Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
15/05/2024, 03:33
Static task
static1
Behavioral task
behavioral1
Sample
d4b8fec03edbcefd0d0aadf5f1cb3ab10bd323d2d30d71d0b64111c3e4903f0f.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
d4b8fec03edbcefd0d0aadf5f1cb3ab10bd323d2d30d71d0b64111c3e4903f0f.exe
Resource
win10v2004-20240426-en
General
-
Target
d4b8fec03edbcefd0d0aadf5f1cb3ab10bd323d2d30d71d0b64111c3e4903f0f.exe
-
Size
124KB
-
MD5
251fb1d38be020bdaed4c7a9b6413f42
-
SHA1
d04cf0dc47c075f7fd74381b219a0446cf72840c
-
SHA256
d4b8fec03edbcefd0d0aadf5f1cb3ab10bd323d2d30d71d0b64111c3e4903f0f
-
SHA512
f3e088ba4a420b80584137b1a3588fc8cb5a87680c2208d2cda30a606d3a8e101622190a66a5baaaa1924f26c9bd8f33bc68e175f3ada4d5a562c53619a8c31c
-
SSDEEP
1536:q8sz/5YDYvhRO/N69BH3OoGa+FLHjKceRgrkOSoINeGUmE:dGBYChkFoN3Oo1+FvfSW
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 43 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" coiuvib.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" guujeov.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" tioeb.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" paadau.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" yiofo.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" gauxie.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" d4b8fec03edbcefd0d0aadf5f1cb3ab10bd323d2d30d71d0b64111c3e4903f0f.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" peofiem.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" voaumi.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" cieroul.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" sooapa.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" kouxoo.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" quwix.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" suexuh.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" cieye.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" xvsez.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" kuiid.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" roedaif.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" teenal.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" buivu.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" wurah.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" kiohe.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" miulael.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" zealu.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" yaowef.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" gxnol.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" yuasof.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" yiiahe.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" neeut.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" dasov.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" dehex.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" hiejuk.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" bueedof.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" qouer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" lauwaan.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ptyeol.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" qaerut.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" rxtuis.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" meiovi.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" hugen.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" looatiz.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" loolim.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" yoeuxuh.exe -
Checks computer location settings 2 TTPs 43 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation d4b8fec03edbcefd0d0aadf5f1cb3ab10bd323d2d30d71d0b64111c3e4903f0f.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation qaerut.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation yiiahe.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation zealu.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation rxtuis.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation hiejuk.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation gxnol.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation lauwaan.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation dehex.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation loolim.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation buivu.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation paadau.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation miulael.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation sooapa.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation peofiem.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation quwix.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation cieroul.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation xvsez.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation coiuvib.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation hugen.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation ptyeol.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation yuasof.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation voaumi.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation kouxoo.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation looatiz.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation yiofo.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation kuiid.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation qouer.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation kiohe.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation meiovi.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation bueedof.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation guujeov.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation tioeb.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation wurah.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation suexuh.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation neeut.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation cieye.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation yaowef.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation teenal.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation dasov.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation yoeuxuh.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation gauxie.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation roedaif.exe -
Executes dropped EXE 43 IoCs
pid Process 3916 guujeov.exe 5004 hugen.exe 3268 gxnol.exe 4520 qouer.exe 4156 lauwaan.exe 544 teenal.exe 5108 ptyeol.exe 4164 dasov.exe 884 dehex.exe 4924 looatiz.exe 1000 loolim.exe 1920 tioeb.exe 3244 peofiem.exe 2528 buivu.exe 4384 wurah.exe 2064 qaerut.exe 3116 yuasof.exe 4936 yiiahe.exe 432 quwix.exe 2848 suexuh.exe 4836 yoeuxuh.exe 2988 neeut.exe 208 voaumi.exe 2192 paadau.exe 5100 miulael.exe 3860 zealu.exe 4864 kiohe.exe 2460 cieye.exe 4664 cieroul.exe 2236 yiofo.exe 4336 rxtuis.exe 3868 xvsez.exe 4988 meiovi.exe 1784 sooapa.exe 4232 coiuvib.exe 4488 kouxoo.exe 4528 gauxie.exe 3084 yaowef.exe 2708 kuiid.exe 4044 hiejuk.exe 4408 roedaif.exe 3176 bueedof.exe 1624 juuzou.exe -
Adds Run key to start application 2 TTPs 43 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teenal = "C:\\Users\\Admin\\teenal.exe /E" lauwaan.exe Set value (str) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\buivu = "C:\\Users\\Admin\\buivu.exe /F" peofiem.exe Set value (str) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yiofo = "C:\\Users\\Admin\\yiofo.exe /q" cieroul.exe Set value (str) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rxtuis = "C:\\Users\\Admin\\rxtuis.exe /y" yiofo.exe Set value (str) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yaowef = "C:\\Users\\Admin\\yaowef.exe /E" gauxie.exe Set value (str) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kuiid = "C:\\Users\\Admin\\kuiid.exe /S" yaowef.exe Set value (str) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\guujeov = "C:\\Users\\Admin\\guujeov.exe /I" d4b8fec03edbcefd0d0aadf5f1cb3ab10bd323d2d30d71d0b64111c3e4903f0f.exe Set value (str) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hugen = "C:\\Users\\Admin\\hugen.exe /I" guujeov.exe Set value (str) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dehex = "C:\\Users\\Admin\\dehex.exe /u" dasov.exe Set value (str) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\paadau = "C:\\Users\\Admin\\paadau.exe /f" voaumi.exe Set value (str) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xvsez = "C:\\Users\\Admin\\xvsez.exe /L" rxtuis.exe Set value (str) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bueedof = "C:\\Users\\Admin\\bueedof.exe /O" roedaif.exe Set value (str) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\loolim = "C:\\Users\\Admin\\loolim.exe /d" looatiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\peofiem = "C:\\Users\\Admin\\peofiem.exe /x" tioeb.exe Set value (str) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wurah = "C:\\Users\\Admin\\wurah.exe /M" buivu.exe Set value (str) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qaerut = "C:\\Users\\Admin\\qaerut.exe /K" wurah.exe Set value (str) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kiohe = "C:\\Users\\Admin\\kiohe.exe /X" zealu.exe Set value (str) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gauxie = "C:\\Users\\Admin\\gauxie.exe /z" kouxoo.exe Set value (str) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hiejuk = "C:\\Users\\Admin\\hiejuk.exe /A" kuiid.exe Set value (str) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qouer = "C:\\Users\\Admin\\qouer.exe /l" gxnol.exe Set value (str) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tioeb = "C:\\Users\\Admin\\tioeb.exe /w" loolim.exe Set value (str) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sooapa = "C:\\Users\\Admin\\sooapa.exe /v" meiovi.exe Set value (str) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kouxoo = "C:\\Users\\Admin\\kouxoo.exe /Q" coiuvib.exe Set value (str) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\juuzou = "C:\\Users\\Admin\\juuzou.exe /j" bueedof.exe Set value (str) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lauwaan = "C:\\Users\\Admin\\lauwaan.exe /K" qouer.exe Set value (str) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yoeuxuh = "C:\\Users\\Admin\\yoeuxuh.exe /C" suexuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cieye = "C:\\Users\\Admin\\cieye.exe /E" kiohe.exe Set value (str) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gxnol = "C:\\Users\\Admin\\gxnol.exe /u" hugen.exe Set value (str) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\miulael = "C:\\Users\\Admin\\miulael.exe /l" paadau.exe Set value (str) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roedaif = "C:\\Users\\Admin\\roedaif.exe /p" hiejuk.exe Set value (str) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\coiuvib = "C:\\Users\\Admin\\coiuvib.exe /F" sooapa.exe Set value (str) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dasov = "C:\\Users\\Admin\\dasov.exe /o" ptyeol.exe Set value (str) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuasof = "C:\\Users\\Admin\\yuasof.exe /k" qaerut.exe Set value (str) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yiiahe = "C:\\Users\\Admin\\yiiahe.exe /l" yuasof.exe Set value (str) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\quwix = "C:\\Users\\Admin\\quwix.exe /c" yiiahe.exe Set value (str) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\suexuh = "C:\\Users\\Admin\\suexuh.exe /z" quwix.exe Set value (str) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voaumi = "C:\\Users\\Admin\\voaumi.exe /n" neeut.exe Set value (str) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cieroul = "C:\\Users\\Admin\\cieroul.exe /Z" cieye.exe Set value (str) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ptyeol = "C:\\Users\\Admin\\ptyeol.exe /M" teenal.exe Set value (str) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\looatiz = "C:\\Users\\Admin\\looatiz.exe /w" dehex.exe Set value (str) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neeut = "C:\\Users\\Admin\\neeut.exe /O" yoeuxuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zealu = "C:\\Users\\Admin\\zealu.exe /e" miulael.exe Set value (str) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\meiovi = "C:\\Users\\Admin\\meiovi.exe /b" xvsez.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5036 d4b8fec03edbcefd0d0aadf5f1cb3ab10bd323d2d30d71d0b64111c3e4903f0f.exe 5036 d4b8fec03edbcefd0d0aadf5f1cb3ab10bd323d2d30d71d0b64111c3e4903f0f.exe 3916 guujeov.exe 3916 guujeov.exe 5004 hugen.exe 5004 hugen.exe 3268 gxnol.exe 3268 gxnol.exe 4520 qouer.exe 4520 qouer.exe 4156 lauwaan.exe 4156 lauwaan.exe 544 teenal.exe 544 teenal.exe 5108 ptyeol.exe 5108 ptyeol.exe 4164 dasov.exe 4164 dasov.exe 884 dehex.exe 884 dehex.exe 4924 looatiz.exe 4924 looatiz.exe 1000 loolim.exe 1000 loolim.exe 1920 tioeb.exe 1920 tioeb.exe 3244 peofiem.exe 3244 peofiem.exe 2528 buivu.exe 2528 buivu.exe 4384 wurah.exe 4384 wurah.exe 2064 qaerut.exe 2064 qaerut.exe 3116 yuasof.exe 3116 yuasof.exe 4936 yiiahe.exe 4936 yiiahe.exe 432 quwix.exe 432 quwix.exe 2848 suexuh.exe 2848 suexuh.exe 4836 yoeuxuh.exe 4836 yoeuxuh.exe 2988 neeut.exe 2988 neeut.exe 208 voaumi.exe 208 voaumi.exe 2192 paadau.exe 2192 paadau.exe 5100 miulael.exe 5100 miulael.exe 3860 zealu.exe 3860 zealu.exe 4864 kiohe.exe 4864 kiohe.exe 2460 cieye.exe 2460 cieye.exe 4664 cieroul.exe 4664 cieroul.exe 2236 yiofo.exe 2236 yiofo.exe 4336 rxtuis.exe 4336 rxtuis.exe -
Suspicious use of SetWindowsHookEx 44 IoCs
pid Process 5036 d4b8fec03edbcefd0d0aadf5f1cb3ab10bd323d2d30d71d0b64111c3e4903f0f.exe 3916 guujeov.exe 5004 hugen.exe 3268 gxnol.exe 4520 qouer.exe 4156 lauwaan.exe 544 teenal.exe 5108 ptyeol.exe 4164 dasov.exe 884 dehex.exe 4924 looatiz.exe 1000 loolim.exe 1920 tioeb.exe 3244 peofiem.exe 2528 buivu.exe 4384 wurah.exe 2064 qaerut.exe 3116 yuasof.exe 4936 yiiahe.exe 432 quwix.exe 2848 suexuh.exe 4836 yoeuxuh.exe 2988 neeut.exe 208 voaumi.exe 2192 paadau.exe 5100 miulael.exe 3860 zealu.exe 4864 kiohe.exe 2460 cieye.exe 4664 cieroul.exe 2236 yiofo.exe 4336 rxtuis.exe 3868 xvsez.exe 4988 meiovi.exe 1784 sooapa.exe 4232 coiuvib.exe 4488 kouxoo.exe 4528 gauxie.exe 3084 yaowef.exe 2708 kuiid.exe 4044 hiejuk.exe 4408 roedaif.exe 3176 bueedof.exe 1624 juuzou.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5036 wrote to memory of 3916 5036 d4b8fec03edbcefd0d0aadf5f1cb3ab10bd323d2d30d71d0b64111c3e4903f0f.exe 86 PID 5036 wrote to memory of 3916 5036 d4b8fec03edbcefd0d0aadf5f1cb3ab10bd323d2d30d71d0b64111c3e4903f0f.exe 86 PID 5036 wrote to memory of 3916 5036 d4b8fec03edbcefd0d0aadf5f1cb3ab10bd323d2d30d71d0b64111c3e4903f0f.exe 86 PID 3916 wrote to memory of 5004 3916 guujeov.exe 91 PID 3916 wrote to memory of 5004 3916 guujeov.exe 91 PID 3916 wrote to memory of 5004 3916 guujeov.exe 91 PID 5004 wrote to memory of 3268 5004 hugen.exe 93 PID 5004 wrote to memory of 3268 5004 hugen.exe 93 PID 5004 wrote to memory of 3268 5004 hugen.exe 93 PID 3268 wrote to memory of 4520 3268 gxnol.exe 96 PID 3268 wrote to memory of 4520 3268 gxnol.exe 96 PID 3268 wrote to memory of 4520 3268 gxnol.exe 96 PID 4520 wrote to memory of 4156 4520 qouer.exe 97 PID 4520 wrote to memory of 4156 4520 qouer.exe 97 PID 4520 wrote to memory of 4156 4520 qouer.exe 97 PID 4156 wrote to memory of 544 4156 lauwaan.exe 98 PID 4156 wrote to memory of 544 4156 lauwaan.exe 98 PID 4156 wrote to memory of 544 4156 lauwaan.exe 98 PID 544 wrote to memory of 5108 544 teenal.exe 99 PID 544 wrote to memory of 5108 544 teenal.exe 99 PID 544 wrote to memory of 5108 544 teenal.exe 99 PID 5108 wrote to memory of 4164 5108 ptyeol.exe 100 PID 5108 wrote to memory of 4164 5108 ptyeol.exe 100 PID 5108 wrote to memory of 4164 5108 ptyeol.exe 100 PID 4164 wrote to memory of 884 4164 dasov.exe 102 PID 4164 wrote to memory of 884 4164 dasov.exe 102 PID 4164 wrote to memory of 884 4164 dasov.exe 102 PID 884 wrote to memory of 4924 884 dehex.exe 104 PID 884 wrote to memory of 4924 884 dehex.exe 104 PID 884 wrote to memory of 4924 884 dehex.exe 104 PID 4924 wrote to memory of 1000 4924 looatiz.exe 105 PID 4924 wrote to memory of 1000 4924 looatiz.exe 105 PID 4924 wrote to memory of 1000 4924 looatiz.exe 105 PID 1000 wrote to memory of 1920 1000 loolim.exe 106 PID 1000 wrote to memory of 1920 1000 loolim.exe 106 PID 1000 wrote to memory of 1920 1000 loolim.exe 106 PID 1920 wrote to memory of 3244 1920 tioeb.exe 107 PID 1920 wrote to memory of 3244 1920 tioeb.exe 107 PID 1920 wrote to memory of 3244 1920 tioeb.exe 107 PID 3244 wrote to memory of 2528 3244 peofiem.exe 108 PID 3244 wrote to memory of 2528 3244 peofiem.exe 108 PID 3244 wrote to memory of 2528 3244 peofiem.exe 108 PID 2528 wrote to memory of 4384 2528 buivu.exe 109 PID 2528 wrote to memory of 4384 2528 buivu.exe 109 PID 2528 wrote to memory of 4384 2528 buivu.exe 109 PID 4384 wrote to memory of 2064 4384 wurah.exe 110 PID 4384 wrote to memory of 2064 4384 wurah.exe 110 PID 4384 wrote to memory of 2064 4384 wurah.exe 110 PID 2064 wrote to memory of 3116 2064 qaerut.exe 111 PID 2064 wrote to memory of 3116 2064 qaerut.exe 111 PID 2064 wrote to memory of 3116 2064 qaerut.exe 111 PID 3116 wrote to memory of 4936 3116 yuasof.exe 112 PID 3116 wrote to memory of 4936 3116 yuasof.exe 112 PID 3116 wrote to memory of 4936 3116 yuasof.exe 112 PID 4936 wrote to memory of 432 4936 yiiahe.exe 113 PID 4936 wrote to memory of 432 4936 yiiahe.exe 113 PID 4936 wrote to memory of 432 4936 yiiahe.exe 113 PID 432 wrote to memory of 2848 432 quwix.exe 115 PID 432 wrote to memory of 2848 432 quwix.exe 115 PID 432 wrote to memory of 2848 432 quwix.exe 115 PID 2848 wrote to memory of 4836 2848 suexuh.exe 116 PID 2848 wrote to memory of 4836 2848 suexuh.exe 116 PID 2848 wrote to memory of 4836 2848 suexuh.exe 116 PID 4836 wrote to memory of 2988 4836 yoeuxuh.exe 117
Processes
-
C:\Users\Admin\AppData\Local\Temp\d4b8fec03edbcefd0d0aadf5f1cb3ab10bd323d2d30d71d0b64111c3e4903f0f.exe"C:\Users\Admin\AppData\Local\Temp\d4b8fec03edbcefd0d0aadf5f1cb3ab10bd323d2d30d71d0b64111c3e4903f0f.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Users\Admin\guujeov.exe"C:\Users\Admin\guujeov.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3916 -
C:\Users\Admin\hugen.exe"C:\Users\Admin\hugen.exe"3⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Users\Admin\gxnol.exe"C:\Users\Admin\gxnol.exe"4⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3268 -
C:\Users\Admin\qouer.exe"C:\Users\Admin\qouer.exe"5⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4520 -
C:\Users\Admin\lauwaan.exe"C:\Users\Admin\lauwaan.exe"6⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4156 -
C:\Users\Admin\teenal.exe"C:\Users\Admin\teenal.exe"7⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:544 -
C:\Users\Admin\ptyeol.exe"C:\Users\Admin\ptyeol.exe"8⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Users\Admin\dasov.exe"C:\Users\Admin\dasov.exe"9⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4164 -
C:\Users\Admin\dehex.exe"C:\Users\Admin\dehex.exe"10⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:884 -
C:\Users\Admin\looatiz.exe"C:\Users\Admin\looatiz.exe"11⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Users\Admin\loolim.exe"C:\Users\Admin\loolim.exe"12⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1000 -
C:\Users\Admin\tioeb.exe"C:\Users\Admin\tioeb.exe"13⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Users\Admin\peofiem.exe"C:\Users\Admin\peofiem.exe"14⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3244 -
C:\Users\Admin\buivu.exe"C:\Users\Admin\buivu.exe"15⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Users\Admin\wurah.exe"C:\Users\Admin\wurah.exe"16⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4384 -
C:\Users\Admin\qaerut.exe"C:\Users\Admin\qaerut.exe"17⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Users\Admin\yuasof.exe"C:\Users\Admin\yuasof.exe"18⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3116 -
C:\Users\Admin\yiiahe.exe"C:\Users\Admin\yiiahe.exe"19⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Users\Admin\quwix.exe"C:\Users\Admin\quwix.exe"20⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:432 -
C:\Users\Admin\suexuh.exe"C:\Users\Admin\suexuh.exe"21⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Users\Admin\yoeuxuh.exe"C:\Users\Admin\yoeuxuh.exe"22⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4836 -
C:\Users\Admin\neeut.exe"C:\Users\Admin\neeut.exe"23⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2988 -
C:\Users\Admin\voaumi.exe"C:\Users\Admin\voaumi.exe"24⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:208 -
C:\Users\Admin\paadau.exe"C:\Users\Admin\paadau.exe"25⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2192 -
C:\Users\Admin\miulael.exe"C:\Users\Admin\miulael.exe"26⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5100 -
C:\Users\Admin\zealu.exe"C:\Users\Admin\zealu.exe"27⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3860 -
C:\Users\Admin\kiohe.exe"C:\Users\Admin\kiohe.exe"28⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4864 -
C:\Users\Admin\cieye.exe"C:\Users\Admin\cieye.exe"29⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2460 -
C:\Users\Admin\cieroul.exe"C:\Users\Admin\cieroul.exe"30⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4664 -
C:\Users\Admin\yiofo.exe"C:\Users\Admin\yiofo.exe"31⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2236 -
C:\Users\Admin\rxtuis.exe"C:\Users\Admin\rxtuis.exe"32⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4336 -
C:\Users\Admin\xvsez.exe"C:\Users\Admin\xvsez.exe"33⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:3868 -
C:\Users\Admin\meiovi.exe"C:\Users\Admin\meiovi.exe"34⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:4988 -
C:\Users\Admin\sooapa.exe"C:\Users\Admin\sooapa.exe"35⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:1784 -
C:\Users\Admin\coiuvib.exe"C:\Users\Admin\coiuvib.exe"36⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:4232 -
C:\Users\Admin\kouxoo.exe"C:\Users\Admin\kouxoo.exe"37⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:4488 -
C:\Users\Admin\gauxie.exe"C:\Users\Admin\gauxie.exe"38⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:4528 -
C:\Users\Admin\yaowef.exe"C:\Users\Admin\yaowef.exe"39⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:3084 -
C:\Users\Admin\kuiid.exe"C:\Users\Admin\kuiid.exe"40⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:2708 -
C:\Users\Admin\hiejuk.exe"C:\Users\Admin\hiejuk.exe"41⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:4044 -
C:\Users\Admin\roedaif.exe"C:\Users\Admin\roedaif.exe"42⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:4408 -
C:\Users\Admin\bueedof.exe"C:\Users\Admin\bueedof.exe"43⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:3176 -
C:\Users\Admin\juuzou.exe"C:\Users\Admin\juuzou.exe"44⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1624
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
124KB
MD53fb91ea6f4e94c8aa97bec5054284e41
SHA1e56b527bfad2c2e760fbe89e7cf04c1b69113e30
SHA25606a89a6eadf0009a39e9cbf1b508d9335d12785c6519aef18c4341d30ab280ef
SHA5127e8942b6402147d81e7aae1f63600655587510ae0cd3b59dd9b7aa75120470e2242729d15a350b3a50ab8f94bf267fadb3aae80e713fa53d02d3877c95288b4a
-
Filesize
124KB
MD5ec82a63154e6923c0ad39811a5b4eee6
SHA18e3ec1345e8a770ca10723e3c049827726ff3c28
SHA2561411db8b76716adeef49fba9d275ce211aed3ef0fe2d7f188e53448d2b6e550d
SHA5128138250acc19a5dd0f11061eb3e97fd74201304125d56f024e0285a2e97e1730e7fa5911fed19866f2e4555e91d8a37d144c8173c8213af3a8c2b037cbd72d4a
-
Filesize
124KB
MD5f223db9a7bb26df0a8819ec4f470b2c8
SHA13f5511227e1ac04f68568f253fcbf38894286f1b
SHA256a4cd985b2b09d4016a136c5c780d458a7ea4ba1814470b5e3554e0b0bc77d8fb
SHA5125583af39dc89cd57aaf05492a9c4df92c4d1507593c806633da0de5391d92ce4b5d660315200abf658419941393baf3809112ff7ac8847839944ea11e5a632d3
-
Filesize
124KB
MD5f54e19041c46919c32b2c4a2af996312
SHA11dd37079304ea7db2bf5a106ff5c50a0140339a9
SHA25665e17c6a6b1673fd94e48ec163df48ccfc79eaac10453164e6737be1bb23161e
SHA5127a9e41771a2fb7d0b5b00abb58d80eb82c331e0002282aaefd342774288f89fe4d1db56900a440b12c790903d13413b04ebb4321f3ec82627f3be4f459269554
-
Filesize
124KB
MD5984637df3255cf5e59a9dadcbb63851c
SHA1f30fd0453c7f3c1400e38fb1d3f83d7953f69394
SHA256ea010cd27003fc5705223b9504ca37e72a23df67ddddee00710b8f582209f439
SHA5129cfdc907ea5ebfc6f023587b2c872606623506bf26f351eb1df2159d36d13e540e93ef3908a395174fd78462d1c0540295b975a6860cdca20f7416316c2ebdf5
-
Filesize
124KB
MD5d5dba5eedcfb79130175d9beb05edab6
SHA1e846ba898b943be8ce9a8f7f9978f656c87b5288
SHA256be35bbab645785be826fd07bdd58d5b929346b2bbaa2a7ef9d2db9ef1372c148
SHA512e4a6bb7fc135a2dd901ccdebf8e1f449d1d6599c247dcd4707c8e713a21853c971d4d296404fca65794c781223e8a7a2ce9b0ba4c4d514b921fafb54bcabdd8f
-
Filesize
124KB
MD54f44fc090e7ecc4d375fe219896dcf6a
SHA15a9ee14506df6868e5d753230a47b476faa23937
SHA2564e96bd564c90376380b41dfbef4be4b2b3ce15935c6e30e894f6e25ebc2535b5
SHA5123c7909f0d1eb3fae69016ecc06d962224d594027af3244f2d2a92347337242b0fbdd813736377863251e5ce11081ceb3c22c29cb2613caf003690e0a966ceec5
-
Filesize
124KB
MD5719716d1c33b00b41e54c20ee3fb2cbd
SHA1d7792a2377c715f7202fc47296f9cf06e72b58d1
SHA256f3837bab1bc9bbec526685bfa6b3ba9ea980bd996329fe49587095e49cece3e9
SHA5120d6142066b1553c41bbbde85f048f28369b264d9e8f26beaec4912b338fd69748fadd5570d55b1d2d1d3d249545a7d3308c2a8fa4633cf3a70b631a864ea28d8
-
Filesize
124KB
MD51aab90b18f24ca9ed86b2aef1acd63ba
SHA117068a0f9b1adf1f86331f44869ca278fd5eee5e
SHA2562f94efe413f37d473b8e920823f49e92a8819caf2e6ae42a4b3c5f3066cfbe9a
SHA512686394273f963d857f1e1cce1c192544973fa46f59d17a638dd0c25f3136a74f99bf3b2e370697283c6063a47b432d25c2374b62cc427469988762bd25c7ad07
-
Filesize
124KB
MD5b4ed9baff28fa8e753fc75c3c0ac1064
SHA145b4faa1edad1d20792db89f21c1470b8c3ad6c3
SHA2569f9f4cacfc7d55a220654fee51409630a2e9024834bec29226f06d807c95f1bb
SHA51252167256b4607be2ed355ed8e1ceb351e732f6b09c2779d59624ac16467a99b4d940006365a8723ccab4815ad6ae39668ecccc9323f8510af87559e4ccd511a0
-
Filesize
124KB
MD5e6873d4a4bdacb6e3d03048ec8f1e12c
SHA15a82c07bb944dfef805a6ec6a58c2f26a4193b99
SHA25677b0f0504dcde45d88f7c80fe64931ba817f368bf3c323ed0cb146b97f1cd276
SHA51288bc6674dbc767a1703935f0a69f9e5e880ed5a824f17b581752c7d57a09aca2fdc7af0d929b3fc4da8f881a150bb6547c32c089742fa5baee6f9979e39f3748
-
Filesize
124KB
MD54befe5a16c198f6013b385287430befb
SHA1c0ee87c344b540fbf390ab628fa4abfe7fbdfd4f
SHA2560b3d381d5b57e36b34067310af58a3c853a1507212e692d37cb8da45b84f0f1f
SHA512c69430d12211f603d703470bfbe2c3140554247f05b9968338538ffd61a6bbe16a0277510e1c39a293a1b0f4ffb2cb0c9da608f112fe30c32d395933b2e3b5b2
-
Filesize
124KB
MD5632a0756a670a0d0d62b8e566ed4380d
SHA191f274fc5d13fc717bbf02d8303630775f8e8a4d
SHA256cf797922b0ceb263a0836d60af109b88aa4c201548f9b3508058b95b2dea11fe
SHA51266580694df233d041164efb6ec0618838bf3608b61dfd10a7f615db84343be2b6b03cb875d75cce051f7e33609969ca2a6ab47d44930336c32a549f7e0c27ca7
-
Filesize
124KB
MD5b4444be269ee555d8ee316786bfca68c
SHA1b83f78c26ee9406f8e16af2ddfb674ea49cc112c
SHA2568b28764b171edc5c9eb8594d34d30411eda3b1365e570cfc002ebd58966e3043
SHA512add15c6ea83690051acc2a1fc2edc4ef4d9560a59828a518994f78c3074e45443e73dd67b87ca3581b36cca3946c75b717b9bdeac977fbdf62acb57dbb71e976
-
Filesize
124KB
MD5b762a3d13c6c574793c83b4c5b69c53a
SHA1305969065818a2570150502615e8ce7a4ffdaf58
SHA256910cf75c2495a1f9106a3042a8beae60e637a41a6552a5dd06dba78ec19df7b8
SHA5126f8e75d9e7dc2b91e220efe8e708b9f33ed34acd0fc5374ec4049b92016a13c494001ee108b5a3c9c1915f92a550fe9807adfc7f5620b55a676a6ee0bb76cd11
-
Filesize
124KB
MD5b29e842787d64f7107b64ca1c5735261
SHA16051d858ded9da2e5a943b77b6a30d8fced7e709
SHA256c4ba641c0ebc7151769f0edecb9417bb367c81b8dc09a8d1991726b24fa1ac81
SHA512abf68a018b69be87b31ae140428282db1d18652d358765b98b20e59597d61ee170f5224d5a534736f1a090f184d751d3c3e12fb9df1bcce4edc666d1f1763c8d
-
Filesize
124KB
MD58b449bbbd97371a358c566603f91d48f
SHA1d5585444c16ec1886bfb76dc834c294656cd68db
SHA256018acbbff02106410efac6a281f1632145111a06fc471595ed580352352d6e15
SHA512fdd103ddd3d0af93065f1082c1b75e3d85de470a556849ca4cd492a78a5fd3a3a430d9277f5130c4bad50f28a235fb072ace7fd1bac541efdeb407be5274cdc0
-
Filesize
124KB
MD5c958b6e36469aa5279f32ea941e182f3
SHA17df1f13bd8e93c60f5671f0fdc33b2086aa97f33
SHA256dec2c80b084ab267f872f3130cfd6ffe25d271726894d6dc04a945a975fe6266
SHA512311262e697443b6f0cb3e5e49568d7e75e12fca738b533612d6e694f7c5b93322b0c915a0c38aa6d5d4f0168e2b2bc7fe07352711b893f496a3804ade0e80445
-
Filesize
124KB
MD5a9603ed06dac3502348205fd40cd1902
SHA110d27b799c68ec80f0c413c77b91251ae74bc019
SHA256ec08ca0f72db18fb2a4a027b1cd3494f617f014b48a783b61771c4cfcf787007
SHA512f10952cdd035c7609782c66a6529d2e4ef3c6a5be0c6b2cb82b66731fc13dcbb6e7fab40b8c9c68b77e3a6150e01827cf1d8a85c95b95cb7992efa1b1349f4fb
-
Filesize
124KB
MD550cb6b74101ab72a4096e37aa86cdff0
SHA12f51fb728d1ca13f6fd9adfbba0681771e57b158
SHA256e0068802b3af52f7d5d25e9ba52926cf9c26a49bc9a0d46b08ac09b6039e04c8
SHA5129c855f168b360e79cb02048057681c95937997273b645be9b71e9e94e5157600f4dec9f56405004fd7dbef61d11675caa9a9c0d5a9b8378c61b60824335521e8
-
Filesize
124KB
MD5fb61125fa67c42684a5da50aeb0ee1e0
SHA100cf27318d8987c2f6ac6c46119ba90a0b52e264
SHA256363c592feab3a8e7db6ee8516697ebd16993200c454fdebae2f924570f31fde3
SHA512dd575949a7330945479f2acf757acfb1aa990eca336d887bcc4d3c0f3f6ae9bbd10cffab5e17ae2e4cc8898becb20d9ced977ce2de8e2e6fe32733903394bd4b
-
Filesize
124KB
MD566eb13a0632bab02cc1d2de0f65468dc
SHA1118b8db3b392fabf7150c2e0ae98c5e0a27849dd
SHA256ccd0eca589c93a49fdba650ce7432b8b5624b0a6e6002a716ff294cf47d49893
SHA51292ef33fd35c996681c3a6f6fd68bfb54c1b374db3486b89b42e6eec23cac13f21fbeca21231ae945d17d947e7e900d0bba3cf84f776ad5b3fd7c5d8b2261b25b
-
Filesize
124KB
MD51be5f831f391daa6bfd83474d1eb0571
SHA11b967459a7a9ff642c3db50f4bc25dd56cf50125
SHA256cb44c6c011fcd3cae8c2c2ecfc6c0d394cb399c2a44cb4566fa4b54b51ef34ff
SHA512a789cc768a40073f0525051bd5b367bc6b0fa041af41e7653a2c6b7d90fee5a16568fb8f476dec923211357b0d943bd4e854fb2e46676cd45b412f1b3488408f
-
Filesize
124KB
MD58d7f0d7bf82acaf477bab2cef1f9034f
SHA11c1932af39050ac709efcf97d632ed16f4b9aa0d
SHA2565ca13c60517605ac9f5c780ac2dee29aabaecc028583bbc73b634c6b2d173ada
SHA512a07418f37a836699a702c5ccad4ba843e0d4b5015fd3358ca43c297711947720a69f30ed33099b83c49dd5f64ab1b898d166f262ca9d8588dbdf98146ef4f81c
-
Filesize
124KB
MD5a9b3aa72be4941337f788712e38814af
SHA1ce598814baa811fdcabc9da6215c4d37012e7325
SHA256eecc862057b7cc5ba111d48161ad803a1459a0fc34b1249236fc50cf8a74b6b7
SHA512d4b06de6f62bcc7e6f4db11525b4fedadbb54dee3218dfd5c6dcca1ad618aac4abe71c733c447dd5ebfea069556af1f4e6082367e794ad049d06220e6fcc241f
-
Filesize
124KB
MD5fe78b3115336fb6caa34b8c89667755f
SHA1215ebb172841db3a3035fe5b007adc677233ffbe
SHA256c92363a2f06d6bb44c62cb8857e39fc8615fd748aa16eb1fab0bb6d795dc071b
SHA5125f6c8839633b11e243328f34bcc428ba13b35cd55122dc3978aa6f5b53f93389ce281724ef4510655681bdf5883089e0352526a2ad770c03333da40d5a15c983
-
Filesize
124KB
MD503da454b20fff2aa1b165dfdb6c8cf49
SHA1fe3e6c2757448f6633dc773f4e378ef460052b11
SHA2563a1ba7fb86cb19d6b4c7da70df9a591185194db001976209357aac0e4c8b7233
SHA5126d5b5f061ec4096d466702e0ab71569ee9f827efafa68eacfb078482b7508f82559f5e05ba88ac2a5c6c6eb693b76d98fdca10f38fbcbaaf0fefc1df5c8a61b9
-
Filesize
124KB
MD50ddfd441286ace0150a2976483ca7a36
SHA1482c75d5715abe78c1e772c94caebcda67c68ea6
SHA256078a60dd28200a5f167f4217f346f6a41c577e11a030ef2632a3301d8c61a64e
SHA51231bef80c935f5b4564187a7b8f84fa3ae45b4ce63dcc6968a63ac49ee41bc7970b59af350092e1b7ca2f3d085530ac4d47ea4fc55212b219f9c9b2181842d51f
-
Filesize
124KB
MD59bcda8dbb2c7604e27d2cd2568e93732
SHA159158caa2c7cc049c68ebbf3a67f0ccfd513d7e4
SHA2560d816cdda9b091cb169c758b7d48defcd69a45ccfbe0add2be6c5994292937af
SHA512ae0ccdff0638bda3bda2bf3dbdb6b8e6ca9a0359bfb7ed043f5dd2132d643fc6f9ec55fd80f5cdb63afbbeb89421b703fcddff105b4893c99ea87b434bc0d310
-
Filesize
124KB
MD5747e7a0edb144fc693af7b242f99781b
SHA1fef8efb6b84bce35ffc18c67059c61f9c694caec
SHA256fdc0dc1384ed05045df21d6480ad77eaf886e1aabc87e37e8dca3557c5821a82
SHA512a0bb006edaad6057f82f5acd287844a91cc66cdb9c82d5dd09203686c87cdd3d4344b84511104f70b66c4f103eec9c92f3e4df57e5d4ec6ee14f066bdb8cbdbe
-
Filesize
124KB
MD5e531ee143b868d42d8917ca7f32829cb
SHA10fc8139148fbcc1a7936c38a9fd422e2765b696f
SHA25695f671292ed47555d005d644db30d3d5f3940f7359b89330a13e8a5e6b7b046b
SHA5121ea2143fbbea2981d11b3a5c25764c1c3229abaa2a3ed6b6414e41c9e086f25175f910b06837f7d36d7e1686b345bec4e1712b083a410fcf2c87a7f413a7dc75
-
Filesize
124KB
MD5c30534b6b95a567165e10383b964623f
SHA17db2c33b7ba3e11ad585589d28497488ee4e43d7
SHA256d72fe0d275ba5e6bc0ae681c78536ad16ff5de9510a5b214c4abddef6eb881c4
SHA51251c89390153865e3ccf365c407ef3cf414ed79de1eca9500b3d895e182f1d7443646aae2e9002c635e2246f0b99da9f7d881553fc2614e0441d6b6d691a623e0