Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12-09-2024 00:33
Static task
static1
Behavioral task
behavioral1
Sample
a8cbc0b3143086a328d8b1d1e24cab47267325dde3cae692302b6705fe4fb681.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a8cbc0b3143086a328d8b1d1e24cab47267325dde3cae692302b6705fe4fb681.exe
Resource
win10v2004-20240802-en
General
-
Target
a8cbc0b3143086a328d8b1d1e24cab47267325dde3cae692302b6705fe4fb681.exe
-
Size
67KB
-
MD5
42499d22801c26b9c187e0fd47e1ec54
-
SHA1
265f9f55fba58dba31350740aea46b61710ad5bf
-
SHA256
a8cbc0b3143086a328d8b1d1e24cab47267325dde3cae692302b6705fe4fb681
-
SHA512
e9cf5f1fa42763e4a39ab2828def1e16bf5273552263e390f13f0e1422f670d6fa47e79b4c9985a724a6f275161d7402e2ed8d24236f45940d08e977bf058ea0
-
SSDEEP
1536:hc2B98P9MK9m3RLrk6BjVIqpvpLB4T44X1Ap4IlneAoXq8KRQ3R/Rj:VB9Wj0RLrHBXpvZBC44FhK+Qe3Vx
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 28 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ddmaok32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Dhkjej32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ddakjkqi.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Daqbip32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dmcibama.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ddakjkqi.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dhmgki32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Dogogcpo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Dknpmdfc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" a8cbc0b3143086a328d8b1d1e24cab47267325dde3cae692302b6705fe4fb681.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Dmcibama.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Dfknkg32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Daconoae.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Daconoae.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Daekdooc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dfknkg32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dogogcpo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Daekdooc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Deagdn32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad a8cbc0b3143086a328d8b1d1e24cab47267325dde3cae692302b6705fe4fb681.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ddmaok32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Daqbip32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dkifae32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Dkifae32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dknpmdfc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dhkjej32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Dhmgki32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Deagdn32.exe -
Executes dropped EXE 14 IoCs
pid Process 3948 Dmcibama.exe 4428 Ddmaok32.exe 4604 Dfknkg32.exe 4820 Daqbip32.exe 3564 Dhkjej32.exe 524 Dkifae32.exe 5112 Daconoae.exe 3452 Ddakjkqi.exe 1372 Dhmgki32.exe 2988 Dogogcpo.exe 2444 Daekdooc.exe 3648 Deagdn32.exe 3736 Dknpmdfc.exe 4908 Dmllipeg.exe -
Drops file in System32 directory 42 IoCs
description ioc Process File created C:\Windows\SysWOW64\Cogflbdn.dll Ddmaok32.exe File opened for modification C:\Windows\SysWOW64\Ddakjkqi.exe Daconoae.exe File created C:\Windows\SysWOW64\Gifhkeje.dll Daconoae.exe File opened for modification C:\Windows\SysWOW64\Dmcibama.exe a8cbc0b3143086a328d8b1d1e24cab47267325dde3cae692302b6705fe4fb681.exe File created C:\Windows\SysWOW64\Pdheac32.dll Dhkjej32.exe File created C:\Windows\SysWOW64\Daekdooc.exe Dogogcpo.exe File created C:\Windows\SysWOW64\Dhkjej32.exe Daqbip32.exe File opened for modification C:\Windows\SysWOW64\Dhkjej32.exe Daqbip32.exe File created C:\Windows\SysWOW64\Lbabpnmn.dll Dhmgki32.exe File created C:\Windows\SysWOW64\Jjjald32.dll Dmcibama.exe File opened for modification C:\Windows\SysWOW64\Daconoae.exe Dkifae32.exe File created C:\Windows\SysWOW64\Ohmoom32.dll Dogogcpo.exe File created C:\Windows\SysWOW64\Kahdohfm.dll Daekdooc.exe File created C:\Windows\SysWOW64\Nokpao32.dll Deagdn32.exe File created C:\Windows\SysWOW64\Daqbip32.exe Dfknkg32.exe File opened for modification C:\Windows\SysWOW64\Dfknkg32.exe Ddmaok32.exe File created C:\Windows\SysWOW64\Jbpbca32.dll Daqbip32.exe File created C:\Windows\SysWOW64\Dkifae32.exe Dhkjej32.exe File created C:\Windows\SysWOW64\Oammoc32.dll Dkifae32.exe File opened for modification C:\Windows\SysWOW64\Dhmgki32.exe Ddakjkqi.exe File created C:\Windows\SysWOW64\Fpdaoioe.dll Ddakjkqi.exe File opened for modification C:\Windows\SysWOW64\Dogogcpo.exe Dhmgki32.exe File created C:\Windows\SysWOW64\Dmcibama.exe a8cbc0b3143086a328d8b1d1e24cab47267325dde3cae692302b6705fe4fb681.exe File opened for modification C:\Windows\SysWOW64\Deagdn32.exe Daekdooc.exe File created C:\Windows\SysWOW64\Deagdn32.exe Daekdooc.exe File created C:\Windows\SysWOW64\Dfknkg32.exe Ddmaok32.exe File opened for modification C:\Windows\SysWOW64\Daekdooc.exe Dogogcpo.exe File opened for modification C:\Windows\SysWOW64\Dmllipeg.exe Dknpmdfc.exe File created C:\Windows\SysWOW64\Kmfjodai.dll a8cbc0b3143086a328d8b1d1e24cab47267325dde3cae692302b6705fe4fb681.exe File opened for modification C:\Windows\SysWOW64\Dkifae32.exe Dhkjej32.exe File created C:\Windows\SysWOW64\Daconoae.exe Dkifae32.exe File created C:\Windows\SysWOW64\Dknpmdfc.exe Deagdn32.exe File created C:\Windows\SysWOW64\Kngpec32.dll Dknpmdfc.exe File opened for modification C:\Windows\SysWOW64\Ddmaok32.exe Dmcibama.exe File opened for modification C:\Windows\SysWOW64\Daqbip32.exe Dfknkg32.exe File created C:\Windows\SysWOW64\Jdipdgch.dll Dfknkg32.exe File created C:\Windows\SysWOW64\Ddakjkqi.exe Daconoae.exe File created C:\Windows\SysWOW64\Dhmgki32.exe Ddakjkqi.exe File created C:\Windows\SysWOW64\Dogogcpo.exe Dhmgki32.exe File opened for modification C:\Windows\SysWOW64\Dknpmdfc.exe Deagdn32.exe File created C:\Windows\SysWOW64\Dmllipeg.exe Dknpmdfc.exe File created C:\Windows\SysWOW64\Ddmaok32.exe Dmcibama.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1964 4908 WerFault.exe 97 -
System Location Discovery: System Language Discovery 1 TTPs 15 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dhkjej32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dhmgki32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Daekdooc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ddakjkqi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a8cbc0b3143086a328d8b1d1e24cab47267325dde3cae692302b6705fe4fb681.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dmcibama.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ddmaok32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dfknkg32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Daqbip32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dkifae32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Daconoae.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dogogcpo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Deagdn32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dknpmdfc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dmllipeg.exe -
Modifies registry class 45 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pdheac32.dll" Dhkjej32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Deagdn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Ddmaok32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Dfknkg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Daqbip32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Daqbip32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Dhmgki32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kmfjodai.dll" a8cbc0b3143086a328d8b1d1e24cab47267325dde3cae692302b6705fe4fb681.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Dmcibama.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Dhkjej32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oammoc32.dll" Dkifae32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Dknpmdfc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Dfknkg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Daconoae.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fpdaoioe.dll" Ddakjkqi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Dogogcpo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jdipdgch.dll" Dfknkg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jbpbca32.dll" Daqbip32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Dhkjej32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Dkifae32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 a8cbc0b3143086a328d8b1d1e24cab47267325dde3cae692302b6705fe4fb681.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID a8cbc0b3143086a328d8b1d1e24cab47267325dde3cae692302b6705fe4fb681.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" a8cbc0b3143086a328d8b1d1e24cab47267325dde3cae692302b6705fe4fb681.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Ddmaok32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Dhmgki32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kahdohfm.dll" Daekdooc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831} a8cbc0b3143086a328d8b1d1e24cab47267325dde3cae692302b6705fe4fb681.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Daconoae.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Dogogcpo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Deagdn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node a8cbc0b3143086a328d8b1d1e24cab47267325dde3cae692302b6705fe4fb681.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gifhkeje.dll" Daconoae.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Ddakjkqi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Ddakjkqi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lbabpnmn.dll" Dhmgki32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Daekdooc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nokpao32.dll" Deagdn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jjjald32.dll" Dmcibama.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Dmcibama.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cogflbdn.dll" Ddmaok32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Dkifae32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kngpec32.dll" Dknpmdfc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ohmoom32.dll" Dogogcpo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Daekdooc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Dknpmdfc.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 3612 wrote to memory of 3948 3612 a8cbc0b3143086a328d8b1d1e24cab47267325dde3cae692302b6705fe4fb681.exe 83 PID 3612 wrote to memory of 3948 3612 a8cbc0b3143086a328d8b1d1e24cab47267325dde3cae692302b6705fe4fb681.exe 83 PID 3612 wrote to memory of 3948 3612 a8cbc0b3143086a328d8b1d1e24cab47267325dde3cae692302b6705fe4fb681.exe 83 PID 3948 wrote to memory of 4428 3948 Dmcibama.exe 84 PID 3948 wrote to memory of 4428 3948 Dmcibama.exe 84 PID 3948 wrote to memory of 4428 3948 Dmcibama.exe 84 PID 4428 wrote to memory of 4604 4428 Ddmaok32.exe 85 PID 4428 wrote to memory of 4604 4428 Ddmaok32.exe 85 PID 4428 wrote to memory of 4604 4428 Ddmaok32.exe 85 PID 4604 wrote to memory of 4820 4604 Dfknkg32.exe 86 PID 4604 wrote to memory of 4820 4604 Dfknkg32.exe 86 PID 4604 wrote to memory of 4820 4604 Dfknkg32.exe 86 PID 4820 wrote to memory of 3564 4820 Daqbip32.exe 87 PID 4820 wrote to memory of 3564 4820 Daqbip32.exe 87 PID 4820 wrote to memory of 3564 4820 Daqbip32.exe 87 PID 3564 wrote to memory of 524 3564 Dhkjej32.exe 88 PID 3564 wrote to memory of 524 3564 Dhkjej32.exe 88 PID 3564 wrote to memory of 524 3564 Dhkjej32.exe 88 PID 524 wrote to memory of 5112 524 Dkifae32.exe 89 PID 524 wrote to memory of 5112 524 Dkifae32.exe 89 PID 524 wrote to memory of 5112 524 Dkifae32.exe 89 PID 5112 wrote to memory of 3452 5112 Daconoae.exe 90 PID 5112 wrote to memory of 3452 5112 Daconoae.exe 90 PID 5112 wrote to memory of 3452 5112 Daconoae.exe 90 PID 3452 wrote to memory of 1372 3452 Ddakjkqi.exe 91 PID 3452 wrote to memory of 1372 3452 Ddakjkqi.exe 91 PID 3452 wrote to memory of 1372 3452 Ddakjkqi.exe 91 PID 1372 wrote to memory of 2988 1372 Dhmgki32.exe 92 PID 1372 wrote to memory of 2988 1372 Dhmgki32.exe 92 PID 1372 wrote to memory of 2988 1372 Dhmgki32.exe 92 PID 2988 wrote to memory of 2444 2988 Dogogcpo.exe 94 PID 2988 wrote to memory of 2444 2988 Dogogcpo.exe 94 PID 2988 wrote to memory of 2444 2988 Dogogcpo.exe 94 PID 2444 wrote to memory of 3648 2444 Daekdooc.exe 95 PID 2444 wrote to memory of 3648 2444 Daekdooc.exe 95 PID 2444 wrote to memory of 3648 2444 Daekdooc.exe 95 PID 3648 wrote to memory of 3736 3648 Deagdn32.exe 96 PID 3648 wrote to memory of 3736 3648 Deagdn32.exe 96 PID 3648 wrote to memory of 3736 3648 Deagdn32.exe 96 PID 3736 wrote to memory of 4908 3736 Dknpmdfc.exe 97 PID 3736 wrote to memory of 4908 3736 Dknpmdfc.exe 97 PID 3736 wrote to memory of 4908 3736 Dknpmdfc.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\a8cbc0b3143086a328d8b1d1e24cab47267325dde3cae692302b6705fe4fb681.exe"C:\Users\Admin\AppData\Local\Temp\a8cbc0b3143086a328d8b1d1e24cab47267325dde3cae692302b6705fe4fb681.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3612 -
C:\Windows\SysWOW64\Dmcibama.exeC:\Windows\system32\Dmcibama.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3948 -
C:\Windows\SysWOW64\Ddmaok32.exeC:\Windows\system32\Ddmaok32.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4428 -
C:\Windows\SysWOW64\Dfknkg32.exeC:\Windows\system32\Dfknkg32.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Windows\SysWOW64\Daqbip32.exeC:\Windows\system32\Daqbip32.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Windows\SysWOW64\Dhkjej32.exeC:\Windows\system32\Dhkjej32.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3564 -
C:\Windows\SysWOW64\Dkifae32.exeC:\Windows\system32\Dkifae32.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:524 -
C:\Windows\SysWOW64\Daconoae.exeC:\Windows\system32\Daconoae.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Windows\SysWOW64\Ddakjkqi.exeC:\Windows\system32\Ddakjkqi.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3452 -
C:\Windows\SysWOW64\Dhmgki32.exeC:\Windows\system32\Dhmgki32.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Windows\SysWOW64\Dogogcpo.exeC:\Windows\system32\Dogogcpo.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Windows\SysWOW64\Daekdooc.exeC:\Windows\system32\Daekdooc.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Windows\SysWOW64\Deagdn32.exeC:\Windows\system32\Deagdn32.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3648 -
C:\Windows\SysWOW64\Dknpmdfc.exeC:\Windows\system32\Dknpmdfc.exe14⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3736 -
C:\Windows\SysWOW64\Dmllipeg.exeC:\Windows\system32\Dmllipeg.exe15⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4908 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4908 -s 40816⤵
- Program crash
PID:1964
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4908 -ip 49081⤵PID:4248
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5bae01bbeb807192ca5112b35179ac52b
SHA12a4442d228031a9e995c10bc7d1e7df6c65b4672
SHA256b678e2cc5db20bdc108ceae8ef79d9684c8cedf8b3a95382fbb50f5c663ab880
SHA512c3ea7af12cbe9d5b29afceed0a67ac69a03691b448827cb4954d05d3f211b7440253286c1ca7dfbc1def80c21084e36da73eace8be1cee75d8613bf602d06a8e
-
Filesize
67KB
MD52902f5a3b66ac054e1b129d33276e34a
SHA1458b2d4443edaa385ac7f28831a551ed7fc4a1bc
SHA2567b8bd89f09cd7dd4b1d50a70a5346140b7d884eea6bf957f3c5bf4e06453834f
SHA512494d662387c9c16fc521e545f7259fab15bae0bea10e37844b73e94c22a8efd6046e0f4e4bb906b5fe340001c278875ee13d94cb89cf1ad40c4c8cd1cca06b04
-
Filesize
67KB
MD5d679d35a52e6c1b855c63b41632d6364
SHA17ee4e4bb94ae08fed0e5fbf2838f1a666264924f
SHA2568e9a233bd9d89fa2a850c962bb8bdd523d6676dfb5411dee079c4ce807b1c2d8
SHA5123d5a565786a641c299b0f82d8f4e5b0aa40dc67828fb8eae09999d4d1db700446d4dd239c0befb8437a184d7ee977ba5e4a6f0d2841228fa2899ad78aa389e3a
-
Filesize
67KB
MD5edd0f6f37d9f092ef4d978cc8c770479
SHA10dc19de76d4ef19933d17e0bf7c2a76d3bd0e0ec
SHA256b073942bae3c1eb350e6a7adc457f59144870aef99536d05f656bb7d378f4a17
SHA5120d7172b0b2374c4abb09528d7f35c662a62c79609616eceec0e2f426bc4b6db12428045d4fed5e2b7ecd55dfa15dc02b3785d7171843310ff3815b0e1665ccec
-
Filesize
67KB
MD5782b5e28b49d96758390abe07bceee1b
SHA161a4930be12c7e1528cdc53917c2dcf38b69b3e8
SHA256a413ec9b6f4a1bb1bd78d8701fd94838efe11b5e2a6fbef25e082318c21ec992
SHA5126d2f989255b16999b21c59f68ec97580cc32a6f5c34bb5834a15ebc6cc800e740938ef9fe1a2fc409dd05571a9eb3457547825503456f7474164195b1f3aa9c5
-
Filesize
67KB
MD5cad1e762ea76952942bc8d13cb941bed
SHA1792efc34f96f58abf9defc4494123a951ec1323d
SHA2565d37542a276caa03616f327fd562c3bdf91c6b9c4963f7dbf95b6ae3b0c59988
SHA5129d304286b225672dfa3a54c2b21fc8a135a1624678d1f048ccd1554d51557746309f2465cfa1b6254874363aa546cc41706eaf4f6b93677b5cf0e52607657c4c
-
Filesize
67KB
MD5c12fa1b6af558178f12bb8a94491baa4
SHA113d3efb19714d0849622a4a1a5629692bcacbdac
SHA2568ff1f2ad0e5aa8a3a8b48008d7104a2484cfdf835ad81f8cf9e6f15f3d64d991
SHA51234ecc9392c15ddfdaf958c68be5fa32ba49c00d08a76499754293f46e0650e374bf412f7b5434d1a1227937d36575f257f98c6cd534b4c73b10e901ed739dc83
-
Filesize
67KB
MD5b83a42285ec2055983d10b2ef3ea8413
SHA151e40477373c04b2fef92807db514c446f1d3fac
SHA256021a1df83754c82d56cbac989a83661f8123f204c8c5cfc39ed9485f689d90bb
SHA512733f1f9ae51500122c8b6654a22b13d79406161e39384ba5b3f03d6046b2482bb6a3ec82b4dee9344c616e620e93553c7c099c6995bee88e38bd5028e4142592
-
Filesize
67KB
MD5aa118b782dee4401c1d03d65f9d36ae0
SHA1df8be17b81f7d267317885305d4357e063cb3b4b
SHA256d46c38d87e0557ad3b9c3890f7408d726f7c7ba61d3792858e66235ffad3f861
SHA512030f66533ba8707cf0aa5ca57c19a6fb88149b2ed214419051b447d0e53bdded377cf82d1e491b10d7ce7c7c54c7ef3e81731378b59d2ddabf69a2eda9c3d0b1
-
Filesize
67KB
MD5f8357bc888c781c9d25e0a74fd9043ff
SHA1aaf34e3521c85acefdcf6f4d1464c8954866eb00
SHA2567abc2ab0668ff72f8f8a1daa7b8f3888bcdfd606e4018d5e2f8036f1894d9605
SHA5121e4a612895257d0e09a197f1e71192ff4044ad6f6e3ce995ffa1b74c4a8c043c0e41bb2d95a61053f7c989c41a562fdf493cd4dcc165602104a7fe728552e889
-
Filesize
67KB
MD5d8147f5142482808c68b05cd061355c8
SHA1b4293e94f2a0baa3654a69b6ccca3120e9d711c9
SHA2568488d6eaf2776b5d8594d6c53e57ab4ac1d8d8e45a5b7c05965b9b80cb50338e
SHA5120137de01924b901a20ab79bf79e9091391f5f6dc369155a261297f4b2dac04a20c2a1c6157127153af86a2da8a1baceb0c839fb94d3cd647eb2bea41ef628608
-
Filesize
67KB
MD5d468c2ee71ee2b6ed04b15899781a6db
SHA11e7a237ca5cea69484a110662088260993ee13ff
SHA256b8934bb085d5bd2e61ab3abc0c93bc26c5b91133178ead1a42911742833aaaf5
SHA512f5965faacd0071f2813accfc61e577edbdb422e5932fa22861bd9a4c201905de50351207601d6126c8128bf53cb61454d6c7ef61a47778835ff980ff4292c1b2
-
Filesize
67KB
MD567b9b3c456e204e74f7519ac430c840e
SHA1e5b9158fbf17772327951f7b87c83cdda0ebae26
SHA256f8b6364ca8c1c652ca7f3cbdb1962f40f7b142368bcf69775b1bbc23703052ef
SHA512520fa64bf5fa52819acb437d43c4981d2035d0a4a7b8b32699cbbc4df84cb4b3d99a29429ed33eed83823b6f90cf789247e53d8ac491e5226e9d64382158dfd6
-
Filesize
67KB
MD53432e64c8c31df77078e1031719bc7c2
SHA19334648fd4762ec33b8f21dab46cfb6e830e4e20
SHA25625a90ac6ce679d1d358999398ce4685a2851534bac0aa6813095d7ce4ab91621
SHA512e0c20d506b5623faf1e1405438cd689707a824f0e0d859d4889703539426e59deed473ab26a7a850b6eedd5bb94c92cf37e052320e71c1d13dff63d0450935b2
-
Filesize
7KB
MD5371e2d38f164d249b0e2914914676432
SHA17e2e6aabe9d6577b807d99edf7eac0810ce3ad89
SHA256d5f6cd8d1b8a4763813950c9fe3c64234d6855c99ad150a52c68097285f7f7b7
SHA51278bbb9055f381c5ed91ba5c44a29ceaff8fff0c6fe9f74341b659a535d8981d34781bc651015677b4e7ccd8b3e7f341595592bcf64060bf3995132ecd0f27fca