Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
22-11-2024 04:36
Static task
static1
Behavioral task
behavioral1
Sample
d50ecb72bdebe11469530fcdc8880d57bc945419c2d95c0e509f21d4d2cacb99.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
d50ecb72bdebe11469530fcdc8880d57bc945419c2d95c0e509f21d4d2cacb99.exe
Resource
win10v2004-20241007-en
General
-
Target
d50ecb72bdebe11469530fcdc8880d57bc945419c2d95c0e509f21d4d2cacb99.exe
-
Size
398KB
-
MD5
fbbcb222040ad251791d4f5ad1cc58ae
-
SHA1
38f9c90c2d8ced41094701e9b5fcddc9f2cbe154
-
SHA256
d50ecb72bdebe11469530fcdc8880d57bc945419c2d95c0e509f21d4d2cacb99
-
SHA512
bb73d9b3047e28e00f9801e9c6e913de60e6f5fd3db6e1b1c7824e0964778b76345b18e36563fd699ce0d95129e0bd613e53334b71bbb2e3bcbb99cdd088b7c1
-
SSDEEP
12288:pg2DN66t3XGCByvNv54B9f01ZmHByvNv5imipWf0Aq:pZN66t3XGpvr4B9f01ZmQvrimipWf0Aq
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 54 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Mpcgbhig.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Nhhominh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ajdcofop.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Mkdbea32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nhqhmj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ongckp32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qijdqp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Nhqhmj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Pbblkaea.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cabaec32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Cabaec32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Blaobmkq.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mpcgbhig.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Nommodjj.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nlanhh32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bldpiifb.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad d50ecb72bdebe11469530fcdc8880d57bc945419c2d95c0e509f21d4d2cacb99.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ojndpqpq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Pkfghh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Blaobmkq.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ajdcofop.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nhhominh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Qpaohjkk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ahcjmkbo.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Abdeoe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Abdeoe32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ojndpqpq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Bldpiifb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Pijgbl32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ahcjmkbo.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cpohhk32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nommodjj.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Celpqbon.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nohddd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Nohddd32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ongckp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Bodhjdcc.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bdfjnkne.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" d50ecb72bdebe11469530fcdc8880d57bc945419c2d95c0e509f21d4d2cacb99.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pioamlkk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Bdodmlcm.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bodhjdcc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Nlanhh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Celpqbon.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pkfghh32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qpaohjkk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Bdfjnkne.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bdodmlcm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Qijdqp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Cpohhk32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mkdbea32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pijgbl32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pbblkaea.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Pioamlkk.exe -
Executes dropped EXE 27 IoCs
pid Process 2080 Mkdbea32.exe 2876 Mpcgbhig.exe 2800 Nohddd32.exe 2704 Nhqhmj32.exe 2676 Nommodjj.exe 2132 Nlanhh32.exe 1652 Nhhominh.exe 1940 Ongckp32.exe 2952 Ojndpqpq.exe 2096 Pkfghh32.exe 1960 Pijgbl32.exe 612 Pbblkaea.exe 2420 Pioamlkk.exe 2348 Qpaohjkk.exe 1624 Qijdqp32.exe 1236 Abdeoe32.exe 584 Ahcjmkbo.exe 1924 Ajdcofop.exe 1872 Bldpiifb.exe 1880 Bdodmlcm.exe 2028 Bodhjdcc.exe 2308 Bdfjnkne.exe 852 Blaobmkq.exe 884 Cpohhk32.exe 2128 Celpqbon.exe 2820 Cabaec32.exe 2784 Coindgbi.exe -
Loads dropped DLL 54 IoCs
pid Process 1644 d50ecb72bdebe11469530fcdc8880d57bc945419c2d95c0e509f21d4d2cacb99.exe 1644 d50ecb72bdebe11469530fcdc8880d57bc945419c2d95c0e509f21d4d2cacb99.exe 2080 Mkdbea32.exe 2080 Mkdbea32.exe 2876 Mpcgbhig.exe 2876 Mpcgbhig.exe 2800 Nohddd32.exe 2800 Nohddd32.exe 2704 Nhqhmj32.exe 2704 Nhqhmj32.exe 2676 Nommodjj.exe 2676 Nommodjj.exe 2132 Nlanhh32.exe 2132 Nlanhh32.exe 1652 Nhhominh.exe 1652 Nhhominh.exe 1940 Ongckp32.exe 1940 Ongckp32.exe 2952 Ojndpqpq.exe 2952 Ojndpqpq.exe 2096 Pkfghh32.exe 2096 Pkfghh32.exe 1960 Pijgbl32.exe 1960 Pijgbl32.exe 612 Pbblkaea.exe 612 Pbblkaea.exe 2420 Pioamlkk.exe 2420 Pioamlkk.exe 2348 Qpaohjkk.exe 2348 Qpaohjkk.exe 1624 Qijdqp32.exe 1624 Qijdqp32.exe 1236 Abdeoe32.exe 1236 Abdeoe32.exe 584 Ahcjmkbo.exe 584 Ahcjmkbo.exe 1924 Ajdcofop.exe 1924 Ajdcofop.exe 1872 Bldpiifb.exe 1872 Bldpiifb.exe 1880 Bdodmlcm.exe 1880 Bdodmlcm.exe 2028 Bodhjdcc.exe 2028 Bodhjdcc.exe 2308 Bdfjnkne.exe 2308 Bdfjnkne.exe 852 Blaobmkq.exe 852 Blaobmkq.exe 884 Cpohhk32.exe 884 Cpohhk32.exe 2128 Celpqbon.exe 2128 Celpqbon.exe 2820 Cabaec32.exe 2820 Cabaec32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\Ajdcofop.exe Ahcjmkbo.exe File opened for modification C:\Windows\SysWOW64\Celpqbon.exe Cpohhk32.exe File opened for modification C:\Windows\SysWOW64\Pkfghh32.exe Ojndpqpq.exe File opened for modification C:\Windows\SysWOW64\Pioamlkk.exe Pbblkaea.exe File created C:\Windows\SysWOW64\Pbblkaea.exe Pijgbl32.exe File opened for modification C:\Windows\SysWOW64\Abdeoe32.exe Qijdqp32.exe File created C:\Windows\SysWOW64\Mncmib32.dll Abdeoe32.exe File opened for modification C:\Windows\SysWOW64\Ajdcofop.exe Ahcjmkbo.exe File created C:\Windows\SysWOW64\Kacclb32.dll Bdfjnkne.exe File created C:\Windows\SysWOW64\Bfqhifni.dll d50ecb72bdebe11469530fcdc8880d57bc945419c2d95c0e509f21d4d2cacb99.exe File created C:\Windows\SysWOW64\Nohddd32.exe Mpcgbhig.exe File created C:\Windows\SysWOW64\Dngdfinb.dll Pijgbl32.exe File created C:\Windows\SysWOW64\Cabaec32.exe Celpqbon.exe File created C:\Windows\SysWOW64\Pkfghh32.exe Ojndpqpq.exe File created C:\Windows\SysWOW64\Facqnfnm.dll Pkfghh32.exe File created C:\Windows\SysWOW64\Gimpofjk.dll Nohddd32.exe File created C:\Windows\SysWOW64\Pfmpgd32.dll Nommodjj.exe File created C:\Windows\SysWOW64\Nhhominh.exe Nlanhh32.exe File created C:\Windows\SysWOW64\Pijgbl32.exe Pkfghh32.exe File opened for modification C:\Windows\SysWOW64\Pbblkaea.exe Pijgbl32.exe File created C:\Windows\SysWOW64\Hgioeh32.dll Ajdcofop.exe File created C:\Windows\SysWOW64\Mpcgbhig.exe Mkdbea32.exe File opened for modification C:\Windows\SysWOW64\Mpcgbhig.exe Mkdbea32.exe File opened for modification C:\Windows\SysWOW64\Bodhjdcc.exe Bdodmlcm.exe File created C:\Windows\SysWOW64\Pfapgnji.dll Cpohhk32.exe File created C:\Windows\SysWOW64\Gfbejp32.dll Ahcjmkbo.exe File created C:\Windows\SysWOW64\Doijgpba.dll Pbblkaea.exe File created C:\Windows\SysWOW64\Eiibij32.dll Qijdqp32.exe File opened for modification C:\Windows\SysWOW64\Nhhominh.exe Nlanhh32.exe File opened for modification C:\Windows\SysWOW64\Qpaohjkk.exe Pioamlkk.exe File opened for modification C:\Windows\SysWOW64\Qijdqp32.exe Qpaohjkk.exe File opened for modification C:\Windows\SysWOW64\Bldpiifb.exe Ajdcofop.exe File created C:\Windows\SysWOW64\Bdfjnkne.exe Bodhjdcc.exe File created C:\Windows\SysWOW64\Ohodgb32.dll Cabaec32.exe File created C:\Windows\SysWOW64\Gfjkqg32.dll Mpcgbhig.exe File created C:\Windows\SysWOW64\Iinalc32.dll Nhqhmj32.exe File created C:\Windows\SysWOW64\Bldpiifb.exe Ajdcofop.exe File created C:\Windows\SysWOW64\Llpaflnl.dll Bldpiifb.exe File created C:\Windows\SysWOW64\Acdlnnal.dll Bdodmlcm.exe File created C:\Windows\SysWOW64\Nhqhmj32.exe Nohddd32.exe File created C:\Windows\SysWOW64\Ahcjmkbo.exe Abdeoe32.exe File created C:\Windows\SysWOW64\Bodhjdcc.exe Bdodmlcm.exe File created C:\Windows\SysWOW64\Celpqbon.exe Cpohhk32.exe File opened for modification C:\Windows\SysWOW64\Nhqhmj32.exe Nohddd32.exe File created C:\Windows\SysWOW64\Bdodmlcm.exe Bldpiifb.exe File created C:\Windows\SysWOW64\Nommodjj.exe Nhqhmj32.exe File created C:\Windows\SysWOW64\Ojndpqpq.exe Ongckp32.exe File opened for modification C:\Windows\SysWOW64\Ahcjmkbo.exe Abdeoe32.exe File created C:\Windows\SysWOW64\Jqlidcln.dll Celpqbon.exe File created C:\Windows\SysWOW64\Mkdbea32.exe d50ecb72bdebe11469530fcdc8880d57bc945419c2d95c0e509f21d4d2cacb99.exe File opened for modification C:\Windows\SysWOW64\Nlanhh32.exe Nommodjj.exe File created C:\Windows\SysWOW64\Jggdmb32.dll Bodhjdcc.exe File created C:\Windows\SysWOW64\Cnfnahkp.dll Blaobmkq.exe File opened for modification C:\Windows\SysWOW64\Cabaec32.exe Celpqbon.exe File opened for modification C:\Windows\SysWOW64\Ongckp32.exe Nhhominh.exe File created C:\Windows\SysWOW64\Gaklhb32.dll Qpaohjkk.exe File created C:\Windows\SysWOW64\Okfimp32.dll Pioamlkk.exe File created C:\Windows\SysWOW64\Abdeoe32.exe Qijdqp32.exe File created C:\Windows\SysWOW64\Cpohhk32.exe Blaobmkq.exe File created C:\Windows\SysWOW64\Nlanhh32.exe Nommodjj.exe File created C:\Windows\SysWOW64\Pioamlkk.exe Pbblkaea.exe File opened for modification C:\Windows\SysWOW64\Pijgbl32.exe Pkfghh32.exe File opened for modification C:\Windows\SysWOW64\Cpohhk32.exe Blaobmkq.exe File created C:\Windows\SysWOW64\Kcnnqifi.dll Ongckp32.exe -
System Location Discovery: System Language Discovery 1 TTPs 28 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d50ecb72bdebe11469530fcdc8880d57bc945419c2d95c0e509f21d4d2cacb99.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bldpiifb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pkfghh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qijdqp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bdodmlcm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Blaobmkq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nhqhmj32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ongckp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ahcjmkbo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bodhjdcc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cpohhk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Celpqbon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Coindgbi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pioamlkk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qpaohjkk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mkdbea32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pijgbl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pbblkaea.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cabaec32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bdfjnkne.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nommodjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ojndpqpq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nhhominh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Abdeoe32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ajdcofop.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mpcgbhig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nlanhh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nohddd32.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Ongckp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kjknge32.dll" Ojndpqpq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Bldpiifb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pfapgnji.dll" Cpohhk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" d50ecb72bdebe11469530fcdc8880d57bc945419c2d95c0e509f21d4d2cacb99.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gfjkqg32.dll" Mpcgbhig.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Pijgbl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mncmib32.dll" Abdeoe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Bldpiifb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bfqhifni.dll" d50ecb72bdebe11469530fcdc8880d57bc945419c2d95c0e509f21d4d2cacb99.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Iinalc32.dll" Nhqhmj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Nommodjj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cnfnahkp.dll" Blaobmkq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 d50ecb72bdebe11469530fcdc8880d57bc945419c2d95c0e509f21d4d2cacb99.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831} d50ecb72bdebe11469530fcdc8880d57bc945419c2d95c0e509f21d4d2cacb99.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lgnmdf32.dll" Mkdbea32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Igjeji32.dll" Nhhominh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Pioamlkk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Abdeoe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jggdmb32.dll" Bodhjdcc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Bdfjnkne.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Nlanhh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Mpcgbhig.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Nhqhmj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Nhqhmj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dngdfinb.dll" Pijgbl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Qpaohjkk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gfbejp32.dll" Ahcjmkbo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Ahcjmkbo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Bdfjnkne.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pfmpgd32.dll" Nommodjj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Nhhominh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Pkfghh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Pbblkaea.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Abdeoe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Acdlnnal.dll" Bdodmlcm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Bdodmlcm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Cpohhk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Nohddd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Doijgpba.dll" Pbblkaea.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Qijdqp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Ajdcofop.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kacclb32.dll" Bdfjnkne.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node d50ecb72bdebe11469530fcdc8880d57bc945419c2d95c0e509f21d4d2cacb99.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID d50ecb72bdebe11469530fcdc8880d57bc945419c2d95c0e509f21d4d2cacb99.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Mkdbea32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Ojndpqpq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Facqnfnm.dll" Pkfghh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Qpaohjkk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gaklhb32.dll" Qpaohjkk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Blaobmkq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ohodgb32.dll" Cabaec32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Diggcodj.dll" Nlanhh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Pkfghh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Pbblkaea.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Pioamlkk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Celpqbon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Mkdbea32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Nommodjj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kcnnqifi.dll" Ongckp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hgioeh32.dll" Ajdcofop.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Bdodmlcm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Blaobmkq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jqlidcln.dll" Celpqbon.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1644 wrote to memory of 2080 1644 d50ecb72bdebe11469530fcdc8880d57bc945419c2d95c0e509f21d4d2cacb99.exe 30 PID 1644 wrote to memory of 2080 1644 d50ecb72bdebe11469530fcdc8880d57bc945419c2d95c0e509f21d4d2cacb99.exe 30 PID 1644 wrote to memory of 2080 1644 d50ecb72bdebe11469530fcdc8880d57bc945419c2d95c0e509f21d4d2cacb99.exe 30 PID 1644 wrote to memory of 2080 1644 d50ecb72bdebe11469530fcdc8880d57bc945419c2d95c0e509f21d4d2cacb99.exe 30 PID 2080 wrote to memory of 2876 2080 Mkdbea32.exe 31 PID 2080 wrote to memory of 2876 2080 Mkdbea32.exe 31 PID 2080 wrote to memory of 2876 2080 Mkdbea32.exe 31 PID 2080 wrote to memory of 2876 2080 Mkdbea32.exe 31 PID 2876 wrote to memory of 2800 2876 Mpcgbhig.exe 32 PID 2876 wrote to memory of 2800 2876 Mpcgbhig.exe 32 PID 2876 wrote to memory of 2800 2876 Mpcgbhig.exe 32 PID 2876 wrote to memory of 2800 2876 Mpcgbhig.exe 32 PID 2800 wrote to memory of 2704 2800 Nohddd32.exe 33 PID 2800 wrote to memory of 2704 2800 Nohddd32.exe 33 PID 2800 wrote to memory of 2704 2800 Nohddd32.exe 33 PID 2800 wrote to memory of 2704 2800 Nohddd32.exe 33 PID 2704 wrote to memory of 2676 2704 Nhqhmj32.exe 34 PID 2704 wrote to memory of 2676 2704 Nhqhmj32.exe 34 PID 2704 wrote to memory of 2676 2704 Nhqhmj32.exe 34 PID 2704 wrote to memory of 2676 2704 Nhqhmj32.exe 34 PID 2676 wrote to memory of 2132 2676 Nommodjj.exe 35 PID 2676 wrote to memory of 2132 2676 Nommodjj.exe 35 PID 2676 wrote to memory of 2132 2676 Nommodjj.exe 35 PID 2676 wrote to memory of 2132 2676 Nommodjj.exe 35 PID 2132 wrote to memory of 1652 2132 Nlanhh32.exe 36 PID 2132 wrote to memory of 1652 2132 Nlanhh32.exe 36 PID 2132 wrote to memory of 1652 2132 Nlanhh32.exe 36 PID 2132 wrote to memory of 1652 2132 Nlanhh32.exe 36 PID 1652 wrote to memory of 1940 1652 Nhhominh.exe 37 PID 1652 wrote to memory of 1940 1652 Nhhominh.exe 37 PID 1652 wrote to memory of 1940 1652 Nhhominh.exe 37 PID 1652 wrote to memory of 1940 1652 Nhhominh.exe 37 PID 1940 wrote to memory of 2952 1940 Ongckp32.exe 38 PID 1940 wrote to memory of 2952 1940 Ongckp32.exe 38 PID 1940 wrote to memory of 2952 1940 Ongckp32.exe 38 PID 1940 wrote to memory of 2952 1940 Ongckp32.exe 38 PID 2952 wrote to memory of 2096 2952 Ojndpqpq.exe 39 PID 2952 wrote to memory of 2096 2952 Ojndpqpq.exe 39 PID 2952 wrote to memory of 2096 2952 Ojndpqpq.exe 39 PID 2952 wrote to memory of 2096 2952 Ojndpqpq.exe 39 PID 2096 wrote to memory of 1960 2096 Pkfghh32.exe 40 PID 2096 wrote to memory of 1960 2096 Pkfghh32.exe 40 PID 2096 wrote to memory of 1960 2096 Pkfghh32.exe 40 PID 2096 wrote to memory of 1960 2096 Pkfghh32.exe 40 PID 1960 wrote to memory of 612 1960 Pijgbl32.exe 41 PID 1960 wrote to memory of 612 1960 Pijgbl32.exe 41 PID 1960 wrote to memory of 612 1960 Pijgbl32.exe 41 PID 1960 wrote to memory of 612 1960 Pijgbl32.exe 41 PID 612 wrote to memory of 2420 612 Pbblkaea.exe 42 PID 612 wrote to memory of 2420 612 Pbblkaea.exe 42 PID 612 wrote to memory of 2420 612 Pbblkaea.exe 42 PID 612 wrote to memory of 2420 612 Pbblkaea.exe 42 PID 2420 wrote to memory of 2348 2420 Pioamlkk.exe 43 PID 2420 wrote to memory of 2348 2420 Pioamlkk.exe 43 PID 2420 wrote to memory of 2348 2420 Pioamlkk.exe 43 PID 2420 wrote to memory of 2348 2420 Pioamlkk.exe 43 PID 2348 wrote to memory of 1624 2348 Qpaohjkk.exe 44 PID 2348 wrote to memory of 1624 2348 Qpaohjkk.exe 44 PID 2348 wrote to memory of 1624 2348 Qpaohjkk.exe 44 PID 2348 wrote to memory of 1624 2348 Qpaohjkk.exe 44 PID 1624 wrote to memory of 1236 1624 Qijdqp32.exe 45 PID 1624 wrote to memory of 1236 1624 Qijdqp32.exe 45 PID 1624 wrote to memory of 1236 1624 Qijdqp32.exe 45 PID 1624 wrote to memory of 1236 1624 Qijdqp32.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\d50ecb72bdebe11469530fcdc8880d57bc945419c2d95c0e509f21d4d2cacb99.exe"C:\Users\Admin\AppData\Local\Temp\d50ecb72bdebe11469530fcdc8880d57bc945419c2d95c0e509f21d4d2cacb99.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Windows\SysWOW64\Mkdbea32.exeC:\Windows\system32\Mkdbea32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Windows\SysWOW64\Mpcgbhig.exeC:\Windows\system32\Mpcgbhig.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Windows\SysWOW64\Nohddd32.exeC:\Windows\system32\Nohddd32.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Windows\SysWOW64\Nhqhmj32.exeC:\Windows\system32\Nhqhmj32.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\SysWOW64\Nommodjj.exeC:\Windows\system32\Nommodjj.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Windows\SysWOW64\Nlanhh32.exeC:\Windows\system32\Nlanhh32.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Windows\SysWOW64\Nhhominh.exeC:\Windows\system32\Nhhominh.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Windows\SysWOW64\Ongckp32.exeC:\Windows\system32\Ongckp32.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Windows\SysWOW64\Ojndpqpq.exeC:\Windows\system32\Ojndpqpq.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Windows\SysWOW64\Pkfghh32.exeC:\Windows\system32\Pkfghh32.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Windows\SysWOW64\Pijgbl32.exeC:\Windows\system32\Pijgbl32.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\SysWOW64\Pbblkaea.exeC:\Windows\system32\Pbblkaea.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:612 -
C:\Windows\SysWOW64\Pioamlkk.exeC:\Windows\system32\Pioamlkk.exe14⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Windows\SysWOW64\Qpaohjkk.exeC:\Windows\system32\Qpaohjkk.exe15⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\SysWOW64\Qijdqp32.exeC:\Windows\system32\Qijdqp32.exe16⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Windows\SysWOW64\Abdeoe32.exeC:\Windows\system32\Abdeoe32.exe17⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1236 -
C:\Windows\SysWOW64\Ahcjmkbo.exeC:\Windows\system32\Ahcjmkbo.exe18⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:584 -
C:\Windows\SysWOW64\Ajdcofop.exeC:\Windows\system32\Ajdcofop.exe19⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1924 -
C:\Windows\SysWOW64\Bldpiifb.exeC:\Windows\system32\Bldpiifb.exe20⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1872 -
C:\Windows\SysWOW64\Bdodmlcm.exeC:\Windows\system32\Bdodmlcm.exe21⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1880 -
C:\Windows\SysWOW64\Bodhjdcc.exeC:\Windows\system32\Bodhjdcc.exe22⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2028 -
C:\Windows\SysWOW64\Bdfjnkne.exeC:\Windows\system32\Bdfjnkne.exe23⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2308 -
C:\Windows\SysWOW64\Blaobmkq.exeC:\Windows\system32\Blaobmkq.exe24⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:852 -
C:\Windows\SysWOW64\Cpohhk32.exeC:\Windows\system32\Cpohhk32.exe25⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:884 -
C:\Windows\SysWOW64\Celpqbon.exeC:\Windows\system32\Celpqbon.exe26⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2128 -
C:\Windows\SysWOW64\Cabaec32.exeC:\Windows\system32\Cabaec32.exe27⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2820 -
C:\Windows\SysWOW64\Coindgbi.exeC:\Windows\system32\Coindgbi.exe28⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2784
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
398KB
MD5272fbf20fc666172509d0339d77acf71
SHA180dba9bfe561fd661baeec38b0840296b38aa1b1
SHA25638301029fae98cc9ede9de5b9eb8b701e3d7777fbbbb90aeacc95cb096e6769e
SHA51206272ae4c528951168055e6970c9ffcfbb5dc4434380b1a9550c53711c53698eb5de8dd595c47ffc45946920b1b1d952f5bcc6f4a99fc517fc5ea01b2684b111
-
Filesize
398KB
MD519971f4f9471690c41521509e4f13700
SHA10704801ec71e836a3030d76989b00bc8f99192e2
SHA2566f781fbc2392186aab2e11c23b12137653e55fbf5e931b4051691bd6c92638bf
SHA5126537ea35aedf863bf882942183e8fdee51f2edcbf270f539b6d929d4d865528cde4c30c67d1da9b27cdd88eec6449397447726bfac6050f078c12264de61251e
-
Filesize
398KB
MD54d161bc8ccf72e9df5b17f139d0234b9
SHA14d0dc5f4583d599342c1a709acae133eecf85c7a
SHA256872823ee799bc3228f20412d5683665c2a9c461a8adbde5fa8c00683aa4024d9
SHA51236b84722402461d7e97b288ca5aae25f531d7d48e83de9642e102982743f55fcaef066d3c5e6a436a897546d6f6efa5c1ed759e67343e0553035f89f87c8b4eb
-
Filesize
398KB
MD53b12a0ac0c9fa95a8a43c35d06dad3e3
SHA12c556f1590672793752fffa4b63b98615563dbba
SHA256101c55f4107242fb5aaebf61252b41ecfb20d4bd80a4827c4f14c3a0761cf0ce
SHA5120121d3d21f2eea3b290e5e49f23a18f2e5706d48525946b6fedeb213aecc9d973fc37e0fc63e1a76cbe2ddee9b482bef6bd609deb49b36f204286ab62ffd3716
-
Filesize
398KB
MD5ee0094a869cabf69b25d8a95b1f3ca39
SHA1a9e2bf4c0aa6cd609b4304ab0fc26515fac06123
SHA256ec399e34d0efa34c55f9f53b8240f362f0619f08eed05579322fcf3a04e51e8e
SHA512a8c128cff2979508d0ef583fe6a41d6d6d0e4e2ecd167204f4f2cafbb353254b68d0417fa12b4e95c9988cab33cca70c14d666f20c037bde8674fb8e33181df8
-
Filesize
398KB
MD565214ab36d4c5ecd26ca1302d24ace4a
SHA17beebf6ddfbb88b1daa8668a71e20d35fb9ad20d
SHA25617db386aa87b328b90d40ef96ca89d732276c058670adf6e5ecadc7d926c7180
SHA5127efc748b1c44f0ca881707b41cd9df39045124f43324287034e3ce1f1716fecd2e24df326b652e2b587a2750887275d84cb465afc709c76106741780b2df1e40
-
Filesize
398KB
MD553ec5f2ed1ce522931dd52cf14c9bc24
SHA1e7c704c58c2794f714ee20f47b4ac2919abaa668
SHA256f0b2ff6b799549b86d18dc810acc58878649f6ce7c36fa1ccf97567f0880a776
SHA512d6335822dd1b287dfe1ce6b760b2193989ce274e4ed57ff82df5ccd8847d07bcdcf4651b5076c4e8d6a9f43e98db713c7095be9b1e30b58be8f0e67e247be5a1
-
Filesize
398KB
MD5a9bbeda8675825cea143444d5b891b89
SHA1dd49f0325165c2f242b2edf0da8548bd84a24faa
SHA2566924ef2b055924335f94a4a7a07265971e3cf9063a4537949400370441bf3d8e
SHA51261a485a2814c9d012a8de7f5d5cfd335a9dcda60f4de4d7d5e5bf1cf463cbe4e8f752f5649a8c9b31eb48914dfa2a62463002f389137dbed90f267a31eea2a9e
-
Filesize
398KB
MD53132feb54980e5e339bf0f7f9b712662
SHA1e3937d814fc773a0ac0003522467ab0b28b099ed
SHA2562f628878ba5e5dac56b2653abc396266f39c707eb37ec43f7ada11bc73b4b918
SHA5124a0556e29a576481d0bd740d163f8278190b2797800ebe8a44d17e66d5b4d5039cc2e6c47c8c1c22de6c88576f913c842e75eb7feade0a8169e29033fd29cc7c
-
Filesize
398KB
MD5c3b8e78a5ece3b8f8f43f605e0a36e1b
SHA11037d994763956398323acae2de2631f1296dd36
SHA2562eadddedc3f0cc0b8c3a42e85ae9374851496219656604010c3f6ce4d6224032
SHA512f3af8d5aa8bba112d82176dec542b721b3358ecad4df87cb8ba8b9178fe5623782e5900a88a6b4bd6bc3516cc5febaeda99602cf0fa442d7c2d6b37485f7b0f2
-
Filesize
398KB
MD5825da4ff05ec755e95fed43d9aeeed49
SHA14b61c7b24a69fb5fb206174be0d867aa045fd88b
SHA256020a2f34c4c007ba859dcdab9087c16b8daa94c9358d8ad469b9fc44fca55ddc
SHA512188721205426ac1fafc2843eeff08d4ca6563807ea061589055680a5f198b988c76c12dab5198855baaa2136cbc3e6b6a265ad523ba80e1f2f6f03d7d46a8c17
-
Filesize
7KB
MD5abdc575b6df7c203f557d5213544f991
SHA1846d8d282059c51027ee9a09ca1607f7bed80362
SHA256474c398055c798a4c0055d3db2883168bff80f7b32e199fb0a8bc908af36bd84
SHA512bbfeb46316eb204d02f97b14054fea1d8fadf7672123f458462677811aa970ed16c1ef75e895f51afdeafd389b99f09f2fb604bdbdf1a81fab66a5122eb65de5
-
Filesize
398KB
MD506aeb3ce2c442b7c170786e02e78f0f7
SHA1cc2e8582cace76a01ed56e9e1c9d49b92a62a82b
SHA25665d42930c3000819deca898a2f583f430e17afc4a53558e6d548b1f36c1d0039
SHA512b7098dd7b5a4830f6523c7d2359a93e3b67a0aeab920618ec2b36261258ae215ed7d9d97f999ffcc1bfb70f58f97e80a7d78a381f1539d982cd9bfe691b2aef8
-
Filesize
398KB
MD5791ba8e5be3409fdea4542224f58b181
SHA190a0263a15e7e50889e6431378d89a0639b834cf
SHA2569fe360088881751709a89c4eb0414ed0d96ce52b384b2a72da7cccce6b6e5989
SHA512e1e80d79f6c9b537069da096bf4dda4487739d7cb8d0ed05294a4b6859a5b5061d8fcccdb1722dfa9b1151e4e142465be0dcfcd5c1627f7762ce2e3f99e89b4e
-
Filesize
398KB
MD5abf8f84ade16dc10f8948ca39313dae6
SHA1c36955c0d048dc4276df9157a7abee636b9c7c6a
SHA256c93cd362103414c90035e6987759f5aae1920605a6e3b9dd0df7811c385c412c
SHA51284b7a9f2a3264c82a01ae6e4d65b3c809b7770b49c1ac7533edf334b1fa906d0820cec48343545c16043880668bf8bc88a73eca274299d129d1cd5b32ce41fe5
-
Filesize
398KB
MD5d731dd4b08c8f09c4b84a972476ba4d8
SHA178c9086c0a07224356f60516628576d92fdb7511
SHA2561871df363f187f090803c916759e61372e05039670764c8f61745f67e02bbc26
SHA512f55a9fc9680643e03c859bc7c760aed0d6bd05e7bcf50e830a1865a4fbf27d229eab368f8a82ba9cca043bf3b2fb572e1ea83674b68b78c8e04e0a8d24832385
-
Filesize
398KB
MD5b258d57f51fbd7f4063a0e59a4bd952f
SHA12129811fb309a7393dfa74a3c59687574021761c
SHA2567061794b0a0973c020cb89944cf15994532ed0b9de3e2461bf94e3ebb56f266e
SHA512e05c5773689d105061dec488c28c8af2fad9e1c857df60ad5f9e0cbe8922e7d61b0f7146410e73b5a4ec09143071e006276679bd76abd944b8f28a657b050566
-
Filesize
398KB
MD53b6ced2f700671e75f16b733dee9fe39
SHA10df93ad3cd26822006bb32723bec122d593de78f
SHA2561fe0e3cc35bcd1e334875a7ee0389c311ae2608e69f18d21141f37e5fc172d13
SHA5124935fc9a4f62cb2f88b6d1b9fd20b798deeb5d771277e675959c7d8f30f2bdd040c855297a292dff90b3dc60cab86924dc247010f91ea87acc9cda4d57e44bb2
-
Filesize
398KB
MD5ae9debeeac174ce3f9470434950be92d
SHA1af0f806a527b2428d788f0739c8b1e5b7bfcfa1d
SHA256c0da55e7f83a50e94801f1db5bbd0dbda56e8c230e1db373359abdcb4a09f26a
SHA512987cd7348d65907bdcf209d19f81d9ae9c4e87b01ef363418dc897d878346d82a5071980732e48eb8d4a3e7bd2b8284bbd64e5e2da4efda9f88b8206e38ee687
-
Filesize
398KB
MD52aa25fe0972e3e729f890f24fa2a4070
SHA19e6813c94efc88fb3d5bad7385e6959ccc252fe2
SHA256c34161f10737ac98741f2148a3102f639051030e7c87a48282246e36e771605e
SHA5126098be51e14bc6e60b081635f04524d08c4699bfa67c1179b9b5451a9260f135e023d3b8a35a9e8dd2edac89daca30d14872d034c03076485ffbebbad89d2ce4
-
Filesize
398KB
MD5f7b4060e0213a3b9de0dba8c6f18f3cd
SHA13ff5dec33a4c5f8fed57f9a6f77b4d00a546c63f
SHA2561a066e84c040953c47c8540f751ad3ef175c543781474799d350cf8a06ce8038
SHA51202a331df81315f38bb482d0e4c017fc07ea700a713d317045de02e47824056e996e7015b864829f3ed7c100f208dd6b8cea77175c9a297b5972a2343dd84ff82
-
Filesize
398KB
MD56e49a5feca21e7901939bd26ccd70dad
SHA122d544315d5f270dcb973a39de744f139e85301b
SHA256a91d4c4c5a6e28ce517781f3c22bf2a17d974874f28db5ace316aa66f60cdf0b
SHA5123d590898cdce73cc47da520d9e8c2911a6df4049cb6afb758d84ac28ab7ecdcbc6486ec1710381d446c00c623a98643eef748aa6c3688d49c09dfb6c4b565954
-
Filesize
398KB
MD59560a66b3016d82407ed85fa5f14b1cc
SHA1f8d4a172e1084a31d1ffdbb5056f4ef4fcd5614d
SHA25690db1cc728a3e3813fa25f547a6d1da48f165f4273b26d3054859a69f1c5ea06
SHA5128865714e6f9aafc2d68354021fa4a1ffcf4c56532d6e8b53a3a431c25e42a775fb98e4bdd886be910621a147158ea6ece350f4f79f2c7e9d49a3d3e8cec7be44
-
Filesize
398KB
MD573d15741c60e1dadde088d025144d126
SHA16ff219d0aebdfc3519149a15da4a248f9181954a
SHA256b71a8b54be630104ac1f769f75e72d0534a562fbf489ad8904876881f4711875
SHA512be2b3490ad81a908afefaf0e780042e7d34f8f71ec3bd9a6d3515dd6ccbde8a21f3ee4b942466ea47155a01b4cd0ed1c94c5725bad04a5004042d1ab51854c84
-
Filesize
398KB
MD56b933ab30a00fd5fbfa6fa2de3b85844
SHA120183e48102e5ee4c66ef4f9c70a4e6dfc174bf4
SHA256147cb511f4f06ecc8767c3196144cca306d53fb436f21102c95bdc41bb9b062f
SHA5125affc6c32943a370e3798c5624ed067695763e51ed262f8fb97bbc7e595075fad7c9be387666ee2f3c673d37b7eb986367435fbde920c5868d1bd9ae4876f0c3
-
Filesize
398KB
MD583e44114ab04b6958648734d97b81df9
SHA1544886de3c31dde3e59f3561d7e4f7b1ca7b5950
SHA256a3b35b05b38f65140d45217b89f8de009dc44dc5b79faf7bb9a27514711f5529
SHA51283f5afd248f07ec6fa84c0b890d9ac24394da376eba5221002e0590e4c2ac9cf8bc423f3a46385004fa5e8169c14e083715a5ee6367bab958ec82140379f3a6f
-
Filesize
398KB
MD50ae3c234086eb9a8c90301dde9ee716b
SHA132062041a9e04b8347cb9b55c15b1049b6255305
SHA25688ef659817834408783bbf4bd9e2b715fcd4e1f07305b46b20face6d79506549
SHA512c5a0f9f1a765f82fe656d42d1fd9a5f6aed889596de34d8c1b68475a25700ba25f7d213596459473259037cccb2f3c5a92f530ac049a21c3fe3d7c8da8917452
-
Filesize
398KB
MD5bf0319534343e1fee745a91efe3fbd7d
SHA12b80b0b7d068eedcc305ba1f0a979e9d3a054ae1
SHA2564e823c186cc23d89e43bba04ea7f112327ae2f186cbc54a4370c9da108620fe2
SHA512e310bcbd0feca8bd20a1e45e52947cae9ec80d875333bfe7abd420879c659569bab0ac266c5987309913a99bc35d4c28f081b1268849cc9fcd98d8c98d2ab186