Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30/09/2024, 05:35
Static task
static1
Behavioral task
behavioral1
Sample
e1c39d32dc72e1236a12a2155a38169d63de901befcf4098e5c111bb96bac3b9N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e1c39d32dc72e1236a12a2155a38169d63de901befcf4098e5c111bb96bac3b9N.exe
Resource
win10v2004-20240802-en
General
-
Target
e1c39d32dc72e1236a12a2155a38169d63de901befcf4098e5c111bb96bac3b9N.exe
-
Size
99KB
-
MD5
f391e99b9ba0b26f9a379bca3023afb0
-
SHA1
182180d6df4914819244c99f198407d6e8399c9f
-
SHA256
e1c39d32dc72e1236a12a2155a38169d63de901befcf4098e5c111bb96bac3b9
-
SHA512
24e976b641f687c21541f88fae45db1267b34017fdef77087c38d6d0963d0331960b343c27202c31a2c7505e9ba54e826e0ae12e2c0d6757c1023a3da7da0067
-
SSDEEP
3072:FFRekcr4OiPpPa6hFnjeyupwoTRBmDRGGurhUI:/R5jpHhMcm7UI
Malware Config
Extracted
berbew
http://viruslist.com/wcmd.txt
http://viruslist.com/ppslog.php
http://viruslist.com/piplog.php?%s:%i:%i:%s:%09u:%i:%02d:%02d:%02d
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 46 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Jfcabd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Kidjdpie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Kkjpggkn.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kageia32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" e1c39d32dc72e1236a12a2155a38169d63de901befcf4098e5c111bb96bac3b9N.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ijcngenj.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Imbjcpnn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Jmfcop32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Imbjcpnn.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jcnoejch.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kdbepm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ieibdnnp.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kidjdpie.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Libjncnc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Libjncnc.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kfaalh32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kkojbf32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jmfcop32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Jpgmpk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Kbjbge32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kkjpggkn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Jjjdhc32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jfcabd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Kkojbf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ijcngenj.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ieibdnnp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Iclbpj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Jcnoejch.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Kbmome32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Klecfkff.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Kfaalh32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iclbpj32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jjjdhc32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jpgmpk32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kbjbge32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Khldkllj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Kageia32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jcqlkjae.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Jcqlkjae.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kbmome32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Klecfkff.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Kdbepm32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad e1c39d32dc72e1236a12a2155a38169d63de901befcf4098e5c111bb96bac3b9N.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jnmiag32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Jnmiag32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Khldkllj.exe -
Executes dropped EXE 23 IoCs
pid Process 2764 Ijcngenj.exe 2736 Imbjcpnn.exe 2856 Ieibdnnp.exe 2740 Iclbpj32.exe 3032 Jcnoejch.exe 1492 Jmfcop32.exe 2956 Jcqlkjae.exe 2888 Jjjdhc32.exe 1472 Jpgmpk32.exe 804 Jnmiag32.exe 1448 Jfcabd32.exe 1628 Kbjbge32.exe 1568 Kidjdpie.exe 1040 Kbmome32.exe 2436 Klecfkff.exe 1104 Khldkllj.exe 1280 Kkjpggkn.exe 552 Kdbepm32.exe 2488 Kfaalh32.exe 1656 Kageia32.exe 1396 Kkojbf32.exe 2640 Libjncnc.exe 2800 Lbjofi32.exe -
Loads dropped DLL 50 IoCs
pid Process 2232 e1c39d32dc72e1236a12a2155a38169d63de901befcf4098e5c111bb96bac3b9N.exe 2232 e1c39d32dc72e1236a12a2155a38169d63de901befcf4098e5c111bb96bac3b9N.exe 2764 Ijcngenj.exe 2764 Ijcngenj.exe 2736 Imbjcpnn.exe 2736 Imbjcpnn.exe 2856 Ieibdnnp.exe 2856 Ieibdnnp.exe 2740 Iclbpj32.exe 2740 Iclbpj32.exe 3032 Jcnoejch.exe 3032 Jcnoejch.exe 1492 Jmfcop32.exe 1492 Jmfcop32.exe 2956 Jcqlkjae.exe 2956 Jcqlkjae.exe 2888 Jjjdhc32.exe 2888 Jjjdhc32.exe 1472 Jpgmpk32.exe 1472 Jpgmpk32.exe 804 Jnmiag32.exe 804 Jnmiag32.exe 1448 Jfcabd32.exe 1448 Jfcabd32.exe 1628 Kbjbge32.exe 1628 Kbjbge32.exe 1568 Kidjdpie.exe 1568 Kidjdpie.exe 1040 Kbmome32.exe 1040 Kbmome32.exe 2436 Klecfkff.exe 2436 Klecfkff.exe 1104 Khldkllj.exe 1104 Khldkllj.exe 1280 Kkjpggkn.exe 1280 Kkjpggkn.exe 552 Kdbepm32.exe 552 Kdbepm32.exe 2488 Kfaalh32.exe 2488 Kfaalh32.exe 1656 Kageia32.exe 1656 Kageia32.exe 1396 Kkojbf32.exe 1396 Kkojbf32.exe 2640 Libjncnc.exe 2640 Libjncnc.exe 1864 WerFault.exe 1864 WerFault.exe 1864 WerFault.exe 1864 WerFault.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Jfcabd32.exe Jnmiag32.exe File created C:\Windows\SysWOW64\Aiomcb32.dll Kbjbge32.exe File created C:\Windows\SysWOW64\Kkjpggkn.exe Khldkllj.exe File created C:\Windows\SysWOW64\Mlpckqje.dll Ijcngenj.exe File opened for modification C:\Windows\SysWOW64\Jjjdhc32.exe Jcqlkjae.exe File created C:\Windows\SysWOW64\Khldkllj.exe Klecfkff.exe File opened for modification C:\Windows\SysWOW64\Kageia32.exe Kfaalh32.exe File created C:\Windows\SysWOW64\Libjncnc.exe Kkojbf32.exe File opened for modification C:\Windows\SysWOW64\Ijcngenj.exe e1c39d32dc72e1236a12a2155a38169d63de901befcf4098e5c111bb96bac3b9N.exe File opened for modification C:\Windows\SysWOW64\Imbjcpnn.exe Ijcngenj.exe File opened for modification C:\Windows\SysWOW64\Khldkllj.exe Klecfkff.exe File opened for modification C:\Windows\SysWOW64\Kkjpggkn.exe Khldkllj.exe File created C:\Windows\SysWOW64\Jlflfm32.dll Kfaalh32.exe File opened for modification C:\Windows\SysWOW64\Kkojbf32.exe Kageia32.exe File created C:\Windows\SysWOW64\Fbbngc32.dll Imbjcpnn.exe File created C:\Windows\SysWOW64\Jmfcop32.exe Jcnoejch.exe File opened for modification C:\Windows\SysWOW64\Klecfkff.exe Kbmome32.exe File created C:\Windows\SysWOW64\Jpgmpk32.exe Jjjdhc32.exe File opened for modification C:\Windows\SysWOW64\Jpgmpk32.exe Jjjdhc32.exe File created C:\Windows\SysWOW64\Jnmiag32.exe Jpgmpk32.exe File opened for modification C:\Windows\SysWOW64\Jnmiag32.exe Jpgmpk32.exe File created C:\Windows\SysWOW64\Eplpdepa.dll Jnmiag32.exe File created C:\Windows\SysWOW64\Lbjofi32.exe Libjncnc.exe File created C:\Windows\SysWOW64\Imbjcpnn.exe Ijcngenj.exe File opened for modification C:\Windows\SysWOW64\Jcqlkjae.exe Jmfcop32.exe File created C:\Windows\SysWOW64\Mebgijei.dll Jcqlkjae.exe File created C:\Windows\SysWOW64\Pdnfmn32.dll Kbmome32.exe File created C:\Windows\SysWOW64\Cmojeo32.dll Jmfcop32.exe File opened for modification C:\Windows\SysWOW64\Kbmome32.exe Kidjdpie.exe File created C:\Windows\SysWOW64\Klecfkff.exe Kbmome32.exe File opened for modification C:\Windows\SysWOW64\Kdbepm32.exe Kkjpggkn.exe File opened for modification C:\Windows\SysWOW64\Ieibdnnp.exe Imbjcpnn.exe File created C:\Windows\SysWOW64\Kobgmfjh.dll Ieibdnnp.exe File created C:\Windows\SysWOW64\Phblkn32.dll Kdbepm32.exe File created C:\Windows\SysWOW64\Kkojbf32.exe Kageia32.exe File opened for modification C:\Windows\SysWOW64\Libjncnc.exe Kkojbf32.exe File created C:\Windows\SysWOW64\Ipafocdg.dll Libjncnc.exe File created C:\Windows\SysWOW64\Cgngaoal.dll Iclbpj32.exe File created C:\Windows\SysWOW64\Jcqlkjae.exe Jmfcop32.exe File created C:\Windows\SysWOW64\Iclbpj32.exe Ieibdnnp.exe File created C:\Windows\SysWOW64\Pccohd32.dll Jcnoejch.exe File opened for modification C:\Windows\SysWOW64\Kbjbge32.exe Jfcabd32.exe File created C:\Windows\SysWOW64\Ijcngenj.exe e1c39d32dc72e1236a12a2155a38169d63de901befcf4098e5c111bb96bac3b9N.exe File created C:\Windows\SysWOW64\Diodocki.dll e1c39d32dc72e1236a12a2155a38169d63de901befcf4098e5c111bb96bac3b9N.exe File created C:\Windows\SysWOW64\Kageia32.exe Kfaalh32.exe File opened for modification C:\Windows\SysWOW64\Jmfcop32.exe Jcnoejch.exe File created C:\Windows\SysWOW64\Knfddo32.dll Jpgmpk32.exe File created C:\Windows\SysWOW64\Kbmome32.exe Kidjdpie.exe File created C:\Windows\SysWOW64\Hlekjpbi.dll Khldkllj.exe File created C:\Windows\SysWOW64\Kfaalh32.exe Kdbepm32.exe File created C:\Windows\SysWOW64\Gffdobll.dll Kageia32.exe File created C:\Windows\SysWOW64\Ipbkjl32.dll Kkojbf32.exe File opened for modification C:\Windows\SysWOW64\Lbjofi32.exe Libjncnc.exe File opened for modification C:\Windows\SysWOW64\Jcnoejch.exe Iclbpj32.exe File created C:\Windows\SysWOW64\Mobafhlg.dll Jfcabd32.exe File created C:\Windows\SysWOW64\Khljoh32.dll Jjjdhc32.exe File opened for modification C:\Windows\SysWOW64\Kidjdpie.exe Kbjbge32.exe File created C:\Windows\SysWOW64\Mkehop32.dll Kidjdpie.exe File created C:\Windows\SysWOW64\Ieibdnnp.exe Imbjcpnn.exe File created C:\Windows\SysWOW64\Jfcabd32.exe Jnmiag32.exe File created C:\Windows\SysWOW64\Kdbepm32.exe Kkjpggkn.exe File created C:\Windows\SysWOW64\Alhpic32.dll Kkjpggkn.exe File opened for modification C:\Windows\SysWOW64\Kfaalh32.exe Kdbepm32.exe File created C:\Windows\SysWOW64\Kbjbge32.exe Jfcabd32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1864 2800 WerFault.exe 52 -
System Location Discovery: System Language Discovery 1 TTPs 24 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e1c39d32dc72e1236a12a2155a38169d63de901befcf4098e5c111bb96bac3b9N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jcnoejch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jfcabd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kbjbge32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kfaalh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kageia32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jpgmpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jnmiag32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kidjdpie.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Klecfkff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ieibdnnp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jjjdhc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kkjpggkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kdbepm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ijcngenj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Imbjcpnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Iclbpj32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jmfcop32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jcqlkjae.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kbmome32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Khldkllj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kkojbf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Libjncnc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lbjofi32.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Kbmome32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Kfaalh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Jmfcop32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Knfddo32.dll" Jpgmpk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mobafhlg.dll" Jfcabd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Kidjdpie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Kdbepm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ipafocdg.dll" Libjncnc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mlpckqje.dll" Ijcngenj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Jjjdhc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Kbjbge32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mebgijei.dll" Jcqlkjae.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pdnfmn32.dll" Kbmome32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID e1c39d32dc72e1236a12a2155a38169d63de901befcf4098e5c111bb96bac3b9N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Diodocki.dll" e1c39d32dc72e1236a12a2155a38169d63de901befcf4098e5c111bb96bac3b9N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Ieibdnnp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Kageia32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Kkojbf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kobgmfjh.dll" Ieibdnnp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Jnmiag32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eplpdepa.dll" Jnmiag32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Imbjcpnn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mkehop32.dll" Kidjdpie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Khldkllj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Kdbepm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gffdobll.dll" Kageia32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Jpgmpk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aiomcb32.dll" Kbjbge32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eghoka32.dll" Klecfkff.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Alhpic32.dll" Kkjpggkn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Ieibdnnp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Jcnoejch.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Jcqlkjae.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Libjncnc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cmojeo32.dll" Jmfcop32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Khljoh32.dll" Jjjdhc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Kkojbf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Jjjdhc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Jnmiag32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Imbjcpnn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Jcnoejch.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pccohd32.dll" Jcnoejch.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Klecfkff.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hlekjpbi.dll" Khldkllj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831} e1c39d32dc72e1236a12a2155a38169d63de901befcf4098e5c111bb96bac3b9N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" e1c39d32dc72e1236a12a2155a38169d63de901befcf4098e5c111bb96bac3b9N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fbbngc32.dll" Imbjcpnn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Kkjpggkn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Kageia32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 e1c39d32dc72e1236a12a2155a38169d63de901befcf4098e5c111bb96bac3b9N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cgngaoal.dll" Iclbpj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Libjncnc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Kidjdpie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Kbmome32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Kkjpggkn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Iclbpj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Iclbpj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Jmfcop32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Kfaalh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node e1c39d32dc72e1236a12a2155a38169d63de901befcf4098e5c111bb96bac3b9N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Jpgmpk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Kbjbge32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Khldkllj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jlflfm32.dll" Kfaalh32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2232 wrote to memory of 2764 2232 e1c39d32dc72e1236a12a2155a38169d63de901befcf4098e5c111bb96bac3b9N.exe 30 PID 2232 wrote to memory of 2764 2232 e1c39d32dc72e1236a12a2155a38169d63de901befcf4098e5c111bb96bac3b9N.exe 30 PID 2232 wrote to memory of 2764 2232 e1c39d32dc72e1236a12a2155a38169d63de901befcf4098e5c111bb96bac3b9N.exe 30 PID 2232 wrote to memory of 2764 2232 e1c39d32dc72e1236a12a2155a38169d63de901befcf4098e5c111bb96bac3b9N.exe 30 PID 2764 wrote to memory of 2736 2764 Ijcngenj.exe 31 PID 2764 wrote to memory of 2736 2764 Ijcngenj.exe 31 PID 2764 wrote to memory of 2736 2764 Ijcngenj.exe 31 PID 2764 wrote to memory of 2736 2764 Ijcngenj.exe 31 PID 2736 wrote to memory of 2856 2736 Imbjcpnn.exe 32 PID 2736 wrote to memory of 2856 2736 Imbjcpnn.exe 32 PID 2736 wrote to memory of 2856 2736 Imbjcpnn.exe 32 PID 2736 wrote to memory of 2856 2736 Imbjcpnn.exe 32 PID 2856 wrote to memory of 2740 2856 Ieibdnnp.exe 33 PID 2856 wrote to memory of 2740 2856 Ieibdnnp.exe 33 PID 2856 wrote to memory of 2740 2856 Ieibdnnp.exe 33 PID 2856 wrote to memory of 2740 2856 Ieibdnnp.exe 33 PID 2740 wrote to memory of 3032 2740 Iclbpj32.exe 34 PID 2740 wrote to memory of 3032 2740 Iclbpj32.exe 34 PID 2740 wrote to memory of 3032 2740 Iclbpj32.exe 34 PID 2740 wrote to memory of 3032 2740 Iclbpj32.exe 34 PID 3032 wrote to memory of 1492 3032 Jcnoejch.exe 35 PID 3032 wrote to memory of 1492 3032 Jcnoejch.exe 35 PID 3032 wrote to memory of 1492 3032 Jcnoejch.exe 35 PID 3032 wrote to memory of 1492 3032 Jcnoejch.exe 35 PID 1492 wrote to memory of 2956 1492 Jmfcop32.exe 36 PID 1492 wrote to memory of 2956 1492 Jmfcop32.exe 36 PID 1492 wrote to memory of 2956 1492 Jmfcop32.exe 36 PID 1492 wrote to memory of 2956 1492 Jmfcop32.exe 36 PID 2956 wrote to memory of 2888 2956 Jcqlkjae.exe 37 PID 2956 wrote to memory of 2888 2956 Jcqlkjae.exe 37 PID 2956 wrote to memory of 2888 2956 Jcqlkjae.exe 37 PID 2956 wrote to memory of 2888 2956 Jcqlkjae.exe 37 PID 2888 wrote to memory of 1472 2888 Jjjdhc32.exe 38 PID 2888 wrote to memory of 1472 2888 Jjjdhc32.exe 38 PID 2888 wrote to memory of 1472 2888 Jjjdhc32.exe 38 PID 2888 wrote to memory of 1472 2888 Jjjdhc32.exe 38 PID 1472 wrote to memory of 804 1472 Jpgmpk32.exe 39 PID 1472 wrote to memory of 804 1472 Jpgmpk32.exe 39 PID 1472 wrote to memory of 804 1472 Jpgmpk32.exe 39 PID 1472 wrote to memory of 804 1472 Jpgmpk32.exe 39 PID 804 wrote to memory of 1448 804 Jnmiag32.exe 40 PID 804 wrote to memory of 1448 804 Jnmiag32.exe 40 PID 804 wrote to memory of 1448 804 Jnmiag32.exe 40 PID 804 wrote to memory of 1448 804 Jnmiag32.exe 40 PID 1448 wrote to memory of 1628 1448 Jfcabd32.exe 41 PID 1448 wrote to memory of 1628 1448 Jfcabd32.exe 41 PID 1448 wrote to memory of 1628 1448 Jfcabd32.exe 41 PID 1448 wrote to memory of 1628 1448 Jfcabd32.exe 41 PID 1628 wrote to memory of 1568 1628 Kbjbge32.exe 42 PID 1628 wrote to memory of 1568 1628 Kbjbge32.exe 42 PID 1628 wrote to memory of 1568 1628 Kbjbge32.exe 42 PID 1628 wrote to memory of 1568 1628 Kbjbge32.exe 42 PID 1568 wrote to memory of 1040 1568 Kidjdpie.exe 43 PID 1568 wrote to memory of 1040 1568 Kidjdpie.exe 43 PID 1568 wrote to memory of 1040 1568 Kidjdpie.exe 43 PID 1568 wrote to memory of 1040 1568 Kidjdpie.exe 43 PID 1040 wrote to memory of 2436 1040 Kbmome32.exe 44 PID 1040 wrote to memory of 2436 1040 Kbmome32.exe 44 PID 1040 wrote to memory of 2436 1040 Kbmome32.exe 44 PID 1040 wrote to memory of 2436 1040 Kbmome32.exe 44 PID 2436 wrote to memory of 1104 2436 Klecfkff.exe 45 PID 2436 wrote to memory of 1104 2436 Klecfkff.exe 45 PID 2436 wrote to memory of 1104 2436 Klecfkff.exe 45 PID 2436 wrote to memory of 1104 2436 Klecfkff.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\e1c39d32dc72e1236a12a2155a38169d63de901befcf4098e5c111bb96bac3b9N.exe"C:\Users\Admin\AppData\Local\Temp\e1c39d32dc72e1236a12a2155a38169d63de901befcf4098e5c111bb96bac3b9N.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\SysWOW64\Ijcngenj.exeC:\Windows\system32\Ijcngenj.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\SysWOW64\Imbjcpnn.exeC:\Windows\system32\Imbjcpnn.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\SysWOW64\Ieibdnnp.exeC:\Windows\system32\Ieibdnnp.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Windows\SysWOW64\Iclbpj32.exeC:\Windows\system32\Iclbpj32.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\SysWOW64\Jcnoejch.exeC:\Windows\system32\Jcnoejch.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\SysWOW64\Jmfcop32.exeC:\Windows\system32\Jmfcop32.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Windows\SysWOW64\Jcqlkjae.exeC:\Windows\system32\Jcqlkjae.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Windows\SysWOW64\Jjjdhc32.exeC:\Windows\system32\Jjjdhc32.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Windows\SysWOW64\Jpgmpk32.exeC:\Windows\system32\Jpgmpk32.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Windows\SysWOW64\Jnmiag32.exeC:\Windows\system32\Jnmiag32.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:804 -
C:\Windows\SysWOW64\Jfcabd32.exeC:\Windows\system32\Jfcabd32.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Windows\SysWOW64\Kbjbge32.exeC:\Windows\system32\Kbjbge32.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Windows\SysWOW64\Kidjdpie.exeC:\Windows\system32\Kidjdpie.exe14⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Windows\SysWOW64\Kbmome32.exeC:\Windows\system32\Kbmome32.exe15⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Windows\SysWOW64\Klecfkff.exeC:\Windows\system32\Klecfkff.exe16⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Windows\SysWOW64\Khldkllj.exeC:\Windows\system32\Khldkllj.exe17⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1104 -
C:\Windows\SysWOW64\Kkjpggkn.exeC:\Windows\system32\Kkjpggkn.exe18⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1280 -
C:\Windows\SysWOW64\Kdbepm32.exeC:\Windows\system32\Kdbepm32.exe19⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:552 -
C:\Windows\SysWOW64\Kfaalh32.exeC:\Windows\system32\Kfaalh32.exe20⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2488 -
C:\Windows\SysWOW64\Kageia32.exeC:\Windows\system32\Kageia32.exe21⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1656 -
C:\Windows\SysWOW64\Kkojbf32.exeC:\Windows\system32\Kkojbf32.exe22⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1396 -
C:\Windows\SysWOW64\Libjncnc.exeC:\Windows\system32\Libjncnc.exe23⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2640 -
C:\Windows\SysWOW64\Lbjofi32.exeC:\Windows\system32\Lbjofi32.exe24⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2800 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2800 -s 14025⤵
- Loads dropped DLL
- Program crash
PID:1864
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7KB
MD5e17006b97ff356b3da55b23dda2308ed
SHA1416543a3d012219b3c5b3be27767194fcc36d0b8
SHA256e34cb84a44f480ab16f808b707285bf7c02c7814d4c1835fd19a1abe4f64326b
SHA512ac5a1ee79dab918a154c9646f9f22fb0f4b23af2b3332cd9d113de6cc92ec371a600f8b575bf06ee6ff144af683a8205397578560f591a40ab4f00cd95a878ba
-
Filesize
99KB
MD5a82962dc0686aaa0d0d3450a5695147e
SHA12e4f78253e94832a1f7def7b7a6a129f5549e7f5
SHA256dcf0feb00784b15331ffdf915b7aa9a7469d21d2714f946289cf5caec53d32ba
SHA512227e5b4abebc8809a4c929a07726fbf20702cd1a8a61f37e7e90b168172ea368ec324146d3ca3f25bb6f3d5447d0075c59fc9f645b2c989e3799f6f265b740dc
-
Filesize
99KB
MD5c3b092a34c18bd3bcbcb4441fd8810c1
SHA1844e3e52671e20b79cd5e1190e5ae50d8573e0ce
SHA2562e23a1198fc065f203d627400faff86d066a5480326b51279c305018464ac74a
SHA512fcbacfced3a07688e7ea799e8b53fe28c8b04523f93f2f356fe242f53defa614df674bb4599042a992d96b48f46e372ab7711f68ccc4944a20082274f3ac0c68
-
Filesize
99KB
MD51dfa1fd475ed82fa09d2e1d7a671492d
SHA1aec4dced2ff4c3af40a6c8e3e63a009688abaca7
SHA2568487e0c4b76139e5e9cb6c5ee17db91ce194269c71bbf161dce4367e6c2d4b68
SHA51240166c59102b3962478c70f40cb33002a6d6fe9aa177a4cf1f865513435dc704ff1f497f7b76db79aba21209d4715065c25b81e384b75f660865df6e78ff635d
-
Filesize
99KB
MD57e6f9b183dc8092a0d7b7fb660bd1397
SHA1f4bb3b50706e24d7b25cf880f5637bb2d6480f5c
SHA256a3e9f37836cb9183f0093b2722cc7feb74dd48aebd411188c7223de8274c0233
SHA512fca1ec614bce6decf88a7ac8335078aef782973b912b8c4bc04a1ab404c2e6d2b1d3dd85a8469c87ca576ef1e8d23228d12c9e3ccc967cc8798a3b3a4d71b0f2
-
Filesize
99KB
MD5b0b2c9151660e8599d72b428b8ef44de
SHA1687942a97b48106b6616b929513caaa5ebce3480
SHA2562b7be8db5c9216510cf8e82d44cb535b4becc0fead41715e07faaf264b9e4395
SHA512a9f163760f656466b4f2bde91291e9ac90d0f126ecf72ca9dde3d65fa26c269f03c8941d4f7779e6c234304fa4b04536a5765b92d3479edc3f25cd810840cb7e
-
Filesize
99KB
MD52c5140d0c82a85e67dce38fd8309c000
SHA15b1e26081543a83bde993ef3f4d6c0248e88432d
SHA256d4235b9d1c7439a988a413972864e22bf8d11a2294851e54222ddcbd9385da0c
SHA5124c38288b873c55df5d5f386aefccf6cf04e0bd9e3dcf867c6a73e78b4d78749b4f4c0e6308ef6b3ff0b1be623be564e6ba886baff3a15b2cd523fbefac0f2510
-
Filesize
99KB
MD55e8add01be366430da75ea499b61308b
SHA173b31615395b92e61da9e85448b37c83422db2e5
SHA256db591ba6657e22ffb7f62e44dd00aad976089c7888f341dcca2b3d96c5f5a853
SHA512e0f129367b90f5f9b94e1786288afce991cd57a424635c7afac6a4d3b5db4cd3be807fa7554bec514b02a367f318a7d6e224b79adb88c95666fa3fccd9200628
-
Filesize
99KB
MD5ebed47067371e212a308c75f458cb045
SHA1ece86610e7966d2fd76d0ba87760792d8114abba
SHA256a96f13e7338f67513b6831c2e69f377eed028a8af6e0ffb3ae9630c323d8023a
SHA512483335422325ec8c2a690d09327b4787e649b87aaad9b1390930fc94e0c31ac69019982e9b17851a8870817bb0e70c4db9d3834398cb2ac6524c92fa4029437b
-
Filesize
99KB
MD5eb816b9bd4de9c9380d5cb7636375899
SHA189028615779c66d993d930bed3d4cfcbb947add2
SHA256ebbed5f52da75dd3643d3cb3d2497538d790fcbdf9fac45d24de839be9aa1c05
SHA51224af1607bd48adce5a009a3642a7c4a0cc6ae488880941069076d66f66a282296cd0ca43e7ad584a9117481dcdab3783068bdfbb164b6b90c9f1f230de2749ca
-
Filesize
99KB
MD52bc8e9e082e56cbd6a707b81f06e3977
SHA1c771412261a62a3fed85dc21a90641327b6e6904
SHA256a1f50ffc2c2506eceaadb0ee997ca97985db87c17505ffd43bceaafff6ff8351
SHA512140f8166787b88f871b0c451cc20d17edcdb608b2577422eaec4320ab7a7befb30fe193c018738095241c0acdf289d4651bf0b1a9a2a978806984126a4e49c68
-
Filesize
99KB
MD5774da986784c5f305e73abbfd33092b1
SHA187e9c9c75cd665fdb5d89180b7d04fa1bf3f78f3
SHA256750e81bbc8cfd55deee4fb61d3d5eadd95e338774afc8e75a957bc67318d9691
SHA51283dfd9ee11d5b332be891a0e623ff12c6b153106ba5175f0dd6cc483f6cf3bbccfc054ed677ebbf530bddf85658ccad6ef3630d697ce9a5826f3e4d672f2e18c
-
Filesize
99KB
MD5976268cb03298829734585551432a0a8
SHA12021741d8a724bffd1173b14e9762ca1e7acd5a2
SHA256be77b278f43ca99a0164fc09d73fa061e9688282d275807cd52272d4ae8a7d2a
SHA51229d3e8d6a5fe7477a7d0a3c673e5ec87a6542c830e7e44f1f7928dca28801cba8b9d0871ccfc4a709162ad4c1baf7b6041eb5166c1cc6480f54537cb27421d38
-
Filesize
99KB
MD5f8e6327be3958c5cb0b4cba8f2fbf580
SHA1869f6f9f0496b8eb997bb9f80712b53288595a15
SHA256df42878c9255adfa2f84e1b4a00ace887c1b15aaf6fdc4a048c3d122d4f72261
SHA512fdb0799aaf33a5614c328057d4385d1f3daa9b0e1dc1cb773dacad2a10a74b96f53fbf35b5e9c00feef80d89dc08e792e1d2c2193bd229f7712fae36bbbb2583
-
Filesize
99KB
MD5c239a2a5b950dfd3d036afe154e0ad5c
SHA1cdd9c7a495874a1c512f15114e6be622e771a7b7
SHA2564965c170da743fec95cff0292f94150d3062031578fec47921ee5ae1a1ca713e
SHA512a18d7e7155bdc1671afedf52ba07a3e5e6dc064a04c59b62578cc61e20f9be1e0936dc7fbc2c0acf6fb331f1df27398ebc1699ed6dbcbd190383cdef5533cef6
-
Filesize
99KB
MD5270efbda8c0b20569b5e3438f39ecff4
SHA17174702873e866296e7753f09a63d87a2a920c3d
SHA256b1db67d42f0064ab45cf70243863ee8bc134c48587bd0df2a4eb053dc2fba22a
SHA5125e82786d607cb75268a04d9e0e0e472a17f79b83edbca07a01cf157d4e0f71589a2c47fd1b18e517bea514bd4448ed39453bc19be2756a0dc20c9038d8925795
-
Filesize
99KB
MD56d6f28e97bd859823e4c61f99d475159
SHA110a6d13b9bb43afc99e9041cf6440c558381ef65
SHA2560cb1ccdd4322569b16b10170604e3c9f00a48ffafd1030db124a966ae998d07a
SHA512dbfa2ca2fc59f7feff447319a3753699fc0da0a9d1f001a5f88ba963678a974aabfda23e63d9192de9360aa810aabde082ed52155e6d7beb9b08d338456b5ea9
-
Filesize
99KB
MD54032ddfd56c9f1b7081ee5ca598fbe2c
SHA1c6ead30204993eb2bd45ed4892f5314735c1ec23
SHA256a9a9cce676d7dc74987419477a60bca022205b9c655bf3138cd8e3fa11be5011
SHA5121fbf05c4e1d4d63f42b37423c4c5276e4dc16ace6760255909525e8f1bfd0bf0a7e28753b68ee08ed02500e92dc954fe77f47ea3a1e49083549dceefbcb53f5b
-
Filesize
99KB
MD5adefe739bf50b183a012dda4aa634480
SHA18167d71e13d66569d91e75072ceab4f2b51c1f95
SHA25692e1d777d78ebe9531c6577557c5b7462228a3d81fec63d759a71d165e626cbe
SHA512885bf17025432f0978ed157fd6079be9508acc767187b962c28ad8d7f9c0565995b07b333ff195b4da091464ee26f2110a12319deffda277bc38c40d400cc91f
-
Filesize
99KB
MD5e0db2627ca26c80bda53f1ec94de3526
SHA1af92961da719d2fa3354b2cb503ff93f7fe7ee62
SHA25621c55b9e7126c70960a02dc21c29826370b94b79ebb650d5fd7e7de54481646a
SHA5126e5e24e6156c9db19b4727708766bb0cbc834bbc1cf7947f4b9cbff359809fb3b056d4c1732bdf8f8aa491f0bb51c1184d0faae672cad8c474bef9e4ec490764
-
Filesize
99KB
MD5cb03e08c12f62b88afeaa40b68357d6e
SHA1417d400d331656d82e311702a5058feb3b852755
SHA256a161dc20f51646a6103356ac007d2722471e9d4f98a496521b4bbb3d1d9df75d
SHA5121ea24a0e403d9d9951766c999f591c70d693bd786504b634a719c071fceb61ffb08c4fbfc04dac4e95e85a64bed66724a24ab3f91292254644c5f507f46e2573
-
Filesize
99KB
MD516efc8976932a424925df16e030bbcdc
SHA1ea96c71109414b6e24a06583acf820b1ba69d71b
SHA2562eff99ab91bf1aa46986990c471ac22231400bda1c1a61123c7580ba980ee9c2
SHA512118cde00bf0a6bec3ce6a1e87a8f516d38033e6abbacb66feda693796bc1b9fa42f47f72d305eaac4439f0705aae77080e685a38eb2e0cdc02a38bf27a4b7de0
-
Filesize
99KB
MD5ea807cfd92d7cb78eefcb22b9da7fcb9
SHA12f219455dcf779393bff433e0aff8a6976494337
SHA256f34dcfc92321720826f96298a62a457cd8d84f98fdbb157acd84c370c2400624
SHA512e23292221127623abbb74faa061fd68b9b6d16f71021fd7a187986b166793150c58a9afa1034e5ae35c61caa51f9befdbd7cac76eed63d86d9b5a95f1e62b3b7
-
Filesize
99KB
MD5288d1174674716bf452543953494aac4
SHA1270ddfa221cc1cde4974b7e0f9b744dc8cb23d6c
SHA256d75a8df1e6d1d22ae20a2c8ae37dc2ec23f96364097147bd002c4dd44dc1357a
SHA512c0384b89c157c1c25116092ad6094410e2736be021c91ad7fee07f5384f70b85de6f8d0339c1eb6910816bcbdc93b8b633a6ca0e721c527deb1f2690cb981946