Analysis
-
max time kernel
151s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11-05-2024 05:49
Static task
static1
Behavioral task
behavioral1
Sample
8c624074b0191e4f7ace8a4783bec710_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8c624074b0191e4f7ace8a4783bec710_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
General
-
Target
8c624074b0191e4f7ace8a4783bec710_NeikiAnalytics.exe
-
Size
224KB
-
MD5
8c624074b0191e4f7ace8a4783bec710
-
SHA1
ad038aa8294a37eca357c274edd441568fd9b60d
-
SHA256
5a48ad3b8c2158d82b285db5daff56bf367cd72b9e09f91ebb9e1d5c717c416d
-
SHA512
676bc6db5ed85351ec78ae27b97366f0f0997f86b64ef32e856c5c4a5ee9958d0ceea2dd91e7def5d83c73a0f535a4c6b65e0dc9669d30633cee087a993dd3f2
-
SSDEEP
3072:GDRKhgB6FhCjG8G3GbGVGBGfGuGxGWYcrf6Kadk:GDghgOAYcD6Kad
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 37 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation gbsoik.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation ziebu.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation baeuxo.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation yjqof.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation hqjag.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation kcpuex.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation ctqul.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation chqul.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation fcpuem.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation nuqib.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation wspex.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation whxon.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 8c624074b0191e4f7ace8a4783bec710_NeikiAnalytics.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation nauup.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation yaooz.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation miayuu.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation qiepaa.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation roexaf.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation qeifuuw.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation hoiiw.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation xeado.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation taeex.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation reuco.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation gauup.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation guahiiw.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation qaiicu.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation louuv.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation foimuug.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation liuuv.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation huood.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation hqjeg.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation noamee.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation nauufe.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation gaobe.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation kwqid.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation beuunog.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation tuvob.exe -
Executes dropped EXE 37 IoCs
pid Process 4128 reuco.exe 4200 gauup.exe 2832 liuuv.exe 2732 gbsoik.exe 3292 huood.exe 2548 guahiiw.exe 1628 kwqid.exe 2936 hqjeg.exe 2556 qeifuuw.exe 4632 hoiiw.exe 1900 kcpuex.exe 3516 xeado.exe 1612 qaiicu.exe 2732 beuunog.exe 4516 nauup.exe 456 yaooz.exe 4616 chqul.exe 4284 louuv.exe 1656 ziebu.exe 3284 fcpuem.exe 4684 nuqib.exe 2460 foimuug.exe 3676 miayuu.exe 4948 taeex.exe 3816 baeuxo.exe 2016 ctqul.exe 4900 noamee.exe 3684 qiepaa.exe 5052 nauufe.exe 3292 yjqof.exe 2248 hqjag.exe 2644 wspex.exe 2364 roexaf.exe 3012 tuvob.exe 3044 gaobe.exe 3848 whxon.exe 4828 taiiw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1800 8c624074b0191e4f7ace8a4783bec710_NeikiAnalytics.exe 1800 8c624074b0191e4f7ace8a4783bec710_NeikiAnalytics.exe 4128 reuco.exe 4128 reuco.exe 4200 gauup.exe 4200 gauup.exe 2832 liuuv.exe 2832 liuuv.exe 2732 gbsoik.exe 2732 gbsoik.exe 3292 huood.exe 3292 huood.exe 2548 guahiiw.exe 2548 guahiiw.exe 1628 kwqid.exe 1628 kwqid.exe 2936 hqjeg.exe 2936 hqjeg.exe 2556 qeifuuw.exe 2556 qeifuuw.exe 4632 hoiiw.exe 4632 hoiiw.exe 1900 kcpuex.exe 1900 kcpuex.exe 3516 xeado.exe 3516 xeado.exe 1612 qaiicu.exe 1612 qaiicu.exe 2732 beuunog.exe 2732 beuunog.exe 4516 nauup.exe 4516 nauup.exe 456 yaooz.exe 456 yaooz.exe 4616 chqul.exe 4616 chqul.exe 4284 louuv.exe 4284 louuv.exe 1656 ziebu.exe 1656 ziebu.exe 3284 fcpuem.exe 3284 fcpuem.exe 4684 nuqib.exe 4684 nuqib.exe 2460 foimuug.exe 2460 foimuug.exe 3676 miayuu.exe 3676 miayuu.exe 4948 taeex.exe 4948 taeex.exe 3816 baeuxo.exe 3816 baeuxo.exe 2016 ctqul.exe 2016 ctqul.exe 4900 noamee.exe 4900 noamee.exe 3684 qiepaa.exe 3684 qiepaa.exe 5052 nauufe.exe 5052 nauufe.exe 3292 yjqof.exe 3292 yjqof.exe 2248 hqjag.exe 2248 hqjag.exe -
Suspicious use of SetWindowsHookEx 38 IoCs
pid Process 1800 8c624074b0191e4f7ace8a4783bec710_NeikiAnalytics.exe 4128 reuco.exe 4200 gauup.exe 2832 liuuv.exe 2732 gbsoik.exe 3292 huood.exe 2548 guahiiw.exe 1628 kwqid.exe 2936 hqjeg.exe 2556 qeifuuw.exe 4632 hoiiw.exe 1900 kcpuex.exe 3516 xeado.exe 1612 qaiicu.exe 2732 beuunog.exe 4516 nauup.exe 456 yaooz.exe 4616 chqul.exe 4284 louuv.exe 1656 ziebu.exe 3284 fcpuem.exe 4684 nuqib.exe 2460 foimuug.exe 3676 miayuu.exe 4948 taeex.exe 3816 baeuxo.exe 2016 ctqul.exe 4900 noamee.exe 3684 qiepaa.exe 5052 nauufe.exe 3292 yjqof.exe 2248 hqjag.exe 2644 wspex.exe 2364 roexaf.exe 3012 tuvob.exe 3044 gaobe.exe 3848 whxon.exe 4828 taiiw.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1800 wrote to memory of 4128 1800 8c624074b0191e4f7ace8a4783bec710_NeikiAnalytics.exe 90 PID 1800 wrote to memory of 4128 1800 8c624074b0191e4f7ace8a4783bec710_NeikiAnalytics.exe 90 PID 1800 wrote to memory of 4128 1800 8c624074b0191e4f7ace8a4783bec710_NeikiAnalytics.exe 90 PID 4128 wrote to memory of 4200 4128 reuco.exe 91 PID 4128 wrote to memory of 4200 4128 reuco.exe 91 PID 4128 wrote to memory of 4200 4128 reuco.exe 91 PID 4200 wrote to memory of 2832 4200 gauup.exe 94 PID 4200 wrote to memory of 2832 4200 gauup.exe 94 PID 4200 wrote to memory of 2832 4200 gauup.exe 94 PID 2832 wrote to memory of 2732 2832 liuuv.exe 97 PID 2832 wrote to memory of 2732 2832 liuuv.exe 97 PID 2832 wrote to memory of 2732 2832 liuuv.exe 97 PID 2732 wrote to memory of 3292 2732 gbsoik.exe 99 PID 2732 wrote to memory of 3292 2732 gbsoik.exe 99 PID 2732 wrote to memory of 3292 2732 gbsoik.exe 99 PID 3292 wrote to memory of 2548 3292 huood.exe 103 PID 3292 wrote to memory of 2548 3292 huood.exe 103 PID 3292 wrote to memory of 2548 3292 huood.exe 103 PID 2548 wrote to memory of 1628 2548 guahiiw.exe 104 PID 2548 wrote to memory of 1628 2548 guahiiw.exe 104 PID 2548 wrote to memory of 1628 2548 guahiiw.exe 104 PID 1628 wrote to memory of 2936 1628 kwqid.exe 105 PID 1628 wrote to memory of 2936 1628 kwqid.exe 105 PID 1628 wrote to memory of 2936 1628 kwqid.exe 105 PID 2936 wrote to memory of 2556 2936 hqjeg.exe 106 PID 2936 wrote to memory of 2556 2936 hqjeg.exe 106 PID 2936 wrote to memory of 2556 2936 hqjeg.exe 106 PID 2556 wrote to memory of 4632 2556 qeifuuw.exe 107 PID 2556 wrote to memory of 4632 2556 qeifuuw.exe 107 PID 2556 wrote to memory of 4632 2556 qeifuuw.exe 107 PID 4632 wrote to memory of 1900 4632 hoiiw.exe 109 PID 4632 wrote to memory of 1900 4632 hoiiw.exe 109 PID 4632 wrote to memory of 1900 4632 hoiiw.exe 109 PID 1900 wrote to memory of 3516 1900 kcpuex.exe 110 PID 1900 wrote to memory of 3516 1900 kcpuex.exe 110 PID 1900 wrote to memory of 3516 1900 kcpuex.exe 110 PID 3516 wrote to memory of 1612 3516 xeado.exe 111 PID 3516 wrote to memory of 1612 3516 xeado.exe 111 PID 3516 wrote to memory of 1612 3516 xeado.exe 111 PID 1612 wrote to memory of 2732 1612 qaiicu.exe 112 PID 1612 wrote to memory of 2732 1612 qaiicu.exe 112 PID 1612 wrote to memory of 2732 1612 qaiicu.exe 112 PID 2732 wrote to memory of 4516 2732 beuunog.exe 113 PID 2732 wrote to memory of 4516 2732 beuunog.exe 113 PID 2732 wrote to memory of 4516 2732 beuunog.exe 113 PID 4516 wrote to memory of 456 4516 nauup.exe 114 PID 4516 wrote to memory of 456 4516 nauup.exe 114 PID 4516 wrote to memory of 456 4516 nauup.exe 114 PID 456 wrote to memory of 4616 456 yaooz.exe 115 PID 456 wrote to memory of 4616 456 yaooz.exe 115 PID 456 wrote to memory of 4616 456 yaooz.exe 115 PID 4616 wrote to memory of 4284 4616 chqul.exe 116 PID 4616 wrote to memory of 4284 4616 chqul.exe 116 PID 4616 wrote to memory of 4284 4616 chqul.exe 116 PID 4284 wrote to memory of 1656 4284 louuv.exe 117 PID 4284 wrote to memory of 1656 4284 louuv.exe 117 PID 4284 wrote to memory of 1656 4284 louuv.exe 117 PID 1656 wrote to memory of 3284 1656 ziebu.exe 118 PID 1656 wrote to memory of 3284 1656 ziebu.exe 118 PID 1656 wrote to memory of 3284 1656 ziebu.exe 118 PID 3284 wrote to memory of 4684 3284 fcpuem.exe 119 PID 3284 wrote to memory of 4684 3284 fcpuem.exe 119 PID 3284 wrote to memory of 4684 3284 fcpuem.exe 119 PID 4684 wrote to memory of 2460 4684 nuqib.exe 120
Processes
-
C:\Users\Admin\AppData\Local\Temp\8c624074b0191e4f7ace8a4783bec710_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\8c624074b0191e4f7ace8a4783bec710_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Users\Admin\reuco.exe"C:\Users\Admin\reuco.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4128 -
C:\Users\Admin\gauup.exe"C:\Users\Admin\gauup.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4200 -
C:\Users\Admin\liuuv.exe"C:\Users\Admin\liuuv.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Users\Admin\gbsoik.exe"C:\Users\Admin\gbsoik.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Users\Admin\huood.exe"C:\Users\Admin\huood.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3292 -
C:\Users\Admin\guahiiw.exe"C:\Users\Admin\guahiiw.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Users\Admin\kwqid.exe"C:\Users\Admin\kwqid.exe"8⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Users\Admin\hqjeg.exe"C:\Users\Admin\hqjeg.exe"9⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Users\Admin\qeifuuw.exe"C:\Users\Admin\qeifuuw.exe"10⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Users\Admin\hoiiw.exe"C:\Users\Admin\hoiiw.exe"11⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4632 -
C:\Users\Admin\kcpuex.exe"C:\Users\Admin\kcpuex.exe"12⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Users\Admin\xeado.exe"C:\Users\Admin\xeado.exe"13⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3516 -
C:\Users\Admin\qaiicu.exe"C:\Users\Admin\qaiicu.exe"14⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Users\Admin\beuunog.exe"C:\Users\Admin\beuunog.exe"15⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Users\Admin\nauup.exe"C:\Users\Admin\nauup.exe"16⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4516 -
C:\Users\Admin\yaooz.exe"C:\Users\Admin\yaooz.exe"17⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:456 -
C:\Users\Admin\chqul.exe"C:\Users\Admin\chqul.exe"18⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Users\Admin\louuv.exe"C:\Users\Admin\louuv.exe"19⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4284 -
C:\Users\Admin\ziebu.exe"C:\Users\Admin\ziebu.exe"20⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Users\Admin\fcpuem.exe"C:\Users\Admin\fcpuem.exe"21⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3284 -
C:\Users\Admin\nuqib.exe"C:\Users\Admin\nuqib.exe"22⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4684 -
C:\Users\Admin\foimuug.exe"C:\Users\Admin\foimuug.exe"23⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2460 -
C:\Users\Admin\miayuu.exe"C:\Users\Admin\miayuu.exe"24⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3676 -
C:\Users\Admin\taeex.exe"C:\Users\Admin\taeex.exe"25⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4948 -
C:\Users\Admin\baeuxo.exe"C:\Users\Admin\baeuxo.exe"26⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3816 -
C:\Users\Admin\ctqul.exe"C:\Users\Admin\ctqul.exe"27⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2016 -
C:\Users\Admin\noamee.exe"C:\Users\Admin\noamee.exe"28⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4900 -
C:\Users\Admin\qiepaa.exe"C:\Users\Admin\qiepaa.exe"29⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3684 -
C:\Users\Admin\nauufe.exe"C:\Users\Admin\nauufe.exe"30⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5052 -
C:\Users\Admin\yjqof.exe"C:\Users\Admin\yjqof.exe"31⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3292 -
C:\Users\Admin\hqjag.exe"C:\Users\Admin\hqjag.exe"32⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2248 -
C:\Users\Admin\wspex.exe"C:\Users\Admin\wspex.exe"33⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2644 -
C:\Users\Admin\roexaf.exe"C:\Users\Admin\roexaf.exe"34⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2364 -
C:\Users\Admin\tuvob.exe"C:\Users\Admin\tuvob.exe"35⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3012 -
C:\Users\Admin\gaobe.exe"C:\Users\Admin\gaobe.exe"36⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3044 -
C:\Users\Admin\whxon.exe"C:\Users\Admin\whxon.exe"37⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3848 -
C:\Users\Admin\taiiw.exe"C:\Users\Admin\taiiw.exe"38⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4828 -
C:\Users\Admin\nrjiex.exe"C:\Users\Admin\nrjiex.exe"39⤵PID:736
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1424 --field-trial-handle=1928,i,13242902252791919845,10377620236057253993,262144 --variations-seed-version /prefetch:81⤵PID:4504
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224KB
MD5792d1dd523a12e74ba57f29d927a6c46
SHA1eb14b9c02a0912be3eea20e13cbb83e1507621e0
SHA256a7ce3f42e57e03f6cb254e4c0330568004835fc28845823fcf74116d2ba05434
SHA512ea24df6f9832665139801f5c34bfc49af8fd965a0c731cb2bfade4e8ce1bc8b3be1a82e82f9f7a1016b09bda978f90579a9c063e24ea7c037323bc835b5ef23c
-
Filesize
224KB
MD5c622dc6325feab0e9c41b1ee101d48fa
SHA113043ae11c7177aff029dd82d8a80287855c8da8
SHA25647534adffc300d386d7d44d0a37b24b192fd9aee24cd6d987f08a108b6d7f167
SHA5129195438ad252ddbf282daad5cb2cfad7ca22e01897093634e0254753861ca4a1b55a59a814a28b85d8a686072ba67649d4891f62a64c272e1c032fd151666e32
-
Filesize
224KB
MD51e12b9fa353390ea155b636c448e82aa
SHA155ace72099479478ca3f4bdc6488383c831adff3
SHA2565905fcb7e28596ad33f679edde70cfb9c7f08a28739e840381b3e6c880d562e2
SHA512ed3a15157a8692af3e3941830e5031f8d0aeca568700886149f1872fc09e0ae2a9575756a6abe9cb376efb8b838c9dfa07b3bf7978647e78139f2b5e9084cc3a
-
Filesize
224KB
MD59e98e86c66caa792a1b57e353a7cad12
SHA15c9ad21a36ae083fe86cc1e8344439ec375afe45
SHA2568ceb13dd7bd82f40c00ca25a20659f9c63486944af364aadf4796edcca8627f6
SHA51243a2c6d7de6dce82cc4df8f0ed3f0818fb11757568396e129b90e0ae4b6e50351256c786efc515f5c303ba266bda30c492152842d22321882a7051478cd4d1af
-
Filesize
224KB
MD5b08912ae9e0ade1137c61febcebf0281
SHA1521bcb4f0435d06e264fb3454d4682cc0e5328e1
SHA256e667b2cd14c81c048676ce4b92416f835d34b14907e27a9ce40621adacff6eb2
SHA5120102b16e3049a696f465041dd5dbf9a12bd68ba0f429d196f16ddfacac01006a69e83579f744cdb82c94ba3b7763e50628671e9508fb3b6f8288bc6646acec16
-
Filesize
224KB
MD5155461c79b2ab93f46cf948a36079da3
SHA1d05539de0c7807320a52542014a712df8d681c31
SHA256824518d3751ffc9533a7b2e4b63e3f1e3f9d0095c9b5f0568981842408ca0a32
SHA512a640f977316e12fb6b5c0654fe7a78bec3af7624f9db67e945ba05ccbe17777a141184c2813c85b22bc9d71590be75400c318f7bc32332c38a190e4f6f2550ed
-
Filesize
224KB
MD52ee91ecb1ad56c3c7c5c2f3a7b2fd8f8
SHA1b3f0a5c8eda1f7c038b3b1418f240aa6152df033
SHA256ed2e3d3daf8902335135c6804593f413ca06034a50b0990be9dcd695fe29b44c
SHA5127e128147b9e42a4f8bc4844064f3b9cd85cff973cad77717ef269ea5080fff8721d85ad392a4a92c958bbb6bfb1defef789903164795c993143e00fcdece10fc
-
Filesize
224KB
MD55744392c8706c7c4c50e6421f808beeb
SHA1572a9d77de0c310896d3d14a9d67f9c58b741801
SHA256cfa3ef547a38bfe788919a404f27e58b78a01e83735cabeaa2c3562cacee954f
SHA5126f79973525902ac2f50f6b588f64f37f1e9bb906507a88669de0474706fb28273944f4f2431bbc023dc2ed4dfe4f62a8d914bf1a855d015f95bf43ce29790db7
-
Filesize
224KB
MD5afb68fc007b48e2a6ad928fd947c769e
SHA1faf13afb955086fea096b9a8457ce51b7c442bfe
SHA25617bed3e83a573fc053fe7456865588506ac8223ce92d18de760acb4807e102f8
SHA512f7ede27fcc5419406c477821d9293df6aeebfbb2319a7c7d5d92f9cb470e5fcbce9d642799c86c4b016302d08b6d653c16106b9f08ad0d2cc356ae1f373e4640
-
Filesize
224KB
MD58a13d559fdc5025fe2cdfc254af24395
SHA1b93bcb3e96fdec397551a1a8ffc20a5cd4b3c18d
SHA2564d1d3f4cf48803a11e24501759683c0c452c69fa874585609ab6bf1dde74edfb
SHA512f7d0238245df25983ea898f9420a633c2d860b2ec918c70045adb5b0d4ef70ce9a294229fbb8177ec31509d6f522b3061effc7a4412446ae8925715d1f6a409f
-
Filesize
224KB
MD59a2478061e7a11b6a2d716cbacd4e6ac
SHA19b0c33dce05d04a84890bb7d423a7b4bfef83b12
SHA256b22c204d9a6b24ec94e9702b14a5a75264069b6eb1818d835cb40ac655c169f8
SHA512073635f950170baa20acaf103c79c37888cabb778fddf25b44eb0e26a4870d7c00954835ba5b7df855cc494beb6ccaae5e02f9942717b65c264d14cb6624961f
-
Filesize
224KB
MD5923bea9a554976d759a12b7fb69aede5
SHA15640d23cc31181b4b1d0d3358708af8dab85f7b2
SHA256d6b856362cef7884d222ba220267e426103dbf7d2e385bff4a8a5dab43db71c4
SHA512c3dd475b35cd3a34c53f2f3910d391bd70c1ca9f0877b672fb6f72503d54499017939910d069ce2d32a330a61db40b77f1d2326514326ede7c416fb0941b2a45
-
Filesize
224KB
MD5805bf79f42dcc2090053bbb560ed42b3
SHA1585970dc27ce2e8d23e854402771b380fecb6fe4
SHA256f4104497515829f60b4f6628b070f7e5cee94cd320208f2824263c190826b0ac
SHA512ec08733d3e5516b20140e9584195127e8c5f31e71e3ca05deb014f4ec92316b950a4e913ca5508f40dd41d9c9b0ddcbb90d17fa5a2991bb10656e9cd863072c1
-
Filesize
224KB
MD5d9947c5064edecb6bae40badbc7ac878
SHA1a0cf0b71f1948df15e7c6e5653c20041ba775461
SHA256aad24d511e33d393005bc82d3cf08f569c2118858ac49861e05e962d3461f4a2
SHA512a92e21d268abffd89729e72c9027b3e3021dbde6b8448e498236d94c2d94388c411ea2d414ac1fb7ec6bb33dc232821e1c99e0dff7a64a4812b44ba2aad05d33
-
Filesize
224KB
MD5c779dd4956850b20d88c99c71d604094
SHA17972d5cfa2c9a621aa819f76695df8b5c28de022
SHA256d612a584931d8a639e45cbf2f69401aa1570cebffe2c1a80cfbf1173909154f9
SHA512481b6e23c667637327e4687d032f06bad0baf5b30da1011eeb2cb48a57fb2d1c7d872e703254c82884d5c770b79ba9245f63879cb5fc41fe15782d4b0a7d95c8
-
Filesize
224KB
MD533cbbf34e80a4ddd6cbea43dcf2f5458
SHA1e73a909c895199997ef105c4fc76b647135a5d8d
SHA25636a7c679c5fddd96a9bbfdf22ca723f9a9120e0f9aaea8c848c4c2f593571967
SHA512515d097ae5d96a4c088d89dcb29c397b3629633b75c933e00e9139c3e045ba97b2c707abe50b5eaee15358746c2c2933e3ba9be199f3cddfcea64ca62496ace0
-
Filesize
224KB
MD578d5d2375a220e9f5204f43a4068754d
SHA1dcfd8b0ab71e86234141d5dac8e140f51ff410f4
SHA2567dc8c7511b3b2b0b53efc756f06c07e3a10a191d9f475216da1bf00971f238a3
SHA512b65276d6bdd6a7125edfffbb5a37aee8a2492510c76d0e53e97ecf7087d3fb0395bf259c20e5aa12b7f9636515371c06ed71e59b43488d32b22db78d217d00fe
-
Filesize
224KB
MD565d35eaec6308585afda312971eaf0a8
SHA1f67ef79cf28f176b72e4fab17580d56788d280ca
SHA2566c2afcdbabfad47099136f0d77956f52b1759b7f9e8c8bc808e42a1f24306da5
SHA51215f4c61b82b762922eee35e1df2351a51f0028ac974bfb1284381c7d1398b654d2696412ae62a6d2f226e4d83bb54d22ad04152b9107b9a266815ec31abfd19b
-
Filesize
224KB
MD5e2f764a2dd39bc3e246c13b386418e2d
SHA17d31d7b07fb99e471f2e377ba96431b85ae0e423
SHA2569c7b04daf91cd9a884c7c5f8cfda5a6067003946ee9c0e988a8d83c10beb8aa2
SHA5126cbd6baf7645a84719cdad88f671ebaea2787bd8b107418eac0ab5554207a18f77b02777989fd5fb8c139fd4c905e5aa59a6e39674a0ca891b86a0a441e14935
-
Filesize
224KB
MD5f3123811e8eb58344b5787bcb420ebd1
SHA17a0b4abc6a9a3d4e1726d74d1c6b24827c10f455
SHA2568e410c13d188a3f336d45910e25cabaa7e3569e451ad4c51187654f4a9b450f9
SHA5126d03fa3d4e1f04b408d663aa0e0ae35ee10b44841047172d2b758a0fb86330fd8b602cc9dc2bd9b6b25b56885ebb647da9f72f785403c20ccd891ca8d6713d21
-
Filesize
224KB
MD544f4225c349eca9932c49937e353fa95
SHA1f2f87329d5172d2b1b7c51be8311eb8482aa2a65
SHA256ab7b682c8871d359518cad2ed92def019899158c42cff7d9efa5725720cbbeff
SHA5120fd8e720673e15481426466a81d58a3a758034d5f6dd34c605b95369d5463dd23fea7ffb4ed2e66641ac7da0141f0d854eb170e8dc4b6b51fe3e69f85202a7a3
-
Filesize
224KB
MD5c9436f93e7fd2e0d2d6ae006e204e9b9
SHA11da76399116b4a2e2e1ab5b7814f686d9db7b942
SHA2569c2dc6c6455f1e32653ec48550462fae7e7387cb9f29cabf0b0497495c67c339
SHA5123f8bcb1ec99d1c2e9548e7a8d4de37d3b1a9d0dbbca14d38056fafd780a15c1448feb2eea9a02c6e225f0d7d4cee4876b72d304ed95d2e0cbe8fc26300554dbb
-
Filesize
224KB
MD5a63c74602df56c4accd09cec609413de
SHA14a531dc9ab8faad561741631702241cb57505a4e
SHA25656579e1356297c2419cb37805efd3eb2ee48ad11d00d07190f8bf361872d9831
SHA512c6cca8efbfd70d87ca675ca5e2e383f1b38e863820080f7eb18942deaadbd72354291612d2d899da1fcff9af008456732cd36b0c178bc27cfdaf0e6ae5b5e004
-
Filesize
224KB
MD52a18a1ef65aaa1df6a5ab9f1661a5080
SHA161c95f751127e6d7389f273f6e0454d0b90250e4
SHA2566e5ae855989e1be0f45f4f207c915164469ee795c74dabe12d73808adf7a7340
SHA51228ebdfd9852e61f8b694a97a5912e12d8ec6a5e36b3e2654d520b67a660c05aee36cdc2e8b54aa7a94161b454aa1681289b6a383d60cfe2fc983dff170c1e5a8
-
Filesize
224KB
MD5b7a452c8efe36c33f45f8fe165baa523
SHA125aac4aec5cd20d2763462d2f9d2d42ab5b4e794
SHA256e2601a27452e4506532e16b8c044ed18415fa3c21bd90d93654a0563a64621cb
SHA512d79d26276d7f7f805b4d4a7edc2ff200d6b68b03192a258d336bf90b96ac0b90a4eb0ab38a970782ffd8389f5f34f732548b1879c7ba98968a276b68b45bca0d
-
Filesize
224KB
MD512490c20bcbb6afe0264838018eb5a0d
SHA192624978ef367fcd9cdd172ee6155b0c41352263
SHA2560c3b8eca53111b01bf9045b110650e0f5b1d3e494a619de3446ce2ae0fa4b947
SHA51273e7633c49b9c50775f89a5d51906562ed14905fd333caf017046dbb1cc6ee379b0f86274c1a2f0e49eee779b0d7a9ca6e10d61211fe43f796fce341b9192113
-
Filesize
224KB
MD5406c711f12ab2738f48693720f162325
SHA1a8fb61b0d9e8f6952cea4430e4ed0384a4b80a45
SHA256b54fb747a2e9ccfb86019a7e35753cf9703a4ed5504567a46ab009d152b90cfa
SHA512116fabc8f53f74a16a73baff898db790172348a5250ecf99634b8654c492e6a3370de996c332e8882f9477e8f2635f1bbd0f5e33c397c6f59c5e524dd7574504
-
Filesize
224KB
MD56df97fe0999c1c13be352b83e6460d04
SHA1ec7e1d5e1dbf6335178ea15bb5aaa22cc4321838
SHA2560ac2f70992bca9c0c20f27f06b199f700c7072d182e1cd28d26db69a39e47e66
SHA5123b0dd0ff7ac1d0ff3541d7a47e51ec0073aca47320054ac9b523311b2a22312ff4ab33e87c51de5792ebb53b18d0c0a7fb49e137c56aa7a5b0a9b454ee93d644
-
Filesize
224KB
MD568f77fa66613a65f1ec8e032ac86e502
SHA1c2f0257ede03e1c077c74f150aa3639d1ffbb787
SHA256b6e1a5e365bd9cef614e970ea27a89425d387cb3be16f3702cb457a948bee84f
SHA51252f1969030ebac5b13150e0d9f5469ca882a690decc6d42df865e301a7ac19e5c5d20e52bebec874352bc7caa38246d5a32af78845f3acea4cff9b373cccc89c
-
Filesize
224KB
MD5ec5f2db87d101a1b071c4c0fb99d4e36
SHA135432faece14182a5016f3539b9af079c5c4db36
SHA256fc799e120937442c3622da90be2493648641420cafe11a48c4e30de32d1245c1
SHA51267743a8f7f70a59a102a6d24a12c12b670b41e7228fad71dfb3d9c9a902b9a8dff256608689502446e2494e28f28ec3030f12a7afd37479b5b8775f1b198fdaf
-
Filesize
224KB
MD5db79a38a53e76e11154807d379d1c33b
SHA16e69c233e34a8e75386950808081e000ab700c81
SHA256dd708b69e132fe7c15f61b33f81511d30319deab50e6429f0fac812a98152e7c
SHA512434ae98cbab8613a1a201171ccd8647bf620494cdb50328019d8d3ac4d638d274ebe48ecbdc80031f6d449201e1cae5d74ff9c7dd823d57afaf3202c58bbc13d
-
Filesize
224KB
MD5fc7b908fdce145778e130fbbc73fac49
SHA1a13283b0748e79e907fb3eb82f76c67d8cd9747c
SHA2566837d16cc752a564e472fbdb4860f8521fd662826a6f031f31e3245f21fbdc13
SHA512e99155f8a18bfbe0134575948c575cd10d92ae361338ee9c2bfa49893a91d8d95c8e6f2cf089b47245e6c4e2b5e7d2d9d60169d3ccb199c4c3de738da88ee88b