Analysis Overview
SHA256
6c9f98c6af1ac1a565627ddfd2abc7e7fdc42f65e5f8892babd53d3930fdfa93
Threat Level: Known bad
The file a9cd04e2d97fc0954dbbf279ed59d0ca.exe was found to be: Known bad.
Malicious Activity Summary
Modifies visiblity of hidden/system files in Explorer
Loads dropped DLL
Checks computer location settings
Executes dropped EXE
Adds Run key to start application
Unsigned PE
Enumerates physical storage devices
Suspicious use of SetWindowsHookEx
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-01-07 19:20
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-01-07 19:20
Reported
2024-01-07 19:24
Platform
win7-20231215-en
Max time kernel
178s
Max time network
181s
Command Line
Signatures
Modifies visiblity of hidden/system files in Explorer
| Description | Indicator | Process | Target |
| Set value (int) | \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" | C:\Users\Admin\AppData\Local\Temp\a9cd04e2d97fc0954dbbf279ed59d0ca.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" | C:\Users\Admin\suvob.exe | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\suvob.exe | N/A |
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\a9cd04e2d97fc0954dbbf279ed59d0ca.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\a9cd04e2d97fc0954dbbf279ed59d0ca.exe | N/A |
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\suvob = "C:\\Users\\Admin\\suvob.exe /x" | C:\Users\Admin\suvob.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\suvob = "C:\\Users\\Admin\\suvob.exe /P" | C:\Users\Admin\suvob.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\suvob = "C:\\Users\\Admin\\suvob.exe /m" | C:\Users\Admin\suvob.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\suvob = "C:\\Users\\Admin\\suvob.exe /S" | C:\Users\Admin\suvob.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\suvob = "C:\\Users\\Admin\\suvob.exe /e" | C:\Users\Admin\suvob.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\suvob = "C:\\Users\\Admin\\suvob.exe /k" | C:\Users\Admin\suvob.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\suvob = "C:\\Users\\Admin\\suvob.exe /t" | C:\Users\Admin\suvob.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\suvob = "C:\\Users\\Admin\\suvob.exe /H" | C:\Users\Admin\suvob.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\suvob = "C:\\Users\\Admin\\suvob.exe /V" | C:\Users\Admin\suvob.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\suvob = "C:\\Users\\Admin\\suvob.exe /n" | C:\Users\Admin\suvob.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\suvob = "C:\\Users\\Admin\\suvob.exe /K" | C:\Users\Admin\AppData\Local\Temp\a9cd04e2d97fc0954dbbf279ed59d0ca.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\suvob = "C:\\Users\\Admin\\suvob.exe /i" | C:\Users\Admin\suvob.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\suvob = "C:\\Users\\Admin\\suvob.exe /C" | C:\Users\Admin\suvob.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\suvob = "C:\\Users\\Admin\\suvob.exe /Q" | C:\Users\Admin\suvob.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\suvob = "C:\\Users\\Admin\\suvob.exe /F" | C:\Users\Admin\suvob.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\suvob = "C:\\Users\\Admin\\suvob.exe /j" | C:\Users\Admin\suvob.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\suvob = "C:\\Users\\Admin\\suvob.exe /D" | C:\Users\Admin\suvob.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\suvob = "C:\\Users\\Admin\\suvob.exe /B" | C:\Users\Admin\suvob.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\suvob = "C:\\Users\\Admin\\suvob.exe /T" | C:\Users\Admin\suvob.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\suvob = "C:\\Users\\Admin\\suvob.exe /d" | C:\Users\Admin\suvob.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\suvob = "C:\\Users\\Admin\\suvob.exe /A" | C:\Users\Admin\suvob.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\suvob = "C:\\Users\\Admin\\suvob.exe /M" | C:\Users\Admin\suvob.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\suvob = "C:\\Users\\Admin\\suvob.exe /I" | C:\Users\Admin\suvob.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\suvob = "C:\\Users\\Admin\\suvob.exe /K" | C:\Users\Admin\suvob.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\suvob = "C:\\Users\\Admin\\suvob.exe /z" | C:\Users\Admin\suvob.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\suvob = "C:\\Users\\Admin\\suvob.exe /q" | C:\Users\Admin\suvob.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\suvob = "C:\\Users\\Admin\\suvob.exe /U" | C:\Users\Admin\suvob.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\suvob = "C:\\Users\\Admin\\suvob.exe /p" | C:\Users\Admin\suvob.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\suvob = "C:\\Users\\Admin\\suvob.exe /v" | C:\Users\Admin\suvob.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\suvob = "C:\\Users\\Admin\\suvob.exe /u" | C:\Users\Admin\suvob.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\suvob = "C:\\Users\\Admin\\suvob.exe /O" | C:\Users\Admin\suvob.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\suvob = "C:\\Users\\Admin\\suvob.exe /b" | C:\Users\Admin\suvob.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\suvob = "C:\\Users\\Admin\\suvob.exe /W" | C:\Users\Admin\suvob.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\suvob = "C:\\Users\\Admin\\suvob.exe /N" | C:\Users\Admin\suvob.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\suvob = "C:\\Users\\Admin\\suvob.exe /g" | C:\Users\Admin\suvob.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\suvob = "C:\\Users\\Admin\\suvob.exe /o" | C:\Users\Admin\suvob.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\suvob = "C:\\Users\\Admin\\suvob.exe /c" | C:\Users\Admin\suvob.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\suvob = "C:\\Users\\Admin\\suvob.exe /Z" | C:\Users\Admin\suvob.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\suvob = "C:\\Users\\Admin\\suvob.exe /s" | C:\Users\Admin\suvob.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\suvob = "C:\\Users\\Admin\\suvob.exe /f" | C:\Users\Admin\suvob.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\suvob = "C:\\Users\\Admin\\suvob.exe /R" | C:\Users\Admin\suvob.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\suvob = "C:\\Users\\Admin\\suvob.exe /J" | C:\Users\Admin\suvob.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\suvob = "C:\\Users\\Admin\\suvob.exe /X" | C:\Users\Admin\suvob.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\suvob = "C:\\Users\\Admin\\suvob.exe /y" | C:\Users\Admin\suvob.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\suvob = "C:\\Users\\Admin\\suvob.exe /E" | C:\Users\Admin\suvob.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\suvob = "C:\\Users\\Admin\\suvob.exe /Y" | C:\Users\Admin\suvob.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\suvob = "C:\\Users\\Admin\\suvob.exe /r" | C:\Users\Admin\suvob.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\suvob = "C:\\Users\\Admin\\suvob.exe /l" | C:\Users\Admin\suvob.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\suvob = "C:\\Users\\Admin\\suvob.exe /h" | C:\Users\Admin\suvob.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\suvob = "C:\\Users\\Admin\\suvob.exe /L" | C:\Users\Admin\suvob.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\suvob = "C:\\Users\\Admin\\suvob.exe /G" | C:\Users\Admin\suvob.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\suvob = "C:\\Users\\Admin\\suvob.exe /w" | C:\Users\Admin\suvob.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\suvob = "C:\\Users\\Admin\\suvob.exe /a" | C:\Users\Admin\suvob.exe | N/A |
Enumerates physical storage devices
Suspicious behavior: EnumeratesProcesses
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\a9cd04e2d97fc0954dbbf279ed59d0ca.exe | N/A |
| N/A | N/A | C:\Users\Admin\suvob.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 3008 wrote to memory of 2580 | N/A | C:\Users\Admin\AppData\Local\Temp\a9cd04e2d97fc0954dbbf279ed59d0ca.exe | C:\Users\Admin\suvob.exe |
| PID 3008 wrote to memory of 2580 | N/A | C:\Users\Admin\AppData\Local\Temp\a9cd04e2d97fc0954dbbf279ed59d0ca.exe | C:\Users\Admin\suvob.exe |
| PID 3008 wrote to memory of 2580 | N/A | C:\Users\Admin\AppData\Local\Temp\a9cd04e2d97fc0954dbbf279ed59d0ca.exe | C:\Users\Admin\suvob.exe |
| PID 3008 wrote to memory of 2580 | N/A | C:\Users\Admin\AppData\Local\Temp\a9cd04e2d97fc0954dbbf279ed59d0ca.exe | C:\Users\Admin\suvob.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\a9cd04e2d97fc0954dbbf279ed59d0ca.exe
"C:\Users\Admin\AppData\Local\Temp\a9cd04e2d97fc0954dbbf279ed59d0ca.exe"
C:\Users\Admin\suvob.exe
"C:\Users\Admin\suvob.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | ns1.player1352.com | udp |
| US | 8.8.8.8:53 | ns1.player1352.net | udp |
| US | 107.178.223.183:8000 | ns1.player1352.net | tcp |
Files
memory/3008-0-0x0000000000400000-0x000000000043F000-memory.dmp
memory/3008-13-0x0000000002F80000-0x0000000002FBF000-memory.dmp
C:\Users\Admin\suvob.exe
| MD5 | 6436afff26391d7b2c275b94db8dcf70 |
| SHA1 | 0461e086257a039a6c228146bffaad1740095bc2 |
| SHA256 | 061c7b4508d98cfc136790d74e83fd1e4a33dd1d84a4f262e49a900219d7949f |
| SHA512 | 32fedb5d0a0b691c2f92c52373b442e4aa5b0cc24ea28ea107e64ff08f7dc4568bc3c92fa9374de214b7c723dc0f2582ec4396a2b1260642d98f38c0dd5230cc |
memory/2580-15-0x0000000000400000-0x000000000043F000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-01-07 19:20
Reported
2024-01-07 19:23
Platform
win10v2004-20231215-en
Max time kernel
150s
Max time network
153s
Command Line
Signatures
Modifies visiblity of hidden/system files in Explorer
| Description | Indicator | Process | Target |
| Set value (int) | \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" | C:\Users\Admin\AppData\Local\Temp\a9cd04e2d97fc0954dbbf279ed59d0ca.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" | C:\Users\Admin\diiugej.exe | N/A |
Checks computer location settings
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\a9cd04e2d97fc0954dbbf279ed59d0ca.exe | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\diiugej.exe | N/A |
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\diiugej = "C:\\Users\\Admin\\diiugej.exe /R" | C:\Users\Admin\diiugej.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\diiugej = "C:\\Users\\Admin\\diiugej.exe /P" | C:\Users\Admin\diiugej.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\diiugej = "C:\\Users\\Admin\\diiugej.exe /X" | C:\Users\Admin\diiugej.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\diiugej = "C:\\Users\\Admin\\diiugej.exe /d" | C:\Users\Admin\diiugej.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\diiugej = "C:\\Users\\Admin\\diiugej.exe /o" | C:\Users\Admin\diiugej.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\diiugej = "C:\\Users\\Admin\\diiugej.exe /k" | C:\Users\Admin\diiugej.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\diiugej = "C:\\Users\\Admin\\diiugej.exe /S" | C:\Users\Admin\diiugej.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\diiugej = "C:\\Users\\Admin\\diiugej.exe /y" | C:\Users\Admin\diiugej.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\diiugej = "C:\\Users\\Admin\\diiugej.exe /C" | C:\Users\Admin\diiugej.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\diiugej = "C:\\Users\\Admin\\diiugej.exe /j" | C:\Users\Admin\diiugej.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\diiugej = "C:\\Users\\Admin\\diiugej.exe /e" | C:\Users\Admin\diiugej.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\diiugej = "C:\\Users\\Admin\\diiugej.exe /F" | C:\Users\Admin\diiugej.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\diiugej = "C:\\Users\\Admin\\diiugej.exe /p" | C:\Users\Admin\diiugej.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\diiugej = "C:\\Users\\Admin\\diiugej.exe /r" | C:\Users\Admin\diiugej.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\diiugej = "C:\\Users\\Admin\\diiugej.exe /J" | C:\Users\Admin\diiugej.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\diiugej = "C:\\Users\\Admin\\diiugej.exe /E" | C:\Users\Admin\diiugej.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\diiugej = "C:\\Users\\Admin\\diiugej.exe /l" | C:\Users\Admin\diiugej.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\diiugej = "C:\\Users\\Admin\\diiugej.exe /B" | C:\Users\Admin\diiugej.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\diiugej = "C:\\Users\\Admin\\diiugej.exe /f" | C:\Users\Admin\diiugej.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\diiugej = "C:\\Users\\Admin\\diiugej.exe /U" | C:\Users\Admin\diiugej.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\diiugej = "C:\\Users\\Admin\\diiugej.exe /i" | C:\Users\Admin\diiugej.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\diiugej = "C:\\Users\\Admin\\diiugej.exe /v" | C:\Users\Admin\diiugej.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\diiugej = "C:\\Users\\Admin\\diiugej.exe /a" | C:\Users\Admin\diiugej.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\diiugej = "C:\\Users\\Admin\\diiugej.exe /n" | C:\Users\Admin\diiugej.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\diiugej = "C:\\Users\\Admin\\diiugej.exe /W" | C:\Users\Admin\diiugej.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\diiugej = "C:\\Users\\Admin\\diiugej.exe /M" | C:\Users\Admin\diiugej.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\diiugej = "C:\\Users\\Admin\\diiugej.exe /D" | C:\Users\Admin\diiugej.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\diiugej = "C:\\Users\\Admin\\diiugej.exe /A" | C:\Users\Admin\diiugej.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\diiugej = "C:\\Users\\Admin\\diiugej.exe /T" | C:\Users\Admin\diiugej.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\diiugej = "C:\\Users\\Admin\\diiugej.exe /t" | C:\Users\Admin\diiugej.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\diiugej = "C:\\Users\\Admin\\diiugej.exe /b" | C:\Users\Admin\diiugej.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\diiugej = "C:\\Users\\Admin\\diiugej.exe /g" | C:\Users\Admin\diiugej.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\diiugej = "C:\\Users\\Admin\\diiugej.exe /H" | C:\Users\Admin\diiugej.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\diiugej = "C:\\Users\\Admin\\diiugej.exe /Q" | C:\Users\Admin\diiugej.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\diiugej = "C:\\Users\\Admin\\diiugej.exe /L" | C:\Users\Admin\diiugej.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\diiugej = "C:\\Users\\Admin\\diiugej.exe /G" | C:\Users\Admin\diiugej.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\diiugej = "C:\\Users\\Admin\\diiugej.exe /w" | C:\Users\Admin\diiugej.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\diiugej = "C:\\Users\\Admin\\diiugej.exe /Y" | C:\Users\Admin\diiugej.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\diiugej = "C:\\Users\\Admin\\diiugej.exe /I" | C:\Users\Admin\diiugej.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\diiugej = "C:\\Users\\Admin\\diiugej.exe /s" | C:\Users\Admin\diiugej.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\diiugej = "C:\\Users\\Admin\\diiugej.exe /h" | C:\Users\Admin\diiugej.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\diiugej = "C:\\Users\\Admin\\diiugej.exe /Z" | C:\Users\Admin\diiugej.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\diiugej = "C:\\Users\\Admin\\diiugej.exe /N" | C:\Users\Admin\diiugej.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\diiugej = "C:\\Users\\Admin\\diiugej.exe /C" | C:\Users\Admin\AppData\Local\Temp\a9cd04e2d97fc0954dbbf279ed59d0ca.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\diiugej = "C:\\Users\\Admin\\diiugej.exe /z" | C:\Users\Admin\diiugej.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\diiugej = "C:\\Users\\Admin\\diiugej.exe /O" | C:\Users\Admin\diiugej.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\diiugej = "C:\\Users\\Admin\\diiugej.exe /x" | C:\Users\Admin\diiugej.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\diiugej = "C:\\Users\\Admin\\diiugej.exe /m" | C:\Users\Admin\diiugej.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\diiugej = "C:\\Users\\Admin\\diiugej.exe /c" | C:\Users\Admin\diiugej.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\diiugej = "C:\\Users\\Admin\\diiugej.exe /V" | C:\Users\Admin\diiugej.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\diiugej = "C:\\Users\\Admin\\diiugej.exe /q" | C:\Users\Admin\diiugej.exe | N/A |
Enumerates physical storage devices
Suspicious behavior: EnumeratesProcesses
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\a9cd04e2d97fc0954dbbf279ed59d0ca.exe | N/A |
| N/A | N/A | C:\Users\Admin\diiugej.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 3160 wrote to memory of 1656 | N/A | C:\Users\Admin\AppData\Local\Temp\a9cd04e2d97fc0954dbbf279ed59d0ca.exe | C:\Users\Admin\diiugej.exe |
| PID 3160 wrote to memory of 1656 | N/A | C:\Users\Admin\AppData\Local\Temp\a9cd04e2d97fc0954dbbf279ed59d0ca.exe | C:\Users\Admin\diiugej.exe |
| PID 3160 wrote to memory of 1656 | N/A | C:\Users\Admin\AppData\Local\Temp\a9cd04e2d97fc0954dbbf279ed59d0ca.exe | C:\Users\Admin\diiugej.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\a9cd04e2d97fc0954dbbf279ed59d0ca.exe
"C:\Users\Admin\AppData\Local\Temp\a9cd04e2d97fc0954dbbf279ed59d0ca.exe"
C:\Users\Admin\diiugej.exe
"C:\Users\Admin\diiugej.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | g.bing.com | udp |
| US | 204.79.197.200:443 | g.bing.com | tcp |
| US | 8.8.8.8:53 | 200.197.79.204.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 64.179.17.96.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 82.177.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 2.136.104.51.in-addr.arpa | udp |
| US | 8.8.8.8:53 | ns1.player1352.com | udp |
| US | 8.8.8.8:53 | ns1.player1352.net | udp |
| US | 104.155.138.21:8000 | ns1.player1352.net | tcp |
| US | 8.8.8.8:53 | 21.138.155.104.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 9.228.82.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 85.177.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 158.240.127.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 41.110.16.96.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 157.123.68.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 146.78.124.51.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 56.126.166.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 134.71.91.104.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 100.5.17.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 119.110.54.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 80.179.17.96.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 0.205.248.87.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 88.156.103.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 79.179.17.96.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 45.179.17.96.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 62.179.17.96.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 14.227.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 8.8.8.8:53 | 56.179.17.96.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 140.71.91.104.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 54.179.17.96.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 207.178.17.96.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 198.187.3.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 204.178.17.96.in-addr.arpa | udp |
| GB | 96.17.178.204:80 | tcp |
Files
memory/3160-0-0x0000000000400000-0x000000000043F000-memory.dmp
C:\Users\Admin\diiugej.exe
| MD5 | f2b4fd2d9af25794aa2f7eacd2ef5a9e |
| SHA1 | e148f8dd05986e7705c76441cecec5321425b229 |
| SHA256 | e3c8968c83ed8eee6068c06c308ab5dfe8134df075bb7802f07ec00e86694bd3 |
| SHA512 | bcca4f38184a548c6f0336f5dd789bd6fc517bf526b5174dc59a3e7058bbf3be9445aa29426252532ce0f04612d418178ce5e3818c16cc593f25989320dc2cbc |
memory/1656-34-0x0000000000400000-0x000000000043F000-memory.dmp