Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
03/05/2024, 20:05
Static task
static1
Behavioral task
behavioral1
Sample
2eb8ab839de10b015435eb090b2f34396efa412c932786bac9e16d75ff284cb9.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2eb8ab839de10b015435eb090b2f34396efa412c932786bac9e16d75ff284cb9.exe
Resource
win10v2004-20240426-en
General
-
Target
2eb8ab839de10b015435eb090b2f34396efa412c932786bac9e16d75ff284cb9.exe
-
Size
124KB
-
MD5
dbb5baf83a4268fd6263222530f76510
-
SHA1
f48065f6eaf68d7995545d63ac97f0811f758d21
-
SHA256
2eb8ab839de10b015435eb090b2f34396efa412c932786bac9e16d75ff284cb9
-
SHA512
41339808c797e080787a696fd2ca431bf188f86af155c5c186ece539e90ffe2b465a8739ae3704e7c0872d70f205272e67ba8c3f7c8e46d62f3e3c2cfe611be4
-
SSDEEP
1536:FJszA5YShRO/N69BH3OoGa+FLHjKceRgrkOSoINeGUmE:nGCYShkFoN3Oo1+FvfSW
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 42 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" kuorao.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" quailux.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" sueal.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" zuuro.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" yaeohod.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" mouxioh.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" cearap.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" duowau.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" fuuvied.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" wiipeu.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" raiveex.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" niujo.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" tueovoq.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" noiivo.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" deeed.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" sfrus.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" pzcaes.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" caenii.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 2eb8ab839de10b015435eb090b2f34396efa412c932786bac9e16d75ff284cb9.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" xiiofow.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" rouexem.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" foaxit.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" hauefum.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" cbniiz.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" piiod.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" saiyioz.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" jaadeik.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" wauujax.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" yuikuuh.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" giaabe.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" bcfaq.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ycgeq.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" vuunoat.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" yoialu.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" bwyan.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" neuuri.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" lsbug.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" juabe.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ceainip.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" vrfoun.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" suiiw.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" tioge.exe -
Checks computer location settings 2 TTPs 42 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation ceainip.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation vrfoun.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation duowau.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation bwyan.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation caenii.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation tioge.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation vuunoat.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation fuuvied.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation saiyioz.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation xiiofow.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation mouxioh.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation noiivo.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation raiveex.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation deeed.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation cbniiz.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation wiipeu.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation niujo.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation suiiw.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation ycgeq.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation yoialu.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation tueovoq.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation sueal.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation bcfaq.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation hauefum.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation pzcaes.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation neuuri.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation yuikuuh.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation quailux.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation rouexem.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation kuorao.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation piiod.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation wauujax.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation jaadeik.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation zuuro.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation sfrus.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation lsbug.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation giaabe.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation yaeohod.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation foaxit.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation 2eb8ab839de10b015435eb090b2f34396efa412c932786bac9e16d75ff284cb9.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation juabe.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation cearap.exe -
Executes dropped EXE 42 IoCs
pid Process 4684 kuorao.exe 632 juabe.exe 2524 ycgeq.exe 3292 vuunoat.exe 2124 yoialu.exe 3508 mouxioh.exe 4512 tueovoq.exe 1000 jaadeik.exe 956 hauefum.exe 3736 noiivo.exe 3944 cearap.exe 3428 duowau.exe 1824 bwyan.exe 4852 deeed.exe 4680 cbniiz.exe 2072 piiod.exe 3608 sfrus.exe 3472 fuuvied.exe 3972 wiipeu.exe 4624 pzcaes.exe 2928 caenii.exe 3396 wauujax.exe 752 raiveex.exe 2496 ceainip.exe 1776 xiiofow.exe 2444 neuuri.exe 1172 vrfoun.exe 2628 yuikuuh.exe 3532 zuuro.exe 3260 saiyioz.exe 1888 niujo.exe 3016 lsbug.exe 3288 suiiw.exe 4056 quailux.exe 4076 sueal.exe 720 giaabe.exe 1464 bcfaq.exe 3004 rouexem.exe 4484 yaeohod.exe 4284 foaxit.exe 1708 tioge.exe 464 heuvii.exe -
Adds Run key to start application 2 TTPs 42 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaadeik = "C:\\Users\\Admin\\jaadeik.exe /W" tueovoq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lsbug = "C:\\Users\\Admin\\lsbug.exe /g" niujo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heuvii = "C:\\Users\\Admin\\heuvii.exe /C" tioge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kuorao = "C:\\Users\\Admin\\kuorao.exe /Y" 2eb8ab839de10b015435eb090b2f34396efa412c932786bac9e16d75ff284cb9.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yoialu = "C:\\Users\\Admin\\yoialu.exe /K" vuunoat.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tueovoq = "C:\\Users\\Admin\\tueovoq.exe /x" mouxioh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hauefum = "C:\\Users\\Admin\\hauefum.exe /O" jaadeik.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\noiivo = "C:\\Users\\Admin\\noiivo.exe /z" hauefum.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cbniiz = "C:\\Users\\Admin\\cbniiz.exe /B" deeed.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sfrus = "C:\\Users\\Admin\\sfrus.exe /j" piiod.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fuuvied = "C:\\Users\\Admin\\fuuvied.exe /k" sfrus.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuunoat = "C:\\Users\\Admin\\vuunoat.exe /G" ycgeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neuuri = "C:\\Users\\Admin\\neuuri.exe /v" xiiofow.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuikuuh = "C:\\Users\\Admin\\yuikuuh.exe /t" vrfoun.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\foaxit = "C:\\Users\\Admin\\foaxit.exe /d" yaeohod.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wauujax = "C:\\Users\\Admin\\wauujax.exe /U" caenii.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wiipeu = "C:\\Users\\Admin\\wiipeu.exe /l" fuuvied.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\niujo = "C:\\Users\\Admin\\niujo.exe /H" saiyioz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bcfaq = "C:\\Users\\Admin\\bcfaq.exe /M" giaabe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rouexem = "C:\\Users\\Admin\\rouexem.exe /d" bcfaq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yaeohod = "C:\\Users\\Admin\\yaeohod.exe /N" rouexem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\duowau = "C:\\Users\\Admin\\duowau.exe /Z" cearap.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pzcaes = "C:\\Users\\Admin\\pzcaes.exe /f" wiipeu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vrfoun = "C:\\Users\\Admin\\vrfoun.exe /Z" neuuri.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\suiiw = "C:\\Users\\Admin\\suiiw.exe /q" lsbug.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tioge = "C:\\Users\\Admin\\tioge.exe /B" foaxit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juabe = "C:\\Users\\Admin\\juabe.exe /X" kuorao.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\caenii = "C:\\Users\\Admin\\caenii.exe /N" pzcaes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceainip = "C:\\Users\\Admin\\ceainip.exe /h" raiveex.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\saiyioz = "C:\\Users\\Admin\\saiyioz.exe /S" zuuro.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\giaabe = "C:\\Users\\Admin\\giaabe.exe /k" sueal.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deeed = "C:\\Users\\Admin\\deeed.exe /f" bwyan.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\raiveex = "C:\\Users\\Admin\\raiveex.exe /N" wauujax.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zuuro = "C:\\Users\\Admin\\zuuro.exe /F" yuikuuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sueal = "C:\\Users\\Admin\\sueal.exe /W" quailux.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mouxioh = "C:\\Users\\Admin\\mouxioh.exe /s" yoialu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cearap = "C:\\Users\\Admin\\cearap.exe /Y" noiivo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\piiod = "C:\\Users\\Admin\\piiod.exe /Y" cbniiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xiiofow = "C:\\Users\\Admin\\xiiofow.exe /M" ceainip.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ycgeq = "C:\\Users\\Admin\\ycgeq.exe /o" juabe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\quailux = "C:\\Users\\Admin\\quailux.exe /S" suiiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bwyan = "C:\\Users\\Admin\\bwyan.exe /E" duowau.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4144 2eb8ab839de10b015435eb090b2f34396efa412c932786bac9e16d75ff284cb9.exe 4144 2eb8ab839de10b015435eb090b2f34396efa412c932786bac9e16d75ff284cb9.exe 4684 kuorao.exe 4684 kuorao.exe 632 juabe.exe 632 juabe.exe 2524 ycgeq.exe 2524 ycgeq.exe 3292 vuunoat.exe 3292 vuunoat.exe 2124 yoialu.exe 2124 yoialu.exe 3508 mouxioh.exe 3508 mouxioh.exe 4512 tueovoq.exe 4512 tueovoq.exe 1000 jaadeik.exe 1000 jaadeik.exe 956 hauefum.exe 956 hauefum.exe 3736 noiivo.exe 3736 noiivo.exe 3944 cearap.exe 3944 cearap.exe 3428 duowau.exe 3428 duowau.exe 1824 bwyan.exe 1824 bwyan.exe 4852 deeed.exe 4852 deeed.exe 4680 cbniiz.exe 4680 cbniiz.exe 2072 piiod.exe 2072 piiod.exe 3608 sfrus.exe 3608 sfrus.exe 3472 fuuvied.exe 3472 fuuvied.exe 3972 wiipeu.exe 3972 wiipeu.exe 4624 pzcaes.exe 4624 pzcaes.exe 2928 caenii.exe 2928 caenii.exe 3396 wauujax.exe 3396 wauujax.exe 752 raiveex.exe 752 raiveex.exe 2496 ceainip.exe 2496 ceainip.exe 1776 xiiofow.exe 1776 xiiofow.exe 2444 neuuri.exe 2444 neuuri.exe 1172 vrfoun.exe 1172 vrfoun.exe 2628 yuikuuh.exe 2628 yuikuuh.exe 3532 zuuro.exe 3532 zuuro.exe 3260 saiyioz.exe 3260 saiyioz.exe 1888 niujo.exe 1888 niujo.exe -
Suspicious use of SetWindowsHookEx 43 IoCs
pid Process 4144 2eb8ab839de10b015435eb090b2f34396efa412c932786bac9e16d75ff284cb9.exe 4684 kuorao.exe 632 juabe.exe 2524 ycgeq.exe 3292 vuunoat.exe 2124 yoialu.exe 3508 mouxioh.exe 4512 tueovoq.exe 1000 jaadeik.exe 956 hauefum.exe 3736 noiivo.exe 3944 cearap.exe 3428 duowau.exe 1824 bwyan.exe 4852 deeed.exe 4680 cbniiz.exe 2072 piiod.exe 3608 sfrus.exe 3472 fuuvied.exe 3972 wiipeu.exe 4624 pzcaes.exe 2928 caenii.exe 3396 wauujax.exe 752 raiveex.exe 2496 ceainip.exe 1776 xiiofow.exe 2444 neuuri.exe 1172 vrfoun.exe 2628 yuikuuh.exe 3532 zuuro.exe 3260 saiyioz.exe 1888 niujo.exe 3016 lsbug.exe 3288 suiiw.exe 4056 quailux.exe 4076 sueal.exe 720 giaabe.exe 1464 bcfaq.exe 3004 rouexem.exe 4484 yaeohod.exe 4284 foaxit.exe 1708 tioge.exe 464 heuvii.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4144 wrote to memory of 4684 4144 2eb8ab839de10b015435eb090b2f34396efa412c932786bac9e16d75ff284cb9.exe 90 PID 4144 wrote to memory of 4684 4144 2eb8ab839de10b015435eb090b2f34396efa412c932786bac9e16d75ff284cb9.exe 90 PID 4144 wrote to memory of 4684 4144 2eb8ab839de10b015435eb090b2f34396efa412c932786bac9e16d75ff284cb9.exe 90 PID 4684 wrote to memory of 632 4684 kuorao.exe 94 PID 4684 wrote to memory of 632 4684 kuorao.exe 94 PID 4684 wrote to memory of 632 4684 kuorao.exe 94 PID 632 wrote to memory of 2524 632 juabe.exe 96 PID 632 wrote to memory of 2524 632 juabe.exe 96 PID 632 wrote to memory of 2524 632 juabe.exe 96 PID 2524 wrote to memory of 3292 2524 ycgeq.exe 98 PID 2524 wrote to memory of 3292 2524 ycgeq.exe 98 PID 2524 wrote to memory of 3292 2524 ycgeq.exe 98 PID 3292 wrote to memory of 2124 3292 vuunoat.exe 99 PID 3292 wrote to memory of 2124 3292 vuunoat.exe 99 PID 3292 wrote to memory of 2124 3292 vuunoat.exe 99 PID 2124 wrote to memory of 3508 2124 yoialu.exe 100 PID 2124 wrote to memory of 3508 2124 yoialu.exe 100 PID 2124 wrote to memory of 3508 2124 yoialu.exe 100 PID 3508 wrote to memory of 4512 3508 mouxioh.exe 101 PID 3508 wrote to memory of 4512 3508 mouxioh.exe 101 PID 3508 wrote to memory of 4512 3508 mouxioh.exe 101 PID 4512 wrote to memory of 1000 4512 tueovoq.exe 102 PID 4512 wrote to memory of 1000 4512 tueovoq.exe 102 PID 4512 wrote to memory of 1000 4512 tueovoq.exe 102 PID 1000 wrote to memory of 956 1000 jaadeik.exe 104 PID 1000 wrote to memory of 956 1000 jaadeik.exe 104 PID 1000 wrote to memory of 956 1000 jaadeik.exe 104 PID 956 wrote to memory of 3736 956 hauefum.exe 106 PID 956 wrote to memory of 3736 956 hauefum.exe 106 PID 956 wrote to memory of 3736 956 hauefum.exe 106 PID 3736 wrote to memory of 3944 3736 noiivo.exe 107 PID 3736 wrote to memory of 3944 3736 noiivo.exe 107 PID 3736 wrote to memory of 3944 3736 noiivo.exe 107 PID 3944 wrote to memory of 3428 3944 cearap.exe 108 PID 3944 wrote to memory of 3428 3944 cearap.exe 108 PID 3944 wrote to memory of 3428 3944 cearap.exe 108 PID 3428 wrote to memory of 1824 3428 duowau.exe 109 PID 3428 wrote to memory of 1824 3428 duowau.exe 109 PID 3428 wrote to memory of 1824 3428 duowau.exe 109 PID 1824 wrote to memory of 4852 1824 bwyan.exe 110 PID 1824 wrote to memory of 4852 1824 bwyan.exe 110 PID 1824 wrote to memory of 4852 1824 bwyan.exe 110 PID 4852 wrote to memory of 4680 4852 deeed.exe 111 PID 4852 wrote to memory of 4680 4852 deeed.exe 111 PID 4852 wrote to memory of 4680 4852 deeed.exe 111 PID 4680 wrote to memory of 2072 4680 cbniiz.exe 112 PID 4680 wrote to memory of 2072 4680 cbniiz.exe 112 PID 4680 wrote to memory of 2072 4680 cbniiz.exe 112 PID 2072 wrote to memory of 3608 2072 piiod.exe 113 PID 2072 wrote to memory of 3608 2072 piiod.exe 113 PID 2072 wrote to memory of 3608 2072 piiod.exe 113 PID 3608 wrote to memory of 3472 3608 sfrus.exe 114 PID 3608 wrote to memory of 3472 3608 sfrus.exe 114 PID 3608 wrote to memory of 3472 3608 sfrus.exe 114 PID 3472 wrote to memory of 3972 3472 fuuvied.exe 115 PID 3472 wrote to memory of 3972 3472 fuuvied.exe 115 PID 3472 wrote to memory of 3972 3472 fuuvied.exe 115 PID 3972 wrote to memory of 4624 3972 wiipeu.exe 117 PID 3972 wrote to memory of 4624 3972 wiipeu.exe 117 PID 3972 wrote to memory of 4624 3972 wiipeu.exe 117 PID 4624 wrote to memory of 2928 4624 pzcaes.exe 118 PID 4624 wrote to memory of 2928 4624 pzcaes.exe 118 PID 4624 wrote to memory of 2928 4624 pzcaes.exe 118 PID 2928 wrote to memory of 3396 2928 caenii.exe 119
Processes
-
C:\Users\Admin\AppData\Local\Temp\2eb8ab839de10b015435eb090b2f34396efa412c932786bac9e16d75ff284cb9.exe"C:\Users\Admin\AppData\Local\Temp\2eb8ab839de10b015435eb090b2f34396efa412c932786bac9e16d75ff284cb9.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4144 -
C:\Users\Admin\kuorao.exe"C:\Users\Admin\kuorao.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4684 -
C:\Users\Admin\juabe.exe"C:\Users\Admin\juabe.exe"3⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:632 -
C:\Users\Admin\ycgeq.exe"C:\Users\Admin\ycgeq.exe"4⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Users\Admin\vuunoat.exe"C:\Users\Admin\vuunoat.exe"5⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3292 -
C:\Users\Admin\yoialu.exe"C:\Users\Admin\yoialu.exe"6⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Users\Admin\mouxioh.exe"C:\Users\Admin\mouxioh.exe"7⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3508 -
C:\Users\Admin\tueovoq.exe"C:\Users\Admin\tueovoq.exe"8⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4512 -
C:\Users\Admin\jaadeik.exe"C:\Users\Admin\jaadeik.exe"9⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1000 -
C:\Users\Admin\hauefum.exe"C:\Users\Admin\hauefum.exe"10⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Users\Admin\noiivo.exe"C:\Users\Admin\noiivo.exe"11⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3736 -
C:\Users\Admin\cearap.exe"C:\Users\Admin\cearap.exe"12⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3944 -
C:\Users\Admin\duowau.exe"C:\Users\Admin\duowau.exe"13⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3428 -
C:\Users\Admin\bwyan.exe"C:\Users\Admin\bwyan.exe"14⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Users\Admin\deeed.exe"C:\Users\Admin\deeed.exe"15⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Users\Admin\cbniiz.exe"C:\Users\Admin\cbniiz.exe"16⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4680 -
C:\Users\Admin\piiod.exe"C:\Users\Admin\piiod.exe"17⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Users\Admin\sfrus.exe"C:\Users\Admin\sfrus.exe"18⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3608 -
C:\Users\Admin\fuuvied.exe"C:\Users\Admin\fuuvied.exe"19⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3472 -
C:\Users\Admin\wiipeu.exe"C:\Users\Admin\wiipeu.exe"20⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3972 -
C:\Users\Admin\pzcaes.exe"C:\Users\Admin\pzcaes.exe"21⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4624 -
C:\Users\Admin\caenii.exe"C:\Users\Admin\caenii.exe"22⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Users\Admin\wauujax.exe"C:\Users\Admin\wauujax.exe"23⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3396 -
C:\Users\Admin\raiveex.exe"C:\Users\Admin\raiveex.exe"24⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:752 -
C:\Users\Admin\ceainip.exe"C:\Users\Admin\ceainip.exe"25⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2496 -
C:\Users\Admin\xiiofow.exe"C:\Users\Admin\xiiofow.exe"26⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1776 -
C:\Users\Admin\neuuri.exe"C:\Users\Admin\neuuri.exe"27⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2444 -
C:\Users\Admin\vrfoun.exe"C:\Users\Admin\vrfoun.exe"28⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1172 -
C:\Users\Admin\yuikuuh.exe"C:\Users\Admin\yuikuuh.exe"29⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2628 -
C:\Users\Admin\zuuro.exe"C:\Users\Admin\zuuro.exe"30⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3532 -
C:\Users\Admin\saiyioz.exe"C:\Users\Admin\saiyioz.exe"31⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3260 -
C:\Users\Admin\niujo.exe"C:\Users\Admin\niujo.exe"32⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1888 -
C:\Users\Admin\lsbug.exe"C:\Users\Admin\lsbug.exe"33⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:3016 -
C:\Users\Admin\suiiw.exe"C:\Users\Admin\suiiw.exe"34⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:3288 -
C:\Users\Admin\quailux.exe"C:\Users\Admin\quailux.exe"35⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:4056 -
C:\Users\Admin\sueal.exe"C:\Users\Admin\sueal.exe"36⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:4076 -
C:\Users\Admin\giaabe.exe"C:\Users\Admin\giaabe.exe"37⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:720 -
C:\Users\Admin\bcfaq.exe"C:\Users\Admin\bcfaq.exe"38⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:1464 -
C:\Users\Admin\rouexem.exe"C:\Users\Admin\rouexem.exe"39⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:3004 -
C:\Users\Admin\yaeohod.exe"C:\Users\Admin\yaeohod.exe"40⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:4484 -
C:\Users\Admin\foaxit.exe"C:\Users\Admin\foaxit.exe"41⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:4284 -
C:\Users\Admin\tioge.exe"C:\Users\Admin\tioge.exe"42⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:1708 -
C:\Users\Admin\heuvii.exe"C:\Users\Admin\heuvii.exe"43⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:464
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
124KB
MD56f2f6f8952df060f3f62e919d7838815
SHA164fca8aacd4cb200aa8c96bd653779f0e0bd71f3
SHA2567f07406406df384c03af99a23d56a5639c7bb1ec57850cdcd2aacf4ba6770e47
SHA5124f9e23abf1e17f974865aa6d2a8c168f86508fd7afd2d0dd1be5a9e6e77398de7e528885262e6be0be1a6e11fddcab0b5f7c7b7d8f3d0bdcb9165c21a8862f95
-
Filesize
124KB
MD5dec96c00e82a446c1ac8989c3fa6e283
SHA1eb3dce2e61142bbcdc8630d78c49108a607928d1
SHA2560f21a3231a0d0f4506bbaf3836b6693cc703857ee141930807fc5fa5b76745ff
SHA512a3876cdada6d2273ea6a2ad874e9e206bf5dea69a3c5a7c9582dbb28bfa79e98a5d03e28d0956aa4cc7c1f27828eaf00c61d1a129750530204084985e39bcaa0
-
Filesize
124KB
MD51722d81880148abbf9b4130e5b991bf7
SHA169561572cd2df64212e56d2db3fe0f400b1a70b8
SHA25600ecad79873eecb90da8d109862045b494c8c4849e061ca891e896a3b1563773
SHA51223afd61ca80e0ebcba4719ef27e90df21c97b001903381baeed6516d9bd92b2609c2da76ccd888c1325923d500c3e338dc6946feed27cfb328c87667d5cce67f
-
Filesize
124KB
MD54625acba81c717bcc8205e4c2541e675
SHA182b495cd24b50d8c46322007107332fbf23cfc32
SHA256cd70845644e4dd8da8753a45dbbe851ecb090711ea57f3ca783a408352680bb1
SHA512c90a6ef6af86b34393635c34e8c7f9e9de3a236c259b42f5cdd0a46ab4349a854cfa9519772f9610d450abb8d3a1e4d3ce2462340efadb30fd3ba44e51dcd9db
-
Filesize
124KB
MD5c8a1669d034a71dd5ed90df8b5e34ca3
SHA1bf62f6da5b5fb85af92ff302912c96460b20dbb2
SHA25659ffcf2edca9fccd4e835461fbd59db93d462f6b0cba030ef323ebd5ae3054e7
SHA512d86e99596c8fc0c881d7026b818574987a9cfbd4506f3de966384bc8a365b50ea606cf9e2c44fe06513f947bf49e7e322d3f034c029fcdc42401c183a7a1c6c5
-
Filesize
124KB
MD5260702c831933c110f85df954f731d5e
SHA1c6ed78c233596601fc55e5beb0325e5611fe60ff
SHA256aa500a164452d679b50f34e275b98cbbe0d01eaa52a6ae2fa41198ff6ba56215
SHA5120b16735c4fe29f351e59890f7b211df3e70699ace0b23d3eb03f77c2ec993f8e8dc388fce54716c4a2c59b259712a3f17a323c030af2f9c475e13de70bb81429
-
Filesize
124KB
MD57e75f2a3c75ea194f43143ef72bf1685
SHA1b9f1ab1551b96a33a61efbdd4c5fff48988c69e9
SHA2569efdae8f413d183490dc85493e715ed46a5823e519c3b29d658b6c37f31e8b67
SHA5126a5e7c72724d0eb4c3f2476c9600d3b26bb4153847706bcd8f82933d3a869b8e57b5fb71f2c64f5cdd2635b22bf64fb9e5ba4ac284380eb28dce5050b1f88fd1
-
Filesize
124KB
MD545e3fec13fd7cd1fc2ab8cde440c4773
SHA1112138d1aaaba1403be562ddad6977f2b380c7b7
SHA2568108c3a22b6a8575844c397a48f7ddc99b51d7185fb77b5d1ec2ffe168189c2c
SHA5123a589791a2230a6a341880889520fb3d887f41317dca106263a45def8d1ab30d604ac610f9bfdb083e3e8dc4f16413912ca13d9e363b9e94c06f836abedf5698
-
Filesize
124KB
MD57009573abfd6a35ab878703c5fcb25d7
SHA1c4b174adbf804a2b8f7302ff4cfe62ca358e4dac
SHA2563ea30763597657dbc3bc6282eb28db825aeb344a484a54baa51fe44da993d2be
SHA5124ac7d63de0de57d122c7a4d4cc807173824d77b86fc0430f0492bab11b9546f242f63cbec418aa3347a21b7025fbac289735bcb1d2b7e923bb34fd935c5e77be
-
Filesize
124KB
MD53346ff13405d7f29eae9cb9f4e5087f5
SHA109a872c076a2b87ac57e2e8bff405b2d3ddea1d4
SHA256bcb44995951daacb6fad0f2b42b299c6161e6854979c23d3809ea82cb32a43a4
SHA5128996ec95ac11c7cb2c56a6ee4e1ca74944783640971b45b41ac60be08def4ec24f3f39a1ed20cd098f6fabed159f2a305b621e94dc51debd9753971b12238405
-
Filesize
124KB
MD5e065f6fddf747d4a078ca1207852bc66
SHA172d72ea76c4aaa09fa4b5124f236f1d81add6a13
SHA2569414bb34f10ff233d1718df23cd505e04e5d496d22958eca3de8e95ccf74c9d7
SHA5123f54532a4edde9c474c4ce31e081dd89e54bc50ba520ed7b95ce676bb82d188d9acdf826916dfb22afce4bd7536239a3e555cb8a4055f0c8f1de5491ee53ad19
-
Filesize
124KB
MD5a05855db1e37f9abebd729fbb26c5a4f
SHA14b6057ec60d99e90d975dc10080a4a7d2172722b
SHA2566b1df6f79dc0234a1c456f87f1d7183d1a9dfd8345b030ccb5b4716aa725032f
SHA5122ebd77f01edc3d84636829c6b08c2237bd20ef26ccfbeb6b0fdc692eb2f6b72fa7f8ef9f57cf6c7cc5071fcec247e25edd75831e4443ff856e77f842530a85cd
-
Filesize
124KB
MD541b33830f619a04ce19253b608712e38
SHA11aa621ed4fa7dda12edd26f67dfaf38b0d17fba4
SHA256f5a5f340b508a53f3c14eab4669ee7ccd73c6f2984f172306a7d8eae9c2cc74b
SHA512315e86968e36bed4778f41c9481d8fa3c7daeb06f93778549c2d234084a7d403039e03bab8e50a05c19a0c488a15b592c6063d55f9037e7c3f447037622ab799
-
Filesize
124KB
MD5247655e02badcbb18e05f7d0e9861a58
SHA1364306519b46ec946945ca8b1fc46330357296ae
SHA256586a5d813ea992f71d90176911d0040d4035abce98639431caf901fabcfc3e36
SHA512aedab9f63c50216a694f6be97613b5222e4e90441843eda306caa4b74f01a656407f0f683d3166d6295a1ec8491536dd834293972d2150515b031e490452a12b
-
Filesize
124KB
MD55aaae9057a3e2400188678e12b2d97bf
SHA1dc972f30f8ccf218a8260b13bfea4dc8e998e5cd
SHA256b6c3e901aab90273524d31565fa3d8b7e3690ff3789bfb3b9ef0a3f86e63add8
SHA512ead416cd9d25d00c42ca63e0ad8566ea8f2ca819f9c138c57aa7a424d09fe060f2b25e0200d0528295dcedf808e4fef86f55d080a205c0645a1ad89828fa915a
-
Filesize
124KB
MD5ab638804b1eb66ade46877d4777f5ddd
SHA19ce2b2faf2ce2e9512d95a0a40ba25b4a8684769
SHA256baec34870d477a7af2ce22817ff61dae3ad1e2bda2020d3f6bd4e7dbd0743361
SHA512d7cc5347ddfcf4e9b43a5c204bacb2ea633fb1ba4f3f6cbf86fdd9d99e02e53989882ff8b3fb1008a959cfc35e04c3edec5fd7b17391865005a3746914db4691
-
Filesize
124KB
MD5064847abfcde975c66cdaac598106fe2
SHA10f15cfcc9f92545657307eaaa6d1e9cabe660f7a
SHA25635c3303da103e46a8297fd96123c627f5ce68f336813e094b74d80aa36c75406
SHA5123170e26d1ee3ac9c3e700858110225c85c427657991bd85034de28dd39d4e89025f99b03bd658089a32fe7c62f1a44df762437781e22462fa05338d763481390
-
Filesize
124KB
MD5c344f1dbdade890f150d8c96274c1d31
SHA1260fc653e23c3d34248b7b279ecd289b956f551e
SHA256a9f3d1fa22a413654e6c8cb319d530fc572d381afc78a5b0f53b37decce9924f
SHA512e955aff39c50a4b68624617d960efa4fbe1098589af650f1c4b471fce29c129a79ec3ff0a867a648c8c461f5c3d31242236e3e56412aa68af01fed32ac809e48
-
Filesize
124KB
MD573e6624d914730fabb990f587d4e5964
SHA12060633626a11cb278e788bb0d18f5ba2d36bf34
SHA25619385652ad64577daa8f38600b0517dc68a76941f19426c08e79efb235b7d16b
SHA512a1931e2f310740b256a5b57f05cc2a2486ca03f28c578129b73336a92a80e4e28c9f86dc8b5688df2ceb96217ba881c26de9e5ab2b536948f7c71c175fbdea5b
-
Filesize
124KB
MD59159680430f18a425b387998680ba305
SHA1eddee9f66b4d682835a0a2bec9fad1bce3afafd0
SHA256899dbe5e9f72e12c3f320806678827cc08aa7cd4c7042d0bdf69291ddb220701
SHA512f059ceb6657849e4f14536eea006a3b778e93fb7abfbf957d12d390f84d44a5622e3357df5c4f9836da74aeac9538b6d2b7b1e445b507774f170bc6f8ca78efd
-
Filesize
124KB
MD53d2ce72efd4f94aa26c267416815061f
SHA1d493214f4f9d3e47eefd4661b731841e243fcdc3
SHA25649563bc42ff2011c9eebe2ebc994286532f81270c035d09391d614fe511c7abd
SHA51259952e98da9e3f5491a92a14524f49919207a13993438e514aa9524da1b475108673b7e64170ea3ae7fdad9d296952d60dc4ba029ac17405ac49f6be9b973ead
-
Filesize
124KB
MD51b1485929a84a56d11ccc32921f9cebf
SHA1d554ce537597a333fb1f9efc2bae773ee3a8a6d0
SHA25650891c6137c6066c4075c3571adc37f832b73e82e87fe2cc93fbe0cc8f11ff43
SHA51291b307feaf5b516bdbeee43b942b73a12fad9b4e67c1c27aae44a36c33da60c3377861c10f0b89266249106fcf3c43023f98cd1c2c185ac5b29f4ebd5665b3ad
-
Filesize
124KB
MD59723e94f0b9b5e8034f201def43913ef
SHA11d1ed9921c55c7a78e3beb8ecf993ddb16468223
SHA256e242bacabbdb3f86abaf59ea7d83a74b9fcb03492ac9068bac3eadbaa4eb284d
SHA512e4cdd2c1d5c2bd51b90c82a5d151262523262638c243e7da8a3844be3d3c560d34680b2099d8807c2e93a27cef1ed067e84ce8a67380b9e53031d5724b6fcef1
-
Filesize
124KB
MD53af53e63f3e26684b17ed33014d30d4d
SHA14de481d9ee60d9a29cb5fc9cd26c6698f9131744
SHA2568b1d3e24b74ed94691207bcb259b5acf4e1c4f54ee80a9020ccfadca52ad5800
SHA512a2167bcf71578b87e72d1aa18b6c07b467700647858536ca7f14fbb5a4d671806f900ca10c532922e13e7b26a07d55adbf4c2d3e0dec375e89ec737da1cbfcde
-
Filesize
124KB
MD5821f1e3ac5c0255dab8ae3f506ce6285
SHA16fbb7f7dcb249640a2a66f3432f9e64b405db211
SHA2566df3ff9fd4984141f9186825d12b56d9650c585cf78d05198d4c3d580610c9d3
SHA512a9dc331fc0c4b61c2e6bb4768bbd5912a74799baa04e2fbd965905ed1cda3511ed25aed45301387395da724c77dbe28d9b474a2646dda48919d72f454aa2cc2f
-
Filesize
124KB
MD5d540b313754ffb622646c96d81638206
SHA12ba24d1a99cedeeb342703d1c90d999f19106191
SHA256c448bf10e857cb09d0d44f3ba0b186662512ec315a26987db5bc43a4be3ca445
SHA512610d8f05ca15a94eedafc7ce49426bc6a4e63fd0a3eb268496e415041b196388c65b1da4be120da431326e58ad57efc76163105c1f78df324df14ca06b3055fe
-
Filesize
124KB
MD5516b9170c5cc8ca49d6802f2edcbaa1f
SHA1467dcfbdec2b09b4d59cd1931e2ad90a26866d78
SHA2561f28e89aaf490cc7469aa588b8c7387075964764a76a3ef2f6ca1c280dce8974
SHA512373901b04757886ed0fbdcac69ee82bb1373c3b6ff5bc0a90477755844b460d217fd33a4dcd4498fd4e6442feeffcd1b96b3118d03e1fb97c653f279b0175698
-
Filesize
124KB
MD558f5abf323c0bf87fd638c2e5c0407e2
SHA1d36216fc72cf47a2c06401ba86f9904b447f30af
SHA256da4e9e2bea671773ad14c5e82da32b23ac88270992bbc1a6eee401c0ad370b9e
SHA512cfaed0926b6f09b7e4a40fb2b22b65a659ba58c464c9a78ffe68eedc1d8cb877e2e895ddd23f6c94ea7306213a81189600f2b234a6a9e4031a635928fb2f2bb8
-
Filesize
124KB
MD5c30a409a2f91a59cd73700c76713169d
SHA1a41f114e84e48778d308415b34d499a13fae2868
SHA256def4a51f64936781c1e455fce2bcd8df738b5e7eee0099ab179d58b1394ca599
SHA512e123ba3ab6ddf32758390b055352674892e53306093e9f441a68bed665cf3e295b9e6748bb3669c8a158aad5a2d99cfc9c731a57ce1f838e536b01b7a9d382bf
-
Filesize
124KB
MD50c343b121c00b73eeb794e9ff114672d
SHA1048176965f19a476c475fe52c8f4b4ec955f40c0
SHA2569b657c5ea73f22ea8b77bcfb5021b76557b8b23e17e366bd65506d296a976215
SHA512174eaa86a5dedfabcb709bb97bc5696e14e38f415174040e0f5690bd06759aadc46ae20de560a0a3c9def56b56fe944fb9c166cdcbaa30eff7b022270dbdd99f
-
Filesize
124KB
MD5f6231acabc01d4cad0e65e618a59de23
SHA16f73049a15b454be368649f74c10366002d56067
SHA2561d7c50be968fdc391509d07af46fb31af4074691defd0126b83df81e9ae39461
SHA512c26114dfd33285fb6e04c04d8dd48db7548ea4ded156d1680237dfa3ddbfd31bcd92597ebc5f8611d9e5e4fa83c5a77656783c56e445513df0026a4ccb432fe3
-
Filesize
124KB
MD5e510fa2b61c64a0ed4c1adcce6874b71
SHA1c69d6739651fc62e06d496ad5778088dd201196b
SHA256852f04a6380216aca3ac946d83cba2f0c3c21aaf78575edb93204a82be757e7a
SHA512d31a2cde848e684b4ae98f9b520523c44371031e457e855fd2b174858616dfcf8dc8c3169fc5ef5c97572c3f43ea0d243daab42368c6265eff2dbc632a62c0ef