Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
177s -
max time network
182s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
21/10/2022, 04:48
Static task
static1
Behavioral task
behavioral1
Sample
a4c18f72f80949c26e154dce20c5acd9891fc1c89891060c69486ceadd1a75b9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a4c18f72f80949c26e154dce20c5acd9891fc1c89891060c69486ceadd1a75b9.exe
Resource
win10v2004-20220812-en
General
-
Target
a4c18f72f80949c26e154dce20c5acd9891fc1c89891060c69486ceadd1a75b9.exe
-
Size
484KB
-
MD5
656edb8f3d3b124a7c28a70b39d67179
-
SHA1
b8382b930a3be717d2c371e4c0c00e2bf6f08c01
-
SHA256
a4c18f72f80949c26e154dce20c5acd9891fc1c89891060c69486ceadd1a75b9
-
SHA512
6b6f22d2adb9733453dc032a614d44fcaa2fd9d567b57d686ce90fe6f78a733e2276df38683bd5ee14ac6ab6dd98309cafd7bb5dde838674e181d6d1e8b8be26
-
SSDEEP
12288:RoUld/f2I9JECdYW4/e4Pii15XZSAmKjlafbdDNUQ:h92ILECd0R15XZS3QafpDNUQ
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" LB9c4j3K.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" giexoub.exe -
Executes dropped EXE 7 IoCs
pid Process 4860 LB9c4j3K.exe 4760 aahost.exe 1860 aahost.exe 2308 giexoub.exe 1508 bshost.exe 3100 dyhost.exe 3952 ekhost.exe -
resource yara_rule behavioral2/memory/1860-145-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral2/memory/1860-148-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral2/memory/1860-149-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral2/memory/1860-150-0x0000000000400000-0x000000000040E000-memory.dmp upx -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation a4c18f72f80949c26e154dce20c5acd9891fc1c89891060c69486ceadd1a75b9.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation ekhost.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation LB9c4j3K.exe -
Adds Run key to start application 2 TTPs 53 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\giexoub = "C:\\Users\\Admin\\giexoub.exe /M" giexoub.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\giexoub = "C:\\Users\\Admin\\giexoub.exe /e" giexoub.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\giexoub = "C:\\Users\\Admin\\giexoub.exe /S" giexoub.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\giexoub = "C:\\Users\\Admin\\giexoub.exe /R" giexoub.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\giexoub = "C:\\Users\\Admin\\giexoub.exe /j" giexoub.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\giexoub = "C:\\Users\\Admin\\giexoub.exe /r" giexoub.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\giexoub = "C:\\Users\\Admin\\giexoub.exe /D" giexoub.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\giexoub = "C:\\Users\\Admin\\giexoub.exe /O" giexoub.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\giexoub = "C:\\Users\\Admin\\giexoub.exe /m" giexoub.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\giexoub = "C:\\Users\\Admin\\giexoub.exe /B" giexoub.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\giexoub = "C:\\Users\\Admin\\giexoub.exe /c" giexoub.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\giexoub = "C:\\Users\\Admin\\giexoub.exe /J" giexoub.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\giexoub = "C:\\Users\\Admin\\giexoub.exe /A" giexoub.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\giexoub = "C:\\Users\\Admin\\giexoub.exe /U" giexoub.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\giexoub = "C:\\Users\\Admin\\giexoub.exe /N" giexoub.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\giexoub = "C:\\Users\\Admin\\giexoub.exe /T" giexoub.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\giexoub = "C:\\Users\\Admin\\giexoub.exe /q" giexoub.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\giexoub = "C:\\Users\\Admin\\giexoub.exe /I" LB9c4j3K.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\giexoub = "C:\\Users\\Admin\\giexoub.exe /X" giexoub.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\giexoub = "C:\\Users\\Admin\\giexoub.exe /n" giexoub.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\giexoub = "C:\\Users\\Admin\\giexoub.exe /Z" giexoub.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\giexoub = "C:\\Users\\Admin\\giexoub.exe /K" giexoub.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\giexoub = "C:\\Users\\Admin\\giexoub.exe /d" giexoub.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\giexoub = "C:\\Users\\Admin\\giexoub.exe /s" giexoub.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\giexoub = "C:\\Users\\Admin\\giexoub.exe /H" giexoub.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\giexoub = "C:\\Users\\Admin\\giexoub.exe /f" giexoub.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\giexoub = "C:\\Users\\Admin\\giexoub.exe /V" giexoub.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\giexoub = "C:\\Users\\Admin\\giexoub.exe /x" giexoub.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\giexoub = "C:\\Users\\Admin\\giexoub.exe /Y" giexoub.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\giexoub = "C:\\Users\\Admin\\giexoub.exe /W" giexoub.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\giexoub = "C:\\Users\\Admin\\giexoub.exe /g" giexoub.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\giexoub = "C:\\Users\\Admin\\giexoub.exe /v" giexoub.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\giexoub = "C:\\Users\\Admin\\giexoub.exe /P" giexoub.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\giexoub = "C:\\Users\\Admin\\giexoub.exe /l" giexoub.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\giexoub = "C:\\Users\\Admin\\giexoub.exe /t" giexoub.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\giexoub = "C:\\Users\\Admin\\giexoub.exe /z" giexoub.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\giexoub = "C:\\Users\\Admin\\giexoub.exe /h" giexoub.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\giexoub = "C:\\Users\\Admin\\giexoub.exe /o" giexoub.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\giexoub = "C:\\Users\\Admin\\giexoub.exe /p" giexoub.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\giexoub = "C:\\Users\\Admin\\giexoub.exe /L" giexoub.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\giexoub = "C:\\Users\\Admin\\giexoub.exe /b" giexoub.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run\ LB9c4j3K.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\giexoub = "C:\\Users\\Admin\\giexoub.exe /C" giexoub.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\giexoub = "C:\\Users\\Admin\\giexoub.exe /a" giexoub.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run\ giexoub.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\giexoub = "C:\\Users\\Admin\\giexoub.exe /Q" giexoub.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\giexoub = "C:\\Users\\Admin\\giexoub.exe /u" giexoub.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\giexoub = "C:\\Users\\Admin\\giexoub.exe /F" giexoub.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\giexoub = "C:\\Users\\Admin\\giexoub.exe /i" giexoub.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\giexoub = "C:\\Users\\Admin\\giexoub.exe /w" giexoub.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\giexoub = "C:\\Users\\Admin\\giexoub.exe /y" giexoub.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\giexoub = "C:\\Users\\Admin\\giexoub.exe /E" giexoub.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\giexoub = "C:\\Users\\Admin\\giexoub.exe /G" giexoub.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4760 set thread context of 1860 4760 aahost.exe 85 PID 1508 set thread context of 688 1508 bshost.exe 91 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates processes with tasklist 1 TTPs 3 IoCs
pid Process 2552 tasklist.exe 1424 tasklist.exe 3932 tasklist.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4860 LB9c4j3K.exe 4860 LB9c4j3K.exe 1860 aahost.exe 1860 aahost.exe 4860 LB9c4j3K.exe 4860 LB9c4j3K.exe 2308 giexoub.exe 2308 giexoub.exe 2308 giexoub.exe 2308 giexoub.exe 1860 aahost.exe 1860 aahost.exe 2308 giexoub.exe 2308 giexoub.exe 2308 giexoub.exe 2308 giexoub.exe 2308 giexoub.exe 2308 giexoub.exe 1860 aahost.exe 1860 aahost.exe 2308 giexoub.exe 2308 giexoub.exe 1860 aahost.exe 1860 aahost.exe 1860 aahost.exe 1860 aahost.exe 2308 giexoub.exe 2308 giexoub.exe 2308 giexoub.exe 2308 giexoub.exe 2308 giexoub.exe 2308 giexoub.exe 1860 aahost.exe 1860 aahost.exe 2308 giexoub.exe 2308 giexoub.exe 1860 aahost.exe 1860 aahost.exe 2308 giexoub.exe 2308 giexoub.exe 1860 aahost.exe 1860 aahost.exe 2308 giexoub.exe 2308 giexoub.exe 2308 giexoub.exe 2308 giexoub.exe 1860 aahost.exe 1860 aahost.exe 2308 giexoub.exe 2308 giexoub.exe 1860 aahost.exe 1860 aahost.exe 1860 aahost.exe 1860 aahost.exe 2308 giexoub.exe 2308 giexoub.exe 1860 aahost.exe 1860 aahost.exe 1860 aahost.exe 1860 aahost.exe 2308 giexoub.exe 2308 giexoub.exe 2308 giexoub.exe 2308 giexoub.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1424 tasklist.exe Token: SeDebugPrivilege 1508 bshost.exe Token: SeDebugPrivilege 3932 tasklist.exe Token: SeDebugPrivilege 2552 tasklist.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 532 a4c18f72f80949c26e154dce20c5acd9891fc1c89891060c69486ceadd1a75b9.exe 4860 LB9c4j3K.exe 4760 aahost.exe 2308 giexoub.exe 3100 dyhost.exe 3952 ekhost.exe -
Suspicious use of WriteProcessMemory 50 IoCs
description pid Process procid_target PID 532 wrote to memory of 4860 532 a4c18f72f80949c26e154dce20c5acd9891fc1c89891060c69486ceadd1a75b9.exe 83 PID 532 wrote to memory of 4860 532 a4c18f72f80949c26e154dce20c5acd9891fc1c89891060c69486ceadd1a75b9.exe 83 PID 532 wrote to memory of 4860 532 a4c18f72f80949c26e154dce20c5acd9891fc1c89891060c69486ceadd1a75b9.exe 83 PID 532 wrote to memory of 4760 532 a4c18f72f80949c26e154dce20c5acd9891fc1c89891060c69486ceadd1a75b9.exe 84 PID 532 wrote to memory of 4760 532 a4c18f72f80949c26e154dce20c5acd9891fc1c89891060c69486ceadd1a75b9.exe 84 PID 532 wrote to memory of 4760 532 a4c18f72f80949c26e154dce20c5acd9891fc1c89891060c69486ceadd1a75b9.exe 84 PID 4760 wrote to memory of 1860 4760 aahost.exe 85 PID 4760 wrote to memory of 1860 4760 aahost.exe 85 PID 4760 wrote to memory of 1860 4760 aahost.exe 85 PID 4760 wrote to memory of 1860 4760 aahost.exe 85 PID 4760 wrote to memory of 1860 4760 aahost.exe 85 PID 4760 wrote to memory of 1860 4760 aahost.exe 85 PID 4760 wrote to memory of 1860 4760 aahost.exe 85 PID 4760 wrote to memory of 1860 4760 aahost.exe 85 PID 4860 wrote to memory of 2308 4860 LB9c4j3K.exe 86 PID 4860 wrote to memory of 2308 4860 LB9c4j3K.exe 86 PID 4860 wrote to memory of 2308 4860 LB9c4j3K.exe 86 PID 4860 wrote to memory of 4828 4860 LB9c4j3K.exe 87 PID 4860 wrote to memory of 4828 4860 LB9c4j3K.exe 87 PID 4860 wrote to memory of 4828 4860 LB9c4j3K.exe 87 PID 4828 wrote to memory of 1424 4828 cmd.exe 89 PID 4828 wrote to memory of 1424 4828 cmd.exe 89 PID 4828 wrote to memory of 1424 4828 cmd.exe 89 PID 532 wrote to memory of 1508 532 a4c18f72f80949c26e154dce20c5acd9891fc1c89891060c69486ceadd1a75b9.exe 90 PID 532 wrote to memory of 1508 532 a4c18f72f80949c26e154dce20c5acd9891fc1c89891060c69486ceadd1a75b9.exe 90 PID 532 wrote to memory of 1508 532 a4c18f72f80949c26e154dce20c5acd9891fc1c89891060c69486ceadd1a75b9.exe 90 PID 1508 wrote to memory of 688 1508 bshost.exe 91 PID 1508 wrote to memory of 688 1508 bshost.exe 91 PID 1508 wrote to memory of 688 1508 bshost.exe 91 PID 1508 wrote to memory of 688 1508 bshost.exe 91 PID 532 wrote to memory of 3100 532 a4c18f72f80949c26e154dce20c5acd9891fc1c89891060c69486ceadd1a75b9.exe 93 PID 532 wrote to memory of 3100 532 a4c18f72f80949c26e154dce20c5acd9891fc1c89891060c69486ceadd1a75b9.exe 93 PID 532 wrote to memory of 3100 532 a4c18f72f80949c26e154dce20c5acd9891fc1c89891060c69486ceadd1a75b9.exe 93 PID 532 wrote to memory of 3952 532 a4c18f72f80949c26e154dce20c5acd9891fc1c89891060c69486ceadd1a75b9.exe 96 PID 532 wrote to memory of 3952 532 a4c18f72f80949c26e154dce20c5acd9891fc1c89891060c69486ceadd1a75b9.exe 96 PID 532 wrote to memory of 3952 532 a4c18f72f80949c26e154dce20c5acd9891fc1c89891060c69486ceadd1a75b9.exe 96 PID 532 wrote to memory of 2044 532 a4c18f72f80949c26e154dce20c5acd9891fc1c89891060c69486ceadd1a75b9.exe 98 PID 532 wrote to memory of 2044 532 a4c18f72f80949c26e154dce20c5acd9891fc1c89891060c69486ceadd1a75b9.exe 98 PID 532 wrote to memory of 2044 532 a4c18f72f80949c26e154dce20c5acd9891fc1c89891060c69486ceadd1a75b9.exe 98 PID 2044 wrote to memory of 3932 2044 cmd.exe 100 PID 2044 wrote to memory of 3932 2044 cmd.exe 100 PID 2044 wrote to memory of 3932 2044 cmd.exe 100 PID 2308 wrote to memory of 3932 2308 giexoub.exe 100 PID 2308 wrote to memory of 3932 2308 giexoub.exe 100 PID 3952 wrote to memory of 4636 3952 ekhost.exe 103 PID 3952 wrote to memory of 4636 3952 ekhost.exe 103 PID 3952 wrote to memory of 4636 3952 ekhost.exe 103 PID 4636 wrote to memory of 2552 4636 cmd.exe 104 PID 4636 wrote to memory of 2552 4636 cmd.exe 104 PID 4636 wrote to memory of 2552 4636 cmd.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\a4c18f72f80949c26e154dce20c5acd9891fc1c89891060c69486ceadd1a75b9.exe"C:\Users\Admin\AppData\Local\Temp\a4c18f72f80949c26e154dce20c5acd9891fc1c89891060c69486ceadd1a75b9.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:532 -
C:\Users\Admin\LB9c4j3K.exeC:\Users\Admin\LB9c4j3K.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4860 -
C:\Users\Admin\giexoub.exe"C:\Users\Admin\giexoub.exe"3⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2308
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del LB9c4j3K.exe3⤵
- Suspicious use of WriteProcessMemory
PID:4828 -
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1424
-
-
-
-
C:\Users\Admin\aahost.exeC:\Users\Admin\aahost.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4760 -
C:\Users\Admin\aahost.exe"C:\Users\Admin\aahost.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1860
-
-
-
C:\Users\Admin\bshost.exeC:\Users\Admin\bshost.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"3⤵PID:688
-
-
-
C:\Users\Admin\dyhost.exeC:\Users\Admin\dyhost.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3100
-
-
C:\Users\Admin\ekhost.exeC:\Users\Admin\ekhost.exe2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3952 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del ekhost.exe3⤵
- Suspicious use of WriteProcessMemory
PID:4636 -
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2552
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del a4c18f72f80949c26e154dce20c5acd9891fc1c89891060c69486ceadd1a75b9.exe2⤵
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:3932
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212KB
MD5fa0eb2a8b561ea9afc6a51709ff0d7de
SHA14ef5265f5b5bb1a4857e7668f132405c799da155
SHA25699ecfb1bb7cdb1e8dd609e60b10d5346b90284172c854b6234631212dd501c4f
SHA5120e8b194cb0e65429b84ac32a0fa131d072f7f425804df192d7a90a7ec6eb7ce9991716ce5a9ca3bcd106181076832d5fa7d6f9cbe67fc80a427ef7980beb75c6
-
Filesize
212KB
MD5fa0eb2a8b561ea9afc6a51709ff0d7de
SHA14ef5265f5b5bb1a4857e7668f132405c799da155
SHA25699ecfb1bb7cdb1e8dd609e60b10d5346b90284172c854b6234631212dd501c4f
SHA5120e8b194cb0e65429b84ac32a0fa131d072f7f425804df192d7a90a7ec6eb7ce9991716ce5a9ca3bcd106181076832d5fa7d6f9cbe67fc80a427ef7980beb75c6
-
Filesize
140KB
MD593ea44e078cb0477614729636866a84b
SHA1f9752413d48fd98a77cfce8fff04a7a0d72c26d8
SHA256c16c3df8b6b4187e04a6abb49a15eb02ccefdce86068960ab3afeb088bf4ba27
SHA512351bafb9dc5395a9cd1393b76cba405312a5d85a59e5b1c0e891c2de1343b2bc2765a40077e4155fbd9a5578db3be66ace35e27ff02cb32f813ba01db4fc1113
-
Filesize
140KB
MD593ea44e078cb0477614729636866a84b
SHA1f9752413d48fd98a77cfce8fff04a7a0d72c26d8
SHA256c16c3df8b6b4187e04a6abb49a15eb02ccefdce86068960ab3afeb088bf4ba27
SHA512351bafb9dc5395a9cd1393b76cba405312a5d85a59e5b1c0e891c2de1343b2bc2765a40077e4155fbd9a5578db3be66ace35e27ff02cb32f813ba01db4fc1113
-
Filesize
140KB
MD593ea44e078cb0477614729636866a84b
SHA1f9752413d48fd98a77cfce8fff04a7a0d72c26d8
SHA256c16c3df8b6b4187e04a6abb49a15eb02ccefdce86068960ab3afeb088bf4ba27
SHA512351bafb9dc5395a9cd1393b76cba405312a5d85a59e5b1c0e891c2de1343b2bc2765a40077e4155fbd9a5578db3be66ace35e27ff02cb32f813ba01db4fc1113
-
Filesize
260KB
MD5bbc0a2fe1284778896b57ffc5701aefa
SHA16b9a0106b82c63265936ce728a858d258c8f6b14
SHA25692fad55bc5c7438d0f36501581b4b958efba2fbe5db02b97093a79b8a19645a0
SHA5128a17a1ed99a99a270191684b0337836531934b8717e78481815fd18767a172e6d7cf89488926dd2ea1b9e9ccaf53afd29c6925beaeb2fa7fa918be0e416be930
-
Filesize
260KB
MD5bbc0a2fe1284778896b57ffc5701aefa
SHA16b9a0106b82c63265936ce728a858d258c8f6b14
SHA25692fad55bc5c7438d0f36501581b4b958efba2fbe5db02b97093a79b8a19645a0
SHA5128a17a1ed99a99a270191684b0337836531934b8717e78481815fd18767a172e6d7cf89488926dd2ea1b9e9ccaf53afd29c6925beaeb2fa7fa918be0e416be930
-
Filesize
48KB
MD5d46eb4bf816ed9978636de7955245323
SHA1c474df60a83302e0d010d11dcebd7cdb3cc22866
SHA2562ae9b936feeade89c9074c379efedd21d15a1cf247207afe5381f437e41ca4bd
SHA512e46a604a96345b1b6800cb22c8c870dfa62dbdd8bd5b6ff43ddce9b080d1af180db498dad23561c0116b4dadbc44617b26840e67bc0afde01439e4c70632d7ef
-
Filesize
48KB
MD5d46eb4bf816ed9978636de7955245323
SHA1c474df60a83302e0d010d11dcebd7cdb3cc22866
SHA2562ae9b936feeade89c9074c379efedd21d15a1cf247207afe5381f437e41ca4bd
SHA512e46a604a96345b1b6800cb22c8c870dfa62dbdd8bd5b6ff43ddce9b080d1af180db498dad23561c0116b4dadbc44617b26840e67bc0afde01439e4c70632d7ef
-
Filesize
24KB
MD59fe0e5252dc24fc1788b0d8b26026807
SHA121e3063a0fac1157b9707861048c5f7fbd070ceb
SHA2569c99c968d969c2d5c1570c6066957d726bc19ffe9e0562242ce1bf79514c1b40
SHA512613f5c821dfcef8124ecb7c9b118cda14be4d72a26f1a21ffde81c4d8aae4f315740d66c298e5963b0647f0ecd9e2d63d9bbb8df4e0c731019896e7ac0391d5c
-
Filesize
24KB
MD59fe0e5252dc24fc1788b0d8b26026807
SHA121e3063a0fac1157b9707861048c5f7fbd070ceb
SHA2569c99c968d969c2d5c1570c6066957d726bc19ffe9e0562242ce1bf79514c1b40
SHA512613f5c821dfcef8124ecb7c9b118cda14be4d72a26f1a21ffde81c4d8aae4f315740d66c298e5963b0647f0ecd9e2d63d9bbb8df4e0c731019896e7ac0391d5c
-
Filesize
212KB
MD52d3b024b3c3000239efa0f61fe687158
SHA186b43c3d2e42097356bf52922e9ade2204838e42
SHA2566bb1138d6ead3d9d56b3f71982c3a6e8c5fecde56c2a430ec68f35c62bb8ffec
SHA512a7cd22da9580a51e99bb3e2e2e69f257b55bb156cce069187d3d28d81690381f23a0e6ca07d6619b7ada7f5b089917aa172b7b795d76ae24d2952f6d6999688d
-
Filesize
212KB
MD52d3b024b3c3000239efa0f61fe687158
SHA186b43c3d2e42097356bf52922e9ade2204838e42
SHA2566bb1138d6ead3d9d56b3f71982c3a6e8c5fecde56c2a430ec68f35c62bb8ffec
SHA512a7cd22da9580a51e99bb3e2e2e69f257b55bb156cce069187d3d28d81690381f23a0e6ca07d6619b7ada7f5b089917aa172b7b795d76ae24d2952f6d6999688d