Analysis
-
max time kernel
114s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21-09-2024 21:38
Behavioral task
behavioral1
Sample
d836d55d25bdaf25ebb1af85cd9bb8e5c1d03df7f1581ae8b6d602808bdd9c56N.exe
Resource
win7-20240708-en
General
-
Target
d836d55d25bdaf25ebb1af85cd9bb8e5c1d03df7f1581ae8b6d602808bdd9c56N.exe
-
Size
337KB
-
MD5
aa337d85ddd2339febb600d0782631f0
-
SHA1
10b1750d4438f39731b06b146ab5c63b584b2bdb
-
SHA256
d836d55d25bdaf25ebb1af85cd9bb8e5c1d03df7f1581ae8b6d602808bdd9c56
-
SHA512
bdd56130e1be4895230e7943733526754aa131add66745afbadad5e6fb3af5d0144947c41d042dc7704b7caefba60295c4693d03795db7d99cff64802b64ead7
-
SSDEEP
3072:/7z4VO4qzvOHf1FXAgYfc0DV+1BIyLK5jZWlfXXqyYwi8x4Yfc09:/7cVO4qjOHf1FXA1+fIyG5jZkCwi8r
Malware Config
Extracted
berbew
http://crutop.nu/index.php
http://crutop.ru/index.php
http://mazafaka.ru/index.php
http://color-bank.ru/index.php
http://asechka.ru/index.php
http://trojan.ru/index.php
http://fuck.ru/index.php
http://goldensand.ru/index.php
http://filesearch.ru/index.php
http://devx.nm.ru/index.php
http://ros-neftbank.ru/index.php
http://lovingod.host.sk/index.php
http://www.redline.ru/index.php
http://cvv.ru/index.php
http://hackers.lv/index.php
http://fethard.biz/index.php
http://ldark.nm.ru/index.htm
http://gaz-prom.ru/index.htm
http://promo.ru/index.htm
http://potleaf.chat.ru/index.htm
http://kadet.ru/index.htm
http://cvv.ru/index.htm
http://crutop.nu/index.htm
http://crutop.ru/index.htm
http://mazafaka.ru/index.htm
http://xware.cjb.net/index.htm
http://konfiskat.org/index.htm
http://parex-bank.ru/index.htm
http://kidos-bank.ru/index.htm
http://kavkaz.ru/index.htm
http://fethard.biz/index.htm
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 20 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad d836d55d25bdaf25ebb1af85cd9bb8e5c1d03df7f1581ae8b6d602808bdd9c56N.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cfmahknh.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dllffa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dbfoclai.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dbhlikpf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cfjeckpj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cdnelpod.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ciknefmk.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cfjeckpj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cdnelpod.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cfmahknh.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dbfoclai.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dipgpf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dipgpf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dpllbp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" d836d55d25bdaf25ebb1af85cd9bb8e5c1d03df7f1581ae8b6d602808bdd9c56N.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ciknefmk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dllffa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dbhlikpf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dpllbp32.exe -
Executes dropped EXE 10 IoCs
pid Process 672 Cfjeckpj.exe 804 Cdnelpod.exe 3168 Cfmahknh.exe 2184 Ciknefmk.exe 4104 Dllffa32.exe 2728 Dbfoclai.exe 860 Dipgpf32.exe 3620 Dbhlikpf.exe 228 Dpllbp32.exe 1036 Dbkhnk32.exe -
Drops file in System32 directory 30 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Ciknefmk.exe Cfmahknh.exe File created C:\Windows\SysWOW64\Ciknefmk.exe Cfmahknh.exe File created C:\Windows\SysWOW64\Hodcma32.dll Ciknefmk.exe File opened for modification C:\Windows\SysWOW64\Dbhlikpf.exe Dipgpf32.exe File opened for modification C:\Windows\SysWOW64\Cfjeckpj.exe d836d55d25bdaf25ebb1af85cd9bb8e5c1d03df7f1581ae8b6d602808bdd9c56N.exe File created C:\Windows\SysWOW64\Iojghflb.dll Cfmahknh.exe File opened for modification C:\Windows\SysWOW64\Dbfoclai.exe Dllffa32.exe File created C:\Windows\SysWOW64\Ioeiam32.dll Dipgpf32.exe File created C:\Windows\SysWOW64\Dpllbp32.exe Dbhlikpf.exe File created C:\Windows\SysWOW64\Cfmahknh.exe Cdnelpod.exe File opened for modification C:\Windows\SysWOW64\Dllffa32.exe Ciknefmk.exe File created C:\Windows\SysWOW64\Pkjhlh32.dll Cdnelpod.exe File created C:\Windows\SysWOW64\Dbhlikpf.exe Dipgpf32.exe File opened for modification C:\Windows\SysWOW64\Dpllbp32.exe Dbhlikpf.exe File created C:\Windows\SysWOW64\Imdnon32.dll Dbfoclai.exe File created C:\Windows\SysWOW64\Ggiipk32.dll Cfjeckpj.exe File opened for modification C:\Windows\SysWOW64\Cfmahknh.exe Cdnelpod.exe File created C:\Windows\SysWOW64\Dbfoclai.exe Dllffa32.exe File created C:\Windows\SysWOW64\Dipgpf32.exe Dbfoclai.exe File created C:\Windows\SysWOW64\Dbkhnk32.exe Dpllbp32.exe File opened for modification C:\Windows\SysWOW64\Cdnelpod.exe Cfjeckpj.exe File created C:\Windows\SysWOW64\Dllffa32.exe Ciknefmk.exe File created C:\Windows\SysWOW64\Mckfmq32.dll Dbhlikpf.exe File opened for modification C:\Windows\SysWOW64\Dbkhnk32.exe Dpllbp32.exe File created C:\Windows\SysWOW64\Naefjl32.dll Dpllbp32.exe File created C:\Windows\SysWOW64\Cfjeckpj.exe d836d55d25bdaf25ebb1af85cd9bb8e5c1d03df7f1581ae8b6d602808bdd9c56N.exe File created C:\Windows\SysWOW64\Cdnelpod.exe Cfjeckpj.exe File created C:\Windows\SysWOW64\Hlhkja32.dll Dllffa32.exe File opened for modification C:\Windows\SysWOW64\Dipgpf32.exe Dbfoclai.exe File created C:\Windows\SysWOW64\Qecnjaee.dll d836d55d25bdaf25ebb1af85cd9bb8e5c1d03df7f1581ae8b6d602808bdd9c56N.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1548 1036 WerFault.exe 98 -
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d836d55d25bdaf25ebb1af85cd9bb8e5c1d03df7f1581ae8b6d602808bdd9c56N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cdnelpod.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cfmahknh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dllffa32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dpllbp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dbkhnk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cfjeckpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ciknefmk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dbfoclai.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dipgpf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dbhlikpf.exe -
Modifies registry class 33 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qecnjaee.dll" d836d55d25bdaf25ebb1af85cd9bb8e5c1d03df7f1581ae8b6d602808bdd9c56N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cfmahknh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hodcma32.dll" Ciknefmk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dipgpf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dpllbp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pkjhlh32.dll" Cdnelpod.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cdnelpod.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cfmahknh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hlhkja32.dll" Dllffa32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dbfoclai.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Iojghflb.dll" Cfmahknh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Imdnon32.dll" Dbfoclai.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ioeiam32.dll" Dipgpf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dbhlikpf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mckfmq32.dll" Dbhlikpf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dbhlikpf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Naefjl32.dll" Dpllbp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dpllbp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 d836d55d25bdaf25ebb1af85cd9bb8e5c1d03df7f1581ae8b6d602808bdd9c56N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node d836d55d25bdaf25ebb1af85cd9bb8e5c1d03df7f1581ae8b6d602808bdd9c56N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID d836d55d25bdaf25ebb1af85cd9bb8e5c1d03df7f1581ae8b6d602808bdd9c56N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cfjeckpj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dipgpf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} d836d55d25bdaf25ebb1af85cd9bb8e5c1d03df7f1581ae8b6d602808bdd9c56N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ggiipk32.dll" Cfjeckpj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ciknefmk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dbfoclai.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" d836d55d25bdaf25ebb1af85cd9bb8e5c1d03df7f1581ae8b6d602808bdd9c56N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dllffa32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cfjeckpj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cdnelpod.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ciknefmk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dllffa32.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2680 wrote to memory of 672 2680 d836d55d25bdaf25ebb1af85cd9bb8e5c1d03df7f1581ae8b6d602808bdd9c56N.exe 89 PID 2680 wrote to memory of 672 2680 d836d55d25bdaf25ebb1af85cd9bb8e5c1d03df7f1581ae8b6d602808bdd9c56N.exe 89 PID 2680 wrote to memory of 672 2680 d836d55d25bdaf25ebb1af85cd9bb8e5c1d03df7f1581ae8b6d602808bdd9c56N.exe 89 PID 672 wrote to memory of 804 672 Cfjeckpj.exe 90 PID 672 wrote to memory of 804 672 Cfjeckpj.exe 90 PID 672 wrote to memory of 804 672 Cfjeckpj.exe 90 PID 804 wrote to memory of 3168 804 Cdnelpod.exe 91 PID 804 wrote to memory of 3168 804 Cdnelpod.exe 91 PID 804 wrote to memory of 3168 804 Cdnelpod.exe 91 PID 3168 wrote to memory of 2184 3168 Cfmahknh.exe 92 PID 3168 wrote to memory of 2184 3168 Cfmahknh.exe 92 PID 3168 wrote to memory of 2184 3168 Cfmahknh.exe 92 PID 2184 wrote to memory of 4104 2184 Ciknefmk.exe 93 PID 2184 wrote to memory of 4104 2184 Ciknefmk.exe 93 PID 2184 wrote to memory of 4104 2184 Ciknefmk.exe 93 PID 4104 wrote to memory of 2728 4104 Dllffa32.exe 94 PID 4104 wrote to memory of 2728 4104 Dllffa32.exe 94 PID 4104 wrote to memory of 2728 4104 Dllffa32.exe 94 PID 2728 wrote to memory of 860 2728 Dbfoclai.exe 95 PID 2728 wrote to memory of 860 2728 Dbfoclai.exe 95 PID 2728 wrote to memory of 860 2728 Dbfoclai.exe 95 PID 860 wrote to memory of 3620 860 Dipgpf32.exe 96 PID 860 wrote to memory of 3620 860 Dipgpf32.exe 96 PID 860 wrote to memory of 3620 860 Dipgpf32.exe 96 PID 3620 wrote to memory of 228 3620 Dbhlikpf.exe 97 PID 3620 wrote to memory of 228 3620 Dbhlikpf.exe 97 PID 3620 wrote to memory of 228 3620 Dbhlikpf.exe 97 PID 228 wrote to memory of 1036 228 Dpllbp32.exe 98 PID 228 wrote to memory of 1036 228 Dpllbp32.exe 98 PID 228 wrote to memory of 1036 228 Dpllbp32.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\d836d55d25bdaf25ebb1af85cd9bb8e5c1d03df7f1581ae8b6d602808bdd9c56N.exe"C:\Users\Admin\AppData\Local\Temp\d836d55d25bdaf25ebb1af85cd9bb8e5c1d03df7f1581ae8b6d602808bdd9c56N.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\SysWOW64\Cfjeckpj.exeC:\Windows\system32\Cfjeckpj.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:672 -
C:\Windows\SysWOW64\Cdnelpod.exeC:\Windows\system32\Cdnelpod.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:804 -
C:\Windows\SysWOW64\Cfmahknh.exeC:\Windows\system32\Cfmahknh.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3168 -
C:\Windows\SysWOW64\Ciknefmk.exeC:\Windows\system32\Ciknefmk.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Windows\SysWOW64\Dllffa32.exeC:\Windows\system32\Dllffa32.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4104 -
C:\Windows\SysWOW64\Dbfoclai.exeC:\Windows\system32\Dbfoclai.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\SysWOW64\Dipgpf32.exeC:\Windows\system32\Dipgpf32.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:860 -
C:\Windows\SysWOW64\Dbhlikpf.exeC:\Windows\system32\Dbhlikpf.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3620 -
C:\Windows\SysWOW64\Dpllbp32.exeC:\Windows\system32\Dpllbp32.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Windows\SysWOW64\Dbkhnk32.exeC:\Windows\system32\Dbkhnk32.exe11⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1036 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1036 -s 40012⤵
- Program crash
PID:1548
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1036 -ip 10361⤵PID:2540
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4452,i,15336851255456239337,16379811035920490645,262144 --variations-seed-version --mojo-platform-channel-handle=4612 /prefetch:81⤵PID:3132
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
337KB
MD5a8858a1f6735b3716b69c39f9a7bfc4a
SHA18f0964638e1696822d82adc71d2d0cf6e9bcdcdc
SHA2562b6d4e79ce2c2959a7fe4988495466aa3350760f84c30c7e47622e66d89e0594
SHA5125f11252bf3376b2303d93e33a2b03be3c04289c2512535c11cc140f195a2b42e295c103a1429c94be6540a5e6e8b9f6b348e8c361716a483c9935f960e31fc3c
-
Filesize
337KB
MD5c6fc6dabdf65c974b79563789e76bc2a
SHA127c2fee1c94b814a381bca905058906a08b236c0
SHA256c4d11a8d28155a607f1c7c35ba5e7d7bcbf23115a1ee132d1dfabab4a1729395
SHA5127f98fb85b88c5b9603cdc176cb33a7e5988c825d5505527ff2b727c1404904286cb1482e01692ca056a607ab2dd03fd2d162662a102e129afd72754d573e4cb0
-
Filesize
337KB
MD5296c3cc6f5a7b0c3f55f2f87be60bece
SHA159aaef464f2883456b8c9122907ddc2f3fbddb79
SHA25659b09b8a55547a214869d9ece3ded9e4fae14cf94ce0936b177db499700c4d31
SHA5121a407d773384d1582c3f2625617c61d55389530ad30f876d917c2980d1365b1301031e1709021c9905aaaa1abf90844cff1c70ca4403c64af3d3def0a148f07b
-
Filesize
337KB
MD5cb36b5b1e7cc5756eebf66f532c5996f
SHA10834310123828ffb266acfb990c7d3d2bc155acf
SHA256ada0fdd06006e3649a1df0cd8392892c0be79b576d1557240d273cb00e3fa736
SHA512bcbba3dab4aa9ff2831e556f14b9b41870b9f481e76bbdc60376ce75b205d12957d27218e559d58e4710b9b1aed97c073da5b093f2002f9afcb9abdfca858e3a
-
Filesize
337KB
MD51d9b43572019832b163cdfa2f69d1942
SHA1026bd64e4f7c485d00f9351d13d2970e2d6f08f8
SHA2561df795c71ca8aa4fb7ae187aa87dc966d2cdf6e2a4c6c5aaaefeff8ded682239
SHA5128b1400f40f06f3e7715bbc4e8098e9fd517f0c5a253d1907efb01110bf9f56a54e2fbda1b86067d563f388eb8586d5b77e695b4b2e47c00dc1cec94f29c61cf9
-
Filesize
337KB
MD504afb9a8c88bd1b03953ae2eba3b69dc
SHA1c2de3d11ff6337c2e0355be296b3ceca3db4fe30
SHA2564c6c9ee8fd8bf8140117290132f7abd9254520727ad634b29fa22cc50a531205
SHA512a258b76741c4d38244421f6148ba225d3cae9a29597424c74cf63acda4967c8eff3287d3c002e86fb068b549ef1949caa5b3660f20dd773e6956dac97d94f817
-
Filesize
337KB
MD5490996e30d67fe3b3283b669cd0b2835
SHA179aa8e8471d05a593f2293620d869e8e9f5bec1f
SHA256ede5f819ebb3e49d958958916039454aa8971af0a974b53c4ea3cc69a9f4b32d
SHA51230ccf8ce73d179c164b92690f343016946ea27b0fd5595d8a8edf030fb514ccb31e7e68e6c98d327d0df081c19ff9f28e598bff2c2de868e9b11b8d3c8421d54
-
Filesize
337KB
MD5ab6edbd355d1297fcd4224ec54f7e4be
SHA1bb37aee875c52786311ac877464e074b02385a41
SHA25657712c29cf4d9351a74e55c46c657bc651814f9aac3d7b4d2bb7096d3bf6800b
SHA51283f6ce57119e7ca8e27a10241ac3b8b994326c0aae906d5b527e56b5bb7e94e5f2ce7e0cf2258b1bfa78ed21f982dd33b8267ef68b88a51c59429437ed0182f4
-
Filesize
337KB
MD5d77cfbd0682f75781ed565adfda9a655
SHA117d0519b110e64f1230fdcc5480385a68b1cc4e6
SHA2565ccc3366d123ef36a38860fedf1629ca91a6d668a710e6f016e8b049d6c6d5d0
SHA512f023f55bc516299f404242d81b8cef3038a27f4dff98cb9dc547530f823f23e21d76fa20ec07e9c1e19e2c9da0df2f3f8a7e75b3bb921cda98a75e2ea7081025
-
Filesize
337KB
MD5bad6f415764005ed0a8006812eeb354b
SHA15d463302aff51b39362dc91aa41d8d4f076718d8
SHA25616736334ed26adad75fc3195261ff29e1204c0d2c27432b4463c2bdbc8bbd104
SHA512fd237dfa69bca89163af3e176b88bfba0dd02a275bc0b6190718b78bd52272fa1023bdc37213e92d9a3f521ad54d8fbeb85cbf4089a76e7044a0077287f047bb