Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
10/05/2024, 23:15
Static task
static1
Behavioral task
behavioral1
Sample
283cc2178acb6e8ae6a33607267fb220_NeikiAnalytics.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
283cc2178acb6e8ae6a33607267fb220_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
283cc2178acb6e8ae6a33607267fb220_NeikiAnalytics.exe
-
Size
224KB
-
MD5
283cc2178acb6e8ae6a33607267fb220
-
SHA1
8a7a0da58def1513a8588551c3313493b73d8a92
-
SHA256
b466ec51c25e30bb255ae4ccfae13e632962aa95475a4fe977b232edebace8a4
-
SHA512
c956edc5e7f35550fce54539eb76dedd0ebced492a504ed695cfe159358ec7e57b49d7cd13bbf50b04182d10915e7fb509a2d39acaf119ae351712ef3495a2d7
-
SSDEEP
3072:G40KMNIZf9ThCjG8G3GbGVGBGfGuGxGWYcrf6KadU:G45MNaTAYcD6Kad
Malware Config
Signatures
-
Executes dropped EXE 61 IoCs
pid Process 2588 wuave.exe 2628 beodi.exe 2548 qoiizur.exe 2424 maoruw.exe 3000 peori.exe 1812 feodi.exe 1984 daiice.exe 1300 svpor.exe 600 feovi.exe 1816 quobaar.exe 1032 xbvoir.exe 1012 mieezup.exe 560 svreq.exe 2456 keutaan.exe 3032 jauug.exe 2892 noidu.exe 2524 saoohut.exe 2984 boidu.exe 2976 yiedaat.exe 1700 muatoo.exe 2572 xiuut.exe 2092 daeevuj.exe 2376 neoofiz.exe 596 syhim.exe 1476 cgqos.exe 1552 kearii.exe 1360 xaooy.exe 1784 syhim.exe 1012 wgxoif.exe 2964 qiyeb.exe 2944 liagoo.exe 2656 qezar.exe 2796 moibu.exe 2988 ziamuu.exe 1632 ndjuy.exe 2316 jaeefuv.exe 2564 tdvoik.exe 2492 yiedaat.exe 836 mauuje.exe 1756 wgxom.exe 2932 feuco.exe 960 deaavoc.exe 1140 baeeyo.exe 1036 peodi.exe 916 deocu.exe 292 qoiizur.exe 2952 teasi.exe 2416 fauuqo.exe 3060 nuqiz.exe 2852 jokiy.exe 2892 muaqev.exe 2436 daiiye.exe 1236 vplos.exe 376 yhqom.exe 996 zuapos.exe 1580 jukiz.exe 2712 xbvoil.exe 1016 qoemaar.exe 408 lauuj.exe 1816 giawoo.exe 600 vfpot.exe -
Loads dropped DLL 64 IoCs
pid Process 2124 283cc2178acb6e8ae6a33607267fb220_NeikiAnalytics.exe 2124 283cc2178acb6e8ae6a33607267fb220_NeikiAnalytics.exe 2588 wuave.exe 2588 wuave.exe 2628 beodi.exe 2628 beodi.exe 2548 qoiizur.exe 2548 qoiizur.exe 2424 maoruw.exe 2424 maoruw.exe 3000 peori.exe 3000 peori.exe 1812 feodi.exe 1812 feodi.exe 1984 daiice.exe 1984 daiice.exe 1300 svpor.exe 1300 svpor.exe 600 feovi.exe 600 feovi.exe 1816 quobaar.exe 1816 quobaar.exe 1032 xbvoir.exe 1032 xbvoir.exe 1012 mieezup.exe 1012 mieezup.exe 560 svreq.exe 560 svreq.exe 2456 keutaan.exe 2456 keutaan.exe 3032 jauug.exe 3032 jauug.exe 2892 noidu.exe 2892 noidu.exe 2524 saoohut.exe 2524 saoohut.exe 2984 boidu.exe 2984 boidu.exe 2976 yiedaat.exe 2976 yiedaat.exe 1700 muatoo.exe 1700 muatoo.exe 2572 xiuut.exe 2572 xiuut.exe 2092 daeevuj.exe 2092 daeevuj.exe 2376 neoofiz.exe 2376 neoofiz.exe 596 syhim.exe 596 syhim.exe 1476 cgqos.exe 1476 cgqos.exe 1552 kearii.exe 1552 kearii.exe 1360 xaooy.exe 1784 syhim.exe 1784 syhim.exe 1012 wgxoif.exe 1012 wgxoif.exe 2964 qiyeb.exe 2964 qiyeb.exe 2944 liagoo.exe 2944 liagoo.exe 2656 qezar.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 62 IoCs
pid Process 2124 283cc2178acb6e8ae6a33607267fb220_NeikiAnalytics.exe 2588 wuave.exe 2628 beodi.exe 2548 qoiizur.exe 2424 maoruw.exe 3000 peori.exe 1812 feodi.exe 1984 daiice.exe 1300 svpor.exe 600 feovi.exe 1816 quobaar.exe 1032 xbvoir.exe 1012 mieezup.exe 560 svreq.exe 2456 keutaan.exe 3032 jauug.exe 2892 noidu.exe 2524 saoohut.exe 2984 boidu.exe 2976 yiedaat.exe 1700 muatoo.exe 2572 xiuut.exe 2092 daeevuj.exe 2376 neoofiz.exe 596 syhim.exe 1476 cgqos.exe 1552 kearii.exe 1360 xaooy.exe 1784 syhim.exe 1012 wgxoif.exe 2964 qiyeb.exe 2944 liagoo.exe 2656 qezar.exe 2796 moibu.exe 2988 ziamuu.exe 1632 ndjuy.exe 2316 jaeefuv.exe 2564 tdvoik.exe 2492 yiedaat.exe 836 mauuje.exe 1756 wgxom.exe 2932 feuco.exe 960 deaavoc.exe 1140 baeeyo.exe 1036 peodi.exe 916 deocu.exe 292 qoiizur.exe 2952 teasi.exe 2416 fauuqo.exe 3060 nuqiz.exe 2852 jokiy.exe 2892 muaqev.exe 2436 daiiye.exe 1236 vplos.exe 376 yhqom.exe 996 zuapos.exe 1580 jukiz.exe 2712 xbvoil.exe 1016 qoemaar.exe 408 lauuj.exe 1816 giawoo.exe 600 vfpot.exe -
Suspicious use of SetWindowsHookEx 62 IoCs
pid Process 2124 283cc2178acb6e8ae6a33607267fb220_NeikiAnalytics.exe 2588 wuave.exe 2628 beodi.exe 2548 qoiizur.exe 2424 maoruw.exe 3000 peori.exe 1812 feodi.exe 1984 daiice.exe 1300 svpor.exe 600 feovi.exe 1816 quobaar.exe 1032 xbvoir.exe 1012 mieezup.exe 560 svreq.exe 2456 keutaan.exe 3032 jauug.exe 2892 noidu.exe 2524 saoohut.exe 2984 boidu.exe 2976 yiedaat.exe 1700 muatoo.exe 2572 xiuut.exe 2092 daeevuj.exe 2376 neoofiz.exe 596 syhim.exe 1476 cgqos.exe 1552 kearii.exe 1360 xaooy.exe 1784 syhim.exe 1012 wgxoif.exe 2964 qiyeb.exe 2944 liagoo.exe 2656 qezar.exe 2796 moibu.exe 2988 ziamuu.exe 1632 ndjuy.exe 2316 jaeefuv.exe 2564 tdvoik.exe 2492 yiedaat.exe 836 mauuje.exe 1756 wgxom.exe 2932 feuco.exe 960 deaavoc.exe 1140 baeeyo.exe 1036 peodi.exe 916 deocu.exe 292 qoiizur.exe 2952 teasi.exe 2416 fauuqo.exe 3060 nuqiz.exe 2852 jokiy.exe 2892 muaqev.exe 2436 daiiye.exe 1236 vplos.exe 376 yhqom.exe 996 zuapos.exe 1580 jukiz.exe 2712 xbvoil.exe 1016 qoemaar.exe 408 lauuj.exe 1816 giawoo.exe 600 vfpot.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2124 wrote to memory of 2588 2124 283cc2178acb6e8ae6a33607267fb220_NeikiAnalytics.exe 28 PID 2124 wrote to memory of 2588 2124 283cc2178acb6e8ae6a33607267fb220_NeikiAnalytics.exe 28 PID 2124 wrote to memory of 2588 2124 283cc2178acb6e8ae6a33607267fb220_NeikiAnalytics.exe 28 PID 2124 wrote to memory of 2588 2124 283cc2178acb6e8ae6a33607267fb220_NeikiAnalytics.exe 28 PID 2588 wrote to memory of 2628 2588 wuave.exe 29 PID 2588 wrote to memory of 2628 2588 wuave.exe 29 PID 2588 wrote to memory of 2628 2588 wuave.exe 29 PID 2588 wrote to memory of 2628 2588 wuave.exe 29 PID 2628 wrote to memory of 2548 2628 beodi.exe 30 PID 2628 wrote to memory of 2548 2628 beodi.exe 30 PID 2628 wrote to memory of 2548 2628 beodi.exe 30 PID 2628 wrote to memory of 2548 2628 beodi.exe 30 PID 2548 wrote to memory of 2424 2548 qoiizur.exe 31 PID 2548 wrote to memory of 2424 2548 qoiizur.exe 31 PID 2548 wrote to memory of 2424 2548 qoiizur.exe 31 PID 2548 wrote to memory of 2424 2548 qoiizur.exe 31 PID 2424 wrote to memory of 3000 2424 maoruw.exe 32 PID 2424 wrote to memory of 3000 2424 maoruw.exe 32 PID 2424 wrote to memory of 3000 2424 maoruw.exe 32 PID 2424 wrote to memory of 3000 2424 maoruw.exe 32 PID 3000 wrote to memory of 1812 3000 peori.exe 33 PID 3000 wrote to memory of 1812 3000 peori.exe 33 PID 3000 wrote to memory of 1812 3000 peori.exe 33 PID 3000 wrote to memory of 1812 3000 peori.exe 33 PID 1812 wrote to memory of 1984 1812 feodi.exe 34 PID 1812 wrote to memory of 1984 1812 feodi.exe 34 PID 1812 wrote to memory of 1984 1812 feodi.exe 34 PID 1812 wrote to memory of 1984 1812 feodi.exe 34 PID 1984 wrote to memory of 1300 1984 daiice.exe 35 PID 1984 wrote to memory of 1300 1984 daiice.exe 35 PID 1984 wrote to memory of 1300 1984 daiice.exe 35 PID 1984 wrote to memory of 1300 1984 daiice.exe 35 PID 1300 wrote to memory of 600 1300 svpor.exe 36 PID 1300 wrote to memory of 600 1300 svpor.exe 36 PID 1300 wrote to memory of 600 1300 svpor.exe 36 PID 1300 wrote to memory of 600 1300 svpor.exe 36 PID 600 wrote to memory of 1816 600 feovi.exe 37 PID 600 wrote to memory of 1816 600 feovi.exe 37 PID 600 wrote to memory of 1816 600 feovi.exe 37 PID 600 wrote to memory of 1816 600 feovi.exe 37 PID 1816 wrote to memory of 1032 1816 quobaar.exe 38 PID 1816 wrote to memory of 1032 1816 quobaar.exe 38 PID 1816 wrote to memory of 1032 1816 quobaar.exe 38 PID 1816 wrote to memory of 1032 1816 quobaar.exe 38 PID 1032 wrote to memory of 1012 1032 xbvoir.exe 39 PID 1032 wrote to memory of 1012 1032 xbvoir.exe 39 PID 1032 wrote to memory of 1012 1032 xbvoir.exe 39 PID 1032 wrote to memory of 1012 1032 xbvoir.exe 39 PID 1012 wrote to memory of 560 1012 mieezup.exe 40 PID 1012 wrote to memory of 560 1012 mieezup.exe 40 PID 1012 wrote to memory of 560 1012 mieezup.exe 40 PID 1012 wrote to memory of 560 1012 mieezup.exe 40 PID 560 wrote to memory of 2456 560 svreq.exe 41 PID 560 wrote to memory of 2456 560 svreq.exe 41 PID 560 wrote to memory of 2456 560 svreq.exe 41 PID 560 wrote to memory of 2456 560 svreq.exe 41 PID 2456 wrote to memory of 3032 2456 keutaan.exe 42 PID 2456 wrote to memory of 3032 2456 keutaan.exe 42 PID 2456 wrote to memory of 3032 2456 keutaan.exe 42 PID 2456 wrote to memory of 3032 2456 keutaan.exe 42 PID 3032 wrote to memory of 2892 3032 jauug.exe 43 PID 3032 wrote to memory of 2892 3032 jauug.exe 43 PID 3032 wrote to memory of 2892 3032 jauug.exe 43 PID 3032 wrote to memory of 2892 3032 jauug.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\283cc2178acb6e8ae6a33607267fb220_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\283cc2178acb6e8ae6a33607267fb220_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Users\Admin\wuave.exe"C:\Users\Admin\wuave.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Users\Admin\beodi.exe"C:\Users\Admin\beodi.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Users\Admin\qoiizur.exe"C:\Users\Admin\qoiizur.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Users\Admin\maoruw.exe"C:\Users\Admin\maoruw.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Users\Admin\peori.exe"C:\Users\Admin\peori.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Users\Admin\feodi.exe"C:\Users\Admin\feodi.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Users\Admin\daiice.exe"C:\Users\Admin\daiice.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Users\Admin\svpor.exe"C:\Users\Admin\svpor.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Users\Admin\feovi.exe"C:\Users\Admin\feovi.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:600 -
C:\Users\Admin\quobaar.exe"C:\Users\Admin\quobaar.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Users\Admin\xbvoir.exe"C:\Users\Admin\xbvoir.exe"12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Users\Admin\mieezup.exe"C:\Users\Admin\mieezup.exe"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1012 -
C:\Users\Admin\svreq.exe"C:\Users\Admin\svreq.exe"14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:560 -
C:\Users\Admin\keutaan.exe"C:\Users\Admin\keutaan.exe"15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Users\Admin\jauug.exe"C:\Users\Admin\jauug.exe"16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Users\Admin\noidu.exe"C:\Users\Admin\noidu.exe"17⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2892 -
C:\Users\Admin\saoohut.exe"C:\Users\Admin\saoohut.exe"18⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2524 -
C:\Users\Admin\boidu.exe"C:\Users\Admin\boidu.exe"19⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2984 -
C:\Users\Admin\yiedaat.exe"C:\Users\Admin\yiedaat.exe"20⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2976 -
C:\Users\Admin\muatoo.exe"C:\Users\Admin\muatoo.exe"21⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1700 -
C:\Users\Admin\xiuut.exe"C:\Users\Admin\xiuut.exe"22⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2572 -
C:\Users\Admin\daeevuj.exe"C:\Users\Admin\daeevuj.exe"23⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2092 -
C:\Users\Admin\neoofiz.exe"C:\Users\Admin\neoofiz.exe"24⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2376 -
C:\Users\Admin\syhim.exe"C:\Users\Admin\syhim.exe"25⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:596 -
C:\Users\Admin\cgqos.exe"C:\Users\Admin\cgqos.exe"26⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1476 -
C:\Users\Admin\kearii.exe"C:\Users\Admin\kearii.exe"27⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1552 -
C:\Users\Admin\xaooy.exe"C:\Users\Admin\xaooy.exe"28⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1360 -
C:\Users\Admin\syhim.exe"C:\Users\Admin\syhim.exe"29⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1784 -
C:\Users\Admin\wgxoif.exe"C:\Users\Admin\wgxoif.exe"30⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1012 -
C:\Users\Admin\qiyeb.exe"C:\Users\Admin\qiyeb.exe"31⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2964 -
C:\Users\Admin\liagoo.exe"C:\Users\Admin\liagoo.exe"32⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2944 -
C:\Users\Admin\qezar.exe"C:\Users\Admin\qezar.exe"33⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2656 -
C:\Users\Admin\moibu.exe"C:\Users\Admin\moibu.exe"34⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2796 -
C:\Users\Admin\ziamuu.exe"C:\Users\Admin\ziamuu.exe"35⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2988 -
C:\Users\Admin\ndjuy.exe"C:\Users\Admin\ndjuy.exe"36⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1632 -
C:\Users\Admin\jaeefuv.exe"C:\Users\Admin\jaeefuv.exe"37⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2316 -
C:\Users\Admin\tdvoik.exe"C:\Users\Admin\tdvoik.exe"38⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2564 -
C:\Users\Admin\yiedaat.exe"C:\Users\Admin\yiedaat.exe"39⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2492 -
C:\Users\Admin\mauuje.exe"C:\Users\Admin\mauuje.exe"40⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:836 -
C:\Users\Admin\wgxom.exe"C:\Users\Admin\wgxom.exe"41⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1756 -
C:\Users\Admin\feuco.exe"C:\Users\Admin\feuco.exe"42⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2932 -
C:\Users\Admin\deaavoc.exe"C:\Users\Admin\deaavoc.exe"43⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:960 -
C:\Users\Admin\baeeyo.exe"C:\Users\Admin\baeeyo.exe"44⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1140 -
C:\Users\Admin\peodi.exe"C:\Users\Admin\peodi.exe"45⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1036 -
C:\Users\Admin\deocu.exe"C:\Users\Admin\deocu.exe"46⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:916 -
C:\Users\Admin\qoiizur.exe"C:\Users\Admin\qoiizur.exe"47⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:292 -
C:\Users\Admin\teasi.exe"C:\Users\Admin\teasi.exe"48⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2952 -
C:\Users\Admin\fauuqo.exe"C:\Users\Admin\fauuqo.exe"49⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2416 -
C:\Users\Admin\nuqiz.exe"C:\Users\Admin\nuqiz.exe"50⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3060 -
C:\Users\Admin\jokiy.exe"C:\Users\Admin\jokiy.exe"51⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2852 -
C:\Users\Admin\muaqev.exe"C:\Users\Admin\muaqev.exe"52⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2892 -
C:\Users\Admin\daiiye.exe"C:\Users\Admin\daiiye.exe"53⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2436 -
C:\Users\Admin\vplos.exe"C:\Users\Admin\vplos.exe"54⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1236 -
C:\Users\Admin\yhqom.exe"C:\Users\Admin\yhqom.exe"55⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:376 -
C:\Users\Admin\zuapos.exe"C:\Users\Admin\zuapos.exe"56⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:996 -
C:\Users\Admin\jukiz.exe"C:\Users\Admin\jukiz.exe"57⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1580 -
C:\Users\Admin\xbvoil.exe"C:\Users\Admin\xbvoil.exe"58⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2712 -
C:\Users\Admin\qoemaar.exe"C:\Users\Admin\qoemaar.exe"59⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1016 -
C:\Users\Admin\lauuj.exe"C:\Users\Admin\lauuj.exe"60⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:408 -
C:\Users\Admin\giawoo.exe"C:\Users\Admin\giawoo.exe"61⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1816 -
C:\Users\Admin\vfpot.exe"C:\Users\Admin\vfpot.exe"62⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:600
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224KB
MD5f811170ddfd9cc7a32bacd11f92ec252
SHA194458840ae977bd7e448f81ba0a953ab8d25d093
SHA256ce03daa041c4030d92a6f9727a636a0815bc84790c3babc6b7a85dd7257675ba
SHA51271d04de79bc815b379d35635e105f1dbca16df4de67b5ca1639ec9b7cc25cd7550b9927dcab3a58a1dbc5d226f5449d857cb2492c4f2d953accb8d8872bc341b
-
Filesize
224KB
MD5b20d227e82559b4aec184613fa74409f
SHA11b5fdab69528da91f24cb6061d9fbab3f900338e
SHA256e26aca830d1c56a321015c8424586c892b8c5933ce5dc0c119c3ed5c9d72190f
SHA512be42f387f535e41da9705d7f05ad62dd26825cbecae31e2cdc96a0f37052fb1455935911b0bbfaf571e8522212a95eda91994c8d9dbf3936227b82dbe5e131ea
-
Filesize
224KB
MD50146a42d0778b9d3dfc737a748af1d83
SHA1e7a8680c8aaac38903212c4937fcf66c7aac325d
SHA25646c36f52f36522f2caada61c1b76cb5eea2e47f13de05744cc6d4c26e18761ad
SHA5125c31b65881a0afdf4fbfb32c7c96b157dcd2fa6c0a60ce9972ce3e08cfa760a62826fdb8a2fc2394b8824f688dc43acf517f159d69c8f8d4f8edf54d8eff505b
-
Filesize
224KB
MD5e896879772e827ad58bcb0bd4f55ff46
SHA17df2ade55cd8ccb3a68172e83c4832d2b7493f7b
SHA256ece922eb552680a883760f783d233c39d913e5753a1bda33c1910d3c46d45e1b
SHA5122b8e728415dfb12dae651413a5c02c20ee3ee449cff1826e02a030934f4b1d0153c2eb37f586332f334b31739be97cd8ac20716855b85e2720c3ee12ffe42229
-
Filesize
224KB
MD551107cf93be4541774a1f2db92ceb35d
SHA150f706310274fe19d02089d29a3f6afc16b33829
SHA2565e39f569fcfec894966853a73cd66d288cecf4888630b39fd1d7068f370c788f
SHA512e5e5198fb239daa0cbcfa3324b38b2b560a1273680a9a46987ca3e210de406741888fe2ef4570c1393094259d583f5ddf8fe9a506981bd2c37c529782d779f05
-
Filesize
224KB
MD5cc19151b4121010c6f0b388c5a6e0287
SHA10fc19fed627e957ebf674277ccd1168f82d6ac85
SHA256c110346f414873b08c66e831e974489fa02805e3a4c449a458632fc12eedde30
SHA512980450fc2b7be641e2c5a5f99f504c919b7553b58c8990f07976352fe380c160c8502060656cc08c602f68651389f3538673ed621f170c566d6fc5e4b1f0780f
-
Filesize
224KB
MD55e584c444e5427a0133e369200b30cff
SHA1e4069ed0339e8bf78248cd4d897e3d367fe3df05
SHA25636e68cf5782d0635d6d98ff9ab410eab32e5235a3e68d1cf1813cf854c4a7207
SHA512a4e842790a124b4383781e8c39c1a5d3d7356877c18f7235b90a7126775c199788f0485032ff059c81980adaed3b5c46cdc8f09998538f333b66df81f63b0b64
-
Filesize
224KB
MD5e865e827665b0b25140ba34d0894ce4d
SHA1ed0cdbc269579f25b1a834f957034eb84f3f8ef8
SHA25625484f6c67ef449a051cab774675bad2cb965e2d1a7202eb9cf6b62a1287c3fd
SHA512f11d85d6821ea6ead368fece7cc60c17cda2b6c96f153daef91269a87bb3ca77400c60e91872a5bb2684524fe57f953213e7fe677468357898e0e3feb6806af8
-
Filesize
224KB
MD5a7b4b36bb0f45693f9e3828b2c39c734
SHA1e1123adbbae336d23943ee559d3ed8dbd7463d20
SHA2565d59b84c786fc231851f1a697afe5535b5a549ebc7044052eef5a9d647643daf
SHA512950ce91687a4a53899b873a113ca6bd67cad5ffea1cc54bd82b4e5313497645b37c58cfb216c37836358a54a1f84dcd817365a9176e9698685f5312802474772
-
Filesize
224KB
MD58e094f59d332098d3a5724a5ade593a5
SHA1cbc107fafa0db0eab7cf4f12978c12b84d5c3a4b
SHA2566e097b7895829232fd63921e65fc1e2e5fce14ff87a652d6a8072252a48b9ef1
SHA5127dc9ec7fe0de76dbf839a2f6482289797042fb87e7e3e614fd395d955e34352e9ea5dd7dcb52ed2373971be9132727f978c5384aa95c0b85f9998db5604bc087
-
Filesize
224KB
MD59fef2d8e1198e3634bc51b89846e7112
SHA1556bc50dd889a541cc054f78b8cf243861dfdc0d
SHA256d86089c1e4188a72b5d1e96bd1b8e50eb529f5905b47e23ebb12d142cf31c63e
SHA512aba14aaf496e9d3bbd33fc43075ae636da8cf99db228522f275b18437af0febcdfa31c8d1d5bdf00a438c7448efebb8e7ec1f185023a768ae36f4f8789faf29a
-
Filesize
224KB
MD57e64b9df4587ef925680b7cfddf2190b
SHA17e0ceb46d16012a8c98625736150042984765f70
SHA256a429b6fb25c7ffdb0731a5f70cbbcc67f2ea9d0bf8d7fca5f1990c66c5d853ce
SHA512ff9840f56642180929836fb2c93c37194b2ee8ece8da9df2d0a7094dbff89491fd0bd6c0e88bcb05363936f30456209f72a68004d3c1ebede9548adb3d001004
-
Filesize
224KB
MD5b2513c4c0af5e2becbcdf87dd3384ad6
SHA15a42cf7929efc6834c0666e0618f62eb2638ae64
SHA256b7b2bc132ef0706e176fa269706a55106ee37c5355d38ec1bbab00a29237692a
SHA512a1f7c18d24a0b8eadc4b25d5ff823b6569c59f6f23366dbad6deeedc4f0dd1bbebc6f2e9efac468bb96e013cb209e9f59587160f9590fcceb102af38fce56b25
-
Filesize
224KB
MD53acdb89a21b9e1a747cfe64a852b9d29
SHA1a67ce14bc55c3e2ccd8fa1e2ed6828738161abe3
SHA2566f8d774d644a30bf47f1c123b4d33405517260867140a7f516694fb0821c6469
SHA5127ac7cb47a89f1b52543d7c422116f531d5658e764efb2898378f5e895c6ed939b382f480235c3a351a462f6c6337570071e1239e7d04c336c174061775a41d43
-
Filesize
224KB
MD5365d6848c3d2420783bb9a818d7ccba5
SHA19636db1e9705986ae0f594f7d2e4f88934ee8f4c
SHA256c1a4441c6981d867a25865e89a6d1335df8479c77444d52cad4993f6ee823265
SHA5125bdd4d9e1efe8628d550c66bfeffbd4ceca8db0c6f3e2324d8afebd95205824aa515e6a70bd997aff5f2db987938547e7dfdbe61d039d7a2609bf2410bfcdcc0
-
Filesize
224KB
MD5825d9a6bac8d648124e333b9270c4239
SHA1fd793200888edb8c49e3841f53d8d89c994e6bad
SHA25604b0816dd30f1cf128f169cf5f8dd8ae44a8b2e24da2dd55468f138c755e96f3
SHA512d2e7099e19d01d37c29e024ea456a027bdbf91be97e723f2040b5e3d423a095ef20d44c3e790e0cf0dff411b65303d8328294d09adc4488c5be0cb086b94ac13