Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24-01-2025 07:46
Behavioral task
behavioral1
Sample
d2261e2319199c3ab7be3e0fb6259e1cbdfc2b453f83655e8b5fdcfcff728182.exe
Resource
win7-20240903-en
General
-
Target
d2261e2319199c3ab7be3e0fb6259e1cbdfc2b453f83655e8b5fdcfcff728182.exe
-
Size
93KB
-
MD5
db480903b6c196fe161aa5ebf300fcb1
-
SHA1
776d33979a393a3e5187ca6354c591775f5d6a8f
-
SHA256
d2261e2319199c3ab7be3e0fb6259e1cbdfc2b453f83655e8b5fdcfcff728182
-
SHA512
f1865799a5aac9caef9ee5115ca7fe015695d3668e719fbcfd4a8b32bd47a480c1bf75bdedbffa7c312248fd739eabf495d58cfeccf55cb70a726364ed254127
-
SSDEEP
1536:/XzEy8VyRJeb/1SS6hPoRuoY31DaYfMZRWuLsV+17:/X2eJI/wSGoRuoY3gYfc0DV+17
Malware Config
Extracted
berbew
http://crutop.nu/index.php
http://crutop.ru/index.php
http://mazafaka.ru/index.php
http://color-bank.ru/index.php
http://asechka.ru/index.php
http://trojan.ru/index.php
http://fuck.ru/index.php
http://goldensand.ru/index.php
http://filesearch.ru/index.php
http://devx.nm.ru/index.php
http://ros-neftbank.ru/index.php
http://lovingod.host.sk/index.php
http://www.redline.ru/index.php
http://cvv.ru/index.php
http://hackers.lv/index.php
http://fethard.biz/index.php
http://ldark.nm.ru/index.htm
http://gaz-prom.ru/index.htm
http://promo.ru/index.htm
http://potleaf.chat.ru/index.htm
http://kadet.ru/index.htm
http://cvv.ru/index.htm
http://crutop.nu/index.htm
http://crutop.ru/index.htm
http://mazafaka.ru/index.htm
http://xware.cjb.net/index.htm
http://konfiskat.org/index.htm
http://parex-bank.ru/index.htm
http://kidos-bank.ru/index.htm
http://kavkaz.ru/index.htm
http://fethard.biz/index.htm
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 24 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kablnadm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kablnadm.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kfodfh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kpgionie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kdeaelok.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad d2261e2319199c3ab7be3e0fb6259e1cbdfc2b453f83655e8b5fdcfcff728182.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kfaalh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kageia32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lplbjm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kfodfh32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kjhcag32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kjhcag32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kpgionie.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kageia32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lmmfnb32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lplbjm32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kekkiq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kekkiq32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Koflgf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Koflgf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kfaalh32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kdeaelok.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lmmfnb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" d2261e2319199c3ab7be3e0fb6259e1cbdfc2b453f83655e8b5fdcfcff728182.exe -
Berbew family
-
Njrat family
-
Executes dropped EXE 12 IoCs
pid Process 2764 Kekkiq32.exe 2696 Kjhcag32.exe 2952 Kablnadm.exe 2820 Kfodfh32.exe 3060 Koflgf32.exe 1208 Kpgionie.exe 628 Kfaalh32.exe 2436 Kageia32.exe 852 Kdeaelok.exe 1664 Lmmfnb32.exe 264 Lplbjm32.exe 1252 Lbjofi32.exe -
Loads dropped DLL 29 IoCs
pid Process 296 d2261e2319199c3ab7be3e0fb6259e1cbdfc2b453f83655e8b5fdcfcff728182.exe 296 d2261e2319199c3ab7be3e0fb6259e1cbdfc2b453f83655e8b5fdcfcff728182.exe 2764 Kekkiq32.exe 2764 Kekkiq32.exe 2696 Kjhcag32.exe 2696 Kjhcag32.exe 2952 Kablnadm.exe 2952 Kablnadm.exe 2820 Kfodfh32.exe 2820 Kfodfh32.exe 3060 Koflgf32.exe 3060 Koflgf32.exe 1208 Kpgionie.exe 1208 Kpgionie.exe 628 Kfaalh32.exe 628 Kfaalh32.exe 2436 Kageia32.exe 2436 Kageia32.exe 852 Kdeaelok.exe 852 Kdeaelok.exe 1664 Lmmfnb32.exe 1664 Lmmfnb32.exe 264 Lplbjm32.exe 264 Lplbjm32.exe 568 WerFault.exe 568 WerFault.exe 568 WerFault.exe 568 WerFault.exe 568 WerFault.exe -
Drops file in System32 directory 36 IoCs
description ioc Process File created C:\Windows\SysWOW64\Kekkiq32.exe d2261e2319199c3ab7be3e0fb6259e1cbdfc2b453f83655e8b5fdcfcff728182.exe File opened for modification C:\Windows\SysWOW64\Kekkiq32.exe d2261e2319199c3ab7be3e0fb6259e1cbdfc2b453f83655e8b5fdcfcff728182.exe File opened for modification C:\Windows\SysWOW64\Kfodfh32.exe Kablnadm.exe File created C:\Windows\SysWOW64\Kfaalh32.exe Kpgionie.exe File created C:\Windows\SysWOW64\Lmmfnb32.exe Kdeaelok.exe File created C:\Windows\SysWOW64\Kablnadm.exe Kjhcag32.exe File created C:\Windows\SysWOW64\Kcjeje32.dll Kablnadm.exe File created C:\Windows\SysWOW64\Pehbqi32.dll Kfodfh32.exe File created C:\Windows\SysWOW64\Lplbjm32.exe Lmmfnb32.exe File opened for modification C:\Windows\SysWOW64\Kjhcag32.exe Kekkiq32.exe File opened for modification C:\Windows\SysWOW64\Kablnadm.exe Kjhcag32.exe File created C:\Windows\SysWOW64\Koflgf32.exe Kfodfh32.exe File created C:\Windows\SysWOW64\Phblkn32.dll Kpgionie.exe File created C:\Windows\SysWOW64\Dlcdel32.dll Lmmfnb32.exe File created C:\Windows\SysWOW64\Kjhcag32.exe Kekkiq32.exe File created C:\Windows\SysWOW64\Kfodfh32.exe Kablnadm.exe File created C:\Windows\SysWOW64\Kpgionie.exe Koflgf32.exe File created C:\Windows\SysWOW64\Kdeaelok.exe Kageia32.exe File opened for modification C:\Windows\SysWOW64\Lplbjm32.exe Lmmfnb32.exe File created C:\Windows\SysWOW64\Kjpndcho.dll Kjhcag32.exe File created C:\Windows\SysWOW64\Kageia32.exe Kfaalh32.exe File created C:\Windows\SysWOW64\Lbjofi32.exe Lplbjm32.exe File opened for modification C:\Windows\SysWOW64\Koflgf32.exe Kfodfh32.exe File opened for modification C:\Windows\SysWOW64\Kdeaelok.exe Kageia32.exe File created C:\Windows\SysWOW64\Mbbhfl32.dll Kageia32.exe File opened for modification C:\Windows\SysWOW64\Lbjofi32.exe Lplbjm32.exe File created C:\Windows\SysWOW64\Gpcafifg.dll Kekkiq32.exe File created C:\Windows\SysWOW64\Jbdhhp32.dll Koflgf32.exe File opened for modification C:\Windows\SysWOW64\Kfaalh32.exe Kpgionie.exe File opened for modification C:\Windows\SysWOW64\Kageia32.exe Kfaalh32.exe File created C:\Windows\SysWOW64\Jlflfm32.dll Kfaalh32.exe File created C:\Windows\SysWOW64\Pigckoki.dll Kdeaelok.exe File created C:\Windows\SysWOW64\Agioom32.dll d2261e2319199c3ab7be3e0fb6259e1cbdfc2b453f83655e8b5fdcfcff728182.exe File opened for modification C:\Windows\SysWOW64\Kpgionie.exe Koflgf32.exe File opened for modification C:\Windows\SysWOW64\Lmmfnb32.exe Kdeaelok.exe File created C:\Windows\SysWOW64\Ipafocdg.dll Lplbjm32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 568 1252 WerFault.exe 41 -
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kekkiq32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kjhcag32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kfodfh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Koflgf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kfaalh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kageia32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d2261e2319199c3ab7be3e0fb6259e1cbdfc2b453f83655e8b5fdcfcff728182.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kpgionie.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kdeaelok.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lmmfnb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lplbjm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lbjofi32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kablnadm.exe -
Modifies registry class 39 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kjhcag32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kablnadm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jbdhhp32.dll" Koflgf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Koflgf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pigckoki.dll" Kdeaelok.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ipafocdg.dll" Lplbjm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 d2261e2319199c3ab7be3e0fb6259e1cbdfc2b453f83655e8b5fdcfcff728182.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kekkiq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jlflfm32.dll" Kfaalh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kfaalh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kageia32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kdeaelok.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lplbjm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} d2261e2319199c3ab7be3e0fb6259e1cbdfc2b453f83655e8b5fdcfcff728182.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pehbqi32.dll" Kfodfh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kfodfh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kpgionie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kfaalh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kjpndcho.dll" Kjhcag32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kekkiq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kablnadm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gpcafifg.dll" Kekkiq32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kjhcag32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kcjeje32.dll" Kablnadm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mbbhfl32.dll" Kageia32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lplbjm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Agioom32.dll" d2261e2319199c3ab7be3e0fb6259e1cbdfc2b453f83655e8b5fdcfcff728182.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Phblkn32.dll" Kpgionie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node d2261e2319199c3ab7be3e0fb6259e1cbdfc2b453f83655e8b5fdcfcff728182.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kageia32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kdeaelok.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lmmfnb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lmmfnb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kfodfh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" d2261e2319199c3ab7be3e0fb6259e1cbdfc2b453f83655e8b5fdcfcff728182.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Koflgf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kpgionie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dlcdel32.dll" Lmmfnb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID d2261e2319199c3ab7be3e0fb6259e1cbdfc2b453f83655e8b5fdcfcff728182.exe -
Suspicious use of WriteProcessMemory 52 IoCs
description pid Process procid_target PID 296 wrote to memory of 2764 296 d2261e2319199c3ab7be3e0fb6259e1cbdfc2b453f83655e8b5fdcfcff728182.exe 30 PID 296 wrote to memory of 2764 296 d2261e2319199c3ab7be3e0fb6259e1cbdfc2b453f83655e8b5fdcfcff728182.exe 30 PID 296 wrote to memory of 2764 296 d2261e2319199c3ab7be3e0fb6259e1cbdfc2b453f83655e8b5fdcfcff728182.exe 30 PID 296 wrote to memory of 2764 296 d2261e2319199c3ab7be3e0fb6259e1cbdfc2b453f83655e8b5fdcfcff728182.exe 30 PID 2764 wrote to memory of 2696 2764 Kekkiq32.exe 31 PID 2764 wrote to memory of 2696 2764 Kekkiq32.exe 31 PID 2764 wrote to memory of 2696 2764 Kekkiq32.exe 31 PID 2764 wrote to memory of 2696 2764 Kekkiq32.exe 31 PID 2696 wrote to memory of 2952 2696 Kjhcag32.exe 32 PID 2696 wrote to memory of 2952 2696 Kjhcag32.exe 32 PID 2696 wrote to memory of 2952 2696 Kjhcag32.exe 32 PID 2696 wrote to memory of 2952 2696 Kjhcag32.exe 32 PID 2952 wrote to memory of 2820 2952 Kablnadm.exe 33 PID 2952 wrote to memory of 2820 2952 Kablnadm.exe 33 PID 2952 wrote to memory of 2820 2952 Kablnadm.exe 33 PID 2952 wrote to memory of 2820 2952 Kablnadm.exe 33 PID 2820 wrote to memory of 3060 2820 Kfodfh32.exe 34 PID 2820 wrote to memory of 3060 2820 Kfodfh32.exe 34 PID 2820 wrote to memory of 3060 2820 Kfodfh32.exe 34 PID 2820 wrote to memory of 3060 2820 Kfodfh32.exe 34 PID 3060 wrote to memory of 1208 3060 Koflgf32.exe 35 PID 3060 wrote to memory of 1208 3060 Koflgf32.exe 35 PID 3060 wrote to memory of 1208 3060 Koflgf32.exe 35 PID 3060 wrote to memory of 1208 3060 Koflgf32.exe 35 PID 1208 wrote to memory of 628 1208 Kpgionie.exe 36 PID 1208 wrote to memory of 628 1208 Kpgionie.exe 36 PID 1208 wrote to memory of 628 1208 Kpgionie.exe 36 PID 1208 wrote to memory of 628 1208 Kpgionie.exe 36 PID 628 wrote to memory of 2436 628 Kfaalh32.exe 37 PID 628 wrote to memory of 2436 628 Kfaalh32.exe 37 PID 628 wrote to memory of 2436 628 Kfaalh32.exe 37 PID 628 wrote to memory of 2436 628 Kfaalh32.exe 37 PID 2436 wrote to memory of 852 2436 Kageia32.exe 38 PID 2436 wrote to memory of 852 2436 Kageia32.exe 38 PID 2436 wrote to memory of 852 2436 Kageia32.exe 38 PID 2436 wrote to memory of 852 2436 Kageia32.exe 38 PID 852 wrote to memory of 1664 852 Kdeaelok.exe 39 PID 852 wrote to memory of 1664 852 Kdeaelok.exe 39 PID 852 wrote to memory of 1664 852 Kdeaelok.exe 39 PID 852 wrote to memory of 1664 852 Kdeaelok.exe 39 PID 1664 wrote to memory of 264 1664 Lmmfnb32.exe 40 PID 1664 wrote to memory of 264 1664 Lmmfnb32.exe 40 PID 1664 wrote to memory of 264 1664 Lmmfnb32.exe 40 PID 1664 wrote to memory of 264 1664 Lmmfnb32.exe 40 PID 264 wrote to memory of 1252 264 Lplbjm32.exe 41 PID 264 wrote to memory of 1252 264 Lplbjm32.exe 41 PID 264 wrote to memory of 1252 264 Lplbjm32.exe 41 PID 264 wrote to memory of 1252 264 Lplbjm32.exe 41 PID 1252 wrote to memory of 568 1252 Lbjofi32.exe 42 PID 1252 wrote to memory of 568 1252 Lbjofi32.exe 42 PID 1252 wrote to memory of 568 1252 Lbjofi32.exe 42 PID 1252 wrote to memory of 568 1252 Lbjofi32.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\d2261e2319199c3ab7be3e0fb6259e1cbdfc2b453f83655e8b5fdcfcff728182.exe"C:\Users\Admin\AppData\Local\Temp\d2261e2319199c3ab7be3e0fb6259e1cbdfc2b453f83655e8b5fdcfcff728182.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:296 -
C:\Windows\SysWOW64\Kekkiq32.exeC:\Windows\system32\Kekkiq32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\SysWOW64\Kjhcag32.exeC:\Windows\system32\Kjhcag32.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\SysWOW64\Kablnadm.exeC:\Windows\system32\Kablnadm.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Windows\SysWOW64\Kfodfh32.exeC:\Windows\system32\Kfodfh32.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\SysWOW64\Koflgf32.exeC:\Windows\system32\Koflgf32.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Windows\SysWOW64\Kpgionie.exeC:\Windows\system32\Kpgionie.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Windows\SysWOW64\Kfaalh32.exeC:\Windows\system32\Kfaalh32.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Windows\SysWOW64\Kageia32.exeC:\Windows\system32\Kageia32.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Windows\SysWOW64\Kdeaelok.exeC:\Windows\system32\Kdeaelok.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Windows\SysWOW64\Lmmfnb32.exeC:\Windows\system32\Lmmfnb32.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Windows\SysWOW64\Lplbjm32.exeC:\Windows\system32\Lplbjm32.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:264 -
C:\Windows\SysWOW64\Lbjofi32.exeC:\Windows\system32\Lbjofi32.exe13⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1252 -s 14014⤵
- Loads dropped DLL
- Program crash
PID:568
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
93KB
MD5130d419984ac47bdb9058129224c03a1
SHA19c693f6c407cca8130cb5e1487fd11f53d2c199d
SHA2567690e44a25aa1c9fcd7f20298ce9d6cde5949e8bbf1ed2447d2a5c46a8112177
SHA51248bb3d2ad9d980fd71f2cff045600f88ab45a6083b15c4e6774875a011d666ee7eb17174f7af5672ba3aa421ef44e446f2700d6aa6025bfa16ca8a060421d8f3
-
Filesize
93KB
MD5de191fd97502a5cbde0283b4fecfd3b0
SHA19abe485a428cd9f002830fd62fd71ed9fc691839
SHA2560dc06f1224affbbb1bd450d13576065ce60014750fffc6c741b80da6eb3b28d9
SHA512de5c052a2a6387de205d010e20d51a0e0527b2ea2669d83d66c64c1bf30976f46111ee2dd9e8099df245c891cfdd3b6371dc493cee1c363226e9d52fe8d2b7a0
-
Filesize
93KB
MD5057ac94b5a36132e873a107f5b09f220
SHA1d7eba6b3c4a1e19eeabe8ca60d84fcd2ff9d232c
SHA2566a14cab4f793164608b54cb7f5a36987c0bb7f7419b01a75cae48fcf1c02af47
SHA512c37303cc478170741459940a0121c61aa7174e93962de70ca2c9f1e1705c5d52be6b920af9674f397244194fe618a22a6a52cd6795b148c3ab3e771deb907468
-
Filesize
93KB
MD5eee06b8fb6830c3b441df49f94cd7bef
SHA1cfa358b3291ef9bc62fb0a807e9f4e55cf04db4e
SHA256c244b6fc6c11a84ba0bf3d6778121d53d05227798696743d7551a929d0e14dd8
SHA5128392ba1104454c61e8ce33f930288533ae26d7b66c0388f02b17ae396e494be789eb1ad8926b34d85d0412e76af8c041b89a1af0d8b85465c1e4e40f46bad140
-
Filesize
93KB
MD5cbc170a3d5635d3d315dc9100d689afc
SHA1eb9212e62403783b27848c3e785152692961ca1e
SHA25629ec66b620454e3ab68095aa46977d4ec25701a834da40b43435ee71cd38dc92
SHA5124017695b377b24cc81f9aaa913f8ab0557d4674814998b1a8d976792328f8b29ab0cbaabb1a704230d37805465c00642219f220debb121d3eb0dcbb5a557d7c0
-
Filesize
93KB
MD5b932207dc83395724a6f9aca6a597641
SHA17688cce6d5a27b1002ca46b29747a772b763de3c
SHA256c8da4e7f4176eb2f52cbdeab856de468d88eea90729e59e146b68fb4f9cd3ecf
SHA512964f19a62a47cea2db4572622d8eef6ce65c91ac48e4c2952f0379e1918101da813448e6209547614f653523f430f46b3cac22f93f960220576f7f387cde95f8
-
Filesize
93KB
MD5df4a4c4574f37a2da13890edffe7e676
SHA1c04f9d70958fa305d07925dbc951d4bf260237d9
SHA25651f67ca2aaed983aa9f3cec2b0f10d4eb34dda78bf850cdac6863826056a672e
SHA512b232b554d000a6bd07ee396c5f6acbad13d969c680c9fafe9a071108193a3f92b2b281f73bc8983a98e36fc344d4eff64dbc76e485bebabba45c0e6f693bafae
-
Filesize
93KB
MD565cdf2e0c570089dd52e8cf5abd4ab5f
SHA19ade0a1b03074eb0aadf67277ee4681c02ecbc3f
SHA25665c06238022b1f036c002e8ed152bb51f64a2557212debd92f576ca84e38a6ce
SHA512c01b3ec0fb51ea3e2c4ba76e9a7149d17a1dbce521e2f4139635d5c5894b18ed30b7d07d25e4c68f82f55ff35456bb5f405a6ff4f2471615db7afe7b8802c948
-
Filesize
93KB
MD55951f1af1bd4f7a329e381dbf28b3893
SHA14a49d038f7ccbfd8d796d60ba6e650d66119a3f6
SHA25614f4445b6081a57ecfbd13f2d9b2533f4fbbe836bdbcde759acb7df8a1fa421d
SHA512404131f5d7ddc9468bb33ae4a911b97de70a1c6c3e4d1277692837fc11ae39af3036dc01954b85cdc96c007056a9d89b2a8f50c9d7f79d7e07baec6936fc2ff3
-
Filesize
93KB
MD596cdad57660ad2af4a35c6030336099c
SHA1ade9adb79ce3390d766989a0411aa7043037edbb
SHA2561a775baa42282a49c60c00a1ea80275434bd2e635775acac6bb371964ef28917
SHA512c0aa01de1619a653e4fb17502aea77fec26c4fd0d3809ba76a8d31df4747f0c8bae5345d6bdeee104df208b54dc5cbf98af2bada5634a49e45c835f4ebad5e92
-
Filesize
93KB
MD5134f79a883f5ea5cb2aeb61895130352
SHA188712574fd41aa2feb007948236886719b84b1fa
SHA256f5369fb96a72a899ae2d298f6196d79b1e822c75930b1b7b767e92013977894d
SHA5125bcbccae39674ef3ba8372e0b20a72e69df1eeda3346089c23e78d19676ced753ed1ec8e7b1cf1f9c4def77ebec3345dea61f85b6035c99d7506ce5fd321e5b7
-
Filesize
93KB
MD55f54d8e1536306bfd0fd79b40f60e00a
SHA1a81bc06218e42fa8a03dda4c86013b9ef8043c77
SHA256e8fd832c1094fd82679d112d6b85bc89593a79cb72e901de0ce5a900113dda6f
SHA512cfc473ba4e291158076d24d3d5e83456eec61a5e3b7ecd36c4a5ce5b3abf1d056a4294fbd2a1106438e265f0716a8aaa235256a2ab174748bccddd524c9b1230