Analysis
-
max time kernel
127s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
12-11-2023 23:19
Behavioral task
behavioral1
Sample
NEAS.5305d802ba1082c7d4c585c4db972810.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.5305d802ba1082c7d4c585c4db972810.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.5305d802ba1082c7d4c585c4db972810.exe
-
Size
289KB
-
MD5
5305d802ba1082c7d4c585c4db972810
-
SHA1
301a9f40463b0761a13b253b9a9a5f69637eff8c
-
SHA256
62404a4e093cbea6649d1cd97bfe10ee8dd94179efe1f3d4928611f130ff3598
-
SHA512
324adc250e4a66359fc354958e6b53aee451a9685fba847da7ae11a8dd2e75637f83fa824b30b83fb72b922bbbd63510cc479117fb6a9488da65273e2f66a993
-
SSDEEP
6144:psyWVAPU2aEEF+KMRErjBOrChaqsauMPkECzJLaQVbU5:pscU2aEguRteasklJLJbU5
Malware Config
Signatures
-
Malware Backdoor - Berbew 43 IoCs
Berbew is a malware infection classified as a 'backdoor' Trojan. This malicious program's primary function is to cause chain infections - it can download/install additional malware such as other Trojans, ransomware, and cryptominers.
resource yara_rule behavioral2/files/0x0006000000022ce4-9.dat family_berbew behavioral2/files/0x0006000000022ce4-11.dat family_berbew behavioral2/files/0x000a000000022cec-12.dat family_berbew behavioral2/files/0x000a000000022cec-20.dat family_berbew behavioral2/files/0x000a000000022cec-21.dat family_berbew behavioral2/files/0x0006000000022cf7-31.dat family_berbew behavioral2/files/0x0006000000022cf7-32.dat family_berbew behavioral2/files/0x0006000000022cfd-43.dat family_berbew behavioral2/files/0x0006000000022cfd-42.dat family_berbew behavioral2/files/0x0006000000022d03-54.dat family_berbew behavioral2/files/0x0006000000022d03-55.dat family_berbew behavioral2/files/0x0002000000022307-70.dat family_berbew behavioral2/files/0x0002000000022307-71.dat family_berbew behavioral2/files/0x0005000000022308-81.dat family_berbew behavioral2/files/0x0005000000022308-83.dat family_berbew behavioral2/files/0x0008000000022cf2-93.dat family_berbew behavioral2/files/0x0008000000022cf2-92.dat family_berbew behavioral2/files/0x000f000000022bfb-105.dat family_berbew behavioral2/files/0x000f000000022bfb-104.dat family_berbew behavioral2/files/0x000e000000022cf4-116.dat family_berbew behavioral2/files/0x000e000000022cf4-118.dat family_berbew behavioral2/files/0x000a000000022cfc-130.dat family_berbew behavioral2/files/0x000a000000022cfc-128.dat family_berbew behavioral2/files/0x0013000000022ced-140.dat family_berbew behavioral2/files/0x0013000000022ced-141.dat family_berbew behavioral2/files/0x0015000000022cf1-152.dat family_berbew behavioral2/files/0x0015000000022cf1-154.dat family_berbew behavioral2/files/0x0012000000022cf0-164.dat family_berbew behavioral2/files/0x0012000000022cf0-165.dat family_berbew behavioral2/files/0x0013000000022cf6-177.dat family_berbew behavioral2/files/0x0013000000022cf6-176.dat family_berbew behavioral2/files/0x0009000000022d09-190.dat family_berbew behavioral2/files/0x0009000000022d09-188.dat family_berbew behavioral2/files/0x0011000000022d00-201.dat family_berbew behavioral2/files/0x0011000000022d00-203.dat family_berbew behavioral2/files/0x0012000000022d05-213.dat family_berbew behavioral2/files/0x0012000000022d05-212.dat family_berbew behavioral2/files/0x0013000000022cfe-225.dat family_berbew behavioral2/files/0x0013000000022cfe-227.dat family_berbew behavioral2/files/0x0016000000022d06-237.dat family_berbew behavioral2/files/0x0016000000022d06-236.dat family_berbew behavioral2/files/0x0011000000022d0a-248.dat family_berbew behavioral2/files/0x0011000000022d0a-249.dat family_berbew -
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation QXUWJ.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation FNYIWPE.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation RSMD.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation HWSL.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation LII.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation FPLN.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation MNPTZ.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation ZCYSU.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation AVANI.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation VUTH.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation XJXWF.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation FBKXP.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation CYGTYBP.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation USSKNP.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation DTTLGUZ.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation AYYA.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation CLFQ.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation IVGD.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation NEAS.5305d802ba1082c7d4c585c4db972810.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation JLSCWXP.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation YREA.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation JOBDWG.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation GKPJ.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation CDIIPO.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation XYR.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation ARXJN.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation SUACAQP.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation AYM.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation UXT.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation XTDO.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation SJNAA.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation OKEKRF.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation HBD.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation FBPWXQ.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation NWNAI.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation NSZN.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation BDR.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation TUWXW.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation CUCS.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation KRS.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation KMDA.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation VKNPS.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation AQN.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation NVMY.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation TMAAZNV.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation YKWQJSN.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation TEJZWM.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation XPGXW.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation QBPRB.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation DIQSK.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation HTBFT.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation RAXP.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation ZLO.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation XHGBAZR.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation AMILOB.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation UHQQQBA.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation JQHR.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation TJOHO.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation CXOFVZK.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation MHXBDGJ.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation NYJ.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation HSHHG.exe -
Executes dropped EXE 64 IoCs
pid Process 2260 CXOFVZK.exe 4048 HBD.exe 1768 TMAAZNV.exe 4536 FPLN.exe 4580 JLSCWXP.exe 1684 QXUWJ.exe 2172 DIQSK.exe 2916 HTBFT.exe 4848 YREA.exe 4192 MNPTZ.exe 3244 BDR.exe 4300 DTTLGUZ.exe 3692 TUWXW.exe 1736 cmd.exe 1400 AYM.exe 4524 XJXWF.exe 5040 UXT.exe 2584 FBKXP.exe 940 CUCS.exe 312 YKWQJSN.exe 1520 AYYA.exe 1676 JOBDWG.exe 1664 GKPJ.exe 2228 QADWJMS.exe 3144 KRS.exe 4552 ZCYSU.exe 3140 CDIIPO.exe 4524 XTDO.exe 3948 TEJZWM.exe 1056 RAXP.exe 2904 SJNAA.exe 2612 URDDLKI.exe 2056 AVANI.exe 4560 FBPWXQ.exe 3656 ARXJN.exe 3568 FNYIWPE.exe 4672 OKEKRF.exe 4572 ZLO.exe 1644 MHXBDGJ.exe 4036 VKNPS.exe 4044 AQN.exe 4048 NWNAI.exe 5016 XHGBAZR.exe 2228 Conhost.exe 2892 KMDA.exe 548 WerFault.exe 4684 NSZN.exe 436 CLFQ.exe 3568 SUACAQP.exe 4672 Conhost.exe 2584 NYJ.exe 3060 CYGTYBP.exe 2032 VUTH.exe 1384 HSHHG.exe 4424 NVMY.exe 1408 AMILOB.exe 3596 LII.exe 3384 RSMD.exe 1528 HWSL.exe 184 UHQQQBA.exe 1680 WerFault.exe 1400 IVGD.exe 2372 NRYKJG.exe 2240 WPSMUK.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\windows\SysWOW64\KZWU.exe QBPRB.exe File created C:\windows\SysWOW64\MNPTZ.exe YREA.exe File created C:\windows\SysWOW64\TEJZWM.exe XTDO.exe File opened for modification C:\windows\SysWOW64\MHXBDGJ.exe ZLO.exe File created C:\windows\SysWOW64\MNPTZ.exe.bat YREA.exe File created C:\windows\SysWOW64\AVANI.exe URDDLKI.exe File created C:\windows\SysWOW64\NVMY.exe.bat HSHHG.exe File created C:\windows\SysWOW64\UXT.exe.bat XJXWF.exe File created C:\windows\SysWOW64\JOBDWG.exe AYYA.exe File created C:\windows\SysWOW64\SUACAQP.exe CLFQ.exe File created C:\windows\SysWOW64\CYGTYBP.exe NYJ.exe File opened for modification C:\windows\SysWOW64\HSHHG.exe VUTH.exe File created C:\windows\SysWOW64\JOBDWG.exe.bat AYYA.exe File created C:\windows\SysWOW64\FNYIWPE.exe.bat ARXJN.exe File created C:\windows\SysWOW64\VFNBZ.exe SUACAQP.exe File opened for modification C:\windows\SysWOW64\NVMY.exe HSHHG.exe File opened for modification C:\windows\SysWOW64\MNPTZ.exe YREA.exe File created C:\windows\SysWOW64\DTTLGUZ.exe BDR.exe File opened for modification C:\windows\SysWOW64\AVANI.exe URDDLKI.exe File created C:\windows\SysWOW64\MHXBDGJ.exe.bat ZLO.exe File opened for modification C:\windows\SysWOW64\YKWQJSN.exe CUCS.exe File created C:\windows\SysWOW64\CDIIPO.exe ZCYSU.exe File created C:\windows\SysWOW64\AVANI.exe.bat URDDLKI.exe File opened for modification C:\windows\SysWOW64\FBPWXQ.exe AVANI.exe File opened for modification C:\windows\SysWOW64\FNYIWPE.exe ARXJN.exe File created C:\windows\SysWOW64\HTBFT.exe DIQSK.exe File opened for modification C:\windows\SysWOW64\HTBFT.exe DIQSK.exe File created C:\windows\SysWOW64\UXT.exe XJXWF.exe File created C:\windows\SysWOW64\CYGTYBP.exe.bat NYJ.exe File opened for modification C:\windows\SysWOW64\FBKXP.exe UXT.exe File created C:\windows\SysWOW64\ZCYSU.exe KRS.exe File created C:\windows\SysWOW64\VFNBZ.exe.bat SUACAQP.exe File opened for modification C:\windows\SysWOW64\ZCYSU.exe KRS.exe File created C:\windows\SysWOW64\HSHHG.exe VUTH.exe File created C:\windows\SysWOW64\NVMY.exe HSHHG.exe File created C:\windows\SysWOW64\TMAAZNV.exe HBD.exe File created C:\windows\SysWOW64\FBKXP.exe.bat UXT.exe File opened for modification C:\windows\SysWOW64\JOBDWG.exe AYYA.exe File created C:\windows\SysWOW64\TEJZWM.exe.bat XTDO.exe File opened for modification C:\windows\SysWOW64\CYGTYBP.exe NYJ.exe File created C:\windows\SysWOW64\HSHHG.exe.bat VUTH.exe File opened for modification C:\windows\SysWOW64\TMAAZNV.exe HBD.exe File created C:\windows\SysWOW64\TMAAZNV.exe.bat HBD.exe File opened for modification C:\windows\SysWOW64\CDIIPO.exe ZCYSU.exe File created C:\windows\SysWOW64\YKWQJSN.exe.bat CUCS.exe File created C:\windows\SysWOW64\WPSMUK.exe NRYKJG.exe File opened for modification C:\windows\SysWOW64\WPSMUK.exe NRYKJG.exe File created C:\windows\SysWOW64\KZWU.exe.bat QBPRB.exe File created C:\windows\SysWOW64\DTTLGUZ.exe.bat BDR.exe File opened for modification C:\windows\SysWOW64\UXT.exe XJXWF.exe File created C:\windows\SysWOW64\YKWQJSN.exe CUCS.exe File created C:\windows\SysWOW64\KZWU.exe QBPRB.exe File created C:\windows\SysWOW64\CDIIPO.exe.bat ZCYSU.exe File created C:\windows\SysWOW64\FBPWXQ.exe AVANI.exe File created C:\windows\SysWOW64\FBPWXQ.exe.bat AVANI.exe File created C:\windows\SysWOW64\FBKXP.exe UXT.exe File opened for modification C:\windows\SysWOW64\TEJZWM.exe XTDO.exe File opened for modification C:\windows\SysWOW64\VFNBZ.exe SUACAQP.exe File created C:\windows\SysWOW64\MHXBDGJ.exe ZLO.exe File opened for modification C:\windows\SysWOW64\SUACAQP.exe CLFQ.exe File created C:\windows\SysWOW64\SUACAQP.exe.bat CLFQ.exe File opened for modification C:\windows\SysWOW64\DTTLGUZ.exe BDR.exe File created C:\windows\SysWOW64\FNYIWPE.exe ARXJN.exe File created C:\windows\SysWOW64\CXOFVZK.exe NEAS.5305d802ba1082c7d4c585c4db972810.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\windows\system\XJXWF.exe.bat AYM.exe File created C:\windows\system\CUCS.exe FBKXP.exe File created C:\windows\system\CUCS.exe.bat FBKXP.exe File created C:\windows\RAXP.exe.bat TEJZWM.exe File opened for modification C:\windows\system\CLFQ.exe NSZN.exe File created C:\windows\system\TJOHO.exe cmd.exe File created C:\windows\system\TJOHO.exe.bat cmd.exe File opened for modification C:\windows\system\XPGXW.exe TJOHO.exe File created C:\windows\system\YREA.exe HTBFT.exe File opened for modification C:\windows\system\GKPJ.exe JOBDWG.exe File created C:\windows\system\SJNAA.exe RAXP.exe File created C:\windows\system\AQN.exe VKNPS.exe File opened for modification C:\windows\system\IVGD.exe WerFault.exe File opened for modification C:\windows\system\USSKNP.exe WPSMUK.exe File created C:\windows\system\DIQSK.exe.bat QXUWJ.exe File opened for modification C:\windows\system\XJXWF.exe AYM.exe File opened for modification C:\windows\system\AQN.exe VKNPS.exe File created C:\windows\XHGBAZR.exe NWNAI.exe File created C:\windows\system\KMDA.exe.bat Conhost.exe File created C:\windows\system\USSKNP.exe WPSMUK.exe File created C:\windows\JQHR.exe KZWU.exe File created C:\windows\system\UTAJ.exe.bat XPGXW.exe File created C:\windows\system\FPLN.exe TMAAZNV.exe File opened for modification C:\windows\system\JLSCWXP.exe FPLN.exe File created C:\windows\system\TUWXW.exe DTTLGUZ.exe File created C:\windows\system\ARXJN.exe FBPWXQ.exe File created C:\windows\system\CLFQ.exe.bat NSZN.exe File created C:\windows\system\XJXWF.exe AYM.exe File opened for modification C:\windows\AYYA.exe YKWQJSN.exe File created C:\windows\RAXP.exe TEJZWM.exe File created C:\windows\LII.exe.bat AMILOB.exe File opened for modification C:\windows\system\TRHX.exe XYR.exe File created C:\windows\system\DIQSK.exe QXUWJ.exe File created C:\windows\system\AYM.exe cmd.exe File opened for modification C:\windows\system\KRS.exe QADWJMS.exe File created C:\windows\XTDO.exe.bat CDIIPO.exe File opened for modification C:\windows\system\ZLO.exe OKEKRF.exe File opened for modification C:\windows\system\OKEKRF.exe FNYIWPE.exe File created C:\windows\system\XYR.exe USSKNP.exe File created C:\windows\system\HBD.exe.bat CXOFVZK.exe File created C:\windows\system\FPLN.exe.bat TMAAZNV.exe File opened for modification C:\windows\QADWJMS.exe GKPJ.exe File created C:\windows\QADWJMS.exe.bat GKPJ.exe File opened for modification C:\windows\XTDO.exe CDIIPO.exe File created C:\windows\system\QXUWJ.exe.bat JLSCWXP.exe File created C:\windows\system\NSZN.exe WerFault.exe File created C:\windows\AMILOB.exe.bat NVMY.exe File created C:\windows\system\OKEKRF.exe FNYIWPE.exe File opened for modification C:\windows\JQHR.exe KZWU.exe File created C:\windows\system\XPGXW.exe TJOHO.exe File created C:\windows\system\AYM.exe.bat cmd.exe File created C:\windows\system\KMDA.exe Conhost.exe File created C:\windows\NYJ.exe Conhost.exe File opened for modification C:\windows\LII.exe AMILOB.exe File created C:\windows\system\USSKNP.exe.bat WPSMUK.exe File opened for modification C:\windows\system\CUCS.exe FBKXP.exe File created C:\windows\QADWJMS.exe GKPJ.exe File opened for modification C:\windows\NRYKJG.exe IVGD.exe File opened for modification C:\windows\system\VKNPS.exe MHXBDGJ.exe File created C:\windows\system\TRHX.exe XYR.exe File created C:\windows\system\IBK.exe.bat JQHR.exe File opened for modification C:\windows\system\UTAJ.exe XPGXW.exe File opened for modification C:\windows\system\FPLN.exe TMAAZNV.exe File opened for modification C:\windows\NYJ.exe Conhost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 64 IoCs
pid pid_target Process procid_target 4520 2468 WerFault.exe 85 2288 2260 WerFault.exe 94 4600 4048 WerFault.exe 100 1912 1768 WerFault.exe 105 864 1684 WerFault.exe 118 4728 2172 WerFault.exe 123 3076 2916 WerFault.exe 128 336 4848 WerFault.exe 133 2216 4192 WerFault.exe 140 2380 3244 WerFault.exe 145 1528 4300 WerFault.exe 150 4264 3692 WerFault.exe 158 5028 1736 WerFault.exe 164 408 1400 WerFault.exe 169 2572 4524 WerFault.exe 176 1916 5040 WerFault.exe 181 1896 2584 WerFault.exe 186 1984 940 WerFault.exe 191 3204 312 WerFault.exe 196 4548 1520 WerFault.exe 201 1360 1676 WerFault.exe 206 4036 1664 WerFault.exe 211 1484 2228 WerFault.exe 216 3516 3144 WerFault.exe 221 4504 4552 WerFault.exe 226 2104 3140 WerFault.exe 231 4708 4524 WerFault.exe 236 1764 3948 WerFault.exe 241 1640 1056 WerFault.exe 246 2120 2904 WerFault.exe 251 1368 2612 WerFault.exe 256 1868 2056 WerFault.exe 261 4988 4560 WerFault.exe 266 1816 3656 WerFault.exe 271 2820 3568 WerFault.exe 276 3516 4672 WerFault.exe 281 772 4572 WerFault.exe 286 2104 1644 WerFault.exe 291 4824 4036 WerFault.exe 296 1664 4044 WerFault.exe 301 3144 4048 WerFault.exe 306 644 5016 WerFault.exe 311 3516 2228 WerFault.exe 316 2928 2892 WerFault.exe 321 260 548 WerFault.exe 326 4004 4684 WerFault.exe 332 1896 436 WerFault.exe 337 1564 3568 WerFault.exe 342 1472 4672 WerFault.exe 347 2960 2584 WerFault.exe 352 4868 3060 WerFault.exe 357 4564 2032 WerFault.exe 362 1100 1384 WerFault.exe 367 5044 4424 WerFault.exe 372 1224 1408 WerFault.exe 377 2472 3596 WerFault.exe 382 4312 3384 WerFault.exe 387 1716 1528 WerFault.exe 392 4972 184 WerFault.exe 397 4288 1680 WerFault.exe 402 3064 1400 WerFault.exe 407 4520 2372 WerFault.exe 412 4032 2240 WerFault.exe 417 260 2956 WerFault.exe 422 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2468 NEAS.5305d802ba1082c7d4c585c4db972810.exe 2468 NEAS.5305d802ba1082c7d4c585c4db972810.exe 2260 CXOFVZK.exe 2260 CXOFVZK.exe 4048 HBD.exe 4048 HBD.exe 1768 TMAAZNV.exe 1768 TMAAZNV.exe 4536 FPLN.exe 4536 FPLN.exe 4580 JLSCWXP.exe 4580 JLSCWXP.exe 1684 QXUWJ.exe 1684 QXUWJ.exe 2172 DIQSK.exe 2172 DIQSK.exe 2916 HTBFT.exe 2916 HTBFT.exe 4848 YREA.exe 4848 YREA.exe 4192 MNPTZ.exe 4192 MNPTZ.exe 3244 BDR.exe 3244 BDR.exe 4300 DTTLGUZ.exe 4300 DTTLGUZ.exe 3692 TUWXW.exe 3692 TUWXW.exe 1736 cmd.exe 1736 cmd.exe 1400 AYM.exe 1400 AYM.exe 4524 XJXWF.exe 4524 XJXWF.exe 5040 UXT.exe 5040 UXT.exe 2584 FBKXP.exe 2584 FBKXP.exe 940 CUCS.exe 940 CUCS.exe 312 YKWQJSN.exe 312 YKWQJSN.exe 1520 AYYA.exe 1520 AYYA.exe 1676 JOBDWG.exe 1676 JOBDWG.exe 1664 GKPJ.exe 1664 GKPJ.exe 2228 QADWJMS.exe 2228 QADWJMS.exe 3144 KRS.exe 3144 KRS.exe 4552 ZCYSU.exe 4552 ZCYSU.exe 3140 CDIIPO.exe 3140 CDIIPO.exe 4524 XTDO.exe 4524 XTDO.exe 3948 TEJZWM.exe 3948 TEJZWM.exe 1056 RAXP.exe 1056 RAXP.exe 2904 SJNAA.exe 2904 SJNAA.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 2468 NEAS.5305d802ba1082c7d4c585c4db972810.exe 2468 NEAS.5305d802ba1082c7d4c585c4db972810.exe 2260 CXOFVZK.exe 2260 CXOFVZK.exe 4048 HBD.exe 4048 HBD.exe 1768 TMAAZNV.exe 1768 TMAAZNV.exe 4536 FPLN.exe 4536 FPLN.exe 4580 JLSCWXP.exe 4580 JLSCWXP.exe 1684 QXUWJ.exe 1684 QXUWJ.exe 2172 DIQSK.exe 2172 DIQSK.exe 2916 HTBFT.exe 2916 HTBFT.exe 4848 YREA.exe 4848 YREA.exe 4192 MNPTZ.exe 4192 MNPTZ.exe 3244 BDR.exe 3244 BDR.exe 4300 DTTLGUZ.exe 4300 DTTLGUZ.exe 3692 TUWXW.exe 3692 TUWXW.exe 1736 cmd.exe 1736 cmd.exe 1400 AYM.exe 1400 AYM.exe 4524 XJXWF.exe 4524 XJXWF.exe 5040 UXT.exe 5040 UXT.exe 2584 FBKXP.exe 2584 FBKXP.exe 940 CUCS.exe 940 CUCS.exe 312 YKWQJSN.exe 312 YKWQJSN.exe 1520 AYYA.exe 1520 AYYA.exe 1676 JOBDWG.exe 1676 JOBDWG.exe 1664 GKPJ.exe 1664 GKPJ.exe 2228 QADWJMS.exe 2228 QADWJMS.exe 3144 KRS.exe 3144 KRS.exe 4552 ZCYSU.exe 4552 ZCYSU.exe 3140 CDIIPO.exe 3140 CDIIPO.exe 4524 XTDO.exe 4524 XTDO.exe 3948 TEJZWM.exe 3948 TEJZWM.exe 1056 RAXP.exe 1056 RAXP.exe 2904 SJNAA.exe 2904 SJNAA.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2468 wrote to memory of 2888 2468 NEAS.5305d802ba1082c7d4c585c4db972810.exe 91 PID 2468 wrote to memory of 2888 2468 NEAS.5305d802ba1082c7d4c585c4db972810.exe 91 PID 2468 wrote to memory of 2888 2468 NEAS.5305d802ba1082c7d4c585c4db972810.exe 91 PID 2888 wrote to memory of 2260 2888 cmd.exe 94 PID 2888 wrote to memory of 2260 2888 cmd.exe 94 PID 2888 wrote to memory of 2260 2888 cmd.exe 94 PID 2260 wrote to memory of 1508 2260 CXOFVZK.exe 96 PID 2260 wrote to memory of 1508 2260 CXOFVZK.exe 96 PID 2260 wrote to memory of 1508 2260 CXOFVZK.exe 96 PID 1508 wrote to memory of 4048 1508 cmd.exe 100 PID 1508 wrote to memory of 4048 1508 cmd.exe 100 PID 1508 wrote to memory of 4048 1508 cmd.exe 100 PID 4048 wrote to memory of 2212 4048 HBD.exe 101 PID 4048 wrote to memory of 2212 4048 HBD.exe 101 PID 4048 wrote to memory of 2212 4048 HBD.exe 101 PID 2212 wrote to memory of 1768 2212 cmd.exe 105 PID 2212 wrote to memory of 1768 2212 cmd.exe 105 PID 2212 wrote to memory of 1768 2212 cmd.exe 105 PID 1768 wrote to memory of 3112 1768 TMAAZNV.exe 106 PID 1768 wrote to memory of 3112 1768 TMAAZNV.exe 106 PID 1768 wrote to memory of 3112 1768 TMAAZNV.exe 106 PID 3112 wrote to memory of 4536 3112 cmd.exe 110 PID 3112 wrote to memory of 4536 3112 cmd.exe 110 PID 3112 wrote to memory of 4536 3112 cmd.exe 110 PID 4536 wrote to memory of 1408 4536 FPLN.exe 111 PID 4536 wrote to memory of 1408 4536 FPLN.exe 111 PID 4536 wrote to memory of 1408 4536 FPLN.exe 111 PID 1408 wrote to memory of 4580 1408 cmd.exe 114 PID 1408 wrote to memory of 4580 1408 cmd.exe 114 PID 1408 wrote to memory of 4580 1408 cmd.exe 114 PID 4580 wrote to memory of 2752 4580 JLSCWXP.exe 115 PID 4580 wrote to memory of 2752 4580 JLSCWXP.exe 115 PID 4580 wrote to memory of 2752 4580 JLSCWXP.exe 115 PID 2752 wrote to memory of 1684 2752 cmd.exe 118 PID 2752 wrote to memory of 1684 2752 cmd.exe 118 PID 2752 wrote to memory of 1684 2752 cmd.exe 118 PID 1684 wrote to memory of 1368 1684 QXUWJ.exe 119 PID 1684 wrote to memory of 1368 1684 QXUWJ.exe 119 PID 1684 wrote to memory of 1368 1684 QXUWJ.exe 119 PID 1368 wrote to memory of 2172 1368 cmd.exe 123 PID 1368 wrote to memory of 2172 1368 cmd.exe 123 PID 1368 wrote to memory of 2172 1368 cmd.exe 123 PID 2172 wrote to memory of 4864 2172 DIQSK.exe 124 PID 2172 wrote to memory of 4864 2172 DIQSK.exe 124 PID 2172 wrote to memory of 4864 2172 DIQSK.exe 124 PID 4864 wrote to memory of 2916 4864 cmd.exe 128 PID 4864 wrote to memory of 2916 4864 cmd.exe 128 PID 4864 wrote to memory of 2916 4864 cmd.exe 128 PID 2916 wrote to memory of 4272 2916 HTBFT.exe 129 PID 2916 wrote to memory of 4272 2916 HTBFT.exe 129 PID 2916 wrote to memory of 4272 2916 HTBFT.exe 129 PID 4272 wrote to memory of 4848 4272 cmd.exe 133 PID 4272 wrote to memory of 4848 4272 cmd.exe 133 PID 4272 wrote to memory of 4848 4272 cmd.exe 133 PID 4848 wrote to memory of 3112 4848 YREA.exe 165 PID 4848 wrote to memory of 3112 4848 YREA.exe 165 PID 4848 wrote to memory of 3112 4848 YREA.exe 165 PID 3112 wrote to memory of 4192 3112 cmd.exe 140 PID 3112 wrote to memory of 4192 3112 cmd.exe 140 PID 3112 wrote to memory of 4192 3112 cmd.exe 140 PID 4192 wrote to memory of 5044 4192 MNPTZ.exe 141 PID 4192 wrote to memory of 5044 4192 MNPTZ.exe 141 PID 4192 wrote to memory of 5044 4192 MNPTZ.exe 141 PID 5044 wrote to memory of 3244 5044 cmd.exe 145
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.5305d802ba1082c7d4c585c4db972810.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.5305d802ba1082c7d4c585c4db972810.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\CXOFVZK.exe.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\windows\SysWOW64\CXOFVZK.exeC:\windows\system32\CXOFVZK.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\HBD.exe.bat" "4⤵
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\windows\system\HBD.exeC:\windows\system\HBD.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4048 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\TMAAZNV.exe.bat" "6⤵
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\windows\SysWOW64\TMAAZNV.exeC:\windows\system32\TMAAZNV.exe7⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\FPLN.exe.bat" "8⤵
- Suspicious use of WriteProcessMemory
PID:3112 -
C:\windows\system\FPLN.exeC:\windows\system\FPLN.exe9⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4536 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\JLSCWXP.exe.bat" "10⤵
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\windows\system\JLSCWXP.exeC:\windows\system\JLSCWXP.exe11⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4580 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\QXUWJ.exe.bat" "12⤵
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\windows\system\QXUWJ.exeC:\windows\system\QXUWJ.exe13⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\DIQSK.exe.bat" "14⤵
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\windows\system\DIQSK.exeC:\windows\system\DIQSK.exe15⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\HTBFT.exe.bat" "16⤵
- Suspicious use of WriteProcessMemory
PID:4864 -
C:\windows\SysWOW64\HTBFT.exeC:\windows\system32\HTBFT.exe17⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\YREA.exe.bat" "18⤵
- Suspicious use of WriteProcessMemory
PID:4272 -
C:\windows\system\YREA.exeC:\windows\system\YREA.exe19⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\MNPTZ.exe.bat" "20⤵PID:3112
-
C:\windows\SysWOW64\MNPTZ.exeC:\windows\system32\MNPTZ.exe21⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4192 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\BDR.exe.bat" "22⤵
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\windows\BDR.exeC:\windows\BDR.exe23⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3244 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\DTTLGUZ.exe.bat" "24⤵PID:2260
-
C:\windows\SysWOW64\DTTLGUZ.exeC:\windows\system32\DTTLGUZ.exe25⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4300 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\TUWXW.exe.bat" "26⤵PID:4212
-
C:\windows\system\TUWXW.exeC:\windows\system\TUWXW.exe27⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3692 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\CFVW.exe.bat" "28⤵PID:1676
-
C:\windows\CFVW.exeC:\windows\CFVW.exe29⤵PID:1736
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\AYM.exe.bat" "30⤵
- Suspicious use of WriteProcessMemory
PID:3112 -
C:\windows\system\AYM.exeC:\windows\system\AYM.exe31⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1400 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\XJXWF.exe.bat" "32⤵PID:2612
-
C:\windows\system\XJXWF.exeC:\windows\system\XJXWF.exe33⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4524 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\UXT.exe.bat" "34⤵PID:5084
-
C:\windows\SysWOW64\UXT.exeC:\windows\system32\UXT.exe35⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5040 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\FBKXP.exe.bat" "36⤵PID:1348
-
C:\windows\SysWOW64\FBKXP.exeC:\windows\system32\FBKXP.exe37⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2584 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\CUCS.exe.bat" "38⤵PID:5044
-
C:\windows\system\CUCS.exeC:\windows\system\CUCS.exe39⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:940 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\YKWQJSN.exe.bat" "40⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1736 -
C:\windows\SysWOW64\YKWQJSN.exeC:\windows\system32\YKWQJSN.exe41⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:312 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\AYYA.exe.bat" "42⤵PID:4888
-
C:\windows\AYYA.exeC:\windows\AYYA.exe43⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1520 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\JOBDWG.exe.bat" "44⤵PID:1240
-
C:\windows\SysWOW64\JOBDWG.exeC:\windows\system32\JOBDWG.exe45⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1676 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\GKPJ.exe.bat" "46⤵PID:3612
-
C:\windows\system\GKPJ.exeC:\windows\system\GKPJ.exe47⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1664 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\QADWJMS.exe.bat" "48⤵PID:4916
-
C:\windows\QADWJMS.exeC:\windows\QADWJMS.exe49⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2228 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\KRS.exe.bat" "50⤵PID:1896
-
C:\windows\system\KRS.exeC:\windows\system\KRS.exe51⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3144 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\ZCYSU.exe.bat" "52⤵PID:4736
-
C:\windows\SysWOW64\ZCYSU.exeC:\windows\system32\ZCYSU.exe53⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4552 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\CDIIPO.exe.bat" "54⤵PID:3244
-
C:\windows\SysWOW64\CDIIPO.exeC:\windows\system32\CDIIPO.exe55⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3140 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\XTDO.exe.bat" "56⤵PID:3884
-
C:\windows\XTDO.exeC:\windows\XTDO.exe57⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4524 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\TEJZWM.exe.bat" "58⤵PID:1224
-
C:\windows\SysWOW64\TEJZWM.exeC:\windows\system32\TEJZWM.exe59⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3948 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\RAXP.exe.bat" "60⤵PID:2900
-
C:\windows\RAXP.exeC:\windows\RAXP.exe61⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1056 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\SJNAA.exe.bat" "62⤵PID:4320
-
C:\windows\system\SJNAA.exeC:\windows\system\SJNAA.exe63⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2904 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\URDDLKI.exe.bat" "64⤵PID:180
-
C:\windows\URDDLKI.exeC:\windows\URDDLKI.exe65⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2612 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\AVANI.exe.bat" "66⤵PID:2480
-
C:\windows\SysWOW64\AVANI.exeC:\windows\system32\AVANI.exe67⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:2056 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\FBPWXQ.exe.bat" "68⤵PID:2004
-
C:\windows\SysWOW64\FBPWXQ.exeC:\windows\system32\FBPWXQ.exe69⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:4560 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\ARXJN.exe.bat" "70⤵PID:3112
-
C:\windows\system\ARXJN.exeC:\windows\system\ARXJN.exe71⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:3656 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\FNYIWPE.exe.bat" "72⤵PID:2900
-
C:\windows\SysWOW64\FNYIWPE.exeC:\windows\system32\FNYIWPE.exe73⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:3568 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\OKEKRF.exe.bat" "74⤵PID:32
-
C:\windows\system\OKEKRF.exeC:\windows\system\OKEKRF.exe75⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:4672 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\ZLO.exe.bat" "76⤵PID:4860
-
C:\windows\system\ZLO.exeC:\windows\system\ZLO.exe77⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:4572 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\MHXBDGJ.exe.bat" "78⤵PID:5056
-
C:\windows\SysWOW64\MHXBDGJ.exeC:\windows\system32\MHXBDGJ.exe79⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:1644 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\VKNPS.exe.bat" "80⤵PID:3288
-
C:\windows\system\VKNPS.exeC:\windows\system\VKNPS.exe81⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:4036 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\AQN.exe.bat" "82⤵PID:4448
-
C:\windows\system\AQN.exeC:\windows\system\AQN.exe83⤵
- Checks computer location settings
- Executes dropped EXE
PID:4044 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\NWNAI.exe.bat" "84⤵PID:4988
-
C:\windows\system\NWNAI.exeC:\windows\system\NWNAI.exe85⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:4048 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\XHGBAZR.exe.bat" "86⤵PID:4920
-
C:\windows\XHGBAZR.exeC:\windows\XHGBAZR.exe87⤵
- Checks computer location settings
- Executes dropped EXE
PID:5016 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\USMNI.exe.bat" "88⤵PID:2260
-
C:\windows\system\USMNI.exeC:\windows\system\USMNI.exe89⤵PID:2228
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\KMDA.exe.bat" "90⤵PID:1564
-
C:\windows\system\KMDA.exeC:\windows\system\KMDA.exe91⤵
- Checks computer location settings
- Executes dropped EXE
PID:2892 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\OXNEV.exe.bat" "92⤵PID:4080
-
C:\windows\system\OXNEV.exeC:\windows\system\OXNEV.exe93⤵PID:548
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\NSZN.exe.bat" "94⤵PID:2104
-
C:\windows\system\NSZN.exeC:\windows\system\NSZN.exe95⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:4684 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\CLFQ.exe.bat" "96⤵PID:1612
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV197⤵PID:4988
-
-
C:\windows\system\CLFQ.exeC:\windows\system\CLFQ.exe97⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:436 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\SUACAQP.exe.bat" "98⤵PID:4524
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV199⤵PID:4860
-
-
C:\windows\SysWOW64\SUACAQP.exeC:\windows\system32\SUACAQP.exe99⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:3568 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\VFNBZ.exe.bat" "100⤵PID:320
-
C:\windows\SysWOW64\VFNBZ.exeC:\windows\system32\VFNBZ.exe101⤵PID:4672
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\NYJ.exe.bat" "102⤵PID:2612
-
C:\windows\NYJ.exeC:\windows\NYJ.exe103⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:2584 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\CYGTYBP.exe.bat" "104⤵PID:5028
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1105⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2228
-
-
C:\windows\SysWOW64\CYGTYBP.exeC:\windows\system32\CYGTYBP.exe105⤵
- Checks computer location settings
- Executes dropped EXE
PID:3060 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\VUTH.exe.bat" "106⤵PID:3140
-
C:\windows\VUTH.exeC:\windows\VUTH.exe107⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:2032 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\HSHHG.exe.bat" "108⤵PID:4572
-
C:\windows\SysWOW64\HSHHG.exeC:\windows\system32\HSHHG.exe109⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:1384 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\NVMY.exe.bat" "110⤵PID:1768
-
C:\windows\SysWOW64\NVMY.exeC:\windows\system32\NVMY.exe111⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:4424 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\AMILOB.exe.bat" "112⤵PID:3100
-
C:\windows\AMILOB.exeC:\windows\AMILOB.exe113⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:1408 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\LII.exe.bat" "114⤵PID:3132
-
C:\windows\LII.exeC:\windows\LII.exe115⤵
- Checks computer location settings
- Executes dropped EXE
PID:3596 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\RSMD.exe.bat" "116⤵PID:1472
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1117⤵PID:5028
-
-
C:\windows\RSMD.exeC:\windows\RSMD.exe117⤵
- Checks computer location settings
- Executes dropped EXE
PID:3384 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\HWSL.exe.bat" "118⤵PID:2140
-
C:\windows\system\HWSL.exeC:\windows\system\HWSL.exe119⤵
- Checks computer location settings
- Executes dropped EXE
PID:1528 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\UHQQQBA.exe.bat" "120⤵PID:4348
-
C:\windows\UHQQQBA.exeC:\windows\UHQQQBA.exe121⤵
- Checks computer location settings
- Executes dropped EXE
PID:184 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\LASXIK.exe.bat" "122⤵PID:1984
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-