Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 15:54
Static task
static1
Behavioral task
behavioral1
Sample
ad87332405e7a2464c6f664f4b1ef4830a8bfa3083a1f3267aec82acbc978785.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ad87332405e7a2464c6f664f4b1ef4830a8bfa3083a1f3267aec82acbc978785.exe
Resource
win10v2004-20220901-en
General
-
Target
ad87332405e7a2464c6f664f4b1ef4830a8bfa3083a1f3267aec82acbc978785.exe
-
Size
248KB
-
MD5
444d47ed94e03a1c113693f4744f1535
-
SHA1
9d177c60003dec53e914820ccbda24a39299c882
-
SHA256
ad87332405e7a2464c6f664f4b1ef4830a8bfa3083a1f3267aec82acbc978785
-
SHA512
b1f1b4387d5deeef65162ea6a9becf24be7c9313419621ec74b8302107f1bafeb1c42d624d97c36948ce8da4d07dc996e3ecaead3434e727e23e6730ad54bcb1
-
SSDEEP
3072:8KS3nulFtcOVH7L0+/RBRgll5lb5zG5L+fk:8DnuhTNGl5Hh8
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
haeiqen.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" haeiqen.exe -
Executes dropped EXE 1 IoCs
Processes:
haeiqen.exepid process 440 haeiqen.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ad87332405e7a2464c6f664f4b1ef4830a8bfa3083a1f3267aec82acbc978785.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation ad87332405e7a2464c6f664f4b1ef4830a8bfa3083a1f3267aec82acbc978785.exe -
Adds Run key to start application 2 TTPs 53 IoCs
Processes:
haeiqen.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haeiqen = "C:\\Users\\Admin\\haeiqen.exe /s" haeiqen.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haeiqen = "C:\\Users\\Admin\\haeiqen.exe /H" haeiqen.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haeiqen = "C:\\Users\\Admin\\haeiqen.exe /d" haeiqen.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haeiqen = "C:\\Users\\Admin\\haeiqen.exe /N" haeiqen.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haeiqen = "C:\\Users\\Admin\\haeiqen.exe /C" haeiqen.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haeiqen = "C:\\Users\\Admin\\haeiqen.exe /Q" haeiqen.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haeiqen = "C:\\Users\\Admin\\haeiqen.exe /n" haeiqen.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haeiqen = "C:\\Users\\Admin\\haeiqen.exe /R" haeiqen.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haeiqen = "C:\\Users\\Admin\\haeiqen.exe /Z" haeiqen.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haeiqen = "C:\\Users\\Admin\\haeiqen.exe /B" haeiqen.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haeiqen = "C:\\Users\\Admin\\haeiqen.exe /J" haeiqen.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haeiqen = "C:\\Users\\Admin\\haeiqen.exe /L" haeiqen.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haeiqen = "C:\\Users\\Admin\\haeiqen.exe /r" haeiqen.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haeiqen = "C:\\Users\\Admin\\haeiqen.exe /e" haeiqen.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haeiqen = "C:\\Users\\Admin\\haeiqen.exe /q" haeiqen.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haeiqen = "C:\\Users\\Admin\\haeiqen.exe /v" haeiqen.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haeiqen = "C:\\Users\\Admin\\haeiqen.exe /G" haeiqen.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haeiqen = "C:\\Users\\Admin\\haeiqen.exe /l" haeiqen.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haeiqen = "C:\\Users\\Admin\\haeiqen.exe /x" haeiqen.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haeiqen = "C:\\Users\\Admin\\haeiqen.exe /S" haeiqen.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haeiqen = "C:\\Users\\Admin\\haeiqen.exe /U" haeiqen.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haeiqen = "C:\\Users\\Admin\\haeiqen.exe /A" haeiqen.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haeiqen = "C:\\Users\\Admin\\haeiqen.exe /m" haeiqen.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haeiqen = "C:\\Users\\Admin\\haeiqen.exe /u" haeiqen.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haeiqen = "C:\\Users\\Admin\\haeiqen.exe /t" haeiqen.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haeiqen = "C:\\Users\\Admin\\haeiqen.exe /D" haeiqen.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haeiqen = "C:\\Users\\Admin\\haeiqen.exe /z" haeiqen.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haeiqen = "C:\\Users\\Admin\\haeiqen.exe /i" haeiqen.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haeiqen = "C:\\Users\\Admin\\haeiqen.exe /j" haeiqen.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haeiqen = "C:\\Users\\Admin\\haeiqen.exe /K" haeiqen.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haeiqen = "C:\\Users\\Admin\\haeiqen.exe /y" haeiqen.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haeiqen = "C:\\Users\\Admin\\haeiqen.exe /M" haeiqen.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haeiqen = "C:\\Users\\Admin\\haeiqen.exe /f" haeiqen.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haeiqen = "C:\\Users\\Admin\\haeiqen.exe /F" haeiqen.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haeiqen = "C:\\Users\\Admin\\haeiqen.exe /E" haeiqen.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haeiqen = "C:\\Users\\Admin\\haeiqen.exe /c" haeiqen.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haeiqen = "C:\\Users\\Admin\\haeiqen.exe /V" haeiqen.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haeiqen = "C:\\Users\\Admin\\haeiqen.exe /P" haeiqen.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haeiqen = "C:\\Users\\Admin\\haeiqen.exe /a" haeiqen.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haeiqen = "C:\\Users\\Admin\\haeiqen.exe /W" haeiqen.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haeiqen = "C:\\Users\\Admin\\haeiqen.exe /T" haeiqen.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haeiqen = "C:\\Users\\Admin\\haeiqen.exe /O" haeiqen.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haeiqen = "C:\\Users\\Admin\\haeiqen.exe /X" haeiqen.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haeiqen = "C:\\Users\\Admin\\haeiqen.exe /h" haeiqen.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run\ haeiqen.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haeiqen = "C:\\Users\\Admin\\haeiqen.exe /o" haeiqen.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haeiqen = "C:\\Users\\Admin\\haeiqen.exe /k" haeiqen.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haeiqen = "C:\\Users\\Admin\\haeiqen.exe /Y" haeiqen.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haeiqen = "C:\\Users\\Admin\\haeiqen.exe /w" haeiqen.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haeiqen = "C:\\Users\\Admin\\haeiqen.exe /b" haeiqen.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haeiqen = "C:\\Users\\Admin\\haeiqen.exe /g" haeiqen.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haeiqen = "C:\\Users\\Admin\\haeiqen.exe /I" haeiqen.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haeiqen = "C:\\Users\\Admin\\haeiqen.exe /p" haeiqen.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
haeiqen.exepid process 440 haeiqen.exe 440 haeiqen.exe 440 haeiqen.exe 440 haeiqen.exe 440 haeiqen.exe 440 haeiqen.exe 440 haeiqen.exe 440 haeiqen.exe 440 haeiqen.exe 440 haeiqen.exe 440 haeiqen.exe 440 haeiqen.exe 440 haeiqen.exe 440 haeiqen.exe 440 haeiqen.exe 440 haeiqen.exe 440 haeiqen.exe 440 haeiqen.exe 440 haeiqen.exe 440 haeiqen.exe 440 haeiqen.exe 440 haeiqen.exe 440 haeiqen.exe 440 haeiqen.exe 440 haeiqen.exe 440 haeiqen.exe 440 haeiqen.exe 440 haeiqen.exe 440 haeiqen.exe 440 haeiqen.exe 440 haeiqen.exe 440 haeiqen.exe 440 haeiqen.exe 440 haeiqen.exe 440 haeiqen.exe 440 haeiqen.exe 440 haeiqen.exe 440 haeiqen.exe 440 haeiqen.exe 440 haeiqen.exe 440 haeiqen.exe 440 haeiqen.exe 440 haeiqen.exe 440 haeiqen.exe 440 haeiqen.exe 440 haeiqen.exe 440 haeiqen.exe 440 haeiqen.exe 440 haeiqen.exe 440 haeiqen.exe 440 haeiqen.exe 440 haeiqen.exe 440 haeiqen.exe 440 haeiqen.exe 440 haeiqen.exe 440 haeiqen.exe 440 haeiqen.exe 440 haeiqen.exe 440 haeiqen.exe 440 haeiqen.exe 440 haeiqen.exe 440 haeiqen.exe 440 haeiqen.exe 440 haeiqen.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
ad87332405e7a2464c6f664f4b1ef4830a8bfa3083a1f3267aec82acbc978785.exehaeiqen.exepid process 4572 ad87332405e7a2464c6f664f4b1ef4830a8bfa3083a1f3267aec82acbc978785.exe 440 haeiqen.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
ad87332405e7a2464c6f664f4b1ef4830a8bfa3083a1f3267aec82acbc978785.exehaeiqen.exedescription pid process target process PID 4572 wrote to memory of 440 4572 ad87332405e7a2464c6f664f4b1ef4830a8bfa3083a1f3267aec82acbc978785.exe haeiqen.exe PID 4572 wrote to memory of 440 4572 ad87332405e7a2464c6f664f4b1ef4830a8bfa3083a1f3267aec82acbc978785.exe haeiqen.exe PID 4572 wrote to memory of 440 4572 ad87332405e7a2464c6f664f4b1ef4830a8bfa3083a1f3267aec82acbc978785.exe haeiqen.exe PID 440 wrote to memory of 4572 440 haeiqen.exe ad87332405e7a2464c6f664f4b1ef4830a8bfa3083a1f3267aec82acbc978785.exe PID 440 wrote to memory of 4572 440 haeiqen.exe ad87332405e7a2464c6f664f4b1ef4830a8bfa3083a1f3267aec82acbc978785.exe PID 440 wrote to memory of 4572 440 haeiqen.exe ad87332405e7a2464c6f664f4b1ef4830a8bfa3083a1f3267aec82acbc978785.exe PID 440 wrote to memory of 4572 440 haeiqen.exe ad87332405e7a2464c6f664f4b1ef4830a8bfa3083a1f3267aec82acbc978785.exe PID 440 wrote to memory of 4572 440 haeiqen.exe ad87332405e7a2464c6f664f4b1ef4830a8bfa3083a1f3267aec82acbc978785.exe PID 440 wrote to memory of 4572 440 haeiqen.exe ad87332405e7a2464c6f664f4b1ef4830a8bfa3083a1f3267aec82acbc978785.exe PID 440 wrote to memory of 4572 440 haeiqen.exe ad87332405e7a2464c6f664f4b1ef4830a8bfa3083a1f3267aec82acbc978785.exe PID 440 wrote to memory of 4572 440 haeiqen.exe ad87332405e7a2464c6f664f4b1ef4830a8bfa3083a1f3267aec82acbc978785.exe PID 440 wrote to memory of 4572 440 haeiqen.exe ad87332405e7a2464c6f664f4b1ef4830a8bfa3083a1f3267aec82acbc978785.exe PID 440 wrote to memory of 4572 440 haeiqen.exe ad87332405e7a2464c6f664f4b1ef4830a8bfa3083a1f3267aec82acbc978785.exe PID 440 wrote to memory of 4572 440 haeiqen.exe ad87332405e7a2464c6f664f4b1ef4830a8bfa3083a1f3267aec82acbc978785.exe PID 440 wrote to memory of 4572 440 haeiqen.exe ad87332405e7a2464c6f664f4b1ef4830a8bfa3083a1f3267aec82acbc978785.exe PID 440 wrote to memory of 4572 440 haeiqen.exe ad87332405e7a2464c6f664f4b1ef4830a8bfa3083a1f3267aec82acbc978785.exe PID 440 wrote to memory of 4572 440 haeiqen.exe ad87332405e7a2464c6f664f4b1ef4830a8bfa3083a1f3267aec82acbc978785.exe PID 440 wrote to memory of 4572 440 haeiqen.exe ad87332405e7a2464c6f664f4b1ef4830a8bfa3083a1f3267aec82acbc978785.exe PID 440 wrote to memory of 4572 440 haeiqen.exe ad87332405e7a2464c6f664f4b1ef4830a8bfa3083a1f3267aec82acbc978785.exe PID 440 wrote to memory of 4572 440 haeiqen.exe ad87332405e7a2464c6f664f4b1ef4830a8bfa3083a1f3267aec82acbc978785.exe PID 440 wrote to memory of 4572 440 haeiqen.exe ad87332405e7a2464c6f664f4b1ef4830a8bfa3083a1f3267aec82acbc978785.exe PID 440 wrote to memory of 4572 440 haeiqen.exe ad87332405e7a2464c6f664f4b1ef4830a8bfa3083a1f3267aec82acbc978785.exe PID 440 wrote to memory of 4572 440 haeiqen.exe ad87332405e7a2464c6f664f4b1ef4830a8bfa3083a1f3267aec82acbc978785.exe PID 440 wrote to memory of 4572 440 haeiqen.exe ad87332405e7a2464c6f664f4b1ef4830a8bfa3083a1f3267aec82acbc978785.exe PID 440 wrote to memory of 4572 440 haeiqen.exe ad87332405e7a2464c6f664f4b1ef4830a8bfa3083a1f3267aec82acbc978785.exe PID 440 wrote to memory of 4572 440 haeiqen.exe ad87332405e7a2464c6f664f4b1ef4830a8bfa3083a1f3267aec82acbc978785.exe PID 440 wrote to memory of 4572 440 haeiqen.exe ad87332405e7a2464c6f664f4b1ef4830a8bfa3083a1f3267aec82acbc978785.exe PID 440 wrote to memory of 4572 440 haeiqen.exe ad87332405e7a2464c6f664f4b1ef4830a8bfa3083a1f3267aec82acbc978785.exe PID 440 wrote to memory of 4572 440 haeiqen.exe ad87332405e7a2464c6f664f4b1ef4830a8bfa3083a1f3267aec82acbc978785.exe PID 440 wrote to memory of 4572 440 haeiqen.exe ad87332405e7a2464c6f664f4b1ef4830a8bfa3083a1f3267aec82acbc978785.exe PID 440 wrote to memory of 4572 440 haeiqen.exe ad87332405e7a2464c6f664f4b1ef4830a8bfa3083a1f3267aec82acbc978785.exe PID 440 wrote to memory of 4572 440 haeiqen.exe ad87332405e7a2464c6f664f4b1ef4830a8bfa3083a1f3267aec82acbc978785.exe PID 440 wrote to memory of 4572 440 haeiqen.exe ad87332405e7a2464c6f664f4b1ef4830a8bfa3083a1f3267aec82acbc978785.exe PID 440 wrote to memory of 4572 440 haeiqen.exe ad87332405e7a2464c6f664f4b1ef4830a8bfa3083a1f3267aec82acbc978785.exe PID 440 wrote to memory of 4572 440 haeiqen.exe ad87332405e7a2464c6f664f4b1ef4830a8bfa3083a1f3267aec82acbc978785.exe PID 440 wrote to memory of 4572 440 haeiqen.exe ad87332405e7a2464c6f664f4b1ef4830a8bfa3083a1f3267aec82acbc978785.exe PID 440 wrote to memory of 4572 440 haeiqen.exe ad87332405e7a2464c6f664f4b1ef4830a8bfa3083a1f3267aec82acbc978785.exe PID 440 wrote to memory of 4572 440 haeiqen.exe ad87332405e7a2464c6f664f4b1ef4830a8bfa3083a1f3267aec82acbc978785.exe PID 440 wrote to memory of 4572 440 haeiqen.exe ad87332405e7a2464c6f664f4b1ef4830a8bfa3083a1f3267aec82acbc978785.exe PID 440 wrote to memory of 4572 440 haeiqen.exe ad87332405e7a2464c6f664f4b1ef4830a8bfa3083a1f3267aec82acbc978785.exe PID 440 wrote to memory of 4572 440 haeiqen.exe ad87332405e7a2464c6f664f4b1ef4830a8bfa3083a1f3267aec82acbc978785.exe PID 440 wrote to memory of 4572 440 haeiqen.exe ad87332405e7a2464c6f664f4b1ef4830a8bfa3083a1f3267aec82acbc978785.exe PID 440 wrote to memory of 4572 440 haeiqen.exe ad87332405e7a2464c6f664f4b1ef4830a8bfa3083a1f3267aec82acbc978785.exe PID 440 wrote to memory of 4572 440 haeiqen.exe ad87332405e7a2464c6f664f4b1ef4830a8bfa3083a1f3267aec82acbc978785.exe PID 440 wrote to memory of 4572 440 haeiqen.exe ad87332405e7a2464c6f664f4b1ef4830a8bfa3083a1f3267aec82acbc978785.exe PID 440 wrote to memory of 4572 440 haeiqen.exe ad87332405e7a2464c6f664f4b1ef4830a8bfa3083a1f3267aec82acbc978785.exe PID 440 wrote to memory of 4572 440 haeiqen.exe ad87332405e7a2464c6f664f4b1ef4830a8bfa3083a1f3267aec82acbc978785.exe PID 440 wrote to memory of 4572 440 haeiqen.exe ad87332405e7a2464c6f664f4b1ef4830a8bfa3083a1f3267aec82acbc978785.exe PID 440 wrote to memory of 4572 440 haeiqen.exe ad87332405e7a2464c6f664f4b1ef4830a8bfa3083a1f3267aec82acbc978785.exe PID 440 wrote to memory of 4572 440 haeiqen.exe ad87332405e7a2464c6f664f4b1ef4830a8bfa3083a1f3267aec82acbc978785.exe PID 440 wrote to memory of 4572 440 haeiqen.exe ad87332405e7a2464c6f664f4b1ef4830a8bfa3083a1f3267aec82acbc978785.exe PID 440 wrote to memory of 4572 440 haeiqen.exe ad87332405e7a2464c6f664f4b1ef4830a8bfa3083a1f3267aec82acbc978785.exe PID 440 wrote to memory of 4572 440 haeiqen.exe ad87332405e7a2464c6f664f4b1ef4830a8bfa3083a1f3267aec82acbc978785.exe PID 440 wrote to memory of 4572 440 haeiqen.exe ad87332405e7a2464c6f664f4b1ef4830a8bfa3083a1f3267aec82acbc978785.exe PID 440 wrote to memory of 4572 440 haeiqen.exe ad87332405e7a2464c6f664f4b1ef4830a8bfa3083a1f3267aec82acbc978785.exe PID 440 wrote to memory of 4572 440 haeiqen.exe ad87332405e7a2464c6f664f4b1ef4830a8bfa3083a1f3267aec82acbc978785.exe PID 440 wrote to memory of 4572 440 haeiqen.exe ad87332405e7a2464c6f664f4b1ef4830a8bfa3083a1f3267aec82acbc978785.exe PID 440 wrote to memory of 4572 440 haeiqen.exe ad87332405e7a2464c6f664f4b1ef4830a8bfa3083a1f3267aec82acbc978785.exe PID 440 wrote to memory of 4572 440 haeiqen.exe ad87332405e7a2464c6f664f4b1ef4830a8bfa3083a1f3267aec82acbc978785.exe PID 440 wrote to memory of 4572 440 haeiqen.exe ad87332405e7a2464c6f664f4b1ef4830a8bfa3083a1f3267aec82acbc978785.exe PID 440 wrote to memory of 4572 440 haeiqen.exe ad87332405e7a2464c6f664f4b1ef4830a8bfa3083a1f3267aec82acbc978785.exe PID 440 wrote to memory of 4572 440 haeiqen.exe ad87332405e7a2464c6f664f4b1ef4830a8bfa3083a1f3267aec82acbc978785.exe PID 440 wrote to memory of 4572 440 haeiqen.exe ad87332405e7a2464c6f664f4b1ef4830a8bfa3083a1f3267aec82acbc978785.exe PID 440 wrote to memory of 4572 440 haeiqen.exe ad87332405e7a2464c6f664f4b1ef4830a8bfa3083a1f3267aec82acbc978785.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad87332405e7a2464c6f664f4b1ef4830a8bfa3083a1f3267aec82acbc978785.exe"C:\Users\Admin\AppData\Local\Temp\ad87332405e7a2464c6f664f4b1ef4830a8bfa3083a1f3267aec82acbc978785.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Users\Admin\haeiqen.exe"C:\Users\Admin\haeiqen.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:440
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
248KB
MD5c8528201513a7fded80cb3678d99565b
SHA1b3fb4561bda285e9b7bd99f39fed15b9f336b773
SHA25659e29551ed8dcf4130b023cec5fa6ff18f5b1910059a8dd37ea4d61cf9dc283a
SHA512009b14ae2d20977b1dd5feeacb804b31b083162b7f14c0c79ce7148cf883ce78500dddd1a959518550b3f8529f3aa3a784231d061a51c945108924e7cfc0029a
-
Filesize
248KB
MD5c8528201513a7fded80cb3678d99565b
SHA1b3fb4561bda285e9b7bd99f39fed15b9f336b773
SHA25659e29551ed8dcf4130b023cec5fa6ff18f5b1910059a8dd37ea4d61cf9dc283a
SHA512009b14ae2d20977b1dd5feeacb804b31b083162b7f14c0c79ce7148cf883ce78500dddd1a959518550b3f8529f3aa3a784231d061a51c945108924e7cfc0029a