Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
29-03-2024 04:39
Static task
static1
Behavioral task
behavioral1
Sample
ebc85aff78379ad5dfbd38dd92bff4cd393316eb32814d491b964ed97947b360.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ebc85aff78379ad5dfbd38dd92bff4cd393316eb32814d491b964ed97947b360.exe
Resource
win10v2004-20240226-en
General
-
Target
ebc85aff78379ad5dfbd38dd92bff4cd393316eb32814d491b964ed97947b360.exe
-
Size
224KB
-
MD5
5bc3c1170791085dcda6bbcaa1661843
-
SHA1
6183977c4bbed0c0e7c0edb619bdac5b757092e0
-
SHA256
ebc85aff78379ad5dfbd38dd92bff4cd393316eb32814d491b964ed97947b360
-
SHA512
106f69ff70750ed12ce8481afa6333154cbb13508b9dacdb47bdf9448006528c42cfb390f966cd0352428592406a245bad3bc6958abcb9054ad8aca8e3fce812
-
SSDEEP
3072:GhtKlty0L+ThCjG8G3GbGVGBGfGuGxGWYcrf6Kadk:Ghklty0sAYcD6Kad
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 38 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation buohaaf.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation xugop.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation roexaf.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation peookil.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation jixeb.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation vokeg.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation maiuye.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation jihuv.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation biafos.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation zivet.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation tiazuf.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation pnhim.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation ziebu.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation cauusof.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation kexuf.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation veati.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation haeewuv.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation joatee.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation tuvob.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation qaiipu.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation vaijel.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation daoori.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation wueboow.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation zcriep.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation rdnoel.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation niasux.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation kiejaat.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation tqjeg.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation toavee.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation foejuug.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation moelaa.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation ebc85aff78379ad5dfbd38dd92bff4cd393316eb32814d491b964ed97947b360.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation jeuyaa.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation jqcuem.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation jauup.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation geaavoc.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation luook.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation ydmiew.exe -
Executes dropped EXE 38 IoCs
pid Process 2136 kiejaat.exe 4400 jqcuem.exe 820 biafos.exe 2420 luook.exe 4248 vokeg.exe 2752 buohaaf.exe 3648 qaiipu.exe 5000 zivet.exe 3668 vaijel.exe 3560 tiazuf.exe 4216 pnhim.exe 228 tqjeg.exe 3380 maiuye.exe 4320 ziebu.exe 2236 daoori.exe 2692 cauusof.exe 2592 wueboow.exe 3216 kexuf.exe 2008 jihuv.exe 3548 toavee.exe 8 jeuyaa.exe 4748 xugop.exe 2592 roexaf.exe 1112 zcriep.exe 3852 ydmiew.exe 3284 veati.exe 3244 haeewuv.exe 3140 jauup.exe 1808 rdnoel.exe 1636 peookil.exe 4484 joatee.exe 508 jixeb.exe 2328 geaavoc.exe 3744 niasux.exe 4468 tuvob.exe 1168 foejuug.exe 548 moelaa.exe 4188 sieyaf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2592 ebc85aff78379ad5dfbd38dd92bff4cd393316eb32814d491b964ed97947b360.exe 2592 ebc85aff78379ad5dfbd38dd92bff4cd393316eb32814d491b964ed97947b360.exe 2136 kiejaat.exe 2136 kiejaat.exe 4400 jqcuem.exe 4400 jqcuem.exe 820 biafos.exe 820 biafos.exe 2420 luook.exe 2420 luook.exe 4248 vokeg.exe 4248 vokeg.exe 2752 buohaaf.exe 2752 buohaaf.exe 3648 qaiipu.exe 3648 qaiipu.exe 5000 zivet.exe 5000 zivet.exe 3668 vaijel.exe 3668 vaijel.exe 3560 tiazuf.exe 3560 tiazuf.exe 4216 pnhim.exe 4216 pnhim.exe 228 tqjeg.exe 228 tqjeg.exe 3380 maiuye.exe 3380 maiuye.exe 4320 ziebu.exe 4320 ziebu.exe 2236 daoori.exe 2236 daoori.exe 2692 cauusof.exe 2692 cauusof.exe 2592 wueboow.exe 2592 wueboow.exe 3216 kexuf.exe 3216 kexuf.exe 2008 jihuv.exe 2008 jihuv.exe 3548 toavee.exe 3548 toavee.exe 8 jeuyaa.exe 8 jeuyaa.exe 4748 xugop.exe 4748 xugop.exe 2592 roexaf.exe 2592 roexaf.exe 1112 zcriep.exe 1112 zcriep.exe 3852 ydmiew.exe 3852 ydmiew.exe 3284 veati.exe 3284 veati.exe 3244 haeewuv.exe 3244 haeewuv.exe 3140 jauup.exe 3140 jauup.exe 1808 rdnoel.exe 1808 rdnoel.exe 1636 peookil.exe 1636 peookil.exe 4484 joatee.exe 4484 joatee.exe -
Suspicious use of SetWindowsHookEx 39 IoCs
pid Process 2592 ebc85aff78379ad5dfbd38dd92bff4cd393316eb32814d491b964ed97947b360.exe 2136 kiejaat.exe 4400 jqcuem.exe 820 biafos.exe 2420 luook.exe 4248 vokeg.exe 2752 buohaaf.exe 3648 qaiipu.exe 5000 zivet.exe 3668 vaijel.exe 3560 tiazuf.exe 4216 pnhim.exe 228 tqjeg.exe 3380 maiuye.exe 4320 ziebu.exe 2236 daoori.exe 2692 cauusof.exe 2592 wueboow.exe 3216 kexuf.exe 2008 jihuv.exe 3548 toavee.exe 8 jeuyaa.exe 4748 xugop.exe 2592 roexaf.exe 1112 zcriep.exe 3852 ydmiew.exe 3284 veati.exe 3244 haeewuv.exe 3140 jauup.exe 1808 rdnoel.exe 1636 peookil.exe 4484 joatee.exe 508 jixeb.exe 2328 geaavoc.exe 3744 niasux.exe 4468 tuvob.exe 1168 foejuug.exe 548 moelaa.exe 4188 sieyaf.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2592 wrote to memory of 2136 2592 ebc85aff78379ad5dfbd38dd92bff4cd393316eb32814d491b964ed97947b360.exe 95 PID 2592 wrote to memory of 2136 2592 ebc85aff78379ad5dfbd38dd92bff4cd393316eb32814d491b964ed97947b360.exe 95 PID 2592 wrote to memory of 2136 2592 ebc85aff78379ad5dfbd38dd92bff4cd393316eb32814d491b964ed97947b360.exe 95 PID 2136 wrote to memory of 4400 2136 kiejaat.exe 100 PID 2136 wrote to memory of 4400 2136 kiejaat.exe 100 PID 2136 wrote to memory of 4400 2136 kiejaat.exe 100 PID 4400 wrote to memory of 820 4400 jqcuem.exe 102 PID 4400 wrote to memory of 820 4400 jqcuem.exe 102 PID 4400 wrote to memory of 820 4400 jqcuem.exe 102 PID 820 wrote to memory of 2420 820 biafos.exe 105 PID 820 wrote to memory of 2420 820 biafos.exe 105 PID 820 wrote to memory of 2420 820 biafos.exe 105 PID 2420 wrote to memory of 4248 2420 luook.exe 106 PID 2420 wrote to memory of 4248 2420 luook.exe 106 PID 2420 wrote to memory of 4248 2420 luook.exe 106 PID 4248 wrote to memory of 2752 4248 vokeg.exe 107 PID 4248 wrote to memory of 2752 4248 vokeg.exe 107 PID 4248 wrote to memory of 2752 4248 vokeg.exe 107 PID 2752 wrote to memory of 3648 2752 buohaaf.exe 109 PID 2752 wrote to memory of 3648 2752 buohaaf.exe 109 PID 2752 wrote to memory of 3648 2752 buohaaf.exe 109 PID 3648 wrote to memory of 5000 3648 qaiipu.exe 110 PID 3648 wrote to memory of 5000 3648 qaiipu.exe 110 PID 3648 wrote to memory of 5000 3648 qaiipu.exe 110 PID 5000 wrote to memory of 3668 5000 zivet.exe 111 PID 5000 wrote to memory of 3668 5000 zivet.exe 111 PID 5000 wrote to memory of 3668 5000 zivet.exe 111 PID 3668 wrote to memory of 3560 3668 vaijel.exe 112 PID 3668 wrote to memory of 3560 3668 vaijel.exe 112 PID 3668 wrote to memory of 3560 3668 vaijel.exe 112 PID 3560 wrote to memory of 4216 3560 tiazuf.exe 113 PID 3560 wrote to memory of 4216 3560 tiazuf.exe 113 PID 3560 wrote to memory of 4216 3560 tiazuf.exe 113 PID 4216 wrote to memory of 228 4216 pnhim.exe 115 PID 4216 wrote to memory of 228 4216 pnhim.exe 115 PID 4216 wrote to memory of 228 4216 pnhim.exe 115 PID 228 wrote to memory of 3380 228 tqjeg.exe 116 PID 228 wrote to memory of 3380 228 tqjeg.exe 116 PID 228 wrote to memory of 3380 228 tqjeg.exe 116 PID 3380 wrote to memory of 4320 3380 maiuye.exe 117 PID 3380 wrote to memory of 4320 3380 maiuye.exe 117 PID 3380 wrote to memory of 4320 3380 maiuye.exe 117 PID 4320 wrote to memory of 2236 4320 ziebu.exe 118 PID 4320 wrote to memory of 2236 4320 ziebu.exe 118 PID 4320 wrote to memory of 2236 4320 ziebu.exe 118 PID 2236 wrote to memory of 2692 2236 daoori.exe 119 PID 2236 wrote to memory of 2692 2236 daoori.exe 119 PID 2236 wrote to memory of 2692 2236 daoori.exe 119 PID 2692 wrote to memory of 2592 2692 cauusof.exe 120 PID 2692 wrote to memory of 2592 2692 cauusof.exe 120 PID 2692 wrote to memory of 2592 2692 cauusof.exe 120 PID 2592 wrote to memory of 3216 2592 wueboow.exe 121 PID 2592 wrote to memory of 3216 2592 wueboow.exe 121 PID 2592 wrote to memory of 3216 2592 wueboow.exe 121 PID 3216 wrote to memory of 2008 3216 kexuf.exe 122 PID 3216 wrote to memory of 2008 3216 kexuf.exe 122 PID 3216 wrote to memory of 2008 3216 kexuf.exe 122 PID 2008 wrote to memory of 3548 2008 jihuv.exe 123 PID 2008 wrote to memory of 3548 2008 jihuv.exe 123 PID 2008 wrote to memory of 3548 2008 jihuv.exe 123 PID 3548 wrote to memory of 8 3548 toavee.exe 124 PID 3548 wrote to memory of 8 3548 toavee.exe 124 PID 3548 wrote to memory of 8 3548 toavee.exe 124 PID 8 wrote to memory of 4748 8 jeuyaa.exe 125
Processes
-
C:\Users\Admin\AppData\Local\Temp\ebc85aff78379ad5dfbd38dd92bff4cd393316eb32814d491b964ed97947b360.exe"C:\Users\Admin\AppData\Local\Temp\ebc85aff78379ad5dfbd38dd92bff4cd393316eb32814d491b964ed97947b360.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Users\Admin\kiejaat.exe"C:\Users\Admin\kiejaat.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Users\Admin\jqcuem.exe"C:\Users\Admin\jqcuem.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4400 -
C:\Users\Admin\biafos.exe"C:\Users\Admin\biafos.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:820 -
C:\Users\Admin\luook.exe"C:\Users\Admin\luook.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Users\Admin\vokeg.exe"C:\Users\Admin\vokeg.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4248 -
C:\Users\Admin\buohaaf.exe"C:\Users\Admin\buohaaf.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Users\Admin\qaiipu.exe"C:\Users\Admin\qaiipu.exe"8⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3648 -
C:\Users\Admin\zivet.exe"C:\Users\Admin\zivet.exe"9⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Users\Admin\vaijel.exe"C:\Users\Admin\vaijel.exe"10⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3668 -
C:\Users\Admin\tiazuf.exe"C:\Users\Admin\tiazuf.exe"11⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3560 -
C:\Users\Admin\pnhim.exe"C:\Users\Admin\pnhim.exe"12⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4216 -
C:\Users\Admin\tqjeg.exe"C:\Users\Admin\tqjeg.exe"13⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Users\Admin\maiuye.exe"C:\Users\Admin\maiuye.exe"14⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3380 -
C:\Users\Admin\ziebu.exe"C:\Users\Admin\ziebu.exe"15⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4320 -
C:\Users\Admin\daoori.exe"C:\Users\Admin\daoori.exe"16⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Users\Admin\cauusof.exe"C:\Users\Admin\cauusof.exe"17⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Users\Admin\wueboow.exe"C:\Users\Admin\wueboow.exe"18⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Users\Admin\kexuf.exe"C:\Users\Admin\kexuf.exe"19⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3216 -
C:\Users\Admin\jihuv.exe"C:\Users\Admin\jihuv.exe"20⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Users\Admin\toavee.exe"C:\Users\Admin\toavee.exe"21⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3548 -
C:\Users\Admin\jeuyaa.exe"C:\Users\Admin\jeuyaa.exe"22⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:8 -
C:\Users\Admin\xugop.exe"C:\Users\Admin\xugop.exe"23⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4748 -
C:\Users\Admin\roexaf.exe"C:\Users\Admin\roexaf.exe"24⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2592 -
C:\Users\Admin\zcriep.exe"C:\Users\Admin\zcriep.exe"25⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1112 -
C:\Users\Admin\ydmiew.exe"C:\Users\Admin\ydmiew.exe"26⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3852 -
C:\Users\Admin\veati.exe"C:\Users\Admin\veati.exe"27⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3284 -
C:\Users\Admin\haeewuv.exe"C:\Users\Admin\haeewuv.exe"28⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3244 -
C:\Users\Admin\jauup.exe"C:\Users\Admin\jauup.exe"29⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3140 -
C:\Users\Admin\rdnoel.exe"C:\Users\Admin\rdnoel.exe"30⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1808 -
C:\Users\Admin\peookil.exe"C:\Users\Admin\peookil.exe"31⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1636 -
C:\Users\Admin\joatee.exe"C:\Users\Admin\joatee.exe"32⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4484 -
C:\Users\Admin\jixeb.exe"C:\Users\Admin\jixeb.exe"33⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:508 -
C:\Users\Admin\geaavoc.exe"C:\Users\Admin\geaavoc.exe"34⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2328 -
C:\Users\Admin\niasux.exe"C:\Users\Admin\niasux.exe"35⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3744 -
C:\Users\Admin\tuvob.exe"C:\Users\Admin\tuvob.exe"36⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4468 -
C:\Users\Admin\foejuug.exe"C:\Users\Admin\foejuug.exe"37⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1168 -
C:\Users\Admin\moelaa.exe"C:\Users\Admin\moelaa.exe"38⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:548 -
C:\Users\Admin\sieyaf.exe"C:\Users\Admin\sieyaf.exe"39⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4188
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4120 --field-trial-handle=2280,i,4114443225282860369,4764091921472631035,262144 --variations-seed-version /prefetch:81⤵PID:2064
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224KB
MD5e317d14c2291e3f29441fb2fc8ea78ae
SHA1e45648049ea3e0a39b2d75412c6d230594aff517
SHA2561591620c875229a4c25f248ccdd9d3ec71dc55c5f337c4c7ba12e50ec43e0bc2
SHA512f98053dfc0dd2cbec6e34affbfb92b18108354b27b1e18fbcc340155dc4a7904f6a73a47459a33ba70bbfe0a5115d2211c4cc7bcc668b27db6b43f32b962f0df
-
Filesize
224KB
MD54bd050c9c415ac156f7bd540c499627c
SHA1e612cd60056a7fb9e339464b8c185c7884ff0bcd
SHA2564b2455ccf1cc41c2680c60eb681b48f9af1630234c2a54f4c196c683ddad405e
SHA51223bb641f9526ffc99319c2053ef4306efeac91768e8d231a6511a561937e9f374e936ab0c2c5cb3b7499b6bffd25370ecf8272919577fe0198988f7239f32166
-
Filesize
224KB
MD5dbe4bf3269e77b5e706ec06a8bb0e7d0
SHA1ff438be2156bb9250d640c2b207d908dd9323a6c
SHA256aeaf9db4c885fa118d30c4613146ddfbefc69ff97a63fed913e01b949a4d6e21
SHA512aa9ca3ac4bb7a11031e7c48420322e7fdb3125806ba0033148bbf2f595f5c4e99ee9e3b47c894aeeda1ef12854f7af4b70701bf8db698f8fff522c8813386e80
-
Filesize
224KB
MD56227bffece5ba65d7fb53fabbffe2690
SHA189b5bd7f101ef6b1c6e3118f696497841ad6bce6
SHA256b31cdf8d2232f47a21dfda0e7044d5da762e1e5b5144903b2bbeeec4f8dc40c7
SHA5128c481b3abb3c61901578ab72a74924c7eb1b8ff3a1bc0f8f6889d7b497f78ebfa4f5a034341642bfb5ff094eb2c75306b92ce8a36856b3b20cb811f2bc099016
-
Filesize
224KB
MD53f3297e7135887ad15828ce9c78d1956
SHA1949ee52788bc2ed419266e3ecd6de6d08daa6489
SHA2569e2f124524a25931211667fa1ed4cae255cda708d72713b74f25dd81e32b5902
SHA512a2fce5c35d7bf2b5b1d12982a3a160944ee31a234dfee5d854e72cae45425e4a621e8c696e4d1f34823ca6c2d307e9974c919fc69afd40067d117df8a1f12742
-
Filesize
224KB
MD5a5eb525f855fd707f7ea769462eff0de
SHA1391603702fa49434f6b6e6773c807af1c22b4af0
SHA25604c0a5d8e1bd26ac97aed5bbe6e087f03ea316c72b0b9ace12ab91f8774d3ba4
SHA5126189cd716e422a136b8af2d2a0f4a03e7360fb56bfde28d3098b09f87ccf78043ee29496f89acd0f9d2ee6f23dc17f8696b1414031b768de444b2353e45577a7
-
Filesize
224KB
MD5af7e2350b6765182cda5dfa37abd052e
SHA1be788f0fcb4a5def16780683dbf322ca7455f958
SHA256c5c3ad74e41ec0f9ff07afc3553595efcb520ad6c7d8885bbd569f5b193abe5a
SHA51210991bb8161c0020663745ec9b78abc177be240cd7914aff5da2d88918056bb8cfa3aab5f378e394448b12d588f213e6bdada299445494313f2d7b6c069875ed
-
Filesize
224KB
MD5959b0c126cf31b52fd1812bd5cd2a515
SHA1822160f323e549a46e0ab07c67ed648ea7fd0250
SHA256c1f36b2cb683aa28aede0fde7cbc42bb82c72c5c4adb0cccabbdb4830056e68d
SHA512d43c1d0f2a9f5e146a282b46522ec04f6268a0dcf026a2902b6da786aaa04d5d3ec328d44c846d2e350e0187c68128270397f60ca1b0ee9060126650f87b1124
-
Filesize
224KB
MD507aa14401937806d96f7b75dca4c6420
SHA1f818e3e04d1d2c44c28fb0c21fb8adaf5ef73a5b
SHA256409f2bde103a428b05c448fe555b2161dc82c134a1b6cc29342a38711395ef14
SHA5127d4fd8fff670fa02d2597a126a19afe1d5a58fa6c05f91f1c47b284dec4258d58f6e00661c7f7d4254f82ea590ae98e011e4306f6a12b39e8807bce33c78fcd9
-
Filesize
224KB
MD5043bd6b449c1651766d77390ea00a959
SHA1e63f4fc2ad1f3e7e14a20f4946670be9d471d0e9
SHA256d999014e1933833f4f6fcb8aecfd3cff6dbb98592a26203a89ac6de6ce9847ec
SHA512f448ed4e8d5b10938450f9efaad062a732a51ec7b1fa854ddea64234be212d65d2a47ce1de796be478752bceffd24f8b73233836a3a81099b7c8beac5370cbf1
-
Filesize
224KB
MD50dd7f96a7b024ace266e36dfcc0fa7e4
SHA1e54797e21630e293921d651eef3f8315f28528c6
SHA256d74e98a254cde3a9d6716b67f33e41e536a889d48c929e8765a8280dedb3f20e
SHA512ef8d4a3c5d96ad42e69955ccaeede1d35bffacb0a978682d774474cc63af4566366a44f5ed7df3377ed3495247d4d8e7616aba577ad9401f9cb8e11615adacc6
-
Filesize
224KB
MD5b081c27ad0c2dd17ccdcf36aa3b5f4ce
SHA18bb1536f9d23749d49a867d6119a811858289158
SHA2569073fa07db3ab34304fdca4a4b8380bea26d23da005fb7833a5ee393f4f728f2
SHA5121f33c251b9cef23ce3788920992d8a7fe136b1dab1377360448f6ab17922cddd8437dc533158c94b4e270c9bbf67a683a090ef66bab458937feb05849f02b83f
-
Filesize
224KB
MD5d6a636d50176041ac15819d4c96f7b66
SHA19d3181abefa3ed60550ade11b90ae2f41d973f90
SHA256567ea923d915920a1165f1839f5a16c23a8c68cb07f511a4f2d1e1a242c48dd6
SHA512f8e92dde1446a27b3c8c23d08ddbffd13ff9a019bdd9b76956997376bedf3f37578c6d958aac080197ad026b87e9322a0e9e8d47e0570760a5cf14c531615d84
-
Filesize
224KB
MD5b7495aeafc0fc394ef0550bf5a01cce4
SHA14fdcf82782a952a5332a41a7ca97cd917cb27e52
SHA2569a5ba771edf3ea7f6acbd4d21647bc7c1216d75b2fab7aa4cc22c5f341298c04
SHA5126be01c075bee3b596b36598d56116099af901017866b92b469ab28704dfce34b576af9458de3146c5195572441eba695e5f43ead12c275d105f5ce5df607aa9c
-
Filesize
224KB
MD52a5c03dabfa1b436f3338b7b38065655
SHA1a9280aa043db9fb03dae5ff73281a1445db4e645
SHA256fb90efc60758ef3e68a21e06060e89c5e84aa3bb1f659038e53fd4c257fe7d3c
SHA512725f25f2285b220d04776ef9212d567beb7f3fd6fb545c3c34d8433e6879cbb29b109b8860c3942e5bb1e19597ec5389c48fdeef53859e74d9d1f07e62600fe5
-
Filesize
224KB
MD580bbdd733fe0db3deaade94e5dac9b20
SHA1c7542cbeca45380c9df375f18d3fc9482c9ecb06
SHA25624582260fa6c808f8e31f0a7faca0996a408d77a91151c80a81dee005f78aef1
SHA51213b4e43bb1d574ade3d5277f38b0d7c0d611c27bef59f84587d15b7c346018c25c2764467efcbedbbb6a98571a0d43f97d3da0de6cfbed31646c0fba26c754d0
-
Filesize
224KB
MD51dd548ce25fd0cb363707734d2a7ff18
SHA1de6a8a984abd64f994f585baa219cb6b1b33c787
SHA25657dedb201a771c0268b0994b0b9e52788aca501a3319805bf386f722ffc6b3f7
SHA5129c93605905434c85f5ecc3f87b764e4b9876ac195cb37948f351a2035976cb309ae503131dbf962b85623099fdbd7f80586e41d7b2bf4ac1152e508288d574db
-
Filesize
224KB
MD53daba756901fe0c7cdc9dc6754d2133c
SHA11984e5abdc1bb542c3c1a0bf2cee823a79c73807
SHA25673ca84fa4a8772615bc283423f09b1812b0a95b3835a6068bd95ec4c826d230f
SHA512a1f4b04f5e7a6dccb18e328b2e2109fc79d35f5f9dce3ba51fa822860579c330a4c370c1ca6810bc47616859d9213e146361532a05c3e728fe5f8610b025d873
-
Filesize
224KB
MD531caa46612a53844115cda375205c26a
SHA12c5da39e85d7ca151106ff7226e0666ebbd9374a
SHA2562383c18c0ed83dd302ad0c4937c171cb656a776db58319215d9998037f32ac0f
SHA51210232d0b6b540ac934cb8267d2aba7156ae9c09f3afd14e0f748455b3348a0a18c77a023a211fc642da17e27f2204a902698db532f6e766adf0993d401e5583c
-
Filesize
224KB
MD5160c3b6224c2c2d234d2e3dbb8b263e8
SHA1ffda7b712486d06bd0e5c4bcd4a61e32e0d08725
SHA2564ddd4570d7c8e767f1e4635ce806726cc1b6607f407fe287449e031f98dc5be1
SHA512d8167ab5c08967793ff3bbd5adf8fe2c2c99f73b2928d3f20c91f96891541bbaa12c380499cfdbd1759b5aed22531191774e27ac8245f073df7f3ba6ef35f1fd
-
Filesize
224KB
MD5bd668fcfc6fed85fa173b6c003fed479
SHA1d88af09bc2f6364dccd35724292050dbc4e0030c
SHA256b01347eddc7d5145c244565c425c7dce9dd46126ddba5ef5809b7aee44cfa9d3
SHA512cb2858e69cf1f1743e48b2935411ca8102c6de4013c9339847080320919ed763976ff92dbe73895ce423c03a0b0f48b060368fe16c5443a117acf89b504a928e
-
Filesize
224KB
MD582272d56f5040991bdec8595827f424d
SHA1196c97fa14b44de2898b6ff093b64cfe80e996f6
SHA256ee0ddde4bbdb21dd62abbc4353d24dbec9d6baa463edeceaf0d9100a4411c7cd
SHA5127eef01dd8ded5fc7ceffc54a30d6f0fad577bed6ad4f39e4eb45344cfac9f9e7f1670dc5100a89d5fdf61092ba22e6d16315714e630757860b7bcafc707620d4
-
Filesize
224KB
MD56e11ecea15b8397e121b81fc772e7b9e
SHA151d5b07451ba8e9d09b8ac3faebd2706a2d6f19b
SHA2567622cac2fdb6192e1f9f1baa83c4613211dd89fcd9b4ab3c5ae1504303c96479
SHA5126732734d1ecceba20f0395f91f6d6768ffa75f0779457ca4dc44aa203ec63583b690b5063674cf25f9bb8d5c8af213f4673f04f56d13bf59dbde054b636c7682
-
Filesize
224KB
MD569843fbf0dea3a6812fedfda9dbb1d09
SHA1274e03c2693797494f668ed4731cab7d73fee01d
SHA2565fc8895f9a5768735132fbc7254ca22e264e062515b7d1ba5b2b839cc344bfe5
SHA5122234388d3c38b610708ce313e2038491f6608c16ae38f78cbb94cedea15463ba8e5a07d6e2d087c033f97826de5dd8d1d3d12330f0d40729e6a4f3bb555afc33
-
Filesize
224KB
MD570f889d51af45d8fbdf5d55568dca39a
SHA12e8914a519612f14ac59b3aae5bf4e2951192c4b
SHA256de1bf0502153e596160c97797ebfc84bdb43678f0f6195f6af81b3f0784578b0
SHA5126bdcaaf00945642327a2aab082539437fda4c259f75bbdb669ccdf65ef82aa287a3ee54b9f662009d859b66f47c2e93ff4c489c659983a022916181e3f02e14c
-
Filesize
224KB
MD587a3c731979b06cd3af9a923e7c55710
SHA106cc0dccb34f7e4173a2884aec9486308f7c9b7b
SHA2563fb1702b0d5b2c6f950efc2c2c915f6f614a7405a4f154c629b83d763f48e2d3
SHA5127854f97c4695eec12854712316bf7d0df8671833e8597422afe0af36f5008d42b6375f00e5abb8beccd045efaf6ceaa312e2e4a1450a8fccb3c8d9effb7474ab
-
Filesize
224KB
MD5048cfb100499a40d7e30c961273e772c
SHA18e05ca81fe8fadd90c31f17212e49cf8cdec2a09
SHA256076a1da5ad7f3f925dafdb009a1c3e25f2b3a763f33a141f857f0045abaadc2b
SHA512a8da1c44f828baba419a60660211003808e143ca67b5e650bce4e7bd84b40cfc71728d8a6f61952cbf0c1c549cca8f1e515d2de90cdeb65395136ddadef2d877
-
Filesize
224KB
MD543dee764dd4001dd3f81ec80d39e5797
SHA1d5b1eb775460b28b1c39af91958b184fba8f51e6
SHA256b18fda62ea8668e69811425ebe853512af39786616b65bdcbd475658b31b2a00
SHA51220a7d3530e22abe766f07f96c94729fe275b66e6bd159de50f9250f70a574218134c2b990feeaba647d32d4497d55f86d2d983ccc15b16ae5515d781d0a47a96
-
Filesize
224KB
MD5173561575136ae9b7c391aeed741df16
SHA13fce0c5c3f3f59ee3ba2821a28db6d28e6d39e47
SHA2567cb206c0df4017ecfd14ccd7d395e2047253a1f27d10b50cc8653751fa5fbf8c
SHA5124b30fc1c404bc697073281b592fd42ef5c44d97d98dc3ac11a478f701a9fb03c82935787c63ff81c28a0da61ffed0f71185c40d6aa878708c81281cc0800caad
-
Filesize
224KB
MD5b9420c4e03c8f99a1dab2c5e6bc99cba
SHA1affa36b0dd1c7fc423a527ac9fcf2acdca71be59
SHA256ecffba7a5450b168e7ed239463061f99295a46913e20c6f5466012f569902008
SHA51273efd5136fd39da38229666124fb44d64a73df57efa024f90878e6511f8d0263540d474daa4e975d104622596440bb3768d46de94da5815a142368ec2d277eac
-
Filesize
224KB
MD51e098f3c5dafefc7779fe9d7027c71d3
SHA11bb9bb58097056dced44d667039895d5e2a50024
SHA256f2c685cfce6490d8f8ba6a7d3bf8507cf8c9ce13e58e48c4f658be7613400835
SHA512c74005427f42b7f6eee7f81ead41c0895081eb7a245b3eb2f8e5430a1df0a2bded9322daac6da88c5234035ac5e4c575bd018013bed439a6cbe208eaa4f54f56
-
Filesize
224KB
MD51fdd34aa46cbc8d053cdbe70f1631108
SHA10fca81abe05f94ede9840cc14a65cdffd8e5eaff
SHA2565a100ba4f0604c850e84acbf182a583b3669812870b700f7ca971b09a2be024b
SHA51202fb3c5f8a98238b580a0a46ba017b01f664597ffdabf272e936e3884119986415f49b6a288c1bbcd74eb557c7f64c04a29e416a8190a2546c0fb21178b96f3e