Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
23-12-2024 00:22
Behavioral task
behavioral1
Sample
83eb5b8b1edaa6887fef7e7ffa4f99d1a5f86a9cf77f9a98b0744da4410da70b.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
83eb5b8b1edaa6887fef7e7ffa4f99d1a5f86a9cf77f9a98b0744da4410da70b.exe
Resource
win10v2004-20241007-en
General
-
Target
83eb5b8b1edaa6887fef7e7ffa4f99d1a5f86a9cf77f9a98b0744da4410da70b.exe
-
Size
448KB
-
MD5
c5edad74accc3d3c61b27f881b250296
-
SHA1
6583254102b1ce16e69b362cef9a0e731caac1f7
-
SHA256
83eb5b8b1edaa6887fef7e7ffa4f99d1a5f86a9cf77f9a98b0744da4410da70b
-
SHA512
0b156c472a225f79f6cd9dfd5d1205deb5a5a441de6a259f5bed461f964cc83e869c85ac02bd28ce7411a1fef89fbf9f8bf39e915de25cab5fc92ea3602408ac
-
SSDEEP
6144:CqEw+AGbM2yJT///NR5f7DM2y/JAQ///NR5fLYG3eujE:3EyoM1z/NzDMTx/NcZt
Malware Config
Extracted
berbew
http://crutop.nu/index.php
http://devx.nm.ru/index.php
http://ros-neftbank.ru/index.php
http://master-x.com/index.php
http://www.redline.ru/index.php
http://cvv.ru/index.php
http://hackers.lv/index.php
http://fethard.biz/index.php
http://crutop.ru/index.php
http://kaspersky.ru/index.php
http://color-bank.ru/index.php
http://adult-empire.com/index.php
http://virus-list.com/index.php
http://trojan.ru/index.php
http://xware.cjb.net/index.htm
http://konfiskat.org/index.htm
http://parex-bank.ru/index.htm
http://fethard.biz/index.htm
http://ldark.nm.ru/index.htm
http://gaz-prom.ru/index.htm
http://promo.ru/index.htm
http://potleaf.chat.ru/index.htm
http://kadet.ru/index.htm
http://cvv.ru/index.htm
http://crutop.nu/index.htm
http://crutop.ru/index.htm
http://kaspersky.ru/index.htm
http://kidos-bank.ru/index.htm
http://kavkaz.ru/index.htm
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 46 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iikkon32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jjjdhc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jjjdhc32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Llepen32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kdbepm32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lekghdad.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lcadghnk.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iocgfhhc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Iocgfhhc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jpbcek32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jllqplnp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kageia32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lcmklh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Llepen32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 83eb5b8b1edaa6887fef7e7ffa4f99d1a5f86a9cf77f9a98b0744da4410da70b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Iikkon32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ifolhann.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jpbcek32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kbjbge32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kfodfh32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kageia32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lcadghnk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ikjhki32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lgfjggll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lgfjggll.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lhlqjone.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lhlqjone.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" 83eb5b8b1edaa6887fef7e7ffa4f99d1a5f86a9cf77f9a98b0744da4410da70b.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ikjhki32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kbjbge32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Khgkpl32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kfodfh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Llpfjomf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lekghdad.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jllqplnp.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Khgkpl32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kdbepm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kgcnahoo.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lcmklh32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Loclai32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ifolhann.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kgcnahoo.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Llpfjomf.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Llbconkd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Llbconkd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Loclai32.exe -
Berbew family
-
Executes dropped EXE 23 IoCs
pid Process 2500 Iocgfhhc.exe 1540 Iikkon32.exe 2992 Ikjhki32.exe 2772 Ifolhann.exe 2904 Jpbcek32.exe 2944 Jjjdhc32.exe 2836 Jllqplnp.exe 2680 Kbjbge32.exe 2328 Khgkpl32.exe 2392 Kfodfh32.exe 2600 Kdbepm32.exe 708 Kageia32.exe 1800 Kgcnahoo.exe 1272 Llpfjomf.exe 1968 Lgfjggll.exe 1396 Llbconkd.exe 1792 Lcmklh32.exe 1248 Lekghdad.exe 1448 Llepen32.exe 2736 Loclai32.exe 1056 Lhlqjone.exe 2860 Lcadghnk.exe 2516 Lepaccmo.exe -
Loads dropped DLL 50 IoCs
pid Process 2272 83eb5b8b1edaa6887fef7e7ffa4f99d1a5f86a9cf77f9a98b0744da4410da70b.exe 2272 83eb5b8b1edaa6887fef7e7ffa4f99d1a5f86a9cf77f9a98b0744da4410da70b.exe 2500 Iocgfhhc.exe 2500 Iocgfhhc.exe 1540 Iikkon32.exe 1540 Iikkon32.exe 2992 Ikjhki32.exe 2992 Ikjhki32.exe 2772 Ifolhann.exe 2772 Ifolhann.exe 2904 Jpbcek32.exe 2904 Jpbcek32.exe 2944 Jjjdhc32.exe 2944 Jjjdhc32.exe 2836 Jllqplnp.exe 2836 Jllqplnp.exe 2680 Kbjbge32.exe 2680 Kbjbge32.exe 2328 Khgkpl32.exe 2328 Khgkpl32.exe 2392 Kfodfh32.exe 2392 Kfodfh32.exe 2600 Kdbepm32.exe 2600 Kdbepm32.exe 708 Kageia32.exe 708 Kageia32.exe 1800 Kgcnahoo.exe 1800 Kgcnahoo.exe 1272 Llpfjomf.exe 1272 Llpfjomf.exe 1968 Lgfjggll.exe 1968 Lgfjggll.exe 1396 Llbconkd.exe 1396 Llbconkd.exe 1792 Lcmklh32.exe 1792 Lcmklh32.exe 1248 Lekghdad.exe 1248 Lekghdad.exe 1448 Llepen32.exe 1448 Llepen32.exe 2736 Loclai32.exe 2736 Loclai32.exe 1056 Lhlqjone.exe 1056 Lhlqjone.exe 2860 Lcadghnk.exe 2860 Lcadghnk.exe 2704 WerFault.exe 2704 WerFault.exe 2704 WerFault.exe 2704 WerFault.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Kageia32.exe Kdbepm32.exe File created C:\Windows\SysWOW64\Qaamhelq.dll Lcmklh32.exe File opened for modification C:\Windows\SysWOW64\Ikjhki32.exe Iikkon32.exe File opened for modification C:\Windows\SysWOW64\Lekghdad.exe Lcmklh32.exe File created C:\Windows\SysWOW64\Mcbniafn.dll Lekghdad.exe File opened for modification C:\Windows\SysWOW64\Lcadghnk.exe Lhlqjone.exe File created C:\Windows\SysWOW64\Dnhanebc.dll Jjjdhc32.exe File opened for modification C:\Windows\SysWOW64\Khgkpl32.exe Kbjbge32.exe File opened for modification C:\Windows\SysWOW64\Llpfjomf.exe Kgcnahoo.exe File created C:\Windows\SysWOW64\Lekghdad.exe Lcmklh32.exe File created C:\Windows\SysWOW64\Kbjbge32.exe Jllqplnp.exe File created C:\Windows\SysWOW64\Kdbepm32.exe Kfodfh32.exe File opened for modification C:\Windows\SysWOW64\Iocgfhhc.exe 83eb5b8b1edaa6887fef7e7ffa4f99d1a5f86a9cf77f9a98b0744da4410da70b.exe File created C:\Windows\SysWOW64\Gcakqmpi.dll Lgfjggll.exe File created C:\Windows\SysWOW64\Pcdapknb.dll Kbjbge32.exe File created C:\Windows\SysWOW64\Kfodfh32.exe Khgkpl32.exe File created C:\Windows\SysWOW64\Bccjfi32.dll Kgcnahoo.exe File created C:\Windows\SysWOW64\Ipdbellh.dll Iikkon32.exe File opened for modification C:\Windows\SysWOW64\Jllqplnp.exe Jjjdhc32.exe File opened for modification C:\Windows\SysWOW64\Ifolhann.exe Ikjhki32.exe File created C:\Windows\SysWOW64\Lepaccmo.exe Lcadghnk.exe File created C:\Windows\SysWOW64\Khgkpl32.exe Kbjbge32.exe File created C:\Windows\SysWOW64\Kcjeje32.dll Khgkpl32.exe File created C:\Windows\SysWOW64\Kageia32.exe Kdbepm32.exe File created C:\Windows\SysWOW64\Kgcnahoo.exe Kageia32.exe File opened for modification C:\Windows\SysWOW64\Kgcnahoo.exe Kageia32.exe File opened for modification C:\Windows\SysWOW64\Loclai32.exe Llepen32.exe File created C:\Windows\SysWOW64\Iocgfhhc.exe 83eb5b8b1edaa6887fef7e7ffa4f99d1a5f86a9cf77f9a98b0744da4410da70b.exe File created C:\Windows\SysWOW64\Jjjdhc32.exe Jpbcek32.exe File created C:\Windows\SysWOW64\Pgodelnq.dll Kageia32.exe File created C:\Windows\SysWOW64\Lhlqjone.exe Loclai32.exe File created C:\Windows\SysWOW64\Lcadghnk.exe Lhlqjone.exe File created C:\Windows\SysWOW64\Oldhgaef.dll Lcadghnk.exe File created C:\Windows\SysWOW64\Mebgijei.dll Jpbcek32.exe File opened for modification C:\Windows\SysWOW64\Kbjbge32.exe Jllqplnp.exe File opened for modification C:\Windows\SysWOW64\Lcmklh32.exe Llbconkd.exe File opened for modification C:\Windows\SysWOW64\Lepaccmo.exe Lcadghnk.exe File created C:\Windows\SysWOW64\Jpbcek32.exe Ifolhann.exe File opened for modification C:\Windows\SysWOW64\Lgfjggll.exe Llpfjomf.exe File created C:\Windows\SysWOW64\Hnanlhmd.dll Llbconkd.exe File opened for modification C:\Windows\SysWOW64\Llepen32.exe Lekghdad.exe File created C:\Windows\SysWOW64\Ikjhki32.exe Iikkon32.exe File created C:\Windows\SysWOW64\Hfopbgif.dll Llpfjomf.exe File created C:\Windows\SysWOW64\Llpfjomf.exe Kgcnahoo.exe File created C:\Windows\SysWOW64\Llbconkd.exe Lgfjggll.exe File opened for modification C:\Windows\SysWOW64\Llbconkd.exe Lgfjggll.exe File created C:\Windows\SysWOW64\Loclai32.exe Llepen32.exe File opened for modification C:\Windows\SysWOW64\Lhlqjone.exe Loclai32.exe File created C:\Windows\SysWOW64\Fhdikdfj.dll Lhlqjone.exe File opened for modification C:\Windows\SysWOW64\Jjjdhc32.exe Jpbcek32.exe File created C:\Windows\SysWOW64\Mobafhlg.dll Jllqplnp.exe File created C:\Windows\SysWOW64\Jllqplnp.exe Jjjdhc32.exe File opened for modification C:\Windows\SysWOW64\Kfodfh32.exe Khgkpl32.exe File created C:\Windows\SysWOW64\Alhpic32.dll Kfodfh32.exe File created C:\Windows\SysWOW64\Jlflfm32.dll Kdbepm32.exe File created C:\Windows\SysWOW64\Lgfjggll.exe Llpfjomf.exe File created C:\Windows\SysWOW64\Llepen32.exe Lekghdad.exe File created C:\Windows\SysWOW64\Ffdmihcc.dll Ikjhki32.exe File opened for modification C:\Windows\SysWOW64\Jpbcek32.exe Ifolhann.exe File created C:\Windows\SysWOW64\Agpqch32.dll Llepen32.exe File opened for modification C:\Windows\SysWOW64\Iikkon32.exe Iocgfhhc.exe File created C:\Windows\SysWOW64\Lcmklh32.exe Llbconkd.exe File created C:\Windows\SysWOW64\Ecfgpaco.dll Iocgfhhc.exe File created C:\Windows\SysWOW64\Ifolhann.exe Ikjhki32.exe -
Program crash 1 IoCs
pid pid_target Process 2704 2516 WerFault.exe -
System Location Discovery: System Language Discovery 1 TTPs 24 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Loclai32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ikjhki32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jjjdhc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jllqplnp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kbjbge32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kfodfh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Llpfjomf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lcmklh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Iocgfhhc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Iikkon32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ifolhann.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Khgkpl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kgcnahoo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Llbconkd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lcadghnk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 83eb5b8b1edaa6887fef7e7ffa4f99d1a5f86a9cf77f9a98b0744da4410da70b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jpbcek32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lekghdad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lhlqjone.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lepaccmo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kdbepm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kageia32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lgfjggll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Llepen32.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Iikkon32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ffdmihcc.dll" Ikjhki32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Llpfjomf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oldhgaef.dll" Lcadghnk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ecfgpaco.dll" Iocgfhhc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kbjbge32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lekghdad.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID 83eb5b8b1edaa6887fef7e7ffa4f99d1a5f86a9cf77f9a98b0744da4410da70b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jpbcek32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pcdapknb.dll" Kbjbge32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Khgkpl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kfodfh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kageia32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Loclai32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hnanlhmd.dll" Llbconkd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Llbconkd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jllqplnp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gcakqmpi.dll" Lgfjggll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Agpqch32.dll" Llepen32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Alhpic32.dll" Kfodfh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pgodelnq.dll" Kageia32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Iocgfhhc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Iocgfhhc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ikjhki32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ifolhann.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Omfpmb32.dll" Ifolhann.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jllqplnp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lhlqjone.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mebgijei.dll" Jpbcek32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kdbepm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bccjfi32.dll" Kgcnahoo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kgcnahoo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Onkckhkp.dll" Loclai32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mcbniafn.dll" Lekghdad.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fhdikdfj.dll" Lhlqjone.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 83eb5b8b1edaa6887fef7e7ffa4f99d1a5f86a9cf77f9a98b0744da4410da70b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ipdbellh.dll" Iikkon32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mobafhlg.dll" Jllqplnp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kcjeje32.dll" Khgkpl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kgcnahoo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hfopbgif.dll" Llpfjomf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} 83eb5b8b1edaa6887fef7e7ffa4f99d1a5f86a9cf77f9a98b0744da4410da70b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" 83eb5b8b1edaa6887fef7e7ffa4f99d1a5f86a9cf77f9a98b0744da4410da70b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jpbcek32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kfodfh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Llepen32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node 83eb5b8b1edaa6887fef7e7ffa4f99d1a5f86a9cf77f9a98b0744da4410da70b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jjjdhc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Llbconkd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lekghdad.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Loclai32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lhlqjone.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dfcllk32.dll" 83eb5b8b1edaa6887fef7e7ffa4f99d1a5f86a9cf77f9a98b0744da4410da70b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kbjbge32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lgfjggll.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Llpfjomf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qaamhelq.dll" Lcmklh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lcmklh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Llepen32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lcadghnk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lcmklh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ikjhki32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jjjdhc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Khgkpl32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2272 wrote to memory of 2500 2272 83eb5b8b1edaa6887fef7e7ffa4f99d1a5f86a9cf77f9a98b0744da4410da70b.exe 30 PID 2272 wrote to memory of 2500 2272 83eb5b8b1edaa6887fef7e7ffa4f99d1a5f86a9cf77f9a98b0744da4410da70b.exe 30 PID 2272 wrote to memory of 2500 2272 83eb5b8b1edaa6887fef7e7ffa4f99d1a5f86a9cf77f9a98b0744da4410da70b.exe 30 PID 2272 wrote to memory of 2500 2272 83eb5b8b1edaa6887fef7e7ffa4f99d1a5f86a9cf77f9a98b0744da4410da70b.exe 30 PID 2500 wrote to memory of 1540 2500 Iocgfhhc.exe 31 PID 2500 wrote to memory of 1540 2500 Iocgfhhc.exe 31 PID 2500 wrote to memory of 1540 2500 Iocgfhhc.exe 31 PID 2500 wrote to memory of 1540 2500 Iocgfhhc.exe 31 PID 1540 wrote to memory of 2992 1540 Iikkon32.exe 32 PID 1540 wrote to memory of 2992 1540 Iikkon32.exe 32 PID 1540 wrote to memory of 2992 1540 Iikkon32.exe 32 PID 1540 wrote to memory of 2992 1540 Iikkon32.exe 32 PID 2992 wrote to memory of 2772 2992 Ikjhki32.exe 33 PID 2992 wrote to memory of 2772 2992 Ikjhki32.exe 33 PID 2992 wrote to memory of 2772 2992 Ikjhki32.exe 33 PID 2992 wrote to memory of 2772 2992 Ikjhki32.exe 33 PID 2772 wrote to memory of 2904 2772 Ifolhann.exe 34 PID 2772 wrote to memory of 2904 2772 Ifolhann.exe 34 PID 2772 wrote to memory of 2904 2772 Ifolhann.exe 34 PID 2772 wrote to memory of 2904 2772 Ifolhann.exe 34 PID 2904 wrote to memory of 2944 2904 Jpbcek32.exe 35 PID 2904 wrote to memory of 2944 2904 Jpbcek32.exe 35 PID 2904 wrote to memory of 2944 2904 Jpbcek32.exe 35 PID 2904 wrote to memory of 2944 2904 Jpbcek32.exe 35 PID 2944 wrote to memory of 2836 2944 Jjjdhc32.exe 36 PID 2944 wrote to memory of 2836 2944 Jjjdhc32.exe 36 PID 2944 wrote to memory of 2836 2944 Jjjdhc32.exe 36 PID 2944 wrote to memory of 2836 2944 Jjjdhc32.exe 36 PID 2836 wrote to memory of 2680 2836 Jllqplnp.exe 37 PID 2836 wrote to memory of 2680 2836 Jllqplnp.exe 37 PID 2836 wrote to memory of 2680 2836 Jllqplnp.exe 37 PID 2836 wrote to memory of 2680 2836 Jllqplnp.exe 37 PID 2680 wrote to memory of 2328 2680 Kbjbge32.exe 38 PID 2680 wrote to memory of 2328 2680 Kbjbge32.exe 38 PID 2680 wrote to memory of 2328 2680 Kbjbge32.exe 38 PID 2680 wrote to memory of 2328 2680 Kbjbge32.exe 38 PID 2328 wrote to memory of 2392 2328 Khgkpl32.exe 39 PID 2328 wrote to memory of 2392 2328 Khgkpl32.exe 39 PID 2328 wrote to memory of 2392 2328 Khgkpl32.exe 39 PID 2328 wrote to memory of 2392 2328 Khgkpl32.exe 39 PID 2392 wrote to memory of 2600 2392 Kfodfh32.exe 40 PID 2392 wrote to memory of 2600 2392 Kfodfh32.exe 40 PID 2392 wrote to memory of 2600 2392 Kfodfh32.exe 40 PID 2392 wrote to memory of 2600 2392 Kfodfh32.exe 40 PID 2600 wrote to memory of 708 2600 Kdbepm32.exe 41 PID 2600 wrote to memory of 708 2600 Kdbepm32.exe 41 PID 2600 wrote to memory of 708 2600 Kdbepm32.exe 41 PID 2600 wrote to memory of 708 2600 Kdbepm32.exe 41 PID 708 wrote to memory of 1800 708 Kageia32.exe 42 PID 708 wrote to memory of 1800 708 Kageia32.exe 42 PID 708 wrote to memory of 1800 708 Kageia32.exe 42 PID 708 wrote to memory of 1800 708 Kageia32.exe 42 PID 1800 wrote to memory of 1272 1800 Kgcnahoo.exe 43 PID 1800 wrote to memory of 1272 1800 Kgcnahoo.exe 43 PID 1800 wrote to memory of 1272 1800 Kgcnahoo.exe 43 PID 1800 wrote to memory of 1272 1800 Kgcnahoo.exe 43 PID 1272 wrote to memory of 1968 1272 Llpfjomf.exe 44 PID 1272 wrote to memory of 1968 1272 Llpfjomf.exe 44 PID 1272 wrote to memory of 1968 1272 Llpfjomf.exe 44 PID 1272 wrote to memory of 1968 1272 Llpfjomf.exe 44 PID 1968 wrote to memory of 1396 1968 Lgfjggll.exe 45 PID 1968 wrote to memory of 1396 1968 Lgfjggll.exe 45 PID 1968 wrote to memory of 1396 1968 Lgfjggll.exe 45 PID 1968 wrote to memory of 1396 1968 Lgfjggll.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\83eb5b8b1edaa6887fef7e7ffa4f99d1a5f86a9cf77f9a98b0744da4410da70b.exe"C:\Users\Admin\AppData\Local\Temp\83eb5b8b1edaa6887fef7e7ffa4f99d1a5f86a9cf77f9a98b0744da4410da70b.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Windows\SysWOW64\Iocgfhhc.exeC:\Windows\system32\Iocgfhhc.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Windows\SysWOW64\Iikkon32.exeC:\Windows\system32\Iikkon32.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Windows\SysWOW64\Ikjhki32.exeC:\Windows\system32\Ikjhki32.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Windows\SysWOW64\Ifolhann.exeC:\Windows\system32\Ifolhann.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\SysWOW64\Jpbcek32.exeC:\Windows\system32\Jpbcek32.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\SysWOW64\Jjjdhc32.exeC:\Windows\system32\Jjjdhc32.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Windows\SysWOW64\Jllqplnp.exeC:\Windows\system32\Jllqplnp.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Windows\SysWOW64\Kbjbge32.exeC:\Windows\system32\Kbjbge32.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\SysWOW64\Khgkpl32.exeC:\Windows\system32\Khgkpl32.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Windows\SysWOW64\Kfodfh32.exeC:\Windows\system32\Kfodfh32.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Windows\SysWOW64\Kdbepm32.exeC:\Windows\system32\Kdbepm32.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Windows\SysWOW64\Kageia32.exeC:\Windows\system32\Kageia32.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:708 -
C:\Windows\SysWOW64\Kgcnahoo.exeC:\Windows\system32\Kgcnahoo.exe14⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Windows\SysWOW64\Llpfjomf.exeC:\Windows\system32\Llpfjomf.exe15⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Windows\SysWOW64\Lgfjggll.exeC:\Windows\system32\Lgfjggll.exe16⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Windows\SysWOW64\Llbconkd.exeC:\Windows\system32\Llbconkd.exe17⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1396 -
C:\Windows\SysWOW64\Lcmklh32.exeC:\Windows\system32\Lcmklh32.exe18⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1792 -
C:\Windows\SysWOW64\Lekghdad.exeC:\Windows\system32\Lekghdad.exe19⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1248 -
C:\Windows\SysWOW64\Llepen32.exeC:\Windows\system32\Llepen32.exe20⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1448 -
C:\Windows\SysWOW64\Loclai32.exeC:\Windows\system32\Loclai32.exe21⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2736 -
C:\Windows\SysWOW64\Lhlqjone.exeC:\Windows\system32\Lhlqjone.exe22⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1056 -
C:\Windows\SysWOW64\Lcadghnk.exeC:\Windows\system32\Lcadghnk.exe23⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2860 -
C:\Windows\SysWOW64\Lepaccmo.exeC:\Windows\system32\Lepaccmo.exe24⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2516 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2516 -s 14025⤵
- Loads dropped DLL
- Program crash
PID:2704
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
448KB
MD56cebd86b20651263c115efe1fcdb20e4
SHA194f8daa33cb1ef665f9d86184103d781713ab7e3
SHA25636e0b61756b0f5311768c7c770ae28a416c74d7b5558c8075a4a95471243d0c4
SHA512e1a75b2a9dbf291732521e35dcf418b9a1698b8e824b2b1dc4983c318e2f7116e32d31a4d6ec447a7670ebf83a3164510dcad12818b9901f44d6f74344a45696
-
Filesize
448KB
MD5c412290b829088cf06bed3b282f834bb
SHA1627b6c666f2dfbd1e72aafdaff21efa937809157
SHA2564cf634e333f43daf306ac5e28d31e47d1b5cdfae869801f56640a49edc9a17d7
SHA512f95d1e94db4a9a81bf16bc7dd72ea5a9156ec9a135cbd0f399d09c696ddfb3a4bf440f324ec4d8f4319b01cacca8e0475837778a8258ec54efab5a9b158a5785
-
Filesize
448KB
MD5d934fb4b5c8b1515e2e5899085a044a1
SHA1b1b3e8ac89dcc0756b69de127a0c14f9f2f3b39b
SHA25615b19249d9b8fee5c6833a25209e28f3efb1c9d1fb216e183ebbcb65a53d4f39
SHA512c661d962bbf8e0e0ceb2fdfb94d3b2233e6ea5f67588a162998023ced2bc246659bda8ca07e905abd835e4c9741cb7141444ebcd59f9c2fda852cdf096d4c9d6
-
Filesize
448KB
MD5047501665970b79a9d7769ef38c80556
SHA19595fcc30fa031622542e84be419f0c1e8aebb10
SHA25680af5a95168a4e62e9bda35f503328236a5757768dfcbf338349a001f27a215e
SHA5120d32ab9100b1a78db1af049f162b54e9f3cd21511d108a787585b697920f3d6a8ac6405a82849c5bd3d4cc0d1114d45f101ec5fe5eb13cb68ceb88b432f8e602
-
Filesize
448KB
MD5a69a8d956a3bbdde85201bee825387e6
SHA13b02f2d7c8dda1942382306aaeeedaff37bd5674
SHA2564d5a004ffb598bdcd59128f7b5aaf80ff52cfdba87f44cfe3e15ba4f75579283
SHA5129773b10712dddace29d3ee1c3a6dcfcf9eab4a3a29ced456a19b7416a157c18a4e612486f09eb62db772ae746b63dfee81a9564932d1fb3346e871ebb57909d4
-
Filesize
448KB
MD549dc5ee8bced6beaf38f5e8b4900a4bc
SHA1236764de549b5d7bf517da16e215c35ec994f3c1
SHA2569d0890dd04a68bbf9e8345a35a6ae33897e6bf379521788180d14038cf8d979f
SHA5123666f03cce7ecb81b1b9f2ec8249fe9b78f92cd95b4d5314ea29089a912b5c6c300aaef1037f3c986cff27c3b5873b4cc15bf4189d5c3e5af83cbefc86ba840c
-
Filesize
448KB
MD5cdf4a430fd6f294d04c5b939c08eaed3
SHA188aa7051f9e7a3f6a9ea60833eba948ef4d66a5d
SHA256d8b2dbca18434b1a241e2bbf8a5fda6bcd868a8189aa4ddaffd8d1e2944581c0
SHA512d540feec4f4eeebeef6ed6586156b032dba78fe0dd23e4d6392b41af32c33f7662f305eb997301b3820daeaf994dc6c1d701b464d559fc61e29936c87de927b6
-
Filesize
448KB
MD558537152b9bca8ce5314a8dfb7218012
SHA14075328f710a65a1df64b4616006f7c6c0b1d97b
SHA25665d26342ef1dae75ad56f6d701de7be4d8c2c810774895701884e95399f2efd5
SHA512dcde7f6540878f4655b257d2fbc10a33b5098998ac5b621a5afbaaf7e67d100bf155a5c876989648576819bfe995d25611bfa04b5b595f97a88c97f54766d08d
-
Filesize
448KB
MD5d0e8c1863e48dcc1011a40da7da9265a
SHA1bb8d1cf8895cd528f144c96884d05294d092f848
SHA256873e01974eee85883ef7d75733b047fbeecfdbc9d3e1b1ed154140956caff2f8
SHA512182683a72503e40632f7c4c5bfc25901f864a980088a97d9fecfd9f41d083561339e574962e41b0006249c92281bc895993bad7b274edb2d2e313369b4e0555d
-
Filesize
448KB
MD584ad9eb52f7ce076473d6a7a8c7f7065
SHA1836f63a62d7fac1f741fc705c80ece8b15513ce6
SHA256a3c985561a728feb74b94cb71adcd41d2e957784067fa9cb4db4de92ecb82c5a
SHA5122ab90f6b28b0a180de7bc9cc14afe0852512b6dd31f43baf8a8a7d64e32de3ce48b7cd0566673de6442a8b0c480d6153eb1a682f9803168d909856aa949a62a9
-
Filesize
448KB
MD5714b28bf769d29c0511aac2b96832d5d
SHA1f825a0fc72e0ca88310d3535a6f8618a6b3f85ba
SHA256008a73a4ae666c378732e88f5c619677061adf8f3f1b89e8f4f2643acbbd53b8
SHA5126e85f69ad317e9d9789f8e1cbc895a3596b4762747211609dec65346db2ca8c1f6c83d9f0b4e91388b24f0eee55883e0030582fac8814b20c1ea3794dcba17e5
-
Filesize
448KB
MD5c8caec3298203572995c225ed65eb7e7
SHA11436bdddd00709537fed7bcd8bd563098b4b7834
SHA256343b22d1ec52b0f14d4fdb7a46c5bc629752202c122683e52b0048d1a0af4b81
SHA5126018a91fc1682ae4391f3428ea697121af772a5d009d79109e35b4c458bc308bebdd851b5992a8f35ed4aa5bb084cd154718952ba68dee4ab86677534e6c4e53
-
Filesize
448KB
MD5d66f0fe738cf6496b7cf686fc41e222d
SHA10c828dcadd680c88a15b8684091f6d28392e373d
SHA2562efe0fec110e7277a0ef2fa048e66517ec4af1836fdb00af25a0792609d848e3
SHA512d4a014d780adfe534e879f6027944a74a54bc75a52f0a26d5979be8b07f4ea6d50bdf3002a33548f497d39c042fbc1cec7ac10355efa76899095e098a17fc3cd
-
Filesize
448KB
MD5465e4624ec8f5ab3fded8aac7e7150da
SHA1d38ae43d8bb5c77bd7b23c40d51ddf7170b9a286
SHA256aea52ba434be3b7b80b85925e6aa231ef407dc96f65acff0ae480ec92be73973
SHA512e385e4434a6fd5804a0d8c42065d419338d26827590f46b417c1f2a0abf6af29e6845a38b87d124ee32f2fad8b3481b4712053b122a5838655d0774b6a535be8
-
Filesize
448KB
MD594a71af928a8c272cea364233bb8732f
SHA1607561cce39bb4c63295fc23da65377b4ad013d4
SHA25654c2bf6dd8b569203917eefe3d72e44611d3a39ba8d7a7839c5f3e0c5e3e715a
SHA512b68cd2cacb1acc56469199626a116f7d0a54293f24160e35440bfc19d5e16877b2b51b37768d5c00a779dd2c2bebb9b907d86630cbb04f06d9b0a8efa0a347a5
-
Filesize
448KB
MD55b59af06cfd536be5d0b8ef5cf796e49
SHA1c9b3df137d60165989d13a6ee0b80d4edfde4e93
SHA25617d9464c64d2a7afd516fb18d1154a6c756f3152af9e289b5a099fa92a965e14
SHA512578f97c6c78039c23d3a08e320c436c44fc6b2e2a8772a56ac4834b4d45fb6a63ce288e1bf3ed0153d911c3fbd02b0270a30813e175d7bbaa071bbeb7f889110
-
Filesize
448KB
MD597f0f03e99b538214877f5ba46918c83
SHA1db2cea5b8ac9dcdb4346666ced44dff657afa839
SHA256ccd57921f9764fd5e64787fb6a0f0ecab63d2c714dcb736beaa6a019767013ee
SHA5128fddcd373b265d992f612615624ca2814dc312fc2fe9085b5845d7559830938269d3fb32e1f90258d80e1bfa8c9002339ff6858c9bcc966b1de1b0d22e5e7188
-
Filesize
448KB
MD5a26f7fe5b3abf9b8af8374de4768404b
SHA1cb6e28c7da995fa3ddf7722eda42a7c5edac57bb
SHA25666705311433112931109dfee3451bbd3a0da4917143c677d6123dcd52aaeb1c0
SHA51234fb549c2b5ea3be75b714d2d1098b91d6582290a0c9266be2476c4a9952e0306554edfb4eb2b3602274943d600982de860515441986bf154e5aba86f74f31cd
-
Filesize
448KB
MD53da8b0ccf427b332dde189fad0ec00e0
SHA17b619bebe090422c073f7c3f6695776b056fc6fe
SHA25660e0c3a72fba26fe28abfd631fa222f835fffae3705ad1cd4409823ed353aa18
SHA5126684680eba23172076bf4d13621c99f89392938eed08d89ae9c3ef11b7417b238b5ec00451c0ac3b834d01052c8d7bf0804d8b60701ce58c3d3c1f55269b4685
-
Filesize
448KB
MD52044c72651a970b18a18c97b045760df
SHA1949b133a9534a53702d6fe6ce74771f74ca7478e
SHA256a84229666fce081c6d88fc5e3817cd8776c09065e21a813ecec8d770a32f3116
SHA512f89bdcc1405aa314f757b8081293e6ab7788ce12657bc827841480a6348bef82dda87d424dc446dd9bf0914e46acbef680977f1fc30646aed12f1b48de3ae65f
-
Filesize
448KB
MD59937e354093bc4280ec8563460dc2ed6
SHA1400728469f3ce6248b13062b7bd44aa7e411022f
SHA256568e9e2bc89f0dfbba8f91a18476fcddb5211e925b8cc3e4739bab3c9e009640
SHA5125c9a7c930c99827d9dde75dc9cf866cb398a523da66519ce306e5c15a271370074b11010a8dee2ad7d30d9a8cbd02985bd713784b63d5723cb5c10986bec1520
-
Filesize
448KB
MD5b955f0af1acc5a0028d3cbac4379f589
SHA1450ee12822bd2ca0772345bbc06f77e78a7a67eb
SHA25659959c9c7a60c1f149177dbbd8fc85d905956f07cb3d58e46c6b64b015cdaac2
SHA512b71f4d08c10b98dc3cf4e80311bd0ba77ec5b4935504e8b6e9eded9384c1d0fec098db0c00fcac1ff9a196ffe7754221ce6c963538518d99bc828d045c945d97
-
Filesize
448KB
MD52480e6280bd17f2a4e8d783869ea8162
SHA10ec9025fd1bd3ee6dd561652f6c8eff2699a35a9
SHA256ed77459739bbd732b107045dc5116c5ae93e92e43cf3e4b3c64d3346e8f7e12d
SHA512adacec6593c0dc393bfcdd76cd62a4eaf93b9abc12b167bf096f4be959424c8f0de758f167a8a940f63847541ee7c3faa4da457c760fd1a610ed1944ed650153