Analysis
-
max time kernel
107s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
17-01-2025 09:50
Static task
static1
Behavioral task
behavioral1
Sample
f46ce4bc57b462b1eeb3398c37e63e43c5cf22150f02180a7c8d1fbf9d9e303aN.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
f46ce4bc57b462b1eeb3398c37e63e43c5cf22150f02180a7c8d1fbf9d9e303aN.exe
Resource
win10v2004-20241007-en
General
-
Target
f46ce4bc57b462b1eeb3398c37e63e43c5cf22150f02180a7c8d1fbf9d9e303aN.exe
-
Size
96KB
-
MD5
f0e71b2cbb4c4ed0bd30f0ff51a0c010
-
SHA1
1053f72d081f0c9c6802794288435216bd9efc2d
-
SHA256
f46ce4bc57b462b1eeb3398c37e63e43c5cf22150f02180a7c8d1fbf9d9e303a
-
SHA512
8ffc581e0aae5fda6e77613334e14aa0d37de9c349ab6d37b084f6323473620278acfd0612270edceaadbcec2ab82120675ace555951238ceca6310bf090a14a
-
SSDEEP
1536:CB395FIpFDK0gOhC+cKfivcAaGYdtdE+A2Lj47RZObZUUWaegPYAW:CTeFD9u5bUCYBj0ClUUWaeF
Malware Config
Extracted
berbew
http://crutop.nu/index.php
http://crutop.ru/index.php
http://mazafaka.ru/index.php
http://color-bank.ru/index.php
http://asechka.ru/index.php
http://trojan.ru/index.php
http://fuck.ru/index.php
http://goldensand.ru/index.php
http://filesearch.ru/index.php
http://devx.nm.ru/index.php
http://ros-neftbank.ru/index.php
http://lovingod.host.sk/index.php
http://www.redline.ru/index.php
http://cvv.ru/index.php
http://hackers.lv/index.php
http://fethard.biz/index.php
http://ldark.nm.ru/index.htm
http://gaz-prom.ru/index.htm
http://promo.ru/index.htm
http://potleaf.chat.ru/index.htm
http://kadet.ru/index.htm
http://cvv.ru/index.htm
http://crutop.nu/index.htm
http://crutop.ru/index.htm
http://mazafaka.ru/index.htm
http://xware.cjb.net/index.htm
http://konfiskat.org/index.htm
http://parex-bank.ru/index.htm
http://kidos-bank.ru/index.htm
http://kavkaz.ru/index.htm
http://fethard.biz/index.htm
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 16 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cinafkkd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cbffoabe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cmpgpond.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad f46ce4bc57b462b1eeb3398c37e63e43c5cf22150f02180a7c8d1fbf9d9e303aN.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Boljgg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bjbndpmd.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bjbndpmd.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bigkel32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cepipm32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cmpgpond.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cepipm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cinafkkd.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cbffoabe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" f46ce4bc57b462b1eeb3398c37e63e43c5cf22150f02180a7c8d1fbf9d9e303aN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Boljgg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bigkel32.exe -
Berbew family
-
Executes dropped EXE 8 IoCs
pid Process 2552 Boljgg32.exe 2448 Bjbndpmd.exe 2904 Bigkel32.exe 2468 Cepipm32.exe 2648 Cinafkkd.exe 2684 Cbffoabe.exe 2576 Cmpgpond.exe 2844 Dpapaj32.exe -
Loads dropped DLL 19 IoCs
pid Process 524 f46ce4bc57b462b1eeb3398c37e63e43c5cf22150f02180a7c8d1fbf9d9e303aN.exe 524 f46ce4bc57b462b1eeb3398c37e63e43c5cf22150f02180a7c8d1fbf9d9e303aN.exe 2552 Boljgg32.exe 2552 Boljgg32.exe 2448 Bjbndpmd.exe 2448 Bjbndpmd.exe 2904 Bigkel32.exe 2904 Bigkel32.exe 2468 Cepipm32.exe 2468 Cepipm32.exe 2648 Cinafkkd.exe 2648 Cinafkkd.exe 2684 Cbffoabe.exe 2684 Cbffoabe.exe 2576 Cmpgpond.exe 2576 Cmpgpond.exe 1916 WerFault.exe 1916 WerFault.exe 1916 WerFault.exe -
Drops file in System32 directory 26 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Cinafkkd.exe Cepipm32.exe File created C:\Windows\SysWOW64\Hbocphim.dll Cinafkkd.exe File created C:\Windows\SysWOW64\Pcaibd32.dll Cbffoabe.exe File created C:\Windows\SysWOW64\Dpapaj32.exe Cmpgpond.exe File opened for modification C:\Windows\SysWOW64\Boljgg32.exe f46ce4bc57b462b1eeb3398c37e63e43c5cf22150f02180a7c8d1fbf9d9e303aN.exe File created C:\Windows\SysWOW64\Gfikmo32.dll Boljgg32.exe File opened for modification C:\Windows\SysWOW64\Bigkel32.exe Bjbndpmd.exe File created C:\Windows\SysWOW64\Oinhifdq.dll Bjbndpmd.exe File opened for modification C:\Windows\SysWOW64\Dpapaj32.exe Cmpgpond.exe File opened for modification C:\Windows\SysWOW64\ÿs.e¢e Dpapaj32.exe File opened for modification C:\Windows\SysWOW64\Cmpgpond.exe Cbffoabe.exe File created C:\Windows\SysWOW64\Jdpkmjnb.dll f46ce4bc57b462b1eeb3398c37e63e43c5cf22150f02180a7c8d1fbf9d9e303aN.exe File opened for modification C:\Windows\SysWOW64\Bjbndpmd.exe Boljgg32.exe File created C:\Windows\SysWOW64\Cepipm32.exe Bigkel32.exe File created C:\Windows\SysWOW64\Cinafkkd.exe Cepipm32.exe File created C:\Windows\SysWOW64\Eepejpil.dll Cepipm32.exe File created C:\Windows\SysWOW64\Cmpgpond.exe Cbffoabe.exe File created C:\Windows\SysWOW64\Pdkefp32.dll Cmpgpond.exe File created C:\Windows\SysWOW64\ÿs.e¢e Dpapaj32.exe File created C:\Windows\SysWOW64\Bjbndpmd.exe Boljgg32.exe File created C:\Windows\SysWOW64\Bigkel32.exe Bjbndpmd.exe File opened for modification C:\Windows\SysWOW64\Cepipm32.exe Bigkel32.exe File created C:\Windows\SysWOW64\Gdgqdaoh.dll Bigkel32.exe File created C:\Windows\SysWOW64\Boljgg32.exe f46ce4bc57b462b1eeb3398c37e63e43c5cf22150f02180a7c8d1fbf9d9e303aN.exe File created C:\Windows\SysWOW64\Cbffoabe.exe Cinafkkd.exe File opened for modification C:\Windows\SysWOW64\Cbffoabe.exe Cinafkkd.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1916 2844 WerFault.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dpapaj32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f46ce4bc57b462b1eeb3398c37e63e43c5cf22150f02180a7c8d1fbf9d9e303aN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Boljgg32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bjbndpmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cepipm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cbffoabe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bigkel32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cinafkkd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cmpgpond.exe -
Modifies registry class 27 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bigkel32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pcaibd32.dll" Cbffoabe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Boljgg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} f46ce4bc57b462b1eeb3398c37e63e43c5cf22150f02180a7c8d1fbf9d9e303aN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eepejpil.dll" Cepipm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cepipm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cinafkkd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cbffoabe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node f46ce4bc57b462b1eeb3398c37e63e43c5cf22150f02180a7c8d1fbf9d9e303aN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID f46ce4bc57b462b1eeb3398c37e63e43c5cf22150f02180a7c8d1fbf9d9e303aN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gfikmo32.dll" Boljgg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bjbndpmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cepipm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hbocphim.dll" Cinafkkd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pdkefp32.dll" Cmpgpond.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cmpgpond.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jdpkmjnb.dll" f46ce4bc57b462b1eeb3398c37e63e43c5cf22150f02180a7c8d1fbf9d9e303aN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Boljgg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gdgqdaoh.dll" Bigkel32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" f46ce4bc57b462b1eeb3398c37e63e43c5cf22150f02180a7c8d1fbf9d9e303aN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bjbndpmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bigkel32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cinafkkd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cbffoabe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 f46ce4bc57b462b1eeb3398c37e63e43c5cf22150f02180a7c8d1fbf9d9e303aN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oinhifdq.dll" Bjbndpmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cmpgpond.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 524 wrote to memory of 2552 524 f46ce4bc57b462b1eeb3398c37e63e43c5cf22150f02180a7c8d1fbf9d9e303aN.exe 31 PID 524 wrote to memory of 2552 524 f46ce4bc57b462b1eeb3398c37e63e43c5cf22150f02180a7c8d1fbf9d9e303aN.exe 31 PID 524 wrote to memory of 2552 524 f46ce4bc57b462b1eeb3398c37e63e43c5cf22150f02180a7c8d1fbf9d9e303aN.exe 31 PID 524 wrote to memory of 2552 524 f46ce4bc57b462b1eeb3398c37e63e43c5cf22150f02180a7c8d1fbf9d9e303aN.exe 31 PID 2552 wrote to memory of 2448 2552 Boljgg32.exe 32 PID 2552 wrote to memory of 2448 2552 Boljgg32.exe 32 PID 2552 wrote to memory of 2448 2552 Boljgg32.exe 32 PID 2552 wrote to memory of 2448 2552 Boljgg32.exe 32 PID 2448 wrote to memory of 2904 2448 Bjbndpmd.exe 33 PID 2448 wrote to memory of 2904 2448 Bjbndpmd.exe 33 PID 2448 wrote to memory of 2904 2448 Bjbndpmd.exe 33 PID 2448 wrote to memory of 2904 2448 Bjbndpmd.exe 33 PID 2904 wrote to memory of 2468 2904 Bigkel32.exe 34 PID 2904 wrote to memory of 2468 2904 Bigkel32.exe 34 PID 2904 wrote to memory of 2468 2904 Bigkel32.exe 34 PID 2904 wrote to memory of 2468 2904 Bigkel32.exe 34 PID 2468 wrote to memory of 2648 2468 Cepipm32.exe 35 PID 2468 wrote to memory of 2648 2468 Cepipm32.exe 35 PID 2468 wrote to memory of 2648 2468 Cepipm32.exe 35 PID 2468 wrote to memory of 2648 2468 Cepipm32.exe 35 PID 2648 wrote to memory of 2684 2648 Cinafkkd.exe 36 PID 2648 wrote to memory of 2684 2648 Cinafkkd.exe 36 PID 2648 wrote to memory of 2684 2648 Cinafkkd.exe 36 PID 2648 wrote to memory of 2684 2648 Cinafkkd.exe 36 PID 2684 wrote to memory of 2576 2684 Cbffoabe.exe 37 PID 2684 wrote to memory of 2576 2684 Cbffoabe.exe 37 PID 2684 wrote to memory of 2576 2684 Cbffoabe.exe 37 PID 2684 wrote to memory of 2576 2684 Cbffoabe.exe 37 PID 2576 wrote to memory of 2844 2576 Cmpgpond.exe 38 PID 2576 wrote to memory of 2844 2576 Cmpgpond.exe 38 PID 2576 wrote to memory of 2844 2576 Cmpgpond.exe 38 PID 2576 wrote to memory of 2844 2576 Cmpgpond.exe 38 PID 2844 wrote to memory of 1916 2844 Dpapaj32.exe 39 PID 2844 wrote to memory of 1916 2844 Dpapaj32.exe 39 PID 2844 wrote to memory of 1916 2844 Dpapaj32.exe 39 PID 2844 wrote to memory of 1916 2844 Dpapaj32.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\f46ce4bc57b462b1eeb3398c37e63e43c5cf22150f02180a7c8d1fbf9d9e303aN.exe"C:\Users\Admin\AppData\Local\Temp\f46ce4bc57b462b1eeb3398c37e63e43c5cf22150f02180a7c8d1fbf9d9e303aN.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:524 -
C:\Windows\SysWOW64\Boljgg32.exeC:\Windows\system32\Boljgg32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\SysWOW64\Bjbndpmd.exeC:\Windows\system32\Bjbndpmd.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Windows\SysWOW64\Bigkel32.exeC:\Windows\system32\Bigkel32.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\SysWOW64\Cepipm32.exeC:\Windows\system32\Cepipm32.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Windows\SysWOW64\Cinafkkd.exeC:\Windows\system32\Cinafkkd.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\SysWOW64\Cbffoabe.exeC:\Windows\system32\Cbffoabe.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\SysWOW64\Cmpgpond.exeC:\Windows\system32\Cmpgpond.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Windows\SysWOW64\Dpapaj32.exeC:\Windows\system32\Dpapaj32.exe9⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2844 -s 14410⤵
- Loads dropped DLL
- Program crash
PID:1916
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD58d19e521fac4108a6be56f8f332d20b8
SHA10766759296655f3246987136d5d872bf5fd6b3d0
SHA256441a595a4c602f127c221ef7566bf939886cb4b52b6d1f9912a9eabafdd1a906
SHA512c9ee7947bf9104044ffbe66c424c991b7ac45f4f198287daeb81a9adb0960755f228812c01b98ae2863f7c88eec98ab6b23d5bfe574adb21864106ee82be772a
-
Filesize
96KB
MD593f46d79a1d62df65d275013d0f21b56
SHA101214bc9f85805c9c3737e68adee2870caa76206
SHA2565ec512544c7efda1001d0ca3a5766f2bc97bb521d95a730681ff30a0452f674b
SHA5125d2ee29b068bcf9e618446e5b17feba8924ba649c3e3a6f4bb5c72b070f124c5178f9a9cb07a2efe8339c02cb76ae1d01bd99e23a0ed5d59372053fc0bc94fde
-
Filesize
96KB
MD549ef23260a18465f420b2d9fb749f8c5
SHA13cedc6b6b224fe628838985b4d87525abde8417f
SHA256f65c4482c262bc3de09c506c15ea55c99153517053712358d28a5c302d883296
SHA5126d5752e11b67db10f00fd3e94214a399a91c69adc1a689f5e044d2a29e6724f878b429a5b0548fb9e72966fc6e3c65f55786b66c0b74828edf01328d0755e262
-
Filesize
96KB
MD5e30e538d502768d54879deb7cbf2e7ef
SHA1986573d8d7379e399a6ef9066a36fb12241326af
SHA2566bb24e9be4341e75f8bdcb7d7b8bf874eb136210ad66f2d66376bafcf4092b3d
SHA5124ffa0ed1b52de8ddc2e3624958564ca609a3a04545d0491d9787607f1b1752c16c7b4b23d14efc60a62a0684adbd667b14d2ec48a7a335f97dbb857c2df55b5b
-
Filesize
96KB
MD5707d87239c0e7351360ca20fba6c28bb
SHA1ba9f78a15d1f18b271a4b1d35e870e45913d3b9f
SHA256df1e74e2bcacc21963e3515fab402f8ff0aad97d74463bf3fcfd067d386f9499
SHA512055b3732c6f705b0249c5775d96a245cc2c3937a9afc30f99b6590989d029fd3846cb5afa6d2765caf6b0ccc64d38d87e2cb114ca66c742a6d06e3ac72b63396
-
Filesize
96KB
MD59993f3118280f3de8b4536795be82b4b
SHA1b29e8a0c516b6f525eddb6025d06534357ec76d3
SHA2569e16a008bd9f3595e9c8e15dd908f1fff00f36fc4b8a5dfef9343cdd93b9883f
SHA512affd8ab300aba8f132975089e1e4accc2d3ff1e34ac16ff9be12e9bc8f717abe96625a9c59707c811b91f17d9f720295b570a864b2cfeba6f1f8763e2d3ce779
-
Filesize
96KB
MD5a62e0e621333643dd15f8259b0df0721
SHA1e3f4326a4cd7c93c6dd536f0231dccbce1b4ddd2
SHA256ac088d5434b7a44d0e7770fe6f8c4c71f7e4bdf8866d1844927d451427a3a450
SHA512cb516039ba1287b0009d62e920399b477ad269691f566f26962c14cb07bf1e6c38a89a787ecc8c77158f94009a8bbbb8e609db365f9121a421a0dfe8c5a0c5ea
-
Filesize
96KB
MD5569547ade099141eed4d8fcd94d4b185
SHA17944844bab10bbaabdb3f4b67e6bd368e4271cde
SHA2566179c1433a9f971855c838ea4b37741c87faa1e8d3f402a277ddd98f9e05bada
SHA5121ca49f5879f198dc39ef78ea2ce36a77a5e01819cfbadcce53b40a4901e5d11335867f32200c5a30ed334088854731d2a95bbeaae5dca5f359e9c10d8ecd9175