SHA512c988e29b3d290569f5327ba7ff5c7a1cd679f1f28fa6b411454ec503121ae929a007653aff7549bc8fb8528a853296ce1dd11167cdd96b8f04aeac2d24471265