Analysis
-
max time kernel
94s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28-01-2025 00:24
Static task
static1
Behavioral task
behavioral1
Sample
835bee400620ba91c4d7479dfc5f2753039757acc981c8ce2512e80b9e94e48e.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
835bee400620ba91c4d7479dfc5f2753039757acc981c8ce2512e80b9e94e48e.exe
Resource
win10v2004-20241007-en
General
-
Target
835bee400620ba91c4d7479dfc5f2753039757acc981c8ce2512e80b9e94e48e.exe
-
Size
96KB
-
MD5
c7c8e1ce6b9ea3d5ae43a9d58e772124
-
SHA1
6896b1effa1ba57f1a8189100d00e01d2e702236
-
SHA256
835bee400620ba91c4d7479dfc5f2753039757acc981c8ce2512e80b9e94e48e
-
SHA512
e3b473dc377f7ff6056e06938e509840d94861e0cae5d6198e0df740585ce6c9f6e1bf82fe86978b1911054a2baf5d7591ec768abccd6c3f075922996e4a791d
-
SSDEEP
1536:/q7EXvMNXXoQDM1lKb22LL297RZObZUUWaegPYAS:/q7DiQZbL29ClUUWaef
Malware Config
Extracted
berbew
http://crutop.nu/index.php
http://crutop.ru/index.php
http://mazafaka.ru/index.php
http://color-bank.ru/index.php
http://asechka.ru/index.php
http://trojan.ru/index.php
http://fuck.ru/index.php
http://goldensand.ru/index.php
http://filesearch.ru/index.php
http://devx.nm.ru/index.php
http://ros-neftbank.ru/index.php
http://lovingod.host.sk/index.php
http://www.redline.ru/index.php
http://cvv.ru/index.php
http://hackers.lv/index.php
http://fethard.biz/index.php
http://ldark.nm.ru/index.htm
http://gaz-prom.ru/index.htm
http://promo.ru/index.htm
http://potleaf.chat.ru/index.htm
http://kadet.ru/index.htm
http://cvv.ru/index.htm
http://crutop.nu/index.htm
http://crutop.ru/index.htm
http://mazafaka.ru/index.htm
http://xware.cjb.net/index.htm
http://konfiskat.org/index.htm
http://parex-bank.ru/index.htm
http://kidos-bank.ru/index.htm
http://kavkaz.ru/index.htm
http://fethard.biz/index.htm
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 18 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 835bee400620ba91c4d7479dfc5f2753039757acc981c8ce2512e80b9e94e48e.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dfnjafap.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dogogcpo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dogogcpo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dfnjafap.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dfpgffpm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Deagdn32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dobfld32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Deokon32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dgbdlf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dgbdlf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" 835bee400620ba91c4d7479dfc5f2753039757acc981c8ce2512e80b9e94e48e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dobfld32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Delnin32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Delnin32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Deokon32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dfpgffpm.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Deagdn32.exe -
Berbew family
-
Executes dropped EXE 9 IoCs
pid Process 4848 Dobfld32.exe 2996 Delnin32.exe 3692 Dfnjafap.exe 1800 Deokon32.exe 4580 Dfpgffpm.exe 2868 Dogogcpo.exe 624 Deagdn32.exe 1064 Dgbdlf32.exe 1984 Dmllipeg.exe -
Drops file in System32 directory 27 IoCs
description ioc Process File created C:\Windows\SysWOW64\Dogogcpo.exe Dfpgffpm.exe File created C:\Windows\SysWOW64\Lbabpnmn.dll Dfpgffpm.exe File created C:\Windows\SysWOW64\Alcidkmm.dll 835bee400620ba91c4d7479dfc5f2753039757acc981c8ce2512e80b9e94e48e.exe File opened for modification C:\Windows\SysWOW64\Dfnjafap.exe Delnin32.exe File created C:\Windows\SysWOW64\Deokon32.exe Dfnjafap.exe File created C:\Windows\SysWOW64\Gfghpl32.dll Deagdn32.exe File opened for modification C:\Windows\SysWOW64\Dmllipeg.exe Dgbdlf32.exe File created C:\Windows\SysWOW64\Poahbe32.dll Delnin32.exe File opened for modification C:\Windows\SysWOW64\Deokon32.exe Dfnjafap.exe File created C:\Windows\SysWOW64\Kngpec32.dll Dgbdlf32.exe File created C:\Windows\SysWOW64\Delnin32.exe Dobfld32.exe File created C:\Windows\SysWOW64\Kahdohfm.dll Dogogcpo.exe File created C:\Windows\SysWOW64\Dmllipeg.exe Dgbdlf32.exe File created C:\Windows\SysWOW64\Dfpgffpm.exe Deokon32.exe File created C:\Windows\SysWOW64\Kmdjdl32.dll Deokon32.exe File opened for modification C:\Windows\SysWOW64\Dogogcpo.exe Dfpgffpm.exe File opened for modification C:\Windows\SysWOW64\Delnin32.exe Dobfld32.exe File created C:\Windows\SysWOW64\Gmcfdb32.dll Dobfld32.exe File created C:\Windows\SysWOW64\Dfnjafap.exe Delnin32.exe File opened for modification C:\Windows\SysWOW64\Dgbdlf32.exe Deagdn32.exe File created C:\Windows\SysWOW64\Dobfld32.exe 835bee400620ba91c4d7479dfc5f2753039757acc981c8ce2512e80b9e94e48e.exe File opened for modification C:\Windows\SysWOW64\Dobfld32.exe 835bee400620ba91c4d7479dfc5f2753039757acc981c8ce2512e80b9e94e48e.exe File opened for modification C:\Windows\SysWOW64\Dfpgffpm.exe Deokon32.exe File created C:\Windows\SysWOW64\Deagdn32.exe Dogogcpo.exe File opened for modification C:\Windows\SysWOW64\Deagdn32.exe Dogogcpo.exe File created C:\Windows\SysWOW64\Dgbdlf32.exe Deagdn32.exe File created C:\Windows\SysWOW64\Amfoeb32.dll Dfnjafap.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3960 1984 WerFault.exe 91 -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dfnjafap.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Deokon32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dgbdlf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 835bee400620ba91c4d7479dfc5f2753039757acc981c8ce2512e80b9e94e48e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dobfld32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Delnin32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dfpgffpm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dogogcpo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Deagdn32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dmllipeg.exe -
Modifies registry class 30 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 835bee400620ba91c4d7479dfc5f2753039757acc981c8ce2512e80b9e94e48e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dobfld32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kahdohfm.dll" Dogogcpo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dgbdlf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gmcfdb32.dll" Dobfld32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dobfld32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Poahbe32.dll" Delnin32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dgbdlf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Delnin32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Deagdn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kngpec32.dll" Dgbdlf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Amfoeb32.dll" Dfnjafap.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kmdjdl32.dll" Deokon32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Deokon32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lbabpnmn.dll" Dfpgffpm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" 835bee400620ba91c4d7479dfc5f2753039757acc981c8ce2512e80b9e94e48e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Delnin32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Deokon32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dfpgffpm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gfghpl32.dll" Deagdn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node 835bee400620ba91c4d7479dfc5f2753039757acc981c8ce2512e80b9e94e48e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Alcidkmm.dll" 835bee400620ba91c4d7479dfc5f2753039757acc981c8ce2512e80b9e94e48e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dogogcpo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID 835bee400620ba91c4d7479dfc5f2753039757acc981c8ce2512e80b9e94e48e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dfnjafap.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Deagdn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} 835bee400620ba91c4d7479dfc5f2753039757acc981c8ce2512e80b9e94e48e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dfnjafap.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dfpgffpm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dogogcpo.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 4916 wrote to memory of 4848 4916 835bee400620ba91c4d7479dfc5f2753039757acc981c8ce2512e80b9e94e48e.exe 83 PID 4916 wrote to memory of 4848 4916 835bee400620ba91c4d7479dfc5f2753039757acc981c8ce2512e80b9e94e48e.exe 83 PID 4916 wrote to memory of 4848 4916 835bee400620ba91c4d7479dfc5f2753039757acc981c8ce2512e80b9e94e48e.exe 83 PID 4848 wrote to memory of 2996 4848 Dobfld32.exe 84 PID 4848 wrote to memory of 2996 4848 Dobfld32.exe 84 PID 4848 wrote to memory of 2996 4848 Dobfld32.exe 84 PID 2996 wrote to memory of 3692 2996 Delnin32.exe 85 PID 2996 wrote to memory of 3692 2996 Delnin32.exe 85 PID 2996 wrote to memory of 3692 2996 Delnin32.exe 85 PID 3692 wrote to memory of 1800 3692 Dfnjafap.exe 86 PID 3692 wrote to memory of 1800 3692 Dfnjafap.exe 86 PID 3692 wrote to memory of 1800 3692 Dfnjafap.exe 86 PID 1800 wrote to memory of 4580 1800 Deokon32.exe 87 PID 1800 wrote to memory of 4580 1800 Deokon32.exe 87 PID 1800 wrote to memory of 4580 1800 Deokon32.exe 87 PID 4580 wrote to memory of 2868 4580 Dfpgffpm.exe 88 PID 4580 wrote to memory of 2868 4580 Dfpgffpm.exe 88 PID 4580 wrote to memory of 2868 4580 Dfpgffpm.exe 88 PID 2868 wrote to memory of 624 2868 Dogogcpo.exe 89 PID 2868 wrote to memory of 624 2868 Dogogcpo.exe 89 PID 2868 wrote to memory of 624 2868 Dogogcpo.exe 89 PID 624 wrote to memory of 1064 624 Deagdn32.exe 90 PID 624 wrote to memory of 1064 624 Deagdn32.exe 90 PID 624 wrote to memory of 1064 624 Deagdn32.exe 90 PID 1064 wrote to memory of 1984 1064 Dgbdlf32.exe 91 PID 1064 wrote to memory of 1984 1064 Dgbdlf32.exe 91 PID 1064 wrote to memory of 1984 1064 Dgbdlf32.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\835bee400620ba91c4d7479dfc5f2753039757acc981c8ce2512e80b9e94e48e.exe"C:\Users\Admin\AppData\Local\Temp\835bee400620ba91c4d7479dfc5f2753039757acc981c8ce2512e80b9e94e48e.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4916 -
C:\Windows\SysWOW64\Dobfld32.exeC:\Windows\system32\Dobfld32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Windows\SysWOW64\Delnin32.exeC:\Windows\system32\Delnin32.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Windows\SysWOW64\Dfnjafap.exeC:\Windows\system32\Dfnjafap.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3692 -
C:\Windows\SysWOW64\Deokon32.exeC:\Windows\system32\Deokon32.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Windows\SysWOW64\Dfpgffpm.exeC:\Windows\system32\Dfpgffpm.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4580 -
C:\Windows\SysWOW64\Dogogcpo.exeC:\Windows\system32\Dogogcpo.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Windows\SysWOW64\Deagdn32.exeC:\Windows\system32\Deagdn32.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:624 -
C:\Windows\SysWOW64\Dgbdlf32.exeC:\Windows\system32\Dgbdlf32.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Windows\SysWOW64\Dmllipeg.exeC:\Windows\system32\Dmllipeg.exe10⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1984 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1984 -s 39611⤵
- Program crash
PID:3960
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 1984 -ip 19841⤵PID:4340
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD54859b136c7c0966cc45fcccf4e71de1d
SHA1b485c804bdec2bea38ed8552125c8b006faf4a2e
SHA2568f2274d8835e05a1e960a354cd8bdc7f606a9b770f44fd7f7948e7913862f5f4
SHA512bc620d730fff559cbff642eb90aa6ecad565347971f24c46bad98910722bf7baaae46acea88357bf12d2f5e14e694fbcf82bac7eefeea11458e816a112873989
-
Filesize
96KB
MD52170f2e4fcaac35c01f30b61ceb6aa19
SHA1f8679d01999adb318a99f76e1532aa0799e2660f
SHA2567f5354562294f680a4c718057f650d019ee35eef53bc372c03ea3b05e081d17d
SHA512ffb90833884cbab3d54ada79a3ba58558e694669a6a2f2ab6a0429601572af91533b10672129cb35b5d42076f38db05a30901cb5e2d58e1456b1f306042e2a19
-
Filesize
96KB
MD5e9cdf7aefeb92e6f2c2f8bf572581654
SHA152a6fad7336b13a6b576a7787d8c4950d6ddb949
SHA256b3ebb60f4eedaa0f9edf5f4a6cf4b3dc46b3ea42ee3917a7113d3744b893f6dc
SHA5128462052eab0a5819e39d3c5126931099751292378324f83ba56d55f249858f512365fa62eee3a8c46a5b7d9c219e842898d27769beb370fff6568646cbaaa11a
-
Filesize
96KB
MD5a67d0ef72c3572d9c5145e0d809a40b2
SHA17ff2f98c408d777ed16b6c9218a28f1d045d6956
SHA256365bf4963440512681604e188719f468c27838bbdf46d6da4c24592cf861db0b
SHA5123c85fc0b5a62345c9167bf234d88a9f5d9ef6ecd555683ed7e0d0e1b8375d201644d5717db0c36f58b8704e6ede38df28db64edbb2fbae428733a824bc2111ff
-
Filesize
96KB
MD5978cc286727f524bea8569a1cf5a1b00
SHA18512b07decc331cb7eefa298fdad9d41b6bcd917
SHA2563a2795fdca6db8cf8243f66a5b10482afef6da336d095368dd75de754d7dd82b
SHA512731c85e7c9427795739cbf1b21ba0d7264319a09172e9fe68136986beee405841a6c486bf3454176d8868efa8f43d6deeaecc55f9dc727d8c6428936ee0e3d85
-
Filesize
96KB
MD596f31e81119c4c058b44111406be8b96
SHA109577668e3f33e25d40f1d147196fe4fb87055d4
SHA2561ed8295025e5676fcebe0bb92ebc227f06c7aa2bd7af8f6db3e260293a73febd
SHA512923ec98d5ba5b65e2c30fc2a8ac9b57353401ef87d137057a5c0f6baa743e836e6e68e378b22091db8e340c72630efe0f4a0b1070cb0eb2150ad22b58de112e9
-
Filesize
96KB
MD54cf1b3ade683e0e53f97848de355d43c
SHA13a7408d093a170a7c814a5b4b933bffe9f455576
SHA2560213676c5256935bd3fff9418fca1d41b1fd2d13498866f3f908776765fee877
SHA512a00caaad75d4c7e507de5d09190cd4d7a31ab920d370d2ae7ed287cf864ae870dce3b869a5ad210c8f66d97b875a408438b96451fb3730d27711aada52713283
-
Filesize
96KB
MD5bd681665d45d44d442b051c7de3b57ca
SHA153cc1e4d894dc269a4a733de742cbf0389d267e8
SHA256b189b7169fac7f10a3443ca17f365cfd6cbba02b8378cece5fa5ff65acc517fb
SHA5126c4740e9cc3bb699296e4bcf14fb33af49b5411f4a822ae942ea8779c6fb6368150fc0568a374383064955a0299bd0d94f48cb2727d396fbdf3352613e09b932
-
Filesize
96KB
MD5b39080ca54b918bcf210a70dad571a84
SHA1f08aefb482fb1569b75dd85c541da0be7639019b
SHA256ec55b02f86d18754529795d704675980cf5e3315430db8597b233b9abedd5a0a
SHA512af65f23f338885bbda32c0722fcb3c6dc34e588a396fc58a14b80a5fe0687e7435317b55530b57ec28e0ca46aabe4c4723eb6bad2792b688c2f91cc11c5d7e66