Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
17/05/2024, 02:28
Static task
static1
Behavioral task
behavioral1
Sample
8a1bf6acbe1750f985f2cfb7081c49d0_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
8a1bf6acbe1750f985f2cfb7081c49d0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
8a1bf6acbe1750f985f2cfb7081c49d0_NeikiAnalytics.exe
-
Size
124KB
-
MD5
8a1bf6acbe1750f985f2cfb7081c49d0
-
SHA1
fc660e752d45782d0c0e38a70f671214f5f3c942
-
SHA256
7b84c783436eef02411c944abce1a4b33bbb08a88fb9325083bda2d35d2b53a7
-
SHA512
a7ec7b06683369a922b84e0079177ccdd561db4da7f017a1db45b85ef33fb1dec1f3aef18a61e0f4c66a1e1ebce59d8651ef214eae68638c45fb472091a1e03d
-
SSDEEP
1536:skszA5YKQB0hRO/N69BH3OoGa+FL9jKceRgrkjSo:fGCYKQB0hkFoN3Oo1+F92S
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 42 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" fuaniu.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" roeuh.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" muael.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" kiogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" xaoaj.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" geowuum.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" soawoiz.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" viyus.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" runag.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" dauvu.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" suoxep.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" naeqaoy.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" buofa.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" buaiho.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" koxil.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" dewog.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" lxdeh.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" kbbiec.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" yeuiki.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" zooliik.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ydmaaj.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" jkluz.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ggsuep.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" doiic.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" sypeaq.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" paeefu.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" deahae.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" twwar.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 8a1bf6acbe1750f985f2cfb7081c49d0_NeikiAnalytics.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" qioxep.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" teoxul.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" gaicim.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" wxbik.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" gaeawa.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" doegeum.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" sixuy.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" vbjaiy.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" vauijo.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" biitei.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" wkjeem.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" caixe.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" tuuivav.exe -
Checks computer location settings 2 TTPs 41 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation soawoiz.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation muael.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation ydmaaj.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation buofa.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation buaiho.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation gaicim.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation geowuum.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation biitei.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation suoxep.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation zooliik.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation wkjeem.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation vbjaiy.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation sypeaq.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation twwar.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation paeefu.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation runag.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation viyus.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation dauvu.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation ggsuep.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation doiic.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation deahae.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation lxdeh.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation 8a1bf6acbe1750f985f2cfb7081c49d0_NeikiAnalytics.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation naeqaoy.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation xaoaj.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation sixuy.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation tuuivav.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation gaeawa.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation kbbiec.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation jkluz.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation yeuiki.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation fuaniu.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation kiogon.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation qioxep.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation caixe.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation koxil.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation doegeum.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation wxbik.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation teoxul.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation vauijo.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation roeuh.exe -
Executes dropped EXE 41 IoCs
pid Process 4392 naeqaoy.exe 3468 ydmaaj.exe 2684 buofa.exe 3208 kiogon.exe 2252 wkjeem.exe 1968 qioxep.exe 1272 buaiho.exe 3472 teoxul.exe 2872 caixe.exe 2556 koxil.exe 5048 kbbiec.exe 1432 doegeum.exe 3024 jkluz.exe 3616 gaicim.exe 4812 xaoaj.exe 3272 geowuum.exe 3944 sixuy.exe 988 wxbik.exe 3308 paeefu.exe 4416 soawoiz.exe 1444 runag.exe 2140 tuuivav.exe 3660 viyus.exe 5040 yeuiki.exe 4964 vauijo.exe 3316 dauvu.exe 3592 biitei.exe 1276 ggsuep.exe 3636 fuaniu.exe 2072 doiic.exe 2560 roeuh.exe 2288 deahae.exe 5000 vbjaiy.exe 3364 suoxep.exe 3936 lxdeh.exe 1072 sypeaq.exe 468 muael.exe 1320 twwar.exe 372 zooliik.exe 3880 gaeawa.exe 4248 cauoqep.exe -
Adds Run key to start application 2 TTPs 42 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\biitei = "C:\\Users\\Admin\\biitei.exe /s" dauvu.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ggsuep = "C:\\Users\\Admin\\ggsuep.exe /z" biitei.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vbjaiy = "C:\\Users\\Admin\\vbjaiy.exe /T" deahae.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cauoqep = "C:\\Users\\Admin\\cauoqep.exe /e" gaeawa.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\caixe = "C:\\Users\\Admin\\caixe.exe /W" teoxul.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gaicim = "C:\\Users\\Admin\\gaicim.exe /g" jkluz.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\runag = "C:\\Users\\Admin\\runag.exe /I" soawoiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\viyus = "C:\\Users\\Admin\\viyus.exe /I" tuuivav.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fuaniu = "C:\\Users\\Admin\\fuaniu.exe /c" ggsuep.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deahae = "C:\\Users\\Admin\\deahae.exe /h" roeuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\muael = "C:\\Users\\Admin\\muael.exe /r" sypeaq.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qioxep = "C:\\Users\\Admin\\qioxep.exe /B" wkjeem.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\koxil = "C:\\Users\\Admin\\koxil.exe /N" caixe.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kbbiec = "C:\\Users\\Admin\\kbbiec.exe /T" koxil.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\doegeum = "C:\\Users\\Admin\\doegeum.exe /P" kbbiec.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jkluz = "C:\\Users\\Admin\\jkluz.exe /E" doegeum.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sixuy = "C:\\Users\\Admin\\sixuy.exe /z" geowuum.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wxbik = "C:\\Users\\Admin\\wxbik.exe /L" dewog.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\soawoiz = "C:\\Users\\Admin\\soawoiz.exe /d" paeefu.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\buaiho = "C:\\Users\\Admin\\buaiho.exe /n" qioxep.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\doiic = "C:\\Users\\Admin\\doiic.exe /f" fuaniu.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sypeaq = "C:\\Users\\Admin\\sypeaq.exe /t" lxdeh.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tuuivav = "C:\\Users\\Admin\\tuuivav.exe /E" runag.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kiogon = "C:\\Users\\Admin\\kiogon.exe /c" buofa.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xaoaj = "C:\\Users\\Admin\\xaoaj.exe /o" gaicim.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dauvu = "C:\\Users\\Admin\\dauvu.exe /f" vauijo.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\twwar = "C:\\Users\\Admin\\twwar.exe /N" muael.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\naeqaoy = "C:\\Users\\Admin\\naeqaoy.exe /W" 8a1bf6acbe1750f985f2cfb7081c49d0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\buofa = "C:\\Users\\Admin\\buofa.exe /F" ydmaaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dewog = "C:\\Users\\Admin\\dewog.exe /c" sixuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\paeefu = "C:\\Users\\Admin\\paeefu.exe /M" wxbik.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zooliik = "C:\\Users\\Admin\\zooliik.exe /m" twwar.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ydmaaj = "C:\\Users\\Admin\\ydmaaj.exe /W" naeqaoy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geowuum = "C:\\Users\\Admin\\geowuum.exe /x" xaoaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yeuiki = "C:\\Users\\Admin\\yeuiki.exe /R" viyus.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\suoxep = "C:\\Users\\Admin\\suoxep.exe /Z" vbjaiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lxdeh = "C:\\Users\\Admin\\lxdeh.exe /R" suoxep.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wkjeem = "C:\\Users\\Admin\\wkjeem.exe /d" kiogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vauijo = "C:\\Users\\Admin\\vauijo.exe /T" yeuiki.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roeuh = "C:\\Users\\Admin\\roeuh.exe /Y" doiic.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gaeawa = "C:\\Users\\Admin\\gaeawa.exe /I" zooliik.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teoxul = "C:\\Users\\Admin\\teoxul.exe /c" buaiho.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4980 8a1bf6acbe1750f985f2cfb7081c49d0_NeikiAnalytics.exe 4980 8a1bf6acbe1750f985f2cfb7081c49d0_NeikiAnalytics.exe 4392 naeqaoy.exe 4392 naeqaoy.exe 3468 ydmaaj.exe 3468 ydmaaj.exe 2684 buofa.exe 2684 buofa.exe 3208 kiogon.exe 3208 kiogon.exe 2252 wkjeem.exe 2252 wkjeem.exe 1968 qioxep.exe 1968 qioxep.exe 1272 buaiho.exe 1272 buaiho.exe 3472 teoxul.exe 3472 teoxul.exe 2872 caixe.exe 2872 caixe.exe 2556 koxil.exe 2556 koxil.exe 5048 kbbiec.exe 5048 kbbiec.exe 1432 doegeum.exe 1432 doegeum.exe 3024 jkluz.exe 3024 jkluz.exe 3616 gaicim.exe 3616 gaicim.exe 4812 xaoaj.exe 4812 xaoaj.exe 3272 geowuum.exe 3272 geowuum.exe 1712 dewog.exe 1712 dewog.exe 988 wxbik.exe 988 wxbik.exe 3308 paeefu.exe 3308 paeefu.exe 4416 soawoiz.exe 4416 soawoiz.exe 1444 runag.exe 1444 runag.exe 2140 tuuivav.exe 2140 tuuivav.exe 3660 viyus.exe 3660 viyus.exe 5040 yeuiki.exe 5040 yeuiki.exe 4964 vauijo.exe 4964 vauijo.exe 3316 dauvu.exe 3316 dauvu.exe 3592 biitei.exe 3592 biitei.exe 1276 ggsuep.exe 1276 ggsuep.exe 3636 fuaniu.exe 3636 fuaniu.exe 2072 doiic.exe 2072 doiic.exe 2560 roeuh.exe 2560 roeuh.exe -
Suspicious use of SetWindowsHookEx 42 IoCs
pid Process 4980 8a1bf6acbe1750f985f2cfb7081c49d0_NeikiAnalytics.exe 4392 naeqaoy.exe 3468 ydmaaj.exe 2684 buofa.exe 3208 kiogon.exe 2252 wkjeem.exe 1968 qioxep.exe 1272 buaiho.exe 3472 teoxul.exe 2872 caixe.exe 2556 koxil.exe 5048 kbbiec.exe 1432 doegeum.exe 3024 jkluz.exe 3616 gaicim.exe 4812 xaoaj.exe 3272 geowuum.exe 1712 dewog.exe 988 wxbik.exe 3308 paeefu.exe 4416 soawoiz.exe 1444 runag.exe 2140 tuuivav.exe 3660 viyus.exe 5040 yeuiki.exe 4964 vauijo.exe 3316 dauvu.exe 3592 biitei.exe 1276 ggsuep.exe 3636 fuaniu.exe 2072 doiic.exe 2560 roeuh.exe 2288 deahae.exe 5000 vbjaiy.exe 3364 suoxep.exe 3936 lxdeh.exe 1072 sypeaq.exe 468 muael.exe 1320 twwar.exe 372 zooliik.exe 3880 gaeawa.exe 4248 cauoqep.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4980 wrote to memory of 4392 4980 8a1bf6acbe1750f985f2cfb7081c49d0_NeikiAnalytics.exe 90 PID 4980 wrote to memory of 4392 4980 8a1bf6acbe1750f985f2cfb7081c49d0_NeikiAnalytics.exe 90 PID 4980 wrote to memory of 4392 4980 8a1bf6acbe1750f985f2cfb7081c49d0_NeikiAnalytics.exe 90 PID 4392 wrote to memory of 3468 4392 naeqaoy.exe 93 PID 4392 wrote to memory of 3468 4392 naeqaoy.exe 93 PID 4392 wrote to memory of 3468 4392 naeqaoy.exe 93 PID 3468 wrote to memory of 2684 3468 ydmaaj.exe 96 PID 3468 wrote to memory of 2684 3468 ydmaaj.exe 96 PID 3468 wrote to memory of 2684 3468 ydmaaj.exe 96 PID 2684 wrote to memory of 3208 2684 buofa.exe 98 PID 2684 wrote to memory of 3208 2684 buofa.exe 98 PID 2684 wrote to memory of 3208 2684 buofa.exe 98 PID 3208 wrote to memory of 2252 3208 kiogon.exe 99 PID 3208 wrote to memory of 2252 3208 kiogon.exe 99 PID 3208 wrote to memory of 2252 3208 kiogon.exe 99 PID 2252 wrote to memory of 1968 2252 wkjeem.exe 100 PID 2252 wrote to memory of 1968 2252 wkjeem.exe 100 PID 2252 wrote to memory of 1968 2252 wkjeem.exe 100 PID 1968 wrote to memory of 1272 1968 qioxep.exe 101 PID 1968 wrote to memory of 1272 1968 qioxep.exe 101 PID 1968 wrote to memory of 1272 1968 qioxep.exe 101 PID 1272 wrote to memory of 3472 1272 buaiho.exe 102 PID 1272 wrote to memory of 3472 1272 buaiho.exe 102 PID 1272 wrote to memory of 3472 1272 buaiho.exe 102 PID 3472 wrote to memory of 2872 3472 teoxul.exe 104 PID 3472 wrote to memory of 2872 3472 teoxul.exe 104 PID 3472 wrote to memory of 2872 3472 teoxul.exe 104 PID 2872 wrote to memory of 2556 2872 caixe.exe 107 PID 2872 wrote to memory of 2556 2872 caixe.exe 107 PID 2872 wrote to memory of 2556 2872 caixe.exe 107 PID 2556 wrote to memory of 5048 2556 koxil.exe 108 PID 2556 wrote to memory of 5048 2556 koxil.exe 108 PID 2556 wrote to memory of 5048 2556 koxil.exe 108 PID 5048 wrote to memory of 1432 5048 kbbiec.exe 109 PID 5048 wrote to memory of 1432 5048 kbbiec.exe 109 PID 5048 wrote to memory of 1432 5048 kbbiec.exe 109 PID 1432 wrote to memory of 3024 1432 doegeum.exe 110 PID 1432 wrote to memory of 3024 1432 doegeum.exe 110 PID 1432 wrote to memory of 3024 1432 doegeum.exe 110 PID 3024 wrote to memory of 3616 3024 jkluz.exe 111 PID 3024 wrote to memory of 3616 3024 jkluz.exe 111 PID 3024 wrote to memory of 3616 3024 jkluz.exe 111 PID 3616 wrote to memory of 4812 3616 gaicim.exe 112 PID 3616 wrote to memory of 4812 3616 gaicim.exe 112 PID 3616 wrote to memory of 4812 3616 gaicim.exe 112 PID 4812 wrote to memory of 3272 4812 xaoaj.exe 113 PID 4812 wrote to memory of 3272 4812 xaoaj.exe 113 PID 4812 wrote to memory of 3272 4812 xaoaj.exe 113 PID 3272 wrote to memory of 3944 3272 geowuum.exe 114 PID 3272 wrote to memory of 3944 3272 geowuum.exe 114 PID 3272 wrote to memory of 3944 3272 geowuum.exe 114 PID 1712 wrote to memory of 988 1712 dewog.exe 117 PID 1712 wrote to memory of 988 1712 dewog.exe 117 PID 1712 wrote to memory of 988 1712 dewog.exe 117 PID 988 wrote to memory of 3308 988 wxbik.exe 118 PID 988 wrote to memory of 3308 988 wxbik.exe 118 PID 988 wrote to memory of 3308 988 wxbik.exe 118 PID 3308 wrote to memory of 4416 3308 paeefu.exe 119 PID 3308 wrote to memory of 4416 3308 paeefu.exe 119 PID 3308 wrote to memory of 4416 3308 paeefu.exe 119 PID 4416 wrote to memory of 1444 4416 soawoiz.exe 120 PID 4416 wrote to memory of 1444 4416 soawoiz.exe 120 PID 4416 wrote to memory of 1444 4416 soawoiz.exe 120 PID 1444 wrote to memory of 2140 1444 runag.exe 121
Processes
-
C:\Users\Admin\AppData\Local\Temp\8a1bf6acbe1750f985f2cfb7081c49d0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\8a1bf6acbe1750f985f2cfb7081c49d0_NeikiAnalytics.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4980 -
C:\Users\Admin\naeqaoy.exe"C:\Users\Admin\naeqaoy.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4392 -
C:\Users\Admin\ydmaaj.exe"C:\Users\Admin\ydmaaj.exe"3⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3468 -
C:\Users\Admin\buofa.exe"C:\Users\Admin\buofa.exe"4⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Users\Admin\kiogon.exe"C:\Users\Admin\kiogon.exe"5⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3208 -
C:\Users\Admin\wkjeem.exe"C:\Users\Admin\wkjeem.exe"6⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Users\Admin\qioxep.exe"C:\Users\Admin\qioxep.exe"7⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Users\Admin\buaiho.exe"C:\Users\Admin\buaiho.exe"8⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Users\Admin\teoxul.exe"C:\Users\Admin\teoxul.exe"9⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3472 -
C:\Users\Admin\caixe.exe"C:\Users\Admin\caixe.exe"10⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Users\Admin\koxil.exe"C:\Users\Admin\koxil.exe"11⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Users\Admin\kbbiec.exe"C:\Users\Admin\kbbiec.exe"12⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Users\Admin\doegeum.exe"C:\Users\Admin\doegeum.exe"13⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1432 -
C:\Users\Admin\jkluz.exe"C:\Users\Admin\jkluz.exe"14⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Users\Admin\gaicim.exe"C:\Users\Admin\gaicim.exe"15⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3616 -
C:\Users\Admin\xaoaj.exe"C:\Users\Admin\xaoaj.exe"16⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Users\Admin\geowuum.exe"C:\Users\Admin\geowuum.exe"17⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3272 -
C:\Users\Admin\sixuy.exe"C:\Users\Admin\sixuy.exe"18⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
PID:3944 -
C:\Users\Admin\dewog.exe"C:\Users\Admin\dewog.exe"19⤵
- Modifies visiblity of hidden/system files in Explorer
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Users\Admin\wxbik.exe"C:\Users\Admin\wxbik.exe"20⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:988 -
C:\Users\Admin\paeefu.exe"C:\Users\Admin\paeefu.exe"21⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3308 -
C:\Users\Admin\soawoiz.exe"C:\Users\Admin\soawoiz.exe"22⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Users\Admin\runag.exe"C:\Users\Admin\runag.exe"23⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Users\Admin\tuuivav.exe"C:\Users\Admin\tuuivav.exe"24⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2140 -
C:\Users\Admin\viyus.exe"C:\Users\Admin\viyus.exe"25⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3660 -
C:\Users\Admin\yeuiki.exe"C:\Users\Admin\yeuiki.exe"26⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5040 -
C:\Users\Admin\vauijo.exe"C:\Users\Admin\vauijo.exe"27⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4964 -
C:\Users\Admin\dauvu.exe"C:\Users\Admin\dauvu.exe"28⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3316 -
C:\Users\Admin\biitei.exe"C:\Users\Admin\biitei.exe"29⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3592 -
C:\Users\Admin\ggsuep.exe"C:\Users\Admin\ggsuep.exe"30⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1276 -
C:\Users\Admin\fuaniu.exe"C:\Users\Admin\fuaniu.exe"31⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3636 -
C:\Users\Admin\doiic.exe"C:\Users\Admin\doiic.exe"32⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2072 -
C:\Users\Admin\roeuh.exe"C:\Users\Admin\roeuh.exe"33⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2560 -
C:\Users\Admin\deahae.exe"C:\Users\Admin\deahae.exe"34⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:2288 -
C:\Users\Admin\vbjaiy.exe"C:\Users\Admin\vbjaiy.exe"35⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:5000 -
C:\Users\Admin\suoxep.exe"C:\Users\Admin\suoxep.exe"36⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:3364 -
C:\Users\Admin\lxdeh.exe"C:\Users\Admin\lxdeh.exe"37⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:3936 -
C:\Users\Admin\sypeaq.exe"C:\Users\Admin\sypeaq.exe"38⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:1072 -
C:\Users\Admin\muael.exe"C:\Users\Admin\muael.exe"39⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:468 -
C:\Users\Admin\twwar.exe"C:\Users\Admin\twwar.exe"40⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:1320 -
C:\Users\Admin\zooliik.exe"C:\Users\Admin\zooliik.exe"41⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:372 -
C:\Users\Admin\gaeawa.exe"C:\Users\Admin\gaeawa.exe"42⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:3880 -
C:\Users\Admin\cauoqep.exe"C:\Users\Admin\cauoqep.exe"43⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4248
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
124KB
MD5477a59d1fe5ccf564a5c097259e29123
SHA153cd330030c97a1c98a81ecd2db5c210837aeccb
SHA256e3e52fe4ccd67f20306299c83b530596945ecda80a262784f0e6d91e8acd9968
SHA5120a2eadf098c8c9cd11f5318f74c570e5800839cd08d7cff42afa2a344a8d978b741bac64abdba91ec08d0fa79d1811047eed2b900b75bf35ccfd4cfa4d32e658
-
Filesize
124KB
MD56747214ce597afc9228c373eb3c73bd1
SHA1c2fe94b368be6f93ffa3d6fa02e4ef61aeebc25b
SHA256fe6b6422bd011bc5c8f1b229241924d955a386521c64125a8e83c83f8912ae84
SHA512b248bba8536d417ad9e0deba856721fe96dac0008bb36e16af931ca8bf0406a656cc24f9dee36bbb0efc7426fa086bd3086dedb9c6d3bc8dc31ba9daedd9cd52
-
Filesize
124KB
MD5eaece6429bcd96774afa54e5fb3f85db
SHA13ee1f77b989703f340cbdce81617de49db9d7da0
SHA256007375b0903146f81a660203c5b9a17a4312018c686fb4c40cf169854ebad517
SHA5125cb8e2d2ea0968aa16d1977815f9f02d7b12933cc2ac815d17a23b47ccd76bb3cd46f7212d7cb36d54249f98af33d3d36c5cb07c8ab49e5e59442a6b4c36b22a
-
Filesize
124KB
MD52dde6ca267d0c9ffaf58626609d24fed
SHA17a5ad4255dee0e377bbd4193bdd62409a581a431
SHA2568bedede7fcecd9e71ebc81ad85f35dbbef461375cd5be767ced29ed8ccbdb126
SHA5121565da47d5c8eaa08b486350d7d1d22b728b747ee352c4b321d7f54138be30e5e07839de2e7ffd69ec6089b8abdc53d8eb30ca4f6c4515cb79d85877d513e19d
-
Filesize
124KB
MD5fb666b24faae1688f1f8ad4a45a6d58a
SHA136e1fe44286d6a6c85b1153db9200baed11f1734
SHA256e59d607306be0a72baf63112eed3a27fae790ca823a8ca3a76a7b5ac89c30fb4
SHA512ae8b24e3efdc4db65ec8d45bbdf0665bc94eb515f4dcd41618096d8461d998a1cbef1db2d54d148986bfdc013e3c6a6b42bc3ac5aab8bdb753080cfe0737308c
-
Filesize
124KB
MD50949642958f4f875fc81a5d5f7b370c9
SHA19117e23517adb26c029a2a0b38465b90b5f6b130
SHA256cda5ab9074eeeb595cbdc724618f00d3e568e1b54cce0c64236ed839ca19f402
SHA512be61aba9ae6b2432c73acd33f6e68d072d1c1267ec5d194dc41fdb2dbef5a66c762f16bbed730d096c42966ed14ea7045ccddc4b1f833ebdf3b079d4ed2015e6
-
Filesize
124KB
MD52d357f5adde5fb151e32c115d8dc312e
SHA1d594053ce2929066c3d5b57283bcfd93f63328c4
SHA2568405f40631d117523979ae26702961ff5eb2e19910b8287ce246c50e187d3971
SHA512dd503da8e526ab02246cfe2de6429459ccc621d4983a374fd37c15b088c6b80cd24bf81969f0741023a682a0dc809f0e91e65693e266390f53043530c36145ad
-
Filesize
124KB
MD57a6ffff6720b3f3f82e85f57731432c2
SHA1046f5152c291ab9878fcbb36ec0999d499a24ea5
SHA256dfb30b235e3bf683b1d2678d2f6463452e8bdacc078749790cef5c54ffdc5888
SHA512101ac3f101d5f04c34126da3068586dcbb3a1a36e78654cea3dbd71d1e109d57e51150112f8e1ff41663091f2e9d9a68f1fc72cda2104f8fb7865242a905e402
-
Filesize
124KB
MD511474be4364fcd39383ff967a90a8832
SHA17f7add369440ea8f0ace189d7ea06242d29b59de
SHA256105e29b1011746a2250fdf7a5affeff3e1df843eb817f64ea383deb28b8bef16
SHA512c4e1752f8531866ac0863921f430caf99ce0d5daac74d5e2ac5bf67b883c12fd2531d2d2724b4ab6f41e1f28da41af777c528446f393196030bca54463927c5b
-
Filesize
124KB
MD591c99fb7578c32171e6ec5a9b06c30a6
SHA1f6acb2e84c1972413a4bd30a9f64d176507fe1b9
SHA25682c6dc6ff94a4f57355f1637250f6765b09b624f4a716fd4a7cbc36cccf621c3
SHA51218b356ff5f489ea6c0a23d753e46599416058c573e864d2398b088ed7a324e8ae8c910d2f0cb5085a7c1d55629253baab4c7e30220c3d8dab8124808c70ccab7
-
Filesize
124KB
MD55f448deab1495e2823ccede4e10be604
SHA1cea2e790fa3c8d5ce5036a29e6da796a11ca23e6
SHA256f6b2e49c9998223effd16d15c998fcb0ff62078390c144f786f3971223f58608
SHA512a43cf02e5b6828eb2c8d1b3d6dc5e3a171ad5b75b2b20fae6cb6bec93f0da98264399eeec55bb0dbac00ab7ae5158a8b147d36ec44db544ec15391be3fb98490
-
Filesize
124KB
MD586933e63b055c886e449a405ab315649
SHA19c0c68211ebd9b7a5ee261648530d823477a189c
SHA25655df43f0a44c126c345ac7344adda73d8dcdf70b5bec3729b4996f73baecc213
SHA5123bbd956666e2dede8e56e6cb8217d579f7731f1f5b397a983029f719269aa6d68b5358c1e19371d8c97d5af37a4f312cf4c5c2859aa85acc02b9521aa5d9329b
-
Filesize
124KB
MD51b8bda4947ff380e51e11b777e14332d
SHA1ed7e81a7070f2ba9782523caa9bfdda12a2fc1f2
SHA256b130b0205ebed3db4646836ce291784b08e3e0c847bc3e2889ab2a104cf6fd7f
SHA5127ecefd8b485f4ebe4bd0fa4be5180abb39b33772456113bcdc9735840d01e7be5fa48416401e9f739498e0765c8b9257cf079ec9f87ef6aa87e754e569211aee
-
Filesize
124KB
MD5aafe96e78b837aa73b4efc09f89f0693
SHA15e27512cfbb1d72606eb814a560c35ebc84ac9c4
SHA2561afaeb6a578b5a1afc1ea1bc350399c6d37c79f24bc061cf2569e70c5ae5515f
SHA512f61c838e604b7753ed8bff51b38005b21297a9c39320fdb5b9ff4297dad67a601a816afeeea47bb4c23c4438a2ad597d8adb25c76beafe5cd80dfa037a7c0b23
-
Filesize
124KB
MD5a807bcdc0380c5892b8c4bb4ceb0b5da
SHA1712c05d9e7deca9bd5d9887751c8623b1d21b944
SHA256dd81855b5dafd277bdd462575a396949bd7b979f90d4e88c0c39256f77e22c1f
SHA5120ded821d07ce61b0b4811bc20d9596e42218b18bc98a941f017080be36af87e37cec13eeedd63bf5b1b57b8ee6dd6cadef16e88644005d85d0cb26dee1d7976f
-
Filesize
124KB
MD5f4eb74725c7acf0d10264a85961042e5
SHA1b43659a7ca656b6d758c6638e0117abb005ca97d
SHA2568aac118222bcdf584dc5d2894fbf2a78573fc21bb831c9af33608b6152f13401
SHA512a88ab14047ab88420c1a47540fbe9fe6911ac9b55fd920ef15d17dcec64760315f182698446f22fb30144a58370afbd3325b0746057a6040785a2739c5606751
-
Filesize
124KB
MD5759cce82780c7f0a51e0fbfe838714ac
SHA10fabb668d0876680320d7a6eca5d13f1dbf747e2
SHA25622775d9cc865c525120f635df747a601f5b05e85c5c8c7dd056d2cfd7f13b93e
SHA512d699fde4168151b4b12c6bbb6cd101f6bf70206e28cd83d51e0c7fb8fc0c0f65cef83b0e596c8021866d011d4849d19f6046a71644e59be3df5cf2e072ed0cc0
-
Filesize
124KB
MD5a4ca5a9064f966a549bc56555fc1fedc
SHA13450a95ed7dbe3dc6597e51619abad14c3f87fdb
SHA256d89130b8ba370eae4e6cd831993330e6c7a88f76fa76c7c6a912007d929183db
SHA51282e73bf4c869bd9ec9ade65caf03bc2fb41e1767a790ff549a1565fd0c2c5cb0191a3d6eb37dcf82a3d41a01d89bab668710fd3f9194fc1ac4b0df470883c387
-
Filesize
124KB
MD51916db82a90ef7d4cb8196db5e2dfd56
SHA191feaeeefbf6abd8cb9e0d94e0840390fe733357
SHA256b9e63fddbcd59fefff42219681cdd073c269b925bf18c647d7ed976323b89ff4
SHA5124ba7ef1fbbe2ff08f767bf848fd7fdd9382b8d84a38ab8e61e9d9713e18a23b1f173e19d809b7d30419369e80cbcdcd7344e1e6579f7ca3d1afa226ea5a6e0dd
-
Filesize
124KB
MD575812081cec1487f59bf5b6c561b4f1c
SHA12940df3754e7ca0fc026bd2a9e19c507b3b1b149
SHA2562526257e809f2761053206c3357737a0c531b273e1c161d87970bdbf721a3c1d
SHA5124e1675c30b39fef4d1c9cb21176c84216ec0cd1a62834361d9482f35982ab7a48b46805b1a7952adceafcf993f27d5e24c3a91a4c9f42ff2fb6d35ba33aabc02
-
Filesize
124KB
MD50efa06d581413a4c260799a516c4a2a4
SHA11d7ca5605572f22eb32bc4f583f0f240afc1b4ff
SHA2566f6f5d02b7b3289f0583c9b0eb0b76d61def51146bd72222762a61874ff5c99a
SHA512ed78acf6222f86938f6c4b0eb088677ae958be14e611ee390ab5f83d5c33f0464ac73ed77e0974ec83e2c1d7cde1bc6a05b7bbafdf8970ae50a01a1ad09fb5f1
-
Filesize
124KB
MD5eb930cd8f8b7014eec68acb8022c5a94
SHA1e58111bc0fb7959f92542eab891bc7e7a57bc91d
SHA256c4fa29c863106403c493725679c519593bb74220d10d15366824e5833cdaaa02
SHA5122e21e9cfda678f9a660c628ef2c854f574a16ee2bcc9d8627c6880f496d99556521f13b9cdc42bcc08e2847e0e2fec278edf2e9eb6dc3dc83f049ac68ae17201
-
Filesize
124KB
MD51145e1ab4660364fcd2906de651adccd
SHA1f2b0452f1b2f71853f3167f258ba9b3a0c3be421
SHA256ca272c442c189c6a1b12ea8af93f8c84a3fb543c468e522b6873045ca8c7f15f
SHA512a705cf5aff2f11ba49038fc8f04698f15a09cd75287d1bfd8c8cd276e6060cfcb3ab770a0d51bf78a19adff1129a69d4f5d3cb4ffe0f919cc77017936c390933
-
Filesize
124KB
MD582adc699ac3bfa427eb339a43dd995c3
SHA1b2b1e7b06e1e49383f6c716813b7caef84b9785e
SHA2560303f97ecc318d3d93cdf3f6e5a3a77e5e01ec890833a2e651940da129320212
SHA5127995213e78a0d9f890a69d86eccf5c40edd2e3317d070aedad0abfebd24613057e5e91202f2ba9d0fa2cb1ccd7020c836a71198e5cdfa7fbdade709d8d5e72c9
-
Filesize
124KB
MD50de2af5ddaf88a1c1e01658ef242f5c0
SHA1f08e1c3b8f97f2b0a58c85aa06d3822749274b94
SHA256a96332d2799e8f4f692b2c4481aa80cf40b10e5e1093997ed42485e2a3dd38e0
SHA5121ec6c08d422099ecb9ad3b9f9f8242e2521f6e52e07e6bb15d8c4fdd9da4805a11486de23bb1ea8ace23a14d47053e70673644c95804ba013bfb8b7632499522
-
Filesize
124KB
MD5e209af36a9566bd8bedc5db28c2c1a52
SHA1c959c97861c298231412eb85a0ad5fd2c22654dc
SHA25673fa3e28113620d01fb901264ccacafd0ac9fd78621d3ff82c4b866cafae168f
SHA5128f9f24021515f4216d5fd60609cca688d103a32657ed2da044ad1def83368d287bc76e652b5a0f2580c32ff346190be6a6827eeac64f18a2df3df7ccb0d49546
-
Filesize
124KB
MD526ed873814f2ec34055fa933f1c5fd16
SHA1456145255a7db5b0473aecdad0af925dc94c5cd4
SHA25659a3acdac41fc575c518c28e3a5f138747d3cbd84374fe2fa84052d3eb3a78e7
SHA512f70408fa6a84f59a0c92c2476c56a667d3cd532d615cef704c913f784323e30807fd38795efbdd591d41d30f97275de87cf4df1a820093519f36bbe6c7106003
-
Filesize
124KB
MD5735bc67828d863ab9d2a0ef8f9002dea
SHA1f2e036a3501d2a7ed29669112f158e96e382d404
SHA256de0aff33f0309dac45b206e037bcb53dbee08f21ff886e402c4c4dd6cba98c58
SHA512a5f891aa280e15dc34779f3a9ef1a5496d70ac5ee871b4855878a6794c95cd67b00190af10772d4ab8cdfd61651021a33e99060e5da883b6e46d7c5ed8149d3d
-
Filesize
124KB
MD54b13c62c931efc3b951c9d999e74396a
SHA17bc3c181791b2cc6422757cc09a19c77cd7ebfdb
SHA25657ef7b46fd721438026f86c588275b705f95ea8bde1b896753a10d414177a3b3
SHA512027d272b5cd22eae3b1e99d3edfa0405e699fb250cd53aef0e715803932029071053c2b87955e3320ae19c8ea3a38f63984ae50615e26e4aa81e901add1a885a
-
Filesize
124KB
MD5e7a18c8be835b4f380690cb93939348d
SHA1d7c7091ab6dce1d063afd341f9dfa7425a0255c8
SHA25692dd27faff6a786a99457773ca2bdaee843f14b790d4fa1911b92b0ce3428d7f
SHA5121143ba97ecde0f410442fbbce7535de49dcc397d2918ff0bf26939bbb1ed70b7c14836197ffe16136c7695cc9f803babcf5cd0930412030931be9b1f30720ae5
-
Filesize
124KB
MD5be6481981d347827033d19a26762c31b
SHA14237883a3c64d689c0a9b7855f239f251a75cee7
SHA2561a0a5f641174c84ecbf527133e6872d60f147c77531056abb1801b9ab355edcb
SHA5122adeba821b8526d4425f4a415ef9a92824f0deb279a476fdbad15de750391bdfde467fb41fda5b422acbb32dda0228b17d695307df3ad6208aaa7fdfaa360b3b
-
Filesize
124KB
MD543daa5a4db50fdade19db8cf3660bc61
SHA1c274d2984e91aa2bbda4652d077230d1cad223c0
SHA2563ce90daccda097a79f77bbce5da76d486a758c8518fed84746c485bbc912da90
SHA512bdd3d9d0e6ca66cf37541f5a076cf6bd424754ffea525a8d3752b179e4357c33e1c7dcefcf0213793ac43f8a9860b1207d0350ac1fc07c67306fe47c424c20e2
-
Filesize
124KB
MD5ebd3fcce91e1470affc2a37e14742978
SHA14fa4b1b93e8592d592b1cb044341ea86f9cd91f6
SHA256477121eaedc77ceb6d71d79d0624519dd56d3c7610e50e0180fcb05a6a6a062e
SHA51282485482ab78a81b2f82a46a82b352409bf7b07fd80c7dc577d68137c7c77d3fcd5815529ef8144223077556e2b97cfbdba9d9da00755d5ad615f971a9a0016f