Analysis
-
max time kernel
39s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
13-11-2024 20:39
Static task
static1
Behavioral task
behavioral1
Sample
28f62058f5dd84c4e04cbabaad570cf869c4bbaa26f7fc0734f6779948cda74c.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
28f62058f5dd84c4e04cbabaad570cf869c4bbaa26f7fc0734f6779948cda74c.exe
Resource
win10v2004-20241007-en
General
-
Target
28f62058f5dd84c4e04cbabaad570cf869c4bbaa26f7fc0734f6779948cda74c.exe
-
Size
96KB
-
MD5
ca982ba5a8d76e24f675e56bc564ee82
-
SHA1
2d724f6bd9b880704d982cc8ef2fc9379c5cbf75
-
SHA256
28f62058f5dd84c4e04cbabaad570cf869c4bbaa26f7fc0734f6779948cda74c
-
SHA512
c7dda3f6b205bce9843ea8d17de08f7bc989df38109e557553fa924599ecda8ab2a5a72a0489a34d9411f189f19ab04a6916bf1c39b19fd48a0fdf953ee3b61b
-
SSDEEP
1536:mGTcmbFf67Ch8R7kkyxc+ggggQ2LV7RZObZUUWaegPYA:x1ECh8R72cyVClUUWae
Malware Config
Extracted
berbew
http://crutop.nu/index.php
http://crutop.ru/index.php
http://mazafaka.ru/index.php
http://color-bank.ru/index.php
http://asechka.ru/index.php
http://trojan.ru/index.php
http://fuck.ru/index.php
http://goldensand.ru/index.php
http://filesearch.ru/index.php
http://devx.nm.ru/index.php
http://ros-neftbank.ru/index.php
http://lovingod.host.sk/index.php
http://www.redline.ru/index.php
http://cvv.ru/index.php
http://hackers.lv/index.php
http://fethard.biz/index.php
http://ldark.nm.ru/index.htm
http://gaz-prom.ru/index.htm
http://promo.ru/index.htm
http://potleaf.chat.ru/index.htm
http://kadet.ru/index.htm
http://cvv.ru/index.htm
http://crutop.nu/index.htm
http://crutop.ru/index.htm
http://mazafaka.ru/index.htm
http://xware.cjb.net/index.htm
http://konfiskat.org/index.htm
http://parex-bank.ru/index.htm
http://kidos-bank.ru/index.htm
http://kavkaz.ru/index.htm
http://fethard.biz/index.htm
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Ahancp32.exeGdbchd32.exeIjenpn32.exePmoqfi32.exeKcahjqfa.exeKkglim32.exeQfganb32.exeFlkohc32.exeAefhpc32.exeFhcehngk.exeHmojfcdk.exeJmelfeqn.exeEeameodq.exeHmnhnk32.exePfmeddag.exeAkjjifji.exeKiccle32.exeNcdciq32.exeCfkkam32.exeCfaaalep.exeKplfmfmf.exeEigbfb32.exeFpijgk32.exeLophcpam.exeMdhnnl32.exeFldbnb32.exeJafilj32.exeMkqbhf32.exeGhcbga32.exeFdlqjf32.exeLngpac32.exeLdlghhde.exeKbgnil32.exeBonenbgj.exeDmgokcja.exeKlocba32.exeAecdpmbm.exeEmkfmioh.exePbppqf32.exeDhdddnep.exeLhbjmg32.exeLhegcg32.exeEenabkfk.exeQnoklc32.exeFaonqiod.exeGnmdfi32.exeIefeaj32.exeJlgcncli.exeAmdmkb32.exeHkndiabh.exeAlncgn32.exeDjffihmp.exeLmjbphod.exeChmlfj32.exeMdcdcmai.exeNehjmppo.exeHklhca32.exeLndlamke.exePikkfilp.exeFdemap32.exeMqoqlfkl.exeEapcjo32.exeIfkfap32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ahancp32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gdbchd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ijenpn32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pmoqfi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kcahjqfa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kkglim32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qfganb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Flkohc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Aefhpc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fhcehngk.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hmojfcdk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jmelfeqn.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eeameodq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hmnhnk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pfmeddag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Akjjifji.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kiccle32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ncdciq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cfkkam32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cfaaalep.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kplfmfmf.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eigbfb32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fpijgk32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lophcpam.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mdhnnl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fldbnb32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jafilj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mkqbhf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ghcbga32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fpijgk32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fdlqjf32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lngpac32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ldlghhde.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kbgnil32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bonenbgj.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dmgokcja.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Klocba32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aecdpmbm.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Emkfmioh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pbppqf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dhdddnep.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lhbjmg32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lhegcg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Eenabkfk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qnoklc32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Faonqiod.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gnmdfi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Iefeaj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jlgcncli.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Amdmkb32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hkndiabh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Alncgn32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Djffihmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lmjbphod.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Chmlfj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mdcdcmai.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nehjmppo.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hklhca32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lndlamke.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pikkfilp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fdemap32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mqoqlfkl.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eapcjo32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ifkfap32.exe -
Berbew family
-
Brute Ratel C4
A customized command and control framework for red teaming and adversary simulation.
-
Bruteratel family
-
Detect BruteRatel badger 3 IoCs
Processes:
resource yara_rule C:\Windows\SysWOW64\Jjbdfbnl.exe family_bruteratel C:\Windows\SysWOW64\Mliibj32.exe family_bruteratel C:\Windows\SysWOW64\Elbkbh32.exe family_bruteratel -
Executes dropped EXE 64 IoCs
Processes:
Bfphmi32.exeBgcbja32.exeCakfcfoc.exeCfkkam32.exeCcaipaho.exeCfaaalep.exeDbhbfmkd.exeDbkolmia.exeDbmlal32.exeDabicikf.exeDkkmln32.exeEmkfmioh.exeElqcnfdp.exeElcpdeam.exeEhjqif32.exeEenabkfk.exeFdcncg32.exeFebjmj32.exeFdggofgn.exeFakhhk32.exeFcmdpcle.exeFdlqjf32.exeGqcaoghl.exeGmjbchnq.exeGbigao32.exeGkaljdaf.exeGoodpb32.exeHenjnica.exeHminbkql.exeHjmolp32.exeHgaoec32.exeHmnhnk32.exeIcjmpd32.exeIfkfap32.exeIaegbmlq.exeIhooog32.exeIecohl32.exeJjbdfbnl.exeKlamohhj.exeKneflplf.exeLoofjg32.exeLflklaoc.exeLngpac32.exeMdcdcmai.exeMnlilb32.exeMjbiac32.exeMdhnnl32.exeMjeffc32.exeMcmkoi32.exeMflgkd32.exeNqakim32.exeNjipabhe.exeNpfhjifm.exeNfppfcmj.exeNpieoi32.exeNbgakd32.exeNnnbqeib.exeNehjmppo.exeNjdbefnf.exeNaokbq32.exeOmekgakg.exeOjilqf32.exeOdaqikaa.exeOmjeba32.exepid process 2488 Bfphmi32.exe 2964 Bgcbja32.exe 2428 Cakfcfoc.exe 2440 Cfkkam32.exe 2720 Ccaipaho.exe 2608 Cfaaalep.exe 540 Dbhbfmkd.exe 2228 Dbkolmia.exe 2356 Dbmlal32.exe 2128 Dabicikf.exe 2212 Dkkmln32.exe 1848 Emkfmioh.exe 2352 Elqcnfdp.exe 2120 Elcpdeam.exe 316 Ehjqif32.exe 616 Eenabkfk.exe 1716 Fdcncg32.exe 2252 Febjmj32.exe 1548 Fdggofgn.exe 1652 Fakhhk32.exe 1772 Fcmdpcle.exe 1092 Fdlqjf32.exe 1048 Gqcaoghl.exe 2532 Gmjbchnq.exe 432 Gbigao32.exe 1720 Gkaljdaf.exe 2952 Goodpb32.exe 1608 Henjnica.exe 2312 Hminbkql.exe 2920 Hjmolp32.exe 2728 Hgaoec32.exe 2788 Hmnhnk32.exe 1640 Icjmpd32.exe 1660 Ifkfap32.exe 1748 Iaegbmlq.exe 3060 Ihooog32.exe 2688 Iecohl32.exe 3036 Jjbdfbnl.exe 2144 Klamohhj.exe 2104 Kneflplf.exe 2112 Loofjg32.exe 1004 Lflklaoc.exe 1028 Lngpac32.exe 1304 Mdcdcmai.exe 1912 Mnlilb32.exe 1400 Mjbiac32.exe 304 Mdhnnl32.exe 2260 Mjeffc32.exe 944 Mcmkoi32.exe 3004 Mflgkd32.exe 2504 Nqakim32.exe 1708 Njipabhe.exe 2888 Npfhjifm.exe 2936 Nfppfcmj.exe 2800 Npieoi32.exe 2424 Nbgakd32.exe 884 Nnnbqeib.exe 2240 Nehjmppo.exe 2664 Njdbefnf.exe 1140 Naokbq32.exe 2640 Omekgakg.exe 2200 Ojilqf32.exe 2520 Odaqikaa.exe 2676 Omjeba32.exe -
Loads dropped DLL 64 IoCs
Processes:
28f62058f5dd84c4e04cbabaad570cf869c4bbaa26f7fc0734f6779948cda74c.exeBfphmi32.exeBgcbja32.exeCakfcfoc.exeCfkkam32.exeCcaipaho.exeCfaaalep.exeDbhbfmkd.exeDbkolmia.exeDbmlal32.exeDabicikf.exeDkkmln32.exeEmkfmioh.exeElqcnfdp.exeElcpdeam.exeEhjqif32.exeEenabkfk.exeFdcncg32.exeFebjmj32.exeFdggofgn.exeFakhhk32.exeFcmdpcle.exeFdlqjf32.exeGqcaoghl.exeGmjbchnq.exeGbigao32.exeGfgpgmql.exeGoodpb32.exeHenjnica.exeHminbkql.exeHjmolp32.exeHgaoec32.exepid process 2328 28f62058f5dd84c4e04cbabaad570cf869c4bbaa26f7fc0734f6779948cda74c.exe 2328 28f62058f5dd84c4e04cbabaad570cf869c4bbaa26f7fc0734f6779948cda74c.exe 2488 Bfphmi32.exe 2488 Bfphmi32.exe 2964 Bgcbja32.exe 2964 Bgcbja32.exe 2428 Cakfcfoc.exe 2428 Cakfcfoc.exe 2440 Cfkkam32.exe 2440 Cfkkam32.exe 2720 Ccaipaho.exe 2720 Ccaipaho.exe 2608 Cfaaalep.exe 2608 Cfaaalep.exe 540 Dbhbfmkd.exe 540 Dbhbfmkd.exe 2228 Dbkolmia.exe 2228 Dbkolmia.exe 2356 Dbmlal32.exe 2356 Dbmlal32.exe 2128 Dabicikf.exe 2128 Dabicikf.exe 2212 Dkkmln32.exe 2212 Dkkmln32.exe 1848 Emkfmioh.exe 1848 Emkfmioh.exe 2352 Elqcnfdp.exe 2352 Elqcnfdp.exe 2120 Elcpdeam.exe 2120 Elcpdeam.exe 316 Ehjqif32.exe 316 Ehjqif32.exe 616 Eenabkfk.exe 616 Eenabkfk.exe 1716 Fdcncg32.exe 1716 Fdcncg32.exe 2252 Febjmj32.exe 2252 Febjmj32.exe 1548 Fdggofgn.exe 1548 Fdggofgn.exe 1652 Fakhhk32.exe 1652 Fakhhk32.exe 1772 Fcmdpcle.exe 1772 Fcmdpcle.exe 1092 Fdlqjf32.exe 1092 Fdlqjf32.exe 1048 Gqcaoghl.exe 1048 Gqcaoghl.exe 2532 Gmjbchnq.exe 2532 Gmjbchnq.exe 432 Gbigao32.exe 432 Gbigao32.exe 2512 Gfgpgmql.exe 2512 Gfgpgmql.exe 2952 Goodpb32.exe 2952 Goodpb32.exe 1608 Henjnica.exe 1608 Henjnica.exe 2312 Hminbkql.exe 2312 Hminbkql.exe 2920 Hjmolp32.exe 2920 Hjmolp32.exe 2728 Hgaoec32.exe 2728 Hgaoec32.exe -
Drops file in System32 directory 64 IoCs
Processes:
Dkkmln32.exeAjjeld32.exeDajlhc32.exeEmfbgg32.exeJfadoaih.exeCkamihfm.exeFebjmj32.exeFkeedo32.exeIpgpcc32.exeMkqbhf32.exeEmkfmioh.exeOjnelefl.exeFidkep32.exeGfgpgmql.exeOjilqf32.exeLgdcom32.exeFdggofgn.exeFeccqime.exeEenckc32.exeKiccle32.exeMkiemqdo.exeBdbdgh32.exeGkjahg32.exeDbkaee32.exeFgibijkb.exeLldhldpg.exeJafilj32.exeKbgnil32.exeBaakem32.exeDdfjak32.exeEhjqif32.exeCclkcdpl.exeFaonqiod.exeKkajkoml.exeNbjpjm32.exeOcdohdfc.exePmoqfi32.exeClkfjman.exePjfdpckc.exeIgoagpja.exeNjgeel32.exeEeameodq.exeJcmhmp32.exeBgpnjkgi.exeEahkag32.exeEpbamc32.exeFhdlbd32.exeGkiooocb.exeJdplmflg.exeMfhcknpf.exeJmelfeqn.exeKneflplf.exePhklcn32.exeQnoklc32.exeAhancp32.exeCcgahe32.exeLnobfn32.exeAlcqcjgd.exeKlamohhj.exeQfganb32.exedescription ioc process File created C:\Windows\SysWOW64\Fkbqmqbj.dll Dkkmln32.exe File created C:\Windows\SysWOW64\Eifodbcn.dll Ajjeld32.exe File opened for modification C:\Windows\SysWOW64\Dhdddnep.exe Dajlhc32.exe File opened for modification C:\Windows\SysWOW64\Fcbjon32.exe Emfbgg32.exe File created C:\Windows\SysWOW64\Fdlhbc32.dll Jfadoaih.exe File created C:\Windows\SysWOW64\Cedhac32.dll Ckamihfm.exe File opened for modification C:\Windows\SysWOW64\Fdggofgn.exe Febjmj32.exe File created C:\Windows\SysWOW64\Faonqiod.exe Fkeedo32.exe File created C:\Windows\SysWOW64\Ijmdql32.exe Ipgpcc32.exe File created C:\Windows\SysWOW64\Opcboqhc.dll Mkqbhf32.exe File created C:\Windows\SysWOW64\Phhcnnel.dll Emkfmioh.exe File created C:\Windows\SysWOW64\Ofefqf32.exe Ojnelefl.exe File created C:\Windows\SysWOW64\Fpncbjqj.exe Fidkep32.exe File created C:\Windows\SysWOW64\Goodpb32.exe Gfgpgmql.exe File created C:\Windows\SysWOW64\Odaqikaa.exe Ojilqf32.exe File created C:\Windows\SysWOW64\Dfomdk32.dll Lgdcom32.exe File opened for modification C:\Windows\SysWOW64\Fakhhk32.exe Fdggofgn.exe File opened for modification C:\Windows\SysWOW64\Fcgdjmlo.exe Feccqime.exe File opened for modification C:\Windows\SysWOW64\Fillabde.exe Eenckc32.exe File created C:\Windows\SysWOW64\Dkgnkbkk.dll Kiccle32.exe File opened for modification C:\Windows\SysWOW64\Mlhbgc32.exe Mkiemqdo.exe File created C:\Windows\SysWOW64\Hfjbkm32.dll Bdbdgh32.exe File created C:\Windows\SysWOW64\Qpaknfnf.dll Gkjahg32.exe File created C:\Windows\SysWOW64\Djffihmp.exe Dbkaee32.exe File created C:\Windows\SysWOW64\Ggkoojip.exe Fgibijkb.exe File created C:\Windows\SysWOW64\Kgmobc32.dll Lldhldpg.exe File created C:\Windows\SysWOW64\Opgmqq32.dll Jafilj32.exe File created C:\Windows\SysWOW64\Klpdie32.dll Kbgnil32.exe File created C:\Windows\SysWOW64\Egedlo32.dll Baakem32.exe File opened for modification C:\Windows\SysWOW64\Dnonjqdq.exe Ddfjak32.exe File created C:\Windows\SysWOW64\Eenabkfk.exe Ehjqif32.exe File opened for modification C:\Windows\SysWOW64\Cdjabn32.exe Ckamihfm.exe File created C:\Windows\SysWOW64\Klocba32.exe Kbgnil32.exe File opened for modification C:\Windows\SysWOW64\Chickknc.exe Cclkcdpl.exe File created C:\Windows\SysWOW64\Fldbnb32.exe Faonqiod.exe File created C:\Windows\SysWOW64\Kdincdcl.exe Kkajkoml.exe File created C:\Windows\SysWOW64\Memchb32.dll Nbjpjm32.exe File opened for modification C:\Windows\SysWOW64\Ommdqi32.exe Ocdohdfc.exe File created C:\Windows\SysWOW64\Lkfibnjf.dll Pmoqfi32.exe File created C:\Windows\SysWOW64\Dahobdpe.exe Clkfjman.exe File opened for modification C:\Windows\SysWOW64\Pfmeddag.exe Pjfdpckc.exe File opened for modification C:\Windows\SysWOW64\Jnlfjjpl.exe Igoagpja.exe File created C:\Windows\SysWOW64\Jbkagpjl.dll Njgeel32.exe File created C:\Windows\SysWOW64\Ebemnc32.exe Eeameodq.exe File created C:\Windows\SysWOW64\Jmelfeqn.exe Jcmhmp32.exe File opened for modification C:\Windows\SysWOW64\Bmmgbbeq.exe Bgpnjkgi.exe File created C:\Windows\SysWOW64\Ekeiel32.exe Eahkag32.exe File created C:\Windows\SysWOW64\Hjcnol32.dll Epbamc32.exe File opened for modification C:\Windows\SysWOW64\Fondonbc.exe Fhdlbd32.exe File opened for modification C:\Windows\SysWOW64\Gdbchd32.exe Gkiooocb.exe File opened for modification C:\Windows\SysWOW64\Jlgcncli.exe Jdplmflg.exe File created C:\Windows\SysWOW64\Iofledji.dll Mfhcknpf.exe File opened for modification C:\Windows\SysWOW64\Jilmkffb.exe Jmelfeqn.exe File created C:\Windows\SysWOW64\Nnbdij32.dll Fdggofgn.exe File opened for modification C:\Windows\SysWOW64\Loofjg32.exe Kneflplf.exe File created C:\Windows\SysWOW64\Pbppqf32.exe Phklcn32.exe File created C:\Windows\SysWOW64\Fcddnkhf.dll Qnoklc32.exe File opened for modification C:\Windows\SysWOW64\Anngkg32.exe Ahancp32.exe File created C:\Windows\SysWOW64\Hgmhld32.dll Ccgahe32.exe File created C:\Windows\SysWOW64\Kiamql32.exe Jafilj32.exe File created C:\Windows\SysWOW64\Lhegcg32.exe Lnobfn32.exe File created C:\Windows\SysWOW64\Amdmkb32.exe Alcqcjgd.exe File created C:\Windows\SysWOW64\Kneflplf.exe Klamohhj.exe File opened for modification C:\Windows\SysWOW64\Appfggjm.exe Qfganb32.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2328 4600 WerFault.exe Gmmgobfd.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Ckamihfm.exeFgibijkb.exeLophcpam.exeDqiakm32.exeIfkfap32.exePfgcff32.exeEahkag32.exePblinp32.exeDbmlal32.exeHkndiabh.exeDmfhqmge.exeElqcnfdp.exeFakhhk32.exeNehjmppo.exeGnenfjdh.exeBabbpc32.exeEigbfb32.exeLgdcom32.exeAajedn32.exeBfcqoqeh.exeGnmdfi32.exeKkajkoml.exeMlhbgc32.exePihnqj32.exeFpncbjqj.exeElcpdeam.exeHminbkql.exeLngpac32.exeBmmgbbeq.exeCafbmdbh.exeKmbclj32.exeEmqaaabg.exeGbigao32.exeFehmlh32.exeIclfccmq.exePebbeq32.exeCmjoaofc.exeFillabde.exeCakfcfoc.exeAhancp32.exeIjmdql32.exeKplfmfmf.exeHmojfcdk.exeNhmbfhfd.exeFdggofgn.exeFdlqjf32.exeOdaqikaa.exeQnoklc32.exePdllci32.exeNcdciq32.exeBfphmi32.exeMdhnnl32.exeFcgdjmlo.exeEmfbgg32.exeGgbljogc.exeBaoopndk.exeEapcjo32.exeEenabkfk.exeHfmbfkhf.exeJaoblk32.exeFhcehngk.exeIgoagpja.exePmoqfi32.exeClpeajjb.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ckamihfm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fgibijkb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lophcpam.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dqiakm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ifkfap32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pfgcff32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Eahkag32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pblinp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dbmlal32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hkndiabh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dmfhqmge.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Elqcnfdp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fakhhk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nehjmppo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gnenfjdh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Babbpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Eigbfb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lgdcom32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Aajedn32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bfcqoqeh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gnmdfi32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kkajkoml.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mlhbgc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pihnqj32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fpncbjqj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Elcpdeam.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hminbkql.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lngpac32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bmmgbbeq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cafbmdbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kmbclj32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Emqaaabg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gbigao32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fehmlh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Iclfccmq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pebbeq32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cmjoaofc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fillabde.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cakfcfoc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ahancp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ijmdql32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kplfmfmf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hmojfcdk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nhmbfhfd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fdggofgn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fdlqjf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Odaqikaa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qnoklc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pdllci32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ncdciq32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bfphmi32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mdhnnl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fcgdjmlo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Emfbgg32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ggbljogc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Baoopndk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Eapcjo32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Eenabkfk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hfmbfkhf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jaoblk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fhcehngk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Igoagpja.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pmoqfi32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Clpeajjb.exe -
Modifies registry class 64 IoCs
Processes:
Jmelfeqn.exePbppqf32.exeMdcdcmai.exeMdhnnl32.exeKeodflee.exeFillabde.exeFdemap32.exeLmlofhmb.exeDdfjak32.exeFdlqjf32.exeGkjahg32.exeGphmbolk.exePmoqfi32.exeCoehnecn.exeEgljjmkp.exeAaeiqf32.exeGhcbga32.exeFokaoh32.exeNaokbq32.exeCkgmon32.exeDfpcdh32.exeAecdpmbm.exeCcaipaho.exeIhooog32.exeEenabkfk.exePljnmkoo.exeHklhca32.exeKmbclj32.exeMfamko32.exeOmekgakg.exeJcmhmp32.exeMjcljlea.exeNjipabhe.exeGdbchd32.exeLophcpam.exeBgndnd32.exeCclkcdpl.exePhklcn32.exeCafbmdbh.exeIgoagpja.exeMnlilb32.exeHhjhgpcn.exeJjbdfbnl.exeHcqcoo32.exeKplfmfmf.exeAlncgn32.exeGgkoojip.exeCfkkam32.exeLgbfin32.exeLldhldpg.exeNbegonmd.exeNgfhbd32.exeAlfflhpa.exeAkjjifji.exeEnokidgl.exePebbeq32.exeBaakem32.exeMjbiac32.exeAdhohapp.exeCifdmbib.exeGgppdpif.exeGqmmhdka.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jmelfeqn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pbppqf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mdcdcmai.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mdhnnl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pmkkpm32.dll" Keodflee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fillabde.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fdemap32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Onbedbmj.dll" Lmlofhmb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ddfjak32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fdlqjf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gkjahg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gphmbolk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pmoqfi32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Coehnecn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Blonkf32.dll" Egljjmkp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Olmpij32.dll" Aaeiqf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ghcbga32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lmpgopjh.dll" Fokaoh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qaapab32.dll" Naokbq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ckgmon32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dfpcdh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Aecdpmbm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pjgoohpd.dll" Ccaipaho.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ihooog32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Eenabkfk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pljnmkoo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Elkicala.dll" Hklhca32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kmbclj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Keodflee.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mfamko32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Omekgakg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jcmhmp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Plongokk.dll" Mjcljlea.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kmcgcmql.dll" Njipabhe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bqnknp32.dll" Gdbchd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fjelpcob.dll" Lophcpam.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bgndnd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cclkcdpl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fnkfoiql.dll" Phklcn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cafbmdbh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Igoagpja.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Enfbchek.dll" Mnlilb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hhjhgpcn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lophcpam.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jjbdfbnl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hcqcoo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kplfmfmf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Alncgn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ggkoojip.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gobopn32.dll" Cfkkam32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lgbfin32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kgmobc32.dll" Lldhldpg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gdmphmlf.dll" Nbegonmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ngfhbd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Alfflhpa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Akjjifji.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mainpc32.dll" Enokidgl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mldijj32.dll" Pebbeq32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Baakem32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kpaihe32.dll" Mjbiac32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Adhohapp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cifdmbib.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ggppdpif.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gqmmhdka.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
28f62058f5dd84c4e04cbabaad570cf869c4bbaa26f7fc0734f6779948cda74c.exeBfphmi32.exeBgcbja32.exeCakfcfoc.exeCfkkam32.exeCcaipaho.exeCfaaalep.exeDbhbfmkd.exeDbkolmia.exeDbmlal32.exeDabicikf.exeDkkmln32.exeEmkfmioh.exeElqcnfdp.exeElcpdeam.exeEhjqif32.exedescription pid process target process PID 2328 wrote to memory of 2488 2328 28f62058f5dd84c4e04cbabaad570cf869c4bbaa26f7fc0734f6779948cda74c.exe Bfphmi32.exe PID 2328 wrote to memory of 2488 2328 28f62058f5dd84c4e04cbabaad570cf869c4bbaa26f7fc0734f6779948cda74c.exe Bfphmi32.exe PID 2328 wrote to memory of 2488 2328 28f62058f5dd84c4e04cbabaad570cf869c4bbaa26f7fc0734f6779948cda74c.exe Bfphmi32.exe PID 2328 wrote to memory of 2488 2328 28f62058f5dd84c4e04cbabaad570cf869c4bbaa26f7fc0734f6779948cda74c.exe Bfphmi32.exe PID 2488 wrote to memory of 2964 2488 Bfphmi32.exe Bgcbja32.exe PID 2488 wrote to memory of 2964 2488 Bfphmi32.exe Bgcbja32.exe PID 2488 wrote to memory of 2964 2488 Bfphmi32.exe Bgcbja32.exe PID 2488 wrote to memory of 2964 2488 Bfphmi32.exe Bgcbja32.exe PID 2964 wrote to memory of 2428 2964 Bgcbja32.exe Cakfcfoc.exe PID 2964 wrote to memory of 2428 2964 Bgcbja32.exe Cakfcfoc.exe PID 2964 wrote to memory of 2428 2964 Bgcbja32.exe Cakfcfoc.exe PID 2964 wrote to memory of 2428 2964 Bgcbja32.exe Cakfcfoc.exe PID 2428 wrote to memory of 2440 2428 Cakfcfoc.exe Cfkkam32.exe PID 2428 wrote to memory of 2440 2428 Cakfcfoc.exe Cfkkam32.exe PID 2428 wrote to memory of 2440 2428 Cakfcfoc.exe Cfkkam32.exe PID 2428 wrote to memory of 2440 2428 Cakfcfoc.exe Cfkkam32.exe PID 2440 wrote to memory of 2720 2440 Cfkkam32.exe Ccaipaho.exe PID 2440 wrote to memory of 2720 2440 Cfkkam32.exe Ccaipaho.exe PID 2440 wrote to memory of 2720 2440 Cfkkam32.exe Ccaipaho.exe PID 2440 wrote to memory of 2720 2440 Cfkkam32.exe Ccaipaho.exe PID 2720 wrote to memory of 2608 2720 Ccaipaho.exe Cfaaalep.exe PID 2720 wrote to memory of 2608 2720 Ccaipaho.exe Cfaaalep.exe PID 2720 wrote to memory of 2608 2720 Ccaipaho.exe Cfaaalep.exe PID 2720 wrote to memory of 2608 2720 Ccaipaho.exe Cfaaalep.exe PID 2608 wrote to memory of 540 2608 Cfaaalep.exe Dbhbfmkd.exe PID 2608 wrote to memory of 540 2608 Cfaaalep.exe Dbhbfmkd.exe PID 2608 wrote to memory of 540 2608 Cfaaalep.exe Dbhbfmkd.exe PID 2608 wrote to memory of 540 2608 Cfaaalep.exe Dbhbfmkd.exe PID 540 wrote to memory of 2228 540 Dbhbfmkd.exe Dbkolmia.exe PID 540 wrote to memory of 2228 540 Dbhbfmkd.exe Dbkolmia.exe PID 540 wrote to memory of 2228 540 Dbhbfmkd.exe Dbkolmia.exe PID 540 wrote to memory of 2228 540 Dbhbfmkd.exe Dbkolmia.exe PID 2228 wrote to memory of 2356 2228 Dbkolmia.exe Dbmlal32.exe PID 2228 wrote to memory of 2356 2228 Dbkolmia.exe Dbmlal32.exe PID 2228 wrote to memory of 2356 2228 Dbkolmia.exe Dbmlal32.exe PID 2228 wrote to memory of 2356 2228 Dbkolmia.exe Dbmlal32.exe PID 2356 wrote to memory of 2128 2356 Dbmlal32.exe Dabicikf.exe PID 2356 wrote to memory of 2128 2356 Dbmlal32.exe Dabicikf.exe PID 2356 wrote to memory of 2128 2356 Dbmlal32.exe Dabicikf.exe PID 2356 wrote to memory of 2128 2356 Dbmlal32.exe Dabicikf.exe PID 2128 wrote to memory of 2212 2128 Dabicikf.exe Dkkmln32.exe PID 2128 wrote to memory of 2212 2128 Dabicikf.exe Dkkmln32.exe PID 2128 wrote to memory of 2212 2128 Dabicikf.exe Dkkmln32.exe PID 2128 wrote to memory of 2212 2128 Dabicikf.exe Dkkmln32.exe PID 2212 wrote to memory of 1848 2212 Dkkmln32.exe Emkfmioh.exe PID 2212 wrote to memory of 1848 2212 Dkkmln32.exe Emkfmioh.exe PID 2212 wrote to memory of 1848 2212 Dkkmln32.exe Emkfmioh.exe PID 2212 wrote to memory of 1848 2212 Dkkmln32.exe Emkfmioh.exe PID 1848 wrote to memory of 2352 1848 Emkfmioh.exe Elqcnfdp.exe PID 1848 wrote to memory of 2352 1848 Emkfmioh.exe Elqcnfdp.exe PID 1848 wrote to memory of 2352 1848 Emkfmioh.exe Elqcnfdp.exe PID 1848 wrote to memory of 2352 1848 Emkfmioh.exe Elqcnfdp.exe PID 2352 wrote to memory of 2120 2352 Elqcnfdp.exe Elcpdeam.exe PID 2352 wrote to memory of 2120 2352 Elqcnfdp.exe Elcpdeam.exe PID 2352 wrote to memory of 2120 2352 Elqcnfdp.exe Elcpdeam.exe PID 2352 wrote to memory of 2120 2352 Elqcnfdp.exe Elcpdeam.exe PID 2120 wrote to memory of 316 2120 Elcpdeam.exe Ehjqif32.exe PID 2120 wrote to memory of 316 2120 Elcpdeam.exe Ehjqif32.exe PID 2120 wrote to memory of 316 2120 Elcpdeam.exe Ehjqif32.exe PID 2120 wrote to memory of 316 2120 Elcpdeam.exe Ehjqif32.exe PID 316 wrote to memory of 616 316 Ehjqif32.exe Eenabkfk.exe PID 316 wrote to memory of 616 316 Ehjqif32.exe Eenabkfk.exe PID 316 wrote to memory of 616 316 Ehjqif32.exe Eenabkfk.exe PID 316 wrote to memory of 616 316 Ehjqif32.exe Eenabkfk.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\28f62058f5dd84c4e04cbabaad570cf869c4bbaa26f7fc0734f6779948cda74c.exe"C:\Users\Admin\AppData\Local\Temp\28f62058f5dd84c4e04cbabaad570cf869c4bbaa26f7fc0734f6779948cda74c.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Windows\SysWOW64\Bfphmi32.exeC:\Windows\system32\Bfphmi32.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\SysWOW64\Bgcbja32.exeC:\Windows\system32\Bgcbja32.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Windows\SysWOW64\Cakfcfoc.exeC:\Windows\system32\Cakfcfoc.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Windows\SysWOW64\Cfkkam32.exeC:\Windows\system32\Cfkkam32.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Windows\SysWOW64\Ccaipaho.exeC:\Windows\system32\Ccaipaho.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\SysWOW64\Cfaaalep.exeC:\Windows\system32\Cfaaalep.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\SysWOW64\Dbhbfmkd.exeC:\Windows\system32\Dbhbfmkd.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Windows\SysWOW64\Dbkolmia.exeC:\Windows\system32\Dbkolmia.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Windows\SysWOW64\Dbmlal32.exeC:\Windows\system32\Dbmlal32.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\SysWOW64\Dabicikf.exeC:\Windows\system32\Dabicikf.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Windows\SysWOW64\Dkkmln32.exeC:\Windows\system32\Dkkmln32.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Windows\SysWOW64\Emkfmioh.exeC:\Windows\system32\Emkfmioh.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Windows\SysWOW64\Elqcnfdp.exeC:\Windows\system32\Elqcnfdp.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Windows\SysWOW64\Elcpdeam.exeC:\Windows\system32\Elcpdeam.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Windows\SysWOW64\Ehjqif32.exeC:\Windows\system32\Ehjqif32.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Windows\SysWOW64\Eenabkfk.exeC:\Windows\system32\Eenabkfk.exe17⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:616 -
C:\Windows\SysWOW64\Fdcncg32.exeC:\Windows\system32\Fdcncg32.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1716 -
C:\Windows\SysWOW64\Febjmj32.exeC:\Windows\system32\Febjmj32.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2252 -
C:\Windows\SysWOW64\Fdggofgn.exeC:\Windows\system32\Fdggofgn.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1548 -
C:\Windows\SysWOW64\Fakhhk32.exeC:\Windows\system32\Fakhhk32.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1652 -
C:\Windows\SysWOW64\Fcmdpcle.exeC:\Windows\system32\Fcmdpcle.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1772 -
C:\Windows\SysWOW64\Fdlqjf32.exeC:\Windows\system32\Fdlqjf32.exe23⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1092 -
C:\Windows\SysWOW64\Gqcaoghl.exeC:\Windows\system32\Gqcaoghl.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1048 -
C:\Windows\SysWOW64\Gmjbchnq.exeC:\Windows\system32\Gmjbchnq.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2532 -
C:\Windows\SysWOW64\Gbigao32.exeC:\Windows\system32\Gbigao32.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:432 -
C:\Windows\SysWOW64\Gkaljdaf.exeC:\Windows\system32\Gkaljdaf.exe27⤵
- Executes dropped EXE
PID:1720 -
C:\Windows\SysWOW64\Gfgpgmql.exeC:\Windows\system32\Gfgpgmql.exe28⤵
- Loads dropped DLL
- Drops file in System32 directory
PID:2512 -
C:\Windows\SysWOW64\Goodpb32.exeC:\Windows\system32\Goodpb32.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2952 -
C:\Windows\SysWOW64\Henjnica.exeC:\Windows\system32\Henjnica.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1608 -
C:\Windows\SysWOW64\Hminbkql.exeC:\Windows\system32\Hminbkql.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2312 -
C:\Windows\SysWOW64\Hjmolp32.exeC:\Windows\system32\Hjmolp32.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2920 -
C:\Windows\SysWOW64\Hgaoec32.exeC:\Windows\system32\Hgaoec32.exe33⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2728 -
C:\Windows\SysWOW64\Hmnhnk32.exeC:\Windows\system32\Hmnhnk32.exe34⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2788 -
C:\Windows\SysWOW64\Icjmpd32.exeC:\Windows\system32\Icjmpd32.exe35⤵
- Executes dropped EXE
PID:1640 -
C:\Windows\SysWOW64\Ifkfap32.exeC:\Windows\system32\Ifkfap32.exe36⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1660 -
C:\Windows\SysWOW64\Iaegbmlq.exeC:\Windows\system32\Iaegbmlq.exe37⤵
- Executes dropped EXE
PID:1748 -
C:\Windows\SysWOW64\Ihooog32.exeC:\Windows\system32\Ihooog32.exe38⤵
- Executes dropped EXE
- Modifies registry class
PID:3060 -
C:\Windows\SysWOW64\Iecohl32.exeC:\Windows\system32\Iecohl32.exe39⤵
- Executes dropped EXE
PID:2688 -
C:\Windows\SysWOW64\Jjbdfbnl.exeC:\Windows\system32\Jjbdfbnl.exe40⤵
- Executes dropped EXE
- Modifies registry class
PID:3036 -
C:\Windows\SysWOW64\Klamohhj.exeC:\Windows\system32\Klamohhj.exe41⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2144 -
C:\Windows\SysWOW64\Kneflplf.exeC:\Windows\system32\Kneflplf.exe42⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2104 -
C:\Windows\SysWOW64\Loofjg32.exeC:\Windows\system32\Loofjg32.exe43⤵
- Executes dropped EXE
PID:2112 -
C:\Windows\SysWOW64\Lflklaoc.exeC:\Windows\system32\Lflklaoc.exe44⤵
- Executes dropped EXE
PID:1004 -
C:\Windows\SysWOW64\Lngpac32.exeC:\Windows\system32\Lngpac32.exe45⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1028 -
C:\Windows\SysWOW64\Mdcdcmai.exeC:\Windows\system32\Mdcdcmai.exe46⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:1304 -
C:\Windows\SysWOW64\Mnlilb32.exeC:\Windows\system32\Mnlilb32.exe47⤵
- Executes dropped EXE
- Modifies registry class
PID:1912 -
C:\Windows\SysWOW64\Mjbiac32.exeC:\Windows\system32\Mjbiac32.exe48⤵
- Executes dropped EXE
- Modifies registry class
PID:1400 -
C:\Windows\SysWOW64\Mdhnnl32.exeC:\Windows\system32\Mdhnnl32.exe49⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:304 -
C:\Windows\SysWOW64\Mjeffc32.exeC:\Windows\system32\Mjeffc32.exe50⤵
- Executes dropped EXE
PID:2260 -
C:\Windows\SysWOW64\Mcmkoi32.exeC:\Windows\system32\Mcmkoi32.exe51⤵
- Executes dropped EXE
PID:944 -
C:\Windows\SysWOW64\Mflgkd32.exeC:\Windows\system32\Mflgkd32.exe52⤵
- Executes dropped EXE
PID:3004 -
C:\Windows\SysWOW64\Nqakim32.exeC:\Windows\system32\Nqakim32.exe53⤵
- Executes dropped EXE
PID:2504 -
C:\Windows\SysWOW64\Njipabhe.exeC:\Windows\system32\Njipabhe.exe54⤵
- Executes dropped EXE
- Modifies registry class
PID:1708 -
C:\Windows\SysWOW64\Npfhjifm.exeC:\Windows\system32\Npfhjifm.exe55⤵
- Executes dropped EXE
PID:2888 -
C:\Windows\SysWOW64\Nfppfcmj.exeC:\Windows\system32\Nfppfcmj.exe56⤵
- Executes dropped EXE
PID:2936 -
C:\Windows\SysWOW64\Npieoi32.exeC:\Windows\system32\Npieoi32.exe57⤵
- Executes dropped EXE
PID:2800 -
C:\Windows\SysWOW64\Nbgakd32.exeC:\Windows\system32\Nbgakd32.exe58⤵
- Executes dropped EXE
PID:2424 -
C:\Windows\SysWOW64\Nnnbqeib.exeC:\Windows\system32\Nnnbqeib.exe59⤵
- Executes dropped EXE
PID:884 -
C:\Windows\SysWOW64\Nehjmppo.exeC:\Windows\system32\Nehjmppo.exe60⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2240 -
C:\Windows\SysWOW64\Njdbefnf.exeC:\Windows\system32\Njdbefnf.exe61⤵
- Executes dropped EXE
PID:2664 -
C:\Windows\SysWOW64\Naokbq32.exeC:\Windows\system32\Naokbq32.exe62⤵
- Executes dropped EXE
- Modifies registry class
PID:1140 -
C:\Windows\SysWOW64\Omekgakg.exeC:\Windows\system32\Omekgakg.exe63⤵
- Executes dropped EXE
- Modifies registry class
PID:2640 -
C:\Windows\SysWOW64\Ojilqf32.exeC:\Windows\system32\Ojilqf32.exe64⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2200 -
C:\Windows\SysWOW64\Odaqikaa.exeC:\Windows\system32\Odaqikaa.exe65⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2520 -
C:\Windows\SysWOW64\Omjeba32.exeC:\Windows\system32\Omjeba32.exe66⤵
- Executes dropped EXE
PID:2676 -
C:\Windows\SysWOW64\Ojnelefl.exeC:\Windows\system32\Ojnelefl.exe67⤵
- Drops file in System32 directory
PID:1688 -
C:\Windows\SysWOW64\Ofefqf32.exeC:\Windows\system32\Ofefqf32.exe68⤵PID:2024
-
C:\Windows\SysWOW64\Ppmkilbp.exeC:\Windows\system32\Ppmkilbp.exe69⤵PID:804
-
C:\Windows\SysWOW64\Pfgcff32.exeC:\Windows\system32\Pfgcff32.exe70⤵
- System Location Discovery: System Language Discovery
PID:1968 -
C:\Windows\SysWOW64\Pobgjhgh.exeC:\Windows\system32\Pobgjhgh.exe71⤵PID:872
-
C:\Windows\SysWOW64\Phklcn32.exeC:\Windows\system32\Phklcn32.exe72⤵
- Drops file in System32 directory
- Modifies registry class
PID:2948 -
C:\Windows\SysWOW64\Pbppqf32.exeC:\Windows\system32\Pbppqf32.exe73⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2316 -
C:\Windows\SysWOW64\Pdamhocm.exeC:\Windows\system32\Pdamhocm.exe74⤵PID:2136
-
C:\Windows\SysWOW64\Pogaeg32.exeC:\Windows\system32\Pogaeg32.exe75⤵PID:2848
-
C:\Windows\SysWOW64\Pddinn32.exeC:\Windows\system32\Pddinn32.exe76⤵PID:2560
-
C:\Windows\SysWOW64\Pmlngdhk.exeC:\Windows\system32\Pmlngdhk.exe77⤵PID:2408
-
C:\Windows\SysWOW64\Pdffcn32.exeC:\Windows\system32\Pdffcn32.exe78⤵PID:2576
-
C:\Windows\SysWOW64\Qnoklc32.exeC:\Windows\system32\Qnoklc32.exe79⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2168 -
C:\Windows\SysWOW64\Qdhcinme.exeC:\Windows\system32\Qdhcinme.exe80⤵PID:1648
-
C:\Windows\SysWOW64\Qpocno32.exeC:\Windows\system32\Qpocno32.exe81⤵PID:2368
-
C:\Windows\SysWOW64\Agilkijf.exeC:\Windows\system32\Agilkijf.exe82⤵PID:1864
-
C:\Windows\SysWOW64\Apapcnaf.exeC:\Windows\system32\Apapcnaf.exe83⤵PID:824
-
C:\Windows\SysWOW64\Ajjeld32.exeC:\Windows\system32\Ajjeld32.exe84⤵
- Drops file in System32 directory
PID:2256 -
C:\Windows\SysWOW64\Alhaho32.exeC:\Windows\system32\Alhaho32.exe85⤵PID:756
-
C:\Windows\SysWOW64\Aaeiqf32.exeC:\Windows\system32\Aaeiqf32.exe86⤵
- Modifies registry class
PID:320 -
C:\Windows\SysWOW64\Ahoamplo.exeC:\Windows\system32\Ahoamplo.exe87⤵PID:1040
-
C:\Windows\SysWOW64\Ahancp32.exeC:\Windows\system32\Ahancp32.exe88⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:924 -
C:\Windows\SysWOW64\Anngkg32.exeC:\Windows\system32\Anngkg32.exe89⤵PID:2976
-
C:\Windows\SysWOW64\Adhohapp.exeC:\Windows\system32\Adhohapp.exe90⤵
- Modifies registry class
PID:2884 -
C:\Windows\SysWOW64\Bnqcaffa.exeC:\Windows\system32\Bnqcaffa.exe91⤵PID:2980
-
C:\Windows\SysWOW64\Bgihjl32.exeC:\Windows\system32\Bgihjl32.exe92⤵PID:1724
-
C:\Windows\SysWOW64\Bdmhcp32.exeC:\Windows\system32\Bdmhcp32.exe93⤵PID:2536
-
C:\Windows\SysWOW64\Bmhmgbif.exeC:\Windows\system32\Bmhmgbif.exe94⤵PID:888
-
C:\Windows\SysWOW64\Bjlnaghp.exeC:\Windows\system32\Bjlnaghp.exe95⤵PID:2124
-
C:\Windows\SysWOW64\Bqffna32.exeC:\Windows\system32\Bqffna32.exe96⤵PID:2188
-
C:\Windows\SysWOW64\Bgpnjkgi.exeC:\Windows\system32\Bgpnjkgi.exe97⤵
- Drops file in System32 directory
PID:1284 -
C:\Windows\SysWOW64\Bmmgbbeq.exeC:\Windows\system32\Bmmgbbeq.exe98⤵
- System Location Discovery: System Language Discovery
PID:2324 -
C:\Windows\SysWOW64\Cfekkgla.exeC:\Windows\system32\Cfekkgla.exe99⤵PID:2652
-
C:\Windows\SysWOW64\Ckbccnji.exeC:\Windows\system32\Ckbccnji.exe100⤵PID:1984
-
C:\Windows\SysWOW64\Cifdmbib.exeC:\Windows\system32\Cifdmbib.exe101⤵
- Modifies registry class
PID:2696 -
C:\Windows\SysWOW64\Ckdpinhf.exeC:\Windows\system32\Ckdpinhf.exe102⤵PID:2508
-
C:\Windows\SysWOW64\Cbnhfhoc.exeC:\Windows\system32\Cbnhfhoc.exe103⤵PID:2852
-
C:\Windows\SysWOW64\Ckgmon32.exeC:\Windows\system32\Ckgmon32.exe104⤵
- Modifies registry class
PID:2704 -
C:\Windows\SysWOW64\Cbqekhmp.exeC:\Windows\system32\Cbqekhmp.exe105⤵PID:1388
-
C:\Windows\SysWOW64\Cgmndokg.exeC:\Windows\system32\Cgmndokg.exe106⤵PID:968
-
C:\Windows\SysWOW64\Cafbmdbh.exeC:\Windows\system32\Cafbmdbh.exe107⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3032 -
C:\Windows\SysWOW64\Clkfjman.exeC:\Windows\system32\Clkfjman.exe108⤵
- Drops file in System32 directory
PID:2176 -
C:\Windows\SysWOW64\Dahobdpe.exeC:\Windows\system32\Dahobdpe.exe109⤵PID:524
-
C:\Windows\SysWOW64\Djqcki32.exeC:\Windows\system32\Djqcki32.exe110⤵PID:2988
-
C:\Windows\SysWOW64\Dajlhc32.exeC:\Windows\system32\Dajlhc32.exe111⤵
- Drops file in System32 directory
PID:1008 -
C:\Windows\SysWOW64\Dhdddnep.exeC:\Windows\system32\Dhdddnep.exe112⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:912 -
C:\Windows\SysWOW64\Eahkag32.exeC:\Windows\system32\Eahkag32.exe113⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1628 -
C:\Windows\SysWOW64\Ekeiel32.exeC:\Windows\system32\Ekeiel32.exe114⤵PID:2968
-
C:\Windows\SysWOW64\Epbamc32.exeC:\Windows\system32\Epbamc32.exe115⤵
- Drops file in System32 directory
PID:1988 -
C:\Windows\SysWOW64\Egljjmkp.exeC:\Windows\system32\Egljjmkp.exe116⤵
- Modifies registry class
PID:2756 -
C:\Windows\SysWOW64\Emfbgg32.exeC:\Windows\system32\Emfbgg32.exe117⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2500 -
C:\Windows\SysWOW64\Fcbjon32.exeC:\Windows\system32\Fcbjon32.exe118⤵PID:1032
-
C:\Windows\SysWOW64\Flkohc32.exeC:\Windows\system32\Flkohc32.exe119⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:516 -
C:\Windows\SysWOW64\Feccqime.exeC:\Windows\system32\Feccqime.exe120⤵
- Drops file in System32 directory
PID:1792 -
C:\Windows\SysWOW64\Fcgdjmlo.exeC:\Windows\system32\Fcgdjmlo.exe121⤵
- System Location Discovery: System Language Discovery
PID:2020 -
C:\Windows\SysWOW64\Fhdlbd32.exeC:\Windows\system32\Fhdlbd32.exe122⤵
- Drops file in System32 directory
PID:328
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-