Analysis
-
max time kernel
96s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20/09/2024, 22:30
Behavioral task
behavioral1
Sample
4bca9db6110d64a1e3870d8b7747caa971ce7b069b231a2d80290b2858753600N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4bca9db6110d64a1e3870d8b7747caa971ce7b069b231a2d80290b2858753600N.exe
Resource
win10v2004-20240802-en
General
-
Target
4bca9db6110d64a1e3870d8b7747caa971ce7b069b231a2d80290b2858753600N.exe
-
Size
163KB
-
MD5
a94484b11e74c7210deba0faeefcca80
-
SHA1
2bfa863c22d7bccf49afd8bfc88ff6329716a3f7
-
SHA256
4bca9db6110d64a1e3870d8b7747caa971ce7b069b231a2d80290b2858753600
-
SHA512
5405d50e622d3acd528adefb051945043f04d43010da61617f51cc388220b903e8a373b76a6618f059854952ee5e89ae85c4ab8d8cae596781417da5eef49efc
-
SSDEEP
1536:PiA1ynDouJMS8KUrp5PxC3IXlProNVU4qNVUrk/9QbfBr+7GwKrPAsqNVU:51qjJtU3ppXltOrWKDBr+yJb
Malware Config
Extracted
berbew
http://crutop.nu/index.php
http://devx.nm.ru/index.php
http://ros-neftbank.ru/index.php
http://master-x.com/index.php
http://www.redline.ru/index.php
http://cvv.ru/index.php
http://hackers.lv/index.php
http://fethard.biz/index.php
http://crutop.ru/index.php
http://kaspersky.ru/index.php
http://color-bank.ru/index.php
http://adult-empire.com/index.php
http://virus-list.com/index.php
http://trojan.ru/index.php
http://xware.cjb.net/index.htm
http://konfiskat.org/index.htm
http://parex-bank.ru/index.htm
http://fethard.biz/index.htm
http://ldark.nm.ru/index.htm
http://gaz-prom.ru/index.htm
http://promo.ru/index.htm
http://potleaf.chat.ru/index.htm
http://kadet.ru/index.htm
http://cvv.ru/index.htm
http://crutop.nu/index.htm
http://crutop.ru/index.htm
http://kaspersky.ru/index.htm
http://kidos-bank.ru/index.htm
http://kavkaz.ru/index.htm
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 30 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cjpckf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cjpckf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ddonekbl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Deokon32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dobfld32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ddonekbl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" 4bca9db6110d64a1e3870d8b7747caa971ce7b069b231a2d80290b2858753600N.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ceehho32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cjbpaf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dfiafg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Danecp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dhhnpjmh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dfpgffpm.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dhocqigp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dfiafg32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Danecp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dhhnpjmh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Deokon32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cjbpaf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cegdnopg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dfpgffpm.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dmjocp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dkifae32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cegdnopg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dobfld32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 4bca9db6110d64a1e3870d8b7747caa971ce7b069b231a2d80290b2858753600N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ceehho32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dkifae32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dmjocp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dhocqigp.exe -
Executes dropped EXE 15 IoCs
pid Process 3492 Cjpckf32.exe 552 Ceehho32.exe 4904 Cjbpaf32.exe 4420 Cegdnopg.exe 4628 Dfiafg32.exe 1284 Danecp32.exe 3108 Dhhnpjmh.exe 4720 Dobfld32.exe 2068 Ddonekbl.exe 1944 Dkifae32.exe 5088 Deokon32.exe 4944 Dfpgffpm.exe 2092 Dmjocp32.exe 768 Dhocqigp.exe 1804 Dmllipeg.exe -
Drops file in System32 directory 45 IoCs
description ioc Process File created C:\Windows\SysWOW64\Bobiobnp.dll Dfpgffpm.exe File created C:\Windows\SysWOW64\Cjpckf32.exe 4bca9db6110d64a1e3870d8b7747caa971ce7b069b231a2d80290b2858753600N.exe File created C:\Windows\SysWOW64\Ceehho32.exe Cjpckf32.exe File created C:\Windows\SysWOW64\Cegdnopg.exe Cjbpaf32.exe File created C:\Windows\SysWOW64\Danecp32.exe Dfiafg32.exe File opened for modification C:\Windows\SysWOW64\Ddonekbl.exe Dobfld32.exe File created C:\Windows\SysWOW64\Dmjocp32.exe Dfpgffpm.exe File created C:\Windows\SysWOW64\Jekpanpa.dll Cjpckf32.exe File created C:\Windows\SysWOW64\Dfiafg32.exe Cegdnopg.exe File opened for modification C:\Windows\SysWOW64\Dfiafg32.exe Cegdnopg.exe File created C:\Windows\SysWOW64\Agjbpg32.dll Dfiafg32.exe File created C:\Windows\SysWOW64\Nbgngp32.dll Danecp32.exe File created C:\Windows\SysWOW64\Amfoeb32.dll Dkifae32.exe File opened for modification C:\Windows\SysWOW64\Ceehho32.exe Cjpckf32.exe File created C:\Windows\SysWOW64\Jgilhm32.dll Ceehho32.exe File opened for modification C:\Windows\SysWOW64\Cegdnopg.exe Cjbpaf32.exe File created C:\Windows\SysWOW64\Mgcail32.dll Cjbpaf32.exe File opened for modification C:\Windows\SysWOW64\Dhhnpjmh.exe Danecp32.exe File created C:\Windows\SysWOW64\Alcidkmm.dll Dhhnpjmh.exe File created C:\Windows\SysWOW64\Kkmjgool.dll Cegdnopg.exe File opened for modification C:\Windows\SysWOW64\Deokon32.exe Dkifae32.exe File opened for modification C:\Windows\SysWOW64\Dmjocp32.exe Dfpgffpm.exe File opened for modification C:\Windows\SysWOW64\Dhocqigp.exe Dmjocp32.exe File opened for modification C:\Windows\SysWOW64\Cjpckf32.exe 4bca9db6110d64a1e3870d8b7747caa971ce7b069b231a2d80290b2858753600N.exe File created C:\Windows\SysWOW64\Dhhnpjmh.exe Danecp32.exe File created C:\Windows\SysWOW64\Ddonekbl.exe Dobfld32.exe File created C:\Windows\SysWOW64\Mjelcfha.dll Dobfld32.exe File created C:\Windows\SysWOW64\Deokon32.exe Dkifae32.exe File created C:\Windows\SysWOW64\Kmdjdl32.dll Deokon32.exe File opened for modification C:\Windows\SysWOW64\Dmllipeg.exe Dhocqigp.exe File created C:\Windows\SysWOW64\Kngpec32.dll Dhocqigp.exe File created C:\Windows\SysWOW64\Cjbpaf32.exe Ceehho32.exe File opened for modification C:\Windows\SysWOW64\Cjbpaf32.exe Ceehho32.exe File opened for modification C:\Windows\SysWOW64\Dobfld32.exe Dhhnpjmh.exe File created C:\Windows\SysWOW64\Dfpgffpm.exe Deokon32.exe File opened for modification C:\Windows\SysWOW64\Danecp32.exe Dfiafg32.exe File created C:\Windows\SysWOW64\Pdheac32.dll Ddonekbl.exe File opened for modification C:\Windows\SysWOW64\Dfpgffpm.exe Deokon32.exe File created C:\Windows\SysWOW64\Dhocqigp.exe Dmjocp32.exe File created C:\Windows\SysWOW64\Elkadb32.dll Dmjocp32.exe File created C:\Windows\SysWOW64\Cacamdcd.dll 4bca9db6110d64a1e3870d8b7747caa971ce7b069b231a2d80290b2858753600N.exe File created C:\Windows\SysWOW64\Dobfld32.exe Dhhnpjmh.exe File created C:\Windows\SysWOW64\Dkifae32.exe Ddonekbl.exe File opened for modification C:\Windows\SysWOW64\Dkifae32.exe Ddonekbl.exe File created C:\Windows\SysWOW64\Dmllipeg.exe Dhocqigp.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4032 1804 WerFault.exe 96 -
System Location Discovery: System Language Discovery 1 TTPs 16 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dkifae32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Deokon32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dfpgffpm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dhocqigp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ddonekbl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ceehho32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cjbpaf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Danecp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cjpckf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dobfld32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dmjocp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dmllipeg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dfiafg32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cegdnopg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dhhnpjmh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4bca9db6110d64a1e3870d8b7747caa971ce7b069b231a2d80290b2858753600N.exe -
Modifies registry class 48 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pdheac32.dll" Ddonekbl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Deokon32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kngpec32.dll" Dhocqigp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID 4bca9db6110d64a1e3870d8b7747caa971ce7b069b231a2d80290b2858753600N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cjpckf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jgilhm32.dll" Ceehho32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cjbpaf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Alcidkmm.dll" Dhhnpjmh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dfiafg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kmdjdl32.dll" Deokon32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dfpgffpm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node 4bca9db6110d64a1e3870d8b7747caa971ce7b069b231a2d80290b2858753600N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" 4bca9db6110d64a1e3870d8b7747caa971ce7b069b231a2d80290b2858753600N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cjpckf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Danecp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nbgngp32.dll" Danecp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dkifae32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dmjocp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dhocqigp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jekpanpa.dll" Cjpckf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Danecp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dhhnpjmh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mjelcfha.dll" Dobfld32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dkifae32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Deokon32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dfpgffpm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Elkadb32.dll" Dmjocp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cacamdcd.dll" 4bca9db6110d64a1e3870d8b7747caa971ce7b069b231a2d80290b2858753600N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ceehho32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cegdnopg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dhhnpjmh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dobfld32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dhocqigp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ddonekbl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ddonekbl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} 4bca9db6110d64a1e3870d8b7747caa971ce7b069b231a2d80290b2858753600N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ceehho32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mgcail32.dll" Cjbpaf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cjbpaf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cegdnopg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 4bca9db6110d64a1e3870d8b7747caa971ce7b069b231a2d80290b2858753600N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dfiafg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dobfld32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Amfoeb32.dll" Dkifae32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bobiobnp.dll" Dfpgffpm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kkmjgool.dll" Cegdnopg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Agjbpg32.dll" Dfiafg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dmjocp32.exe -
Suspicious use of WriteProcessMemory 45 IoCs
description pid Process procid_target PID 620 wrote to memory of 3492 620 4bca9db6110d64a1e3870d8b7747caa971ce7b069b231a2d80290b2858753600N.exe 82 PID 620 wrote to memory of 3492 620 4bca9db6110d64a1e3870d8b7747caa971ce7b069b231a2d80290b2858753600N.exe 82 PID 620 wrote to memory of 3492 620 4bca9db6110d64a1e3870d8b7747caa971ce7b069b231a2d80290b2858753600N.exe 82 PID 3492 wrote to memory of 552 3492 Cjpckf32.exe 83 PID 3492 wrote to memory of 552 3492 Cjpckf32.exe 83 PID 3492 wrote to memory of 552 3492 Cjpckf32.exe 83 PID 552 wrote to memory of 4904 552 Ceehho32.exe 84 PID 552 wrote to memory of 4904 552 Ceehho32.exe 84 PID 552 wrote to memory of 4904 552 Ceehho32.exe 84 PID 4904 wrote to memory of 4420 4904 Cjbpaf32.exe 85 PID 4904 wrote to memory of 4420 4904 Cjbpaf32.exe 85 PID 4904 wrote to memory of 4420 4904 Cjbpaf32.exe 85 PID 4420 wrote to memory of 4628 4420 Cegdnopg.exe 86 PID 4420 wrote to memory of 4628 4420 Cegdnopg.exe 86 PID 4420 wrote to memory of 4628 4420 Cegdnopg.exe 86 PID 4628 wrote to memory of 1284 4628 Dfiafg32.exe 87 PID 4628 wrote to memory of 1284 4628 Dfiafg32.exe 87 PID 4628 wrote to memory of 1284 4628 Dfiafg32.exe 87 PID 1284 wrote to memory of 3108 1284 Danecp32.exe 88 PID 1284 wrote to memory of 3108 1284 Danecp32.exe 88 PID 1284 wrote to memory of 3108 1284 Danecp32.exe 88 PID 3108 wrote to memory of 4720 3108 Dhhnpjmh.exe 89 PID 3108 wrote to memory of 4720 3108 Dhhnpjmh.exe 89 PID 3108 wrote to memory of 4720 3108 Dhhnpjmh.exe 89 PID 4720 wrote to memory of 2068 4720 Dobfld32.exe 90 PID 4720 wrote to memory of 2068 4720 Dobfld32.exe 90 PID 4720 wrote to memory of 2068 4720 Dobfld32.exe 90 PID 2068 wrote to memory of 1944 2068 Ddonekbl.exe 91 PID 2068 wrote to memory of 1944 2068 Ddonekbl.exe 91 PID 2068 wrote to memory of 1944 2068 Ddonekbl.exe 91 PID 1944 wrote to memory of 5088 1944 Dkifae32.exe 92 PID 1944 wrote to memory of 5088 1944 Dkifae32.exe 92 PID 1944 wrote to memory of 5088 1944 Dkifae32.exe 92 PID 5088 wrote to memory of 4944 5088 Deokon32.exe 93 PID 5088 wrote to memory of 4944 5088 Deokon32.exe 93 PID 5088 wrote to memory of 4944 5088 Deokon32.exe 93 PID 4944 wrote to memory of 2092 4944 Dfpgffpm.exe 94 PID 4944 wrote to memory of 2092 4944 Dfpgffpm.exe 94 PID 4944 wrote to memory of 2092 4944 Dfpgffpm.exe 94 PID 2092 wrote to memory of 768 2092 Dmjocp32.exe 95 PID 2092 wrote to memory of 768 2092 Dmjocp32.exe 95 PID 2092 wrote to memory of 768 2092 Dmjocp32.exe 95 PID 768 wrote to memory of 1804 768 Dhocqigp.exe 96 PID 768 wrote to memory of 1804 768 Dhocqigp.exe 96 PID 768 wrote to memory of 1804 768 Dhocqigp.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\4bca9db6110d64a1e3870d8b7747caa971ce7b069b231a2d80290b2858753600N.exe"C:\Users\Admin\AppData\Local\Temp\4bca9db6110d64a1e3870d8b7747caa971ce7b069b231a2d80290b2858753600N.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:620 -
C:\Windows\SysWOW64\Cjpckf32.exeC:\Windows\system32\Cjpckf32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3492 -
C:\Windows\SysWOW64\Ceehho32.exeC:\Windows\system32\Ceehho32.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Windows\SysWOW64\Cjbpaf32.exeC:\Windows\system32\Cjbpaf32.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Windows\SysWOW64\Cegdnopg.exeC:\Windows\system32\Cegdnopg.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4420 -
C:\Windows\SysWOW64\Dfiafg32.exeC:\Windows\system32\Dfiafg32.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4628 -
C:\Windows\SysWOW64\Danecp32.exeC:\Windows\system32\Danecp32.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Windows\SysWOW64\Dhhnpjmh.exeC:\Windows\system32\Dhhnpjmh.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3108 -
C:\Windows\SysWOW64\Dobfld32.exeC:\Windows\system32\Dobfld32.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Windows\SysWOW64\Ddonekbl.exeC:\Windows\system32\Ddonekbl.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Windows\SysWOW64\Dkifae32.exeC:\Windows\system32\Dkifae32.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Windows\SysWOW64\Deokon32.exeC:\Windows\system32\Deokon32.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Windows\SysWOW64\Dfpgffpm.exeC:\Windows\system32\Dfpgffpm.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Windows\SysWOW64\Dmjocp32.exeC:\Windows\system32\Dmjocp32.exe14⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Windows\SysWOW64\Dhocqigp.exeC:\Windows\system32\Dhocqigp.exe15⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:768 -
C:\Windows\SysWOW64\Dmllipeg.exeC:\Windows\system32\Dmllipeg.exe16⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1804 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1804 -s 40817⤵
- Program crash
PID:4032
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1804 -ip 18041⤵PID:4152
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
163KB
MD538d8f77a078b5022629fee309805d313
SHA172096e9ac53c7cb0a4229c53223ac88272971ea2
SHA2569a3b36b412939458b38709c89e728fd2ddac4de6caefc1a6d4e6fe9601561ec8
SHA5125e67b4d4c75c4da142875e05e9b8e6f9fae30f8cdf29a28557cf75661206b5c19e1f6fe3c2c4cb3be17a853a5bf911ad2f68f6e3d0a6eca415f800e6461527b3
-
Filesize
163KB
MD520173811081d3e50dd3c7db80f52eec4
SHA1f317748af4a696c4576f047ede21e1b2e0b24c6c
SHA2565ebb36e646c6a860fbf85343581cdcc907edb9cfa6833cb51403f9dc20a06427
SHA5125b595248ff0db81389cc33b85ff3ecbb2cb29cf736957c93580df9481a15c514733143793c09b65b74b89b9a9b1443384876c0af6e9e4587e38290b95ea9c5e2
-
Filesize
163KB
MD559aa0d6546db96a8359333ea298e7918
SHA10bcae175468ef462855e64b3ace1ec8d1f92e702
SHA256eb80ec9a1cd4b65c4ef02e6cb40a2b9d91e470df6fa75a01ea5d2652147d4bbf
SHA5123a7c41f56cf827ce89232c8101cf701be7b4d72900fef55e33a9b97de7b9921761aa55cd9cdab262ea40d27eda92632abc03b4eed5550c00ebe7b3006067125b
-
Filesize
163KB
MD5bd69667c965f42e151e46d1c8a7e789d
SHA1813dd03297caef599bfafc035f686bbe88207345
SHA256496c78d092ca6d61d1997f57d6102f5ef8e050cb331a676f78bab2931beec78b
SHA512a9bb4890e1c8e1dfae3d0a4f0dfdd8c9dc7322559a747d6ad2791de20e72f780e7ee9a627b7a5a8d4e779ee80b4f8b3934d61e10b6d420877d574368cbefd23b
-
Filesize
163KB
MD51956e0b64cedf8b565daeb5d514476e1
SHA1f1780d42a5f97195a0a058a9b12d5f221661ccda
SHA256df1d982461f7d617ba67a0513bc37d51535ed05d1af689a85ca27156b2b9b35c
SHA51263b27a947400fb5c58e668d436ded2f58c5c153e43f3952596e2d0ece41c354798ddbae688d7cd3d8c66eec001ad3f34e88acfe6934e3a18ef748d4c2d6cae34
-
Filesize
163KB
MD5854f39b3a7d252abe2ae2e4352eff896
SHA1f2fe7793c100d214169d7c4eb03954783edfeaf4
SHA256014839a13229312e0587a8d3596445fbf995a610146afad3ee16e9157b7e5b22
SHA512521f6643270cc796c17d1c3dc656470c331cec2ea82d3a98080dfe2aa0d6fbfc84fc313df7b7f3acc75625d7169b70cea1ab512d52402f7860230fd38fe68532
-
Filesize
128KB
MD520db973dcfafaa74d866b91eb005e6c6
SHA1627f74c83ec1cd550cfb325aa47b211e3a242932
SHA2566a482ef49f1bc984f80aa278cda781ca936f54b47c7263cea9d8b99369e0c57b
SHA512827cb193fdb22b9d22b5fbde6b93a0ad43372affc94a742b728ef45609ae6bdabc5939d10781a90ae72605e086d895a21df778e6ee02a0f98f328a28f0e43f22
-
Filesize
163KB
MD5a8f9e1c701551c7e18dc9984d77cd825
SHA1ec57d48eb93cc3c19bc9e01d16f1a9bc3b6ac5aa
SHA25651d5445318b06b6e56a723218e0fee79951de0a67f5951c4a56dd897fa9b58ac
SHA5128bb80d380540eea096c3b9566fff2a68e84c7afe02448f1cdded06c40f47639e118864035e862634a4c7b7d91e4e574edcbbc328bd166feb9d378748ae37ac8e
-
Filesize
163KB
MD53a965e78cf7ff47d8d7d09e38762e50c
SHA169ce20e8324ba06550babfafa738320bbae5e4f5
SHA2562dd47ec24358bf1410fbe9ddd232e0db401bb5de044db1dfe3bd6ef61cece1b4
SHA51203f88b62e1d39e5de175faacee3847f4b1e3efeb7f14a4a1a98ea887db99c8e081277de4065e3ff3bf882418c56ab9bca710fdf050b0eb20f01b1d625d55b225
-
Filesize
163KB
MD5ae17dbd31ea8d1c189bccc3f3cfa94ed
SHA119a04bd5d19a5544a38c5db57c5631f825d58a94
SHA2560e49da280f91f259334181137d854a57c795d9d87fc339742c7e6084f99c5576
SHA5128ca03aca4112f06329ecb3da359d849ce245a5177ca93c27cc3c25e2037568bdfd42bb91f1458a38a10a8eb360e548ec18bc85b0eab9aa7e35cdf4e605624ef4
-
Filesize
163KB
MD5d3cb455a370982fd3a5c3be97607817e
SHA17267fce644f4ff7ec2d81880ced86d22f33a9ed8
SHA256ef69ece69b2d5defecb8139ad469703e570507d5467113c8b21e2eab13873dbf
SHA512651819482620aa73788c02868347a5292f155fac0b171836b018d28ff1c24de977436baa1f9f2ce2d552df13446892c40e65af7124a6f36a71fb391e6ad38df9
-
Filesize
163KB
MD53cf594d91fa555cbb73e9dd2a34caa94
SHA1828a815f47a3ba7458e134a19ef6537476e94aaa
SHA256a360db7bcc8d314e1277f1129d78077e7cbddd13d7096c4d03e7e2ff82a4b7e2
SHA5127595f91eaae92bd210eb8f4823c190ef6dfc9801f169b86e9ae29900eb6fa31cc0dd9e3fbe5a6fd6207f51c6057a50b1e8fecb45eb92ea8095affce0c4a8d0aa
-
Filesize
163KB
MD55b960fbc88dd28319dd90bef0b9da4ed
SHA1d7094b88227ef60b893efff34f1bf7ffe29c8397
SHA256ab5681a07d2526fae8025b186e014fbe6c2c75ea14346fd0c6d2e39a810a46fa
SHA5122967142e12ad96ff6401a1837927961acf89d1196fcba77bdafc92466ff7f0b43abb3d732d739cbe787f052a914bacccfa3572bc1ae28db279ce4addffbac432
-
Filesize
163KB
MD5bd2f943eb59e4eb203972580fead2c26
SHA17ae59aa8629dfd5bcf32e1b34e66b1eb4df9aba3
SHA2563019e5ed81e65f76522feec0c62fbeecb4446850ad45d723738e64c553aa9325
SHA51266dec897836ce6f5ae7740a4fa3e8f1b320640f1295d58217f78bc8ba38b999b97cd744316512f114e7afc34c0da6782ccb0648979aeec5d3e1b10a17c8ae87a
-
Filesize
163KB
MD504c328efe0c2d1c0a8bff2c82bcb957f
SHA1cd6ac540e1146f8b489f78c6dbf8286dd39cf1d2
SHA256e676fc36e45f023c6977b9865e60fb1b93043a2be7a5b813551e1e65b0eddfbf
SHA5127c2a89e58afc594ee19838f4125770990542dc5715bd5cf98fe3a1880144473591e604706d72deab4709cf77ac3b7505c867eeedb0db30ce88c3224d66fc52b0
-
Filesize
163KB
MD5a646fde41f4bcc07b3b6fd93637ccc48
SHA175ade8b191a97968a0859d6b6365d7edb3afca25
SHA256145ae0cc07148bc0af34139dfa6dbf518b3ec2627301f245c2c7ea3139dedc0d
SHA512b96dd1b74e9ab65d0be945d41c0303d2b5f59cacd57e5a15cf8f0e7cbc7fa81f08e688fef96c38ca139f15c7db786edca9a289aa4cdb779e96796e8bb3502c4c