Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
16-05-2024 21:52
Static task
static1
Behavioral task
behavioral1
Sample
496fd59b6379f1a57b2dc7171943e128833c38a9e31a99a899e7cc2ffc582eeb.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
496fd59b6379f1a57b2dc7171943e128833c38a9e31a99a899e7cc2ffc582eeb.exe
Resource
win10v2004-20240508-en
General
-
Target
496fd59b6379f1a57b2dc7171943e128833c38a9e31a99a899e7cc2ffc582eeb.exe
-
Size
124KB
-
MD5
6487cf67b6eaa52a22f2dda78c3c0a40
-
SHA1
be61bd6e46a8d554edbad2537fa0eeef9d33ac23
-
SHA256
496fd59b6379f1a57b2dc7171943e128833c38a9e31a99a899e7cc2ffc582eeb
-
SHA512
56051cc4a9c22dbb6c081681f63c80085e69cde3b02e0380ff1da4e1971016ce469e82c5470b2d61b2c249f9f53d6473fecd25f53a1bfc3319572ccec6a2145d
-
SSDEEP
1536:1mszp5Y5AhhRO/N69BH3OoGa+FL9jKceRgrkjSo:sGHY6hhkFoN3Oo1+F92S
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 41 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" mzqob.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" vayoc.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 496fd59b6379f1a57b2dc7171943e128833c38a9e31a99a899e7cc2ffc582eeb.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" fiiolik.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" suiugom.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" cujum.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" naoac.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" zuigun.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" gauowe.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" gaooloj.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" gauuzuv.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" tuoas.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" kautoal.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" tgxov.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" joufui.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" queoqub.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" buqah.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" fuazuem.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" nidoq.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" siiqaid.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" qeiyey.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" kituj.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" yauur.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" nwyueh.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ziuoto.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" wufib.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" hklas.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" laaal.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" liauvo.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" nifoz.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" qeeceq.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" nauik.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" looeno.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" wiieh.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" giotue.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" zsjuj.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" hoekaek.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" tukak.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" cueeyib.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" nauefa.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" voike.exe -
Checks computer location settings 2 TTPs 41 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation yauur.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation nifoz.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation qeeceq.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation suiugom.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation nauefa.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation zsjuj.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation tgxov.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation buqah.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation nauik.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation liauvo.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation cujum.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation wiieh.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation wufib.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation vayoc.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation joufui.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation zuigun.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation nidoq.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation giotue.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation tukak.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation fuazuem.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation voike.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation naoac.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation mzqob.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation cueeyib.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation fiiolik.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation ziuoto.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation looeno.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation hoekaek.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation qeiyey.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation kautoal.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation nwyueh.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation kituj.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation 496fd59b6379f1a57b2dc7171943e128833c38a9e31a99a899e7cc2ffc582eeb.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation gauowe.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation gaooloj.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation hklas.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation laaal.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation queoqub.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation gauuzuv.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation siiqaid.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation tuoas.exe -
Executes dropped EXE 41 IoCs
pid Process 632 zsjuj.exe 4280 tgxov.exe 4780 yauur.exe 1880 cujum.exe 2540 nifoz.exe 212 queoqub.exe 4636 naoac.exe 4512 mzqob.exe 4668 zuigun.exe 912 cueeyib.exe 548 gauowe.exe 2588 buqah.exe 3516 qeeceq.exe 4156 fiiolik.exe 1500 nauik.exe 3200 looeno.exe 4460 wiieh.exe 1212 ziuoto.exe 3488 fuazuem.exe 4520 wufib.exe 3760 vayoc.exe 1616 nidoq.exe 3768 hoekaek.exe 1536 giotue.exe 744 suiugom.exe 4640 gaooloj.exe 1440 tukak.exe 2248 voike.exe 4000 gauuzuv.exe 3212 siiqaid.exe 960 hklas.exe 3560 laaal.exe 384 nauefa.exe 4728 qeiyey.exe 5024 tuoas.exe 2544 kituj.exe 2764 kautoal.exe 628 joufui.exe 3248 liauvo.exe 3752 nwyueh.exe 396 gzmam.exe -
Adds Run key to start application 2 TTPs 41 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fuazuem = "C:\\Users\\Admin\\fuazuem.exe /I" ziuoto.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hklas = "C:\\Users\\Admin\\hklas.exe /Z" siiqaid.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gzmam = "C:\\Users\\Admin\\gzmam.exe /p" nwyueh.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cueeyib = "C:\\Users\\Admin\\cueeyib.exe /I" zuigun.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vayoc = "C:\\Users\\Admin\\vayoc.exe /o" wufib.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\liauvo = "C:\\Users\\Admin\\liauvo.exe /S" joufui.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kautoal = "C:\\Users\\Admin\\kautoal.exe /o" kituj.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\joufui = "C:\\Users\\Admin\\joufui.exe /p" kautoal.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\naoac = "C:\\Users\\Admin\\naoac.exe /c" queoqub.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zuigun = "C:\\Users\\Admin\\zuigun.exe /e" mzqob.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\buqah = "C:\\Users\\Admin\\buqah.exe /d" gauowe.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nauik = "C:\\Users\\Admin\\nauik.exe /O" fiiolik.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wiieh = "C:\\Users\\Admin\\wiieh.exe /H" looeno.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nauefa = "C:\\Users\\Admin\\nauefa.exe /b" laaal.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tgxov = "C:\\Users\\Admin\\tgxov.exe /j" zsjuj.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hoekaek = "C:\\Users\\Admin\\hoekaek.exe /p" nidoq.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gaooloj = "C:\\Users\\Admin\\gaooloj.exe /i" suiugom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cujum = "C:\\Users\\Admin\\cujum.exe /V" yauur.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qeeceq = "C:\\Users\\Admin\\qeeceq.exe /H" buqah.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fiiolik = "C:\\Users\\Admin\\fiiolik.exe /q" qeeceq.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tukak = "C:\\Users\\Admin\\tukak.exe /Z" gaooloj.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gauuzuv = "C:\\Users\\Admin\\gauuzuv.exe /t" voike.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nwyueh = "C:\\Users\\Admin\\nwyueh.exe /X" liauvo.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qeiyey = "C:\\Users\\Admin\\qeiyey.exe /M" nauefa.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voike = "C:\\Users\\Admin\\voike.exe /w" tukak.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\siiqaid = "C:\\Users\\Admin\\siiqaid.exe /O" gauuzuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gauowe = "C:\\Users\\Admin\\gauowe.exe /Z" cueeyib.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ziuoto = "C:\\Users\\Admin\\ziuoto.exe /u" wiieh.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wufib = "C:\\Users\\Admin\\wufib.exe /B" fuazuem.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nidoq = "C:\\Users\\Admin\\nidoq.exe /X" vayoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\giotue = "C:\\Users\\Admin\\giotue.exe /Y" hoekaek.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\suiugom = "C:\\Users\\Admin\\suiugom.exe /N" giotue.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tuoas = "C:\\Users\\Admin\\tuoas.exe /O" qeiyey.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kituj = "C:\\Users\\Admin\\kituj.exe /Y" tuoas.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\laaal = "C:\\Users\\Admin\\laaal.exe /K" hklas.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zsjuj = "C:\\Users\\Admin\\zsjuj.exe /f" 496fd59b6379f1a57b2dc7171943e128833c38a9e31a99a899e7cc2ffc582eeb.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yauur = "C:\\Users\\Admin\\yauur.exe /R" tgxov.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nifoz = "C:\\Users\\Admin\\nifoz.exe /e" cujum.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\queoqub = "C:\\Users\\Admin\\queoqub.exe /W" nifoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mzqob = "C:\\Users\\Admin\\mzqob.exe /f" naoac.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\looeno = "C:\\Users\\Admin\\looeno.exe /u" nauik.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 228 496fd59b6379f1a57b2dc7171943e128833c38a9e31a99a899e7cc2ffc582eeb.exe 228 496fd59b6379f1a57b2dc7171943e128833c38a9e31a99a899e7cc2ffc582eeb.exe 632 zsjuj.exe 632 zsjuj.exe 4280 tgxov.exe 4280 tgxov.exe 4780 yauur.exe 4780 yauur.exe 1880 cujum.exe 1880 cujum.exe 2540 nifoz.exe 2540 nifoz.exe 212 queoqub.exe 212 queoqub.exe 4636 naoac.exe 4636 naoac.exe 4512 mzqob.exe 4512 mzqob.exe 4668 zuigun.exe 4668 zuigun.exe 912 cueeyib.exe 912 cueeyib.exe 548 gauowe.exe 548 gauowe.exe 2588 buqah.exe 2588 buqah.exe 3516 qeeceq.exe 3516 qeeceq.exe 4156 fiiolik.exe 4156 fiiolik.exe 1500 nauik.exe 1500 nauik.exe 3200 looeno.exe 3200 looeno.exe 4460 wiieh.exe 4460 wiieh.exe 1212 ziuoto.exe 1212 ziuoto.exe 3488 fuazuem.exe 3488 fuazuem.exe 4520 wufib.exe 4520 wufib.exe 3760 vayoc.exe 3760 vayoc.exe 1616 nidoq.exe 1616 nidoq.exe 3768 hoekaek.exe 3768 hoekaek.exe 1536 giotue.exe 1536 giotue.exe 744 suiugom.exe 744 suiugom.exe 4640 gaooloj.exe 4640 gaooloj.exe 1440 tukak.exe 1440 tukak.exe 2248 voike.exe 2248 voike.exe 4000 gauuzuv.exe 4000 gauuzuv.exe 3212 siiqaid.exe 3212 siiqaid.exe 960 hklas.exe 960 hklas.exe -
Suspicious use of SetWindowsHookEx 42 IoCs
pid Process 228 496fd59b6379f1a57b2dc7171943e128833c38a9e31a99a899e7cc2ffc582eeb.exe 632 zsjuj.exe 4280 tgxov.exe 4780 yauur.exe 1880 cujum.exe 2540 nifoz.exe 212 queoqub.exe 4636 naoac.exe 4512 mzqob.exe 4668 zuigun.exe 912 cueeyib.exe 548 gauowe.exe 2588 buqah.exe 3516 qeeceq.exe 4156 fiiolik.exe 1500 nauik.exe 3200 looeno.exe 4460 wiieh.exe 1212 ziuoto.exe 3488 fuazuem.exe 4520 wufib.exe 3760 vayoc.exe 1616 nidoq.exe 3768 hoekaek.exe 1536 giotue.exe 744 suiugom.exe 4640 gaooloj.exe 1440 tukak.exe 2248 voike.exe 4000 gauuzuv.exe 3212 siiqaid.exe 960 hklas.exe 3560 laaal.exe 384 nauefa.exe 4728 qeiyey.exe 5024 tuoas.exe 2544 kituj.exe 2764 kautoal.exe 628 joufui.exe 3248 liauvo.exe 3752 nwyueh.exe 396 gzmam.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 228 wrote to memory of 632 228 496fd59b6379f1a57b2dc7171943e128833c38a9e31a99a899e7cc2ffc582eeb.exe 92 PID 228 wrote to memory of 632 228 496fd59b6379f1a57b2dc7171943e128833c38a9e31a99a899e7cc2ffc582eeb.exe 92 PID 228 wrote to memory of 632 228 496fd59b6379f1a57b2dc7171943e128833c38a9e31a99a899e7cc2ffc582eeb.exe 92 PID 632 wrote to memory of 4280 632 zsjuj.exe 94 PID 632 wrote to memory of 4280 632 zsjuj.exe 94 PID 632 wrote to memory of 4280 632 zsjuj.exe 94 PID 4280 wrote to memory of 4780 4280 tgxov.exe 96 PID 4280 wrote to memory of 4780 4280 tgxov.exe 96 PID 4280 wrote to memory of 4780 4280 tgxov.exe 96 PID 4780 wrote to memory of 1880 4780 yauur.exe 98 PID 4780 wrote to memory of 1880 4780 yauur.exe 98 PID 4780 wrote to memory of 1880 4780 yauur.exe 98 PID 1880 wrote to memory of 2540 1880 cujum.exe 99 PID 1880 wrote to memory of 2540 1880 cujum.exe 99 PID 1880 wrote to memory of 2540 1880 cujum.exe 99 PID 2540 wrote to memory of 212 2540 nifoz.exe 100 PID 2540 wrote to memory of 212 2540 nifoz.exe 100 PID 2540 wrote to memory of 212 2540 nifoz.exe 100 PID 212 wrote to memory of 4636 212 queoqub.exe 101 PID 212 wrote to memory of 4636 212 queoqub.exe 101 PID 212 wrote to memory of 4636 212 queoqub.exe 101 PID 4636 wrote to memory of 4512 4636 naoac.exe 102 PID 4636 wrote to memory of 4512 4636 naoac.exe 102 PID 4636 wrote to memory of 4512 4636 naoac.exe 102 PID 4512 wrote to memory of 4668 4512 mzqob.exe 104 PID 4512 wrote to memory of 4668 4512 mzqob.exe 104 PID 4512 wrote to memory of 4668 4512 mzqob.exe 104 PID 4668 wrote to memory of 912 4668 zuigun.exe 107 PID 4668 wrote to memory of 912 4668 zuigun.exe 107 PID 4668 wrote to memory of 912 4668 zuigun.exe 107 PID 912 wrote to memory of 548 912 cueeyib.exe 108 PID 912 wrote to memory of 548 912 cueeyib.exe 108 PID 912 wrote to memory of 548 912 cueeyib.exe 108 PID 548 wrote to memory of 2588 548 gauowe.exe 109 PID 548 wrote to memory of 2588 548 gauowe.exe 109 PID 548 wrote to memory of 2588 548 gauowe.exe 109 PID 2588 wrote to memory of 3516 2588 buqah.exe 110 PID 2588 wrote to memory of 3516 2588 buqah.exe 110 PID 2588 wrote to memory of 3516 2588 buqah.exe 110 PID 3516 wrote to memory of 4156 3516 qeeceq.exe 111 PID 3516 wrote to memory of 4156 3516 qeeceq.exe 111 PID 3516 wrote to memory of 4156 3516 qeeceq.exe 111 PID 4156 wrote to memory of 1500 4156 fiiolik.exe 112 PID 4156 wrote to memory of 1500 4156 fiiolik.exe 112 PID 4156 wrote to memory of 1500 4156 fiiolik.exe 112 PID 1500 wrote to memory of 3200 1500 nauik.exe 113 PID 1500 wrote to memory of 3200 1500 nauik.exe 113 PID 1500 wrote to memory of 3200 1500 nauik.exe 113 PID 3200 wrote to memory of 4460 3200 looeno.exe 114 PID 3200 wrote to memory of 4460 3200 looeno.exe 114 PID 3200 wrote to memory of 4460 3200 looeno.exe 114 PID 4460 wrote to memory of 1212 4460 wiieh.exe 115 PID 4460 wrote to memory of 1212 4460 wiieh.exe 115 PID 4460 wrote to memory of 1212 4460 wiieh.exe 115 PID 1212 wrote to memory of 3488 1212 ziuoto.exe 117 PID 1212 wrote to memory of 3488 1212 ziuoto.exe 117 PID 1212 wrote to memory of 3488 1212 ziuoto.exe 117 PID 3488 wrote to memory of 4520 3488 fuazuem.exe 118 PID 3488 wrote to memory of 4520 3488 fuazuem.exe 118 PID 3488 wrote to memory of 4520 3488 fuazuem.exe 118 PID 4520 wrote to memory of 3760 4520 wufib.exe 119 PID 4520 wrote to memory of 3760 4520 wufib.exe 119 PID 4520 wrote to memory of 3760 4520 wufib.exe 119 PID 3760 wrote to memory of 1616 3760 vayoc.exe 120
Processes
-
C:\Users\Admin\AppData\Local\Temp\496fd59b6379f1a57b2dc7171943e128833c38a9e31a99a899e7cc2ffc582eeb.exe"C:\Users\Admin\AppData\Local\Temp\496fd59b6379f1a57b2dc7171943e128833c38a9e31a99a899e7cc2ffc582eeb.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Users\Admin\zsjuj.exe"C:\Users\Admin\zsjuj.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:632 -
C:\Users\Admin\tgxov.exe"C:\Users\Admin\tgxov.exe"3⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4280 -
C:\Users\Admin\yauur.exe"C:\Users\Admin\yauur.exe"4⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Users\Admin\cujum.exe"C:\Users\Admin\cujum.exe"5⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Users\Admin\nifoz.exe"C:\Users\Admin\nifoz.exe"6⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Users\Admin\queoqub.exe"C:\Users\Admin\queoqub.exe"7⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Users\Admin\naoac.exe"C:\Users\Admin\naoac.exe"8⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4636 -
C:\Users\Admin\mzqob.exe"C:\Users\Admin\mzqob.exe"9⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4512 -
C:\Users\Admin\zuigun.exe"C:\Users\Admin\zuigun.exe"10⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4668 -
C:\Users\Admin\cueeyib.exe"C:\Users\Admin\cueeyib.exe"11⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:912 -
C:\Users\Admin\gauowe.exe"C:\Users\Admin\gauowe.exe"12⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:548 -
C:\Users\Admin\buqah.exe"C:\Users\Admin\buqah.exe"13⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Users\Admin\qeeceq.exe"C:\Users\Admin\qeeceq.exe"14⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3516 -
C:\Users\Admin\fiiolik.exe"C:\Users\Admin\fiiolik.exe"15⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4156 -
C:\Users\Admin\nauik.exe"C:\Users\Admin\nauik.exe"16⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Users\Admin\looeno.exe"C:\Users\Admin\looeno.exe"17⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3200 -
C:\Users\Admin\wiieh.exe"C:\Users\Admin\wiieh.exe"18⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Users\Admin\ziuoto.exe"C:\Users\Admin\ziuoto.exe"19⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Users\Admin\fuazuem.exe"C:\Users\Admin\fuazuem.exe"20⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3488 -
C:\Users\Admin\wufib.exe"C:\Users\Admin\wufib.exe"21⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4520 -
C:\Users\Admin\vayoc.exe"C:\Users\Admin\vayoc.exe"22⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3760 -
C:\Users\Admin\nidoq.exe"C:\Users\Admin\nidoq.exe"23⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1616 -
C:\Users\Admin\hoekaek.exe"C:\Users\Admin\hoekaek.exe"24⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3768 -
C:\Users\Admin\giotue.exe"C:\Users\Admin\giotue.exe"25⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1536 -
C:\Users\Admin\suiugom.exe"C:\Users\Admin\suiugom.exe"26⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:744 -
C:\Users\Admin\gaooloj.exe"C:\Users\Admin\gaooloj.exe"27⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4640 -
C:\Users\Admin\tukak.exe"C:\Users\Admin\tukak.exe"28⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1440 -
C:\Users\Admin\voike.exe"C:\Users\Admin\voike.exe"29⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2248 -
C:\Users\Admin\gauuzuv.exe"C:\Users\Admin\gauuzuv.exe"30⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4000 -
C:\Users\Admin\siiqaid.exe"C:\Users\Admin\siiqaid.exe"31⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3212 -
C:\Users\Admin\hklas.exe"C:\Users\Admin\hklas.exe"32⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:960 -
C:\Users\Admin\laaal.exe"C:\Users\Admin\laaal.exe"33⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:3560 -
C:\Users\Admin\nauefa.exe"C:\Users\Admin\nauefa.exe"34⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:384 -
C:\Users\Admin\qeiyey.exe"C:\Users\Admin\qeiyey.exe"35⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:4728 -
C:\Users\Admin\tuoas.exe"C:\Users\Admin\tuoas.exe"36⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:5024 -
C:\Users\Admin\kituj.exe"C:\Users\Admin\kituj.exe"37⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:2544 -
C:\Users\Admin\kautoal.exe"C:\Users\Admin\kautoal.exe"38⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:2764 -
C:\Users\Admin\joufui.exe"C:\Users\Admin\joufui.exe"39⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:628 -
C:\Users\Admin\liauvo.exe"C:\Users\Admin\liauvo.exe"40⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:3248 -
C:\Users\Admin\nwyueh.exe"C:\Users\Admin\nwyueh.exe"41⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:3752 -
C:\Users\Admin\gzmam.exe"C:\Users\Admin\gzmam.exe"42⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:396
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
124KB
MD563896a97ce0c35e0ca10846179fe746c
SHA116c19652c921100919ace3435eaaed4cd8878d67
SHA2563e905e849d73cf8394382dd5d241dae7e586d39c77d1adbb6c8ba1bf5887d901
SHA51270cfce3f1d444c6f45cdf8caf8ba0b26a9a9fa6e6f134157d7fc91fb6f1297874bb578b9d075646e7e2014ac6fa0dcaf5a11ec34fc070a6acb1aeaafbbdd7fc5
-
Filesize
124KB
MD56af3b81eec0dd326c934aa75e6dbb763
SHA1eb85713b965863128cbf59836ff38b9b9c78b830
SHA25694b2d2ea99b485fe5609aacc4bf2e54e36e2ebc4434f918e7ac056d7cf935550
SHA51235ecb9f1df2ed88c4bcfcfcf9bab7909f5ec9cb711e3c2227c7e6ff215433e0f371eba6559e1813d0ea5b0062db31450993532030ac6b15ae086238bf1f4735e
-
Filesize
124KB
MD574d18060ab3f9b97bd507e1a904f4bc9
SHA16ceb01f05e9abf247461bd46c3b7a3e9c5892e8b
SHA25667c2ec4b527e7edf2d82084de90f27962708c59f1448e50e0a1cc06b8a2102a3
SHA5125a92db8c5e1a58252bad27abd462d222b8a16474c6da076e4ae59d0ddb3cfebae6db4dcf4da1a26573e5669df2923541f7c8f3049bd40d0d2ca34e4c02018914
-
Filesize
124KB
MD5cae9276153a5e70aa9395301da5fda71
SHA1f5d2d61e69eb124d7248be00b20ac7b2efe67417
SHA2563865c1c6fb0562c0ea53a62062953a9690765ae2a8de8308edad1ba7d1f02370
SHA512dfd684ab783cc9775c0808eb5f3bf5b1a34d16b3e96cfdc0e6729682196b71e410a4da3f96076253743dfc2309be8acf9550405fe4f0d63131bbe2ab1455e3ea
-
Filesize
124KB
MD5bbda8d33280e19338a7f799fb97a7052
SHA146337466c9399b925a48d692c11cb91eb9a61859
SHA25611bd47fe5c03c679caa5bf5b3c38ca18ce71f3ea6ad37e5c810c4b24498edee6
SHA512766788aeed37d18a3552869051fdee06c56894916c502791f7b097462c7fbdf4191ecde2988c2692644d77950f3af89e2a4de18f469bceb87419f4b114d69400
-
Filesize
124KB
MD59bee06c6992e9eb233a30369ec32c855
SHA1eb6e61eea7783d09bc6dc56baa3c8e0f621e44bb
SHA2562c077de51824b52f96f2dc9e1ba076941414ecb5d47a9415bdffefd8da83daf8
SHA5127e34b5f74f35630b9d9479d969604005bc3ed3e992bff4122d77cfcd0e1332536299f896d84d17bc3942aa613ea8200065f94e16bec8f1e993751b1964de0c1a
-
Filesize
124KB
MD5693b1405f1598a3844fb926e92fa09e9
SHA131d4d6574070e986394422c1f741a7e9fcd18295
SHA256c4cd4bc79d328354ac0c648a12dc4672269127bfc4c6764dd4546c1ee6d3461e
SHA512d24084575cb5514f37010437b25d746f8914a5bf3a8e3c53d68cdcdbbc69ab8ed7beab88e803918d2700c80184e0bd7b00e5acccc5f005054feffb1ac9e32f31
-
Filesize
124KB
MD54a5f9d8fd260600445df3de9c038ed39
SHA1651ce903319b851f2fcda33553d194e201613904
SHA256d51dcb49110b9f58c0bf1d35e5aa40711a0c484ffca2503d04075afb44f7dec9
SHA512cf861c7482e6c1239d0cc09f4dc11113eeea1c143456849e5763566a629220a3a51925e9619b2a2231cfecb1cc5b4118b042a7783eb208bffd98340ad839aee3
-
Filesize
124KB
MD5d962e165d436f4589320687535062809
SHA1715c42a8c6c1fe640c7b8f8ff5bbe0c5619ee558
SHA256e7f498cff797c4c5a18d20737b425e2295ff50cac4e8e214ec58a922dce573c6
SHA512480e51ab77e7e3972f8bded1230c12a121946b40d8145ec0e7e14661e0da2267754afb1e66d60b223b057f6de6e8abf67dd32572857f89270b4661e0399390f8
-
Filesize
124KB
MD54d8a3444037b3155d2c2a4eb813ae97d
SHA1c7f99fcce794ea0a94c47c755c322bf6d97fdb84
SHA256c757ecb8a29f3cb8d4b1e665c43958423079acbd853c71d606511940ad728afa
SHA5121af5482dc65cb6dfc04c533667792a3011dc02a138268eb5ae3007beb89de0c9847421a994e0012a2d69cae235e05e1a2fc9a5869bd0ea43a67c812f33d0640f
-
Filesize
124KB
MD5dba913289ec5cf81e350725894c0535d
SHA1e90b74437543894cb2ae4588201f82c571bc0923
SHA25661aa985b352f144c37fc7ac5e6da47ea4080b900d688e2c78757d3f924be611e
SHA5128a7f487acd21a456470cc875291a178324d98082f768ab9581bd7be05360437bb35fe77c893ee12e6828f12745fea291eefe22f5bc436ef6089e8333f29c8007
-
Filesize
124KB
MD59a7b6df356d36254c5f2843233c41dd1
SHA13c9f83081a566383e363358427dc6be849037cc2
SHA256649f79d92963a73cc061730fc81bf0c1b8ca667fe0c8dae4c9e1959ad9c382b6
SHA512efb11cee712ec05e2b9e79079fd76da223ad43975e91163b00c357164189677a37842e8e5ba3773a8416118da7e07f9925cc004413b731a1132135546cc7b400
-
Filesize
124KB
MD5c4bbcf8e8f83b0999ad1db722e1b6bbe
SHA1286eae9604b9000ff2dd62f7c73455ff034f8eca
SHA256690df807d6fd69e576570b7158a86363681a8102fe5ebf4aa33d2cb5f959af47
SHA512b21ee3637b0e039158b209428268b2e52f25da75c6a74f454963c0802a365fc85d85b8940753c05567ae486562520a2d088943a76cbc3b7649a47cae425d42e7
-
Filesize
124KB
MD5e2a960bce15ebadadffcfff4f9e51ea3
SHA1cf67c2d73bde5b56b466b46da08bc99e09e8d764
SHA2564c415cf3ea195102519772c62f18109d7b63e84dcfc5d1636c934756a92058e4
SHA512a46ba4696ce0ada067222c960bc59e242893586e539efdb005c4f547fbf992962702ba3fe189d559aa9959f084464d979e819fa8e8bac59825f149289622cd33
-
Filesize
124KB
MD57c92a443516730b8b478abb1b4983ff4
SHA100f3fd9e2b81a8f4eb7ffaf487589b9039b8e166
SHA256fd18c53582ad0f1287c246e5868a47145ff8275d8020b952c053606e1184bc23
SHA5122d0710e3075be1acd31a8d6fef84692ac65a2e16582c5503078bb9a9f1525b03639f526efca941e23299402ec1d3c5b57a7c42dc7fb4ea6e82a3f52e256136ec
-
Filesize
124KB
MD553e010de8eb1ab0e1c4e40fd3da75be7
SHA19d3f97c992b6bf9724840ea59d384822b9cda46b
SHA256ecdcba373a9d408fbfe877d621831918ae9865e108a20e6acaab52d368c39b17
SHA51240eeea5f068b0b209a8364951d2e326d6eb315cc60dfef2f5bbde1f15cea73e6f6c80eafe76b05417e962f6e055272c6eb65f1872eced4b6cba86874ab1d8fb6
-
Filesize
124KB
MD5c1cd6973a6ee6ad20763384c6b225688
SHA1c6b98a7c5a9e5fe7f79353759877684a9225c988
SHA2566c1b3dab93644942c5f8d2ec6c4434ab9a77ea9dcf61eccca88d224ffd3fff87
SHA5128d43a5351eebd600431b0ffa396cb9dc862c271ab97dfdd7245725ecc779797c77b496c9d1e84a1efcb883395f19d3b2322367bece784237872eca1e6ce5163e
-
Filesize
124KB
MD57f67adc5e8de950b57464100c8a078a3
SHA1a54553b7565f86f4b352c0731f2dc64f7a09d1a1
SHA25688b127b3f03de5393b091822d2613f17355002b142b461907d1189ee30d9544f
SHA512f98bf3d39838cef0d7810bb53d1241f4ca4c493eb62137e04c006e3fd4d9a705a133530dd7e4bcd5c7edbb3bd0720d0171086bf9a2c9ad049465ee281372e84a
-
Filesize
124KB
MD541c04c263985bbc656afbf2695717a5e
SHA13a26e0bb70e55a2ca6e5b90cb7ddfcb9664377d6
SHA2566e3bdc80d1acb0e1efbbf46837b66290a3c539d23558282e60090dd492d9fa5c
SHA512d99efb5246a9e8c423605554cc48b97aca1715a2ead01c4b9f4ed8b087241b15b9167e8bc968c976fe67759db8cf23cdbe20f8ed059067f4278e249b9579a381
-
Filesize
124KB
MD5c5963c87988ec28bd517dd59d8f97f26
SHA16a4d43ffe5146f5cace4b5cb772fe328babdcb4c
SHA25699e8ffb59215c1e5454976f7c78bc176aea02b62acce1441e7482fe8f1630bd5
SHA5129f5ea0ecf9f2a5f19069aaa425becc910f0fee362ad55107cf57b1e83b9fb47024974c122d3865cbc411ca584a4bfd4874be962b1da0b9be478075e2cb30f12d
-
Filesize
124KB
MD5a4f4ded7483979a42d38e3e5a19be03a
SHA123e8b1711f1e876e1b6808a35ebb641d0c810505
SHA2562775413396590790e5c2e7addfe26d2736b5ba423f335e457c669353eb5fc749
SHA512de0e7b3bd641d34be836412e6869b5724913884564efd79d092b0c1155751b85e5b5f88b4b5eae827b41b18940f3fb46fce802c739845173cb3cf914a21da2f7
-
Filesize
124KB
MD546cf70231f735e510f37588134c7e5a6
SHA1c1da0bb12cc3869592da5d5e57dc0db75c8bf901
SHA256df57c50e663567ba377efa62d69ce5fe4635aeea29340d132b36f2700c035921
SHA5122bb3b345d4b6089d098717a8564c30d0694d38cf0a50efe8c5165bfc79ea677eca66767c37e722e1fdeecc57a5f4dbf8cbca65d82c5ba350772a338727e62614
-
Filesize
124KB
MD58dc78774211fbaf34c493a5b690d5b9e
SHA146f66a6d794e6797cb55607edf532a71232c6273
SHA256f57ed03ebe887d063b698f975b59194fe44ce6b3ce305b55c6abe7191ab870fa
SHA5123be103ff3fffd8ef88e151bdd93e2f589ec7e465bbaadc50b7b8f61f0d3c0889b0a1fc4a36abd2f4e86309240bd234a8389363b9613216128ee4769d081d4c23
-
Filesize
124KB
MD5e3f7822b69156207e2c57fe8621f9cab
SHA13712976181c77888b2084e3fe0ae14b97a416d0b
SHA256900f1b9317ba16c07e01258ee9138b7b62826f39d45d6c8cdf6581a2a5fbceae
SHA512db5da820aaf86b578025b41c1d8c0c3978e3c6130e62408710d00671d0b73de20c9f2de6f01c78aa09190739edd4e82e7e61e496cf17512a6f3685fea867b67a
-
Filesize
124KB
MD5c46758902464a0ef6d873ba33cdad0c8
SHA14c1be26eb1e52267c2b82574e077532e0da27953
SHA25653be7123bead11ad77f23e7956322c598493138ca1bff9b065ff11bc7b864920
SHA5124782db4aed7cd05adc32fbcda3a9dbe57ac406ad88cd0640e36d3f3a87e27f5319f9a1a4245ccd95a28bf7a8522174250696a99ce9d1cf690887edf6d63edceb
-
Filesize
124KB
MD57ee2a893c7be816405a0df17a0b694ed
SHA12ebea48a2ad77322a9d7e4eddf50cc98ea50dc51
SHA256d0ebea523699ae5885d7299c451afd98a1052b601240bc18f00401350e1b7674
SHA512701f5eec3addd129585277f190b1c09f8a820dd66cfec403ca18a6b8388bbcbb1e35c468264d1a2ad85587c752eb01b7341060aa8e81462bba71792e46141bb8
-
Filesize
124KB
MD544b1e60d146b4d2bccd812e320f47058
SHA121373fad7e4b841c0b8c8f45f374bc6ff8beb863
SHA256c29922c9303fbb33ca67d507c0aaa2bc9d013736f95d11431b243f275caae246
SHA512409f190a0a4d41d2fa7a934029b48d5ea150e774ee641264a8c701d7516ab5a1a956870019ff13c26f85aaa64b08af41183af304003cb75eed302cf62f640068
-
Filesize
124KB
MD57282568b52ef51d65e9d0037bb7d63e3
SHA1d21c0ab856f5e7d700442dd15d87bd1f4b3c2d3e
SHA256031cecfe7e8abd7ab983d972edda28563562258efe164edbb8921f3b3e401ca9
SHA5121a969cd4c542964c93748e96ab0afdd81445371ff41896a1ce9b600f65ab909c761d27345ce3118c497422adb779024474afa09359a1786fd0919665586768b1
-
Filesize
124KB
MD5468a59c4fb2f3d06784128f8d9c2e2d3
SHA136de3a72a62e320ef2d9590f55a7b860759801cf
SHA25643250f96860b1058c41e65bb3299340d86a83bf3b01e96ddd9d0fe2ba7e9aa42
SHA512189bf482db18d16df2036cf441cf0bb912672a7c9afc6e2494d732747616b0a4e79aa345e80306da1f61552283e00984d3b590dd4808329f722c6d5e52efa2b5
-
Filesize
124KB
MD54d9b22c662272283c80aac8ffdf2a961
SHA1541daa41e9c4dd6f7e9c09ae9c40ab53b093ee3b
SHA256dcbb5bddf09e308f8ef4e67c100609dd1122de4e8c4bd26d6781605edfcf7109
SHA512ec2b9b641121a32cb82eab2eb698e2c5be8fdb427d7f48f53a071eea9647ada014f8aa06a2e649d02e2186eb4c19c1421a60ce5518440ffb816cf35b22b71c0f
-
Filesize
124KB
MD5bf22b749a178da59eb9e7919aafb3c84
SHA166689156edc449ad487a530cedfda64d66b8ec7c
SHA2566199a045fc6ae80f0311dd3275120d30187b8e69ede541890063dc2b6c151013
SHA512fbda9a47739adc631020dd0d4a721b085bd8605b81273dd427e2e431c5af5988ef4e7cc5c34ac7e42c934903d034eb80bca5ecd83666d249d97e05388c38714d
-
Filesize
124KB
MD52e15a33aa3a7db824e9027843c893ae7
SHA15fc45e344309907543a65847504080aeba55782e
SHA2562ef2f742b5b2af3eee278ecb014c7726dc504d7111b1c0dfa8360499e9ce18e3
SHA5127260074bdeaab3f723d5035696c8e55962db14d1b0f416069d28d37acfeb4f7a6f7ee8e3b7a4845a0c50c8f2a15f63b84a8baddaef8df40a10ab4092b6c15c67