Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
08-12-2024 02:55
Static task
static1
Behavioral task
behavioral1
Sample
c69f795bf651d5c5b550f9d3df6684f0eda06c55825b9d7e7157c53da91662e8.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c69f795bf651d5c5b550f9d3df6684f0eda06c55825b9d7e7157c53da91662e8.exe
Resource
win10v2004-20241007-en
General
-
Target
c69f795bf651d5c5b550f9d3df6684f0eda06c55825b9d7e7157c53da91662e8.exe
-
Size
80KB
-
MD5
7f696659be2339f9acfe93891560d877
-
SHA1
d124c4c43cf7d5a8af691762091987421bcf9dda
-
SHA256
c69f795bf651d5c5b550f9d3df6684f0eda06c55825b9d7e7157c53da91662e8
-
SHA512
6a46d5f788be2790c9f77d84cfbfe0afa71f8a2b666cbc354126b2d6baa623b826f419589ab7d77c8c09df71a0b205f87190acde78fb27a1728fb5c229bfee07
-
SSDEEP
1536:9F1346nj8yskuT+uZlhbPJ7XW/MAYI4r0SzDfWqdMVrlEFtyb7IYOOqw4Tt:v1I6nwyduTtDr7XWCIJSzTWqAhELy1M9
Malware Config
Extracted
berbew
http://crutop.nu/index.php
http://crutop.ru/index.php
http://mazafaka.ru/index.php
http://color-bank.ru/index.php
http://asechka.ru/index.php
http://trojan.ru/index.php
http://fuck.ru/index.php
http://goldensand.ru/index.php
http://filesearch.ru/index.php
http://devx.nm.ru/index.php
http://ros-neftbank.ru/index.php
http://lovingod.host.sk/index.php
http://www.redline.ru/index.php
http://cvv.ru/index.php
http://hackers.lv/index.php
http://fethard.biz/index.php
http://ldark.nm.ru/index.htm
http://gaz-prom.ru/index.htm
http://promo.ru/index.htm
http://potleaf.chat.ru/index.htm
http://kadet.ru/index.htm
http://cvv.ru/index.htm
http://crutop.nu/index.htm
http://crutop.ru/index.htm
http://mazafaka.ru/index.htm
http://xware.cjb.net/index.htm
http://konfiskat.org/index.htm
http://parex-bank.ru/index.htm
http://kidos-bank.ru/index.htm
http://kavkaz.ru/index.htm
http://fethard.biz/index.htm
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 18 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lpqlemaj.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lhlqjone.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Llbconkd.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lhiddoph.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lhiddoph.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lcadghnk.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lmmfnb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lpqlemaj.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lcadghnk.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lgfjggll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lgfjggll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lhlqjone.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad c69f795bf651d5c5b550f9d3df6684f0eda06c55825b9d7e7157c53da91662e8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" c69f795bf651d5c5b550f9d3df6684f0eda06c55825b9d7e7157c53da91662e8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kgcnahoo.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kgcnahoo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lmmfnb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Llbconkd.exe -
Berbew family
-
Executes dropped EXE 9 IoCs
pid Process 2688 Kgcnahoo.exe 2652 Lmmfnb32.exe 2808 Lgfjggll.exe 2600 Llbconkd.exe 2624 Lhiddoph.exe 3064 Lpqlemaj.exe 2528 Lhlqjone.exe 1848 Lcadghnk.exe 2616 Lepaccmo.exe -
Loads dropped DLL 22 IoCs
pid Process 2640 c69f795bf651d5c5b550f9d3df6684f0eda06c55825b9d7e7157c53da91662e8.exe 2640 c69f795bf651d5c5b550f9d3df6684f0eda06c55825b9d7e7157c53da91662e8.exe 2688 Kgcnahoo.exe 2688 Kgcnahoo.exe 2652 Lmmfnb32.exe 2652 Lmmfnb32.exe 2808 Lgfjggll.exe 2808 Lgfjggll.exe 2600 Llbconkd.exe 2600 Llbconkd.exe 2624 Lhiddoph.exe 2624 Lhiddoph.exe 3064 Lpqlemaj.exe 3064 Lpqlemaj.exe 2528 Lhlqjone.exe 2528 Lhlqjone.exe 1848 Lcadghnk.exe 1848 Lcadghnk.exe 2780 WerFault.exe 2780 WerFault.exe 2780 WerFault.exe 2780 WerFault.exe -
Drops file in System32 directory 27 IoCs
description ioc Process File created C:\Windows\SysWOW64\Hfopbgif.dll Lmmfnb32.exe File created C:\Windows\SysWOW64\Lhiddoph.exe Llbconkd.exe File opened for modification C:\Windows\SysWOW64\Lpqlemaj.exe Lhiddoph.exe File created C:\Windows\SysWOW64\Pgodelnq.dll c69f795bf651d5c5b550f9d3df6684f0eda06c55825b9d7e7157c53da91662e8.exe File created C:\Windows\SysWOW64\Nmdeem32.dll Llbconkd.exe File opened for modification C:\Windows\SysWOW64\Lcadghnk.exe Lhlqjone.exe File created C:\Windows\SysWOW64\Pigckoki.dll Kgcnahoo.exe File created C:\Windows\SysWOW64\Gcakqmpi.dll Lgfjggll.exe File opened for modification C:\Windows\SysWOW64\Lhiddoph.exe Llbconkd.exe File created C:\Windows\SysWOW64\Lcadghnk.exe Lhlqjone.exe File created C:\Windows\SysWOW64\Lgfjggll.exe Lmmfnb32.exe File opened for modification C:\Windows\SysWOW64\Lgfjggll.exe Lmmfnb32.exe File opened for modification C:\Windows\SysWOW64\Llbconkd.exe Lgfjggll.exe File created C:\Windows\SysWOW64\Ljphmekn.dll Lhiddoph.exe File created C:\Windows\SysWOW64\Kgcnahoo.exe c69f795bf651d5c5b550f9d3df6684f0eda06c55825b9d7e7157c53da91662e8.exe File created C:\Windows\SysWOW64\Lepaccmo.exe Lcadghnk.exe File opened for modification C:\Windows\SysWOW64\Lmmfnb32.exe Kgcnahoo.exe File created C:\Windows\SysWOW64\Onkckhkp.dll Lpqlemaj.exe File created C:\Windows\SysWOW64\Fhdikdfj.dll Lhlqjone.exe File opened for modification C:\Windows\SysWOW64\Kgcnahoo.exe c69f795bf651d5c5b550f9d3df6684f0eda06c55825b9d7e7157c53da91662e8.exe File opened for modification C:\Windows\SysWOW64\Lepaccmo.exe Lcadghnk.exe File created C:\Windows\SysWOW64\Llbconkd.exe Lgfjggll.exe File opened for modification C:\Windows\SysWOW64\Lhlqjone.exe Lpqlemaj.exe File created C:\Windows\SysWOW64\Oldhgaef.dll Lcadghnk.exe File created C:\Windows\SysWOW64\Lpqlemaj.exe Lhiddoph.exe File created C:\Windows\SysWOW64\Lhlqjone.exe Lpqlemaj.exe File created C:\Windows\SysWOW64\Lmmfnb32.exe Kgcnahoo.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2780 2616 WerFault.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lpqlemaj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lcadghnk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lepaccmo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c69f795bf651d5c5b550f9d3df6684f0eda06c55825b9d7e7157c53da91662e8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lmmfnb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Llbconkd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lhiddoph.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kgcnahoo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lgfjggll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lhlqjone.exe -
Modifies registry class 30 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} c69f795bf651d5c5b550f9d3df6684f0eda06c55825b9d7e7157c53da91662e8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Llbconkd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lcadghnk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lmmfnb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nmdeem32.dll" Llbconkd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lhlqjone.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 c69f795bf651d5c5b550f9d3df6684f0eda06c55825b9d7e7157c53da91662e8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID c69f795bf651d5c5b550f9d3df6684f0eda06c55825b9d7e7157c53da91662e8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pgodelnq.dll" c69f795bf651d5c5b550f9d3df6684f0eda06c55825b9d7e7157c53da91662e8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gcakqmpi.dll" Lgfjggll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pigckoki.dll" Kgcnahoo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lhiddoph.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lhiddoph.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fhdikdfj.dll" Lhlqjone.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lcadghnk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node c69f795bf651d5c5b550f9d3df6684f0eda06c55825b9d7e7157c53da91662e8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" c69f795bf651d5c5b550f9d3df6684f0eda06c55825b9d7e7157c53da91662e8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kgcnahoo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kgcnahoo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lgfjggll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ljphmekn.dll" Lhiddoph.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hfopbgif.dll" Lmmfnb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lgfjggll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oldhgaef.dll" Lcadghnk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Llbconkd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Onkckhkp.dll" Lpqlemaj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lhlqjone.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lmmfnb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lpqlemaj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lpqlemaj.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 2640 wrote to memory of 2688 2640 c69f795bf651d5c5b550f9d3df6684f0eda06c55825b9d7e7157c53da91662e8.exe 30 PID 2640 wrote to memory of 2688 2640 c69f795bf651d5c5b550f9d3df6684f0eda06c55825b9d7e7157c53da91662e8.exe 30 PID 2640 wrote to memory of 2688 2640 c69f795bf651d5c5b550f9d3df6684f0eda06c55825b9d7e7157c53da91662e8.exe 30 PID 2640 wrote to memory of 2688 2640 c69f795bf651d5c5b550f9d3df6684f0eda06c55825b9d7e7157c53da91662e8.exe 30 PID 2688 wrote to memory of 2652 2688 Kgcnahoo.exe 31 PID 2688 wrote to memory of 2652 2688 Kgcnahoo.exe 31 PID 2688 wrote to memory of 2652 2688 Kgcnahoo.exe 31 PID 2688 wrote to memory of 2652 2688 Kgcnahoo.exe 31 PID 2652 wrote to memory of 2808 2652 Lmmfnb32.exe 32 PID 2652 wrote to memory of 2808 2652 Lmmfnb32.exe 32 PID 2652 wrote to memory of 2808 2652 Lmmfnb32.exe 32 PID 2652 wrote to memory of 2808 2652 Lmmfnb32.exe 32 PID 2808 wrote to memory of 2600 2808 Lgfjggll.exe 33 PID 2808 wrote to memory of 2600 2808 Lgfjggll.exe 33 PID 2808 wrote to memory of 2600 2808 Lgfjggll.exe 33 PID 2808 wrote to memory of 2600 2808 Lgfjggll.exe 33 PID 2600 wrote to memory of 2624 2600 Llbconkd.exe 34 PID 2600 wrote to memory of 2624 2600 Llbconkd.exe 34 PID 2600 wrote to memory of 2624 2600 Llbconkd.exe 34 PID 2600 wrote to memory of 2624 2600 Llbconkd.exe 34 PID 2624 wrote to memory of 3064 2624 Lhiddoph.exe 35 PID 2624 wrote to memory of 3064 2624 Lhiddoph.exe 35 PID 2624 wrote to memory of 3064 2624 Lhiddoph.exe 35 PID 2624 wrote to memory of 3064 2624 Lhiddoph.exe 35 PID 3064 wrote to memory of 2528 3064 Lpqlemaj.exe 36 PID 3064 wrote to memory of 2528 3064 Lpqlemaj.exe 36 PID 3064 wrote to memory of 2528 3064 Lpqlemaj.exe 36 PID 3064 wrote to memory of 2528 3064 Lpqlemaj.exe 36 PID 2528 wrote to memory of 1848 2528 Lhlqjone.exe 37 PID 2528 wrote to memory of 1848 2528 Lhlqjone.exe 37 PID 2528 wrote to memory of 1848 2528 Lhlqjone.exe 37 PID 2528 wrote to memory of 1848 2528 Lhlqjone.exe 37 PID 1848 wrote to memory of 2616 1848 Lcadghnk.exe 38 PID 1848 wrote to memory of 2616 1848 Lcadghnk.exe 38 PID 1848 wrote to memory of 2616 1848 Lcadghnk.exe 38 PID 1848 wrote to memory of 2616 1848 Lcadghnk.exe 38 PID 2616 wrote to memory of 2780 2616 Lepaccmo.exe 39 PID 2616 wrote to memory of 2780 2616 Lepaccmo.exe 39 PID 2616 wrote to memory of 2780 2616 Lepaccmo.exe 39 PID 2616 wrote to memory of 2780 2616 Lepaccmo.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\c69f795bf651d5c5b550f9d3df6684f0eda06c55825b9d7e7157c53da91662e8.exe"C:\Users\Admin\AppData\Local\Temp\c69f795bf651d5c5b550f9d3df6684f0eda06c55825b9d7e7157c53da91662e8.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\SysWOW64\Kgcnahoo.exeC:\Windows\system32\Kgcnahoo.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\SysWOW64\Lmmfnb32.exeC:\Windows\system32\Lmmfnb32.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\SysWOW64\Lgfjggll.exeC:\Windows\system32\Lgfjggll.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\SysWOW64\Llbconkd.exeC:\Windows\system32\Llbconkd.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Windows\SysWOW64\Lhiddoph.exeC:\Windows\system32\Lhiddoph.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Windows\SysWOW64\Lpqlemaj.exeC:\Windows\system32\Lpqlemaj.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Windows\SysWOW64\Lhlqjone.exeC:\Windows\system32\Lhlqjone.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Windows\SysWOW64\Lcadghnk.exeC:\Windows\system32\Lcadghnk.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Windows\SysWOW64\Lepaccmo.exeC:\Windows\system32\Lepaccmo.exe10⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2616 -s 14011⤵
- Loads dropped DLL
- Program crash
PID:2780
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD53f41fead2732ab7683b22e936e3b4a1c
SHA1d2049364b23035cf2fc7b28d2e0cb953244061aa
SHA2561a6372da8ee1eeb7ae2fae072a07763c5a922adf89b8dcf2d5b92a3f97e7e358
SHA512caf6a128dfda7593ff8efb56b3f602dc02ed5730bc6ff5cff2cc459d1c0c1d57f48c7c8c56f9a88388153a899d6309094ddb21f406b28ac93f4cc8c3809bf035
-
Filesize
80KB
MD5e833f8db51990565a88d04f89a3b893b
SHA15501d31eb108dafe8872bae0d701827a8628f354
SHA256252e6121c0b0bc5974d7674ac405ecc494fffe1c125a4b836cfc7d773502cbc9
SHA5120bce9e79c2b1e07f89eded0e8ce0106ca9962769d92988d88a39eb4a19660c56a90d2c92fd666b1ee94f22d9c9e474315442e0708226623e4e6695e654865794
-
Filesize
80KB
MD5cd616abfbf2653bd509490b1073f50e5
SHA161b53476c029dbbccca294f218162e594abd7f35
SHA2568ea44fda253151ca51edcfa50125fe34ebe9598a5d4eda994b7617cf73fb4093
SHA512e9e0442b6bfe9b308ea0ebbe8da6dccd3d08a78ed05845fb6480fc69fb43f7af59ee06cede45f4c1156d88972ee4fc1f8c7beed8c1e7452c7c04ba7aee1654ed
-
Filesize
80KB
MD5dcc50647de90d00ca38982edc88d9971
SHA19fe0c556fa67ee2a6a06e12344f1b64e9caaf30a
SHA25666127e18f6738e97e9e2c85fbf2da292fdc465b95acdbee347da2b5b2157a604
SHA5122898b10ee7852c56b3f2f0073c8e1f573ce48415a5b61d3340d1417b58b343a7fd6541b5b21e2972a6bf92df4ab7bd7a9ab1042a265bc37484fbbaa437eef473
-
Filesize
80KB
MD566cf8578f997c0bd65000b9c5d016801
SHA14471cbc94cc87132489ba00c17f7c0b88eac2a0f
SHA256b4303b0f24389acfc6136f539ffc615477f6b93ed4562dd72faf159250c55173
SHA51273058121356968d34ab018dc7d8bc60f5b17a39da3657d3f7ca1b17d84e068da603e7278a5651074ab7b15e5e59aa57a7ee39b8028272786b9784fed85ebd497
-
Filesize
80KB
MD5ec0ce787d2bad76154eaeefa7419233c
SHA1dcdee282f2e940bb1dd481bc618da4318a46abdf
SHA2568309761e8276e55a7c055be46cbb8f3bde25fd58552fc366491a6889ee705eec
SHA5126a9ce336faa4ed21170a9fc9033767fd14129a6c5bbebad65b0b1631bdbc86518b86c514d416890dcc8a4b4555ff975060d71f3e5ce59193e89d777d32ea5ea3
-
Filesize
80KB
MD513f2504c2c4fd2f601aadbab30c48cc5
SHA1a3c7d9313e1e49b7c7bdb6846f42a6db7cc5e83b
SHA256282299ca0c378812ea8c726216e2436e618568c37defdde34e05890c7d74b5d4
SHA5121812d887e81124aa4f9e8074e2c3151b6f2c85610f8a4f554533e34b6d4c773fc822b6053608896d783986bbd831b13d34192693e94e02e563b35d6df841670c
-
Filesize
80KB
MD5e89094d33e736caf98f06196d90862ec
SHA1ac2c618e0fa0bf30ff8b5bedab1fc37112e957ee
SHA25662e26ca645c18da6cd51416681ce140b8d64f545a1c15495b6171284b022c26a
SHA51221b0f7b4ced18b576f8356aa4af6779409224291440499a31f6909fdbaecc7926e2d2c10cdd49124727d3fd20cc40d2e2c2014300223dbee0fc944acf2bb0f04
-
Filesize
80KB
MD5abc3bc4d8cf4ac73948433e78b6678ab
SHA13e90b531895cfafff00817adf53c061cd1bd1777
SHA256048ecca12106d77e13d031730b4ed2b63bc59c8ea164f259a68732b57bef0af5
SHA512a11881ece78d2d576b446782703b41f67dcff26450ce4752f6ca95cfeca0a37f6a59c6c8bae31194d6dc43fdb05cac981a6d85e0c7c419f64084c3af363cbb8b