Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
16/05/2024, 09:44
Static task
static1
Behavioral task
behavioral1
Sample
d79e1f0b97b27bbf1b4f6d230b49a5a0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d79e1f0b97b27bbf1b4f6d230b49a5a0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
d79e1f0b97b27bbf1b4f6d230b49a5a0_NeikiAnalytics.exe
-
Size
124KB
-
MD5
d79e1f0b97b27bbf1b4f6d230b49a5a0
-
SHA1
21f08e1381b830f64befeea21e3a5a69805979ce
-
SHA256
275d97b29481a11559a0e0b1fbfe3baad2a3b4902b38c09a602040ea2993ad2b
-
SHA512
885dc57cbc2b1c7662b78488fda4e64e58354a49aaf0a8603308e9e8beee3ae642620c7fb7205cc769403a527df4705d23c5dfd26fd0e409495df0260cfe9408
-
SSDEEP
1536:Ajszc5YOIhRO/N69BH3OoGa+FL9jKceRgrkjSo3E:cGOY1hkFoN3Oo1+F92SP
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 42 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" zokih.exe Set value (int) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" guaer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" teure.exe Set value (int) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" jieeta.exe Set value (int) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" mlbam.exe Set value (int) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" woauv.exe Set value (int) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ketax.exe Set value (int) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" nkceas.exe Set value (int) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" xeeah.exe Set value (int) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" weaev.exe Set value (int) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" yefej.exe Set value (int) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" hiuaz.exe Set value (int) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" kieso.exe Set value (int) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" pyjaah.exe Set value (int) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" zcrueq.exe Set value (int) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" doeajuy.exe Set value (int) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ciyok.exe Set value (int) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" gieecey.exe Set value (int) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" kqfib.exe Set value (int) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" gaeubo.exe Set value (int) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" koenois.exe Set value (int) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" fiorip.exe Set value (int) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" booasab.exe Set value (int) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" veuaj.exe Set value (int) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" dvnev.exe Set value (int) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" gkzey.exe Set value (int) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" canec.exe Set value (int) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" tihow.exe Set value (int) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" yiika.exe Set value (int) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ksmix.exe Set value (int) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" kuurip.exe Set value (int) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" faoiyow.exe Set value (int) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" fuoez.exe Set value (int) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" fcrioc.exe Set value (int) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" vaiep.exe Set value (int) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" gaxuj.exe Set value (int) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" cueyeu.exe Set value (int) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" riaged.exe Set value (int) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" keadi.exe Set value (int) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" vunet.exe Set value (int) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" d79e1f0b97b27bbf1b4f6d230b49a5a0_NeikiAnalytics.exe Set value (int) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" teuoxi.exe -
Checks computer location settings 2 TTPs 42 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation gaeubo.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation fuoez.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation keadi.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation fiorip.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation kuurip.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation hiuaz.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation veuaj.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation gieecey.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation vunet.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation teuoxi.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation canec.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation ciyok.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation riaged.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation zcrueq.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation vaiep.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation d79e1f0b97b27bbf1b4f6d230b49a5a0_NeikiAnalytics.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation gkzey.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation pyjaah.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation zokih.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation kqfib.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation nkceas.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation tihow.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation ksmix.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation booasab.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation weaev.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation doeajuy.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation yefej.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation xeeah.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation kieso.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation faoiyow.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation yiika.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation guaer.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation cueyeu.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation koenois.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation fcrioc.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation mlbam.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation dvnev.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation woauv.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation ketax.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation gaxuj.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation teure.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation jieeta.exe -
Executes dropped EXE 42 IoCs
pid Process 4600 mlbam.exe 1208 fiorip.exe 3880 ksmix.exe 4944 kuurip.exe 2364 hiuaz.exe 4612 veuaj.exe 4580 dvnev.exe 4316 booasab.exe 3608 weaev.exe 5096 doeajuy.exe 2612 yefej.exe 3716 woauv.exe 3028 ketax.exe 460 gaxuj.exe 5008 gieecey.exe 3708 teuoxi.exe 2280 kqfib.exe 2112 gaeubo.exe 3412 ciyok.exe 1500 riaged.exe 4556 gkzey.exe 4616 cueyeu.exe 2764 pyjaah.exe 4456 nkceas.exe 3088 canec.exe 2696 tihow.exe 3336 fuoez.exe 2304 koenois.exe 4188 fcrioc.exe 4036 zcrueq.exe 3800 zokih.exe 2600 xeeah.exe 3480 yiika.exe 4216 keadi.exe 900 kieso.exe 3040 guaer.exe 3216 vunet.exe 1444 vaiep.exe 2092 teure.exe 4652 faoiyow.exe 4388 jieeta.exe 1576 dooiw.exe -
Adds Run key to start application 2 TTPs 42 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fiorip = "C:\\Users\\Admin\\fiorip.exe /y" mlbam.exe Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tihow = "C:\\Users\\Admin\\tihow.exe /g" canec.exe Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kieso = "C:\\Users\\Admin\\kieso.exe /h" keadi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dooiw = "C:\\Users\\Admin\\dooiw.exe /T" jieeta.exe Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dvnev = "C:\\Users\\Admin\\dvnev.exe /J" veuaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woauv = "C:\\Users\\Admin\\woauv.exe /i" yefej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ketax = "C:\\Users\\Admin\\ketax.exe /Y" woauv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\koenois = "C:\\Users\\Admin\\koenois.exe /V" fuoez.exe Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fcrioc = "C:\\Users\\Admin\\fcrioc.exe /y" koenois.exe Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\faoiyow = "C:\\Users\\Admin\\faoiyow.exe /I" teure.exe Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hiuaz = "C:\\Users\\Admin\\hiuaz.exe /B" kuurip.exe Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\booasab = "C:\\Users\\Admin\\booasab.exe /R" dvnev.exe Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yefej = "C:\\Users\\Admin\\yefej.exe /a" doeajuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cueyeu = "C:\\Users\\Admin\\cueyeu.exe /h" gkzey.exe Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vaiep = "C:\\Users\\Admin\\vaiep.exe /U" vunet.exe Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\doeajuy = "C:\\Users\\Admin\\doeajuy.exe /k" weaev.exe Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gaeubo = "C:\\Users\\Admin\\gaeubo.exe /G" kqfib.exe Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ciyok = "C:\\Users\\Admin\\ciyok.exe /Q" gaeubo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nkceas = "C:\\Users\\Admin\\nkceas.exe /L" pyjaah.exe Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\canec = "C:\\Users\\Admin\\canec.exe /V" nkceas.exe Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fuoez = "C:\\Users\\Admin\\fuoez.exe /n" tihow.exe Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zcrueq = "C:\\Users\\Admin\\zcrueq.exe /Z" fcrioc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yiika = "C:\\Users\\Admin\\yiika.exe /z" xeeah.exe Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ksmix = "C:\\Users\\Admin\\ksmix.exe /q" fiorip.exe Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gaxuj = "C:\\Users\\Admin\\gaxuj.exe /w" ketax.exe Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gieecey = "C:\\Users\\Admin\\gieecey.exe /Z" gaxuj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pyjaah = "C:\\Users\\Admin\\pyjaah.exe /O" cueyeu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\guaer = "C:\\Users\\Admin\\guaer.exe /Z" kieso.exe Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kuurip = "C:\\Users\\Admin\\kuurip.exe /G" ksmix.exe Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\keadi = "C:\\Users\\Admin\\keadi.exe /r" yiika.exe Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vunet = "C:\\Users\\Admin\\vunet.exe /l" guaer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mlbam = "C:\\Users\\Admin\\mlbam.exe /e" d79e1f0b97b27bbf1b4f6d230b49a5a0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\weaev = "C:\\Users\\Admin\\weaev.exe /l" booasab.exe Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zokih = "C:\\Users\\Admin\\zokih.exe /Y" zcrueq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xeeah = "C:\\Users\\Admin\\xeeah.exe /w" zokih.exe Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gkzey = "C:\\Users\\Admin\\gkzey.exe /W" riaged.exe Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teure = "C:\\Users\\Admin\\teure.exe /o" vaiep.exe Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jieeta = "C:\\Users\\Admin\\jieeta.exe /v" faoiyow.exe Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\veuaj = "C:\\Users\\Admin\\veuaj.exe /W" hiuaz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teuoxi = "C:\\Users\\Admin\\teuoxi.exe /A" gieecey.exe Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kqfib = "C:\\Users\\Admin\\kqfib.exe /P" teuoxi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\riaged = "C:\\Users\\Admin\\riaged.exe /s" ciyok.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3484 d79e1f0b97b27bbf1b4f6d230b49a5a0_NeikiAnalytics.exe 3484 d79e1f0b97b27bbf1b4f6d230b49a5a0_NeikiAnalytics.exe 4600 mlbam.exe 4600 mlbam.exe 1208 fiorip.exe 1208 fiorip.exe 3880 ksmix.exe 3880 ksmix.exe 4944 kuurip.exe 4944 kuurip.exe 2364 hiuaz.exe 2364 hiuaz.exe 4612 veuaj.exe 4612 veuaj.exe 4580 dvnev.exe 4580 dvnev.exe 4316 booasab.exe 4316 booasab.exe 3608 weaev.exe 3608 weaev.exe 5096 doeajuy.exe 5096 doeajuy.exe 2612 yefej.exe 2612 yefej.exe 3716 woauv.exe 3716 woauv.exe 3028 ketax.exe 3028 ketax.exe 460 gaxuj.exe 460 gaxuj.exe 5008 gieecey.exe 5008 gieecey.exe 3708 teuoxi.exe 3708 teuoxi.exe 2280 kqfib.exe 2280 kqfib.exe 2112 gaeubo.exe 2112 gaeubo.exe 3412 ciyok.exe 3412 ciyok.exe 1500 riaged.exe 1500 riaged.exe 4556 gkzey.exe 4556 gkzey.exe 4616 cueyeu.exe 4616 cueyeu.exe 2764 pyjaah.exe 2764 pyjaah.exe 4456 nkceas.exe 4456 nkceas.exe 3088 canec.exe 3088 canec.exe 2696 tihow.exe 2696 tihow.exe 3336 fuoez.exe 3336 fuoez.exe 2304 koenois.exe 2304 koenois.exe 4188 fcrioc.exe 4188 fcrioc.exe 4036 zcrueq.exe 4036 zcrueq.exe 3800 zokih.exe 3800 zokih.exe -
Suspicious use of SetWindowsHookEx 43 IoCs
pid Process 3484 d79e1f0b97b27bbf1b4f6d230b49a5a0_NeikiAnalytics.exe 4600 mlbam.exe 1208 fiorip.exe 3880 ksmix.exe 4944 kuurip.exe 2364 hiuaz.exe 4612 veuaj.exe 4580 dvnev.exe 4316 booasab.exe 3608 weaev.exe 5096 doeajuy.exe 2612 yefej.exe 3716 woauv.exe 3028 ketax.exe 460 gaxuj.exe 5008 gieecey.exe 3708 teuoxi.exe 2280 kqfib.exe 2112 gaeubo.exe 3412 ciyok.exe 1500 riaged.exe 4556 gkzey.exe 4616 cueyeu.exe 2764 pyjaah.exe 4456 nkceas.exe 3088 canec.exe 2696 tihow.exe 3336 fuoez.exe 2304 koenois.exe 4188 fcrioc.exe 4036 zcrueq.exe 3800 zokih.exe 2600 xeeah.exe 3480 yiika.exe 4216 keadi.exe 900 kieso.exe 3040 guaer.exe 3216 vunet.exe 1444 vaiep.exe 2092 teure.exe 4652 faoiyow.exe 4388 jieeta.exe 1576 dooiw.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3484 wrote to memory of 4600 3484 d79e1f0b97b27bbf1b4f6d230b49a5a0_NeikiAnalytics.exe 90 PID 3484 wrote to memory of 4600 3484 d79e1f0b97b27bbf1b4f6d230b49a5a0_NeikiAnalytics.exe 90 PID 3484 wrote to memory of 4600 3484 d79e1f0b97b27bbf1b4f6d230b49a5a0_NeikiAnalytics.exe 90 PID 4600 wrote to memory of 1208 4600 mlbam.exe 93 PID 4600 wrote to memory of 1208 4600 mlbam.exe 93 PID 4600 wrote to memory of 1208 4600 mlbam.exe 93 PID 1208 wrote to memory of 3880 1208 fiorip.exe 97 PID 1208 wrote to memory of 3880 1208 fiorip.exe 97 PID 1208 wrote to memory of 3880 1208 fiorip.exe 97 PID 3880 wrote to memory of 4944 3880 ksmix.exe 98 PID 3880 wrote to memory of 4944 3880 ksmix.exe 98 PID 3880 wrote to memory of 4944 3880 ksmix.exe 98 PID 4944 wrote to memory of 2364 4944 kuurip.exe 99 PID 4944 wrote to memory of 2364 4944 kuurip.exe 99 PID 4944 wrote to memory of 2364 4944 kuurip.exe 99 PID 2364 wrote to memory of 4612 2364 hiuaz.exe 100 PID 2364 wrote to memory of 4612 2364 hiuaz.exe 100 PID 2364 wrote to memory of 4612 2364 hiuaz.exe 100 PID 4612 wrote to memory of 4580 4612 veuaj.exe 101 PID 4612 wrote to memory of 4580 4612 veuaj.exe 101 PID 4612 wrote to memory of 4580 4612 veuaj.exe 101 PID 4580 wrote to memory of 4316 4580 dvnev.exe 102 PID 4580 wrote to memory of 4316 4580 dvnev.exe 102 PID 4580 wrote to memory of 4316 4580 dvnev.exe 102 PID 4316 wrote to memory of 3608 4316 booasab.exe 104 PID 4316 wrote to memory of 3608 4316 booasab.exe 104 PID 4316 wrote to memory of 3608 4316 booasab.exe 104 PID 3608 wrote to memory of 5096 3608 weaev.exe 105 PID 3608 wrote to memory of 5096 3608 weaev.exe 105 PID 3608 wrote to memory of 5096 3608 weaev.exe 105 PID 5096 wrote to memory of 2612 5096 doeajuy.exe 107 PID 5096 wrote to memory of 2612 5096 doeajuy.exe 107 PID 5096 wrote to memory of 2612 5096 doeajuy.exe 107 PID 2612 wrote to memory of 3716 2612 yefej.exe 108 PID 2612 wrote to memory of 3716 2612 yefej.exe 108 PID 2612 wrote to memory of 3716 2612 yefej.exe 108 PID 3716 wrote to memory of 3028 3716 woauv.exe 109 PID 3716 wrote to memory of 3028 3716 woauv.exe 109 PID 3716 wrote to memory of 3028 3716 woauv.exe 109 PID 3028 wrote to memory of 460 3028 ketax.exe 110 PID 3028 wrote to memory of 460 3028 ketax.exe 110 PID 3028 wrote to memory of 460 3028 ketax.exe 110 PID 460 wrote to memory of 5008 460 gaxuj.exe 111 PID 460 wrote to memory of 5008 460 gaxuj.exe 111 PID 460 wrote to memory of 5008 460 gaxuj.exe 111 PID 5008 wrote to memory of 3708 5008 gieecey.exe 112 PID 5008 wrote to memory of 3708 5008 gieecey.exe 112 PID 5008 wrote to memory of 3708 5008 gieecey.exe 112 PID 3708 wrote to memory of 2280 3708 teuoxi.exe 113 PID 3708 wrote to memory of 2280 3708 teuoxi.exe 113 PID 3708 wrote to memory of 2280 3708 teuoxi.exe 113 PID 2280 wrote to memory of 2112 2280 kqfib.exe 114 PID 2280 wrote to memory of 2112 2280 kqfib.exe 114 PID 2280 wrote to memory of 2112 2280 kqfib.exe 114 PID 2112 wrote to memory of 3412 2112 gaeubo.exe 115 PID 2112 wrote to memory of 3412 2112 gaeubo.exe 115 PID 2112 wrote to memory of 3412 2112 gaeubo.exe 115 PID 3412 wrote to memory of 1500 3412 ciyok.exe 117 PID 3412 wrote to memory of 1500 3412 ciyok.exe 117 PID 3412 wrote to memory of 1500 3412 ciyok.exe 117 PID 1500 wrote to memory of 4556 1500 riaged.exe 118 PID 1500 wrote to memory of 4556 1500 riaged.exe 118 PID 1500 wrote to memory of 4556 1500 riaged.exe 118 PID 4556 wrote to memory of 4616 4556 gkzey.exe 119
Processes
-
C:\Users\Admin\AppData\Local\Temp\d79e1f0b97b27bbf1b4f6d230b49a5a0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\d79e1f0b97b27bbf1b4f6d230b49a5a0_NeikiAnalytics.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3484 -
C:\Users\Admin\mlbam.exe"C:\Users\Admin\mlbam.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Users\Admin\fiorip.exe"C:\Users\Admin\fiorip.exe"3⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Users\Admin\ksmix.exe"C:\Users\Admin\ksmix.exe"4⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3880 -
C:\Users\Admin\kuurip.exe"C:\Users\Admin\kuurip.exe"5⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Users\Admin\hiuaz.exe"C:\Users\Admin\hiuaz.exe"6⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Users\Admin\veuaj.exe"C:\Users\Admin\veuaj.exe"7⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4612 -
C:\Users\Admin\dvnev.exe"C:\Users\Admin\dvnev.exe"8⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4580 -
C:\Users\Admin\booasab.exe"C:\Users\Admin\booasab.exe"9⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4316 -
C:\Users\Admin\weaev.exe"C:\Users\Admin\weaev.exe"10⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3608 -
C:\Users\Admin\doeajuy.exe"C:\Users\Admin\doeajuy.exe"11⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Users\Admin\yefej.exe"C:\Users\Admin\yefej.exe"12⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Users\Admin\woauv.exe"C:\Users\Admin\woauv.exe"13⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3716 -
C:\Users\Admin\ketax.exe"C:\Users\Admin\ketax.exe"14⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Users\Admin\gaxuj.exe"C:\Users\Admin\gaxuj.exe"15⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:460 -
C:\Users\Admin\gieecey.exe"C:\Users\Admin\gieecey.exe"16⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Users\Admin\teuoxi.exe"C:\Users\Admin\teuoxi.exe"17⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3708 -
C:\Users\Admin\kqfib.exe"C:\Users\Admin\kqfib.exe"18⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Users\Admin\gaeubo.exe"C:\Users\Admin\gaeubo.exe"19⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Users\Admin\ciyok.exe"C:\Users\Admin\ciyok.exe"20⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3412 -
C:\Users\Admin\riaged.exe"C:\Users\Admin\riaged.exe"21⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Users\Admin\gkzey.exe"C:\Users\Admin\gkzey.exe"22⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Users\Admin\cueyeu.exe"C:\Users\Admin\cueyeu.exe"23⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4616 -
C:\Users\Admin\pyjaah.exe"C:\Users\Admin\pyjaah.exe"24⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2764 -
C:\Users\Admin\nkceas.exe"C:\Users\Admin\nkceas.exe"25⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4456 -
C:\Users\Admin\canec.exe"C:\Users\Admin\canec.exe"26⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3088 -
C:\Users\Admin\tihow.exe"C:\Users\Admin\tihow.exe"27⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2696 -
C:\Users\Admin\fuoez.exe"C:\Users\Admin\fuoez.exe"28⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3336 -
C:\Users\Admin\koenois.exe"C:\Users\Admin\koenois.exe"29⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2304 -
C:\Users\Admin\fcrioc.exe"C:\Users\Admin\fcrioc.exe"30⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4188 -
C:\Users\Admin\zcrueq.exe"C:\Users\Admin\zcrueq.exe"31⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4036 -
C:\Users\Admin\zokih.exe"C:\Users\Admin\zokih.exe"32⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3800 -
C:\Users\Admin\xeeah.exe"C:\Users\Admin\xeeah.exe"33⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:2600 -
C:\Users\Admin\yiika.exe"C:\Users\Admin\yiika.exe"34⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:3480 -
C:\Users\Admin\keadi.exe"C:\Users\Admin\keadi.exe"35⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:4216 -
C:\Users\Admin\kieso.exe"C:\Users\Admin\kieso.exe"36⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:900 -
C:\Users\Admin\guaer.exe"C:\Users\Admin\guaer.exe"37⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:3040 -
C:\Users\Admin\vunet.exe"C:\Users\Admin\vunet.exe"38⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:3216 -
C:\Users\Admin\vaiep.exe"C:\Users\Admin\vaiep.exe"39⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:1444 -
C:\Users\Admin\teure.exe"C:\Users\Admin\teure.exe"40⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:2092 -
C:\Users\Admin\faoiyow.exe"C:\Users\Admin\faoiyow.exe"41⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:4652 -
C:\Users\Admin\jieeta.exe"C:\Users\Admin\jieeta.exe"42⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:4388 -
C:\Users\Admin\dooiw.exe"C:\Users\Admin\dooiw.exe"43⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1576
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
124KB
MD5764458b5ea4c44552e7ea682ab2ac742
SHA1928b97951d07859445ffd256387b3b7b0e0aed93
SHA25600c3bccd58e2ecbd83d41f09786a72c71332264ae78d7b20803401ee1afa5d4d
SHA512b6888b2f3c127e687bedc363dcac26673b0db46975a701e310ccd60d3bd178f440461c3c32456e655a2cd14bd3622f701e707f11ead9842d1fbdf3526c3c88f0
-
Filesize
124KB
MD51ad012ec6d6f11e178189bb332586a28
SHA176f622afb197d5c064853fe72729e247f051b843
SHA256b3efe436a61a215d58d9bd7076632de83b9dac682e10ba35bb72c5ce0c5cd512
SHA512e089b61ce28f83aa99481d2a2466bad9c018fbc231061a8c61ca86dfd8b265c980d9fa77af0b98787a417cf25b705628e73fc4175071e0f9b32ce0257903906b
-
Filesize
124KB
MD52e7afe150f47ce6646012fe9d9b2d786
SHA1e0c8f0b995e728af1be9625fb5ed89ecf3ed93ee
SHA2563ffb59bdb615e87c6843c6cbb8f327db04a605051ce48f1cc2aa32a12cd787fc
SHA512ca3ba96f0f56de21bbbc2d31932456905ea9dc9f6b22cb8717a9e25d893e58e5fbda427d793d3fe04cb0f945e4600cffe2560185adcc37db7c76d8865430374b
-
Filesize
124KB
MD59e904aa1a028e9ec7aedf117fd68146c
SHA10a671227446166998e558492bc324d4e29907dbe
SHA25624cba1bb3d5fa547092ff960d1d348ea5eb0f1e000b18cd40aa63b860c6395d7
SHA512d917dc7691cfd68eec328a8395abbef3f5d099713d2e0d9eaedbcc9f5465e88fa0f1e586ee5e68fa4cb9541dd2efbea359054f18860510938685ece68323d6ad
-
Filesize
124KB
MD584a65b7096bb4aab975d17708f4d6a7f
SHA114cc7204f7ef4a7b16342ff555695edb64a6b8e4
SHA256f2d0841d6afd427ea9201e9967c5f34a120eef62c2f4ea44df062ee7991219a8
SHA512e1f0c0c1ace3b7f3c1e9b88789e0760c47a885b0ef83b8a5f819eca83605ffe43b0a3a6e4a1bf4d0f6e2072fa0b8bf7a63fd783b13dae3929f9bb45bf7ccccab
-
Filesize
124KB
MD541bc4a7c594b0cf0186e185d14ef05a4
SHA1fa9856abb5e7b047a7f08956a1d7a7435c1bc603
SHA256f12d6410731ef006df48937dcfbac7ed6eebce33106fbb90fb473e424925be0e
SHA51272e3ae21ba769d567be5fa7d54747844bdec50dd6f1984b90783e1774cb8d46052bdea3d6f72c1f356e150e153f54a442c3dfd0493192ac3c2c37b812ea9a68c
-
Filesize
124KB
MD5aa5cfc537284c98f9a9792689bcfc198
SHA1a7ec2c460cc972ddbeba43f6e46ab3dd39150b15
SHA256438586d85d3bccd0c6a81d1a068c8d0a098e500b68c551d0b924b996959134e0
SHA51285dd7138200e98055f7be7e77f4778889fd3c192ae286105f1162b77e930b4fb3361d90c28f3ebcf057865a1c0b3a387b6945cb2888221b5932edd0b3ab02126
-
Filesize
124KB
MD51a456fef22d1d2a318e21e3cc7ced481
SHA1876b49f200c672ac53216cc848300a3b3fc71c49
SHA256dbe8d115bdba13e7ddc85023c812d07b561c4e2be124bcf1578a4c918ad0c91d
SHA512643948668b07971e23ba4f50c4ddf087ee732b9b108176c16cf08d04b2dc844a71e8bc782b041affd90e84118db9963a0d1a548d80eb14b95c697e35d616daf6
-
Filesize
124KB
MD558df23478696f915b3622efe2bad0ffd
SHA1ac09a5501efb41e35444e36208468b0bab26395d
SHA2568172dbe35928600418fc0bd649c83f952516eb29841b7021f9a20746f54569ee
SHA512a36c8568845c7cd50bc44de8a06644bbaf49caa0633e1eefbbb397c1da5971a8dcafd08af4e416ae145c47a3365e6059c42f6ea1f35d4a066300f62e0df31964
-
Filesize
124KB
MD58d417cb931b42a2f7cf6062fd9fd7d8d
SHA13d90d12bf2636867b6136fdd964622d0c6efd2f8
SHA256f2518b1de7c9183d1a6ef5570ca42ff33f6d3b6c54a21ffe076f9c64b4991d54
SHA512fa9ebf85c89432f8434eef89e34be2f612e67a54e8b5caa11983d4c1fb68cbc9c4f969bfeda81954ec79c19b8d40a76b458417751a3caed59bdc55d572f90a1a
-
Filesize
124KB
MD561a7d82cbd5e403951825dc342a99618
SHA16e180dab75c91b1a4832fe4881ccef0af6ae52ad
SHA25645ba48fda6e6e11c95e2100ba6f860ea297b259602422463f8237fd9437bc047
SHA5127b7024051079c3a59035302848b3c8a4dc34defe3047128f128cbcd2782152d5d3664a5d65137e02e2a01029a2db08ab1d4bd71ab0fb2789db426591cde56138
-
Filesize
124KB
MD5d0abe78f217baf9e91f95ac64d0cd352
SHA1407101b50bc72ca06d19a572d04d8955dc55d858
SHA256f72aebae43e59b58c0217eddb01cab8e57b645ef981b90d436a0b0895b81b09b
SHA512b729cd6e9f64aafcb0314d2bd74ed3afeae9ea8e9f8d9194e053bce460c96da4ac2c819d6e8906412efe9115c27ec3d1da517fbcad13ea9cd634c3fe2ccab700
-
Filesize
124KB
MD54caf97b075746ed021d7e67b9641ce3d
SHA147e0fe37ecb63408bb795900319e58627a409bcd
SHA256536772013be82a9bd5f8290b0b066d80ce65e39f277f346328045c1e349f8935
SHA51235d952343c2d0f2d2dc097c7234a84f70b168ab62b64592aaf16609d9ccd3b5955bb1ac730e9e692131fb6fe122ccc8bb7f5f056549db2f34a321a11a00caa8d
-
Filesize
124KB
MD5bd99e58b07b5a97e320b3761e9fe46ac
SHA15d59b7919f6526807d44e63f75454d43d845fa59
SHA25693be01331b0aceb3eeb8913f1000a588a5b5ed75d9737b74910da7dc21da30c7
SHA512bd3e8c74f5e8ab24e1f3a027a0c80c14aac03253d97364efe972b8df279486ec99f06b70ea6ab4478f6b3b9c102f42145f3bf64611f930b836d4ab156fc3f87e
-
Filesize
124KB
MD57ff819f039ca7c87aa8ae7a52e95fea0
SHA15c1fa25790e8bbe92ad8bc0e1140be6335c7dc5f
SHA256fdaf9a29be6d016b2aa59dcb105797ae5d6e27c612fc1b1c0eb08d82e9e9cf09
SHA512ecec99dffaa43be1dd9295c259183634e5de78cb93f6ced75df74f156317080f69195e572e7455ed0d2858f2b2a16a7f4030f46337cbc4fbe955d0051967d14a
-
Filesize
124KB
MD5a4c8186a70f6f6c0366ea88aa28bc6bc
SHA14c3a8a2c4f774dd2e07e87ebb4cda64cb4bcd28a
SHA256e6eb8743a56a142eb2e3b7b19c533d88be2ae53639bf2e990f0d1e0031d4987f
SHA51267e5faea2958891a0e91ea4f29e361f20789b3aa9d23bfe08939e901a8774c7bc2a8011dcd6e9841d2e9c9eb057d55451f08c9069b0470668f750232ad98df3f
-
Filesize
124KB
MD551e811fee483033cf81bb22ba297273f
SHA1177275949a5260423813ba479f80e756cd4dc572
SHA256465bf5a007121e87128c7c72867ee9ac68751d4a6c41df5ced45db926a464043
SHA5125484556795d53533a6d19a8d6e4622fd759e44c36b1019c976d54e6e34afab10987ecd2703903e1d5cdaf4714030f99a9454ba0adaff193494e57362acdca721
-
Filesize
124KB
MD54d5ca6be4d33ba56efa05a6db2545843
SHA11d6fb0d46ed69797864dcfb3635fe1e692c0fb91
SHA2567b424862956829c49120e7caaf688264fa0fc9cc2d00a82e11966643e40efd6a
SHA5129e59bea61ce1f274fa67deb68981d0cc164d6254b3cf27c053f66994d5ace3140862ff7a852f6c6fe63c5fc18c0f1d446a6d06edf211b6ce4fa9c2240df46169
-
Filesize
124KB
MD531a4295f5f858ca127573e878ad6c757
SHA19932fd0251cfbaa147313baa67d16c031d05c884
SHA25611738def8bd4476498cac7c51641f4a38426fc5da1b97ec238ceb62d938026e3
SHA5120f699bb6f13a7e85a04f03cb3636aa49cb26c17b2c074c7419387d08cc36f18150f4826cbb6116318b2ef5f03b182802b1ccd28c60887aa7f1bb59efa0ba7b64
-
Filesize
124KB
MD5a8f8d2737f968801096da438a97669eb
SHA1cf69bc550395f83c99a4ba5447e2f404b548fe2c
SHA2569b4985c1b29887cba3032ea5b0582af22b2b038a65273d839877649472962182
SHA5128d3d4ca025f947047a396384e5798b52c95ec14e9a5b40a1594f15145ab733392b7f652f7bc3c2266c631ffaeaf71afe7d440337a3ea30d10b23c0f2875ac991
-
Filesize
124KB
MD5c592c02ca386b01c35a6f6d2397f890f
SHA1329006af9b09979705cb1644d64579bea763f01a
SHA2568d0ca6429f728a4e6b0dad6e0ebbc56797792ba6ca7f2ac6b13223ec39de6eff
SHA5123dbe7bf92fb6f755a95eba14c6d462daec137534d42ab75f741b34f5db7a90ff5ced2b0b5d86273d4864d3cb140d81fea01c6bac7a8a8977071dbf9b4d93507e
-
Filesize
124KB
MD5572e830c9eb58ace1f059c76d2efafc8
SHA1c103c70819c51dfdee91f04dd2f82a797806e056
SHA256710157e78444f0d6b79884f67dab39ad48e368e6c60797a327246198f26cc615
SHA5126c1943202f4055b705755cc8a23748a1381671f7eb49c3b3b53c02355956fc0aaa69cf89d43d56a595dafb1df8f8760a917c7e3eb30f69b19390eeef099d4bc9
-
Filesize
124KB
MD5daa2b3c38cded62d3202a51e4a0034df
SHA186e96b5d2fb0111016b64e4e778ea6fcb8ce35d5
SHA2568d743f63560bdf921d23a76b5512b258e92fc3babbca68ae7930e1b5d6d5abe9
SHA5126e2dad4be7a4a74fe46d107b181803dc3cdef63f15c7390057e54431aa1736cbf9dbd2f334bcc7f120cdaf19eb1d1e5f1cc7233afd0c47743d1646f1ae4859ec
-
Filesize
124KB
MD56d6d2bbd31024021e71bf0c7a2c8d3be
SHA17e56a2970d0f6d62c1f138659269939260e6b469
SHA256ba718d253f746de5f0aa88fa615a590a82cc2365af6eee3ceef4630ed151de51
SHA512960877fe79623758a9ae788d7f6e5cda4e5f817346a95187786c953bca936a0d5962f6b5d04fd3aa5c9ece2cb2022748806b0b15055f55faae6104709a243b77
-
Filesize
124KB
MD532c64e32e7011aec5dc8790a864e1f95
SHA197071cdbddcd0a6f35f3e4078ddf0f6a5d08e767
SHA256ceb1cffa59fab57c48fec0b17e13b96e3528b92fca4f68ef36dda627907a92ba
SHA512cfed7ffe1340ab1f157b7af8c8489e2d571e82c183acbcba0b49f452f7da387321d623ac25dad694023c1a567058ba5db9759f0ef03cae964b577e63fbb0145c
-
Filesize
124KB
MD5ef56996608e4b5cb4926ed50e82f6eaf
SHA1408bff5152939e5e24bda2805444ebc804ebc110
SHA2562f51599353f9629e80347d909f0f35ecfb34899fbb65531c107527ef1ff82707
SHA512abe3913be32d6a2f3a1390193abaee3711244dcfe7220864b27916d3c9383634aecd8e52adfdbca4d343f379bb883dac4f6a713bb484d90b3d00bffe11f1a081
-
Filesize
124KB
MD58d4b85155d8905e2fb1540c67dafd4c4
SHA18f3dcfd4e5ee390e87bcd5f9faab3dc6c69801c4
SHA256775f84ba321f1d9f9ce7a6e83506a4e8c614b4ebd6f37b3aa113c81b45b10a0e
SHA512d06d3287e891b0def3de3fa59bd9ba84e8f320c3e900f05e47c6825c8bd595397a107fd386e3b5e7a84a71752cf0d7f9010975b2b982b00e8e848a3e6e151877
-
Filesize
124KB
MD5054d3000cc7b0489052a0422242f7de7
SHA110ad47c0f29f44f6bd1950ee1d8958fb9c9f1a82
SHA256c9d772c4381334c4ca5f2eb01c832f481d88150d35a0ae45e31b313bbaa08734
SHA5126d9e434374942c733e9c8722c8bb9801d161a9ea2173e618394b27a8cfeaa0484d73dbdbe6f54f13219b9cd6d894bb98941b289f62f2a68f4f18f091b2b64cf8
-
Filesize
124KB
MD543ba1c52b8bbfc2dfc404f39243d87a8
SHA11ba8c171cc1a0098e125068dfeea180bbd96832a
SHA2562174472f3a845cedb1e6536d3e043a9948fb6fad8ac41a4d8476c133fa5ed251
SHA51270e202450377d3a3c5293a8c678f1020b3e75658474c22a59523d1c4c033867ed672ae7a7626b0c6037d4a3d6d61afa7a3d124b0d8ddf73bd6b099d000aff58e
-
Filesize
124KB
MD583c6576a7614339919298e8e605d3fe6
SHA1b8361db65128d439f69d5e4d09956d6312819e8a
SHA2562a3926e9edbb469d85f018dd4e12cd4f5f11e19a13be1bad0b18b01fabc806d6
SHA512c35885013fb188af9a5999a5292af3ea08d73a3fe91800299d9299c43f382424982ceb04c7728e611031e0b706745ea0086b94a505781eb88e7943155096e7fa
-
Filesize
124KB
MD539acd339c8ca6a202df5ec55dbe4bedd
SHA1a4edc5b53323dfe8e8bccb30fa75036f0e7dd314
SHA256f2ebcd8c3d1fd59a4e630caae295c845795914efd6dbf1af5685452e7daab71a
SHA512abda91ea477495927fa8d208f3a2fc9d838f5e5df54b4e2182f47f9ef71d8a98c227c8c3bef2720637f7113d903dfb5bd135c25103b8fff9969f8f1b9a6051b7
-
Filesize
124KB
MD5458c1a669f0af574359bb16021bea064
SHA13caf12da8ed1a1fa47a569d59d300c5ec14ec725
SHA2562b8767c04fa01dce81fc776bafacd434a90eee6f494eda5b89081e78df428774
SHA512dd9ac5011b4a6cf43401bfdda06cfc34eace1b61fab5e41ab15b1d43833acb130e3b2ed05a505778ba704697abfe4e75ea00de24a0235b3d63c01c560eaa46e9