Analysis
-
max time kernel
92s -
max time network
93s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-12-2024 01:13
Static task
static1
Behavioral task
behavioral1
Sample
0cfbe74729f81622000675d26bf02479a41b931f727465bba3ec6b136b65e398N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
0cfbe74729f81622000675d26bf02479a41b931f727465bba3ec6b136b65e398N.exe
Resource
win10v2004-20241007-en
General
-
Target
0cfbe74729f81622000675d26bf02479a41b931f727465bba3ec6b136b65e398N.exe
-
Size
101KB
-
MD5
7d64766e8d1d12589111e82e3b01ad60
-
SHA1
3fe1fab564617ed9b1ec1ed81593cc3fe5229cd3
-
SHA256
0cfbe74729f81622000675d26bf02479a41b931f727465bba3ec6b136b65e398
-
SHA512
5b7c7071afe220de9a285e222d68d9cb760f6b2f90c37807c63ecdca3e3174c308437a64a96b1092699e0a6548d09e00de3a96dd604c53422dfb6e84fe8e878a
-
SSDEEP
3072:gDdQbTnRmFZuYVE2lduXqbyu0sY7q5AnrHY4vDX:i6mF432C853Anr44vDX
Malware Config
Extracted
berbew
http://tat-neftbank.ru/kkq.php
http://tat-neftbank.ru/wcmd.htm
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 22 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dkkcge32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dmjocp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Deagdn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Deagdn32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dgbdlf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dmefhako.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Deokon32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dodbbdbb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Deokon32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ddonekbl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ddonekbl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dkifae32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dodbbdbb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dgbdlf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 0cfbe74729f81622000675d26bf02479a41b931f727465bba3ec6b136b65e398N.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dmefhako.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dhkjej32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dkifae32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dkkcge32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dmjocp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" 0cfbe74729f81622000675d26bf02479a41b931f727465bba3ec6b136b65e398N.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dhkjej32.exe -
Berbew family
-
Executes dropped EXE 11 IoCs
pid Process 4848 Dmefhako.exe 2996 Ddonekbl.exe 3692 Dhkjej32.exe 3012 Dkifae32.exe 4620 Dodbbdbb.exe 456 Deokon32.exe 1044 Dkkcge32.exe 792 Dmjocp32.exe 1984 Deagdn32.exe 964 Dgbdlf32.exe 3236 Dmllipeg.exe -
Drops file in System32 directory 33 IoCs
description ioc Process File created C:\Windows\SysWOW64\Dhkjej32.exe Ddonekbl.exe File created C:\Windows\SysWOW64\Dodbbdbb.exe Dkifae32.exe File opened for modification C:\Windows\SysWOW64\Dodbbdbb.exe Dkifae32.exe File opened for modification C:\Windows\SysWOW64\Dmjocp32.exe Dkkcge32.exe File created C:\Windows\SysWOW64\Kahdohfm.dll Dmjocp32.exe File created C:\Windows\SysWOW64\Dmefhako.exe 0cfbe74729f81622000675d26bf02479a41b931f727465bba3ec6b136b65e398N.exe File created C:\Windows\SysWOW64\Dkkcge32.exe Deokon32.exe File opened for modification C:\Windows\SysWOW64\Dkkcge32.exe Deokon32.exe File created C:\Windows\SysWOW64\Bobiobnp.dll Dkkcge32.exe File created C:\Windows\SysWOW64\Mjelcfha.dll Dmefhako.exe File created C:\Windows\SysWOW64\Jbpbca32.dll Ddonekbl.exe File created C:\Windows\SysWOW64\Amfoeb32.dll Dodbbdbb.exe File opened for modification C:\Windows\SysWOW64\Ddonekbl.exe Dmefhako.exe File created C:\Windows\SysWOW64\Fnmnbf32.dll Dkifae32.exe File created C:\Windows\SysWOW64\Pdheac32.dll Dhkjej32.exe File opened for modification C:\Windows\SysWOW64\Dkifae32.exe Dhkjej32.exe File opened for modification C:\Windows\SysWOW64\Deokon32.exe Dodbbdbb.exe File created C:\Windows\SysWOW64\Dgbdlf32.exe Deagdn32.exe File opened for modification C:\Windows\SysWOW64\Dmllipeg.exe Dgbdlf32.exe File created C:\Windows\SysWOW64\Kngpec32.dll Dgbdlf32.exe File created C:\Windows\SysWOW64\Gidbim32.dll 0cfbe74729f81622000675d26bf02479a41b931f727465bba3ec6b136b65e398N.exe File created C:\Windows\SysWOW64\Dkifae32.exe Dhkjej32.exe File created C:\Windows\SysWOW64\Jcbdhp32.dll Deokon32.exe File opened for modification C:\Windows\SysWOW64\Deagdn32.exe Dmjocp32.exe File created C:\Windows\SysWOW64\Gfghpl32.dll Deagdn32.exe File opened for modification C:\Windows\SysWOW64\Dmefhako.exe 0cfbe74729f81622000675d26bf02479a41b931f727465bba3ec6b136b65e398N.exe File created C:\Windows\SysWOW64\Deokon32.exe Dodbbdbb.exe File created C:\Windows\SysWOW64\Deagdn32.exe Dmjocp32.exe File opened for modification C:\Windows\SysWOW64\Dgbdlf32.exe Deagdn32.exe File created C:\Windows\SysWOW64\Dmllipeg.exe Dgbdlf32.exe File opened for modification C:\Windows\SysWOW64\Dhkjej32.exe Ddonekbl.exe File created C:\Windows\SysWOW64\Dmjocp32.exe Dkkcge32.exe File created C:\Windows\SysWOW64\Ddonekbl.exe Dmefhako.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2928 3236 WerFault.exe 93 -
System Location Discovery: System Language Discovery 1 TTPs 12 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dkifae32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dmjocp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Deagdn32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dgbdlf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Deokon32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dkkcge32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dmllipeg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0cfbe74729f81622000675d26bf02479a41b931f727465bba3ec6b136b65e398N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dmefhako.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ddonekbl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dhkjej32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dodbbdbb.exe -
Modifies registry class 36 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} 0cfbe74729f81622000675d26bf02479a41b931f727465bba3ec6b136b65e398N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gidbim32.dll" 0cfbe74729f81622000675d26bf02479a41b931f727465bba3ec6b136b65e398N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dkifae32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Deokon32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dmjocp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node 0cfbe74729f81622000675d26bf02479a41b931f727465bba3ec6b136b65e398N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" 0cfbe74729f81622000675d26bf02479a41b931f727465bba3ec6b136b65e398N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dodbbdbb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Amfoeb32.dll" Dodbbdbb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dgbdlf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 0cfbe74729f81622000675d26bf02479a41b931f727465bba3ec6b136b65e398N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ddonekbl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dhkjej32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dodbbdbb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gfghpl32.dll" Deagdn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID 0cfbe74729f81622000675d26bf02479a41b931f727465bba3ec6b136b65e398N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dmefhako.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dhkjej32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kahdohfm.dll" Dmjocp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Deagdn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pdheac32.dll" Dhkjej32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dkifae32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fnmnbf32.dll" Dkifae32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dkkcge32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kngpec32.dll" Dgbdlf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mjelcfha.dll" Dmefhako.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jcbdhp32.dll" Deokon32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Deagdn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dgbdlf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dmefhako.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ddonekbl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bobiobnp.dll" Dkkcge32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jbpbca32.dll" Ddonekbl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Deokon32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dkkcge32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dmjocp32.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 1928 wrote to memory of 4848 1928 0cfbe74729f81622000675d26bf02479a41b931f727465bba3ec6b136b65e398N.exe 83 PID 1928 wrote to memory of 4848 1928 0cfbe74729f81622000675d26bf02479a41b931f727465bba3ec6b136b65e398N.exe 83 PID 1928 wrote to memory of 4848 1928 0cfbe74729f81622000675d26bf02479a41b931f727465bba3ec6b136b65e398N.exe 83 PID 4848 wrote to memory of 2996 4848 Dmefhako.exe 84 PID 4848 wrote to memory of 2996 4848 Dmefhako.exe 84 PID 4848 wrote to memory of 2996 4848 Dmefhako.exe 84 PID 2996 wrote to memory of 3692 2996 Ddonekbl.exe 85 PID 2996 wrote to memory of 3692 2996 Ddonekbl.exe 85 PID 2996 wrote to memory of 3692 2996 Ddonekbl.exe 85 PID 3692 wrote to memory of 3012 3692 Dhkjej32.exe 86 PID 3692 wrote to memory of 3012 3692 Dhkjej32.exe 86 PID 3692 wrote to memory of 3012 3692 Dhkjej32.exe 86 PID 3012 wrote to memory of 4620 3012 Dkifae32.exe 87 PID 3012 wrote to memory of 4620 3012 Dkifae32.exe 87 PID 3012 wrote to memory of 4620 3012 Dkifae32.exe 87 PID 4620 wrote to memory of 456 4620 Dodbbdbb.exe 88 PID 4620 wrote to memory of 456 4620 Dodbbdbb.exe 88 PID 4620 wrote to memory of 456 4620 Dodbbdbb.exe 88 PID 456 wrote to memory of 1044 456 Deokon32.exe 89 PID 456 wrote to memory of 1044 456 Deokon32.exe 89 PID 456 wrote to memory of 1044 456 Deokon32.exe 89 PID 1044 wrote to memory of 792 1044 Dkkcge32.exe 90 PID 1044 wrote to memory of 792 1044 Dkkcge32.exe 90 PID 1044 wrote to memory of 792 1044 Dkkcge32.exe 90 PID 792 wrote to memory of 1984 792 Dmjocp32.exe 91 PID 792 wrote to memory of 1984 792 Dmjocp32.exe 91 PID 792 wrote to memory of 1984 792 Dmjocp32.exe 91 PID 1984 wrote to memory of 964 1984 Deagdn32.exe 92 PID 1984 wrote to memory of 964 1984 Deagdn32.exe 92 PID 1984 wrote to memory of 964 1984 Deagdn32.exe 92 PID 964 wrote to memory of 3236 964 Dgbdlf32.exe 93 PID 964 wrote to memory of 3236 964 Dgbdlf32.exe 93 PID 964 wrote to memory of 3236 964 Dgbdlf32.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\0cfbe74729f81622000675d26bf02479a41b931f727465bba3ec6b136b65e398N.exe"C:\Users\Admin\AppData\Local\Temp\0cfbe74729f81622000675d26bf02479a41b931f727465bba3ec6b136b65e398N.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Windows\SysWOW64\Dmefhako.exeC:\Windows\system32\Dmefhako.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Windows\SysWOW64\Ddonekbl.exeC:\Windows\system32\Ddonekbl.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Windows\SysWOW64\Dhkjej32.exeC:\Windows\system32\Dhkjej32.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3692 -
C:\Windows\SysWOW64\Dkifae32.exeC:\Windows\system32\Dkifae32.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Windows\SysWOW64\Dodbbdbb.exeC:\Windows\system32\Dodbbdbb.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4620 -
C:\Windows\SysWOW64\Deokon32.exeC:\Windows\system32\Deokon32.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:456 -
C:\Windows\SysWOW64\Dkkcge32.exeC:\Windows\system32\Dkkcge32.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Windows\SysWOW64\Dmjocp32.exeC:\Windows\system32\Dmjocp32.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:792 -
C:\Windows\SysWOW64\Deagdn32.exeC:\Windows\system32\Deagdn32.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\SysWOW64\Dgbdlf32.exeC:\Windows\system32\Dgbdlf32.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Windows\SysWOW64\Dmllipeg.exeC:\Windows\system32\Dmllipeg.exe12⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3236 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3236 -s 39613⤵
- Program crash
PID:2928
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3236 -ip 32361⤵PID:3740
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
101KB
MD5097b07f5adf01e160d30862502f63709
SHA1d89d87dfd37b229f8ba8a1c23947a97b258f02c4
SHA2561d5fd17a8cd5ee947982714b1c3c00ff97fade26da4be8bc2619e4c31ce1d782
SHA512bfdbffc8a8f810f60149597e455e59a3eb90aecc1ab815e03f675ebe8911d17e162687ee39f9a26a464d98a037a311023cf346304d6539bfabfd7d28ed03c90c
-
Filesize
101KB
MD55f549c180131eb419ade8433a7b68e0b
SHA19947f02f22e67bc5c1e25e1466dade8165adaae3
SHA25684da38f489c234255425818535a2851959ec784f6c4bd9f5f94ec20f008da0a9
SHA5125f2eff8454fa3adfd2f7e1d499d0f4027e567881b9fffbe45f6974034b2bf059c661c567495a59867f42158091b8f5b0710e5fa835fbc9cf8fbd6e2927240c9f
-
Filesize
101KB
MD50e64b6d6f6718957d18f0e515180b462
SHA1038f413b6049813903c8c5837ff16637e62e83a1
SHA256957e158a51002f95a25ec5672d13606fd8691cc1a552a85da818a346acc16660
SHA512b2a2b830e263ede5981338831e1331b379372ae8af72277df17e672b8e1ef736f5ea6ac1e291877d4d9cd423a91141bbf50b27a2bd941b05558a5e7be4785cd8
-
Filesize
101KB
MD56e8a89b63c59a18f11e03581b9e330dc
SHA1cc7dc7d365d4e5c3b5047508d14d2716fd28807c
SHA256f9ae31f35b7dd83305af48e5f5b3d0e264d62c1d4b9e39ea4efb07480b69e4d3
SHA512e1172b84234bcebfa60f768dd63af54471acb2776ddcae0d991e0962405cb5053a5552b286ce1aea2250fdd06aa513dec5effc71db29334aca1902100125b2af
-
Filesize
101KB
MD51ce76ecb9a91c29e287eaa08153fe78f
SHA11a03b70d2ca784537ef954485bc4d76d435f35cd
SHA256dfc19846c746c165b80610172212d7012372c2946af364d89d8a9f39654d97fa
SHA5128e6e75ed756465cabd9a591c36b12e92e7f59acfc0271f9cb135de7bf8eac81b89b6be352532bda143740bfb5508d33479f796828372813762d0b3dfb3311cae
-
Filesize
101KB
MD52c7684e87451110206c97cc4016d0989
SHA13d09b9cefcb74fdb73106ea6e960a136cf26c5ba
SHA25664c49ee1d1d5158aa6dce651c9386a192bc5e2c633c5e74157c3cab9c75a782b
SHA512e1f2dfef122a47a21c8ea95af46ccf8056f30c294699c90d92fb44ea3d1ccdb7809861d26227e727b8fde5cecd2cd0c1f6ae6477b5e051cd9365ab95cda501aa
-
Filesize
101KB
MD5018332d6f3ab656feeb62ff9b39aee25
SHA13b45f1fab00f1bda276495a2b692d1c4e71d0c4a
SHA256ba1d32e6070b8921a61cf2e93d21c56195a131ae37620e19b378b01a6a2b5cef
SHA5120823a74cbe8d0cc0c4d4150f18185185b690d9c6170061d570212a62bc273a69cbb6b4c9afadd53d903799787e81299f1f3db5a905680119adf58968de8a45c6
-
Filesize
101KB
MD556cf888477c3c3b1b1e4921eadfab5da
SHA1a8855cd82b32e8c204b3b6513e18d81479d22627
SHA25613ab51a4fde7cf7d7a3ce438d0127eccbef5283910f4c62b630055188d4c9524
SHA512d847063f8e6b18ee643a0a9420fff5caffe3305f6c4b6f28f3b9c901dd5254a9916a7fb8d19937faf44ce92f13896453d75ebe74d6804e3846e28c59cf1ad584
-
Filesize
101KB
MD54fbe7cc0fd3d87e5df72d7fcc0cdf3f1
SHA155ae9df9911d8af1c7a5fc1d6c1086fdc603ec71
SHA2560889b102e47ea87837ef1aff567905b20ae1c5a5a70543bd3bbc1f98318f675a
SHA512e42973fa022198452dd8e139a3a566fcc5ff10925559a4d054e589954cc301afbdf534b0e510d0d6687a4f841153544b2ffaaae4492d87f9a819748a40262e37
-
Filesize
101KB
MD552f7feb484bf7808b0b12aea6b4eda9f
SHA19455aad1e5991bcb7c3b5ddf36c10bdeaf949155
SHA256c122d18ded8386c8cc66eb6c6a5ea3f4a56d5fcf78a0de50618a23d312aeac67
SHA512ee2109f9d1df179a2724d8ec4f4867b961686b51b6277fc21f2a1fc476119be76caaf63ae36ee0a30d25c9facdcdae8ec3bcd0f09cc06f5f44c00498dcc8e195
-
Filesize
101KB
MD59a94f2d31558cfb79f9eb6e558bcc595
SHA13109d9376c990d81a27b90d905bce0f3c779774b
SHA256215fbefaa45641ea9f7ee2a62607c4d7c85656c47cf0a9183dd7682dd91b2ec9
SHA5125377bee51b16a85588bde318ead318b59e553d5c6d6f4e58f283513c54f8afec71352f49e4bd4cd8e7fa331e6aff1b0131d2f13f621632f6ea79105d76106056