Analysis
-
max time kernel
111s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-01-2025 17:25
Static task
static1
Behavioral task
behavioral1
Sample
bf11b43e1f298bc90370b1dd83868443542a7c365a4afb204e8e2d6ffd89e44c.exe
Resource
win7-20240903-en
General
-
Target
bf11b43e1f298bc90370b1dd83868443542a7c365a4afb204e8e2d6ffd89e44c.exe
-
Size
2.0MB
-
MD5
b612eb21d3e997f804a49c9a7dfb3558
-
SHA1
5a1afbcafb6c233ce1afbb7dfcf674336352e83a
-
SHA256
bf11b43e1f298bc90370b1dd83868443542a7c365a4afb204e8e2d6ffd89e44c
-
SHA512
523e037ee05d40c993d1a5f4b351f14bb3787fa11832c5c68231eeca5ceb20760833ac132f8c5d17b0088c44382820d8458f5bb67b51b278236a44ef86bb450a
-
SSDEEP
24576:m3K8VrXXaaDmW6MKYs9j0x5h3kW9I9ECxYKBG/P8FS7FSzwQS2xXkal/I+3N+xBW:mTaFWn/s9jeh0R1jBGMF8algEMBVnA
Malware Config
Extracted
gcleaner
45.12.253.51
45.12.253.92
45.12.253.89
45.12.253.55
-
url_path
/done.php
/delivery.php
/delivery.php
Signatures
-
Gcleaner family
-
Executes dropped EXE 2 IoCs
pid Process 3476 bf11b43e1f298bc90370b1dd83868443542a7c365a4afb204e8e2d6ffd89e44c.tmp 2008 CggedFrog7.exe -
Loads dropped DLL 3 IoCs
pid Process 3476 bf11b43e1f298bc90370b1dd83868443542a7c365a4afb204e8e2d6ffd89e44c.tmp 212 regsvr32.exe 3896 regsvr32.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 38 IoCs
description ioc Process File created C:\Program Files (x86)\CggedFrog\translation\is-6A9FG.tmp bf11b43e1f298bc90370b1dd83868443542a7c365a4afb204e8e2d6ffd89e44c.tmp File created C:\Program Files (x86)\CggedFrog\extensions\Meta\translation\is-6SDJ3.tmp bf11b43e1f298bc90370b1dd83868443542a7c365a4afb204e8e2d6ffd89e44c.tmp File created C:\Program Files (x86)\CggedFrog\extensions\Meta\translation\is-I2S6Q.tmp bf11b43e1f298bc90370b1dd83868443542a7c365a4afb204e8e2d6ffd89e44c.tmp File created C:\Program Files (x86)\CggedFrog\extensions\Meta\translation\is-PMP8I.tmp bf11b43e1f298bc90370b1dd83868443542a7c365a4afb204e8e2d6ffd89e44c.tmp File created C:\Program Files (x86)\CggedFrog\extensions\Meta\is-PDBGL.tmp bf11b43e1f298bc90370b1dd83868443542a7c365a4afb204e8e2d6ffd89e44c.tmp File opened for modification C:\Program Files (x86)\CggedFrog\unins000.dat bf11b43e1f298bc90370b1dd83868443542a7c365a4afb204e8e2d6ffd89e44c.tmp File created C:\Program Files (x86)\CggedFrog\is-5MJK7.tmp bf11b43e1f298bc90370b1dd83868443542a7c365a4afb204e8e2d6ffd89e44c.tmp File created C:\Program Files (x86)\CggedFrog\translation\is-02H9K.tmp bf11b43e1f298bc90370b1dd83868443542a7c365a4afb204e8e2d6ffd89e44c.tmp File created C:\Program Files (x86)\CggedFrog\translation\is-H18V2.tmp bf11b43e1f298bc90370b1dd83868443542a7c365a4afb204e8e2d6ffd89e44c.tmp File created C:\Program Files (x86)\CggedFrog\translation\is-N4DDA.tmp bf11b43e1f298bc90370b1dd83868443542a7c365a4afb204e8e2d6ffd89e44c.tmp File created C:\Program Files (x86)\CggedFrog\extensions\Meta\translation\is-4SBTT.tmp bf11b43e1f298bc90370b1dd83868443542a7c365a4afb204e8e2d6ffd89e44c.tmp File created C:\Program Files (x86)\CggedFrog\is-HGQVG.tmp bf11b43e1f298bc90370b1dd83868443542a7c365a4afb204e8e2d6ffd89e44c.tmp File created C:\Program Files (x86)\CggedFrog\is-L92R0.tmp bf11b43e1f298bc90370b1dd83868443542a7c365a4afb204e8e2d6ffd89e44c.tmp File created C:\Program Files (x86)\CggedFrog\translation\is-BNIGQ.tmp bf11b43e1f298bc90370b1dd83868443542a7c365a4afb204e8e2d6ffd89e44c.tmp File created C:\Program Files (x86)\CggedFrog\extensions\Meta\translation\is-J3KK7.tmp bf11b43e1f298bc90370b1dd83868443542a7c365a4afb204e8e2d6ffd89e44c.tmp File created C:\Program Files (x86)\CggedFrog\is-PMLB0.tmp bf11b43e1f298bc90370b1dd83868443542a7c365a4afb204e8e2d6ffd89e44c.tmp File created C:\Program Files (x86)\CggedFrog\translation\is-LTT6Q.tmp bf11b43e1f298bc90370b1dd83868443542a7c365a4afb204e8e2d6ffd89e44c.tmp File created C:\Program Files (x86)\CggedFrog\translation\is-0FMDU.tmp bf11b43e1f298bc90370b1dd83868443542a7c365a4afb204e8e2d6ffd89e44c.tmp File created C:\Program Files (x86)\CggedFrog\translation\is-SVQOV.tmp bf11b43e1f298bc90370b1dd83868443542a7c365a4afb204e8e2d6ffd89e44c.tmp File created C:\Program Files (x86)\CggedFrog\extensions\Meta\is-HSD4E.tmp bf11b43e1f298bc90370b1dd83868443542a7c365a4afb204e8e2d6ffd89e44c.tmp File created C:\Program Files (x86)\CggedFrog\is-STNA7.tmp bf11b43e1f298bc90370b1dd83868443542a7c365a4afb204e8e2d6ffd89e44c.tmp File created C:\Program Files (x86)\CggedFrog\translation\is-ORPN5.tmp bf11b43e1f298bc90370b1dd83868443542a7c365a4afb204e8e2d6ffd89e44c.tmp File created C:\Program Files (x86)\CggedFrog\translation\is-5B6D6.tmp bf11b43e1f298bc90370b1dd83868443542a7c365a4afb204e8e2d6ffd89e44c.tmp File created C:\Program Files (x86)\CggedFrog\translation\is-48RQE.tmp bf11b43e1f298bc90370b1dd83868443542a7c365a4afb204e8e2d6ffd89e44c.tmp File created C:\Program Files (x86)\CggedFrog\translation\is-MMGLF.tmp bf11b43e1f298bc90370b1dd83868443542a7c365a4afb204e8e2d6ffd89e44c.tmp File created C:\Program Files (x86)\CggedFrog\extensions\Meta\translation\is-627EE.tmp bf11b43e1f298bc90370b1dd83868443542a7c365a4afb204e8e2d6ffd89e44c.tmp File created C:\Program Files (x86)\CggedFrog\translation\is-QSDEF.tmp bf11b43e1f298bc90370b1dd83868443542a7c365a4afb204e8e2d6ffd89e44c.tmp File created C:\Program Files (x86)\CggedFrog\translation\is-3LTD5.tmp bf11b43e1f298bc90370b1dd83868443542a7c365a4afb204e8e2d6ffd89e44c.tmp File created C:\Program Files (x86)\CggedFrog\is-UM5F7.tmp bf11b43e1f298bc90370b1dd83868443542a7c365a4afb204e8e2d6ffd89e44c.tmp File created C:\Program Files (x86)\CggedFrog\is-IEQ8A.tmp bf11b43e1f298bc90370b1dd83868443542a7c365a4afb204e8e2d6ffd89e44c.tmp File created C:\Program Files (x86)\CggedFrog\extensions\Meta\translation\is-HFHUM.tmp bf11b43e1f298bc90370b1dd83868443542a7c365a4afb204e8e2d6ffd89e44c.tmp File created C:\Program Files (x86)\CggedFrog\unins000.dat bf11b43e1f298bc90370b1dd83868443542a7c365a4afb204e8e2d6ffd89e44c.tmp File created C:\Program Files (x86)\CggedFrog\is-LDUUQ.tmp bf11b43e1f298bc90370b1dd83868443542a7c365a4afb204e8e2d6ffd89e44c.tmp File created C:\Program Files (x86)\CggedFrog\translation\is-M8H7U.tmp bf11b43e1f298bc90370b1dd83868443542a7c365a4afb204e8e2d6ffd89e44c.tmp File created C:\Program Files (x86)\CggedFrog\extensions\Meta\is-LK7V3.tmp bf11b43e1f298bc90370b1dd83868443542a7c365a4afb204e8e2d6ffd89e44c.tmp File opened for modification C:\Program Files (x86)\CggedFrog\CggedFrog7.exe bf11b43e1f298bc90370b1dd83868443542a7c365a4afb204e8e2d6ffd89e44c.tmp File created C:\Program Files (x86)\CggedFrog\extensions\Meta\translation\is-PE9UU.tmp bf11b43e1f298bc90370b1dd83868443542a7c365a4afb204e8e2d6ffd89e44c.tmp File created C:\Program Files (x86)\CggedFrog\extensions\Meta\translation\is-RBAK6.tmp bf11b43e1f298bc90370b1dd83868443542a7c365a4afb204e8e2d6ffd89e44c.tmp -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CggedFrog7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bf11b43e1f298bc90370b1dd83868443542a7c365a4afb204e8e2d6ffd89e44c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bf11b43e1f298bc90370b1dd83868443542a7c365a4afb204e8e2d6ffd89e44c.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{93769740-DE48-11D2-B7C8-A62255602516}\1.4\FLAGS regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{93769743-DE48-11D2-B7C8-A62255602516}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{93769742-DE48-11D2-B7C8-A62255602516}\TypeLib\ = "{93769740-DE48-11D2-B7C8-A62255602516}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{93769741-DE48-11D2-B7C8-A62255602516} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{93769741-DE48-11D2-B7C8-A62255602516}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{72E8D54B-C929-4DD8-8723-3006F89F7D58}\ = "TFShellMenu" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DSOleFile.PropertyReader\CurVer\ = "DSOleFile.PropertyReader.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{93769740-DE48-11D2-B7C8-A62255602516}\1.4\0\win32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{93769741-DE48-11D2-B7C8-A62255602516}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{71068371-CDC2-4FA2-B0AE-66673A56D5CB}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3955D421-C8F3-11d2-B7C8-A22B3D95F811}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{93769741-DE48-11D2-B7C8-A62255602516}\ = "_PropertyReader" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3955D421-C8F3-11d2-B7C8-A22B3D95F811}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3955D421-C8F3-11d2-B7C8-A22B3D95F811}\InprocServer32\ = "C:\\Program Files (x86)\\CggedFrog\\extensions\\Meta\\dsofile.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DSOleFile.PropertyReader\CLSID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{93769740-DE48-11D2-B7C8-A62255602516}\1.4\ = "DS: OLE Document Properties 1.4 Object Library" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{93769744-DE48-11D2-B7C8-A62255602516}\ = "CustomProperty" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{93769743-DE48-11D2-B7C8-A62255602516}\TypeLib\Version = "1.4" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{71068371-CDC2-4FA2-B0AE-66673A56D5CB} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shellex\ContextMenuHandlers\TaggedFrogExt regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{93769741-DE48-11D2-B7C8-A62255602516}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{93769742-DE48-11D2-B7C8-A62255602516}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{93769741-DE48-11D2-B7C8-A62255602516} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DSOleFile.PropertyReader regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DSOleFile.PropertyReader\CLSID\ = "{3955D421-C8F3-11d2-B7C8-A22B3D95F811}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{93769744-DE48-11D2-B7C8-A62255602516}\TypeLib\ = "{93769740-DE48-11D2-B7C8-A62255602516}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{93769743-DE48-11D2-B7C8-A62255602516}\TypeLib\ = "{93769740-DE48-11D2-B7C8-A62255602516}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{93769741-DE48-11D2-B7C8-A62255602516}\ = "_PropertyReader" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{71068371-CDC2-4FA2-B0AE-66673A56D5CB}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3955D421-C8F3-11d2-B7C8-A22B3D95F811}\ = "OLE File Property Reader Class" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{93769740-DE48-11D2-B7C8-A62255602516}\1.4\0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{93769740-DE48-11D2-B7C8-A62255602516}\1.4\HELPDIR regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{93769743-DE48-11D2-B7C8-A62255602516}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{93769742-DE48-11D2-B7C8-A62255602516}\ = "DocumentProperties" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3955D421-C8F3-11d2-B7C8-A22B3D95F811}\ProgID\ = "DSOleFile.PropertyReader.1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{93769740-DE48-11D2-B7C8-A62255602516}\1.4\FLAGS\ = "0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{72E8D54B-C929-4DD8-8723-3006F89F7D58} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{93769744-DE48-11D2-B7C8-A62255602516}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{93769740-DE48-11D2-B7C8-A62255602516}\1.4 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{93769744-DE48-11D2-B7C8-A62255602516}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{93769743-DE48-11D2-B7C8-A62255602516}\TypeLib\Version = "1.4" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{93769742-DE48-11D2-B7C8-A62255602516} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{93769742-DE48-11D2-B7C8-A62255602516}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{93769742-DE48-11D2-B7C8-A62255602516}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3955D421-C8F3-11d2-B7C8-A22B3D95F811}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DSOleFile.PropertyReader\ = "OLE File Property Reader" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{93769741-DE48-11D2-B7C8-A62255602516}\TypeLib\ = "{93769740-DE48-11D2-B7C8-A62255602516}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{93769740-DE48-11D2-B7C8-A62255602516} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{93769744-DE48-11D2-B7C8-A62255602516}\TypeLib\Version = "1.4" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\TFShellMenu.DLL\AppID = "{72E8D54B-C929-4DD8-8723-3006F89F7D58}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DSOleFile.PropertyReader.1\ = "OLE File Property Reader" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{93769740-DE48-11D2-B7C8-A62255602516}\1.4\0\win32\ = "C:\\Program Files (x86)\\CggedFrog\\extensions\\Meta\\dsofile.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{93769743-DE48-11D2-B7C8-A62255602516} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{93769743-DE48-11D2-B7C8-A62255602516}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{93769743-DE48-11D2-B7C8-A62255602516}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{93769743-DE48-11D2-B7C8-A62255602516}\TypeLib\ = "{93769740-DE48-11D2-B7C8-A62255602516}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{93769742-DE48-11D2-B7C8-A62255602516}\TypeLib\Version = "1.4" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\TFShellMenu.DLL regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shellex\ContextMenuHandlers\TaggedFrogExt\ = "{71068371-CDC2-4FA2-B0AE-66673A56D5CB}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{93769741-DE48-11D2-B7C8-A62255602516}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{93769741-DE48-11D2-B7C8-A62255602516}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{93769743-DE48-11D2-B7C8-A62255602516}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DSOleFile.PropertyReader\CurVer regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{93769743-DE48-11D2-B7C8-A62255602516}\ = "CustomProperties" regsvr32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2008 CggedFrog7.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3596 wrote to memory of 3476 3596 bf11b43e1f298bc90370b1dd83868443542a7c365a4afb204e8e2d6ffd89e44c.exe 85 PID 3596 wrote to memory of 3476 3596 bf11b43e1f298bc90370b1dd83868443542a7c365a4afb204e8e2d6ffd89e44c.exe 85 PID 3596 wrote to memory of 3476 3596 bf11b43e1f298bc90370b1dd83868443542a7c365a4afb204e8e2d6ffd89e44c.exe 85 PID 3476 wrote to memory of 212 3476 bf11b43e1f298bc90370b1dd83868443542a7c365a4afb204e8e2d6ffd89e44c.tmp 86 PID 3476 wrote to memory of 212 3476 bf11b43e1f298bc90370b1dd83868443542a7c365a4afb204e8e2d6ffd89e44c.tmp 86 PID 3476 wrote to memory of 212 3476 bf11b43e1f298bc90370b1dd83868443542a7c365a4afb204e8e2d6ffd89e44c.tmp 86 PID 3476 wrote to memory of 3896 3476 bf11b43e1f298bc90370b1dd83868443542a7c365a4afb204e8e2d6ffd89e44c.tmp 87 PID 3476 wrote to memory of 3896 3476 bf11b43e1f298bc90370b1dd83868443542a7c365a4afb204e8e2d6ffd89e44c.tmp 87 PID 3476 wrote to memory of 3896 3476 bf11b43e1f298bc90370b1dd83868443542a7c365a4afb204e8e2d6ffd89e44c.tmp 87 PID 3476 wrote to memory of 2284 3476 bf11b43e1f298bc90370b1dd83868443542a7c365a4afb204e8e2d6ffd89e44c.tmp 88 PID 3476 wrote to memory of 2284 3476 bf11b43e1f298bc90370b1dd83868443542a7c365a4afb204e8e2d6ffd89e44c.tmp 88 PID 3476 wrote to memory of 2284 3476 bf11b43e1f298bc90370b1dd83868443542a7c365a4afb204e8e2d6ffd89e44c.tmp 88 PID 3476 wrote to memory of 2008 3476 bf11b43e1f298bc90370b1dd83868443542a7c365a4afb204e8e2d6ffd89e44c.tmp 90 PID 3476 wrote to memory of 2008 3476 bf11b43e1f298bc90370b1dd83868443542a7c365a4afb204e8e2d6ffd89e44c.tmp 90 PID 3476 wrote to memory of 2008 3476 bf11b43e1f298bc90370b1dd83868443542a7c365a4afb204e8e2d6ffd89e44c.tmp 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\bf11b43e1f298bc90370b1dd83868443542a7c365a4afb204e8e2d6ffd89e44c.exe"C:\Users\Admin\AppData\Local\Temp\bf11b43e1f298bc90370b1dd83868443542a7c365a4afb204e8e2d6ffd89e44c.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3596 -
C:\Users\Admin\AppData\Local\Temp\is-SMPDJ.tmp\bf11b43e1f298bc90370b1dd83868443542a7c365a4afb204e8e2d6ffd89e44c.tmp"C:\Users\Admin\AppData\Local\Temp\is-SMPDJ.tmp\bf11b43e1f298bc90370b1dd83868443542a7c365a4afb204e8e2d6ffd89e44c.tmp" /SL5="$60258,1843076,319488,C:\Users\Admin\AppData\Local\Temp\bf11b43e1f298bc90370b1dd83868443542a7c365a4afb204e8e2d6ffd89e44c.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3476 -
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s "C:\Program Files (x86)\CggedFrog\TFShellMenu.dll"3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:212
-
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s "C:\Program Files (x86)\CggedFrog\extensions\Meta\dsofile.dll"3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3896
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Delete /F /TN "NavFrog 7"3⤵
- System Location Discovery: System Language Discovery
PID:2284
-
-
C:\Program Files (x86)\CggedFrog\CggedFrog7.exe"C:\Program Files (x86)\CggedFrog\CggedFrog7.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:2008
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.1MB
MD58bb5a1dcb7aaa32626f8180b2769a77e
SHA193f80063524828893796382721986272e293aa4d
SHA256577490d1249efb93d64632e8ef46590fcc17a13b70a6c13d27934e56fca2719d
SHA512da20dc0bfee9abc603cafdc096ebf288cd03ad4efc9984c3061df166b07d5a7254818b00533e17e56215289458f791e58a68f2a39391d6ce2368b7677d8cdbdb
-
Filesize
80KB
MD5aa1c938f60e065a350f07af972faf21c
SHA1cb7c5c2becd64e4ebcb410e86d6fb01624a0984b
SHA256f3455a77cb7fad3d842deecbbe386dfa7ad8fca98856a99c15374e3c46c04d23
SHA512dedfe61d8dec35d741e4db7617dd8f5dae492ce35ca215bdea2970fc4e202f5ad93461c062aa34f1659fbc36783e8b88e5240a698098728ff3a76cb1f18a196d
-
Filesize
39KB
MD59fb080566c3a4fb15ce48add38cc70dc
SHA1ad66885c72ca78247a60f26b6c391a9878e5fa26
SHA256f78978cf74047a690751bd377e71d002deb8a797b9be4b7d55ff279caf853b82
SHA512a4d0d89bab5e85fd42abea5f17f99972356f4aae76a4dde0b19fd7dacdcf693edf1dc1bb87748c39a07c6adb2c4269576da602056e94bceeb66b7579121d0559
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
C:\Users\Admin\AppData\Local\Temp\is-SMPDJ.tmp\bf11b43e1f298bc90370b1dd83868443542a7c365a4afb204e8e2d6ffd89e44c.tmp
Filesize955KB
MD571b23c68dc698518b17e8c2486245883
SHA14e26a8c1845431b0630ba3a58ee3e0e78cfc5d17
SHA256975ee3a1a4c6c4b836b9c26b8dc0839f024294a07b2f554ad210c8284a8cb568
SHA51260fc272e81735f8f7f9294686321c5557d4499095893af6294ee483954765d0edb169a6edb353a3aa86b3bdf52c5030e15b3329fa82af6122248baa9b61d9a69