Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
25/04/2024, 03:55
Static task
static1
Behavioral task
behavioral1
Sample
d6fb4e84b42c2bf97b6cfa49b2ee34f61b462e04d97181b66de44149665b6feb.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
d6fb4e84b42c2bf97b6cfa49b2ee34f61b462e04d97181b66de44149665b6feb.exe
Resource
win10v2004-20240226-en
General
-
Target
d6fb4e84b42c2bf97b6cfa49b2ee34f61b462e04d97181b66de44149665b6feb.exe
-
Size
224KB
-
MD5
29239936028f8eb516700014845eded3
-
SHA1
34734a314ca6cf889919726e1179502578925b87
-
SHA256
d6fb4e84b42c2bf97b6cfa49b2ee34f61b462e04d97181b66de44149665b6feb
-
SHA512
3a7b822470d77520cfc1874fa464ebba429b908fc9a9b78568afd7ee1088ac8071ab6494d60c120325b348d614eb9a6e1f48bae0623cb43dee3d07b2cc39815b
-
SSDEEP
3072:GG+KCdTZH9DhCjG8G3GbGVGBGfGuGxGWYcrf6Kad0:GGvCdTp1AYcD6Kad
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 40 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation baeexo.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation juvob.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation joanee.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation keasii.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation vaoof.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation xuezoo.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation xueyoo.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation zuoop.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation vrqot.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation veati.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation baeuxo.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation geabim.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation yeabo.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation wiebaal.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation jiafux.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation cuoor.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation fauce.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation haeewuv.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation neasuy.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation xiemaac.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation baiiye.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation scpeq.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation teasi.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation tbvoik.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation xbvoir.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation caebu.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation daiiwe.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation xbvoir.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation xeabip.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation miaku.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation lieeyun.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation scriem.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation hopik.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation ziamuu.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation haebu.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation neasuy.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation juvon.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation poiizuq.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation d6fb4e84b42c2bf97b6cfa49b2ee34f61b462e04d97181b66de44149665b6feb.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation krluem.exe -
Executes dropped EXE 40 IoCs
pid Process 1560 daiiwe.exe 1164 scriem.exe 4460 xbvoir.exe 4300 juvon.exe 2472 cuoor.exe 4876 keasii.exe 4604 hopik.exe 3640 ziamuu.exe 4300 vaoof.exe 1680 fauce.exe 4840 haeewuv.exe 2040 xuezoo.exe 3176 scpeq.exe 1016 xueyoo.exe 436 veati.exe 2928 krluem.exe 4848 poiizuq.exe 2040 haebu.exe 5068 zuoop.exe 2096 teasi.exe 3664 tbvoik.exe 4580 baeexo.exe 212 neasuy.exe 4436 juvob.exe 968 baeuxo.exe 400 neasuy.exe 1260 xiemaac.exe 4332 xeabip.exe 2852 xbvoir.exe 5028 miaku.exe 5072 geabim.exe 4696 lieeyun.exe 184 caebu.exe 1320 wiebaal.exe 2452 baiiye.exe 2768 jiafux.exe 700 joanee.exe 4636 vrqot.exe 1164 yeabo.exe 2864 feoti.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2332 d6fb4e84b42c2bf97b6cfa49b2ee34f61b462e04d97181b66de44149665b6feb.exe 2332 d6fb4e84b42c2bf97b6cfa49b2ee34f61b462e04d97181b66de44149665b6feb.exe 1560 daiiwe.exe 1560 daiiwe.exe 1164 scriem.exe 1164 scriem.exe 4460 xbvoir.exe 4460 xbvoir.exe 4300 juvon.exe 4300 juvon.exe 2472 cuoor.exe 2472 cuoor.exe 4876 keasii.exe 4876 keasii.exe 4604 hopik.exe 4604 hopik.exe 3640 ziamuu.exe 3640 ziamuu.exe 4300 vaoof.exe 4300 vaoof.exe 1680 fauce.exe 1680 fauce.exe 4840 haeewuv.exe 4840 haeewuv.exe 2040 xuezoo.exe 2040 xuezoo.exe 3176 scpeq.exe 3176 scpeq.exe 1016 xueyoo.exe 1016 xueyoo.exe 436 veati.exe 436 veati.exe 2928 krluem.exe 2928 krluem.exe 4848 poiizuq.exe 4848 poiizuq.exe 2040 haebu.exe 2040 haebu.exe 5068 zuoop.exe 5068 zuoop.exe 2096 teasi.exe 2096 teasi.exe 3664 tbvoik.exe 3664 tbvoik.exe 4580 baeexo.exe 4580 baeexo.exe 212 neasuy.exe 212 neasuy.exe 4436 juvob.exe 4436 juvob.exe 968 baeuxo.exe 968 baeuxo.exe 400 neasuy.exe 400 neasuy.exe 1260 xiemaac.exe 1260 xiemaac.exe 4332 xeabip.exe 4332 xeabip.exe 2852 xbvoir.exe 2852 xbvoir.exe 5028 miaku.exe 5028 miaku.exe 5072 geabim.exe 5072 geabim.exe -
Suspicious use of SetWindowsHookEx 41 IoCs
pid Process 2332 d6fb4e84b42c2bf97b6cfa49b2ee34f61b462e04d97181b66de44149665b6feb.exe 1560 daiiwe.exe 1164 scriem.exe 4460 xbvoir.exe 4300 juvon.exe 2472 cuoor.exe 4876 keasii.exe 4604 hopik.exe 3640 ziamuu.exe 4300 vaoof.exe 1680 fauce.exe 4840 haeewuv.exe 2040 xuezoo.exe 3176 scpeq.exe 1016 xueyoo.exe 436 veati.exe 2928 krluem.exe 4848 poiizuq.exe 2040 haebu.exe 5068 zuoop.exe 2096 teasi.exe 3664 tbvoik.exe 4580 baeexo.exe 212 neasuy.exe 4436 juvob.exe 968 baeuxo.exe 400 neasuy.exe 1260 xiemaac.exe 4332 xeabip.exe 2852 xbvoir.exe 5028 miaku.exe 5072 geabim.exe 4696 lieeyun.exe 184 caebu.exe 1320 wiebaal.exe 2452 baiiye.exe 2768 jiafux.exe 700 joanee.exe 4636 vrqot.exe 1164 yeabo.exe 2864 feoti.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2332 wrote to memory of 1560 2332 d6fb4e84b42c2bf97b6cfa49b2ee34f61b462e04d97181b66de44149665b6feb.exe 92 PID 2332 wrote to memory of 1560 2332 d6fb4e84b42c2bf97b6cfa49b2ee34f61b462e04d97181b66de44149665b6feb.exe 92 PID 2332 wrote to memory of 1560 2332 d6fb4e84b42c2bf97b6cfa49b2ee34f61b462e04d97181b66de44149665b6feb.exe 92 PID 1560 wrote to memory of 1164 1560 daiiwe.exe 93 PID 1560 wrote to memory of 1164 1560 daiiwe.exe 93 PID 1560 wrote to memory of 1164 1560 daiiwe.exe 93 PID 1164 wrote to memory of 4460 1164 scriem.exe 98 PID 1164 wrote to memory of 4460 1164 scriem.exe 98 PID 1164 wrote to memory of 4460 1164 scriem.exe 98 PID 4460 wrote to memory of 4300 4460 xbvoir.exe 100 PID 4460 wrote to memory of 4300 4460 xbvoir.exe 100 PID 4460 wrote to memory of 4300 4460 xbvoir.exe 100 PID 4300 wrote to memory of 2472 4300 juvon.exe 103 PID 4300 wrote to memory of 2472 4300 juvon.exe 103 PID 4300 wrote to memory of 2472 4300 juvon.exe 103 PID 2472 wrote to memory of 4876 2472 cuoor.exe 104 PID 2472 wrote to memory of 4876 2472 cuoor.exe 104 PID 2472 wrote to memory of 4876 2472 cuoor.exe 104 PID 4876 wrote to memory of 4604 4876 keasii.exe 106 PID 4876 wrote to memory of 4604 4876 keasii.exe 106 PID 4876 wrote to memory of 4604 4876 keasii.exe 106 PID 4604 wrote to memory of 3640 4604 hopik.exe 107 PID 4604 wrote to memory of 3640 4604 hopik.exe 107 PID 4604 wrote to memory of 3640 4604 hopik.exe 107 PID 3640 wrote to memory of 4300 3640 ziamuu.exe 108 PID 3640 wrote to memory of 4300 3640 ziamuu.exe 108 PID 3640 wrote to memory of 4300 3640 ziamuu.exe 108 PID 4300 wrote to memory of 1680 4300 vaoof.exe 109 PID 4300 wrote to memory of 1680 4300 vaoof.exe 109 PID 4300 wrote to memory of 1680 4300 vaoof.exe 109 PID 1680 wrote to memory of 4840 1680 fauce.exe 110 PID 1680 wrote to memory of 4840 1680 fauce.exe 110 PID 1680 wrote to memory of 4840 1680 fauce.exe 110 PID 4840 wrote to memory of 2040 4840 haeewuv.exe 111 PID 4840 wrote to memory of 2040 4840 haeewuv.exe 111 PID 4840 wrote to memory of 2040 4840 haeewuv.exe 111 PID 2040 wrote to memory of 3176 2040 xuezoo.exe 113 PID 2040 wrote to memory of 3176 2040 xuezoo.exe 113 PID 2040 wrote to memory of 3176 2040 xuezoo.exe 113 PID 3176 wrote to memory of 1016 3176 scpeq.exe 114 PID 3176 wrote to memory of 1016 3176 scpeq.exe 114 PID 3176 wrote to memory of 1016 3176 scpeq.exe 114 PID 1016 wrote to memory of 436 1016 xueyoo.exe 115 PID 1016 wrote to memory of 436 1016 xueyoo.exe 115 PID 1016 wrote to memory of 436 1016 xueyoo.exe 115 PID 436 wrote to memory of 2928 436 veati.exe 116 PID 436 wrote to memory of 2928 436 veati.exe 116 PID 436 wrote to memory of 2928 436 veati.exe 116 PID 2928 wrote to memory of 4848 2928 krluem.exe 117 PID 2928 wrote to memory of 4848 2928 krluem.exe 117 PID 2928 wrote to memory of 4848 2928 krluem.exe 117 PID 4848 wrote to memory of 2040 4848 poiizuq.exe 118 PID 4848 wrote to memory of 2040 4848 poiizuq.exe 118 PID 4848 wrote to memory of 2040 4848 poiizuq.exe 118 PID 2040 wrote to memory of 5068 2040 haebu.exe 119 PID 2040 wrote to memory of 5068 2040 haebu.exe 119 PID 2040 wrote to memory of 5068 2040 haebu.exe 119 PID 5068 wrote to memory of 2096 5068 zuoop.exe 120 PID 5068 wrote to memory of 2096 5068 zuoop.exe 120 PID 5068 wrote to memory of 2096 5068 zuoop.exe 120 PID 2096 wrote to memory of 3664 2096 teasi.exe 121 PID 2096 wrote to memory of 3664 2096 teasi.exe 121 PID 2096 wrote to memory of 3664 2096 teasi.exe 121 PID 3664 wrote to memory of 4580 3664 tbvoik.exe 122
Processes
-
C:\Users\Admin\AppData\Local\Temp\d6fb4e84b42c2bf97b6cfa49b2ee34f61b462e04d97181b66de44149665b6feb.exe"C:\Users\Admin\AppData\Local\Temp\d6fb4e84b42c2bf97b6cfa49b2ee34f61b462e04d97181b66de44149665b6feb.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Users\Admin\daiiwe.exe"C:\Users\Admin\daiiwe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Users\Admin\scriem.exe"C:\Users\Admin\scriem.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\Users\Admin\xbvoir.exe"C:\Users\Admin\xbvoir.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Users\Admin\juvon.exe"C:\Users\Admin\juvon.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4300 -
C:\Users\Admin\cuoor.exe"C:\Users\Admin\cuoor.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Users\Admin\keasii.exe"C:\Users\Admin\keasii.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Users\Admin\hopik.exe"C:\Users\Admin\hopik.exe"8⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Users\Admin\ziamuu.exe"C:\Users\Admin\ziamuu.exe"9⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3640 -
C:\Users\Admin\vaoof.exe"C:\Users\Admin\vaoof.exe"10⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4300 -
C:\Users\Admin\fauce.exe"C:\Users\Admin\fauce.exe"11⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Users\Admin\haeewuv.exe"C:\Users\Admin\haeewuv.exe"12⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4840 -
C:\Users\Admin\xuezoo.exe"C:\Users\Admin\xuezoo.exe"13⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Users\Admin\scpeq.exe"C:\Users\Admin\scpeq.exe"14⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3176 -
C:\Users\Admin\xueyoo.exe"C:\Users\Admin\xueyoo.exe"15⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1016 -
C:\Users\Admin\veati.exe"C:\Users\Admin\veati.exe"16⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:436 -
C:\Users\Admin\krluem.exe"C:\Users\Admin\krluem.exe"17⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Users\Admin\poiizuq.exe"C:\Users\Admin\poiizuq.exe"18⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Users\Admin\haebu.exe"C:\Users\Admin\haebu.exe"19⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Users\Admin\zuoop.exe"C:\Users\Admin\zuoop.exe"20⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Users\Admin\teasi.exe"C:\Users\Admin\teasi.exe"21⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Users\Admin\tbvoik.exe"C:\Users\Admin\tbvoik.exe"22⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3664 -
C:\Users\Admin\baeexo.exe"C:\Users\Admin\baeexo.exe"23⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4580 -
C:\Users\Admin\neasuy.exe"C:\Users\Admin\neasuy.exe"24⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:212 -
C:\Users\Admin\juvob.exe"C:\Users\Admin\juvob.exe"25⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4436 -
C:\Users\Admin\baeuxo.exe"C:\Users\Admin\baeuxo.exe"26⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:968 -
C:\Users\Admin\neasuy.exe"C:\Users\Admin\neasuy.exe"27⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:400 -
C:\Users\Admin\xiemaac.exe"C:\Users\Admin\xiemaac.exe"28⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1260 -
C:\Users\Admin\xeabip.exe"C:\Users\Admin\xeabip.exe"29⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4332 -
C:\Users\Admin\xbvoir.exe"C:\Users\Admin\xbvoir.exe"30⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2852 -
C:\Users\Admin\miaku.exe"C:\Users\Admin\miaku.exe"31⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5028 -
C:\Users\Admin\geabim.exe"C:\Users\Admin\geabim.exe"32⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5072 -
C:\Users\Admin\lieeyun.exe"C:\Users\Admin\lieeyun.exe"33⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4696 -
C:\Users\Admin\caebu.exe"C:\Users\Admin\caebu.exe"34⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:184 -
C:\Users\Admin\wiebaal.exe"C:\Users\Admin\wiebaal.exe"35⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1320 -
C:\Users\Admin\baiiye.exe"C:\Users\Admin\baiiye.exe"36⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2452 -
C:\Users\Admin\jiafux.exe"C:\Users\Admin\jiafux.exe"37⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2768 -
C:\Users\Admin\joanee.exe"C:\Users\Admin\joanee.exe"38⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:700 -
C:\Users\Admin\vrqot.exe"C:\Users\Admin\vrqot.exe"39⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4636 -
C:\Users\Admin\yeabo.exe"C:\Users\Admin\yeabo.exe"40⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1164 -
C:\Users\Admin\feoti.exe"C:\Users\Admin\feoti.exe"41⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2864
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3696 --field-trial-handle=3192,i,2785050981002401924,4037047756083432660,262144 --variations-seed-version /prefetch:81⤵PID:2348
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224KB
MD51fadea39541fbff620e5fc62046d4885
SHA1f15dfd648541d97449efd490f0000af1d55da520
SHA2569b8cd13570bac48e16cc947dc0a85451e3a78b8ad912e20011832912f1c8e4d8
SHA5125ab5fd3e9971d68df2046b3cd6930e1b9fd69cb42eaa7a38bd326bf318ddd82b887f15da2c2fe373fe31a2bf467ec17ff845bfa28dd7776836b64254b481c552
-
Filesize
224KB
MD5ee69a3bb4d604bba34dd376d780ac58f
SHA1126bc09d102b5c8eb01d8b0edaf34e3e3d614eb5
SHA256a2d67f5365bb822deb6e13715589c15c6526b52cee74ef326196da7ec6b84ccf
SHA512216f96ecd0ed6a38dcdeea72de19729a2342b4e488b35a9633725330eb32f9a0b11e4646143f1b344d00699f0697d333453ed8073ec5cbac85ea0a6089f81a9b
-
Filesize
224KB
MD5492c8905dbed3d7ccfd9be358e2fafe6
SHA1b725c684e7268d59219cc4c4293db56f03888f07
SHA256253b4e3ba14fbd634cd2b491c1d5e41a6d4975b71a1515dbb4a92670f48e3958
SHA512061fa7fdcdede982094ce27517fc25bd3ae3009580a14d89eace7b2342b57645f12bb79cc2f6cc0939e8f677077370362a459c8bc609d5eb8e57b5ee0092e727
-
Filesize
224KB
MD57ff0a03d8edf4f25845e7abb74dbf312
SHA1240926c1628cd4617fa208ff54b17d20af1b22d1
SHA256f7beae443c6c9934f2c5e2bc17fb88c1a22e1cef3bbd2c2fd6795c14d7266143
SHA512daa1d2306e9a921ac5e90233cabdd8b8460c9807cbe2b9bd36320ce74c2ec2fb199231cef5d925946577566232e1b3c5a4ffb2b7fade8b5c5dd03396759ea3d4
-
Filesize
224KB
MD56d33ce5a37145248a225797b09aeae44
SHA12e424d8fbf2307ff96382e071edf250150b16430
SHA256d5451e7627c358302dad2e1a14458c10d4c6bcfb48f3464b66c9607294d892cc
SHA5120cabe0e987ad9422d2151d3661c1066d72b5e7c5b97ef9b22fd52a3343ea362c9e29fd3e691961d0756d7690c05bbf026c96f760f808eeebc751779a4f6ecb73
-
Filesize
224KB
MD5a17d3281276a7557814b4334544316e4
SHA14b3874cb6cce4d2392ce0b24a815902b072b7ce0
SHA2566efc31563a9cf0037d61fb927bef711890b5a98d592a6f4af8e2f0cb819b2fd9
SHA512b724e5b99ef76ab9db1439a0ca2c399d19e04c36450ce29e582acccffdfcb85c8cd481b5fe35bbbf330b6725397cfbf52fc80b22bd6fea81076c660743ec9cbd
-
Filesize
224KB
MD575391a016d5ec6653fadbe3fa18bf003
SHA1ee8cd7f0ea1477ee808292bdda9691c40ea37b47
SHA2563af03eac2d33be1f73df7a3154604f264c83048b68cca8812b6b6e105d49a67c
SHA512b15a6511263be461ce40dd0f44c7147f6f0f0e01d90fcd46835670dc4cf69eeb0789ccd90c86451319da3c7bcdc80936ad672407f04c68aa0c2a8d5dbc88d039
-
Filesize
224KB
MD5797ac30608874e8f5d9bf1c5773c774d
SHA1acb7b80dca419c6090fcad50aead1fe967b7aace
SHA2565e92fdccfc219d76fbf4bcf7dad907c79a4aec2ad5b38ae1730619d9adb1d586
SHA512d9fb63ec2fa96696b673f54a081f354d7e0ffad322b7af5ed412f04cf2cc6d248911390e70cda4ec38b0486c10ebd1f539f29a8bf888aaa4c7e0e2aba18aaa6b
-
Filesize
224KB
MD5ba3951f027e0f5b3bc38d9c10e756a4d
SHA16cca7b9a2941979e8a4ca26f9c1f13cd9f0cdfaa
SHA256ab73e9812677da0a5566ce79653bbd0729cdcecb463508ce31c4b144bf2268c9
SHA512b857fe331224a19ffe4e18f5aafeba67ff3b22e09f52c5d1192822541c05d8698e154109ec961293ef86fe00a0e53c695fdf8a225a425a544ee6892d7436356f
-
Filesize
224KB
MD509d20bae7627231e710aaec30491b8aa
SHA1f07829183c8585d0620b7601ed4b5d1b01b0423b
SHA256648365f90f8323e4011e66ed6b82f720fb69116d134fb2e3e86e5f1e95bd0aba
SHA5128daaee1115f774344fdf290e6b216d0404289302f5d7cfb52b6ad9cc168d14ec5cd8617214e118291d53c735b195db0050a399e37fa03f2710198b7023fe33a6
-
Filesize
224KB
MD59d58d78e17356941fd1dd675a47f4562
SHA15e158dd447d4afeb81e109719d7cbbd43cc5c629
SHA256984158ed3f871435bb28f24ab32174cd807ff1990a4952e6da0eedc9ac88dec8
SHA512fb3bc50b46841965866a0f2c17819de26da39095b1299a146d15fa19e83536f36e175be6d655f8804d9169b34900696f63a5ec85eda5533361311e2741c20295
-
Filesize
224KB
MD56bb79633a3a148d777c5fc6b88d50ed1
SHA11ece6ec505d9db60a2cb43ee3f3cd2190db3f09f
SHA256b5d46cb15cbf552aa7d2937497f513bd87395e60b9875b76730099654c61384c
SHA5121e6aa360d50bde3f4d07e65996bc37feba2ff035c7bb609ccdd07d77ac2f45d2ba4d1c58f8794be9291d59a872c314e16b0f542dcab3fe55556c17cb224c7f9a
-
Filesize
224KB
MD59a0f8ef0cc208382901bb90b775625a2
SHA1929e546cf06b50065f068c2da72a4c8064e47e98
SHA256e187ddbf42ddf34568cd1f37a3ea00919518efb7da8447a39902ec9f38fe619d
SHA512086ed0a4c0e7029a5ba7d8af185b67d17b484b60666eb16d13c179cc73812cfe885107140ba845004af3e88219d8b6eafe16e5798fc56ac8c35d9019cdd22d78
-
Filesize
224KB
MD5af15f8b69ac49ae58d781a3900649321
SHA16e64c10d31a99bc77011f347d24eb4bf201d9127
SHA256f3d3f55d4a32d8f59fe50763653542c237f4bd4c294c24c3fe8fae6c0054bdf1
SHA512ba446bd0e46195f7721827c57c2c94fd915fd82f1d1e6dceff9045c43fe55838d195be79c3ee62f40732a13e439de635098001ce054f83a57dd9ad276bbeb39e
-
Filesize
224KB
MD5c67cec0a1bc1734b5d46d9a3af145474
SHA1b91a0aa480007465b69557f78353b8eb77cd7437
SHA256494d636991c7b3c6356f9c2c69884682a800cd275a79701bcccb693d16f9c693
SHA512fd9deb04d8e22f042f8dae16c2c780a0d0b829857a96cefe710f335bc1927f702b230e206150cd85817a67e15bc93c6c76ab983d9f7c9fb1b2dc2142b5668b1c
-
Filesize
224KB
MD50641dbd98355284385aaaa6a13566335
SHA1b180e70c4554b2c19fc41e5379a6e581b5c1e768
SHA256752eacbf01286ab9e707b39978f4b152ead5320948d1f17b0e01082b0a810a0d
SHA512ad9adc9b0f67b32aa37345e91faefb3d72967b65d1010578d31a72f6e08289b4eac55fa2880e61b0b8508a1e4cfb72dc15550b84d1992abcedfb7127c8b01227
-
Filesize
224KB
MD5d10d9ce93f48a410b43a19ced69f5d62
SHA1c643e845eda6296939daa4c5148b9bff8fc1571f
SHA256f1dc37ab496f5340c8f0786ab7dc3f06add8254fba7fd1dd31b0c3d2e4078cff
SHA5121684fb71522dc6bcb0b902ccc5ca9fdba09e01a557e8723303eed0f3fbb90b4ef24ccc807660b572e6494f85cf30d57808e77f39f0f923dd7f22eb99d377f866
-
Filesize
224KB
MD5326fa49b9f450c95ca28677c0d9c5404
SHA1165efab40284fd44d6994690c5260685432235d7
SHA256317af60c8d42c1435ab6ef39124beef5feeb93e1b4ea6fd34cd00b60e89c4b29
SHA512402512e3b2d2681e30a237be72dba20d2c4e678e2df2b7a4bf62a8abf14b98663176391392d95766ec50a362ab880ac2720b9bd888a833b64fcdb4a6a1a5b512
-
Filesize
224KB
MD546274ba465618f66f7311d60b7e80728
SHA1ffbc489ef4c8163ded10a49d250ec41104bf8bfb
SHA2568ec2f9ec148a286dc7c699a57e5d3957e29515035fe016055413a7fb53a20200
SHA51213db06b10999222e7f179adf217d0913e84dc2b10a30396732ad7a3f46fc0de0d97c13c0e47436c161e1e3af24f2daa90e7c30d2b57c3f218b177ca4ae876ac4
-
Filesize
224KB
MD5bb66400ae45c0893195f5b9624aae605
SHA148628c3e27360af3402191233f86ed8afb9ea886
SHA256468a3b80dd5e279a1231956109b17b78a713cb4bac45a362b14cda34c1d7750d
SHA512890cd0ae434647688d9acb41fe2a4a3ad055124918109bac832c6b317131d6981957a1a4e4c4226ccc55ef967e39e3d8b5d6cc7fd1192ed7551755421411fc2b
-
Filesize
224KB
MD50ae587c5d19e43104cbb5130dc6edafd
SHA1e37468211a2a03e10a4113659569102b1cef4516
SHA256a34d087c0fe49f801afd40b44996c1ac466250185f0d92fa2f6045c69555a0b6
SHA512f445ea5c1b61acd333ca73d156bb0cf4f55e7c652b8c13818a8aedf41bc7db9b1e5e4c13cbc8e2b4baf11686cb96effa7e2bf1d5b43c4664c9b2e65913cb2f14
-
Filesize
224KB
MD5908f2ece2b1efbdf8166c3c5b123d6a8
SHA1f88b05c2741cafa610096c981b1e50e9026eea5b
SHA2564bd919f5661925b779bfaa2996c1e08b94c1eaff7beb77b561e5802f748fe0ea
SHA512d1481e0502501f004fc3559db109007d02e21a54725dcc7aa862e0a85415e12ab16cccc23e0010dfd7f22aab440d6114a257ab9a028b7e3cb762a8f5379f28ec
-
Filesize
224KB
MD5451cf326fe94a17d521337347863cc07
SHA1e302360beae85dc4c38fd8f9bb201cbdba34e8a8
SHA2563ba01c8cb9710cd3c8d41234b1bd9b26e072e0ef295b0848fc1d6f223a2d2e4b
SHA512291d3ce8b8c2d6e3a42051f30bc7a47611984168aa1cb20cf4a7802c49036b95a8044b611d5377580cb2a13e6828ecc1f77edd165b2ec419e6066597b2626944
-
Filesize
224KB
MD51b74a85f9d05427b0bb784ffc1fa0c9e
SHA17d574fe0fa6fc9db31f64575a3ab0fd3b5eae985
SHA256dc01e59bd4b4ce9ad97da140e7c013ae3c6db573f69032927a76b5e10201a504
SHA5123a8706a7ce4204973ec5e7b8af78645ca563e405ebe3c244ae58a0f17150d98105fabecbc0f0dc9d9c3976554ca6371e739ac5563e72fdcbe16de4d00ade904f
-
Filesize
224KB
MD5640ef81be0d382270981e5c8675cd414
SHA1d2152c7e855c9e71d7afba8d2b17cf9456fe7f7d
SHA2562dca5fc7100a8f7dfea371bece17d1a517e960ae6cf5d94467bb1d1023690d59
SHA5126815a80d413be2e737344f9ccc8a1b84d741b20c35371c6f7d011d580cdd759c915d440c5ca2c8f8305f1e66bf30702518ba605d2c360761b488564ab1ad3efc
-
Filesize
224KB
MD5cedee4b880d356efacbb0f7f548e2e7a
SHA130e1de9531699469d855324945a83a73f9d8d541
SHA25657a5c796b50cd955492fcd13bc1a585fb992d030a8f2f7d2360934e2a9f08436
SHA512e39b2cadcfc142291f1b493e6cfeaea6f43f6b102f411607f447927cfa5b8992bad31a49e6826ae8812e4d5476e7f8c9b29ed10f169937f40274739b838ad811
-
Filesize
224KB
MD5fcccb05f2f75f6764c8c75d1ea42d869
SHA159778a6fc091ff25cfb415e743dbb9ef6c61da95
SHA256bf0bd2042d032fd7c0704dbd12e7718e630660026a8f4ffd577af19bf09f2dfe
SHA51206b1f5dc152b8bc250e7ed46929b79b3979347e90a160e26bfec98dbcd0af313bde8b8b75c7a313669347ed99fe092463aca654224b61ba14fc1c957854978ca
-
Filesize
224KB
MD5904b47ed1f37b76e9ea37573c7fed2f5
SHA10687d049dc0a12562b70a81f491c626b4a605951
SHA2569499c960f64efea14f616d169eef0d26442f6605baf44e8fe24810aaf393d4fe
SHA512a23f81dd08adb9f5908e44fb4921a42439997d9f3f8f9cf880e7b6e2603b3a6429d2bb57fcfc4bf5c954ec513e7f1950e684d023d1eef31f0706eb2550bef4c8
-
Filesize
224KB
MD5567021a1a56a42fbb63417e4bf48f410
SHA1d2dbfb77c837ec68ea2f5feb7b47a350d7d471ca
SHA2565d303db551b88d5aa89ed8afa3973643f1076bc083c17065283c893a8adb63e6
SHA51289fa07dcbc960c96f05f28b9e9230894d33bfabb4b1cb783b93632406bbe6e4cd105246d14a85470465a016d9ef5346410d59b3a3852fbad728f9e4072bc5081
-
Filesize
224KB
MD5d3535eca9b1920ebf3619b06354df332
SHA1bceda626c90b39802532543f9efe5e22ff349b93
SHA256bf559b638b25ae9143da8b079b7ff48c31dbd73780a63151103629c9a468cb5c
SHA51230e96fa6506cb54382094054201cc58685a0a942a254e77bd47322262bc11a20b9eee6e0267e0410b0ce4853fe0a4768d85e95285c0e71d377c5b3f2a4163f02
-
Filesize
224KB
MD594ab06c8811d8dba83f42f8fcb115686
SHA109259a3c8cbcf3e1a787c692a3509790b75b0ab0
SHA2567c095c357052798a3b1f84781ec468a7ca31f5fe1a3f71bb5bb6bf4a0a589ec6
SHA512eb55b51fff03875afeead34e44dace9a4a3202c6822394b04277474041d56faa18b64e5c02f1e7012808a579c16141f5537aa9f5a87455903d9ac8e444aaa29b