Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
17/05/2024, 02:28
Static task
static1
Behavioral task
behavioral1
Sample
8a1bf6acbe1750f985f2cfb7081c49d0_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
8a1bf6acbe1750f985f2cfb7081c49d0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
8a1bf6acbe1750f985f2cfb7081c49d0_NeikiAnalytics.exe
-
Size
124KB
-
MD5
8a1bf6acbe1750f985f2cfb7081c49d0
-
SHA1
fc660e752d45782d0c0e38a70f671214f5f3c942
-
SHA256
7b84c783436eef02411c944abce1a4b33bbb08a88fb9325083bda2d35d2b53a7
-
SHA512
a7ec7b06683369a922b84e0079177ccdd561db4da7f017a1db45b85ef33fb1dec1f3aef18a61e0f4c66a1e1ebce59d8651ef214eae68638c45fb472091a1e03d
-
SSDEEP
1536:skszA5YKQB0hRO/N69BH3OoGa+FL9jKceRgrkjSo:fGCYKQB0hkFoN3Oo1+F92S
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 47 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" gooiku.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" meetoy.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" leefad.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" lougob.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" yooneg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" niezeey.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" yarel.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" hueqoip.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" saovu.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" cjkos.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" rueni.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" juaxiip.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" rioeh.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" riugoi.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" muaujew.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" beeefaj.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" jeeke.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" deium.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" saavoeq.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 8a1bf6acbe1750f985f2cfb7081c49d0_NeikiAnalytics.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" beaora.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" zaical.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" dihoh.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" latom.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" kaaewax.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" djbaes.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" keeuya.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" leapiij.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" wuaqik.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" woeluu.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" leanau.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" gxcual.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" yeoevon.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" poopae.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" paaejif.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" yucor.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" yowun.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" yrzoev.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" tuiecu.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" qeapoot.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" csgeik.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" tuaabi.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" tiobooy.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" saegef.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" tooci.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" dueawa.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" sjzod.exe -
Executes dropped EXE 47 IoCs
pid Process 2248 meetoy.exe 1968 rioeh.exe 2632 qeapoot.exe 2996 leanau.exe 2852 leefad.exe 1208 gxcual.exe 1220 csgeik.exe 1312 lougob.exe 2028 dihoh.exe 3020 yeoevon.exe 2192 riugoi.exe 1176 deium.exe 3060 muaujew.exe 1440 tuaabi.exe 1652 latom.exe 1508 beeefaj.exe 1520 poopae.exe 2636 beaora.exe 2440 jeeke.exe 2872 paaejif.exe 2112 yarel.exe 1416 tiobooy.exe 1156 leapiij.exe 1904 kaaewax.exe 2120 wuaqik.exe 788 saegef.exe 1632 yowun.exe 2176 djbaes.exe 1096 yooneg.exe 2900 woeluu.exe 2532 zaical.exe 1240 yrzoev.exe 2684 cjkos.exe 2196 hueqoip.exe 2348 saavoeq.exe 2812 tuiecu.exe 632 keeuya.exe 2696 tooci.exe 2460 saovu.exe 2296 dueawa.exe 1724 rueni.exe 844 juaxiip.exe 408 sjzod.exe 1740 yucor.exe 2580 niezeey.exe 3016 gooiku.exe 1412 loariv.exe -
Loads dropped DLL 64 IoCs
pid Process 2104 8a1bf6acbe1750f985f2cfb7081c49d0_NeikiAnalytics.exe 2104 8a1bf6acbe1750f985f2cfb7081c49d0_NeikiAnalytics.exe 2248 meetoy.exe 2248 meetoy.exe 1968 rioeh.exe 1968 rioeh.exe 2632 qeapoot.exe 2632 qeapoot.exe 2996 leanau.exe 2996 leanau.exe 2852 leefad.exe 2852 leefad.exe 1208 gxcual.exe 1208 gxcual.exe 1220 csgeik.exe 1220 csgeik.exe 1312 lougob.exe 1312 lougob.exe 2028 dihoh.exe 2028 dihoh.exe 3020 yeoevon.exe 3020 yeoevon.exe 2192 riugoi.exe 2192 riugoi.exe 1176 deium.exe 1176 deium.exe 3060 muaujew.exe 3060 muaujew.exe 1440 tuaabi.exe 1440 tuaabi.exe 1652 latom.exe 1652 latom.exe 1508 beeefaj.exe 1508 beeefaj.exe 1520 poopae.exe 1520 poopae.exe 2636 beaora.exe 2636 beaora.exe 2440 jeeke.exe 2440 jeeke.exe 2872 paaejif.exe 2872 paaejif.exe 2112 yarel.exe 2112 yarel.exe 1416 tiobooy.exe 1416 tiobooy.exe 1156 leapiij.exe 1156 leapiij.exe 1904 kaaewax.exe 1904 kaaewax.exe 2120 wuaqik.exe 2120 wuaqik.exe 788 saegef.exe 788 saegef.exe 1632 yowun.exe 1632 yowun.exe 2176 djbaes.exe 2176 djbaes.exe 1096 yooneg.exe 1096 yooneg.exe 2900 woeluu.exe 2900 woeluu.exe 2532 zaical.exe 2532 zaical.exe -
Adds Run key to start application 2 TTPs 47 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\gxcual = "C:\\Users\\Admin\\gxcual.exe /J" leefad.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiobooy = "C:\\Users\\Admin\\tiobooy.exe /r" yarel.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\keeuya = "C:\\Users\\Admin\\keeuya.exe /F" tuiecu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\loariv = "C:\\Users\\Admin\\loariv.exe /u" gooiku.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\leanau = "C:\\Users\\Admin\\leanau.exe /Y" qeapoot.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\jeeke = "C:\\Users\\Admin\\jeeke.exe /i" beaora.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\djbaes = "C:\\Users\\Admin\\djbaes.exe /n" yowun.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\latom = "C:\\Users\\Admin\\latom.exe /a" tuaabi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\dihoh = "C:\\Users\\Admin\\dihoh.exe /j" lougob.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\riugoi = "C:\\Users\\Admin\\riugoi.exe /u" yeoevon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\muaujew = "C:\\Users\\Admin\\muaujew.exe /j" deium.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\beeefaj = "C:\\Users\\Admin\\beeefaj.exe /d" latom.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\saegef = "C:\\Users\\Admin\\saegef.exe /F" wuaqik.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\hueqoip = "C:\\Users\\Admin\\hueqoip.exe /C" cjkos.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\saavoeq = "C:\\Users\\Admin\\saavoeq.exe /E" hueqoip.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\rioeh = "C:\\Users\\Admin\\rioeh.exe /g" meetoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\yeoevon = "C:\\Users\\Admin\\yeoevon.exe /X" dihoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaical = "C:\\Users\\Admin\\zaical.exe /c" woeluu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\tooci = "C:\\Users\\Admin\\tooci.exe /k" keeuya.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\saovu = "C:\\Users\\Admin\\saovu.exe /t" tooci.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\sjzod = "C:\\Users\\Admin\\sjzod.exe /Z" juaxiip.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\yucor = "C:\\Users\\Admin\\yucor.exe /F" sjzod.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\niezeey = "C:\\Users\\Admin\\niezeey.exe /V" yucor.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\lougob = "C:\\Users\\Admin\\lougob.exe /q" csgeik.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\cjkos = "C:\\Users\\Admin\\cjkos.exe /t" yrzoev.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\juaxiip = "C:\\Users\\Admin\\juaxiip.exe /o" rueni.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\gooiku = "C:\\Users\\Admin\\gooiku.exe /h" niezeey.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\leapiij = "C:\\Users\\Admin\\leapiij.exe /v" tiobooy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuaqik = "C:\\Users\\Admin\\wuaqik.exe /q" kaaewax.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\woeluu = "C:\\Users\\Admin\\woeluu.exe /u" yooneg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\tuiecu = "C:\\Users\\Admin\\tuiecu.exe /g" saavoeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\dueawa = "C:\\Users\\Admin\\dueawa.exe /n" saovu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\rueni = "C:\\Users\\Admin\\rueni.exe /x" dueawa.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\deium = "C:\\Users\\Admin\\deium.exe /i" riugoi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\yarel = "C:\\Users\\Admin\\yarel.exe /S" paaejif.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\kaaewax = "C:\\Users\\Admin\\kaaewax.exe /W" leapiij.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\yrzoev = "C:\\Users\\Admin\\yrzoev.exe /W" zaical.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\tuaabi = "C:\\Users\\Admin\\tuaabi.exe /J" muaujew.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\qeapoot = "C:\\Users\\Admin\\qeapoot.exe /a" rioeh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\leefad = "C:\\Users\\Admin\\leefad.exe /R" leanau.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\csgeik = "C:\\Users\\Admin\\csgeik.exe /j" gxcual.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\poopae = "C:\\Users\\Admin\\poopae.exe /x" beeefaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\beaora = "C:\\Users\\Admin\\beaora.exe /v" poopae.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\paaejif = "C:\\Users\\Admin\\paaejif.exe /r" jeeke.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\yowun = "C:\\Users\\Admin\\yowun.exe /S" saegef.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\meetoy = "C:\\Users\\Admin\\meetoy.exe /O" 8a1bf6acbe1750f985f2cfb7081c49d0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\yooneg = "C:\\Users\\Admin\\yooneg.exe /S" djbaes.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 47 IoCs
pid Process 2104 8a1bf6acbe1750f985f2cfb7081c49d0_NeikiAnalytics.exe 2248 meetoy.exe 1968 rioeh.exe 2632 qeapoot.exe 2996 leanau.exe 2852 leefad.exe 1208 gxcual.exe 1220 csgeik.exe 1312 lougob.exe 2028 dihoh.exe 3020 yeoevon.exe 2192 riugoi.exe 1176 deium.exe 3060 muaujew.exe 1440 tuaabi.exe 1652 latom.exe 1508 beeefaj.exe 1520 poopae.exe 2636 beaora.exe 2440 jeeke.exe 2872 paaejif.exe 2112 yarel.exe 1416 tiobooy.exe 1156 leapiij.exe 1904 kaaewax.exe 2120 wuaqik.exe 788 saegef.exe 1632 yowun.exe 2176 djbaes.exe 1096 yooneg.exe 2900 woeluu.exe 2532 zaical.exe 1240 yrzoev.exe 2684 cjkos.exe 2196 hueqoip.exe 2348 saavoeq.exe 2812 tuiecu.exe 632 keeuya.exe 2696 tooci.exe 2460 saovu.exe 2296 dueawa.exe 1724 rueni.exe 844 juaxiip.exe 408 sjzod.exe 1740 yucor.exe 2580 niezeey.exe 3016 gooiku.exe -
Suspicious use of SetWindowsHookEx 48 IoCs
pid Process 2104 8a1bf6acbe1750f985f2cfb7081c49d0_NeikiAnalytics.exe 2248 meetoy.exe 1968 rioeh.exe 2632 qeapoot.exe 2996 leanau.exe 2852 leefad.exe 1208 gxcual.exe 1220 csgeik.exe 1312 lougob.exe 2028 dihoh.exe 3020 yeoevon.exe 2192 riugoi.exe 1176 deium.exe 3060 muaujew.exe 1440 tuaabi.exe 1652 latom.exe 1508 beeefaj.exe 1520 poopae.exe 2636 beaora.exe 2440 jeeke.exe 2872 paaejif.exe 2112 yarel.exe 1416 tiobooy.exe 1156 leapiij.exe 1904 kaaewax.exe 2120 wuaqik.exe 788 saegef.exe 1632 yowun.exe 2176 djbaes.exe 1096 yooneg.exe 2900 woeluu.exe 2532 zaical.exe 1240 yrzoev.exe 2684 cjkos.exe 2196 hueqoip.exe 2348 saavoeq.exe 2812 tuiecu.exe 632 keeuya.exe 2696 tooci.exe 2460 saovu.exe 2296 dueawa.exe 1724 rueni.exe 844 juaxiip.exe 408 sjzod.exe 1740 yucor.exe 2580 niezeey.exe 3016 gooiku.exe 1412 loariv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2104 wrote to memory of 2248 2104 8a1bf6acbe1750f985f2cfb7081c49d0_NeikiAnalytics.exe 28 PID 2104 wrote to memory of 2248 2104 8a1bf6acbe1750f985f2cfb7081c49d0_NeikiAnalytics.exe 28 PID 2104 wrote to memory of 2248 2104 8a1bf6acbe1750f985f2cfb7081c49d0_NeikiAnalytics.exe 28 PID 2104 wrote to memory of 2248 2104 8a1bf6acbe1750f985f2cfb7081c49d0_NeikiAnalytics.exe 28 PID 2248 wrote to memory of 1968 2248 meetoy.exe 29 PID 2248 wrote to memory of 1968 2248 meetoy.exe 29 PID 2248 wrote to memory of 1968 2248 meetoy.exe 29 PID 2248 wrote to memory of 1968 2248 meetoy.exe 29 PID 1968 wrote to memory of 2632 1968 rioeh.exe 30 PID 1968 wrote to memory of 2632 1968 rioeh.exe 30 PID 1968 wrote to memory of 2632 1968 rioeh.exe 30 PID 1968 wrote to memory of 2632 1968 rioeh.exe 30 PID 2632 wrote to memory of 2996 2632 qeapoot.exe 31 PID 2632 wrote to memory of 2996 2632 qeapoot.exe 31 PID 2632 wrote to memory of 2996 2632 qeapoot.exe 31 PID 2632 wrote to memory of 2996 2632 qeapoot.exe 31 PID 2996 wrote to memory of 2852 2996 leanau.exe 32 PID 2996 wrote to memory of 2852 2996 leanau.exe 32 PID 2996 wrote to memory of 2852 2996 leanau.exe 32 PID 2996 wrote to memory of 2852 2996 leanau.exe 32 PID 2852 wrote to memory of 1208 2852 leefad.exe 33 PID 2852 wrote to memory of 1208 2852 leefad.exe 33 PID 2852 wrote to memory of 1208 2852 leefad.exe 33 PID 2852 wrote to memory of 1208 2852 leefad.exe 33 PID 1208 wrote to memory of 1220 1208 gxcual.exe 34 PID 1208 wrote to memory of 1220 1208 gxcual.exe 34 PID 1208 wrote to memory of 1220 1208 gxcual.exe 34 PID 1208 wrote to memory of 1220 1208 gxcual.exe 34 PID 1220 wrote to memory of 1312 1220 csgeik.exe 35 PID 1220 wrote to memory of 1312 1220 csgeik.exe 35 PID 1220 wrote to memory of 1312 1220 csgeik.exe 35 PID 1220 wrote to memory of 1312 1220 csgeik.exe 35 PID 1312 wrote to memory of 2028 1312 lougob.exe 36 PID 1312 wrote to memory of 2028 1312 lougob.exe 36 PID 1312 wrote to memory of 2028 1312 lougob.exe 36 PID 1312 wrote to memory of 2028 1312 lougob.exe 36 PID 2028 wrote to memory of 3020 2028 dihoh.exe 37 PID 2028 wrote to memory of 3020 2028 dihoh.exe 37 PID 2028 wrote to memory of 3020 2028 dihoh.exe 37 PID 2028 wrote to memory of 3020 2028 dihoh.exe 37 PID 3020 wrote to memory of 2192 3020 yeoevon.exe 38 PID 3020 wrote to memory of 2192 3020 yeoevon.exe 38 PID 3020 wrote to memory of 2192 3020 yeoevon.exe 38 PID 3020 wrote to memory of 2192 3020 yeoevon.exe 38 PID 2192 wrote to memory of 1176 2192 riugoi.exe 39 PID 2192 wrote to memory of 1176 2192 riugoi.exe 39 PID 2192 wrote to memory of 1176 2192 riugoi.exe 39 PID 2192 wrote to memory of 1176 2192 riugoi.exe 39 PID 1176 wrote to memory of 3060 1176 deium.exe 42 PID 1176 wrote to memory of 3060 1176 deium.exe 42 PID 1176 wrote to memory of 3060 1176 deium.exe 42 PID 1176 wrote to memory of 3060 1176 deium.exe 42 PID 3060 wrote to memory of 1440 3060 muaujew.exe 43 PID 3060 wrote to memory of 1440 3060 muaujew.exe 43 PID 3060 wrote to memory of 1440 3060 muaujew.exe 43 PID 3060 wrote to memory of 1440 3060 muaujew.exe 43 PID 1440 wrote to memory of 1652 1440 tuaabi.exe 44 PID 1440 wrote to memory of 1652 1440 tuaabi.exe 44 PID 1440 wrote to memory of 1652 1440 tuaabi.exe 44 PID 1440 wrote to memory of 1652 1440 tuaabi.exe 44 PID 1652 wrote to memory of 1508 1652 latom.exe 45 PID 1652 wrote to memory of 1508 1652 latom.exe 45 PID 1652 wrote to memory of 1508 1652 latom.exe 45 PID 1652 wrote to memory of 1508 1652 latom.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\8a1bf6acbe1750f985f2cfb7081c49d0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\8a1bf6acbe1750f985f2cfb7081c49d0_NeikiAnalytics.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Users\Admin\meetoy.exe"C:\Users\Admin\meetoy.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Users\Admin\rioeh.exe"C:\Users\Admin\rioeh.exe"3⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Users\Admin\qeapoot.exe"C:\Users\Admin\qeapoot.exe"4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Users\Admin\leanau.exe"C:\Users\Admin\leanau.exe"5⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Users\Admin\leefad.exe"C:\Users\Admin\leefad.exe"6⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Users\Admin\gxcual.exe"C:\Users\Admin\gxcual.exe"7⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Users\Admin\csgeik.exe"C:\Users\Admin\csgeik.exe"8⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Users\Admin\lougob.exe"C:\Users\Admin\lougob.exe"9⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Users\Admin\dihoh.exe"C:\Users\Admin\dihoh.exe"10⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Users\Admin\yeoevon.exe"C:\Users\Admin\yeoevon.exe"11⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Users\Admin\riugoi.exe"C:\Users\Admin\riugoi.exe"12⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Users\Admin\deium.exe"C:\Users\Admin\deium.exe"13⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Users\Admin\muaujew.exe"C:\Users\Admin\muaujew.exe"14⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Users\Admin\tuaabi.exe"C:\Users\Admin\tuaabi.exe"15⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Users\Admin\latom.exe"C:\Users\Admin\latom.exe"16⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Users\Admin\beeefaj.exe"C:\Users\Admin\beeefaj.exe"17⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1508 -
C:\Users\Admin\poopae.exe"C:\Users\Admin\poopae.exe"18⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1520 -
C:\Users\Admin\beaora.exe"C:\Users\Admin\beaora.exe"19⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2636 -
C:\Users\Admin\jeeke.exe"C:\Users\Admin\jeeke.exe"20⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2440 -
C:\Users\Admin\paaejif.exe"C:\Users\Admin\paaejif.exe"21⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2872 -
C:\Users\Admin\yarel.exe"C:\Users\Admin\yarel.exe"22⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2112 -
C:\Users\Admin\tiobooy.exe"C:\Users\Admin\tiobooy.exe"23⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1416 -
C:\Users\Admin\leapiij.exe"C:\Users\Admin\leapiij.exe"24⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1156 -
C:\Users\Admin\kaaewax.exe"C:\Users\Admin\kaaewax.exe"25⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1904 -
C:\Users\Admin\wuaqik.exe"C:\Users\Admin\wuaqik.exe"26⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2120 -
C:\Users\Admin\saegef.exe"C:\Users\Admin\saegef.exe"27⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:788 -
C:\Users\Admin\yowun.exe"C:\Users\Admin\yowun.exe"28⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1632 -
C:\Users\Admin\djbaes.exe"C:\Users\Admin\djbaes.exe"29⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2176 -
C:\Users\Admin\yooneg.exe"C:\Users\Admin\yooneg.exe"30⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1096 -
C:\Users\Admin\woeluu.exe"C:\Users\Admin\woeluu.exe"31⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2900 -
C:\Users\Admin\zaical.exe"C:\Users\Admin\zaical.exe"32⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2532 -
C:\Users\Admin\yrzoev.exe"C:\Users\Admin\yrzoev.exe"33⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1240 -
C:\Users\Admin\cjkos.exe"C:\Users\Admin\cjkos.exe"34⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2684 -
C:\Users\Admin\hueqoip.exe"C:\Users\Admin\hueqoip.exe"35⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2196 -
C:\Users\Admin\saavoeq.exe"C:\Users\Admin\saavoeq.exe"36⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2348 -
C:\Users\Admin\tuiecu.exe"C:\Users\Admin\tuiecu.exe"37⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2812 -
C:\Users\Admin\keeuya.exe"C:\Users\Admin\keeuya.exe"38⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:632 -
C:\Users\Admin\tooci.exe"C:\Users\Admin\tooci.exe"39⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2696 -
C:\Users\Admin\saovu.exe"C:\Users\Admin\saovu.exe"40⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2460 -
C:\Users\Admin\dueawa.exe"C:\Users\Admin\dueawa.exe"41⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2296 -
C:\Users\Admin\rueni.exe"C:\Users\Admin\rueni.exe"42⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1724 -
C:\Users\Admin\juaxiip.exe"C:\Users\Admin\juaxiip.exe"43⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:844 -
C:\Users\Admin\sjzod.exe"C:\Users\Admin\sjzod.exe"44⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:408 -
C:\Users\Admin\yucor.exe"C:\Users\Admin\yucor.exe"45⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1740 -
C:\Users\Admin\niezeey.exe"C:\Users\Admin\niezeey.exe"46⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2580 -
C:\Users\Admin\gooiku.exe"C:\Users\Admin\gooiku.exe"47⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3016 -
C:\Users\Admin\loariv.exe"C:\Users\Admin\loariv.exe"48⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1412
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
124KB
MD5e71981932a221d8b995d10ebd670035e
SHA1a6f444af6a5179471090ec4b1b23daf7266a587e
SHA256865458ce117aa6eab98053683b363b7c16c0e8ab23467cb5699b78dad6b51e85
SHA512ec1d0f2f1d0535bd6b299e4f40aa88104ce80106de29735b75476152aa8f3e156da4df09db77089455c2cf744e06bfd57b5c43699e44f2b3091f328916bf1b51
-
Filesize
124KB
MD5e62fcd92687c0083efbff9159310317e
SHA19fa4414b77dbff996786837a99a8037b5421acd6
SHA25681613e428e6dffe2e01c6fc4ef37a9328fb3fa9d6f1b91a9ba11a9c26ad64e7d
SHA512a5cbdc9b461ea80e145ae0b482f30e0cd7f93278bcde0803e01ead187c98f8d4e3126786a46a23178390bb4a884501a2222efe56a418997e2c04a25a09751fb7
-
Filesize
124KB
MD560b3299835741b093823f8fb5db3eecd
SHA13b6c7017c746efa2baa7d772aca326858549bfa6
SHA25697d088b6cf8a1581ef939d536ce76481339da1bcda21f7e48ff0c7f09fb62093
SHA512a489ebc90536fcb923167ffb6a8ac4a46ae14ae4116e90775da4ec22ee8b4621a60e43610c12e6a317e89da6d2ac382579897a510bd799614c545f7ebff7e9ce
-
Filesize
124KB
MD57869866560fd6794c2e1b9dcf010250a
SHA17d99e17f78d1204eaf0c9be51ebc25364b35468e
SHA256bdd71335e8cf9cbf57231c887f302e644410d7755653dc2b5e0969e56230de38
SHA512b0cdd52773d2aa79104a384ddda45cff603f5b35584c8c7ebeb952e34a11fadbcc91c1e2259ec5305f7d6843e4f80adafd542b6abdc4017345266b21a870c78c
-
Filesize
124KB
MD5dd7028d0984a077db96f7503c6e8feec
SHA1307ca53b469f048cded3eb579a0720a4e7d3f00e
SHA256d4dd715f304c880b39b086a2535908c8feb6a060300bd3e6f02f1c541f649129
SHA5120d171b20df1485453e5e19dbd081b2eddc1d4d718f29cbb8b36b902a6094ceeb10739f9c0be784e5fb42e53f389208a084ebb14cbde77a6153496ea9dec7650d
-
Filesize
124KB
MD52258c386792180ecb83448b28178652f
SHA1ef0bd7791ef9b526286a86822a80d0035b07bc8d
SHA256ca61fec994e1aee4c06feacd58c592a49a343c00c39db962866bc30734c0620a
SHA5122bb78f78df22691e1d90d9e3f91e79c4ed89f29bd7569460af53bd683071077c25ce0fa4c2724d14acf83b7b7068459d6a93889bf59d7d0e742f4e4a3e377dcd
-
Filesize
124KB
MD51b3a1ae231e7b07eb2d458976c43fe49
SHA1fb91898d1f5a372d223b9e6594562c277d802842
SHA2562e1b6fdfcf0eff03bd3e4208278d878ce7c4a7c335237dbf57ea6f02a7380713
SHA5120153182fba38bc77841c126d3685eb142cd83b30a35724470cc9fc0c65f0a2faef4a52d73bdcbc64bc034030b9e6661df3de33cd3da8238f50995c908ec0689d
-
Filesize
124KB
MD5a723e4c13f37a2eafd73b4a2bb30b4bc
SHA17d4377d0e3fb4002b0c4a5b34f8ecf0f0147e329
SHA2564bac72dde18756c8ebecff6d321c5eb3ce3f1effaf1eb64e12f2cdb2e4c391eb
SHA51271f72cd7904622dde4967e87f02c5916a6d6c80889ce9dfaeb89bc21ba611ad6e0c820505b0c33573fa7c5a89ecf4595eb0486b672516f6372ed10a08fc4f899
-
Filesize
124KB
MD5f98d58d18fb71b6243bab109eb9b7e2d
SHA14287110061a797fadd32ea4b8fab6a47f8ee6578
SHA256660928ac92a69fe67be236c97a264f4cd717eb769ccb5c616b1f6e145773974b
SHA512860da5295ba60016b2f6f906db64f8831c652da7e871334da35fe9e4841ec3db2e5ea7c8ba10a08cc519ca019e07583a6de930bdab2416961da77470212e000f
-
Filesize
124KB
MD57c03af70b221f2a56ad967dca5e76aff
SHA11e255acaa64a791394dc0a8aeb5bb47118e85ca2
SHA256c33b12569383ed3f8fc41194fa87d4d05f268d368de050b39e916c16fbeb3711
SHA512b7637131247634ef6e1b86bc9fe5cb59fb9208425a6266a11efa15ca4abf532696eaba9cd221eec407d4df424e7e23a921c86ffd55142011e7b8ea6d1b4b2076
-
Filesize
124KB
MD5826d15a9a9a14f9a998d8940b69c3408
SHA1810e5270f2dec40e0b8daea60caff36923150796
SHA2568a21645cbea7c2be5c3786484681079101e5a5f1edde74bc0fe03ec3761cd105
SHA5129bbac520fd759bb1413304286e5495fe6df23e3007965807097672fd55bb7bcf91d34c9435f16657966ca0824c0170e32165b9491be6a9467d5de74e46b68d87
-
Filesize
124KB
MD53f71d06d1bfe621ff6248ba50c2cf3f9
SHA1492aaacaebfd46ce92f142f039e8d6c2cc18a4c7
SHA256842ac2784ed9348a251bfff609ea13eb84c437932895cc289dae907537ba6fc1
SHA51294e05288cd95e889c576e6f390b7e263b049c07047d97f69e9f008bb257870422a8df310e76bf8ac099e10110d5b311d747b9d96a63aa9f7389ad8cd7431e383
-
Filesize
124KB
MD57a33bf314ca7947cbbe709896e4d8b7c
SHA1a4b3ca1ae99aba6b57a2d1f41aec819c24025d6f
SHA256aeb6b5d9a6e09c036eb6c5d3c09264ef4bd6c810c411c429d8a444e7331e41de
SHA512dc2398b9109beefcf9c3804abf7fc7d768a183c478068745a2685f1e16773767309e7a0f8ecbe28adcec6f396b8e28dcfce2dcda9692e0bd32cc5d8e94c528eb
-
Filesize
124KB
MD57ff4b1fdaa54108a881dd676ec7691c1
SHA1e1c7ee1f92c5032eb31d26ba4389a7c48edc760d
SHA25607978d1cf51c45bc4b372bdd95282e43427b99a3c9ed44ad763a0b4558ce5fbc
SHA512ebd954c2619fb93b6d2d2373e6c0279bc8166491452a5addaa03838e95173c03efe1e025ea22cf4726d3c4933d77759bccddaa1243682667e9fc1a0b91164d9c
-
Filesize
124KB
MD5690875c61e0719f4556edf510514891d
SHA12614cb3cb88d4425664ea3cb00b79577634591c6
SHA25662d0f82dc897992b39ad7f857573e570d96c57ff5dc63d7bd20fd49bbc576e59
SHA51285b0c7af1bc2a912d56214ff09a797f64e653563b17bb5b6710609d2184fdc5ec62cdbc2d29e320e5cda9884388290819226c5273ff3e2382b789eb399401159
-
Filesize
124KB
MD5f52228bd77d21573e3ff1ecf72de4076
SHA10d274fafe606feab623c8a9a7477f9d0ad88dedc
SHA256c48bfbd4ec956df82212c824dfcab130db21a4c6ad362d298d16927c8bceb677
SHA512e5f16d052e5be12387e45fced3cc1de203708fe5624c4868df53214c96797086cb231b5c6bd9b5947074d00ecc576eff536d12fe85d9c419e258e24763d0290a