Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
07/05/2024, 06:24
Static task
static1
Behavioral task
behavioral1
Sample
80f8e128f0faba411ac5db87c8222a40_NEAS.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
80f8e128f0faba411ac5db87c8222a40_NEAS.exe
Resource
win10v2004-20240419-en
General
-
Target
80f8e128f0faba411ac5db87c8222a40_NEAS.exe
-
Size
224KB
-
MD5
80f8e128f0faba411ac5db87c8222a40
-
SHA1
68d1e331b1b987617e7bffea93014d09ede7c41b
-
SHA256
0f69e2f1aacb656a44412010da9f8a5f048d45bac6de9d5551584a0bef4de5de
-
SHA512
b04bc5ac3effb1e5a3964aa7cd44f02e5b0260b45e1e9907124c1e8cac46dff3088435d46181f1e760b17c09bc4d12eb81f8051a22fef7b1cfa1e84f43c6af5f
-
SSDEEP
3072:GwXKF4VhCjG8G3GbGVGBGfGuGxGWYcrf6KadE:Gw6FWAYcD6Kad
Malware Config
Signatures
-
Executes dropped EXE 63 IoCs
pid Process 2552 puimees.exe 2576 viegaaz.exe 2472 guaboq.exe 2720 fiawuu.exe 2116 heanil.exe 1648 zkqon.exe 1532 caoopu.exe 864 sjkip.exe 336 pnhim.exe 636 bauuxo.exe 1684 fiemaap.exe 2172 siuut.exe 1260 loiisux.exe 3012 niweg.exe 2972 ruewad.exe 2772 zoefad.exe 2572 jiawux.exe 2896 noidu.exe 2876 ceaaso.exe 2328 qauuf.exe 2728 miuzaa.exe 1728 tokig.exe 1776 puimees.exe 532 hqjeg.exe 1000 nieezup.exe 1952 wuegooq.exe 1668 teuco.exe 1040 beuunog.exe 960 miuzaa.exe 1724 heuyaap.exe 2944 buoop.exe 2816 seoohit.exe 2668 niasuy.exe 2580 vieraaz.exe 2332 nvtil.exe 2896 kieecum.exe 2876 yiamoq.exe 2328 huooy.exe 2848 poamik.exe 3060 peamik.exe 2072 zcriep.exe 1584 deugo.exe 2424 weoxii.exe 652 beoogu.exe 2884 yieetus.exe 2808 vuokaaz.exe 1512 raiiqu.exe 2652 soitee.exe 2752 ceaasuz.exe 2620 jgfex.exe 1108 zaooq.exe 1880 zoeex.exe 1324 vodig.exe 2416 hvtif.exe 2740 teuusop.exe 1264 kaeecum.exe 864 veudo.exe 312 pouuj.exe 2248 siayeg.exe 1844 xmcuov.exe 1052 guawen.exe 1028 daooju.exe 2884 saiip.exe -
Loads dropped DLL 64 IoCs
pid Process 1396 80f8e128f0faba411ac5db87c8222a40_NEAS.exe 1396 80f8e128f0faba411ac5db87c8222a40_NEAS.exe 2552 puimees.exe 2552 puimees.exe 2576 viegaaz.exe 2576 viegaaz.exe 2472 guaboq.exe 2472 guaboq.exe 2720 fiawuu.exe 2720 fiawuu.exe 2116 heanil.exe 2116 heanil.exe 1648 zkqon.exe 1648 zkqon.exe 1532 caoopu.exe 1532 caoopu.exe 864 sjkip.exe 864 sjkip.exe 336 pnhim.exe 336 pnhim.exe 636 bauuxo.exe 636 bauuxo.exe 1684 fiemaap.exe 1684 fiemaap.exe 2172 siuut.exe 2172 siuut.exe 1260 loiisux.exe 1260 loiisux.exe 3012 niweg.exe 3012 niweg.exe 2972 ruewad.exe 2972 ruewad.exe 2772 zoefad.exe 2772 zoefad.exe 2572 jiawux.exe 2572 jiawux.exe 2896 noidu.exe 2896 noidu.exe 2876 ceaaso.exe 2876 ceaaso.exe 2328 qauuf.exe 2328 qauuf.exe 2728 miuzaa.exe 2728 miuzaa.exe 1728 tokig.exe 1776 puimees.exe 1776 puimees.exe 532 hqjeg.exe 532 hqjeg.exe 1000 nieezup.exe 1000 nieezup.exe 1952 wuegooq.exe 1952 wuegooq.exe 1668 teuco.exe 1668 teuco.exe 1040 beuunog.exe 960 miuzaa.exe 960 miuzaa.exe 1724 heuyaap.exe 1724 heuyaap.exe 2944 buoop.exe 2944 buoop.exe 2816 seoohit.exe 2816 seoohit.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 63 IoCs
pid Process 1396 80f8e128f0faba411ac5db87c8222a40_NEAS.exe 2552 puimees.exe 2576 viegaaz.exe 2472 guaboq.exe 2720 fiawuu.exe 2116 heanil.exe 1648 zkqon.exe 1532 caoopu.exe 864 sjkip.exe 336 pnhim.exe 636 bauuxo.exe 1684 fiemaap.exe 2172 siuut.exe 1260 loiisux.exe 3012 niweg.exe 2972 ruewad.exe 2772 zoefad.exe 2572 jiawux.exe 2896 noidu.exe 2876 ceaaso.exe 2328 qauuf.exe 2728 miuzaa.exe 1728 tokig.exe 1776 puimees.exe 532 hqjeg.exe 1000 nieezup.exe 1952 wuegooq.exe 1668 teuco.exe 1040 beuunog.exe 960 miuzaa.exe 1724 heuyaap.exe 2944 buoop.exe 2816 seoohit.exe 2668 niasuy.exe 2580 vieraaz.exe 2332 nvtil.exe 2896 kieecum.exe 2876 yiamoq.exe 2328 huooy.exe 2848 poamik.exe 3060 peamik.exe 2072 zcriep.exe 1584 deugo.exe 2424 weoxii.exe 652 beoogu.exe 2884 yieetus.exe 2808 vuokaaz.exe 1512 raiiqu.exe 2652 soitee.exe 2752 ceaasuz.exe 2620 jgfex.exe 1108 zaooq.exe 1880 zoeex.exe 1324 vodig.exe 2416 hvtif.exe 2740 teuusop.exe 1264 kaeecum.exe 864 veudo.exe 312 pouuj.exe 2248 siayeg.exe 1844 xmcuov.exe 1052 guawen.exe 1028 daooju.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 1396 80f8e128f0faba411ac5db87c8222a40_NEAS.exe 2552 puimees.exe 2576 viegaaz.exe 2472 guaboq.exe 2720 fiawuu.exe 2116 heanil.exe 1648 zkqon.exe 1532 caoopu.exe 864 sjkip.exe 336 pnhim.exe 636 bauuxo.exe 1684 fiemaap.exe 2172 siuut.exe 1260 loiisux.exe 3012 niweg.exe 2972 ruewad.exe 2772 zoefad.exe 2572 jiawux.exe 2896 noidu.exe 2876 ceaaso.exe 2328 qauuf.exe 2728 miuzaa.exe 1728 tokig.exe 1776 puimees.exe 532 hqjeg.exe 1000 nieezup.exe 1952 wuegooq.exe 1668 teuco.exe 1040 beuunog.exe 960 miuzaa.exe 1724 heuyaap.exe 2944 buoop.exe 2816 seoohit.exe 2668 niasuy.exe 2580 vieraaz.exe 2332 nvtil.exe 2896 kieecum.exe 2876 yiamoq.exe 2328 huooy.exe 2848 poamik.exe 3060 peamik.exe 2072 zcriep.exe 1584 deugo.exe 2424 weoxii.exe 652 beoogu.exe 2884 yieetus.exe 2808 vuokaaz.exe 1512 raiiqu.exe 2652 soitee.exe 2752 ceaasuz.exe 2620 jgfex.exe 1108 zaooq.exe 1880 zoeex.exe 1324 vodig.exe 2416 hvtif.exe 2740 teuusop.exe 1264 kaeecum.exe 864 veudo.exe 312 pouuj.exe 2248 siayeg.exe 1844 xmcuov.exe 1052 guawen.exe 1028 daooju.exe 2884 saiip.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1396 wrote to memory of 2552 1396 80f8e128f0faba411ac5db87c8222a40_NEAS.exe 28 PID 1396 wrote to memory of 2552 1396 80f8e128f0faba411ac5db87c8222a40_NEAS.exe 28 PID 1396 wrote to memory of 2552 1396 80f8e128f0faba411ac5db87c8222a40_NEAS.exe 28 PID 1396 wrote to memory of 2552 1396 80f8e128f0faba411ac5db87c8222a40_NEAS.exe 28 PID 2552 wrote to memory of 2576 2552 puimees.exe 29 PID 2552 wrote to memory of 2576 2552 puimees.exe 29 PID 2552 wrote to memory of 2576 2552 puimees.exe 29 PID 2552 wrote to memory of 2576 2552 puimees.exe 29 PID 2576 wrote to memory of 2472 2576 viegaaz.exe 30 PID 2576 wrote to memory of 2472 2576 viegaaz.exe 30 PID 2576 wrote to memory of 2472 2576 viegaaz.exe 30 PID 2576 wrote to memory of 2472 2576 viegaaz.exe 30 PID 2472 wrote to memory of 2720 2472 guaboq.exe 31 PID 2472 wrote to memory of 2720 2472 guaboq.exe 31 PID 2472 wrote to memory of 2720 2472 guaboq.exe 31 PID 2472 wrote to memory of 2720 2472 guaboq.exe 31 PID 2720 wrote to memory of 2116 2720 fiawuu.exe 32 PID 2720 wrote to memory of 2116 2720 fiawuu.exe 32 PID 2720 wrote to memory of 2116 2720 fiawuu.exe 32 PID 2720 wrote to memory of 2116 2720 fiawuu.exe 32 PID 2116 wrote to memory of 1648 2116 heanil.exe 33 PID 2116 wrote to memory of 1648 2116 heanil.exe 33 PID 2116 wrote to memory of 1648 2116 heanil.exe 33 PID 2116 wrote to memory of 1648 2116 heanil.exe 33 PID 1648 wrote to memory of 1532 1648 zkqon.exe 34 PID 1648 wrote to memory of 1532 1648 zkqon.exe 34 PID 1648 wrote to memory of 1532 1648 zkqon.exe 34 PID 1648 wrote to memory of 1532 1648 zkqon.exe 34 PID 1532 wrote to memory of 864 1532 caoopu.exe 35 PID 1532 wrote to memory of 864 1532 caoopu.exe 35 PID 1532 wrote to memory of 864 1532 caoopu.exe 35 PID 1532 wrote to memory of 864 1532 caoopu.exe 35 PID 864 wrote to memory of 336 864 sjkip.exe 36 PID 864 wrote to memory of 336 864 sjkip.exe 36 PID 864 wrote to memory of 336 864 sjkip.exe 36 PID 864 wrote to memory of 336 864 sjkip.exe 36 PID 336 wrote to memory of 636 336 pnhim.exe 37 PID 336 wrote to memory of 636 336 pnhim.exe 37 PID 336 wrote to memory of 636 336 pnhim.exe 37 PID 336 wrote to memory of 636 336 pnhim.exe 37 PID 636 wrote to memory of 1684 636 bauuxo.exe 38 PID 636 wrote to memory of 1684 636 bauuxo.exe 38 PID 636 wrote to memory of 1684 636 bauuxo.exe 38 PID 636 wrote to memory of 1684 636 bauuxo.exe 38 PID 1684 wrote to memory of 2172 1684 fiemaap.exe 39 PID 1684 wrote to memory of 2172 1684 fiemaap.exe 39 PID 1684 wrote to memory of 2172 1684 fiemaap.exe 39 PID 1684 wrote to memory of 2172 1684 fiemaap.exe 39 PID 2172 wrote to memory of 1260 2172 siuut.exe 40 PID 2172 wrote to memory of 1260 2172 siuut.exe 40 PID 2172 wrote to memory of 1260 2172 siuut.exe 40 PID 2172 wrote to memory of 1260 2172 siuut.exe 40 PID 1260 wrote to memory of 3012 1260 loiisux.exe 41 PID 1260 wrote to memory of 3012 1260 loiisux.exe 41 PID 1260 wrote to memory of 3012 1260 loiisux.exe 41 PID 1260 wrote to memory of 3012 1260 loiisux.exe 41 PID 3012 wrote to memory of 2972 3012 niweg.exe 42 PID 3012 wrote to memory of 2972 3012 niweg.exe 42 PID 3012 wrote to memory of 2972 3012 niweg.exe 42 PID 3012 wrote to memory of 2972 3012 niweg.exe 42 PID 2972 wrote to memory of 2772 2972 ruewad.exe 43 PID 2972 wrote to memory of 2772 2972 ruewad.exe 43 PID 2972 wrote to memory of 2772 2972 ruewad.exe 43 PID 2972 wrote to memory of 2772 2972 ruewad.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\80f8e128f0faba411ac5db87c8222a40_NEAS.exe"C:\Users\Admin\AppData\Local\Temp\80f8e128f0faba411ac5db87c8222a40_NEAS.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Users\Admin\puimees.exe"C:\Users\Admin\puimees.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Users\Admin\viegaaz.exe"C:\Users\Admin\viegaaz.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Users\Admin\guaboq.exe"C:\Users\Admin\guaboq.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Users\Admin\fiawuu.exe"C:\Users\Admin\fiawuu.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Users\Admin\heanil.exe"C:\Users\Admin\heanil.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Users\Admin\zkqon.exe"C:\Users\Admin\zkqon.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Users\Admin\caoopu.exe"C:\Users\Admin\caoopu.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Users\Admin\sjkip.exe"C:\Users\Admin\sjkip.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:864 -
C:\Users\Admin\pnhim.exe"C:\Users\Admin\pnhim.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:336 -
C:\Users\Admin\bauuxo.exe"C:\Users\Admin\bauuxo.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:636 -
C:\Users\Admin\fiemaap.exe"C:\Users\Admin\fiemaap.exe"12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Users\Admin\siuut.exe"C:\Users\Admin\siuut.exe"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Users\Admin\loiisux.exe"C:\Users\Admin\loiisux.exe"14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Users\Admin\niweg.exe"C:\Users\Admin\niweg.exe"15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Users\Admin\ruewad.exe"C:\Users\Admin\ruewad.exe"16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Users\Admin\zoefad.exe"C:\Users\Admin\zoefad.exe"17⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2772 -
C:\Users\Admin\jiawux.exe"C:\Users\Admin\jiawux.exe"18⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2572 -
C:\Users\Admin\noidu.exe"C:\Users\Admin\noidu.exe"19⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2896 -
C:\Users\Admin\ceaaso.exe"C:\Users\Admin\ceaaso.exe"20⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2876 -
C:\Users\Admin\qauuf.exe"C:\Users\Admin\qauuf.exe"21⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2328 -
C:\Users\Admin\miuzaa.exe"C:\Users\Admin\miuzaa.exe"22⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2728 -
C:\Users\Admin\tokig.exe"C:\Users\Admin\tokig.exe"23⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1728 -
C:\Users\Admin\puimees.exe"C:\Users\Admin\puimees.exe"24⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1776 -
C:\Users\Admin\hqjeg.exe"C:\Users\Admin\hqjeg.exe"25⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:532 -
C:\Users\Admin\nieezup.exe"C:\Users\Admin\nieezup.exe"26⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1000 -
C:\Users\Admin\wuegooq.exe"C:\Users\Admin\wuegooq.exe"27⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1952 -
C:\Users\Admin\teuco.exe"C:\Users\Admin\teuco.exe"28⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1668 -
C:\Users\Admin\beuunog.exe"C:\Users\Admin\beuunog.exe"29⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1040 -
C:\Users\Admin\miuzaa.exe"C:\Users\Admin\miuzaa.exe"30⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:960 -
C:\Users\Admin\heuyaap.exe"C:\Users\Admin\heuyaap.exe"31⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1724 -
C:\Users\Admin\buoop.exe"C:\Users\Admin\buoop.exe"32⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2944 -
C:\Users\Admin\seoohit.exe"C:\Users\Admin\seoohit.exe"33⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2816 -
C:\Users\Admin\niasuy.exe"C:\Users\Admin\niasuy.exe"34⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2668 -
C:\Users\Admin\vieraaz.exe"C:\Users\Admin\vieraaz.exe"35⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2580 -
C:\Users\Admin\nvtil.exe"C:\Users\Admin\nvtil.exe"36⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2332 -
C:\Users\Admin\kieecum.exe"C:\Users\Admin\kieecum.exe"37⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2896 -
C:\Users\Admin\yiamoq.exe"C:\Users\Admin\yiamoq.exe"38⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2876 -
C:\Users\Admin\huooy.exe"C:\Users\Admin\huooy.exe"39⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2328 -
C:\Users\Admin\poamik.exe"C:\Users\Admin\poamik.exe"40⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2848 -
C:\Users\Admin\peamik.exe"C:\Users\Admin\peamik.exe"41⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3060 -
C:\Users\Admin\zcriep.exe"C:\Users\Admin\zcriep.exe"42⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2072 -
C:\Users\Admin\deugo.exe"C:\Users\Admin\deugo.exe"43⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1584 -
C:\Users\Admin\weoxii.exe"C:\Users\Admin\weoxii.exe"44⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2424 -
C:\Users\Admin\beoogu.exe"C:\Users\Admin\beoogu.exe"45⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:652 -
C:\Users\Admin\yieetus.exe"C:\Users\Admin\yieetus.exe"46⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2884 -
C:\Users\Admin\vuokaaz.exe"C:\Users\Admin\vuokaaz.exe"47⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2808 -
C:\Users\Admin\raiiqu.exe"C:\Users\Admin\raiiqu.exe"48⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1512 -
C:\Users\Admin\soitee.exe"C:\Users\Admin\soitee.exe"49⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2652 -
C:\Users\Admin\ceaasuz.exe"C:\Users\Admin\ceaasuz.exe"50⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2752 -
C:\Users\Admin\jgfex.exe"C:\Users\Admin\jgfex.exe"51⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2620 -
C:\Users\Admin\zaooq.exe"C:\Users\Admin\zaooq.exe"52⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1108 -
C:\Users\Admin\zoeex.exe"C:\Users\Admin\zoeex.exe"53⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1880 -
C:\Users\Admin\vodig.exe"C:\Users\Admin\vodig.exe"54⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1324 -
C:\Users\Admin\hvtif.exe"C:\Users\Admin\hvtif.exe"55⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2416 -
C:\Users\Admin\teuusop.exe"C:\Users\Admin\teuusop.exe"56⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2740 -
C:\Users\Admin\kaeecum.exe"C:\Users\Admin\kaeecum.exe"57⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1264 -
C:\Users\Admin\veudo.exe"C:\Users\Admin\veudo.exe"58⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:864 -
C:\Users\Admin\pouuj.exe"C:\Users\Admin\pouuj.exe"59⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:312 -
C:\Users\Admin\siayeg.exe"C:\Users\Admin\siayeg.exe"60⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2248 -
C:\Users\Admin\xmcuov.exe"C:\Users\Admin\xmcuov.exe"61⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1844 -
C:\Users\Admin\guawen.exe"C:\Users\Admin\guawen.exe"62⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1052 -
C:\Users\Admin\daooju.exe"C:\Users\Admin\daooju.exe"63⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1028 -
C:\Users\Admin\saiip.exe"C:\Users\Admin\saiip.exe"64⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2884
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224KB
MD58ba43ea6a37d79da48c03ca97c18eda2
SHA1c984aa8a756dfc0a9b1d0262daa0e7991a30a5c0
SHA2560abcacc7310051e0fb5f66d951b9c7ed9be7c0b5babc5e8945d522bc822d144c
SHA5122a73861955101f7d94d9724c3b53f44df71e03808795160234b9bd4349cf3809caece7b7f099c5a20edda360fa96b20a9eaa92cab97299708acdcfea671e83b1
-
Filesize
224KB
MD5d2c6af378a8a014ba095df49490b9b6f
SHA18c0dc5883a01d440b61497a66b17174c39c2bf6d
SHA2568ae1a528929079467e703919225912e013499aef45009c796f988e15b836c48b
SHA512239912840517c049244dc76fea1ac07bbc0ea7133b770cacb6684338bafc8345ad8536870db784dfd9a7fa7b0488f1d16dd8fa47c0b02e148138dc0800c76b67
-
Filesize
224KB
MD58dac5576232c4caf2c61c093f7c20526
SHA1b1cdc689d45dcb4b3e2b95ddb647ede45f68b9b8
SHA2565201975d4357d44ad41248a1ad1467b42476433e10720b27fc6e64290c5b09ae
SHA5129c6f88f754f13b312775196baf42b86efeeff50c68e3b44963d1357fd32edc6b799e44277d550dbc095dd661be7e0dd2f20bb867bb35f1e88da8e0b1774b5f6a
-
Filesize
224KB
MD5d0fc22cf30f2c51c704e82ed4cfbe762
SHA14a5108d5e37aa331e3b6699fb0da48162d6f900e
SHA256b41c775435d61705e7ac3c55a2bec3bafad94b11293e53bbe36906430d0d663e
SHA512ceb3da93335a64284bd83222451c7bb865ee6969292b27505e5bb8c79025dc0c25b30a896501d3e21d0e2a429f1092242c70d19638255d1f44caa16e7c3fdd31
-
Filesize
224KB
MD51b393af10010c3611ca01b94f28dc46c
SHA10a56f26b78107e061fa377d31f948851ebace1c7
SHA256c1a0e93b97334b16b311c62d76253e4e0507b0bd89212a206e087ad6713a994b
SHA5122969a5c0a61b70d43c2e752873542c771b7e078adb072da77ac8915d0126dce6bc3e4e1aa0d4c0bd63e600b56e2aa302f4b0783c86d9983e590f66e8c0fc19ef
-
Filesize
224KB
MD5808db34faa217d5b598b7246d2c2978f
SHA1c9702efdc6a8efd436890dae517bf67f22f232f9
SHA2565b46d1955c5eddb207080233f45780fada2eb52bb1073f67f358e455ad28208c
SHA5128911b24e4faf4643b8c2beedbe271ccd5f3c5eb15538befc3440b7072598ca502ed028e1b43d50810885e3916efd0a2f31c39ab106bffbbd8fe6d7e1f8cb3e4b
-
Filesize
224KB
MD57b6c375f40b288762b924fc677505b40
SHA136aec3e8465db0f277f6117a60fcc23999bf705c
SHA256c2208b9ef92e6754bfbf400678d3568e0bc3b92b774a252cc76a1a17bb7581fa
SHA512406ecf8cc694b26e3ec4a19d89be016be98dbc4614c39e15d836355970597a05c5c7866330668938fbf4cc0f67aae3516c5e82b440fe9b0de854fc2db09bab98
-
Filesize
224KB
MD5b8a2ca3e9663aea8c51bb827548a5c84
SHA11f004bc88450ddd677d4d140ac962b7cb0796049
SHA256f8f2ec5a44c56487e869faf84476b948c7fa656ba73cfaf208a5619a2a7e0e06
SHA512d9d0b1d7607cc967f12f0ea031d5b90e6d2fb0101b64d84a608720de937b90baa44b87bdd4ea37ab103887d82cb189d0c5302c20fb26ed547a037b9bfbdc0f98
-
Filesize
224KB
MD5b5ac53a8d87c5fcac99e3fa459b937de
SHA1bbe52a4d68f78199d868234a7026942bcd82eceb
SHA256e81c10ab62fa495b5ffe08a458233b12c1f88a8671626cca1d13d501e18bb581
SHA51244ffbeba4b8aed0331d65f0b63dbc5aaa68149be8753f5fe2a37f597bf6038e1667a44f41be168cc20fe5fcae8e986f68fb8d3c6acadce82545daa287c64aeea
-
Filesize
224KB
MD58265ffd9ac33bff3b742c48ba611c7a3
SHA123d8646dc8da8c25b363b13265477e5254c1ee79
SHA256f4ec0f4265fcc7fbaec9ed8e1acfca67c8c53d09882bdbec45bcbbbf253ead24
SHA512ce9d3d0454debda5f0e0c9227f6c88f8957c23778e990acb2e8ab146dc8b3c6a9f98a5ca341f18acae368eb3786bb139411e7bc1090230ff89ba7008a60333f6
-
Filesize
224KB
MD57db97d1fe871e97464d65abc272dffa8
SHA15158637ee51861bbf32d5565c373c3baa5c72353
SHA25619e0b3c48a69c7f8504ff07099168bab4cc16187463c2bede3b6ebaa52ed19d3
SHA512429b103b23abc340295a99ecad07b15da5d737f3c801fe8883e1715aa3b14bfe6eaed2f314486b982593423b5a77088b125cde4665ef47eb493673d5964dbc61
-
Filesize
224KB
MD5e3ffad16cf7c48560403676f1a85be49
SHA1e034f0376730d6aecbd51599a94b010fbd96ceb3
SHA2568740e2ab808ebef613600f2c715846070fe18987274c0dc9b1fbd687483d3daa
SHA5124f334ecfd3adc6716944834f3364426c6c2da9cbc9bdeea221bf687516fb8f114576544c7a4203706216f8a9f85de550837fd468da5358ccbc98e44069454f5e
-
Filesize
224KB
MD50f993284751b0bf31f914e64500375a3
SHA17699b928498f164c0712780ec73d4765ea4a166e
SHA2561db06613bcc137122be2194b8701ad5b2ad91b0c222ee1ec2b22f56ecd632dac
SHA512ad527ca13f5d78883f24a0b84c01966309e6e7f9ba6614db6a25149be785eeb9996168ca0de9a5215bfe3149cbe4694fe941f31baebaf066f6ed72137789b06a
-
Filesize
224KB
MD514b38324f6dd0841e8f4d3f5965df2eb
SHA1b95ee3a23c58b3731f17596ed6599dfffe66ba5a
SHA25611d8fce11dfc0c3e5bd464dd81941aee372855ec0478b2c7b81a1814952f1717
SHA51264c778c5cb42f26ce7c0ac5f5fa81e93733cdf8a63159c00b7620a07c6fdb7fe395ec6aa0ddf808a3e06918e92945b1fa33bbe39da6ceba88892d4ae2b99c8a8
-
Filesize
224KB
MD53381e8203c1c17d5900bd6ea2122e8de
SHA1496c7becda632eb81ca337371d1833b3918b20fd
SHA256d915e18ff0e858c3e37f90f6a6b36f8ddc4e74889d14f5ca210e9ac51bcba74d
SHA512889e7ae9c2f067a359db26bab8b624407aaaf798ca1799a23bf7f9bd93b6223bac7d7c9eba6214d1802e37bd056d6db16866e41c18e1857dda34f9dff6fcf4d2
-
Filesize
224KB
MD567a317ec887f127fc50fa5b6634d3cbb
SHA119f76ca85ac9a627e230004ebe5fc0acf691bcfd
SHA2563793364cc813b4e3ca9d1b54b55338bb9c3a9eaedf109e45b8ca7992cdc1bafc
SHA512c945b9c73e9b26df2af690f8500156525c812dd10e7c4844f1539f916b4db631a5584fb4ae67778084a5cdde89a7185a9d2361db90b678690a468b44f1dca869