Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2024, 16:24
Static task
static1
Behavioral task
behavioral1
Sample
1d46ba5259139ff884f8e37aabcadb9452659c22112098e1ded7031dd206ce47N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
1d46ba5259139ff884f8e37aabcadb9452659c22112098e1ded7031dd206ce47N.exe
Resource
win10v2004-20241007-en
General
-
Target
1d46ba5259139ff884f8e37aabcadb9452659c22112098e1ded7031dd206ce47N.exe
-
Size
64KB
-
MD5
cf5c6a4d31ab88155c76067852282950
-
SHA1
69e31f51b16098fd86db19342cb1e09e839674b6
-
SHA256
1d46ba5259139ff884f8e37aabcadb9452659c22112098e1ded7031dd206ce47
-
SHA512
539f30a183cb28e88577110550848adfd11f6b27c30086ea3edac40fee9781230e0a677d806d47ada5cd9b2d43e08e0b6658cfc29a49dfd38f9ce7349b9a0226
-
SSDEEP
1536:lC7aZ3WjrP84gynNdl5rWqmfKI7tBnO2LcrDWBi:lCmZ3Wjr8Kr4tlTc2Bi
Malware Config
Extracted
berbew
http://crutop.nu/index.php
http://crutop.ru/index.php
http://mazafaka.ru/index.php
http://color-bank.ru/index.php
http://asechka.ru/index.php
http://trojan.ru/index.php
http://fuck.ru/index.php
http://goldensand.ru/index.php
http://filesearch.ru/index.php
http://devx.nm.ru/index.php
http://ros-neftbank.ru/index.php
http://lovingod.host.sk/index.php
http://www.redline.ru/index.php
http://cvv.ru/index.php
http://hackers.lv/index.php
http://fethard.biz/index.php
http://ldark.nm.ru/index.htm
http://gaz-prom.ru/index.htm
http://promo.ru/index.htm
http://potleaf.chat.ru/index.htm
http://kadet.ru/index.htm
http://cvv.ru/index.htm
http://crutop.nu/index.htm
http://crutop.ru/index.htm
http://mazafaka.ru/index.htm
http://xware.cjb.net/index.htm
http://konfiskat.org/index.htm
http://parex-bank.ru/index.htm
http://kidos-bank.ru/index.htm
http://kavkaz.ru/index.htm
http://fethard.biz/index.htm
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qcgffqei.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aabmqd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Banllbdn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dhocqigp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dgbdlf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bnkgeg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bjagjhnc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dodbbdbb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cdhhdlid.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cffdpghg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ddjejl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dmefhako.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dmgbnq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qjoankoi.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qddfkd32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bgcknmop.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ddakjkqi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dogogcpo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Banllbdn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Danecp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ddakjkqi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ajfhnjhq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ceqnmpfo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Anogiicl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cmqmma32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qjoankoi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bjmnoi32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bnkgeg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Delnin32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aepefb32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cfdhkhjj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dhhnpjmh.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pqbdjfln.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cfbkeh32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dogogcpo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bmngqdpj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bjfaeh32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dfnjafap.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Acnlgp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bagflcje.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bagflcje.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bjfaeh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Chjaol32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dgbdlf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Aabmqd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Aepefb32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bmkjkd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cfbkeh32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pcppfaka.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Chjaol32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cjinkg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bgcknmop.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" 1d46ba5259139ff884f8e37aabcadb9452659c22112098e1ded7031dd206ce47N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pqbdjfln.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bjokdipf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pjhlml32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pjhlml32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bjmnoi32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pjmehkqk.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Accfbokl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bganhm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ajhddjfn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ajkaii32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Accfbokl.exe -
Berbew family
-
Executes dropped EXE 64 IoCs
pid Process 3464 Pcncpbmd.exe 3556 Pjhlml32.exe 1604 Pmfhig32.exe 2356 Pqbdjfln.exe 4204 Pcppfaka.exe 2344 Pjjhbl32.exe 1328 Pqdqof32.exe 1432 Pgnilpah.exe 3260 Pjmehkqk.exe 4164 Qdbiedpa.exe 2800 Qgqeappe.exe 3488 Qjoankoi.exe 2252 Qddfkd32.exe 1484 Qcgffqei.exe 1040 Anmjcieo.exe 1972 Anogiicl.exe 3680 Ajfhnjhq.exe 2240 Acnlgp32.exe 4724 Ajhddjfn.exe 1592 Aabmqd32.exe 4976 Acqimo32.exe 2228 Ajkaii32.exe 4548 Anfmjhmd.exe 3348 Aepefb32.exe 2700 Accfbokl.exe 2332 Bjmnoi32.exe 2304 Bnhjohkb.exe 4972 Bmkjkd32.exe 4420 Bagflcje.exe 820 Bebblb32.exe 4092 Bganhm32.exe 4876 Bjokdipf.exe 5028 Bnkgeg32.exe 4736 Bmngqdpj.exe 1320 Bgcknmop.exe 1256 Bjagjhnc.exe 312 Bgehcmmm.exe 4540 Banllbdn.exe 3588 Bjfaeh32.exe 1704 Chjaol32.exe 1824 Cjinkg32.exe 1352 Cfpnph32.exe 2880 Cnffqf32.exe 2852 Ceqnmpfo.exe 1224 Cfbkeh32.exe 4248 Cmlcbbcj.exe 1364 Ceckcp32.exe 4868 Cfdhkhjj.exe 4752 Cmnpgb32.exe 1192 Cdhhdlid.exe 3448 Cffdpghg.exe 4284 Cmqmma32.exe 2936 Ddjejl32.exe 4176 Danecp32.exe 668 Dhhnpjmh.exe 1660 Dmefhako.exe 3664 Delnin32.exe 4188 Dfnjafap.exe 3968 Dodbbdbb.exe 2132 Dmgbnq32.exe 812 Ddakjkqi.exe 3696 Dfpgffpm.exe 4428 Dogogcpo.exe 1476 Daekdooc.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\Qciaajej.dll Qdbiedpa.exe File opened for modification C:\Windows\SysWOW64\Bebblb32.exe Bagflcje.exe File created C:\Windows\SysWOW64\Cmnpgb32.exe Cfdhkhjj.exe File opened for modification C:\Windows\SysWOW64\Cdhhdlid.exe Cmnpgb32.exe File opened for modification C:\Windows\SysWOW64\Dgbdlf32.exe Dhocqigp.exe File created C:\Windows\SysWOW64\Acnlgp32.exe Ajfhnjhq.exe File opened for modification C:\Windows\SysWOW64\Ajhddjfn.exe Acnlgp32.exe File opened for modification C:\Windows\SysWOW64\Bagflcje.exe Bmkjkd32.exe File created C:\Windows\SysWOW64\Ddakjkqi.exe Dmgbnq32.exe File created C:\Windows\SysWOW64\Qdbiedpa.exe Pjmehkqk.exe File created C:\Windows\SysWOW64\Qgqeappe.exe Qdbiedpa.exe File created C:\Windows\SysWOW64\Anfmjhmd.exe Ajkaii32.exe File created C:\Windows\SysWOW64\Ljbncc32.dll Ajkaii32.exe File created C:\Windows\SysWOW64\Cmlcbbcj.exe Cfbkeh32.exe File created C:\Windows\SysWOW64\Delnin32.exe Dmefhako.exe File created C:\Windows\SysWOW64\Nlaqpipg.dll Pcncpbmd.exe File opened for modification C:\Windows\SysWOW64\Pcppfaka.exe Pqbdjfln.exe File created C:\Windows\SysWOW64\Pqdqof32.exe Pjjhbl32.exe File opened for modification C:\Windows\SysWOW64\Qcgffqei.exe Qddfkd32.exe File opened for modification C:\Windows\SysWOW64\Bmngqdpj.exe Bnkgeg32.exe File opened for modification C:\Windows\SysWOW64\Bjagjhnc.exe Bgcknmop.exe File opened for modification C:\Windows\SysWOW64\Danecp32.exe Ddjejl32.exe File created C:\Windows\SysWOW64\Poahbe32.dll Delnin32.exe File created C:\Windows\SysWOW64\Lbabpnmn.dll Dfpgffpm.exe File created C:\Windows\SysWOW64\Daekdooc.exe Dogogcpo.exe File opened for modification C:\Windows\SysWOW64\Dmllipeg.exe Dgbdlf32.exe File created C:\Windows\SysWOW64\Pjjhbl32.exe Pcppfaka.exe File opened for modification C:\Windows\SysWOW64\Qgqeappe.exe Qdbiedpa.exe File opened for modification C:\Windows\SysWOW64\Anfmjhmd.exe Ajkaii32.exe File created C:\Windows\SysWOW64\Kmfiloih.dll Anfmjhmd.exe File created C:\Windows\SysWOW64\Banllbdn.exe Bgehcmmm.exe File created C:\Windows\SysWOW64\Lpggmhkg.dll Cmnpgb32.exe File created C:\Windows\SysWOW64\Ohmoom32.dll Dogogcpo.exe File created C:\Windows\SysWOW64\Pmfhig32.exe Pjhlml32.exe File opened for modification C:\Windows\SysWOW64\Ajfhnjhq.exe Anogiicl.exe File created C:\Windows\SysWOW64\Acqimo32.exe Aabmqd32.exe File created C:\Windows\SysWOW64\Aepefb32.exe Anfmjhmd.exe File created C:\Windows\SysWOW64\Bebblb32.exe Bagflcje.exe File created C:\Windows\SysWOW64\Pmgmnjcj.dll Bjokdipf.exe File opened for modification C:\Windows\SysWOW64\Bgehcmmm.exe Bjagjhnc.exe File opened for modification C:\Windows\SysWOW64\Cnffqf32.exe Cfpnph32.exe File created C:\Windows\SysWOW64\Danecp32.exe Ddjejl32.exe File opened for modification C:\Windows\SysWOW64\Delnin32.exe Dmefhako.exe File created C:\Windows\SysWOW64\Pcncpbmd.exe 1d46ba5259139ff884f8e37aabcadb9452659c22112098e1ded7031dd206ce47N.exe File opened for modification C:\Windows\SysWOW64\Bjokdipf.exe Bganhm32.exe File created C:\Windows\SysWOW64\Bgcknmop.exe Bmngqdpj.exe File created C:\Windows\SysWOW64\Bjfaeh32.exe Banllbdn.exe File created C:\Windows\SysWOW64\Ndhkdnkh.dll Banllbdn.exe File created C:\Windows\SysWOW64\Lfjhbihm.dll Cfpnph32.exe File created C:\Windows\SysWOW64\Cdhhdlid.exe Cmnpgb32.exe File created C:\Windows\SysWOW64\Dfnjafap.exe Delnin32.exe File created C:\Windows\SysWOW64\Gifhkeje.dll Dmgbnq32.exe File created C:\Windows\SysWOW64\Ifoihl32.dll Pqbdjfln.exe File created C:\Windows\SysWOW64\Hgaoidec.dll Pgnilpah.exe File created C:\Windows\SysWOW64\Qjoankoi.exe Qgqeappe.exe File created C:\Windows\SysWOW64\Ghekjiam.dll Ceqnmpfo.exe File opened for modification C:\Windows\SysWOW64\Dhocqigp.exe Daekdooc.exe File created C:\Windows\SysWOW64\Odaoecld.dll Pcppfaka.exe File created C:\Windows\SysWOW64\Pgnilpah.exe Pqdqof32.exe File opened for modification C:\Windows\SysWOW64\Ajkaii32.exe Acqimo32.exe File opened for modification C:\Windows\SysWOW64\Cfbkeh32.exe Ceqnmpfo.exe File created C:\Windows\SysWOW64\Eifnachf.dll Cmlcbbcj.exe File created C:\Windows\SysWOW64\Gmcfdb32.dll Dmefhako.exe File created C:\Windows\SysWOW64\Fnmnbf32.dll Dfnjafap.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2388 4684 WerFault.exe 148 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pqdqof32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Aepefb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bnhjohkb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bganhm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Banllbdn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cmnpgb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cmqmma32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qgqeappe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qddfkd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dhhnpjmh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ddakjkqi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bnkgeg32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dodbbdbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pjmehkqk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qdbiedpa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cfbkeh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cmlcbbcj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Anmjcieo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Anfmjhmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bagflcje.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bjagjhnc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dmgbnq32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pmfhig32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pcppfaka.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bjfaeh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cnffqf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dhocqigp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pjjhbl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bjokdipf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cffdpghg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dfpgffpm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ajfhnjhq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bmkjkd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ceckcp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dmllipeg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pjhlml32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cjinkg32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ajhddjfn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cfpnph32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Aabmqd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Acqimo32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ajkaii32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cfdhkhjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Danecp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pgnilpah.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Anogiicl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ddjejl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Daekdooc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bmngqdpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bgehcmmm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bgcknmop.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pqbdjfln.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bebblb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qcgffqei.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Accfbokl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Chjaol32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dmefhako.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dfnjafap.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1d46ba5259139ff884f8e37aabcadb9452659c22112098e1ded7031dd206ce47N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pcncpbmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cdhhdlid.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dgbdlf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qjoankoi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ceqnmpfo.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Acqimo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Abkobg32.dll" Bmkjkd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Akichh32.dll" Bmngqdpj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Okgoadbf.dll" Cffdpghg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pqbdjfln.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Odaoecld.dll" Pcppfaka.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pqdqof32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Maghgl32.dll" Ajfhnjhq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Delnin32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dhocqigp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Anogiicl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qihfjd32.dll" Bgehcmmm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Daekdooc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pjhlml32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pcppfaka.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pgnilpah.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Anmjcieo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dmgbnq32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Qddfkd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eflgme32.dll" Bgcknmop.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bjfaeh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Danecp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cnffqf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ghilmi32.dll" Ceckcp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Delnin32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Elkadb32.dll" Daekdooc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nlaqpipg.dll" Pcncpbmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pqdqof32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ickfifmb.dll" Anogiicl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bjagjhnc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bganhm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hfanhp32.dll" Cmqmma32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Poahbe32.dll" Delnin32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kmdjdl32.dll" Ddakjkqi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hgaoidec.dll" Pgnilpah.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lommhphi.dll" Bjmnoi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bnkgeg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cfpnph32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ddjejl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nbgngp32.dll" Danecp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" 1d46ba5259139ff884f8e37aabcadb9452659c22112098e1ded7031dd206ce47N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kgldjcmk.dll" Pjmehkqk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ajkaii32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ndhkdnkh.dll" Banllbdn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dogogcpo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bnhjohkb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bjokdipf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dhhnpjmh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dmefhako.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dgbdlf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Elcmjaol.dll" Pjhlml32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ajfhnjhq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bnhjohkb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cmlcbbcj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fmjkjk32.dll" Cfbkeh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cfdhkhjj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dodbbdbb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 1d46ba5259139ff884f8e37aabcadb9452659c22112098e1ded7031dd206ce47N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Qjoankoi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Idnljnaa.dll" Ajhddjfn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bjfaeh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ddakjkqi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pjjhbl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bjmnoi32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 556 wrote to memory of 3464 556 1d46ba5259139ff884f8e37aabcadb9452659c22112098e1ded7031dd206ce47N.exe 82 PID 556 wrote to memory of 3464 556 1d46ba5259139ff884f8e37aabcadb9452659c22112098e1ded7031dd206ce47N.exe 82 PID 556 wrote to memory of 3464 556 1d46ba5259139ff884f8e37aabcadb9452659c22112098e1ded7031dd206ce47N.exe 82 PID 3464 wrote to memory of 3556 3464 Pcncpbmd.exe 83 PID 3464 wrote to memory of 3556 3464 Pcncpbmd.exe 83 PID 3464 wrote to memory of 3556 3464 Pcncpbmd.exe 83 PID 3556 wrote to memory of 1604 3556 Pjhlml32.exe 84 PID 3556 wrote to memory of 1604 3556 Pjhlml32.exe 84 PID 3556 wrote to memory of 1604 3556 Pjhlml32.exe 84 PID 1604 wrote to memory of 2356 1604 Pmfhig32.exe 85 PID 1604 wrote to memory of 2356 1604 Pmfhig32.exe 85 PID 1604 wrote to memory of 2356 1604 Pmfhig32.exe 85 PID 2356 wrote to memory of 4204 2356 Pqbdjfln.exe 86 PID 2356 wrote to memory of 4204 2356 Pqbdjfln.exe 86 PID 2356 wrote to memory of 4204 2356 Pqbdjfln.exe 86 PID 4204 wrote to memory of 2344 4204 Pcppfaka.exe 87 PID 4204 wrote to memory of 2344 4204 Pcppfaka.exe 87 PID 4204 wrote to memory of 2344 4204 Pcppfaka.exe 87 PID 2344 wrote to memory of 1328 2344 Pjjhbl32.exe 88 PID 2344 wrote to memory of 1328 2344 Pjjhbl32.exe 88 PID 2344 wrote to memory of 1328 2344 Pjjhbl32.exe 88 PID 1328 wrote to memory of 1432 1328 Pqdqof32.exe 89 PID 1328 wrote to memory of 1432 1328 Pqdqof32.exe 89 PID 1328 wrote to memory of 1432 1328 Pqdqof32.exe 89 PID 1432 wrote to memory of 3260 1432 Pgnilpah.exe 90 PID 1432 wrote to memory of 3260 1432 Pgnilpah.exe 90 PID 1432 wrote to memory of 3260 1432 Pgnilpah.exe 90 PID 3260 wrote to memory of 4164 3260 Pjmehkqk.exe 91 PID 3260 wrote to memory of 4164 3260 Pjmehkqk.exe 91 PID 3260 wrote to memory of 4164 3260 Pjmehkqk.exe 91 PID 4164 wrote to memory of 2800 4164 Qdbiedpa.exe 92 PID 4164 wrote to memory of 2800 4164 Qdbiedpa.exe 92 PID 4164 wrote to memory of 2800 4164 Qdbiedpa.exe 92 PID 2800 wrote to memory of 3488 2800 Qgqeappe.exe 93 PID 2800 wrote to memory of 3488 2800 Qgqeappe.exe 93 PID 2800 wrote to memory of 3488 2800 Qgqeappe.exe 93 PID 3488 wrote to memory of 2252 3488 Qjoankoi.exe 94 PID 3488 wrote to memory of 2252 3488 Qjoankoi.exe 94 PID 3488 wrote to memory of 2252 3488 Qjoankoi.exe 94 PID 2252 wrote to memory of 1484 2252 Qddfkd32.exe 95 PID 2252 wrote to memory of 1484 2252 Qddfkd32.exe 95 PID 2252 wrote to memory of 1484 2252 Qddfkd32.exe 95 PID 1484 wrote to memory of 1040 1484 Qcgffqei.exe 96 PID 1484 wrote to memory of 1040 1484 Qcgffqei.exe 96 PID 1484 wrote to memory of 1040 1484 Qcgffqei.exe 96 PID 1040 wrote to memory of 1972 1040 Anmjcieo.exe 97 PID 1040 wrote to memory of 1972 1040 Anmjcieo.exe 97 PID 1040 wrote to memory of 1972 1040 Anmjcieo.exe 97 PID 1972 wrote to memory of 3680 1972 Anogiicl.exe 98 PID 1972 wrote to memory of 3680 1972 Anogiicl.exe 98 PID 1972 wrote to memory of 3680 1972 Anogiicl.exe 98 PID 3680 wrote to memory of 2240 3680 Ajfhnjhq.exe 99 PID 3680 wrote to memory of 2240 3680 Ajfhnjhq.exe 99 PID 3680 wrote to memory of 2240 3680 Ajfhnjhq.exe 99 PID 2240 wrote to memory of 4724 2240 Acnlgp32.exe 100 PID 2240 wrote to memory of 4724 2240 Acnlgp32.exe 100 PID 2240 wrote to memory of 4724 2240 Acnlgp32.exe 100 PID 4724 wrote to memory of 1592 4724 Ajhddjfn.exe 101 PID 4724 wrote to memory of 1592 4724 Ajhddjfn.exe 101 PID 4724 wrote to memory of 1592 4724 Ajhddjfn.exe 101 PID 1592 wrote to memory of 4976 1592 Aabmqd32.exe 102 PID 1592 wrote to memory of 4976 1592 Aabmqd32.exe 102 PID 1592 wrote to memory of 4976 1592 Aabmqd32.exe 102 PID 4976 wrote to memory of 2228 4976 Acqimo32.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\1d46ba5259139ff884f8e37aabcadb9452659c22112098e1ded7031dd206ce47N.exe"C:\Users\Admin\AppData\Local\Temp\1d46ba5259139ff884f8e37aabcadb9452659c22112098e1ded7031dd206ce47N.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:556 -
C:\Windows\SysWOW64\Pcncpbmd.exeC:\Windows\system32\Pcncpbmd.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3464 -
C:\Windows\SysWOW64\Pjhlml32.exeC:\Windows\system32\Pjhlml32.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3556 -
C:\Windows\SysWOW64\Pmfhig32.exeC:\Windows\system32\Pmfhig32.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Windows\SysWOW64\Pqbdjfln.exeC:\Windows\system32\Pqbdjfln.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\SysWOW64\Pcppfaka.exeC:\Windows\system32\Pcppfaka.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4204 -
C:\Windows\SysWOW64\Pjjhbl32.exeC:\Windows\system32\Pjjhbl32.exe7⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Windows\SysWOW64\Pqdqof32.exeC:\Windows\system32\Pqdqof32.exe8⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Windows\SysWOW64\Pgnilpah.exeC:\Windows\system32\Pgnilpah.exe9⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1432 -
C:\Windows\SysWOW64\Pjmehkqk.exeC:\Windows\system32\Pjmehkqk.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3260 -
C:\Windows\SysWOW64\Qdbiedpa.exeC:\Windows\system32\Qdbiedpa.exe11⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4164 -
C:\Windows\SysWOW64\Qgqeappe.exeC:\Windows\system32\Qgqeappe.exe12⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Windows\SysWOW64\Qjoankoi.exeC:\Windows\system32\Qjoankoi.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3488 -
C:\Windows\SysWOW64\Qddfkd32.exeC:\Windows\system32\Qddfkd32.exe14⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Windows\SysWOW64\Qcgffqei.exeC:\Windows\system32\Qcgffqei.exe15⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Windows\SysWOW64\Anmjcieo.exeC:\Windows\system32\Anmjcieo.exe16⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Windows\SysWOW64\Anogiicl.exeC:\Windows\system32\Anogiicl.exe17⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\SysWOW64\Ajfhnjhq.exeC:\Windows\system32\Ajfhnjhq.exe18⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3680 -
C:\Windows\SysWOW64\Acnlgp32.exeC:\Windows\system32\Acnlgp32.exe19⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Windows\SysWOW64\Ajhddjfn.exeC:\Windows\system32\Ajhddjfn.exe20⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4724 -
C:\Windows\SysWOW64\Aabmqd32.exeC:\Windows\system32\Aabmqd32.exe21⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Windows\SysWOW64\Acqimo32.exeC:\Windows\system32\Acqimo32.exe22⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Windows\SysWOW64\Ajkaii32.exeC:\Windows\system32\Ajkaii32.exe23⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2228 -
C:\Windows\SysWOW64\Anfmjhmd.exeC:\Windows\system32\Anfmjhmd.exe24⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4548 -
C:\Windows\SysWOW64\Aepefb32.exeC:\Windows\system32\Aepefb32.exe25⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3348 -
C:\Windows\SysWOW64\Accfbokl.exeC:\Windows\system32\Accfbokl.exe26⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2700 -
C:\Windows\SysWOW64\Bjmnoi32.exeC:\Windows\system32\Bjmnoi32.exe27⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:2332 -
C:\Windows\SysWOW64\Bnhjohkb.exeC:\Windows\system32\Bnhjohkb.exe28⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2304 -
C:\Windows\SysWOW64\Bmkjkd32.exeC:\Windows\system32\Bmkjkd32.exe29⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4972 -
C:\Windows\SysWOW64\Bagflcje.exeC:\Windows\system32\Bagflcje.exe30⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4420 -
C:\Windows\SysWOW64\Bebblb32.exeC:\Windows\system32\Bebblb32.exe31⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:820 -
C:\Windows\SysWOW64\Bganhm32.exeC:\Windows\system32\Bganhm32.exe32⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4092 -
C:\Windows\SysWOW64\Bjokdipf.exeC:\Windows\system32\Bjokdipf.exe33⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4876 -
C:\Windows\SysWOW64\Bnkgeg32.exeC:\Windows\system32\Bnkgeg32.exe34⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5028 -
C:\Windows\SysWOW64\Bmngqdpj.exeC:\Windows\system32\Bmngqdpj.exe35⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4736 -
C:\Windows\SysWOW64\Bgcknmop.exeC:\Windows\system32\Bgcknmop.exe36⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1320 -
C:\Windows\SysWOW64\Bjagjhnc.exeC:\Windows\system32\Bjagjhnc.exe37⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1256 -
C:\Windows\SysWOW64\Bgehcmmm.exeC:\Windows\system32\Bgehcmmm.exe38⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:312 -
C:\Windows\SysWOW64\Banllbdn.exeC:\Windows\system32\Banllbdn.exe39⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4540 -
C:\Windows\SysWOW64\Bjfaeh32.exeC:\Windows\system32\Bjfaeh32.exe40⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3588 -
C:\Windows\SysWOW64\Chjaol32.exeC:\Windows\system32\Chjaol32.exe41⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1704 -
C:\Windows\SysWOW64\Cjinkg32.exeC:\Windows\system32\Cjinkg32.exe42⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1824 -
C:\Windows\SysWOW64\Cfpnph32.exeC:\Windows\system32\Cfpnph32.exe43⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1352 -
C:\Windows\SysWOW64\Cnffqf32.exeC:\Windows\system32\Cnffqf32.exe44⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2880 -
C:\Windows\SysWOW64\Ceqnmpfo.exeC:\Windows\system32\Ceqnmpfo.exe45⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2852 -
C:\Windows\SysWOW64\Cfbkeh32.exeC:\Windows\system32\Cfbkeh32.exe46⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1224 -
C:\Windows\SysWOW64\Cmlcbbcj.exeC:\Windows\system32\Cmlcbbcj.exe47⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4248 -
C:\Windows\SysWOW64\Ceckcp32.exeC:\Windows\system32\Ceckcp32.exe48⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1364 -
C:\Windows\SysWOW64\Cfdhkhjj.exeC:\Windows\system32\Cfdhkhjj.exe49⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4868 -
C:\Windows\SysWOW64\Cmnpgb32.exeC:\Windows\system32\Cmnpgb32.exe50⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4752 -
C:\Windows\SysWOW64\Cdhhdlid.exeC:\Windows\system32\Cdhhdlid.exe51⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1192 -
C:\Windows\SysWOW64\Cffdpghg.exeC:\Windows\system32\Cffdpghg.exe52⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3448 -
C:\Windows\SysWOW64\Cmqmma32.exeC:\Windows\system32\Cmqmma32.exe53⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4284 -
C:\Windows\SysWOW64\Ddjejl32.exeC:\Windows\system32\Ddjejl32.exe54⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2936 -
C:\Windows\SysWOW64\Danecp32.exeC:\Windows\system32\Danecp32.exe55⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4176 -
C:\Windows\SysWOW64\Dhhnpjmh.exeC:\Windows\system32\Dhhnpjmh.exe56⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:668 -
C:\Windows\SysWOW64\Dmefhako.exeC:\Windows\system32\Dmefhako.exe57⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1660 -
C:\Windows\SysWOW64\Delnin32.exeC:\Windows\system32\Delnin32.exe58⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:3664 -
C:\Windows\SysWOW64\Dfnjafap.exeC:\Windows\system32\Dfnjafap.exe59⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4188 -
C:\Windows\SysWOW64\Dodbbdbb.exeC:\Windows\system32\Dodbbdbb.exe60⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3968 -
C:\Windows\SysWOW64\Dmgbnq32.exeC:\Windows\system32\Dmgbnq32.exe61⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2132 -
C:\Windows\SysWOW64\Ddakjkqi.exeC:\Windows\system32\Ddakjkqi.exe62⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:812 -
C:\Windows\SysWOW64\Dfpgffpm.exeC:\Windows\system32\Dfpgffpm.exe63⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3696 -
C:\Windows\SysWOW64\Dogogcpo.exeC:\Windows\system32\Dogogcpo.exe64⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:4428 -
C:\Windows\SysWOW64\Daekdooc.exeC:\Windows\system32\Daekdooc.exe65⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1476 -
C:\Windows\SysWOW64\Dhocqigp.exeC:\Windows\system32\Dhocqigp.exe66⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1600 -
C:\Windows\SysWOW64\Dgbdlf32.exeC:\Windows\system32\Dgbdlf32.exe67⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4360 -
C:\Windows\SysWOW64\Dmllipeg.exeC:\Windows\system32\Dmllipeg.exe68⤵
- System Location Discovery: System Language Discovery
PID:4684 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4684 -s 21269⤵
- Program crash
PID:2388
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4684 -ip 46841⤵PID:2932
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5e7006e624d343ec2533f9022a5c593fb
SHA1e6228fb331206a3cf5c9536b73dcd510b0ebd2ac
SHA2564cf7a5c57931e40c413306577c5bffaa23e9bdc5209259f72d25b645ecdf9b6c
SHA5123c9a646e922ec14b1a6632420f828b030ec4bd5aa325fd491274c95b17bcb703e15c176a343fce80b4f9a3f464284d61b81b5e4fa1ea580463377e6207ea221c
-
Filesize
64KB
MD571d413921c1e887f96ce4fbb84ef46f6
SHA164e7ff8a2136c16210432b460699f38ec9792b56
SHA2567d9c917252f4bf62e3d98fcd5033d75096230abeae09a1235472a3ffb16d754f
SHA512b4c42c6d5d39ac04b4847319e3bf608f88b192f5ee9f1c1e6306d6ff4c26b4e2e5c15ec2b666d6025260ad0a4b5e9265bb12740d27bf40aeba01be51e36ef59a
-
Filesize
64KB
MD5a8e378f9b9a0c8d184441411f0d9ccdf
SHA118ff36674d382d4b229e2260c85ed138939f55a5
SHA2561cc4e26a0fadff89c4f1b4e485a99afa40f6519bbacd24cb6946885af962ce8d
SHA51257d64f430feb864434bffb021def81ee769ae7b52c254b2c80354e7eeb6fef9a5ce424fcadbe2a38da44422253960a96a7ee5624f1037bdb7699906aaf322c35
-
Filesize
64KB
MD56489672d437b7698b19ae6ea40df3109
SHA1a8b5f1d8b13900e18b2a7aaacc74ee60c191ae7b
SHA256037c676ae026fc63b95343e1537b7e009a52103275ca84f1dab36608507e9cc1
SHA512891786ef4459ef156c40fe2c91fe19fb91524e2b13ba612e36a48836eb9e34ecad5c14398f33882950336a57c5aff8d16e9f994ee2a1a5e75dcc7863ec312578
-
Filesize
64KB
MD53a13e6ac2fb0c99c7504cb2aee546c65
SHA14e90f7d4b3b45577fe3638592ee653b998e7b371
SHA256b856e738002876454d5afcb7366fe3e1c340bed66b8ecc84dbfafb150456294c
SHA512c3ba560809dfaeccf8706220a687935e9b63b9edbcaaf0990ef2db45a96030924dabc0fc70d7cce2d6ff561d23b6e067cd42fd819f7b8eb3f9de7921a21ef0d9
-
Filesize
64KB
MD51b30abf59389c0b365373c40a2501f6d
SHA1d7eebc5dd136a9ff9bfd3a89e628ca26a01cac03
SHA256a8d22cf6d93565a6534a515ad3c418522e38349d71e7fd6e413ced3c6963abca
SHA512051533c59533cb519b0a869d9df752bc71a1e283e7afaa0b91a76e7d12fcd6dbbc62576ae38cec6b3c7933d7b948a402356da24d3e59fadfa7064cfc84801af8
-
Filesize
64KB
MD569ae778816267a95baef31cd52ca7c90
SHA1cf0c11f052fd3c991ea83ac85d75583d306ee2b9
SHA256afb2b697b9deed45a449fcfe9067f968ac5990a98b706a6d5a43713304fa7f68
SHA512d114419f81728cd4da26a32925cdd54cf811d1769d9740d35591042425472092854557d246cc69350604205751ac6dbfa56cfe62aea2b2d0d79611cfa9082981
-
Filesize
64KB
MD5680e8e64f58123254f0c368b0e57abf4
SHA1dd6165cc62acbc965a6f936bf23a56664ba3bc47
SHA256196926c15bd61edf6410b0c8306958fe69bb1dd4f790516bd2c7c234695e7926
SHA5121696a4047fbe81b5a38dd2ac7a554dd48b6d3c891b4335d8f26b80f1d4925e704ae925022342433a5f97dc4d013a219ab05f350237a4e20a1f472c0c8a0660f6
-
Filesize
64KB
MD557ed4cdc79ff879029ab3973610e38bb
SHA100484e170aa5becdd11a6b49055680fd16730f95
SHA256659bf51848277b100b789608f037c49156b3585e115678edb6ba808f41985b8f
SHA5127e413628f24ebfd45cb336f5ac750551cf3b27057bcbde0988bebf95826162696409a1694c197d8f59da575c3ef1b5aafd7f457448b068a264792af7af5d7492
-
Filesize
64KB
MD5f3e0e083c31b0a3434e730199283cf43
SHA1874e0c7e6aa31ca2cd45c19aba22dd5dd0564362
SHA25605e389c39ef435406db01a0ee894fc08500ee9824a18cf3bcd3db8cfde23c68c
SHA512830f3b2f22b83ed790a2bc5587250311242e45436949c50697d37822f874ce326232a8df93c7c360a39b44b757611a3eb3a00444e2e53c71f2cc203953050a21
-
Filesize
64KB
MD58acf6e728e5a69b901445ab9d1d37f8a
SHA19af911959780b435f4b15c1a805f973f72eb37d0
SHA256e024af21f95bd61b5feacb3b36276e75680bd3c3b81c5f7c3de70080415fd45b
SHA512800e7fe5249112a568e17abd35b1454a17c43dba975d046619e1960d9043624866eb7e241c5a22a679e37086b880adfd2c914d4ccb26515c0d03362fb1ae1d76
-
Filesize
64KB
MD54b63aab7a415628ed96693328d7813a0
SHA17bca49f320ec47a95e674a973da05dcdf59c105d
SHA256e5a137122204f23fbc7eee5b8dac6aaa029734f828e68c5e084165b119b93882
SHA512f45d2fdfbcb1c5b74ec8676d62dba6a1e4d63cab1ec116cc4e6cefec91c48e76858ecd80db54ce33b91be9cd5cbde75c1eabbbbd9664ce58ba9ef4c9628a3460
-
Filesize
64KB
MD5592e68e316ef06792b46a92188315e59
SHA16ab4e9f6135f09dfd32534e2955e32e425486499
SHA25670401a984c587bad1715405b5e0ecdcadbbf20eb7f9d5a10a206d0df61620859
SHA5120802d73d6ccc0ea7289b310f9b226a3b2592e3cfc1ebab0dbb31a927c3194f23916f9309057577e97e6348a75fbbe1f2fc80b7091d00f657ac66c76ff432cf9f
-
Filesize
64KB
MD5549a457b131d10d61e4ae61f92f33a78
SHA19d1f8463d4f64e14ade778a2a31f0a04e19cba59
SHA256324d200539fb814ab97cb7a267e572fb2765247975a107aeaab95adf7ca71bfc
SHA512ad89f867bf09b149ff6925ddae7bdf21b2620ca0b5883bab40041225ae8204b62e10d8ec50c4ca20a90ccbc2ef126395f9ff8d18c8ca16a444fdc89d35fbedd7
-
Filesize
64KB
MD5f655ffbcb5fda7a6f511888a74afc667
SHA191e8ac9d7279296212333f616d4f2662565d64a1
SHA2564a6359f6f1cfa41ee3c4ff8ca5b7722ed8c549cc820ed54382f92bb46f6aaa74
SHA51252ee0976e26b4b740665c54a2ca6949f8b0a512a257378b5f0c2ed49719feaa3a6cecafcac219395c87e815ab9bd60d1af1b0a5b72b2d1fa99bbce5d3673b545
-
Filesize
64KB
MD516b5eeac80864497d842cd5a305f2d1a
SHA155467780734ccd9ea2b827764821740dca1d4577
SHA25642a7e10f6c41ae4909ad4c49ee0317dc02264c8550b37a45f23576babc1ae4d8
SHA512a98f99e405721936639aa4d2671913ab4a7aba44f27fd77eb57a3be95bec046cd51a0fa604f5df991895a43778046ffd2288937ea3f283e1377c983dcbadaa02
-
Filesize
64KB
MD5097053f7da1faf5f45aa5a916ba1ecf7
SHA166ed88f1ac472ffa19bfbd504b4d7d1e4b59040c
SHA2563f1fc932b5a655651ed96f71612cbfede3c102f1793a654169b71786d77b9edb
SHA51268b58c0a3bc1f023d45e0098e5e224ba3cb13ca8d152a20b2a919b85c24ed81306957bc381d58d72bd5e01b85d8ce9ab847acc4cc2dfa13888045417c4122382
-
Filesize
64KB
MD5a22e820fcf3aec51f218d2020bd9e3c3
SHA17610afb036beaae2e6ebc10abcd991de451b635a
SHA2566137a77206192979b3755e0f4e765affe13f019c342ff1b7a1f123136a3c4baf
SHA512557d8ed86e86e50955b707295b02adaf403bd47fe28070ac9b99f3c95754096af901aa829f09b90515a7b37a42ed493096863a4a73421843334b6949f9874daa
-
Filesize
64KB
MD56c7d099cd3d495e3b805475c28a2d451
SHA17ceae3810e89870565f83ae97d89665704f5a688
SHA256e6fc31ffc772824b8a4faec75860d0702fcd144125d6940bc2064b047022da3a
SHA5123f91ea3b31db173112378f37706648b629775cd4a2ad478002811430b2beadf034dd7b3e625a352ae7d5785b019bd667d9ac15a8a913009488dc87644d3c4f2b
-
Filesize
64KB
MD55a7f4f2cf3996b8c81816933fc1fc7e5
SHA12cebb2e5784be16b54747ef4b22f586fd6d21509
SHA25695b69d2d11375873a935d8127b3fdc6ea7114948030961a86d5f2effd6387795
SHA512cb36f5f1dd546cf7d29514d73bb0849c05cb9da276804f16de837eab0031708f41b3f3570dadb1d39153c071b4912729b046fd3b879c53220e897f7224900739
-
Filesize
64KB
MD555aeb7eef564d131d1e7af84a33e74d0
SHA13b6f9653e07adcb462a59f27a23f35878ceb925b
SHA2566dd6d6dce84d93dd2423130a1ef5156a5fba89ded4db1ae4ecde02c1c1d23557
SHA5124ebc81fd0b0037af33592a65154d87d17ac037e50e775285792893cc71c58cf85bbff8f4cec38a7f1321b6183b9085263ece342993674ba68c16375766f57e54
-
Filesize
64KB
MD55b991a7f2d160bbe7052e5b6fa0a8b23
SHA1f9edf8dd95b7696f31c1d7febe42df7cb7b2f4e5
SHA256dc2993451b2798b7b9d54eaf58975917da3b33ba2e01ecc74609d605c494d411
SHA5120d9470f062f8b7c3dd41a694db48a4012b623393865b1361aca76ac0938cea456d57c6e5e3a88c226904aa45a999ce13d2f38408370843b19ebd240320cc9039
-
Filesize
64KB
MD5681ae091ab1df734f61be8411ac13e81
SHA1c36ed0d07a6f058645a7d885fd6c16306dffdec9
SHA256745fc2ecc3e8cc5a18cfa5812801ed2dec1a81fe73b075f3da62352af591f941
SHA512a1cf3ba1cc5cb07a8b0728abc36eed57a55b0d721e5d67e7ca8c2d8cce27240bb7ed90d04272c97a3a417a9643d6036b9b01ff12a2a467aeafae07de8ff65f5d
-
Filesize
64KB
MD5554667f2ce63c021623bc1ea41ec94a4
SHA15cdca82327f309d261a74c12e6574cca25189958
SHA256ee35837abe0977f489024f34a27079592b42c59e5d0980b6d6e46e8fc67e187f
SHA5129b8a7bf739247589d4010b1dd79fa25b1c28ad6a35c78f79ff3caa8ef0233f1872229ead32fd88e439439818f36eb16b01e399812842fc376f1c0446a63c2509
-
Filesize
64KB
MD52ce6fc4e6e2f818e4b25a7eeeffa4250
SHA1830cae06008f27990717013bc3b549680b41c4a4
SHA256de2688226e5ddfb6f093a32b3234b793fce278e50d085ae61c0ed7f971badf48
SHA5128c7215db8b216b188d0f1a19645a5fa81cc8bb8f0c3ebefd92e41c7ff23bef276460f8930962bd31442b778c4880fe1e5e95aa0853c0eb6c329ca8fde8c8d9d7
-
Filesize
64KB
MD54f3be449fd2c7ed8644cffce207a32b3
SHA171d3fb8735840e213f4e8381d1d7b53343d7d3ff
SHA2562a9a729c7ff8ce04a1e19d47118244b48ca2ed5d30b52caaf880406b05a350c1
SHA5122f94563ae12079c8cde8d40808397cb7c24e560266ff5c88d0ba2ae4092be04d5fe82723ecdc8943647646c04162fb061c971adc5400abeb99e9f3bd3c1e1477
-
Filesize
64KB
MD5b4fb1cbfb77b3c2e3c32f7ea22347c13
SHA166dcd28bc53eb6f05e6c0154fce401c60ff72d69
SHA256aa6cf665a0f3356863759178c1028ca36198eb4eebd30cdb71fb52b934259147
SHA51297f5c24c986210a4d69245da4a6e8381e9ccbefaf3db535c9b0b147dc8d28e4ca0cb81dad7b6fec8add3e795b55a244de997793acd8ecc68af6c4d470472dfbb
-
Filesize
64KB
MD5a1bc2f69aed01576be71e3228571c4b8
SHA1ea7fc803a892106da73bc33c5b3c0da2a36252b2
SHA25678e0d71661f50764e73bf978832e467ee6b88820f2eaffb6f3b068a700c044e1
SHA51208bd23de8d1ae432ce38950d92a243ef2894e5fcf05f42567812f0714939bc0832093ca8e33d4a6eaa9087d07c0c406ca29cd65a7ffe721c86cfcb66b0fc3cfc
-
Filesize
64KB
MD56058608e933923031192e262b116f665
SHA115b8967a62701a44b4fbf5f81199731db3322c0f
SHA256fbb2076671996eb5fcb9419d50f85caa07b0d0e6bb946cca888569ec82428a33
SHA5121f7d234629950d3f188c64fcb0e37a2bf552efcdfb655c72f0ed5213862e9e2f05b24990932ded459480bcfffe62075648111e568dd0116342478d4970e79af6
-
Filesize
64KB
MD58195925719d750e686be01dff27e4edb
SHA192e2dd816d4abeb482f200f9447258b6add5fc41
SHA2560e0191f0d3987e72b701baed00e61f24515591cfc3a9625203481c68e1f16a10
SHA512a8747559952c4e4a266c57c799ba3d095af500e74ea4ced43394c64aaa78ca7747ffb7a4d26e55bff7cfb1a8e36f2742a15bc00915c12ebd74c449a7ce129a38
-
Filesize
64KB
MD566bd48ce7a198f5cfa22a2f69e26bd3f
SHA168f64b26c5970c8a283a0b1a5daa54959939f927
SHA2569a207b9b5b965fb0dcbb307697e258ef9f726a0e1e56fb1307417a340033152e
SHA5121372e314b36b11b667ae222f619873d1d6f9e7f97066cc225797f035cc527239fa96045d9a140ce43748d6a9faaaa9e1f560427869bb331971a660008ba8bc88
-
Filesize
64KB
MD52b6cbd2c93bd35e6f7d309d6076b696c
SHA174f718f9ccbb815dbba6ea771ad3353b17066dfc
SHA2563351322a57133c5767adcd0125209557b283abe9d3c5daccc1ac3d6ceebfe737
SHA512ce6553060712eed4a514ebb0b04035f321be256b5d8b1886ec67b487a0f2090ebc69826e6b738136c4aa5c93b0f7e999a77553a90a4be80285691cc96e4b4e3f
-
Filesize
64KB
MD5328afa6ca961b31c55f0b7e6fd2dd24f
SHA1976e1a32525d2d73f6d9c31cfd0492dd584609aa
SHA25611ba0b9ba77fc135c65f8afd5b6d3e1b02e89b10275c0c6af533f6a4b34001a4
SHA512a93b4a33939d997510023c638c6121c46c58eeb421ff7e0d9e687e4f9b55f4b7e0cba192b7d6c7e0502978652d6af0f9b99ababde79ce9903bbd04b245f44980
-
Filesize
64KB
MD5526b41bbeabebfc783f9911e29708344
SHA1c95d7323e191fda08ff9da1c36cd075e24ddec95
SHA256b9a0224e40b2c519ac3fe07660be585db9735585e71559ce6d205acf00455e33
SHA5126d56aab22fdc642cdd0698f38ffed3dea0c302b30f142861e73837082991bfbc5e54b8e4030d8488ef9eb68ffb97ea67ee3d028fd30856c6aa21fe7a8080f102
-
Filesize
64KB
MD5ac3a1ef3b3001e1538bf88a31cdc5a8d
SHA1212abf68b377330107e5c3502e3cf8a9fb18a666
SHA256d6350325584778dbf899125f34859162c8d7e6c673a9090379723ce64483ec95
SHA5122791f1fd313c793acf74693841ed64e7fe77054bddeda7136b4dd71f8b8cf1bec21879312a666ce4fbd364a3f7e04ac8d658290d305b829b44b33418f4175dd4
-
Filesize
64KB
MD57d111b753013653fbd752cfa1c0d698e
SHA1c6a94aa7cd5103f8b0660ca833873489dc3352d2
SHA256cbf64ba1ca989f6090d63de6bb5d9addda540aee1cd83f69ee9796a753469a35
SHA512dff4a0bf85f56e4fdfa95f1f33306c0d367d91fdb6b0a5af19ebbbe21505c93083ca02bffce3e03c623817cc93301dabef1547ac8e5863a6967f9ff1f4477c18
-
Filesize
64KB
MD5242ba27e3064c2b5c3b714d84d851906
SHA19ad01c4ed2736427268d58ca825deb7a67540e6d
SHA256263576ff5f9e6fc94991ae8a8316db9d09a281bb3ba97a4d74a1d1c1f0978cee
SHA51220344598b2b2c53387253acd6e1915586807de9b1b8d31bf735ae7423e7bb40ecca942ec91d09d657c29c181336ce1be31fe0e65ebf0ce52fd627b38656bcd39
-
Filesize
64KB
MD50638a7c0b8f74c3758c5f22580a82892
SHA1a59f592d1bcdd4f6b5a4a62edb0ec091d66e16ac
SHA25697f573e1539edb076032e576baf97150858300c6b3af6f3e09ba08b150e19cc2
SHA5120b1b8289061f7333557085a193fdebe7ce553fd4452ede70d2f7d739c988a0344801989daaaed47b9d06103e7464a62601674393ce2a3c5dc567d7ca194cce67
-
Filesize
64KB
MD5a46f554ccef7d1018184fb8fbb0b6477
SHA106f1e6fa987c30b4a6092a5d6d4142ee26be8c68
SHA256252a1c7ec03ae7e69f0c50c8181f5ad4ebd84516525fca78a618f1a71bb311e3
SHA512ce5a201c656d38ac1478afe1c044866f7d605e475b41311b7012765fc47fcf5d08230bad84d60142b2bf1252c73912077a5a1494c932f62b88b850e4ff86b15e