Analysis
-
max time kernel
92s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20-09-2024 18:07
Static task
static1
Behavioral task
behavioral1
Sample
031b293b63b8f0c899da68b560eecfbebe8570097c37d964cb9b05bfc83c9588.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
031b293b63b8f0c899da68b560eecfbebe8570097c37d964cb9b05bfc83c9588.exe
Resource
win10v2004-20240802-en
General
-
Target
031b293b63b8f0c899da68b560eecfbebe8570097c37d964cb9b05bfc83c9588.exe
-
Size
470KB
-
MD5
e2f327000b16959d93224170a51e5fe6
-
SHA1
f358e501e39d95b52192d37c8278afafadf458c8
-
SHA256
031b293b63b8f0c899da68b560eecfbebe8570097c37d964cb9b05bfc83c9588
-
SHA512
3d263a6a0c4a856aff9e25c38da5a3ac79923199e0f47dd9a0eb7f3be7fdd96e24ee9e89692b51a208d3400231ea3ab8c88d1736fd739cd6b467f1fa86434e19
-
SSDEEP
12288:kt159/Qc8QVj94nLiFzN3b7CUq1u2ztB1XQKTQInqyS6Rm6TIJ3l7DurTG9c8QVH:61594
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 28 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dknpmdfc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cjmgfgdf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Cdhhdlid.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dkifae32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Daekdooc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Dddhpjof.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dgbdlf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 031b293b63b8f0c899da68b560eecfbebe8570097c37d964cb9b05bfc83c9588.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cdcoim32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Cmnpgb32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dhmgki32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Dkifae32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Danecp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Dhmgki32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Daekdooc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cmnpgb32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cdhhdlid.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Dgbdlf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Dknpmdfc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ddjejl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ddjejl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Dobfld32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dddhpjof.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" 031b293b63b8f0c899da68b560eecfbebe8570097c37d964cb9b05bfc83c9588.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Cdcoim32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Cjmgfgdf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Danecp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dobfld32.exe -
Executes dropped EXE 14 IoCs
pid Process 3872 Cdcoim32.exe 1272 Cjmgfgdf.exe 4384 Cmnpgb32.exe 924 Cdhhdlid.exe 1332 Ddjejl32.exe 4184 Danecp32.exe 4980 Dobfld32.exe 4800 Dkifae32.exe 1972 Dhmgki32.exe 1408 Daekdooc.exe 116 Dddhpjof.exe 3708 Dgbdlf32.exe 3260 Dknpmdfc.exe 1492 Dmllipeg.exe -
Drops file in System32 directory 42 IoCs
description ioc Process File created C:\Windows\SysWOW64\Danecp32.exe Ddjejl32.exe File opened for modification C:\Windows\SysWOW64\Dhmgki32.exe Dkifae32.exe File created C:\Windows\SysWOW64\Cmnpgb32.exe Cjmgfgdf.exe File created C:\Windows\SysWOW64\Ffpmlcim.dll Cjmgfgdf.exe File created C:\Windows\SysWOW64\Cdhhdlid.exe Cmnpgb32.exe File opened for modification C:\Windows\SysWOW64\Dkifae32.exe Dobfld32.exe File created C:\Windows\SysWOW64\Dhmgki32.exe Dkifae32.exe File opened for modification C:\Windows\SysWOW64\Daekdooc.exe Dhmgki32.exe File created C:\Windows\SysWOW64\Dgbdlf32.exe Dddhpjof.exe File created C:\Windows\SysWOW64\Gfghpl32.dll Dddhpjof.exe File created C:\Windows\SysWOW64\Nokpao32.dll Dgbdlf32.exe File opened for modification C:\Windows\SysWOW64\Cmnpgb32.exe Cjmgfgdf.exe File opened for modification C:\Windows\SysWOW64\Dobfld32.exe Danecp32.exe File created C:\Windows\SysWOW64\Fpdaoioe.dll Dkifae32.exe File created C:\Windows\SysWOW64\Daekdooc.exe Dhmgki32.exe File opened for modification C:\Windows\SysWOW64\Dddhpjof.exe Daekdooc.exe File opened for modification C:\Windows\SysWOW64\Cjmgfgdf.exe Cdcoim32.exe File created C:\Windows\SysWOW64\Hfanhp32.dll Cdhhdlid.exe File created C:\Windows\SysWOW64\Agjbpg32.dll Ddjejl32.exe File created C:\Windows\SysWOW64\Pdheac32.dll Dobfld32.exe File created C:\Windows\SysWOW64\Dknpmdfc.exe Dgbdlf32.exe File opened for modification C:\Windows\SysWOW64\Dknpmdfc.exe Dgbdlf32.exe File created C:\Windows\SysWOW64\Cdcoim32.exe 031b293b63b8f0c899da68b560eecfbebe8570097c37d964cb9b05bfc83c9588.exe File created C:\Windows\SysWOW64\Nedmmlba.dll 031b293b63b8f0c899da68b560eecfbebe8570097c37d964cb9b05bfc83c9588.exe File created C:\Windows\SysWOW64\Dobfld32.exe Danecp32.exe File created C:\Windows\SysWOW64\Kngpec32.dll Dknpmdfc.exe File created C:\Windows\SysWOW64\Amjknl32.dll Daekdooc.exe File created C:\Windows\SysWOW64\Dmllipeg.exe Dknpmdfc.exe File opened for modification C:\Windows\SysWOW64\Cdhhdlid.exe Cmnpgb32.exe File created C:\Windows\SysWOW64\Lpggmhkg.dll Cmnpgb32.exe File created C:\Windows\SysWOW64\Ddjejl32.exe Cdhhdlid.exe File created C:\Windows\SysWOW64\Alcidkmm.dll Danecp32.exe File created C:\Windows\SysWOW64\Dkifae32.exe Dobfld32.exe File opened for modification C:\Windows\SysWOW64\Dgbdlf32.exe Dddhpjof.exe File opened for modification C:\Windows\SysWOW64\Dmllipeg.exe Dknpmdfc.exe File opened for modification C:\Windows\SysWOW64\Cdcoim32.exe 031b293b63b8f0c899da68b560eecfbebe8570097c37d964cb9b05bfc83c9588.exe File created C:\Windows\SysWOW64\Cjmgfgdf.exe Cdcoim32.exe File created C:\Windows\SysWOW64\Maickled.dll Cdcoim32.exe File opened for modification C:\Windows\SysWOW64\Ddjejl32.exe Cdhhdlid.exe File opened for modification C:\Windows\SysWOW64\Danecp32.exe Ddjejl32.exe File created C:\Windows\SysWOW64\Ohmoom32.dll Dhmgki32.exe File created C:\Windows\SysWOW64\Dddhpjof.exe Daekdooc.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 744 1492 WerFault.exe 95 -
System Location Discovery: System Language Discovery 1 TTPs 15 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Danecp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dhmgki32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 031b293b63b8f0c899da68b560eecfbebe8570097c37d964cb9b05bfc83c9588.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cjmgfgdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dkifae32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dgbdlf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cdcoim32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cmnpgb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dobfld32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Daekdooc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dknpmdfc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cdhhdlid.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ddjejl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dddhpjof.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dmllipeg.exe -
Modifies registry class 45 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ohmoom32.dll" Dhmgki32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node 031b293b63b8f0c899da68b560eecfbebe8570097c37d964cb9b05bfc83c9588.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Cjmgfgdf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Cmnpgb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Agjbpg32.dll" Ddjejl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Dkifae32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fpdaoioe.dll" Dkifae32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID 031b293b63b8f0c899da68b560eecfbebe8570097c37d964cb9b05bfc83c9588.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Cdcoim32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gfghpl32.dll" Dddhpjof.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Dgbdlf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hfanhp32.dll" Cdhhdlid.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Cdhhdlid.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Dknpmdfc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kngpec32.dll" Dknpmdfc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831} 031b293b63b8f0c899da68b560eecfbebe8570097c37d964cb9b05bfc83c9588.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nedmmlba.dll" 031b293b63b8f0c899da68b560eecfbebe8570097c37d964cb9b05bfc83c9588.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Danecp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Dobfld32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Dhmgki32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Dddhpjof.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Ddjejl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Danecp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pdheac32.dll" Dobfld32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Dknpmdfc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Dgbdlf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ffpmlcim.dll" Cjmgfgdf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Cdhhdlid.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Ddjejl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Dhmgki32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Amjknl32.dll" Daekdooc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Dddhpjof.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Dobfld32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Dkifae32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" 031b293b63b8f0c899da68b560eecfbebe8570097c37d964cb9b05bfc83c9588.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Cdcoim32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Maickled.dll" Cdcoim32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Cjmgfgdf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lpggmhkg.dll" Cmnpgb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Cmnpgb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Daekdooc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 031b293b63b8f0c899da68b560eecfbebe8570097c37d964cb9b05bfc83c9588.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Alcidkmm.dll" Danecp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Daekdooc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nokpao32.dll" Dgbdlf32.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 5004 wrote to memory of 3872 5004 031b293b63b8f0c899da68b560eecfbebe8570097c37d964cb9b05bfc83c9588.exe 82 PID 5004 wrote to memory of 3872 5004 031b293b63b8f0c899da68b560eecfbebe8570097c37d964cb9b05bfc83c9588.exe 82 PID 5004 wrote to memory of 3872 5004 031b293b63b8f0c899da68b560eecfbebe8570097c37d964cb9b05bfc83c9588.exe 82 PID 3872 wrote to memory of 1272 3872 Cdcoim32.exe 83 PID 3872 wrote to memory of 1272 3872 Cdcoim32.exe 83 PID 3872 wrote to memory of 1272 3872 Cdcoim32.exe 83 PID 1272 wrote to memory of 4384 1272 Cjmgfgdf.exe 84 PID 1272 wrote to memory of 4384 1272 Cjmgfgdf.exe 84 PID 1272 wrote to memory of 4384 1272 Cjmgfgdf.exe 84 PID 4384 wrote to memory of 924 4384 Cmnpgb32.exe 85 PID 4384 wrote to memory of 924 4384 Cmnpgb32.exe 85 PID 4384 wrote to memory of 924 4384 Cmnpgb32.exe 85 PID 924 wrote to memory of 1332 924 Cdhhdlid.exe 86 PID 924 wrote to memory of 1332 924 Cdhhdlid.exe 86 PID 924 wrote to memory of 1332 924 Cdhhdlid.exe 86 PID 1332 wrote to memory of 4184 1332 Ddjejl32.exe 87 PID 1332 wrote to memory of 4184 1332 Ddjejl32.exe 87 PID 1332 wrote to memory of 4184 1332 Ddjejl32.exe 87 PID 4184 wrote to memory of 4980 4184 Danecp32.exe 88 PID 4184 wrote to memory of 4980 4184 Danecp32.exe 88 PID 4184 wrote to memory of 4980 4184 Danecp32.exe 88 PID 4980 wrote to memory of 4800 4980 Dobfld32.exe 89 PID 4980 wrote to memory of 4800 4980 Dobfld32.exe 89 PID 4980 wrote to memory of 4800 4980 Dobfld32.exe 89 PID 4800 wrote to memory of 1972 4800 Dkifae32.exe 90 PID 4800 wrote to memory of 1972 4800 Dkifae32.exe 90 PID 4800 wrote to memory of 1972 4800 Dkifae32.exe 90 PID 1972 wrote to memory of 1408 1972 Dhmgki32.exe 91 PID 1972 wrote to memory of 1408 1972 Dhmgki32.exe 91 PID 1972 wrote to memory of 1408 1972 Dhmgki32.exe 91 PID 1408 wrote to memory of 116 1408 Daekdooc.exe 92 PID 1408 wrote to memory of 116 1408 Daekdooc.exe 92 PID 1408 wrote to memory of 116 1408 Daekdooc.exe 92 PID 116 wrote to memory of 3708 116 Dddhpjof.exe 93 PID 116 wrote to memory of 3708 116 Dddhpjof.exe 93 PID 116 wrote to memory of 3708 116 Dddhpjof.exe 93 PID 3708 wrote to memory of 3260 3708 Dgbdlf32.exe 94 PID 3708 wrote to memory of 3260 3708 Dgbdlf32.exe 94 PID 3708 wrote to memory of 3260 3708 Dgbdlf32.exe 94 PID 3260 wrote to memory of 1492 3260 Dknpmdfc.exe 95 PID 3260 wrote to memory of 1492 3260 Dknpmdfc.exe 95 PID 3260 wrote to memory of 1492 3260 Dknpmdfc.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\031b293b63b8f0c899da68b560eecfbebe8570097c37d964cb9b05bfc83c9588.exe"C:\Users\Admin\AppData\Local\Temp\031b293b63b8f0c899da68b560eecfbebe8570097c37d964cb9b05bfc83c9588.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Windows\SysWOW64\Cdcoim32.exeC:\Windows\system32\Cdcoim32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3872 -
C:\Windows\SysWOW64\Cjmgfgdf.exeC:\Windows\system32\Cjmgfgdf.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Windows\SysWOW64\Cmnpgb32.exeC:\Windows\system32\Cmnpgb32.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4384 -
C:\Windows\SysWOW64\Cdhhdlid.exeC:\Windows\system32\Cdhhdlid.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:924 -
C:\Windows\SysWOW64\Ddjejl32.exeC:\Windows\system32\Ddjejl32.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Windows\SysWOW64\Danecp32.exeC:\Windows\system32\Danecp32.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4184 -
C:\Windows\SysWOW64\Dobfld32.exeC:\Windows\system32\Dobfld32.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4980 -
C:\Windows\SysWOW64\Dkifae32.exeC:\Windows\system32\Dkifae32.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Windows\SysWOW64\Dhmgki32.exeC:\Windows\system32\Dhmgki32.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\SysWOW64\Daekdooc.exeC:\Windows\system32\Daekdooc.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Windows\SysWOW64\Dddhpjof.exeC:\Windows\system32\Dddhpjof.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:116 -
C:\Windows\SysWOW64\Dgbdlf32.exeC:\Windows\system32\Dgbdlf32.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3708 -
C:\Windows\SysWOW64\Dknpmdfc.exeC:\Windows\system32\Dknpmdfc.exe14⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3260 -
C:\Windows\SysWOW64\Dmllipeg.exeC:\Windows\system32\Dmllipeg.exe15⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1492 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1492 -s 40816⤵
- Program crash
PID:744
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1492 -ip 14921⤵PID:1032
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
470KB
MD535a6cbf15d7bb5d221972227f7a82dec
SHA14c82c6203cd264bf6a5c3e6f5cc227878219d8bd
SHA25689a6f8885712dc2976ade8845914d2e03f1ee357b78830b14a2f563c385707f9
SHA512b32d9827c9bc951032e76d96cb70fbb792bc70698f2e763c675586ab937f86d1fd4e2668c9e96c3bef863a8304fb457b6ae91432dd8bc649d256b883adbcfcae
-
Filesize
470KB
MD5a539465a11da4d6835df55b6df29bed5
SHA1982320848d9205c659efa92d09b027606c4ab21a
SHA256572c0d64e24a1537f3510bf6f3b3ebc7f317b95873bc4c3459958819a75e8023
SHA512690dc4938033e7c23f4972089927a881324c91afd820a5899f2e32bcb78a38ea45bd1e799ccc4febd2657d87080844940511949c368ac76451a8a121dff2e48b
-
Filesize
470KB
MD54948e7693a0d5d0d934c7779e33d58d3
SHA1cf0e4f9b057930bebfeca33598dff618c43977de
SHA2561baf1e9cbe1ed91be2dc2072cb39c26568715c4c1a305ac4b5e78dee24569cce
SHA51273943f66de095076f7d2d380ddfff25bf082547fe14ecafc6a9b98a14c3555fbd648c414f7acc19d11b2bb89c970bd527928ca54a947b843c674835d54913dd4
-
Filesize
470KB
MD5a64f506805071db234e658ff770c0183
SHA117023d3a7427fbd7ea4f2709980a952d5d467a69
SHA2566d0fa2dfeb2f63e202fe85f4a8c9de407b45dc953195edde34c959e19dbb20ef
SHA512e0e1cbdbf1716645280d9e82a0bc52695c978c243438469810d077a69c91643c0166391a0a5efd10ee04d952e131a61116ee3ec1b8dac4b468efe5b992d27432
-
Filesize
470KB
MD56cca54732398d5ecb9023430112cd71d
SHA1ca7748d2d3d31ce9aa0eb8cf1ece7b52d95f0b31
SHA25633c4c78dddba31e10c57eb2365e9eddbb1e84198131baba75b1cfbf9deb8428c
SHA512f567ad2204d3df4709348418c616c6e68e549d684d039af330ec01c151a5f5c86cf882a00e1456a6943803df8e0cd795123fe24314e2c815de440140864ee9f4
-
Filesize
470KB
MD5add2e490564ca10ebb37fe37ffdc4efb
SHA1171ef36589e3043599ff97f88e618f83da25f0de
SHA256fbcf29090607722f98526fe1456938dbf9f8b246a77341b9cc8c586ca68cdbc5
SHA51252f746908df18c8c3351ab4c12eba1f66eea8f0c28c96a3fedbe8c34ccfe1a83825adb71a76e97c7f8d7f29d86a987811ddd1d8f192f639c42caa84d7a7ececc
-
Filesize
470KB
MD58fd44a670aaf35c250a04ebd430cb4c5
SHA1515a11b41d0589c9dd5b7f5726008ade6cc0401c
SHA25601d5c469e386cba80653251a46058b5d92e48d1c02b93c2c5d1420da732665f4
SHA512c734d5b36d165cf9780f70d67ad90f09a79ee807f9392db624c33836ab004ed8f17f70303c8a4da66a08c76e0b2405bdadbb1e94a1e0372c4b9d3ad13d023718
-
Filesize
470KB
MD5a7b4694b5d5f50a262bb12f0e1f7fabf
SHA1c62cef3d2bf06a3bb5bdade44f6db2f17d780f75
SHA25615d6b7a1dfd7fa7e02f30d47a26604dd2c8b721734ab3ad5e39e9962ccac5b16
SHA5125b4feea212e756e9d25d29c6bf73890657bdb451cf63e0e69bc6b15ccbc150d972293c8f4b007b4b3d7ab5a95560656b50ff2e63ea9bbe3efcdc2593d48fd59d
-
Filesize
470KB
MD558b52ca5f41909b99972bd8efd856dc9
SHA10bf05bfb8eb75320577a21510e21444c9b80abc1
SHA256a666b3180b27225f61d95ef41607e041eb42977701a553d0d846bc4da1a5e498
SHA5129f5aaa0497481b09df9b1be95602cef73197111ecc5cba34947bb7748eb765ad68234dc22912679cb9888831454516700e3662f1d94f0c39b302866a196d0fde
-
Filesize
470KB
MD56f46fa8af0bd4ae23f06dc9707a0e49a
SHA10207ae529f9c79ab8a01245fdcbd69541740d916
SHA256d77336891ac966ae003abfc5f93d301bb9bdbffc4017b092858b9a9aa8f5eec2
SHA512aecd61c98ebd45d3dbc5591c02ab7a354fc33133fd8c505272e22857defba286bd236335a1a360b9d379b169a1115a182a12730b9386ba78e11f8373db373525
-
Filesize
470KB
MD50966a10e52573457330810d1d05b7cdd
SHA1284a033f8b2475303bfa84695f08fa78e548ea39
SHA25635fed51126c0b9513b1dba1fd63a0cedefc4925407b5f4cf009c4f29e2c90cfd
SHA51291d9ecefc1706d1ddecfe0f2edcb51f400d9fa4402f6a2aaab75de9bad310de0a27296896a4417026afd1bef1b7f84f554b99df8c215c2f96f6a867e4f5d40f4
-
Filesize
470KB
MD5a232c7e602f332677806d37689aeafa5
SHA10e274901e3797ad1fb978c6c05ef8a99eb026c7d
SHA256a993c92ca2ca9a9754113b9fc49081776a2dd168360377d5e9b62b964b11c10b
SHA512eeaf7fdcc3761929624f32c5a38f9eb9497350d9dd46618328965bc35af48dbbc0ef0313bba417eb6dd15898aed7ffbfdc0130d35557f83eddf69c2f54f46faa
-
Filesize
470KB
MD5430bf9cb764130c986e3bb9f425f08a3
SHA196caefa3965797c2b7de4cdeadf8d0aa6a812ddf
SHA2568dbcd954e387fc9b020a825cc0f028564f3ad9044872d5297c3045693550170e
SHA512e687bd6267a7110cb0835f2a53fe08da04613a5fa96e5419e2708ff392ffd606a2c1bdabbf2d56b410922717abe96afc1b01c7aa71352cbd39f07a3f6825fb3c
-
Filesize
470KB
MD5d1395f733143812c4ac561b770b54228
SHA1c401a44e1ec66b40911b50da5c889e13e6bf28fb
SHA25692ba2436a9a2ddedf2989db481dce6126c97b94cf818607c00285edb2db5240e
SHA5128486bdac99ab33c2764d2a27956478e6e8f84614c6f39ad8f2b64930183b274dbe8a8e204b17a63374649ea010aa092d21ff9908e887b985a1b7002eae3ca016
-
Filesize
7KB
MD5a31c85aed5085160d75bdcc8233a4e5d
SHA1dd0fed28336a7e2fc9264d7af81349d567f1e6fc
SHA256c19e5a1692897a1fffd9f5b398e8d740880edbb3bbec2516f6540e80235903a7
SHA512674ccc88e22d40ea14e4d02063c0a02b8bbe22acd0ccc3d10c473930e3a0ad0897a650f635ae81836cc8068c3e88b586fe924e593ed6123c8f9c6f22f800584f