Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
27/05/2024, 08:22
Static task
static1
Behavioral task
behavioral1
Sample
9f719326140a88704d9ca9d911031390_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
9f719326140a88704d9ca9d911031390_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
General
-
Target
9f719326140a88704d9ca9d911031390_NeikiAnalytics.exe
-
Size
200KB
-
MD5
9f719326140a88704d9ca9d911031390
-
SHA1
803dcec82e1850792b65888714922bd9527780ab
-
SHA256
e17918dcccb97ae8f1807894893a784112f2947db0659638ce1f4828f9e04265
-
SHA512
4c2d91c67ddcf5d9086341443e9957c8f1c14a538b5e1f4e0a7bb867bba83d162fe459867d66d3df2035fdb34f3174b37effce2bc99bb6aeafa96ee501bccd52
-
SSDEEP
3072:mmjakl2LGo3y4CpCfCGCCOCwC9CvCFCfCLCvCUCLC2FInROUSRSGSuSQSmSNS4Sd:PaklQGo3yGFInRO
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 36 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation gbfoev.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation joanee.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation moelaa.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation veudo.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation wxfey.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation daoopub.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation fearii.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation yjpof.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation swjif.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation rxhiep.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation quewac.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation yiedu.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation coamee.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation voajil.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation daoozu.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation miaguu.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 9f719326140a88704d9ca9d911031390_NeikiAnalytics.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation zhxoip.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation puimees.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation kiuug.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation veaasoq.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation reuunom.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation pouuja.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation gbwoet.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation zuaanog.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation vfpot.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation jiaahum.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation ziebu.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation zaoog.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation bauunog.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation yealooh.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation srkip.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation poimeeg.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation feayo.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation yiubooh.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation bauuzi.exe -
Executes dropped EXE 36 IoCs
pid Process 5136 zaoog.exe 1656 yiedu.exe 5532 bauunog.exe 2964 joanee.exe 4448 zhxoip.exe 4444 wxfey.exe 1452 yiubooh.exe 4376 moelaa.exe 3556 daoopub.exe 5628 bauuzi.exe 4476 vfpot.exe 5560 gbwoet.exe 5540 jiaahum.exe 1716 zuaanog.exe 1720 veaasoq.exe 3416 gbfoev.exe 6052 coamee.exe 844 reuunom.exe 6100 fearii.exe 1964 voajil.exe 5380 veudo.exe 2212 yjpof.exe 5876 swjif.exe 4276 ziebu.exe 4764 yealooh.exe 5096 srkip.exe 4996 poimeeg.exe 6052 daoozu.exe 4112 rxhiep.exe 5308 feayo.exe 5584 pouuja.exe 5528 miaguu.exe 4012 puimees.exe 1168 kiuug.exe 5184 quewac.exe 5220 beuuhog.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2620 9f719326140a88704d9ca9d911031390_NeikiAnalytics.exe 2620 9f719326140a88704d9ca9d911031390_NeikiAnalytics.exe 5136 zaoog.exe 5136 zaoog.exe 1656 yiedu.exe 1656 yiedu.exe 5532 bauunog.exe 5532 bauunog.exe 2964 joanee.exe 2964 joanee.exe 4448 zhxoip.exe 4448 zhxoip.exe 4444 wxfey.exe 4444 wxfey.exe 1452 yiubooh.exe 1452 yiubooh.exe 4376 moelaa.exe 4376 moelaa.exe 3556 daoopub.exe 3556 daoopub.exe 5628 bauuzi.exe 5628 bauuzi.exe 4476 vfpot.exe 4476 vfpot.exe 5560 gbwoet.exe 5560 gbwoet.exe 5540 jiaahum.exe 5540 jiaahum.exe 1716 zuaanog.exe 1716 zuaanog.exe 1720 veaasoq.exe 1720 veaasoq.exe 3416 gbfoev.exe 3416 gbfoev.exe 6052 coamee.exe 6052 coamee.exe 844 reuunom.exe 844 reuunom.exe 6100 fearii.exe 6100 fearii.exe 1964 voajil.exe 1964 voajil.exe 5380 veudo.exe 5380 veudo.exe 2212 yjpof.exe 2212 yjpof.exe 5876 swjif.exe 5876 swjif.exe 4276 ziebu.exe 4276 ziebu.exe 4764 yealooh.exe 4764 yealooh.exe 5096 srkip.exe 5096 srkip.exe 4996 poimeeg.exe 4996 poimeeg.exe 6052 daoozu.exe 6052 daoozu.exe 4112 rxhiep.exe 4112 rxhiep.exe 5308 feayo.exe 5308 feayo.exe 5584 pouuja.exe 5584 pouuja.exe -
Suspicious use of SetWindowsHookEx 37 IoCs
pid Process 2620 9f719326140a88704d9ca9d911031390_NeikiAnalytics.exe 5136 zaoog.exe 1656 yiedu.exe 5532 bauunog.exe 2964 joanee.exe 4448 zhxoip.exe 4444 wxfey.exe 1452 yiubooh.exe 4376 moelaa.exe 3556 daoopub.exe 5628 bauuzi.exe 4476 vfpot.exe 5560 gbwoet.exe 5540 jiaahum.exe 1716 zuaanog.exe 1720 veaasoq.exe 3416 gbfoev.exe 6052 coamee.exe 844 reuunom.exe 6100 fearii.exe 1964 voajil.exe 5380 veudo.exe 2212 yjpof.exe 5876 swjif.exe 4276 ziebu.exe 4764 yealooh.exe 5096 srkip.exe 4996 poimeeg.exe 6052 daoozu.exe 4112 rxhiep.exe 5308 feayo.exe 5584 pouuja.exe 5528 miaguu.exe 4012 puimees.exe 1168 kiuug.exe 5184 quewac.exe 5220 beuuhog.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2620 wrote to memory of 5136 2620 9f719326140a88704d9ca9d911031390_NeikiAnalytics.exe 91 PID 2620 wrote to memory of 5136 2620 9f719326140a88704d9ca9d911031390_NeikiAnalytics.exe 91 PID 2620 wrote to memory of 5136 2620 9f719326140a88704d9ca9d911031390_NeikiAnalytics.exe 91 PID 5136 wrote to memory of 1656 5136 zaoog.exe 92 PID 5136 wrote to memory of 1656 5136 zaoog.exe 92 PID 5136 wrote to memory of 1656 5136 zaoog.exe 92 PID 1656 wrote to memory of 5532 1656 yiedu.exe 97 PID 1656 wrote to memory of 5532 1656 yiedu.exe 97 PID 1656 wrote to memory of 5532 1656 yiedu.exe 97 PID 5532 wrote to memory of 2964 5532 bauunog.exe 100 PID 5532 wrote to memory of 2964 5532 bauunog.exe 100 PID 5532 wrote to memory of 2964 5532 bauunog.exe 100 PID 2964 wrote to memory of 4448 2964 joanee.exe 103 PID 2964 wrote to memory of 4448 2964 joanee.exe 103 PID 2964 wrote to memory of 4448 2964 joanee.exe 103 PID 4448 wrote to memory of 4444 4448 zhxoip.exe 104 PID 4448 wrote to memory of 4444 4448 zhxoip.exe 104 PID 4448 wrote to memory of 4444 4448 zhxoip.exe 104 PID 4444 wrote to memory of 1452 4444 wxfey.exe 105 PID 4444 wrote to memory of 1452 4444 wxfey.exe 105 PID 4444 wrote to memory of 1452 4444 wxfey.exe 105 PID 1452 wrote to memory of 4376 1452 yiubooh.exe 106 PID 1452 wrote to memory of 4376 1452 yiubooh.exe 106 PID 1452 wrote to memory of 4376 1452 yiubooh.exe 106 PID 4376 wrote to memory of 3556 4376 moelaa.exe 108 PID 4376 wrote to memory of 3556 4376 moelaa.exe 108 PID 4376 wrote to memory of 3556 4376 moelaa.exe 108 PID 3556 wrote to memory of 5628 3556 daoopub.exe 109 PID 3556 wrote to memory of 5628 3556 daoopub.exe 109 PID 3556 wrote to memory of 5628 3556 daoopub.exe 109 PID 5628 wrote to memory of 4476 5628 bauuzi.exe 110 PID 5628 wrote to memory of 4476 5628 bauuzi.exe 110 PID 5628 wrote to memory of 4476 5628 bauuzi.exe 110 PID 4476 wrote to memory of 5560 4476 vfpot.exe 111 PID 4476 wrote to memory of 5560 4476 vfpot.exe 111 PID 4476 wrote to memory of 5560 4476 vfpot.exe 111 PID 5560 wrote to memory of 5540 5560 gbwoet.exe 112 PID 5560 wrote to memory of 5540 5560 gbwoet.exe 112 PID 5560 wrote to memory of 5540 5560 gbwoet.exe 112 PID 5540 wrote to memory of 1716 5540 jiaahum.exe 113 PID 5540 wrote to memory of 1716 5540 jiaahum.exe 113 PID 5540 wrote to memory of 1716 5540 jiaahum.exe 113 PID 1716 wrote to memory of 1720 1716 zuaanog.exe 114 PID 1716 wrote to memory of 1720 1716 zuaanog.exe 114 PID 1716 wrote to memory of 1720 1716 zuaanog.exe 114 PID 1720 wrote to memory of 3416 1720 veaasoq.exe 115 PID 1720 wrote to memory of 3416 1720 veaasoq.exe 115 PID 1720 wrote to memory of 3416 1720 veaasoq.exe 115 PID 3416 wrote to memory of 6052 3416 gbfoev.exe 116 PID 3416 wrote to memory of 6052 3416 gbfoev.exe 116 PID 3416 wrote to memory of 6052 3416 gbfoev.exe 116 PID 6052 wrote to memory of 844 6052 coamee.exe 117 PID 6052 wrote to memory of 844 6052 coamee.exe 117 PID 6052 wrote to memory of 844 6052 coamee.exe 117 PID 844 wrote to memory of 6100 844 reuunom.exe 118 PID 844 wrote to memory of 6100 844 reuunom.exe 118 PID 844 wrote to memory of 6100 844 reuunom.exe 118 PID 6100 wrote to memory of 1964 6100 fearii.exe 119 PID 6100 wrote to memory of 1964 6100 fearii.exe 119 PID 6100 wrote to memory of 1964 6100 fearii.exe 119 PID 1964 wrote to memory of 5380 1964 voajil.exe 120 PID 1964 wrote to memory of 5380 1964 voajil.exe 120 PID 1964 wrote to memory of 5380 1964 voajil.exe 120 PID 5380 wrote to memory of 2212 5380 veudo.exe 121
Processes
-
C:\Users\Admin\AppData\Local\Temp\9f719326140a88704d9ca9d911031390_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\9f719326140a88704d9ca9d911031390_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Users\Admin\zaoog.exe"C:\Users\Admin\zaoog.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5136 -
C:\Users\Admin\yiedu.exe"C:\Users\Admin\yiedu.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Users\Admin\bauunog.exe"C:\Users\Admin\bauunog.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5532 -
C:\Users\Admin\joanee.exe"C:\Users\Admin\joanee.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Users\Admin\zhxoip.exe"C:\Users\Admin\zhxoip.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4448 -
C:\Users\Admin\wxfey.exe"C:\Users\Admin\wxfey.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Users\Admin\yiubooh.exe"C:\Users\Admin\yiubooh.exe"8⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Users\Admin\moelaa.exe"C:\Users\Admin\moelaa.exe"9⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4376 -
C:\Users\Admin\daoopub.exe"C:\Users\Admin\daoopub.exe"10⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3556 -
C:\Users\Admin\bauuzi.exe"C:\Users\Admin\bauuzi.exe"11⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5628 -
C:\Users\Admin\vfpot.exe"C:\Users\Admin\vfpot.exe"12⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\Users\Admin\gbwoet.exe"C:\Users\Admin\gbwoet.exe"13⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5560 -
C:\Users\Admin\jiaahum.exe"C:\Users\Admin\jiaahum.exe"14⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5540 -
C:\Users\Admin\zuaanog.exe"C:\Users\Admin\zuaanog.exe"15⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Users\Admin\veaasoq.exe"C:\Users\Admin\veaasoq.exe"16⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Users\Admin\gbfoev.exe"C:\Users\Admin\gbfoev.exe"17⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3416 -
C:\Users\Admin\coamee.exe"C:\Users\Admin\coamee.exe"18⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:6052 -
C:\Users\Admin\reuunom.exe"C:\Users\Admin\reuunom.exe"19⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:844 -
C:\Users\Admin\fearii.exe"C:\Users\Admin\fearii.exe"20⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:6100 -
C:\Users\Admin\voajil.exe"C:\Users\Admin\voajil.exe"21⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Users\Admin\veudo.exe"C:\Users\Admin\veudo.exe"22⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5380 -
C:\Users\Admin\yjpof.exe"C:\Users\Admin\yjpof.exe"23⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2212 -
C:\Users\Admin\swjif.exe"C:\Users\Admin\swjif.exe"24⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5876 -
C:\Users\Admin\ziebu.exe"C:\Users\Admin\ziebu.exe"25⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4276 -
C:\Users\Admin\yealooh.exe"C:\Users\Admin\yealooh.exe"26⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4764 -
C:\Users\Admin\srkip.exe"C:\Users\Admin\srkip.exe"27⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5096 -
C:\Users\Admin\poimeeg.exe"C:\Users\Admin\poimeeg.exe"28⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4996 -
C:\Users\Admin\daoozu.exe"C:\Users\Admin\daoozu.exe"29⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:6052 -
C:\Users\Admin\rxhiep.exe"C:\Users\Admin\rxhiep.exe"30⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4112 -
C:\Users\Admin\feayo.exe"C:\Users\Admin\feayo.exe"31⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5308 -
C:\Users\Admin\pouuja.exe"C:\Users\Admin\pouuja.exe"32⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5584 -
C:\Users\Admin\miaguu.exe"C:\Users\Admin\miaguu.exe"33⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5528 -
C:\Users\Admin\puimees.exe"C:\Users\Admin\puimees.exe"34⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4012 -
C:\Users\Admin\kiuug.exe"C:\Users\Admin\kiuug.exe"35⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1168 -
C:\Users\Admin\quewac.exe"C:\Users\Admin\quewac.exe"36⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5184 -
C:\Users\Admin\beuuhog.exe"C:\Users\Admin\beuuhog.exe"37⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5220
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3876 --field-trial-handle=2280,i,1836084024518340990,18250262151825427757,262144 --variations-seed-version /prefetch:81⤵PID:3876
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
200KB
MD5aaab8e2b90e6de1793161cd9bdb5493a
SHA1cc8f05e6a72cbad7fcfe3968f59930445d72e1cf
SHA2563a4bdb6757aab2b72c40cf6ce2353347d1565d00b3f7ccb54cff5d8e03ebb35b
SHA5127994e8968d7a19054f9ec49a10a05006f65901553cc16258dc77326b59f4b349d68b967cf2847464f3e6579d06d83ac050ff3c2060e7f8623f20c52f128c6bdf
-
Filesize
200KB
MD556eddd7bf2bd50109f174af7644e9438
SHA10426fb13301da3d66b8ce042e17b49663864d5b4
SHA25610a6218ef90894dfbedb9552539ad3fb6e5567700b346f94441463910f11a07d
SHA512b2f182865b1092dc0d30f4f7bf44635c37a89b03db0c770cfb5185d22ffc0a8d76fbe9520c97db2a2285486a6cb92430ab6e3c6faacd94174f710772ebcdffcb
-
Filesize
200KB
MD5ef6de5d7811452d299a8646da8ee2df0
SHA1660762f8501e2af2661543016019eabe578636f6
SHA256368d5c42327198ab2e3fe846713b5a59ba0e4a0163f5456130b14d3e43e59431
SHA5124ed84e2d1d7baaa198399c9cb1cc57078de26a3b8b785373ec634e1348f993c23f6d0eb7f691dffc109e84c9b1edbb54e6020f7ff71a5a218ce57c0e619f3a8a
-
Filesize
200KB
MD53a01714a0d8bb9f53a7ddde0795174df
SHA1dbeabc3ffe3d65f18a5045520f21ecb459ec564f
SHA25626ad882918497a240d0e2f4225adb07d01fbb02c54b3ef3b92865223a3557635
SHA5126de9969247ba7e0976ad8bc48e089e8b7906088df2790e3fb166af0ad0c1d4766a301f25bb9ffafbb27e4c6b8e82e57241b1bd5a399493f6611a3b503406afee
-
Filesize
200KB
MD548f935b0df65f7df57e63b2854d3b8c3
SHA13271dc05f9866e504077b2d8f1da25ba050057d4
SHA256f22fd7f6430cdd9f18da5fc5924bacb1d00953c8328eaea79f3caa9b1582c10e
SHA51231cae4b1ee1a558ad8b7f58266d3c25ae41b0876b91a15e091dc5c2f3288428a51bb448890a265358efe446afda6ca1a9e34fa2fe2b5047c75645298df8a5137
-
Filesize
200KB
MD57f664e8f9916b98838a5e8e5dce02719
SHA12a0f71267c3dda4225556aa33df5e5e78f7067b0
SHA25627d2a369f88ab039f9c819e15228f56e5dcfc6b1b99c3901bb82a73aebbaa9bb
SHA51213e971a8f78ec135a8f48283b029e4804f131ff5b2d43b097ad15e5e4362874f6677592dd0d5df986212392f60fbb49b093903799fac851ccd537d7eb07c084a
-
Filesize
200KB
MD5fa7049635633d1b264b5cbbe856b95d0
SHA192cfca0ab3d2b11d37f1649336784ee2b8724f35
SHA2562fad629f2694c978aa5bc08b0f86c0345e220b69e24df6eb3e3649f72773a736
SHA512e2a6872a9350fb125e0f3314eb38bdd7468a4e6341910119e26b3466ed80f1581fe12da8820e84cc96d6e0ef040064563ce58ebd538b4df821108e080fa9d6ae
-
Filesize
200KB
MD5d1d558dc537102c41d4708022d55100a
SHA100d242f187d61d6a79df0607377c8ca6cc63b450
SHA256accb3bf8abdc99f14e8f7fadc01aa601e7a00d714b0f3bfe01c5eddb39df4b3e
SHA512c1d206544c858b7d8529fc34bee5d3be95ee06d093a98f53c6672857118c671f3772cc315e5e9ef68abf8aafe1fe1d346f3e01a1f737bf4ad7806023f738a530
-
Filesize
200KB
MD50d36bdabe125d7d78485cd82cbd2d6f2
SHA1053949fa54d3a7c01eb0f2fbffb3302bd193f093
SHA2569a620ff6d6857fca7c31937c9bf7d05fe50d68338d50c57aeb1cdea1be7a6dfc
SHA51285eb2e0bbefa042dce99ed1e5be5e6e304db276686e7109a6460a14f38aac96fc0a632bdebefb4a2b233205f140ffe192468a3a7d4a298f31c5405bbd9c8f439
-
Filesize
200KB
MD5443b5aa2f23e2c59e9e36faf7058982e
SHA15ad80129fb754bc3d7048ee8dad6e46c52c357ed
SHA2561105295dc27241f3181b9b9954867521cce206c4ca9c7a0020fcf12ebb17a2e8
SHA512946a797603be2d095ba2c9ca0436bcf0d320812ada95708b14f26a9b11c4de06c29eb19559265c89a859c4a4d1a638ff5bad46935287c8155a4d1b619bcbc80d
-
Filesize
200KB
MD50afccd6f94af6332a43b54388bbec0cf
SHA1496b881b5be6fa2bf121ecad6c30ed1660f12d12
SHA256638b5496a78cf27a5bae7bc5a7ce701fda1227bb53740451502b2f75f4df76c5
SHA5120ec29cdf128965db2765d431bb697b3fa31cb3f2cde6ce2363198cdbf6ba9f7a94712d79bcf2ffc5b3f580f2ea11bef90fa02b161ee082a218eac9ec0c474b1a
-
Filesize
200KB
MD545433226ee3ab6e8b31bdfa196fe5b77
SHA127790aa38b2a71f496cac8d86f0d5e8c3abe1d9b
SHA256ce216d7d519319a68f801daabaa32f3ee8a42b80182897f5b2efca6559d7ce79
SHA5120355474648cf8ad32d5daa81c94a13c26f49d0185d558be0d45f4125be306921167a461ef01b65f7bc2a45a4b0d94693d82e7f60d662f0530149284a919a58be
-
Filesize
200KB
MD5284ae44d463044b1df43ce1719f02df8
SHA1b3c148b9810a6f251e570fdce549ecfef238f6b0
SHA25695a327cb49e4885dc5ed0a1be3d9fd683de9c6a276203b2c4f25834472ce7018
SHA512d7a85fb0f382f45e3e4f178b8c1ce856d3fe607f4f9fc3c6131dcde55fc1f186aa5cf76c1016f534b7848e1ba774f7595ac4c431984ab0a4d866bb34283a04c7
-
Filesize
200KB
MD5515d9cefa8de7410b62026440475e98c
SHA1e172320fd32e416c63c7490c381fa4070d71d65b
SHA256f1e26859738d218ec86adfc87d180f2e5c7fc371c75ef0df30cf09bee3f63b4a
SHA512e36acb567ba1f58735740042cfc4abefc7a8dfeba66a69cde42fa692a7c92418afb5c4d93e12f79365c86b2c8901c86288a69d486e751ce942bcbe8c133554c3
-
Filesize
200KB
MD514c760531e6dee331564833a9a2350df
SHA1bed5b91010a246ee3ec609855f4a7bedbd2e9b2b
SHA256ad9a37cb1f5feb4f2de746fe472a680d30e48e06248fccca754b7394feb5ca55
SHA512654522ae7a8d51cc5b0b5478133e7117698199be9366d82f1de67b77fadd77ddda47eee2b617f0a9f01fa97f60543177fa594f60ff92e281422a14a79d000bf0
-
Filesize
200KB
MD542eaebbc874fcc4c972890056c70387b
SHA154d275cc4e659baf1061d1b562560a13a72c3133
SHA25647bb2af37642d27bd6b043b5e9d5b0ff628ab5e3db5ea4ff32306355ba54b30d
SHA512d2d7f5b22cfdc9f3f490ad27a222573f247af49bfe052cb317fab035d9313873d8af64bcbe2b875de400065ad23b18180991f6472296ee92bbc613639445c341
-
Filesize
200KB
MD5817a1a0eabd8ad14abfdce71ca38f179
SHA1ef7289eafd2be7507944966a6c4a7357e7d8e4b5
SHA256f830df4328ece11d1d67c72dac658edf83ea4dd93b78e20988b561a4c7af23a5
SHA51265771a68a0b59a4235963afab92e6b682e3748b3d75d0246823e22b11de4416cc7d6ead45f19b84c7685996c72d41c903584d6612d9780ffd76cc73cb9dd629e
-
Filesize
200KB
MD5be38b185b17a89350bb803e44c4febbe
SHA16f1e3a64e9a964d42a6907501c7aa57a99caf9b1
SHA2564f768d8f2cccb9b58266e973fb3e60dcf29516b081fe6d572a5dd11cdc7f5e69
SHA512d502c7ab97b438b193bb19e37a5576e6bd862bd49a3ff332cc78e35715078ea790d069e88fb9e790d3305bae7bb451d0516839b8d42f19cd218d32ecfcad81e3
-
Filesize
200KB
MD5234d53e1d977116046fa733046a807db
SHA1c9a7d9ba5709acf1b53e9ae937857bb11818576f
SHA2567ea1cea66361ac2d2a14d1ea04fe2ba20826213e3307ae5654b26e4a909cc82b
SHA512d3f2020e437ac4bbc0ede8dcdc12ce21c10d545f1ba0b93bf66ee5377a9cdeb554a39029d6b02f140b808e62016df3a303aa63e6c39599de19fb476a9bc9d4b7
-
Filesize
200KB
MD58790679a5d570d726f3cf998235add5a
SHA111f6b1047304eb36bba8313dafc2780ac8b975ff
SHA25672c4aaa9443538eb0824c6f3370e31adcd856434ba817c216ed0f47253a4942c
SHA5122108545430c35c1c2d4f68887b2ddd8fd9007448e79d9fb8472927a9158c29ee52650a1adb74baee854979b3e24fec879b5b22bcf6dc28c10689f8af3079e980
-
Filesize
200KB
MD5fd2f413341b20cf43f76bc1a064eb1fd
SHA18125ad614e3b50b17d0df31a9e71d373e054556f
SHA2562ac867ffbb8f8f174b817945bf987f993ff916bb96bee3a58f36c51e658a4d18
SHA512ebdab63c0f0f9ba6b6bad306f1539bdc2db096fd71c5f578c042ed5cb1ad16aa0c331295629d9a2448db31ecfc6e48663a8fc70744c97a325da7c73e94579b6c
-
Filesize
200KB
MD5bbe2585fee45b060de3931f7ff974114
SHA13aba1dc7abf6b97d1afa465b376bbef1deec77a8
SHA256b367cedbdfbbc1b4353efe90da3dd23e5c573af88e90cf93385b7e3a5f1e9129
SHA5127d0ff9d8f99811926fe4f188e3769a2c079e5372b0184de74dc21ff35312d3dec137818c7e5d9018e02803991d3388b18bf8440c77a373d2868182e56e333b20
-
Filesize
200KB
MD5f4c643d3e816be24e77449f2a53b9634
SHA1619b6ccca5357038009aaede2c26861fe655cd7f
SHA25613a148f5cae22c588ca2c96f44bb33eea04c47534c8bd5710192dc734eb777c8
SHA5122b45953da19087a3bea53b1629aac6a4ee2aaf27d0c7b7cc518e05177ad480ce828dd126dde06ac38ebd350ffa7f6ec2675bc6e87a5cc136ae3468ff635f7954
-
Filesize
200KB
MD51c5c2a5e4450948b00a614caba4e41c2
SHA1908b7e766f897e8e0d93e83b0d646f7b973d444d
SHA256ab26f3cee6a5e68c1a60beb17c95886e02ff170861591a18cf015ab126ceb5b8
SHA5125f5befdaf9a3104dab448c5efc122b5da549b1fdd9f1eb1958305df2ec603f29477348f285628054fcb6dd2bfb7e82cf59e89cc35e7d70edf33cecc8ec9370aa
-
Filesize
200KB
MD566f74926e5fea1b169f21d0d9501f250
SHA1dab7a8e1c79f4eb694b5279fa4e8c78588176ee7
SHA256aab8ce04e4e7fe8ddc8be96c91fe93033a79c369290831ba49d906427dbbbcd3
SHA512abea2360d3fb13f678e0efe549a0d14ac4e4f8d57d6d8392fb2d97b3d8035552b799fe159dbdc682556192060508e427a083e752795bb879a3419d60750d0a59
-
Filesize
200KB
MD5756e593e7473e9245dbbe435f55c2dff
SHA1a52c75e1f46c6a3f22121c043845633b28d371df
SHA256cc342a88c3f0b0d1ba7b3fa723be37a2ae32fe88889c255648d057765f3cc538
SHA5123e186f34dab4ce2fb433c9676393bf040a8d120ceefbd1f19efa93d4b69894ea5e0d4e980bc2e4f1c0cd396ecf45c7831bebe13c294f93c9bdd45f670d0f8fb6
-
Filesize
200KB
MD5964595b70db7c4332760751f3676b515
SHA1e3bf7fec8c1c0cbde9a9ee2d2874a33aaa03940c
SHA256981da8d1802d708ee706ee5f87ce17947527af68d11f7789c1ca12fbe6c14084
SHA5127990abffd0edf92ad9ae76b512f09d36c4af0817e866a80dd99d746e79830c90ff7b8f07c95c22facebb37afa101f7a084cdc328317d07d747d6d1600bd3b2ea
-
Filesize
200KB
MD50247b3ce55a5db17c5acdaf6d54b548a
SHA15707c304cf8727c89a0dd18f200f1cbe3b4fbef5
SHA256e4adf1ceba43ec9ced820ad747090e4255d985589c61bceddb3fd9ad3d0de9c9
SHA5125df17e8c86b812433cdbed46efc1aad47c8e34eaba6f205c11c570635ce14250dabe11686ef2e88b654a6f084f58c9794c38d7409a659b5683327c1efb25c363
-
Filesize
200KB
MD587da13bb5121305f59ca401a0ab034fb
SHA1c2e8d6c1cbd68b350053d9856f36490419371ee5
SHA256593d4880cb828f5047964d8ffdb5cfcdd2a0105a4365fcaf0a2d8fd29bf8b256
SHA51212e800e44af86756c00f6f9e14e6ae6b32d764077d279e0523265c69b2fbc4a360399027690004e51f0964e501e3e83665a91a1b5798993f53d1be9a5a50ceaa
-
Filesize
200KB
MD52bb9a0f20859ef3b625ce5329b9c25b7
SHA1c17b9f9329c6af5856af7e24f4d4430fa79911eb
SHA256c485cbcee4c79d5465ab5307d32d93ec43b8064f167941dc7ad4a8ce6a73518a
SHA512f98fb8e6eb5667a8483c16329d8bda77b239e259e6b5ca69456941d71cf8425449639e13861adb1731f617d76b0346910605384274edece3272922659ae44b85
-
Filesize
200KB
MD5aca04b3939792b8f7fab1c389697cff0
SHA1bdbb68d159889ae0148817c0002a6b9060d07051
SHA256b1e137e205ae02327eda9620726b1b4cc5ef447dd628e7d05d6768d3fcf1ef57
SHA51288a7aa80e86b86e7aecd7527d433f640ae07c0a995dbe3ad47417996edfc5060bee38094beaa9d0d5452f3ea0f4bdaf68e1ea59af43ca82e65670020a80a5415
-
Filesize
200KB
MD5b0e2c04be476da8a1f99746637ae06a0
SHA1fbe0dc89a533473f3805c27b61fbf58e3bd573ad
SHA25696458db3cc90d972a973f6a92191d111635a0eb7dd62a5a1c9c2259d36dd0fc8
SHA512046d5b814735ea87d11ece1b722e8e969da74a5101dad97e13fde75a0ccd76c7940dd477aa0e802baf74fc8f2546d4e978c27a13f605c412d2d33e726aa57bb7
-
Filesize
200KB
MD5a0ec5fdaef4ef0c7a6107d5e32152aba
SHA1dbdefd540d9bfd3eba0989903d162bf1575c66d4
SHA256bf5fee4bf5bbee920eb51d63bcad01219095e0518d6a050e77527b47986d7b7a
SHA5127bac49e2829ec7d21770ce39b2e055a7ec7c3b32aff6c0a2cee7050fb90e5620398a21320dcfdbd7e56efd0c4127d69457922878048de7caf12b47c92bd0d583
-
Filesize
200KB
MD5ce3bd799985e48130e04696d0e2ce25c
SHA1451da82a52f1e2037213b88cd541dab08088f8a7
SHA2561e64cdfd471be978d139848edb4f5d445c05591f983cbe7acd1b3b67a6ee8261
SHA512c5bcd3e6f72d09330339c2983d607c04752e3e22002ee18375dc8fbac11f75d0412801e58d1f675c75518b2568ce583b1cb1c4af4ec652af959483a3f945c24a
-
Filesize
200KB
MD5802b7ea816492731bb6b399de6073879
SHA152a24f77102a6776642e9aad27af9bed523b1092
SHA2562427bfd6924b592140196f583cc0b8be767da9d2c6f4de9efafe9568a2b8105f
SHA512b8b84fe80c3dc48547eda9ea1f62e0de45b01e590881878062bf4d62eef49c80453e815098fd7eb9eabb4850ffc3970a5887d5a399fa1162e7403d24681c5b33
-
Filesize
200KB
MD514b5710944938c960d9688d084c44904
SHA13fe8a9b14d772c6e48f967124dd0e6dbc646d64f
SHA256ca5fcb60db78c0a4006c96f79311a4d48c0085698b7599c0f00003bb0338e671
SHA5128957d46f8e8acb78c89e74fc4bdf7b6a66e18f9b08b84b5124dccb8cc86d4cc12a68c2999bf35c60410e104e09e21afd685e4f6b8898d3ac61f80fa1d85523de