Analysis
-
max time kernel
33s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
12-10-2024 03:15
Static task
static1
Behavioral task
behavioral1
Sample
ace870046e0fe00cce00ea6b0b3f4b66da9071319a78d73ebe8e5d7bc2198503N.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
ace870046e0fe00cce00ea6b0b3f4b66da9071319a78d73ebe8e5d7bc2198503N.exe
Resource
win10v2004-20241007-en
General
-
Target
ace870046e0fe00cce00ea6b0b3f4b66da9071319a78d73ebe8e5d7bc2198503N.exe
-
Size
78KB
-
MD5
78c1a11f39329ef2b709642115a52f60
-
SHA1
1fe10a5614c779bfb9eaf8c2039a6a915344346a
-
SHA256
ace870046e0fe00cce00ea6b0b3f4b66da9071319a78d73ebe8e5d7bc2198503
-
SHA512
a025205011f20686fe542a7e1844bb25cbabda023c60bd688c61182f0736b7e36eff4d3d9f321746f95aecbdc8887799e3aca91304b09bedb9355e6074993c77
-
SSDEEP
1536:8nkTdADQPnbTZ/CuGMKsREYeIJWlS4awJiVJN+zL20gJi1ie:EkTaSDREYeIKBJiVJgzL20WKt
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 22 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Abinjdad.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bmelpa32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bfpmog32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cenmfbml.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qghgigkn.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Abbhje32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Beggec32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cenmfbml.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qgfkchmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bmgifa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qghgigkn.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bmgifa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Beggec32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad ace870046e0fe00cce00ea6b0b3f4b66da9071319a78d73ebe8e5d7bc2198503N.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qgfkchmp.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Abinjdad.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bmelpa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bfpmog32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ciglaa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ciglaa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" ace870046e0fe00cce00ea6b0b3f4b66da9071319a78d73ebe8e5d7bc2198503N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Abbhje32.exe -
Executes dropped EXE 11 IoCs
pid Process 2780 Qgfkchmp.exe 3052 Qghgigkn.exe 2980 Abbhje32.exe 2672 Abinjdad.exe 2960 Bmelpa32.exe 3024 Bmgifa32.exe 2628 Bfpmog32.exe 1560 Beggec32.exe 3004 Ciglaa32.exe 1756 Cenmfbml.exe 780 Coindgbi.exe -
Loads dropped DLL 22 IoCs
pid Process 1612 ace870046e0fe00cce00ea6b0b3f4b66da9071319a78d73ebe8e5d7bc2198503N.exe 1612 ace870046e0fe00cce00ea6b0b3f4b66da9071319a78d73ebe8e5d7bc2198503N.exe 2780 Qgfkchmp.exe 2780 Qgfkchmp.exe 3052 Qghgigkn.exe 3052 Qghgigkn.exe 2980 Abbhje32.exe 2980 Abbhje32.exe 2672 Abinjdad.exe 2672 Abinjdad.exe 2960 Bmelpa32.exe 2960 Bmelpa32.exe 3024 Bmgifa32.exe 3024 Bmgifa32.exe 2628 Bfpmog32.exe 2628 Bfpmog32.exe 1560 Beggec32.exe 1560 Beggec32.exe 3004 Ciglaa32.exe 3004 Ciglaa32.exe 1756 Cenmfbml.exe 1756 Cenmfbml.exe -
Drops file in System32 directory 33 IoCs
description ioc Process File created C:\Windows\SysWOW64\Mokegi32.dll Beggec32.exe File created C:\Windows\SysWOW64\Abinjdad.exe Abbhje32.exe File opened for modification C:\Windows\SysWOW64\Bmelpa32.exe Abinjdad.exe File created C:\Windows\SysWOW64\Cmpbigma.dll Bmelpa32.exe File created C:\Windows\SysWOW64\Flhbop32.dll Bmgifa32.exe File opened for modification C:\Windows\SysWOW64\Qgfkchmp.exe ace870046e0fe00cce00ea6b0b3f4b66da9071319a78d73ebe8e5d7bc2198503N.exe File created C:\Windows\SysWOW64\Gaocdi32.dll Qghgigkn.exe File opened for modification C:\Windows\SysWOW64\Qghgigkn.exe Qgfkchmp.exe File created C:\Windows\SysWOW64\Abbhje32.exe Qghgigkn.exe File opened for modification C:\Windows\SysWOW64\Abbhje32.exe Qghgigkn.exe File created C:\Windows\SysWOW64\Bmgifa32.exe Bmelpa32.exe File opened for modification C:\Windows\SysWOW64\Beggec32.exe Bfpmog32.exe File opened for modification C:\Windows\SysWOW64\Cenmfbml.exe Ciglaa32.exe File opened for modification C:\Windows\SysWOW64\Coindgbi.exe Cenmfbml.exe File created C:\Windows\SysWOW64\Qgfkchmp.exe ace870046e0fe00cce00ea6b0b3f4b66da9071319a78d73ebe8e5d7bc2198503N.exe File created C:\Windows\SysWOW64\Lnoipg32.dll Qgfkchmp.exe File created C:\Windows\SysWOW64\Dcigjjli.dll Abbhje32.exe File created C:\Windows\SysWOW64\Bmelpa32.exe Abinjdad.exe File created C:\Windows\SysWOW64\Cenmfbml.exe Ciglaa32.exe File created C:\Windows\SysWOW64\Coindgbi.exe Cenmfbml.exe File created C:\Windows\SysWOW64\Qghgigkn.exe Qgfkchmp.exe File created C:\Windows\SysWOW64\Bhhjdb32.dll Abinjdad.exe File created C:\Windows\SysWOW64\Beggec32.exe Bfpmog32.exe File created C:\Windows\SysWOW64\Ohodgb32.dll Cenmfbml.exe File created C:\Windows\SysWOW64\Aiffeloi.dll ace870046e0fe00cce00ea6b0b3f4b66da9071319a78d73ebe8e5d7bc2198503N.exe File created C:\Windows\SysWOW64\Bfpmog32.exe Bmgifa32.exe File created C:\Windows\SysWOW64\Kbmamh32.dll Bfpmog32.exe File opened for modification C:\Windows\SysWOW64\Ciglaa32.exe Beggec32.exe File created C:\Windows\SysWOW64\Hlilhb32.dll Ciglaa32.exe File opened for modification C:\Windows\SysWOW64\Abinjdad.exe Abbhje32.exe File opened for modification C:\Windows\SysWOW64\Bmgifa32.exe Bmelpa32.exe File opened for modification C:\Windows\SysWOW64\Bfpmog32.exe Bmgifa32.exe File created C:\Windows\SysWOW64\Ciglaa32.exe Beggec32.exe -
System Location Discovery: System Language Discovery 1 TTPs 12 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bmelpa32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bmgifa32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bfpmog32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Beggec32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ciglaa32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cenmfbml.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qghgigkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Abinjdad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Abbhje32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Coindgbi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ace870046e0fe00cce00ea6b0b3f4b66da9071319a78d73ebe8e5d7bc2198503N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qgfkchmp.exe -
Modifies registry class 36 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lnoipg32.dll" Qgfkchmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Abbhje32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cmpbigma.dll" Bmelpa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bmgifa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ciglaa32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node ace870046e0fe00cce00ea6b0b3f4b66da9071319a78d73ebe8e5d7bc2198503N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Beggec32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aiffeloi.dll" ace870046e0fe00cce00ea6b0b3f4b66da9071319a78d73ebe8e5d7bc2198503N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" ace870046e0fe00cce00ea6b0b3f4b66da9071319a78d73ebe8e5d7bc2198503N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Qghgigkn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bhhjdb32.dll" Abinjdad.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bmelpa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kbmamh32.dll" Bfpmog32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Beggec32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mokegi32.dll" Beggec32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 ace870046e0fe00cce00ea6b0b3f4b66da9071319a78d73ebe8e5d7bc2198503N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gaocdi32.dll" Qghgigkn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Qghgigkn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bmelpa32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bmgifa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Flhbop32.dll" Bmgifa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bfpmog32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cenmfbml.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cenmfbml.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Abbhje32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dcigjjli.dll" Abbhje32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Abinjdad.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ohodgb32.dll" Cenmfbml.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID ace870046e0fe00cce00ea6b0b3f4b66da9071319a78d73ebe8e5d7bc2198503N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Abinjdad.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bfpmog32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Qgfkchmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Qgfkchmp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ciglaa32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} ace870046e0fe00cce00ea6b0b3f4b66da9071319a78d73ebe8e5d7bc2198503N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hlilhb32.dll" Ciglaa32.exe -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 1612 wrote to memory of 2780 1612 ace870046e0fe00cce00ea6b0b3f4b66da9071319a78d73ebe8e5d7bc2198503N.exe 30 PID 1612 wrote to memory of 2780 1612 ace870046e0fe00cce00ea6b0b3f4b66da9071319a78d73ebe8e5d7bc2198503N.exe 30 PID 1612 wrote to memory of 2780 1612 ace870046e0fe00cce00ea6b0b3f4b66da9071319a78d73ebe8e5d7bc2198503N.exe 30 PID 1612 wrote to memory of 2780 1612 ace870046e0fe00cce00ea6b0b3f4b66da9071319a78d73ebe8e5d7bc2198503N.exe 30 PID 2780 wrote to memory of 3052 2780 Qgfkchmp.exe 31 PID 2780 wrote to memory of 3052 2780 Qgfkchmp.exe 31 PID 2780 wrote to memory of 3052 2780 Qgfkchmp.exe 31 PID 2780 wrote to memory of 3052 2780 Qgfkchmp.exe 31 PID 3052 wrote to memory of 2980 3052 Qghgigkn.exe 32 PID 3052 wrote to memory of 2980 3052 Qghgigkn.exe 32 PID 3052 wrote to memory of 2980 3052 Qghgigkn.exe 32 PID 3052 wrote to memory of 2980 3052 Qghgigkn.exe 32 PID 2980 wrote to memory of 2672 2980 Abbhje32.exe 33 PID 2980 wrote to memory of 2672 2980 Abbhje32.exe 33 PID 2980 wrote to memory of 2672 2980 Abbhje32.exe 33 PID 2980 wrote to memory of 2672 2980 Abbhje32.exe 33 PID 2672 wrote to memory of 2960 2672 Abinjdad.exe 34 PID 2672 wrote to memory of 2960 2672 Abinjdad.exe 34 PID 2672 wrote to memory of 2960 2672 Abinjdad.exe 34 PID 2672 wrote to memory of 2960 2672 Abinjdad.exe 34 PID 2960 wrote to memory of 3024 2960 Bmelpa32.exe 35 PID 2960 wrote to memory of 3024 2960 Bmelpa32.exe 35 PID 2960 wrote to memory of 3024 2960 Bmelpa32.exe 35 PID 2960 wrote to memory of 3024 2960 Bmelpa32.exe 35 PID 3024 wrote to memory of 2628 3024 Bmgifa32.exe 36 PID 3024 wrote to memory of 2628 3024 Bmgifa32.exe 36 PID 3024 wrote to memory of 2628 3024 Bmgifa32.exe 36 PID 3024 wrote to memory of 2628 3024 Bmgifa32.exe 36 PID 2628 wrote to memory of 1560 2628 Bfpmog32.exe 37 PID 2628 wrote to memory of 1560 2628 Bfpmog32.exe 37 PID 2628 wrote to memory of 1560 2628 Bfpmog32.exe 37 PID 2628 wrote to memory of 1560 2628 Bfpmog32.exe 37 PID 1560 wrote to memory of 3004 1560 Beggec32.exe 38 PID 1560 wrote to memory of 3004 1560 Beggec32.exe 38 PID 1560 wrote to memory of 3004 1560 Beggec32.exe 38 PID 1560 wrote to memory of 3004 1560 Beggec32.exe 38 PID 3004 wrote to memory of 1756 3004 Ciglaa32.exe 39 PID 3004 wrote to memory of 1756 3004 Ciglaa32.exe 39 PID 3004 wrote to memory of 1756 3004 Ciglaa32.exe 39 PID 3004 wrote to memory of 1756 3004 Ciglaa32.exe 39 PID 1756 wrote to memory of 780 1756 Cenmfbml.exe 40 PID 1756 wrote to memory of 780 1756 Cenmfbml.exe 40 PID 1756 wrote to memory of 780 1756 Cenmfbml.exe 40 PID 1756 wrote to memory of 780 1756 Cenmfbml.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\ace870046e0fe00cce00ea6b0b3f4b66da9071319a78d73ebe8e5d7bc2198503N.exe"C:\Users\Admin\AppData\Local\Temp\ace870046e0fe00cce00ea6b0b3f4b66da9071319a78d73ebe8e5d7bc2198503N.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Windows\SysWOW64\Qgfkchmp.exeC:\Windows\system32\Qgfkchmp.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\SysWOW64\Qghgigkn.exeC:\Windows\system32\Qghgigkn.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\SysWOW64\Abbhje32.exeC:\Windows\system32\Abbhje32.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Windows\SysWOW64\Abinjdad.exeC:\Windows\system32\Abinjdad.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\SysWOW64\Bmelpa32.exeC:\Windows\system32\Bmelpa32.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Windows\SysWOW64\Bmgifa32.exeC:\Windows\system32\Bmgifa32.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\SysWOW64\Bfpmog32.exeC:\Windows\system32\Bfpmog32.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Windows\SysWOW64\Beggec32.exeC:\Windows\system32\Beggec32.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Windows\SysWOW64\Ciglaa32.exeC:\Windows\system32\Ciglaa32.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Windows\SysWOW64\Cenmfbml.exeC:\Windows\system32\Cenmfbml.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Windows\SysWOW64\Coindgbi.exeC:\Windows\system32\Coindgbi.exe12⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:780
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
78KB
MD57d22d177de595e2ae3593b0f21424a1b
SHA1dfcffee6f963643b34241dce4f98f839f2b729d7
SHA25617d9ea61db8d198d18af91c6a8d3cfec2f3c4e8bb24e19c60377627a57e2d5ca
SHA512f190d4db345f5a379c19d817832d41e6395b9ff2b1ea5bdd6c38c474f4893e2bb61f1ae62051ade2d5521d7dfedccad0eeb1e613a6bd3fda68ca7704534428d0
-
Filesize
78KB
MD5bed70520de5da41e06eca13b3cb391ce
SHA1b93d34b77f64ffeb063806a7cfa4fa187f13af4b
SHA256502af3e8ee0108425826f7c67594600f60d7859824be7c060fda643cb3e0b190
SHA51232236225bb8513a0c7fc0d9cd189e9e5e06e0619fd7ff013e4e17d3a4c069de520d733cc092752d179c78239feb19850a47f3f831ff2695d632d0eb4ed06e9d3
-
Filesize
78KB
MD5d4bcbde6edc9ff098bb602f8c45c51b0
SHA1b34b8c238b2fa3077d58b411ba91548b0405e033
SHA2567b5a2fe5079a25d0685e51e99282d608e40da0122a5a7ef139e26e49a644c8e8
SHA51202dbed8917b4fa61566203c56cd04f2a10dddd931b475100113f85b6c10661e47bab83c42906f9655549af41b6767d49a80f3f920f2acdbf76a4060655cda8ac
-
Filesize
78KB
MD54a7d298ab5d1ce7981c142a122225726
SHA1d152ef03766d0c5f7d7104b55888317213706554
SHA256513111b36d8f9031bc361446d57eb2957517e98d78cec6aa4adc9d6b652fb17f
SHA5129859fde0cfdd46515c844fad4d2f27ebb050a8ba2b49916d877cc7ba0cec6347c265184b5bd7bed7db1f30f3cd3b5975332949dd117b5e7255a89d14b1ae2320
-
Filesize
78KB
MD5cfc445cc60d9b2a33d5538692cf67adf
SHA19e12fd41f9389effa02a8cc0804c9176f8690b4f
SHA2569e35eb43d06fada62605ad749ae4cf4d63fe8a7ca85bc9f26a08665840b77699
SHA512655135f4be7735cd5dbb99e1e06089911d31b3b4aa916ecb496eb7b61c3c8b6e5f50821c1da606714aa32bfe6f33c9c796bba57bdb7af7eb006f995ea3ce30de
-
Filesize
78KB
MD5474ff3be556b4563e6fa19511be967bb
SHA1baa92fb6d707253d5bdae529718407b1ace34830
SHA25646139ef8df2c577135205b586bdf3db007ca24d9ce2220944b9674e08069ba4d
SHA51260d0d07ca448eb99c6775e119595d8ed4af46612bbf80f09e5a27d2f5254ecd0e4f886228c3cd1a1ae5666ce823631a629cab0434023af8a09463ae706997bd0
-
Filesize
78KB
MD5ff3a7afce6651e18f4b049a931c85ea6
SHA105121c3b20bd86421dff20907fc06ab27a323811
SHA256c72e4d2e26b40490276bcb5ad6d5ce7fabf9a9a095cf4397eeb178ac59abb792
SHA512114dc8aea41976cae0dd67581c1bd122ff41cb9ef1050a096c7be57e20c8b71108c10b508b209664d01eca6c4276e59b0c486611cba3d6edd8f6c31b1368a0e9
-
Filesize
78KB
MD5b232425c9380b2dfe96f400988876fb3
SHA14aad80b8b8a4cbb0c8ae808c5c8c564b5e801a1f
SHA25652f51f5db8c1293b879e44cc91fffa3ba61ae8f82093e2193186e88959cc998d
SHA5125f28806dfbb0a3476b5d53ccd758180a38bd092d4e6ceeb8cf1cfb18dc65faa856ac342edd120eba2180f7c8010ef62851478d713480251eead3e0fc89dfe053
-
Filesize
78KB
MD5ad14cda607124d70f278a36ad507ba46
SHA141874be3e57a8e4be27cdba80e992ea201dd0969
SHA25629fa73487b36bd39938ec9a629c611ec094d9c11476ea7ff02db78e49ae21677
SHA512d5161a9c9dca7036c5f85a9e6c1422054db5d9afd84f748e0d9c0424746a746c40bbca63f8a28780d82be5151fd005c368a928c8167b6beaf756113a2493d2f7
-
Filesize
78KB
MD53a4c8701c309df9a68bc989dd9816e8a
SHA1901081e063c23fd584bbc0df534d516f817aa1c1
SHA256b9ba61c864df63258ff13e5b8959f7a5c47509f4a57d29a274351a9cdd77fd24
SHA5127b266fb39336f14bcf90f4b14c9c97ca22746d2ca62a1e3703ac5969e020435a093dbcac497be0ed843ea4f30d0e48931212675645bbe3f4d88b03993374d06b
-
Filesize
78KB
MD550e3a0066e9f687ffebfcfbc4f2137c3
SHA12eaf24bd17246c9e3259084c7599114923db8775
SHA256c6d5a008dda8796b59ae229dcf6985cb23424d9148f41aa27cff49e8475317bf
SHA512f5471b2d2d37610a5d22f8e6ceef251be8b4371405ed374553c015499111aae2ae7704d07c28b6a66c60dac7a92512d082372ceb557b481932921b52bb9e9342