Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20/05/2024, 03:18
Static task
static1
Behavioral task
behavioral1
Sample
d73cbc311d5fc6f297f661bf465a8fdb13ca184619aafad61235f672c27610a6.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d73cbc311d5fc6f297f661bf465a8fdb13ca184619aafad61235f672c27610a6.exe
Resource
win10v2004-20240508-en
General
-
Target
d73cbc311d5fc6f297f661bf465a8fdb13ca184619aafad61235f672c27610a6.exe
-
Size
124KB
-
MD5
8148b0a59054f3c79278875508fa7a85
-
SHA1
9955b3503f7e526361f018e283b3356b3679db00
-
SHA256
d73cbc311d5fc6f297f661bf465a8fdb13ca184619aafad61235f672c27610a6
-
SHA512
694dd86d744ade19e3bed906e550557ba3be6fc75d1d5a5ecba39fcdfe0b562ac9d191cd1862160ae7f44c0a4417a7e29e9a40c4c27ea0fd54bdf9b7d28c0028
-
SSDEEP
1536:FVszw5YSd0hRO/N69BH3OoGa+FL9jKceRgrkjSo:nGSYK0hkFoN3Oo1+F92S
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 42 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" niauza.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" faameax.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" teitem.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" siunio.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" giionuc.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ssseaw.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" bajuv.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" luiuku.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" yuuop.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" yamur.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" teana.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" mixis.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" qaeko.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" qncooj.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" zeeqeeq.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" viaes.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" wauree.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" mnsof.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" quuzeap.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ynraoh.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" riaja.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" goosul.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" xgxim.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" d73cbc311d5fc6f297f661bf465a8fdb13ca184619aafad61235f672c27610a6.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" tjlail.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" fooid.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" gnpaut.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" giuew.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" piaid.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" giuozo.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" nyziug.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" kfhiic.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" foapoa.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" xeedoir.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" nausuaw.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" xaaewuv.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" sooaci.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" weiqeez.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" qeeit.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" saicoar.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" wznuaf.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" seiow.exe -
Checks computer location settings 2 TTPs 42 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation weiqeez.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation mixis.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation giuozo.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation d73cbc311d5fc6f297f661bf465a8fdb13ca184619aafad61235f672c27610a6.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation quuzeap.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation yuuop.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation siunio.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation ynraoh.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation viaes.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation goosul.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation riaja.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation xaaewuv.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation kfhiic.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation wauree.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation seiow.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation bajuv.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation piaid.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation sooaci.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation xgxim.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation qaeko.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation luiuku.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation niauza.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation faameax.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation fooid.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation wznuaf.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation yamur.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation xeedoir.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation teana.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation saicoar.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation nyziug.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation foapoa.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation ssseaw.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation zeeqeeq.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation nausuaw.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation giuew.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation mnsof.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation qncooj.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation qeeit.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation gnpaut.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation giionuc.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation teitem.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation tjlail.exe -
Executes dropped EXE 42 IoCs
pid Process 4752 weiqeez.exe 4444 tjlail.exe 1648 nyziug.exe 1436 qaeko.exe 3692 wznuaf.exe 652 riaja.exe 2696 quuzeap.exe 2548 kfhiic.exe 2692 fooid.exe 640 luiuku.exe 2044 qncooj.exe 2860 yuuop.exe 3940 qeeit.exe 4504 foapoa.exe 3076 gnpaut.exe 3124 siunio.exe 3184 ynraoh.exe 4512 ssseaw.exe 4436 yamur.exe 820 zeeqeeq.exe 2268 viaes.exe 4972 wauree.exe 1576 seiow.exe 3548 xeedoir.exe 3240 giionuc.exe 1328 teana.exe 4976 bajuv.exe 1020 saicoar.exe 4092 goosul.exe 4604 nausuaw.exe 2228 giuew.exe 2556 niauza.exe 3020 faameax.exe 5104 mnsof.exe 1352 mixis.exe 1780 xaaewuv.exe 2488 piaid.exe 1532 teitem.exe 1792 giuozo.exe 3488 sooaci.exe 2036 xgxim.exe 3828 louyau.exe -
Adds Run key to start application 2 TTPs 42 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kfhiic = "C:\\Users\\Admin\\kfhiic.exe /C" quuzeap.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fooid = "C:\\Users\\Admin\\fooid.exe /R" kfhiic.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qeeit = "C:\\Users\\Admin\\qeeit.exe /k" yuuop.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ynraoh = "C:\\Users\\Admin\\ynraoh.exe /Y" siunio.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mixis = "C:\\Users\\Admin\\mixis.exe /h" mnsof.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sooaci = "C:\\Users\\Admin\\sooaci.exe /q" giuozo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\quuzeap = "C:\\Users\\Admin\\quuzeap.exe /Y" riaja.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wznuaf = "C:\\Users\\Admin\\wznuaf.exe /P" qaeko.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qncooj = "C:\\Users\\Admin\\qncooj.exe /u" luiuku.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bajuv = "C:\\Users\\Admin\\bajuv.exe /b" teana.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xaaewuv = "C:\\Users\\Admin\\xaaewuv.exe /k" mixis.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tjlail = "C:\\Users\\Admin\\tjlail.exe /D" weiqeez.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\riaja = "C:\\Users\\Admin\\riaja.exe /V" wznuaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\giionuc = "C:\\Users\\Admin\\giionuc.exe /c" xeedoir.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mnsof = "C:\\Users\\Admin\\mnsof.exe /f" faameax.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\giuozo = "C:\\Users\\Admin\\giuozo.exe /Q" teitem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\weiqeez = "C:\\Users\\Admin\\weiqeez.exe /t" d73cbc311d5fc6f297f661bf465a8fdb13ca184619aafad61235f672c27610a6.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seiow = "C:\\Users\\Admin\\seiow.exe /x" wauree.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gnpaut = "C:\\Users\\Admin\\gnpaut.exe /l" foapoa.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ssseaw = "C:\\Users\\Admin\\ssseaw.exe /h" ynraoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xeedoir = "C:\\Users\\Admin\\xeedoir.exe /n" seiow.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\giuew = "C:\\Users\\Admin\\giuew.exe /F" nausuaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teitem = "C:\\Users\\Admin\\teitem.exe /h" piaid.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuuop = "C:\\Users\\Admin\\yuuop.exe /O" qncooj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\viaes = "C:\\Users\\Admin\\viaes.exe /B" zeeqeeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wauree = "C:\\Users\\Admin\\wauree.exe /z" viaes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\goosul = "C:\\Users\\Admin\\goosul.exe /b" saicoar.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nausuaw = "C:\\Users\\Admin\\nausuaw.exe /y" goosul.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\faameax = "C:\\Users\\Admin\\faameax.exe /v" niauza.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\luiuku = "C:\\Users\\Admin\\luiuku.exe /F" fooid.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zeeqeeq = "C:\\Users\\Admin\\zeeqeeq.exe /o" yamur.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teana = "C:\\Users\\Admin\\teana.exe /x" giionuc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\saicoar = "C:\\Users\\Admin\\saicoar.exe /Z" bajuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\niauza = "C:\\Users\\Admin\\niauza.exe /G" giuew.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\piaid = "C:\\Users\\Admin\\piaid.exe /o" xaaewuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\louyau = "C:\\Users\\Admin\\louyau.exe /I" xgxim.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qaeko = "C:\\Users\\Admin\\qaeko.exe /b" nyziug.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\foapoa = "C:\\Users\\Admin\\foapoa.exe /D" qeeit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\siunio = "C:\\Users\\Admin\\siunio.exe /r" gnpaut.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yamur = "C:\\Users\\Admin\\yamur.exe /j" ssseaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xgxim = "C:\\Users\\Admin\\xgxim.exe /R" sooaci.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nyziug = "C:\\Users\\Admin\\nyziug.exe /i" tjlail.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4036 d73cbc311d5fc6f297f661bf465a8fdb13ca184619aafad61235f672c27610a6.exe 4036 d73cbc311d5fc6f297f661bf465a8fdb13ca184619aafad61235f672c27610a6.exe 4752 weiqeez.exe 4752 weiqeez.exe 4444 tjlail.exe 4444 tjlail.exe 1648 nyziug.exe 1648 nyziug.exe 1436 qaeko.exe 1436 qaeko.exe 3692 wznuaf.exe 3692 wznuaf.exe 652 riaja.exe 652 riaja.exe 2696 quuzeap.exe 2696 quuzeap.exe 2548 kfhiic.exe 2548 kfhiic.exe 2692 fooid.exe 2692 fooid.exe 640 luiuku.exe 640 luiuku.exe 2044 qncooj.exe 2044 qncooj.exe 2860 yuuop.exe 2860 yuuop.exe 3940 qeeit.exe 3940 qeeit.exe 4504 foapoa.exe 4504 foapoa.exe 3076 gnpaut.exe 3076 gnpaut.exe 3124 siunio.exe 3124 siunio.exe 3184 ynraoh.exe 3184 ynraoh.exe 4512 ssseaw.exe 4512 ssseaw.exe 4436 yamur.exe 4436 yamur.exe 820 zeeqeeq.exe 820 zeeqeeq.exe 2268 viaes.exe 2268 viaes.exe 4972 wauree.exe 4972 wauree.exe 1576 seiow.exe 1576 seiow.exe 3548 xeedoir.exe 3548 xeedoir.exe 3240 giionuc.exe 3240 giionuc.exe 1328 teana.exe 1328 teana.exe 4976 bajuv.exe 4976 bajuv.exe 1020 saicoar.exe 1020 saicoar.exe 4092 goosul.exe 4092 goosul.exe 4604 nausuaw.exe 4604 nausuaw.exe 2228 giuew.exe 2228 giuew.exe -
Suspicious use of SetWindowsHookEx 43 IoCs
pid Process 4036 d73cbc311d5fc6f297f661bf465a8fdb13ca184619aafad61235f672c27610a6.exe 4752 weiqeez.exe 4444 tjlail.exe 1648 nyziug.exe 1436 qaeko.exe 3692 wznuaf.exe 652 riaja.exe 2696 quuzeap.exe 2548 kfhiic.exe 2692 fooid.exe 640 luiuku.exe 2044 qncooj.exe 2860 yuuop.exe 3940 qeeit.exe 4504 foapoa.exe 3076 gnpaut.exe 3124 siunio.exe 3184 ynraoh.exe 4512 ssseaw.exe 4436 yamur.exe 820 zeeqeeq.exe 2268 viaes.exe 4972 wauree.exe 1576 seiow.exe 3548 xeedoir.exe 3240 giionuc.exe 1328 teana.exe 4976 bajuv.exe 1020 saicoar.exe 4092 goosul.exe 4604 nausuaw.exe 2228 giuew.exe 2556 niauza.exe 3020 faameax.exe 5104 mnsof.exe 1352 mixis.exe 1780 xaaewuv.exe 2488 piaid.exe 1532 teitem.exe 1792 giuozo.exe 3488 sooaci.exe 2036 xgxim.exe 3828 louyau.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4036 wrote to memory of 4752 4036 d73cbc311d5fc6f297f661bf465a8fdb13ca184619aafad61235f672c27610a6.exe 91 PID 4036 wrote to memory of 4752 4036 d73cbc311d5fc6f297f661bf465a8fdb13ca184619aafad61235f672c27610a6.exe 91 PID 4036 wrote to memory of 4752 4036 d73cbc311d5fc6f297f661bf465a8fdb13ca184619aafad61235f672c27610a6.exe 91 PID 4752 wrote to memory of 4444 4752 weiqeez.exe 94 PID 4752 wrote to memory of 4444 4752 weiqeez.exe 94 PID 4752 wrote to memory of 4444 4752 weiqeez.exe 94 PID 4444 wrote to memory of 1648 4444 tjlail.exe 96 PID 4444 wrote to memory of 1648 4444 tjlail.exe 96 PID 4444 wrote to memory of 1648 4444 tjlail.exe 96 PID 1648 wrote to memory of 1436 1648 nyziug.exe 98 PID 1648 wrote to memory of 1436 1648 nyziug.exe 98 PID 1648 wrote to memory of 1436 1648 nyziug.exe 98 PID 1436 wrote to memory of 3692 1436 qaeko.exe 99 PID 1436 wrote to memory of 3692 1436 qaeko.exe 99 PID 1436 wrote to memory of 3692 1436 qaeko.exe 99 PID 3692 wrote to memory of 652 3692 wznuaf.exe 100 PID 3692 wrote to memory of 652 3692 wznuaf.exe 100 PID 3692 wrote to memory of 652 3692 wznuaf.exe 100 PID 652 wrote to memory of 2696 652 riaja.exe 101 PID 652 wrote to memory of 2696 652 riaja.exe 101 PID 652 wrote to memory of 2696 652 riaja.exe 101 PID 2696 wrote to memory of 2548 2696 quuzeap.exe 102 PID 2696 wrote to memory of 2548 2696 quuzeap.exe 102 PID 2696 wrote to memory of 2548 2696 quuzeap.exe 102 PID 2548 wrote to memory of 2692 2548 kfhiic.exe 104 PID 2548 wrote to memory of 2692 2548 kfhiic.exe 104 PID 2548 wrote to memory of 2692 2548 kfhiic.exe 104 PID 2692 wrote to memory of 640 2692 fooid.exe 106 PID 2692 wrote to memory of 640 2692 fooid.exe 106 PID 2692 wrote to memory of 640 2692 fooid.exe 106 PID 640 wrote to memory of 2044 640 luiuku.exe 107 PID 640 wrote to memory of 2044 640 luiuku.exe 107 PID 640 wrote to memory of 2044 640 luiuku.exe 107 PID 2044 wrote to memory of 2860 2044 qncooj.exe 108 PID 2044 wrote to memory of 2860 2044 qncooj.exe 108 PID 2044 wrote to memory of 2860 2044 qncooj.exe 108 PID 2860 wrote to memory of 3940 2860 yuuop.exe 109 PID 2860 wrote to memory of 3940 2860 yuuop.exe 109 PID 2860 wrote to memory of 3940 2860 yuuop.exe 109 PID 3940 wrote to memory of 4504 3940 qeeit.exe 110 PID 3940 wrote to memory of 4504 3940 qeeit.exe 110 PID 3940 wrote to memory of 4504 3940 qeeit.exe 110 PID 4504 wrote to memory of 3076 4504 foapoa.exe 111 PID 4504 wrote to memory of 3076 4504 foapoa.exe 111 PID 4504 wrote to memory of 3076 4504 foapoa.exe 111 PID 3076 wrote to memory of 3124 3076 gnpaut.exe 112 PID 3076 wrote to memory of 3124 3076 gnpaut.exe 112 PID 3076 wrote to memory of 3124 3076 gnpaut.exe 112 PID 3124 wrote to memory of 3184 3124 siunio.exe 113 PID 3124 wrote to memory of 3184 3124 siunio.exe 113 PID 3124 wrote to memory of 3184 3124 siunio.exe 113 PID 3184 wrote to memory of 4512 3184 ynraoh.exe 114 PID 3184 wrote to memory of 4512 3184 ynraoh.exe 114 PID 3184 wrote to memory of 4512 3184 ynraoh.exe 114 PID 4512 wrote to memory of 4436 4512 ssseaw.exe 116 PID 4512 wrote to memory of 4436 4512 ssseaw.exe 116 PID 4512 wrote to memory of 4436 4512 ssseaw.exe 116 PID 4436 wrote to memory of 820 4436 yamur.exe 117 PID 4436 wrote to memory of 820 4436 yamur.exe 117 PID 4436 wrote to memory of 820 4436 yamur.exe 117 PID 820 wrote to memory of 2268 820 zeeqeeq.exe 118 PID 820 wrote to memory of 2268 820 zeeqeeq.exe 118 PID 820 wrote to memory of 2268 820 zeeqeeq.exe 118 PID 2268 wrote to memory of 4972 2268 viaes.exe 119
Processes
-
C:\Users\Admin\AppData\Local\Temp\d73cbc311d5fc6f297f661bf465a8fdb13ca184619aafad61235f672c27610a6.exe"C:\Users\Admin\AppData\Local\Temp\d73cbc311d5fc6f297f661bf465a8fdb13ca184619aafad61235f672c27610a6.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4036 -
C:\Users\Admin\weiqeez.exe"C:\Users\Admin\weiqeez.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4752 -
C:\Users\Admin\tjlail.exe"C:\Users\Admin\tjlail.exe"3⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Users\Admin\nyziug.exe"C:\Users\Admin\nyziug.exe"4⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Users\Admin\qaeko.exe"C:\Users\Admin\qaeko.exe"5⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Users\Admin\wznuaf.exe"C:\Users\Admin\wznuaf.exe"6⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3692 -
C:\Users\Admin\riaja.exe"C:\Users\Admin\riaja.exe"7⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:652 -
C:\Users\Admin\quuzeap.exe"C:\Users\Admin\quuzeap.exe"8⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Users\Admin\kfhiic.exe"C:\Users\Admin\kfhiic.exe"9⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Users\Admin\fooid.exe"C:\Users\Admin\fooid.exe"10⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Users\Admin\luiuku.exe"C:\Users\Admin\luiuku.exe"11⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Users\Admin\qncooj.exe"C:\Users\Admin\qncooj.exe"12⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Users\Admin\yuuop.exe"C:\Users\Admin\yuuop.exe"13⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Users\Admin\qeeit.exe"C:\Users\Admin\qeeit.exe"14⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3940 -
C:\Users\Admin\foapoa.exe"C:\Users\Admin\foapoa.exe"15⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4504 -
C:\Users\Admin\gnpaut.exe"C:\Users\Admin\gnpaut.exe"16⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3076 -
C:\Users\Admin\siunio.exe"C:\Users\Admin\siunio.exe"17⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3124 -
C:\Users\Admin\ynraoh.exe"C:\Users\Admin\ynraoh.exe"18⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3184 -
C:\Users\Admin\ssseaw.exe"C:\Users\Admin\ssseaw.exe"19⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4512 -
C:\Users\Admin\yamur.exe"C:\Users\Admin\yamur.exe"20⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4436 -
C:\Users\Admin\zeeqeeq.exe"C:\Users\Admin\zeeqeeq.exe"21⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:820 -
C:\Users\Admin\viaes.exe"C:\Users\Admin\viaes.exe"22⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Users\Admin\wauree.exe"C:\Users\Admin\wauree.exe"23⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4972 -
C:\Users\Admin\seiow.exe"C:\Users\Admin\seiow.exe"24⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1576 -
C:\Users\Admin\xeedoir.exe"C:\Users\Admin\xeedoir.exe"25⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3548 -
C:\Users\Admin\giionuc.exe"C:\Users\Admin\giionuc.exe"26⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3240 -
C:\Users\Admin\teana.exe"C:\Users\Admin\teana.exe"27⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1328 -
C:\Users\Admin\bajuv.exe"C:\Users\Admin\bajuv.exe"28⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4976 -
C:\Users\Admin\saicoar.exe"C:\Users\Admin\saicoar.exe"29⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1020 -
C:\Users\Admin\goosul.exe"C:\Users\Admin\goosul.exe"30⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4092 -
C:\Users\Admin\nausuaw.exe"C:\Users\Admin\nausuaw.exe"31⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4604 -
C:\Users\Admin\giuew.exe"C:\Users\Admin\giuew.exe"32⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2228 -
C:\Users\Admin\niauza.exe"C:\Users\Admin\niauza.exe"33⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:2556 -
C:\Users\Admin\faameax.exe"C:\Users\Admin\faameax.exe"34⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:3020 -
C:\Users\Admin\mnsof.exe"C:\Users\Admin\mnsof.exe"35⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:5104 -
C:\Users\Admin\mixis.exe"C:\Users\Admin\mixis.exe"36⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:1352 -
C:\Users\Admin\xaaewuv.exe"C:\Users\Admin\xaaewuv.exe"37⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:1780 -
C:\Users\Admin\piaid.exe"C:\Users\Admin\piaid.exe"38⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:2488 -
C:\Users\Admin\teitem.exe"C:\Users\Admin\teitem.exe"39⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:1532 -
C:\Users\Admin\giuozo.exe"C:\Users\Admin\giuozo.exe"40⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:1792 -
C:\Users\Admin\sooaci.exe"C:\Users\Admin\sooaci.exe"41⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:3488 -
C:\Users\Admin\xgxim.exe"C:\Users\Admin\xgxim.exe"42⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:2036 -
C:\Users\Admin\louyau.exe"C:\Users\Admin\louyau.exe"43⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3828
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
124KB
MD5f5986b2cae93e524400006da96563f1f
SHA1313dde89e9d82d07143dbfbb94c0970d9155c1f9
SHA2569557048bd5f00ee63ac010326bf3be0bfd7ff79cad8b6989fa6a11d71907b963
SHA512487ef01194a3ad3ba28de379302702663d1b478b3bc9946c3ddf34b642ca25ac3e12df21e80a14a6712a2ee225d1492e51e714e72e7b3f7ffe4de1ae7c460cbe
-
Filesize
124KB
MD508dc26b80539e87b94a753560652246a
SHA1b318813205d68e8a84c3308f144bff28a994f65a
SHA256f094c83e5caa168f675fb0ca5c6ac367c1ef595139f60ad3253d848dc355164e
SHA5126ec70595207b1f13275194e67bb476eb416aaaac7d0afb8819fb35d430982e52e9e1bd87a94b39eca2c22dba06ad2ca32326521df739cce9197777ad9ae52774
-
Filesize
124KB
MD52efd3369a4edb67bc97dc823a9cfa595
SHA1e2dc8a50bf14c5c706f8f3df7b6705df00d5bc1f
SHA256a3e26687822803bc91ac0d56fb26ff3ca621f624aa26ba42acf22dc546b1231c
SHA512f4819daac3a02025bf1b9631ec9e801e2068f23cbf61d1c6c09e3f12171ba740dd059cdb18e8dcdaef4c280e69f203b8292d0edd257795e81c4ee8070036c988
-
Filesize
124KB
MD54cb2498459c08a5b68afb734bb02ba96
SHA1df88f450cfa2dcc3db5589a142cbb01c9f4f991a
SHA256d7023dc96350535d44224fd639643faa502602fa2c4c294614d0e2cb7253c87d
SHA5120992270248365c79f3bba4405a10b3b0472a9472950a92b7bc55d2ad3d3b1cdfb1c093def2085ff4f65b50b8c1c0fa89aa6541b447f718add1f5b204c2c98383
-
Filesize
124KB
MD5d2f69a6a7515a2647efc5030e0c7fcfe
SHA170af49e72bbc423d8986841ab526b76e6077a777
SHA25614749fac46c4ff09291efd60827d062089c5db19bbd2e871f74279cb7abb9e0b
SHA512ffd5c3a2d0097ed4d2e9feba72732295297ba7466fceb15fbcdc2427a9f4c9197f457e5e814435d9b5d21922f3feca5a770aff242d3902f4f0e847dbe59c23c9
-
Filesize
124KB
MD5718177cf56d890c0d30fedc4a07663a0
SHA1a15b20ca62cab263869d3cae0bcc672e65b72630
SHA256ace31500208ca56467c0cc41ef5af37dbbe57d3733df9e0d6938ae5a46db8116
SHA5122515911441940e9462f6edbbca952a963f26be0192feb0b58358d404f61318029f0466e08a3afdf639bcd99cf200dcdd234a666ee9c5c5113f166c95a80ed381
-
Filesize
124KB
MD5baf7bc18dad12b328d610f48c2745b07
SHA133f2389450c088e87c563cc847563fc922fa0ab1
SHA2563cf39fda07842839633c72b31eb6ee625f3989c044bb77473bab3d52bef51b72
SHA5121837998849a4c2f09a423f541bdf510bf7cf638d54f9c7d7d6b3b416a45504340966e88f2f8139211e0d29b3893ebfb8def92b7fa6b0ecbb635f0fe2d54e1243
-
Filesize
124KB
MD54dd57580b1b4189ae4f360c9f5295dc3
SHA15a414680750e8d106941b29294271a28cea53b9c
SHA25633f90dea45709c32f680106ce8788780c8c347337353cddb79e6ee792bddb6a2
SHA512e7a7336be9cb1a8751a5c7be173e6e5e3a9e03ba29aa383c76c87751edb5a8f694555a6fd72d492de872aa26f7e08621083eb6ae38ca587391d3d4b82e0c065e
-
Filesize
124KB
MD5aa64f4bb31190d914480412f5457b815
SHA13bc842160f78f808e80968c0226bc5ef2e0b3f29
SHA256c60faaec775f1dfcec7f59ccd1da45e467d0ed672cdfd7c0154e63501fda332b
SHA5126ce0886afc27a4fd4d70c24a7389ea351c5a0c425966dcd9ba0fe2f29c772014f74cf68211584d73a4df940f1da6d48ea21ca3083c9c6a5f8434e82b033db3fc
-
Filesize
124KB
MD515c2559913065fba0d8199357873f1a6
SHA18f40d1dc37a457dec5976879e723e143640fe479
SHA256989d9e3bba1d0e7ab06295ef9e215035a39bcb3fb3d6bf4a8942745b3040ee1c
SHA51231268770037e2406dcfa84d518e41944a204ce1800985612eb539a24783803046ef820a3ad2d2879cbcbc6ff0a63ef2230740497fafbc346b398a192c18d37ec
-
Filesize
124KB
MD50c0fc009552b43c2bd24db3341ec1bbd
SHA17dd25fb017642e064523cae2f89421e044624864
SHA256a46365178ae8cce9dd793944cd4a869cbd13d1462fbb75394dc4822217ebd8d9
SHA512b1edc732213f3e194820b06816d392836063704ff1038a44d58794bc8b0054266ed4b937cad0c4e78712a1b18d1fbdf20ac4ac2b7689ffc3453b95d7aeea5dfe
-
Filesize
124KB
MD5f7987b89a40bb576ff297aaff44429f8
SHA169bb1a643b3912d4b65472de31fb08f8cf36b32b
SHA2564efd0e42e005b0e92976430b913540dee80b6dca6b9825225ee32ebf32bd3b6d
SHA5127d4216b043dd9442f6216ba23a8a1f1fcd5b039f82197d9a0ab73f9858730c8568d93150d621cf60928e52154a584d1a35dcff28caf35711128062d7c1a6a0e0
-
Filesize
124KB
MD5f0a6319c4553fd82d77d02c9dde9d060
SHA19b6babf16646731c980bd783aba3edc1e1506eb0
SHA256ebec6791bf87c45051a6b16c07b31654c582357a05cd94fe29a2c3c10486019b
SHA512b13a01f8832fc49ee7cd59935137361e0b2319ca8499ef5805d6b0ae0c8c2d71e87338c0b07baab8686de90c3a75e606c6ee09d67fab9700aa7d8052fe16bdec
-
Filesize
124KB
MD56caa038d3eae85647f1855cf745cfbc5
SHA18516900774e0c49994c6ff09b09f9ffcbf6831d0
SHA2561f3ab2cda9510d3210cd624538fde9808c1f491c57f6b5d5fd685efb60d51d78
SHA512e27eb4afb5d941800457220223f20b6541dfc2122396bc9f3e02b82311e990cf430cf16e4c36dbe2b8fd92ed5a274cfdfe628049483ae362a3093334724c03c6
-
Filesize
124KB
MD57f96246ae9337565d01711f177a3e236
SHA18be244783c339b62462c5390ba37a77ee07721c8
SHA256550be393cc131c252176bd9f12a7ace495088502badb54fe09f1bd522f6c5335
SHA5120e1f729116654157b0756a7499e03fd68f10023378ea1d33f7783a54fb3595e1af8af71ada6bd848d48ea60f02a6bcd1b12690cf9e07891c8cc8676331b0917a
-
Filesize
124KB
MD53297e93f8b3d74d6e6f16e66bb538651
SHA10b01587f6e898aec747c55309e3f21739393a927
SHA256c982df7205be8160f75877498b66ac8a1eb3ddf1f9faa71bd7d90edc2b1a31ca
SHA51227044ef614ab0f1b6d6f5edc6155aa87d60595fc0800842e12703c782f9e9c856aee032189432b8575029771fbac0868daadb3a01c36a63ab358dfc8ad6f167d
-
Filesize
124KB
MD557f66618c1d3961260f576ced5c065de
SHA109fce57cb21fd655e5e8d05ff99a3cff79c36535
SHA2569dc469b768c2e7f2502a6af1adc031bd4b716cf0498b814a367077b279e1653d
SHA51230fdb4afc978af75b74456df095c1e383387958399b407818b9b6c9d31ba66b81e054d7c9dc1274650271ac08c2a794539dab7d66eca990d99a6651f28dbe430
-
Filesize
124KB
MD56cecd246274711a79bcdb69e3ee6f857
SHA1212770005903714822502ccbd3193221765ab121
SHA25661e570eaf6d2b9da7e695cc714e73542ef915a46cd81353668d62f977e2cc95a
SHA512b01f80d3cb0e7bb842dec362fd4e8c4c6929f9f93062e40a17e6f1f7c6ff126c6d33c9bb40ea78cd8a0f0127021eaca5641f133c881c5f247cadd5c8091e1ac7
-
Filesize
124KB
MD560ffeee6f9039ded8f31d97ac9d26aaa
SHA1c71d72b2f780666b5367eb31863baea4108cc171
SHA256e3bf4fa928fce45d0d5c3a1269bb271d116447c93293b1b7187a2e589edab6be
SHA512d4b64f5891433a47bda39a69769f3f085b79f0cc6ce3d5ac6eae1d4ac29481c616d471d09cbc175072cda18e3093a0fba185766513841bfcc69f88c8e4e8e3eb
-
Filesize
124KB
MD5516a73632ca8b9f30a2d7e3801adcbd1
SHA12005a572ccd7e286a31052ee8828c16d4b177b5d
SHA25632d8fb3948317fd86e5b559c9726116f91425741c947d80e9f0f0a9b625dff76
SHA512ff54c648b77f40199222c25a0540fcf86763762076c20b42ff1115b87554335cf63493f79221d366eb9569fe07e403636e629fab9c49b54d142659998583551f
-
Filesize
124KB
MD57d30a1dc8fdd66e7a262c3eb5ce45cca
SHA1f8283b5b4d155b59d058b0b86e1aebfd4701340e
SHA256e7d4850d91637d41d00baf6e9072a9c85097eba36ed3bcec1165b9f52ca0def0
SHA51240d1fe07edf2a9f0e0e44aa09c5c3400d9805e96bd9d280b37549a8443de87c34170fa2d1ed5753822039f370b841a9716506edf34b74f410c8767b96c702d30
-
Filesize
124KB
MD5e6958238959a731c748f2fbbbce6986d
SHA1da3df4604ace8bd8bd07f5c8c15b3da064b977a3
SHA2563bca6d97f5704d23c50680bcc3cb0bfa5b86975eff01c7cdce57f5510e9f9d2a
SHA512ef143243ec3289e4adcad13f5df7e8a5b92294634e684b562eec34bd607327357b63514c7992dd3a23fb34fafc3e3b72d155f4115e315fed7b01e58563ec9a76
-
Filesize
124KB
MD591946e22c8a7632a1ad70c4afd5174bf
SHA11aa4e3c70fc4fb4dacf73aee89b3d9bf9e146e01
SHA2562944a8ced7e4735a884efdf5cadb09e8ee995e13e52f9b8d466d2d6aa57b97ab
SHA512b9b6e7539981405269618308ae110da64ce2af9771d89907a6a3f82b38598bb5c943e000328439e257b606422cf1f1fa0afd68ab90d5eea8c44e63a0f7d7b135
-
Filesize
124KB
MD50dc66d74641af3ae8bccc2c784434bb9
SHA121a5ffaf94a1fa7bd90523d1f3e67e2aa767ead1
SHA256f9a80cce1606614519ee4a7848a60924e46bcadb171e7c80aeb04875247f1335
SHA512489f8460f044629f24e6154c9acc503e2126afcf859d2306aaa05eb5d908d297e4ed059ff7d37d9730cea8f887013006261f0cddb84e52e893f72a98c5aee00a
-
Filesize
124KB
MD541daa06e98a45d19f22005586886293c
SHA1fa7711534d261288e855940bc9afea0c179b6fda
SHA256f1bdbd2f1fab80a53e27be89cc5eeef7bb3d20c5589d1ffc36a3c7fb65c3594e
SHA512fff14544a4fc61cd37dec0e548121c98f662d7f16b1277d8232fc3c5878bdb5b4413f22d61931f8c398d9337807edcd27771da90383e5a2f267cf75e9c12053c
-
Filesize
124KB
MD5e0df0d25302ae5665a8bc6cbcc219059
SHA1ca9cbea5da33582ad01a7c960bac58d72c062d57
SHA256dcb7c9f76cd80377100a4f0636c1201f49258aa0a1164dbfa708f3516c1e8ffe
SHA5127c1562297a27b34f87692787057d3ac36bff01df06471d29e35553a88081bddfee4bbf8265c7b54359c8b99f19abeb3d49ccfd86678f3680a6c163025dda353e
-
Filesize
124KB
MD550352875899da29ae702f4ba3c4f4ef3
SHA156467377e27cf55882e5397ce1624d1b83edeb2c
SHA2564b306b9375bee6c6af19895a418eb980eddf3547673525bd0e5dd5492e7b75d5
SHA512d86c4a2fc1d9fd2f9ae254e7db6d949d63e5c9ca5718d1fbda378941239f8548d17b7e857e0927fac56db413c9f4a94022138275a06f40654ad2a21ee481e433
-
Filesize
124KB
MD5cb667f1c73e49d2e513d7ca7298988f6
SHA1e237d91afdafe558cb480bd5d5ee8bdf0c81099c
SHA2564840123c8a69f68ee8d18713550423793c30f2c87597508f7f28012821d9d743
SHA512c090418ac8ebd6b777bff6650bd390d414bfaee048d46a8811a0e7b709c125a887f91e79bf2b7a06fb08e52b03ecb8c16e4fa3e257078179ecb1827a0e0c4317
-
Filesize
124KB
MD59c96e8168941120c8b0b7f289b156480
SHA10e28f470ecc396768311cebc83aa6352ccb012c2
SHA256eed4701df59bc75fb0b549017e0c300a2d9883df8c74f80919deba1fdda5211e
SHA512141773274c023ecb20d035346dee77f08ad8c9340217396c8c5dae4aec6212332edeb49842291ad722dd5def589d7869248ba13401d10a716d6afa4e220b694a
-
Filesize
124KB
MD580ec6c3987b8858ff60b6f23095e768c
SHA18d48f1f62418edb0177b9d9c929f55abf11e368d
SHA256a55dc92e6561f62de6b57d523efc613588ebf0fe80eb2a4d16974ce8d85724f4
SHA512bde3025f5a899acdae6523f20daeeade27a6589c6c9fcaa5c4ab55ff11ef70c35f6e0090ff4ab636efaa7671c03bd577a916ec5909f5a9455f327e5c05e05710
-
Filesize
124KB
MD547ebf21072e05ca1f2a873cec48b674e
SHA1eb8d196551667630a318f67415c197ccca0dca1e
SHA25630103023cb5229943419a9b4f0b8ac9fcc211b53c19045301fee68038654c442
SHA5124f204dc020453f25a131ca6974c0bb5f255752ee7d01d40c461abd958277970212df0b7b92576d386b9d20ac5296e998fdfb3b132e4c739ba972e661648971a8
-
Filesize
124KB
MD52ab38e56652709cf681c99989a5cbcf0
SHA1e299a163dc4fd341f19660adedabbcea5c799e7d
SHA2563ced7284f2e97578920b4320024294131eaf3092e91abcdbd1172a24d843aff2
SHA5125fa7032548497a7416873aa937e82b67b76441aea05ea84404a2ca66bd483e38ffe675bfad93c8e9ed18de04c6743c2f99f827a44e2255d46c15759555348e8f