Analysis
-
max time kernel
92s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20/11/2024, 05:52
Static task
static1
Behavioral task
behavioral1
Sample
2d9516279d6a6d06cb5f696a4cb6c389024dad9d32774da647dab24251031d9dN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2d9516279d6a6d06cb5f696a4cb6c389024dad9d32774da647dab24251031d9dN.exe
Resource
win10v2004-20241007-en
General
-
Target
2d9516279d6a6d06cb5f696a4cb6c389024dad9d32774da647dab24251031d9dN.exe
-
Size
165KB
-
MD5
ac8701bc3ff91b372baa7b95d9d3d8f0
-
SHA1
17e6722f9d26f562a7a7f052bf635f3662911820
-
SHA256
2d9516279d6a6d06cb5f696a4cb6c389024dad9d32774da647dab24251031d9d
-
SHA512
b4a76d2bb2bbc577968d5622598b02160dfb60f8e7ad25d1b25c8d88621117c8cce8cfd158dcd9d2bc5c11222074e5c4ebb62534bbe6c819e6c61d10962ece62
-
SSDEEP
3072:uz1vzEgBgBwgMnsrT3vQfEdArGzHq+egM5bylnO/hZP:uz1vAobghrbQMdArGzHregqgnO
Malware Config
Extracted
berbew
http://crutop.nu/index.php
http://crutop.ru/index.php
http://mazafaka.ru/index.php
http://color-bank.ru/index.php
http://asechka.ru/index.php
http://trojan.ru/index.php
http://fuck.ru/index.php
http://goldensand.ru/index.php
http://filesearch.ru/index.php
http://devx.nm.ru/index.php
http://ros-neftbank.ru/index.php
http://lovingod.host.sk/index.php
http://www.redline.ru/index.php
http://cvv.ru/index.php
http://hackers.lv/index.php
http://fethard.biz/index.php
http://ldark.nm.ru/index.htm
http://gaz-prom.ru/index.htm
http://promo.ru/index.htm
http://potleaf.chat.ru/index.htm
http://kadet.ru/index.htm
http://cvv.ru/index.htm
http://crutop.nu/index.htm
http://crutop.ru/index.htm
http://mazafaka.ru/index.htm
http://xware.cjb.net/index.htm
http://konfiskat.org/index.htm
http://parex-bank.ru/index.htm
http://kidos-bank.ru/index.htm
http://kavkaz.ru/index.htm
http://fethard.biz/index.htm
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 40 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cdabcm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ceqnmpfo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dhkjej32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dhmgki32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" 2d9516279d6a6d06cb5f696a4cb6c389024dad9d32774da647dab24251031d9dN.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Chokikeb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dmgbnq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dopigd32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Daqbip32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dhkjej32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cfpnph32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cjmgfgdf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cjbpaf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ddjejl32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dopigd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dogogcpo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dogogcpo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cfpnph32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cnffqf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cmlcbbcj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dfknkg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dfknkg32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cjmgfgdf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cmlcbbcj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cdhhdlid.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Daqbip32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dknpmdfc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ddjejl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dknpmdfc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 2d9516279d6a6d06cb5f696a4cb6c389024dad9d32774da647dab24251031d9dN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cfmajipb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cnffqf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Chokikeb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cjbpaf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ceqnmpfo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dmgbnq32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dhmgki32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cfmajipb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cdabcm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cdhhdlid.exe -
Berbew family
-
Executes dropped EXE 20 IoCs
pid Process 3948 Cfmajipb.exe 1236 Cdabcm32.exe 1940 Cfpnph32.exe 4388 Cnffqf32.exe 3112 Ceqnmpfo.exe 2796 Chokikeb.exe 4188 Cjmgfgdf.exe 2164 Cmlcbbcj.exe 4264 Cdhhdlid.exe 3304 Cjbpaf32.exe 2340 Ddjejl32.exe 756 Dopigd32.exe 740 Dfknkg32.exe 3344 Daqbip32.exe 1848 Dhkjej32.exe 4076 Dmgbnq32.exe 2556 Dhmgki32.exe 4968 Dogogcpo.exe 1552 Dknpmdfc.exe 5064 Dmllipeg.exe -
Drops file in System32 directory 60 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Cdabcm32.exe Cfmajipb.exe File created C:\Windows\SysWOW64\Dknpmdfc.exe Dogogcpo.exe File created C:\Windows\SysWOW64\Hfanhp32.dll Cjbpaf32.exe File opened for modification C:\Windows\SysWOW64\Dmllipeg.exe Dknpmdfc.exe File created C:\Windows\SysWOW64\Cfmajipb.exe 2d9516279d6a6d06cb5f696a4cb6c389024dad9d32774da647dab24251031d9dN.exe File created C:\Windows\SysWOW64\Dnieoofh.dll Ceqnmpfo.exe File created C:\Windows\SysWOW64\Cdhhdlid.exe Cmlcbbcj.exe File created C:\Windows\SysWOW64\Daqbip32.exe Dfknkg32.exe File created C:\Windows\SysWOW64\Chokikeb.exe Ceqnmpfo.exe File opened for modification C:\Windows\SysWOW64\Cjmgfgdf.exe Chokikeb.exe File created C:\Windows\SysWOW64\Jdipdgch.dll Dfknkg32.exe File created C:\Windows\SysWOW64\Ihidnp32.dll Dhkjej32.exe File created C:\Windows\SysWOW64\Lfjhbihm.dll Cfpnph32.exe File opened for modification C:\Windows\SysWOW64\Cfpnph32.exe Cdabcm32.exe File opened for modification C:\Windows\SysWOW64\Dopigd32.exe Ddjejl32.exe File created C:\Windows\SysWOW64\Dmllipeg.exe Dknpmdfc.exe File created C:\Windows\SysWOW64\Dhmgki32.exe Dmgbnq32.exe File created C:\Windows\SysWOW64\Nokpao32.dll Dogogcpo.exe File opened for modification C:\Windows\SysWOW64\Cfmajipb.exe 2d9516279d6a6d06cb5f696a4cb6c389024dad9d32774da647dab24251031d9dN.exe File created C:\Windows\SysWOW64\Cdabcm32.exe Cfmajipb.exe File created C:\Windows\SysWOW64\Cfpnph32.exe Cdabcm32.exe File created C:\Windows\SysWOW64\Lpggmhkg.dll Cmlcbbcj.exe File opened for modification C:\Windows\SysWOW64\Cjbpaf32.exe Cdhhdlid.exe File opened for modification C:\Windows\SysWOW64\Dhkjej32.exe Daqbip32.exe File opened for modification C:\Windows\SysWOW64\Daqbip32.exe Dfknkg32.exe File created C:\Windows\SysWOW64\Dmgbnq32.exe Dhkjej32.exe File opened for modification C:\Windows\SysWOW64\Cdhhdlid.exe Cmlcbbcj.exe File created C:\Windows\SysWOW64\Imbajm32.dll 2d9516279d6a6d06cb5f696a4cb6c389024dad9d32774da647dab24251031d9dN.exe File created C:\Windows\SysWOW64\Bhicommo.dll Cfmajipb.exe File opened for modification C:\Windows\SysWOW64\Ceqnmpfo.exe Cnffqf32.exe File created C:\Windows\SysWOW64\Cmlcbbcj.exe Cjmgfgdf.exe File created C:\Windows\SysWOW64\Ddjejl32.exe Cjbpaf32.exe File created C:\Windows\SysWOW64\Jbpbca32.dll Daqbip32.exe File opened for modification C:\Windows\SysWOW64\Cnffqf32.exe Cfpnph32.exe File created C:\Windows\SysWOW64\Cjmgfgdf.exe Chokikeb.exe File created C:\Windows\SysWOW64\Dopigd32.exe Ddjejl32.exe File opened for modification C:\Windows\SysWOW64\Dfknkg32.exe Dopigd32.exe File opened for modification C:\Windows\SysWOW64\Dhmgki32.exe Dmgbnq32.exe File created C:\Windows\SysWOW64\Maickled.dll Chokikeb.exe File opened for modification C:\Windows\SysWOW64\Ddjejl32.exe Cjbpaf32.exe File created C:\Windows\SysWOW64\Dfknkg32.exe Dopigd32.exe File opened for modification C:\Windows\SysWOW64\Dmgbnq32.exe Dhkjej32.exe File created C:\Windows\SysWOW64\Lbabpnmn.dll Dhmgki32.exe File opened for modification C:\Windows\SysWOW64\Dknpmdfc.exe Dogogcpo.exe File created C:\Windows\SysWOW64\Kngpec32.dll Dknpmdfc.exe File created C:\Windows\SysWOW64\Ceqnmpfo.exe Cnffqf32.exe File opened for modification C:\Windows\SysWOW64\Cmlcbbcj.exe Cjmgfgdf.exe File created C:\Windows\SysWOW64\Jgilhm32.dll Cdhhdlid.exe File created C:\Windows\SysWOW64\Hcjccj32.dll Ddjejl32.exe File created C:\Windows\SysWOW64\Dhkjej32.exe Daqbip32.exe File opened for modification C:\Windows\SysWOW64\Dogogcpo.exe Dhmgki32.exe File created C:\Windows\SysWOW64\Flgehc32.dll Cdabcm32.exe File created C:\Windows\SysWOW64\Kdqjac32.dll Cnffqf32.exe File opened for modification C:\Windows\SysWOW64\Chokikeb.exe Ceqnmpfo.exe File created C:\Windows\SysWOW64\Cogflbdn.dll Dopigd32.exe File created C:\Windows\SysWOW64\Fmjkjk32.dll Cjmgfgdf.exe File created C:\Windows\SysWOW64\Fpdaoioe.dll Dmgbnq32.exe File created C:\Windows\SysWOW64\Cnffqf32.exe Cfpnph32.exe File created C:\Windows\SysWOW64\Cjbpaf32.exe Cdhhdlid.exe File created C:\Windows\SysWOW64\Dogogcpo.exe Dhmgki32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3756 5064 WerFault.exe 103 -
System Location Discovery: System Language Discovery 1 TTPs 21 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cdabcm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cmlcbbcj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cjbpaf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dmllipeg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dhkjej32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dhmgki32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dknpmdfc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cfmajipb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dopigd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dfknkg32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Daqbip32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dmgbnq32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2d9516279d6a6d06cb5f696a4cb6c389024dad9d32774da647dab24251031d9dN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ceqnmpfo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cjmgfgdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ddjejl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dogogcpo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cfpnph32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cnffqf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Chokikeb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cdhhdlid.exe -
Modifies registry class 63 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cjmgfgdf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dogogcpo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node 2d9516279d6a6d06cb5f696a4cb6c389024dad9d32774da647dab24251031d9dN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cdabcm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cfpnph32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ceqnmpfo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hcjccj32.dll" Ddjejl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Imbajm32.dll" 2d9516279d6a6d06cb5f696a4cb6c389024dad9d32774da647dab24251031d9dN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bhicommo.dll" Cfmajipb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lpggmhkg.dll" Cmlcbbcj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ihidnp32.dll" Dhkjej32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dogogcpo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cfmajipb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cfpnph32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cmlcbbcj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cjbpaf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dmgbnq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fpdaoioe.dll" Dmgbnq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lbabpnmn.dll" Dhmgki32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cnffqf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cnffqf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cdhhdlid.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cogflbdn.dll" Dopigd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dfknkg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Chokikeb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lfjhbihm.dll" Cfpnph32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Chokikeb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cjmgfgdf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dhkjej32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dopigd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jdipdgch.dll" Dfknkg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Daqbip32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dnieoofh.dll" Ceqnmpfo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cdhhdlid.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hfanhp32.dll" Cjbpaf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ddjejl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ddjejl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dhmgki32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kngpec32.dll" Dknpmdfc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" 2d9516279d6a6d06cb5f696a4cb6c389024dad9d32774da647dab24251031d9dN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dopigd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jbpbca32.dll" Daqbip32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dhmgki32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kdqjac32.dll" Cnffqf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID 2d9516279d6a6d06cb5f696a4cb6c389024dad9d32774da647dab24251031d9dN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cfmajipb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fmjkjk32.dll" Cjmgfgdf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dmgbnq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dknpmdfc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Flgehc32.dll" Cdabcm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Maickled.dll" Chokikeb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cmlcbbcj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Daqbip32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dhkjej32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dknpmdfc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} 2d9516279d6a6d06cb5f696a4cb6c389024dad9d32774da647dab24251031d9dN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ceqnmpfo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dfknkg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 2d9516279d6a6d06cb5f696a4cb6c389024dad9d32774da647dab24251031d9dN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cdabcm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jgilhm32.dll" Cdhhdlid.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cjbpaf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nokpao32.dll" Dogogcpo.exe -
Suspicious use of WriteProcessMemory 60 IoCs
description pid Process procid_target PID 1732 wrote to memory of 3948 1732 2d9516279d6a6d06cb5f696a4cb6c389024dad9d32774da647dab24251031d9dN.exe 83 PID 1732 wrote to memory of 3948 1732 2d9516279d6a6d06cb5f696a4cb6c389024dad9d32774da647dab24251031d9dN.exe 83 PID 1732 wrote to memory of 3948 1732 2d9516279d6a6d06cb5f696a4cb6c389024dad9d32774da647dab24251031d9dN.exe 83 PID 3948 wrote to memory of 1236 3948 Cfmajipb.exe 84 PID 3948 wrote to memory of 1236 3948 Cfmajipb.exe 84 PID 3948 wrote to memory of 1236 3948 Cfmajipb.exe 84 PID 1236 wrote to memory of 1940 1236 Cdabcm32.exe 85 PID 1236 wrote to memory of 1940 1236 Cdabcm32.exe 85 PID 1236 wrote to memory of 1940 1236 Cdabcm32.exe 85 PID 1940 wrote to memory of 4388 1940 Cfpnph32.exe 86 PID 1940 wrote to memory of 4388 1940 Cfpnph32.exe 86 PID 1940 wrote to memory of 4388 1940 Cfpnph32.exe 86 PID 4388 wrote to memory of 3112 4388 Cnffqf32.exe 87 PID 4388 wrote to memory of 3112 4388 Cnffqf32.exe 87 PID 4388 wrote to memory of 3112 4388 Cnffqf32.exe 87 PID 3112 wrote to memory of 2796 3112 Ceqnmpfo.exe 88 PID 3112 wrote to memory of 2796 3112 Ceqnmpfo.exe 88 PID 3112 wrote to memory of 2796 3112 Ceqnmpfo.exe 88 PID 2796 wrote to memory of 4188 2796 Chokikeb.exe 89 PID 2796 wrote to memory of 4188 2796 Chokikeb.exe 89 PID 2796 wrote to memory of 4188 2796 Chokikeb.exe 89 PID 4188 wrote to memory of 2164 4188 Cjmgfgdf.exe 90 PID 4188 wrote to memory of 2164 4188 Cjmgfgdf.exe 90 PID 4188 wrote to memory of 2164 4188 Cjmgfgdf.exe 90 PID 2164 wrote to memory of 4264 2164 Cmlcbbcj.exe 91 PID 2164 wrote to memory of 4264 2164 Cmlcbbcj.exe 91 PID 2164 wrote to memory of 4264 2164 Cmlcbbcj.exe 91 PID 4264 wrote to memory of 3304 4264 Cdhhdlid.exe 92 PID 4264 wrote to memory of 3304 4264 Cdhhdlid.exe 92 PID 4264 wrote to memory of 3304 4264 Cdhhdlid.exe 92 PID 3304 wrote to memory of 2340 3304 Cjbpaf32.exe 93 PID 3304 wrote to memory of 2340 3304 Cjbpaf32.exe 93 PID 3304 wrote to memory of 2340 3304 Cjbpaf32.exe 93 PID 2340 wrote to memory of 756 2340 Ddjejl32.exe 94 PID 2340 wrote to memory of 756 2340 Ddjejl32.exe 94 PID 2340 wrote to memory of 756 2340 Ddjejl32.exe 94 PID 756 wrote to memory of 740 756 Dopigd32.exe 95 PID 756 wrote to memory of 740 756 Dopigd32.exe 95 PID 756 wrote to memory of 740 756 Dopigd32.exe 95 PID 740 wrote to memory of 3344 740 Dfknkg32.exe 96 PID 740 wrote to memory of 3344 740 Dfknkg32.exe 96 PID 740 wrote to memory of 3344 740 Dfknkg32.exe 96 PID 3344 wrote to memory of 1848 3344 Daqbip32.exe 97 PID 3344 wrote to memory of 1848 3344 Daqbip32.exe 97 PID 3344 wrote to memory of 1848 3344 Daqbip32.exe 97 PID 1848 wrote to memory of 4076 1848 Dhkjej32.exe 98 PID 1848 wrote to memory of 4076 1848 Dhkjej32.exe 98 PID 1848 wrote to memory of 4076 1848 Dhkjej32.exe 98 PID 4076 wrote to memory of 2556 4076 Dmgbnq32.exe 99 PID 4076 wrote to memory of 2556 4076 Dmgbnq32.exe 99 PID 4076 wrote to memory of 2556 4076 Dmgbnq32.exe 99 PID 2556 wrote to memory of 4968 2556 Dhmgki32.exe 100 PID 2556 wrote to memory of 4968 2556 Dhmgki32.exe 100 PID 2556 wrote to memory of 4968 2556 Dhmgki32.exe 100 PID 4968 wrote to memory of 1552 4968 Dogogcpo.exe 102 PID 4968 wrote to memory of 1552 4968 Dogogcpo.exe 102 PID 4968 wrote to memory of 1552 4968 Dogogcpo.exe 102 PID 1552 wrote to memory of 5064 1552 Dknpmdfc.exe 103 PID 1552 wrote to memory of 5064 1552 Dknpmdfc.exe 103 PID 1552 wrote to memory of 5064 1552 Dknpmdfc.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\2d9516279d6a6d06cb5f696a4cb6c389024dad9d32774da647dab24251031d9dN.exe"C:\Users\Admin\AppData\Local\Temp\2d9516279d6a6d06cb5f696a4cb6c389024dad9d32774da647dab24251031d9dN.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\SysWOW64\Cfmajipb.exeC:\Windows\system32\Cfmajipb.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3948 -
C:\Windows\SysWOW64\Cdabcm32.exeC:\Windows\system32\Cdabcm32.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Windows\SysWOW64\Cfpnph32.exeC:\Windows\system32\Cfpnph32.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Windows\SysWOW64\Cnffqf32.exeC:\Windows\system32\Cnffqf32.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4388 -
C:\Windows\SysWOW64\Ceqnmpfo.exeC:\Windows\system32\Ceqnmpfo.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3112 -
C:\Windows\SysWOW64\Chokikeb.exeC:\Windows\system32\Chokikeb.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\SysWOW64\Cjmgfgdf.exeC:\Windows\system32\Cjmgfgdf.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4188 -
C:\Windows\SysWOW64\Cmlcbbcj.exeC:\Windows\system32\Cmlcbbcj.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Windows\SysWOW64\Cdhhdlid.exeC:\Windows\system32\Cdhhdlid.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4264 -
C:\Windows\SysWOW64\Cjbpaf32.exeC:\Windows\system32\Cjbpaf32.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3304 -
C:\Windows\SysWOW64\Ddjejl32.exeC:\Windows\system32\Ddjejl32.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Windows\SysWOW64\Dopigd32.exeC:\Windows\system32\Dopigd32.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:756 -
C:\Windows\SysWOW64\Dfknkg32.exeC:\Windows\system32\Dfknkg32.exe14⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:740 -
C:\Windows\SysWOW64\Daqbip32.exeC:\Windows\system32\Daqbip32.exe15⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3344 -
C:\Windows\SysWOW64\Dhkjej32.exeC:\Windows\system32\Dhkjej32.exe16⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Windows\SysWOW64\Dmgbnq32.exeC:\Windows\system32\Dmgbnq32.exe17⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4076 -
C:\Windows\SysWOW64\Dhmgki32.exeC:\Windows\system32\Dhmgki32.exe18⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Windows\SysWOW64\Dogogcpo.exeC:\Windows\system32\Dogogcpo.exe19⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Windows\SysWOW64\Dknpmdfc.exeC:\Windows\system32\Dknpmdfc.exe20⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Windows\SysWOW64\Dmllipeg.exeC:\Windows\system32\Dmllipeg.exe21⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5064 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5064 -s 39622⤵
- Program crash
PID:3756
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 5064 -ip 50641⤵PID:3848
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
165KB
MD5b347d2d1ffd3727fa1d6c7514d10f3a2
SHA1e43aec525b982fbeb85e308beb0fd05347cace41
SHA256750afeab6c07e87f8ca6176c9222157393da5cde43225f6f5458d7ade364cea7
SHA512c28f5c94a10dfcba75bdeb523b3b36297d54ec7c7fd3648d6e3f22e4efd0e148a0ecb15acaebf03c8e5e33a71ad3e59d377e08d8c2da99875f6726e3daf49353
-
Filesize
165KB
MD5997bc42e28e36ebe67cff18865a9b3df
SHA109f2b0512365740b6a6ecaf1dad1e9d14cb59abb
SHA2569090ca67478f3acc4213b1cfa8346983d0ab78459723bc62e94e0ca04858ff16
SHA512e78233b69acd7c1c34ccd2b11fdad854772cc838e723d63c8e0452dc93b83bd3814e8ddc1db425505f609939b65b608476b83446bf44d2c9ffaa7e21ca454368
-
Filesize
165KB
MD535600659ebce9ef6100304376eb70d77
SHA124ac4d7ccec1ed02706c3c273b697da6afd9d823
SHA256efb593bb5716be755cd8d213d6158ab495e5ca5200cbcd57bfecdfa539c3c890
SHA5125b902f762deb04dbb16c7c4e1f4dd6b393f4270b2a4634959e34f3c7f9a86a1072e0065035aa6cd5a50cdf731834c33c9cf7a424b6cbfab2038f4a21fe90e94e
-
Filesize
165KB
MD5b34190ea93894a3ca3d83af5b87afb95
SHA1b6873f4f0d428be2c55fb3cfbceec41dba4fba28
SHA2564dbd9a8a327db788d1191f6d1c517be69957879ef272972c012ded1d51ee1d21
SHA51214709c2e7df9e5fd5c85fa063e9ab389c82c0d92fdb624524f651f5d58bd18347aeaa326e930459ca4db83549433c9fb7e937238abea3196f135bbaa59795278
-
Filesize
165KB
MD588b3c134c8c8f0b06ee0152fb2ca5c73
SHA17042a271e8f5cb6ab7d201998159000bca4144fa
SHA25671d0cdfb40cdfe38781f8cb60f2cf83f73d1000ecb706458ddc6ec0bc59b0ff9
SHA5123345feb1ba1803bb59ed41c7b0a1102e5a9893495d68bf6a69d1dfe9ee1bdc7109b782adbbf3aa49e2b5180f775ccd34d0ce42ad1dd82068496bc5702b7ea3b3
-
Filesize
165KB
MD53969c9fc80de65574490a008cdebc1e8
SHA180e6e9a40e073be0ce27ac381c45977caa8e0efc
SHA25648ee5e65628cc98572e5ca626e0cce4adc0e66610869446bf02639b43929b695
SHA5128d481d9a73f77525035362756b3521f53c60abc25d8ad43ba64c4fb73a31ca5d6ca8560bbc4455c8d74e54844e469d4fbc7b03fcec9ef1ad8fd2589581eac111
-
Filesize
165KB
MD5fb6aa78c94cca825584ab3fe2425a982
SHA14dbff45ae299fe3a603be9acdd2f7a489c15069d
SHA2568d2a89bf7b761fb9d1d09e37e7d96917c746173441c50562eca90ce682a3ad72
SHA512b6d62b89772b4ef54aba7ce3f705a7e84e7304df58638cf2f49ccdd5fc809054e4c81bcc7f2f3218b2600eeeacc837e6d6407f7988c6ff88c8b2949174af894a
-
Filesize
165KB
MD563a307a4921160da73305bc186b7b85d
SHA100285a6088be8b3b1538fadf207819c4e4f6d352
SHA25632e6d6e12d566b2f8f4f2729f0595164230d13675d2995c606253ba597b905cd
SHA512c4311ebc2a930a5c2a24008e44a08b375b94f1ed9944cca4cbc38f7f2757da390bd3d63ab0e1f38e52cc593383792255a1364155f2e829a9945fea7127ea7610
-
Filesize
165KB
MD57346109d0493abe87cf674249e422d02
SHA1daa8047d6f876ca204e42e06e566f0a3673c49ba
SHA2560515546e8322c43a0cde6f18422f25e7efda2232c72f9bf602194e0bff27053e
SHA5121d9beb50495da693acb34f78a8f7ba55cd1a71c66d2121c7dbce56880018c5f975b7b1f4ff399493ed23223417bbd0b6d4816d56f22159d06a3356c8c925eff5
-
Filesize
165KB
MD59e8cfb6dfae13c459ee60d8f7fd497b2
SHA123b9dbfd4ffaae689c3b1bbe888d0e56b5d2a832
SHA256e7daa2bf258438006398beaf9fcf7dc29a2b456c2cbf5d69658f205367f31574
SHA51232acc89fa13ee12b8dcf252cd170e78fe4e58ddea5c3e4dfa36a0ae177b8c6d437585bdd1052f13489cd3710673ac94ab0fc9c97606c7151ad7970e160ed836f
-
Filesize
165KB
MD548e40022d9f9364acb7a9218140419c0
SHA1afa4682c94b8429606f53e03b684d1800db53160
SHA2565938424076709c005520c52bc04a08124f004d39fcd3349f502e6edbf738236b
SHA512d56b71306e6dfbafbb1ddac3622a3e316d4a8f8ef7cc3b4fb49226c52766fd6fa7423cceb880633da379a59c04f31aef2104099e836703f44da2da649cb99d89
-
Filesize
165KB
MD5617cabd750abd8d16f1be516d632a047
SHA161eec65d934c83c2d57f0e708e888759ee40fc07
SHA25616e6e84bee84b205a2552ac52a9fbd2de597798666a4ac96ced6c6ad880b9ae2
SHA51223c291c4a4a7fc5e1eb6c7fec92e169dd3144b4cc9c7f0f188e32d6425db017264bc1b927d222494b2c99629b197e41f1d9eb51151ef99066cebf4fba601c7b3
-
Filesize
165KB
MD55f0d63f3676d588a8e821a36a462800a
SHA1a3406ebddac4f991bea67ef5d203ac961b773172
SHA256889fa2147dbea382c7bed7a9d1c139de12a500086a62476069fff782ba770393
SHA512e55d4f47316b12b7913c4b40d94c9bcba73cc88d10de7cf85acda15991c1d2b59f322d5a08fb8b2c62f46b4bc5cd5b2b4f316f9dd090dd50c8033323209580ca
-
Filesize
165KB
MD54ec8ec943b6531ac0d2175b76515753a
SHA1e6f9b94cdc8a5f7a39eee082acb26ecbde77cef5
SHA256f792c49868a29299aa982d8d5289edab1314bced10573d78fbf503f2aea99907
SHA512422fc383025cd0e8cc56fae860515d5c1ad0d41a6403c01611bf7ffedd1c01221f3fc388ed66609a05ebe8e2726e98cb3c8d096380b7d9974364818df1f36db0
-
Filesize
165KB
MD57b7e738583ed6210cf52dd85354882cf
SHA1592eef7700852aebce10109d5ed8bd4e627374b5
SHA256ced7ee9026c4c3767e70ea39a94021a14df0552c948353802e558bf157c1f1a6
SHA512b70a26462ec86d6e0d8b18093ebe7fb2a20f80a0cbc2ada6281be549f34e7effea816a0d89dd4e20ac5703e71badd283db6bed3970336ea30cd4e5b4bb65eaca
-
Filesize
165KB
MD56f0be0b12b8991cf3d48f119068cf68c
SHA14e3705f3884fbb3b8a215f918fc2b9b4f92b799a
SHA256ad06f82d662d2cc07104ac4eb9f759462c7275f2e038ff4884c321def4eab396
SHA51213b2aa2046e374180a10683ce973a65cd3845ff58f4d342c74a4e2f24e52ea4b5d52ea8c7ab9fac44020488700890de2468279b1057bbafd63e3b6f7c99c7b3b
-
Filesize
165KB
MD5005cc46dc26684274bbf7178ef1a1bdf
SHA1752e1dc3a68a10c55e1322651171bfca52f56a2a
SHA256803ff64053dfca0151cb3beab2d3f01a468a9e05c9db4522451ca91b6f64ab49
SHA51295e3e685f08f57f6c093f6178bb0576cecd91061300cb3eb893ba638edb4df1ae7376bc562c1042be4d3a969c1e6628744097ed63b2a11a49a47fbd6b07cac74
-
Filesize
165KB
MD50da7c0d995fd5fd2ab573ca93bd320b6
SHA1c300829270b56acb4241602feb81d3f0975c8419
SHA2565b51e1b31fa3997ab662e5f63dceb01ce54fb3042349eafa9a24b659697deae0
SHA5129f6bc8b46c29028f34a7032bf81ca55e7f8dbbc322f0c4e519e156093adb560f262637ff3b9c20571664edbd1be2f395bf67f31d61886972bb9451ae5cf4f577
-
Filesize
165KB
MD51ab4f93c368409037a7a3fa4128df92b
SHA1333b32a59405177efa9b8dadcf94dac916a595e2
SHA25613791ccd5ab14737d4b10a746a750d2409d9383b4d4ed8d6c1bf8fcd73231a1c
SHA51296d66c62621bcaeece19213a3eb6ea5b76f0fc64813b29d89fab2eb6c6ecb9f7a28407e10e0cff0ddcef6c15349a60cbad1a1bd24ce1b5e3f7bd1eaa78c8a3a4
-
Filesize
165KB
MD5fcbc0a0666c2596f37358c6f2cc36685
SHA13945004ea9a6af93ea8b5de6a16ef8085e8fc03a
SHA256f74cf805f10f72afb1ec21d2a63004417dc2b94fcf7ce4d3860896dbd92ec136
SHA5122231ccaf4340980a959c6ecdd2d101343c9e0657a90db88ee85497771b16ee9c90e3dd69e2add3f5a2102b2f2affd6b5a40db6c2df07b9b577e8f6672c1708bf