Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
03/05/2024, 20:05
Static task
static1
Behavioral task
behavioral1
Sample
2eb8ab839de10b015435eb090b2f34396efa412c932786bac9e16d75ff284cb9.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2eb8ab839de10b015435eb090b2f34396efa412c932786bac9e16d75ff284cb9.exe
Resource
win10v2004-20240426-en
General
-
Target
2eb8ab839de10b015435eb090b2f34396efa412c932786bac9e16d75ff284cb9.exe
-
Size
124KB
-
MD5
dbb5baf83a4268fd6263222530f76510
-
SHA1
f48065f6eaf68d7995545d63ac97f0811f758d21
-
SHA256
2eb8ab839de10b015435eb090b2f34396efa412c932786bac9e16d75ff284cb9
-
SHA512
41339808c797e080787a696fd2ca431bf188f86af155c5c186ece539e90ffe2b465a8739ae3704e7c0872d70f205272e67ba8c3f7c8e46d62f3e3c2cfe611be4
-
SSDEEP
1536:FJszA5YShRO/N69BH3OoGa+FLHjKceRgrkOSoINeGUmE:nGCYShkFoN3Oo1+FvfSW
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 46 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" kqgoah.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" xauha.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" veocior.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" xvquv.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" biuluw.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" riiexu.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" jeutias.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" kuawoh.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" xydat.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" nueav.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" boaal.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" yiual.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" waeixoy.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" veuloa.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" wouebuq.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" hooecoz.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" mmleh.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" lcleex.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" waeso.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" taidue.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" qamut.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" caiusah.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" tioev.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" yuuoj.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 2eb8ab839de10b015435eb090b2f34396efa412c932786bac9e16d75ff284cb9.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" reoisi.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" nisux.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" yoiam.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" jouud.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" niauho.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" xffuoc.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" kuleh.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" jauumul.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" deitauy.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" keeniu.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" xaavoi.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" reetuf.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" caear.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ruovou.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" zvciol.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ytwet.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" doadih.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" xoeowet.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" zaoedi.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" naiunit.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" jueide.exe -
Executes dropped EXE 46 IoCs
pid Process 2144 mmleh.exe 2684 lcleex.exe 2728 zvciol.exe 2420 waeso.exe 824 reoisi.exe 2948 xffuoc.exe 2648 taidue.exe 2768 qamut.exe 1536 caiusah.exe 2128 nisux.exe 764 kqgoah.exe 1780 yoiam.exe 2248 xauha.exe 1664 wouebuq.exe 2312 jouud.exe 1584 kuleh.exe 1312 jeutias.exe 2672 jauumul.exe 2416 kuawoh.exe 2784 zaoedi.exe 2584 xydat.exe 804 nueav.exe 2040 reetuf.exe 2840 boaal.exe 384 veocior.exe 1540 naiunit.exe 628 ytwet.exe 1956 doadih.exe 1316 yiual.exe 2524 jueide.exe 2164 biuluw.exe 1284 niauho.exe 2332 yuuoj.exe 1764 hooecoz.exe 2076 xvquv.exe 1676 riiexu.exe 2824 deitauy.exe 1616 caear.exe 1596 waeixoy.exe 2080 veuloa.exe 2468 keeniu.exe 1624 xoeowet.exe 932 ruovou.exe 712 xaavoi.exe 1976 tioev.exe 2488 soiok.exe -
Loads dropped DLL 64 IoCs
pid Process 1724 2eb8ab839de10b015435eb090b2f34396efa412c932786bac9e16d75ff284cb9.exe 1724 2eb8ab839de10b015435eb090b2f34396efa412c932786bac9e16d75ff284cb9.exe 2144 mmleh.exe 2144 mmleh.exe 2684 lcleex.exe 2684 lcleex.exe 2728 zvciol.exe 2728 zvciol.exe 2420 waeso.exe 2420 waeso.exe 824 reoisi.exe 824 reoisi.exe 2948 xffuoc.exe 2948 xffuoc.exe 2648 taidue.exe 2648 taidue.exe 2768 qamut.exe 2768 qamut.exe 1536 caiusah.exe 1536 caiusah.exe 2128 nisux.exe 2128 nisux.exe 764 kqgoah.exe 764 kqgoah.exe 1780 yoiam.exe 1780 yoiam.exe 2248 xauha.exe 2248 xauha.exe 1664 wouebuq.exe 1664 wouebuq.exe 2312 jouud.exe 2312 jouud.exe 1584 kuleh.exe 1584 kuleh.exe 1312 jeutias.exe 1312 jeutias.exe 2672 jauumul.exe 2672 jauumul.exe 2416 kuawoh.exe 2416 kuawoh.exe 2784 zaoedi.exe 2784 zaoedi.exe 2584 xydat.exe 2584 xydat.exe 804 nueav.exe 804 nueav.exe 2040 reetuf.exe 2040 reetuf.exe 2840 boaal.exe 2840 boaal.exe 384 veocior.exe 384 veocior.exe 1540 naiunit.exe 1540 naiunit.exe 628 ytwet.exe 628 ytwet.exe 1956 doadih.exe 1956 doadih.exe 1316 yiual.exe 1316 yiual.exe 2524 jueide.exe 2524 jueide.exe 2164 biuluw.exe 2164 biuluw.exe -
Adds Run key to start application 2 TTPs 46 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\lcleex = "C:\\Users\\Admin\\lcleex.exe /J" mmleh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\niauho = "C:\\Users\\Admin\\niauho.exe /q" biuluw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\hooecoz = "C:\\Users\\Admin\\hooecoz.exe /E" yuuoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\tioev = "C:\\Users\\Admin\\tioev.exe /G" xaavoi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoeowet = "C:\\Users\\Admin\\xoeowet.exe /P" keeniu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\xffuoc = "C:\\Users\\Admin\\xffuoc.exe /Z" reoisi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\caiusah = "C:\\Users\\Admin\\caiusah.exe /e" qamut.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\nisux = "C:\\Users\\Admin\\nisux.exe /x" caiusah.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\nueav = "C:\\Users\\Admin\\nueav.exe /T" xydat.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\biuluw = "C:\\Users\\Admin\\biuluw.exe /G" jueide.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\waeixoy = "C:\\Users\\Admin\\waeixoy.exe /G" caear.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\riiexu = "C:\\Users\\Admin\\riiexu.exe /i" xvquv.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\qamut = "C:\\Users\\Admin\\qamut.exe /f" taidue.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\kuleh = "C:\\Users\\Admin\\kuleh.exe /x" jouud.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\jauumul = "C:\\Users\\Admin\\jauumul.exe /L" jeutias.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\xydat = "C:\\Users\\Admin\\xydat.exe /I" zaoedi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\doadih = "C:\\Users\\Admin\\doadih.exe /z" ytwet.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\xvquv = "C:\\Users\\Admin\\xvquv.exe /W" hooecoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\soiok = "C:\\Users\\Admin\\soiok.exe /a" tioev.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\taidue = "C:\\Users\\Admin\\taidue.exe /y" xffuoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\kqgoah = "C:\\Users\\Admin\\kqgoah.exe /z" nisux.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\yoiam = "C:\\Users\\Admin\\yoiam.exe /w" kqgoah.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\kuawoh = "C:\\Users\\Admin\\kuawoh.exe /o" jauumul.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\jueide = "C:\\Users\\Admin\\jueide.exe /C" yiual.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\caear = "C:\\Users\\Admin\\caear.exe /M" deitauy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\yuuoj = "C:\\Users\\Admin\\yuuoj.exe /l" niauho.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\deitauy = "C:\\Users\\Admin\\deitauy.exe /W" riiexu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\xauha = "C:\\Users\\Admin\\xauha.exe /N" yoiam.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\jouud = "C:\\Users\\Admin\\jouud.exe /e" wouebuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\jeutias = "C:\\Users\\Admin\\jeutias.exe /r" kuleh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaoedi = "C:\\Users\\Admin\\zaoedi.exe /f" kuawoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\reetuf = "C:\\Users\\Admin\\reetuf.exe /a" nueav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\veocior = "C:\\Users\\Admin\\veocior.exe /h" boaal.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\keeniu = "C:\\Users\\Admin\\keeniu.exe /s" veuloa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\mmleh = "C:\\Users\\Admin\\mmleh.exe /h" 2eb8ab839de10b015435eb090b2f34396efa412c932786bac9e16d75ff284cb9.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\wouebuq = "C:\\Users\\Admin\\wouebuq.exe /E" xauha.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\naiunit = "C:\\Users\\Admin\\naiunit.exe /y" veocior.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\ytwet = "C:\\Users\\Admin\\ytwet.exe /L" naiunit.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaavoi = "C:\\Users\\Admin\\xaavoi.exe /i" ruovou.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\zvciol = "C:\\Users\\Admin\\zvciol.exe /n" lcleex.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\yiual = "C:\\Users\\Admin\\yiual.exe /O" doadih.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\veuloa = "C:\\Users\\Admin\\veuloa.exe /R" waeixoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\waeso = "C:\\Users\\Admin\\waeso.exe /F" zvciol.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\reoisi = "C:\\Users\\Admin\\reoisi.exe /S" waeso.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\boaal = "C:\\Users\\Admin\\boaal.exe /d" reetuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\ruovou = "C:\\Users\\Admin\\ruovou.exe /l" xoeowet.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 46 IoCs
pid Process 1724 2eb8ab839de10b015435eb090b2f34396efa412c932786bac9e16d75ff284cb9.exe 2144 mmleh.exe 2684 lcleex.exe 2728 zvciol.exe 2420 waeso.exe 824 reoisi.exe 2948 xffuoc.exe 2648 taidue.exe 2768 qamut.exe 1536 caiusah.exe 2128 nisux.exe 764 kqgoah.exe 1780 yoiam.exe 2248 xauha.exe 1664 wouebuq.exe 2312 jouud.exe 1584 kuleh.exe 1312 jeutias.exe 2672 jauumul.exe 2416 kuawoh.exe 2784 zaoedi.exe 2584 xydat.exe 804 nueav.exe 2040 reetuf.exe 2840 boaal.exe 384 veocior.exe 1540 naiunit.exe 628 ytwet.exe 1956 doadih.exe 1316 yiual.exe 2524 jueide.exe 2164 biuluw.exe 1284 niauho.exe 2332 yuuoj.exe 1764 hooecoz.exe 2076 xvquv.exe 1676 riiexu.exe 2824 deitauy.exe 1616 caear.exe 1596 waeixoy.exe 2080 veuloa.exe 2468 keeniu.exe 1624 xoeowet.exe 932 ruovou.exe 712 xaavoi.exe 1976 tioev.exe -
Suspicious use of SetWindowsHookEx 47 IoCs
pid Process 1724 2eb8ab839de10b015435eb090b2f34396efa412c932786bac9e16d75ff284cb9.exe 2144 mmleh.exe 2684 lcleex.exe 2728 zvciol.exe 2420 waeso.exe 824 reoisi.exe 2948 xffuoc.exe 2648 taidue.exe 2768 qamut.exe 1536 caiusah.exe 2128 nisux.exe 764 kqgoah.exe 1780 yoiam.exe 2248 xauha.exe 1664 wouebuq.exe 2312 jouud.exe 1584 kuleh.exe 1312 jeutias.exe 2672 jauumul.exe 2416 kuawoh.exe 2784 zaoedi.exe 2584 xydat.exe 804 nueav.exe 2040 reetuf.exe 2840 boaal.exe 384 veocior.exe 1540 naiunit.exe 628 ytwet.exe 1956 doadih.exe 1316 yiual.exe 2524 jueide.exe 2164 biuluw.exe 1284 niauho.exe 2332 yuuoj.exe 1764 hooecoz.exe 2076 xvquv.exe 1676 riiexu.exe 2824 deitauy.exe 1616 caear.exe 1596 waeixoy.exe 2080 veuloa.exe 2468 keeniu.exe 1624 xoeowet.exe 932 ruovou.exe 712 xaavoi.exe 1976 tioev.exe 2488 soiok.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1724 wrote to memory of 2144 1724 2eb8ab839de10b015435eb090b2f34396efa412c932786bac9e16d75ff284cb9.exe 28 PID 1724 wrote to memory of 2144 1724 2eb8ab839de10b015435eb090b2f34396efa412c932786bac9e16d75ff284cb9.exe 28 PID 1724 wrote to memory of 2144 1724 2eb8ab839de10b015435eb090b2f34396efa412c932786bac9e16d75ff284cb9.exe 28 PID 1724 wrote to memory of 2144 1724 2eb8ab839de10b015435eb090b2f34396efa412c932786bac9e16d75ff284cb9.exe 28 PID 2144 wrote to memory of 2684 2144 mmleh.exe 29 PID 2144 wrote to memory of 2684 2144 mmleh.exe 29 PID 2144 wrote to memory of 2684 2144 mmleh.exe 29 PID 2144 wrote to memory of 2684 2144 mmleh.exe 29 PID 2684 wrote to memory of 2728 2684 lcleex.exe 30 PID 2684 wrote to memory of 2728 2684 lcleex.exe 30 PID 2684 wrote to memory of 2728 2684 lcleex.exe 30 PID 2684 wrote to memory of 2728 2684 lcleex.exe 30 PID 2728 wrote to memory of 2420 2728 zvciol.exe 31 PID 2728 wrote to memory of 2420 2728 zvciol.exe 31 PID 2728 wrote to memory of 2420 2728 zvciol.exe 31 PID 2728 wrote to memory of 2420 2728 zvciol.exe 31 PID 2420 wrote to memory of 824 2420 waeso.exe 32 PID 2420 wrote to memory of 824 2420 waeso.exe 32 PID 2420 wrote to memory of 824 2420 waeso.exe 32 PID 2420 wrote to memory of 824 2420 waeso.exe 32 PID 824 wrote to memory of 2948 824 reoisi.exe 33 PID 824 wrote to memory of 2948 824 reoisi.exe 33 PID 824 wrote to memory of 2948 824 reoisi.exe 33 PID 824 wrote to memory of 2948 824 reoisi.exe 33 PID 2948 wrote to memory of 2648 2948 xffuoc.exe 34 PID 2948 wrote to memory of 2648 2948 xffuoc.exe 34 PID 2948 wrote to memory of 2648 2948 xffuoc.exe 34 PID 2948 wrote to memory of 2648 2948 xffuoc.exe 34 PID 2648 wrote to memory of 2768 2648 taidue.exe 35 PID 2648 wrote to memory of 2768 2648 taidue.exe 35 PID 2648 wrote to memory of 2768 2648 taidue.exe 35 PID 2648 wrote to memory of 2768 2648 taidue.exe 35 PID 2768 wrote to memory of 1536 2768 qamut.exe 36 PID 2768 wrote to memory of 1536 2768 qamut.exe 36 PID 2768 wrote to memory of 1536 2768 qamut.exe 36 PID 2768 wrote to memory of 1536 2768 qamut.exe 36 PID 1536 wrote to memory of 2128 1536 caiusah.exe 37 PID 1536 wrote to memory of 2128 1536 caiusah.exe 37 PID 1536 wrote to memory of 2128 1536 caiusah.exe 37 PID 1536 wrote to memory of 2128 1536 caiusah.exe 37 PID 2128 wrote to memory of 764 2128 nisux.exe 38 PID 2128 wrote to memory of 764 2128 nisux.exe 38 PID 2128 wrote to memory of 764 2128 nisux.exe 38 PID 2128 wrote to memory of 764 2128 nisux.exe 38 PID 764 wrote to memory of 1780 764 kqgoah.exe 39 PID 764 wrote to memory of 1780 764 kqgoah.exe 39 PID 764 wrote to memory of 1780 764 kqgoah.exe 39 PID 764 wrote to memory of 1780 764 kqgoah.exe 39 PID 1780 wrote to memory of 2248 1780 yoiam.exe 40 PID 1780 wrote to memory of 2248 1780 yoiam.exe 40 PID 1780 wrote to memory of 2248 1780 yoiam.exe 40 PID 1780 wrote to memory of 2248 1780 yoiam.exe 40 PID 2248 wrote to memory of 1664 2248 xauha.exe 41 PID 2248 wrote to memory of 1664 2248 xauha.exe 41 PID 2248 wrote to memory of 1664 2248 xauha.exe 41 PID 2248 wrote to memory of 1664 2248 xauha.exe 41 PID 1664 wrote to memory of 2312 1664 wouebuq.exe 42 PID 1664 wrote to memory of 2312 1664 wouebuq.exe 42 PID 1664 wrote to memory of 2312 1664 wouebuq.exe 42 PID 1664 wrote to memory of 2312 1664 wouebuq.exe 42 PID 2312 wrote to memory of 1584 2312 jouud.exe 45 PID 2312 wrote to memory of 1584 2312 jouud.exe 45 PID 2312 wrote to memory of 1584 2312 jouud.exe 45 PID 2312 wrote to memory of 1584 2312 jouud.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\2eb8ab839de10b015435eb090b2f34396efa412c932786bac9e16d75ff284cb9.exe"C:\Users\Admin\AppData\Local\Temp\2eb8ab839de10b015435eb090b2f34396efa412c932786bac9e16d75ff284cb9.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Users\Admin\mmleh.exe"C:\Users\Admin\mmleh.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Users\Admin\lcleex.exe"C:\Users\Admin\lcleex.exe"3⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Users\Admin\zvciol.exe"C:\Users\Admin\zvciol.exe"4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Users\Admin\waeso.exe"C:\Users\Admin\waeso.exe"5⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Users\Admin\reoisi.exe"C:\Users\Admin\reoisi.exe"6⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:824 -
C:\Users\Admin\xffuoc.exe"C:\Users\Admin\xffuoc.exe"7⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Users\Admin\taidue.exe"C:\Users\Admin\taidue.exe"8⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Users\Admin\qamut.exe"C:\Users\Admin\qamut.exe"9⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Users\Admin\caiusah.exe"C:\Users\Admin\caiusah.exe"10⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Users\Admin\nisux.exe"C:\Users\Admin\nisux.exe"11⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Users\Admin\kqgoah.exe"C:\Users\Admin\kqgoah.exe"12⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Users\Admin\yoiam.exe"C:\Users\Admin\yoiam.exe"13⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Users\Admin\xauha.exe"C:\Users\Admin\xauha.exe"14⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Users\Admin\wouebuq.exe"C:\Users\Admin\wouebuq.exe"15⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Users\Admin\jouud.exe"C:\Users\Admin\jouud.exe"16⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Users\Admin\kuleh.exe"C:\Users\Admin\kuleh.exe"17⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1584 -
C:\Users\Admin\jeutias.exe"C:\Users\Admin\jeutias.exe"18⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1312 -
C:\Users\Admin\jauumul.exe"C:\Users\Admin\jauumul.exe"19⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2672 -
C:\Users\Admin\kuawoh.exe"C:\Users\Admin\kuawoh.exe"20⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2416 -
C:\Users\Admin\zaoedi.exe"C:\Users\Admin\zaoedi.exe"21⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2784 -
C:\Users\Admin\xydat.exe"C:\Users\Admin\xydat.exe"22⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2584 -
C:\Users\Admin\nueav.exe"C:\Users\Admin\nueav.exe"23⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:804 -
C:\Users\Admin\reetuf.exe"C:\Users\Admin\reetuf.exe"24⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2040 -
C:\Users\Admin\boaal.exe"C:\Users\Admin\boaal.exe"25⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2840 -
C:\Users\Admin\veocior.exe"C:\Users\Admin\veocior.exe"26⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:384 -
C:\Users\Admin\naiunit.exe"C:\Users\Admin\naiunit.exe"27⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1540 -
C:\Users\Admin\ytwet.exe"C:\Users\Admin\ytwet.exe"28⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:628 -
C:\Users\Admin\doadih.exe"C:\Users\Admin\doadih.exe"29⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1956 -
C:\Users\Admin\yiual.exe"C:\Users\Admin\yiual.exe"30⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1316 -
C:\Users\Admin\jueide.exe"C:\Users\Admin\jueide.exe"31⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2524 -
C:\Users\Admin\biuluw.exe"C:\Users\Admin\biuluw.exe"32⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2164 -
C:\Users\Admin\niauho.exe"C:\Users\Admin\niauho.exe"33⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1284 -
C:\Users\Admin\yuuoj.exe"C:\Users\Admin\yuuoj.exe"34⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2332 -
C:\Users\Admin\hooecoz.exe"C:\Users\Admin\hooecoz.exe"35⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1764 -
C:\Users\Admin\xvquv.exe"C:\Users\Admin\xvquv.exe"36⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2076 -
C:\Users\Admin\riiexu.exe"C:\Users\Admin\riiexu.exe"37⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1676 -
C:\Users\Admin\deitauy.exe"C:\Users\Admin\deitauy.exe"38⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2824 -
C:\Users\Admin\caear.exe"C:\Users\Admin\caear.exe"39⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1616 -
C:\Users\Admin\waeixoy.exe"C:\Users\Admin\waeixoy.exe"40⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1596 -
C:\Users\Admin\veuloa.exe"C:\Users\Admin\veuloa.exe"41⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2080 -
C:\Users\Admin\keeniu.exe"C:\Users\Admin\keeniu.exe"42⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2468 -
C:\Users\Admin\xoeowet.exe"C:\Users\Admin\xoeowet.exe"43⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1624 -
C:\Users\Admin\ruovou.exe"C:\Users\Admin\ruovou.exe"44⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:932 -
C:\Users\Admin\xaavoi.exe"C:\Users\Admin\xaavoi.exe"45⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:712 -
C:\Users\Admin\tioev.exe"C:\Users\Admin\tioev.exe"46⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1976 -
C:\Users\Admin\soiok.exe"C:\Users\Admin\soiok.exe"47⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2488
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
124KB
MD513b428e57113dccb66b613bfb5d5d4a8
SHA1ad468dcd7e9230ee529ed0a41d638308e7dc2541
SHA2563f0e861cf5048d567192551f2f285981fd1e0f32b1761b3113e4d2d813d87230
SHA512c6cbfd390751d70eb5ea36096e54e9f2ab3ad25ec0cbb2ce99746c97598143d0139dbbd736e77279a153c944fb274493e3fda487abeb8697c92faaedfb2bc3d3
-
Filesize
124KB
MD5158ee94033ea9fe90eaea78825daf2f5
SHA1c943e48ad7d28ba1f933cfe1934790f828fdad8d
SHA256bd74d12327c19263f8b1e8852abb0260636e4feaf32b293cced0f515ca107425
SHA512dd1bbccb6bc0e864d8c585717c1677068800063daa3792755cbb10b49f64e19a8189b1b4fddaecf2a6cd8e76e9c75d01a4e750f08d6b697174ab9b5dde6ff21e
-
Filesize
124KB
MD5070c727ab9943a5d5118ab3dd3156587
SHA11bbf0b5b7cd00f81c2167b66e3bc601015c18387
SHA2564bb3363fd5b1d7ee7f049ef3f8fd87d8c2f492beb1fefced468715d98d99e0fa
SHA5129634b5d119c561338c844d7b22fb8e45b92bca9934bb5ae652e26f7c2d07c0e3bb3942842443b7ff1f3f8e6de27b61cdb77cd7bbe7c669f0e714cdad1c838520
-
Filesize
124KB
MD575eec3bb60f70e2eb98c5dd286d29282
SHA19de74caa8c6514db8a167f7b5144bc38e0a38c62
SHA256e279d8028a47b104509d458aa297e4646a01f650d78611fb7ebd306a28c26d1b
SHA512071972e48b10c48a08523d25d33f8450ef4a90df8016d961f506954874b3948d79d9d33ea99d1ef670cab9c9c3ec5d8cb09b7bbc3d5aed45e739fe88651b1314
-
Filesize
124KB
MD51dd875ebd732a23d459e6b04fe888f98
SHA132110aaa59699b2563e4e2d8e6a735f10c8de4d2
SHA256197dffca60d8fd024c0a6485298cf40f85978de4e2cf4eac555a2eacd057c3e5
SHA512308b92755d895298fd571519d4b812a70be7bf17dd4ed4ec1c3563d06c7b5f509bfee4e622b71b3b8e29dd4a0be82636fefbb6dc88f8cda1e55137a125ca0896
-
Filesize
124KB
MD5fd4e6961913785729b86be13da8c5470
SHA1d6a2823f982c2e7d8a03fd274a3f90701dc38b84
SHA2566690872e0960dbe417ca6385aaec51edbb56c7af49c883075907769c7fbdcbfe
SHA5126a8a2ee69e7edd146d10c4c997a8cbef8c1939e45b07c88224892fb83f8145f51ae6b6c7b55d88c15c8e370fd90bba4a1139e29229df5f2aeed3d0bd81b2a741
-
Filesize
124KB
MD5dcaf0d94312e267deab04a3cbdce618e
SHA10954bdfb4487caf2f00e5d7e13d151c6b45df2ee
SHA256784f3c6cbb5fff89c76bcb5aeb90e186a25bc2eef3883de38851b90c867970c0
SHA512f32b78d1e399fc71d13925afd9b9e8fc192b1d7d2e481da586df314f945c29e2f6ba80cdb21ce6e38e231c2952d3518bde9d80b7b8c694d31b8d4a754408a723
-
Filesize
124KB
MD5c7112ea5a3e870562b75770a51e5d495
SHA1192c4249ef50ae5bfa1a958f3e302da2bc2bd67e
SHA256626eb474d6cb81d26f5423bfde3f860a9ae8000951fcc53c52b9bae8ee4ee704
SHA512d75c4aa787f7ce1390c0ba999378b48fde77a27e251390ead0feb9673cb4504fcb61926b091085ec1bc3a1df640d877738ad3426b868864cdeb52b6ed3994294
-
Filesize
124KB
MD5f37bc688a36ec94664c9eee0b3b564c8
SHA1f56ff6d71f2c70ce21effb1979314e9aa3f85cb7
SHA256ef45b34e4fe99186c5cf4c85fd668816fa39cae4c8d6edc25be631c93f5aed19
SHA512f3919003066b730062527d8b75031b92879ce045c1567d14fd97ec32a599528e8be0d17713c238dd1a48f1a5f8a8dc69f658aa2970c8cd7f0a0af8548297c3d7
-
Filesize
124KB
MD5b0dfe33bd3a47241ef7b0956d25ea365
SHA1527628d8e37c5c458e775dfdf810fc766131728c
SHA256dcef5eb1703ddeacf4e6c7ea0aef62b5a8b9688ffb86dcb4a1a55f9e8aa2f4c9
SHA512d66e7e1ae0346ae7f8a0c24e074ba1e96f8c5b8afc3f51451d9eb024872556fd80fde4f244d7d803c0133345cce98c6aedf0cf5ec60a5349a49525adc826a8bd
-
Filesize
124KB
MD5ebf78bf23a5888e41fa6b9f5dcaa0d02
SHA1961e80da7b5158a5d88f5f0ec210a00415dc6272
SHA256cc53881977ebf36e63494303844c1dd4fde8f70b4dd055c7cba1a21c146f879e
SHA51265b5cb7bd0d1be4212454566c6b7f4d8d934696e5287187fb1b1384dde982494fcfeb9995a40cc81da03dca23f3b5ea57c424064caea1d594535eb149cfd83f1
-
Filesize
124KB
MD5bb0db76932497c3b1f0c8c2db9553778
SHA1edabe231b4a3b1d47ffd78b23ec6188f2443da3d
SHA25653bbf1d5440f7e5d96da99b41361eb90e44c3adf40db20b8da4719df378b3f48
SHA5128f92cd7679af0120ab7da68253bdf10c5a237ee531133cb38b98b1c9e4d66013a3fa5fb6a3bc0b32c9b5e65629f3eccdca28408e2519196d42c97d04f874c210
-
Filesize
124KB
MD55b4479a12b0691070f5b459d7513caa4
SHA18bd8e33eaf4afb6067d3b392b87f654f6ca5188e
SHA256f527e3e22eb19b487b69817853ee841ee70ef58bbd0ba3e71523635ed390341c
SHA51288e8db8cbde28addadb5a713445646a3bc6911910a0eae64c78bdbffff17c3a99a11f636c3195b78e55b2c9c333b1f04517f92b456b57658bfc691e65698fecb
-
Filesize
124KB
MD532d3b592542ac578016deab1397ef8b5
SHA1acf59f50b4ff619c021c755d97282484d6cf6ba3
SHA256d0344be0010a2255fe356df5d9f450e496134c733aae4309fda948fbb2fc9e9f
SHA512d08aefbd36fd50de75e5076772935acac785bc8ada1c60057a20b90bf6c8b027bfc8bf70af1742356e5b6a0e52e1c7e2e836c1f5c5a0288ebc94fed8a437aa86
-
Filesize
124KB
MD5f4609ade91174a8b4006f11cafbde45c
SHA116f6f8c8fe6d749b6b19900334a292b785122376
SHA256a0e24d844b0ee2814f9c176bc2e90bcc18627dce51f7c17a5f7914441ebfcd20
SHA512a26408c2bde5589483411bf700a79fa9d15ca718695482944b6fbd0f9fb9924066a76a71691abd4904d9037ef532388438f3d007e814a6eadcf3c7bdf81821c9
-
Filesize
124KB
MD5fdcea6b99e48ccbb501dd9669193bc9a
SHA15302a028bec05d57e08990b60e6367643e084396
SHA256867ceaa908c34aac4881210cccc1cf5eb10f2c7dcea692f83362c473b264f961
SHA512d5dfff9b682fe64ec12d088f58b295c3c633426e501baffd7f0a325bcc5695655bc80f3b4639360f67249057a8430b46ad186e89c491b900c70f7c0eb43274ab