Analysis
-
max time kernel
152s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 21:16
Static task
static1
Behavioral task
behavioral1
Sample
3d9c9007ea5b94f32856b4bccc1dbb10_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3d9c9007ea5b94f32856b4bccc1dbb10_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
General
-
Target
3d9c9007ea5b94f32856b4bccc1dbb10_NeikiAnalytics.exe
-
Size
224KB
-
MD5
3d9c9007ea5b94f32856b4bccc1dbb10
-
SHA1
43aa779a725a798de8bb3783dae0d3392366e7db
-
SHA256
f789715cc9a906d06d0c91df5e6ece3b61cd24848feb18d8b9eaf99613a0025c
-
SHA512
b4d80db23810149439999a6345251281c8097e76d03c47f4db4e33b804aa97faa2455dad481b2ff1530ed67e01a2fa74b609399788ac4d534ddd41752ba498bb
-
SSDEEP
3072:GGDKJvjuwL3hCjG8G3GbGVGBGfGuGxGWYcrf6KadE:GGeJvzAYcD6Kad
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 36 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
nofey.exewbyuis.exetbsoim.exehfnoz.exeroezaf.exeqeuur.exemauuye.exemiaguu.exerhkip.exeliaqot.exeloequur.exejixef.execauuri.exeyutoq.exemaiiye.exe3d9c9007ea5b94f32856b4bccc1dbb10_NeikiAnalytics.exevoeeji.exenolef.exefiejuuh.exetaoomig.execaiilu.exeteogiiy.exeveati.exemiaguu.exemeiihuy.execbvois.exenauuqe.exeguipaav.exemearux.exesuadoo.exevoeeji.exeleapih.exepauuze.exeliaqov.exekauur.exevfpit.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation nofey.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation wbyuis.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation tbsoim.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation hfnoz.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation roezaf.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation qeuur.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation mauuye.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation miaguu.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation rhkip.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation liaqot.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation loequur.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation jixef.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation cauuri.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation yutoq.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation maiiye.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 3d9c9007ea5b94f32856b4bccc1dbb10_NeikiAnalytics.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation voeeji.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation nolef.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation fiejuuh.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation taoomig.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation caiilu.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation teogiiy.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation veati.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation miaguu.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation meiihuy.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation cbvois.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation nauuqe.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation guipaav.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation mearux.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation suadoo.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation voeeji.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation leapih.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation pauuze.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation liaqov.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation kauur.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation vfpit.exe -
Executes dropped EXE 36 IoCs
Processes:
voeeji.exemiaguu.exeteogiiy.exekauur.exenofey.execbvois.exewbyuis.exeliaqot.exemearux.exeleapih.exesuadoo.exeveati.exenolef.exerhkip.exeguipaav.exevfpit.exeloequur.exefiejuuh.exepauuze.exenauuqe.exetbsoim.exehfnoz.exejixef.execauuri.exeroezaf.exemiaguu.exeyutoq.exeqeuur.exemeiihuy.exevoeeji.exetaoomig.execaiilu.exemaiiye.exeliaqov.exemauuye.exeliuqaa.exepid process 4440 voeeji.exe 2260 miaguu.exe 3208 teogiiy.exe 2240 kauur.exe 1348 nofey.exe 1772 cbvois.exe 4832 wbyuis.exe 3328 liaqot.exe 4772 mearux.exe 224 leapih.exe 3944 suadoo.exe 1764 veati.exe 3208 nolef.exe 4304 rhkip.exe 3964 guipaav.exe 4436 vfpit.exe 3516 loequur.exe 2172 fiejuuh.exe 1940 pauuze.exe 2320 nauuqe.exe 4636 tbsoim.exe 4740 hfnoz.exe 4176 jixef.exe 2372 cauuri.exe 3968 roezaf.exe 4640 miaguu.exe 3304 yutoq.exe 2312 qeuur.exe 2280 meiihuy.exe 3776 voeeji.exe 4760 taoomig.exe 3624 caiilu.exe 1236 maiiye.exe 3076 liaqov.exe 3852 mauuye.exe 1088 liuqaa.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
3d9c9007ea5b94f32856b4bccc1dbb10_NeikiAnalytics.exevoeeji.exemiaguu.exeteogiiy.exekauur.exenofey.execbvois.exewbyuis.exeliaqot.exemearux.exeleapih.exesuadoo.exeveati.exenolef.exerhkip.exeguipaav.exevfpit.exeloequur.exefiejuuh.exepauuze.exenauuqe.exetbsoim.exehfnoz.exejixef.execauuri.exeroezaf.exemiaguu.exeyutoq.exeqeuur.exemeiihuy.exevoeeji.exetaoomig.exepid process 3264 3d9c9007ea5b94f32856b4bccc1dbb10_NeikiAnalytics.exe 3264 3d9c9007ea5b94f32856b4bccc1dbb10_NeikiAnalytics.exe 4440 voeeji.exe 4440 voeeji.exe 2260 miaguu.exe 2260 miaguu.exe 3208 teogiiy.exe 3208 teogiiy.exe 2240 kauur.exe 2240 kauur.exe 1348 nofey.exe 1348 nofey.exe 1772 cbvois.exe 1772 cbvois.exe 4832 wbyuis.exe 4832 wbyuis.exe 3328 liaqot.exe 3328 liaqot.exe 4772 mearux.exe 4772 mearux.exe 224 leapih.exe 224 leapih.exe 3944 suadoo.exe 3944 suadoo.exe 1764 veati.exe 1764 veati.exe 3208 nolef.exe 3208 nolef.exe 4304 rhkip.exe 4304 rhkip.exe 3964 guipaav.exe 3964 guipaav.exe 4436 vfpit.exe 4436 vfpit.exe 3516 loequur.exe 3516 loequur.exe 2172 fiejuuh.exe 2172 fiejuuh.exe 1940 pauuze.exe 1940 pauuze.exe 2320 nauuqe.exe 2320 nauuqe.exe 4636 tbsoim.exe 4636 tbsoim.exe 4740 hfnoz.exe 4740 hfnoz.exe 4176 jixef.exe 4176 jixef.exe 2372 cauuri.exe 2372 cauuri.exe 3968 roezaf.exe 3968 roezaf.exe 4640 miaguu.exe 4640 miaguu.exe 3304 yutoq.exe 3304 yutoq.exe 2312 qeuur.exe 2312 qeuur.exe 2280 meiihuy.exe 2280 meiihuy.exe 3776 voeeji.exe 3776 voeeji.exe 4760 taoomig.exe 4760 taoomig.exe -
Suspicious use of SetWindowsHookEx 37 IoCs
Processes:
3d9c9007ea5b94f32856b4bccc1dbb10_NeikiAnalytics.exevoeeji.exemiaguu.exeteogiiy.exekauur.exenofey.execbvois.exewbyuis.exeliaqot.exemearux.exeleapih.exesuadoo.exeveati.exenolef.exerhkip.exeguipaav.exevfpit.exeloequur.exefiejuuh.exepauuze.exenauuqe.exetbsoim.exehfnoz.exejixef.execauuri.exeroezaf.exemiaguu.exeyutoq.exeqeuur.exemeiihuy.exevoeeji.exetaoomig.execaiilu.exemaiiye.exeliaqov.exemauuye.exeliuqaa.exepid process 3264 3d9c9007ea5b94f32856b4bccc1dbb10_NeikiAnalytics.exe 4440 voeeji.exe 2260 miaguu.exe 3208 teogiiy.exe 2240 kauur.exe 1348 nofey.exe 1772 cbvois.exe 4832 wbyuis.exe 3328 liaqot.exe 4772 mearux.exe 224 leapih.exe 3944 suadoo.exe 1764 veati.exe 3208 nolef.exe 4304 rhkip.exe 3964 guipaav.exe 4436 vfpit.exe 3516 loequur.exe 2172 fiejuuh.exe 1940 pauuze.exe 2320 nauuqe.exe 4636 tbsoim.exe 4740 hfnoz.exe 4176 jixef.exe 2372 cauuri.exe 3968 roezaf.exe 4640 miaguu.exe 3304 yutoq.exe 2312 qeuur.exe 2280 meiihuy.exe 3776 voeeji.exe 4760 taoomig.exe 3624 caiilu.exe 1236 maiiye.exe 3076 liaqov.exe 3852 mauuye.exe 1088 liuqaa.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
3d9c9007ea5b94f32856b4bccc1dbb10_NeikiAnalytics.exevoeeji.exemiaguu.exeteogiiy.exekauur.exenofey.execbvois.exewbyuis.exeliaqot.exemearux.exeleapih.exesuadoo.exeveati.exenolef.exerhkip.exeguipaav.exevfpit.exeloequur.exefiejuuh.exepauuze.exenauuqe.exetbsoim.exedescription pid process target process PID 3264 wrote to memory of 4440 3264 3d9c9007ea5b94f32856b4bccc1dbb10_NeikiAnalytics.exe voeeji.exe PID 3264 wrote to memory of 4440 3264 3d9c9007ea5b94f32856b4bccc1dbb10_NeikiAnalytics.exe voeeji.exe PID 3264 wrote to memory of 4440 3264 3d9c9007ea5b94f32856b4bccc1dbb10_NeikiAnalytics.exe voeeji.exe PID 4440 wrote to memory of 2260 4440 voeeji.exe miaguu.exe PID 4440 wrote to memory of 2260 4440 voeeji.exe miaguu.exe PID 4440 wrote to memory of 2260 4440 voeeji.exe miaguu.exe PID 2260 wrote to memory of 3208 2260 miaguu.exe teogiiy.exe PID 2260 wrote to memory of 3208 2260 miaguu.exe teogiiy.exe PID 2260 wrote to memory of 3208 2260 miaguu.exe teogiiy.exe PID 3208 wrote to memory of 2240 3208 teogiiy.exe kauur.exe PID 3208 wrote to memory of 2240 3208 teogiiy.exe kauur.exe PID 3208 wrote to memory of 2240 3208 teogiiy.exe kauur.exe PID 2240 wrote to memory of 1348 2240 kauur.exe nofey.exe PID 2240 wrote to memory of 1348 2240 kauur.exe nofey.exe PID 2240 wrote to memory of 1348 2240 kauur.exe nofey.exe PID 1348 wrote to memory of 1772 1348 nofey.exe cbvois.exe PID 1348 wrote to memory of 1772 1348 nofey.exe cbvois.exe PID 1348 wrote to memory of 1772 1348 nofey.exe cbvois.exe PID 1772 wrote to memory of 4832 1772 cbvois.exe wbyuis.exe PID 1772 wrote to memory of 4832 1772 cbvois.exe wbyuis.exe PID 1772 wrote to memory of 4832 1772 cbvois.exe wbyuis.exe PID 4832 wrote to memory of 3328 4832 wbyuis.exe liaqot.exe PID 4832 wrote to memory of 3328 4832 wbyuis.exe liaqot.exe PID 4832 wrote to memory of 3328 4832 wbyuis.exe liaqot.exe PID 3328 wrote to memory of 4772 3328 liaqot.exe mearux.exe PID 3328 wrote to memory of 4772 3328 liaqot.exe mearux.exe PID 3328 wrote to memory of 4772 3328 liaqot.exe mearux.exe PID 4772 wrote to memory of 224 4772 mearux.exe leapih.exe PID 4772 wrote to memory of 224 4772 mearux.exe leapih.exe PID 4772 wrote to memory of 224 4772 mearux.exe leapih.exe PID 224 wrote to memory of 3944 224 leapih.exe suadoo.exe PID 224 wrote to memory of 3944 224 leapih.exe suadoo.exe PID 224 wrote to memory of 3944 224 leapih.exe suadoo.exe PID 3944 wrote to memory of 1764 3944 suadoo.exe veati.exe PID 3944 wrote to memory of 1764 3944 suadoo.exe veati.exe PID 3944 wrote to memory of 1764 3944 suadoo.exe veati.exe PID 1764 wrote to memory of 3208 1764 veati.exe nolef.exe PID 1764 wrote to memory of 3208 1764 veati.exe nolef.exe PID 1764 wrote to memory of 3208 1764 veati.exe nolef.exe PID 3208 wrote to memory of 4304 3208 nolef.exe rhkip.exe PID 3208 wrote to memory of 4304 3208 nolef.exe rhkip.exe PID 3208 wrote to memory of 4304 3208 nolef.exe rhkip.exe PID 4304 wrote to memory of 3964 4304 rhkip.exe guipaav.exe PID 4304 wrote to memory of 3964 4304 rhkip.exe guipaav.exe PID 4304 wrote to memory of 3964 4304 rhkip.exe guipaav.exe PID 3964 wrote to memory of 4436 3964 guipaav.exe vfpit.exe PID 3964 wrote to memory of 4436 3964 guipaav.exe vfpit.exe PID 3964 wrote to memory of 4436 3964 guipaav.exe vfpit.exe PID 4436 wrote to memory of 3516 4436 vfpit.exe loequur.exe PID 4436 wrote to memory of 3516 4436 vfpit.exe loequur.exe PID 4436 wrote to memory of 3516 4436 vfpit.exe loequur.exe PID 3516 wrote to memory of 2172 3516 loequur.exe fiejuuh.exe PID 3516 wrote to memory of 2172 3516 loequur.exe fiejuuh.exe PID 3516 wrote to memory of 2172 3516 loequur.exe fiejuuh.exe PID 2172 wrote to memory of 1940 2172 fiejuuh.exe pauuze.exe PID 2172 wrote to memory of 1940 2172 fiejuuh.exe pauuze.exe PID 2172 wrote to memory of 1940 2172 fiejuuh.exe pauuze.exe PID 1940 wrote to memory of 2320 1940 pauuze.exe nauuqe.exe PID 1940 wrote to memory of 2320 1940 pauuze.exe nauuqe.exe PID 1940 wrote to memory of 2320 1940 pauuze.exe nauuqe.exe PID 2320 wrote to memory of 4636 2320 nauuqe.exe tbsoim.exe PID 2320 wrote to memory of 4636 2320 nauuqe.exe tbsoim.exe PID 2320 wrote to memory of 4636 2320 nauuqe.exe tbsoim.exe PID 4636 wrote to memory of 4740 4636 tbsoim.exe hfnoz.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3d9c9007ea5b94f32856b4bccc1dbb10_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\3d9c9007ea5b94f32856b4bccc1dbb10_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3264 -
C:\Users\Admin\voeeji.exe"C:\Users\Admin\voeeji.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Users\Admin\miaguu.exe"C:\Users\Admin\miaguu.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Users\Admin\teogiiy.exe"C:\Users\Admin\teogiiy.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3208 -
C:\Users\Admin\kauur.exe"C:\Users\Admin\kauur.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Users\Admin\nofey.exe"C:\Users\Admin\nofey.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Users\Admin\cbvois.exe"C:\Users\Admin\cbvois.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Users\Admin\wbyuis.exe"C:\Users\Admin\wbyuis.exe"8⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Users\Admin\liaqot.exe"C:\Users\Admin\liaqot.exe"9⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3328 -
C:\Users\Admin\mearux.exe"C:\Users\Admin\mearux.exe"10⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Users\Admin\leapih.exe"C:\Users\Admin\leapih.exe"11⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Users\Admin\suadoo.exe"C:\Users\Admin\suadoo.exe"12⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3944 -
C:\Users\Admin\veati.exe"C:\Users\Admin\veati.exe"13⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Users\Admin\nolef.exe"C:\Users\Admin\nolef.exe"14⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3208 -
C:\Users\Admin\rhkip.exe"C:\Users\Admin\rhkip.exe"15⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4304 -
C:\Users\Admin\guipaav.exe"C:\Users\Admin\guipaav.exe"16⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3964 -
C:\Users\Admin\vfpit.exe"C:\Users\Admin\vfpit.exe"17⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4436 -
C:\Users\Admin\loequur.exe"C:\Users\Admin\loequur.exe"18⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3516 -
C:\Users\Admin\fiejuuh.exe"C:\Users\Admin\fiejuuh.exe"19⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Users\Admin\pauuze.exe"C:\Users\Admin\pauuze.exe"20⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Users\Admin\nauuqe.exe"C:\Users\Admin\nauuqe.exe"21⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Users\Admin\tbsoim.exe"C:\Users\Admin\tbsoim.exe"22⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4636 -
C:\Users\Admin\hfnoz.exe"C:\Users\Admin\hfnoz.exe"23⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4740 -
C:\Users\Admin\jixef.exe"C:\Users\Admin\jixef.exe"24⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4176 -
C:\Users\Admin\cauuri.exe"C:\Users\Admin\cauuri.exe"25⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2372 -
C:\Users\Admin\roezaf.exe"C:\Users\Admin\roezaf.exe"26⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3968 -
C:\Users\Admin\miaguu.exe"C:\Users\Admin\miaguu.exe"27⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4640 -
C:\Users\Admin\yutoq.exe"C:\Users\Admin\yutoq.exe"28⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3304 -
C:\Users\Admin\qeuur.exe"C:\Users\Admin\qeuur.exe"29⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2312 -
C:\Users\Admin\meiihuy.exe"C:\Users\Admin\meiihuy.exe"30⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2280 -
C:\Users\Admin\voeeji.exe"C:\Users\Admin\voeeji.exe"31⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3776 -
C:\Users\Admin\taoomig.exe"C:\Users\Admin\taoomig.exe"32⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4760 -
C:\Users\Admin\caiilu.exe"C:\Users\Admin\caiilu.exe"33⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3624 -
C:\Users\Admin\maiiye.exe"C:\Users\Admin\maiiye.exe"34⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1236 -
C:\Users\Admin\liaqov.exe"C:\Users\Admin\liaqov.exe"35⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3076 -
C:\Users\Admin\mauuye.exe"C:\Users\Admin\mauuye.exe"36⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3852 -
C:\Users\Admin\liuqaa.exe"C:\Users\Admin\liuqaa.exe"37⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1088 -
C:\Users\Admin\gofik.exe"C:\Users\Admin\gofik.exe"38⤵PID:868
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4112 --field-trial-handle=2292,i,2103142837140538807,15881446839139365070,262144 --variations-seed-version /prefetch:81⤵PID:3852
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224KB
MD567a1a7c7b32fc3a4ca0247b2c9e2f114
SHA1cad39dd63a5f100a281be060256398dc95bd09a0
SHA25639e450064d932533ce978cf5ecc8f25bb9ed551a40fcdd11cae16d10f50583f8
SHA512e6da855a447c0c1b6cf0be5df4a96c64a3f3bbc93f21921bc360e6b267acc5803f76c2fc901e7c6dc9f562f2ec48e98544bf04ea95aeb7d8e3643116059421be
-
Filesize
224KB
MD5b440f4bec410ae6225e6a4527590fa74
SHA13b3d27333be7f24c99a5f531d460b501262b7d87
SHA256acbaacfa3ba065680bb2842947ef43144c651c3dc76d09f0b2bde4bf4ede7797
SHA51278d0f221e8d30ebfaf2fc317211d64f2b3dfc80194cbe12ca176c1b9a525355669481bcd3c52711a430786dbf2358c207a2ef931c9da5d53595e72b204472b1e
-
Filesize
224KB
MD56102bf983494d44e5755ac960a393627
SHA180e64265a97d7acb6467e9f8da55e3226bac45ca
SHA256d126365d9a7fea2bf88ec1871f2ebe379f3ee632eb54ea6890fd1b436b56a1e7
SHA512fd218a30c323cff14735a56f2f438ac8d53f1f5af8816d9eb327e86147f246fa14aba606cec3fcbabad2658c59a83f77b711cc067c59dbe0fa2a6b6cb1e7904e
-
Filesize
224KB
MD554a0751e4a32d259c2bc4ebb70b1a7b0
SHA1ff3e739f7aa9a9574a2420d982c78e306dd5544d
SHA25697fc8dc73fda6db12e16ce35aef79b38fc4d32cae321d109b9824854e185a06b
SHA512709c3429d26b1cd6175df888206c2a9db5088c9d2d8c70bd2520afca8cc7e202092a8fe5593a1f0e05db9e2d09d83d4c644c06e5cca3d3365ef7013f8ca690e6
-
Filesize
224KB
MD5fa30957b260de0c56321917e72672720
SHA1466c6f8a551102ac75f1528bbe2bb78bc53d9634
SHA256ecab04c85ce1f201b9a9572c36f0578775146072361183223042054393f13d35
SHA5122ed7a2e894c61b607410e9ee4d69526f2e4489686f4c431856904155515dab0c894281864a4f3b1035b2a542604129faee27dbb2652c13348eee1e3a7d7194e3
-
Filesize
224KB
MD52e0f0269a5f4d90c8bc2ffaba6750234
SHA16f22de05e820644383eb2d26f9b521b77f93b39c
SHA256f1dbac4075b0cc780447ee8025dd966baf7c0dcb78234c8925cf804151f998da
SHA512ad9baac5a8cc0703f1dcc34587426513f1b1921f0c278849148fea416e6a9732b46cb233e5eea55c973d49af6b8608c6b27d5698355f5892bf3b7b054e4162db
-
Filesize
224KB
MD595ec4048b2b5a98a5ad8582833390448
SHA14b1029aa8056756f615f766638bb3cee0b10b433
SHA256dfcbe65ce33adb689ddb6f8a3eccc1f25e7d99996a88eb9a4c4381bc2a92dbb2
SHA512f37a7df93c7a2a578a1ac50e4b332970ce421200e36e3d90bf807eb4b70b7e5313f627dff9aed0231f89e37951c3c15de06dba5cdc5e794c9733b10be186d684
-
Filesize
224KB
MD5b246a39a556d1f862fc7371f2b7db262
SHA1e48364e81458dfb8cf5260754279a5a6227e424c
SHA256119eb0342e87f24b7e86caab2b5b285af8fc4e015f3aa149281665645399310e
SHA512ea592901dd0086e5b29d58afc1762db04e6e5db0246c2e9cacac660b6c2da38e5263b15ac8e2935881e9c25886d1596d5612916a4fd2ecce900705ac5721aa2b
-
Filesize
224KB
MD5c4426455696f4a4b623eba25a265cd19
SHA1bdc7fa584cb18c633733d24fce9cf9cc26a373ea
SHA25614f1fe74942f8774738eeae04e221b522ec4f391d46361e5eff67c951a433383
SHA5126fc90975362ace0d52bb0faff87c21c2f335f80b46f4d3cfbb54f4902ba3afdc51786f25147953965d10868efd4e9ad92ef1e35eb3ccb1ecf24e7e41103a51f9
-
Filesize
224KB
MD53bd4f8dd1642f2945a68127096792c82
SHA1162f4e999cb6f84391adf8a21a0d22b57d8bc686
SHA25674c3f7934f1e6934bab614458e4418f923467db724a1b91a874e55997ffa591a
SHA51238b02e18fc93a66e5b823fa782dc7672ebb32e3bdb43fb9be13233c373bc0cdbff7229bffbb05c26b92f8935131e1acc2a162b56588b1f16e941a27f845cfc6f
-
Filesize
224KB
MD538730ac080b7612489e6fc405fc206ee
SHA137a891516bea3fc6dbcd2b0744eff3553c8b7f75
SHA2566a82aa8b3483eb8fadd6e1aacb7bb6253bf84deaf910b0a704acfd0694546cee
SHA5129a2dfb63e6c33f72b2db2a53a8fb7ee43950e4d94d641767b2d7f3553a841078761054cb49bc9d4f4102130771de4d0216233b944f368dae053624cc1bcacf39
-
Filesize
224KB
MD55e8a3328b1cd1a93a8f3a7d19a1e4f19
SHA140af826bbd81fdcde5b92ecff1b1c0d835e5a881
SHA25683dfd5d0d186fc3b2b1601b17f30e772d37794fb7790c184cb78cf237511e027
SHA5124bb398466c8e93264c4165d95f2d549a37adecaa091ccbf59130a0c0efccd8c99c89576846b7c6dc351deb324c9cb33173a91f02914736ed43fd869321f04d65
-
Filesize
224KB
MD5f6473a907d1f5dc29f603876108b7bc1
SHA16250da17cd9392b5ad7ee30698974e2bb383f2c1
SHA25684245ab22b02030478ef19218b3885e0954b134e962b4b492e3708ba54d04bf3
SHA51256e538f63f4769e15df39322cfb3751b3231aa17d90457d6a2a1a1edb691eb4c58536ea14e777c11c9760143bb1e0add1375057c0a7a09cb53df0cd876394058
-
Filesize
224KB
MD5f46600812cd159fb9f2cd520bbe0763c
SHA17499798a99dbcd573bcdf7f9e66806d842774777
SHA25678896b8c8fd2614af39af5f1cbe22f8e543c20e9feb1827b4bc5d9f31ab908f5
SHA5127ea3ec3d95f5f1ddec41dea45c0a69d9ecdab32a8a9381bde53cdfa58d7456d43d92eb68db53b342003c595dc2868ff336363c3589ca36c456f7dde3f233ffd3
-
Filesize
224KB
MD56f788b925e60f02c90df5450a4e99e33
SHA1ae491dfeafe685fd2dadf9a79682df25bcf112c5
SHA25644938360d46da5eb95e98016132374db8bbc45e7b3fe84a21d6dcfee808862fc
SHA512e6fd9d332e1d90953a65417bc70c4d288516a9c900dc2ccc426c9e5cf54aa8b1bde3b28a77c61b71408893dee53f14b42b992ff116abb533e94ce0ad15fff640
-
Filesize
224KB
MD54de512595de37db68a5b28a16ab16473
SHA1c767692c5c878b892f850a47dcaf74b286acda6d
SHA256845aa8017b0cfb82d7326f3e91a128b32e5f364083e2b0688b4c7849c4eb2829
SHA51209b6078f5ba75aa3cc3e306b0a80d949dc0a797bc3aca34aeae73c42b3ec440dd38173df056f9d6748b17b3accccaad577b4e2ce493125cb09abb0d6f3c60b2e
-
Filesize
224KB
MD50c5a5af9aeecb8d5b5a728290ebd1e43
SHA11cec3e8c0427cf4743d739cd95f3023907db0f87
SHA256be3c6636f4f5aaade6420bdf2bbbdb2ac21ebf34665597b00415629a3f785187
SHA512214a4e46534239844fb9cd5b5e2660aca26677c9c210be5483e80f6e4c148a75c81c6a6296d9c09b308241dce5b8fb660b18c64957d40f839c468e7749c94311
-
Filesize
224KB
MD5174e858c20e4145dd750f8de696e41eb
SHA170d744be3a31ddd3a4b064b982cdcdc9a28e0f47
SHA256031e9369909896a90ca54c284854f90891ddcf56819dccd327093aea72cb77dc
SHA5123f53386b73c17a2963ba2a4b5da4164118d4e8fa709456be48c998ee17d8274cc0de31bce8115534890c8aed0849d1e17824dbfa89d2993cad1fbd8d47bca6e3
-
Filesize
224KB
MD5749213faf9081f10a346da2c9199add9
SHA190b9d52486da8cfad2657934c740ed3468379a2c
SHA256b9ee9740278d11f0f1d3cab85461cb45d00bc3ed0ee6bb61f41bb51b4acf95dd
SHA512aa775f86d48231d62eeb1fbd70abc8fea7b4eab4e8ef985f668701fadf2c8bd630b1ad79929e46f9145590d654a6e5fddbaee093d9f40c777485c1b8cee11fd3
-
Filesize
224KB
MD54b1379908cd38967a6571ecc8c1aa7b4
SHA1b4cafe6aefb4371b820f018ca02a00501d18fa00
SHA25632dcd94c00aa5fd8d9646aafff7189199c5f368ded0fd3505bb0e1c067ecb4e4
SHA51242a3fda19c2f236135148b875492550cc84274e0af471dc70ce45c2d291a50f91711ae0fe88015b50a7c8fdc294be5350eb579daa03938003d754ff3868e22bf
-
Filesize
224KB
MD5a1cc11a4858983afc9ceacec21417b40
SHA1fc27578aeef17c73985ac28705467c9219ad50f3
SHA2562c31224c301996dff0f8a30ea0ad1946571249cd5dc783f5d5c73974c492e2c7
SHA512677c4b223fb1ae09a6018c79bd4fcf7d46d2311ee9b0ffc19dcf8c7710c8e1eafc614ce510fd34b949e40d63c5c499f84013f6a77971018e8f319bd4c610cf1d
-
Filesize
224KB
MD5cd2d48b9614d119d07b20ba9ef7b5856
SHA18bb81a6c811c2e75b5362397cd0826e8aaebc936
SHA25648af2e4ebbeeb7c09650b71a09e64440351f2e50387c01f60bc3a8f466a44a17
SHA5122dbb3c8c362825d73509157fb1ca6fc4dac7a37de2017639cdd23240bd311af6cf235031e43b4883a1fd3a70b3fc6f14cf65e713afcf54144fe4b34e333fe844
-
Filesize
224KB
MD5687d0b2643400666732167c389d5b0c0
SHA1c966c43215c7a8de8033f2ef11d1470e94b37fda
SHA2567ac461cd55a9631d208a9b2427539b997c54e796d14e11bf05444fce2c6b88dd
SHA512ff90f83667e0c26fd1f50c36453b99f2917fcf1b94c6d2ea9c45372a490a0c664ea73a40a01603c3fb7b07d5fe2af2abb943fcf3edafaccd182808cf3df8e4b3
-
Filesize
224KB
MD5ecb609f3418386eba81b1b93e46127e1
SHA1b1b9fa6ca295dbd2aa052f774a78ec121b3d173b
SHA256e077df73d1db9a64bf56d7b6b8ee09b5ecc7d6c3077cf7eb2fb8f5bda19feb69
SHA512a2ea650bcc4e1c6d3121ba920e41e06f0855d5877e8d9a8d1025f5b558aac6b737454e5c599d47a092bfb97811edd0636a2463c35105e71af7ae8f1b3754453c
-
Filesize
224KB
MD5535305fe3f45049fad182c7710e52f24
SHA1b65803396969c222dbea2ab79577390ca21fb6fb
SHA256559fc0be7d5f7bae9d899e74278486b2a56f0fbf0ea6fa90c3cf030510061e7b
SHA5124b1dc9d91efcb485e21368682693325b84dd664b5a7227b15f122a0de6ecac694da1a688a8485980ca3c47ca64906f5957ae186f713ae379fbaa0e1353e58ff8
-
Filesize
224KB
MD56ce4648e45e4c9ce11415eea316555e3
SHA1e7e6a30adf8bb85ce6c3e8e608da1791f5030e9c
SHA25663ac65b37b6afad27ef475a193de1c296555b1519e22c6553ea5adaac7ca0020
SHA5127676d49a861cdede3ce1aa909cd19afd968ae8cb502cbb3cdfbb986c6525c8728dfa16df6766ea1018335c85987bcd2046649eaa6bae88685f7afa7964673070
-
Filesize
224KB
MD5a4bccfc668f39d2408e8944e48aeb081
SHA1a426344a2143dc44db44fcf7c1c93eef545722e2
SHA256d6408aa08016aab2c997a1a569cf8f2c215d8848c77eb3b76e503fe60e9a687d
SHA5129073b8a833d81c1ba791be3efa7440574c00691cc8540f8633d4f6e5ef55309a1f43f56d8b8f39a1a6282a5fad7372c25d85766dcd40076f087a5cdddc09ab9b
-
Filesize
224KB
MD5f3cb4202f057b6e1f9f26a377a05a3a8
SHA1959a0512d9bdb881fe949f20bc81620b6598a25c
SHA2565e2f5ecb7d6fffd274b8e72dc0f732c14a905acf4a34c36ddfd3fae9fba3e3e1
SHA51222ca19e0fc7b9c56300bc5fcd5f6ad934535ccf7b4af782b938fdeedd26ab23a48b307c651b71f0055e41f8b5b08377dcc5c04e357a9345109347860e3752f47
-
Filesize
224KB
MD5b4730b4532623f1b812c3d4778013bc4
SHA139defa6f091b4945b1e2016db0c80a79490478ad
SHA256197238ca2b8b6e921a2677be0a6dcb96fb8ed8729923ba6d1a05573e99050749
SHA512b277d12063bc103a7c49e74d0d462d1dfb55d62c2217ed110fff7862bd33c58f9c9bc909c27f2784d8df7d974fec11f0a909782dce95ce92621d82d424ad72da
-
Filesize
224KB
MD5762d31fbd20be988ec2436f38f2d6051
SHA1590c12d4c5a72cb5cea1b28dfc4ffaba863d279a
SHA256eb7493e2ebc86fba188539e42e6ea3e822ff4b49b111fb36d7df60d626051a43
SHA5122715d3b66a428265868879f10d0f744e97464fc8baa104ccd0404f52bb48583d5477e2c5d312165ea673db3fbc341f64e4c3535c0ea4ca1d9a26edcac608aa8a
-
Filesize
224KB
MD5848acd7f74d6737cab5c7e0817e209a6
SHA1148225b640228e7fa110e5e52b6be76cdfd8943f
SHA2567bc2cc0d581d6234c5e9f9bffcbb01910890196d8d1ece9df2fb2937cc006bcb
SHA512a1f4e2ba0979f7f962d834c49068971614073413d4aa812d743ad0d7eb906cbff15bd783b7a7d3d1f223887c6fa5916ec4fce3aaa87c606b681f89f1eadf5ff3