Analysis
-
max time kernel
151s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 00:17
Static task
static1
Behavioral task
behavioral1
Sample
7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe
Resource
win10v2004-20220901-en
General
-
Target
7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe
-
Size
252KB
-
MD5
2e039a2c2780ce64e13cab0d8092ff45
-
SHA1
232282496576b1b9962eebf8fdfaf87b351f3851
-
SHA256
7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4
-
SHA512
f1239af8dc2488096a6dfa9c694380bc55f98da45cfdb0a6868d9c12624a1faabadf0b6ca5df902fc79b812a6a87b3bc94e96c2b7774b13a635c59475c045ce1
-
SSDEEP
1536:aKIwL0+zscRbgE3vo97thU0CNY+cdoFlVxEz/c2JYO8VUmnbfzFHfz8sFBpYWC/g:1l0+7gYg9bVtgfzFHfzb51QRPr8GDiX
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
geuyeah.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" geuyeah.exe -
Executes dropped EXE 1 IoCs
Processes:
geuyeah.exepid process 3120 geuyeah.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe -
Adds Run key to start application 2 TTPs 51 IoCs
Processes:
geuyeah.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geuyeah = "C:\\Users\\Admin\\geuyeah.exe /n" geuyeah.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geuyeah = "C:\\Users\\Admin\\geuyeah.exe /G" geuyeah.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geuyeah = "C:\\Users\\Admin\\geuyeah.exe /u" geuyeah.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geuyeah = "C:\\Users\\Admin\\geuyeah.exe /r" geuyeah.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geuyeah = "C:\\Users\\Admin\\geuyeah.exe /z" geuyeah.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geuyeah = "C:\\Users\\Admin\\geuyeah.exe /K" geuyeah.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geuyeah = "C:\\Users\\Admin\\geuyeah.exe /d" geuyeah.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geuyeah = "C:\\Users\\Admin\\geuyeah.exe /Y" geuyeah.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geuyeah = "C:\\Users\\Admin\\geuyeah.exe /m" geuyeah.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geuyeah = "C:\\Users\\Admin\\geuyeah.exe /B" geuyeah.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geuyeah = "C:\\Users\\Admin\\geuyeah.exe /P" geuyeah.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geuyeah = "C:\\Users\\Admin\\geuyeah.exe /D" geuyeah.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geuyeah = "C:\\Users\\Admin\\geuyeah.exe /R" geuyeah.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geuyeah = "C:\\Users\\Admin\\geuyeah.exe /U" geuyeah.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geuyeah = "C:\\Users\\Admin\\geuyeah.exe /b" geuyeah.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geuyeah = "C:\\Users\\Admin\\geuyeah.exe /y" geuyeah.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geuyeah = "C:\\Users\\Admin\\geuyeah.exe /S" geuyeah.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geuyeah = "C:\\Users\\Admin\\geuyeah.exe /M" geuyeah.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geuyeah = "C:\\Users\\Admin\\geuyeah.exe /p" geuyeah.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geuyeah = "C:\\Users\\Admin\\geuyeah.exe /C" geuyeah.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run\ geuyeah.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geuyeah = "C:\\Users\\Admin\\geuyeah.exe /c" geuyeah.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geuyeah = "C:\\Users\\Admin\\geuyeah.exe /J" geuyeah.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geuyeah = "C:\\Users\\Admin\\geuyeah.exe /A" geuyeah.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geuyeah = "C:\\Users\\Admin\\geuyeah.exe /L" geuyeah.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geuyeah = "C:\\Users\\Admin\\geuyeah.exe /V" geuyeah.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geuyeah = "C:\\Users\\Admin\\geuyeah.exe /s" geuyeah.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geuyeah = "C:\\Users\\Admin\\geuyeah.exe /W" geuyeah.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geuyeah = "C:\\Users\\Admin\\geuyeah.exe /f" geuyeah.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geuyeah = "C:\\Users\\Admin\\geuyeah.exe /j" geuyeah.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geuyeah = "C:\\Users\\Admin\\geuyeah.exe /Z" geuyeah.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geuyeah = "C:\\Users\\Admin\\geuyeah.exe /T" geuyeah.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geuyeah = "C:\\Users\\Admin\\geuyeah.exe /q" geuyeah.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geuyeah = "C:\\Users\\Admin\\geuyeah.exe /E" geuyeah.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geuyeah = "C:\\Users\\Admin\\geuyeah.exe /l" geuyeah.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geuyeah = "C:\\Users\\Admin\\geuyeah.exe /k" geuyeah.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geuyeah = "C:\\Users\\Admin\\geuyeah.exe /I" geuyeah.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geuyeah = "C:\\Users\\Admin\\geuyeah.exe /i" geuyeah.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geuyeah = "C:\\Users\\Admin\\geuyeah.exe /g" geuyeah.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geuyeah = "C:\\Users\\Admin\\geuyeah.exe /x" geuyeah.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geuyeah = "C:\\Users\\Admin\\geuyeah.exe /w" geuyeah.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geuyeah = "C:\\Users\\Admin\\geuyeah.exe /X" geuyeah.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geuyeah = "C:\\Users\\Admin\\geuyeah.exe /t" geuyeah.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geuyeah = "C:\\Users\\Admin\\geuyeah.exe /O" geuyeah.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geuyeah = "C:\\Users\\Admin\\geuyeah.exe /v" geuyeah.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geuyeah = "C:\\Users\\Admin\\geuyeah.exe /N" geuyeah.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geuyeah = "C:\\Users\\Admin\\geuyeah.exe /h" geuyeah.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geuyeah = "C:\\Users\\Admin\\geuyeah.exe /a" geuyeah.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geuyeah = "C:\\Users\\Admin\\geuyeah.exe /H" geuyeah.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geuyeah = "C:\\Users\\Admin\\geuyeah.exe /F" geuyeah.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geuyeah = "C:\\Users\\Admin\\geuyeah.exe /Q" geuyeah.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
geuyeah.exepid process 3120 geuyeah.exe 3120 geuyeah.exe 3120 geuyeah.exe 3120 geuyeah.exe 3120 geuyeah.exe 3120 geuyeah.exe 3120 geuyeah.exe 3120 geuyeah.exe 3120 geuyeah.exe 3120 geuyeah.exe 3120 geuyeah.exe 3120 geuyeah.exe 3120 geuyeah.exe 3120 geuyeah.exe 3120 geuyeah.exe 3120 geuyeah.exe 3120 geuyeah.exe 3120 geuyeah.exe 3120 geuyeah.exe 3120 geuyeah.exe 3120 geuyeah.exe 3120 geuyeah.exe 3120 geuyeah.exe 3120 geuyeah.exe 3120 geuyeah.exe 3120 geuyeah.exe 3120 geuyeah.exe 3120 geuyeah.exe 3120 geuyeah.exe 3120 geuyeah.exe 3120 geuyeah.exe 3120 geuyeah.exe 3120 geuyeah.exe 3120 geuyeah.exe 3120 geuyeah.exe 3120 geuyeah.exe 3120 geuyeah.exe 3120 geuyeah.exe 3120 geuyeah.exe 3120 geuyeah.exe 3120 geuyeah.exe 3120 geuyeah.exe 3120 geuyeah.exe 3120 geuyeah.exe 3120 geuyeah.exe 3120 geuyeah.exe 3120 geuyeah.exe 3120 geuyeah.exe 3120 geuyeah.exe 3120 geuyeah.exe 3120 geuyeah.exe 3120 geuyeah.exe 3120 geuyeah.exe 3120 geuyeah.exe 3120 geuyeah.exe 3120 geuyeah.exe 3120 geuyeah.exe 3120 geuyeah.exe 3120 geuyeah.exe 3120 geuyeah.exe 3120 geuyeah.exe 3120 geuyeah.exe 3120 geuyeah.exe 3120 geuyeah.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exegeuyeah.exepid process 2444 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe 3120 geuyeah.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exegeuyeah.exedescription pid process target process PID 2444 wrote to memory of 3120 2444 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe geuyeah.exe PID 2444 wrote to memory of 3120 2444 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe geuyeah.exe PID 2444 wrote to memory of 3120 2444 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe geuyeah.exe PID 3120 wrote to memory of 2444 3120 geuyeah.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe PID 3120 wrote to memory of 2444 3120 geuyeah.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe PID 3120 wrote to memory of 2444 3120 geuyeah.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe PID 3120 wrote to memory of 2444 3120 geuyeah.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe PID 3120 wrote to memory of 2444 3120 geuyeah.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe PID 3120 wrote to memory of 2444 3120 geuyeah.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe PID 3120 wrote to memory of 2444 3120 geuyeah.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe PID 3120 wrote to memory of 2444 3120 geuyeah.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe PID 3120 wrote to memory of 2444 3120 geuyeah.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe PID 3120 wrote to memory of 2444 3120 geuyeah.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe PID 3120 wrote to memory of 2444 3120 geuyeah.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe PID 3120 wrote to memory of 2444 3120 geuyeah.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe PID 3120 wrote to memory of 2444 3120 geuyeah.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe PID 3120 wrote to memory of 2444 3120 geuyeah.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe PID 3120 wrote to memory of 2444 3120 geuyeah.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe PID 3120 wrote to memory of 2444 3120 geuyeah.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe PID 3120 wrote to memory of 2444 3120 geuyeah.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe PID 3120 wrote to memory of 2444 3120 geuyeah.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe PID 3120 wrote to memory of 2444 3120 geuyeah.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe PID 3120 wrote to memory of 2444 3120 geuyeah.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe PID 3120 wrote to memory of 2444 3120 geuyeah.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe PID 3120 wrote to memory of 2444 3120 geuyeah.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe PID 3120 wrote to memory of 2444 3120 geuyeah.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe PID 3120 wrote to memory of 2444 3120 geuyeah.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe PID 3120 wrote to memory of 2444 3120 geuyeah.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe PID 3120 wrote to memory of 2444 3120 geuyeah.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe PID 3120 wrote to memory of 2444 3120 geuyeah.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe PID 3120 wrote to memory of 2444 3120 geuyeah.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe PID 3120 wrote to memory of 2444 3120 geuyeah.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe PID 3120 wrote to memory of 2444 3120 geuyeah.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe PID 3120 wrote to memory of 2444 3120 geuyeah.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe PID 3120 wrote to memory of 2444 3120 geuyeah.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe PID 3120 wrote to memory of 2444 3120 geuyeah.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe PID 3120 wrote to memory of 2444 3120 geuyeah.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe PID 3120 wrote to memory of 2444 3120 geuyeah.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe PID 3120 wrote to memory of 2444 3120 geuyeah.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe PID 3120 wrote to memory of 2444 3120 geuyeah.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe PID 3120 wrote to memory of 2444 3120 geuyeah.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe PID 3120 wrote to memory of 2444 3120 geuyeah.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe PID 3120 wrote to memory of 2444 3120 geuyeah.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe PID 3120 wrote to memory of 2444 3120 geuyeah.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe PID 3120 wrote to memory of 2444 3120 geuyeah.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe PID 3120 wrote to memory of 2444 3120 geuyeah.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe PID 3120 wrote to memory of 2444 3120 geuyeah.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe PID 3120 wrote to memory of 2444 3120 geuyeah.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe PID 3120 wrote to memory of 2444 3120 geuyeah.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe PID 3120 wrote to memory of 2444 3120 geuyeah.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe PID 3120 wrote to memory of 2444 3120 geuyeah.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe PID 3120 wrote to memory of 2444 3120 geuyeah.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe PID 3120 wrote to memory of 2444 3120 geuyeah.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe PID 3120 wrote to memory of 2444 3120 geuyeah.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe PID 3120 wrote to memory of 2444 3120 geuyeah.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe PID 3120 wrote to memory of 2444 3120 geuyeah.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe PID 3120 wrote to memory of 2444 3120 geuyeah.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe PID 3120 wrote to memory of 2444 3120 geuyeah.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe PID 3120 wrote to memory of 2444 3120 geuyeah.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe PID 3120 wrote to memory of 2444 3120 geuyeah.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe PID 3120 wrote to memory of 2444 3120 geuyeah.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe PID 3120 wrote to memory of 2444 3120 geuyeah.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe PID 3120 wrote to memory of 2444 3120 geuyeah.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe PID 3120 wrote to memory of 2444 3120 geuyeah.exe 7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe"C:\Users\Admin\AppData\Local\Temp\7aaf1e24e15699ba7ab4ea7e0453e26b76e03b9e40175f444b29474da276e0c4.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Users\Admin\geuyeah.exe"C:\Users\Admin\geuyeah.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3120
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
252KB
MD5eb46a2fbdb236d71e7a2552063559085
SHA1f33960c42939b2ee68c6d69b9787d71a7c8249c3
SHA256ebe05bf9a49374da9df0763d408bcfd5cbb31172bcb0dc27a58a44e001d00131
SHA51281249d364906406214129c13ccc2a79d8d940f6ba89b502f75a88822bb3d16d9eb705f89c4ef1a2483a7b7946f8ce383c634829e887daa0d812bbf95896b9a3c
-
Filesize
252KB
MD5eb46a2fbdb236d71e7a2552063559085
SHA1f33960c42939b2ee68c6d69b9787d71a7c8249c3
SHA256ebe05bf9a49374da9df0763d408bcfd5cbb31172bcb0dc27a58a44e001d00131
SHA51281249d364906406214129c13ccc2a79d8d940f6ba89b502f75a88822bb3d16d9eb705f89c4ef1a2483a7b7946f8ce383c634829e887daa0d812bbf95896b9a3c