Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23/11/2024, 11:18
Static task
static1
Behavioral task
behavioral1
Sample
8a5331a12a4d1e11d1fe0c1afb44d9a62b1fd560c610714b4509617e31df8814.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8a5331a12a4d1e11d1fe0c1afb44d9a62b1fd560c610714b4509617e31df8814.exe
Resource
win10v2004-20241007-en
General
-
Target
8a5331a12a4d1e11d1fe0c1afb44d9a62b1fd560c610714b4509617e31df8814.exe
-
Size
88KB
-
MD5
ae8cde720f5da210b740d47f00acf447
-
SHA1
42823c3118b3431bf352cd39e78120fa52e23330
-
SHA256
8a5331a12a4d1e11d1fe0c1afb44d9a62b1fd560c610714b4509617e31df8814
-
SHA512
ea365d04bcad5106685af944815d44c51cc928ba957c2c25499e71c23e7c7431993ec23043dd4943c63a59a5c609a30020157208abc6ff40b5ddf44d5f1b795f
-
SSDEEP
1536:pXMLSwx+4joJ2dOmjJpvG8dI27opJDwsR2qphwkACDaTpeuge5T1Gnouy8b:QSwx+4cmdjJpRSwsR2IVKT12outb
Malware Config
Extracted
berbew
http://f/wcmd.htm
http://f/ppslog.php
http://f/piplog.php?%s:%i:%i:%s:%09u:%i:%02d:%02d:%02d
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 22 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Delnin32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Delnin32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Daconoae.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dkkcge32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Dkkcge32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ddakjkqi.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dmjocp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dddhpjof.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dknpmdfc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 8a5331a12a4d1e11d1fe0c1afb44d9a62b1fd560c610714b4509617e31df8814.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" 8a5331a12a4d1e11d1fe0c1afb44d9a62b1fd560c610714b4509617e31df8814.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dobfld32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Dobfld32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dhkjej32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Dhkjej32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dodbbdbb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Dodbbdbb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Daconoae.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ddakjkqi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Dmjocp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Dddhpjof.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Dknpmdfc.exe -
Berbew family
-
Executes dropped EXE 11 IoCs
pid Process 2440 Dobfld32.exe 3248 Delnin32.exe 888 Dhkjej32.exe 2116 Dodbbdbb.exe 980 Daconoae.exe 4788 Ddakjkqi.exe 2400 Dkkcge32.exe 1180 Dmjocp32.exe 2064 Dddhpjof.exe 3252 Dknpmdfc.exe 2648 Dmllipeg.exe -
Drops file in System32 directory 33 IoCs
description ioc Process File created C:\Windows\SysWOW64\Daconoae.exe Dodbbdbb.exe File opened for modification C:\Windows\SysWOW64\Daconoae.exe Dodbbdbb.exe File created C:\Windows\SysWOW64\Ddakjkqi.exe Daconoae.exe File created C:\Windows\SysWOW64\Jcbdhp32.dll Ddakjkqi.exe File opened for modification C:\Windows\SysWOW64\Dmjocp32.exe Dkkcge32.exe File created C:\Windows\SysWOW64\Dddhpjof.exe Dmjocp32.exe File created C:\Windows\SysWOW64\Amjknl32.dll Dmjocp32.exe File created C:\Windows\SysWOW64\Gmcfdb32.dll Dobfld32.exe File opened for modification C:\Windows\SysWOW64\Ddakjkqi.exe Daconoae.exe File created C:\Windows\SysWOW64\Jbpbca32.dll Delnin32.exe File created C:\Windows\SysWOW64\Dodbbdbb.exe Dhkjej32.exe File created C:\Windows\SysWOW64\Dkkcge32.exe Ddakjkqi.exe File created C:\Windows\SysWOW64\Dmjocp32.exe Dkkcge32.exe File created C:\Windows\SysWOW64\Nokpao32.dll Dddhpjof.exe File created C:\Windows\SysWOW64\Dmllipeg.exe Dknpmdfc.exe File opened for modification C:\Windows\SysWOW64\Dmllipeg.exe Dknpmdfc.exe File opened for modification C:\Windows\SysWOW64\Dobfld32.exe 8a5331a12a4d1e11d1fe0c1afb44d9a62b1fd560c610714b4509617e31df8814.exe File opened for modification C:\Windows\SysWOW64\Dhkjej32.exe Delnin32.exe File opened for modification C:\Windows\SysWOW64\Dknpmdfc.exe Dddhpjof.exe File created C:\Windows\SysWOW64\Dobfld32.exe 8a5331a12a4d1e11d1fe0c1afb44d9a62b1fd560c610714b4509617e31df8814.exe File created C:\Windows\SysWOW64\Fnmnbf32.dll Dhkjej32.exe File opened for modification C:\Windows\SysWOW64\Dkkcge32.exe Ddakjkqi.exe File created C:\Windows\SysWOW64\Bobiobnp.dll Dkkcge32.exe File opened for modification C:\Windows\SysWOW64\Dddhpjof.exe Dmjocp32.exe File created C:\Windows\SysWOW64\Dknpmdfc.exe Dddhpjof.exe File created C:\Windows\SysWOW64\Kngpec32.dll Dknpmdfc.exe File opened for modification C:\Windows\SysWOW64\Dodbbdbb.exe Dhkjej32.exe File opened for modification C:\Windows\SysWOW64\Delnin32.exe Dobfld32.exe File created C:\Windows\SysWOW64\Oammoc32.dll Dodbbdbb.exe File created C:\Windows\SysWOW64\Alcidkmm.dll 8a5331a12a4d1e11d1fe0c1afb44d9a62b1fd560c610714b4509617e31df8814.exe File created C:\Windows\SysWOW64\Dhkjej32.exe Delnin32.exe File created C:\Windows\SysWOW64\Gifhkeje.dll Daconoae.exe File created C:\Windows\SysWOW64\Delnin32.exe Dobfld32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4348 2648 WerFault.exe 92 -
System Location Discovery: System Language Discovery 1 TTPs 12 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dobfld32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dhkjej32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dkkcge32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dmjocp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dddhpjof.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8a5331a12a4d1e11d1fe0c1afb44d9a62b1fd560c610714b4509617e31df8814.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Delnin32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dodbbdbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Daconoae.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ddakjkqi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dknpmdfc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dmllipeg.exe -
Modifies registry class 36 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Dobfld32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Dmjocp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Dknpmdfc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Dodbbdbb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Dkkcge32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nokpao32.dll" Dddhpjof.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Dddhpjof.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717} 8a5331a12a4d1e11d1fe0c1afb44d9a62b1fd560c610714b4509617e31df8814.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Delnin32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jbpbca32.dll" Delnin32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Dhkjej32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Daconoae.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gifhkeje.dll" Daconoae.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jcbdhp32.dll" Ddakjkqi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kngpec32.dll" Dknpmdfc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Dknpmdfc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 8a5331a12a4d1e11d1fe0c1afb44d9a62b1fd560c610714b4509617e31df8814.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID 8a5331a12a4d1e11d1fe0c1afb44d9a62b1fd560c610714b4509617e31df8814.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" 8a5331a12a4d1e11d1fe0c1afb44d9a62b1fd560c610714b4509617e31df8814.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Delnin32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Alcidkmm.dll" 8a5331a12a4d1e11d1fe0c1afb44d9a62b1fd560c610714b4509617e31df8814.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Daconoae.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ddakjkqi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Dmjocp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node 8a5331a12a4d1e11d1fe0c1afb44d9a62b1fd560c610714b4509617e31df8814.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ddakjkqi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gmcfdb32.dll" Dobfld32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Dhkjej32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oammoc32.dll" Dodbbdbb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bobiobnp.dll" Dkkcge32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Amjknl32.dll" Dmjocp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Dobfld32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fnmnbf32.dll" Dhkjej32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Dodbbdbb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Dkkcge32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Dddhpjof.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 344 wrote to memory of 2440 344 8a5331a12a4d1e11d1fe0c1afb44d9a62b1fd560c610714b4509617e31df8814.exe 82 PID 344 wrote to memory of 2440 344 8a5331a12a4d1e11d1fe0c1afb44d9a62b1fd560c610714b4509617e31df8814.exe 82 PID 344 wrote to memory of 2440 344 8a5331a12a4d1e11d1fe0c1afb44d9a62b1fd560c610714b4509617e31df8814.exe 82 PID 2440 wrote to memory of 3248 2440 Dobfld32.exe 83 PID 2440 wrote to memory of 3248 2440 Dobfld32.exe 83 PID 2440 wrote to memory of 3248 2440 Dobfld32.exe 83 PID 3248 wrote to memory of 888 3248 Delnin32.exe 84 PID 3248 wrote to memory of 888 3248 Delnin32.exe 84 PID 3248 wrote to memory of 888 3248 Delnin32.exe 84 PID 888 wrote to memory of 2116 888 Dhkjej32.exe 85 PID 888 wrote to memory of 2116 888 Dhkjej32.exe 85 PID 888 wrote to memory of 2116 888 Dhkjej32.exe 85 PID 2116 wrote to memory of 980 2116 Dodbbdbb.exe 86 PID 2116 wrote to memory of 980 2116 Dodbbdbb.exe 86 PID 2116 wrote to memory of 980 2116 Dodbbdbb.exe 86 PID 980 wrote to memory of 4788 980 Daconoae.exe 87 PID 980 wrote to memory of 4788 980 Daconoae.exe 87 PID 980 wrote to memory of 4788 980 Daconoae.exe 87 PID 4788 wrote to memory of 2400 4788 Ddakjkqi.exe 88 PID 4788 wrote to memory of 2400 4788 Ddakjkqi.exe 88 PID 4788 wrote to memory of 2400 4788 Ddakjkqi.exe 88 PID 2400 wrote to memory of 1180 2400 Dkkcge32.exe 89 PID 2400 wrote to memory of 1180 2400 Dkkcge32.exe 89 PID 2400 wrote to memory of 1180 2400 Dkkcge32.exe 89 PID 1180 wrote to memory of 2064 1180 Dmjocp32.exe 90 PID 1180 wrote to memory of 2064 1180 Dmjocp32.exe 90 PID 1180 wrote to memory of 2064 1180 Dmjocp32.exe 90 PID 2064 wrote to memory of 3252 2064 Dddhpjof.exe 91 PID 2064 wrote to memory of 3252 2064 Dddhpjof.exe 91 PID 2064 wrote to memory of 3252 2064 Dddhpjof.exe 91 PID 3252 wrote to memory of 2648 3252 Dknpmdfc.exe 92 PID 3252 wrote to memory of 2648 3252 Dknpmdfc.exe 92 PID 3252 wrote to memory of 2648 3252 Dknpmdfc.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\8a5331a12a4d1e11d1fe0c1afb44d9a62b1fd560c610714b4509617e31df8814.exe"C:\Users\Admin\AppData\Local\Temp\8a5331a12a4d1e11d1fe0c1afb44d9a62b1fd560c610714b4509617e31df8814.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:344 -
C:\Windows\SysWOW64\Dobfld32.exeC:\Windows\system32\Dobfld32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Windows\SysWOW64\Delnin32.exeC:\Windows\system32\Delnin32.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3248 -
C:\Windows\SysWOW64\Dhkjej32.exeC:\Windows\system32\Dhkjej32.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:888 -
C:\Windows\SysWOW64\Dodbbdbb.exeC:\Windows\system32\Dodbbdbb.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Windows\SysWOW64\Daconoae.exeC:\Windows\system32\Daconoae.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:980 -
C:\Windows\SysWOW64\Ddakjkqi.exeC:\Windows\system32\Ddakjkqi.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Windows\SysWOW64\Dkkcge32.exeC:\Windows\system32\Dkkcge32.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Windows\SysWOW64\Dmjocp32.exeC:\Windows\system32\Dmjocp32.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Windows\SysWOW64\Dddhpjof.exeC:\Windows\system32\Dddhpjof.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Windows\SysWOW64\Dknpmdfc.exeC:\Windows\system32\Dknpmdfc.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3252 -
C:\Windows\SysWOW64\Dmllipeg.exeC:\Windows\system32\Dmllipeg.exe12⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2648 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2648 -s 40813⤵
- Program crash
PID:4348
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 2648 -ip 26481⤵PID:812
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
88KB
MD5e68defbf78a01704c98689fe873fd4a3
SHA1c0d3f8cceb60894a1b7346dfd8b481a1899770f7
SHA2566cd722e068b356c395b0169e0927acabcd40f863049c840b283698537a8d4c1b
SHA5122e2bec608432b71e4e601355bced74dc6ec35630498d96c361e47503788998ef4626df9dbb0dca63c842a1efbf4a4bcd0bbc1e7e4fb08a796c937e0f1b415a95
-
Filesize
88KB
MD5425c0f32cce7885c96e23db4ad73f254
SHA106cbd1d2f9a13a1f6fa13d401f4ace9199425aa7
SHA25698ada3aa9a9eb88e6d6c3ea82868be23e1394e1b91983f2e7b4be885b7fa7cd0
SHA512c69450191a046ede36bc38d00c2d7b76e91ec282f4ad4031ab5908f868b3a3159a96aad4d73a4b438d1ba6b078f3e84e73b331b5f678cda0954de93c88b00f45
-
Filesize
88KB
MD5c6ba169262e5c3ee4b350d509cc83711
SHA1c2d91d3a20a3f948ce5853c194de34447a7f9130
SHA256164d98ed3fe7555e6bad7f4f031c3bd7384691b77f128e6365fd67f9d4dd2080
SHA512472357f649be4d11bc070dc68b05304a1c1a30b53e5e11e4821d26c14354e9b458c12bf6462fd75e871cb3b8ec1e0a1b21b50e47db22b7356562fdb0a0aa8d25
-
Filesize
88KB
MD52d196f14674578b9eb1b5123250a7d66
SHA1b9d5b835889f306058fc06bf89d00e68398bd8a2
SHA25692a41795fe1bd7ab5d7f6bc737de1fa188a640295673dcc261bbe626bf54a303
SHA5123e508277241b4a7cb951aaf9ccf464e9a3999631308a48470fa05bf831fa7260c8edac4f159f8217ebc93902892d631ef36b099fefe0a63d53182ce0bbf20488
-
Filesize
88KB
MD5752d535a0c555422b3eee3df5c2622ad
SHA1a9554595c86f15b6ab47d47b98f76bdd8b7ce164
SHA256c90a4c8fcc9baac167cfd0931357ae9feeb8836aa7697f9c2c8e22fa3968be8b
SHA5123e2a8f44b0a9c62642950de59a4a91102070f8fd30c7a38fc2fc1da394e0c9060a85a05ddf4ff4dd4100ef511f0f810deaee86a126ed80817d23380d09c1f029
-
Filesize
88KB
MD510a9f948f8614f4d01fba59bf1d887ec
SHA127cc6b380fc490b435f49902d1a81252e5d254c5
SHA2561afd95b9aa346e97c84db0f05dce91bd32615a4d093e012361be2737630c5d39
SHA512f3cc921c226c8436f06cc321b6c25543556f3f93272e1bccd8f3303d3f6d9c025a0d642b4e543a4dcaeabb371f52e44703ae42e4dcd1f536ee1179cf1cdd5fdf
-
Filesize
88KB
MD5234685cee9900ff1dfe1085caa2014be
SHA163bd68f231b09fe4f5b126dfcd64f723c7c06466
SHA2564a33a46aa7bc73efba4b296be85c563c96080abd44579a54f9fecec81ba2897f
SHA5124e2249f821b227d05929ed125ea8b6ef33e7dcbfadb2a0659041fe797a5e90974e2d689c6875ff2f9485b782c2590c8893cea261d6f652d30fda92958daaa4c5
-
Filesize
88KB
MD5e94d2cf0eb9ef5b59eb0c385e80302f7
SHA15152c5352f3187699f0d34785c30c8de4857ccf4
SHA25684a7338574b4a18f2468a043a00b297ede664a3fa5c59900cb8bdbb432656636
SHA5128823a4d4df42809839979f74f1c6edb12e4225e3520ac18f9612fb168487804dca0f891daacfd42c4747e566326e3a13c305829e7281ebfbad234982486169c3
-
Filesize
88KB
MD51e37c7c5237d49dd55e820aaafb3410a
SHA1dec0f0ac3f05bbf2a9f62b1a2bd4a624639d4fd5
SHA256b4d91438c2c515de5931542b9587d13026452c79d05873423c3635b0666f0ae7
SHA512b5e29ffc575dcab0bb46c19f950823cf61d5f85feb74f97b5b5b7c216f5480556672996b8b5ce5a427f65ac3aafc8235fead855e117e993cfe912458e04db28d
-
Filesize
88KB
MD5f7b5b0e94dd1435d5c8a44530697965d
SHA123de72662e7453ca4fcd348b2ba4a0b6728f9473
SHA25607d2d56f816e3d33d58a032d6eb3b35709a3ef549f1ba1d03c2bfe53828bd4ae
SHA512355bd5810229a60b0a3604a1d09e5a3a193c740a8bfa9bc00c06a7f4d193f0dfd5daea081bd25cb82486304323c1cdf309f6ea080fe0f8585632b8da291e1edd
-
Filesize
88KB
MD54edda82a3d98d1a0fbc8d64d409dd89b
SHA1d28d068d5de002016e96b693ac1b2d8ac8496e4e
SHA256b6ffd3a74226fbe7f2e18bf2c68872a1b00318b75aeb35a66fc9f59c78e3d9a3
SHA5120e7df717e7270d44252108b790552fffe5b794e1add70ba74d5be0037674b74c3c8eb0b4a20fe87192ecf4d7579e04632c7fe44ce19c809cac165636cc5d9d93
-
Filesize
7KB
MD5591cfc51e959bb6b004cc0ef2bfa0bc6
SHA15d2acfa88803905736dd3d1375a8732bf7def631
SHA256b8f74ecf1b51ba6c0fb5533c0ab70e57805964f047f2e40cc6ea33226537e8b8
SHA5120ab5832f70963ff095c0e0401b3e9ee0bdd6dd2fb661b262a63c8b3c5619866dfa2e64ebcabe345fddccbb2c4b364907ffb8b1ee7961bbb43f6edf9d6a8d5ef1