Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
28-05-2024 04:44
Behavioral task
behavioral1
Sample
32facde47575d88303a6deceae2454a0_NeikiAnalytics.exe
Resource
win7-20240508-en
General
-
Target
32facde47575d88303a6deceae2454a0_NeikiAnalytics.exe
-
Size
282KB
-
MD5
32facde47575d88303a6deceae2454a0
-
SHA1
8541b6145a3b4c5d594bfd8e9afda2b45764e25b
-
SHA256
b311f0ad6efaea64cd8400e4756d611cdb553608975049cae476709c74028e5a
-
SHA512
687bdbfe674cdd0e108cc51c858237e7c125ca90add07a4bf1bc5a16a95830e0379819c52d687a8d55a82d209880aeb5a3e4eaa9b2dd98dd9d4e40ff2dad66b4
-
SSDEEP
6144:kYXEmup2uytWBvAnk3jys/kEjiPISUOgW9X+hOGzC/:knmusWBgWjPkmZzcukG2/
Malware Config
Signatures
-
Malware Dropper & Backdoor - Berbew 19 IoCs
Berbew is a backdoor Trojan malware with capabilities to download and install a range of additional malicious software, such as other Trojans, ransomware, and cryptominers.
Processes:
resource yara_rule C:\Windows\System\SZR.exe family_berbew C:\Windows\NMWPR.exe family_berbew C:\Windows\SysWOW64\CABD.exe family_berbew C:\Windows\System\HDFBU.exe family_berbew C:\Windows\BQR.exe family_berbew C:\windows\SysWOW64\OBVY.exe family_berbew C:\windows\system\EPMFZPU.exe family_berbew C:\windows\PHPPHX.exe family_berbew C:\Windows\SAY.exe family_berbew C:\windows\JINLH.exe family_berbew C:\Windows\SysWOW64\CLROMKQ.exe family_berbew C:\Windows\RBSGT.exe family_berbew C:\windows\YMP.exe family_berbew C:\Windows\System\PAVI.exe family_berbew C:\Windows\SysWOW64\EVFMKNI.exe family_berbew C:\Windows\SysWOW64\TLUSUW.exe family_berbew C:\windows\ZLC.exe family_berbew C:\Windows\System\QUR.exe family_berbew C:\Windows\System\PETTZVX.exe family_berbew -
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
HDFBU.exeVWYH.exeQLQJDVA.exeUIN.exeHQOBCRI.exeGOQOFSV.exeYDSOB.exeRBSGT.exeOMHAF.exeFPXKH.exeBGWR.exeGRH.exeAQOQ.exeZDJBBY.exeTAWH.exeBSLINW.exeHKQWIAS.exeSLIM.exeICUPUV.exeSTN.exeTLYMYUA.exeMVZDP.exeGDWES.exeEZV.exeBTTR.exeXWIQ.exeMKU.exeDYGDAX.exeYMP.exeZLP.exeJOVZNOH.exeWNFJZO.exeKGRS.exeIPLXONV.exeDTO.exeCREA.exeHTBFT.exeOYOF.exePVREM.exeTLIKNY.exeJEGFW.exeUJTRN.exeHKWWCS.exeEMQF.exeNHQU.exeWVBMU.exeAPBJDO.exeEOMF.exeZTUHJ.exeTHVICMU.exeTIAKTE.exeWFEUPLX.exeZKPYTU.exeBGTXX.exeBOAXVAZ.exeHNTETQ.exeBFMIY.exeJINLH.exeQWHKO.exeLZGSQS.exeKMJMHQT.exeTIMGF.exeUYBD.exeDECMQX.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation HDFBU.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation VWYH.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation QLQJDVA.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation UIN.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation HQOBCRI.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation GOQOFSV.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation YDSOB.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation RBSGT.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation OMHAF.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation FPXKH.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation BGWR.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation GRH.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation AQOQ.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation ZDJBBY.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation TAWH.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation BSLINW.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation HKQWIAS.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation SLIM.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation ICUPUV.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation STN.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation TLYMYUA.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation MVZDP.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation GDWES.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation EZV.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation BTTR.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation XWIQ.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation MKU.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation DYGDAX.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation YMP.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation ZLP.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation JOVZNOH.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation WNFJZO.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation KGRS.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation IPLXONV.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation DTO.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation CREA.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation HTBFT.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation OYOF.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation PVREM.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation TLIKNY.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation JEGFW.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation UJTRN.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation HKWWCS.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation EMQF.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation NHQU.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation WVBMU.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation APBJDO.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation EOMF.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation ZTUHJ.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation THVICMU.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation TIAKTE.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation WFEUPLX.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation ZKPYTU.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation BGTXX.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation BOAXVAZ.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation HNTETQ.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation BFMIY.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation JINLH.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation QWHKO.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation LZGSQS.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation KMJMHQT.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation TIMGF.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation UYBD.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation DECMQX.exe -
Executes dropped EXE 64 IoCs
Processes:
SZR.exeNMWPR.exeCABD.exeHDFBU.exeBQR.exeOBVY.exeEPMFZPU.exePHPPHX.exeXNUEKV.exeSAY.exeJINLH.exeCLROMKQ.exeRBSGT.exeYMP.exeMSN.exePAVI.exeEVFMKNI.exeTLUSUW.exeZLC.exeQUR.exePETTZVX.exeXKGAJUT.exeTLIKNY.exeZLP.exeDTWYIK.exeJOVZNOH.exeRCINYM.exeTZNAFU.exeWNFJZO.exeQAJ.exeRDNOO.exeKGRS.exeBGTXX.exeWCKZRK.exeJEGFW.exeKIKB.exeTIMGF.exeILW.exeMOUFXD.exeOMHAF.exeUMPNWN.exeNEWYFG.exeTAWH.exeMVZDP.exeDIK.exeNQMAJ.exeVWYH.exeMEAUX.exeQMH.exeIPLXONV.exeSNRK.exeIIIWPIM.exeGTLMYO.exeGZDTZBD.exeUJTRN.exeSUWH.exeHPGMHFV.exeCKK.exeRALUYAZ.exeDTO.exeFGGP.exeBOAXVAZ.exeCREA.exeGHK.exepid process 5036 SZR.exe 3032 NMWPR.exe 3020 CABD.exe 3288 HDFBU.exe 2156 BQR.exe 3188 OBVY.exe 4016 EPMFZPU.exe 2512 PHPPHX.exe 3216 XNUEKV.exe 4560 SAY.exe 676 JINLH.exe 4352 CLROMKQ.exe 2156 RBSGT.exe 1480 YMP.exe 3120 MSN.exe 364 PAVI.exe 3044 EVFMKNI.exe 5004 TLUSUW.exe 3288 ZLC.exe 1908 QUR.exe 2212 PETTZVX.exe 1980 XKGAJUT.exe 4896 TLIKNY.exe 1632 ZLP.exe 2376 DTWYIK.exe 3024 JOVZNOH.exe 4112 RCINYM.exe 1228 TZNAFU.exe 1972 WNFJZO.exe 1572 QAJ.exe 4076 RDNOO.exe 4960 KGRS.exe 3100 BGTXX.exe 4588 WCKZRK.exe 4444 JEGFW.exe 736 KIKB.exe 3212 TIMGF.exe 2720 ILW.exe 3884 MOUFXD.exe 4280 OMHAF.exe 4920 UMPNWN.exe 2736 NEWYFG.exe 3200 TAWH.exe 4212 MVZDP.exe 3596 DIK.exe 4492 NQMAJ.exe 1768 VWYH.exe 1340 MEAUX.exe 1336 QMH.exe 836 IPLXONV.exe 4716 SNRK.exe 2156 IIIWPIM.exe 2704 GTLMYO.exe 2852 GZDTZBD.exe 3400 UJTRN.exe 2424 SUWH.exe 4788 HPGMHFV.exe 2892 CKK.exe 552 RALUYAZ.exe 4896 DTO.exe 2120 FGGP.exe 4040 BOAXVAZ.exe 4904 CREA.exe 2488 GHK.exe -
Drops file in System32 directory 64 IoCs
Processes:
STN.exeLKNJCT.exeDTWYIK.exeWNFJZO.exeCREA.exeKVZWFUD.exeKMJMHQT.exeTIAKTE.exeDYGDAX.exeNMWPR.exeNQMAJ.exeDTO.exeLZGSQS.exeDIDHFCA.exePAVI.exePETTZVX.exeDIT.exeFBZUZ.exeOJVZIH.exeEVFMKNI.exeFGGP.exeBOAXVAZ.exeWJC.exeYWSTQ.exeOXVO.exeAQOQ.exeWVBMU.exeJINLH.exePZWTAXJ.exeUJTRN.exeGOQOFSV.exeZLP.exeGZDTZBD.exeMOUFXD.exeHKQWIAS.exeAVJEOH.exeJOVZNOH.exeJEGFW.exeEOMF.exeVJSIOCT.exeTLEN.exeBQR.exeRCINYM.exeUTFJ.exedescription ioc process File opened for modification C:\windows\SysWOW64\EMQF.exe STN.exe File opened for modification C:\windows\SysWOW64\DNR.exe LKNJCT.exe File created C:\windows\SysWOW64\DNR.exe.bat LKNJCT.exe File opened for modification C:\windows\SysWOW64\JOVZNOH.exe DTWYIK.exe File created C:\windows\SysWOW64\QAJ.exe.bat WNFJZO.exe File created C:\windows\SysWOW64\GHK.exe CREA.exe File opened for modification C:\windows\SysWOW64\QWHKO.exe KVZWFUD.exe File created C:\windows\SysWOW64\ICUPUV.exe KMJMHQT.exe File created C:\windows\SysWOW64\TLEN.exe.bat TIAKTE.exe File created C:\windows\SysWOW64\OQBWAE.exe DYGDAX.exe File created C:\windows\SysWOW64\CABD.exe NMWPR.exe File created C:\windows\SysWOW64\VWYH.exe.bat NQMAJ.exe File opened for modification C:\windows\SysWOW64\FGGP.exe DTO.exe File opened for modification C:\windows\SysWOW64\WRNDIT.exe LZGSQS.exe File opened for modification C:\windows\SysWOW64\XWIQ.exe DIDHFCA.exe File created C:\windows\SysWOW64\EVFMKNI.exe.bat PAVI.exe File created C:\windows\SysWOW64\XKGAJUT.exe PETTZVX.exe File created C:\windows\SysWOW64\JOVZNOH.exe DTWYIK.exe File opened for modification C:\windows\SysWOW64\LOG.exe DIT.exe File created C:\windows\SysWOW64\WRNDIT.exe.bat LZGSQS.exe File created C:\windows\SysWOW64\UWQ.exe FBZUZ.exe File created C:\windows\SysWOW64\BMMXWK.exe OJVZIH.exe File created C:\windows\SysWOW64\TLUSUW.exe EVFMKNI.exe File opened for modification C:\windows\SysWOW64\BOAXVAZ.exe FGGP.exe File opened for modification C:\windows\SysWOW64\CREA.exe BOAXVAZ.exe File opened for modification C:\windows\SysWOW64\GHK.exe CREA.exe File created C:\windows\SysWOW64\KMGD.exe WJC.exe File created C:\windows\SysWOW64\OHVJRWL.exe YWSTQ.exe File opened for modification C:\windows\SysWOW64\JAENJYQ.exe OXVO.exe File created C:\windows\SysWOW64\VDTHJ.exe.bat AQOQ.exe File created C:\windows\SysWOW64\ZDJBBY.exe.bat WVBMU.exe File created C:\windows\SysWOW64\CABD.exe.bat NMWPR.exe File opened for modification C:\windows\SysWOW64\CLROMKQ.exe JINLH.exe File created C:\windows\SysWOW64\FPXKH.exe.bat PZWTAXJ.exe File opened for modification C:\windows\SysWOW64\ICUPUV.exe KMJMHQT.exe File created C:\windows\SysWOW64\SUWH.exe.bat UJTRN.exe File created C:\windows\SysWOW64\YWSTQ.exe.bat GOQOFSV.exe File opened for modification C:\windows\SysWOW64\BMMXWK.exe OJVZIH.exe File opened for modification C:\windows\SysWOW64\TLUSUW.exe EVFMKNI.exe File created C:\windows\SysWOW64\TLUSUW.exe.bat EVFMKNI.exe File created C:\windows\SysWOW64\DTWYIK.exe ZLP.exe File opened for modification C:\windows\SysWOW64\QAJ.exe WNFJZO.exe File created C:\windows\SysWOW64\UJTRN.exe.bat GZDTZBD.exe File opened for modification C:\windows\SysWOW64\OMHAF.exe MOUFXD.exe File created C:\windows\SysWOW64\RIWQXJB.exe HKQWIAS.exe File created C:\windows\SysWOW64\EMQF.exe.bat STN.exe File created C:\windows\SysWOW64\ZTUHJ.exe AVJEOH.exe File opened for modification C:\windows\SysWOW64\ZTUHJ.exe AVJEOH.exe File created C:\windows\SysWOW64\RCINYM.exe JOVZNOH.exe File created C:\windows\SysWOW64\KIKB.exe.bat JEGFW.exe File opened for modification C:\windows\SysWOW64\RIWQXJB.exe HKQWIAS.exe File opened for modification C:\windows\SysWOW64\PGPYWZ.exe EOMF.exe File created C:\windows\SysWOW64\GHK.exe.bat CREA.exe File created C:\windows\SysWOW64\KMGD.exe.bat WJC.exe File created C:\windows\SysWOW64\MKU.exe VJSIOCT.exe File created C:\windows\SysWOW64\OQBWAE.exe.bat DYGDAX.exe File created C:\windows\SysWOW64\VJSIOCT.exe TLEN.exe File opened for modification C:\windows\SysWOW64\MKU.exe VJSIOCT.exe File created C:\windows\SysWOW64\MKU.exe.bat VJSIOCT.exe File created C:\windows\SysWOW64\OBVY.exe.bat BQR.exe File created C:\windows\SysWOW64\CLROMKQ.exe JINLH.exe File created C:\windows\SysWOW64\CLROMKQ.exe.bat JINLH.exe File opened for modification C:\windows\SysWOW64\TZNAFU.exe RCINYM.exe File created C:\windows\SysWOW64\PENI.exe.bat UTFJ.exe -
Drops file in Windows directory 64 IoCs
Processes:
ZIE.exeHDFBU.exeSAY.exeKMGD.exeRIWQXJB.exeGKDZQXQ.exeDNR.exePGPYWZ.exe32facde47575d88303a6deceae2454a0_NeikiAnalytics.exeGDWES.exeBFMIY.exeILW.exeQLQJDVA.exeXHBE.exeFCGIP.exePAMD.exeRDNOO.exeWCKZRK.exeDECMQX.exeGRH.exeIWIEF.exeVCI.exeMNVNRJQ.exeCQPIA.exeCKK.exePVREM.exeBNC.exeOBVY.exeKIKB.exeHMZLZE.exeGTLMYO.exeZFQN.exeLLIBIC.exeIZEJ.exeEPMFZPU.exeLERJES.exeXKGAJUT.exeNDY.exeQWHKO.exeFRLEDOA.exeNYJ.exeRBSGT.exeXNUEKV.exeUMPNWN.exeWRNDIT.exeNHQU.exeHPGMHFV.exePENI.exeMZX.exeUYBD.exeLYD.exeYDSOB.exeTIMGF.exeNEWYFG.exedescription ioc process File created C:\windows\SDQDRSF.exe ZIE.exe File created C:\windows\BQR.exe.bat HDFBU.exe File created C:\windows\JINLH.exe.bat SAY.exe File created C:\windows\system\MZX.exe.bat KMGD.exe File created C:\windows\SLIM.exe.bat RIWQXJB.exe File opened for modification C:\windows\LKNJCT.exe GKDZQXQ.exe File created C:\windows\TIAKTE.exe.bat DNR.exe File opened for modification C:\windows\system\IZEJ.exe PGPYWZ.exe File created C:\windows\system\IZEJ.exe.bat PGPYWZ.exe File opened for modification C:\windows\system\SZR.exe 32facde47575d88303a6deceae2454a0_NeikiAnalytics.exe File opened for modification C:\windows\QLQJDVA.exe GDWES.exe File created C:\windows\AQOQ.exe BFMIY.exe File opened for modification C:\windows\MOUFXD.exe ILW.exe File created C:\windows\system\UTFJ.exe QLQJDVA.exe File opened for modification C:\windows\system\MXC.exe XHBE.exe File created C:\windows\system\PAMD.exe.bat FCGIP.exe File created C:\windows\YNXVMCF.exe PAMD.exe File opened for modification C:\windows\system\MZX.exe KMGD.exe File created C:\windows\KGRS.exe.bat RDNOO.exe File opened for modification C:\windows\system\JEGFW.exe WCKZRK.exe File created C:\windows\system\GRH.exe.bat DECMQX.exe File opened for modification C:\windows\YULRGVW.exe GRH.exe File opened for modification C:\windows\system\VCI.exe IWIEF.exe File created C:\windows\system\ZKPYTU.exe VCI.exe File created C:\windows\DYGDAX.exe.bat MNVNRJQ.exe File opened for modification C:\windows\system\FYYEHQ.exe CQPIA.exe File opened for modification C:\windows\TIAKTE.exe DNR.exe File opened for modification C:\windows\RALUYAZ.exe CKK.exe File created C:\windows\TLYMYUA.exe PVREM.exe File created C:\windows\system\LLIBIC.exe BNC.exe File created C:\windows\system\EPMFZPU.exe OBVY.exe File created C:\windows\TIMGF.exe.bat KIKB.exe File created C:\windows\LKNJCT.exe.bat GKDZQXQ.exe File created C:\windows\system\NHQU.exe.bat HMZLZE.exe File created C:\windows\system\VCI.exe IWIEF.exe File opened for modification C:\windows\GZDTZBD.exe GTLMYO.exe File created C:\windows\LKNJCT.exe GKDZQXQ.exe File created C:\windows\PVREM.exe ZFQN.exe File opened for modification C:\windows\system\EOMF.exe LLIBIC.exe File opened for modification C:\windows\WFEUPLX.exe IZEJ.exe File opened for modification C:\windows\PHPPHX.exe EPMFZPU.exe File created C:\windows\EZV.exe LERJES.exe File created C:\windows\system\TLIKNY.exe XKGAJUT.exe File created C:\windows\KVZWFUD.exe.bat NDY.exe File opened for modification C:\windows\system\ATVE.exe QWHKO.exe File created C:\windows\system\ZFQN.exe.bat FRLEDOA.exe File created C:\windows\system\AVJEOH.exe.bat NYJ.exe File created C:\windows\JINLH.exe SAY.exe File opened for modification C:\windows\YMP.exe RBSGT.exe File created C:\windows\SAY.exe XNUEKV.exe File opened for modification C:\windows\NEWYFG.exe UMPNWN.exe File created C:\windows\system\PAMD.exe FCGIP.exe File created C:\windows\system\HKQWIAS.exe WRNDIT.exe File created C:\windows\WVBMU.exe.bat NHQU.exe File created C:\windows\BQR.exe HDFBU.exe File created C:\windows\CKK.exe.bat HPGMHFV.exe File created C:\windows\system\KRSRGY.exe.bat PENI.exe File opened for modification C:\windows\DSAUYWL.exe MZX.exe File opened for modification C:\windows\AYJRQV.exe UYBD.exe File created C:\windows\system\IWIEF.exe LYD.exe File created C:\windows\NYJ.exe YDSOB.exe File opened for modification C:\windows\ILW.exe TIMGF.exe File created C:\windows\TAWH.exe NEWYFG.exe File created C:\windows\system\KRSRGY.exe PENI.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 64 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 2104 3832 WerFault.exe 32facde47575d88303a6deceae2454a0_NeikiAnalytics.exe 3112 5036 WerFault.exe SZR.exe 1528 3032 WerFault.exe NMWPR.exe 2892 3020 WerFault.exe CABD.exe 4352 3288 WerFault.exe HDFBU.exe 3984 2156 WerFault.exe BQR.exe 4188 3188 WerFault.exe OBVY.exe 1512 4016 WerFault.exe EPMFZPU.exe 3112 2512 WerFault.exe PHPPHX.exe 3044 3216 WerFault.exe XNUEKV.exe 868 4560 WerFault.exe SAY.exe 5116 676 WerFault.exe JINLH.exe 456 4352 WerFault.exe CLROMKQ.exe 2424 2156 WerFault.exe RBSGT.exe 2736 1480 WerFault.exe YMP.exe 4180 3120 WerFault.exe MSN.exe 5040 364 WerFault.exe PAVI.exe 3192 3044 WerFault.exe EVFMKNI.exe 836 5004 WerFault.exe TLUSUW.exe 4788 3288 WerFault.exe ZLC.exe 4292 1908 WerFault.exe QUR.exe 2264 2212 WerFault.exe PETTZVX.exe 3216 1980 WerFault.exe XKGAJUT.exe 3220 4896 WerFault.exe TLIKNY.exe 3228 1632 WerFault.exe ZLP.exe 3580 2376 WerFault.exe DTWYIK.exe 2424 3024 WerFault.exe JOVZNOH.exe 2016 4112 WerFault.exe RCINYM.exe 2460 1228 WerFault.exe TZNAFU.exe 4124 1972 WerFault.exe WNFJZO.exe 1596 1572 WerFault.exe QAJ.exe 4440 4076 WerFault.exe RDNOO.exe 4972 4960 WerFault.exe KGRS.exe 4364 3100 WerFault.exe BGTXX.exe 1996 4588 WerFault.exe WCKZRK.exe 4548 4444 WerFault.exe JEGFW.exe 1980 736 WerFault.exe KIKB.exe 4924 3212 WerFault.exe TIMGF.exe 3224 2720 WerFault.exe ILW.exe 5020 3884 WerFault.exe MOUFXD.exe 2412 4280 WerFault.exe OMHAF.exe 3604 4920 WerFault.exe UMPNWN.exe 3288 2736 WerFault.exe NEWYFG.exe 4048 3200 WerFault.exe TAWH.exe 1148 4212 WerFault.exe MVZDP.exe 456 3596 WerFault.exe DIK.exe 3256 4492 WerFault.exe NQMAJ.exe 2376 1768 WerFault.exe VWYH.exe 1016 1340 WerFault.exe MEAUX.exe 5000 1336 WerFault.exe QMH.exe 3196 836 WerFault.exe IPLXONV.exe 1980 4716 WerFault.exe SNRK.exe 2308 2156 WerFault.exe IIIWPIM.exe 1800 2704 WerFault.exe GTLMYO.exe 4616 2852 WerFault.exe GZDTZBD.exe 3576 3400 WerFault.exe UJTRN.exe 4736 2424 WerFault.exe SUWH.exe 3348 4788 WerFault.exe HPGMHFV.exe 3236 2892 WerFault.exe CKK.exe 4132 552 WerFault.exe RALUYAZ.exe 1564 4896 WerFault.exe DTO.exe 5116 2120 WerFault.exe FGGP.exe 4432 4040 WerFault.exe BOAXVAZ.exe 2924 4904 WerFault.exe CREA.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
32facde47575d88303a6deceae2454a0_NeikiAnalytics.exeSZR.exeNMWPR.exeCABD.exeHDFBU.exeBQR.exeOBVY.exeEPMFZPU.exePHPPHX.exeXNUEKV.exeSAY.exeJINLH.exeCLROMKQ.exeRBSGT.exeYMP.exeMSN.exePAVI.exeEVFMKNI.exeTLUSUW.exeZLC.exeQUR.exePETTZVX.exeXKGAJUT.exeTLIKNY.exeZLP.exeDTWYIK.exeJOVZNOH.exeRCINYM.exeTZNAFU.exeWNFJZO.exeQAJ.exeRDNOO.exepid process 3832 32facde47575d88303a6deceae2454a0_NeikiAnalytics.exe 3832 32facde47575d88303a6deceae2454a0_NeikiAnalytics.exe 5036 SZR.exe 5036 SZR.exe 3032 NMWPR.exe 3032 NMWPR.exe 3020 CABD.exe 3020 CABD.exe 3288 HDFBU.exe 3288 HDFBU.exe 2156 BQR.exe 2156 BQR.exe 3188 OBVY.exe 3188 OBVY.exe 4016 EPMFZPU.exe 4016 EPMFZPU.exe 2512 PHPPHX.exe 2512 PHPPHX.exe 3216 XNUEKV.exe 3216 XNUEKV.exe 4560 SAY.exe 4560 SAY.exe 676 JINLH.exe 676 JINLH.exe 4352 CLROMKQ.exe 4352 CLROMKQ.exe 2156 RBSGT.exe 2156 RBSGT.exe 1480 YMP.exe 1480 YMP.exe 3120 MSN.exe 3120 MSN.exe 364 PAVI.exe 364 PAVI.exe 3044 EVFMKNI.exe 3044 EVFMKNI.exe 5004 TLUSUW.exe 5004 TLUSUW.exe 3288 ZLC.exe 3288 ZLC.exe 1908 QUR.exe 1908 QUR.exe 2212 PETTZVX.exe 2212 PETTZVX.exe 1980 XKGAJUT.exe 1980 XKGAJUT.exe 4896 TLIKNY.exe 4896 TLIKNY.exe 1632 ZLP.exe 1632 ZLP.exe 2376 DTWYIK.exe 2376 DTWYIK.exe 3024 JOVZNOH.exe 3024 JOVZNOH.exe 4112 RCINYM.exe 4112 RCINYM.exe 1228 TZNAFU.exe 1228 TZNAFU.exe 1972 WNFJZO.exe 1972 WNFJZO.exe 1572 QAJ.exe 1572 QAJ.exe 4076 RDNOO.exe 4076 RDNOO.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
Processes:
32facde47575d88303a6deceae2454a0_NeikiAnalytics.exeSZR.exeNMWPR.exeCABD.exeHDFBU.exeBQR.exeOBVY.exeEPMFZPU.exePHPPHX.exeXNUEKV.exeSAY.exeJINLH.exeCLROMKQ.exeRBSGT.exeYMP.exeMSN.exePAVI.exeEVFMKNI.exeTLUSUW.exeZLC.exeQUR.exePETTZVX.exeXKGAJUT.exeTLIKNY.exeZLP.exeDTWYIK.exeJOVZNOH.exeRCINYM.exeTZNAFU.exeWNFJZO.exeQAJ.exeRDNOO.exepid process 3832 32facde47575d88303a6deceae2454a0_NeikiAnalytics.exe 3832 32facde47575d88303a6deceae2454a0_NeikiAnalytics.exe 5036 SZR.exe 5036 SZR.exe 3032 NMWPR.exe 3032 NMWPR.exe 3020 CABD.exe 3020 CABD.exe 3288 HDFBU.exe 3288 HDFBU.exe 2156 BQR.exe 2156 BQR.exe 3188 OBVY.exe 3188 OBVY.exe 4016 EPMFZPU.exe 4016 EPMFZPU.exe 2512 PHPPHX.exe 2512 PHPPHX.exe 3216 XNUEKV.exe 3216 XNUEKV.exe 4560 SAY.exe 4560 SAY.exe 676 JINLH.exe 676 JINLH.exe 4352 CLROMKQ.exe 4352 CLROMKQ.exe 2156 RBSGT.exe 2156 RBSGT.exe 1480 YMP.exe 1480 YMP.exe 3120 MSN.exe 3120 MSN.exe 364 PAVI.exe 364 PAVI.exe 3044 EVFMKNI.exe 3044 EVFMKNI.exe 5004 TLUSUW.exe 5004 TLUSUW.exe 3288 ZLC.exe 3288 ZLC.exe 1908 QUR.exe 1908 QUR.exe 2212 PETTZVX.exe 2212 PETTZVX.exe 1980 XKGAJUT.exe 1980 XKGAJUT.exe 4896 TLIKNY.exe 4896 TLIKNY.exe 1632 ZLP.exe 1632 ZLP.exe 2376 DTWYIK.exe 2376 DTWYIK.exe 3024 JOVZNOH.exe 3024 JOVZNOH.exe 4112 RCINYM.exe 4112 RCINYM.exe 1228 TZNAFU.exe 1228 TZNAFU.exe 1972 WNFJZO.exe 1972 WNFJZO.exe 1572 QAJ.exe 1572 QAJ.exe 4076 RDNOO.exe 4076 RDNOO.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
32facde47575d88303a6deceae2454a0_NeikiAnalytics.execmd.exeSZR.execmd.exeNMWPR.execmd.exeCABD.execmd.exeHDFBU.execmd.exeBQR.execmd.exeOBVY.execmd.exeEPMFZPU.execmd.exePHPPHX.execmd.exeXNUEKV.execmd.exeSAY.execmd.exedescription pid process target process PID 3832 wrote to memory of 3416 3832 32facde47575d88303a6deceae2454a0_NeikiAnalytics.exe cmd.exe PID 3832 wrote to memory of 3416 3832 32facde47575d88303a6deceae2454a0_NeikiAnalytics.exe cmd.exe PID 3832 wrote to memory of 3416 3832 32facde47575d88303a6deceae2454a0_NeikiAnalytics.exe cmd.exe PID 3416 wrote to memory of 5036 3416 cmd.exe SZR.exe PID 3416 wrote to memory of 5036 3416 cmd.exe SZR.exe PID 3416 wrote to memory of 5036 3416 cmd.exe SZR.exe PID 5036 wrote to memory of 2088 5036 SZR.exe cmd.exe PID 5036 wrote to memory of 2088 5036 SZR.exe cmd.exe PID 5036 wrote to memory of 2088 5036 SZR.exe cmd.exe PID 2088 wrote to memory of 3032 2088 cmd.exe NMWPR.exe PID 2088 wrote to memory of 3032 2088 cmd.exe NMWPR.exe PID 2088 wrote to memory of 3032 2088 cmd.exe NMWPR.exe PID 3032 wrote to memory of 3320 3032 NMWPR.exe cmd.exe PID 3032 wrote to memory of 3320 3032 NMWPR.exe cmd.exe PID 3032 wrote to memory of 3320 3032 NMWPR.exe cmd.exe PID 3320 wrote to memory of 3020 3320 cmd.exe CABD.exe PID 3320 wrote to memory of 3020 3320 cmd.exe CABD.exe PID 3320 wrote to memory of 3020 3320 cmd.exe CABD.exe PID 3020 wrote to memory of 820 3020 CABD.exe cmd.exe PID 3020 wrote to memory of 820 3020 CABD.exe cmd.exe PID 3020 wrote to memory of 820 3020 CABD.exe cmd.exe PID 820 wrote to memory of 3288 820 cmd.exe HDFBU.exe PID 820 wrote to memory of 3288 820 cmd.exe HDFBU.exe PID 820 wrote to memory of 3288 820 cmd.exe HDFBU.exe PID 3288 wrote to memory of 1616 3288 HDFBU.exe cmd.exe PID 3288 wrote to memory of 1616 3288 HDFBU.exe cmd.exe PID 3288 wrote to memory of 1616 3288 HDFBU.exe cmd.exe PID 1616 wrote to memory of 2156 1616 cmd.exe BQR.exe PID 1616 wrote to memory of 2156 1616 cmd.exe BQR.exe PID 1616 wrote to memory of 2156 1616 cmd.exe BQR.exe PID 2156 wrote to memory of 4400 2156 BQR.exe cmd.exe PID 2156 wrote to memory of 4400 2156 BQR.exe cmd.exe PID 2156 wrote to memory of 4400 2156 BQR.exe cmd.exe PID 4400 wrote to memory of 3188 4400 cmd.exe OBVY.exe PID 4400 wrote to memory of 3188 4400 cmd.exe OBVY.exe PID 4400 wrote to memory of 3188 4400 cmd.exe OBVY.exe PID 3188 wrote to memory of 2100 3188 OBVY.exe cmd.exe PID 3188 wrote to memory of 2100 3188 OBVY.exe cmd.exe PID 3188 wrote to memory of 2100 3188 OBVY.exe cmd.exe PID 2100 wrote to memory of 4016 2100 cmd.exe EPMFZPU.exe PID 2100 wrote to memory of 4016 2100 cmd.exe EPMFZPU.exe PID 2100 wrote to memory of 4016 2100 cmd.exe EPMFZPU.exe PID 4016 wrote to memory of 540 4016 EPMFZPU.exe cmd.exe PID 4016 wrote to memory of 540 4016 EPMFZPU.exe cmd.exe PID 4016 wrote to memory of 540 4016 EPMFZPU.exe cmd.exe PID 540 wrote to memory of 2512 540 cmd.exe PHPPHX.exe PID 540 wrote to memory of 2512 540 cmd.exe PHPPHX.exe PID 540 wrote to memory of 2512 540 cmd.exe PHPPHX.exe PID 2512 wrote to memory of 2260 2512 PHPPHX.exe cmd.exe PID 2512 wrote to memory of 2260 2512 PHPPHX.exe cmd.exe PID 2512 wrote to memory of 2260 2512 PHPPHX.exe cmd.exe PID 2260 wrote to memory of 3216 2260 cmd.exe XNUEKV.exe PID 2260 wrote to memory of 3216 2260 cmd.exe XNUEKV.exe PID 2260 wrote to memory of 3216 2260 cmd.exe XNUEKV.exe PID 3216 wrote to memory of 4936 3216 XNUEKV.exe cmd.exe PID 3216 wrote to memory of 4936 3216 XNUEKV.exe cmd.exe PID 3216 wrote to memory of 4936 3216 XNUEKV.exe cmd.exe PID 4936 wrote to memory of 4560 4936 cmd.exe SAY.exe PID 4936 wrote to memory of 4560 4936 cmd.exe SAY.exe PID 4936 wrote to memory of 4560 4936 cmd.exe SAY.exe PID 4560 wrote to memory of 3720 4560 SAY.exe cmd.exe PID 4560 wrote to memory of 3720 4560 SAY.exe cmd.exe PID 4560 wrote to memory of 3720 4560 SAY.exe cmd.exe PID 3720 wrote to memory of 676 3720 cmd.exe JINLH.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\32facde47575d88303a6deceae2454a0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\32facde47575d88303a6deceae2454a0_NeikiAnalytics.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3832 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\SZR.exe.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:3416 -
C:\windows\system\SZR.exeC:\windows\system\SZR.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\NMWPR.exe.bat" "4⤵
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\windows\NMWPR.exeC:\windows\NMWPR.exe5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\CABD.exe.bat" "6⤵
- Suspicious use of WriteProcessMemory
PID:3320 -
C:\windows\SysWOW64\CABD.exeC:\windows\system32\CABD.exe7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\HDFBU.exe.bat" "8⤵
- Suspicious use of WriteProcessMemory
PID:820 -
C:\windows\system\HDFBU.exeC:\windows\system\HDFBU.exe9⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3288 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\BQR.exe.bat" "10⤵
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\windows\BQR.exeC:\windows\BQR.exe11⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\OBVY.exe.bat" "12⤵
- Suspicious use of WriteProcessMemory
PID:4400 -
C:\windows\SysWOW64\OBVY.exeC:\windows\system32\OBVY.exe13⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3188 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\EPMFZPU.exe.bat" "14⤵
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\windows\system\EPMFZPU.exeC:\windows\system\EPMFZPU.exe15⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4016 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\PHPPHX.exe.bat" "16⤵
- Suspicious use of WriteProcessMemory
PID:540 -
C:\windows\PHPPHX.exeC:\windows\PHPPHX.exe17⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\XNUEKV.exe.bat" "18⤵
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\windows\system\XNUEKV.exeC:\windows\system\XNUEKV.exe19⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3216 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\SAY.exe.bat" "20⤵
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\windows\SAY.exeC:\windows\SAY.exe21⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4560 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\JINLH.exe.bat" "22⤵
- Suspicious use of WriteProcessMemory
PID:3720 -
C:\windows\JINLH.exeC:\windows\JINLH.exe23⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:676 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\CLROMKQ.exe.bat" "24⤵PID:4384
-
C:\windows\SysWOW64\CLROMKQ.exeC:\windows\system32\CLROMKQ.exe25⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4352 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\RBSGT.exe.bat" "26⤵PID:4400
-
C:\windows\RBSGT.exeC:\windows\RBSGT.exe27⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2156 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\YMP.exe.bat" "28⤵PID:4788
-
C:\windows\YMP.exeC:\windows\YMP.exe29⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1480 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\MSN.exe.bat" "30⤵PID:2764
-
C:\windows\system\MSN.exeC:\windows\system\MSN.exe31⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3120 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\PAVI.exe.bat" "32⤵PID:2900
-
C:\windows\system\PAVI.exeC:\windows\system\PAVI.exe33⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:364 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\EVFMKNI.exe.bat" "34⤵PID:1768
-
C:\windows\SysWOW64\EVFMKNI.exeC:\windows\system32\EVFMKNI.exe35⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3044 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\TLUSUW.exe.bat" "36⤵PID:4892
-
C:\windows\SysWOW64\TLUSUW.exeC:\windows\system32\TLUSUW.exe37⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5004 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\ZLC.exe.bat" "38⤵PID:3592
-
C:\windows\ZLC.exeC:\windows\ZLC.exe39⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3288 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\QUR.exe.bat" "40⤵PID:4352
-
C:\windows\system\QUR.exeC:\windows\system\QUR.exe41⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1908 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\PETTZVX.exe.bat" "42⤵PID:4016
-
C:\windows\system\PETTZVX.exeC:\windows\system\PETTZVX.exe43⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2212 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\XKGAJUT.exe.bat" "44⤵PID:2736
-
C:\windows\SysWOW64\XKGAJUT.exeC:\windows\system32\XKGAJUT.exe45⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1980 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\TLIKNY.exe.bat" "46⤵PID:736
-
C:\windows\system\TLIKNY.exeC:\windows\system\TLIKNY.exe47⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4896 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\ZLP.exe.bat" "48⤵PID:3708
-
C:\windows\ZLP.exeC:\windows\ZLP.exe49⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1632 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\DTWYIK.exe.bat" "50⤵PID:3828
-
C:\windows\SysWOW64\DTWYIK.exeC:\windows\system32\DTWYIK.exe51⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2376 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\JOVZNOH.exe.bat" "52⤵PID:4956
-
C:\windows\SysWOW64\JOVZNOH.exeC:\windows\system32\JOVZNOH.exe53⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3024 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\RCINYM.exe.bat" "54⤵PID:2400
-
C:\windows\SysWOW64\RCINYM.exeC:\windows\system32\RCINYM.exe55⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4112 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\TZNAFU.exe.bat" "56⤵PID:3856
-
C:\windows\SysWOW64\TZNAFU.exeC:\windows\system32\TZNAFU.exe57⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1228 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\WNFJZO.exe.bat" "58⤵PID:1512
-
C:\windows\WNFJZO.exeC:\windows\WNFJZO.exe59⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1972 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\QAJ.exe.bat" "60⤵PID:2212
-
C:\windows\SysWOW64\QAJ.exeC:\windows\system32\QAJ.exe61⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1572 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\RDNOO.exe.bat" "62⤵PID:2192
-
C:\windows\SysWOW64\RDNOO.exeC:\windows\system32\RDNOO.exe63⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4076 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\KGRS.exe.bat" "64⤵PID:2384
-
C:\windows\KGRS.exeC:\windows\KGRS.exe65⤵
- Checks computer location settings
- Executes dropped EXE
PID:4960 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\BGTXX.exe.bat" "66⤵PID:4848
-
C:\windows\system\BGTXX.exeC:\windows\system\BGTXX.exe67⤵
- Checks computer location settings
- Executes dropped EXE
PID:3100 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\WCKZRK.exe.bat" "68⤵PID:1004
-
C:\windows\system\WCKZRK.exeC:\windows\system\WCKZRK.exe69⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4588 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\JEGFW.exe.bat" "70⤵PID:2204
-
C:\windows\system\JEGFW.exeC:\windows\system\JEGFW.exe71⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:4444 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\KIKB.exe.bat" "72⤵PID:3532
-
C:\windows\SysWOW64\KIKB.exeC:\windows\system32\KIKB.exe73⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:736 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\TIMGF.exe.bat" "74⤵PID:4036
-
C:\windows\TIMGF.exeC:\windows\TIMGF.exe75⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:3212 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\ILW.exe.bat" "76⤵PID:3796
-
C:\windows\ILW.exeC:\windows\ILW.exe77⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2720 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\MOUFXD.exe.bat" "78⤵PID:4468
-
C:\windows\MOUFXD.exeC:\windows\MOUFXD.exe79⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3884 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\OMHAF.exe.bat" "80⤵PID:4456
-
C:\windows\SysWOW64\OMHAF.exeC:\windows\system32\OMHAF.exe81⤵
- Checks computer location settings
- Executes dropped EXE
PID:4280 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\UMPNWN.exe.bat" "82⤵PID:3644
-
C:\windows\UMPNWN.exeC:\windows\UMPNWN.exe83⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4920 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\NEWYFG.exe.bat" "84⤵PID:3992
-
C:\windows\NEWYFG.exeC:\windows\NEWYFG.exe85⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2736 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\TAWH.exe.bat" "86⤵PID:2984
-
C:\windows\TAWH.exeC:\windows\TAWH.exe87⤵
- Checks computer location settings
- Executes dropped EXE
PID:3200 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\MVZDP.exe.bat" "88⤵PID:4004
-
C:\windows\system\MVZDP.exeC:\windows\system\MVZDP.exe89⤵
- Checks computer location settings
- Executes dropped EXE
PID:4212 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\DIK.exe.bat" "90⤵PID:4580
-
C:\windows\SysWOW64\DIK.exeC:\windows\system32\DIK.exe91⤵
- Executes dropped EXE
PID:3596 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\NQMAJ.exe.bat" "92⤵PID:3308
-
C:\windows\NQMAJ.exeC:\windows\NQMAJ.exe93⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4492 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\VWYH.exe.bat" "94⤵PID:3840
-
C:\windows\SysWOW64\VWYH.exeC:\windows\system32\VWYH.exe95⤵
- Checks computer location settings
- Executes dropped EXE
PID:1768 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\MEAUX.exe.bat" "96⤵PID:3192
-
C:\windows\system\MEAUX.exeC:\windows\system\MEAUX.exe97⤵
- Executes dropped EXE
PID:1340 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\QMH.exe.bat" "98⤵PID:4624
-
C:\windows\system\QMH.exeC:\windows\system\QMH.exe99⤵
- Executes dropped EXE
PID:1336 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\IPLXONV.exe.bat" "100⤵PID:2088
-
C:\windows\SysWOW64\IPLXONV.exeC:\windows\system32\IPLXONV.exe101⤵
- Checks computer location settings
- Executes dropped EXE
PID:836 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\SNRK.exe.bat" "102⤵PID:3960
-
C:\windows\SNRK.exeC:\windows\SNRK.exe103⤵
- Executes dropped EXE
PID:4716 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\IIIWPIM.exe.bat" "104⤵PID:4052
-
C:\windows\system\IIIWPIM.exeC:\windows\system\IIIWPIM.exe105⤵
- Executes dropped EXE
PID:2156 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\GTLMYO.exe.bat" "106⤵PID:1404
-
C:\windows\system\GTLMYO.exeC:\windows\system\GTLMYO.exe107⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2704 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\GZDTZBD.exe.bat" "108⤵PID:3212
-
C:\windows\GZDTZBD.exeC:\windows\GZDTZBD.exe109⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2852 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\UJTRN.exe.bat" "110⤵PID:3836
-
C:\windows\SysWOW64\UJTRN.exeC:\windows\system32\UJTRN.exe111⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:3400 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\SUWH.exe.bat" "112⤵PID:2356
-
C:\windows\SysWOW64\SUWH.exeC:\windows\system32\SUWH.exe113⤵
- Executes dropped EXE
PID:2424 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\HPGMHFV.exe.bat" "114⤵PID:2568
-
C:\windows\HPGMHFV.exeC:\windows\HPGMHFV.exe115⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4788 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\CKK.exe.bat" "116⤵PID:3604
-
C:\windows\CKK.exeC:\windows\CKK.exe117⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2892 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\RALUYAZ.exe.bat" "118⤵PID:4280
-
C:\windows\RALUYAZ.exeC:\windows\RALUYAZ.exe119⤵
- Executes dropped EXE
PID:552 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\DTO.exe.bat" "120⤵PID:2712
-
C:\windows\DTO.exeC:\windows\DTO.exe121⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:4896 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\FGGP.exe.bat" "122⤵PID:3360
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-