Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11/05/2024, 16:31
Static task
static1
Behavioral task
behavioral1
Sample
1b1e7e9fe250abf8f3b0406cb686dce0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1b1e7e9fe250abf8f3b0406cb686dce0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
1b1e7e9fe250abf8f3b0406cb686dce0_NeikiAnalytics.exe
-
Size
124KB
-
MD5
1b1e7e9fe250abf8f3b0406cb686dce0
-
SHA1
30bafb954dd580fb54533a9945ca397f7b9478f4
-
SHA256
63bb3cc4e97a97f397ffefa45413e00eed89e4d5b1d1a9b6546e20069296b7c8
-
SHA512
b85774e6bf1b6419476496af00acc3c14c829d5733bbe286671a16043075b6eb233f51f11d27d542f098e2c0e94d92a89c35c56db148d85fe1a0deb94f96694d
-
SSDEEP
1536:N9sza5YidlhRO/N69BH3OoGa+FL9jKceRgrkjSo:XGYYiHhkFoN3Oo1+F92S
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 46 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 1b1e7e9fe250abf8f3b0406cb686dce0_NeikiAnalytics.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" fotow.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" foxej.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" hrkam.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" jhwod.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" zoegab.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" zouoy.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" hiizuev.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" jeucue.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" baqux.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" baujud.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" riiuqa.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" waaukeq.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" rqnam.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" queize.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" koega.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" meufi.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" feiese.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" reios.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" gyqoh.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ceuojut.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ziilip.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" tioubir.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" taaimul.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" yooxied.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" weiruaw.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" tupoz.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" peuvo.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" wuiyok.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" haidon.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" gauib.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" feouvaz.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" yogod.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" qiataed.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" tjqeab.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" coekua.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" joeeg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" beeenen.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" raiyuv.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" xeaoqi.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" nooaka.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" lrsoey.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" soacix.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" znyug.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" baakil.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" jpcap.exe -
Executes dropped EXE 46 IoCs
pid Process 1700 meufi.exe 2664 feiese.exe 2460 xeaoqi.exe 2440 zouoy.exe 1304 feouvaz.exe 2868 tioubir.exe 2252 nooaka.exe 2880 fotow.exe 768 yogod.exe 336 reios.exe 488 qiataed.exe 1776 taaimul.exe 1008 tjqeab.exe 2004 lrsoey.exe 3000 yooxied.exe 2196 gyqoh.exe 2204 foxej.exe 2660 soacix.exe 2544 znyug.exe 1828 baakil.exe 2864 hiizuev.exe 1600 ceuojut.exe 2176 weiruaw.exe 2820 jeucue.exe 316 tupoz.exe 1160 baqux.exe 1988 peuvo.exe 892 coekua.exe 1804 joeeg.exe 708 hrkam.exe 2904 haidon.exe 1548 rqnam.exe 1796 jhwod.exe 1812 beeenen.exe 2424 queize.exe 3052 wuiyok.exe 616 zoegab.exe 2236 gauib.exe 2388 koega.exe 688 jpcap.exe 2400 baujud.exe 1140 riiuqa.exe 2092 ziilip.exe 1596 raiyuv.exe 2788 waaukeq.exe 3004 yuojeab.exe -
Loads dropped DLL 64 IoCs
pid Process 1632 1b1e7e9fe250abf8f3b0406cb686dce0_NeikiAnalytics.exe 1632 1b1e7e9fe250abf8f3b0406cb686dce0_NeikiAnalytics.exe 1700 meufi.exe 1700 meufi.exe 2664 feiese.exe 2664 feiese.exe 2460 xeaoqi.exe 2460 xeaoqi.exe 2440 zouoy.exe 2440 zouoy.exe 1304 feouvaz.exe 1304 feouvaz.exe 2868 tioubir.exe 2868 tioubir.exe 2252 nooaka.exe 2252 nooaka.exe 2880 fotow.exe 2880 fotow.exe 768 yogod.exe 768 yogod.exe 336 reios.exe 336 reios.exe 488 qiataed.exe 488 qiataed.exe 1776 taaimul.exe 1776 taaimul.exe 1008 tjqeab.exe 1008 tjqeab.exe 2004 lrsoey.exe 2004 lrsoey.exe 3000 yooxied.exe 3000 yooxied.exe 2196 gyqoh.exe 2196 gyqoh.exe 2204 foxej.exe 2204 foxej.exe 2660 soacix.exe 2660 soacix.exe 2544 znyug.exe 2544 znyug.exe 1828 baakil.exe 1828 baakil.exe 2864 hiizuev.exe 2864 hiizuev.exe 1600 ceuojut.exe 1600 ceuojut.exe 2176 weiruaw.exe 2176 weiruaw.exe 2820 jeucue.exe 2820 jeucue.exe 316 tupoz.exe 316 tupoz.exe 1160 baqux.exe 1160 baqux.exe 1988 peuvo.exe 1988 peuvo.exe 892 coekua.exe 892 coekua.exe 1804 joeeg.exe 1804 joeeg.exe 708 hrkam.exe 708 hrkam.exe 2904 haidon.exe 2904 haidon.exe -
Adds Run key to start application 2 TTPs 46 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\gauib = "C:\\Users\\Admin\\gauib.exe /f" zoegab.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\feiese = "C:\\Users\\Admin\\feiese.exe /m" meufi.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\qiataed = "C:\\Users\\Admin\\qiataed.exe /J" reios.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\yooxied = "C:\\Users\\Admin\\yooxied.exe /S" lrsoey.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\weiruaw = "C:\\Users\\Admin\\weiruaw.exe /d" ceuojut.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\jeucue = "C:\\Users\\Admin\\jeucue.exe /e" weiruaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\baqux = "C:\\Users\\Admin\\baqux.exe /b" tupoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\jhwod = "C:\\Users\\Admin\\jhwod.exe /l" rqnam.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\beeenen = "C:\\Users\\Admin\\beeenen.exe /l" jhwod.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\meufi = "C:\\Users\\Admin\\meufi.exe /F" 1b1e7e9fe250abf8f3b0406cb686dce0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\taaimul = "C:\\Users\\Admin\\taaimul.exe /J" qiataed.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\lrsoey = "C:\\Users\\Admin\\lrsoey.exe /z" tjqeab.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\soacix = "C:\\Users\\Admin\\soacix.exe /f" foxej.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\tupoz = "C:\\Users\\Admin\\tupoz.exe /B" jeucue.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\joeeg = "C:\\Users\\Admin\\joeeg.exe /E" coekua.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\haidon = "C:\\Users\\Admin\\haidon.exe /C" hrkam.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\koega = "C:\\Users\\Admin\\koega.exe /M" gauib.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\gyqoh = "C:\\Users\\Admin\\gyqoh.exe /X" yooxied.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\hiizuev = "C:\\Users\\Admin\\hiizuev.exe /f" baakil.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\rqnam = "C:\\Users\\Admin\\rqnam.exe /o" haidon.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\queize = "C:\\Users\\Admin\\queize.exe /h" beeenen.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\zoegab = "C:\\Users\\Admin\\zoegab.exe /C" wuiyok.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\ziilip = "C:\\Users\\Admin\\ziilip.exe /J" riiuqa.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\nooaka = "C:\\Users\\Admin\\nooaka.exe /k" tioubir.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\yogod = "C:\\Users\\Admin\\yogod.exe /a" fotow.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\tjqeab = "C:\\Users\\Admin\\tjqeab.exe /M" taaimul.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\coekua = "C:\\Users\\Admin\\coekua.exe /Q" peuvo.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\baujud = "C:\\Users\\Admin\\baujud.exe /a" jpcap.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\riiuqa = "C:\\Users\\Admin\\riiuqa.exe /t" baujud.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\zouoy = "C:\\Users\\Admin\\zouoy.exe /L" xeaoqi.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuiyok = "C:\\Users\\Admin\\wuiyok.exe /A" queize.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeaoqi = "C:\\Users\\Admin\\xeaoqi.exe /l" feiese.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\feouvaz = "C:\\Users\\Admin\\feouvaz.exe /O" zouoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\znyug = "C:\\Users\\Admin\\znyug.exe /g" soacix.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\hrkam = "C:\\Users\\Admin\\hrkam.exe /N" joeeg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\tioubir = "C:\\Users\\Admin\\tioubir.exe /F" feouvaz.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\fotow = "C:\\Users\\Admin\\fotow.exe /M" nooaka.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\reios = "C:\\Users\\Admin\\reios.exe /v" yogod.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\foxej = "C:\\Users\\Admin\\foxej.exe /k" gyqoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceuojut = "C:\\Users\\Admin\\ceuojut.exe /w" hiizuev.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\raiyuv = "C:\\Users\\Admin\\raiyuv.exe /v" ziilip.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\waaukeq = "C:\\Users\\Admin\\waaukeq.exe /R" raiyuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\baakil = "C:\\Users\\Admin\\baakil.exe /c" znyug.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\peuvo = "C:\\Users\\Admin\\peuvo.exe /T" baqux.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\jpcap = "C:\\Users\\Admin\\jpcap.exe /h" koega.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\yuojeab = "C:\\Users\\Admin\\yuojeab.exe /Y" waaukeq.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 46 IoCs
pid Process 1632 1b1e7e9fe250abf8f3b0406cb686dce0_NeikiAnalytics.exe 1700 meufi.exe 2664 feiese.exe 2460 xeaoqi.exe 2440 zouoy.exe 1304 feouvaz.exe 2868 tioubir.exe 2252 nooaka.exe 2880 fotow.exe 768 yogod.exe 336 reios.exe 488 qiataed.exe 1776 taaimul.exe 1008 tjqeab.exe 2004 lrsoey.exe 3000 yooxied.exe 2196 gyqoh.exe 2204 foxej.exe 2660 soacix.exe 2544 znyug.exe 1828 baakil.exe 2864 hiizuev.exe 1600 ceuojut.exe 2176 weiruaw.exe 2820 jeucue.exe 316 tupoz.exe 1160 baqux.exe 1988 peuvo.exe 892 coekua.exe 1804 joeeg.exe 708 hrkam.exe 2904 haidon.exe 1548 rqnam.exe 1796 jhwod.exe 1812 beeenen.exe 2424 queize.exe 3052 wuiyok.exe 616 zoegab.exe 2236 gauib.exe 2388 koega.exe 688 jpcap.exe 2400 baujud.exe 1140 riiuqa.exe 2092 ziilip.exe 1596 raiyuv.exe 2788 waaukeq.exe -
Suspicious use of SetWindowsHookEx 47 IoCs
pid Process 1632 1b1e7e9fe250abf8f3b0406cb686dce0_NeikiAnalytics.exe 1700 meufi.exe 2664 feiese.exe 2460 xeaoqi.exe 2440 zouoy.exe 1304 feouvaz.exe 2868 tioubir.exe 2252 nooaka.exe 2880 fotow.exe 768 yogod.exe 336 reios.exe 488 qiataed.exe 1776 taaimul.exe 1008 tjqeab.exe 2004 lrsoey.exe 3000 yooxied.exe 2196 gyqoh.exe 2204 foxej.exe 2660 soacix.exe 2544 znyug.exe 1828 baakil.exe 2864 hiizuev.exe 1600 ceuojut.exe 2176 weiruaw.exe 2820 jeucue.exe 316 tupoz.exe 1160 baqux.exe 1988 peuvo.exe 892 coekua.exe 1804 joeeg.exe 708 hrkam.exe 2904 haidon.exe 1548 rqnam.exe 1796 jhwod.exe 1812 beeenen.exe 2424 queize.exe 3052 wuiyok.exe 616 zoegab.exe 2236 gauib.exe 2388 koega.exe 688 jpcap.exe 2400 baujud.exe 1140 riiuqa.exe 2092 ziilip.exe 1596 raiyuv.exe 2788 waaukeq.exe 3004 yuojeab.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1632 wrote to memory of 1700 1632 1b1e7e9fe250abf8f3b0406cb686dce0_NeikiAnalytics.exe 28 PID 1632 wrote to memory of 1700 1632 1b1e7e9fe250abf8f3b0406cb686dce0_NeikiAnalytics.exe 28 PID 1632 wrote to memory of 1700 1632 1b1e7e9fe250abf8f3b0406cb686dce0_NeikiAnalytics.exe 28 PID 1632 wrote to memory of 1700 1632 1b1e7e9fe250abf8f3b0406cb686dce0_NeikiAnalytics.exe 28 PID 1700 wrote to memory of 2664 1700 meufi.exe 29 PID 1700 wrote to memory of 2664 1700 meufi.exe 29 PID 1700 wrote to memory of 2664 1700 meufi.exe 29 PID 1700 wrote to memory of 2664 1700 meufi.exe 29 PID 2664 wrote to memory of 2460 2664 feiese.exe 30 PID 2664 wrote to memory of 2460 2664 feiese.exe 30 PID 2664 wrote to memory of 2460 2664 feiese.exe 30 PID 2664 wrote to memory of 2460 2664 feiese.exe 30 PID 2460 wrote to memory of 2440 2460 xeaoqi.exe 31 PID 2460 wrote to memory of 2440 2460 xeaoqi.exe 31 PID 2460 wrote to memory of 2440 2460 xeaoqi.exe 31 PID 2460 wrote to memory of 2440 2460 xeaoqi.exe 31 PID 2440 wrote to memory of 1304 2440 zouoy.exe 32 PID 2440 wrote to memory of 1304 2440 zouoy.exe 32 PID 2440 wrote to memory of 1304 2440 zouoy.exe 32 PID 2440 wrote to memory of 1304 2440 zouoy.exe 32 PID 1304 wrote to memory of 2868 1304 feouvaz.exe 33 PID 1304 wrote to memory of 2868 1304 feouvaz.exe 33 PID 1304 wrote to memory of 2868 1304 feouvaz.exe 33 PID 1304 wrote to memory of 2868 1304 feouvaz.exe 33 PID 2868 wrote to memory of 2252 2868 tioubir.exe 34 PID 2868 wrote to memory of 2252 2868 tioubir.exe 34 PID 2868 wrote to memory of 2252 2868 tioubir.exe 34 PID 2868 wrote to memory of 2252 2868 tioubir.exe 34 PID 2252 wrote to memory of 2880 2252 nooaka.exe 35 PID 2252 wrote to memory of 2880 2252 nooaka.exe 35 PID 2252 wrote to memory of 2880 2252 nooaka.exe 35 PID 2252 wrote to memory of 2880 2252 nooaka.exe 35 PID 2880 wrote to memory of 768 2880 fotow.exe 36 PID 2880 wrote to memory of 768 2880 fotow.exe 36 PID 2880 wrote to memory of 768 2880 fotow.exe 36 PID 2880 wrote to memory of 768 2880 fotow.exe 36 PID 768 wrote to memory of 336 768 yogod.exe 37 PID 768 wrote to memory of 336 768 yogod.exe 37 PID 768 wrote to memory of 336 768 yogod.exe 37 PID 768 wrote to memory of 336 768 yogod.exe 37 PID 336 wrote to memory of 488 336 reios.exe 38 PID 336 wrote to memory of 488 336 reios.exe 38 PID 336 wrote to memory of 488 336 reios.exe 38 PID 336 wrote to memory of 488 336 reios.exe 38 PID 488 wrote to memory of 1776 488 qiataed.exe 39 PID 488 wrote to memory of 1776 488 qiataed.exe 39 PID 488 wrote to memory of 1776 488 qiataed.exe 39 PID 488 wrote to memory of 1776 488 qiataed.exe 39 PID 1776 wrote to memory of 1008 1776 taaimul.exe 40 PID 1776 wrote to memory of 1008 1776 taaimul.exe 40 PID 1776 wrote to memory of 1008 1776 taaimul.exe 40 PID 1776 wrote to memory of 1008 1776 taaimul.exe 40 PID 1008 wrote to memory of 2004 1008 tjqeab.exe 41 PID 1008 wrote to memory of 2004 1008 tjqeab.exe 41 PID 1008 wrote to memory of 2004 1008 tjqeab.exe 41 PID 1008 wrote to memory of 2004 1008 tjqeab.exe 41 PID 2004 wrote to memory of 3000 2004 lrsoey.exe 44 PID 2004 wrote to memory of 3000 2004 lrsoey.exe 44 PID 2004 wrote to memory of 3000 2004 lrsoey.exe 44 PID 2004 wrote to memory of 3000 2004 lrsoey.exe 44 PID 3000 wrote to memory of 2196 3000 yooxied.exe 45 PID 3000 wrote to memory of 2196 3000 yooxied.exe 45 PID 3000 wrote to memory of 2196 3000 yooxied.exe 45 PID 3000 wrote to memory of 2196 3000 yooxied.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\1b1e7e9fe250abf8f3b0406cb686dce0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\1b1e7e9fe250abf8f3b0406cb686dce0_NeikiAnalytics.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Users\Admin\meufi.exe"C:\Users\Admin\meufi.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Users\Admin\feiese.exe"C:\Users\Admin\feiese.exe"3⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Users\Admin\xeaoqi.exe"C:\Users\Admin\xeaoqi.exe"4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Users\Admin\zouoy.exe"C:\Users\Admin\zouoy.exe"5⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Users\Admin\feouvaz.exe"C:\Users\Admin\feouvaz.exe"6⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Users\Admin\tioubir.exe"C:\Users\Admin\tioubir.exe"7⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Users\Admin\nooaka.exe"C:\Users\Admin\nooaka.exe"8⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Users\Admin\fotow.exe"C:\Users\Admin\fotow.exe"9⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Users\Admin\yogod.exe"C:\Users\Admin\yogod.exe"10⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:768 -
C:\Users\Admin\reios.exe"C:\Users\Admin\reios.exe"11⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:336 -
C:\Users\Admin\qiataed.exe"C:\Users\Admin\qiataed.exe"12⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:488 -
C:\Users\Admin\taaimul.exe"C:\Users\Admin\taaimul.exe"13⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Users\Admin\tjqeab.exe"C:\Users\Admin\tjqeab.exe"14⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1008 -
C:\Users\Admin\lrsoey.exe"C:\Users\Admin\lrsoey.exe"15⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Users\Admin\yooxied.exe"C:\Users\Admin\yooxied.exe"16⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Users\Admin\gyqoh.exe"C:\Users\Admin\gyqoh.exe"17⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2196 -
C:\Users\Admin\foxej.exe"C:\Users\Admin\foxej.exe"18⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2204 -
C:\Users\Admin\soacix.exe"C:\Users\Admin\soacix.exe"19⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2660 -
C:\Users\Admin\znyug.exe"C:\Users\Admin\znyug.exe"20⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2544 -
C:\Users\Admin\baakil.exe"C:\Users\Admin\baakil.exe"21⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1828 -
C:\Users\Admin\hiizuev.exe"C:\Users\Admin\hiizuev.exe"22⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2864 -
C:\Users\Admin\ceuojut.exe"C:\Users\Admin\ceuojut.exe"23⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1600 -
C:\Users\Admin\weiruaw.exe"C:\Users\Admin\weiruaw.exe"24⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2176 -
C:\Users\Admin\jeucue.exe"C:\Users\Admin\jeucue.exe"25⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2820 -
C:\Users\Admin\tupoz.exe"C:\Users\Admin\tupoz.exe"26⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:316 -
C:\Users\Admin\baqux.exe"C:\Users\Admin\baqux.exe"27⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1160 -
C:\Users\Admin\peuvo.exe"C:\Users\Admin\peuvo.exe"28⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1988 -
C:\Users\Admin\coekua.exe"C:\Users\Admin\coekua.exe"29⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:892 -
C:\Users\Admin\joeeg.exe"C:\Users\Admin\joeeg.exe"30⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1804 -
C:\Users\Admin\hrkam.exe"C:\Users\Admin\hrkam.exe"31⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:708 -
C:\Users\Admin\haidon.exe"C:\Users\Admin\haidon.exe"32⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2904 -
C:\Users\Admin\rqnam.exe"C:\Users\Admin\rqnam.exe"33⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1548 -
C:\Users\Admin\jhwod.exe"C:\Users\Admin\jhwod.exe"34⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1796 -
C:\Users\Admin\beeenen.exe"C:\Users\Admin\beeenen.exe"35⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1812 -
C:\Users\Admin\queize.exe"C:\Users\Admin\queize.exe"36⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2424 -
C:\Users\Admin\wuiyok.exe"C:\Users\Admin\wuiyok.exe"37⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3052 -
C:\Users\Admin\zoegab.exe"C:\Users\Admin\zoegab.exe"38⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:616 -
C:\Users\Admin\gauib.exe"C:\Users\Admin\gauib.exe"39⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2236 -
C:\Users\Admin\koega.exe"C:\Users\Admin\koega.exe"40⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2388 -
C:\Users\Admin\jpcap.exe"C:\Users\Admin\jpcap.exe"41⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:688 -
C:\Users\Admin\baujud.exe"C:\Users\Admin\baujud.exe"42⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2400 -
C:\Users\Admin\riiuqa.exe"C:\Users\Admin\riiuqa.exe"43⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1140 -
C:\Users\Admin\ziilip.exe"C:\Users\Admin\ziilip.exe"44⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2092 -
C:\Users\Admin\raiyuv.exe"C:\Users\Admin\raiyuv.exe"45⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1596 -
C:\Users\Admin\waaukeq.exe"C:\Users\Admin\waaukeq.exe"46⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2788 -
C:\Users\Admin\yuojeab.exe"C:\Users\Admin\yuojeab.exe"47⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3004
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
124KB
MD52413fa07c1e76d03b68e6442fd69553e
SHA1589ec487c627e73461ba6dc8787eb7dd98e11571
SHA256ce1dfc855ed1dfe8523c74f0055bca2fd4564a78be0da8271a9a7b2411dc07db
SHA51232bc57b799761c8e93cc965e4b3228308e9dd4ff67eead192fa1119f5d90538b07ab0e40f338a134d7bbc122ef51f2765c162c56374606c9508f7273e84f8288
-
Filesize
124KB
MD50b24cacb1e4311a32c03605537e35ed4
SHA17e43f0ba3eadb9f73a70378676691b8cbe626c35
SHA2568ab1dbeb4df3a3f60e8f088c2aa9e812efff968b74bc8dda4801bf28ed42d1c3
SHA51217894ce17975b5ed4570b307a4e038c7a65bc23c0d63a0655428c45251f74f5eda67017a2a5b00d8f10028a850e66cf1e5f95aea17beb44e68b774f91e170ac0
-
Filesize
124KB
MD55353b0112b3ac4709d5ed1ce8da9c5ea
SHA1dba56421050ae45b631fe0639aab4788e88dffd0
SHA256ef799f556e8a33b74a7657aec1de4d519b5ed8cea072c3bf70a9cb547220675d
SHA51210ece5b94fd2496aa85a4eeba4557c9504be341ead24f2f319bd5078d03edfbc1a54dcc4a37eb12a80cc6758c0203c5c8c487c9b4d4e21be5b01199982cda5aa
-
Filesize
124KB
MD5a6f3c1a40912bb941069c7171a26f3d9
SHA12803ff59ae4cb37d8645a8161469d18b8a237290
SHA2569fc45be282206dcd1a8e0e72e33fb54664e7b3b0ebecb8e3680c1511246f298f
SHA512068ca4e950f031141f0c4cf5fe36934fb3a3df8ac654aee89d74824804a5b3dcda9daa90554e9a314ecb21cae41d8cf96d00baf07ac28f3f3a18468dce00f6d5
-
Filesize
124KB
MD58fce1fb508551f19932535b4dbb983df
SHA190473a14fef6bd01cdecd20b19cfaa7e50dc6cfb
SHA256ecccf17eeba59faffa9ea46da6cbc505a8672474ebef1b1efa72ff4182156c34
SHA512ffea5311c347e58eebd36985ab17c6a3490220a8b5b2cd0926e7e07d9c062923ceeb84073f9d10ec0f200f93f8b92f167baaa3fb548d9f3c38d88f0665e6c32f
-
Filesize
124KB
MD5886ff461fcbc6c6a313c7ec506e06e4e
SHA10d6e4ce7ded142035e7847f527df352aa343ffbc
SHA256104ad5ec49408f743641d7ea777416b314a15205e4281a7240c11f4f6d9410b5
SHA51229f99a532b3e0dd907355fd47cec724cb7c7205bc5907ba4daadbadd8af4ad1ec534d2be8c1182dfdafade0fc51ace4ae220e33f88e8327248f6ef0cd5a2c238
-
Filesize
124KB
MD5013270292004250b3922529987bf78e1
SHA155822798c2ce0ab92972705d154da66a54c330cb
SHA2564c3f6e2a71c10cb77054bb5492f007c987ed386d9cf66fedf6b9f93e42a84577
SHA512c8d3d9471c7f2b38f70166cd569bd67124d215d1b7a526a68e90171fc509d0233d72f3ac99fededbcbf441c41d5357e81291162726c4ac5cf205ca17211ad3d2
-
Filesize
124KB
MD5a3c47663d29bd6c4a4e69b69529d77be
SHA133a65d1c438b19cf4b720d835a32ea1a1dab91e4
SHA2567efa5bead1b46e21c4311691db51d032ee8448ed64c38a2cfd1e8ec242f217e7
SHA51284a84a0bb0e372e7ce3fb40b1528265b52244549f05f62fcc01f644fd096eb4f7b41ac31078dda96675a5a9c7f80114504d6917a4311d150a900ef00892fc6ec
-
Filesize
124KB
MD5af9e0d5a5ec441e4dc13e219c1ef9493
SHA1e06bf7fb4e79b52d0b89260b5f432343ca687592
SHA256bef2914964af93759197f85a9099c69fa623afcb7e9afede3ba61cf541fdfa0c
SHA512b6f6360617292d759af1c29c088b9b6723df05909881312489f14c6e24f156c5c4017e3b90897f7471c05c375dae330cf33e5e6efde56f0b5a6319f612cc6fbb
-
Filesize
124KB
MD536f838aadd3626f73a37139a67bdc7e6
SHA11281b1b0c97e18a733fd18aea84435a648e14314
SHA256a3a9c212f5da4391d93ff5a81850a36ac42c63e8b932b332b259d69664f6ca9e
SHA512ffae38188186efd0d00535163dbb55c72a8885c934de7317f968c4327c2035faecfc7f69e5bdf139364823b217618c2419f674ce46caf993923cc1a8bf25e983
-
Filesize
124KB
MD531b2fa11816f0ef4e5770779ce924ca9
SHA1285da89e9909c697914a25bcdbbf922b36faa5fd
SHA256488f94082af640431ec9ffa13d5847e05724a993a8dda7a2a9de5708bc98fbbf
SHA512083250741b5863e7f68202f6d931b5a861ace682b571a5e3f5b52919c13d0e5f5bf1a9d660a29bd1eb78af90f4c21da1a24e17863c138af60ccba997b9e46cfb
-
Filesize
124KB
MD591a0084c9ce845fe2c8b6ffdf5340b72
SHA17dc059fa4cb1c94d75bffa84d86f0aabac17e5a2
SHA256b8cee6a1f75305f242e435426e1895f18d3e98af689e804ece9ed0565975fe6e
SHA512bffe6fe36467563c527a900f741e146be5209b79f6144c6ed01b734ba2695b4240e22a3615441bc3dc62b653fe2563d7c44652e5ca19af6adf4dc6c6cd2c3052
-
Filesize
124KB
MD5c3e1a4389e1e22757262de25661b9e34
SHA102df3a2e94771fa68d259e46f8609d7a34c9df74
SHA256439a03d7478f87379d933db10d15cae32d3f70e3e8808f5f62128e9e99151b82
SHA5127ea8e0ba51ae20da84a8ed634b4161f8f8e5e8292c16cbeb0f8c323cddc65c38c4dbcdd7df786ea82f43415fc39c476abef4647701c722450c4717f468f5c19c
-
Filesize
124KB
MD563a2b8fe6faf1543fc91ceb9d76b650c
SHA16cfd087c7165a26d544b8e9e3107f1fef3c73b12
SHA256bdb10c5e870c249a89727f61e54aa6dba61ca407ae5db596bcfd67549bd12611
SHA512b69b2c4d85c924d27da46f00b3ae3d6ba3db3c3cee4f984aa75cec4539435d80580f7192ee13e32a1962790665db78e5cab343a247e3832f6c068fe5ba77d330
-
Filesize
124KB
MD5e29860f178d84682cf589216208f2a2f
SHA12f607802d30238e323eafae7b199ad2181334001
SHA2560044e190113c1ed7e1ad0886d45be2ab6a6f094df329083aec2010f12b348444
SHA512017ddd12b05d11efdddf7ee73c62324967b7ec5b8f1f9e7e214f3ff817bdafb3879216abf2e567f96dd5e3ca30d5672967cffd0dd3822835b0506fc4d15b7c73
-
Filesize
124KB
MD5074b1b4a71ae82feedbd6d1d08e11cfa
SHA1ec2c31529edc30860ca663698412b6406d6555e6
SHA25614123e7b3a99879ea16624d6b30e051ed8976328dfb1749a249fe7b51eefe80b
SHA5123c6af95d508db188c144cf07e092b69783901bf02ec07e75ee0532533c63b8c116386791f0642f0382e95edbddc0606c98ed3784904e6a8e6dd3d0d754ae9531