Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240319-en -
resource tags
arch:x64arch:x86image:win10v2004-20240319-enlocale:en-usos:windows10-2004-x64system -
submitted
27/03/2024, 23:37
Static task
static1
Behavioral task
behavioral1
Sample
b8409494d9b140f95d6a6936599acc03c377600b7fcab60a578d66128e37a7b5.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b8409494d9b140f95d6a6936599acc03c377600b7fcab60a578d66128e37a7b5.exe
Resource
win10v2004-20240319-en
General
-
Target
b8409494d9b140f95d6a6936599acc03c377600b7fcab60a578d66128e37a7b5.exe
-
Size
224KB
-
MD5
26007b26eaf3bbeeea225269cd41844c
-
SHA1
9b6d5b7a0edff0ce0825e35338c6c7f33ba8c951
-
SHA256
b8409494d9b140f95d6a6936599acc03c377600b7fcab60a578d66128e37a7b5
-
SHA512
b37b6ae71901c8d9a7062327a7c62102c28025a5f5d5994669b7f5e89db8a874abb72aea570bd21b1b2f4fccd34df53020f3410ad3942e541452dc75d3c29be1
-
SSDEEP
3072:GD5KJB39OuJwQS3xhCjG8G3GbGVGBGfGuGxGWYcrf6Kad0:GD4JB3fHAAYcD6Kad
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 44 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation juohaac.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation bthial.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation mauug.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation csgew.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation yuoof.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation chxoim.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation xeuus.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation yhqoj.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation yusoq.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation yhqom.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation qozef.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation xiuus.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation jiafuv.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation foimej.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation lieegav.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation yuoofi.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation mianuu.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation miaguu.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation zeaasu.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation coeniir.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation kiejuuh.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation miayuz.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation wupol.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation neoofiz.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation diafuv.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation peuvab.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation lihuv.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation goezac.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation vauuq.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation nuqiz.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation neooviz.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation fauup.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation goezac.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation daiiwe.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation rtpiq.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation veowii.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation xiuus.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation bauuxo.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation nialuf.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation vuogaay.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation nialu.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation b8409494d9b140f95d6a6936599acc03c377600b7fcab60a578d66128e37a7b5.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation csgew.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation csgew.exe -
Executes dropped EXE 44 IoCs
pid Process 4844 miayuz.exe 2292 csgew.exe 2016 diafuv.exe 4432 neooviz.exe 3692 yuoof.exe 396 fauup.exe 4792 chxoim.exe 1840 xiuus.exe 1368 zeaasu.exe 4592 wupol.exe 2804 xeuus.exe 3396 jiafuv.exe 1776 foimej.exe 1836 coeniir.exe 4964 goezac.exe 5092 yhqoj.exe 2776 kiejuuh.exe 4764 lieegav.exe 1100 peuvab.exe 1828 yuoofi.exe 440 csgew.exe 3496 mianuu.exe 4908 lihuv.exe 3708 daiiwe.exe 1712 rtpiq.exe 2272 goezac.exe 4964 miaguu.exe 1172 vauuq.exe 452 juohaac.exe 2768 neoofiz.exe 4556 veowii.exe 3852 nuqiz.exe 3376 xiuus.exe 1468 bauuxo.exe 3876 bthial.exe 2812 mauug.exe 4484 csgew.exe 3404 nialuf.exe 1208 yusoq.exe 1340 yhqom.exe 1568 vuogaay.exe 3724 qozef.exe 536 nialu.exe 3452 vplos.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1556 b8409494d9b140f95d6a6936599acc03c377600b7fcab60a578d66128e37a7b5.exe 1556 b8409494d9b140f95d6a6936599acc03c377600b7fcab60a578d66128e37a7b5.exe 4844 miayuz.exe 4844 miayuz.exe 2292 csgew.exe 2292 csgew.exe 2016 diafuv.exe 2016 diafuv.exe 4432 neooviz.exe 4432 neooviz.exe 3692 yuoof.exe 3692 yuoof.exe 396 fauup.exe 396 fauup.exe 4792 chxoim.exe 4792 chxoim.exe 1840 xiuus.exe 1840 xiuus.exe 1368 zeaasu.exe 1368 zeaasu.exe 4592 wupol.exe 4592 wupol.exe 2804 xeuus.exe 2804 xeuus.exe 3396 jiafuv.exe 3396 jiafuv.exe 1776 foimej.exe 1776 foimej.exe 1836 coeniir.exe 1836 coeniir.exe 4964 goezac.exe 4964 goezac.exe 5092 yhqoj.exe 5092 yhqoj.exe 2776 kiejuuh.exe 2776 kiejuuh.exe 4764 lieegav.exe 4764 lieegav.exe 1100 peuvab.exe 1100 peuvab.exe 1828 yuoofi.exe 1828 yuoofi.exe 440 csgew.exe 440 csgew.exe 3496 mianuu.exe 3496 mianuu.exe 4908 lihuv.exe 4908 lihuv.exe 3708 daiiwe.exe 3708 daiiwe.exe 1712 rtpiq.exe 1712 rtpiq.exe 2272 goezac.exe 2272 goezac.exe 4964 miaguu.exe 4964 miaguu.exe 1172 vauuq.exe 1172 vauuq.exe 452 juohaac.exe 452 juohaac.exe 2768 neoofiz.exe 2768 neoofiz.exe 4556 veowii.exe 4556 veowii.exe -
Suspicious use of SetWindowsHookEx 45 IoCs
pid Process 1556 b8409494d9b140f95d6a6936599acc03c377600b7fcab60a578d66128e37a7b5.exe 4844 miayuz.exe 2292 csgew.exe 2016 diafuv.exe 4432 neooviz.exe 3692 yuoof.exe 396 fauup.exe 4792 chxoim.exe 1840 xiuus.exe 1368 zeaasu.exe 4592 wupol.exe 2804 xeuus.exe 3396 jiafuv.exe 1776 foimej.exe 1836 coeniir.exe 4964 goezac.exe 5092 yhqoj.exe 2776 kiejuuh.exe 4764 lieegav.exe 1100 peuvab.exe 1828 yuoofi.exe 440 csgew.exe 3496 mianuu.exe 4908 lihuv.exe 3708 daiiwe.exe 1712 rtpiq.exe 2272 goezac.exe 4964 miaguu.exe 1172 vauuq.exe 452 juohaac.exe 2768 neoofiz.exe 4556 veowii.exe 3852 nuqiz.exe 3376 xiuus.exe 1468 bauuxo.exe 3876 bthial.exe 2812 mauug.exe 4484 csgew.exe 3404 nialuf.exe 1208 yusoq.exe 1340 yhqom.exe 1568 vuogaay.exe 3724 qozef.exe 536 nialu.exe 3452 vplos.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1556 wrote to memory of 4844 1556 b8409494d9b140f95d6a6936599acc03c377600b7fcab60a578d66128e37a7b5.exe 97 PID 1556 wrote to memory of 4844 1556 b8409494d9b140f95d6a6936599acc03c377600b7fcab60a578d66128e37a7b5.exe 97 PID 1556 wrote to memory of 4844 1556 b8409494d9b140f95d6a6936599acc03c377600b7fcab60a578d66128e37a7b5.exe 97 PID 4844 wrote to memory of 2292 4844 miayuz.exe 101 PID 4844 wrote to memory of 2292 4844 miayuz.exe 101 PID 4844 wrote to memory of 2292 4844 miayuz.exe 101 PID 2292 wrote to memory of 2016 2292 csgew.exe 106 PID 2292 wrote to memory of 2016 2292 csgew.exe 106 PID 2292 wrote to memory of 2016 2292 csgew.exe 106 PID 2016 wrote to memory of 4432 2016 diafuv.exe 108 PID 2016 wrote to memory of 4432 2016 diafuv.exe 108 PID 2016 wrote to memory of 4432 2016 diafuv.exe 108 PID 4432 wrote to memory of 3692 4432 neooviz.exe 110 PID 4432 wrote to memory of 3692 4432 neooviz.exe 110 PID 4432 wrote to memory of 3692 4432 neooviz.exe 110 PID 3692 wrote to memory of 396 3692 yuoof.exe 111 PID 3692 wrote to memory of 396 3692 yuoof.exe 111 PID 3692 wrote to memory of 396 3692 yuoof.exe 111 PID 396 wrote to memory of 4792 396 fauup.exe 112 PID 396 wrote to memory of 4792 396 fauup.exe 112 PID 396 wrote to memory of 4792 396 fauup.exe 112 PID 4792 wrote to memory of 1840 4792 chxoim.exe 113 PID 4792 wrote to memory of 1840 4792 chxoim.exe 113 PID 4792 wrote to memory of 1840 4792 chxoim.exe 113 PID 1840 wrote to memory of 1368 1840 xiuus.exe 115 PID 1840 wrote to memory of 1368 1840 xiuus.exe 115 PID 1840 wrote to memory of 1368 1840 xiuus.exe 115 PID 1368 wrote to memory of 4592 1368 zeaasu.exe 116 PID 1368 wrote to memory of 4592 1368 zeaasu.exe 116 PID 1368 wrote to memory of 4592 1368 zeaasu.exe 116 PID 4592 wrote to memory of 2804 4592 wupol.exe 118 PID 4592 wrote to memory of 2804 4592 wupol.exe 118 PID 4592 wrote to memory of 2804 4592 wupol.exe 118 PID 2804 wrote to memory of 3396 2804 xeuus.exe 119 PID 2804 wrote to memory of 3396 2804 xeuus.exe 119 PID 2804 wrote to memory of 3396 2804 xeuus.exe 119 PID 3396 wrote to memory of 1776 3396 jiafuv.exe 120 PID 3396 wrote to memory of 1776 3396 jiafuv.exe 120 PID 3396 wrote to memory of 1776 3396 jiafuv.exe 120 PID 1776 wrote to memory of 1836 1776 foimej.exe 121 PID 1776 wrote to memory of 1836 1776 foimej.exe 121 PID 1776 wrote to memory of 1836 1776 foimej.exe 121 PID 1836 wrote to memory of 4964 1836 coeniir.exe 123 PID 1836 wrote to memory of 4964 1836 coeniir.exe 123 PID 1836 wrote to memory of 4964 1836 coeniir.exe 123 PID 4964 wrote to memory of 5092 4964 goezac.exe 124 PID 4964 wrote to memory of 5092 4964 goezac.exe 124 PID 4964 wrote to memory of 5092 4964 goezac.exe 124 PID 5092 wrote to memory of 2776 5092 yhqoj.exe 125 PID 5092 wrote to memory of 2776 5092 yhqoj.exe 125 PID 5092 wrote to memory of 2776 5092 yhqoj.exe 125 PID 2776 wrote to memory of 4764 2776 kiejuuh.exe 126 PID 2776 wrote to memory of 4764 2776 kiejuuh.exe 126 PID 2776 wrote to memory of 4764 2776 kiejuuh.exe 126 PID 4764 wrote to memory of 1100 4764 lieegav.exe 127 PID 4764 wrote to memory of 1100 4764 lieegav.exe 127 PID 4764 wrote to memory of 1100 4764 lieegav.exe 127 PID 1100 wrote to memory of 1828 1100 peuvab.exe 128 PID 1100 wrote to memory of 1828 1100 peuvab.exe 128 PID 1100 wrote to memory of 1828 1100 peuvab.exe 128 PID 1828 wrote to memory of 440 1828 yuoofi.exe 130 PID 1828 wrote to memory of 440 1828 yuoofi.exe 130 PID 1828 wrote to memory of 440 1828 yuoofi.exe 130 PID 440 wrote to memory of 3496 440 csgew.exe 131
Processes
-
C:\Users\Admin\AppData\Local\Temp\b8409494d9b140f95d6a6936599acc03c377600b7fcab60a578d66128e37a7b5.exe"C:\Users\Admin\AppData\Local\Temp\b8409494d9b140f95d6a6936599acc03c377600b7fcab60a578d66128e37a7b5.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1556 -
C:\Users\Admin\miayuz.exe"C:\Users\Admin\miayuz.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Users\Admin\csgew.exe"C:\Users\Admin\csgew.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Users\Admin\diafuv.exe"C:\Users\Admin\diafuv.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Users\Admin\neooviz.exe"C:\Users\Admin\neooviz.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4432 -
C:\Users\Admin\yuoof.exe"C:\Users\Admin\yuoof.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3692 -
C:\Users\Admin\fauup.exe"C:\Users\Admin\fauup.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:396 -
C:\Users\Admin\chxoim.exe"C:\Users\Admin\chxoim.exe"8⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Users\Admin\xiuus.exe"C:\Users\Admin\xiuus.exe"9⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Users\Admin\zeaasu.exe"C:\Users\Admin\zeaasu.exe"10⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Users\Admin\wupol.exe"C:\Users\Admin\wupol.exe"11⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4592 -
C:\Users\Admin\xeuus.exe"C:\Users\Admin\xeuus.exe"12⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Users\Admin\jiafuv.exe"C:\Users\Admin\jiafuv.exe"13⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3396 -
C:\Users\Admin\foimej.exe"C:\Users\Admin\foimej.exe"14⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Users\Admin\coeniir.exe"C:\Users\Admin\coeniir.exe"15⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Users\Admin\goezac.exe"C:\Users\Admin\goezac.exe"16⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Users\Admin\yhqoj.exe"C:\Users\Admin\yhqoj.exe"17⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Users\Admin\kiejuuh.exe"C:\Users\Admin\kiejuuh.exe"18⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Users\Admin\lieegav.exe"C:\Users\Admin\lieegav.exe"19⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Users\Admin\peuvab.exe"C:\Users\Admin\peuvab.exe"20⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Users\Admin\yuoofi.exe"C:\Users\Admin\yuoofi.exe"21⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Users\Admin\csgew.exe"C:\Users\Admin\csgew.exe"22⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:440 -
C:\Users\Admin\mianuu.exe"C:\Users\Admin\mianuu.exe"23⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3496 -
C:\Users\Admin\lihuv.exe"C:\Users\Admin\lihuv.exe"24⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4908 -
C:\Users\Admin\daiiwe.exe"C:\Users\Admin\daiiwe.exe"25⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3708 -
C:\Users\Admin\rtpiq.exe"C:\Users\Admin\rtpiq.exe"26⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1712 -
C:\Users\Admin\goezac.exe"C:\Users\Admin\goezac.exe"27⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2272 -
C:\Users\Admin\miaguu.exe"C:\Users\Admin\miaguu.exe"28⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4964 -
C:\Users\Admin\vauuq.exe"C:\Users\Admin\vauuq.exe"29⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1172 -
C:\Users\Admin\juohaac.exe"C:\Users\Admin\juohaac.exe"30⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:452 -
C:\Users\Admin\neoofiz.exe"C:\Users\Admin\neoofiz.exe"31⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2768 -
C:\Users\Admin\veowii.exe"C:\Users\Admin\veowii.exe"32⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4556 -
C:\Users\Admin\nuqiz.exe"C:\Users\Admin\nuqiz.exe"33⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3852 -
C:\Users\Admin\xiuus.exe"C:\Users\Admin\xiuus.exe"34⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3376 -
C:\Users\Admin\bauuxo.exe"C:\Users\Admin\bauuxo.exe"35⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1468 -
C:\Users\Admin\bthial.exe"C:\Users\Admin\bthial.exe"36⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3876 -
C:\Users\Admin\mauug.exe"C:\Users\Admin\mauug.exe"37⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2812 -
C:\Users\Admin\csgew.exe"C:\Users\Admin\csgew.exe"38⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4484 -
C:\Users\Admin\nialuf.exe"C:\Users\Admin\nialuf.exe"39⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3404 -
C:\Users\Admin\yusoq.exe"C:\Users\Admin\yusoq.exe"40⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1208 -
C:\Users\Admin\yhqom.exe"C:\Users\Admin\yhqom.exe"41⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1340 -
C:\Users\Admin\vuogaay.exe"C:\Users\Admin\vuogaay.exe"42⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1568 -
C:\Users\Admin\qozef.exe"C:\Users\Admin\qozef.exe"43⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3724 -
C:\Users\Admin\nialu.exe"C:\Users\Admin\nialu.exe"44⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:536 -
C:\Users\Admin\vplos.exe"C:\Users\Admin\vplos.exe"45⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3452
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3996 --field-trial-handle=2228,i,17475224967547320003,13667387715861799238,262144 --variations-seed-version /prefetch:81⤵PID:1980
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224KB
MD5b689c98b6e16a99dc88faec81d704c48
SHA16d3cccd85a2f8d3d11e141abcfdfbfff1f7e0dfb
SHA256a6463e726a6a8a3b502b791ed6f523acec20311a7f8b658147e05e4766a02f5a
SHA512b69b8cc1920df8ff7dca45ddf36a1b19548a10a54f186abb324ffc4e1a73ffcea5a8c23dd8d408628d07d878b848b1294779adfdc42988a7b3502102a7064245
-
Filesize
224KB
MD594d89f305426be4f2c99afba247c17a8
SHA14ccd0290a7475636fac48d403e13976daf4d1042
SHA256046d5f984d0698dc705505952bc3743905a5b72fe74d54e66799659cc2b7ae9c
SHA512161de21cdacd379f8edb34a34f8964f86dd47a416436cca7a6e38b2f69559a5edea180c7f0b710d034d9a19818ef30e85194d5d29379c3f2f9c231eaa4b3c564
-
Filesize
224KB
MD53222137ae204a5f50e5665c61650506f
SHA107369e8db00f12b7d2d02fc4e41247b8013a1f6f
SHA256a0bef7bf430c68ea014cfb5ffe708ae2eb7abc7212c7acc1830a85b9d4d01f5c
SHA5122c8b6f9b272e58f29406439c114bebf5ada8f0692dac062d82f690529a3f4b51677689f7c85bd2e7f3a461b83ca1437556e50d4af7be627b5430d7df9a07546a
-
Filesize
224KB
MD553f66d6e50432216401a456664c38b15
SHA150620ddcca93e9a3facb588f1217ebbaa9c019ae
SHA256a3a4cbaf7a84cc4548947c29633ac6afde922b349069422770aa84164694ecc1
SHA512151718a850ce4531aa4bab45d2ea3ec702f3be0be77bfd5120c9f7cd5d949a9a57368ead9a436720721c2828f402d823d1bbf32812152e338b274fa067ab377e
-
Filesize
224KB
MD54a6bb7b6809ddf901305aebc4be29616
SHA14e18545d2823c556881c3f791206962434621c7e
SHA25676db957375662ea760b51c926e1046e581fc238f36db917a9ffd6dd464dd365d
SHA512edd3fda753c6b8064e12776e15138c7125afbdaa625a47461f892c0af2905b91c0b4660bfc339469b30087198efed84a578d4010674fd190471d5415251fcda6
-
Filesize
224KB
MD5840eb310746123b93f598eda53fffa3c
SHA164e94fb8c6d53f8f567be65c8deb675b32b15723
SHA25614b35a4af77bd7e9af567ccb544cf0d307528bbfbb2cdf910e7a8fdae97472b7
SHA5120d733d76c2727086260d28a8ef7a7bb8d12f367a03088f07ba78e955b71da54207678387a5fcd86c9d45329585e6d8c57024f2f37901322c07a6d57262a016cc
-
Filesize
224KB
MD5538910cfe26dd397a25c3935389d3713
SHA1063fba057743dff50535b2637cf0c38b1e5c67af
SHA25682fb48816901069f73d37725c0369d8661e272e1b77fbb858a6b108128de9348
SHA5122c1197f4272f615a2b20c550cf48d838dd86b2b7bee747f531fbbe163d0b234b0de86cdbb951b1f8ee90999a33681afd0e47bbf965c8821f1e809179b01ac773
-
Filesize
224KB
MD553370b46b5a7df8eae859a5cb53bd83f
SHA132cc019f798edd28355064368c89bc6d75bb4efa
SHA25669650234cb12c26fc86e0b4f561edefe2f1acd9aeeb34155d933082c3251b669
SHA512d9fc28047ec144d0519ec5310643b45169393f4146da5e52647d42ce2ed73d770ff07d8a141546faff363c8c96a2caaba73e631804030c80a353bf515f3e5369
-
Filesize
224KB
MD5693b2a6e65fae5503fa7da8f57f24d47
SHA15bef971736b82213a32c2f29a57e3697e3b458bc
SHA256e2d3494e0a6990bbcf6dcfd152bbe4664e1b6ad35e1635e80bab75b09160288b
SHA512ad425639f1f1cb646c9680a0e5518542a679cfe5658364eac051ec43d99dd092f78f4deda88b1a2de2da9a44364dd7dd14fd7a75505f4ae14e49dba916212e9d
-
Filesize
224KB
MD5af0a4740069886c9f3f5df5c98737e98
SHA14982f81216f67c0d4c155caad38b101388b1be03
SHA256032e15c18dc2866d6681d02fe532926614dce7b6b41685253a1643a81a1138b4
SHA512f63c19b29246ea3b970502ab6b35de213f1d308d8dc03ad69c652697ca1b605b1798bb503b27976c352b6e854870dc5ed21847c4417183feefd47623cc921793
-
Filesize
224KB
MD508fd1d99628b05e4511bbc3f25b38a02
SHA1c1a5d255ebba0784e3eff99dfe0e52af6a9df947
SHA2560c3b906c39e0bd802062d7b84ac4a882bc0cc8f7108e69e309008530f267a032
SHA51298a280468d321b40e7c87b56523b16cd761c3f5bd5b1a7c6bf1781543f4c671e7b83ea6d6208274d2fe4dd4f405448a44e965c25354d0bca031f482d80793ba4
-
Filesize
224KB
MD5173eb315434061662ac352e4d9000694
SHA12331b6cf3ed13f51e9b12722912be256e3b68ef2
SHA2565cd07d6a13eb25a78f8ed4976a3667c03526198163ed8ac35c27b313819e91c2
SHA512682e3846370129108067eba6f34115550887749beb8eb168ccc2178df332279acde4fcd6086c3181625e3e6b4a9720baa63d023dd10386e966579c992f6d6392
-
Filesize
224KB
MD55ff76d9db896f1f56a348be06e450af5
SHA12aa122d929005e72b1fe4d2f32565722d3d118a3
SHA25692a3024c6f64d73e6a53e686d6d3199409c8f16cf614d90da621dff13e5795bb
SHA51222088a2ae131e4d0a6155a1b944ef5bf7e4a09c55398349148decf93758289dfce9c34f29b6ff484849b94a09e3abc60229fc6b0cbbb2539ed598bbe6ad1946e
-
Filesize
224KB
MD505b08abe2147cc0c460801c833620275
SHA17297131d292a5b1333595ab31027bbfd900566e1
SHA25650b709933b3b377fe9b4a1c3c449d2c6f1bfb9fe504b138d695c44c69b8947ed
SHA5121ecfffe2ebaa909432c816414edd3ac3174fb0f0870cb49f752e8294bdb62aa05bda25dab6a759ce2d1e833f80b143823c076a4f45997c34e90ea54d04359384
-
Filesize
224KB
MD5cddffda0c3be080b6911f6977bdc5b8d
SHA1ea58eaf394581ff23d83b0536804ecd8dd027ff8
SHA256abd85644732af4d03dbe5e16a635ecb0b26199f2c464c08f52335e3a007a952f
SHA51266bc37eee83feec6186fead6215ee30b472bae65115f89d11c646dd9ae24f0e0d6d32140a7a029c67fba266672ac4e26e2e1ec4d300d21a56964b4bfca1c9b9b
-
Filesize
224KB
MD5075f94f1c79e4767d9e141d6667d4df6
SHA1c41d05cc0e1ea57fa5533382b2805c5026b5755a
SHA256b5c6f8aef5e7059aa1f7a48086cab13f1c104ae89a9ce3c747ec176a2856b293
SHA512c16282bc4e4e0b79a47278a6db3e3c7f1d728d6ab52f5a630cdfba103b0957837f786b3b6e4bf9550cf0e4b1458acf8d44dc43188e429bec4d24c4a4216949c3
-
Filesize
224KB
MD5f0846f36a75814edfa77d292e2cb5715
SHA14034fe8be817741aa4dee0316c294edca7cab523
SHA2568e627443851a6dd425410f332baa23902ba76a489682fa52bb173f50797256bd
SHA5124377ad8a5f69148747751289a5852b9ad696b4ef2b15e8071427c27e7133516cdbacf04c6f14bfd40fd9c81ea14fb669cbb6e8e8f86f718c65dbbd636e35b8f9
-
Filesize
224KB
MD592d432179192971655507fb91dbff1c2
SHA1b77d1dd65456b1653b629646c709f28c8247b50c
SHA256e589c73cb36876de590e6f4c7c7219b905141956d909538514632fdb76870484
SHA5121d91c959c2d32ad50faad9ec9f6cda1c2400ab6b7bc02ed40d8ef4b6e988d98858814b821abfd9c81d68bc9cfe1632a88b48764d84c59d993bf236848d59d0bc
-
Filesize
224KB
MD5a26e5a3434f07f5fbd457112a52a29e8
SHA10abf5d625a66a8120bf54ca5fe87306d023cbd17
SHA25684e93276f116c44b3fef04002de349c8d1ac261110d6425293f29c28ababaff6
SHA512879ceb742c9d359a4d905798aa9f4dafc5f72ca9c45210dd44dd6de86d26917963d737b5ab2eda253be450373f30045a15081eb05bc0f64a52add28584108294
-
Filesize
224KB
MD506778c6d82cc516dbc18b987d6021c82
SHA1cecc6cd21f3211f3a8572a5b98ac0ede1cc2d44b
SHA256d8b2caf61fc0f9de3fdc0772cc9857674d5c4bea15e02275e88a66ede373c795
SHA512a97137b12056c8542fddf1b69f163c6ef44fd9d1c6a4279744820b74e48c287cc482f51a20089b46859bbae5588a2502b47ad0297a70824eca8e5ac9f7f347f8
-
Filesize
224KB
MD5033d72ae580a2a2546b8d16bfdaaa1bb
SHA1adf8e9743ec4cf0f2f37ae057dc01c4afd8d1907
SHA2568a3b528d9e080cdc022dba806d70dba1b31c999b5e13e3902786bbc7a4a8931c
SHA51263a5332db4a5ee489df6082ff58a1a02ff87e85d4553a06276aae0954dbec6d864f0fa3430fc2ee09b1117ab54b166ed5d60ce48a858a47c5bd2b15a2d0e00fa
-
Filesize
224KB
MD5527c678080d5766ad50230e5caa921b9
SHA11b0a6256f868e0a41048d643c9b22b2bdcc3510a
SHA256e8a30b5f102037d0b734c563be1607c015760853e0a860cc963a08fe5a23bc32
SHA512b356a573980ed37a062e219c35fdb27f3f687fbaa3a7198f4eb3280ea64a89181d7c1c258ed001074b3c38a3b47d1ce744e635ceb6897187616da753f6ce8910
-
Filesize
224KB
MD53fbf79c299f5a86583bd1d0928f5e464
SHA1fe43727c2d102e1b4fb76f86a16638550af89e72
SHA2560ae300674dab67b3b7dd36fa106dc4cf96fb7f6ed7ba8811f23084ec7b838ba5
SHA51237f6d667ed6de68c437806f7636a6bc43ac5564941e4abc4d06ade5630e14b3ab52a7d7b5d7026cf10bd869707bdd6cdcfdf763e6b66a048dfc37db742373d22
-
Filesize
224KB
MD50694288562485ddfde9b89034b479e4c
SHA1a7600d9aeed606b7fa0517dc287671db2417a468
SHA2568f71eae5410c20543825908cbfb993742efafba6b9701aad361025f82f8e16ae
SHA5125d83d77e3d2c39fbbe533cf1e8a3e2e18e50a9601f49333530773f74ac1adfb553118729aa7526b2c27457028ea0829d43e06ce1592c4a335608171e8373d738
-
Filesize
224KB
MD5e4a4f7b06c46935832bdf80e4ff54077
SHA1bc0f9332dcde4daab6ecc3a96e3a16906f04a290
SHA2564a3dfb22d8707218881c62b31ad0617e3869dc8e7470c6245f86646b120526ba
SHA512845d956c7b65f7df0798e316d52c859daf137fe36d0c6129ef099d783de7109f6834fc95218f8e149a4d967e0c60a3dc662189a2505fece5d8d32a804ce0433d
-
Filesize
224KB
MD5ea142c63f014a1169ab924f0132de739
SHA151a5b3f2ad9d2df0947a29c3e23b32a71c43a0c1
SHA256e9823652c947d3cfa8c816d7953e9c5322b184f4ddb552cc004b47eec7a3b83c
SHA5123108cd3a4f801fcdb1d8d5e8192d8b7681fef32c14b898810c4ea4c7840b0b02afce12a1f7063cf3a5d3e1d49ca5474a573ea5c3df9aff1102fa0d4d26fa0f51
-
Filesize
224KB
MD5a628920e479a4f085fb00d2f6160472b
SHA1a989f9034961016e6f3fbf7da731f7747fb38205
SHA256a0eef423e2e643fa136803b53f9c3166d8ee0259667946e0210db885fb1f265c
SHA512a537522d5f07777ed04842f75f9a6e371bd03a1cd3afed82807ffb0838d952f569c733afeeefabbfadf33bddbc7667fc6ed69d4b80e2aa7ca932d0a7b2eaa5a3
-
Filesize
224KB
MD52bb18e47ba8e4629f8ef8ffe1667bd6f
SHA19efdd4a55718fc8c42dd485a57d5b880dc2b2aea
SHA256ea745ec92cc17038349fd8f7b728c1f12456f1a48c8a12a56551263c730c0d70
SHA512598a92448597fa048a7d89572792ad90d8d2cd12dc2daee3515aa618a9684bbcf8715ebc825094c8c44b8e4581d5061cc48d8c887fa9fffed370de59561a9708
-
Filesize
224KB
MD5d24126ee8fb2699ecfa2a4d7ca84f5e6
SHA177f7fdf5a379590bb328e871a442b26ba0a42f46
SHA256022ed9fe870fbf584ea853527f246d0694b1a17d532f000a8f1fa9b084fb167e
SHA512e87f49a686e93858179fcea1e9ec980fea17de4acc3742b861f23213d5f30b651bf1d24c527148eb9c9d291edd122e830a4fe39aa12c42f5a565f6bd872ce9ae
-
Filesize
224KB
MD5c311dc66f937528bcc9cc1628e441b73
SHA1ac16bc1348fa9642f2180fab1ebb2df2d7f1a082
SHA2563bd6ffbffb7ef7588bfe54e07236030170d1a3e58915d8dd52932fc04aa09aaf
SHA5128c3c88c67caaec69275ff1a98bec10852bf01c664b7b2d7a03210eabcd3bfb06f699777e65332c693e2c9c11b2d3c240cc9ed479879a0b814a7f2f29e428c90f
-
Filesize
224KB
MD575c1fb526eb156f9e18e8866634cac39
SHA138d3f9e1ffa0590adf1e380dd658028f9438f1d5
SHA256a4c4be30e95302106f1fe94a6529e79a6ce03980bcee9a1d315d787667c6ef28
SHA512317839bfeb4a6021879fec66dab36089081e5596537858051e9b2c3305973b10cecd3edd1043c118789cbd8d3e3a4c2281ecd38f100bab22eb526a5658fa6e68