Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16-05-2024 09:44
Static task
static1
Behavioral task
behavioral1
Sample
d79e1f0b97b27bbf1b4f6d230b49a5a0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d79e1f0b97b27bbf1b4f6d230b49a5a0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
d79e1f0b97b27bbf1b4f6d230b49a5a0_NeikiAnalytics.exe
-
Size
124KB
-
MD5
d79e1f0b97b27bbf1b4f6d230b49a5a0
-
SHA1
21f08e1381b830f64befeea21e3a5a69805979ce
-
SHA256
275d97b29481a11559a0e0b1fbfe3baad2a3b4902b38c09a602040ea2993ad2b
-
SHA512
885dc57cbc2b1c7662b78488fda4e64e58354a49aaf0a8603308e9e8beee3ae642620c7fb7205cc769403a527df4705d23c5dfd26fd0e409495df0260cfe9408
-
SSDEEP
1536:Ajszc5YOIhRO/N69BH3OoGa+FL9jKceRgrkjSo3E:cGOY1hkFoN3Oo1+F92SP
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 46 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" vieqa.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" soiya.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" soihaeq.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" neaoluw.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" duebud.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" d79e1f0b97b27bbf1b4f6d230b49a5a0_NeikiAnalytics.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" toeasu.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" jeaika.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" telef.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" hfvur.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" miauzi.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" mdyum.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" wsjeek.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" foutuo.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" moufes.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" zeayaun.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" yhwib.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" wiuqu.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" xrxuiw.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" wohox.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" hpyot.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" gumib.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ziiip.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" yiezou.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" seapas.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" hotiw.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" lauwe.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" kyqug.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" zeaapo.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" gaahee.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" giuhuow.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" qaoagu.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" baoveux.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" nuidib.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" yieik.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" scyes.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" yuuceo.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" qoiuji.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" vueboy.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" qiuhic.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" nauyieb.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" voiajaz.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" xezek.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" coabic.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" foeid.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ridic.exe -
Executes dropped EXE 46 IoCs
pid Process 2408 kyqug.exe 2660 ziiip.exe 2572 xezek.exe 300 yiezou.exe 2128 nuidib.exe 2860 yuuceo.exe 1888 toeasu.exe 1660 zeaapo.exe 1620 jeaika.exe 2264 wiuqu.exe 2160 gaahee.exe 1912 seapas.exe 3000 coabic.exe 1652 foeid.exe 836 xrxuiw.exe 1592 hfvur.exe 1996 hpyot.exe 2608 miauzi.exe 2464 vieqa.exe 1892 qoiuji.exe 3004 yieik.exe 1256 wohox.exe 1528 vueboy.exe 2812 soiya.exe 2240 soihaeq.exe 1472 scyes.exe 1656 hotiw.exe 1504 lauwe.exe 1796 giuhuow.exe 2756 neaoluw.exe 2196 mdyum.exe 2416 wsjeek.exe 1880 foutuo.exe 2560 telef.exe 2288 duebud.exe 3012 qaoagu.exe 1148 gumib.exe 2636 moufes.exe 1696 qiuhic.exe 3052 baoveux.exe 1420 nauyieb.exe 2420 voiajaz.exe 1884 zeayaun.exe 1732 yhwib.exe 2816 ridic.exe 2508 mouose.exe -
Loads dropped DLL 64 IoCs
pid Process 2864 d79e1f0b97b27bbf1b4f6d230b49a5a0_NeikiAnalytics.exe 2864 d79e1f0b97b27bbf1b4f6d230b49a5a0_NeikiAnalytics.exe 2408 kyqug.exe 2408 kyqug.exe 2660 ziiip.exe 2660 ziiip.exe 2572 xezek.exe 2572 xezek.exe 300 yiezou.exe 300 yiezou.exe 2128 nuidib.exe 2128 nuidib.exe 2860 yuuceo.exe 2860 yuuceo.exe 1888 toeasu.exe 1888 toeasu.exe 1660 zeaapo.exe 1660 zeaapo.exe 1620 jeaika.exe 1620 jeaika.exe 2264 wiuqu.exe 2264 wiuqu.exe 2160 gaahee.exe 2160 gaahee.exe 1912 seapas.exe 1912 seapas.exe 3000 coabic.exe 3000 coabic.exe 1652 foeid.exe 1652 foeid.exe 836 xrxuiw.exe 836 xrxuiw.exe 1592 hfvur.exe 1592 hfvur.exe 1996 hpyot.exe 1996 hpyot.exe 2608 miauzi.exe 2608 miauzi.exe 2464 vieqa.exe 2464 vieqa.exe 1892 qoiuji.exe 1892 qoiuji.exe 3004 yieik.exe 3004 yieik.exe 1256 wohox.exe 1256 wohox.exe 1528 vueboy.exe 1528 vueboy.exe 2812 soiya.exe 2812 soiya.exe 2240 soihaeq.exe 2240 soihaeq.exe 1472 scyes.exe 1472 scyes.exe 1656 hotiw.exe 1656 hotiw.exe 1504 lauwe.exe 1504 lauwe.exe 1796 giuhuow.exe 1796 giuhuow.exe 2756 neaoluw.exe 2756 neaoluw.exe 2196 mdyum.exe 2196 mdyum.exe -
Adds Run key to start application 2 TTPs 46 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\nauyieb = "C:\\Users\\Admin\\nauyieb.exe /e" baoveux.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\mouose = "C:\\Users\\Admin\\mouose.exe /g" ridic.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\gaahee = "C:\\Users\\Admin\\gaahee.exe /R" wiuqu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\hotiw = "C:\\Users\\Admin\\hotiw.exe /e" scyes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\mdyum = "C:\\Users\\Admin\\mdyum.exe /U" neaoluw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\qaoagu = "C:\\Users\\Admin\\qaoagu.exe /M" duebud.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\yhwib = "C:\\Users\\Admin\\yhwib.exe /s" zeayaun.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\ziiip = "C:\\Users\\Admin\\ziiip.exe /r" kyqug.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\soihaeq = "C:\\Users\\Admin\\soihaeq.exe /B" soiya.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\scyes = "C:\\Users\\Admin\\scyes.exe /L" soihaeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\gumib = "C:\\Users\\Admin\\gumib.exe /x" qaoagu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\miauzi = "C:\\Users\\Admin\\miauzi.exe /u" hpyot.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\vieqa = "C:\\Users\\Admin\\vieqa.exe /i" miauzi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\foutuo = "C:\\Users\\Admin\\foutuo.exe /F" wsjeek.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\telef = "C:\\Users\\Admin\\telef.exe /Q" foutuo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\yuuceo = "C:\\Users\\Admin\\yuuceo.exe /y" nuidib.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\wiuqu = "C:\\Users\\Admin\\wiuqu.exe /d" jeaika.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\foeid = "C:\\Users\\Admin\\foeid.exe /T" coabic.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\xrxuiw = "C:\\Users\\Admin\\xrxuiw.exe /N" foeid.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\voiajaz = "C:\\Users\\Admin\\voiajaz.exe /s" nauyieb.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\qiuhic = "C:\\Users\\Admin\\qiuhic.exe /L" moufes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\baoveux = "C:\\Users\\Admin\\baoveux.exe /m" qiuhic.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\jeaika = "C:\\Users\\Admin\\jeaika.exe /p" zeaapo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\hfvur = "C:\\Users\\Admin\\hfvur.exe /y" xrxuiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\giuhuow = "C:\\Users\\Admin\\giuhuow.exe /h" lauwe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\duebud = "C:\\Users\\Admin\\duebud.exe /K" telef.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\vueboy = "C:\\Users\\Admin\\vueboy.exe /P" wohox.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\soiya = "C:\\Users\\Admin\\soiya.exe /o" vueboy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\lauwe = "C:\\Users\\Admin\\lauwe.exe /c" hotiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\moufes = "C:\\Users\\Admin\\moufes.exe /n" gumib.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\kyqug = "C:\\Users\\Admin\\kyqug.exe /f" d79e1f0b97b27bbf1b4f6d230b49a5a0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\coabic = "C:\\Users\\Admin\\coabic.exe /o" seapas.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\hpyot = "C:\\Users\\Admin\\hpyot.exe /q" hfvur.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\qoiuji = "C:\\Users\\Admin\\qoiuji.exe /w" vieqa.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\ridic = "C:\\Users\\Admin\\ridic.exe /i" yhwib.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\wohox = "C:\\Users\\Admin\\wohox.exe /p" yieik.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\xezek = "C:\\Users\\Admin\\xezek.exe /T" ziiip.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\yiezou = "C:\\Users\\Admin\\yiezou.exe /b" xezek.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\nuidib = "C:\\Users\\Admin\\nuidib.exe /A" yiezou.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\seapas = "C:\\Users\\Admin\\seapas.exe /M" gaahee.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeaapo = "C:\\Users\\Admin\\zeaapo.exe /W" toeasu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeayaun = "C:\\Users\\Admin\\zeayaun.exe /l" voiajaz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\toeasu = "C:\\Users\\Admin\\toeasu.exe /Z" yuuceo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\yieik = "C:\\Users\\Admin\\yieik.exe /f" qoiuji.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\neaoluw = "C:\\Users\\Admin\\neaoluw.exe /S" giuhuow.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\wsjeek = "C:\\Users\\Admin\\wsjeek.exe /k" mdyum.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 46 IoCs
pid Process 2864 d79e1f0b97b27bbf1b4f6d230b49a5a0_NeikiAnalytics.exe 2408 kyqug.exe 2660 ziiip.exe 2572 xezek.exe 300 yiezou.exe 2128 nuidib.exe 2860 yuuceo.exe 1888 toeasu.exe 1660 zeaapo.exe 1620 jeaika.exe 2264 wiuqu.exe 2160 gaahee.exe 1912 seapas.exe 3000 coabic.exe 1652 foeid.exe 836 xrxuiw.exe 1592 hfvur.exe 1996 hpyot.exe 2608 miauzi.exe 2464 vieqa.exe 1892 qoiuji.exe 3004 yieik.exe 1256 wohox.exe 1528 vueboy.exe 2812 soiya.exe 2240 soihaeq.exe 1472 scyes.exe 1656 hotiw.exe 1504 lauwe.exe 1796 giuhuow.exe 2756 neaoluw.exe 2196 mdyum.exe 2416 wsjeek.exe 1880 foutuo.exe 2560 telef.exe 2288 duebud.exe 3012 qaoagu.exe 1148 gumib.exe 2636 moufes.exe 1696 qiuhic.exe 3052 baoveux.exe 1420 nauyieb.exe 2420 voiajaz.exe 1884 zeayaun.exe 1732 yhwib.exe 2816 ridic.exe -
Suspicious use of SetWindowsHookEx 47 IoCs
pid Process 2864 d79e1f0b97b27bbf1b4f6d230b49a5a0_NeikiAnalytics.exe 2408 kyqug.exe 2660 ziiip.exe 2572 xezek.exe 300 yiezou.exe 2128 nuidib.exe 2860 yuuceo.exe 1888 toeasu.exe 1660 zeaapo.exe 1620 jeaika.exe 2264 wiuqu.exe 2160 gaahee.exe 1912 seapas.exe 3000 coabic.exe 1652 foeid.exe 836 xrxuiw.exe 1592 hfvur.exe 1996 hpyot.exe 2608 miauzi.exe 2464 vieqa.exe 1892 qoiuji.exe 3004 yieik.exe 1256 wohox.exe 1528 vueboy.exe 2812 soiya.exe 2240 soihaeq.exe 1472 scyes.exe 1656 hotiw.exe 1504 lauwe.exe 1796 giuhuow.exe 2756 neaoluw.exe 2196 mdyum.exe 2416 wsjeek.exe 1880 foutuo.exe 2560 telef.exe 2288 duebud.exe 3012 qaoagu.exe 1148 gumib.exe 2636 moufes.exe 1696 qiuhic.exe 3052 baoveux.exe 1420 nauyieb.exe 2420 voiajaz.exe 1884 zeayaun.exe 1732 yhwib.exe 2816 ridic.exe 2508 mouose.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2864 wrote to memory of 2408 2864 d79e1f0b97b27bbf1b4f6d230b49a5a0_NeikiAnalytics.exe 28 PID 2864 wrote to memory of 2408 2864 d79e1f0b97b27bbf1b4f6d230b49a5a0_NeikiAnalytics.exe 28 PID 2864 wrote to memory of 2408 2864 d79e1f0b97b27bbf1b4f6d230b49a5a0_NeikiAnalytics.exe 28 PID 2864 wrote to memory of 2408 2864 d79e1f0b97b27bbf1b4f6d230b49a5a0_NeikiAnalytics.exe 28 PID 2408 wrote to memory of 2660 2408 kyqug.exe 29 PID 2408 wrote to memory of 2660 2408 kyqug.exe 29 PID 2408 wrote to memory of 2660 2408 kyqug.exe 29 PID 2408 wrote to memory of 2660 2408 kyqug.exe 29 PID 2660 wrote to memory of 2572 2660 ziiip.exe 30 PID 2660 wrote to memory of 2572 2660 ziiip.exe 30 PID 2660 wrote to memory of 2572 2660 ziiip.exe 30 PID 2660 wrote to memory of 2572 2660 ziiip.exe 30 PID 2572 wrote to memory of 300 2572 xezek.exe 31 PID 2572 wrote to memory of 300 2572 xezek.exe 31 PID 2572 wrote to memory of 300 2572 xezek.exe 31 PID 2572 wrote to memory of 300 2572 xezek.exe 31 PID 300 wrote to memory of 2128 300 yiezou.exe 32 PID 300 wrote to memory of 2128 300 yiezou.exe 32 PID 300 wrote to memory of 2128 300 yiezou.exe 32 PID 300 wrote to memory of 2128 300 yiezou.exe 32 PID 2128 wrote to memory of 2860 2128 nuidib.exe 33 PID 2128 wrote to memory of 2860 2128 nuidib.exe 33 PID 2128 wrote to memory of 2860 2128 nuidib.exe 33 PID 2128 wrote to memory of 2860 2128 nuidib.exe 33 PID 2860 wrote to memory of 1888 2860 yuuceo.exe 34 PID 2860 wrote to memory of 1888 2860 yuuceo.exe 34 PID 2860 wrote to memory of 1888 2860 yuuceo.exe 34 PID 2860 wrote to memory of 1888 2860 yuuceo.exe 34 PID 1888 wrote to memory of 1660 1888 toeasu.exe 35 PID 1888 wrote to memory of 1660 1888 toeasu.exe 35 PID 1888 wrote to memory of 1660 1888 toeasu.exe 35 PID 1888 wrote to memory of 1660 1888 toeasu.exe 35 PID 1660 wrote to memory of 1620 1660 zeaapo.exe 36 PID 1660 wrote to memory of 1620 1660 zeaapo.exe 36 PID 1660 wrote to memory of 1620 1660 zeaapo.exe 36 PID 1660 wrote to memory of 1620 1660 zeaapo.exe 36 PID 1620 wrote to memory of 2264 1620 jeaika.exe 37 PID 1620 wrote to memory of 2264 1620 jeaika.exe 37 PID 1620 wrote to memory of 2264 1620 jeaika.exe 37 PID 1620 wrote to memory of 2264 1620 jeaika.exe 37 PID 2264 wrote to memory of 2160 2264 wiuqu.exe 38 PID 2264 wrote to memory of 2160 2264 wiuqu.exe 38 PID 2264 wrote to memory of 2160 2264 wiuqu.exe 38 PID 2264 wrote to memory of 2160 2264 wiuqu.exe 38 PID 2160 wrote to memory of 1912 2160 gaahee.exe 39 PID 2160 wrote to memory of 1912 2160 gaahee.exe 39 PID 2160 wrote to memory of 1912 2160 gaahee.exe 39 PID 2160 wrote to memory of 1912 2160 gaahee.exe 39 PID 1912 wrote to memory of 3000 1912 seapas.exe 40 PID 1912 wrote to memory of 3000 1912 seapas.exe 40 PID 1912 wrote to memory of 3000 1912 seapas.exe 40 PID 1912 wrote to memory of 3000 1912 seapas.exe 40 PID 3000 wrote to memory of 1652 3000 coabic.exe 41 PID 3000 wrote to memory of 1652 3000 coabic.exe 41 PID 3000 wrote to memory of 1652 3000 coabic.exe 41 PID 3000 wrote to memory of 1652 3000 coabic.exe 41 PID 1652 wrote to memory of 836 1652 foeid.exe 44 PID 1652 wrote to memory of 836 1652 foeid.exe 44 PID 1652 wrote to memory of 836 1652 foeid.exe 44 PID 1652 wrote to memory of 836 1652 foeid.exe 44 PID 836 wrote to memory of 1592 836 xrxuiw.exe 45 PID 836 wrote to memory of 1592 836 xrxuiw.exe 45 PID 836 wrote to memory of 1592 836 xrxuiw.exe 45 PID 836 wrote to memory of 1592 836 xrxuiw.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\d79e1f0b97b27bbf1b4f6d230b49a5a0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\d79e1f0b97b27bbf1b4f6d230b49a5a0_NeikiAnalytics.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Users\Admin\kyqug.exe"C:\Users\Admin\kyqug.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Users\Admin\ziiip.exe"C:\Users\Admin\ziiip.exe"3⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Users\Admin\xezek.exe"C:\Users\Admin\xezek.exe"4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Users\Admin\yiezou.exe"C:\Users\Admin\yiezou.exe"5⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:300 -
C:\Users\Admin\nuidib.exe"C:\Users\Admin\nuidib.exe"6⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Users\Admin\yuuceo.exe"C:\Users\Admin\yuuceo.exe"7⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Users\Admin\toeasu.exe"C:\Users\Admin\toeasu.exe"8⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Users\Admin\zeaapo.exe"C:\Users\Admin\zeaapo.exe"9⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Users\Admin\jeaika.exe"C:\Users\Admin\jeaika.exe"10⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Users\Admin\wiuqu.exe"C:\Users\Admin\wiuqu.exe"11⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Users\Admin\gaahee.exe"C:\Users\Admin\gaahee.exe"12⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Users\Admin\seapas.exe"C:\Users\Admin\seapas.exe"13⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Users\Admin\coabic.exe"C:\Users\Admin\coabic.exe"14⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Users\Admin\foeid.exe"C:\Users\Admin\foeid.exe"15⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Users\Admin\xrxuiw.exe"C:\Users\Admin\xrxuiw.exe"16⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Users\Admin\hfvur.exe"C:\Users\Admin\hfvur.exe"17⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1592 -
C:\Users\Admin\hpyot.exe"C:\Users\Admin\hpyot.exe"18⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1996 -
C:\Users\Admin\miauzi.exe"C:\Users\Admin\miauzi.exe"19⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2608 -
C:\Users\Admin\vieqa.exe"C:\Users\Admin\vieqa.exe"20⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2464 -
C:\Users\Admin\qoiuji.exe"C:\Users\Admin\qoiuji.exe"21⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1892 -
C:\Users\Admin\yieik.exe"C:\Users\Admin\yieik.exe"22⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3004 -
C:\Users\Admin\wohox.exe"C:\Users\Admin\wohox.exe"23⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1256 -
C:\Users\Admin\vueboy.exe"C:\Users\Admin\vueboy.exe"24⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1528 -
C:\Users\Admin\soiya.exe"C:\Users\Admin\soiya.exe"25⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2812 -
C:\Users\Admin\soihaeq.exe"C:\Users\Admin\soihaeq.exe"26⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2240 -
C:\Users\Admin\scyes.exe"C:\Users\Admin\scyes.exe"27⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1472 -
C:\Users\Admin\hotiw.exe"C:\Users\Admin\hotiw.exe"28⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1656 -
C:\Users\Admin\lauwe.exe"C:\Users\Admin\lauwe.exe"29⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1504 -
C:\Users\Admin\giuhuow.exe"C:\Users\Admin\giuhuow.exe"30⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1796 -
C:\Users\Admin\neaoluw.exe"C:\Users\Admin\neaoluw.exe"31⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2756 -
C:\Users\Admin\mdyum.exe"C:\Users\Admin\mdyum.exe"32⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2196 -
C:\Users\Admin\wsjeek.exe"C:\Users\Admin\wsjeek.exe"33⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2416 -
C:\Users\Admin\foutuo.exe"C:\Users\Admin\foutuo.exe"34⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1880 -
C:\Users\Admin\telef.exe"C:\Users\Admin\telef.exe"35⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2560 -
C:\Users\Admin\duebud.exe"C:\Users\Admin\duebud.exe"36⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2288 -
C:\Users\Admin\qaoagu.exe"C:\Users\Admin\qaoagu.exe"37⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3012 -
C:\Users\Admin\gumib.exe"C:\Users\Admin\gumib.exe"38⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1148 -
C:\Users\Admin\moufes.exe"C:\Users\Admin\moufes.exe"39⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2636 -
C:\Users\Admin\qiuhic.exe"C:\Users\Admin\qiuhic.exe"40⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1696 -
C:\Users\Admin\baoveux.exe"C:\Users\Admin\baoveux.exe"41⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3052 -
C:\Users\Admin\nauyieb.exe"C:\Users\Admin\nauyieb.exe"42⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1420 -
C:\Users\Admin\voiajaz.exe"C:\Users\Admin\voiajaz.exe"43⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2420 -
C:\Users\Admin\zeayaun.exe"C:\Users\Admin\zeayaun.exe"44⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1884 -
C:\Users\Admin\yhwib.exe"C:\Users\Admin\yhwib.exe"45⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1732 -
C:\Users\Admin\ridic.exe"C:\Users\Admin\ridic.exe"46⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2816 -
C:\Users\Admin\mouose.exe"C:\Users\Admin\mouose.exe"47⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2508
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
124KB
MD505be652ab60bb2538d1dcdc3837fcb12
SHA1d9b3f3d1038dfcf22ad2a4c7155b6892c2c1199e
SHA256b0952978b0b6463a426f5e8cdfba9923e86cc104b2a986cbe581c003769fe163
SHA512eaa804b9be8778af5b83effed301e42d81f7ee0dff09d4b3863a0f93de3ab35c957c9aebc19b136758fe7ed7de0439361834cdbdd352ee28fe870992b490b11f
-
Filesize
124KB
MD5c573d218cd7bdbebcecbf98d5fd50f26
SHA10304edfdd7e29be9ef7ccd1690d378858bf71c2e
SHA2566077d98f63156a36dd9bfabf3feca700c659198baaaf600560d22bc57d22c8f5
SHA512c1de5015df133f8b80592dd38ff79e657b3805e29331a3158418c2bed0fbaf1e239fd2b6c0aad69025d097a8e8cf6d480e05713cf95dd8b8c119cbc3e4579592
-
Filesize
124KB
MD5ab85c84c47088bbf33ab431833e0c12d
SHA13178f518ee9807db7cf5fb98f879b5c17c51ca10
SHA256c881cb7be4dcb0b203e1bba5029a5e98b007d847464ca1a071ceeffaa2b3a005
SHA512b4d8255c151a467c01e66d6e906671f76b8abd88f748fa25ab34731e3a6592d9385b7f5b4a9aad3a9e1e9a8c230755bd8a1d82a25d57003921b7c2baf7627bbf
-
Filesize
124KB
MD53153bd010da7b11797b18c1639a5a78a
SHA123dd07cf55c1184ca046ff94d881d6211e33a497
SHA256ea63ffac24450b5f9b9a8b036d7698ae7b9ead6e30811600f745b24db976cd44
SHA512093459ef6e750e81fccaf54d5c96878a6abc3134e61953f4f676b6dd453d8d38e0956c4c9aa4bfda282ea6d8633645b9c9d427deb397955da6f248ab32da19b9
-
Filesize
124KB
MD505b1cb7ce97e79c025ff310f7b2e73a4
SHA174883f4e7001786dfced019f39840ceda77ab7b5
SHA256d5cc088e9ea2051465f4ad29c9b3cc611210aa4c53c7b541f5d5b4c9b7e0872f
SHA51285025dc82f706b47e7209291353112ede97419908b6cd772bc10a9881d3b74ba0664302ad2f72259c7aa936ca6a305c9467c7f87cc0d718b88fb90728fe09d38
-
Filesize
124KB
MD5a93549b2043dbaac52ef501c81027e8c
SHA14a141c758af8cfcabce5601c06878e48e82980ff
SHA2561ccc32d7f641a3911b1df09a164a78b74f5b47cf4a62cfba31109f2cd6955235
SHA512846f803a6f0e8040a56b000a39c7a86627acd259a94669d9f4b4f0c1c69f54963071833749b113035f7a19a58ac088c730c84b8309c0d8d9ed3b4c68b2de3340
-
Filesize
124KB
MD5786b4f0bad324d92516c983dbbfdf766
SHA1fdf28a2db42cfcd17f8a2b45232ec8c243d38fea
SHA2566e18c76805cae07e0f1f47f69306f6908fffd87021ad323f594dada1a1664d4c
SHA512c371f696aa630235039f8c88bb27961d5c863ff62a190d4da4bc3c5e1c6b6661ec93586cdfc5ef73ea013643fe93d9d8d467e6bbacf0c4a98683ca0c0421b224
-
Filesize
124KB
MD561e27e547ab73fce241b1758f51fe3d5
SHA1f2cb79f4d491ba7b85d51ca5fe714f52ee268c85
SHA256fda7a9b6a497ed805ce82845df3423e2b110ac92e0551ac793bbc1c4e64c6cee
SHA5129fedb15ab4470a55f8575f4f36db7b0593bc20a1fb8eb84d84e7e8b6c0175ce0dda99b2ff11eca729ecf65d9d13a75bae4c26dd5b8322f72f3bff81419104bef
-
Filesize
124KB
MD5f1b577b4e0c90d1e99df596c153d8be9
SHA18247d0071c519877528df4d57129e9488f485158
SHA25688bbed5c4b8d676bd7193b5b91db73da232e28be71a6f5e065b44b520e613624
SHA512ed01e1c8536b85ebccf1ed0aaa2083c62d94d8b655671704f6c4046f04f3a016a6d03e6cd4c07277290fd630bdd35672ddfc763bea1ef76aa9eaef670cf334f1
-
Filesize
124KB
MD5d2810ca5a2591adf96a38d9b2e615c59
SHA1fa87f6055a3b9b76a1114002eed42182b9d4e143
SHA256376a8dbf1d219d0e7d614f9d05461648da9c4587e70ae721caa30e52cd2391a9
SHA512b78f61e29ce1b0afd2d2e18d4a31e368f1e54f26ee0fed23dd6d8d4f9706cbee3cc72e07199ee189ebd5f65738e888c054d5cc56530eb8c4e58d45a512ffe7c4
-
Filesize
124KB
MD5373a617f3407c72b6c98ec4422c1beed
SHA1a0af4f994314796104824b2ea078940df4f44ca8
SHA256b0b8ed0bc111e425f0eb97152ac3116175b1e47875c64f89672ec85a0943e689
SHA5125c98fb6e92cf49cc474c6787a9dec2042cbca9ea152b3428b5acfb6a777244dea3581c9dc77bfd9c83361190c500be0030abd19135a94a8b893799db3ce365fc
-
Filesize
124KB
MD5df7789834912a70f6473695711eae2e6
SHA18ee9383b6d59a9d10c52fae79b345d1df6eb010b
SHA2567fce7c49325a0ba23545b966ebf351b0fe248b158b8c2be561d25148764e404f
SHA512166c6a1c1ccd38eb9aa0305d11e829101f3712252cab33e69b4a52142e15b1c0fa2c1b7700327abd68e9e923b0071fd0ec6d0b32473fb2216ca0c3d4dad0d5fc
-
Filesize
124KB
MD5134c0326e305ab454fc8420b76f5fa19
SHA16b894d76d3efb6b268488663c43a5340f900e0ee
SHA256a41a7de3e877c121d20f30b61882d19e1f11ccac426436ea52acab6036457874
SHA512c842337bdad80a51ac4fedb84000e8021dfc2b81819813a8a4bf867b9822de855ddfb42152d7bacba9165b176aedb43cd1720308e51e51f98f4ca7d7bc75344b
-
Filesize
124KB
MD560cf72e9cb52eab50a90f38c2dcedd30
SHA125bd5d2a214cccec0e5871c50262edad6bed7aa5
SHA256642b57f1b7eeaea5bdd75f80619b5c4389e03eecd2c7ef0dd5b7775eceddba91
SHA512ade037fc60d41f17f0366be19327ce89b0411fb55edb2d20703d69ba8e864050486dc2ac0c8d760407b49fddb37754b6f1d60685bb3771b51de7f039255ece08
-
Filesize
124KB
MD585c50f1a50999e8713f6511cbf740ce9
SHA1a87b586e32cb13a4e19593374f15f91cd629c550
SHA256f01c644434a9f6acd5b8349fe1d94ca1cf1aedcf646f037d0800dc1855bb0877
SHA512293e89101d9b0a2345880ef12b45571ca261dd3f43ce3813a9f3179d936b226f82d4c9b5a95a3280e3143c6060ec2bb365124a033e7c894264b5fa6f2f3b57bd
-
Filesize
124KB
MD5fef23edbedaf0ffcfc7b03945c56a8a2
SHA1bee7b16ca6b03400f99e0f7eb3cfb58538844999
SHA25659844db17349239ff14fd4768c9c52f3787bba242c69b9fb0c4f19f80f0315fa
SHA51216c751e61b66a2b38c6b4b18256770aa83245bb562f01976316149869724b19214a2686e62a0c7d4e9beb67521479b66d00dbfdba7d80223ba1bf48f937b3ab6