Analysis
-
max time kernel
155s -
max time network
73s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 00:17
Static task
static1
Behavioral task
behavioral1
Sample
7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe
Resource
win10v2004-20220901-en
General
-
Target
7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe
-
Size
252KB
-
MD5
2e039a2c2780ce64e13cab0d8092ff45
-
SHA1
232282496576b1b9962eebf8fdfaf87b351f3851
-
SHA256
7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4
-
SHA512
f1239af8dc2488096a6dfa9c694380bc55f98da45cfdb0a6868d9c12624a1faabadf0b6ca5df902fc79b812a6a87b3bc94e96c2b7774b13a635c59475c045ce1
-
SSDEEP
1536:aKIwL0+zscRbgE3vo97thU0CNY+cdoFlVxEz/c2JYO8VUmnbfzFHfz8sFBpYWC/g:1l0+7gYg9bVtgfzFHfzb51QRPr8GDiX
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
maoqouj.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" maoqouj.exe -
Executes dropped EXE 1 IoCs
Processes:
maoqouj.exepid process 1748 maoqouj.exe -
Loads dropped DLL 2 IoCs
Processes:
7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exepid process 1808 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe 1808 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe -
Adds Run key to start application 2 TTPs 49 IoCs
Processes:
maoqouj.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\maoqouj = "C:\\Users\\Admin\\maoqouj.exe /X" maoqouj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\maoqouj = "C:\\Users\\Admin\\maoqouj.exe /S" maoqouj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\maoqouj = "C:\\Users\\Admin\\maoqouj.exe /k" maoqouj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\maoqouj = "C:\\Users\\Admin\\maoqouj.exe /t" maoqouj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\maoqouj = "C:\\Users\\Admin\\maoqouj.exe /R" maoqouj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\maoqouj = "C:\\Users\\Admin\\maoqouj.exe /a" maoqouj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\maoqouj = "C:\\Users\\Admin\\maoqouj.exe /u" maoqouj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\maoqouj = "C:\\Users\\Admin\\maoqouj.exe /L" maoqouj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\maoqouj = "C:\\Users\\Admin\\maoqouj.exe /A" maoqouj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\maoqouj = "C:\\Users\\Admin\\maoqouj.exe /O" maoqouj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\maoqouj = "C:\\Users\\Admin\\maoqouj.exe /Y" maoqouj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\maoqouj = "C:\\Users\\Admin\\maoqouj.exe /w" maoqouj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\maoqouj = "C:\\Users\\Admin\\maoqouj.exe /y" maoqouj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\maoqouj = "C:\\Users\\Admin\\maoqouj.exe /n" maoqouj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\maoqouj = "C:\\Users\\Admin\\maoqouj.exe /b" maoqouj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\maoqouj = "C:\\Users\\Admin\\maoqouj.exe /e" maoqouj.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ maoqouj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\maoqouj = "C:\\Users\\Admin\\maoqouj.exe /F" maoqouj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\maoqouj = "C:\\Users\\Admin\\maoqouj.exe /W" maoqouj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\maoqouj = "C:\\Users\\Admin\\maoqouj.exe /m" maoqouj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\maoqouj = "C:\\Users\\Admin\\maoqouj.exe /I" maoqouj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\maoqouj = "C:\\Users\\Admin\\maoqouj.exe /D" maoqouj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\maoqouj = "C:\\Users\\Admin\\maoqouj.exe /g" maoqouj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\maoqouj = "C:\\Users\\Admin\\maoqouj.exe /r" maoqouj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\maoqouj = "C:\\Users\\Admin\\maoqouj.exe /B" maoqouj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\maoqouj = "C:\\Users\\Admin\\maoqouj.exe /Q" maoqouj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\maoqouj = "C:\\Users\\Admin\\maoqouj.exe /E" maoqouj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\maoqouj = "C:\\Users\\Admin\\maoqouj.exe /M" maoqouj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\maoqouj = "C:\\Users\\Admin\\maoqouj.exe /o" maoqouj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\maoqouj = "C:\\Users\\Admin\\maoqouj.exe /v" maoqouj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\maoqouj = "C:\\Users\\Admin\\maoqouj.exe /q" maoqouj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\maoqouj = "C:\\Users\\Admin\\maoqouj.exe /i" maoqouj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\maoqouj = "C:\\Users\\Admin\\maoqouj.exe /K" maoqouj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\maoqouj = "C:\\Users\\Admin\\maoqouj.exe /Z" maoqouj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\maoqouj = "C:\\Users\\Admin\\maoqouj.exe /p" maoqouj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\maoqouj = "C:\\Users\\Admin\\maoqouj.exe /C" maoqouj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\maoqouj = "C:\\Users\\Admin\\maoqouj.exe /z" maoqouj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\maoqouj = "C:\\Users\\Admin\\maoqouj.exe /J" maoqouj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\maoqouj = "C:\\Users\\Admin\\maoqouj.exe /l" maoqouj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\maoqouj = "C:\\Users\\Admin\\maoqouj.exe /V" maoqouj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\maoqouj = "C:\\Users\\Admin\\maoqouj.exe /G" maoqouj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\maoqouj = "C:\\Users\\Admin\\maoqouj.exe /x" maoqouj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\maoqouj = "C:\\Users\\Admin\\maoqouj.exe /c" maoqouj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\maoqouj = "C:\\Users\\Admin\\maoqouj.exe /T" maoqouj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\maoqouj = "C:\\Users\\Admin\\maoqouj.exe /d" maoqouj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\maoqouj = "C:\\Users\\Admin\\maoqouj.exe /H" maoqouj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\maoqouj = "C:\\Users\\Admin\\maoqouj.exe /j" maoqouj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\maoqouj = "C:\\Users\\Admin\\maoqouj.exe /U" maoqouj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\maoqouj = "C:\\Users\\Admin\\maoqouj.exe /s" maoqouj.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
maoqouj.exepid process 1748 maoqouj.exe 1748 maoqouj.exe 1748 maoqouj.exe 1748 maoqouj.exe 1748 maoqouj.exe 1748 maoqouj.exe 1748 maoqouj.exe 1748 maoqouj.exe 1748 maoqouj.exe 1748 maoqouj.exe 1748 maoqouj.exe 1748 maoqouj.exe 1748 maoqouj.exe 1748 maoqouj.exe 1748 maoqouj.exe 1748 maoqouj.exe 1748 maoqouj.exe 1748 maoqouj.exe 1748 maoqouj.exe 1748 maoqouj.exe 1748 maoqouj.exe 1748 maoqouj.exe 1748 maoqouj.exe 1748 maoqouj.exe 1748 maoqouj.exe 1748 maoqouj.exe 1748 maoqouj.exe 1748 maoqouj.exe 1748 maoqouj.exe 1748 maoqouj.exe 1748 maoqouj.exe 1748 maoqouj.exe 1748 maoqouj.exe 1748 maoqouj.exe 1748 maoqouj.exe 1748 maoqouj.exe 1748 maoqouj.exe 1748 maoqouj.exe 1748 maoqouj.exe 1748 maoqouj.exe 1748 maoqouj.exe 1748 maoqouj.exe 1748 maoqouj.exe 1748 maoqouj.exe 1748 maoqouj.exe 1748 maoqouj.exe 1748 maoqouj.exe 1748 maoqouj.exe 1748 maoqouj.exe 1748 maoqouj.exe 1748 maoqouj.exe 1748 maoqouj.exe 1748 maoqouj.exe 1748 maoqouj.exe 1748 maoqouj.exe 1748 maoqouj.exe 1748 maoqouj.exe 1748 maoqouj.exe 1748 maoqouj.exe 1748 maoqouj.exe 1748 maoqouj.exe 1748 maoqouj.exe 1748 maoqouj.exe 1748 maoqouj.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exemaoqouj.exepid process 1808 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe 1748 maoqouj.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exemaoqouj.exedescription pid process target process PID 1808 wrote to memory of 1748 1808 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe maoqouj.exe PID 1808 wrote to memory of 1748 1808 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe maoqouj.exe PID 1808 wrote to memory of 1748 1808 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe maoqouj.exe PID 1808 wrote to memory of 1748 1808 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe maoqouj.exe PID 1748 wrote to memory of 1808 1748 maoqouj.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe PID 1748 wrote to memory of 1808 1748 maoqouj.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe PID 1748 wrote to memory of 1808 1748 maoqouj.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe PID 1748 wrote to memory of 1808 1748 maoqouj.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe PID 1748 wrote to memory of 1808 1748 maoqouj.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe PID 1748 wrote to memory of 1808 1748 maoqouj.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe PID 1748 wrote to memory of 1808 1748 maoqouj.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe PID 1748 wrote to memory of 1808 1748 maoqouj.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe PID 1748 wrote to memory of 1808 1748 maoqouj.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe PID 1748 wrote to memory of 1808 1748 maoqouj.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe PID 1748 wrote to memory of 1808 1748 maoqouj.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe PID 1748 wrote to memory of 1808 1748 maoqouj.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe PID 1748 wrote to memory of 1808 1748 maoqouj.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe PID 1748 wrote to memory of 1808 1748 maoqouj.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe PID 1748 wrote to memory of 1808 1748 maoqouj.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe PID 1748 wrote to memory of 1808 1748 maoqouj.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe PID 1748 wrote to memory of 1808 1748 maoqouj.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe PID 1748 wrote to memory of 1808 1748 maoqouj.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe PID 1748 wrote to memory of 1808 1748 maoqouj.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe PID 1748 wrote to memory of 1808 1748 maoqouj.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe PID 1748 wrote to memory of 1808 1748 maoqouj.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe PID 1748 wrote to memory of 1808 1748 maoqouj.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe PID 1748 wrote to memory of 1808 1748 maoqouj.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe PID 1748 wrote to memory of 1808 1748 maoqouj.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe PID 1748 wrote to memory of 1808 1748 maoqouj.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe PID 1748 wrote to memory of 1808 1748 maoqouj.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe PID 1748 wrote to memory of 1808 1748 maoqouj.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe PID 1748 wrote to memory of 1808 1748 maoqouj.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe PID 1748 wrote to memory of 1808 1748 maoqouj.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe PID 1748 wrote to memory of 1808 1748 maoqouj.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe PID 1748 wrote to memory of 1808 1748 maoqouj.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe PID 1748 wrote to memory of 1808 1748 maoqouj.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe PID 1748 wrote to memory of 1808 1748 maoqouj.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe PID 1748 wrote to memory of 1808 1748 maoqouj.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe PID 1748 wrote to memory of 1808 1748 maoqouj.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe PID 1748 wrote to memory of 1808 1748 maoqouj.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe PID 1748 wrote to memory of 1808 1748 maoqouj.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe PID 1748 wrote to memory of 1808 1748 maoqouj.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe PID 1748 wrote to memory of 1808 1748 maoqouj.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe PID 1748 wrote to memory of 1808 1748 maoqouj.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe PID 1748 wrote to memory of 1808 1748 maoqouj.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe PID 1748 wrote to memory of 1808 1748 maoqouj.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe PID 1748 wrote to memory of 1808 1748 maoqouj.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe PID 1748 wrote to memory of 1808 1748 maoqouj.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe PID 1748 wrote to memory of 1808 1748 maoqouj.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe PID 1748 wrote to memory of 1808 1748 maoqouj.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe PID 1748 wrote to memory of 1808 1748 maoqouj.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe PID 1748 wrote to memory of 1808 1748 maoqouj.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe PID 1748 wrote to memory of 1808 1748 maoqouj.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe PID 1748 wrote to memory of 1808 1748 maoqouj.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe PID 1748 wrote to memory of 1808 1748 maoqouj.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe PID 1748 wrote to memory of 1808 1748 maoqouj.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe PID 1748 wrote to memory of 1808 1748 maoqouj.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe PID 1748 wrote to memory of 1808 1748 maoqouj.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe PID 1748 wrote to memory of 1808 1748 maoqouj.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe PID 1748 wrote to memory of 1808 1748 maoqouj.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe PID 1748 wrote to memory of 1808 1748 maoqouj.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe PID 1748 wrote to memory of 1808 1748 maoqouj.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe PID 1748 wrote to memory of 1808 1748 maoqouj.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe PID 1748 wrote to memory of 1808 1748 maoqouj.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe"C:\Users\Admin\AppData\Local\Temp\7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Users\Admin\maoqouj.exe"C:\Users\Admin\maoqouj.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1748
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
252KB
MD5278fa3826a627fb987ca5761cc219690
SHA10f2929c34f7191b20f6ef59f9a20eedcd81985b1
SHA2564674b375abad6a8ba4b4f4e98b14b491d4551a1a1c1d7e67228f50b37e92145a
SHA512298cfcd7f5878390d4282de9943ec8011ac9d78f1a2ff85d0ca76b11208f9238cc9a0e0e5ec4608a7688c030133030ee98a2fe844026359a4b2bf70074828682
-
Filesize
252KB
MD5278fa3826a627fb987ca5761cc219690
SHA10f2929c34f7191b20f6ef59f9a20eedcd81985b1
SHA2564674b375abad6a8ba4b4f4e98b14b491d4551a1a1c1d7e67228f50b37e92145a
SHA512298cfcd7f5878390d4282de9943ec8011ac9d78f1a2ff85d0ca76b11208f9238cc9a0e0e5ec4608a7688c030133030ee98a2fe844026359a4b2bf70074828682
-
Filesize
252KB
MD5278fa3826a627fb987ca5761cc219690
SHA10f2929c34f7191b20f6ef59f9a20eedcd81985b1
SHA2564674b375abad6a8ba4b4f4e98b14b491d4551a1a1c1d7e67228f50b37e92145a
SHA512298cfcd7f5878390d4282de9943ec8011ac9d78f1a2ff85d0ca76b11208f9238cc9a0e0e5ec4608a7688c030133030ee98a2fe844026359a4b2bf70074828682
-
Filesize
252KB
MD5278fa3826a627fb987ca5761cc219690
SHA10f2929c34f7191b20f6ef59f9a20eedcd81985b1
SHA2564674b375abad6a8ba4b4f4e98b14b491d4551a1a1c1d7e67228f50b37e92145a
SHA512298cfcd7f5878390d4282de9943ec8011ac9d78f1a2ff85d0ca76b11208f9238cc9a0e0e5ec4608a7688c030133030ee98a2fe844026359a4b2bf70074828682