Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15/05/2024, 18:16
Static task
static1
Behavioral task
behavioral1
Sample
10239debc1afdcb45323f18205524e70_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
10239debc1afdcb45323f18205524e70_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
10239debc1afdcb45323f18205524e70_NeikiAnalytics.exe
-
Size
224KB
-
MD5
10239debc1afdcb45323f18205524e70
-
SHA1
7f2a9a728215ca8d654be78c0df1ccfbfec17dde
-
SHA256
d17e954ef3f1f81982ed0a9ce44b8ef37f16fa523fc04736e6e97067cc383087
-
SHA512
2fc1f05e5c47bdf427b4470f44faa05d96e203a597c49789376516fd4a6c24e41f5ed62b744cfa621ba1b236fcf2967c3be6ab09ffeced29f9b1e5d7d80ffc13
-
SSDEEP
3072:G4pKwyPhCjG8G3GbGVGBGfGuGxGWYcrf6Kadk:G4owqAYcD6Kad
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 53 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation kiejaav.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation liaqov.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation daiijub.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation liaqov.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation deoci.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation qdyuir.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation puimees.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation hofey.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation roiihus.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation roiitus.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation feodi.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation wiaguu.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation beodi.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation wdyuis.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation foqex.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation feodi.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation liaguu.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation liaguu.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation qdyuir.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation biafot.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation deoci.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation diofuu.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation koemaar.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation kiejuav.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation liaqot.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation reuus.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation liaqov.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation geavih.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation maiuye.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation zienuu.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation beodi.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation qdyuir.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation leapih.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation svpor.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation cbvois.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation gopul.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation whvois.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation roiitus.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation feodi.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation wgxoin.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation liaqot.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation quric.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation koemaar.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation liaqot.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation keuus.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation qdyuir.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation meookuy.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation svpor.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation nolef.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation vuegaaz.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation 10239debc1afdcb45323f18205524e70_NeikiAnalytics.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation maiuye.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation meootuy.exe -
Executes dropped EXE 53 IoCs
pid Process 2240 maiuye.exe 4200 liaguu.exe 4688 zienuu.exe 4380 kiejaav.exe 5032 wiaguu.exe 2148 cbvois.exe 5008 qdyuir.exe 3604 daiijub.exe 2180 beodi.exe 3912 liaqot.exe 2716 kiejuav.exe 4976 biafot.exe 3600 foqex.exe 4716 deoci.exe 4376 beodi.exe 2848 gopul.exe 1680 puimees.exe 2036 meootuy.exe 3240 qdyuir.exe 2360 wdyuis.exe 1664 whvois.exe 3328 feodi.exe 4304 quric.exe 3376 liaqov.exe 4952 diofuu.exe 3384 leapih.exe 4660 qdyuir.exe 4536 liaqov.exe 4756 roiitus.exe 4476 meookuy.exe 3460 geavih.exe 4496 liaqov.exe 4420 liaqot.exe 436 svpor.exe 3076 hofey.exe 460 svpor.exe 4880 roiitus.exe 3756 feodi.exe 4004 deoci.exe 2328 wgxoin.exe 4960 nolef.exe 1400 reuus.exe 4752 koemaar.exe 5104 liaguu.exe 3340 koemaar.exe 4756 vuegaaz.exe 2352 roiihus.exe 1048 liaqot.exe 1288 feodi.exe 2856 qdyuir.exe 1688 maiuye.exe 3568 keuus.exe 2404 bauuye.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1540 10239debc1afdcb45323f18205524e70_NeikiAnalytics.exe 1540 10239debc1afdcb45323f18205524e70_NeikiAnalytics.exe 2240 maiuye.exe 2240 maiuye.exe 4200 liaguu.exe 4200 liaguu.exe 4688 zienuu.exe 4688 zienuu.exe 4380 kiejaav.exe 4380 kiejaav.exe 5032 wiaguu.exe 5032 wiaguu.exe 2148 cbvois.exe 2148 cbvois.exe 5008 qdyuir.exe 5008 qdyuir.exe 3604 daiijub.exe 3604 daiijub.exe 2180 beodi.exe 2180 beodi.exe 3912 liaqot.exe 3912 liaqot.exe 2716 kiejuav.exe 2716 kiejuav.exe 4976 biafot.exe 4976 biafot.exe 3600 foqex.exe 3600 foqex.exe 4716 deoci.exe 4716 deoci.exe 4376 beodi.exe 4376 beodi.exe 2848 gopul.exe 2848 gopul.exe 1680 puimees.exe 1680 puimees.exe 2036 meootuy.exe 2036 meootuy.exe 3240 qdyuir.exe 3240 qdyuir.exe 2360 wdyuis.exe 2360 wdyuis.exe 1664 whvois.exe 1664 whvois.exe 3328 feodi.exe 3328 feodi.exe 4304 quric.exe 4304 quric.exe 3376 liaqov.exe 3376 liaqov.exe 4952 diofuu.exe 4952 diofuu.exe 3384 leapih.exe 3384 leapih.exe 4660 qdyuir.exe 4660 qdyuir.exe 4536 liaqov.exe 4536 liaqov.exe 4756 roiitus.exe 4756 roiitus.exe 4476 meookuy.exe 4476 meookuy.exe 3460 geavih.exe 3460 geavih.exe -
Suspicious use of SetWindowsHookEx 54 IoCs
pid Process 1540 10239debc1afdcb45323f18205524e70_NeikiAnalytics.exe 2240 maiuye.exe 4200 liaguu.exe 4688 zienuu.exe 4380 kiejaav.exe 5032 wiaguu.exe 2148 cbvois.exe 5008 qdyuir.exe 3604 daiijub.exe 2180 beodi.exe 3912 liaqot.exe 2716 kiejuav.exe 4976 biafot.exe 3600 foqex.exe 4716 deoci.exe 4376 beodi.exe 2848 gopul.exe 1680 puimees.exe 2036 meootuy.exe 3240 qdyuir.exe 2360 wdyuis.exe 1664 whvois.exe 3328 feodi.exe 4304 quric.exe 3376 liaqov.exe 4952 diofuu.exe 3384 leapih.exe 4660 qdyuir.exe 4536 liaqov.exe 4756 roiitus.exe 4476 meookuy.exe 3460 geavih.exe 4496 liaqov.exe 4420 liaqot.exe 436 svpor.exe 3076 hofey.exe 460 svpor.exe 4880 roiitus.exe 3756 feodi.exe 4004 deoci.exe 2328 wgxoin.exe 4960 nolef.exe 1400 reuus.exe 4752 koemaar.exe 5104 liaguu.exe 3340 koemaar.exe 4756 vuegaaz.exe 2352 roiihus.exe 1048 liaqot.exe 1288 feodi.exe 2856 qdyuir.exe 1688 maiuye.exe 3568 keuus.exe 2404 bauuye.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1540 wrote to memory of 2240 1540 10239debc1afdcb45323f18205524e70_NeikiAnalytics.exe 81 PID 1540 wrote to memory of 2240 1540 10239debc1afdcb45323f18205524e70_NeikiAnalytics.exe 81 PID 1540 wrote to memory of 2240 1540 10239debc1afdcb45323f18205524e70_NeikiAnalytics.exe 81 PID 2240 wrote to memory of 4200 2240 maiuye.exe 82 PID 2240 wrote to memory of 4200 2240 maiuye.exe 82 PID 2240 wrote to memory of 4200 2240 maiuye.exe 82 PID 4200 wrote to memory of 4688 4200 liaguu.exe 83 PID 4200 wrote to memory of 4688 4200 liaguu.exe 83 PID 4200 wrote to memory of 4688 4200 liaguu.exe 83 PID 4688 wrote to memory of 4380 4688 zienuu.exe 84 PID 4688 wrote to memory of 4380 4688 zienuu.exe 84 PID 4688 wrote to memory of 4380 4688 zienuu.exe 84 PID 4380 wrote to memory of 5032 4380 kiejaav.exe 85 PID 4380 wrote to memory of 5032 4380 kiejaav.exe 85 PID 4380 wrote to memory of 5032 4380 kiejaav.exe 85 PID 5032 wrote to memory of 2148 5032 wiaguu.exe 86 PID 5032 wrote to memory of 2148 5032 wiaguu.exe 86 PID 5032 wrote to memory of 2148 5032 wiaguu.exe 86 PID 2148 wrote to memory of 5008 2148 cbvois.exe 87 PID 2148 wrote to memory of 5008 2148 cbvois.exe 87 PID 2148 wrote to memory of 5008 2148 cbvois.exe 87 PID 5008 wrote to memory of 3604 5008 qdyuir.exe 88 PID 5008 wrote to memory of 3604 5008 qdyuir.exe 88 PID 5008 wrote to memory of 3604 5008 qdyuir.exe 88 PID 3604 wrote to memory of 2180 3604 daiijub.exe 89 PID 3604 wrote to memory of 2180 3604 daiijub.exe 89 PID 3604 wrote to memory of 2180 3604 daiijub.exe 89 PID 2180 wrote to memory of 3912 2180 beodi.exe 90 PID 2180 wrote to memory of 3912 2180 beodi.exe 90 PID 2180 wrote to memory of 3912 2180 beodi.exe 90 PID 3912 wrote to memory of 2716 3912 liaqot.exe 93 PID 3912 wrote to memory of 2716 3912 liaqot.exe 93 PID 3912 wrote to memory of 2716 3912 liaqot.exe 93 PID 2716 wrote to memory of 4976 2716 kiejuav.exe 94 PID 2716 wrote to memory of 4976 2716 kiejuav.exe 94 PID 2716 wrote to memory of 4976 2716 kiejuav.exe 94 PID 4976 wrote to memory of 3600 4976 biafot.exe 95 PID 4976 wrote to memory of 3600 4976 biafot.exe 95 PID 4976 wrote to memory of 3600 4976 biafot.exe 95 PID 3600 wrote to memory of 4716 3600 foqex.exe 96 PID 3600 wrote to memory of 4716 3600 foqex.exe 96 PID 3600 wrote to memory of 4716 3600 foqex.exe 96 PID 4716 wrote to memory of 4376 4716 deoci.exe 97 PID 4716 wrote to memory of 4376 4716 deoci.exe 97 PID 4716 wrote to memory of 4376 4716 deoci.exe 97 PID 4376 wrote to memory of 2848 4376 beodi.exe 98 PID 4376 wrote to memory of 2848 4376 beodi.exe 98 PID 4376 wrote to memory of 2848 4376 beodi.exe 98 PID 2848 wrote to memory of 1680 2848 gopul.exe 99 PID 2848 wrote to memory of 1680 2848 gopul.exe 99 PID 2848 wrote to memory of 1680 2848 gopul.exe 99 PID 1680 wrote to memory of 2036 1680 puimees.exe 100 PID 1680 wrote to memory of 2036 1680 puimees.exe 100 PID 1680 wrote to memory of 2036 1680 puimees.exe 100 PID 2036 wrote to memory of 3240 2036 meootuy.exe 101 PID 2036 wrote to memory of 3240 2036 meootuy.exe 101 PID 2036 wrote to memory of 3240 2036 meootuy.exe 101 PID 3240 wrote to memory of 2360 3240 qdyuir.exe 102 PID 3240 wrote to memory of 2360 3240 qdyuir.exe 102 PID 3240 wrote to memory of 2360 3240 qdyuir.exe 102 PID 2360 wrote to memory of 1664 2360 wdyuis.exe 103 PID 2360 wrote to memory of 1664 2360 wdyuis.exe 103 PID 2360 wrote to memory of 1664 2360 wdyuis.exe 103 PID 1664 wrote to memory of 3328 1664 whvois.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\10239debc1afdcb45323f18205524e70_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\10239debc1afdcb45323f18205524e70_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Users\Admin\maiuye.exe"C:\Users\Admin\maiuye.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Users\Admin\liaguu.exe"C:\Users\Admin\liaguu.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4200 -
C:\Users\Admin\zienuu.exe"C:\Users\Admin\zienuu.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4688 -
C:\Users\Admin\kiejaav.exe"C:\Users\Admin\kiejaav.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Users\Admin\wiaguu.exe"C:\Users\Admin\wiaguu.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\Users\Admin\cbvois.exe"C:\Users\Admin\cbvois.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Users\Admin\qdyuir.exe"C:\Users\Admin\qdyuir.exe"8⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Users\Admin\daiijub.exe"C:\Users\Admin\daiijub.exe"9⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3604 -
C:\Users\Admin\beodi.exe"C:\Users\Admin\beodi.exe"10⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Users\Admin\liaqot.exe"C:\Users\Admin\liaqot.exe"11⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3912 -
C:\Users\Admin\kiejuav.exe"C:\Users\Admin\kiejuav.exe"12⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Users\Admin\biafot.exe"C:\Users\Admin\biafot.exe"13⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Users\Admin\foqex.exe"C:\Users\Admin\foqex.exe"14⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3600 -
C:\Users\Admin\deoci.exe"C:\Users\Admin\deoci.exe"15⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4716 -
C:\Users\Admin\beodi.exe"C:\Users\Admin\beodi.exe"16⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4376 -
C:\Users\Admin\gopul.exe"C:\Users\Admin\gopul.exe"17⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Users\Admin\puimees.exe"C:\Users\Admin\puimees.exe"18⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Users\Admin\meootuy.exe"C:\Users\Admin\meootuy.exe"19⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Users\Admin\qdyuir.exe"C:\Users\Admin\qdyuir.exe"20⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3240 -
C:\Users\Admin\wdyuis.exe"C:\Users\Admin\wdyuis.exe"21⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Users\Admin\whvois.exe"C:\Users\Admin\whvois.exe"22⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Users\Admin\feodi.exe"C:\Users\Admin\feodi.exe"23⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3328 -
C:\Users\Admin\quric.exe"C:\Users\Admin\quric.exe"24⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4304 -
C:\Users\Admin\liaqov.exe"C:\Users\Admin\liaqov.exe"25⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3376 -
C:\Users\Admin\diofuu.exe"C:\Users\Admin\diofuu.exe"26⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4952 -
C:\Users\Admin\leapih.exe"C:\Users\Admin\leapih.exe"27⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3384 -
C:\Users\Admin\qdyuir.exe"C:\Users\Admin\qdyuir.exe"28⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4660 -
C:\Users\Admin\liaqov.exe"C:\Users\Admin\liaqov.exe"29⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4536 -
C:\Users\Admin\roiitus.exe"C:\Users\Admin\roiitus.exe"30⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4756 -
C:\Users\Admin\meookuy.exe"C:\Users\Admin\meookuy.exe"31⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4476 -
C:\Users\Admin\geavih.exe"C:\Users\Admin\geavih.exe"32⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3460 -
C:\Users\Admin\liaqov.exe"C:\Users\Admin\liaqov.exe"33⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4496 -
C:\Users\Admin\liaqot.exe"C:\Users\Admin\liaqot.exe"34⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4420 -
C:\Users\Admin\svpor.exe"C:\Users\Admin\svpor.exe"35⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:436 -
C:\Users\Admin\hofey.exe"C:\Users\Admin\hofey.exe"36⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3076 -
C:\Users\Admin\svpor.exe"C:\Users\Admin\svpor.exe"37⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:460 -
C:\Users\Admin\roiitus.exe"C:\Users\Admin\roiitus.exe"38⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4880 -
C:\Users\Admin\feodi.exe"C:\Users\Admin\feodi.exe"39⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3756 -
C:\Users\Admin\deoci.exe"C:\Users\Admin\deoci.exe"40⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4004 -
C:\Users\Admin\wgxoin.exe"C:\Users\Admin\wgxoin.exe"41⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2328 -
C:\Users\Admin\nolef.exe"C:\Users\Admin\nolef.exe"42⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4960 -
C:\Users\Admin\reuus.exe"C:\Users\Admin\reuus.exe"43⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1400 -
C:\Users\Admin\koemaar.exe"C:\Users\Admin\koemaar.exe"44⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4752 -
C:\Users\Admin\liaguu.exe"C:\Users\Admin\liaguu.exe"45⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5104 -
C:\Users\Admin\koemaar.exe"C:\Users\Admin\koemaar.exe"46⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3340 -
C:\Users\Admin\vuegaaz.exe"C:\Users\Admin\vuegaaz.exe"47⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4756 -
C:\Users\Admin\roiihus.exe"C:\Users\Admin\roiihus.exe"48⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2352 -
C:\Users\Admin\liaqot.exe"C:\Users\Admin\liaqot.exe"49⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1048 -
C:\Users\Admin\feodi.exe"C:\Users\Admin\feodi.exe"50⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1288 -
C:\Users\Admin\qdyuir.exe"C:\Users\Admin\qdyuir.exe"51⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2856 -
C:\Users\Admin\maiuye.exe"C:\Users\Admin\maiuye.exe"52⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1688 -
C:\Users\Admin\keuus.exe"C:\Users\Admin\keuus.exe"53⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3568 -
C:\Users\Admin\bauuye.exe"C:\Users\Admin\bauuye.exe"54⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2404
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224KB
MD584d3104cb74757fde76ee52322acc581
SHA150b7dca2887034c036bf4b2d7fe288f11cae3c5a
SHA256fb1448e81493564d11f3396cc6d7771a5eab6afd8da38591d55f56a9ca0d28e0
SHA5124a1520d42d6931f0334b5e379a8965078a7eae5ddd8aed7ec82156d2ad1d4787dfdb30f86415bd6067cce511c0b47a1c0fa0f1629236901afa2ad85ae44d7b84
-
Filesize
224KB
MD581e5602606938d0d593d89341f24aceb
SHA156b7df065f4bbb90b668debf03f2f7df197cbdb3
SHA25627e2c0688b2e555f8bd16e276e43ee8fc8eebd4e36e4a0573c6ae1db5a2bd250
SHA512d1bbd9baad46320db62e901f6a020b75c9fe6c1fc24315eb25c227ac8b7e0dce0ca378a4d4867d443800385a05bb30dc88bb5bfbc7aecfb6b8be62ed5e8f66ba
-
Filesize
224KB
MD5dc4057605ce3e4427a447708e9f96a41
SHA1dd20da0af34abb9bccb611c9e5a31ead2206dbfb
SHA256f9d7c310ee03333e75360175fa15d2f2d42718e5a2af1f0b4542bda865d33f9d
SHA51222b8b4e24ca08e7e00b50ca928a8423d6c729cd6765598964149af5210a60fb024089e8479dcc297f48409a0b3790baf80158dbaf97ae75e3fad6572e86e155f
-
Filesize
224KB
MD5a84eb44f7a8f06a97bd94fad8d4c9755
SHA1b13bcd782329c60213797e45045583da18d0a128
SHA256272d369bb60ce2b2cd8ba04e3ccb0899988e968cc486c013f93ecae7908f2d02
SHA51266ae4f8e9521e49c4760ac4f33390d4ac48a4c67b3ecdf1dc09983b800cb339426f26d50dafede93c43d9cd8b74d6fe76748873860b88f4aef4a08ab6691344c
-
Filesize
224KB
MD5c8cdc75702de82a9d7762bed057a0b7b
SHA150fbff049934bbbce5dee0010fbc5fb4f110756f
SHA256d20d56f977f978d4052b0e597872a69a4b431c23fcb32b48a9e56f59030a2f4c
SHA512467a319ac033784c202299ea216a57005d21e80837ef5498011ba343dacdb167865a26af98c32f3eb489bd24ed412c6bc6fd4d6ede716aa22d37060700589e39
-
Filesize
224KB
MD5779bfa52691c4b40bde55ad8585702dc
SHA1e8600f6578932c321ac0a213360958cb813ac009
SHA2560746ae0599a09ceb82c66e2d0e3449547051f83802f51563d1eece59cd2cb95b
SHA51254618f12982332f4edf42cc6077e32bf3d542a8a3d0c2946dcbe38d3b9b9b64df3e40d71d53cfca8c06976196b8e093c886a9e5dda266d41dfc69ef5fa818f07
-
Filesize
224KB
MD5fdd9ac8ba6478fa8e22c1eeaaa3c88df
SHA18c86d15f7192556825a375b469d0d7ff899c36f8
SHA256981fbd8049a723e3fb18f8577674d4f618e50eb9ea79870e04cee8e2758249f9
SHA512533bfa9cc8c076db97ab85fa61cce90125d7f1593d8e7f728ae9ebf6b9286c85bdf3c17b69076fc86c98417ce783b39660da0f3870ab3fb21d3244a71e5958e6
-
Filesize
224KB
MD51f458104fcb50e64b517b4228dba5f67
SHA1e75249995109eea51b5bb2099c03e93b3243bbb3
SHA256caf23cd18e19e97210777a315b1e6f60e9546a7fce69d05a81adaef5878d4c85
SHA5124dd7986759fc81503f8d1c2118304d429ce360dd1eecbd01457606b5421bdcdec374d30e4dcf739ede19e8932d5d2e3826066dbe1c0ce841c3a1ce89d652ef68
-
Filesize
224KB
MD591c7e63699cd39e220f243485b3b595f
SHA14ef1451974584b411b3cef1b8ebdc9bfcd8c1290
SHA256da39a1e5c302b16768ce6104e849d7fa8f7bf127b672c6208f9305805a53eca0
SHA512d148f177036970759d421cd214300e63f22ad4bb71f38562d443982a62a4506afe9414eb107c6b9c119c426da65e804bf49e3847c7385ba487ca6d50002a817c
-
Filesize
224KB
MD53ee9f2cefdeec047c01fd96497105882
SHA11794951cfd9d02a90ea47a102b716691a7ec087c
SHA256cc8e4d24b0b4035aa77d5292e16408fecde90f1865819d9261c52774fc933b94
SHA512e381cee922b7520193e8432b590cd26ea3bc8e23a11211131d087064afeb7bbb5688f56441ffd3ff58d5b587950b0877540b66e034190ba8e57c0b0c3667ea01
-
Filesize
224KB
MD52e1c69c6c65741106937e456a9b1a0a0
SHA1dddd87484eda34738e8afae1f9ec32a6112b9a03
SHA2568871d7efb86135e6c72eac51d6fb52f10d8e522f49879c51e7546ec2b1458d23
SHA51227de320144f0e12a2d7ab0bfa1cb8f61be40edecbd934d0b63e58247841f5e254536f1da6210ebb90086be5d92c81f67cb9e150c190a82c8003e57e258064db7
-
Filesize
224KB
MD5446e427e60345450d5052927b0d9af98
SHA1bffeba8dc047c3178e047fffcb9f182925a49bef
SHA256f4fb101d6f31b5714cb45993470e67d192676a4e24f2b98c26b924592de8dd8f
SHA5127fd280911c1d489520407592bc96d40f0e29b44f2e9764bb08c80ebd1b36202a1b09f3a449797b0073714affc28dc5706fa410970671d9199379dadcd684ebce
-
Filesize
224KB
MD5794bb8282bbddae65bda642e55213fc3
SHA1fdeed980f56e797251a5e6a3475cb12c4080bade
SHA256c530404b27b725f6780f0b39ccafd474ec3e0261d0fb0f4330b4963a9445e1d8
SHA51220370ddd6d018c3392a41563edb9debbe5af7f3d7304e108af4d5bd3ee5281a7486de89acdead76890c73e5721a826190a67cf2eaa08fa3f3bc05d99d5aea113
-
Filesize
224KB
MD570a1c93246bc40ea525223c4a8a07d8f
SHA18047f38a3fff446618f5acf8ea437bee45bd4276
SHA25641f1e4a597251857222caf5936a6509ce87e75de2c1d00dea0eea8f7d1190951
SHA51256cdde0ecbff2afbcce1b2fb02ec7a70b91dd8be645e4001e99168d5ed15fdbff5229cc85e2c8601bce2ac597f6b0152d091718f01d91144f8e2fd515639d749
-
Filesize
224KB
MD5e5961aa97057069641f300769ae68ab7
SHA1318bb260bac76171a94c2ab057d24981fda25219
SHA256a8dfb3eb7bb8e8a5b488d4ae770977af38390ee76534cc53587d21305848a871
SHA512d8eba1cd4d85b13fac48df71f42d2bb63cc4ad548dd3f09994c1326aa0b266dba8f31d83d17b0f4221f3db9ec9f17fdcc8fbb05c3f056bdb8951762356f03805
-
Filesize
224KB
MD5e57e21cfd0ffe4475f7c41ea37793a91
SHA15043d9d89a8e7c9bec1a971c916da69475018af0
SHA25622b284913cb142e23d2a28859f4bdd472acb06f5ee45c47940dbe2b8c9a1189a
SHA512c2efba4b02e9df8caf1d88f2edc665009a24ca3763fc2bc5532bb8234c4fd6c430f8d670f52794e73e5b552293832ff42845be82330080ca5a2554a7b2924667
-
Filesize
224KB
MD546a27cc7bfd5a4937c46cd26c96f291e
SHA148fb263744460d610fd9ea5d1026ecdb2c466726
SHA256ad4e1925bb95f12833408341090674bcb951b231af6612743450e8bfe175909d
SHA5128684c05d4ff9bc39edb62585e00ff3219682a19d5c7dfad90f6efb011ec4bff64df22f76f853e247cf49d593951c8c7d316b697f8ef623a799b7c3ca88c8f06f
-
Filesize
224KB
MD514fbb3d5e4c107adbe421845692ce1d8
SHA184b69cec5dc4d28771235ba830695d8df1db67a5
SHA256db29dca317a25523cf95b82c480bc5d5bdbc4d5e3736c3bfcd62f6ec33beb2e1
SHA512a95b02279fca3f4651ae72238068ecee823ba754df039bd9a9d2d589b455b0aefee82ae2804b91056316fe055a8f59684624cfb732aecd27dc28ac42395ce3a1
-
Filesize
224KB
MD5cc32ba6eda14488a01bdccdf91e778df
SHA1dc29452b55005d97e82632bc627433f5951a3ed3
SHA25607486efa649a9d06b0068bfc7e25495f47b4610df2c21c50fb08534e732c6717
SHA51233aa67fa1cf86ec1165428312909b9520859bc9b0e2624c60fa4145612257636e8567a48a2bbc79e60305255ba6f33424531bc4142f147cdd4f5ba990141ef97
-
Filesize
224KB
MD5e2857eb58c3625c36b19c32f1343ecc8
SHA1ff24926135965c410f28a66727e68f796abc81b9
SHA2568e1e464cc957aec7dec4151e2f6bd3b1b26653525ff7c8b3f2931ee45bb6d237
SHA512c910b93d2c122504ca465691bb9580f89bfd6a47550c0c3b40e96ae286c8503a2320f6391a35e6b8b515a34b7ec95ac7a5c583fea9d6ff516f7220a29887a4f8
-
Filesize
224KB
MD50900024d87dc8cd378660ba67fe18531
SHA18006c37c0b2c6e220376a236a2437739df31ed3b
SHA25649b80b0bdbde40fa057e5d3ed13962725a5767e223b0ef0de6f677fba9c48042
SHA512fbd9bf2883c0da9d7e75279b2260bcbee10b51989a2adfb0d90dfced3a9f871613facd989e12f6d52a27d486d8220ccd959b9c5f5d3b1f4cf002fc53e37036e6
-
Filesize
224KB
MD5e0fbd8b2ab06479af19e263a986cf8bc
SHA12b7c2be9ba59b9d3bd43d3dd6bd10b419a91425d
SHA256f7c5eb31ad8390ba985e7e9b2cf880aa84480738f4b74a57d6bfa9633d03a122
SHA5120a722bac45389981b15e1a804c07f9cf63dc0085964f86cc8db52c2be540599ede52c917fc0135f49ed6da1d2332d2167a9c5729e8e3512efbfc6cd3e9033048
-
Filesize
224KB
MD5692b95b6666d8f2d3713db11369cba61
SHA15bae359d66e47e13fe49ad405c358dda656a53d7
SHA256c9f3b0af78f44c9c08802a9db9710c92e6b50b88acbdeee4085950fbb369375d
SHA5129c2f2643c8e331bf514f8fb0c4a32962b1f482122c5ec4d716dfe018191b17e802f59d988e238210b739c2d574992cb8256d2fa16acb53347850ad730f070db8
-
Filesize
224KB
MD5e8daa1fb21aa5cac8800d1b3388924f4
SHA1aff8bcef5645993446e5a7b04493ddc137f1725f
SHA25642d6c62b7a13a992ddceb94f47d55cd13a24c1fcde78d83aac6823fbb69520c3
SHA512bfeb521be7d38dc17845d9c2b98913fcd23c738596c6fdd08857be4e98a5bd36fbc393022f979f3de53aab0debd24f86d1dd0111e5bcd087b26075c864471f18
-
Filesize
224KB
MD553243d970d13b666203baf793a991f96
SHA17287607398e21f9417f5a22bb24a25b931cd18b3
SHA256795d3769c0ba9f5c41603d5aeaf171ce5b7a57543f0591703414ed4493d158a3
SHA51215afce1681775bb80a5115911c5fec5acc74d4a4dce8d8c70039103403e9f934f72317478d102fa533ca5865b168c1223b7b8c644f769e1d2aba0e0993b09963
-
Filesize
224KB
MD516b50b3add17304467df6543bdf33836
SHA16c594ce5ad76befa21cf25fa1294ec96c23e77fc
SHA2566d68c28840c524b74ab89fce75535d5e99c2f8759ebc375651f0c04cb2e142aa
SHA512b53f45c31a03efcb0336e0f9b80a4d3de3619b98f4cb71b31046869a09f109df95ac1bc53bea5b3614047b94fcecb46a75fa099184bdff05c25b241ee9d0e328
-
Filesize
224KB
MD5b4c6787d0a611cf1c2492fd30af0b3fc
SHA15a3189452b980f3471d262a58c50962a623e365d
SHA2569f6328fee806ec6af1015827b32fc77ae1ef4f12af6a4e9a0d50c3353c8fbc10
SHA5122b235d6fe23d9da737031b8c500cc5dce0b582391168dbbac687aa72c32a1748248f21c12db73e05c7b9fd03fc1627a86c5b6a0bed2620a16a5d82f0de5d4e15
-
Filesize
224KB
MD5828b33aa7863ecf5305778329dc7cd5e
SHA198eb4b0c128995cd2b70cd49dd714072595fc9e8
SHA256f31802ca18ab091fffa672db5bd5d6d827b6e9de1ec1ab4a761e7566d0482240
SHA512db160ab36c5380d3f6a33911d29f9b1175b66f8315d00833cff0e37a2f828c3ee141d759d40e6ec3ea637bc01bf1df6f2069e4edb1eeae57e9e87f69f4c16c53
-
Filesize
224KB
MD5fcb4bbebd6f420b8b46d1d42ebfdebd6
SHA14c5376d60626647cc3f388dcb4d4326a33bc3ce9
SHA256290973e523cf98e200c1c9005cc605a63c515363d40d95afe884d6d6e3709643
SHA512674bf07bef847ba89de440fa1f2522c4d3f4dd8099c9ff23ef45dc22525dfe47c1e699f138a96918940a08b52167c06d1f1f973f7cca45d62c48268d53b6e4f5