Analysis
-
max time kernel
112s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
08-12-2024 00:38
Behavioral task
behavioral1
Sample
194f18acdb94c07f36a21bf2a80196365e58f758285a0fbcdfafbbbdae89b59bN.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
194f18acdb94c07f36a21bf2a80196365e58f758285a0fbcdfafbbbdae89b59bN.exe
Resource
win10v2004-20241007-en
General
-
Target
194f18acdb94c07f36a21bf2a80196365e58f758285a0fbcdfafbbbdae89b59bN.exe
-
Size
182KB
-
MD5
561c248ea6f24cd057a51f40a4ccb1b0
-
SHA1
fafe52cb2ab893d608c0c0162a2e7d6a863b6455
-
SHA256
194f18acdb94c07f36a21bf2a80196365e58f758285a0fbcdfafbbbdae89b59b
-
SHA512
7d1e91f833e8df0aced22e6c432c863cc482ef5d9eca80f15ca0dbc7be58e0cc6abc37c08fa809599301e74df6d29e6d6366a2444bafabaceb65e2af2cf48e72
-
SSDEEP
1536:SEQOcV/Qfxp+vLw2yYNQlZMJP2L97nguPw9uVgA53+RrKJs2zjFS3ldkBOLLaVqk:xQOI+Lmk2BEH97nguPnVgA53+GpOc
Malware Config
Extracted
berbew
http://crutop.nu/index.php
http://crutop.ru/index.php
http://mazafaka.ru/index.php
http://color-bank.ru/index.php
http://asechka.ru/index.php
http://trojan.ru/index.php
http://fuck.ru/index.php
http://goldensand.ru/index.php
http://filesearch.ru/index.php
http://devx.nm.ru/index.php
http://ros-neftbank.ru/index.php
http://lovingod.host.sk/index.php
http://www.redline.ru/index.php
http://cvv.ru/index.php
http://hackers.lv/index.php
http://fethard.biz/index.php
http://ldark.nm.ru/index.htm
http://gaz-prom.ru/index.htm
http://promo.ru/index.htm
http://potleaf.chat.ru/index.htm
http://kadet.ru/index.htm
http://cvv.ru/index.htm
http://crutop.nu/index.htm
http://crutop.ru/index.htm
http://mazafaka.ru/index.htm
http://xware.cjb.net/index.htm
http://konfiskat.org/index.htm
http://parex-bank.ru/index.htm
http://kidos-bank.ru/index.htm
http://kavkaz.ru/index.htm
http://fethard.biz/index.htm
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 50 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Apclnj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cbkgog32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ckiiiine.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cgbfcjag.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bfpmog32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 194f18acdb94c07f36a21bf2a80196365e58f758285a0fbcdfafbbbdae89b59bN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Apclnj32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Abdeoe32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Apkbnibq.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aalofa32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Abkkpd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Abkkpd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bgdfjfmi.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Chjmmnnb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Chmibmlo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Chjmmnnb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" 194f18acdb94c07f36a21bf2a80196365e58f758285a0fbcdfafbbbdae89b59bN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pegnglnm.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qgfkchmp.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qcmkhi32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qijdqp32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Apfici32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Baqhapdj.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pegnglnm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Abdeoe32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aeenapck.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Baqhapdj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bmlbaqfh.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bpmkbl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qijdqp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Apfici32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Aeenapck.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Apkbnibq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qcmkhi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bldpiifb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Binikb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Celpqbon.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ckiiiine.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Chmibmlo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qgfkchmp.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bldpiifb.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Binikb32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bgdfjfmi.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cbkgog32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Aalofa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bfpmog32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bmlbaqfh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bpmkbl32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Celpqbon.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cgbfcjag.exe -
Berbew family
-
Executes dropped EXE 25 IoCs
pid Process 2216 Pegnglnm.exe 2884 Qgfkchmp.exe 3032 Qcmkhi32.exe 3000 Qijdqp32.exe 2956 Apclnj32.exe 1680 Apfici32.exe 1152 Abdeoe32.exe 2492 Aeenapck.exe 3048 Apkbnibq.exe 1088 Aalofa32.exe 1424 Abkkpd32.exe 1176 Bldpiifb.exe 536 Baqhapdj.exe 2328 Bfpmog32.exe 2088 Binikb32.exe 2200 Bmlbaqfh.exe 1632 Bgdfjfmi.exe 1524 Bpmkbl32.exe 1924 Cbkgog32.exe 2460 Celpqbon.exe 2324 Chjmmnnb.exe 2440 Ckiiiine.exe 1688 Chmibmlo.exe 2180 Cgbfcjag.exe 2052 Coindgbi.exe -
Loads dropped DLL 50 IoCs
pid Process 2748 194f18acdb94c07f36a21bf2a80196365e58f758285a0fbcdfafbbbdae89b59bN.exe 2748 194f18acdb94c07f36a21bf2a80196365e58f758285a0fbcdfafbbbdae89b59bN.exe 2216 Pegnglnm.exe 2216 Pegnglnm.exe 2884 Qgfkchmp.exe 2884 Qgfkchmp.exe 3032 Qcmkhi32.exe 3032 Qcmkhi32.exe 3000 Qijdqp32.exe 3000 Qijdqp32.exe 2956 Apclnj32.exe 2956 Apclnj32.exe 1680 Apfici32.exe 1680 Apfici32.exe 1152 Abdeoe32.exe 1152 Abdeoe32.exe 2492 Aeenapck.exe 2492 Aeenapck.exe 3048 Apkbnibq.exe 3048 Apkbnibq.exe 1088 Aalofa32.exe 1088 Aalofa32.exe 1424 Abkkpd32.exe 1424 Abkkpd32.exe 1176 Bldpiifb.exe 1176 Bldpiifb.exe 536 Baqhapdj.exe 536 Baqhapdj.exe 2328 Bfpmog32.exe 2328 Bfpmog32.exe 2088 Binikb32.exe 2088 Binikb32.exe 2200 Bmlbaqfh.exe 2200 Bmlbaqfh.exe 1632 Bgdfjfmi.exe 1632 Bgdfjfmi.exe 1524 Bpmkbl32.exe 1524 Bpmkbl32.exe 1924 Cbkgog32.exe 1924 Cbkgog32.exe 2460 Celpqbon.exe 2460 Celpqbon.exe 2324 Chjmmnnb.exe 2324 Chjmmnnb.exe 2440 Ckiiiine.exe 2440 Ckiiiine.exe 1688 Chmibmlo.exe 1688 Chmibmlo.exe 2180 Cgbfcjag.exe 2180 Cgbfcjag.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\Qcmkhi32.exe Qgfkchmp.exe File opened for modification C:\Windows\SysWOW64\Aeenapck.exe Abdeoe32.exe File created C:\Windows\SysWOW64\Agcmideg.dll Binikb32.exe File created C:\Windows\SysWOW64\Mpgoaiep.dll Ckiiiine.exe File opened for modification C:\Windows\SysWOW64\Cgbfcjag.exe Chmibmlo.exe File created C:\Windows\SysWOW64\Jafjpdlm.dll Aalofa32.exe File created C:\Windows\SysWOW64\Bldpiifb.exe Abkkpd32.exe File opened for modification C:\Windows\SysWOW64\Ckiiiine.exe Chjmmnnb.exe File created C:\Windows\SysWOW64\Ohodgb32.dll Cgbfcjag.exe File created C:\Windows\SysWOW64\Pegnglnm.exe 194f18acdb94c07f36a21bf2a80196365e58f758285a0fbcdfafbbbdae89b59bN.exe File opened for modification C:\Windows\SysWOW64\Qijdqp32.exe Qcmkhi32.exe File opened for modification C:\Windows\SysWOW64\Bldpiifb.exe Abkkpd32.exe File created C:\Windows\SysWOW64\Hgioeh32.dll Abkkpd32.exe File created C:\Windows\SysWOW64\Anfdhfiq.dll Bldpiifb.exe File created C:\Windows\SysWOW64\Flhbop32.dll Baqhapdj.exe File created C:\Windows\SysWOW64\Bmlbaqfh.exe Binikb32.exe File opened for modification C:\Windows\SysWOW64\Abkkpd32.exe Aalofa32.exe File opened for modification C:\Windows\SysWOW64\Baqhapdj.exe Bldpiifb.exe File created C:\Windows\SysWOW64\Cgbfcjag.exe Chmibmlo.exe File opened for modification C:\Windows\SysWOW64\Pegnglnm.exe 194f18acdb94c07f36a21bf2a80196365e58f758285a0fbcdfafbbbdae89b59bN.exe File created C:\Windows\SysWOW64\Ipippm32.dll Apkbnibq.exe File opened for modification C:\Windows\SysWOW64\Bgdfjfmi.exe Bmlbaqfh.exe File created C:\Windows\SysWOW64\Ckiiiine.exe Chjmmnnb.exe File opened for modification C:\Windows\SysWOW64\Chmibmlo.exe Ckiiiine.exe File opened for modification C:\Windows\SysWOW64\Coindgbi.exe Cgbfcjag.exe File opened for modification C:\Windows\SysWOW64\Qgfkchmp.exe Pegnglnm.exe File created C:\Windows\SysWOW64\Qijdqp32.exe Qcmkhi32.exe File opened for modification C:\Windows\SysWOW64\Apkbnibq.exe Aeenapck.exe File created C:\Windows\SysWOW64\Bgdfjfmi.exe Bmlbaqfh.exe File created C:\Windows\SysWOW64\Cbkgog32.exe Bpmkbl32.exe File created C:\Windows\SysWOW64\Pfapgnji.dll Cbkgog32.exe File created C:\Windows\SysWOW64\Clmkgm32.dll Celpqbon.exe File created C:\Windows\SysWOW64\Coindgbi.exe Cgbfcjag.exe File created C:\Windows\SysWOW64\Qgfkchmp.exe Pegnglnm.exe File created C:\Windows\SysWOW64\Eejanc32.dll Qgfkchmp.exe File created C:\Windows\SysWOW64\Apfici32.exe Apclnj32.exe File created C:\Windows\SysWOW64\Chmibmlo.exe Ckiiiine.exe File created C:\Windows\SysWOW64\Aeenapck.exe Abdeoe32.exe File opened for modification C:\Windows\SysWOW64\Bpmkbl32.exe Bgdfjfmi.exe File created C:\Windows\SysWOW64\Hjnhlm32.dll Bgdfjfmi.exe File opened for modification C:\Windows\SysWOW64\Celpqbon.exe Cbkgog32.exe File created C:\Windows\SysWOW64\Befddlni.dll Chmibmlo.exe File created C:\Windows\SysWOW64\Mfhdke32.dll 194f18acdb94c07f36a21bf2a80196365e58f758285a0fbcdfafbbbdae89b59bN.exe File created C:\Windows\SysWOW64\Gaklhb32.dll Qcmkhi32.exe File created C:\Windows\SysWOW64\Djcnme32.dll Abdeoe32.exe File created C:\Windows\SysWOW64\Jalnli32.dll Aeenapck.exe File opened for modification C:\Windows\SysWOW64\Aalofa32.exe Apkbnibq.exe File opened for modification C:\Windows\SysWOW64\Bfpmog32.exe Baqhapdj.exe File created C:\Windows\SysWOW64\Bpmkbl32.exe Bgdfjfmi.exe File created C:\Windows\SysWOW64\Jlmhimhb.dll Bpmkbl32.exe File created C:\Windows\SysWOW64\Chjmmnnb.exe Celpqbon.exe File opened for modification C:\Windows\SysWOW64\Apclnj32.exe Qijdqp32.exe File created C:\Windows\SysWOW64\Kkggemii.dll Qijdqp32.exe File opened for modification C:\Windows\SysWOW64\Abdeoe32.exe Apfici32.exe File opened for modification C:\Windows\SysWOW64\Binikb32.exe Bfpmog32.exe File created C:\Windows\SysWOW64\Aiffeloi.dll Pegnglnm.exe File created C:\Windows\SysWOW64\Apkbnibq.exe Aeenapck.exe File created C:\Windows\SysWOW64\Bfpmog32.exe Baqhapdj.exe File created C:\Windows\SysWOW64\Kpfdhgca.dll Bfpmog32.exe File opened for modification C:\Windows\SysWOW64\Chjmmnnb.exe Celpqbon.exe File created C:\Windows\SysWOW64\Aalofa32.exe Apkbnibq.exe File created C:\Windows\SysWOW64\Abkkpd32.exe Aalofa32.exe File created C:\Windows\SysWOW64\Jchbfbij.dll Chjmmnnb.exe File opened for modification C:\Windows\SysWOW64\Qcmkhi32.exe Qgfkchmp.exe -
System Location Discovery: System Language Discovery 1 TTPs 26 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Apkbnibq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bldpiifb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bmlbaqfh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Apclnj32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bgdfjfmi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bpmkbl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Coindgbi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Abdeoe32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qijdqp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Binikb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cbkgog32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Celpqbon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Chmibmlo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qcmkhi32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pegnglnm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qgfkchmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Apfici32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Aeenapck.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Aalofa32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Abkkpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Baqhapdj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 194f18acdb94c07f36a21bf2a80196365e58f758285a0fbcdfafbbbdae89b59bN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Chjmmnnb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ckiiiine.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cgbfcjag.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bfpmog32.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pegnglnm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eiibij32.dll" Apfici32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Apfici32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bmlbaqfh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ohodgb32.dll" Cgbfcjag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Abkkpd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID 194f18acdb94c07f36a21bf2a80196365e58f758285a0fbcdfafbbbdae89b59bN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} 194f18acdb94c07f36a21bf2a80196365e58f758285a0fbcdfafbbbdae89b59bN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eejanc32.dll" Qgfkchmp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Qcmkhi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Qcmkhi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Qijdqp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Apfici32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Flhbop32.dll" Baqhapdj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bfpmog32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node 194f18acdb94c07f36a21bf2a80196365e58f758285a0fbcdfafbbbdae89b59bN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Apclnj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jafjpdlm.dll" Aalofa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Agcmideg.dll" Binikb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Celpqbon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" 194f18acdb94c07f36a21bf2a80196365e58f758285a0fbcdfafbbbdae89b59bN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Qijdqp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Clmkgm32.dll" Celpqbon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ckiiiine.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cgbfcjag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jlmhimhb.dll" Bpmkbl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pegnglnm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Abdeoe32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bldpiifb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kpfdhgca.dll" Bfpmog32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bfpmog32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hjnhlm32.dll" Bgdfjfmi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bgdfjfmi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jchbfbij.dll" Chjmmnnb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Chmibmlo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aiffeloi.dll" Pegnglnm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Abkkpd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Apclnj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Djcnme32.dll" Abdeoe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Aeenapck.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Baqhapdj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Celpqbon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Chjmmnnb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hgioeh32.dll" Abkkpd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gaklhb32.dll" Qcmkhi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Abdeoe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kkggemii.dll" Qijdqp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Apkbnibq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Aalofa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Aalofa32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bgdfjfmi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pfapgnji.dll" Cbkgog32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ckiiiine.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Qgfkchmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jalnli32.dll" Aeenapck.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Chjmmnnb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mpgoaiep.dll" Ckiiiine.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lficmm32.dll" Apclnj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bldpiifb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Baqhapdj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bmlbaqfh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bpmkbl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cbkgog32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ipippm32.dll" Apkbnibq.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2748 wrote to memory of 2216 2748 194f18acdb94c07f36a21bf2a80196365e58f758285a0fbcdfafbbbdae89b59bN.exe 30 PID 2748 wrote to memory of 2216 2748 194f18acdb94c07f36a21bf2a80196365e58f758285a0fbcdfafbbbdae89b59bN.exe 30 PID 2748 wrote to memory of 2216 2748 194f18acdb94c07f36a21bf2a80196365e58f758285a0fbcdfafbbbdae89b59bN.exe 30 PID 2748 wrote to memory of 2216 2748 194f18acdb94c07f36a21bf2a80196365e58f758285a0fbcdfafbbbdae89b59bN.exe 30 PID 2216 wrote to memory of 2884 2216 Pegnglnm.exe 31 PID 2216 wrote to memory of 2884 2216 Pegnglnm.exe 31 PID 2216 wrote to memory of 2884 2216 Pegnglnm.exe 31 PID 2216 wrote to memory of 2884 2216 Pegnglnm.exe 31 PID 2884 wrote to memory of 3032 2884 Qgfkchmp.exe 32 PID 2884 wrote to memory of 3032 2884 Qgfkchmp.exe 32 PID 2884 wrote to memory of 3032 2884 Qgfkchmp.exe 32 PID 2884 wrote to memory of 3032 2884 Qgfkchmp.exe 32 PID 3032 wrote to memory of 3000 3032 Qcmkhi32.exe 33 PID 3032 wrote to memory of 3000 3032 Qcmkhi32.exe 33 PID 3032 wrote to memory of 3000 3032 Qcmkhi32.exe 33 PID 3032 wrote to memory of 3000 3032 Qcmkhi32.exe 33 PID 3000 wrote to memory of 2956 3000 Qijdqp32.exe 34 PID 3000 wrote to memory of 2956 3000 Qijdqp32.exe 34 PID 3000 wrote to memory of 2956 3000 Qijdqp32.exe 34 PID 3000 wrote to memory of 2956 3000 Qijdqp32.exe 34 PID 2956 wrote to memory of 1680 2956 Apclnj32.exe 35 PID 2956 wrote to memory of 1680 2956 Apclnj32.exe 35 PID 2956 wrote to memory of 1680 2956 Apclnj32.exe 35 PID 2956 wrote to memory of 1680 2956 Apclnj32.exe 35 PID 1680 wrote to memory of 1152 1680 Apfici32.exe 36 PID 1680 wrote to memory of 1152 1680 Apfici32.exe 36 PID 1680 wrote to memory of 1152 1680 Apfici32.exe 36 PID 1680 wrote to memory of 1152 1680 Apfici32.exe 36 PID 1152 wrote to memory of 2492 1152 Abdeoe32.exe 37 PID 1152 wrote to memory of 2492 1152 Abdeoe32.exe 37 PID 1152 wrote to memory of 2492 1152 Abdeoe32.exe 37 PID 1152 wrote to memory of 2492 1152 Abdeoe32.exe 37 PID 2492 wrote to memory of 3048 2492 Aeenapck.exe 38 PID 2492 wrote to memory of 3048 2492 Aeenapck.exe 38 PID 2492 wrote to memory of 3048 2492 Aeenapck.exe 38 PID 2492 wrote to memory of 3048 2492 Aeenapck.exe 38 PID 3048 wrote to memory of 1088 3048 Apkbnibq.exe 39 PID 3048 wrote to memory of 1088 3048 Apkbnibq.exe 39 PID 3048 wrote to memory of 1088 3048 Apkbnibq.exe 39 PID 3048 wrote to memory of 1088 3048 Apkbnibq.exe 39 PID 1088 wrote to memory of 1424 1088 Aalofa32.exe 40 PID 1088 wrote to memory of 1424 1088 Aalofa32.exe 40 PID 1088 wrote to memory of 1424 1088 Aalofa32.exe 40 PID 1088 wrote to memory of 1424 1088 Aalofa32.exe 40 PID 1424 wrote to memory of 1176 1424 Abkkpd32.exe 41 PID 1424 wrote to memory of 1176 1424 Abkkpd32.exe 41 PID 1424 wrote to memory of 1176 1424 Abkkpd32.exe 41 PID 1424 wrote to memory of 1176 1424 Abkkpd32.exe 41 PID 1176 wrote to memory of 536 1176 Bldpiifb.exe 42 PID 1176 wrote to memory of 536 1176 Bldpiifb.exe 42 PID 1176 wrote to memory of 536 1176 Bldpiifb.exe 42 PID 1176 wrote to memory of 536 1176 Bldpiifb.exe 42 PID 536 wrote to memory of 2328 536 Baqhapdj.exe 43 PID 536 wrote to memory of 2328 536 Baqhapdj.exe 43 PID 536 wrote to memory of 2328 536 Baqhapdj.exe 43 PID 536 wrote to memory of 2328 536 Baqhapdj.exe 43 PID 2328 wrote to memory of 2088 2328 Bfpmog32.exe 44 PID 2328 wrote to memory of 2088 2328 Bfpmog32.exe 44 PID 2328 wrote to memory of 2088 2328 Bfpmog32.exe 44 PID 2328 wrote to memory of 2088 2328 Bfpmog32.exe 44 PID 2088 wrote to memory of 2200 2088 Binikb32.exe 45 PID 2088 wrote to memory of 2200 2088 Binikb32.exe 45 PID 2088 wrote to memory of 2200 2088 Binikb32.exe 45 PID 2088 wrote to memory of 2200 2088 Binikb32.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\194f18acdb94c07f36a21bf2a80196365e58f758285a0fbcdfafbbbdae89b59bN.exe"C:\Users\Admin\AppData\Local\Temp\194f18acdb94c07f36a21bf2a80196365e58f758285a0fbcdfafbbbdae89b59bN.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\SysWOW64\Pegnglnm.exeC:\Windows\system32\Pegnglnm.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Windows\SysWOW64\Qgfkchmp.exeC:\Windows\system32\Qgfkchmp.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Windows\SysWOW64\Qcmkhi32.exeC:\Windows\system32\Qcmkhi32.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\SysWOW64\Qijdqp32.exeC:\Windows\system32\Qijdqp32.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\SysWOW64\Apclnj32.exeC:\Windows\system32\Apclnj32.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Windows\SysWOW64\Apfici32.exeC:\Windows\system32\Apfici32.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\SysWOW64\Abdeoe32.exeC:\Windows\system32\Abdeoe32.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Windows\SysWOW64\Aeenapck.exeC:\Windows\system32\Aeenapck.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Windows\SysWOW64\Apkbnibq.exeC:\Windows\system32\Apkbnibq.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Windows\SysWOW64\Aalofa32.exeC:\Windows\system32\Aalofa32.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\Windows\SysWOW64\Abkkpd32.exeC:\Windows\system32\Abkkpd32.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Windows\SysWOW64\Bldpiifb.exeC:\Windows\system32\Bldpiifb.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Windows\SysWOW64\Baqhapdj.exeC:\Windows\system32\Baqhapdj.exe14⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Windows\SysWOW64\Bfpmog32.exeC:\Windows\system32\Bfpmog32.exe15⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Windows\SysWOW64\Binikb32.exeC:\Windows\system32\Binikb32.exe16⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Windows\SysWOW64\Bmlbaqfh.exeC:\Windows\system32\Bmlbaqfh.exe17⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2200 -
C:\Windows\SysWOW64\Bgdfjfmi.exeC:\Windows\system32\Bgdfjfmi.exe18⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1632 -
C:\Windows\SysWOW64\Bpmkbl32.exeC:\Windows\system32\Bpmkbl32.exe19⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1524 -
C:\Windows\SysWOW64\Cbkgog32.exeC:\Windows\system32\Cbkgog32.exe20⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1924 -
C:\Windows\SysWOW64\Celpqbon.exeC:\Windows\system32\Celpqbon.exe21⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2460 -
C:\Windows\SysWOW64\Chjmmnnb.exeC:\Windows\system32\Chjmmnnb.exe22⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2324 -
C:\Windows\SysWOW64\Ckiiiine.exeC:\Windows\system32\Ckiiiine.exe23⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2440 -
C:\Windows\SysWOW64\Chmibmlo.exeC:\Windows\system32\Chmibmlo.exe24⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1688 -
C:\Windows\SysWOW64\Cgbfcjag.exeC:\Windows\system32\Cgbfcjag.exe25⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2180 -
C:\Windows\SysWOW64\Coindgbi.exeC:\Windows\system32\Coindgbi.exe26⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2052
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
182KB
MD5421452816f05495fdfbd3bb9851dd88f
SHA1fdfc1cb9631cbe47676f4a4dc4a8f9c3741efea9
SHA25606e86e1ea8b5707508bc78ee889fc9b843e13df5679cd19e9ffafa02c62b5723
SHA51276de162a6f5996d79d0d5f4604a04bd9de06869df3def8398e7f95e87d7f9c2b492c847e91c44a414d6558da486a8fa31da0798b806de9ca3c6a723e44ea7d84
-
Filesize
182KB
MD5b6353f86fd40cbc18776accb94e68f49
SHA1596864cb14d6f31204fb5e25154d63f9d3f4435a
SHA256f1b0e3b83c09300e31dfea0c06b7d521abd0dfcf95a29bf2807d802824849a60
SHA512401b752328600b5673d7061684d2958bce50c659334e44695c2dcb3381934e8d791fbeff4b7eb54469136741957e5ea54679f16339c3857b478a1c3ddd647a16
-
Filesize
182KB
MD5ac407dab4da6f76842ebed5db0ffe3a9
SHA14016e67b3b8d8bbe4b4673531c49e9872086227c
SHA25660a669aa3c273f7e6f9f9a613efa1a648b5485c3f73a94ded7aad39895cf952a
SHA5123308110e4da928df42c7ad94e1e3f4bcd6eae90aae6ebbd30d255df5fc00fe38a24b25d4d359cab8959f10fc13db4ca23985fc4017db17eb208b630bc12055c1
-
Filesize
182KB
MD5ff321ed381ad39f0863bd718148c1b32
SHA1734a96fbc4d42b61fae5aa15e9f66a47511058f6
SHA2564e5a820539d4c162013f22e6ab37b8c91820894e339e159bf87dfec816c5b344
SHA5121bd2987a9dfa0eb6afb17cf40624fbc51fc29917ab48fa4bc78e45131873d6f2183aafa226a2b91bfd7eed83547d0a0e45f63d8f848e32a7d3291bcd86ee5df8
-
Filesize
182KB
MD5d94bf21507eb986ebf505a038371a7ea
SHA15042b4870416700efccd0df73b49bbff9ba314fd
SHA2569277022817c83614d54b0be149da7a1274794c66f1c2ec1d0c63935cf66c866e
SHA5129e1659945ab38b7f7331ed36be461a9455f41f812021b42aebf2777f4d42eabdab374f209665cc51cceaba70ff3f6b4b380299812e64014d350656810ea2944c
-
Filesize
182KB
MD5692607402a5b78b46ee8eac110355e57
SHA1afdb6f7421ba4f56196be07828624f8d1217a8aa
SHA256a6fe74514881b5414d011e798dd8db75ad2d51c66d8f79f3e07e11de90016f2d
SHA5127fc416d40a7d700d50c190420ec3ac5af4a5502233233a00f2828089192953b7a0cbef94bde9e9e6e5318e974d39bee89b0729c29c2f93472159e17b52cffc77
-
Filesize
182KB
MD5cfac8f9bf91f47cf6e67ca033741bf00
SHA1db24bdba8912c0443e774a1cd6f6594b47835eee
SHA25625131ea0d2ec70376408df919887eb14f2aa28f96bc7f2a17c89e1ac71118ab2
SHA512d5edf6b7d5db8c3441bb3ff519342a66cb4286d4bc1a1382a86de19cc55308c89d0f6efbfcdbaf33e3bc7c336c5fc2306421233642bc72927ba7c4effe5fae7c
-
Filesize
182KB
MD54b6d409f0541bf9f05702c9c283beac5
SHA11d218ae63833be30c4c44e72865f0cdb0f42622b
SHA256c670f93a32daec708044bb8ec2e5c1ae4e2774f7522a12bd101522f120137a30
SHA5127305382d1e63b3c2093e4a7ac86bedb2f50e1b68e3c86abeeda35f6b860e2da8cf4174f579373746d2ed5f6d0966c577decf7664b9bdf11f2d5eafbcbfb9275d
-
Filesize
182KB
MD51092bb66d1384258461e0b837dd59a54
SHA1ad6e071150b4166b5581e1f90a2500bb171d9029
SHA256ff4a1b77f6243956c5fe70055d6279b453c0cd830ba65047dcb314d7ef42984d
SHA512145c5cda26e0fb159e3a2add3ad8e5a101cb3dc55657c61ba811a05ba6a4d019e95a1539b8803d43300dbf822cfe86c4b6f700b823727be00531870eae72eafe
-
Filesize
182KB
MD535c381bba759918e229c8c24dd70e491
SHA18c14ed308c02f3615e56d895b3bac429a6ac71db
SHA2560fbc55324d81280bf269e1bab693b3f82238b6804b8f97fe4fb6a9fe2cae73c4
SHA51242c34151396909b7541032a3affd0d15e46b6dd3abbbfcb569c65450277b84dc0b8af277bd840fb3762fe8aa25bd90f49855b0b0dfb144b8d82cd9a9d40738e9
-
Filesize
182KB
MD5b6525120480c043413f1b19b3a4cf0b0
SHA1794ae2048164886916d7b7b8eeb1fb30900eab4f
SHA256a2b5aadccdfec9bc9e319e0c803958e563e70ff4f20f51dc61f0ceea4123eee4
SHA5127d853c1114962ac73f56f86ea4564c30e44b07f696df5b51c6672a2101453523a1ce3e89484d23ca09e0490b887df9ba9ae02b054033f717fa069475869de485
-
Filesize
182KB
MD5b4921ec4cbf3fcded556917da040bba1
SHA1dc65a2e0f149fad35af86fbbaf4f813926de2538
SHA256b6807fdb2894bc38ed903421575e1abd982d2966c2848cc90eb5e4c648d76344
SHA5128eb69a8d39f9c7554b2a07a8f436142c8b112446ea5b93725d6cb1eb567f187be7085314bcaa5c741d70e244666bbf0eaa0e93122d38d849d12ff23862469b35
-
Filesize
182KB
MD5c1a654dadc9b152712897c550c117b1b
SHA1151b8d1a637aba25098ba295f7d8fafad56db67d
SHA256ed5d77d4f6c12e632f30ad9e8b09be7bfb04cfa0c61a4185febb26d5dcc7803f
SHA512b4da9d5b6849375b1e5e7e1a4cf5996a4b48f38dcf972acf72cf623f65c56a60a8ab0afe548fffe65c889dac2bd467f5045b09e844233b7435798f3c37fd2db4
-
Filesize
182KB
MD53f76581acb6d555a85b74b361094e412
SHA1dc9f35131dec05e453abbdec49affe6edffbaeb6
SHA2563507bd87c2e628b726139fc890e2435707daa1173cd50110881bb46d79028759
SHA512a925d85e28bba39eef70ce0bc2a7ffe8c73d140d8ba2262c162244f2b0a307fdab1818073d6510c6aae33e4735d1eab8aa03373eaa70bf5c3eba265a65773be3
-
Filesize
182KB
MD59a4deca8709f9392abd58887e19924b6
SHA1028150f86597024a5a69d6d5f6f226a4db1845f9
SHA256d600bf034dda3a651673672749e2f3508297b109964d2ee7171ff40c2749f096
SHA512f29f5a2c22cbd040d48062b20a6328fee60fd82b3988ce3fc3a293d3f0ca8ed1cc6962d00b2dfeb71d721e8de15f5b832f35a5f173006ad9c9fa6b5023ade87f
-
Filesize
182KB
MD5425136e93d751173b324ba773465f120
SHA14270ae37be45fff40967e3ec4ccb06bc89c565d4
SHA25678f7d42f16e92040527577d655215f6dbcd0b0c4869a813ca75717fc8efb77af
SHA5128af465b534529e1b499e0598ac6e53ac5d591bb6d9f8807be662b83333403293b948128e7ac67d291466df7f3c689666f263c5a64cddf39b18e9b42c606b28e3
-
Filesize
182KB
MD5975ae5c36aebd3ce44a8e5d59bb720d3
SHA1825cacefd4fe5ebda2f94a05d8ad4298c209cd30
SHA256ea2a19dced53502fa7b43a6e32b12cb1943d8b3b8b9254b2cf279c343139a614
SHA51218cd5c6f09fa255f77b28b666de485e5bdad67ff87c3cc5be44f229d17f84ec2be306d34decee802d31f79cd2bdb59e2a4b100005a6770635d6c63f3c2f95306
-
Filesize
182KB
MD5f1fb8c7a9fef161e08bb496c11511ac6
SHA11856aea07daabed765be82b0d1c2496444bbe059
SHA25682d9725b68fb119044aa9d3dfa9cc490ee925c866eba32518fd46bd5fc5cd2e6
SHA51293cef13b1ff99839c831669cf03539f68c7b2b49375ada8b4f78c5cbf804c187ccf13715974b5b01a4b2f163386c64d490077289e21104fc95138a443f02675f
-
Filesize
182KB
MD5ac0d34c8ebc1a9dffd0eeeae160a06a7
SHA1b3266eece8551db2251063415f5b684288de2723
SHA2569d82b8ca16310275a51f4e4f1a72cdae0ed61a8c18fe3b94b2f94a7f8937781b
SHA5127af8421e2b02f0e92025c7960cee66793c2c0fab1f95238366096132193e697f91e7d088eb31ecab3d7a3a24ed4cf1ec5b1d7d8866a21fb9de37936064e9fd28
-
Filesize
182KB
MD5fca91f16526a237dc86617c1b56050cb
SHA159e013ca78cfc5a59e3e6318f9791ae1edfff6f5
SHA2561bd01f300dd2539d38723afb51b38ffdb193c3ddc8364e4bddd9844ec4461912
SHA51229561ca58b6957cca0741150db0fd8a5b418a29db2000ac4549542c14367a9dd71315e40c413df46be2053aaba1255d39d08edde08d44a2e80947e72feb2b11c
-
Filesize
182KB
MD5dd024939cbaf50c1ae30dcd89829d4f1
SHA14ae11b418e80d881b646299becabd51028f08aa6
SHA256c52854301cff88d3b6c3fdfd80d0617e0bcb84ed7c6333c038fa72a55be63d70
SHA5125a7d5b4b0f315e737238d0afd10d5dad38cd0fe44198ef8858310387b7c2db4a1b3eb297232115a2f4535793bbc5ff65e4b153a80ca96556e09f4ed22caa0f32
-
Filesize
182KB
MD5ccf03ebe31c429886794b6d65b169cf7
SHA10a659e033536a8ebf4b4cc53969928b528f89b3a
SHA256ed50926386a72d5a996803e9b0b586da255172e5c704169776e3fa0c8a36dc5d
SHA5127f521e177828a4968bd8f9646456036d20c45e27dace8fcc478bd2de646ff734176124eef7991692893a39647e45695195b06bfbb9d1c0ca6a37be90b43a1db8
-
Filesize
182KB
MD5d5467d381e8ab6edf0040a4fa56ba79c
SHA1fd7696a07292575b78829fa3c13c45dd071fc4b9
SHA2567bebf643b30888f1e93e1f557d630ed70bea317459c2fcf2ac161a541f40820c
SHA512c7fad5e744bc358c898efeeaa27d1428643a7fc7236cd7dd63c53c329522d23abafc9541ca76d1e83092e138a2dd3c557804e4485189da238f4dd8315bd8d128
-
Filesize
182KB
MD57f46307d56d947b02f88b275af9ebb6f
SHA1ba192a6e7c33644bf948801ea23b8bbb6d6fc41a
SHA2565ac61cfceb090dbe2400717a5714a27888a7c08208510615166eaacc6e50d9ca
SHA51245920eff4b7982c5b318385a23b9ae824e135fb392a12b386649be8a0542bebc7d66c487f26183539404c59dcdd0a8a9ff99af49c377431edd2c37fb070397ae
-
Filesize
182KB
MD5df297dad03731a3b63b53f6abbc5a74d
SHA1abc89753625ee48e009994bd42d9b16098297d4d
SHA256210333ae94af55f533982e9e62b1ae913bcc9e78bd25259c1d30a0597639cad2
SHA512f560861880b3b024384f376c0534bc3f330339b43887d433a0864c7549a94b8d783cce0ab404ca96ca94a88a1cbf678181724b58a530ad4fb24143c41efcb963