Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
27/07/2024, 22:59
Static task
static1
Behavioral task
behavioral1
Sample
1265f4cc5345feacaf274ea239ca4430N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
1265f4cc5345feacaf274ea239ca4430N.exe
Resource
win10v2004-20240704-en
General
-
Target
1265f4cc5345feacaf274ea239ca4430N.exe
-
Size
224KB
-
MD5
1265f4cc5345feacaf274ea239ca4430
-
SHA1
cd1a7e942711e11cdc9bf188ef96cee6d14c3396
-
SHA256
eb0398748cbb4590021d1676341e3648935b695a6dae00e8cb496102d38200dd
-
SHA512
df7bc4081876e10d4d861d5603066c9071e4a476fc72a61ac4aeec3005bf1bd078f4c18cfd6962f53369f9ba514e34291abb9454fe44edd46f6c6b0aef0c5d71
-
SSDEEP
3072:GakK+l3/11Q2Dp9hCjG8G3GbGVGBGfGuGxGWYcrf6KadU:Gap+BQaAYcD6Kad
Malware Config
Signatures
-
Executes dropped EXE 46 IoCs
pid Process 1984 yutoq.exe 2104 piuut.exe 2588 moelaa.exe 2432 yutos.exe 2796 hmceof.exe 2496 mieju.exe 1876 qoemuur.exe 2416 veogiiz.exe 2076 tfwoic.exe 896 hrjug.exe 1956 qaiiju.exe 2136 beuuwo.exe 2184 deuuno.exe 3012 nsfuey.exe 2576 ciuut.exe 2700 hnyim.exe 2964 puinaav.exe 2436 xzhij.exe 2776 zhxoik.exe 2804 raiiw.exe 2472 zbvoik.exe 2248 ruifaax.exe 2676 soluk.exe 1480 heaqii.exe 1800 tuoraay.exe 2344 qoiizur.exe 636 rxdoep.exe 2180 xeubaaj.exe 1996 geuzo.exe 1068 bauuye.exe 2668 dauuhi.exe 2560 muafop.exe 3048 fuwop.exe 2816 pvhiaz.exe 2748 feodi.exe 1440 ziemuu.exe 2216 qolef.exe 448 foakeg.exe 1084 yiazo.exe 1620 toapeer.exe 2056 seopaay.exe 2976 wfxon.exe 996 nauug.exe 2136 gwqid.exe 1576 jiawux.exe 2648 rusem.exe -
Loads dropped DLL 64 IoCs
pid Process 3012 1265f4cc5345feacaf274ea239ca4430N.exe 3012 1265f4cc5345feacaf274ea239ca4430N.exe 1984 yutoq.exe 1984 yutoq.exe 2104 piuut.exe 2104 piuut.exe 2588 moelaa.exe 2588 moelaa.exe 2432 yutos.exe 2432 yutos.exe 2796 hmceof.exe 2796 hmceof.exe 2496 mieju.exe 2496 mieju.exe 1876 qoemuur.exe 1876 qoemuur.exe 2416 veogiiz.exe 2416 veogiiz.exe 2076 tfwoic.exe 2076 tfwoic.exe 896 hrjug.exe 896 hrjug.exe 1956 qaiiju.exe 1956 qaiiju.exe 2136 beuuwo.exe 2136 beuuwo.exe 2184 deuuno.exe 2184 deuuno.exe 3012 nsfuey.exe 3012 nsfuey.exe 2576 ciuut.exe 2576 ciuut.exe 2700 hnyim.exe 2700 hnyim.exe 2964 puinaav.exe 2964 puinaav.exe 2436 xzhij.exe 2436 xzhij.exe 2776 zhxoik.exe 2776 zhxoik.exe 2804 raiiw.exe 2804 raiiw.exe 2472 zbvoik.exe 2472 zbvoik.exe 2248 ruifaax.exe 2248 ruifaax.exe 2676 soluk.exe 2676 soluk.exe 1480 heaqii.exe 1480 heaqii.exe 1800 tuoraay.exe 1800 tuoraay.exe 2344 qoiizur.exe 2344 qoiizur.exe 636 rxdoep.exe 636 rxdoep.exe 2180 xeubaaj.exe 2180 xeubaaj.exe 1996 geuzo.exe 1996 geuzo.exe 1068 bauuye.exe 1068 bauuye.exe 2668 dauuhi.exe 2668 dauuhi.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 47 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mieju.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language deuuno.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language raiiw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language soluk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tuoraay.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rxdoep.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dauuhi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wfxon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xzhij.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language muafop.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziemuu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qolef.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language geuzo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jiawux.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1265f4cc5345feacaf274ea239ca4430N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language veogiiz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zhxoik.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gwqid.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rusem.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hmceof.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nsfuey.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zbvoik.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qoiizur.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language foakeg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yutoq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language piuut.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tfwoic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hrjug.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ruifaax.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yutos.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qoemuur.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qaiiju.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ciuut.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language heaqii.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xeubaaj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fuwop.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language feodi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yiazo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language toapeer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nauug.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language moelaa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language beuuwo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hnyim.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language puinaav.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bauuye.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pvhiaz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language seopaay.exe -
Suspicious behavior: EnumeratesProcesses 47 IoCs
pid Process 3012 1265f4cc5345feacaf274ea239ca4430N.exe 1984 yutoq.exe 2104 piuut.exe 2588 moelaa.exe 2432 yutos.exe 2796 hmceof.exe 2496 mieju.exe 1876 qoemuur.exe 2416 veogiiz.exe 2076 tfwoic.exe 896 hrjug.exe 1956 qaiiju.exe 2136 beuuwo.exe 2184 deuuno.exe 3012 nsfuey.exe 2576 ciuut.exe 2700 hnyim.exe 2964 puinaav.exe 2436 xzhij.exe 2776 zhxoik.exe 2804 raiiw.exe 2472 zbvoik.exe 2248 ruifaax.exe 2676 soluk.exe 1480 heaqii.exe 1800 tuoraay.exe 2344 qoiizur.exe 636 rxdoep.exe 2180 xeubaaj.exe 1996 geuzo.exe 1068 bauuye.exe 2668 dauuhi.exe 2560 muafop.exe 3048 fuwop.exe 2816 pvhiaz.exe 2748 feodi.exe 1440 ziemuu.exe 2216 qolef.exe 448 foakeg.exe 1084 yiazo.exe 1620 toapeer.exe 2056 seopaay.exe 2976 wfxon.exe 996 nauug.exe 2136 gwqid.exe 1576 jiawux.exe 2648 rusem.exe -
Suspicious use of SetWindowsHookEx 47 IoCs
pid Process 3012 1265f4cc5345feacaf274ea239ca4430N.exe 1984 yutoq.exe 2104 piuut.exe 2588 moelaa.exe 2432 yutos.exe 2796 hmceof.exe 2496 mieju.exe 1876 qoemuur.exe 2416 veogiiz.exe 2076 tfwoic.exe 896 hrjug.exe 1956 qaiiju.exe 2136 beuuwo.exe 2184 deuuno.exe 3012 nsfuey.exe 2576 ciuut.exe 2700 hnyim.exe 2964 puinaav.exe 2436 xzhij.exe 2776 zhxoik.exe 2804 raiiw.exe 2472 zbvoik.exe 2248 ruifaax.exe 2676 soluk.exe 1480 heaqii.exe 1800 tuoraay.exe 2344 qoiizur.exe 636 rxdoep.exe 2180 xeubaaj.exe 1996 geuzo.exe 1068 bauuye.exe 2668 dauuhi.exe 2560 muafop.exe 3048 fuwop.exe 2816 pvhiaz.exe 2748 feodi.exe 1440 ziemuu.exe 2216 qolef.exe 448 foakeg.exe 1084 yiazo.exe 1620 toapeer.exe 2056 seopaay.exe 2976 wfxon.exe 996 nauug.exe 2136 gwqid.exe 1576 jiawux.exe 2648 rusem.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3012 wrote to memory of 1984 3012 1265f4cc5345feacaf274ea239ca4430N.exe 30 PID 3012 wrote to memory of 1984 3012 1265f4cc5345feacaf274ea239ca4430N.exe 30 PID 3012 wrote to memory of 1984 3012 1265f4cc5345feacaf274ea239ca4430N.exe 30 PID 3012 wrote to memory of 1984 3012 1265f4cc5345feacaf274ea239ca4430N.exe 30 PID 1984 wrote to memory of 2104 1984 yutoq.exe 31 PID 1984 wrote to memory of 2104 1984 yutoq.exe 31 PID 1984 wrote to memory of 2104 1984 yutoq.exe 31 PID 1984 wrote to memory of 2104 1984 yutoq.exe 31 PID 2104 wrote to memory of 2588 2104 piuut.exe 32 PID 2104 wrote to memory of 2588 2104 piuut.exe 32 PID 2104 wrote to memory of 2588 2104 piuut.exe 32 PID 2104 wrote to memory of 2588 2104 piuut.exe 32 PID 2588 wrote to memory of 2432 2588 moelaa.exe 33 PID 2588 wrote to memory of 2432 2588 moelaa.exe 33 PID 2588 wrote to memory of 2432 2588 moelaa.exe 33 PID 2588 wrote to memory of 2432 2588 moelaa.exe 33 PID 2432 wrote to memory of 2796 2432 yutos.exe 34 PID 2432 wrote to memory of 2796 2432 yutos.exe 34 PID 2432 wrote to memory of 2796 2432 yutos.exe 34 PID 2432 wrote to memory of 2796 2432 yutos.exe 34 PID 2796 wrote to memory of 2496 2796 hmceof.exe 35 PID 2796 wrote to memory of 2496 2796 hmceof.exe 35 PID 2796 wrote to memory of 2496 2796 hmceof.exe 35 PID 2796 wrote to memory of 2496 2796 hmceof.exe 35 PID 2496 wrote to memory of 1876 2496 mieju.exe 36 PID 2496 wrote to memory of 1876 2496 mieju.exe 36 PID 2496 wrote to memory of 1876 2496 mieju.exe 36 PID 2496 wrote to memory of 1876 2496 mieju.exe 36 PID 1876 wrote to memory of 2416 1876 qoemuur.exe 37 PID 1876 wrote to memory of 2416 1876 qoemuur.exe 37 PID 1876 wrote to memory of 2416 1876 qoemuur.exe 37 PID 1876 wrote to memory of 2416 1876 qoemuur.exe 37 PID 2416 wrote to memory of 2076 2416 veogiiz.exe 38 PID 2416 wrote to memory of 2076 2416 veogiiz.exe 38 PID 2416 wrote to memory of 2076 2416 veogiiz.exe 38 PID 2416 wrote to memory of 2076 2416 veogiiz.exe 38 PID 2076 wrote to memory of 896 2076 tfwoic.exe 39 PID 2076 wrote to memory of 896 2076 tfwoic.exe 39 PID 2076 wrote to memory of 896 2076 tfwoic.exe 39 PID 2076 wrote to memory of 896 2076 tfwoic.exe 39 PID 896 wrote to memory of 1956 896 hrjug.exe 40 PID 896 wrote to memory of 1956 896 hrjug.exe 40 PID 896 wrote to memory of 1956 896 hrjug.exe 40 PID 896 wrote to memory of 1956 896 hrjug.exe 40 PID 1956 wrote to memory of 2136 1956 qaiiju.exe 41 PID 1956 wrote to memory of 2136 1956 qaiiju.exe 41 PID 1956 wrote to memory of 2136 1956 qaiiju.exe 41 PID 1956 wrote to memory of 2136 1956 qaiiju.exe 41 PID 2136 wrote to memory of 2184 2136 beuuwo.exe 42 PID 2136 wrote to memory of 2184 2136 beuuwo.exe 42 PID 2136 wrote to memory of 2184 2136 beuuwo.exe 42 PID 2136 wrote to memory of 2184 2136 beuuwo.exe 42 PID 2184 wrote to memory of 3012 2184 deuuno.exe 43 PID 2184 wrote to memory of 3012 2184 deuuno.exe 43 PID 2184 wrote to memory of 3012 2184 deuuno.exe 43 PID 2184 wrote to memory of 3012 2184 deuuno.exe 43 PID 3012 wrote to memory of 2576 3012 nsfuey.exe 44 PID 3012 wrote to memory of 2576 3012 nsfuey.exe 44 PID 3012 wrote to memory of 2576 3012 nsfuey.exe 44 PID 3012 wrote to memory of 2576 3012 nsfuey.exe 44 PID 2576 wrote to memory of 2700 2576 ciuut.exe 45 PID 2576 wrote to memory of 2700 2576 ciuut.exe 45 PID 2576 wrote to memory of 2700 2576 ciuut.exe 45 PID 2576 wrote to memory of 2700 2576 ciuut.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\1265f4cc5345feacaf274ea239ca4430N.exe"C:\Users\Admin\AppData\Local\Temp\1265f4cc5345feacaf274ea239ca4430N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Users\Admin\yutoq.exe"C:\Users\Admin\yutoq.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Users\Admin\piuut.exe"C:\Users\Admin\piuut.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Users\Admin\moelaa.exe"C:\Users\Admin\moelaa.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Users\Admin\yutos.exe"C:\Users\Admin\yutos.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Users\Admin\hmceof.exe"C:\Users\Admin\hmceof.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Users\Admin\mieju.exe"C:\Users\Admin\mieju.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Users\Admin\qoemuur.exe"C:\Users\Admin\qoemuur.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Users\Admin\veogiiz.exe"C:\Users\Admin\veogiiz.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Users\Admin\tfwoic.exe"C:\Users\Admin\tfwoic.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Users\Admin\hrjug.exe"C:\Users\Admin\hrjug.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:896 -
C:\Users\Admin\qaiiju.exe"C:\Users\Admin\qaiiju.exe"12⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Users\Admin\beuuwo.exe"C:\Users\Admin\beuuwo.exe"13⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Users\Admin\deuuno.exe"C:\Users\Admin\deuuno.exe"14⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Users\Admin\nsfuey.exe"C:\Users\Admin\nsfuey.exe"15⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Users\Admin\ciuut.exe"C:\Users\Admin\ciuut.exe"16⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Users\Admin\hnyim.exe"C:\Users\Admin\hnyim.exe"17⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2700 -
C:\Users\Admin\puinaav.exe"C:\Users\Admin\puinaav.exe"18⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2964 -
C:\Users\Admin\xzhij.exe"C:\Users\Admin\xzhij.exe"19⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2436 -
C:\Users\Admin\zhxoik.exe"C:\Users\Admin\zhxoik.exe"20⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2776 -
C:\Users\Admin\raiiw.exe"C:\Users\Admin\raiiw.exe"21⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2804 -
C:\Users\Admin\zbvoik.exe"C:\Users\Admin\zbvoik.exe"22⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2472 -
C:\Users\Admin\ruifaax.exe"C:\Users\Admin\ruifaax.exe"23⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2248 -
C:\Users\Admin\soluk.exe"C:\Users\Admin\soluk.exe"24⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2676 -
C:\Users\Admin\heaqii.exe"C:\Users\Admin\heaqii.exe"25⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1480 -
C:\Users\Admin\tuoraay.exe"C:\Users\Admin\tuoraay.exe"26⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1800 -
C:\Users\Admin\qoiizur.exe"C:\Users\Admin\qoiizur.exe"27⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2344 -
C:\Users\Admin\rxdoep.exe"C:\Users\Admin\rxdoep.exe"28⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:636 -
C:\Users\Admin\xeubaaj.exe"C:\Users\Admin\xeubaaj.exe"29⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2180 -
C:\Users\Admin\geuzo.exe"C:\Users\Admin\geuzo.exe"30⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1996 -
C:\Users\Admin\bauuye.exe"C:\Users\Admin\bauuye.exe"31⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1068 -
C:\Users\Admin\dauuhi.exe"C:\Users\Admin\dauuhi.exe"32⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2668 -
C:\Users\Admin\muafop.exe"C:\Users\Admin\muafop.exe"33⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2560 -
C:\Users\Admin\fuwop.exe"C:\Users\Admin\fuwop.exe"34⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3048 -
C:\Users\Admin\pvhiaz.exe"C:\Users\Admin\pvhiaz.exe"35⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2816 -
C:\Users\Admin\feodi.exe"C:\Users\Admin\feodi.exe"36⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2748 -
C:\Users\Admin\ziemuu.exe"C:\Users\Admin\ziemuu.exe"37⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1440 -
C:\Users\Admin\qolef.exe"C:\Users\Admin\qolef.exe"38⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2216 -
C:\Users\Admin\foakeg.exe"C:\Users\Admin\foakeg.exe"39⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:448 -
C:\Users\Admin\yiazo.exe"C:\Users\Admin\yiazo.exe"40⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1084 -
C:\Users\Admin\toapeer.exe"C:\Users\Admin\toapeer.exe"41⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1620 -
C:\Users\Admin\seopaay.exe"C:\Users\Admin\seopaay.exe"42⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2056 -
C:\Users\Admin\wfxon.exe"C:\Users\Admin\wfxon.exe"43⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2976 -
C:\Users\Admin\nauug.exe"C:\Users\Admin\nauug.exe"44⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:996 -
C:\Users\Admin\gwqid.exe"C:\Users\Admin\gwqid.exe"45⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2136 -
C:\Users\Admin\jiawux.exe"C:\Users\Admin\jiawux.exe"46⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1576 -
C:\Users\Admin\rusem.exe"C:\Users\Admin\rusem.exe"47⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2648
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224KB
MD57c7726099f9a385edc203e4c7a2a7374
SHA148aeef55e999c89df7eb7f23c8f0f41e7d006f72
SHA256e4c1fb7f7b2933bb85d850df4adc80f1c0189409ed555481b1291a8f4f8f098f
SHA512519fda5148691b62c7c20455a1f984872581140eaa9c041f4ae85206fef7f61df6200a0d964b609a1044170b3e4c05725687cd79ff10dae9439c94becb178734
-
Filesize
224KB
MD5bab19af6fc5dfd7d2637fc76e4a77379
SHA1949516e05c49ce7818791eaa82dc97fcba4ea0ee
SHA256fd85b0e71f47bcc2f4c7b928a97a71c96b3670b14a0e17c2f0da9deaab5985e3
SHA5125d58c85ed7eb56757428f9cb4bbc19cfef75fd649e6a7fdee8860f4f45d9cafec3fc49d0205c8614454bb179f10eeea84b5cf0cd41333f280ab0dc2581beaa00
-
Filesize
224KB
MD5c6fbb402549e5aaaaf431539f45b75d7
SHA1c80272d8b892e47882c79dd509de8508098b34fa
SHA256a320311b0fe56161a8fb2187125510885d89b07faa7c146bc9ea487227dcd5cb
SHA512320fa4655b9301353cdebb3b22b8942c8f90365db5ddb6e9645f9f5d4734965cf27103e5a6202b55478ff5794ffb57a4e07f3c86f85704bc32d8cef2e3011a05
-
Filesize
224KB
MD5afc9033c0f0bf93f6cfe1e318a21e3bc
SHA19f6796ccdd3e355e8f6196fe8f039957712e2308
SHA2561fe9f3bd05e6e7eb20248845592d979e9ee8bc48a36bcea32e5b75b829de878a
SHA512215cdd013bf88c6c3ff5514b5150d4de833c1dd6f06d09022b2da1f6ed56fab7dd1166816ea2909977968132e7b303bce01687124c2cebf01d15bfba5ddd25ad
-
Filesize
224KB
MD5a3ad351182221878ab4e514484bbd195
SHA1aacff9da56b28d4ab8bbc78b2b6fa6145ebbd232
SHA25678721c722737aecbdd62dadc91739da64ec9d7463ba48a0ef3015c9237cd1c7d
SHA5129364142330e37768cc9d5807988ea016fe404804db557e78f4fcd4b6d249961aa084871e4e5f6e09c1a2416a3a6dea361f92329b70789d213eb6bd68dae4814b
-
Filesize
224KB
MD5bbadc86114e48ce547fe6d137e2f3256
SHA12d8e8fa0f02a8bdf6c16ddb362d8181d1fff4149
SHA256660c1ca960b015aed95b0110cdf579ccd0cc59b47f19d176be97a6d9457ad587
SHA5128d5e375d0b825f6c919c1f045a13f3cd1e92b6e25a44418730db62c7948dbffb42afe088ce326052209b9dabafb0abde82d6e56f41742d387837534714c4f7f7
-
Filesize
224KB
MD596f0a3e2cb7fdb99fdd5106f897b59c7
SHA19ca37a233a5be9b9578119ff1f56a8ceae1281d1
SHA256a253882c9988a158c51aec96d090da1ebe173cd54fed2379bc5f74859c1e8f4b
SHA512c24b9a7d432d33c5e1c2e973d228b22b40583bed3aab0cffbdb151fa163330385757bc211b5e88bf8e6215a6019bd115cd2d873c9fd72627b2a726a595dcd279
-
Filesize
224KB
MD574adb39b8ef149ba58254952232f9a28
SHA1efcb42b4b973f9884b1ad9344016bb4fc54ac658
SHA256bfe706ac986c2bd50687e3b89ae805af469495ae76bcbd05abdb76937ccc7a34
SHA5123ba9ce1a9c5b388da1baf32593f87d43a4fe927d0e0d37e93263263320096c91c26c7e29d9fbfc494821181af5780ea56179c0ac813c2ed799502c67dd47a37f
-
Filesize
224KB
MD56efd8bdf0607e2429426bb1ae73a5d7d
SHA1d4adfc25a5fd65cc288c0dfa8d650a56222bf075
SHA25606755af60a5e673e9101989cd04c233677f12086e31576cc99b6518b3de1aede
SHA51285837f12437d561dc53e09b0e83d9c5f9eb9047f6a85e9f59d654d1a3f32d9a373f108ee75f433dce26a722378211caa65676b7497650f98337d54dac3821279
-
Filesize
224KB
MD53aa7988cca91d615e2b4b469380f0310
SHA1a2389d2ee402be04ed989d70a1681e33bc7fcfc8
SHA256b0c926893742635525c9e1f079a257a86f8d91e4706c777d9dd4328d9f217ee4
SHA512240db40ba01f7e1e1c2bec51812134f9dfd555b3a3d28ca2ee7bbbcc69b100bc7f3e2d3bf667c365755a291b5472a855add3320d36b800ccbc7144ea5a4e3a85
-
Filesize
224KB
MD58ebe11c7e70ab37be73b34084526d330
SHA1d413443cd5b07cf2019197b319c2d08defe82940
SHA256625881d58128a13b3d8e2922d11621afdb9b25e6c00e1f824737ae8d973a1492
SHA512ec9c3d78573627cda36d9ace5deef72a6b85887dbd5c6d9605c8c8f6231d371d22ed6a7a81d706fe35d35df034839caf12daa07326f1652b43f569b4f722d78e
-
Filesize
224KB
MD50ea2e560eb910c61fb699d744d321aa2
SHA114f41ec7d353e62a7cdcbb39a1a75e296ca1c497
SHA2563efa30715efb72fea2c1e2e176232a98e547471db8b8f6ce490868bf969b5fa1
SHA5127bf3a3e340a9172de3c1a6f76e5ca4bb6249797f708579b47d4f6c1f45cdfd4dc8e532324876ba0b046d0f03047059625e774f89a7dff34ad6e78d1ea17f0220
-
Filesize
224KB
MD52dbfbc530545eac6ca50eecdc60672c8
SHA1f1b628eca92af9c427e6a4d5d54488d7c4c8be63
SHA256fac7ab6d9d722bab6dfa998a5ebc0d9371798c993ce74e8c50652c8c547bbffa
SHA51214fc58ef52b1d17de6dbd7e730fcec34c084bdf005cc0be8fc36054a749265c7150d6512f5c175511df6a63d6c30b7cdd27f5f5f6855ab41987dadddb4f1ccf5
-
Filesize
224KB
MD5fb9a4476ace56a26e2bb5d217cc2db70
SHA1ad429e9df20fdace4152c1025e71716b35ab4f49
SHA256258556cea5344ae29ddccb0f87a86a5cd9b761a997da68a7c5da1b1b19630eaa
SHA5126ce8638ca899bec6724b00e87360de17bcf5f5ed0a042d0794057c59400373f2e38108fb100438c191c7d7fd5a408aecabca0e6ffeb00dae11a4dff21e6cc7e1
-
Filesize
224KB
MD5a109ed18d85d0ec60e31e54d62dc662c
SHA1bd62d13cb01d98e320ae01d144b8f8f21d658bf8
SHA256b3cab270344d974407be883817ff1845d5b93975b7c9b96713492a57b390f528
SHA51288ad800020e270c06cb06e7f200eee956a5f02c828696e28e236de42c0ef611a14b10864f95e1509fcf6b31d221087f789492a3e7746a2eab31f1d9db4f6fade
-
Filesize
224KB
MD5a5e7105308832db2f41d2fa681b3d94e
SHA16c3f8e143412a28d7291556435b4be25d14d5faa
SHA2562f6675198ba100e4863a340ca11ab65ac861020a09057562cb289f77e6a09b43
SHA512ca9131cb98491b27223797fa82a52ab6f1eb6ee629d252d5f534e44694cf7494c8c7c6bb45ba3904792c2f1ed1a92842daac6aa6940c3134df1199fa09dd565e