Analysis
-
max time kernel
150s -
max time network
110s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
26-05-2024 16:19
Behavioral task
behavioral1
Sample
129a5c3a35af8a88138945b19e005bc0_NeikiAnalytics.exe
Resource
win7-20240508-en
General
-
Target
129a5c3a35af8a88138945b19e005bc0_NeikiAnalytics.exe
-
Size
282KB
-
MD5
129a5c3a35af8a88138945b19e005bc0
-
SHA1
3ad8d32ae0f8f12e10a425b623bdd3997b6e421b
-
SHA256
9168ae0c6a9ae5627eefaae0716954a6e0375b6a512a19f722971f88d58ed497
-
SHA512
e81408573c3820e77aa99bff53d94854ba87cc8595d081b3456d59c4fa4147a5d0faa9024bf62a29231144b15c0256ec3dbb73f24824fb63770c841d4feceeb8
-
SSDEEP
6144:hLmIHtskDVmsF+ALzKvz6T/nQckEjiPISUOgW9X+hOGzC/:NLdVmcTLzKvz6jkmZzcukG2/
Malware Config
Signatures
-
Malware Dropper & Backdoor - Berbew 18 IoCs
Berbew is a backdoor Trojan malware with capabilities to download and install a range of additional malicious software, such as other Trojans, ransomware, and cryptominers.
Processes:
resource yara_rule C:\Windows\System\WHA.exe family_berbew C:\Windows\System\CHHS.exe family_berbew C:\Windows\SPKEPK.exe family_berbew C:\windows\SysWOW64\OVI.exe family_berbew C:\Windows\System\WAV.exe family_berbew C:\Windows\VLXYQYR.exe family_berbew C:\windows\UKN.exe family_berbew C:\windows\system\QPTSQ.exe family_berbew C:\windows\system\KIADZ.exe family_berbew C:\windows\system\CLEYNDV.exe family_berbew C:\windows\system\YIMKP.exe family_berbew C:\Windows\LOY.exe family_berbew C:\Windows\System\QZJS.exe family_berbew C:\windows\system\WVUT.exe family_berbew C:\windows\system\XYY.exe family_berbew C:\windows\system\FDLVVFJ.exe family_berbew C:\Windows\SysWOW64\RTEV.exe family_berbew C:\windows\GJFUPFV.exe family_berbew -
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
SNPHD.exeEFYLO.exeSMMX.exeQFRYMRM.exeKYGNRJ.exePXA.exeOGOIIZ.exeVCD.exeXPA.exeJNRMHG.exeLJOW.exeSGVPQR.exeHCGMSWA.exeUSXZQ.exeEVMILO.exeMJENULG.exeASFI.exeGJFUPFV.exeNYJIYA.exeIEUBRSJ.exeHXC.exeRJMNXBH.exeVPX.exeHLIBT.exeUVZKUQ.exeVTDKH.exeLPLTREU.exeHIWHLW.exeYIMKP.exeFDDLWT.exeFCGIP.exeAYETJI.exeDNIHOVB.exeRUPMH.exeQVJIH.exeNLTYA.exeAZI.exeQBABUOH.exeDHBKRKE.exeGHK.exeACXTUA.exeSGDELD.exeQPTSQ.exeKOIRGPL.exeILB.exeJLN.exeQWRNHK.exeATIO.exeZHTQJL.exeTEP.exeMLWLVY.exeWNPHS.exeCHSXXBH.exeLASBHU.exeWHA.exeNOA.exeACLZLND.exeJXCLOG.exeWRXJB.exeCDO.exeKTRXBE.exePJH.exeKAZL.exeVOHN.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation SNPHD.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation EFYLO.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation SMMX.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation QFRYMRM.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation KYGNRJ.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation PXA.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation OGOIIZ.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation VCD.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation XPA.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation JNRMHG.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation LJOW.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation SGVPQR.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation HCGMSWA.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation USXZQ.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation EVMILO.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation MJENULG.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation ASFI.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation GJFUPFV.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation NYJIYA.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation IEUBRSJ.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation HXC.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation RJMNXBH.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation VPX.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation HLIBT.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation UVZKUQ.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation VTDKH.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation LPLTREU.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation HIWHLW.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation YIMKP.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation FDDLWT.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation FCGIP.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation AYETJI.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation DNIHOVB.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation RUPMH.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation QVJIH.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation NLTYA.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation AZI.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation QBABUOH.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation DHBKRKE.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation GHK.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation ACXTUA.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation SGDELD.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation QPTSQ.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation KOIRGPL.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation ILB.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation JLN.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation QWRNHK.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation ATIO.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation ZHTQJL.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation TEP.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation MLWLVY.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation WNPHS.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation CHSXXBH.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation LASBHU.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation WHA.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation NOA.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation ACLZLND.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation JXCLOG.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation WRXJB.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation CDO.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation KTRXBE.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation PJH.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation KAZL.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation VOHN.exe -
Executes dropped EXE 64 IoCs
Processes:
WHA.exeCHHS.exeSPKEPK.exeOVI.exeWAV.exeVLXYQYR.exeDBY.exeUKN.exeQPTSQ.exeKIADZ.exeCLEYNDV.exeYIMKP.exeLOY.exeZRUU.exeQZJS.exeWVUT.exeXYY.exeFDLVVFJ.exeRTEV.exeGJFUPFV.exePJH.exeZHMUIK.exePXA.exeCIEKVRQ.exeKOIRGPL.exeMLWLVY.exeNOA.exeAZI.exeEHPFB.exeTXQF.exeBDD.exeFTJTXV.exeNYJIYA.exeVMOOJG.exeERYHZDY.exeYFFFEFU.exeACLZLND.exeKAZL.exeILB.exeWWKAPM.exeTMXR.exeOHCBH.exeWNPHS.exeQAURCRJ.exeGQVQJ.exeTBD.exeGZDTZBD.exeQWRNHK.exeIFFSTB.exeKCLFJJ.exeUVU.exeQBABUOH.exeORNTK.exeDHBKRKE.exeJHIYIEG.exeGHK.exeFDDLWT.exeAQI.exeIEUBRSJ.exeVODAFUE.exeJMDLHG.exeGCQDON.exeBPVMZ.exeDNIHOVB.exepid process 3984 WHA.exe 1836 CHHS.exe 116 SPKEPK.exe 1496 OVI.exe 3788 WAV.exe 588 VLXYQYR.exe 3272 DBY.exe 3420 UKN.exe 4068 QPTSQ.exe 2288 KIADZ.exe 5104 CLEYNDV.exe 4536 YIMKP.exe 3964 LOY.exe 4988 ZRUU.exe 648 QZJS.exe 4608 WVUT.exe 1576 XYY.exe 2196 FDLVVFJ.exe 3764 RTEV.exe 1128 GJFUPFV.exe 3616 PJH.exe 4640 ZHMUIK.exe 4564 PXA.exe 3732 CIEKVRQ.exe 5000 KOIRGPL.exe 3468 MLWLVY.exe 3636 NOA.exe 3436 AZI.exe 4652 EHPFB.exe 3200 TXQF.exe 1788 BDD.exe 2260 FTJTXV.exe 4416 NYJIYA.exe 4912 VMOOJG.exe 3468 ERYHZDY.exe 5100 YFFFEFU.exe 708 ACLZLND.exe 3560 KAZL.exe 2688 ILB.exe 3080 WWKAPM.exe 1488 TMXR.exe 3764 OHCBH.exe 1136 WNPHS.exe 2340 QAURCRJ.exe 4984 GQVQJ.exe 3432 TBD.exe 3580 GZDTZBD.exe 3020 QWRNHK.exe 3060 IFFSTB.exe 1120 KCLFJJ.exe 4520 UVU.exe 1344 QBABUOH.exe 964 ORNTK.exe 4840 DHBKRKE.exe 856 JHIYIEG.exe 60 GHK.exe 4384 FDDLWT.exe 2540 AQI.exe 4600 IEUBRSJ.exe 4488 VODAFUE.exe 3204 JMDLHG.exe 3548 GCQDON.exe 3584 BPVMZ.exe 4404 DNIHOVB.exe -
Drops file in System32 directory 64 IoCs
Processes:
GPVWMRQ.exeGTUSEJ.exeMJENULG.exeKOIRGPL.exeNYJIYA.exeUYDGA.exeZHMUIK.exeJXCLOG.exeLZLPVE.exeYSK.exeQUYA.exeNFOU.exeXPA.exeTGYH.exeFDLVVFJ.exeWWKAPM.exeVNVTKR.exeEHPFB.exeDPNG.exeIZZKL.exeBCLEW.exeTMXR.exeBFBD.exeSNPHD.exeVABXAI.exeKYGNRJ.exeBCSLMT.exeVOHN.exeAQI.exeWRXJB.exeDEQMHMF.exeVLXYQYR.exeIFFSTB.exeGSBBXBB.exeVTDKH.exeGAGFNIP.exeSPKEPK.exedescription ioc process File opened for modification C:\windows\SysWOW64\QMIQTZ.exe GPVWMRQ.exe File created C:\windows\SysWOW64\ZHTQJL.exe.bat GTUSEJ.exe File opened for modification C:\windows\SysWOW64\LUOVVZ.exe MJENULG.exe File created C:\windows\SysWOW64\MLWLVY.exe KOIRGPL.exe File created C:\windows\SysWOW64\VMOOJG.exe.bat NYJIYA.exe File created C:\windows\SysWOW64\LJOW.exe UYDGA.exe File created C:\windows\SysWOW64\PXA.exe.bat ZHMUIK.exe File created C:\windows\SysWOW64\RCGSZE.exe.bat JXCLOG.exe File opened for modification C:\windows\SysWOW64\KKAXMDM.exe LZLPVE.exe File created C:\windows\SysWOW64\BFBD.exe.bat YSK.exe File opened for modification C:\windows\SysWOW64\JNNL.exe QUYA.exe File created C:\windows\SysWOW64\PSLDWQ.exe NFOU.exe File created C:\windows\SysWOW64\YSYG.exe.bat XPA.exe File created C:\windows\SysWOW64\OBDQQH.exe.bat TGYH.exe File created C:\windows\SysWOW64\RTEV.exe FDLVVFJ.exe File created C:\windows\SysWOW64\TMXR.exe.bat WWKAPM.exe File created C:\windows\SysWOW64\QMIQTZ.exe.bat GPVWMRQ.exe File created C:\windows\SysWOW64\ASFI.exe.bat VNVTKR.exe File created C:\windows\SysWOW64\TXQF.exe.bat EHPFB.exe File created C:\windows\SysWOW64\FNA.exe DPNG.exe File opened for modification C:\windows\SysWOW64\XPA.exe IZZKL.exe File created C:\windows\SysWOW64\PILP.exe BCLEW.exe File created C:\windows\SysWOW64\OHCBH.exe.bat TMXR.exe File opened for modification C:\windows\SysWOW64\AYETJI.exe BFBD.exe File created C:\windows\SysWOW64\XPA.exe.bat IZZKL.exe File created C:\windows\SysWOW64\JNRMHG.exe.bat SNPHD.exe File opened for modification C:\windows\SysWOW64\QKROOL.exe VABXAI.exe File created C:\windows\SysWOW64\DBKRFZY.exe KYGNRJ.exe File created C:\windows\SysWOW64\QKROOL.exe VABXAI.exe File created C:\windows\SysWOW64\VPX.exe.bat BCSLMT.exe File created C:\windows\SysWOW64\JNNL.exe QUYA.exe File created C:\windows\SysWOW64\WRXJB.exe VOHN.exe File opened for modification C:\windows\SysWOW64\FNA.exe DPNG.exe File opened for modification C:\windows\SysWOW64\MLWLVY.exe KOIRGPL.exe File created C:\windows\SysWOW64\KKAXMDM.exe.bat LZLPVE.exe File created C:\windows\SysWOW64\IEUBRSJ.exe AQI.exe File created C:\windows\SysWOW64\JNRMHG.exe SNPHD.exe File created C:\windows\SysWOW64\LPLTREU.exe.bat WRXJB.exe File opened for modification C:\windows\SysWOW64\PSLDWQ.exe NFOU.exe File created C:\windows\SysWOW64\ABI.exe.bat DEQMHMF.exe File created C:\windows\SysWOW64\DBY.exe VLXYQYR.exe File created C:\windows\SysWOW64\RTEV.exe.bat FDLVVFJ.exe File created C:\windows\SysWOW64\KCLFJJ.exe IFFSTB.exe File opened for modification C:\windows\SysWOW64\VPX.exe BCSLMT.exe File opened for modification C:\windows\SysWOW64\DBKRFZY.exe KYGNRJ.exe File opened for modification C:\windows\SysWOW64\TMXR.exe WWKAPM.exe File created C:\windows\SysWOW64\OHCBH.exe TMXR.exe File created C:\windows\SysWOW64\OGOIIZ.exe GSBBXBB.exe File created C:\windows\SysWOW64\LPLTREU.exe WRXJB.exe File created C:\windows\SysWOW64\PSLDWQ.exe.bat NFOU.exe File created C:\windows\SysWOW64\OBDQQH.exe TGYH.exe File opened for modification C:\windows\SysWOW64\DBY.exe VLXYQYR.exe File opened for modification C:\windows\SysWOW64\LJOW.exe UYDGA.exe File created C:\windows\SysWOW64\VOHN.exe VTDKH.exe File opened for modification C:\windows\SysWOW64\IEUBRSJ.exe AQI.exe File opened for modification C:\windows\SysWOW64\JNRMHG.exe SNPHD.exe File created C:\windows\SysWOW64\ULOWCLK.exe GAGFNIP.exe File created C:\windows\SysWOW64\OVI.exe SPKEPK.exe File opened for modification C:\windows\SysWOW64\LPLTREU.exe WRXJB.exe File created C:\windows\SysWOW64\ZHTQJL.exe GTUSEJ.exe File created C:\windows\SysWOW64\VPX.exe BCSLMT.exe File created C:\windows\SysWOW64\BFBD.exe YSK.exe File opened for modification C:\windows\SysWOW64\ZHTQJL.exe GTUSEJ.exe File opened for modification C:\windows\SysWOW64\YSYG.exe XPA.exe -
Drops file in Windows directory 64 IoCs
Processes:
UKN.exeRUQQ.exeQFRYMRM.exeBPVMZ.exeWNPHS.exePXA.exeDPVSG.exeCTVK.exeLKNUE.exeNOA.exeJODRYY.exeGZDTZBD.exeGOQOFSV.exe129a5c3a35af8a88138945b19e005bc0_NeikiAnalytics.exeVODAFUE.exeOUKAQD.exeVMOOJG.exeIEUBRSJ.exeTEP.exeORNTK.exeEBIAJXJ.exePOMPU.exeNLTYA.exeULOWCLK.exeSGVPQR.exeQMIQTZ.exeZPN.exeFDDLWT.exeEZV.exeLOY.exePILP.exeUAAKFHC.exeFXSON.exeWVUT.exeGEVRQ.exeLASBHU.exeGXCBI.exeSGDELD.exeEBZETZ.exeRNNSX.exeGQVQJ.exeDHBKRKE.exeAZI.exeIWEG.exeDBY.exeOGOIIZ.exePSLDWQ.exeATIO.exeJNNL.exeLJOW.exeACXTUA.exeQBABUOH.exeCIEKVRQ.exeSMMX.exeNGZDXZ.exedescription ioc process File created C:\windows\system\QPTSQ.exe UKN.exe File created C:\windows\JXCLOG.exe RUQQ.exe File created C:\windows\system\ACXTUA.exe.bat QFRYMRM.exe File created C:\windows\system\DNIHOVB.exe BPVMZ.exe File created C:\windows\system\QAURCRJ.exe WNPHS.exe File created C:\windows\CIEKVRQ.exe PXA.exe File opened for modification C:\windows\HXC.exe DPVSG.exe File opened for modification C:\windows\YRHONGG.exe CTVK.exe File created C:\windows\ZPN.exe.bat LKNUE.exe File opened for modification C:\windows\system\AZI.exe NOA.exe File opened for modification C:\windows\system\EBIAJXJ.exe JODRYY.exe File created C:\windows\system\QWRNHK.exe GZDTZBD.exe File opened for modification C:\windows\system\UJU.exe GOQOFSV.exe File created C:\windows\YRHONGG.exe.bat CTVK.exe File created C:\windows\system\WHA.exe 129a5c3a35af8a88138945b19e005bc0_NeikiAnalytics.exe File created C:\windows\JMDLHG.exe VODAFUE.exe File created C:\windows\system\OXNEV.exe OUKAQD.exe File created C:\windows\ERYHZDY.exe.bat VMOOJG.exe File created C:\windows\system\VODAFUE.exe.bat IEUBRSJ.exe File opened for modification C:\windows\system\QFRYMRM.exe TEP.exe File created C:\windows\DHBKRKE.exe.bat ORNTK.exe File opened for modification C:\windows\BCSLMT.exe EBIAJXJ.exe File created C:\windows\system\WHA.exe.bat 129a5c3a35af8a88138945b19e005bc0_NeikiAnalytics.exe File created C:\windows\AGTAL.exe.bat POMPU.exe File opened for modification C:\windows\system\GOXUFFF.exe NLTYA.exe File created C:\windows\BCSLMT.exe EBIAJXJ.exe File created C:\windows\HIWHLW.exe.bat ULOWCLK.exe File created C:\windows\system\IWEG.exe.bat SGVPQR.exe File created C:\windows\DSICD.exe QMIQTZ.exe File created C:\windows\RNNSX.exe ZPN.exe File created C:\windows\AQI.exe.bat FDDLWT.exe File created C:\windows\FCGIP.exe EZV.exe File created C:\windows\ZRUU.exe.bat LOY.exe File opened for modification C:\windows\XOXW.exe PILP.exe File created C:\windows\system\EBIAJXJ.exe JODRYY.exe File created C:\windows\HLIBT.exe UAAKFHC.exe File opened for modification C:\windows\system\BCLEW.exe FXSON.exe File created C:\windows\system\XYY.exe.bat WVUT.exe File created C:\windows\system\EPYHZUD.exe GEVRQ.exe File created C:\windows\DEQMHMF.exe LASBHU.exe File created C:\windows\system\GOXUFFF.exe.bat NLTYA.exe File created C:\windows\GAGFNIP.exe GXCBI.exe File created C:\windows\system\LZLPVE.exe.bat SGDELD.exe File created C:\windows\GOQOFSV.exe EBZETZ.exe File created C:\windows\system\LASBHU.exe.bat RNNSX.exe File opened for modification C:\windows\system\DNIHOVB.exe BPVMZ.exe File opened for modification C:\windows\system\TBD.exe GQVQJ.exe File created C:\windows\JHIYIEG.exe DHBKRKE.exe File created C:\windows\system\ACXTUA.exe QFRYMRM.exe File created C:\windows\EHPFB.exe AZI.exe File created C:\windows\ERYHZDY.exe VMOOJG.exe File opened for modification C:\windows\system\RUQQ.exe IWEG.exe File created C:\windows\UKN.exe DBY.exe File created C:\windows\system\NRR.exe OGOIIZ.exe File opened for modification C:\windows\system\QVBZLZ.exe PSLDWQ.exe File opened for modification C:\windows\system\VBRLVT.exe ATIO.exe File created C:\windows\system\CQRGXT.exe.bat JNNL.exe File created C:\windows\system\TBD.exe GQVQJ.exe File opened for modification C:\windows\system\OWSFTU.exe LJOW.exe File created C:\windows\system\TVMEDT.exe ACXTUA.exe File created C:\windows\system\ORNTK.exe.bat QBABUOH.exe File created C:\windows\system\KOIRGPL.exe.bat CIEKVRQ.exe File opened for modification C:\windows\system\GPVWMRQ.exe SMMX.exe File created C:\windows\VTDKH.exe NGZDXZ.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 64 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4408 4268 WerFault.exe 129a5c3a35af8a88138945b19e005bc0_NeikiAnalytics.exe 3080 3984 WerFault.exe WHA.exe 2132 1836 WerFault.exe CHHS.exe 4076 116 WerFault.exe SPKEPK.exe 2952 1496 WerFault.exe OVI.exe 4328 3788 WerFault.exe WAV.exe 1980 588 WerFault.exe VLXYQYR.exe 4268 3272 WerFault.exe DBY.exe 4488 3420 WerFault.exe UKN.exe 2152 4068 WerFault.exe QPTSQ.exe 2956 2288 WerFault.exe KIADZ.exe 2540 5104 WerFault.exe CLEYNDV.exe 4204 4536 WerFault.exe YIMKP.exe 1128 3964 WerFault.exe LOY.exe 4244 4988 WerFault.exe ZRUU.exe 4076 648 WerFault.exe QZJS.exe 4004 4608 WerFault.exe WVUT.exe 4320 1576 WerFault.exe XYY.exe 2144 2196 WerFault.exe FDLVVFJ.exe 3204 3764 WerFault.exe RTEV.exe 3704 1128 WerFault.exe GJFUPFV.exe 516 3616 WerFault.exe PJH.exe 1608 4640 WerFault.exe ZHMUIK.exe 4952 4564 WerFault.exe PXA.exe 1748 3732 WerFault.exe CIEKVRQ.exe 3080 5000 WerFault.exe KOIRGPL.exe 2356 3468 WerFault.exe MLWLVY.exe 4696 3636 WerFault.exe NOA.exe 5072 3436 WerFault.exe AZI.exe 1116 4652 WerFault.exe EHPFB.exe 760 3200 WerFault.exe TXQF.exe 2892 1788 WerFault.exe BDD.exe 3496 2260 WerFault.exe FTJTXV.exe 5064 4416 WerFault.exe NYJIYA.exe 3508 4912 WerFault.exe VMOOJG.exe 3636 3468 WerFault.exe ERYHZDY.exe 540 5100 WerFault.exe YFFFEFU.exe 4928 708 WerFault.exe ACLZLND.exe 3432 3560 WerFault.exe KAZL.exe 3304 2688 WerFault.exe ILB.exe 844 3080 WerFault.exe WWKAPM.exe 2844 1488 WerFault.exe TMXR.exe 516 3764 WerFault.exe OHCBH.exe 4264 1136 WerFault.exe WNPHS.exe 1340 2340 WerFault.exe QAURCRJ.exe 3548 4984 WerFault.exe GQVQJ.exe 2788 3432 WerFault.exe TBD.exe 1624 3580 WerFault.exe GZDTZBD.exe 432 3020 WerFault.exe QWRNHK.exe 4912 3060 WerFault.exe IFFSTB.exe 3504 1120 WerFault.exe KCLFJJ.exe 4872 4520 WerFault.exe UVU.exe 4204 1344 WerFault.exe QBABUOH.exe 3548 964 WerFault.exe ORNTK.exe 2152 4840 WerFault.exe DHBKRKE.exe 2860 856 WerFault.exe JHIYIEG.exe 5104 60 WerFault.exe GHK.exe 2356 4384 WerFault.exe FDDLWT.exe 3636 2540 WerFault.exe AQI.exe 4236 4600 WerFault.exe IEUBRSJ.exe 1596 4488 WerFault.exe VODAFUE.exe 2688 3204 WerFault.exe JMDLHG.exe 2788 3548 WerFault.exe GCQDON.exe 856 3584 WerFault.exe BPVMZ.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
129a5c3a35af8a88138945b19e005bc0_NeikiAnalytics.exeWHA.exeCHHS.exeSPKEPK.exeOVI.exeWAV.exeVLXYQYR.exeDBY.exeUKN.exeQPTSQ.exeKIADZ.exeCLEYNDV.exeYIMKP.exeLOY.exeZRUU.exeQZJS.exeWVUT.exeXYY.exeFDLVVFJ.exeRTEV.exeGJFUPFV.exePJH.exeZHMUIK.exePXA.exeCIEKVRQ.exeKOIRGPL.exeMLWLVY.exeNOA.exeAZI.exeEHPFB.exeTXQF.exeBDD.exepid process 4268 129a5c3a35af8a88138945b19e005bc0_NeikiAnalytics.exe 4268 129a5c3a35af8a88138945b19e005bc0_NeikiAnalytics.exe 3984 WHA.exe 3984 WHA.exe 1836 CHHS.exe 1836 CHHS.exe 116 SPKEPK.exe 116 SPKEPK.exe 1496 OVI.exe 1496 OVI.exe 3788 WAV.exe 3788 WAV.exe 588 VLXYQYR.exe 588 VLXYQYR.exe 3272 DBY.exe 3272 DBY.exe 3420 UKN.exe 3420 UKN.exe 4068 QPTSQ.exe 4068 QPTSQ.exe 2288 KIADZ.exe 2288 KIADZ.exe 5104 CLEYNDV.exe 5104 CLEYNDV.exe 4536 YIMKP.exe 4536 YIMKP.exe 3964 LOY.exe 3964 LOY.exe 4988 ZRUU.exe 4988 ZRUU.exe 648 QZJS.exe 648 QZJS.exe 4608 WVUT.exe 4608 WVUT.exe 1576 XYY.exe 1576 XYY.exe 2196 FDLVVFJ.exe 2196 FDLVVFJ.exe 3764 RTEV.exe 3764 RTEV.exe 1128 GJFUPFV.exe 1128 GJFUPFV.exe 3616 PJH.exe 3616 PJH.exe 4640 ZHMUIK.exe 4640 ZHMUIK.exe 4564 PXA.exe 4564 PXA.exe 3732 CIEKVRQ.exe 3732 CIEKVRQ.exe 5000 KOIRGPL.exe 5000 KOIRGPL.exe 3468 MLWLVY.exe 3468 MLWLVY.exe 3636 NOA.exe 3636 NOA.exe 3436 AZI.exe 3436 AZI.exe 4652 EHPFB.exe 4652 EHPFB.exe 3200 TXQF.exe 3200 TXQF.exe 1788 BDD.exe 1788 BDD.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
Processes:
129a5c3a35af8a88138945b19e005bc0_NeikiAnalytics.exeWHA.exeCHHS.exeSPKEPK.exeOVI.exeWAV.exeVLXYQYR.exeDBY.exeUKN.exeQPTSQ.exeKIADZ.exeCLEYNDV.exeYIMKP.exeLOY.exeZRUU.exeQZJS.exeWVUT.exeXYY.exeFDLVVFJ.exeRTEV.exeGJFUPFV.exePJH.exeZHMUIK.exePXA.exeCIEKVRQ.exeKOIRGPL.exeMLWLVY.exeNOA.exeAZI.exeEHPFB.exeTXQF.exeBDD.exepid process 4268 129a5c3a35af8a88138945b19e005bc0_NeikiAnalytics.exe 4268 129a5c3a35af8a88138945b19e005bc0_NeikiAnalytics.exe 3984 WHA.exe 3984 WHA.exe 1836 CHHS.exe 1836 CHHS.exe 116 SPKEPK.exe 116 SPKEPK.exe 1496 OVI.exe 1496 OVI.exe 3788 WAV.exe 3788 WAV.exe 588 VLXYQYR.exe 588 VLXYQYR.exe 3272 DBY.exe 3272 DBY.exe 3420 UKN.exe 3420 UKN.exe 4068 QPTSQ.exe 4068 QPTSQ.exe 2288 KIADZ.exe 2288 KIADZ.exe 5104 CLEYNDV.exe 5104 CLEYNDV.exe 4536 YIMKP.exe 4536 YIMKP.exe 3964 LOY.exe 3964 LOY.exe 4988 ZRUU.exe 4988 ZRUU.exe 648 QZJS.exe 648 QZJS.exe 4608 WVUT.exe 4608 WVUT.exe 1576 XYY.exe 1576 XYY.exe 2196 FDLVVFJ.exe 2196 FDLVVFJ.exe 3764 RTEV.exe 3764 RTEV.exe 1128 GJFUPFV.exe 1128 GJFUPFV.exe 3616 PJH.exe 3616 PJH.exe 4640 ZHMUIK.exe 4640 ZHMUIK.exe 4564 PXA.exe 4564 PXA.exe 3732 CIEKVRQ.exe 3732 CIEKVRQ.exe 5000 KOIRGPL.exe 5000 KOIRGPL.exe 3468 MLWLVY.exe 3468 MLWLVY.exe 3636 NOA.exe 3636 NOA.exe 3436 AZI.exe 3436 AZI.exe 4652 EHPFB.exe 4652 EHPFB.exe 3200 TXQF.exe 3200 TXQF.exe 1788 BDD.exe 1788 BDD.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
129a5c3a35af8a88138945b19e005bc0_NeikiAnalytics.execmd.exeWHA.execmd.exeCHHS.execmd.exeSPKEPK.execmd.exeOVI.execmd.exeWAV.execmd.exeVLXYQYR.execmd.exeDBY.execmd.exeUKN.execmd.exeQPTSQ.execmd.exeKIADZ.execmd.exedescription pid process target process PID 4268 wrote to memory of 4664 4268 129a5c3a35af8a88138945b19e005bc0_NeikiAnalytics.exe cmd.exe PID 4268 wrote to memory of 4664 4268 129a5c3a35af8a88138945b19e005bc0_NeikiAnalytics.exe cmd.exe PID 4268 wrote to memory of 4664 4268 129a5c3a35af8a88138945b19e005bc0_NeikiAnalytics.exe cmd.exe PID 4664 wrote to memory of 3984 4664 cmd.exe WHA.exe PID 4664 wrote to memory of 3984 4664 cmd.exe WHA.exe PID 4664 wrote to memory of 3984 4664 cmd.exe WHA.exe PID 3984 wrote to memory of 3664 3984 WHA.exe cmd.exe PID 3984 wrote to memory of 3664 3984 WHA.exe cmd.exe PID 3984 wrote to memory of 3664 3984 WHA.exe cmd.exe PID 3664 wrote to memory of 1836 3664 cmd.exe CHHS.exe PID 3664 wrote to memory of 1836 3664 cmd.exe CHHS.exe PID 3664 wrote to memory of 1836 3664 cmd.exe CHHS.exe PID 1836 wrote to memory of 432 1836 CHHS.exe cmd.exe PID 1836 wrote to memory of 432 1836 CHHS.exe cmd.exe PID 1836 wrote to memory of 432 1836 CHHS.exe cmd.exe PID 432 wrote to memory of 116 432 cmd.exe SPKEPK.exe PID 432 wrote to memory of 116 432 cmd.exe SPKEPK.exe PID 432 wrote to memory of 116 432 cmd.exe SPKEPK.exe PID 116 wrote to memory of 3196 116 SPKEPK.exe cmd.exe PID 116 wrote to memory of 3196 116 SPKEPK.exe cmd.exe PID 116 wrote to memory of 3196 116 SPKEPK.exe cmd.exe PID 3196 wrote to memory of 1496 3196 cmd.exe OVI.exe PID 3196 wrote to memory of 1496 3196 cmd.exe OVI.exe PID 3196 wrote to memory of 1496 3196 cmd.exe OVI.exe PID 1496 wrote to memory of 2888 1496 OVI.exe cmd.exe PID 1496 wrote to memory of 2888 1496 OVI.exe cmd.exe PID 1496 wrote to memory of 2888 1496 OVI.exe cmd.exe PID 2888 wrote to memory of 3788 2888 cmd.exe WAV.exe PID 2888 wrote to memory of 3788 2888 cmd.exe WAV.exe PID 2888 wrote to memory of 3788 2888 cmd.exe WAV.exe PID 3788 wrote to memory of 4240 3788 WAV.exe cmd.exe PID 3788 wrote to memory of 4240 3788 WAV.exe cmd.exe PID 3788 wrote to memory of 4240 3788 WAV.exe cmd.exe PID 4240 wrote to memory of 588 4240 cmd.exe VLXYQYR.exe PID 4240 wrote to memory of 588 4240 cmd.exe VLXYQYR.exe PID 4240 wrote to memory of 588 4240 cmd.exe VLXYQYR.exe PID 588 wrote to memory of 4664 588 VLXYQYR.exe cmd.exe PID 588 wrote to memory of 4664 588 VLXYQYR.exe cmd.exe PID 588 wrote to memory of 4664 588 VLXYQYR.exe cmd.exe PID 4664 wrote to memory of 3272 4664 cmd.exe DBY.exe PID 4664 wrote to memory of 3272 4664 cmd.exe DBY.exe PID 4664 wrote to memory of 3272 4664 cmd.exe DBY.exe PID 3272 wrote to memory of 3664 3272 DBY.exe cmd.exe PID 3272 wrote to memory of 3664 3272 DBY.exe cmd.exe PID 3272 wrote to memory of 3664 3272 DBY.exe cmd.exe PID 3664 wrote to memory of 3420 3664 cmd.exe UKN.exe PID 3664 wrote to memory of 3420 3664 cmd.exe UKN.exe PID 3664 wrote to memory of 3420 3664 cmd.exe UKN.exe PID 3420 wrote to memory of 3640 3420 UKN.exe cmd.exe PID 3420 wrote to memory of 3640 3420 UKN.exe cmd.exe PID 3420 wrote to memory of 3640 3420 UKN.exe cmd.exe PID 3640 wrote to memory of 4068 3640 cmd.exe QPTSQ.exe PID 3640 wrote to memory of 4068 3640 cmd.exe QPTSQ.exe PID 3640 wrote to memory of 4068 3640 cmd.exe QPTSQ.exe PID 4068 wrote to memory of 2036 4068 QPTSQ.exe cmd.exe PID 4068 wrote to memory of 2036 4068 QPTSQ.exe cmd.exe PID 4068 wrote to memory of 2036 4068 QPTSQ.exe cmd.exe PID 2036 wrote to memory of 2288 2036 cmd.exe KIADZ.exe PID 2036 wrote to memory of 2288 2036 cmd.exe KIADZ.exe PID 2036 wrote to memory of 2288 2036 cmd.exe KIADZ.exe PID 2288 wrote to memory of 5112 2288 KIADZ.exe cmd.exe PID 2288 wrote to memory of 5112 2288 KIADZ.exe cmd.exe PID 2288 wrote to memory of 5112 2288 KIADZ.exe cmd.exe PID 5112 wrote to memory of 5104 5112 cmd.exe CLEYNDV.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\129a5c3a35af8a88138945b19e005bc0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\129a5c3a35af8a88138945b19e005bc0_NeikiAnalytics.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4268 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\WHA.exe.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:4664 -
C:\windows\system\WHA.exeC:\windows\system\WHA.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3984 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\CHHS.exe.bat" "4⤵
- Suspicious use of WriteProcessMemory
PID:3664 -
C:\windows\system\CHHS.exeC:\windows\system\CHHS.exe5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\SPKEPK.exe.bat" "6⤵
- Suspicious use of WriteProcessMemory
PID:432 -
C:\windows\SPKEPK.exeC:\windows\SPKEPK.exe7⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:116 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\OVI.exe.bat" "8⤵
- Suspicious use of WriteProcessMemory
PID:3196 -
C:\windows\SysWOW64\OVI.exeC:\windows\system32\OVI.exe9⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\WAV.exe.bat" "10⤵
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\windows\system\WAV.exeC:\windows\system\WAV.exe11⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3788 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\VLXYQYR.exe.bat" "12⤵
- Suspicious use of WriteProcessMemory
PID:4240 -
C:\windows\VLXYQYR.exeC:\windows\VLXYQYR.exe13⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:588 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\DBY.exe.bat" "14⤵
- Suspicious use of WriteProcessMemory
PID:4664 -
C:\windows\SysWOW64\DBY.exeC:\windows\system32\DBY.exe15⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3272 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\UKN.exe.bat" "16⤵
- Suspicious use of WriteProcessMemory
PID:3664 -
C:\windows\UKN.exeC:\windows\UKN.exe17⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3420 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\QPTSQ.exe.bat" "18⤵
- Suspicious use of WriteProcessMemory
PID:3640 -
C:\windows\system\QPTSQ.exeC:\windows\system\QPTSQ.exe19⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4068 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\KIADZ.exe.bat" "20⤵
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\windows\system\KIADZ.exeC:\windows\system\KIADZ.exe21⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\CLEYNDV.exe.bat" "22⤵
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\windows\system\CLEYNDV.exeC:\windows\system\CLEYNDV.exe23⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5104 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\YIMKP.exe.bat" "24⤵PID:1748
-
C:\windows\system\YIMKP.exeC:\windows\system\YIMKP.exe25⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4536 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\LOY.exe.bat" "26⤵PID:4416
-
C:\windows\LOY.exeC:\windows\LOY.exe27⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3964 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\ZRUU.exe.bat" "28⤵PID:512
-
C:\windows\ZRUU.exeC:\windows\ZRUU.exe29⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4988 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\QZJS.exe.bat" "30⤵PID:1308
-
C:\windows\system\QZJS.exeC:\windows\system\QZJS.exe31⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:648 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\WVUT.exe.bat" "32⤵PID:3580
-
C:\windows\system\WVUT.exeC:\windows\system\WVUT.exe33⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4608 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\XYY.exe.bat" "34⤵PID:2000
-
C:\windows\system\XYY.exeC:\windows\system\XYY.exe35⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1576 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\FDLVVFJ.exe.bat" "36⤵PID:2244
-
C:\windows\system\FDLVVFJ.exeC:\windows\system\FDLVVFJ.exe37⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2196 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\RTEV.exe.bat" "38⤵PID:4116
-
C:\windows\SysWOW64\RTEV.exeC:\windows\system32\RTEV.exe39⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3764 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\GJFUPFV.exe.bat" "40⤵PID:3920
-
C:\windows\GJFUPFV.exeC:\windows\GJFUPFV.exe41⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1128 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\PJH.exe.bat" "42⤵PID:652
-
C:\windows\system\PJH.exeC:\windows\system\PJH.exe43⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3616 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\ZHMUIK.exe.bat" "44⤵PID:4244
-
C:\windows\ZHMUIK.exeC:\windows\ZHMUIK.exe45⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4640 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\PXA.exe.bat" "46⤵PID:4860
-
C:\windows\SysWOW64\PXA.exeC:\windows\system32\PXA.exe47⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4564 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\CIEKVRQ.exe.bat" "48⤵PID:2980
-
C:\windows\CIEKVRQ.exeC:\windows\CIEKVRQ.exe49⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3732 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\KOIRGPL.exe.bat" "50⤵PID:4924
-
C:\windows\system\KOIRGPL.exeC:\windows\system\KOIRGPL.exe51⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5000 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\MLWLVY.exe.bat" "52⤵PID:3720
-
C:\windows\SysWOW64\MLWLVY.exeC:\windows\system32\MLWLVY.exe53⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3468 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\NOA.exe.bat" "54⤵PID:4912
-
C:\windows\system\NOA.exeC:\windows\system\NOA.exe55⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3636 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\AZI.exe.bat" "56⤵PID:3524
-
C:\windows\system\AZI.exeC:\windows\system\AZI.exe57⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3436 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\EHPFB.exe.bat" "58⤵PID:1624
-
C:\windows\EHPFB.exeC:\windows\EHPFB.exe59⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4652 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\TXQF.exe.bat" "60⤵PID:676
-
C:\windows\SysWOW64\TXQF.exeC:\windows\system32\TXQF.exe61⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3200 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\BDD.exe.bat" "62⤵PID:2856
-
C:\windows\BDD.exeC:\windows\BDD.exe63⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1788 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\FTJTXV.exe.bat" "64⤵PID:3560
-
C:\windows\system\FTJTXV.exeC:\windows\system\FTJTXV.exe65⤵
- Executes dropped EXE
PID:2260 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\NYJIYA.exe.bat" "66⤵PID:4456
-
C:\windows\system\NYJIYA.exeC:\windows\system\NYJIYA.exe67⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:4416 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\VMOOJG.exe.bat" "68⤵PID:4476
-
C:\windows\SysWOW64\VMOOJG.exeC:\windows\system32\VMOOJG.exe69⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4912 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\ERYHZDY.exe.bat" "70⤵PID:3524
-
C:\windows\ERYHZDY.exeC:\windows\ERYHZDY.exe71⤵
- Executes dropped EXE
PID:3468 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\YFFFEFU.exe.bat" "72⤵PID:1128
-
C:\windows\SysWOW64\YFFFEFU.exeC:\windows\system32\YFFFEFU.exe73⤵
- Executes dropped EXE
PID:5100 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\ACLZLND.exe.bat" "74⤵PID:4176
-
C:\windows\ACLZLND.exeC:\windows\ACLZLND.exe75⤵
- Checks computer location settings
- Executes dropped EXE
PID:708 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\KAZL.exe.bat" "76⤵PID:1104
-
C:\windows\SysWOW64\KAZL.exeC:\windows\system32\KAZL.exe77⤵
- Checks computer location settings
- Executes dropped EXE
PID:3560 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\ILB.exe.bat" "78⤵PID:1340
-
C:\windows\system\ILB.exeC:\windows\system\ILB.exe79⤵
- Checks computer location settings
- Executes dropped EXE
PID:2688 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\WWKAPM.exe.bat" "80⤵PID:4232
-
C:\windows\SysWOW64\WWKAPM.exeC:\windows\system32\WWKAPM.exe81⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3080 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\TMXR.exe.bat" "82⤵PID:3244
-
C:\windows\SysWOW64\TMXR.exeC:\windows\system32\TMXR.exe83⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1488 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\OHCBH.exe.bat" "84⤵PID:2312
-
C:\windows\SysWOW64\OHCBH.exeC:\windows\system32\OHCBH.exe85⤵
- Executes dropped EXE
PID:3764 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\WNPHS.exe.bat" "86⤵PID:1616
-
C:\windows\WNPHS.exeC:\windows\WNPHS.exe87⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:1136 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\QAURCRJ.exe.bat" "88⤵PID:2744
-
C:\windows\system\QAURCRJ.exeC:\windows\system\QAURCRJ.exe89⤵
- Executes dropped EXE
PID:2340 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\GQVQJ.exe.bat" "90⤵PID:1596
-
C:\windows\GQVQJ.exeC:\windows\GQVQJ.exe91⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4984 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\TBD.exe.bat" "92⤵PID:4924
-
C:\windows\system\TBD.exeC:\windows\system\TBD.exe93⤵
- Executes dropped EXE
PID:3432 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\GZDTZBD.exe.bat" "94⤵PID:3960
-
C:\windows\GZDTZBD.exeC:\windows\GZDTZBD.exe95⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3580 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\QWRNHK.exe.bat" "96⤵PID:3464
-
C:\windows\system\QWRNHK.exeC:\windows\system\QWRNHK.exe97⤵
- Checks computer location settings
- Executes dropped EXE
PID:3020 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\IFFSTB.exe.bat" "98⤵PID:4076
-
C:\windows\SysWOW64\IFFSTB.exeC:\windows\system32\IFFSTB.exe99⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3060 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\KCLFJJ.exe.bat" "100⤵PID:1488
-
C:\windows\SysWOW64\KCLFJJ.exeC:\windows\system32\KCLFJJ.exe101⤵
- Executes dropped EXE
PID:1120 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\UVU.exe.bat" "102⤵PID:468
-
C:\windows\SysWOW64\UVU.exeC:\windows\system32\UVU.exe103⤵
- Executes dropped EXE
PID:4520 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\QBABUOH.exe.bat" "104⤵PID:4004
-
C:\windows\system\QBABUOH.exeC:\windows\system\QBABUOH.exe105⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:1344 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\ORNTK.exe.bat" "106⤵PID:224
-
C:\windows\system\ORNTK.exeC:\windows\system\ORNTK.exe107⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:964 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\DHBKRKE.exe.bat" "108⤵PID:3304
-
C:\windows\DHBKRKE.exeC:\windows\DHBKRKE.exe109⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:4840 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\JHIYIEG.exe.bat" "110⤵PID:4480
-
C:\windows\JHIYIEG.exeC:\windows\JHIYIEG.exe111⤵
- Executes dropped EXE
PID:856 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\GHK.exe.bat" "112⤵PID:4664
-
C:\windows\SysWOW64\GHK.exeC:\windows\system32\GHK.exe113⤵
- Checks computer location settings
- Executes dropped EXE
PID:60 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\FDDLWT.exe.bat" "114⤵PID:3684
-
C:\windows\SysWOW64\FDDLWT.exeC:\windows\system32\FDDLWT.exe115⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:4384 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\AQI.exe.bat" "116⤵PID:3508
-
C:\windows\AQI.exeC:\windows\AQI.exe117⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2540 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\IEUBRSJ.exe.bat" "118⤵PID:1748
-
C:\windows\SysWOW64\IEUBRSJ.exeC:\windows\system32\IEUBRSJ.exe119⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:4600 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\VODAFUE.exe.bat" "120⤵PID:4536
-
C:\windows\system\VODAFUE.exeC:\windows\system\VODAFUE.exe121⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4488 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\JMDLHG.exe.bat" "122⤵PID:3932
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-