Analysis
-
max time kernel
143s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
10/05/2024, 23:16
Static task
static1
Behavioral task
behavioral1
Sample
2855626f751843eb782fcae784f7d690_NeikiAnalytics.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2855626f751843eb782fcae784f7d690_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
2855626f751843eb782fcae784f7d690_NeikiAnalytics.exe
-
Size
232KB
-
MD5
2855626f751843eb782fcae784f7d690
-
SHA1
b0e82b9125f60df491efd33f9349c2cb2d5f37bb
-
SHA256
e33292ef19fe2543559589a82532d2725e8813b2a50a035d4c9a47753892b87a
-
SHA512
7f50d9f2c14bedee1867189cd4a7fac3c1a5933dfb2b123112442205491baed0e7486b72999aebcadcebc5b57edeb61b65cfb5a1eac5136f2d799d0c197f7c9f
-
SSDEEP
3072:G3fKaN0KlYUFhCjG8G3GbGVGBGfGuGxGWYcrf6Kadk:G3yaN0aYAAYcD6Kad
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 52 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation wuqil.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation buoop.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation nukiz.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation wuave.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation ruvem.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation puijaav.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation qainux.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation daeevuj.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation daiife.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation geabo.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation nauuye.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation feuur.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation knzeoh.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation guahiiw.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation caiilu.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation rkyeoh.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation liagoo.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation rbceoh.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation feuco.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation jiafuv.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation keugo.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation yjdoit.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation doiixab.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation wuabe.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation mehig.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation qiyed.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation ruimaax.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation hlyeq.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation 2855626f751843eb782fcae784f7d690_NeikiAnalytics.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation mauuf.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation zuoop.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation neoqi.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation wuqiz.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation zeanos.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation roaquc.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation roeluus.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation bauuyo.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation beidu.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation gofik.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation knyeom.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation vugon.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation liepuu.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation ziomuu.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation wuqim.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation neatuy.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation wuebooz.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation joezac.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation wjxoaf.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation kieho.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation weoyii.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation ncxiew.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation piafuz.exe -
Executes dropped EXE 52 IoCs
pid Process 1164 rkyeoh.exe 2572 neatuy.exe 4372 wuebooz.exe 4580 qainux.exe 1004 mauuf.exe 452 keugo.exe 1052 knyeom.exe 2244 daeevuj.exe 5812 liagoo.exe 2828 rbceoh.exe 1780 weoyii.exe 732 zuoop.exe 4072 wuqil.exe 1236 roaquc.exe 1932 daiife.exe 5716 qiyed.exe 2872 wuabe.exe 4520 ncxiew.exe 1444 joezac.exe 1628 mehig.exe 5320 wjxoaf.exe 212 yjdoit.exe 5040 geabo.exe 3440 wuqiz.exe 5508 vugon.exe 980 ruimaax.exe 4944 kieho.exe 1928 buoop.exe 3804 roeluus.exe 5160 nauuye.exe 1056 feuur.exe 5764 piafuz.exe 4692 nukiz.exe 4568 liepuu.exe 6088 knzeoh.exe 1508 wuave.exe 1856 feuco.exe 1852 ziomuu.exe 5288 wuqim.exe 676 bauuyo.exe 5092 zeanos.exe 4032 doiixab.exe 1928 jiafuv.exe 4068 beidu.exe 5536 neoqi.exe 3452 gofik.exe 3408 hlyeq.exe 1196 guahiiw.exe 444 ruvem.exe 1900 puijaav.exe 5552 caiilu.exe 876 neuuq.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2368 2855626f751843eb782fcae784f7d690_NeikiAnalytics.exe 2368 2855626f751843eb782fcae784f7d690_NeikiAnalytics.exe 1164 rkyeoh.exe 1164 rkyeoh.exe 2572 neatuy.exe 2572 neatuy.exe 4372 wuebooz.exe 4372 wuebooz.exe 4580 qainux.exe 4580 qainux.exe 1004 mauuf.exe 1004 mauuf.exe 452 keugo.exe 452 keugo.exe 1052 knyeom.exe 1052 knyeom.exe 2244 daeevuj.exe 2244 daeevuj.exe 5812 liagoo.exe 5812 liagoo.exe 2828 rbceoh.exe 2828 rbceoh.exe 1780 weoyii.exe 1780 weoyii.exe 732 zuoop.exe 732 zuoop.exe 4072 wuqil.exe 4072 wuqil.exe 1236 roaquc.exe 1236 roaquc.exe 1932 daiife.exe 1932 daiife.exe 5716 qiyed.exe 5716 qiyed.exe 2872 wuabe.exe 2872 wuabe.exe 4520 ncxiew.exe 4520 ncxiew.exe 1444 joezac.exe 1444 joezac.exe 1628 mehig.exe 1628 mehig.exe 5320 wjxoaf.exe 5320 wjxoaf.exe 212 yjdoit.exe 212 yjdoit.exe 5040 geabo.exe 5040 geabo.exe 3440 wuqiz.exe 3440 wuqiz.exe 5508 vugon.exe 5508 vugon.exe 980 ruimaax.exe 980 ruimaax.exe 4944 kieho.exe 4944 kieho.exe 1928 buoop.exe 1928 buoop.exe 3804 roeluus.exe 3804 roeluus.exe 5160 nauuye.exe 5160 nauuye.exe 1056 feuur.exe 1056 feuur.exe -
Suspicious use of SetWindowsHookEx 53 IoCs
pid Process 2368 2855626f751843eb782fcae784f7d690_NeikiAnalytics.exe 1164 rkyeoh.exe 2572 neatuy.exe 4372 wuebooz.exe 4580 qainux.exe 1004 mauuf.exe 452 keugo.exe 1052 knyeom.exe 2244 daeevuj.exe 5812 liagoo.exe 2828 rbceoh.exe 1780 weoyii.exe 732 zuoop.exe 4072 wuqil.exe 1236 roaquc.exe 1932 daiife.exe 5716 qiyed.exe 2872 wuabe.exe 4520 ncxiew.exe 1444 joezac.exe 1628 mehig.exe 5320 wjxoaf.exe 212 yjdoit.exe 5040 geabo.exe 3440 wuqiz.exe 5508 vugon.exe 980 ruimaax.exe 4944 kieho.exe 1928 buoop.exe 3804 roeluus.exe 5160 nauuye.exe 1056 feuur.exe 5764 piafuz.exe 4692 nukiz.exe 4568 liepuu.exe 6088 knzeoh.exe 1508 wuave.exe 1856 feuco.exe 1852 ziomuu.exe 5288 wuqim.exe 676 bauuyo.exe 5092 zeanos.exe 4032 doiixab.exe 1928 jiafuv.exe 4068 beidu.exe 5536 neoqi.exe 3452 gofik.exe 3408 hlyeq.exe 1196 guahiiw.exe 444 ruvem.exe 1900 puijaav.exe 5552 caiilu.exe 876 neuuq.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2368 wrote to memory of 1164 2368 2855626f751843eb782fcae784f7d690_NeikiAnalytics.exe 87 PID 2368 wrote to memory of 1164 2368 2855626f751843eb782fcae784f7d690_NeikiAnalytics.exe 87 PID 2368 wrote to memory of 1164 2368 2855626f751843eb782fcae784f7d690_NeikiAnalytics.exe 87 PID 1164 wrote to memory of 2572 1164 rkyeoh.exe 92 PID 1164 wrote to memory of 2572 1164 rkyeoh.exe 92 PID 1164 wrote to memory of 2572 1164 rkyeoh.exe 92 PID 2572 wrote to memory of 4372 2572 neatuy.exe 94 PID 2572 wrote to memory of 4372 2572 neatuy.exe 94 PID 2572 wrote to memory of 4372 2572 neatuy.exe 94 PID 4372 wrote to memory of 4580 4372 wuebooz.exe 97 PID 4372 wrote to memory of 4580 4372 wuebooz.exe 97 PID 4372 wrote to memory of 4580 4372 wuebooz.exe 97 PID 4580 wrote to memory of 1004 4580 qainux.exe 98 PID 4580 wrote to memory of 1004 4580 qainux.exe 98 PID 4580 wrote to memory of 1004 4580 qainux.exe 98 PID 1004 wrote to memory of 452 1004 mauuf.exe 99 PID 1004 wrote to memory of 452 1004 mauuf.exe 99 PID 1004 wrote to memory of 452 1004 mauuf.exe 99 PID 452 wrote to memory of 1052 452 keugo.exe 100 PID 452 wrote to memory of 1052 452 keugo.exe 100 PID 452 wrote to memory of 1052 452 keugo.exe 100 PID 1052 wrote to memory of 2244 1052 knyeom.exe 101 PID 1052 wrote to memory of 2244 1052 knyeom.exe 101 PID 1052 wrote to memory of 2244 1052 knyeom.exe 101 PID 2244 wrote to memory of 5812 2244 daeevuj.exe 102 PID 2244 wrote to memory of 5812 2244 daeevuj.exe 102 PID 2244 wrote to memory of 5812 2244 daeevuj.exe 102 PID 5812 wrote to memory of 2828 5812 liagoo.exe 103 PID 5812 wrote to memory of 2828 5812 liagoo.exe 103 PID 5812 wrote to memory of 2828 5812 liagoo.exe 103 PID 2828 wrote to memory of 1780 2828 rbceoh.exe 105 PID 2828 wrote to memory of 1780 2828 rbceoh.exe 105 PID 2828 wrote to memory of 1780 2828 rbceoh.exe 105 PID 1780 wrote to memory of 732 1780 weoyii.exe 107 PID 1780 wrote to memory of 732 1780 weoyii.exe 107 PID 1780 wrote to memory of 732 1780 weoyii.exe 107 PID 732 wrote to memory of 4072 732 zuoop.exe 108 PID 732 wrote to memory of 4072 732 zuoop.exe 108 PID 732 wrote to memory of 4072 732 zuoop.exe 108 PID 4072 wrote to memory of 1236 4072 wuqil.exe 109 PID 4072 wrote to memory of 1236 4072 wuqil.exe 109 PID 4072 wrote to memory of 1236 4072 wuqil.exe 109 PID 1236 wrote to memory of 1932 1236 roaquc.exe 110 PID 1236 wrote to memory of 1932 1236 roaquc.exe 110 PID 1236 wrote to memory of 1932 1236 roaquc.exe 110 PID 1932 wrote to memory of 5716 1932 daiife.exe 111 PID 1932 wrote to memory of 5716 1932 daiife.exe 111 PID 1932 wrote to memory of 5716 1932 daiife.exe 111 PID 5716 wrote to memory of 2872 5716 qiyed.exe 112 PID 5716 wrote to memory of 2872 5716 qiyed.exe 112 PID 5716 wrote to memory of 2872 5716 qiyed.exe 112 PID 2872 wrote to memory of 4520 2872 wuabe.exe 113 PID 2872 wrote to memory of 4520 2872 wuabe.exe 113 PID 2872 wrote to memory of 4520 2872 wuabe.exe 113 PID 4520 wrote to memory of 1444 4520 ncxiew.exe 114 PID 4520 wrote to memory of 1444 4520 ncxiew.exe 114 PID 4520 wrote to memory of 1444 4520 ncxiew.exe 114 PID 1444 wrote to memory of 1628 1444 joezac.exe 115 PID 1444 wrote to memory of 1628 1444 joezac.exe 115 PID 1444 wrote to memory of 1628 1444 joezac.exe 115 PID 1628 wrote to memory of 5320 1628 mehig.exe 116 PID 1628 wrote to memory of 5320 1628 mehig.exe 116 PID 1628 wrote to memory of 5320 1628 mehig.exe 116 PID 5320 wrote to memory of 212 5320 wjxoaf.exe 117
Processes
-
C:\Users\Admin\AppData\Local\Temp\2855626f751843eb782fcae784f7d690_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\2855626f751843eb782fcae784f7d690_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Users\Admin\rkyeoh.exe"C:\Users\Admin\rkyeoh.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\Users\Admin\neatuy.exe"C:\Users\Admin\neatuy.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Users\Admin\wuebooz.exe"C:\Users\Admin\wuebooz.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4372 -
C:\Users\Admin\qainux.exe"C:\Users\Admin\qainux.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4580 -
C:\Users\Admin\mauuf.exe"C:\Users\Admin\mauuf.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1004 -
C:\Users\Admin\keugo.exe"C:\Users\Admin\keugo.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:452 -
C:\Users\Admin\knyeom.exe"C:\Users\Admin\knyeom.exe"8⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Users\Admin\daeevuj.exe"C:\Users\Admin\daeevuj.exe"9⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Users\Admin\liagoo.exe"C:\Users\Admin\liagoo.exe"10⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5812 -
C:\Users\Admin\rbceoh.exe"C:\Users\Admin\rbceoh.exe"11⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Users\Admin\weoyii.exe"C:\Users\Admin\weoyii.exe"12⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Users\Admin\zuoop.exe"C:\Users\Admin\zuoop.exe"13⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:732 -
C:\Users\Admin\wuqil.exe"C:\Users\Admin\wuqil.exe"14⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4072 -
C:\Users\Admin\roaquc.exe"C:\Users\Admin\roaquc.exe"15⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Users\Admin\daiife.exe"C:\Users\Admin\daiife.exe"16⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Users\Admin\qiyed.exe"C:\Users\Admin\qiyed.exe"17⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5716 -
C:\Users\Admin\wuabe.exe"C:\Users\Admin\wuabe.exe"18⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Users\Admin\ncxiew.exe"C:\Users\Admin\ncxiew.exe"19⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4520 -
C:\Users\Admin\joezac.exe"C:\Users\Admin\joezac.exe"20⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Users\Admin\mehig.exe"C:\Users\Admin\mehig.exe"21⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Users\Admin\wjxoaf.exe"C:\Users\Admin\wjxoaf.exe"22⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5320 -
C:\Users\Admin\yjdoit.exe"C:\Users\Admin\yjdoit.exe"23⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:212 -
C:\Users\Admin\geabo.exe"C:\Users\Admin\geabo.exe"24⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5040 -
C:\Users\Admin\wuqiz.exe"C:\Users\Admin\wuqiz.exe"25⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3440 -
C:\Users\Admin\vugon.exe"C:\Users\Admin\vugon.exe"26⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5508 -
C:\Users\Admin\ruimaax.exe"C:\Users\Admin\ruimaax.exe"27⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:980 -
C:\Users\Admin\kieho.exe"C:\Users\Admin\kieho.exe"28⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4944 -
C:\Users\Admin\buoop.exe"C:\Users\Admin\buoop.exe"29⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1928 -
C:\Users\Admin\roeluus.exe"C:\Users\Admin\roeluus.exe"30⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3804 -
C:\Users\Admin\nauuye.exe"C:\Users\Admin\nauuye.exe"31⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5160 -
C:\Users\Admin\feuur.exe"C:\Users\Admin\feuur.exe"32⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1056 -
C:\Users\Admin\piafuz.exe"C:\Users\Admin\piafuz.exe"33⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5764 -
C:\Users\Admin\nukiz.exe"C:\Users\Admin\nukiz.exe"34⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4692 -
C:\Users\Admin\liepuu.exe"C:\Users\Admin\liepuu.exe"35⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4568 -
C:\Users\Admin\knzeoh.exe"C:\Users\Admin\knzeoh.exe"36⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:6088 -
C:\Users\Admin\wuave.exe"C:\Users\Admin\wuave.exe"37⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1508 -
C:\Users\Admin\feuco.exe"C:\Users\Admin\feuco.exe"38⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1856 -
C:\Users\Admin\ziomuu.exe"C:\Users\Admin\ziomuu.exe"39⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1852 -
C:\Users\Admin\wuqim.exe"C:\Users\Admin\wuqim.exe"40⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5288 -
C:\Users\Admin\bauuyo.exe"C:\Users\Admin\bauuyo.exe"41⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:676 -
C:\Users\Admin\zeanos.exe"C:\Users\Admin\zeanos.exe"42⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5092 -
C:\Users\Admin\doiixab.exe"C:\Users\Admin\doiixab.exe"43⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4032 -
C:\Users\Admin\jiafuv.exe"C:\Users\Admin\jiafuv.exe"44⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1928 -
C:\Users\Admin\beidu.exe"C:\Users\Admin\beidu.exe"45⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4068 -
C:\Users\Admin\neoqi.exe"C:\Users\Admin\neoqi.exe"46⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5536 -
C:\Users\Admin\gofik.exe"C:\Users\Admin\gofik.exe"47⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3452 -
C:\Users\Admin\hlyeq.exe"C:\Users\Admin\hlyeq.exe"48⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3408 -
C:\Users\Admin\guahiiw.exe"C:\Users\Admin\guahiiw.exe"49⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1196 -
C:\Users\Admin\ruvem.exe"C:\Users\Admin\ruvem.exe"50⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:444 -
C:\Users\Admin\puijaav.exe"C:\Users\Admin\puijaav.exe"51⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1900 -
C:\Users\Admin\caiilu.exe"C:\Users\Admin\caiilu.exe"52⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5552 -
C:\Users\Admin\neuuq.exe"C:\Users\Admin\neuuq.exe"53⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:876 -
C:\Users\Admin\wueboal.exe"C:\Users\Admin\wueboal.exe"54⤵PID:748
-
C:\Users\Admin\seuco.exe"C:\Users\Admin\seuco.exe"55⤵PID:1508
-
C:\Users\Admin\roiihus.exe"C:\Users\Admin\roiihus.exe"56⤵PID:512
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
232KB
MD5778763639c82753b359bd45052a0d358
SHA13e353b39285c98cb6ddc9d7b7bb8ef547e83aa4e
SHA2562615f3e1a302f769c22a68a3d17be0e250da3575a7cc4188c841ff324e22a2da
SHA5126324f34ca8cff14f3e0c5cc68b44d2edba30ef0243d18bfb8b02514e89e6bef240944b78e5ea14595ac9010d62eec7f651ee7de6399a1c417b4c97f104159ce7
-
Filesize
232KB
MD57799cdc77b63017da2bcd0e4db9c590f
SHA1c5732dee1b03fee21dd0fe2f72e4f6034f34cc25
SHA2566a078e43fe204bcf3e278f38b01d371144aed094da399ddf7975c168d7227abe
SHA512217938cecc3b2f88dd21fe7c9bb0302a00471e174d678d4174895bbfb912a726a9b8fd4e01090fad9061121152d14c9ad9ec625878541164bae02a9ffbe58a10
-
Filesize
232KB
MD5e165fbbe6625316e8d5a7adb2df6ada4
SHA1cd6db06b853d49b7d7b7c9c57afbf3d323dc3170
SHA25683d754e383ffe26456d2eda5a40d15b04cef431964ea141eab26ea9b230f10ea
SHA5128764b99e0f9bb83fd16e73e223f0f5fd82b29787bae2ebe4cd358ca40860f3206d6629b401cffa52015c2b54b9c215a46892c4a0d5c9266674c3b67ee1b3bb83
-
Filesize
232KB
MD5526de184b94c20ea5eaff7e7ec26b982
SHA1f87246f1f67f1e540d74c86e369eb9fe3c6fc2d8
SHA256510697029bb9ad251e211b2f734172daafdcb118452ea571cf8888d60e94acad
SHA512fc0af3f26208881408bf0129582badb0f5aa038319725fced3d7010896048e46606725193f52aa96d125ffc8baf311781545466d4ff33359b4cf829df235e233
-
Filesize
232KB
MD599b306874faa1bcc52c65472ee37d3a9
SHA18437eeb78b30ae91df08d3927f979874359c2710
SHA256b7baa0f1fd0a727027b92c47f60014677465aecd77fe126deddba6256851cd3c
SHA5121d8e05642eb8db84055ed16776314d515d8f08ec9e0ba9475733d0013dffd58ce65afeb81f0fda117d357730a5b903fb41628c68e91bbfe07cecd8fefd56e397
-
Filesize
232KB
MD55b53b4e29c675cdb660e7242cb022f7e
SHA13dc9a519733e3833da32f37c5205aac3d3eef333
SHA256d65b5534fa9094d2a1de42712e3a10849ed88888846f152c16fbf3b99ac37f0f
SHA512431b111c0aa9e1a33fdc91446e10eff161a7a75148cbd25b2e6b7dbd4f2b7a3a08987185f98eaa71ff1fa2174689873889044f539022f5e754477f053b2dbc73
-
Filesize
232KB
MD58fa1013ece2b6723e3fa6fe5a17fda64
SHA1d90ab5ace59510e7cb4217e2126fa89e4fadeda9
SHA256c87bf83626d9024bae0afe493c14061b6d79cfd5524d3225ec9395ef48b4b2f8
SHA512f1428b0b30212c2d875c70f6b9653a2f59f8fa748cdc3a22a0e4523117c33f825c3e9dec91f896316934e33ca33267d66235d6591e07e459dedd4da52cfb41d4
-
Filesize
232KB
MD5e6f9bafaaa0a40ad000d1d827bc9383f
SHA18fd95b8841bf2b940e92f6c7b05d559f1c2c84a1
SHA256797f07bac01e842661fc9f2542a59e00f67edf020533586784c9bc6ec71f17a5
SHA512ffa52a40cf6d2276ea167b0c9c754141ab6705d9e5ce5f95b6b953691e39ec053e3626a7f9e6ae085ba931f4ae89af40d13d5dcc8e23adfc36e728d4d8d1a844
-
Filesize
232KB
MD56d9bc76bf7d7f602b7081597435b06bc
SHA1b3d6b24cfc6c4f1a53ac78cda392eec9ddaace86
SHA25652c915d47be81cbb2977f59084992d20225dd029fd464b3df2bd3200f453f580
SHA51215d743e1861b2270b9212b0ea3e7bf6def285a42cb437b24b833eb448370701e4ba47f1ab5eed344f8a78afbf5678ebc3cc7dd3e5a64ddf7b34ff8c90ec9bd06
-
Filesize
232KB
MD54114466c03a02ac12c4bcb04a730a10d
SHA1a9ca2547acdc70a97f04598c8c05185c337a6385
SHA25676e7081b37155645f70b6e123e3084a00e2a961354db92401d775b8a73d5ff42
SHA51287142e4dfcb51ece28e0bd6b258e47a1a21c74ec2c4d69170e963de14c4ce44ce368fb33cc6c23dae8d8dee18a556eb87a71cd5b8c9a97767b831f38af37f457
-
Filesize
232KB
MD53dbbcf766f981a7b3010f41dbbeb042e
SHA1f17c9d48f48c9679205d3b2c9df67ee32dedcdbc
SHA2564fa763b1b89b8d12f83ada2332264fe3a06aada89d52d649ca254cb48fd4420b
SHA5125d2a8107e2c39a90aad8ecf87b66f093d428b5249f4a10478c12e6df54f7d794627a2de26aeafe478aee1ebd84cfc497f17f3548e2c6dba12aa27cdd1cc005e3
-
Filesize
232KB
MD588d9e0259487c1b640e3a41319f4bc5d
SHA1a38a8c9a24b103a5a30ce10b744beb8ff638297b
SHA256b009da5b41a3cc5e632e289deb5cf904b40bc195a75f001d77ad11c1e7528a42
SHA51209c6bae502623a73589e945b47db00546e9abce0e44f54456208b8f264a5cb0481b76916a66faa5b44fcce8fa6e5b8c1ec799b7bc2b0f3afbab0c34da96921be
-
Filesize
232KB
MD58b60441aa7f6898d5cd56e4596d003a3
SHA14b640bde53523cb7b7663b26a3dd70976dc37154
SHA25685d6f3bd8a4b6a5d77e880e922a523fc299c296b4497f0de90d0a209ac624ec2
SHA51243e286d7ea86076735ba9f21e6052092507638561dfc938c7a51c88bd8b1b5749bec917748de82b7ed76b64033ad43a3c395580e129ae9fc33f5e8c42e785a43
-
Filesize
232KB
MD540d45a8dd2c917bb1d8353dd9da856cf
SHA137c88776ab5d91f83e6101faf8f5ebbb0bcfdd87
SHA25618576a39e1615a26d7eeedeccb3e1660a44b78b50827ed0f1cdca2d6798ba901
SHA51231cadd153e2efea54f2c05cffb6010075c36209e268ada877cf3da9c8e7cf750ee03ad64fc922e1b19b5b3ca9580c1826abbbbcb5009f7ed7fd1a1b670f457a6
-
Filesize
232KB
MD5c7d26fd7c8056b74a7a8ad57dfcd7bb3
SHA15d2e1dcf007813db3b28279b062ec831d8a4908b
SHA256402f1c844393b22e0e49a1617867d9ad82741b33ea793f64e4bd65b87c95b77c
SHA5127ebd8048816118781434d6b5008262bd3cb201884f53897c0fb5a88440f4df0f7aa161ef8ae7543042d93d9a29e16f99b0ec55079424f96789125d411e9e3cd8
-
Filesize
232KB
MD58173591691a0d89f7c420c93cd720d92
SHA1f0c9424a4cba0ab15fef91b187457a04be1cc157
SHA2569785ddd2fc56db16c7570885b22321506c5267a1b011c8427351073f499ae15c
SHA512bad91f41590dd565620db7617b87a518a57c2c4dddb3ea0afac7549eea909f0b379219790de70565b22bc88ef14da1a88dd419166427d236e6adf283f5b33c41
-
Filesize
232KB
MD5474214d75ab1dddaf2535347ced19cc5
SHA1fcd08baacfabdfdd15b51c1350a042e20cff38b6
SHA2560a6baba6dd04a91ef33bb579c9a9313ba6bf810ed9744e309d8e35c22623a96e
SHA512aa89d2fe291eb33552103abea313d1e87f31f0c47b631031462a565f6b84d443ea56c614f186766e0a1ae9215f8bfd03c032c3c8d04e651b3b3b0afbf5aed1ad
-
Filesize
232KB
MD5162b77ea93ca7e0c40262af604be7b36
SHA1f0b6a8cb5d18e31a178e30beb0caa9ca5afc06fc
SHA2566c00b0c4db77b93ae6bae4f6059edb9fd30d322523ebb336374180bf7339b1b6
SHA5128019487be341ac97eda039681a29adaf43234a823581c2e5ac4de742dbc85acbb7b9d0551d4ad7832317e82d34e9033b4c9c252ea54521b35ae48863d4787de8
-
Filesize
232KB
MD54ed6a921c7bf635744a775e79d1c79a5
SHA1d57792269c718800a94326c7371390ac9b9bf234
SHA256a63585be306fc5447a2ae1abecca2162e98c1804e2ba896875db1d00c4221060
SHA512305fb66ae167c791a1e8317b9a282d545e83876bc4b08d4a7569817db42582aabcc92c9d49308fc26fb69783c6c15ccab635c1268c8b90ff5692dade0d739c61
-
Filesize
232KB
MD5163df0a0e5d77ab6ccf7e74c3df0a102
SHA1d25b133e94a0ffc80b10583c946320852839a8ff
SHA2563d69328557c6730a3922e5153bd283c7f84856fb25b5ea39424f7016e35b5c5c
SHA51280e42516d322f85b3ec1e52431a726f8bab763c8d2aaa0f63784c414b82804158c311ced9e1a20607f5b0c1fcfaf9f597cb26553da2336772740fd08a1b189bf
-
Filesize
232KB
MD5551479cf71485683c41b64c8185abd7f
SHA162719e95ff2f53480e21aee65218c044c68f2463
SHA2562c7df067273607aaf6fd7357f566bb593062c505965b9d065b12c241208fb823
SHA512f38e96ea4830a9544aee7ab66215c91a466234308f3e51d3542bde96e24b489c6e75837e16c2434ef8cf82d2e90af6c60770137a63977b69043bb6d3f69cddc8
-
Filesize
232KB
MD545b646eba5f639e8dcb4033a4bd02641
SHA1b08a94f75b1211b77b0f86396c9e7a41df6e57d6
SHA256b84616c9a036ee7414d61f81e57cb03c224c24b1132746c6e12bea54f2e4a6b3
SHA512bb612425b769776a1dfd535e3d31443371664d22dd2868eabefe6e94d93a882b9d936cd1154be31e4086f5db474502f4c0c0015cda34f22fb500af3ca17570f5
-
Filesize
232KB
MD56ac5f59e214735759bde4f7635ffda22
SHA123826842167f76f4670ea8bf2d7fd098d79a9100
SHA256d63206db4b9db368551c73cd831a4fb72131b8f10b25e77a0addea7dbc51deca
SHA5128821390da73df344c58ab2ec97e8e2b0ee90281c25a54627a656af6057cbb4d7901a5cb3a2a46ee3a3ba11b46327622af48694253e7c23a7797f2e8ad92c43d0
-
Filesize
232KB
MD5f6905c12977a530b1a994e450357aeeb
SHA1be9a33df1fbc267d64addee1d4f5aeb62629e4df
SHA256ded41d4ea769a36b8eee26ec179410e9a1fdadd60f96af28b7cefd008590a459
SHA512fee96ec91ce6346fc592eabf5ef938e1ab34364932abcdbd38a877d8263abacecd90bbbbc2d33676dee056761fe2f10092226dddca8bb605bd2a580c6082e49f
-
Filesize
232KB
MD593eeebd48a74a5095d0fbe7aec00531c
SHA16824f949869c6b141f4d970838a8485ced84beb8
SHA256fa5d7eb81bee9766e57364d02535239df534563f3200d7ff520aee9e4f6625f2
SHA5123d27680d8e54aeeb99ae2ff514a506bc3afeb0714b974d62589b26db83f8e1dc79d5ab45af920a3484cd34b71748d296765226104fb9b9f1c73418acaebbbf1b
-
Filesize
232KB
MD509cda485b2f1b7f2911f64cccf509cc2
SHA1cfb79c5fff834791aa1af44b6f11e6400d952201
SHA256e1347011ad3a0fde62366e663c6bc59a91159591cbd535046bd09967477cac63
SHA51223cbfdde53bc5fec247784d3bc239e1fa0f54127f3a693ea1dd3ab84e418094c88531731501620ea41b8ea53b3a761d8bca2bfdbad2a1661acfdbf5bd49a9a7d
-
Filesize
232KB
MD5050e2c3fcb1212aae3225456e40d9e33
SHA1c0347efeb699501e71e012baa2acf3f441b07607
SHA2561ce4160f770bec414ad20d6eb9bf22ad86b22707ca7442f3de8ded2e4eca780e
SHA51273fa18f6c892139d466120be86013f539b97f157cbfd88a72ff522be32c2820eea5ec08c2b5825a76bdcbb50db0fa157a24edbe336156a800fdc1a4ebaad8d56
-
Filesize
232KB
MD57d1ce1af050284f37d1433294690e9da
SHA1a0dff1320c97d378617052cfa774e98a2d5f3fd8
SHA25629a51a55d721fa889374e2866d4b7ab85e74c13703b622deeb444c3e7158fa38
SHA512ad82b96a8741040ad1594c9bcaf4d079831e168283128bea3ec1243684131dbc27718eef7d17c58e01c761a4aecdcda6e7bb6f433c48a663e08d872717f129f7
-
Filesize
232KB
MD5c9279e40fdd0575aab0d8ff242b19cd4
SHA1a557a2127b1ffe3930677c944953b10b9fb160e7
SHA256bdb6f26c21f0863ec3fb79a3b31f73100d2c9e495353d045ea74ccccaac11306
SHA512b318c00cf886c454ccc41129b6567f437c38c7dd73421c85639990f88520020d7c901f219dfa21d8299b844830b60d544a3842b99bc88b1880aab86f6bb44c41
-
Filesize
232KB
MD5ef7ab9a65706a5eea20e1694e4ef3034
SHA1f88affb023ff5a10534f06687ba19f72f5531a42
SHA2566639d7025f88396515f00a86544aafaa1f1cd9141f7424040828bbfd69eec60c
SHA512353eeae29352de1c7db52041cb227f8b10d9beb3ef2286c9c705bbdc3c624b11c947b3141a6490fc2f6d947abe0020803c4f9f9cda49a48e48cd536481b26807
-
Filesize
232KB
MD5477d1edd4622c10dd62aed07a947caf5
SHA19700e806eab2e9c08600523ee37014e4a4942f05
SHA256770440aabfd89201b333ae224c7a74a2b461538c546b305369483b9dfe723813
SHA51288b134255730e1af68746d9649b38de069f727d207a727c6d65fc7196fbb07303f136bbee00cc827c674ca080d53290ceb3fa0486a6cc34b02204351adbd4cd1
-
Filesize
232KB
MD5ba6750e867931bbbbfec364d13f1706b
SHA179ab910bcbd90ce8c8e861d71dc94e9b024b7865
SHA2569c5a54ca2cb17ed9a6625267547ff8527f537bb8ab3ab8770512a9bbd79bd3c0
SHA512eb9ccab6c6450b277203cb5e5afc28d2ef514deda62442d55c690c2e7c10589d103f1c31903808be758f00cc0fd044800f3924f0d890707c61ae5bb33a7500b5