Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
17/05/2024, 00:17
Static task
static1
Behavioral task
behavioral1
Sample
77bae933800a5ea4dde4f85b8ba7b02fbae2359e3d9e9e79443625d65ef5513d.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
77bae933800a5ea4dde4f85b8ba7b02fbae2359e3d9e9e79443625d65ef5513d.exe
Resource
win10v2004-20240426-en
General
-
Target
77bae933800a5ea4dde4f85b8ba7b02fbae2359e3d9e9e79443625d65ef5513d.exe
-
Size
124KB
-
MD5
94ca7a3511d9ce833ad8a8716d95c620
-
SHA1
4b946f53b780da367a80d3122ea33ac73c60c4b6
-
SHA256
77bae933800a5ea4dde4f85b8ba7b02fbae2359e3d9e9e79443625d65ef5513d
-
SHA512
7c454fc1ae3bbceb5541a98172d6ae6835e00c291f5c823213e713b2f782810901601f9eba71992e81746933f1c71016b5605a6d0ef9b300f494c7c52ca7851b
-
SSDEEP
1536:Jkszn5YXhRO/N69BH3OoGa+FL9jKceRgrkjSo:+G5YXhkFoN3Oo1+F92S
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 43 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" foixa.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" soded.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" heupo.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" qegej.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" veayed.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" xkqoer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" meaoh.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" heuboq.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" wouhiw.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" fnrev.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" boatek.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" sykor.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" vuodi.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ceuhaub.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" nuakaf.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" huaego.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" foiac.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" xhyoom.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" vaaapok.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" nakas.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" luken.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" riibiv.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" yeaqao.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" giaigiv.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" teamup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" huoemo.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" qdfaup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" vuaonu.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" hgjaos.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" naoaji.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" huovuuv.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" zouiqo.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ruibuu.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 77bae933800a5ea4dde4f85b8ba7b02fbae2359e3d9e9e79443625d65ef5513d.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" coios.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" lufin.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" zoaxeo.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" cuugu.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" tawet.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" haajuz.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" boius.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" xuiwua.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" xeeubob.exe -
Checks computer location settings 2 TTPs 43 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation huaego.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation xhyoom.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation teamup.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation foiac.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation xeeubob.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation ceuhaub.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation naoaji.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation huoemo.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation luken.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation vaaapok.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation coios.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation huovuuv.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation yeaqao.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation soded.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation hgjaos.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation meaoh.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation qdfaup.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation nakas.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation sykor.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation haajuz.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation ruibuu.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation xkqoer.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation foixa.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation boatek.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation tawet.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation vuaonu.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation heuboq.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation zoaxeo.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation fnrev.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation cuugu.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation lufin.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation boius.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation xuiwua.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation zouiqo.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation vuodi.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation wouhiw.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation qegej.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation 77bae933800a5ea4dde4f85b8ba7b02fbae2359e3d9e9e79443625d65ef5513d.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation veayed.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation riibiv.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation giaigiv.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation heupo.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation nuakaf.exe -
Executes dropped EXE 43 IoCs
pid Process 2588 xkqoer.exe 4192 meaoh.exe 3396 cuugu.exe 4308 coios.exe 60 boatek.exe 1200 tawet.exe 1920 lufin.exe 3564 huoemo.exe 2268 nuakaf.exe 1828 hgjaos.exe 1680 qdfaup.exe 4632 nakas.exe 2340 sykor.exe 3528 vuaonu.exe 3024 naoaji.exe 1308 luken.exe 4748 huovuuv.exe 1728 riibiv.exe 4872 yeaqao.exe 5108 giaigiv.exe 2888 boius.exe 3100 huaego.exe 2216 heuboq.exe 2032 xuiwua.exe 4472 foixa.exe 4368 haajuz.exe 1684 zouiqo.exe 1388 xhyoom.exe 3304 teamup.exe 772 ruibuu.exe 2152 vuodi.exe 4272 wouhiw.exe 1676 soded.exe 2092 zoaxeo.exe 3456 foiac.exe 408 vaaapok.exe 3608 xeeubob.exe 3056 heupo.exe 4728 qegej.exe 3576 veayed.exe 3080 fnrev.exe 3504 ceuhaub.exe 4384 soaof.exe -
Adds Run key to start application 2 TTPs 43 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\huoemo = "C:\\Users\\Admin\\huoemo.exe /t" lufin.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xuiwua = "C:\\Users\\Admin\\xuiwua.exe /w" heuboq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\foixa = "C:\\Users\\Admin\\foixa.exe /G" xuiwua.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wouhiw = "C:\\Users\\Admin\\wouhiw.exe /s" vuodi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\soded = "C:\\Users\\Admin\\soded.exe /v" wouhiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vaaapok = "C:\\Users\\Admin\\vaaapok.exe /r" foiac.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lufin = "C:\\Users\\Admin\\lufin.exe /O" tawet.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zoaxeo = "C:\\Users\\Admin\\zoaxeo.exe /a" soded.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qegej = "C:\\Users\\Admin\\qegej.exe /p" heupo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\veayed = "C:\\Users\\Admin\\veayed.exe /C" qegej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fnrev = "C:\\Users\\Admin\\fnrev.exe /H" veayed.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nuakaf = "C:\\Users\\Admin\\nuakaf.exe /E" huoemo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\huaego = "C:\\Users\\Admin\\huaego.exe /U" boius.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haajuz = "C:\\Users\\Admin\\haajuz.exe /b" foixa.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xhyoom = "C:\\Users\\Admin\\xhyoom.exe /z" zouiqo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xeeubob = "C:\\Users\\Admin\\xeeubob.exe /y" vaaapok.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\soaof = "C:\\Users\\Admin\\soaof.exe /Q" ceuhaub.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\riibiv = "C:\\Users\\Admin\\riibiv.exe /N" huovuuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nakas = "C:\\Users\\Admin\\nakas.exe /w" qdfaup.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuaonu = "C:\\Users\\Admin\\vuaonu.exe /N" sykor.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\giaigiv = "C:\\Users\\Admin\\giaigiv.exe /V" yeaqao.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hgjaos = "C:\\Users\\Admin\\hgjaos.exe /J" nuakaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qdfaup = "C:\\Users\\Admin\\qdfaup.exe /B" hgjaos.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\naoaji = "C:\\Users\\Admin\\naoaji.exe /k" vuaonu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\huovuuv = "C:\\Users\\Admin\\huovuuv.exe /C" luken.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ruibuu = "C:\\Users\\Admin\\ruibuu.exe /I" teamup.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\foiac = "C:\\Users\\Admin\\foiac.exe /N" zoaxeo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceuhaub = "C:\\Users\\Admin\\ceuhaub.exe /g" fnrev.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\coios = "C:\\Users\\Admin\\coios.exe /O" cuugu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tawet = "C:\\Users\\Admin\\tawet.exe /x" boatek.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yeaqao = "C:\\Users\\Admin\\yeaqao.exe /f" riibiv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\boius = "C:\\Users\\Admin\\boius.exe /j" giaigiv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heuboq = "C:\\Users\\Admin\\heuboq.exe /v" huaego.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuodi = "C:\\Users\\Admin\\vuodi.exe /e" ruibuu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heupo = "C:\\Users\\Admin\\heupo.exe /H" xeeubob.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cuugu = "C:\\Users\\Admin\\cuugu.exe /R" meaoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\meaoh = "C:\\Users\\Admin\\meaoh.exe /h" xkqoer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\boatek = "C:\\Users\\Admin\\boatek.exe /u" coios.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sykor = "C:\\Users\\Admin\\sykor.exe /F" nakas.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\luken = "C:\\Users\\Admin\\luken.exe /s" naoaji.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zouiqo = "C:\\Users\\Admin\\zouiqo.exe /i" haajuz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teamup = "C:\\Users\\Admin\\teamup.exe /W" xhyoom.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xkqoer = "C:\\Users\\Admin\\xkqoer.exe /D" 77bae933800a5ea4dde4f85b8ba7b02fbae2359e3d9e9e79443625d65ef5513d.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3272 77bae933800a5ea4dde4f85b8ba7b02fbae2359e3d9e9e79443625d65ef5513d.exe 3272 77bae933800a5ea4dde4f85b8ba7b02fbae2359e3d9e9e79443625d65ef5513d.exe 2588 xkqoer.exe 2588 xkqoer.exe 4192 meaoh.exe 4192 meaoh.exe 3396 cuugu.exe 3396 cuugu.exe 4308 coios.exe 4308 coios.exe 60 boatek.exe 60 boatek.exe 1200 tawet.exe 1200 tawet.exe 1920 lufin.exe 1920 lufin.exe 3564 huoemo.exe 3564 huoemo.exe 2268 nuakaf.exe 2268 nuakaf.exe 1828 hgjaos.exe 1828 hgjaos.exe 1680 qdfaup.exe 1680 qdfaup.exe 4632 nakas.exe 4632 nakas.exe 2340 sykor.exe 2340 sykor.exe 3528 vuaonu.exe 3528 vuaonu.exe 3024 naoaji.exe 3024 naoaji.exe 1308 luken.exe 1308 luken.exe 4748 huovuuv.exe 4748 huovuuv.exe 1728 riibiv.exe 1728 riibiv.exe 4872 yeaqao.exe 4872 yeaqao.exe 5108 giaigiv.exe 5108 giaigiv.exe 2888 boius.exe 2888 boius.exe 3100 huaego.exe 3100 huaego.exe 2216 heuboq.exe 2216 heuboq.exe 2032 xuiwua.exe 2032 xuiwua.exe 4472 foixa.exe 4472 foixa.exe 4368 haajuz.exe 4368 haajuz.exe 1684 zouiqo.exe 1684 zouiqo.exe 1388 xhyoom.exe 1388 xhyoom.exe 3304 teamup.exe 3304 teamup.exe 772 ruibuu.exe 772 ruibuu.exe 2152 vuodi.exe 2152 vuodi.exe -
Suspicious use of SetWindowsHookEx 44 IoCs
pid Process 3272 77bae933800a5ea4dde4f85b8ba7b02fbae2359e3d9e9e79443625d65ef5513d.exe 2588 xkqoer.exe 4192 meaoh.exe 3396 cuugu.exe 4308 coios.exe 60 boatek.exe 1200 tawet.exe 1920 lufin.exe 3564 huoemo.exe 2268 nuakaf.exe 1828 hgjaos.exe 1680 qdfaup.exe 4632 nakas.exe 2340 sykor.exe 3528 vuaonu.exe 3024 naoaji.exe 1308 luken.exe 4748 huovuuv.exe 1728 riibiv.exe 4872 yeaqao.exe 5108 giaigiv.exe 2888 boius.exe 3100 huaego.exe 2216 heuboq.exe 2032 xuiwua.exe 4472 foixa.exe 4368 haajuz.exe 1684 zouiqo.exe 1388 xhyoom.exe 3304 teamup.exe 772 ruibuu.exe 2152 vuodi.exe 4272 wouhiw.exe 1676 soded.exe 2092 zoaxeo.exe 3456 foiac.exe 408 vaaapok.exe 3608 xeeubob.exe 3056 heupo.exe 4728 qegej.exe 3576 veayed.exe 3080 fnrev.exe 3504 ceuhaub.exe 4384 soaof.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3272 wrote to memory of 2588 3272 77bae933800a5ea4dde4f85b8ba7b02fbae2359e3d9e9e79443625d65ef5513d.exe 87 PID 3272 wrote to memory of 2588 3272 77bae933800a5ea4dde4f85b8ba7b02fbae2359e3d9e9e79443625d65ef5513d.exe 87 PID 3272 wrote to memory of 2588 3272 77bae933800a5ea4dde4f85b8ba7b02fbae2359e3d9e9e79443625d65ef5513d.exe 87 PID 2588 wrote to memory of 4192 2588 xkqoer.exe 94 PID 2588 wrote to memory of 4192 2588 xkqoer.exe 94 PID 2588 wrote to memory of 4192 2588 xkqoer.exe 94 PID 4192 wrote to memory of 3396 4192 meaoh.exe 96 PID 4192 wrote to memory of 3396 4192 meaoh.exe 96 PID 4192 wrote to memory of 3396 4192 meaoh.exe 96 PID 3396 wrote to memory of 4308 3396 cuugu.exe 99 PID 3396 wrote to memory of 4308 3396 cuugu.exe 99 PID 3396 wrote to memory of 4308 3396 cuugu.exe 99 PID 4308 wrote to memory of 60 4308 coios.exe 100 PID 4308 wrote to memory of 60 4308 coios.exe 100 PID 4308 wrote to memory of 60 4308 coios.exe 100 PID 60 wrote to memory of 1200 60 boatek.exe 101 PID 60 wrote to memory of 1200 60 boatek.exe 101 PID 60 wrote to memory of 1200 60 boatek.exe 101 PID 1200 wrote to memory of 1920 1200 tawet.exe 102 PID 1200 wrote to memory of 1920 1200 tawet.exe 102 PID 1200 wrote to memory of 1920 1200 tawet.exe 102 PID 1920 wrote to memory of 3564 1920 lufin.exe 103 PID 1920 wrote to memory of 3564 1920 lufin.exe 103 PID 1920 wrote to memory of 3564 1920 lufin.exe 103 PID 3564 wrote to memory of 2268 3564 huoemo.exe 104 PID 3564 wrote to memory of 2268 3564 huoemo.exe 104 PID 3564 wrote to memory of 2268 3564 huoemo.exe 104 PID 2268 wrote to memory of 1828 2268 nuakaf.exe 107 PID 2268 wrote to memory of 1828 2268 nuakaf.exe 107 PID 2268 wrote to memory of 1828 2268 nuakaf.exe 107 PID 1828 wrote to memory of 1680 1828 hgjaos.exe 108 PID 1828 wrote to memory of 1680 1828 hgjaos.exe 108 PID 1828 wrote to memory of 1680 1828 hgjaos.exe 108 PID 1680 wrote to memory of 4632 1680 qdfaup.exe 109 PID 1680 wrote to memory of 4632 1680 qdfaup.exe 109 PID 1680 wrote to memory of 4632 1680 qdfaup.exe 109 PID 4632 wrote to memory of 2340 4632 nakas.exe 110 PID 4632 wrote to memory of 2340 4632 nakas.exe 110 PID 4632 wrote to memory of 2340 4632 nakas.exe 110 PID 2340 wrote to memory of 3528 2340 sykor.exe 111 PID 2340 wrote to memory of 3528 2340 sykor.exe 111 PID 2340 wrote to memory of 3528 2340 sykor.exe 111 PID 3528 wrote to memory of 3024 3528 vuaonu.exe 112 PID 3528 wrote to memory of 3024 3528 vuaonu.exe 112 PID 3528 wrote to memory of 3024 3528 vuaonu.exe 112 PID 3024 wrote to memory of 1308 3024 naoaji.exe 113 PID 3024 wrote to memory of 1308 3024 naoaji.exe 113 PID 3024 wrote to memory of 1308 3024 naoaji.exe 113 PID 1308 wrote to memory of 4748 1308 luken.exe 114 PID 1308 wrote to memory of 4748 1308 luken.exe 114 PID 1308 wrote to memory of 4748 1308 luken.exe 114 PID 4748 wrote to memory of 1728 4748 huovuuv.exe 115 PID 4748 wrote to memory of 1728 4748 huovuuv.exe 115 PID 4748 wrote to memory of 1728 4748 huovuuv.exe 115 PID 1728 wrote to memory of 4872 1728 riibiv.exe 118 PID 1728 wrote to memory of 4872 1728 riibiv.exe 118 PID 1728 wrote to memory of 4872 1728 riibiv.exe 118 PID 4872 wrote to memory of 5108 4872 yeaqao.exe 119 PID 4872 wrote to memory of 5108 4872 yeaqao.exe 119 PID 4872 wrote to memory of 5108 4872 yeaqao.exe 119 PID 5108 wrote to memory of 2888 5108 giaigiv.exe 120 PID 5108 wrote to memory of 2888 5108 giaigiv.exe 120 PID 5108 wrote to memory of 2888 5108 giaigiv.exe 120 PID 2888 wrote to memory of 3100 2888 boius.exe 121
Processes
-
C:\Users\Admin\AppData\Local\Temp\77bae933800a5ea4dde4f85b8ba7b02fbae2359e3d9e9e79443625d65ef5513d.exe"C:\Users\Admin\AppData\Local\Temp\77bae933800a5ea4dde4f85b8ba7b02fbae2359e3d9e9e79443625d65ef5513d.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3272 -
C:\Users\Admin\xkqoer.exe"C:\Users\Admin\xkqoer.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Users\Admin\meaoh.exe"C:\Users\Admin\meaoh.exe"3⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4192 -
C:\Users\Admin\cuugu.exe"C:\Users\Admin\cuugu.exe"4⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3396 -
C:\Users\Admin\coios.exe"C:\Users\Admin\coios.exe"5⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4308 -
C:\Users\Admin\boatek.exe"C:\Users\Admin\boatek.exe"6⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:60 -
C:\Users\Admin\tawet.exe"C:\Users\Admin\tawet.exe"7⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Users\Admin\lufin.exe"C:\Users\Admin\lufin.exe"8⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Users\Admin\huoemo.exe"C:\Users\Admin\huoemo.exe"9⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3564 -
C:\Users\Admin\nuakaf.exe"C:\Users\Admin\nuakaf.exe"10⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Users\Admin\hgjaos.exe"C:\Users\Admin\hgjaos.exe"11⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Users\Admin\qdfaup.exe"C:\Users\Admin\qdfaup.exe"12⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Users\Admin\nakas.exe"C:\Users\Admin\nakas.exe"13⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4632 -
C:\Users\Admin\sykor.exe"C:\Users\Admin\sykor.exe"14⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Users\Admin\vuaonu.exe"C:\Users\Admin\vuaonu.exe"15⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3528 -
C:\Users\Admin\naoaji.exe"C:\Users\Admin\naoaji.exe"16⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Users\Admin\luken.exe"C:\Users\Admin\luken.exe"17⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Users\Admin\huovuuv.exe"C:\Users\Admin\huovuuv.exe"18⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4748 -
C:\Users\Admin\riibiv.exe"C:\Users\Admin\riibiv.exe"19⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Users\Admin\yeaqao.exe"C:\Users\Admin\yeaqao.exe"20⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4872 -
C:\Users\Admin\giaigiv.exe"C:\Users\Admin\giaigiv.exe"21⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Users\Admin\boius.exe"C:\Users\Admin\boius.exe"22⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Users\Admin\huaego.exe"C:\Users\Admin\huaego.exe"23⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3100 -
C:\Users\Admin\heuboq.exe"C:\Users\Admin\heuboq.exe"24⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2216 -
C:\Users\Admin\xuiwua.exe"C:\Users\Admin\xuiwua.exe"25⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2032 -
C:\Users\Admin\foixa.exe"C:\Users\Admin\foixa.exe"26⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4472 -
C:\Users\Admin\haajuz.exe"C:\Users\Admin\haajuz.exe"27⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4368 -
C:\Users\Admin\zouiqo.exe"C:\Users\Admin\zouiqo.exe"28⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1684 -
C:\Users\Admin\xhyoom.exe"C:\Users\Admin\xhyoom.exe"29⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1388 -
C:\Users\Admin\teamup.exe"C:\Users\Admin\teamup.exe"30⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3304 -
C:\Users\Admin\ruibuu.exe"C:\Users\Admin\ruibuu.exe"31⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:772 -
C:\Users\Admin\vuodi.exe"C:\Users\Admin\vuodi.exe"32⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2152 -
C:\Users\Admin\wouhiw.exe"C:\Users\Admin\wouhiw.exe"33⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:4272 -
C:\Users\Admin\soded.exe"C:\Users\Admin\soded.exe"34⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:1676 -
C:\Users\Admin\zoaxeo.exe"C:\Users\Admin\zoaxeo.exe"35⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:2092 -
C:\Users\Admin\foiac.exe"C:\Users\Admin\foiac.exe"36⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:3456 -
C:\Users\Admin\vaaapok.exe"C:\Users\Admin\vaaapok.exe"37⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:408 -
C:\Users\Admin\xeeubob.exe"C:\Users\Admin\xeeubob.exe"38⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:3608 -
C:\Users\Admin\heupo.exe"C:\Users\Admin\heupo.exe"39⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:3056 -
C:\Users\Admin\qegej.exe"C:\Users\Admin\qegej.exe"40⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:4728 -
C:\Users\Admin\veayed.exe"C:\Users\Admin\veayed.exe"41⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:3576 -
C:\Users\Admin\fnrev.exe"C:\Users\Admin\fnrev.exe"42⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:3080 -
C:\Users\Admin\ceuhaub.exe"C:\Users\Admin\ceuhaub.exe"43⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:3504 -
C:\Users\Admin\soaof.exe"C:\Users\Admin\soaof.exe"44⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4384
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
124KB
MD5956122936851258d989e1ee1925f2ad0
SHA192805066382abd35acfbce162a636a5108dd6eb5
SHA2562b1ecc44fc440f4f38e3277c4be38d2cd02495ed5b2b6fa574e62702d6f06309
SHA5125cb248a6a67a89c451a01666f4a3690bac2b832ee85a43303ef5ddc61994edddb4973b20de43168bc8e8efced0425b51a039bf720cf32ebd65f1b427496f7560
-
Filesize
124KB
MD5fe8591df547fbac8acdaf5c1e4e716f4
SHA1b38a5f4d7178b058b51559cc4dd0a1797f647540
SHA2569afdfc908c36322d569550ebf9bc92f0d92cf6bdc13796d25c1afe3407e1fe69
SHA512501c2a901207784c98abe5cf84a87aeb5a4170b716c11edfed16cad389bd5f74cc2976311182e0efa66d052a2671ef0c1746f05b3a69da1d5f70baf6ccd2763c
-
Filesize
124KB
MD5fe3b2ece45eb979d7eebbc8687febfc7
SHA1e6422e4e8d4b43f4e532a4869bdceabb8bcd6540
SHA2567eb20c80efe6ea715186f505b5185c5a2d37411bbb63e0c9a6050a43f7af8b84
SHA512986c325b11b8edf3fb3eaae584f791d67d88212ee0af5b7061d82cddcecae5f7d579e9945b93b9aa2ce08e424241ae4adb6486c54be91b9b52d7b2f4b77a9cf8
-
Filesize
124KB
MD59e3476bcf52465318bab5db441e7e70a
SHA1bd120179fe7a8e85eb4494995258eb2ff2e76163
SHA256f3b36e1f4f95319faab9c7cd200330e3733d82ea4a01575f206b4bdbafebf7da
SHA512ace272db72a8c6ae092122031a1c8f53b420073bc72b4dc86a67c183235cdd2f94e1d4ffd26b88dd1a3dc89ba9873a05473da3c418d5956dcbe95d5b92bab6f3
-
Filesize
124KB
MD525ad90b92c007001e24f55fe9b736bc6
SHA17473ea0d2eb4e29c6676fd896c53d1ca9b1cb66d
SHA25693c9ef16aa728848f31c9b0db9b53239b8a1d4dd17846d22746fc83f1574f527
SHA51281d3e8b4989cd7a28c652ec67a6bf6c3272fc01507c6f11af006048a4bd4808df8cb013cf7be468c3c289397a0e65d77c9bf47656f6860157c57817514bc0f7d
-
Filesize
124KB
MD553d9cc9eeb6effdf757ed5daa954b79d
SHA16859c5cb95e4ca8d70c113c3afda9ea708ecf86e
SHA2562c90a5d827d1db6a3f1a0d30ae5d4642cc87c55738c00d33b09f90261ff10edb
SHA5129d826f5edd0c0827a4447e0882d67f300f991d758c54bbbd8f52ea889f4efee66b7bb3d0bf64a7b111a6bcdae6df1cbbabe85f6bc47dc78fb04ee7c0b2255433
-
Filesize
124KB
MD5dbe91734694e539fad4713fbef934150
SHA101481395198b7ff93e06513dd9663c9b78f00b88
SHA25667079a60ddd0a3bfa00baf49ef8edd9452c18d121db6c687f33890ae3d46b5fc
SHA512029537956426ecf659f9ff2474fe625f1e60eeb4762dc02f29f35e26cad2fb3dbbe8daa63d4809197e14606b85c0534e9789321c1b8c1e621e8ba47d5c91e8a0
-
Filesize
124KB
MD54bb3016f741f24334a35c65150a01e38
SHA16566e387dfbc2525793611369976c1a3932c1b05
SHA256322e49f98fa275d68d0e8d452145860a7fb33e9ecd57c67532d5f97fb3914e6d
SHA51285682c028d1373f19cb9a95c3052ea9b004bada3b73a4e467a61c62118a96e617ab34c854cb4dce020000b2b75d02881edc9b369559a71051699d6782fa8fc3b
-
Filesize
124KB
MD50385a76026d8dcde7bb4ac73ed215d69
SHA1a48203a48587255d6abc9332dd83d7b5cedd3a82
SHA256b419378911511c4f1231bfd78d6db2395b91a1896e60efe9eb4412ba02af0f41
SHA51275cf9133ce5e49cdc23138857962d7ad330ad70dada53c0dd4ff81bdcde7aac945a7158d01d2f7369630f2c421a657cefc446d74b3b90148844255647602d473
-
Filesize
124KB
MD5bcaf00d091b040fa3e99edda8565e2e0
SHA1dd2e0a64c7982c9c1ccffe8baa3c6200726a80ee
SHA2567385a7f6ca08cb4ab6f473e5598c52ad73541e01a754a21cbee7d07d7e1b7c60
SHA51205218ba13abbdebcd7075a6021da86d4ffd3bd4f500f12dbf398446b351d2683784bf711ba5719a4385ff1647ed6423776610713aae36485b26d9bd5455dac1f
-
Filesize
124KB
MD5da4c0d936d087e3ac5e206ef1a3e61fa
SHA1a0634b41a6d9ba234b534a239a2b9dde92590b7e
SHA256a7332ca67c2b7442ee47cf328cecf6e2f675be736391eef577e487425a7138d5
SHA512f97ce1cf82d5a3cd9f6f7a832d72389f7d6091b174af099561e51f9f3706b4ddad9c4a245cdf626a0aa656e0d3d8ffe9195c57a180bd499c940336c31f839229
-
Filesize
124KB
MD5163949218a3463c20eed5e8f90b777ad
SHA17bf3eddd8554f29c6d39b6a37c1d0920e3af3dfe
SHA256b2853ddb3d863bd28532143f4aa13d86106286dd4c9dd95cc8693f92b003c609
SHA5121d2c3421e8b9bb535b228f22cc05cab6a94690ac27979d81816bdb51aa03f8e96ba4b84ec35fcc5550498ff22e7df12e67c5e10ea992d2af1f821663ecc73885
-
Filesize
124KB
MD511c6c87e78873b59cd45ac040d4a09e5
SHA1e84afe0dcd764d050342b8207624b394885b7f45
SHA256b3cc5f589af4a1d6f0bfea9f627f0cb7cb7b799d763463c569910524f1a3f26c
SHA5121471e5980822b469e29ff6a2784e03f93dfa4fd8aa53e1e51227bb0f0091a5466a9c8a947e65f4838e5bcca10966b796e5a406525612977d8b7c1fc12ecb22fc
-
Filesize
124KB
MD52171112c4ba06efaf038041af415952f
SHA191921e3d1823b1236fd669a3c5b0d979503fadba
SHA25685bb642a83274924b258920e0f3f576ea53c3fb2b90e0e40cac995c7263b533e
SHA5128166fe88584eb404f53aad218459f0eeabc33eddd6a91f56d39d2848c8288362d01279c46d8c55a3b6f08a755fe557b80e6c43454c9cf608e01c05689d8bfb29
-
Filesize
124KB
MD530b96d2ea1a5042482de60d63b5434db
SHA16d2b2bd39bae56f5d6ecfd7308eff9661d31c96a
SHA256039d7349a92971892d23db96d09637517e82eb118dd14f4691ce45f3386eeb71
SHA51289ee7b6abc8d5a47a050affe85c5a1e881c7a44c6f2fdafebc6b2623caa5ad17c4c35820235c25b68d2909a15579a1be248ebc3074ead8484d4d7cbefb65f0d7
-
Filesize
124KB
MD5d83f175276042fa6b0983c364df17843
SHA12fd0efb58d2efe7df5a83a7c0fa9573acd52e678
SHA2565809517557b3543c1ccc09236f1acb0dfbec28ef5e3354548625ac5a4154492d
SHA5120d9f56f9aa92ee203140a541db54348c784470d1e8f8cf696d1de3131dcb4baba9ac5599baa88e4868c0dbfa55cb738889148aa2d76d67f7f97f76aa5a4075ea
-
Filesize
124KB
MD5a7c9861a0af3e4630b369bd41b36e182
SHA1dbe191c55ddcc80afc1a5871f2c13ebe70ed1f59
SHA2566e0b20e56acca5fd28147d702f35494f78c7aa5dae96feb71bee39bffdda86b6
SHA512befb42ecc61dc4f0c042af3c17103db89e4ca48348d322c9da029e8721cfd42de893cbe509401af337ed8b796fc9e53e590a47600161d69946f3d82d5733b329
-
Filesize
124KB
MD591eb53e8c3b70afd2633fe458d18d035
SHA1f9383b3e7341f37de66a4d88dcb57a533404fc98
SHA2566212d4e33c92c93044d500a872d2d01ef38d6abaead11cbec8c78e84eef3bdcd
SHA5120fb72e9bc9643d8d582101eb07806095159ffdb25898bcc497af7dabc64dbb2c14b6733c237a401dcf27cb3ab7796b14b92de5d17d8cd60714243841c281b940
-
Filesize
124KB
MD5e41c8e2d8941295a6713640b53218ce9
SHA1017092a4fd7b2d38abbf8d4476f1b69f159c54fb
SHA256dfe01dba59ccd1a017ee0640c567157e90f1d66a8952daa1df57004024b1bd9c
SHA5124094334d823b8d202bd95e8d10ba1782726b65e540414992255fab0fc92c8da6a25f019bf9374931e497d717d3aee9a71825cf0b503a9586444ed3f35d46c001
-
Filesize
124KB
MD5e0ab1c258faf4842f34fe62d955d4913
SHA137fd4ea98ac86498319aaf5cde92a743458b106b
SHA256db431875cf81ff887c7858e3d481841f6cdb241e71bf752a1af74f122c50aaa7
SHA512b1f4e5599325b06aa2e6ac0451f46486af4fe19db3fa4871cbb8ad19032b89c679d5248b923e53d93cf140fb5f8752e94c6a34611fb91fa4f8dab9fb058ba74d
-
Filesize
124KB
MD58085b1b002d3cb42b9116d0f9fef210e
SHA1b62572c3f02763f1ef90fbe162d7a664c4811259
SHA256d5c5a371c99239ce429f26a89cc2a8059c854ba6abbff8af8dc68740eccc1eb2
SHA5129e3377098a2b9b869d1849a7353c2c12f51f3ab994b1b18ac328a458fdea7d2f2cfa6f62941b568455fb1d35d44066d60f30ea6242c2402ac07e71728d38a9ee
-
Filesize
124KB
MD53160aa569df50590319c8810f8909228
SHA18e92316e712c9dd62421e66141059048dc9c9fad
SHA256785db90dc74667355cf554d9fa7d3bb42dca3fcfd1e964ea093710c663b06205
SHA5122d1fc8156ce1eb1c3ea53b5b36b558ebf227997b5f0d6772a0e2f1cf75f9ce470e00425194a1e384b8c19c229dab90ef850b0c6f2c88fecac7e85d18b1a72d2f
-
Filesize
124KB
MD55df26b243ec9777aebfda5f12be7ca2d
SHA1eeac500f4c7bb41431bc9de32a38189be8cdfd59
SHA256df650601e385ce6de9ce09742da59d7c4e3a7dd4176d7a7b733796814874437d
SHA512a0590f69d75bd16136f7f4a03bdd756794221c0573c086005ec61525c073a82f028cfec734405df9d70c91d1170669dd706ce71e7832028e5eae65e3c459b9f2
-
Filesize
124KB
MD5eb37a921896d0ea6e5b67a890a3daf93
SHA1c8c12cefeaabd13a2cd785139979d568e3e4396e
SHA256edde45fedb490167f69ef2a0740262295577021731d8ab1602f04ec9038caed8
SHA512fb8ee1b63f8a67727948762b7c6c0915109914178588e4c0a07378eab6e5b8013e4df52258511870934281cf67396c833378ef460c8df7c52039890a2bf7199b
-
Filesize
124KB
MD53adf8eb6a7d1387d9065fff6532af2fe
SHA12e5c71446416f5d2d22b9d9771fe9e8839ddfdf3
SHA256a8d8e0100d3e0863270cc4ec3e8ac26e92bb19780b4e498ebbc0c89b57fa1662
SHA512121316e9efdc0be582feaf8021900abff50baa5ea131d829bef991fe36cfa87fac24fa9d2d350c96dc9b48c9788de8ececa5fd5225f169114a35f52282da0610
-
Filesize
124KB
MD53edb337e7d6249ae5c432ffc5be05da5
SHA15aab81049cfe6a813fd7b2258c6c10c23169ca61
SHA25623ce8b5ca1f8ab27a2284b938aabc9c7b870516052df9d0ea3012dbaf8c02c6a
SHA5123467840b5092cf68eca9372bc232972b11803a59c1a17eedda4d960f34bbc3108f787fc3378b676917bb1e9c5403faef40106ad26d8a9123029577d99997db61
-
Filesize
124KB
MD5f1f095114527fb54a90f0d28cfc844dd
SHA1b2e44ebdeba1cb4514e9d4b3b33cb90e0249cd61
SHA2564fd28bf0481c0f9a4cdbef177fba3b4264fad3cccbf8c76dfe235a64d93b2ed1
SHA512116be9e463f9a604be3fa69245931e9a26009c103e38533fac702f8c54ca1829e53bac3be011ad30b3995aebace54f8863bd650166dbd37d98e576cde74609e1
-
Filesize
124KB
MD5847ff93335945f972733bea049344d5c
SHA13b4b41e40de01c012908c7fd55c1f333dda8445e
SHA256d017c629e89cfdf071581a1b2f9769c4cbbf1fc7dc6dcd8595aed26ef3e3b501
SHA51273e0c4eb44113df34895a657272b540511b3d728e36e49d6bc448a0f455ddd78006877170a46cf26fe584c2e62de1e6f34642edc4f8e1b4b612b1d868d06fff1
-
Filesize
124KB
MD5385f8240c98ddf9cb76d00b27d53cbca
SHA186c559a1268b30e5799a6414058bd700ed52aa57
SHA256be68120445a38755fa763d3d3839fcff9a507d3338b634b863c733574f0dbc35
SHA512bec9d487dc808b751d5e0f1e67255010ce9b9f78297697b8ce322dfe45b63e0d968b42ce2c2005c28dbeb841150766a56160e60fd0791325f8dcf87a83013869
-
Filesize
124KB
MD5a95aaaab68d309b7905f7c22a08a4943
SHA15e7b7df7a2b1115586bdd5e79607da99efc7b20d
SHA2565b90ff16371ad47fdf13cd05b391562048abc6214a6126fe3e4f1bf5053f671c
SHA51237e05907346ac170d10dee503589232d3dc33285ab2a5ff7276ea8ef3d6afb9e7e3b40a3ad78e99d6da63d3d8312fc43f2ce7bc18a206d83a745ddf65b5073a4
-
Filesize
124KB
MD5f1dddd001c355847b3ff0e6504d27f4a
SHA17a916eba1c4705bcdd12676e11acb1a9e1ad96b2
SHA25689dba9d81650d6b09ee60c761ed8047eda5cd099787ff8bd54f2ce9912ea1556
SHA512c12bc7cd24b59973ece7170c03d6506b755f923e6689e75513c19c6ec6b6916d7a8c945154e1e485f6ddd20bb25e010e26be971eda153c1adce0f499d25ff132
-
Filesize
124KB
MD52f04ceb3f81dc990a2f85be039454d47
SHA11c90c93eeee40db6c7f2cd78e72a804a6ddbb60a
SHA256a124a16bc4d7900b49a0e98f7b91706b03073a3f35c87ccab95acde6c99bcc6b
SHA512e22300cd4bd44771e7f989b03945e4e0ec987e4180a1689a38abc474344c56e76ac5dbcc65a9bfe5c7a465c5bcda9188b5c99f91a4849912c8d9e9943e965d1c