Analysis
-
max time kernel
96s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2024 12:42
Behavioral task
behavioral1
Sample
12ea454e005a15a0afae0ad969c60c514f1a9842027324a5ce982ae75ddec3ce.exe
Resource
win7-20241010-en
General
-
Target
12ea454e005a15a0afae0ad969c60c514f1a9842027324a5ce982ae75ddec3ce.exe
-
Size
337KB
-
MD5
e9028b0f2407ca130e4f92ac57a8dfdd
-
SHA1
51cc60257929be0cef53debf9fd53a20249a9d16
-
SHA256
12ea454e005a15a0afae0ad969c60c514f1a9842027324a5ce982ae75ddec3ce
-
SHA512
8a57abc2d73c51676cd20262e2959d618f99e8e3913fac28d06a3d92e479a973548033022ca9e764c2b6a4727a64e532766de580de9d6d6f51484476ef174007
-
SSDEEP
3072:i2zyX1tsp1ZLkBwWqgYfc0DV+1BIyLK5jZWlfXXqyYwi8x4Yfc09:3zyl21ZTWq1+fIyG5jZkCwi8r
Malware Config
Extracted
berbew
http://crutop.nu/index.php
http://crutop.ru/index.php
http://mazafaka.ru/index.php
http://color-bank.ru/index.php
http://asechka.ru/index.php
http://trojan.ru/index.php
http://fuck.ru/index.php
http://goldensand.ru/index.php
http://filesearch.ru/index.php
http://devx.nm.ru/index.php
http://ros-neftbank.ru/index.php
http://lovingod.host.sk/index.php
http://www.redline.ru/index.php
http://cvv.ru/index.php
http://hackers.lv/index.php
http://fethard.biz/index.php
http://ldark.nm.ru/index.htm
http://gaz-prom.ru/index.htm
http://promo.ru/index.htm
http://potleaf.chat.ru/index.htm
http://kadet.ru/index.htm
http://cvv.ru/index.htm
http://crutop.nu/index.htm
http://crutop.ru/index.htm
http://mazafaka.ru/index.htm
http://xware.cjb.net/index.htm
http://konfiskat.org/index.htm
http://parex-bank.ru/index.htm
http://kidos-bank.ru/index.htm
http://kavkaz.ru/index.htm
http://fethard.biz/index.htm
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 54 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Daekdooc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dhocqigp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Daekdooc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cfdhkhjj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cffdpghg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ddonekbl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dhmgki32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dknpmdfc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cdfkolkf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cdfkolkf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cfdhkhjj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dodbbdbb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Beihma32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dobfld32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dkifae32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dodbbdbb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dkkcge32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cndikf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cjkjpgfi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dknpmdfc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Daqbip32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dmgbnq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dmgbnq32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dmjocp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cffdpghg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dopigd32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dfpgffpm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dhocqigp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cjkjpgfi.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ddonekbl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dkkcge32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dddhpjof.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" 12ea454e005a15a0afae0ad969c60c514f1a9842027324a5ce982ae75ddec3ce.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Danecp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dkifae32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cnnlaehj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dopigd32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 12ea454e005a15a0afae0ad969c60c514f1a9842027324a5ce982ae75ddec3ce.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bfkedibe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dmjocp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bfkedibe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dobfld32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Daqbip32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Deokon32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dfpgffpm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dddhpjof.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Chokikeb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Chokikeb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cnnlaehj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Danecp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Deokon32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Beihma32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dhmgki32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cndikf32.exe -
Berbew family
-
Njrat family
-
Executes dropped EXE 27 IoCs
pid Process 1596 Beihma32.exe 1084 Bfkedibe.exe 1152 Cndikf32.exe 2068 Cjkjpgfi.exe 5068 Chokikeb.exe 1900 Cdfkolkf.exe 1440 Cfdhkhjj.exe 2316 Cffdpghg.exe 4112 Cnnlaehj.exe 4648 Dopigd32.exe 1912 Danecp32.exe 3772 Dobfld32.exe 1628 Daqbip32.exe 2056 Ddonekbl.exe 2956 Dkifae32.exe 3636 Dodbbdbb.exe 2092 Dmgbnq32.exe 3472 Deokon32.exe 4944 Dhmgki32.exe 2848 Dfpgffpm.exe 4776 Dkkcge32.exe 3920 Dmjocp32.exe 1828 Daekdooc.exe 2784 Dddhpjof.exe 4908 Dhocqigp.exe 4440 Dknpmdfc.exe 4888 Dmllipeg.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Cfdhkhjj.exe Cdfkolkf.exe File created C:\Windows\SysWOW64\Nnjaqjfh.dll Beihma32.exe File created C:\Windows\SysWOW64\Cndikf32.exe Bfkedibe.exe File created C:\Windows\SysWOW64\Bobiobnp.dll Dkkcge32.exe File created C:\Windows\SysWOW64\Cdfkolkf.exe Chokikeb.exe File opened for modification C:\Windows\SysWOW64\Cdfkolkf.exe Chokikeb.exe File created C:\Windows\SysWOW64\Dmgbnq32.exe Dodbbdbb.exe File created C:\Windows\SysWOW64\Jcbdhp32.dll Dfpgffpm.exe File opened for modification C:\Windows\SysWOW64\Dmjocp32.exe Dkkcge32.exe File opened for modification C:\Windows\SysWOW64\Cjkjpgfi.exe Cndikf32.exe File created C:\Windows\SysWOW64\Cnnlaehj.exe Cffdpghg.exe File created C:\Windows\SysWOW64\Agjbpg32.dll Dopigd32.exe File created C:\Windows\SysWOW64\Dodbbdbb.exe Dkifae32.exe File created C:\Windows\SysWOW64\Dfpgffpm.exe Dhmgki32.exe File created C:\Windows\SysWOW64\Dkkcge32.exe Dfpgffpm.exe File opened for modification C:\Windows\SysWOW64\Bfkedibe.exe Beihma32.exe File created C:\Windows\SysWOW64\Cfdhkhjj.exe Cdfkolkf.exe File created C:\Windows\SysWOW64\Omocan32.dll Cndikf32.exe File created C:\Windows\SysWOW64\Mjelcfha.dll Daqbip32.exe File created C:\Windows\SysWOW64\Dhmgki32.exe Deokon32.exe File opened for modification C:\Windows\SysWOW64\Dhmgki32.exe Deokon32.exe File opened for modification C:\Windows\SysWOW64\Dddhpjof.exe Daekdooc.exe File opened for modification C:\Windows\SysWOW64\Dknpmdfc.exe Dhocqigp.exe File created C:\Windows\SysWOW64\Dchfiejc.dll Cfdhkhjj.exe File created C:\Windows\SysWOW64\Amfoeb32.dll Dmgbnq32.exe File created C:\Windows\SysWOW64\Dmjocp32.exe Dkkcge32.exe File created C:\Windows\SysWOW64\Dknpmdfc.exe Dhocqigp.exe File created C:\Windows\SysWOW64\Cjkjpgfi.exe Cndikf32.exe File opened for modification C:\Windows\SysWOW64\Cffdpghg.exe Cfdhkhjj.exe File created C:\Windows\SysWOW64\Fnmnbf32.dll Dkifae32.exe File created C:\Windows\SysWOW64\Dhocqigp.exe Dddhpjof.exe File created C:\Windows\SysWOW64\Elkadb32.dll Dddhpjof.exe File created C:\Windows\SysWOW64\Kngpec32.dll Dknpmdfc.exe File created C:\Windows\SysWOW64\Bfkedibe.exe Beihma32.exe File opened for modification C:\Windows\SysWOW64\Cnnlaehj.exe Cffdpghg.exe File created C:\Windows\SysWOW64\Ingfla32.dll Cffdpghg.exe File created C:\Windows\SysWOW64\Jdipdgch.dll Dobfld32.exe File created C:\Windows\SysWOW64\Fpdaoioe.dll Deokon32.exe File opened for modification C:\Windows\SysWOW64\Dodbbdbb.exe Dkifae32.exe File created C:\Windows\SysWOW64\Beihma32.exe 12ea454e005a15a0afae0ad969c60c514f1a9842027324a5ce982ae75ddec3ce.exe File created C:\Windows\SysWOW64\Gblnkg32.dll 12ea454e005a15a0afae0ad969c60c514f1a9842027324a5ce982ae75ddec3ce.exe File opened for modification C:\Windows\SysWOW64\Chokikeb.exe Cjkjpgfi.exe File created C:\Windows\SysWOW64\Dopigd32.exe Cnnlaehj.exe File created C:\Windows\SysWOW64\Danecp32.exe Dopigd32.exe File created C:\Windows\SysWOW64\Daqbip32.exe Dobfld32.exe File opened for modification C:\Windows\SysWOW64\Daqbip32.exe Dobfld32.exe File opened for modification C:\Windows\SysWOW64\Deokon32.exe Dmgbnq32.exe File opened for modification C:\Windows\SysWOW64\Dfpgffpm.exe Dhmgki32.exe File created C:\Windows\SysWOW64\Nokpao32.dll Dhocqigp.exe File opened for modification C:\Windows\SysWOW64\Dhocqigp.exe Dddhpjof.exe File opened for modification C:\Windows\SysWOW64\Beihma32.exe 12ea454e005a15a0afae0ad969c60c514f1a9842027324a5ce982ae75ddec3ce.exe File created C:\Windows\SysWOW64\Alcidkmm.dll Danecp32.exe File opened for modification C:\Windows\SysWOW64\Ddonekbl.exe Daqbip32.exe File opened for modification C:\Windows\SysWOW64\Dkifae32.exe Ddonekbl.exe File opened for modification C:\Windows\SysWOW64\Dkkcge32.exe Dfpgffpm.exe File opened for modification C:\Windows\SysWOW64\Daekdooc.exe Dmjocp32.exe File created C:\Windows\SysWOW64\Dddhpjof.exe Daekdooc.exe File created C:\Windows\SysWOW64\Ghilmi32.dll Cdfkolkf.exe File created C:\Windows\SysWOW64\Dobfld32.exe Danecp32.exe File opened for modification C:\Windows\SysWOW64\Dmgbnq32.exe Dodbbdbb.exe File created C:\Windows\SysWOW64\Deokon32.exe Dmgbnq32.exe File created C:\Windows\SysWOW64\Daekdooc.exe Dmjocp32.exe File opened for modification C:\Windows\SysWOW64\Dmllipeg.exe Dknpmdfc.exe File created C:\Windows\SysWOW64\Dnieoofh.dll Cjkjpgfi.exe -
Program crash 1 IoCs
pid pid_target Process 4624 4888 WerFault.exe -
System Location Discovery: System Language Discovery 1 TTPs 28 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Deokon32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dhmgki32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cjkjpgfi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Chokikeb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cfdhkhjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cffdpghg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dkifae32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dobfld32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dmjocp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Beihma32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dmgbnq32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dkkcge32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dmllipeg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cnnlaehj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dopigd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dfpgffpm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cndikf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Danecp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Daqbip32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dhocqigp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dknpmdfc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bfkedibe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cdfkolkf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Daekdooc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dddhpjof.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dodbbdbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 12ea454e005a15a0afae0ad969c60c514f1a9842027324a5ce982ae75ddec3ce.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ddonekbl.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kmdjdl32.dll" Dhmgki32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dopigd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Agjbpg32.dll" Dopigd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Daqbip32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Amfoeb32.dll" Dmgbnq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cnnlaehj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nnjaqjfh.dll" Beihma32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cndikf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cfdhkhjj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hcjccj32.dll" Cnnlaehj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cffdpghg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ihidnp32.dll" Dodbbdbb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dmjocp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dhocqigp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fqjamcpe.dll" Bfkedibe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cdfkolkf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Alcidkmm.dll" Danecp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jcbdhp32.dll" Dfpgffpm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dobfld32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ddonekbl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dmgbnq32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Daekdooc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dnieoofh.dll" Cjkjpgfi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Chokikeb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Danecp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dobfld32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Amjknl32.dll" Daekdooc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Elkadb32.dll" Dddhpjof.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dknpmdfc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Chokikeb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dchfiejc.dll" Cfdhkhjj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fnmnbf32.dll" Dkifae32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dodbbdbb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dddhpjof.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dhocqigp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" 12ea454e005a15a0afae0ad969c60c514f1a9842027324a5ce982ae75ddec3ce.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cffdpghg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dopigd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Daekdooc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kngpec32.dll" Dknpmdfc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cfdhkhjj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dhmgki32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dfpgffpm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dmjocp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID 12ea454e005a15a0afae0ad969c60c514f1a9842027324a5ce982ae75ddec3ce.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cnnlaehj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dhmgki32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dfpgffpm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bobiobnp.dll" Dkkcge32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ohmoom32.dll" Dmjocp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bfkedibe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cndikf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dkifae32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Deokon32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fpdaoioe.dll" Deokon32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Deokon32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 12ea454e005a15a0afae0ad969c60c514f1a9842027324a5ce982ae75ddec3ce.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Beihma32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jffggf32.dll" Chokikeb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jdipdgch.dll" Dobfld32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Daqbip32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gblnkg32.dll" 12ea454e005a15a0afae0ad969c60c514f1a9842027324a5ce982ae75ddec3ce.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Beihma32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bfkedibe.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3204 wrote to memory of 1596 3204 12ea454e005a15a0afae0ad969c60c514f1a9842027324a5ce982ae75ddec3ce.exe 83 PID 3204 wrote to memory of 1596 3204 12ea454e005a15a0afae0ad969c60c514f1a9842027324a5ce982ae75ddec3ce.exe 83 PID 3204 wrote to memory of 1596 3204 12ea454e005a15a0afae0ad969c60c514f1a9842027324a5ce982ae75ddec3ce.exe 83 PID 1596 wrote to memory of 1084 1596 Beihma32.exe 84 PID 1596 wrote to memory of 1084 1596 Beihma32.exe 84 PID 1596 wrote to memory of 1084 1596 Beihma32.exe 84 PID 1084 wrote to memory of 1152 1084 Bfkedibe.exe 85 PID 1084 wrote to memory of 1152 1084 Bfkedibe.exe 85 PID 1084 wrote to memory of 1152 1084 Bfkedibe.exe 85 PID 1152 wrote to memory of 2068 1152 Cndikf32.exe 86 PID 1152 wrote to memory of 2068 1152 Cndikf32.exe 86 PID 1152 wrote to memory of 2068 1152 Cndikf32.exe 86 PID 2068 wrote to memory of 5068 2068 Cjkjpgfi.exe 87 PID 2068 wrote to memory of 5068 2068 Cjkjpgfi.exe 87 PID 2068 wrote to memory of 5068 2068 Cjkjpgfi.exe 87 PID 5068 wrote to memory of 1900 5068 Chokikeb.exe 88 PID 5068 wrote to memory of 1900 5068 Chokikeb.exe 88 PID 5068 wrote to memory of 1900 5068 Chokikeb.exe 88 PID 1900 wrote to memory of 1440 1900 Cdfkolkf.exe 89 PID 1900 wrote to memory of 1440 1900 Cdfkolkf.exe 89 PID 1900 wrote to memory of 1440 1900 Cdfkolkf.exe 89 PID 1440 wrote to memory of 2316 1440 Cfdhkhjj.exe 90 PID 1440 wrote to memory of 2316 1440 Cfdhkhjj.exe 90 PID 1440 wrote to memory of 2316 1440 Cfdhkhjj.exe 90 PID 2316 wrote to memory of 4112 2316 Cffdpghg.exe 91 PID 2316 wrote to memory of 4112 2316 Cffdpghg.exe 91 PID 2316 wrote to memory of 4112 2316 Cffdpghg.exe 91 PID 4112 wrote to memory of 4648 4112 Cnnlaehj.exe 92 PID 4112 wrote to memory of 4648 4112 Cnnlaehj.exe 92 PID 4112 wrote to memory of 4648 4112 Cnnlaehj.exe 92 PID 4648 wrote to memory of 1912 4648 Dopigd32.exe 93 PID 4648 wrote to memory of 1912 4648 Dopigd32.exe 93 PID 4648 wrote to memory of 1912 4648 Dopigd32.exe 93 PID 1912 wrote to memory of 3772 1912 Danecp32.exe 94 PID 1912 wrote to memory of 3772 1912 Danecp32.exe 94 PID 1912 wrote to memory of 3772 1912 Danecp32.exe 94 PID 3772 wrote to memory of 1628 3772 Dobfld32.exe 95 PID 3772 wrote to memory of 1628 3772 Dobfld32.exe 95 PID 3772 wrote to memory of 1628 3772 Dobfld32.exe 95 PID 1628 wrote to memory of 2056 1628 Daqbip32.exe 96 PID 1628 wrote to memory of 2056 1628 Daqbip32.exe 96 PID 1628 wrote to memory of 2056 1628 Daqbip32.exe 96 PID 2056 wrote to memory of 2956 2056 Ddonekbl.exe 97 PID 2056 wrote to memory of 2956 2056 Ddonekbl.exe 97 PID 2056 wrote to memory of 2956 2056 Ddonekbl.exe 97 PID 2956 wrote to memory of 3636 2956 Dkifae32.exe 98 PID 2956 wrote to memory of 3636 2956 Dkifae32.exe 98 PID 2956 wrote to memory of 3636 2956 Dkifae32.exe 98 PID 3636 wrote to memory of 2092 3636 Dodbbdbb.exe 99 PID 3636 wrote to memory of 2092 3636 Dodbbdbb.exe 99 PID 3636 wrote to memory of 2092 3636 Dodbbdbb.exe 99 PID 2092 wrote to memory of 3472 2092 Dmgbnq32.exe 100 PID 2092 wrote to memory of 3472 2092 Dmgbnq32.exe 100 PID 2092 wrote to memory of 3472 2092 Dmgbnq32.exe 100 PID 3472 wrote to memory of 4944 3472 Deokon32.exe 101 PID 3472 wrote to memory of 4944 3472 Deokon32.exe 101 PID 3472 wrote to memory of 4944 3472 Deokon32.exe 101 PID 4944 wrote to memory of 2848 4944 Dhmgki32.exe 102 PID 4944 wrote to memory of 2848 4944 Dhmgki32.exe 102 PID 4944 wrote to memory of 2848 4944 Dhmgki32.exe 102 PID 2848 wrote to memory of 4776 2848 Dfpgffpm.exe 103 PID 2848 wrote to memory of 4776 2848 Dfpgffpm.exe 103 PID 2848 wrote to memory of 4776 2848 Dfpgffpm.exe 103 PID 4776 wrote to memory of 3920 4776 Dkkcge32.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\12ea454e005a15a0afae0ad969c60c514f1a9842027324a5ce982ae75ddec3ce.exe"C:\Users\Admin\AppData\Local\Temp\12ea454e005a15a0afae0ad969c60c514f1a9842027324a5ce982ae75ddec3ce.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3204 -
C:\Windows\SysWOW64\Beihma32.exeC:\Windows\system32\Beihma32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Windows\SysWOW64\Bfkedibe.exeC:\Windows\system32\Bfkedibe.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Windows\SysWOW64\Cndikf32.exeC:\Windows\system32\Cndikf32.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Windows\SysWOW64\Cjkjpgfi.exeC:\Windows\system32\Cjkjpgfi.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Windows\SysWOW64\Chokikeb.exeC:\Windows\system32\Chokikeb.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Windows\SysWOW64\Cdfkolkf.exeC:\Windows\system32\Cdfkolkf.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Windows\SysWOW64\Cfdhkhjj.exeC:\Windows\system32\Cfdhkhjj.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Windows\SysWOW64\Cffdpghg.exeC:\Windows\system32\Cffdpghg.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\SysWOW64\Cnnlaehj.exeC:\Windows\system32\Cnnlaehj.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4112 -
C:\Windows\SysWOW64\Dopigd32.exeC:\Windows\system32\Dopigd32.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4648 -
C:\Windows\SysWOW64\Danecp32.exeC:\Windows\system32\Danecp32.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Windows\SysWOW64\Dobfld32.exeC:\Windows\system32\Dobfld32.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3772 -
C:\Windows\SysWOW64\Daqbip32.exeC:\Windows\system32\Daqbip32.exe14⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Windows\SysWOW64\Ddonekbl.exeC:\Windows\system32\Ddonekbl.exe15⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\SysWOW64\Dkifae32.exeC:\Windows\system32\Dkifae32.exe16⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Windows\SysWOW64\Dodbbdbb.exeC:\Windows\system32\Dodbbdbb.exe17⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3636 -
C:\Windows\SysWOW64\Dmgbnq32.exeC:\Windows\system32\Dmgbnq32.exe18⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Windows\SysWOW64\Deokon32.exeC:\Windows\system32\Deokon32.exe19⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3472 -
C:\Windows\SysWOW64\Dhmgki32.exeC:\Windows\system32\Dhmgki32.exe20⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Windows\SysWOW64\Dfpgffpm.exeC:\Windows\system32\Dfpgffpm.exe21⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\SysWOW64\Dkkcge32.exeC:\Windows\system32\Dkkcge32.exe22⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Windows\SysWOW64\Dmjocp32.exeC:\Windows\system32\Dmjocp32.exe23⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3920 -
C:\Windows\SysWOW64\Daekdooc.exeC:\Windows\system32\Daekdooc.exe24⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1828 -
C:\Windows\SysWOW64\Dddhpjof.exeC:\Windows\system32\Dddhpjof.exe25⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2784 -
C:\Windows\SysWOW64\Dhocqigp.exeC:\Windows\system32\Dhocqigp.exe26⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4908 -
C:\Windows\SysWOW64\Dknpmdfc.exeC:\Windows\system32\Dknpmdfc.exe27⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4440 -
C:\Windows\SysWOW64\Dmllipeg.exeC:\Windows\system32\Dmllipeg.exe28⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4888 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4888 -s 39629⤵
- Program crash
PID:4624
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4888 -ip 48881⤵PID:1464
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
337KB
MD5aed280eb120f5c57e757c0bcc760947e
SHA14193f2239a9eea68a111aaac301a41ea7b6f013d
SHA256f3ac93354073e5da3741d24546c0e0db54e3aa85952f06b03ac95d8f652cbbc9
SHA5128afde06db56af71026f38970509bf6d5e8a887fa3dc704003a6344b39cc89d853f7b3c63804ac6d960ab39056b0e63ab6f32377c100317a284b390e860d757b0
-
Filesize
337KB
MD5e5dd173dde6ea4f7313a230560b9f290
SHA14999899c11b476f8f010218907029eaa709a7685
SHA256a7c453efcfb9b17f7d32395db5eae0ebf41aeeda6121f7b57886d8c3f02f0b0c
SHA51268ccfb892328c24b92be93d781e6e03a7a89de1d448ec12d583a8bfa537e6612e6bc80f1bb117037f7f5818fcac6d59728505645933a3c74d1460331ef5f19d2
-
Filesize
337KB
MD5f7fc078b42632299d8fdd1a80f6426ce
SHA103f28cc9ad1596efc45a565df7ad7471bb926137
SHA2568d87010c180d4e4c559fdb556aad9747559019c512bda9f2ee9609ba7788d857
SHA51231c3f730041f6f2cf9407bf16b823c82929a30f118c409e945e59ceeb4d770056e14e599d7e0e51638cf0aaec49651384664cff11a8884422c097fe0699b5fcc
-
Filesize
337KB
MD543b441e143a144416e574c744b458f9f
SHA15af4d728afa0bcad7f01d4ce949b166e0e518bca
SHA256e8be27533d4b28c84fb23492b16578285b666d1979102a454bb5e448d40bc6b6
SHA51265ae8edff9af5d7efab75dd824e8f58bcfdf30b50cda9e6234317dad4eb4fb5025930ac182f6295713162010bbde25f59ae55f485e9090a23324561935e7b78b
-
Filesize
337KB
MD5de60ba67e3e1fa673761b3dac32872cd
SHA17995e37dc8f9a909756104746b454201ea073e35
SHA256d179d5b3a0505721d8e73e2a219ea2907fcafe8f094d0c0e2c1949612dad822b
SHA512b6fea557dd47ebd75a59482d5a10046d4021615b5fa3c504bfba775ee18916fcf7b84e3041abecd2dbff2b3452b340db07b00e3e0d8c41d2703d51dc1da32d59
-
Filesize
337KB
MD5b8d64bd4c48e10935b4448a9e2ea0f0f
SHA1446694997cb039d87c00091e90fd0a59a249114d
SHA256359c331751afd81ca2fd4644eaa2c2eafbeda9c508d4b0619845eb1a9a0f8222
SHA5128a05117c3c5cac37abd1c612ddd25056e7dd312d4c132dd88428add2638a0c4490b5eaebff87aea5f07ebf21e04e0e5e4d9cd35b77452870d637e9d6988908a2
-
Filesize
337KB
MD5298034185c8c3fc0acac7e546450d447
SHA133be755a7602eb48bb81c6bd4ec45bef15f3b634
SHA256c3036b4f3e22e2abe6beab3c74fdd37e22b1c691d24b11d2baede360a13ffa4e
SHA512c6029427c7526747d4e6be290efc56b1fe46748679ce7c476016e6c784b066b941f1e6cf3075e1f62a4cd55dbf4aaa6fa8d31e1b9979a136bade51a1a8de9528
-
Filesize
337KB
MD50e7f05721c1e7fa4b37040c790d9226d
SHA1c0fc351df136b4dc61a09541220c0c2670edc67c
SHA25600e74f5808b40056b27ae8fe4072df0a2f506899c77a252b3b7f3dc70b6b953e
SHA51270aa3b47826d465c1d94d82da27ce61531f6f03dcd58d74cf4143c981cf91727dd92f8409dd84878f2275367ec64e9bbd00ecde1803e2da443fd819b51f1e3dc
-
Filesize
337KB
MD590dac82c8f9525e11b6e8d73436975b7
SHA17160b0c265611869304e3416965ebbb872c3f280
SHA25655a5cda8a49333848a73fbada264b17dce35e88eee7c3b45e496cd15c1748d45
SHA5125c551fae02c5e94bc67b970b3d8f345c69c4347e23fbe4db88112fadc4cf51a2a6a0799564c19521b735b57487f59d98a36b168e9c46e0e37f481ff3b99a863e
-
Filesize
337KB
MD50f4e596f3d2dea23fe2859ae3012515c
SHA138b46adb7d74616502f6348ee14a33b313770357
SHA2563a43e8fcb610aefdda4982c07998947e30312411030acdd0ec0da62589708f0b
SHA5123cfa478ba7ecc266b9542e40d1a0287bc6385ff2ce5f90afd05e598d9b6c17e1973548dd76a9cd090339c0e55c274f3a2b97663d48e8db59888164151e33d57e
-
Filesize
337KB
MD57cb9d585b56ac15b9fa6214f4bc680df
SHA1ff04e9543b760f060377a071ebe150835b37a120
SHA25617e75e3c487fab801a81f2860f922d50dda6fce3b397354ffd49b40593c7b4d0
SHA51230929e5575270c4a2928d6ac0993bbf60f25a5b25341b70bf747d427b427244b31ab64d57932f8d656409eb4261cd42e5c79a15970da0fd887150d7922ec7fdd
-
Filesize
337KB
MD50a8f14d57b00a12383e798b543702355
SHA1fd973eac6900809584927df8afb6bb1e0633e74c
SHA25637cb4696842b76e8be62880b67d02c56370e3d344c0bc917bb78797feb28c608
SHA512436e99232e116e76fecc7589f98984b60fd74944ea7d5a84ce402adecfa8ee927aa1a35436c8bff9ee0c11458e685a06a7ac979a45bd2509af6a7004e3016314
-
Filesize
337KB
MD5f5df732860d25184dbc33e78e79eab6a
SHA15a187417d00da5b7ff11cd1cbc6c03cde502b9ff
SHA256882ca793b95492d301f8d4a9890ee2ce3cb34e776c6624f950e7f6a45b99e77d
SHA512bf02e6d69373dd92df53e4d19308891d583f2d93b77d1b998547791d4923039b7535fff5fe564fdf9636bba6495bea407c9e92088625be9d07f27f023f51a9e1
-
Filesize
337KB
MD55b952717c092cad6c95a577ec53312d6
SHA109a2e0595d7fb48989950b1fe2079b8e3a290a19
SHA2560e66fe289e8177898d648eea8f25128c3f6829bf03940d933b1adae9e66f9c6f
SHA5122e7f272c6655a2d3a1f6f328127b28e55f0ca787835310bb4c696744e85e8b88eaf625a4247740fb211264e0cbcb91f3db9953dbd0bb24def7cf68b3e330abde
-
Filesize
337KB
MD5684dcd2f0f6d6d7528bc3829b404542f
SHA1f46010f669ce96e748f186a30a223a506e335920
SHA256f7c16a51bb1c687dd5c2413de28369eefbf089d3d14c9d79fbc41864cfad48c6
SHA512744476ce949fa4fe71f44ffd1b20f619fb398b0a895dcbd848c7d9ee4fc6be4bb1e06ecb8c8fb958e18625a8c7a9dbe66af2bf589753615c9a93111eae2aedec
-
Filesize
337KB
MD5b1a6a7f0761a254e3da08d8397c7c122
SHA1c009b2c102a6b857c1e4eeb4d9f2d19168ab356e
SHA256abab1587ea790bf8b145959270333454a7514fd4d003956d224cd18586ba4fa0
SHA5125ba83b47e7eeb8936c3832d12be6c42ab8c5fa1cc5f5e06490bbe7524494772e0c81f200527b11ed022ca44dcde2b5f747170b3ae3f3faccc69205e6fb9726f7
-
Filesize
337KB
MD59ead9610d3f72f5607b900cb60e3c964
SHA12ce47c796d27699fbbcb4fb1923bbd5abb32cbc4
SHA256ede0c388778a22a7a2f1d15f9c9eef47d045d5b904ad88d44c764b1f5157e0a3
SHA512e3cfae228f628a9238dbb2f5687854ebb337cd97543414d4dfd7e822781ac1a5acf03be0e36ff250c19019bab94f41ddb40ee0b0a04b50b045a10ae5d290c88e
-
Filesize
337KB
MD5ebb33b15f6d7b794a81442e7741a5802
SHA18e231cf6c322c8b43b3e90fbe97e8ff875bd8d14
SHA2568f3d785b0b0038a43dd47f357d04b851500745a308a1838f3badb9fa5cc1e63c
SHA5127a449fb545e3bdbd37e9fdb10b0e10b37dd864fc3cfa7ec5cc749fc6abb200cd72b89180769dfb96d4bbc3a2bd9b4a305d4d7d78953895dbfa2cf19d79c14b7f
-
Filesize
337KB
MD540bf3df8b504111fbf0f4c4fe6493a22
SHA1f602ccae8f25d232e9acd6cdea974652ff17232f
SHA256779708fa3ca3b0d176fc68d89f0480d36d84d832ca998602af4fc2a982856a28
SHA512568d17e641bcb81e1ccaf6bb62327e834b37b0bb3a10a7130df4b2401ca5ad9f48e9bacebece873c530520dd3043ec49b625e1c5b90c6193e95a9a9a6b74705d
-
Filesize
337KB
MD58ae255ba69931d4208a82cd4b906b62b
SHA178f31a68be0586c3cb4c20280268ae5edfd0add4
SHA25620b88c7d538bf4f3378e80938ca0dd1df2878abeb73b97d571b5a96a33fea689
SHA5120c3ad483fb12ad026a05c858aede5df7f86f03f4d32ee7c5c18a21e4cd6471ae75f981a8e7d294eac6aecf2b822df39ad8d8d20a886af59919b5a3ee3c9fad9b
-
Filesize
337KB
MD51f39dd4d20268c715bfc7728b9dab0ba
SHA130fdea29cc5b7776d9b82b17f81e6716948be289
SHA2569afb6a3ce05bb821a427439a7dd6efea5b756d5d462ac96f9082905b14008cfa
SHA512011b8746ba1a6213b3770f39b84c7ed27fb509f7043c5544841b72b0f2369c2a809456917404a74008ccfddf53ce73a7f21c19d8787cb15077cd39d8dd551897
-
Filesize
337KB
MD5d43e989a989f610ceefe72b17ad2378e
SHA1edd2b3674e7cc590da404177db5456cf2228c3a8
SHA2567529fde6ea2298d0289f3a60c9421ffcaa82524bfbb9df13aee4ab954ac3ae16
SHA512735c59ff43da14043eb12b9581d717f8f62b5654f88558f1c2fb523c4891b59e84a0f16f3ee8fc0481ed827fb88f3a70d055a006ff05692380636b56b8bef74b
-
Filesize
337KB
MD53885e198d2d78dc74eebf50b6ca39b77
SHA1d8cee24d12ea205dcecf12fb6df5f777f1640d6b
SHA256a3293bf40f501f7bb2bec8148f005115001a7f0e1d1a8e1278881bf69b18a4b1
SHA512d71a03bc09d6f261f9366e5e8155fa8894b4cd039c1b73e14845ee54699aba3dd546a12c8a2e40d29d3ae8f997c5dda22428c83d9a1e26913dfe5dcb835a30ed
-
Filesize
337KB
MD5ae1147583e9f6543e9b66d25e879ff8e
SHA1b13744653e2b1758bdeee8ea77f39d28ebd94db8
SHA2565c5c443fce9bc9d1a1aa5c89c6166fb43c6d95db6cb855081627f2db91341e10
SHA51257ff9b8d742ead3cba06d11d252f4317e3f8b9cb202374613513970825741e889773e10c7362bc5b4bfa454f9ea5058d71876cfb4c7fdf985c86ee896d6fc519
-
Filesize
337KB
MD5e573369244e3d67d81887d2594d7530b
SHA19b6c5c663bcf0d57e4fa7eac30fe4e6f030010df
SHA2563c470659ac617105862395088da373846c20954d3fecc847e5f251d786166b0b
SHA512e510a65978389debeb0581d50808b3bf711cf72e6d4276c8dcfcb66689e57344e19e152c0f467e3798fa6239f43023fa88a220921f31e1dd65bac8fa5c895e25
-
Filesize
337KB
MD502201e13f64d837fff7086c984770e81
SHA1cae0dfbc645ff0fbbf961ce436cf267342f437af
SHA2564c69028b7c1b0bfadefe3ef3caa2558f8daf4d0947692692e02cea887b7a2de7
SHA512d0ecffcd4b3d8e6894c359c1be91283924953af90771ad8f57b26b42e9e6ab9fadb4a20682e7ce1fa09a53a1e6eff13eebccaf25987adad1d8d31416a907cceb
-
Filesize
337KB
MD5c676abf05b774d0531e15e29b70a3be4
SHA158a7ea8f542606957a098f83692a1f1d016e6b0e
SHA256325666dd8b832443a5de00ea99bd034346158488b5eb2c07ff3e81afe850573d
SHA5128a01fe540b51de8b194bf149fec2d228f64e4fbe0dac7de154ff46ef937cbc35c41bace5fc653e8d1d06add7b4a9de415b1ab05529037070a0572cd2ff496a80