Analysis
-
max time kernel
94s -
max time network
105s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13-09-2024 16:59
Static task
static1
Behavioral task
behavioral1
Sample
511c19c21a28a4d008bd713683c64720N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
511c19c21a28a4d008bd713683c64720N.exe
Resource
win10v2004-20240802-en
General
-
Target
511c19c21a28a4d008bd713683c64720N.exe
-
Size
74KB
-
MD5
511c19c21a28a4d008bd713683c64720
-
SHA1
8daa062b7ab3c77c5db9d2802e3ad03aae5ceac8
-
SHA256
e1a63d788c3c486d0914279edb9e156946a5a397043cb7641b44800a15268d5a
-
SHA512
95268cb88f8335831acfba514990e76505f713176ade806c85864ac8f3f2d1ed855994b5f4a98ebe14895cdd1ec1e23c94e1bb772897de321358cf35f69ca3a2
-
SSDEEP
1536:/cF81e6FPDZb56JkA1BEwMxlNxdN7GcXqyUooZXO3NIHPicyqGU:/GSsJkplBNKQq9Xe3OvoqG
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 22 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dmefhako.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Delnin32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dmgbnq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Dkkcge32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Daekdooc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dddhpjof.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Dgbdlf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" 511c19c21a28a4d008bd713683c64720N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Dfknkg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Dmefhako.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Daekdooc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dfknkg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ddakjkqi.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dkkcge32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dgbdlf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 511c19c21a28a4d008bd713683c64720N.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Delnin32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dfnjafap.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Dfnjafap.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Dmgbnq32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ddakjkqi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Dddhpjof.exe -
Executes dropped EXE 11 IoCs
pid Process 3228 Dfknkg32.exe 952 Dmefhako.exe 988 Delnin32.exe 3568 Dfnjafap.exe 3920 Dmgbnq32.exe 4848 Ddakjkqi.exe 3448 Dkkcge32.exe 3008 Daekdooc.exe 3212 Dddhpjof.exe 5052 Dgbdlf32.exe 3476 Dmllipeg.exe -
Drops file in System32 directory 33 IoCs
description ioc Process File created C:\Windows\SysWOW64\Cogflbdn.dll 511c19c21a28a4d008bd713683c64720N.exe File opened for modification C:\Windows\SysWOW64\Delnin32.exe Dmefhako.exe File opened for modification C:\Windows\SysWOW64\Dgbdlf32.exe Dddhpjof.exe File opened for modification C:\Windows\SysWOW64\Dmllipeg.exe Dgbdlf32.exe File created C:\Windows\SysWOW64\Gidbim32.dll Dfknkg32.exe File created C:\Windows\SysWOW64\Dmgbnq32.exe Dfnjafap.exe File created C:\Windows\SysWOW64\Ohmoom32.dll Dkkcge32.exe File created C:\Windows\SysWOW64\Dfnjafap.exe Delnin32.exe File created C:\Windows\SysWOW64\Ihidnp32.dll Dfnjafap.exe File created C:\Windows\SysWOW64\Dkkcge32.exe Ddakjkqi.exe File created C:\Windows\SysWOW64\Dgbdlf32.exe Dddhpjof.exe File created C:\Windows\SysWOW64\Gfghpl32.dll Dddhpjof.exe File created C:\Windows\SysWOW64\Kngpec32.dll Dgbdlf32.exe File opened for modification C:\Windows\SysWOW64\Dmefhako.exe Dfknkg32.exe File opened for modification C:\Windows\SysWOW64\Dmgbnq32.exe Dfnjafap.exe File created C:\Windows\SysWOW64\Ddakjkqi.exe Dmgbnq32.exe File opened for modification C:\Windows\SysWOW64\Dkkcge32.exe Ddakjkqi.exe File created C:\Windows\SysWOW64\Daekdooc.exe Dkkcge32.exe File created C:\Windows\SysWOW64\Dmllipeg.exe Dgbdlf32.exe File created C:\Windows\SysWOW64\Dfknkg32.exe 511c19c21a28a4d008bd713683c64720N.exe File opened for modification C:\Windows\SysWOW64\Ddakjkqi.exe Dmgbnq32.exe File created C:\Windows\SysWOW64\Gifhkeje.dll Dmgbnq32.exe File created C:\Windows\SysWOW64\Jcbdhp32.dll Ddakjkqi.exe File opened for modification C:\Windows\SysWOW64\Dddhpjof.exe Daekdooc.exe File created C:\Windows\SysWOW64\Amjknl32.dll Daekdooc.exe File created C:\Windows\SysWOW64\Dmefhako.exe Dfknkg32.exe File created C:\Windows\SysWOW64\Gmcfdb32.dll Dmefhako.exe File created C:\Windows\SysWOW64\Poahbe32.dll Delnin32.exe File opened for modification C:\Windows\SysWOW64\Daekdooc.exe Dkkcge32.exe File created C:\Windows\SysWOW64\Dddhpjof.exe Daekdooc.exe File opened for modification C:\Windows\SysWOW64\Dfknkg32.exe 511c19c21a28a4d008bd713683c64720N.exe File created C:\Windows\SysWOW64\Delnin32.exe Dmefhako.exe File opened for modification C:\Windows\SysWOW64\Dfnjafap.exe Delnin32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1144 3476 WerFault.exe 93 -
System Location Discovery: System Language Discovery 1 TTPs 12 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dmefhako.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dfnjafap.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dmgbnq32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ddakjkqi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dkkcge32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Daekdooc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 511c19c21a28a4d008bd713683c64720N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Delnin32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dddhpjof.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dgbdlf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dmllipeg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dfknkg32.exe -
Modifies registry class 36 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gidbim32.dll" Dfknkg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Dmefhako.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ihidnp32.dll" Dfnjafap.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Dddhpjof.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ddakjkqi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID 511c19c21a28a4d008bd713683c64720N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717} 511c19c21a28a4d008bd713683c64720N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Dfknkg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Dmgbnq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Amjknl32.dll" Daekdooc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Dgbdlf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gfghpl32.dll" Dddhpjof.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kngpec32.dll" Dgbdlf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" 511c19c21a28a4d008bd713683c64720N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gmcfdb32.dll" Dmefhako.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Delnin32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Dfnjafap.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cogflbdn.dll" 511c19c21a28a4d008bd713683c64720N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Dmefhako.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Poahbe32.dll" Delnin32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ohmoom32.dll" Dkkcge32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Dddhpjof.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node 511c19c21a28a4d008bd713683c64720N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Dfnjafap.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Dmgbnq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jcbdhp32.dll" Ddakjkqi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Delnin32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Dkkcge32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Dkkcge32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Daekdooc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Daekdooc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Dgbdlf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 511c19c21a28a4d008bd713683c64720N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Dfknkg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gifhkeje.dll" Dmgbnq32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ddakjkqi.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 2360 wrote to memory of 3228 2360 511c19c21a28a4d008bd713683c64720N.exe 83 PID 2360 wrote to memory of 3228 2360 511c19c21a28a4d008bd713683c64720N.exe 83 PID 2360 wrote to memory of 3228 2360 511c19c21a28a4d008bd713683c64720N.exe 83 PID 3228 wrote to memory of 952 3228 Dfknkg32.exe 84 PID 3228 wrote to memory of 952 3228 Dfknkg32.exe 84 PID 3228 wrote to memory of 952 3228 Dfknkg32.exe 84 PID 952 wrote to memory of 988 952 Dmefhako.exe 85 PID 952 wrote to memory of 988 952 Dmefhako.exe 85 PID 952 wrote to memory of 988 952 Dmefhako.exe 85 PID 988 wrote to memory of 3568 988 Delnin32.exe 86 PID 988 wrote to memory of 3568 988 Delnin32.exe 86 PID 988 wrote to memory of 3568 988 Delnin32.exe 86 PID 3568 wrote to memory of 3920 3568 Dfnjafap.exe 87 PID 3568 wrote to memory of 3920 3568 Dfnjafap.exe 87 PID 3568 wrote to memory of 3920 3568 Dfnjafap.exe 87 PID 3920 wrote to memory of 4848 3920 Dmgbnq32.exe 88 PID 3920 wrote to memory of 4848 3920 Dmgbnq32.exe 88 PID 3920 wrote to memory of 4848 3920 Dmgbnq32.exe 88 PID 4848 wrote to memory of 3448 4848 Ddakjkqi.exe 89 PID 4848 wrote to memory of 3448 4848 Ddakjkqi.exe 89 PID 4848 wrote to memory of 3448 4848 Ddakjkqi.exe 89 PID 3448 wrote to memory of 3008 3448 Dkkcge32.exe 90 PID 3448 wrote to memory of 3008 3448 Dkkcge32.exe 90 PID 3448 wrote to memory of 3008 3448 Dkkcge32.exe 90 PID 3008 wrote to memory of 3212 3008 Daekdooc.exe 91 PID 3008 wrote to memory of 3212 3008 Daekdooc.exe 91 PID 3008 wrote to memory of 3212 3008 Daekdooc.exe 91 PID 3212 wrote to memory of 5052 3212 Dddhpjof.exe 92 PID 3212 wrote to memory of 5052 3212 Dddhpjof.exe 92 PID 3212 wrote to memory of 5052 3212 Dddhpjof.exe 92 PID 5052 wrote to memory of 3476 5052 Dgbdlf32.exe 93 PID 5052 wrote to memory of 3476 5052 Dgbdlf32.exe 93 PID 5052 wrote to memory of 3476 5052 Dgbdlf32.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\511c19c21a28a4d008bd713683c64720N.exe"C:\Users\Admin\AppData\Local\Temp\511c19c21a28a4d008bd713683c64720N.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Windows\SysWOW64\Dfknkg32.exeC:\Windows\system32\Dfknkg32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3228 -
C:\Windows\SysWOW64\Dmefhako.exeC:\Windows\system32\Dmefhako.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:952 -
C:\Windows\SysWOW64\Delnin32.exeC:\Windows\system32\Delnin32.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:988 -
C:\Windows\SysWOW64\Dfnjafap.exeC:\Windows\system32\Dfnjafap.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3568 -
C:\Windows\SysWOW64\Dmgbnq32.exeC:\Windows\system32\Dmgbnq32.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3920 -
C:\Windows\SysWOW64\Ddakjkqi.exeC:\Windows\system32\Ddakjkqi.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Windows\SysWOW64\Dkkcge32.exeC:\Windows\system32\Dkkcge32.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3448 -
C:\Windows\SysWOW64\Daekdooc.exeC:\Windows\system32\Daekdooc.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Windows\SysWOW64\Dddhpjof.exeC:\Windows\system32\Dddhpjof.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3212 -
C:\Windows\SysWOW64\Dgbdlf32.exeC:\Windows\system32\Dgbdlf32.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Windows\SysWOW64\Dmllipeg.exeC:\Windows\system32\Dmllipeg.exe12⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3476 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3476 -s 41613⤵
- Program crash
PID:1144
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3476 -ip 34761⤵PID:2088
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74KB
MD5ba9210db590771af2bd43aaedf0e1ab5
SHA176fdbecfbf1362fe184e0bd58a2c260c9fffbb74
SHA256b9f370b88e335906714afca9beecef3a48fa4cb12f9b380831e81996be8067a4
SHA5122513c7d6cde82e024eb9d6675341281f9ab920574b43c6b05d8fbf356a4488acaf3568583be9e7228ccb6f54273809f41c405df1c5e05b5c947cc17a6658edf5
-
Filesize
74KB
MD5a753b2e597323f95bfa083db96d7abbc
SHA113cf2599b88686a66d49471a1787e0a00b4c4c95
SHA256bdc53f1d8101617f837967c5717853b95746cbbf338c9313e3f19b3b7c70fc63
SHA5124ebc48dc91d9d3fb5a8fac4c5eba899da75bda977eb4036c3b75953f8175c54c1dc8d14a594a0231bd15571ffeee0ea25450ca3adf3aa3ecd3367e2c11542f4f
-
Filesize
74KB
MD5445a22f839840244145d4fca92f12898
SHA1301c5f8418a2023f85f8d92f82968de34d555155
SHA25601b295ea18114648f398647a9a39fb53c1ad995fca688aba418bfe976eb4386a
SHA512d7617ee093c1b9b0e9d207f4b47e68cb8ed8b6d2b54e011af79b4d9f74e1e77b8aa10ee583300323ac2df9e5a8c1af9364691346e94411fca23e9c5affabcc33
-
Filesize
74KB
MD5b7fbfb4b344b05b04f6a2a6cf6d4def9
SHA1a53821ae63ce85392db69d0aaba1bd37bfd8a968
SHA2561a1f0002a1271aca0e3d84ad395c036d4758d4d06da1a9a9eb03e3a7327a4d28
SHA5127cb110cc07af17ae6927c5dd0270a6ef5b0729d6b4b076d928ce010b36e5620b9cf0295b776d8d99173cf012aa5a0c3b56ecf28b963ebdc3cca95e931f7bf58c
-
Filesize
74KB
MD5e753305e96347a2dcca313e7dd8a1522
SHA1c7fce8782a703eb295cb6fb841a38edccb49b6f9
SHA25665daaac83e6b6acdf3f38a94195ee9bf29290f8acde476b28dddaabfc8e74e5e
SHA51281ff30ecfd1099faf74e23ef0c8e4f1f1b064373372e716798d11205d2c542b65158da5cfbc045b07bce404b7c475eb969b3b0b8c82569986658509d25bee544
-
Filesize
74KB
MD5fa7c500ed5db584919bfaac1e0cbb697
SHA1fdb478ac38e06738d8eef32217a6806900b37ea3
SHA256f2b391703c8bda7717c986c4b65d748f2721550259223d064490745cff52ac9e
SHA51278a812224b86de8515d3f570c8cf16d31889ff66c74d547e54b470b18f401ddd9a3d4c8d9c509431a9fb64da26334c0c2619fc6d2845992c8b24e831c4446fb3
-
Filesize
74KB
MD5b6f6ba493c574b634a684d811df703e2
SHA157a02ec95d12e254d11bbebfbaec41806c5020eb
SHA25672caa8bd62f90fb3c59fd478030ca1eb063059dff5b94d6749c5dd3d8caab23a
SHA5128f031912a1cd00d29849159c481a20eb9a19c7c64e4d525cae0422c4a545371aa308adde621d289bb0dfb9614658f996d5c19efbf5b02418ef287eb6e833ed62
-
Filesize
74KB
MD51145424c73b2b598772548641e8215da
SHA16ec8b0d4b2dd84a25027978f4ad7d2a7bc777688
SHA256b2b4ddfa42587f0157cfda69d8605e095138133041ecd7aff1db2e10df91acd0
SHA512620d2e8e69ff199e5ceb0d59b7f7bb45ee4d9563cd1fa0d84a589c860581df7aa6e7fc8138ed4b3565f37f3b87ca247104dc03be1a96c10eff53d00529019433
-
Filesize
74KB
MD547bff0fb54f52a46b4b4f7eed51f86f4
SHA10d5914165699ec5392b90fafff50925c6e2418d6
SHA256471725dab145da5b39fc9842ae2c0882c47b9d685b7e90d29f3417cd5fc786e6
SHA5124d3464c1d81b6443166d84cff475a6865fe08414a53a807118a49f58ae2272aef3515fd6b98f84293f5927506eb667f8ed943d44f11cb12a41ca8a48b1c61bc4
-
Filesize
74KB
MD55bf7834c98a611ef707fef9dc2871981
SHA10daa90abb98633c73c089b26e03e5e54f7af6cfc
SHA256fbad722a75ac72f11d55fbd90a360d2c724b0d9d3e77529ff678751ee34a4307
SHA51211af5be9efd7b906ea0d3c1aec6b7cc3cc3f364702b7eade337c1e1b3996a77771b0c5dbe9101efedace79398bbeda16482c078568834549e1cf4831e87e2416
-
Filesize
74KB
MD5e8fdfc39b803ddd9f52aeffa5d098be6
SHA1fbe3c2acedf1bc30f8edf209bddde92e3f9e6a7a
SHA2566ed4d807318f807bcd0dc45ca6002ebab8d79b622e95d1849c7d247cad4aeefc
SHA5126d9c77c7003fb5e112cceebee1dcbc0658140bb471a60098ff5f4f760982eccafa8f9fd5a6b053c55e67ca2a82994fb9d387c8dbfa0c203ca10271f5d5661a0c
-
Filesize
74KB
MD5a237e6a51456f1f1fac35df6862317fc
SHA1a204b92fdad4bd244d2960428544d045a6d1df8c
SHA2566046608959fad343efda52c2ee532d4edab69b6591328ea23ee87ccdbaa072da
SHA5123cea33131a160ac8b1ff6cf6c362b0ea57dda4b873a1ae87c286ad00a757dd0ce7b02b92cbd75696a116ad278391d0b23b526d97f33db606088fe64ed60e9ba6
-
Filesize
7KB
MD5bb09192d6734e7f7c5c9cc8a9c155e85
SHA10144481ccf28a171ea21ba7aae34ea22a0e5956e
SHA256ebe2ea44665022eb97beccb4c1d4e67678e7dc162cb7858f323f307743a54478
SHA51211e206dce4cb442eae3051da0cd3d83d9b62950659b9eb162e08968a30275b8204084a30fb89794e9c99dc24995756b2c2a5585abedc5963d723c9dea0322f44