Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15-05-2024 19:54
Static task
static1
Behavioral task
behavioral1
Sample
2563be922867d94e2722a26d3cbb02c0_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2563be922867d94e2722a26d3cbb02c0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
2563be922867d94e2722a26d3cbb02c0_NeikiAnalytics.exe
-
Size
124KB
-
MD5
2563be922867d94e2722a26d3cbb02c0
-
SHA1
84abafd2ffa91e8903524bc80a7ee590d1ae179c
-
SHA256
50c997fd2cc2eee8389af74135c2e59703f9d3c0af459bca028b7f01fdbfe5fd
-
SHA512
1cf9e5bc20f093954a6e34879ed2222773f3156d77aa1d79f0bae68270a918f25fbfb7dbe740e760594fedfcc514fa5cbefc79ed7eeb01b2f1e679b23b3ccb83
-
SSDEEP
1536:HsszN5YLZPhRO/N69BH3OoGa+FL9jKceRgrkjSo:MGbYlhkFoN3Oo1+F92S
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 41 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" kbkoeb.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" zeoam.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" raaiyud.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" kxraew.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" zihix.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" leaun.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" jouacu.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" hlyos.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" daeus.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" jioxen.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" vkyoar.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" kuiug.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" jeogius.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" gatid.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" zfheel.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" jzmaf.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" heobui.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" quamaiw.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ruuzuoh.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" maojee.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" xefur.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 2563be922867d94e2722a26d3cbb02c0_NeikiAnalytics.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ndziz.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" suiaxaf.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" raean.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" dafij.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" hibug.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" faabas.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" kiejak.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" foeyob.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" yeepoe.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" huaote.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" hauaga.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" guipav.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" woaal.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" bpdaef.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" voekie.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" doeoxi.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" raaen.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" koootay.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" fiifis.exe -
Checks computer location settings 2 TTPs 42 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation yeepoe.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation daeus.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation kuiug.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation jeogius.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation woaal.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation kbkoeb.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation suiaxaf.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation faabas.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation kxraew.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation zfheel.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation foeyob.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation bpdaef.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation heobui.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation xefur.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation fiifis.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation nlkiif.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation raaen.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation ndziz.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation dafij.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation hibug.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation guipav.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation voekie.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation vkyoar.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation gatid.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation 2563be922867d94e2722a26d3cbb02c0_NeikiAnalytics.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation huaote.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation koootay.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation kiejak.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation leaun.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation maojee.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation hlyos.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation hauaga.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation jioxen.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation doeoxi.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation zihix.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation quamaiw.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation ruuzuoh.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation raaiyud.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation jouacu.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation jzmaf.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation zeoam.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation raean.exe -
Executes dropped EXE 41 IoCs
pid Process 1960 yeepoe.exe 2448 jzmaf.exe 1428 bpdaef.exe 4040 raaen.exe 2724 kbkoeb.exe 1492 zeoam.exe 1720 ndziz.exe 4492 heobui.exe 1100 quamaiw.exe 5108 huaote.exe 2968 dafij.exe 912 koootay.exe 3660 suiaxaf.exe 664 hibug.exe 3724 hlyos.exe 1940 faabas.exe 3244 ruuzuoh.exe 2716 hauaga.exe 968 kiejak.exe 2748 guipav.exe 2372 raaiyud.exe 2144 daeus.exe 1236 voekie.exe 224 jioxen.exe 4648 kxraew.exe 1380 raean.exe 1680 vkyoar.exe 5020 kuiug.exe 4736 jeogius.exe 3876 doeoxi.exe 744 woaal.exe 3020 leaun.exe 3024 maojee.exe 2496 jouacu.exe 2328 xefur.exe 4592 zihix.exe 3132 gatid.exe 4796 zfheel.exe 1488 fiifis.exe 1792 foeyob.exe 372 nlkiif.exe -
Adds Run key to start application 2 TTPs 41 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fiifis = "C:\\Users\\Admin\\fiifis.exe /k" zfheel.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kbkoeb = "C:\\Users\\Admin\\kbkoeb.exe /f" raaen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\faabas = "C:\\Users\\Admin\\faabas.exe /Q" hlyos.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voekie = "C:\\Users\\Admin\\voekie.exe /Q" daeus.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kxraew = "C:\\Users\\Admin\\kxraew.exe /Z" jioxen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\leaun = "C:\\Users\\Admin\\leaun.exe /i" woaal.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zfheel = "C:\\Users\\Admin\\zfheel.exe /r" gatid.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bpdaef = "C:\\Users\\Admin\\bpdaef.exe /H" jzmaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\raaen = "C:\\Users\\Admin\\raaen.exe /L" bpdaef.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hlyos = "C:\\Users\\Admin\\hlyos.exe /B" hibug.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kuiug = "C:\\Users\\Admin\\kuiug.exe /P" vkyoar.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\doeoxi = "C:\\Users\\Admin\\doeoxi.exe /C" jeogius.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ndziz = "C:\\Users\\Admin\\ndziz.exe /O" zeoam.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dafij = "C:\\Users\\Admin\\dafij.exe /k" huaote.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\guipav = "C:\\Users\\Admin\\guipav.exe /T" kiejak.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\daeus = "C:\\Users\\Admin\\daeus.exe /A" raaiyud.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maojee = "C:\\Users\\Admin\\maojee.exe /E" leaun.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kiejak = "C:\\Users\\Admin\\kiejak.exe /e" hauaga.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zihix = "C:\\Users\\Admin\\zihix.exe /E" xefur.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yeepoe = "C:\\Users\\Admin\\yeepoe.exe /T" 2563be922867d94e2722a26d3cbb02c0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heobui = "C:\\Users\\Admin\\heobui.exe /c" ndziz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woaal = "C:\\Users\\Admin\\woaal.exe /M" doeoxi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xefur = "C:\\Users\\Admin\\xefur.exe /z" jouacu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gatid = "C:\\Users\\Admin\\gatid.exe /E" zihix.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jioxen = "C:\\Users\\Admin\\jioxen.exe /N" voekie.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vkyoar = "C:\\Users\\Admin\\vkyoar.exe /w" raean.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jzmaf = "C:\\Users\\Admin\\jzmaf.exe /K" yeepoe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zeoam = "C:\\Users\\Admin\\zeoam.exe /A" kbkoeb.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\huaote = "C:\\Users\\Admin\\huaote.exe /i" quamaiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hibug = "C:\\Users\\Admin\\hibug.exe /J" suiaxaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ruuzuoh = "C:\\Users\\Admin\\ruuzuoh.exe /u" faabas.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\raaiyud = "C:\\Users\\Admin\\raaiyud.exe /L" guipav.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\foeyob = "C:\\Users\\Admin\\foeyob.exe /T" fiifis.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jouacu = "C:\\Users\\Admin\\jouacu.exe /l" maojee.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nlkiif = "C:\\Users\\Admin\\nlkiif.exe /N" foeyob.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\quamaiw = "C:\\Users\\Admin\\quamaiw.exe /g" heobui.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\koootay = "C:\\Users\\Admin\\koootay.exe /V" dafij.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\suiaxaf = "C:\\Users\\Admin\\suiaxaf.exe /l" koootay.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hauaga = "C:\\Users\\Admin\\hauaga.exe /N" ruuzuoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\raean = "C:\\Users\\Admin\\raean.exe /U" kxraew.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeogius = "C:\\Users\\Admin\\jeogius.exe /f" kuiug.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4300 2563be922867d94e2722a26d3cbb02c0_NeikiAnalytics.exe 4300 2563be922867d94e2722a26d3cbb02c0_NeikiAnalytics.exe 1960 yeepoe.exe 1960 yeepoe.exe 2448 jzmaf.exe 2448 jzmaf.exe 1428 bpdaef.exe 1428 bpdaef.exe 4040 raaen.exe 4040 raaen.exe 2724 kbkoeb.exe 2724 kbkoeb.exe 1492 zeoam.exe 1492 zeoam.exe 1720 ndziz.exe 1720 ndziz.exe 4492 heobui.exe 4492 heobui.exe 1100 quamaiw.exe 1100 quamaiw.exe 5108 huaote.exe 5108 huaote.exe 2968 dafij.exe 2968 dafij.exe 912 koootay.exe 912 koootay.exe 3660 suiaxaf.exe 3660 suiaxaf.exe 664 hibug.exe 664 hibug.exe 3724 hlyos.exe 3724 hlyos.exe 1940 faabas.exe 1940 faabas.exe 3244 ruuzuoh.exe 3244 ruuzuoh.exe 2716 hauaga.exe 2716 hauaga.exe 968 kiejak.exe 968 kiejak.exe 2748 guipav.exe 2748 guipav.exe 2372 raaiyud.exe 2372 raaiyud.exe 2144 daeus.exe 2144 daeus.exe 1236 voekie.exe 1236 voekie.exe 224 jioxen.exe 224 jioxen.exe 4648 kxraew.exe 4648 kxraew.exe 1380 raean.exe 1380 raean.exe 1680 vkyoar.exe 1680 vkyoar.exe 5020 kuiug.exe 5020 kuiug.exe 4736 jeogius.exe 4736 jeogius.exe 3876 doeoxi.exe 3876 doeoxi.exe 744 woaal.exe 744 woaal.exe -
Suspicious use of SetWindowsHookEx 42 IoCs
pid Process 4300 2563be922867d94e2722a26d3cbb02c0_NeikiAnalytics.exe 1960 yeepoe.exe 2448 jzmaf.exe 1428 bpdaef.exe 4040 raaen.exe 2724 kbkoeb.exe 1492 zeoam.exe 1720 ndziz.exe 4492 heobui.exe 1100 quamaiw.exe 5108 huaote.exe 2968 dafij.exe 912 koootay.exe 3660 suiaxaf.exe 664 hibug.exe 3724 hlyos.exe 1940 faabas.exe 3244 ruuzuoh.exe 2716 hauaga.exe 968 kiejak.exe 2748 guipav.exe 2372 raaiyud.exe 2144 daeus.exe 1236 voekie.exe 224 jioxen.exe 4648 kxraew.exe 1380 raean.exe 1680 vkyoar.exe 5020 kuiug.exe 4736 jeogius.exe 3876 doeoxi.exe 744 woaal.exe 3020 leaun.exe 3024 maojee.exe 2496 jouacu.exe 2328 xefur.exe 4592 zihix.exe 3132 gatid.exe 4796 zfheel.exe 1488 fiifis.exe 1792 foeyob.exe 372 nlkiif.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4300 wrote to memory of 1960 4300 2563be922867d94e2722a26d3cbb02c0_NeikiAnalytics.exe 91 PID 4300 wrote to memory of 1960 4300 2563be922867d94e2722a26d3cbb02c0_NeikiAnalytics.exe 91 PID 4300 wrote to memory of 1960 4300 2563be922867d94e2722a26d3cbb02c0_NeikiAnalytics.exe 91 PID 1960 wrote to memory of 2448 1960 yeepoe.exe 94 PID 1960 wrote to memory of 2448 1960 yeepoe.exe 94 PID 1960 wrote to memory of 2448 1960 yeepoe.exe 94 PID 2448 wrote to memory of 1428 2448 jzmaf.exe 96 PID 2448 wrote to memory of 1428 2448 jzmaf.exe 96 PID 2448 wrote to memory of 1428 2448 jzmaf.exe 96 PID 1428 wrote to memory of 4040 1428 bpdaef.exe 98 PID 1428 wrote to memory of 4040 1428 bpdaef.exe 98 PID 1428 wrote to memory of 4040 1428 bpdaef.exe 98 PID 4040 wrote to memory of 2724 4040 raaen.exe 99 PID 4040 wrote to memory of 2724 4040 raaen.exe 99 PID 4040 wrote to memory of 2724 4040 raaen.exe 99 PID 2724 wrote to memory of 1492 2724 kbkoeb.exe 100 PID 2724 wrote to memory of 1492 2724 kbkoeb.exe 100 PID 2724 wrote to memory of 1492 2724 kbkoeb.exe 100 PID 1492 wrote to memory of 1720 1492 zeoam.exe 101 PID 1492 wrote to memory of 1720 1492 zeoam.exe 101 PID 1492 wrote to memory of 1720 1492 zeoam.exe 101 PID 1720 wrote to memory of 4492 1720 ndziz.exe 102 PID 1720 wrote to memory of 4492 1720 ndziz.exe 102 PID 1720 wrote to memory of 4492 1720 ndziz.exe 102 PID 4492 wrote to memory of 1100 4492 heobui.exe 104 PID 4492 wrote to memory of 1100 4492 heobui.exe 104 PID 4492 wrote to memory of 1100 4492 heobui.exe 104 PID 1100 wrote to memory of 5108 1100 quamaiw.exe 106 PID 1100 wrote to memory of 5108 1100 quamaiw.exe 106 PID 1100 wrote to memory of 5108 1100 quamaiw.exe 106 PID 5108 wrote to memory of 2968 5108 huaote.exe 107 PID 5108 wrote to memory of 2968 5108 huaote.exe 107 PID 5108 wrote to memory of 2968 5108 huaote.exe 107 PID 2968 wrote to memory of 912 2968 dafij.exe 108 PID 2968 wrote to memory of 912 2968 dafij.exe 108 PID 2968 wrote to memory of 912 2968 dafij.exe 108 PID 912 wrote to memory of 3660 912 koootay.exe 109 PID 912 wrote to memory of 3660 912 koootay.exe 109 PID 912 wrote to memory of 3660 912 koootay.exe 109 PID 3660 wrote to memory of 664 3660 suiaxaf.exe 110 PID 3660 wrote to memory of 664 3660 suiaxaf.exe 110 PID 3660 wrote to memory of 664 3660 suiaxaf.exe 110 PID 664 wrote to memory of 3724 664 hibug.exe 111 PID 664 wrote to memory of 3724 664 hibug.exe 111 PID 664 wrote to memory of 3724 664 hibug.exe 111 PID 3724 wrote to memory of 1940 3724 hlyos.exe 112 PID 3724 wrote to memory of 1940 3724 hlyos.exe 112 PID 3724 wrote to memory of 1940 3724 hlyos.exe 112 PID 1940 wrote to memory of 3244 1940 faabas.exe 113 PID 1940 wrote to memory of 3244 1940 faabas.exe 113 PID 1940 wrote to memory of 3244 1940 faabas.exe 113 PID 3244 wrote to memory of 2716 3244 ruuzuoh.exe 114 PID 3244 wrote to memory of 2716 3244 ruuzuoh.exe 114 PID 3244 wrote to memory of 2716 3244 ruuzuoh.exe 114 PID 2716 wrote to memory of 968 2716 hauaga.exe 116 PID 2716 wrote to memory of 968 2716 hauaga.exe 116 PID 2716 wrote to memory of 968 2716 hauaga.exe 116 PID 968 wrote to memory of 2748 968 kiejak.exe 117 PID 968 wrote to memory of 2748 968 kiejak.exe 117 PID 968 wrote to memory of 2748 968 kiejak.exe 117 PID 2748 wrote to memory of 2372 2748 guipav.exe 118 PID 2748 wrote to memory of 2372 2748 guipav.exe 118 PID 2748 wrote to memory of 2372 2748 guipav.exe 118 PID 2372 wrote to memory of 2144 2372 raaiyud.exe 119
Processes
-
C:\Users\Admin\AppData\Local\Temp\2563be922867d94e2722a26d3cbb02c0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\2563be922867d94e2722a26d3cbb02c0_NeikiAnalytics.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4300 -
C:\Users\Admin\yeepoe.exe"C:\Users\Admin\yeepoe.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Users\Admin\jzmaf.exe"C:\Users\Admin\jzmaf.exe"3⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Users\Admin\bpdaef.exe"C:\Users\Admin\bpdaef.exe"4⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Users\Admin\raaen.exe"C:\Users\Admin\raaen.exe"5⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4040 -
C:\Users\Admin\kbkoeb.exe"C:\Users\Admin\kbkoeb.exe"6⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Users\Admin\zeoam.exe"C:\Users\Admin\zeoam.exe"7⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Users\Admin\ndziz.exe"C:\Users\Admin\ndziz.exe"8⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Users\Admin\heobui.exe"C:\Users\Admin\heobui.exe"9⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4492 -
C:\Users\Admin\quamaiw.exe"C:\Users\Admin\quamaiw.exe"10⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Users\Admin\huaote.exe"C:\Users\Admin\huaote.exe"11⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Users\Admin\dafij.exe"C:\Users\Admin\dafij.exe"12⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Users\Admin\koootay.exe"C:\Users\Admin\koootay.exe"13⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:912 -
C:\Users\Admin\suiaxaf.exe"C:\Users\Admin\suiaxaf.exe"14⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3660 -
C:\Users\Admin\hibug.exe"C:\Users\Admin\hibug.exe"15⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:664 -
C:\Users\Admin\hlyos.exe"C:\Users\Admin\hlyos.exe"16⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3724 -
C:\Users\Admin\faabas.exe"C:\Users\Admin\faabas.exe"17⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Users\Admin\ruuzuoh.exe"C:\Users\Admin\ruuzuoh.exe"18⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3244 -
C:\Users\Admin\hauaga.exe"C:\Users\Admin\hauaga.exe"19⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Users\Admin\kiejak.exe"C:\Users\Admin\kiejak.exe"20⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:968 -
C:\Users\Admin\guipav.exe"C:\Users\Admin\guipav.exe"21⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Users\Admin\raaiyud.exe"C:\Users\Admin\raaiyud.exe"22⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Users\Admin\daeus.exe"C:\Users\Admin\daeus.exe"23⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2144 -
C:\Users\Admin\voekie.exe"C:\Users\Admin\voekie.exe"24⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1236 -
C:\Users\Admin\jioxen.exe"C:\Users\Admin\jioxen.exe"25⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:224 -
C:\Users\Admin\kxraew.exe"C:\Users\Admin\kxraew.exe"26⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4648 -
C:\Users\Admin\raean.exe"C:\Users\Admin\raean.exe"27⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1380 -
C:\Users\Admin\vkyoar.exe"C:\Users\Admin\vkyoar.exe"28⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1680 -
C:\Users\Admin\kuiug.exe"C:\Users\Admin\kuiug.exe"29⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5020 -
C:\Users\Admin\jeogius.exe"C:\Users\Admin\jeogius.exe"30⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4736 -
C:\Users\Admin\doeoxi.exe"C:\Users\Admin\doeoxi.exe"31⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3876 -
C:\Users\Admin\woaal.exe"C:\Users\Admin\woaal.exe"32⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:744 -
C:\Users\Admin\leaun.exe"C:\Users\Admin\leaun.exe"33⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:3020 -
C:\Users\Admin\maojee.exe"C:\Users\Admin\maojee.exe"34⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:3024 -
C:\Users\Admin\jouacu.exe"C:\Users\Admin\jouacu.exe"35⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:2496 -
C:\Users\Admin\xefur.exe"C:\Users\Admin\xefur.exe"36⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:2328 -
C:\Users\Admin\zihix.exe"C:\Users\Admin\zihix.exe"37⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:4592 -
C:\Users\Admin\gatid.exe"C:\Users\Admin\gatid.exe"38⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:3132 -
C:\Users\Admin\zfheel.exe"C:\Users\Admin\zfheel.exe"39⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:4796 -
C:\Users\Admin\fiifis.exe"C:\Users\Admin\fiifis.exe"40⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:1488 -
C:\Users\Admin\foeyob.exe"C:\Users\Admin\foeyob.exe"41⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:1792 -
C:\Users\Admin\nlkiif.exe"C:\Users\Admin\nlkiif.exe"42⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:372 -
C:\Users\Admin\zkdud.exe"C:\Users\Admin\zkdud.exe"43⤵PID:5096
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
124KB
MD54e12d735dba4cabffb694a46f3e06027
SHA1e3c33fdbbefe35500ab3c0392353ba385eef892a
SHA256a61a27bf412d18d85fcfd7206d7d51ad6aaada209798184fb83cf126acf48f95
SHA512a4f3d591f31b52c792526a382e41f9a0fae7df476c959c2c2c0be6e4f675ca7a5669aa34c137d7f6d16da9956c5fff6fff1a3c065bb096cdd80ef5c9ae5d94e0
-
Filesize
124KB
MD50598e03bfe3386ed6652dfc503172893
SHA176b5c44d592482fcbe68cfc9423a0e4b224ebdec
SHA2562bfff963d92ef7152dbd5b27c39be2a0918a1244400a28c1f624e3ff8a3ee191
SHA51234681d66769e4796c699a1c487a2fe95a54abebcc133fb93b19fc7c983a86c8fddd86ae1d9514e4cdd652b3d67df5aea1704e51022256a1c8508042d005a0299
-
Filesize
124KB
MD5dc418abf452303775480f390713c449a
SHA1b40d0ba433485e9c0bf9fef3db8a511e8fcf681c
SHA256bfd01b9ad344baaf5db2fe0ca75d9924566b8378e80f07722b83bc3dfbf88d86
SHA512433ac4c1c9f1816e97fcbe8ee59527d5884b975f40ccf5b01a7af3ad64f545b6a243f6a9b943348c12587494bdb95177d06fd5166b97e57da371cf95c22766bc
-
Filesize
124KB
MD5709851a87bfe8c0eb5c3d86bb8bc3566
SHA171f980511690f25e0a2fb5a63ba47cf1ecb7b357
SHA256d4869ea5db56eb8bc2ac45769835f4a9e0a4e6f82978f9fe080daaf192780428
SHA5127d6c0c1d907862f4c8b5a148a7686a844159ca9f71d12dc2f0325328e396385c9b730c5bd8b55b14b30fd2179e0915763f0657f076cc71d02054278904d95571
-
Filesize
124KB
MD5b4061968fa59f4a4766b9eac4c006446
SHA13639e284f1f123e57ec23e5f139c130ac2b67c25
SHA25612c07761f61ebdd0353cc4e507a3c077fe964c0914abd7e594df74cb70ea7e09
SHA51202963477a7a9cf15a76e1c1cb7bb0458d483c28a5d8ce5d47994d8bac0bc80a6856179e8aec09d4321583ffdfcd8049cbfe2e95588fefa53124a52dfc4c1ce1f
-
Filesize
124KB
MD53ddf8605626f60c2e6c80dece2e0a2c3
SHA142a7096d23e4cee165f3d09c59e908723aa3ea3a
SHA256d23ceb68c2f963cf3a248945fddfe48c412e6943dd68728b6ad71ade5dc69e8a
SHA5121ab168eea6b3b96036fcf8f54c9ad67f76b75181702037ae6fc8e7d09990471b2fccd9bf8c81505bd67f1a244484616faef23cf6d67f2416959991f63dff2aba
-
Filesize
124KB
MD59f19f2115714ef54399dd70dca730a10
SHA1b386d07661e303e710490e33dbf7fefbc3e35e4c
SHA256e8cc11df142773c7b09ea110f867cc707c3100db211b394754ce12d10d920d6b
SHA512033619cdc86752858075b593b65e649cf5af6fd6968ac75ed54491129bfc7e034c05e80cab1ea2f7ca082b7b1ecb0ee8917d157cf8d7ce7ce317d7d2475d0644
-
Filesize
124KB
MD5a322070af17c9bca8fba137bf5dea842
SHA1f4718e4b4dcedf2bb77447eb22d00a812355721e
SHA256fe38ae5176e9637c6f7dbb9873532f7e931ab5fc4a9bbd968d3ac4e91dbd72c0
SHA512b943c31c9bc11fff15a01f44ee4be686767a8d987164a86f805ab2a291457e68c614ea9d1fdbca6fdd1df2f99e2f1caeee54f138eff448a24b23335002ec95a2
-
Filesize
124KB
MD59f585f0f16eb3470632015c7f81f6379
SHA1eed1f44fb0d126bccd42de9daca3f04b6ba806ab
SHA25651a982cf44cd269d1ff499c8e888ec89eafc548ceff16072d460cb9018001dd5
SHA5123d5a94c4c1ae4acf84f2d19729f42d8ca9956f809d26a9523ed82dd78f39f0f00123a6a970b619402b5e90fa77b40e306fb8263dec2a0f7c5f09abc3595bcb1b
-
Filesize
124KB
MD5424ca0b77ff94a05825584a85e8b33e1
SHA103029d4b64e73042d7d283924ab1bb9bf0946c54
SHA256e4b40fe68d3d96f339b1297de8bce94b3f5ead0d39e03e4dfc6d3fa50be0cf88
SHA512889ebb44aebadcfc947d32009d7ac2e6389bfc3fe4329e9db0868899bcacbcf323ed1852d40472a3a496a4a29e4fe135d54a47cd99cdb95557e21b9227feb1e4
-
Filesize
124KB
MD58ece1279baadfc651f66161f0ac84ba7
SHA14aa36a0ced4a30f00b06ace8e82307b311403c82
SHA25619718c6b3a8af90fdbacdc838cf93d8258d399b2b0e1331cdc07358249039888
SHA51253bfb4d8de84b910dd495d6b2fe27eadba285a7c0f5094ddc20b2b9d26cf4f616c6026d4b214347074f874ab3232ca615f597cd279d98de55311775902f2c14f
-
Filesize
124KB
MD590fdeb3c271af1a42e45aab7b1f3774d
SHA19198e892c0bfe84531d03a9ff3d55c6a703a7545
SHA25632371954ad24f7d4be22f29c4197e86500a8ce12754d97cf6127a69748a58d34
SHA51254cc6bfc6c4c9801b94cd17f353700de795659de08eb034954a0c7489290c3df3558929a1057dea07ee674432486c926fea64e3ff5a4b85d04653e622fecee3a
-
Filesize
124KB
MD5198473ef55d36df2ad2ebb2612d341d7
SHA1bbe9dc94d1321b2ee3482075a49833cb59626973
SHA256db61e8f644c2b90178da58a0fcc6bf211a359d6ac86ccbc001cb9ad59032e5ff
SHA512aca4f0ced5a13f2fce8c4f600da79cc4e1b7cc759009e95cde3b3e2654463e446e8c1551266ba631cd0bdc138830a337bbd83253bf13a4909a0aa09052c05fc1
-
Filesize
124KB
MD54fc23d3271e0fcc7e9229d3f2e72c0f5
SHA10b8974e8c912fe2e4767a80b42f9d8d9400c9a3e
SHA2566aa8e50bacb18e09442f86801f3844d7a6d18e1b425cfc933e364ae592c6aa13
SHA51247eecc55a40f55a9639648dfe9f7f5679811e408a16437a10c054df6acd5ffb32cee22a17858e41de6797d8934e70a9e3d08004eb842148857d7da05f6d5394c
-
Filesize
124KB
MD5eb21e36dfaa96fa6256aecfda0fa9d8b
SHA16b2e64ae7ddfc153a90a6a549f46664dd0905757
SHA256147885c7c69c9e2cf778d2cd69788cadd11d9b5f6dc13486bbe784138da30f3f
SHA5127fa681ef09131c1103d1d6133f69c9aa6ab49444771f76a7002146ef1dec7ec9a64eaa6a7c37c03554c399d831989370053c1f0ae6d7889b75418726323982d3
-
Filesize
124KB
MD585791b3a78d0e5824f3fb6d035137fb0
SHA1c83ccbf9eedac5018a35be52f06c88d328cd22b2
SHA256e26162127cdd1c4467cd0ce3f420df1ed6aa68c825a744fe59ca79f0ecb8f62f
SHA5128089f1eb09917f741f5a2c2adc66fd9788204374b24a7d8686f88e29c6d918313c47616ef14bcddd74181fd3cd113399e7874548479fb94f0d0b696de94e4678
-
Filesize
124KB
MD5d3290ff379be8a8d33bed48a379fb647
SHA1375b01a431b150f298ee013575ce36da63443bc7
SHA2565f160549fb0a46ace553730a343a494c66ccdf4e7b205d4a374e7882fc5d4e52
SHA512e95b59db64a3b3fd0d2bc23554aefebfb84cb79b80be3f436e70eeeb43f509413ddc53644ab82aa300f60dec1848fd51a1321222706c228a98ecf7f7f54a1623
-
Filesize
124KB
MD54c3993f96d008dfac9be022b90460d1a
SHA148c410ff36984c8ada185d2a6b34b41d04610da5
SHA256d929c67db20c388d45587ed2f16987414455e8c91bf036a82f193216b7c78e92
SHA51226dfdebb363ec3b31aeaf496e1822bbf74841fb66ac3c9cca40c20e8a572a2d0fcef36a9bfca52077281c3e9fa3259c29f4483d9862304e150ee9d9d5f37047b
-
Filesize
124KB
MD513748b980203aad3ea2dc9ac744e94f4
SHA18a25fcddbd7c406ae3839a2313798d9a864b5476
SHA256c6fa046a9cce55a5826a8dc2c89f042a1b6043486871d7b262b8a8e2670518ab
SHA5125ab3c2e6d95973af635d3d72c5cebd85c71ca5e871ec085bb8d248c23ece4ccdf22f57305e459240c4a5a36c853aef38c714c4bc0e027fe5913fcd91e09a34bf
-
Filesize
124KB
MD5bf68dda5feaf7070fea5714c0adc15a7
SHA1ec4d8d3ae002e19115e333528d1bb6f4447ea2f1
SHA2564490acb8c2521fd320debc44fe714b7b9611737a610ef3c5d5470271a4f78983
SHA5123732f3349e1d505041d658a1a25191c8072a5a58bc3d1150a15d16f87ab715b345d26f4bcc432917273b194e66e6ac494d57b2a6c7944249e2ef7fa199056ece
-
Filesize
124KB
MD500b32de157fec91b2201b69512d4b418
SHA10971a4e103560b7857c0e047e06c4f15b4c07dd3
SHA256cbc7dcd097966a355585f63700b359a8075fe1f35de4f84dc6cf7b7b8a27e48a
SHA51245a6340180a54cfb29507caeb68e056125e4efac0b59214e5898cbb400084a81b14f700d362a52cec93d83f05d20fdcb64b3fbf7dcf6a209f642e1de707fb565
-
Filesize
124KB
MD56b07b8a48222745d2a2a9924ce89856d
SHA1926aae0da387cf35407f86aa572e7b42f3f0542a
SHA25614e3efbc5729425bd40418687b04dd0e1a30f7f4ffed983c46db16ee43378a99
SHA512a631764c9efbfa0bb96230aa861c4618913f05bac43f2577bc0c1db8cc1ce8fde543f5e3bc51fc7a470262ed3945440dfa111e79baaa3217e3dc5eaae5d7190b
-
Filesize
124KB
MD53c7ed51da4e125767c9f3b8160dce5ef
SHA1e709a1f44ea0b6a914f03c2051aa16c02aed3580
SHA256aca3e0408d5e8f38eb70666aa2b278e15afaddfeb92f8f423ad7ad7ccdd64cb1
SHA512eb582c6ed8c30c7ecc46ef94882a896c016222b3f39f2a84bc17cdb8b76c72d56bf78e0b3a8818f92d822f78cab5f0e8651edb2e453b611f6fd92cb1df6bde3d
-
Filesize
124KB
MD5cf6a491b0ab38ce16c2e0921396ccae4
SHA1d0f913c0bf09160ecbc4ddfc0d8ff91068b0facd
SHA2567509fac076e35f5ef89b1ce75d667ec3e25125d503429129d908cc726b6ace27
SHA512cef68aea096f90ec9bdae9befa38c642f478cdb2e63d1bbbc42177ca0110f02d863745a06545cb1bd08fe68331920a009272091db3c6efb0210b07cb329bec1b
-
Filesize
124KB
MD5af7a5a7cfe70d239c36293558251da00
SHA13ef88ef08d029c08b17403b17ecab10cf990b6ab
SHA25640ebedc34734da250c91b4bfed2e6aa7b5947a2404111d79b936542f5e105e52
SHA5120ebe6a0cbb4e8bf405a016a044f7184f600cbd12c7f2233099795a261fd314ffc9a4f92b05eba7b1472f4626bc45c3af352fc87bd9cf008c7bd1f26094b9d907
-
Filesize
124KB
MD50aaebcc1d977b182a5e1b733553d513e
SHA1e199f8567d3a5bcdc557f7b0dddbab14914a1c06
SHA2568b9bed2a82d8b291e1892e141a4ebfaf5a3785adb009447be470b6b2da9bc036
SHA5120bba952228ecff7240d1e5d9aa7ab931753bd9004221ee9f1254a1e5a7c8dd9069a0444e297a19471eb700a0b05b5cdfbea1d53cd0b1134c15e3c67ebfeca6b1
-
Filesize
124KB
MD508deb58b7ceb50bc506a6de58641c5f5
SHA1a9fd62787c7d56978896ca277d062c29dbd2b337
SHA25685953c0f6ddbbe128af7db185e0f381919ada6faeeba8593c070170f3269e61c
SHA512c8dc23266a1832fa634a7fda9a44de896b7805b17ded6ead41c7f1172eba521b89c2829cb9b91042e6603ec88b40c605ad7731113b7dbebcc66bea1f7b20aa75
-
Filesize
124KB
MD589b3eab81e6ff478c57e58783f9a1c61
SHA1ab0bf94bc90e65910aa3c14fc94da1bb9c06eaea
SHA256dd8948b79810c414aaf9281f2bac16d6466aec9b015f47e70568f6f582801b5f
SHA512caae7e2b3da77db6c714708d54b9f866afe85303509a8160efdd3ca574d6e945ed0c693e7647f19fc345e71e5b98fcb9351e1e85d39da8e693eaace825dc44bd
-
Filesize
124KB
MD5f89f537b8911453bf282cc57954d8c57
SHA16aec497a4b230d3030bd279007dac5fea7d167c6
SHA256f4a4ddedb576449be41da81106f4fd96591e44cadc3797c3217922160cf8be45
SHA512b03a41a836f452647a1beec8349b942f0d479cba56627e73ce9a600ab203b8f0530428e75b35d392d6066fd25777e4c2de54f530df244eb79f69653d2d9e2138
-
Filesize
124KB
MD51ab61a701b619673d77356d7c1967cdf
SHA1edebf897baf33858e1a9e5bfc22604c3711c8d6c
SHA256b50962efc81a8bb7f2d732f815f7633c7e356cf4ea0716d3070df7d3d379c422
SHA512abdc1d3c184a5727eab1ccc1f034dee5c748bab879c6e232129de18a29c1a80031e48a00d90429671ec34ad64ddf78d99c22f2b82abd6ab5c78897f2df202534
-
Filesize
124KB
MD507234d3a05cf7a67f4675c5cf3cadaa2
SHA170d4a2507ff1da2c7b9ce4de2b644ccd9b1fdeea
SHA256173e1c6c77e4312cc3b257c8e47d20d115a25a588f9f9197123302378049f443
SHA51279b32922a37cc113e36934ae65088ef1082d6522d70500e99d7e8c78e192efbfa6791a9a41fa019dc6ae3da1aac7c3299339dcd31fa982fb2837081510994a18
-
Filesize
124KB
MD5a090309a3321a311c694f6baf4c4f3b3
SHA170af2bf5990fb6a58e5ef22c487aad3c67d1081b
SHA256389c3963b92f0ca4ad27238d3d5a61682927accdff745f6379f1e6f43a3dc90b
SHA512714e249ef40820ea9af8a2502b371fbf529bdbb25ad6c2cb8338689b23520b85d19fff4ff1fcf5519698050b3e302314bed14ef52df0da27be7f88c4df406308