Analysis
-
max time kernel
179s -
max time network
181s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 18:51
Static task
static1
Behavioral task
behavioral1
Sample
3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe
Resource
win10v2004-20221111-en
General
-
Target
3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe
-
Size
244KB
-
MD5
353631c7e3686b6aba08dcab28849013
-
SHA1
0e0054e1175f1119e44aa71f94ad9b059c207338
-
SHA256
3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840
-
SHA512
48f3577e731cf6b984b8602241eba4855a7dd2846a76e527d347a5c55ea49b3927d8ae0eff285b93c1b586696db5a6a9dde0b44652800d7b9f8386af94e1d469
-
SSDEEP
6144:oHAn9UvAqXDdJZRx8zm/4Q7OkkXJLbg4xK4laa:Pn9UvxXDdJZRx8zm/4Q7OksJLbg4x
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
geoayaq.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" geoayaq.exe -
Executes dropped EXE 1 IoCs
Processes:
geoayaq.exepid process 4180 geoayaq.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe -
Adds Run key to start application 2 TTPs 49 IoCs
Processes:
geoayaq.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Windows\CurrentVersion\Run\ geoayaq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geoayaq = "C:\\Users\\Admin\\geoayaq.exe /l" geoayaq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geoayaq = "C:\\Users\\Admin\\geoayaq.exe /u" geoayaq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geoayaq = "C:\\Users\\Admin\\geoayaq.exe /k" geoayaq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geoayaq = "C:\\Users\\Admin\\geoayaq.exe /R" geoayaq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geoayaq = "C:\\Users\\Admin\\geoayaq.exe /G" geoayaq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geoayaq = "C:\\Users\\Admin\\geoayaq.exe /v" geoayaq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geoayaq = "C:\\Users\\Admin\\geoayaq.exe /Y" geoayaq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geoayaq = "C:\\Users\\Admin\\geoayaq.exe /J" geoayaq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geoayaq = "C:\\Users\\Admin\\geoayaq.exe /j" geoayaq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geoayaq = "C:\\Users\\Admin\\geoayaq.exe /B" geoayaq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geoayaq = "C:\\Users\\Admin\\geoayaq.exe /N" geoayaq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geoayaq = "C:\\Users\\Admin\\geoayaq.exe /a" geoayaq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geoayaq = "C:\\Users\\Admin\\geoayaq.exe /W" geoayaq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geoayaq = "C:\\Users\\Admin\\geoayaq.exe /n" geoayaq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geoayaq = "C:\\Users\\Admin\\geoayaq.exe /M" geoayaq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geoayaq = "C:\\Users\\Admin\\geoayaq.exe /c" geoayaq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geoayaq = "C:\\Users\\Admin\\geoayaq.exe /o" geoayaq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geoayaq = "C:\\Users\\Admin\\geoayaq.exe /s" geoayaq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geoayaq = "C:\\Users\\Admin\\geoayaq.exe /z" geoayaq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geoayaq = "C:\\Users\\Admin\\geoayaq.exe /V" geoayaq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geoayaq = "C:\\Users\\Admin\\geoayaq.exe /C" geoayaq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geoayaq = "C:\\Users\\Admin\\geoayaq.exe /F" geoayaq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geoayaq = "C:\\Users\\Admin\\geoayaq.exe /h" geoayaq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geoayaq = "C:\\Users\\Admin\\geoayaq.exe /b" geoayaq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geoayaq = "C:\\Users\\Admin\\geoayaq.exe /I" geoayaq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geoayaq = "C:\\Users\\Admin\\geoayaq.exe /T" geoayaq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geoayaq = "C:\\Users\\Admin\\geoayaq.exe /x" geoayaq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geoayaq = "C:\\Users\\Admin\\geoayaq.exe /f" geoayaq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geoayaq = "C:\\Users\\Admin\\geoayaq.exe /i" geoayaq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geoayaq = "C:\\Users\\Admin\\geoayaq.exe /L" geoayaq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geoayaq = "C:\\Users\\Admin\\geoayaq.exe /O" geoayaq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geoayaq = "C:\\Users\\Admin\\geoayaq.exe /Q" geoayaq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geoayaq = "C:\\Users\\Admin\\geoayaq.exe /t" geoayaq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geoayaq = "C:\\Users\\Admin\\geoayaq.exe /d" geoayaq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geoayaq = "C:\\Users\\Admin\\geoayaq.exe /q" geoayaq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geoayaq = "C:\\Users\\Admin\\geoayaq.exe /P" geoayaq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geoayaq = "C:\\Users\\Admin\\geoayaq.exe /Z" geoayaq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geoayaq = "C:\\Users\\Admin\\geoayaq.exe /E" geoayaq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geoayaq = "C:\\Users\\Admin\\geoayaq.exe /K" geoayaq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geoayaq = "C:\\Users\\Admin\\geoayaq.exe /r" geoayaq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geoayaq = "C:\\Users\\Admin\\geoayaq.exe /w" geoayaq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geoayaq = "C:\\Users\\Admin\\geoayaq.exe /H" geoayaq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geoayaq = "C:\\Users\\Admin\\geoayaq.exe /e" geoayaq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geoayaq = "C:\\Users\\Admin\\geoayaq.exe /m" geoayaq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geoayaq = "C:\\Users\\Admin\\geoayaq.exe /D" geoayaq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geoayaq = "C:\\Users\\Admin\\geoayaq.exe /g" geoayaq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geoayaq = "C:\\Users\\Admin\\geoayaq.exe /X" geoayaq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geoayaq = "C:\\Users\\Admin\\geoayaq.exe /p" geoayaq.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
geoayaq.exepid process 4180 geoayaq.exe 4180 geoayaq.exe 4180 geoayaq.exe 4180 geoayaq.exe 4180 geoayaq.exe 4180 geoayaq.exe 4180 geoayaq.exe 4180 geoayaq.exe 4180 geoayaq.exe 4180 geoayaq.exe 4180 geoayaq.exe 4180 geoayaq.exe 4180 geoayaq.exe 4180 geoayaq.exe 4180 geoayaq.exe 4180 geoayaq.exe 4180 geoayaq.exe 4180 geoayaq.exe 4180 geoayaq.exe 4180 geoayaq.exe 4180 geoayaq.exe 4180 geoayaq.exe 4180 geoayaq.exe 4180 geoayaq.exe 4180 geoayaq.exe 4180 geoayaq.exe 4180 geoayaq.exe 4180 geoayaq.exe 4180 geoayaq.exe 4180 geoayaq.exe 4180 geoayaq.exe 4180 geoayaq.exe 4180 geoayaq.exe 4180 geoayaq.exe 4180 geoayaq.exe 4180 geoayaq.exe 4180 geoayaq.exe 4180 geoayaq.exe 4180 geoayaq.exe 4180 geoayaq.exe 4180 geoayaq.exe 4180 geoayaq.exe 4180 geoayaq.exe 4180 geoayaq.exe 4180 geoayaq.exe 4180 geoayaq.exe 4180 geoayaq.exe 4180 geoayaq.exe 4180 geoayaq.exe 4180 geoayaq.exe 4180 geoayaq.exe 4180 geoayaq.exe 4180 geoayaq.exe 4180 geoayaq.exe 4180 geoayaq.exe 4180 geoayaq.exe 4180 geoayaq.exe 4180 geoayaq.exe 4180 geoayaq.exe 4180 geoayaq.exe 4180 geoayaq.exe 4180 geoayaq.exe 4180 geoayaq.exe 4180 geoayaq.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exegeoayaq.exepid process 4636 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe 4180 geoayaq.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exegeoayaq.exedescription pid process target process PID 4636 wrote to memory of 4180 4636 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe geoayaq.exe PID 4636 wrote to memory of 4180 4636 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe geoayaq.exe PID 4636 wrote to memory of 4180 4636 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe geoayaq.exe PID 4180 wrote to memory of 4636 4180 geoayaq.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe PID 4180 wrote to memory of 4636 4180 geoayaq.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe PID 4180 wrote to memory of 4636 4180 geoayaq.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe PID 4180 wrote to memory of 4636 4180 geoayaq.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe PID 4180 wrote to memory of 4636 4180 geoayaq.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe PID 4180 wrote to memory of 4636 4180 geoayaq.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe PID 4180 wrote to memory of 4636 4180 geoayaq.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe PID 4180 wrote to memory of 4636 4180 geoayaq.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe PID 4180 wrote to memory of 4636 4180 geoayaq.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe PID 4180 wrote to memory of 4636 4180 geoayaq.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe PID 4180 wrote to memory of 4636 4180 geoayaq.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe PID 4180 wrote to memory of 4636 4180 geoayaq.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe PID 4180 wrote to memory of 4636 4180 geoayaq.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe PID 4180 wrote to memory of 4636 4180 geoayaq.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe PID 4180 wrote to memory of 4636 4180 geoayaq.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe PID 4180 wrote to memory of 4636 4180 geoayaq.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe PID 4180 wrote to memory of 4636 4180 geoayaq.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe PID 4180 wrote to memory of 4636 4180 geoayaq.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe PID 4180 wrote to memory of 4636 4180 geoayaq.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe PID 4180 wrote to memory of 4636 4180 geoayaq.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe PID 4180 wrote to memory of 4636 4180 geoayaq.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe PID 4180 wrote to memory of 4636 4180 geoayaq.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe PID 4180 wrote to memory of 4636 4180 geoayaq.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe PID 4180 wrote to memory of 4636 4180 geoayaq.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe PID 4180 wrote to memory of 4636 4180 geoayaq.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe PID 4180 wrote to memory of 4636 4180 geoayaq.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe PID 4180 wrote to memory of 4636 4180 geoayaq.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe PID 4180 wrote to memory of 4636 4180 geoayaq.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe PID 4180 wrote to memory of 4636 4180 geoayaq.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe PID 4180 wrote to memory of 4636 4180 geoayaq.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe PID 4180 wrote to memory of 4636 4180 geoayaq.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe PID 4180 wrote to memory of 4636 4180 geoayaq.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe PID 4180 wrote to memory of 4636 4180 geoayaq.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe PID 4180 wrote to memory of 4636 4180 geoayaq.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe PID 4180 wrote to memory of 4636 4180 geoayaq.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe PID 4180 wrote to memory of 4636 4180 geoayaq.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe PID 4180 wrote to memory of 4636 4180 geoayaq.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe PID 4180 wrote to memory of 4636 4180 geoayaq.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe PID 4180 wrote to memory of 4636 4180 geoayaq.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe PID 4180 wrote to memory of 4636 4180 geoayaq.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe PID 4180 wrote to memory of 4636 4180 geoayaq.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe PID 4180 wrote to memory of 4636 4180 geoayaq.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe PID 4180 wrote to memory of 4636 4180 geoayaq.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe PID 4180 wrote to memory of 4636 4180 geoayaq.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe PID 4180 wrote to memory of 4636 4180 geoayaq.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe PID 4180 wrote to memory of 4636 4180 geoayaq.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe PID 4180 wrote to memory of 4636 4180 geoayaq.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe PID 4180 wrote to memory of 4636 4180 geoayaq.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe PID 4180 wrote to memory of 4636 4180 geoayaq.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe PID 4180 wrote to memory of 4636 4180 geoayaq.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe PID 4180 wrote to memory of 4636 4180 geoayaq.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe PID 4180 wrote to memory of 4636 4180 geoayaq.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe PID 4180 wrote to memory of 4636 4180 geoayaq.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe PID 4180 wrote to memory of 4636 4180 geoayaq.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe PID 4180 wrote to memory of 4636 4180 geoayaq.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe PID 4180 wrote to memory of 4636 4180 geoayaq.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe PID 4180 wrote to memory of 4636 4180 geoayaq.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe PID 4180 wrote to memory of 4636 4180 geoayaq.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe PID 4180 wrote to memory of 4636 4180 geoayaq.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe PID 4180 wrote to memory of 4636 4180 geoayaq.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe PID 4180 wrote to memory of 4636 4180 geoayaq.exe 3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe"C:\Users\Admin\AppData\Local\Temp\3999b02a5ea3296196d635345d1641e8e5b294de86df15b4c7877442fe2ec840.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4636 -
C:\Users\Admin\geoayaq.exe"C:\Users\Admin\geoayaq.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4180
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
244KB
MD5edbe8501fd3dfd80ff30c65df59a7183
SHA141b74dc45b509ff2e04f551111c901f849e3fc04
SHA25634b3c0eee8018deeb0c76e73407df92af8fa6ffd98139051d6fa1f8880d65afb
SHA51255e3a5cefc99e82c54e4eab23af810d563380a6a587f94284ce050623e727632a6d7916e69868a95dd1bc8031130d76d77b0d35d4afc84257def89a822f772e4
-
Filesize
244KB
MD5edbe8501fd3dfd80ff30c65df59a7183
SHA141b74dc45b509ff2e04f551111c901f849e3fc04
SHA25634b3c0eee8018deeb0c76e73407df92af8fa6ffd98139051d6fa1f8880d65afb
SHA51255e3a5cefc99e82c54e4eab23af810d563380a6a587f94284ce050623e727632a6d7916e69868a95dd1bc8031130d76d77b0d35d4afc84257def89a822f772e4