Analysis
-
max time kernel
102s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-10-2024 10:24
Behavioral task
behavioral1
Sample
d116caef9cd76a838f9e0624f963e6073578162338d65e81e9d76c2d9e3f230dN.exe
Resource
win7-20240903-en
General
-
Target
d116caef9cd76a838f9e0624f963e6073578162338d65e81e9d76c2d9e3f230dN.exe
-
Size
337KB
-
MD5
baebd94a0682df3d6a0fa53e67a4d920
-
SHA1
d26bf82bafba3c1e8f826ac8cff3e83a243781db
-
SHA256
d116caef9cd76a838f9e0624f963e6073578162338d65e81e9d76c2d9e3f230d
-
SHA512
587ea932e56810e02b33ed2cd2f5492147d063c875a894a164ccdc50985fc673bdbf8b536bd156406194f90fc76b1a76a577f398eb56d4850567e4967ba37a0a
-
SSDEEP
3072:sddd18is8TNMwsgYfc0DV+1BIyLK5jZWlfXXqyYwi8x4Yfc09:h50Js1+fIyG5jZkCwi8r
Malware Config
Extracted
berbew
http://crutop.nu/index.php
http://crutop.ru/index.php
http://mazafaka.ru/index.php
http://color-bank.ru/index.php
http://asechka.ru/index.php
http://trojan.ru/index.php
http://fuck.ru/index.php
http://goldensand.ru/index.php
http://filesearch.ru/index.php
http://devx.nm.ru/index.php
http://ros-neftbank.ru/index.php
http://lovingod.host.sk/index.php
http://www.redline.ru/index.php
http://cvv.ru/index.php
http://hackers.lv/index.php
http://fethard.biz/index.php
http://ldark.nm.ru/index.htm
http://gaz-prom.ru/index.htm
http://promo.ru/index.htm
http://potleaf.chat.ru/index.htm
http://kadet.ru/index.htm
http://cvv.ru/index.htm
http://crutop.nu/index.htm
http://crutop.ru/index.htm
http://mazafaka.ru/index.htm
http://xware.cjb.net/index.htm
http://konfiskat.org/index.htm
http://parex-bank.ru/index.htm
http://kidos-bank.ru/index.htm
http://kavkaz.ru/index.htm
http://fethard.biz/index.htm
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 42 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dhhnpjmh.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dobfld32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad d116caef9cd76a838f9e0624f963e6073578162338d65e81e9d76c2d9e3f230dN.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cmnpgb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dejacond.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dobfld32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dkkcge32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cdabcm32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cfbkeh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Chagok32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cffdpghg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cffdpghg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dfiafg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dhhnpjmh.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Delnin32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bnbmefbg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cmgjgcgo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cmnpgb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dhmgki32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dkkcge32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Calhnpgn.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Belebq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ceckcp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Calhnpgn.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dodbbdbb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dgbdlf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" d116caef9cd76a838f9e0624f963e6073578162338d65e81e9d76c2d9e3f230dN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Belebq32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ceqnmpfo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cfbkeh32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ceckcp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Delnin32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dhmgki32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dgbdlf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bnbmefbg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cmgjgcgo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ceqnmpfo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dfiafg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dodbbdbb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cdabcm32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Chagok32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dejacond.exe -
Executes dropped EXE 21 IoCs
pid Process 1604 Bnbmefbg.exe 836 Belebq32.exe 3360 Cmgjgcgo.exe 2744 Cdabcm32.exe 2404 Ceqnmpfo.exe 4496 Cfbkeh32.exe 2444 Ceckcp32.exe 2272 Chagok32.exe 3960 Cmnpgb32.exe 2064 Cffdpghg.exe 4908 Calhnpgn.exe 3912 Dfiafg32.exe 2428 Dejacond.exe 1560 Dhhnpjmh.exe 3996 Dobfld32.exe 2032 Delnin32.exe 208 Dodbbdbb.exe 1636 Dhmgki32.exe 2540 Dkkcge32.exe 4524 Dgbdlf32.exe 3908 Dmllipeg.exe -
Drops file in System32 directory 63 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Belebq32.exe Bnbmefbg.exe File created C:\Windows\SysWOW64\Cdabcm32.exe Cmgjgcgo.exe File created C:\Windows\SysWOW64\Ghekjiam.dll Ceqnmpfo.exe File created C:\Windows\SysWOW64\Chagok32.exe Ceckcp32.exe File created C:\Windows\SysWOW64\Mkfdhbpg.dll d116caef9cd76a838f9e0624f963e6073578162338d65e81e9d76c2d9e3f230dN.exe File created C:\Windows\SysWOW64\Belebq32.exe Bnbmefbg.exe File created C:\Windows\SysWOW64\Cfbkeh32.exe Ceqnmpfo.exe File created C:\Windows\SysWOW64\Ffpmlcim.dll Chagok32.exe File opened for modification C:\Windows\SysWOW64\Dmllipeg.exe Dgbdlf32.exe File created C:\Windows\SysWOW64\Hjfhhm32.dll Belebq32.exe File created C:\Windows\SysWOW64\Gmcfdb32.dll Dobfld32.exe File created C:\Windows\SysWOW64\Kngpec32.dll Dgbdlf32.exe File created C:\Windows\SysWOW64\Dchfiejc.dll Cmnpgb32.exe File created C:\Windows\SysWOW64\Dobfld32.exe Dhhnpjmh.exe File opened for modification C:\Windows\SysWOW64\Delnin32.exe Dobfld32.exe File created C:\Windows\SysWOW64\Dfiafg32.exe Calhnpgn.exe File created C:\Windows\SysWOW64\Gallfmbn.dll Bnbmefbg.exe File opened for modification C:\Windows\SysWOW64\Dfiafg32.exe Calhnpgn.exe File opened for modification C:\Windows\SysWOW64\Dgbdlf32.exe Dkkcge32.exe File created C:\Windows\SysWOW64\Ceckcp32.exe Cfbkeh32.exe File created C:\Windows\SysWOW64\Eifnachf.dll Cfbkeh32.exe File opened for modification C:\Windows\SysWOW64\Dhhnpjmh.exe Dejacond.exe File opened for modification C:\Windows\SysWOW64\Dobfld32.exe Dhhnpjmh.exe File created C:\Windows\SysWOW64\Alcidkmm.dll Dhhnpjmh.exe File opened for modification C:\Windows\SysWOW64\Cdabcm32.exe Cmgjgcgo.exe File created C:\Windows\SysWOW64\Qlgene32.dll Ceckcp32.exe File created C:\Windows\SysWOW64\Dodbbdbb.exe Delnin32.exe File created C:\Windows\SysWOW64\Dmllipeg.exe Dgbdlf32.exe File created C:\Windows\SysWOW64\Bhicommo.dll Cmgjgcgo.exe File created C:\Windows\SysWOW64\Cmnpgb32.exe Chagok32.exe File created C:\Windows\SysWOW64\Naeheh32.dll Cffdpghg.exe File created C:\Windows\SysWOW64\Hpnkaj32.dll Dfiafg32.exe File created C:\Windows\SysWOW64\Bnbmefbg.exe d116caef9cd76a838f9e0624f963e6073578162338d65e81e9d76c2d9e3f230dN.exe File opened for modification C:\Windows\SysWOW64\Cfbkeh32.exe Ceqnmpfo.exe File created C:\Windows\SysWOW64\Cffdpghg.exe Cmnpgb32.exe File created C:\Windows\SysWOW64\Kkmjgool.dll Calhnpgn.exe File opened for modification C:\Windows\SysWOW64\Chagok32.exe Ceckcp32.exe File opened for modification C:\Windows\SysWOW64\Dejacond.exe Dfiafg32.exe File opened for modification C:\Windows\SysWOW64\Dodbbdbb.exe Delnin32.exe File created C:\Windows\SysWOW64\Dgbdlf32.exe Dkkcge32.exe File created C:\Windows\SysWOW64\Gfghpl32.dll Dkkcge32.exe File created C:\Windows\SysWOW64\Ceqnmpfo.exe Cdabcm32.exe File opened for modification C:\Windows\SysWOW64\Cmnpgb32.exe Chagok32.exe File created C:\Windows\SysWOW64\Calhnpgn.exe Cffdpghg.exe File created C:\Windows\SysWOW64\Dhhnpjmh.exe Dejacond.exe File opened for modification C:\Windows\SysWOW64\Cmgjgcgo.exe Belebq32.exe File opened for modification C:\Windows\SysWOW64\Dkkcge32.exe Dhmgki32.exe File created C:\Windows\SysWOW64\Fpdaoioe.dll Dodbbdbb.exe File opened for modification C:\Windows\SysWOW64\Ceqnmpfo.exe Cdabcm32.exe File opened for modification C:\Windows\SysWOW64\Ceckcp32.exe Cfbkeh32.exe File opened for modification C:\Windows\SysWOW64\Calhnpgn.exe Cffdpghg.exe File created C:\Windows\SysWOW64\Fnmnbf32.dll Delnin32.exe File created C:\Windows\SysWOW64\Dhmgki32.exe Dodbbdbb.exe File opened for modification C:\Windows\SysWOW64\Dhmgki32.exe Dodbbdbb.exe File created C:\Windows\SysWOW64\Delnin32.exe Dobfld32.exe File created C:\Windows\SysWOW64\Dkkcge32.exe Dhmgki32.exe File opened for modification C:\Windows\SysWOW64\Bnbmefbg.exe d116caef9cd76a838f9e0624f963e6073578162338d65e81e9d76c2d9e3f230dN.exe File created C:\Windows\SysWOW64\Cmgjgcgo.exe Belebq32.exe File created C:\Windows\SysWOW64\Kdqjac32.dll Cdabcm32.exe File opened for modification C:\Windows\SysWOW64\Cffdpghg.exe Cmnpgb32.exe File created C:\Windows\SysWOW64\Dejacond.exe Dfiafg32.exe File created C:\Windows\SysWOW64\Nbgngp32.dll Dejacond.exe File created C:\Windows\SysWOW64\Jcbdhp32.dll Dhmgki32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3872 3908 WerFault.exe 107 -
System Location Discovery: System Language Discovery 1 TTPs 22 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cfbkeh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ceckcp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dhhnpjmh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Delnin32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dgbdlf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Belebq32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cdabcm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dejacond.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d116caef9cd76a838f9e0624f963e6073578162338d65e81e9d76c2d9e3f230dN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Chagok32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Calhnpgn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dobfld32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dodbbdbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dkkcge32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bnbmefbg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cmgjgcgo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ceqnmpfo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cmnpgb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cffdpghg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dfiafg32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dhmgki32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dmllipeg.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ceqnmpfo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Chagok32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 d116caef9cd76a838f9e0624f963e6073578162338d65e81e9d76c2d9e3f230dN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Belebq32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cfbkeh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Naeheh32.dll" Cffdpghg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cffdpghg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dodbbdbb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dgbdlf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID d116caef9cd76a838f9e0624f963e6073578162338d65e81e9d76c2d9e3f230dN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cdabcm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ceckcp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ceckcp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dhhnpjmh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Chagok32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ceqnmpfo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eifnachf.dll" Cfbkeh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hpnkaj32.dll" Dfiafg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dejacond.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dchfiejc.dll" Cmnpgb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Alcidkmm.dll" Dhhnpjmh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dgbdlf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Delnin32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node d116caef9cd76a838f9e0624f963e6073578162338d65e81e9d76c2d9e3f230dN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mkfdhbpg.dll" d116caef9cd76a838f9e0624f963e6073578162338d65e81e9d76c2d9e3f230dN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cfbkeh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cmnpgb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dobfld32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hjfhhm32.dll" Belebq32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cmnpgb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fpdaoioe.dll" Dodbbdbb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dkkcge32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dfiafg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dhmgki32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gfghpl32.dll" Dkkcge32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cmgjgcgo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Calhnpgn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dejacond.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nbgngp32.dll" Dejacond.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kngpec32.dll" Dgbdlf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Delnin32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jcbdhp32.dll" Dhmgki32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cffdpghg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dhmgki32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} d116caef9cd76a838f9e0624f963e6073578162338d65e81e9d76c2d9e3f230dN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bnbmefbg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bnbmefbg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cdabcm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ghekjiam.dll" Ceqnmpfo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gmcfdb32.dll" Dobfld32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dobfld32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fnmnbf32.dll" Delnin32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" d116caef9cd76a838f9e0624f963e6073578162338d65e81e9d76c2d9e3f230dN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bhicommo.dll" Cmgjgcgo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kdqjac32.dll" Cdabcm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ffpmlcim.dll" Chagok32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dfiafg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dodbbdbb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dhhnpjmh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gallfmbn.dll" Bnbmefbg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cmgjgcgo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qlgene32.dll" Ceckcp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kkmjgool.dll" Calhnpgn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Calhnpgn.exe -
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 3168 wrote to memory of 1604 3168 d116caef9cd76a838f9e0624f963e6073578162338d65e81e9d76c2d9e3f230dN.exe 84 PID 3168 wrote to memory of 1604 3168 d116caef9cd76a838f9e0624f963e6073578162338d65e81e9d76c2d9e3f230dN.exe 84 PID 3168 wrote to memory of 1604 3168 d116caef9cd76a838f9e0624f963e6073578162338d65e81e9d76c2d9e3f230dN.exe 84 PID 1604 wrote to memory of 836 1604 Bnbmefbg.exe 85 PID 1604 wrote to memory of 836 1604 Bnbmefbg.exe 85 PID 1604 wrote to memory of 836 1604 Bnbmefbg.exe 85 PID 836 wrote to memory of 3360 836 Belebq32.exe 87 PID 836 wrote to memory of 3360 836 Belebq32.exe 87 PID 836 wrote to memory of 3360 836 Belebq32.exe 87 PID 3360 wrote to memory of 2744 3360 Cmgjgcgo.exe 88 PID 3360 wrote to memory of 2744 3360 Cmgjgcgo.exe 88 PID 3360 wrote to memory of 2744 3360 Cmgjgcgo.exe 88 PID 2744 wrote to memory of 2404 2744 Cdabcm32.exe 90 PID 2744 wrote to memory of 2404 2744 Cdabcm32.exe 90 PID 2744 wrote to memory of 2404 2744 Cdabcm32.exe 90 PID 2404 wrote to memory of 4496 2404 Ceqnmpfo.exe 91 PID 2404 wrote to memory of 4496 2404 Ceqnmpfo.exe 91 PID 2404 wrote to memory of 4496 2404 Ceqnmpfo.exe 91 PID 4496 wrote to memory of 2444 4496 Cfbkeh32.exe 92 PID 4496 wrote to memory of 2444 4496 Cfbkeh32.exe 92 PID 4496 wrote to memory of 2444 4496 Cfbkeh32.exe 92 PID 2444 wrote to memory of 2272 2444 Ceckcp32.exe 93 PID 2444 wrote to memory of 2272 2444 Ceckcp32.exe 93 PID 2444 wrote to memory of 2272 2444 Ceckcp32.exe 93 PID 2272 wrote to memory of 3960 2272 Chagok32.exe 95 PID 2272 wrote to memory of 3960 2272 Chagok32.exe 95 PID 2272 wrote to memory of 3960 2272 Chagok32.exe 95 PID 3960 wrote to memory of 2064 3960 Cmnpgb32.exe 96 PID 3960 wrote to memory of 2064 3960 Cmnpgb32.exe 96 PID 3960 wrote to memory of 2064 3960 Cmnpgb32.exe 96 PID 2064 wrote to memory of 4908 2064 Cffdpghg.exe 97 PID 2064 wrote to memory of 4908 2064 Cffdpghg.exe 97 PID 2064 wrote to memory of 4908 2064 Cffdpghg.exe 97 PID 4908 wrote to memory of 3912 4908 Calhnpgn.exe 98 PID 4908 wrote to memory of 3912 4908 Calhnpgn.exe 98 PID 4908 wrote to memory of 3912 4908 Calhnpgn.exe 98 PID 3912 wrote to memory of 2428 3912 Dfiafg32.exe 99 PID 3912 wrote to memory of 2428 3912 Dfiafg32.exe 99 PID 3912 wrote to memory of 2428 3912 Dfiafg32.exe 99 PID 2428 wrote to memory of 1560 2428 Dejacond.exe 100 PID 2428 wrote to memory of 1560 2428 Dejacond.exe 100 PID 2428 wrote to memory of 1560 2428 Dejacond.exe 100 PID 1560 wrote to memory of 3996 1560 Dhhnpjmh.exe 101 PID 1560 wrote to memory of 3996 1560 Dhhnpjmh.exe 101 PID 1560 wrote to memory of 3996 1560 Dhhnpjmh.exe 101 PID 3996 wrote to memory of 2032 3996 Dobfld32.exe 102 PID 3996 wrote to memory of 2032 3996 Dobfld32.exe 102 PID 3996 wrote to memory of 2032 3996 Dobfld32.exe 102 PID 2032 wrote to memory of 208 2032 Delnin32.exe 103 PID 2032 wrote to memory of 208 2032 Delnin32.exe 103 PID 2032 wrote to memory of 208 2032 Delnin32.exe 103 PID 208 wrote to memory of 1636 208 Dodbbdbb.exe 104 PID 208 wrote to memory of 1636 208 Dodbbdbb.exe 104 PID 208 wrote to memory of 1636 208 Dodbbdbb.exe 104 PID 1636 wrote to memory of 2540 1636 Dhmgki32.exe 105 PID 1636 wrote to memory of 2540 1636 Dhmgki32.exe 105 PID 1636 wrote to memory of 2540 1636 Dhmgki32.exe 105 PID 2540 wrote to memory of 4524 2540 Dkkcge32.exe 106 PID 2540 wrote to memory of 4524 2540 Dkkcge32.exe 106 PID 2540 wrote to memory of 4524 2540 Dkkcge32.exe 106 PID 4524 wrote to memory of 3908 4524 Dgbdlf32.exe 107 PID 4524 wrote to memory of 3908 4524 Dgbdlf32.exe 107 PID 4524 wrote to memory of 3908 4524 Dgbdlf32.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\d116caef9cd76a838f9e0624f963e6073578162338d65e81e9d76c2d9e3f230dN.exe"C:\Users\Admin\AppData\Local\Temp\d116caef9cd76a838f9e0624f963e6073578162338d65e81e9d76c2d9e3f230dN.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3168 -
C:\Windows\SysWOW64\Bnbmefbg.exeC:\Windows\system32\Bnbmefbg.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Windows\SysWOW64\Belebq32.exeC:\Windows\system32\Belebq32.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Windows\SysWOW64\Cmgjgcgo.exeC:\Windows\system32\Cmgjgcgo.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3360 -
C:\Windows\SysWOW64\Cdabcm32.exeC:\Windows\system32\Cdabcm32.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\SysWOW64\Ceqnmpfo.exeC:\Windows\system32\Ceqnmpfo.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Windows\SysWOW64\Cfbkeh32.exeC:\Windows\system32\Cfbkeh32.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Windows\SysWOW64\Ceckcp32.exeC:\Windows\system32\Ceckcp32.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Windows\SysWOW64\Chagok32.exeC:\Windows\system32\Chagok32.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Windows\SysWOW64\Cmnpgb32.exeC:\Windows\system32\Cmnpgb32.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3960 -
C:\Windows\SysWOW64\Cffdpghg.exeC:\Windows\system32\Cffdpghg.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Windows\SysWOW64\Calhnpgn.exeC:\Windows\system32\Calhnpgn.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Windows\SysWOW64\Dfiafg32.exeC:\Windows\system32\Dfiafg32.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3912 -
C:\Windows\SysWOW64\Dejacond.exeC:\Windows\system32\Dejacond.exe14⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Windows\SysWOW64\Dhhnpjmh.exeC:\Windows\system32\Dhhnpjmh.exe15⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Windows\SysWOW64\Dobfld32.exeC:\Windows\system32\Dobfld32.exe16⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3996 -
C:\Windows\SysWOW64\Delnin32.exeC:\Windows\system32\Delnin32.exe17⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\SysWOW64\Dodbbdbb.exeC:\Windows\system32\Dodbbdbb.exe18⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:208 -
C:\Windows\SysWOW64\Dhmgki32.exeC:\Windows\system32\Dhmgki32.exe19⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Windows\SysWOW64\Dkkcge32.exeC:\Windows\system32\Dkkcge32.exe20⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\SysWOW64\Dgbdlf32.exeC:\Windows\system32\Dgbdlf32.exe21⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4524 -
C:\Windows\SysWOW64\Dmllipeg.exeC:\Windows\system32\Dmllipeg.exe22⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3908 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3908 -s 40423⤵
- Program crash
PID:3872
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 3908 -ip 39081⤵PID:1468
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
337KB
MD57bdb6f000559abd190ab7780935691c1
SHA1020beefeb0cba243c5768e3997e5bfa08fb97091
SHA256a7fd5af0d7abf45d01c17ff6f249a70a9ab8c59d020851fc789459c725c2926f
SHA512fe394d5b5806b6d10fc3672b245b7adaf5bb6f00668a57249a2548fa9ea87f4580320ba8f82a665c5468b5852f5e2a10309fe667e231011b013997f011a0b14d
-
Filesize
337KB
MD56b68dc9da699860bd06375d23f0cccef
SHA12ff150b876b9b1a51ad330b81c4fbe6bb0c90c7e
SHA25632d373d4e55bab6d0d349477b4c724a787e4410efcf453912bf4976c3f8435df
SHA5126259c603465feeb5de43187f35d3b44813509bb647bdc3be6bf3c4279e1abf6d4529bd82ca66a55710011a050457c8f4da571cb99ee73d3bb50a82ede806ad98
-
Filesize
337KB
MD5d24a6fbe5b158f4632bb4577761227b3
SHA1461defa66bece90c51e01439a853e2a8af97ace7
SHA256a89dd8a6a70c16e986bf2c5624f971cc2886f9f01446b075c3e7f389176d6781
SHA512dc86b28a737aa932abe43eb74d0699cd0bde14808d62dbe77e8098b50eacb4328ce1f738f36262bc71a7e34d902fff52c9e34b40d19a4b2cd0116b441389a9e4
-
Filesize
337KB
MD537fdd966a7218db50560bbfd72b185a3
SHA1163420ab275a2a2e72705e1e30c74565f871c9de
SHA2566821e15f53da7ed3fe081ab2c82dc9b49fa453e12f4b9db53f660cb29c26f477
SHA51224a27932dd576bb47d4af36ef634f65307b6090ff24f11e9252bdf2dfa47e8f689448aa404ae117fd823dfad32bc465f83f513719cee6e324c1818c1fa45746c
-
Filesize
337KB
MD5fd677cf8f261b5ea3575cde39ce47d7e
SHA1d3ee97117f84537ab546364054785d9739b598d4
SHA256ed21fe5cb68582cc4aa88509d692e93ab72e84f4d153f90d0af1810f14c5899d
SHA5127dbcd8e0970791f16f462c071fbf43b8d21bdc71cd816b3fc2b73d145f87e664523f7294355b7ae691ae764b4ad1650916a6f4abdf06bfe1e625fb2da52d8593
-
Filesize
337KB
MD571934870b7d1fdd46d8c9ce71bcff686
SHA13cb4248070f02d2082689c234af6fdf3ef64905f
SHA25629c59a89a997aa7804e25a7ae5bce194385c61163aa881690ac1439244e438f4
SHA512397f8c7869bf8cce7c3ed6aaed92fc930262c1066318cba4ce08f4dfbbf3580d6469b1ff047ba246151f82cb625e8d99de6f7a76e2497dc44c2ebd27220e77d7
-
Filesize
337KB
MD5486c8c2c33db2fd4d936bc470ab0323b
SHA132d278fdee7aaf5cd943d802ba39c83fdc7462ba
SHA2563e3533e44f866887fcbec447812bf7fadb42bfc6310086163e9409d9200d76b4
SHA5123a054fd2ecc40b530605792b72b84a0619138db7d3050362b61953ad85ffba24703d1d178d747804af1254536ea7310de8554bf934a261771c841bd55c0784b0
-
Filesize
337KB
MD5c0357952a765b0b9e8f68b0d10a8adfd
SHA130c75fbda22c896dba0f095da04ca6c0a9aa3554
SHA256242a71047cc333d80b309202e932a0dab07ef3a5cf9e9bf713ca72f8dfb32a20
SHA5128c7f0b0367525fd4dfd2ab5820bdd080fecc8cf5598a7d30a2308109fed45273f529fbe9d8e0436174799c59d4242dcbbacfd55429942c7840baa876c511d5db
-
Filesize
337KB
MD56cc526ef1ad3137122759f68475cb0c4
SHA192878e202056077bc05b8957a736bf8f88f395ef
SHA256b8001bd8dd31400c29108321dec509976880cff48df06dd039a626529188f97d
SHA51275832199298e5fb986d6b4d9ad4296b635a336875cf9a5c952c88728c4f31158c1f0e0e264dd873f6231b11272df7fd7a56b245dc4aee94e54cf3fca8d751c75
-
Filesize
337KB
MD5f1b04cbbe153ffe5617a121cf120e170
SHA1c8590db8a2b723073a8f833a32089e39eb2e7e25
SHA2563c7aac261a8e555fccbf4c6e90888c4e147cece846b8d7ab482cf917d44d98e8
SHA512817a27694fe405020f80a3f313b0ca482217930b69c3563ae186648d573e0835e8477f2ee8db0df29c2e0bc5741d9cfcb6e6259fcb3d54e67df437bb04e2c224
-
Filesize
337KB
MD5443e0419af001a65b19c2f5cf2e2d39e
SHA1dc29ebadfa3c9e3401793e21bdf05d2269cdcbac
SHA256578f07258ed721cd6dea0ca49550d70f4d0aa0596f3a4f98a06bf5bc12746965
SHA5121d277dad37772ae82a994643017eb5da07a50e1632188aa17a6ea00e77fc629fa4701c3dada7f34acf34c59ba2b39f13867fc9b50021063816841bb8a8ae230b
-
Filesize
337KB
MD5434411dbff1dd63ff6526128edb83137
SHA1199d11e7f948c77b7e831a18f18eebb1f328cd18
SHA256deed0bed9c20f2af9d635e5bf57199bcddc08b2bd65ad987b7a6c1fb6456f3df
SHA512255dba01e9f16f9166b3898ee4671d851f2f11764d7a659925f24fa0f7b13ca9f9684f730851bf1df360c8907a1c3feb65095ca9ae44b03c0a3648770eddfd7a
-
Filesize
337KB
MD55bd796a11d95a0a6dc503b9cdc7d7e5a
SHA10391680c3b1ec48c86fc0d23954a650c1c3b7b24
SHA256f6684678cb3622ec401b0294d9103ccf861fd1ef77cc22fe7ee66484ea04d186
SHA512c1b1f104c0334f927558a07a09df5d04a0c0c690ac0954121c4c57fc6a7f017248acc9a98bda64cc052aa724824e8075c6622d3c388d73c4f2f60eadee05dda4
-
Filesize
337KB
MD5ea3869e0c3c858be18a8de7ecc62591f
SHA1033587d9bb1b7fb47a1ca3cd0ffd894232e88d43
SHA25690defcd5bba78b0cd85bf1bc60693fb25ea3c1f5d5d232431c57572efaefde13
SHA51233545790df78e966c9d0f3216be2cbc2cab3ebed39edd2cb18531ac3cb9db1cee353f00181dd9138df242c47c75451aee4d0b2d5e0c85fe7c71240a001771de0
-
Filesize
337KB
MD54917179b20f4c232b0bdf250526172ab
SHA177803f45db2f6cc5ee39ae2bcb87b13e83430639
SHA2569b7b48470f17cbd638d1357db563297444b331f4e5a5e9481c31468e992a8e23
SHA51282168e14fc63da2375c895303be6003310e23183fe6ac72a1d0822628fbe539c35383a1d63f4cbe487551e1f4ee77240925a8d43bbceacfcd334f3e219dcb854
-
Filesize
337KB
MD5307785d4192ec936ef17f4cfc36550ea
SHA15b576703dabc19de1c46f8f1f0903055714cd31f
SHA256082f1d4e0a59e4d728ea331df6451325a543d1aa985f11deebfa6e5f64440e64
SHA5129756e7e0f6b3d6e8092396c7fcbb53dc84079e1a57cf648940ad72eb7a98fc3d04e729a80663c531142c0b628f504f36d8576a3332f2c0cdb555b09ce1e631d2
-
Filesize
337KB
MD5daadac24e20e3191e5e3cbe8b3f757c2
SHA134be673610b630b6f301a60f7c2b7e411bd73a8a
SHA2561f9284b75f7473294e8d9702ebce249fb698d1ee65defc3dd00869be0159e53d
SHA512f1a0344f75cd2dadff6925b1579eecdfda3afae451c8fb5f88ca6f35c10899739dde8dc8290c8f7e98b641d47a488608ddbfb95fdffa94ad584df19d4ce79a4c
-
Filesize
337KB
MD59f098b57607124544f9daa58591aeb1e
SHA1e08fb501172d08a0b24e6a00cf07628272f8fa57
SHA25682569b1235fed89c3a2a1669e2105602b83949022290048e6b1949dc43624157
SHA512d4be2c059b63931c10580ad2f2ec99112900ce23ed45b6c52073f7b57c1e3d5b068b5f8efa5831e8dc41f16b61eded9b717097fe1ce1627d3a56c3c5ecbae4c4
-
Filesize
337KB
MD50f50121fde2bc6b826dfad2083e6cd0c
SHA16d11bd65b134b96bcf8a4c743c4133bee3470629
SHA256a3a4928a6a04ac65863fe4416c306c18b22d108e4a140f0946d3ad4e71a637b2
SHA51286bc941da9bf2ba0385fbbd95ebc62f0ad70612a1dc8e1900c62c0d25a136d7f5f251506ff42e38b6905c7d1dea4fb5e4d62c848c01fabfb627ec76600299cdc
-
Filesize
337KB
MD52a6822e29d0bf80c3f90f355d7d7bc8b
SHA122fbf2001b4cbc5e52b76dc390083f62c964e50e
SHA256b93c8ba63c40dd4f8d474b9f6d768a32947f963e13715d7a82a8ec2590bd82bb
SHA512fc8d6b68f7b5e383fb4d5f4e347415b56f5e575746cf582ad02c01aa5fa2c57a70181858a17f5ccf99a771b2cd0338ec17ff71bd452dcf88c76d97d23c9f8e74
-
Filesize
337KB
MD5c538a46b5f6730ab60396764a826f991
SHA1c54f434b6dcebe0e8f446d4baa6690e4f942813d
SHA25690bad353db73b27860cf43c2540b1773856e7dc34580774f900a56f0c5eec8df
SHA5121116599cb0fc10859fc8b2a0b78d1e1f922b7bccd1378a4592ea51950fca10bda3eb9796a97afd0a285ebc0d9fe3ec32bde5b8965fbf211819324321dcff1e90