Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
21/05/2024, 12:33
Static task
static1
Behavioral task
behavioral1
Sample
4b91f0f341a55ab2e50baa375c23b5e534ea901559cce893b3c43dbc0b811e5b_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4b91f0f341a55ab2e50baa375c23b5e534ea901559cce893b3c43dbc0b811e5b_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
4b91f0f341a55ab2e50baa375c23b5e534ea901559cce893b3c43dbc0b811e5b_NeikiAnalytics.exe
-
Size
124KB
-
MD5
adff7c9c612d14e7497dbc10d46ca850
-
SHA1
2a467710a869f729c0d496b6d8e63fc4342030ab
-
SHA256
4b91f0f341a55ab2e50baa375c23b5e534ea901559cce893b3c43dbc0b811e5b
-
SHA512
9dd25bc75d1876c3dfad8432b1190792a21cf46716fa3bea52399f743c0dae5558bfaf55a25b8a3a58e508a16d097b2755091fdf7d99b30d4add5bf39a130326
-
SSDEEP
1536:43szT5YLTKhRO/N69BH3OoGa+FL9jKceRgrkjSo3E:EGVYLehkFoN3Oo1+F92SP
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 42 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" wienuc.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ceeiqex.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" raeibi.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" twjeev.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" tebaf.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" feoeroh.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" rrxief.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" sfrouz.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" kggos.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" nxtig.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 4b91f0f341a55ab2e50baa375c23b5e534ea901559cce893b3c43dbc0b811e5b_NeikiAnalytics.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" peokiek.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" raaep.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" bygeof.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" mbfaic.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ypkeig.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" reiojes.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" toizoi.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" xuuwu.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ybmaon.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" geuadic.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" xuiet.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" wioaro.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" tuaxez.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" kjqic.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" yioqai.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" waiafu.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" nuoris.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" qoobeb.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" boebaj.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" qiuta.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" fuacuus.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" kzpoz.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ciexau.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" doaej.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" yswoal.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" jpsej.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" maexi.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" tuiur.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" yaaumi.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" qiuexib.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" taaque.exe -
Checks computer location settings 2 TTPs 42 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation kzpoz.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation xuiet.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation kggos.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation waiafu.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation ybmaon.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation reiojes.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation yswoal.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation qiuta.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation sfrouz.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation yioqai.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation xuuwu.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation nxtig.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation bygeof.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation wienuc.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation ceeiqex.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation toizoi.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation doaej.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation raaep.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation qiuexib.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation nuoris.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation boebaj.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation ciexau.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation raeibi.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation twjeev.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation kjqic.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation fuacuus.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation geuadic.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation peokiek.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation rrxief.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation wioaro.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation jpsej.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation 4b91f0f341a55ab2e50baa375c23b5e534ea901559cce893b3c43dbc0b811e5b_NeikiAnalytics.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation mbfaic.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation ypkeig.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation taaque.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation tebaf.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation maexi.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation tuiur.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation yaaumi.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation feoeroh.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation tuaxez.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation qoobeb.exe -
Executes dropped EXE 42 IoCs
pid Process 5024 kzpoz.exe 1400 mbfaic.exe 1408 ypkeig.exe 1288 geuadic.exe 556 wienuc.exe 1544 ciexau.exe 4296 feoeroh.exe 2592 reiojes.exe 5032 peokiek.exe 1516 ceeiqex.exe 1036 doaej.exe 5012 toizoi.exe 4056 rrxief.exe 1332 sfrouz.exe 3960 yswoal.exe 1704 xuiet.exe 444 raeibi.exe 4276 wioaro.exe 5040 tuaxez.exe 2024 kjqic.exe 4888 jpsej.exe 1232 maexi.exe 568 qiuta.exe 5036 tuiur.exe 2036 yaaumi.exe 4396 kggos.exe 2668 yioqai.exe 736 xuuwu.exe 2516 waiafu.exe 4064 twjeev.exe 904 fuacuus.exe 2708 raaep.exe 2900 qiuexib.exe 4336 taaque.exe 3952 tebaf.exe 1724 nxtig.exe 4964 bygeof.exe 2992 nuoris.exe 4072 qoobeb.exe 5108 boebaj.exe 4516 ybmaon.exe 2552 muozoeh.exe -
Adds Run key to start application 2 TTPs 42 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceeiqex = "C:\\Users\\Admin\\ceeiqex.exe /N" peokiek.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\toizoi = "C:\\Users\\Admin\\toizoi.exe /s" doaej.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xuiet = "C:\\Users\\Admin\\xuiet.exe /H" yswoal.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qiuta = "C:\\Users\\Admin\\qiuta.exe /I" maexi.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yioqai = "C:\\Users\\Admin\\yioqai.exe /w" kggos.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ypkeig = "C:\\Users\\Admin\\ypkeig.exe /F" mbfaic.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geuadic = "C:\\Users\\Admin\\geuadic.exe /e" ypkeig.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\reiojes = "C:\\Users\\Admin\\reiojes.exe /t" feoeroh.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\waiafu = "C:\\Users\\Admin\\waiafu.exe /b" xuuwu.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\muozoeh = "C:\\Users\\Admin\\muozoeh.exe /w" ybmaon.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bygeof = "C:\\Users\\Admin\\bygeof.exe /s" nxtig.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\boebaj = "C:\\Users\\Admin\\boebaj.exe /v" qoobeb.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kggos = "C:\\Users\\Admin\\kggos.exe /o" yaaumi.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\twjeev = "C:\\Users\\Admin\\twjeev.exe /f" waiafu.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fuacuus = "C:\\Users\\Admin\\fuacuus.exe /p" twjeev.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qiuexib = "C:\\Users\\Admin\\qiuexib.exe /y" raaep.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mbfaic = "C:\\Users\\Admin\\mbfaic.exe /d" kzpoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kjqic = "C:\\Users\\Admin\\kjqic.exe /d" tuaxez.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\raaep = "C:\\Users\\Admin\\raaep.exe /w" fuacuus.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xuuwu = "C:\\Users\\Admin\\xuuwu.exe /W" yioqai.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tebaf = "C:\\Users\\Admin\\tebaf.exe /a" taaque.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nuoris = "C:\\Users\\Admin\\nuoris.exe /C" bygeof.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wioaro = "C:\\Users\\Admin\\wioaro.exe /l" raeibi.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tuaxez = "C:\\Users\\Admin\\tuaxez.exe /m" wioaro.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tuiur = "C:\\Users\\Admin\\tuiur.exe /v" qiuta.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qoobeb = "C:\\Users\\Admin\\qoobeb.exe /k" nuoris.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yswoal = "C:\\Users\\Admin\\yswoal.exe /l" sfrouz.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jpsej = "C:\\Users\\Admin\\jpsej.exe /P" kjqic.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\maexi = "C:\\Users\\Admin\\maexi.exe /X" jpsej.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\taaque = "C:\\Users\\Admin\\taaque.exe /q" qiuexib.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ybmaon = "C:\\Users\\Admin\\ybmaon.exe /R" boebaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ciexau = "C:\\Users\\Admin\\ciexau.exe /o" wienuc.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\feoeroh = "C:\\Users\\Admin\\feoeroh.exe /v" ciexau.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\raeibi = "C:\\Users\\Admin\\raeibi.exe /Z" xuiet.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sfrouz = "C:\\Users\\Admin\\sfrouz.exe /G" rrxief.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kzpoz = "C:\\Users\\Admin\\kzpoz.exe /B" 4b91f0f341a55ab2e50baa375c23b5e534ea901559cce893b3c43dbc0b811e5b_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wienuc = "C:\\Users\\Admin\\wienuc.exe /o" geuadic.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rrxief = "C:\\Users\\Admin\\rrxief.exe /B" toizoi.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nxtig = "C:\\Users\\Admin\\nxtig.exe /c" tebaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\peokiek = "C:\\Users\\Admin\\peokiek.exe /a" reiojes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\doaej = "C:\\Users\\Admin\\doaej.exe /y" ceeiqex.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yaaumi = "C:\\Users\\Admin\\yaaumi.exe /A" tuiur.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3076 4b91f0f341a55ab2e50baa375c23b5e534ea901559cce893b3c43dbc0b811e5b_NeikiAnalytics.exe 3076 4b91f0f341a55ab2e50baa375c23b5e534ea901559cce893b3c43dbc0b811e5b_NeikiAnalytics.exe 5024 kzpoz.exe 5024 kzpoz.exe 1400 mbfaic.exe 1400 mbfaic.exe 1408 ypkeig.exe 1408 ypkeig.exe 1288 geuadic.exe 1288 geuadic.exe 556 wienuc.exe 556 wienuc.exe 1544 ciexau.exe 1544 ciexau.exe 4296 feoeroh.exe 4296 feoeroh.exe 2592 reiojes.exe 2592 reiojes.exe 5032 peokiek.exe 5032 peokiek.exe 1516 ceeiqex.exe 1516 ceeiqex.exe 1036 doaej.exe 1036 doaej.exe 5012 toizoi.exe 5012 toizoi.exe 4056 rrxief.exe 4056 rrxief.exe 1332 sfrouz.exe 1332 sfrouz.exe 3960 yswoal.exe 3960 yswoal.exe 1704 xuiet.exe 1704 xuiet.exe 444 raeibi.exe 444 raeibi.exe 4276 wioaro.exe 4276 wioaro.exe 5040 tuaxez.exe 5040 tuaxez.exe 2024 kjqic.exe 2024 kjqic.exe 4888 jpsej.exe 4888 jpsej.exe 1232 maexi.exe 1232 maexi.exe 568 qiuta.exe 568 qiuta.exe 5036 tuiur.exe 5036 tuiur.exe 2036 yaaumi.exe 2036 yaaumi.exe 4396 kggos.exe 4396 kggos.exe 2668 yioqai.exe 2668 yioqai.exe 736 xuuwu.exe 736 xuuwu.exe 2516 waiafu.exe 2516 waiafu.exe 4064 twjeev.exe 4064 twjeev.exe 904 fuacuus.exe 904 fuacuus.exe -
Suspicious use of SetWindowsHookEx 43 IoCs
pid Process 3076 4b91f0f341a55ab2e50baa375c23b5e534ea901559cce893b3c43dbc0b811e5b_NeikiAnalytics.exe 5024 kzpoz.exe 1400 mbfaic.exe 1408 ypkeig.exe 1288 geuadic.exe 556 wienuc.exe 1544 ciexau.exe 4296 feoeroh.exe 2592 reiojes.exe 5032 peokiek.exe 1516 ceeiqex.exe 1036 doaej.exe 5012 toizoi.exe 4056 rrxief.exe 1332 sfrouz.exe 3960 yswoal.exe 1704 xuiet.exe 444 raeibi.exe 4276 wioaro.exe 5040 tuaxez.exe 2024 kjqic.exe 4888 jpsej.exe 1232 maexi.exe 568 qiuta.exe 5036 tuiur.exe 2036 yaaumi.exe 4396 kggos.exe 2668 yioqai.exe 736 xuuwu.exe 2516 waiafu.exe 4064 twjeev.exe 904 fuacuus.exe 2708 raaep.exe 2900 qiuexib.exe 4336 taaque.exe 3952 tebaf.exe 1724 nxtig.exe 4964 bygeof.exe 2992 nuoris.exe 4072 qoobeb.exe 5108 boebaj.exe 4516 ybmaon.exe 2552 muozoeh.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3076 wrote to memory of 5024 3076 4b91f0f341a55ab2e50baa375c23b5e534ea901559cce893b3c43dbc0b811e5b_NeikiAnalytics.exe 90 PID 3076 wrote to memory of 5024 3076 4b91f0f341a55ab2e50baa375c23b5e534ea901559cce893b3c43dbc0b811e5b_NeikiAnalytics.exe 90 PID 3076 wrote to memory of 5024 3076 4b91f0f341a55ab2e50baa375c23b5e534ea901559cce893b3c43dbc0b811e5b_NeikiAnalytics.exe 90 PID 5024 wrote to memory of 1400 5024 kzpoz.exe 94 PID 5024 wrote to memory of 1400 5024 kzpoz.exe 94 PID 5024 wrote to memory of 1400 5024 kzpoz.exe 94 PID 1400 wrote to memory of 1408 1400 mbfaic.exe 96 PID 1400 wrote to memory of 1408 1400 mbfaic.exe 96 PID 1400 wrote to memory of 1408 1400 mbfaic.exe 96 PID 1408 wrote to memory of 1288 1408 ypkeig.exe 98 PID 1408 wrote to memory of 1288 1408 ypkeig.exe 98 PID 1408 wrote to memory of 1288 1408 ypkeig.exe 98 PID 1288 wrote to memory of 556 1288 geuadic.exe 99 PID 1288 wrote to memory of 556 1288 geuadic.exe 99 PID 1288 wrote to memory of 556 1288 geuadic.exe 99 PID 556 wrote to memory of 1544 556 wienuc.exe 100 PID 556 wrote to memory of 1544 556 wienuc.exe 100 PID 556 wrote to memory of 1544 556 wienuc.exe 100 PID 1544 wrote to memory of 4296 1544 ciexau.exe 101 PID 1544 wrote to memory of 4296 1544 ciexau.exe 101 PID 1544 wrote to memory of 4296 1544 ciexau.exe 101 PID 4296 wrote to memory of 2592 4296 feoeroh.exe 102 PID 4296 wrote to memory of 2592 4296 feoeroh.exe 102 PID 4296 wrote to memory of 2592 4296 feoeroh.exe 102 PID 2592 wrote to memory of 5032 2592 reiojes.exe 104 PID 2592 wrote to memory of 5032 2592 reiojes.exe 104 PID 2592 wrote to memory of 5032 2592 reiojes.exe 104 PID 5032 wrote to memory of 1516 5032 peokiek.exe 107 PID 5032 wrote to memory of 1516 5032 peokiek.exe 107 PID 5032 wrote to memory of 1516 5032 peokiek.exe 107 PID 1516 wrote to memory of 1036 1516 ceeiqex.exe 108 PID 1516 wrote to memory of 1036 1516 ceeiqex.exe 108 PID 1516 wrote to memory of 1036 1516 ceeiqex.exe 108 PID 1036 wrote to memory of 5012 1036 doaej.exe 109 PID 1036 wrote to memory of 5012 1036 doaej.exe 109 PID 1036 wrote to memory of 5012 1036 doaej.exe 109 PID 5012 wrote to memory of 4056 5012 toizoi.exe 110 PID 5012 wrote to memory of 4056 5012 toizoi.exe 110 PID 5012 wrote to memory of 4056 5012 toizoi.exe 110 PID 4056 wrote to memory of 1332 4056 rrxief.exe 111 PID 4056 wrote to memory of 1332 4056 rrxief.exe 111 PID 4056 wrote to memory of 1332 4056 rrxief.exe 111 PID 1332 wrote to memory of 3960 1332 sfrouz.exe 112 PID 1332 wrote to memory of 3960 1332 sfrouz.exe 112 PID 1332 wrote to memory of 3960 1332 sfrouz.exe 112 PID 3960 wrote to memory of 1704 3960 yswoal.exe 113 PID 3960 wrote to memory of 1704 3960 yswoal.exe 113 PID 3960 wrote to memory of 1704 3960 yswoal.exe 113 PID 1704 wrote to memory of 444 1704 xuiet.exe 114 PID 1704 wrote to memory of 444 1704 xuiet.exe 114 PID 1704 wrote to memory of 444 1704 xuiet.exe 114 PID 444 wrote to memory of 4276 444 raeibi.exe 115 PID 444 wrote to memory of 4276 444 raeibi.exe 115 PID 444 wrote to memory of 4276 444 raeibi.exe 115 PID 4276 wrote to memory of 5040 4276 wioaro.exe 117 PID 4276 wrote to memory of 5040 4276 wioaro.exe 117 PID 4276 wrote to memory of 5040 4276 wioaro.exe 117 PID 5040 wrote to memory of 2024 5040 tuaxez.exe 118 PID 5040 wrote to memory of 2024 5040 tuaxez.exe 118 PID 5040 wrote to memory of 2024 5040 tuaxez.exe 118 PID 2024 wrote to memory of 4888 2024 kjqic.exe 119 PID 2024 wrote to memory of 4888 2024 kjqic.exe 119 PID 2024 wrote to memory of 4888 2024 kjqic.exe 119 PID 4888 wrote to memory of 1232 4888 jpsej.exe 120
Processes
-
C:\Users\Admin\AppData\Local\Temp\4b91f0f341a55ab2e50baa375c23b5e534ea901559cce893b3c43dbc0b811e5b_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\4b91f0f341a55ab2e50baa375c23b5e534ea901559cce893b3c43dbc0b811e5b_NeikiAnalytics.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3076 -
C:\Users\Admin\kzpoz.exe"C:\Users\Admin\kzpoz.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5024 -
C:\Users\Admin\mbfaic.exe"C:\Users\Admin\mbfaic.exe"3⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Users\Admin\ypkeig.exe"C:\Users\Admin\ypkeig.exe"4⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Users\Admin\geuadic.exe"C:\Users\Admin\geuadic.exe"5⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Users\Admin\wienuc.exe"C:\Users\Admin\wienuc.exe"6⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:556 -
C:\Users\Admin\ciexau.exe"C:\Users\Admin\ciexau.exe"7⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Users\Admin\feoeroh.exe"C:\Users\Admin\feoeroh.exe"8⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4296 -
C:\Users\Admin\reiojes.exe"C:\Users\Admin\reiojes.exe"9⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Users\Admin\peokiek.exe"C:\Users\Admin\peokiek.exe"10⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\Users\Admin\ceeiqex.exe"C:\Users\Admin\ceeiqex.exe"11⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Users\Admin\doaej.exe"C:\Users\Admin\doaej.exe"12⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Users\Admin\toizoi.exe"C:\Users\Admin\toizoi.exe"13⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Users\Admin\rrxief.exe"C:\Users\Admin\rrxief.exe"14⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4056 -
C:\Users\Admin\sfrouz.exe"C:\Users\Admin\sfrouz.exe"15⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Users\Admin\yswoal.exe"C:\Users\Admin\yswoal.exe"16⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3960 -
C:\Users\Admin\xuiet.exe"C:\Users\Admin\xuiet.exe"17⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Users\Admin\raeibi.exe"C:\Users\Admin\raeibi.exe"18⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:444 -
C:\Users\Admin\wioaro.exe"C:\Users\Admin\wioaro.exe"19⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4276 -
C:\Users\Admin\tuaxez.exe"C:\Users\Admin\tuaxez.exe"20⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\Users\Admin\kjqic.exe"C:\Users\Admin\kjqic.exe"21⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Users\Admin\jpsej.exe"C:\Users\Admin\jpsej.exe"22⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Users\Admin\maexi.exe"C:\Users\Admin\maexi.exe"23⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1232 -
C:\Users\Admin\qiuta.exe"C:\Users\Admin\qiuta.exe"24⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:568 -
C:\Users\Admin\tuiur.exe"C:\Users\Admin\tuiur.exe"25⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5036 -
C:\Users\Admin\yaaumi.exe"C:\Users\Admin\yaaumi.exe"26⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2036 -
C:\Users\Admin\kggos.exe"C:\Users\Admin\kggos.exe"27⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4396 -
C:\Users\Admin\yioqai.exe"C:\Users\Admin\yioqai.exe"28⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2668 -
C:\Users\Admin\xuuwu.exe"C:\Users\Admin\xuuwu.exe"29⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:736 -
C:\Users\Admin\waiafu.exe"C:\Users\Admin\waiafu.exe"30⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2516 -
C:\Users\Admin\twjeev.exe"C:\Users\Admin\twjeev.exe"31⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4064 -
C:\Users\Admin\fuacuus.exe"C:\Users\Admin\fuacuus.exe"32⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:904 -
C:\Users\Admin\raaep.exe"C:\Users\Admin\raaep.exe"33⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:2708 -
C:\Users\Admin\qiuexib.exe"C:\Users\Admin\qiuexib.exe"34⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:2900 -
C:\Users\Admin\taaque.exe"C:\Users\Admin\taaque.exe"35⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:4336 -
C:\Users\Admin\tebaf.exe"C:\Users\Admin\tebaf.exe"36⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:3952 -
C:\Users\Admin\nxtig.exe"C:\Users\Admin\nxtig.exe"37⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:1724 -
C:\Users\Admin\bygeof.exe"C:\Users\Admin\bygeof.exe"38⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:4964 -
C:\Users\Admin\nuoris.exe"C:\Users\Admin\nuoris.exe"39⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:2992 -
C:\Users\Admin\qoobeb.exe"C:\Users\Admin\qoobeb.exe"40⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:4072 -
C:\Users\Admin\boebaj.exe"C:\Users\Admin\boebaj.exe"41⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:5108 -
C:\Users\Admin\ybmaon.exe"C:\Users\Admin\ybmaon.exe"42⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:4516 -
C:\Users\Admin\muozoeh.exe"C:\Users\Admin\muozoeh.exe"43⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2552
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
124KB
MD57fac6f733253ca0738d8290b1cbcd774
SHA151a253aa26366af18370fa539225b5d15005a0fb
SHA256f1b25032aa0a84ffec93b9a617b988f46e5f156e8543b8c76f5fe999e01dc815
SHA512b3713536bb75a152cffe0f32c86796759b63ed8bef0069d0308976727d9f46b6e2d6811b49cfff2608d2072213efa9b4b45c7bcc5764c2c5818fc73d9d3d31f4
-
Filesize
124KB
MD572c05d8c828520eae304913155745445
SHA1014175c5d891305d4fad23a4e76c921b22d976f5
SHA25656d9955fc4baac4e943266bd5401dc96e6fe6b3ec36941e25b1037411b039a8a
SHA512585c2f2f6cc7effab1df82517bcdb459afc706f9e92fcedc45fa8a75d6f5700ce3b09e25cf1380e6cfee479e09cc49aa56a7961eccd7a7affc01bdea5269bb0d
-
Filesize
124KB
MD5e96c149fc06e17c0274fdb69ed3cb8b6
SHA122f39c2c44365c8a15f409607f3698cfd0c518de
SHA2560c77d63cd3cac8791b8c7464c3ec9e1ad5652db49e3993fdca5798ccfdecd7e7
SHA5127cc15ec27e7f51cc5190a3d20c11dc5c2c8d1805455f1655b16e464e6daab540412910a5c031e461fcaca85681857081035dcb698707c0a615ab58dca47e4b26
-
Filesize
124KB
MD53a4243a2aac58b5b1b00c5d9256febea
SHA1322f4d33a365d8c9a9deb84e1934d1f23bcce838
SHA256c03347bfc0a2212f4ea0881a09b5b86893bc18725c29a80b37c8a3f2b26bc522
SHA512d65aade7116a362a3d98c08f99df2f66e75519c85174fffdb9397145d689ee1a838091637e30f46a09977eae9b1101c6566f963450ab289973d35dc428789a61
-
Filesize
124KB
MD5561ffae8f78bdd3b794a77a99f12c8f1
SHA1e1a39799b875d8c45e1f971f4211b64cabaa38d5
SHA256fc366434f0bad78151e8396f0696a45fae14248dfb92754aa4a3f48dafb52cac
SHA512cf84bc69de1039d91d2ee525ba04476284d9d416ed64c4c20f835194d56f9ab929218b7a8a2f0f159a057582c56796efe725d2f213f805e897b1ecaa1ea2d281
-
Filesize
124KB
MD50afd7da5f609a743958ab441c456d28a
SHA149affc78c880daaba6c9e41bb706cbcb7c241b33
SHA256cd666ec100dfbcaf24028f131e91f51d1a25562e9c3fc0551499fc12947bd8a0
SHA5126b27bfa03496ec65a8e75243fe4893de5202f2803c39fa5a9a2360127256035d755f3201c73e8441fbf622f4bd30d6344c730675a4c0d92d982d8b3da3363fc4
-
Filesize
124KB
MD51a558ef63ace441ec888f1e59d63c479
SHA18e6298277c027ffe6b7928abb8a59c01c17619ae
SHA25697519bab1ad81adb89a679fd21e142c94973783e96ef53c1f149b3f708302889
SHA512319c7054946fa169036b303446413e24582b49f24d4447d265ead0d87dc1f4145f289895461a909b4ce5d7c440475388fd6daed1251522b24d1b5f39e260940a
-
Filesize
124KB
MD5cb16b85d16b8b36893856261d3cd0e31
SHA1dcd92411dd8e02ecb7a5cfcfedd1e7cb5662043e
SHA256fe63b8e0f3ded612d00a92eb673523454fede2f70ee0c5c0f6d6c4a0f01ccaec
SHA5122ea3af5f3a0965e9927b38745b71b1ff3ae932f9513321f8a95c7c5fd5563784b92dd5f9bf70d32cc37acdae9c49777d60ebbc2fe9e099e9c8e7f8556ad0b31e
-
Filesize
124KB
MD5933c2a83d86fb45383a135d9a5ff2089
SHA14d0dd1838bf30a4ba86de6cbdb4eb380bedc0733
SHA256d44cd3e1de974539c60b5f2684a8aef3c2202b7f9e461518a56eb45d793bb7af
SHA5127bc38d17eac30f3f9edd532e3ec42d123f3622daace93052c5a9215b1b9f3cc9ca7bb4b62e2da4de8b47ffdfbaac6acac4157a1c8705e928995879954cc99c0b
-
Filesize
124KB
MD5d7afb488d9c80a5ec99e809a34a0337a
SHA17e8c856119a0e179c9a88fd7b5fc88d9389d2f6a
SHA256fc93feb704425e3637a2ae3306899a9546aca8d0926fe47db1f7b4c4ac6bae96
SHA5124b37dc812c56c8ad63896e1960c464854057630594ab0f5762279f4f77c38d5ce903eecfd66eccfc021aefca0442b075327685325cd3e1d8f740ec7f20ce1749
-
Filesize
124KB
MD5ad91585035a3c65dccdbdf9cb8aa8709
SHA1b3213c8a4cf7df91cf1ca2a0395ee2b464d0ea3d
SHA256cacb44be87bc638604ae240838b06607290ea32675d4c9a90bbe2df3bfeec3e5
SHA512acf65198b50e15ab6063b876809ea9582519f5a5ed7041b0f7f27787730157c7b18dcd1ff3d96fb28ee5c842e2d3243244466f8fe0f12565b8a3ddcfd3f35cd4
-
Filesize
124KB
MD5b23c9d1ccdfcf3715d956fcb60021172
SHA1cfa354c8a558830e332be989ee287896b2a44fff
SHA25665150523685552f238a78192cfd7917d1322df73276507300e5edfa49c216f9a
SHA5122e1efda6cc66c9ba61fbee68610f99167a8309f0927b9beeda28677bfa50c80541318769f29b6fc5f4cdd02955494ea0321dec1ea633d226c6b0cfe429f349fe
-
Filesize
124KB
MD5c7158a3c81ad5f8a7fc21fe62777163d
SHA1072bd4845cf7054548ae8dda22c4e61e158bb95e
SHA2562fa701fd2f100f41a1818f450a42bbae0fa4be443237049e06c9ab4906bd8e7f
SHA512c8e542bba5c5621b9840c950a4bd7cce949286931aea7f57d2e80efa4d05d219dd0aa0e47330db2cc0bf77ce73313ccdb0d9b8646ba805beb926dfa9ab31c13a
-
Filesize
124KB
MD5459669684dca47974c1d31ff8753e2ad
SHA18e0aed7f3f810857ddbfb2f5c3968a9bd6031d42
SHA25645bc76de217dd606a3b9bb7bec3cfce5bf3553eecc6fb9c633cfa3ae558a2857
SHA5124e69de8d7a6ddb5bde18f6a9b06b3e101b0d81794f36ae45e4ca5f870a2e1f9ae6185be203895308e13fd939f020e104236c42d310c3fe5242752c412e798d8b
-
Filesize
124KB
MD576d1585a79b1f33cfb78a8d1ad7501db
SHA1994f3eaa1a9997359528fbc38dde314af540797a
SHA256f50d23d6b02a6be25a32cdd22a1b43133b06ed1d5f36a132a8f1e5c190af4624
SHA512a8b2e2fb40c5ee0625b5bfa24cefb67e4b01ed7b86cf52865fca2ee9b4bf955a740c0fd509de1547691c897454209bf0fdce605435d2d7d8b0125b707bb06815
-
Filesize
124KB
MD57ed55e3c3584e81ec81a209e696b6b77
SHA140df7ca5a88fcfd23fdf35d05dc972e71e761273
SHA256d2e1d97bcf5cf575771ad0195e3d0d063937c9d1630d829107367dfea3c9d1c9
SHA51275137900c89cd74607b061cdbd930656ff5f48358a9f9282e88a5d1230c42086cfcd2284fbe2a277571295d7d8e8c60e3b9407e840168f974fdc5e3a44f48108
-
Filesize
124KB
MD5519bd5139586788beac53677b57cbf4b
SHA137f0d8787e25aabf006b762506dfe664a5101ef3
SHA2566149eef5ad1d82f9fac10b904d46e60c55897ce6e3f261eec923a18dbb0bfa3e
SHA51276fd422ab42c54b14fa79e7e74a021a27b15882abf7c5a26864dbc9fcdf435723d0dc46108d15334eafc6b4162f3304ebaf4a7f124e177e25a1bd4cf31d4012f
-
Filesize
124KB
MD5162a8413b47fb57f7489c0891add2bed
SHA1cfc38723f70d8667fc5b9d0a374a96368bcaf0dd
SHA256f6dccee0d4202a95ea6af397106560692bf9bdbdf75515315aa6b5c51f9494c3
SHA512235d6b1d2d514ecec53b0fdefb6033161a0425bc6c2de0febd9643c00ac670f45b9ac5769e4abc7bfa780afc9c0309612df6d7202e0b34314770b67479780637
-
Filesize
124KB
MD5c5fabfec27c9df6c179f756827ef9416
SHA113a577e46006b8367bd38bd67e2792be48075367
SHA256f36347387d5e0b80f46c7af66f3239b163aa1a544f25048220ed79d39a0a2295
SHA512c45c16458de1352e51815c9f19a00c0e3e35b2418319eb9f5565dbecd93e35d1edeee6855b4192b710544b384989fd646652dc724bdce87ef7ff383beb7a4047
-
Filesize
124KB
MD52d9a7ff70820d936f59ee2f15b9331ae
SHA1b07f94f70b26671e3d00248a3866d557710ecd49
SHA256a81957281eea42de65fe2e1367d5a4adb426f1baac5dfb4e22a9c3a898228104
SHA512d4d4c376586f28431c8a2d55d33ca36e44dbce1cce5bee64034a2ce5692e09ba201c06e535062ba04ba67a4d0d807a37d3625b1cb76f734e51c0cbf281eda08b
-
Filesize
124KB
MD5b1d0c5d56189a347c194a973e3db046d
SHA1327b071665ecdfa0b5a6410ce48cb67010519587
SHA256d6f8c57aef1cbe205ff49c2bbb826b66987cc63bbeca129f1b6cbe56201ea51e
SHA512a5e1981263ddecdee71a3c84d965e7bfb7e3e9f406a6fd39b3039c4d3915e8273b8071de44079998c8cadc3a7f20ec66e4c02f16e01113dc261fbf2ef6692003
-
Filesize
124KB
MD5abc1aaa2946343a8dee6465ac8e11c74
SHA1f7a7e31f1d0198eb9360ad02360ed95692ea52e3
SHA256436b4e814a73793f6ff65772acb98ec45437093826b365370468d72f1e3f2cc5
SHA5126e12aa97ff07d5ea3504d142ee89121b63157736c0d4750c548b7eb9a097defb04a7c070eacd9c6e89e2713aa11df58006bfb3df991c08970e1137b01302e43b
-
Filesize
124KB
MD569897b53d8a1f8da0001563ce48f6c0b
SHA18bcd25b229a9dd8d4118b2dbe1df763dda2a9a1f
SHA256bc6034685397c00ba68233bea90f7f3924483b18627b9c941fecbefe90e1874d
SHA512c53b89db54d18818561d33f646b148764a8d8ae41822be21ce1c07aef89ae080dac983a905af5a91a6347b6aafe1312ed1bdfeffb9418b89a43cad2206783398
-
Filesize
124KB
MD50ac77f1dcbbe7b597005b5dcc1c666ec
SHA12175d0dd78046fba8a631aed29613233eb763eb0
SHA256f112dc14fa912ad573aac288bcdc3f722d683560a7f8c608d1b6f1f40bfad006
SHA512b44460232db0b776ee6f60ef1ce9f8bc97162dcd995111056d2ed804fa057ca610eeea59f3b93bfc3acc141b02a81d33182dc244e0d38a9b88dc93aca2d8ac16
-
Filesize
124KB
MD58c55697c184c23df9c64d6a7c8830e59
SHA143a76e1ec575af076ce523f6a3a2efe29307be8d
SHA25695a8678c87d32d5ae4e27fa831b5e6fd5ad87262db73550cacd4279c37ad6e65
SHA512498c6a4eac99a437e9f32fa37a708b26063ae2429adc2e40298aed17a898ddf4e4e089ea079bfdf27622b6b7d55c8899fd6937d9cf26f534f60a7ac6aa104129
-
Filesize
124KB
MD5b817cb2e29ce3a598e1ff65431a97598
SHA1a573e01a31da3dfd7c70c43a9f455f4bac348731
SHA2565741b47f7033701f844e5789a3e10fdd65d0708cc1055347c7de325302b9aba5
SHA512c7cd6b3d65dbdf4386dfae3805c4b6f908981bb71cbedeb45ae98d956e60763fe2454b221a32b87b5f906b49004a678c8694dd32def191b6fd65af8aae7bc18f
-
Filesize
124KB
MD57fdc3538e25e5a949fde3f82eb5944ff
SHA1e7650f7d2febcd156298781156a7a07432cbaa9d
SHA256b27e0775adcbefd66028409356801c0f89272bc63320a1e63ca2b6a9f2eb75c1
SHA51259a75ae03abb719bd6f6aff393c3f54db73301c88e7fe83df6fa65ba4e6fddac617a10f6c2fb0fc90180be35864a61c7348c522de505b998a7051cf3c5f6d5f8
-
Filesize
124KB
MD58d212057d865c8850bbe0b2a46cc90dc
SHA1f2a6ac6e970db6105d2f99917da84b76befc4b55
SHA256d785cf28935a8e596971a694ce31cafa13a775a7cfa624f07cfe28003f84177e
SHA512b7f9710d707ec4fb2acf7c3bb030db446db11263f1877052582a9764ae26ee2710e978c09b00a39513f1b6f16dae78868bafa6591cf70ecd2c273d6a9c3c5fc1
-
Filesize
124KB
MD588ad4bbee9a6e6fdb84c123de953e9ee
SHA187c0382d64ea8512c998d1e6eef59a688fab2ca2
SHA2562b99395decc7c2a61fa342c7c18c4896d3a965dca78a500420ce924aed02888d
SHA5122f3d09c817901653a4b01e9b239c619347d30b389f8759a642c41d46594b086de3ce1190cbab2929a182c4378f8a93309423fe73cf20295e2ebe7841662d5883
-
Filesize
124KB
MD5f914e343845c88ae20a98baa244f948e
SHA199de5c4e8f0236bb95d639e30ee094b984995522
SHA2566971589af9863bbbbdff636100cd58930af8855914374e298381ade26c4e154c
SHA5127be2809cf43d7485244639829ba0fc87b43f018934c7d5b20846bd3ec9252844773b3202993931a3eba968eb83c16671479a89b87be46f446a280997639a122a
-
Filesize
124KB
MD56369491d5f05985a184fb7214032950b
SHA12b4a7a115d4da763692db1e75b613bb087e3f0f1
SHA256a3e964e1779609cfdae10a7e7ef4c379ec89c890a087a8eab173400eda75a208
SHA512d76584ba3860b2c7e7923fc9fba1752531acb5e269cf8b8ac58593121de5273b264f7552c19c4ae4913a052aaabae3cde6435d87ee0ead51e69ba416e32f8fe6
-
Filesize
124KB
MD564d217280cc6720aa28138ca96c80092
SHA1b84f64fca56883fe95314e4a80c62db9c8c69e69
SHA256f8924c4c4239a413cc66db3c4083562e1a46af1d4d97a2c25b402a05282d58af
SHA51210a1c3f12072b2cee03002b500a9cd3d9e3c032749fd246948028bb580c7a7be3fd0fca961bf295ace90ed93a789676c9f91b8a27c830b978f8cca5d94bae190