Analysis
-
max time kernel
111s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
08-12-2024 01:30
Static task
static1
Behavioral task
behavioral1
Sample
2a794789e75f681866b3a5be5cf0b4167e0f458f79187c38f48d4415c50f8e06N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2a794789e75f681866b3a5be5cf0b4167e0f458f79187c38f48d4415c50f8e06N.exe
Resource
win10v2004-20241007-en
General
-
Target
2a794789e75f681866b3a5be5cf0b4167e0f458f79187c38f48d4415c50f8e06N.exe
-
Size
80KB
-
MD5
5c4b18898418bc88ce67b904b696a4c0
-
SHA1
dd15862b2c636f6aa8b8a11cef89f872fbf0a455
-
SHA256
2a794789e75f681866b3a5be5cf0b4167e0f458f79187c38f48d4415c50f8e06
-
SHA512
8685721d2593210d404350eebe0b32487eedd3ee471805ef5df772ccdf30349c5db2242ac4367f3b857407dac0f862503875a03031c8e4469e938e99f9ef0505
-
SSDEEP
1536:flKgFyc/oQZ3Ag5fnt392LjCYrum8SPGC:tKg/oM35fntejVT8S5
Malware Config
Extracted
berbew
http://crutop.nu/index.php
http://crutop.ru/index.php
http://mazafaka.ru/index.php
http://color-bank.ru/index.php
http://asechka.ru/index.php
http://trojan.ru/index.php
http://fuck.ru/index.php
http://goldensand.ru/index.php
http://filesearch.ru/index.php
http://devx.nm.ru/index.php
http://ros-neftbank.ru/index.php
http://lovingod.host.sk/index.php
http://www.redline.ru/index.php
http://cvv.ru/index.php
http://hackers.lv/index.php
http://fethard.biz/index.php
http://ldark.nm.ru/index.htm
http://gaz-prom.ru/index.htm
http://promo.ru/index.htm
http://potleaf.chat.ru/index.htm
http://kadet.ru/index.htm
http://cvv.ru/index.htm
http://crutop.nu/index.htm
http://crutop.ru/index.htm
http://mazafaka.ru/index.htm
http://xware.cjb.net/index.htm
http://konfiskat.org/index.htm
http://parex-bank.ru/index.htm
http://kidos-bank.ru/index.htm
http://kavkaz.ru/index.htm
http://fethard.biz/index.htm
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 54 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bmgifa32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bbikig32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cbkgog32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cbkgog32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bmgifa32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bkkioeig.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Blobmm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Chjmmnnb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bdaabk32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Baealp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Capdpcge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Clhecl32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aejglo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bobleeef.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Beldao32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Beldao32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bjiljf32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Beggec32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ajdcofop.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cdamao32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bmnofp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Aejglo32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bjiljf32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Clhecl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ceqjla32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bdcnhk32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bmnofp32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ciepkajj.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Chjmmnnb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Clfhml32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cdamao32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Blobmm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Beggec32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ccnddg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Caenkc32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ccnddg32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bdaabk32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bknfeege.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bbikig32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bknfeege.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ajdcofop.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bdcnhk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ciepkajj.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ceqjla32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bobleeef.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bkkioeig.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cpohhk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" 2a794789e75f681866b3a5be5cf0b4167e0f458f79187c38f48d4415c50f8e06N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cpohhk32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Capdpcge.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 2a794789e75f681866b3a5be5cf0b4167e0f458f79187c38f48d4415c50f8e06N.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Clfhml32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Caenkc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Baealp32.exe -
Berbew family
-
Executes dropped EXE 27 IoCs
pid Process 2944 Ajdcofop.exe 2960 Aejglo32.exe 2832 Bobleeef.exe 2808 Beldao32.exe 2756 Bjiljf32.exe 2780 Bmgifa32.exe 1352 Bdaabk32.exe 2468 Bkkioeig.exe 2684 Baealp32.exe 2064 Bdcnhk32.exe 3036 Bknfeege.exe 1256 Blobmm32.exe 2908 Bbikig32.exe 2372 Beggec32.exe 2300 Bmnofp32.exe 1040 Cbkgog32.exe 2056 Ciepkajj.exe 824 Cpohhk32.exe 2636 Ccnddg32.exe 2008 Capdpcge.exe 1500 Chjmmnnb.exe 2928 Clfhml32.exe 2656 Cdamao32.exe 548 Clhecl32.exe 1964 Caenkc32.exe 2856 Ceqjla32.exe 2984 Coindgbi.exe -
Loads dropped DLL 54 IoCs
pid Process 1096 2a794789e75f681866b3a5be5cf0b4167e0f458f79187c38f48d4415c50f8e06N.exe 1096 2a794789e75f681866b3a5be5cf0b4167e0f458f79187c38f48d4415c50f8e06N.exe 2944 Ajdcofop.exe 2944 Ajdcofop.exe 2960 Aejglo32.exe 2960 Aejglo32.exe 2832 Bobleeef.exe 2832 Bobleeef.exe 2808 Beldao32.exe 2808 Beldao32.exe 2756 Bjiljf32.exe 2756 Bjiljf32.exe 2780 Bmgifa32.exe 2780 Bmgifa32.exe 1352 Bdaabk32.exe 1352 Bdaabk32.exe 2468 Bkkioeig.exe 2468 Bkkioeig.exe 2684 Baealp32.exe 2684 Baealp32.exe 2064 Bdcnhk32.exe 2064 Bdcnhk32.exe 3036 Bknfeege.exe 3036 Bknfeege.exe 1256 Blobmm32.exe 1256 Blobmm32.exe 2908 Bbikig32.exe 2908 Bbikig32.exe 2372 Beggec32.exe 2372 Beggec32.exe 2300 Bmnofp32.exe 2300 Bmnofp32.exe 1040 Cbkgog32.exe 1040 Cbkgog32.exe 2056 Ciepkajj.exe 2056 Ciepkajj.exe 824 Cpohhk32.exe 824 Cpohhk32.exe 2636 Ccnddg32.exe 2636 Ccnddg32.exe 2008 Capdpcge.exe 2008 Capdpcge.exe 1500 Chjmmnnb.exe 1500 Chjmmnnb.exe 2928 Clfhml32.exe 2928 Clfhml32.exe 2656 Cdamao32.exe 2656 Cdamao32.exe 548 Clhecl32.exe 548 Clhecl32.exe 1964 Caenkc32.exe 1964 Caenkc32.exe 2856 Ceqjla32.exe 2856 Ceqjla32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\Bmgifa32.exe Bjiljf32.exe File opened for modification C:\Windows\SysWOW64\Clfhml32.exe Chjmmnnb.exe File created C:\Windows\SysWOW64\Caenkc32.exe Clhecl32.exe File created C:\Windows\SysWOW64\Ceqjla32.exe Caenkc32.exe File opened for modification C:\Windows\SysWOW64\Beldao32.exe Bobleeef.exe File created C:\Windows\SysWOW64\Kipdmjne.dll Beldao32.exe File created C:\Windows\SysWOW64\Bknfeege.exe Bdcnhk32.exe File opened for modification C:\Windows\SysWOW64\Ciepkajj.exe Cbkgog32.exe File created C:\Windows\SysWOW64\Cmfjgc32.dll Ccnddg32.exe File opened for modification C:\Windows\SysWOW64\Clhecl32.exe Cdamao32.exe File created C:\Windows\SysWOW64\Idcnlffk.dll Bdcnhk32.exe File created C:\Windows\SysWOW64\Ciepkajj.exe Cbkgog32.exe File opened for modification C:\Windows\SysWOW64\Ccnddg32.exe Cpohhk32.exe File created C:\Windows\SysWOW64\Ohodgb32.dll Ceqjla32.exe File opened for modification C:\Windows\SysWOW64\Capdpcge.exe Ccnddg32.exe File created C:\Windows\SysWOW64\Aejglo32.exe Ajdcofop.exe File created C:\Windows\SysWOW64\Beldao32.exe Bobleeef.exe File created C:\Windows\SysWOW64\Bijpeihq.dll Bmgifa32.exe File created C:\Windows\SysWOW64\Mjhdbb32.dll Bkkioeig.exe File created C:\Windows\SysWOW64\Pdgmbedh.dll Blobmm32.exe File created C:\Windows\SysWOW64\Madcho32.dll Cpohhk32.exe File created C:\Windows\SysWOW64\Gfbejp32.dll 2a794789e75f681866b3a5be5cf0b4167e0f458f79187c38f48d4415c50f8e06N.exe File created C:\Windows\SysWOW64\Bdaabk32.exe Bmgifa32.exe File opened for modification C:\Windows\SysWOW64\Bbikig32.exe Blobmm32.exe File opened for modification C:\Windows\SysWOW64\Caenkc32.exe Clhecl32.exe File opened for modification C:\Windows\SysWOW64\Ceqjla32.exe Caenkc32.exe File created C:\Windows\SysWOW64\Djenbd32.dll Caenkc32.exe File opened for modification C:\Windows\SysWOW64\Ajdcofop.exe 2a794789e75f681866b3a5be5cf0b4167e0f458f79187c38f48d4415c50f8e06N.exe File opened for modification C:\Windows\SysWOW64\Baealp32.exe Bkkioeig.exe File opened for modification C:\Windows\SysWOW64\Bdcnhk32.exe Baealp32.exe File opened for modification C:\Windows\SysWOW64\Cbkgog32.exe Bmnofp32.exe File created C:\Windows\SysWOW64\Lfehem32.dll Cdamao32.exe File created C:\Windows\SysWOW64\Ajdcofop.exe 2a794789e75f681866b3a5be5cf0b4167e0f458f79187c38f48d4415c50f8e06N.exe File opened for modification C:\Windows\SysWOW64\Bobleeef.exe Aejglo32.exe File created C:\Windows\SysWOW64\Mkhanokh.dll Aejglo32.exe File created C:\Windows\SysWOW64\Coindgbi.exe Ceqjla32.exe File created C:\Windows\SysWOW64\Bobleeef.exe Aejglo32.exe File opened for modification C:\Windows\SysWOW64\Blobmm32.exe Bknfeege.exe File opened for modification C:\Windows\SysWOW64\Cdamao32.exe Clfhml32.exe File created C:\Windows\SysWOW64\Hakhbifq.dll Clhecl32.exe File opened for modification C:\Windows\SysWOW64\Aejglo32.exe Ajdcofop.exe File created C:\Windows\SysWOW64\Eonkgg32.dll Bobleeef.exe File created C:\Windows\SysWOW64\Cmpbigma.dll Bjiljf32.exe File created C:\Windows\SysWOW64\Bdcnhk32.exe Baealp32.exe File created C:\Windows\SysWOW64\Blobmm32.exe Bknfeege.exe File created C:\Windows\SysWOW64\Cdamao32.exe Clfhml32.exe File opened for modification C:\Windows\SysWOW64\Bkkioeig.exe Bdaabk32.exe File created C:\Windows\SysWOW64\Fbflbd32.dll Bdaabk32.exe File opened for modification C:\Windows\SysWOW64\Cpohhk32.exe Ciepkajj.exe File created C:\Windows\SysWOW64\Cnfnahkp.dll Ciepkajj.exe File created C:\Windows\SysWOW64\Chjmmnnb.exe Capdpcge.exe File created C:\Windows\SysWOW64\Befima32.dll Ajdcofop.exe File opened for modification C:\Windows\SysWOW64\Bjiljf32.exe Beldao32.exe File opened for modification C:\Windows\SysWOW64\Bmgifa32.exe Bjiljf32.exe File created C:\Windows\SysWOW64\Bkkioeig.exe Bdaabk32.exe File created C:\Windows\SysWOW64\Podpaa32.dll Baealp32.exe File created C:\Windows\SysWOW64\Jlmhimhb.dll Bmnofp32.exe File opened for modification C:\Windows\SysWOW64\Bdaabk32.exe Bmgifa32.exe File created C:\Windows\SysWOW64\Bmnofp32.exe Beggec32.exe File created C:\Windows\SysWOW64\Hjlkkhne.dll Chjmmnnb.exe File created C:\Windows\SysWOW64\Niienepq.dll Clfhml32.exe File opened for modification C:\Windows\SysWOW64\Coindgbi.exe Ceqjla32.exe File created C:\Windows\SysWOW64\Baealp32.exe Bkkioeig.exe File created C:\Windows\SysWOW64\Kbmamh32.dll Bbikig32.exe -
System Location Discovery: System Language Discovery 1 TTPs 28 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Chjmmnnb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Clfhml32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cdamao32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Aejglo32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bmgifa32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bkkioeig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bdcnhk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ciepkajj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cpohhk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Beldao32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bdaabk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bbikig32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Beggec32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cbkgog32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ceqjla32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ccnddg32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ajdcofop.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bjiljf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2a794789e75f681866b3a5be5cf0b4167e0f458f79187c38f48d4415c50f8e06N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Blobmm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Coindgbi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Baealp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bmnofp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bobleeef.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bknfeege.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Capdpcge.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Clhecl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Caenkc32.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} 2a794789e75f681866b3a5be5cf0b4167e0f458f79187c38f48d4415c50f8e06N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Aejglo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bjiljf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bmgifa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Edalmn32.dll" Beggec32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cnfnahkp.dll" Ciepkajj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" 2a794789e75f681866b3a5be5cf0b4167e0f458f79187c38f48d4415c50f8e06N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mkhanokh.dll" Aejglo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Beldao32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Baealp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cmfjgc32.dll" Ccnddg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bdaabk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Idcnlffk.dll" Bdcnhk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cbkgog32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ajdcofop.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Aejglo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Podpaa32.dll" Baealp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ljkaejba.dll" Bknfeege.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bbikig32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cpohhk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Chjmmnnb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lfehem32.dll" Cdamao32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Clhecl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hakhbifq.dll" Clhecl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Caenkc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Befima32.dll" Ajdcofop.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kbmamh32.dll" Bbikig32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ciepkajj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Clmkgm32.dll" Capdpcge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hjlkkhne.dll" Chjmmnnb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Chjmmnnb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Clhecl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ceqjla32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mjhdbb32.dll" Bkkioeig.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bkkioeig.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ccnddg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID 2a794789e75f681866b3a5be5cf0b4167e0f458f79187c38f48d4415c50f8e06N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kipdmjne.dll" Beldao32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bmgifa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fbflbd32.dll" Bdaabk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Blobmm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Beggec32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bmnofp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bmnofp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Niienepq.dll" Clfhml32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Clfhml32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eonkgg32.dll" Bobleeef.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pdgmbedh.dll" Blobmm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ccnddg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Capdpcge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bijpeihq.dll" Bmgifa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bknfeege.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bbikig32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ajdcofop.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bobleeef.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Baealp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jlmhimhb.dll" Bmnofp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ciepkajj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cpohhk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Madcho32.dll" Cpohhk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Caenkc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Beggec32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Djenbd32.dll" Caenkc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bjiljf32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1096 wrote to memory of 2944 1096 2a794789e75f681866b3a5be5cf0b4167e0f458f79187c38f48d4415c50f8e06N.exe 30 PID 1096 wrote to memory of 2944 1096 2a794789e75f681866b3a5be5cf0b4167e0f458f79187c38f48d4415c50f8e06N.exe 30 PID 1096 wrote to memory of 2944 1096 2a794789e75f681866b3a5be5cf0b4167e0f458f79187c38f48d4415c50f8e06N.exe 30 PID 1096 wrote to memory of 2944 1096 2a794789e75f681866b3a5be5cf0b4167e0f458f79187c38f48d4415c50f8e06N.exe 30 PID 2944 wrote to memory of 2960 2944 Ajdcofop.exe 31 PID 2944 wrote to memory of 2960 2944 Ajdcofop.exe 31 PID 2944 wrote to memory of 2960 2944 Ajdcofop.exe 31 PID 2944 wrote to memory of 2960 2944 Ajdcofop.exe 31 PID 2960 wrote to memory of 2832 2960 Aejglo32.exe 32 PID 2960 wrote to memory of 2832 2960 Aejglo32.exe 32 PID 2960 wrote to memory of 2832 2960 Aejglo32.exe 32 PID 2960 wrote to memory of 2832 2960 Aejglo32.exe 32 PID 2832 wrote to memory of 2808 2832 Bobleeef.exe 33 PID 2832 wrote to memory of 2808 2832 Bobleeef.exe 33 PID 2832 wrote to memory of 2808 2832 Bobleeef.exe 33 PID 2832 wrote to memory of 2808 2832 Bobleeef.exe 33 PID 2808 wrote to memory of 2756 2808 Beldao32.exe 34 PID 2808 wrote to memory of 2756 2808 Beldao32.exe 34 PID 2808 wrote to memory of 2756 2808 Beldao32.exe 34 PID 2808 wrote to memory of 2756 2808 Beldao32.exe 34 PID 2756 wrote to memory of 2780 2756 Bjiljf32.exe 35 PID 2756 wrote to memory of 2780 2756 Bjiljf32.exe 35 PID 2756 wrote to memory of 2780 2756 Bjiljf32.exe 35 PID 2756 wrote to memory of 2780 2756 Bjiljf32.exe 35 PID 2780 wrote to memory of 1352 2780 Bmgifa32.exe 36 PID 2780 wrote to memory of 1352 2780 Bmgifa32.exe 36 PID 2780 wrote to memory of 1352 2780 Bmgifa32.exe 36 PID 2780 wrote to memory of 1352 2780 Bmgifa32.exe 36 PID 1352 wrote to memory of 2468 1352 Bdaabk32.exe 37 PID 1352 wrote to memory of 2468 1352 Bdaabk32.exe 37 PID 1352 wrote to memory of 2468 1352 Bdaabk32.exe 37 PID 1352 wrote to memory of 2468 1352 Bdaabk32.exe 37 PID 2468 wrote to memory of 2684 2468 Bkkioeig.exe 38 PID 2468 wrote to memory of 2684 2468 Bkkioeig.exe 38 PID 2468 wrote to memory of 2684 2468 Bkkioeig.exe 38 PID 2468 wrote to memory of 2684 2468 Bkkioeig.exe 38 PID 2684 wrote to memory of 2064 2684 Baealp32.exe 39 PID 2684 wrote to memory of 2064 2684 Baealp32.exe 39 PID 2684 wrote to memory of 2064 2684 Baealp32.exe 39 PID 2684 wrote to memory of 2064 2684 Baealp32.exe 39 PID 2064 wrote to memory of 3036 2064 Bdcnhk32.exe 40 PID 2064 wrote to memory of 3036 2064 Bdcnhk32.exe 40 PID 2064 wrote to memory of 3036 2064 Bdcnhk32.exe 40 PID 2064 wrote to memory of 3036 2064 Bdcnhk32.exe 40 PID 3036 wrote to memory of 1256 3036 Bknfeege.exe 41 PID 3036 wrote to memory of 1256 3036 Bknfeege.exe 41 PID 3036 wrote to memory of 1256 3036 Bknfeege.exe 41 PID 3036 wrote to memory of 1256 3036 Bknfeege.exe 41 PID 1256 wrote to memory of 2908 1256 Blobmm32.exe 42 PID 1256 wrote to memory of 2908 1256 Blobmm32.exe 42 PID 1256 wrote to memory of 2908 1256 Blobmm32.exe 42 PID 1256 wrote to memory of 2908 1256 Blobmm32.exe 42 PID 2908 wrote to memory of 2372 2908 Bbikig32.exe 43 PID 2908 wrote to memory of 2372 2908 Bbikig32.exe 43 PID 2908 wrote to memory of 2372 2908 Bbikig32.exe 43 PID 2908 wrote to memory of 2372 2908 Bbikig32.exe 43 PID 2372 wrote to memory of 2300 2372 Beggec32.exe 44 PID 2372 wrote to memory of 2300 2372 Beggec32.exe 44 PID 2372 wrote to memory of 2300 2372 Beggec32.exe 44 PID 2372 wrote to memory of 2300 2372 Beggec32.exe 44 PID 2300 wrote to memory of 1040 2300 Bmnofp32.exe 45 PID 2300 wrote to memory of 1040 2300 Bmnofp32.exe 45 PID 2300 wrote to memory of 1040 2300 Bmnofp32.exe 45 PID 2300 wrote to memory of 1040 2300 Bmnofp32.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\2a794789e75f681866b3a5be5cf0b4167e0f458f79187c38f48d4415c50f8e06N.exe"C:\Users\Admin\AppData\Local\Temp\2a794789e75f681866b3a5be5cf0b4167e0f458f79187c38f48d4415c50f8e06N.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Windows\SysWOW64\Ajdcofop.exeC:\Windows\system32\Ajdcofop.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Windows\SysWOW64\Aejglo32.exeC:\Windows\system32\Aejglo32.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Windows\SysWOW64\Bobleeef.exeC:\Windows\system32\Bobleeef.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Windows\SysWOW64\Beldao32.exeC:\Windows\system32\Beldao32.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\SysWOW64\Bjiljf32.exeC:\Windows\system32\Bjiljf32.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\SysWOW64\Bmgifa32.exeC:\Windows\system32\Bmgifa32.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\SysWOW64\Bdaabk32.exeC:\Windows\system32\Bdaabk32.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Windows\SysWOW64\Bkkioeig.exeC:\Windows\system32\Bkkioeig.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Windows\SysWOW64\Baealp32.exeC:\Windows\system32\Baealp32.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\SysWOW64\Bdcnhk32.exeC:\Windows\system32\Bdcnhk32.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Windows\SysWOW64\Bknfeege.exeC:\Windows\system32\Bknfeege.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Windows\SysWOW64\Blobmm32.exeC:\Windows\system32\Blobmm32.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Windows\SysWOW64\Bbikig32.exeC:\Windows\system32\Bbikig32.exe14⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Windows\SysWOW64\Beggec32.exeC:\Windows\system32\Beggec32.exe15⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Windows\SysWOW64\Bmnofp32.exeC:\Windows\system32\Bmnofp32.exe16⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\SysWOW64\Cbkgog32.exeC:\Windows\system32\Cbkgog32.exe17⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1040 -
C:\Windows\SysWOW64\Ciepkajj.exeC:\Windows\system32\Ciepkajj.exe18⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2056 -
C:\Windows\SysWOW64\Cpohhk32.exeC:\Windows\system32\Cpohhk32.exe19⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:824 -
C:\Windows\SysWOW64\Ccnddg32.exeC:\Windows\system32\Ccnddg32.exe20⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2636 -
C:\Windows\SysWOW64\Capdpcge.exeC:\Windows\system32\Capdpcge.exe21⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2008 -
C:\Windows\SysWOW64\Chjmmnnb.exeC:\Windows\system32\Chjmmnnb.exe22⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1500 -
C:\Windows\SysWOW64\Clfhml32.exeC:\Windows\system32\Clfhml32.exe23⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2928 -
C:\Windows\SysWOW64\Cdamao32.exeC:\Windows\system32\Cdamao32.exe24⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2656 -
C:\Windows\SysWOW64\Clhecl32.exeC:\Windows\system32\Clhecl32.exe25⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:548 -
C:\Windows\SysWOW64\Caenkc32.exeC:\Windows\system32\Caenkc32.exe26⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1964 -
C:\Windows\SysWOW64\Ceqjla32.exeC:\Windows\system32\Ceqjla32.exe27⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2856 -
C:\Windows\SysWOW64\Coindgbi.exeC:\Windows\system32\Coindgbi.exe28⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2984
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD5d21b77245bda46aad6b9d093c9cd8931
SHA113cfe90bee867d6a52a633481b21dbb7145cbabd
SHA2560fbd8180775061e3304b38b046d34a8ba76cbaef9d0ff450187a38c7151325f7
SHA512bf6f84a56335232a2fddfc803fe5212675cf1bc87b5c7944bc23e860737fc8efa714d507bd0cdf35cc607409413fae9df76d673ceff813cc0bc780234e15e6a7
-
Filesize
80KB
MD5fe6dc5583b02c71227364b1aecc70125
SHA18811a06ccc83d590ec6c31d7d5c0ee45030168d0
SHA2565f4dcc8a8c8c5bab4f6e77804c9472173b99f7a0e5aad286a1b7f0ea1f1c8498
SHA5125f64af00fce3066afe069e95680ff890901830bb5f65f129864a42d046a4d1b742cb3915ae275d6eec6a7bc27c805c0abc05c538b27fb55116835c8d6a0d9961
-
Filesize
80KB
MD501257a09a459fa7116b2158d8f8e90ac
SHA13f009c801979739100d65b42c051e95e378b37e0
SHA256bc02331b888baff0c818f78a56fbb8f99b55643ab875e9e58a4d298af1454893
SHA512ea0e544ec92433fb2c4fe1e203b43e916f7eea63deec2061c8eb9c6d660fd197fc20478f22482b4884aa0ef41adcbd30e8abfb1ecbd19f01d8c92c148daa5e45
-
Filesize
80KB
MD54f63e1c7b25caba938560bac09913086
SHA1fa342a9f70a2e0cc355372ebeb201ef4dbdb76a8
SHA256d4f5814c6792166e36ce03c331b6db55f6b1b3fa428ab9bd1bf14d097ac8de75
SHA51290b527eda71628f4a3f632047a5cab492f36fe1de7ef54f82e41224a4e37cd8005ca4e3e046164a3120d243c47bb137048d14da739aa51875709b9eacf5a70f3
-
Filesize
80KB
MD572075c21833cae41a7354b10bad579a6
SHA1b31efa0c7e9ffd35e2a5e9ede58a36a8b8e8a5ba
SHA256a8a51dc253fe80429ac3de92085134d9eadbdc8108ea2e91e661349d694fbb4e
SHA51201309599839c7b5005fea51192d3ef339367e656fe5d4996f87dfb9f0f9d9a26b9d456d20d7355033fa7da01f70d7814fbcb36fed779a31935616e765fc00cf5
-
Filesize
80KB
MD5878c0707bee157e527be4b88d4cdeaa8
SHA1b15e00778e80d89ec185b7fbab6a33ec465bd370
SHA25627dd53f6e81f3386526499f450d919298cd1688a763eaae8ce564242c542a71a
SHA512fe07fe97fa944ebce05c347e9ce0bb6ffcb9020ce4003e49a7dd201b399e6fb504e3821d64de7ae78e41106b9b338bb2dae7a2744cd8ddd5d0923697fc362738
-
Filesize
80KB
MD57294ec4c5afd6450206bd0c4712ccf47
SHA13cdd0aed4c4132728421eb661df5682da20134fb
SHA2560e997da614c93778f347fef0c83efe6f08d61a38f20419c2277b223daabc715c
SHA5123d4338abeffdb83f8140e190f860aeefebc76581a8d7cd2d69e169779d37614eb9f2eacd5a8e8360aee3396648d715c7bbe596e30dda4231d65572e7f37dfd6b
-
Filesize
80KB
MD5d58265dd65f0efd8360c9b65ec29ec72
SHA1372812faca84a31efe5cc6fbd8d18fb221c01b9f
SHA256ff5a9b01373bccefbe09687d163b245e7748ade645554ac4dc70a3f88ea50f99
SHA512260c1bd0dd29581a1b0627a2cad5c168079bd0ad415efcd339cc84dc41f97f16d8f8f64aac44e6624453c35dda263a955634508bb5eeb70c2a6d64561fe27f7e
-
Filesize
80KB
MD58f1352cc5e39b29bfae40e9a9c8f4b6d
SHA1a786686b38ec2fce12d5c89bd47385253ad0f2b6
SHA2563be1dc0bb7a23e9f0a3e6de34ca6e321e617406c2bd2ffc837d0ed17515a25ef
SHA51225a7ebec6e1dc6fde97d5428059a4daf44ac13707396a3e78311e84af1c9fc13211e489ba0cbda3372e8fa968927de48c892395364988276255b5bdbf02ffbeb
-
Filesize
80KB
MD5587594c57ed598e11ad668cd8c309104
SHA1051a364f4ad5f186521eaf99c7c6b94bb1e6f63a
SHA256b3e1d5f7e342221acd0fd97e55d7671a18493eb455b8c9aec44247dea6e89961
SHA512037d74424b39bc81a9166a9ec8fc9fe9f102b6f1ee3ff36beede83153566dbc24cf39931fc4059e7ddd9c1cd057adebfb291957a086ef6282f37b977d09b2caa
-
Filesize
80KB
MD5b56d27817cb012a84b865254eeddd628
SHA16142a499725597a3a5df200faaea3fdb579252c3
SHA2562052a750749eb706e2af6305a2d532617517a96205fa2630b99654334a1bbcbd
SHA5125a7b5483f1ef9b24c83998b9e55dc886b8423e4e77c70c1b9180acdf7529bdbf62e6862407467ac3a2a7e421cea13c7aae3934ebc4b66e9f43e5b1957072c34d
-
Filesize
80KB
MD5b4ef7390365dc584832c16de867153d0
SHA191faa8acb05422fac94dd02621ff8da3ec8f906d
SHA256362b9bd76d4192a63502ba54c81be3ca57564972ed56069435fb5a6b17e23e25
SHA512848776c6c721397513b6abaeafb569fbadf56452f4eba48cc287da92501b3116961cc895d838b8e540f5a50484c77683a0705f2e72cbfdfb1d251965eaf35ce4
-
Filesize
80KB
MD5c67d1c8dd761df0fa5652294db98525b
SHA13184915d5cddf007f438ca57b2e024644589ea4a
SHA256cd25ff36900c49d1c3082e3e0b0247f1ed2a58baed76cb5ad8d4970395782a12
SHA51245c186d0a32133cb7e3e6d3555f84953f5448fd90726ffc0e8fa4a67342d001faf55c704db0cec4aec7560fc036b2a4924888a39a3948c6b47f26158fe6937ba
-
Filesize
80KB
MD5b8e00a713f51da8fddf97d24ebea6916
SHA17e88d7887740f513ab6527c71d0f4774ec6d8714
SHA256ee15e26b6fcf87c74dbc0356c443e01553d6fa394cbe179c9c7fe47cd9c65860
SHA51235b50514f174445b4d04debbf0f2c5e0a77b3c5c031303a69af334d934400a7944460b6f06731e7903d50cb376ad392995235a7f38301d2f95773643d7647c45
-
Filesize
80KB
MD59624a53c326c8d7d4717c0fee31e1b53
SHA1eb9455ff2bba37d4f00f3d774c9fef87ea5981ae
SHA2563d4a7df3d7bbd8aafd80df67f50b85293d8d778b389865465957b7e82bafd9dd
SHA5123795a59ae652f8f3d17cd4d0dd2867ba4192ab7ec942b40319493006905662e77d6812b7b206e186ff14db7463afcd01e9c42488901894c60926ed37d90b76b5
-
Filesize
80KB
MD5fc2baf1318e8e456d14057fa9f78b5e7
SHA13b5fc065fd29858da2b8f4aaf57aad99ca719da4
SHA25668615e7cf28c98c07b76f1fac561abb74034fde54abfc9ff88a46e2294ca9cda
SHA5122389e772ee936af2383cb6ab41126cbe9281dcf1c1d4446a2567d7b09800f7f94c0a82ddaded25940a7bb6caf1c7c3aeac7b704e2a0da0bfccc959eef44bdfd7
-
Filesize
80KB
MD538608328570cd0e521eb914d7ab8e909
SHA124711269241af8ebe8d17eb88b49d1199fda9b89
SHA256d975af08e495726f99a328395320d8b3a55c6beccb8908e09f8e0d9383d8404e
SHA5126e76fb4bae7af0ddc16269b486067fd0f9dfe3897d983c302195c94d58bda67ec1e4b20fd5560c2ce967b152e7e9c6dca040c5c0887497aa8d0b01f36a0e7a55
-
Filesize
80KB
MD5b4a3b63d697f08ffe58c2a4dbacdfffb
SHA143bf50b61b72507856c09f1067119f06c7983850
SHA256fe69278cb1576cb73def94b82c8c623ab67c58e60a1987466c9fef5e9a857cb5
SHA5122df6df23e5944d95dd153fab4a146fb7abe39feac26a64548c780feb2f0258332b51b2403f835c3b2baca2f4393781f3bf7d120b769ea6da02d139d32781ead9
-
Filesize
80KB
MD52df36a19fbb1438cdbaf53bf5ba9c167
SHA10391fd3abdc6443ae3c9b55218d429de0dacf752
SHA256ccd8eb24931842372892fd003d99bd73ee39c86eabef816e78540443b2d444b3
SHA51218e5a1b3884e6809d4c0f7e9e029674290fba2a5b171f5d3318d9869aba381b698f16902fc184780d8fd2cbb96de8fbccd6a4446fb17e4b4a9a2686b0262c68c
-
Filesize
80KB
MD548433ab7e1ba9b3183cf5bf02df50f62
SHA11e5323ff2e00dd612c307336521aa63ae5684e55
SHA256fa622971beb793d74fd49588b6f5df7b515569ba54205b6280ac833eab5b4ead
SHA512af2f2c1e901279c25b62fb16e051f550eefe3c8338e723bbcd5644f1711cdfa1bf0d9cb0b2a312da8c4bdb666639b2a6e54148203d26a61910ba0c22723c4581
-
Filesize
80KB
MD5d5855759eca2a79cf706cee82457f02b
SHA17c458815b09b37995b555ff66a653e14b6060871
SHA2566002341913f3c3fca0c693cc34ae1c0491ddea9f46693a23b2096bcf2a8676c6
SHA512d58fbf17005b7767992be75e9f88e403e9b58a1cc610291924e235074ef4cc7aef1fdd632969dba777654bef5c1f7d27d057882ffaedaf99ed270b9253901497
-
Filesize
80KB
MD5be587734b3543af9655f604882c0329f
SHA1913e62594e50d42a4360d9af39dc71d73dcf6f35
SHA2560651cb67bf219da6a749d6cbc9b7fc90149537021998b151361c0fc21e4ed918
SHA5124f25c89df85dba1d44477d4df33207d9caa90091e5bdcdbb2733594b7bad930e307827d4e1f44cfecbce728cf29114e9d6c29c393f635044f281546b88e3734a
-
Filesize
80KB
MD59ce4eab48b280ec515e1c8cd6a1b7bbd
SHA17fe1f315f0a49bf25eb78607a98c6950acfce544
SHA2567a88083275478a6bc6e6420bde9119e530ab3588ab30b2055e3d59715508af22
SHA512758c9c2f5b8c472c2057a84232c767a2ccdb48a31a60b24a81c7688abe8b4eda6fa1f6e783084bd15f7a1b3fa431cd657ffe0dc16a75cf1708b92f15e6419b60
-
Filesize
80KB
MD58bbf6cc0227578b9e0dbbd0b29037893
SHA1ece2d9727ea70947d167092e32162913ce3858f4
SHA256107cae87123505243cded3b7f46520633646bf812f57a80c412f39c6392a1d5c
SHA5125587b84ead2deb6ae243d0bd674fadf8ffcce6ebcf32a4d87882e0e70064b27603860b3d4d0c00fef1c5c5f6433f18ffb79428999625c449a8f994e374158a32
-
Filesize
80KB
MD5624fc87d347304d0bb9cac10df6e2203
SHA184d20fda89ba1be11a96dd84c65eaef75bc264e1
SHA256b739593c985fea667a6c0a6192b64c900f3882f5d30b8e0b1a469569c2de16de
SHA5129f2b1d1840290a4c353bf7d1f4090b353ce5d9dea8e69cf027d4bc4c9b8859c86b0aae452707fc6ada01efb190d18cd9bceddab878d6b98b4826d606bafe05df
-
Filesize
80KB
MD5c4e736a50b9d367b78d6ccba49a60271
SHA11fcf2ab4a6828052d064cf35f5c76de2aad08096
SHA25656b9e98fa0a2dd42193326e272a8c6606cb675522b187f835707727b5c114da6
SHA5129a5f8c4a46e28a6b8d2020a6011e4d38f6e65ee599de1ed53b8d6cffdd77de689d4313683ff64e1affa647cc1e51038f51449bd9aa3e811b088fc686ffb18910
-
Filesize
80KB
MD52dd82836c7f4a7474ff9f91c8789500e
SHA1dd5ef600a1422e1341e0de046a4b612b5cf61b17
SHA2568c4ed3d4699a0f8839bb5e97d05b9ed9328887ca6efff8f92d41a01e6c1b18ee
SHA5124d7c2b4bd98bd46973d177de6d6aefb34431089595bb81756862c9016aa35350ebd1de2998634995182c7358e9d965634c1f4735ba59e53e832385aec3dcdddf