Analysis

  • max time kernel
    149s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    02/08/2024, 21:10

General

  • Target

    472d813dba35e575aa09cb43cb10bdc7df6119b07ca20f4860d52455c12f2473.exe

  • Size

    232KB

  • MD5

    d98fa51ed404b69bfc0d499856de17e2

  • SHA1

    ec2441b30b8b418d7e78db21bc8dbc4d6726ed00

  • SHA256

    472d813dba35e575aa09cb43cb10bdc7df6119b07ca20f4860d52455c12f2473

  • SHA512

    8183d661c78eb1ffb16a41e7af02ccbb9752366421952195b2acbb015a5ca1664421ecb3e47e6af2c36277bd0576ec359db73f704737964af2201d0174da450c

  • SSDEEP

    3072:GxGKVe6wFR92hCjG8G3GbGVGBGfGuGxGWYcrf6Kadk:GxHVde92AYcD6Kad

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 61 IoCs
  • Loads dropped DLL 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 62 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 61 IoCs
  • Suspicious use of SetWindowsHookEx 62 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\472d813dba35e575aa09cb43cb10bdc7df6119b07ca20f4860d52455c12f2473.exe
    "C:\Users\Admin\AppData\Local\Temp\472d813dba35e575aa09cb43cb10bdc7df6119b07ca20f4860d52455c12f2473.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3048
    • C:\Users\Admin\quric.exe
      "C:\Users\Admin\quric.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1644
      • C:\Users\Admin\xaobe.exe
        "C:\Users\Admin\xaobe.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2752
        • C:\Users\Admin\svpor.exe
          "C:\Users\Admin\svpor.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2724
          • C:\Users\Admin\caoopi.exe
            "C:\Users\Admin\caoopi.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2636
            • C:\Users\Admin\qoemaar.exe
              "C:\Users\Admin\qoemaar.exe"
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:1928
              • C:\Users\Admin\jgvex.exe
                "C:\Users\Admin\jgvex.exe"
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of SetWindowsHookEx
                • Suspicious use of WriteProcessMemory
                PID:2024
                • C:\Users\Admin\daiije.exe
                  "C:\Users\Admin\daiije.exe"
                  8⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of SetWindowsHookEx
                  • Suspicious use of WriteProcessMemory
                  PID:1988
                  • C:\Users\Admin\moelaa.exe
                    "C:\Users\Admin\moelaa.exe"
                    9⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • System Location Discovery: System Language Discovery
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of SetWindowsHookEx
                    • Suspicious use of WriteProcessMemory
                    PID:1904
                    • C:\Users\Admin\yoiiw.exe
                      "C:\Users\Admin\yoiiw.exe"
                      10⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of SetWindowsHookEx
                      • Suspicious use of WriteProcessMemory
                      PID:1112
                      • C:\Users\Admin\qoizaaw.exe
                        "C:\Users\Admin\qoizaaw.exe"
                        11⤵
                        • Executes dropped EXE
                        • Loads dropped DLL
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of SetWindowsHookEx
                        • Suspicious use of WriteProcessMemory
                        PID:1756
                        • C:\Users\Admin\ciuuxo.exe
                          "C:\Users\Admin\ciuuxo.exe"
                          12⤵
                          • Executes dropped EXE
                          • Loads dropped DLL
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of SetWindowsHookEx
                          • Suspicious use of WriteProcessMemory
                          PID:1992
                          • C:\Users\Admin\fltew.exe
                            "C:\Users\Admin\fltew.exe"
                            13⤵
                            • Executes dropped EXE
                            • Loads dropped DLL
                            • System Location Discovery: System Language Discovery
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of SetWindowsHookEx
                            • Suspicious use of WriteProcessMemory
                            PID:696
                            • C:\Users\Admin\wuqim.exe
                              "C:\Users\Admin\wuqim.exe"
                              14⤵
                              • Executes dropped EXE
                              • Loads dropped DLL
                              • System Location Discovery: System Language Discovery
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of SetWindowsHookEx
                              • Suspicious use of WriteProcessMemory
                              PID:3004
                              • C:\Users\Admin\weaasoq.exe
                                "C:\Users\Admin\weaasoq.exe"
                                15⤵
                                • Executes dropped EXE
                                • Loads dropped DLL
                                • System Location Discovery: System Language Discovery
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of SetWindowsHookEx
                                • Suspicious use of WriteProcessMemory
                                PID:2068
                                • C:\Users\Admin\zeuur.exe
                                  "C:\Users\Admin\zeuur.exe"
                                  16⤵
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  • System Location Discovery: System Language Discovery
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of SetWindowsHookEx
                                  • Suspicious use of WriteProcessMemory
                                  PID:2872
                                  • C:\Users\Admin\ruidaaw.exe
                                    "C:\Users\Admin\ruidaaw.exe"
                                    17⤵
                                    • Executes dropped EXE
                                    • Loads dropped DLL
                                    • System Location Discovery: System Language Discovery
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious use of SetWindowsHookEx
                                    PID:2760
                                    • C:\Users\Admin\yiuloo.exe
                                      "C:\Users\Admin\yiuloo.exe"
                                      18⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      • System Location Discovery: System Language Discovery
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious use of SetWindowsHookEx
                                      PID:2492
                                      • C:\Users\Admin\pusik.exe
                                        "C:\Users\Admin\pusik.exe"
                                        19⤵
                                        • Executes dropped EXE
                                        • Loads dropped DLL
                                        • System Location Discovery: System Language Discovery
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious use of SetWindowsHookEx
                                        PID:1808
                                        • C:\Users\Admin\qoemaar.exe
                                          "C:\Users\Admin\qoemaar.exe"
                                          20⤵
                                          • Executes dropped EXE
                                          • Loads dropped DLL
                                          • System Location Discovery: System Language Discovery
                                          • Suspicious behavior: EnumeratesProcesses
                                          • Suspicious use of SetWindowsHookEx
                                          PID:2396
                                          • C:\Users\Admin\hnjeow.exe
                                            "C:\Users\Admin\hnjeow.exe"
                                            21⤵
                                            • Executes dropped EXE
                                            • Loads dropped DLL
                                            • System Location Discovery: System Language Discovery
                                            • Suspicious behavior: EnumeratesProcesses
                                            • Suspicious use of SetWindowsHookEx
                                            PID:1844
                                            • C:\Users\Admin\taeex.exe
                                              "C:\Users\Admin\taeex.exe"
                                              22⤵
                                              • Executes dropped EXE
                                              • Loads dropped DLL
                                              • System Location Discovery: System Language Discovery
                                              • Suspicious behavior: EnumeratesProcesses
                                              • Suspicious use of SetWindowsHookEx
                                              PID:1448
                                              • C:\Users\Admin\wfpex.exe
                                                "C:\Users\Admin\wfpex.exe"
                                                23⤵
                                                • Executes dropped EXE
                                                • Loads dropped DLL
                                                • System Location Discovery: System Language Discovery
                                                • Suspicious behavior: EnumeratesProcesses
                                                • Suspicious use of SetWindowsHookEx
                                                PID:2644
                                                • C:\Users\Admin\leapot.exe
                                                  "C:\Users\Admin\leapot.exe"
                                                  24⤵
                                                  • Executes dropped EXE
                                                  • Loads dropped DLL
                                                  • System Location Discovery: System Language Discovery
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:2952
                                                  • C:\Users\Admin\beodi.exe
                                                    "C:\Users\Admin\beodi.exe"
                                                    25⤵
                                                    • Executes dropped EXE
                                                    • Loads dropped DLL
                                                    • System Location Discovery: System Language Discovery
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:1940
                                                    • C:\Users\Admin\lbwoah.exe
                                                      "C:\Users\Admin\lbwoah.exe"
                                                      26⤵
                                                      • Executes dropped EXE
                                                      • Loads dropped DLL
                                                      • System Location Discovery: System Language Discovery
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      • Suspicious use of SetWindowsHookEx
                                                      PID:280
                                                      • C:\Users\Admin\mauuye.exe
                                                        "C:\Users\Admin\mauuye.exe"
                                                        27⤵
                                                        • Executes dropped EXE
                                                        • Loads dropped DLL
                                                        • System Location Discovery: System Language Discovery
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        • Suspicious use of SetWindowsHookEx
                                                        PID:984
                                                        • C:\Users\Admin\geabin.exe
                                                          "C:\Users\Admin\geabin.exe"
                                                          28⤵
                                                          • Executes dropped EXE
                                                          • Loads dropped DLL
                                                          • System Location Discovery: System Language Discovery
                                                          • Suspicious behavior: EnumeratesProcesses
                                                          • Suspicious use of SetWindowsHookEx
                                                          PID:2668
                                                          • C:\Users\Admin\kiuug.exe
                                                            "C:\Users\Admin\kiuug.exe"
                                                            29⤵
                                                            • Executes dropped EXE
                                                            • Loads dropped DLL
                                                            • System Location Discovery: System Language Discovery
                                                            • Suspicious behavior: EnumeratesProcesses
                                                            • Suspicious use of SetWindowsHookEx
                                                            PID:2064
                                                            • C:\Users\Admin\gofek.exe
                                                              "C:\Users\Admin\gofek.exe"
                                                              30⤵
                                                              • Executes dropped EXE
                                                              • Loads dropped DLL
                                                              • System Location Discovery: System Language Discovery
                                                              • Suspicious behavior: EnumeratesProcesses
                                                              • Suspicious use of SetWindowsHookEx
                                                              PID:2080
                                                              • C:\Users\Admin\niasux.exe
                                                                "C:\Users\Admin\niasux.exe"
                                                                31⤵
                                                                • Executes dropped EXE
                                                                • Loads dropped DLL
                                                                • System Location Discovery: System Language Discovery
                                                                • Suspicious behavior: EnumeratesProcesses
                                                                • Suspicious use of SetWindowsHookEx
                                                                PID:3028
                                                                • C:\Users\Admin\tbgum.exe
                                                                  "C:\Users\Admin\tbgum.exe"
                                                                  32⤵
                                                                  • Executes dropped EXE
                                                                  • Loads dropped DLL
                                                                  • System Location Discovery: System Language Discovery
                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                  • Suspicious use of SetWindowsHookEx
                                                                  PID:2632
                                                                  • C:\Users\Admin\wdyuis.exe
                                                                    "C:\Users\Admin\wdyuis.exe"
                                                                    33⤵
                                                                    • Executes dropped EXE
                                                                    • Loads dropped DLL
                                                                    • System Location Discovery: System Language Discovery
                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                    • Suspicious use of SetWindowsHookEx
                                                                    PID:2016
                                                                    • C:\Users\Admin\kiejaav.exe
                                                                      "C:\Users\Admin\kiejaav.exe"
                                                                      34⤵
                                                                      • Executes dropped EXE
                                                                      • System Location Discovery: System Language Discovery
                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                      • Suspicious use of SetWindowsHookEx
                                                                      PID:2760
                                                                      • C:\Users\Admin\daoocu.exe
                                                                        "C:\Users\Admin\daoocu.exe"
                                                                        35⤵
                                                                        • Executes dropped EXE
                                                                        • System Location Discovery: System Language Discovery
                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                        • Suspicious use of SetWindowsHookEx
                                                                        PID:1056
                                                                        • C:\Users\Admin\wdyuis.exe
                                                                          "C:\Users\Admin\wdyuis.exe"
                                                                          36⤵
                                                                          • Executes dropped EXE
                                                                          • System Location Discovery: System Language Discovery
                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                          • Suspicious use of SetWindowsHookEx
                                                                          PID:1984
                                                                          • C:\Users\Admin\nauuv.exe
                                                                            "C:\Users\Admin\nauuv.exe"
                                                                            37⤵
                                                                            • Executes dropped EXE
                                                                            • System Location Discovery: System Language Discovery
                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                            • Suspicious use of SetWindowsHookEx
                                                                            PID:1668
                                                                            • C:\Users\Admin\svpor.exe
                                                                              "C:\Users\Admin\svpor.exe"
                                                                              38⤵
                                                                              • Executes dropped EXE
                                                                              • System Location Discovery: System Language Discovery
                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                              • Suspicious use of SetWindowsHookEx
                                                                              PID:2996
                                                                              • C:\Users\Admin\roexad.exe
                                                                                "C:\Users\Admin\roexad.exe"
                                                                                39⤵
                                                                                • Executes dropped EXE
                                                                                • System Location Discovery: System Language Discovery
                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                • Suspicious use of SetWindowsHookEx
                                                                                PID:2936
                                                                                • C:\Users\Admin\leapit.exe
                                                                                  "C:\Users\Admin\leapit.exe"
                                                                                  40⤵
                                                                                  • Executes dropped EXE
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                  • Suspicious use of SetWindowsHookEx
                                                                                  PID:1792
                                                                                  • C:\Users\Admin\pauuj.exe
                                                                                    "C:\Users\Admin\pauuj.exe"
                                                                                    41⤵
                                                                                    • Executes dropped EXE
                                                                                    • System Location Discovery: System Language Discovery
                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                    • Suspicious use of SetWindowsHookEx
                                                                                    PID:1640
                                                                                    • C:\Users\Admin\tzgem.exe
                                                                                      "C:\Users\Admin\tzgem.exe"
                                                                                      42⤵
                                                                                      • Executes dropped EXE
                                                                                      • System Location Discovery: System Language Discovery
                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                      PID:952
                                                                                      • C:\Users\Admin\cbvois.exe
                                                                                        "C:\Users\Admin\cbvois.exe"
                                                                                        43⤵
                                                                                        • Executes dropped EXE
                                                                                        • System Location Discovery: System Language Discovery
                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                        • Suspicious use of SetWindowsHookEx
                                                                                        PID:1872
                                                                                        • C:\Users\Admin\jiaguu.exe
                                                                                          "C:\Users\Admin\jiaguu.exe"
                                                                                          44⤵
                                                                                          • Executes dropped EXE
                                                                                          • System Location Discovery: System Language Discovery
                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                          • Suspicious use of SetWindowsHookEx
                                                                                          PID:556
                                                                                          • C:\Users\Admin\coasee.exe
                                                                                            "C:\Users\Admin\coasee.exe"
                                                                                            45⤵
                                                                                            • Executes dropped EXE
                                                                                            • System Location Discovery: System Language Discovery
                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                            • Suspicious use of SetWindowsHookEx
                                                                                            PID:1596
                                                                                            • C:\Users\Admin\biofut.exe
                                                                                              "C:\Users\Admin\biofut.exe"
                                                                                              46⤵
                                                                                              • Executes dropped EXE
                                                                                              • System Location Discovery: System Language Discovery
                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                              • Suspicious use of SetWindowsHookEx
                                                                                              PID:2264
                                                                                              • C:\Users\Admin\zpqeg.exe
                                                                                                "C:\Users\Admin\zpqeg.exe"
                                                                                                47⤵
                                                                                                • Executes dropped EXE
                                                                                                • System Location Discovery: System Language Discovery
                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                PID:2148
                                                                                                • C:\Users\Admin\dkqov.exe
                                                                                                  "C:\Users\Admin\dkqov.exe"
                                                                                                  48⤵
                                                                                                  • Executes dropped EXE
                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                  • Suspicious use of SetWindowsHookEx
                                                                                                  PID:2896
                                                                                                  • C:\Users\Admin\gofuk.exe
                                                                                                    "C:\Users\Admin\gofuk.exe"
                                                                                                    49⤵
                                                                                                    • Executes dropped EXE
                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                    • Suspicious use of SetWindowsHookEx
                                                                                                    PID:2628
                                                                                                    • C:\Users\Admin\wdyuis.exe
                                                                                                      "C:\Users\Admin\wdyuis.exe"
                                                                                                      50⤵
                                                                                                      • Executes dropped EXE
                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                                      PID:2600
                                                                                                      • C:\Users\Admin\xcnij.exe
                                                                                                        "C:\Users\Admin\xcnij.exe"
                                                                                                        51⤵
                                                                                                        • Executes dropped EXE
                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                                        • Suspicious use of SetWindowsHookEx
                                                                                                        PID:2724
                                                                                                        • C:\Users\Admin\ydmiew.exe
                                                                                                          "C:\Users\Admin\ydmiew.exe"
                                                                                                          52⤵
                                                                                                          • Executes dropped EXE
                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                                          • Suspicious use of SetWindowsHookEx
                                                                                                          PID:2384
                                                                                                          • C:\Users\Admin\puiyees.exe
                                                                                                            "C:\Users\Admin\puiyees.exe"
                                                                                                            53⤵
                                                                                                            • Executes dropped EXE
                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                                            • Suspicious use of SetWindowsHookEx
                                                                                                            PID:2544
                                                                                                            • C:\Users\Admin\biafot.exe
                                                                                                              "C:\Users\Admin\biafot.exe"
                                                                                                              54⤵
                                                                                                              • Executes dropped EXE
                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                                              • Suspicious use of SetWindowsHookEx
                                                                                                              PID:2244
                                                                                                              • C:\Users\Admin\zpfer.exe
                                                                                                                "C:\Users\Admin\zpfer.exe"
                                                                                                                55⤵
                                                                                                                • Executes dropped EXE
                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                                PID:2288
                                                                                                                • C:\Users\Admin\cbvois.exe
                                                                                                                  "C:\Users\Admin\cbvois.exe"
                                                                                                                  56⤵
                                                                                                                  • Executes dropped EXE
                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                                  • Suspicious use of SetWindowsHookEx
                                                                                                                  PID:2996
                                                                                                                  • C:\Users\Admin\koefaav.exe
                                                                                                                    "C:\Users\Admin\koefaav.exe"
                                                                                                                    57⤵
                                                                                                                    • Executes dropped EXE
                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                                    • Suspicious use of SetWindowsHookEx
                                                                                                                    PID:2984
                                                                                                                    • C:\Users\Admin\niasux.exe
                                                                                                                      "C:\Users\Admin\niasux.exe"
                                                                                                                      58⤵
                                                                                                                      • Executes dropped EXE
                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                                                      PID:1568
                                                                                                                      • C:\Users\Admin\kiehov.exe
                                                                                                                        "C:\Users\Admin\kiehov.exe"
                                                                                                                        59⤵
                                                                                                                        • Executes dropped EXE
                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                                                        • Suspicious use of SetWindowsHookEx
                                                                                                                        PID:1420
                                                                                                                        • C:\Users\Admin\diejaah.exe
                                                                                                                          "C:\Users\Admin\diejaah.exe"
                                                                                                                          60⤵
                                                                                                                          • Executes dropped EXE
                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                                                          • Suspicious use of SetWindowsHookEx
                                                                                                                          PID:356
                                                                                                                          • C:\Users\Admin\feodi.exe
                                                                                                                            "C:\Users\Admin\feodi.exe"
                                                                                                                            61⤵
                                                                                                                            • Executes dropped EXE
                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                                                            • Suspicious use of SetWindowsHookEx
                                                                                                                            PID:888
                                                                                                                            • C:\Users\Admin\yfnor.exe
                                                                                                                              "C:\Users\Admin\yfnor.exe"
                                                                                                                              62⤵
                                                                                                                              • Executes dropped EXE
                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                              • Suspicious use of SetWindowsHookEx
                                                                                                                              PID:1468

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\fltew.exe

    Filesize

    232KB

    MD5

    d58fec6cd34c0b4259581d54ae06b0df

    SHA1

    33e9e703084d03ddee06ed40ef8a012ca602d89f

    SHA256

    82578bbc26b6277bf2d05a5558798911739bbcda98d67d2da4b15655ba492147

    SHA512

    671953d3de6a0ceabc43807d880e714589aa42b7cb36a17c983ceebd9147c94ea99b58eb5b751f8728ee73fdaddb973fe1b63dea91508f0a6473baf983349f7b

  • C:\Users\Admin\moelaa.exe

    Filesize

    232KB

    MD5

    5f92ef6e40163507d1a81e3b7bcb91ea

    SHA1

    bc6694d924f54d7004b99fa0c70b3b2470a5b4ca

    SHA256

    99e22c75bce7f368eeb0351c773debe39dec244832e0238fce54f34bf5f6a97d

    SHA512

    995a12e409beeb5a170c2853fab98abdf5d45349516a6092b65a58f6781316b4a01e4dacaf8cc610f18940909a21307b05b5b4d00c9bc0e13d40d4e7c912eb51

  • C:\Users\Admin\ruidaaw.exe

    Filesize

    232KB

    MD5

    03d1860217712e9a5830bb5828660171

    SHA1

    e7723fcd382b7d464e543ea67c1e28379210da93

    SHA256

    950fc433c159dd70ebf205c4bbdc40f79434907dfcc05cfe3265d7c36580a273

    SHA512

    a2cbc6bed6bd21e68b2d873802bef34f96a958b39a6cf1e471c963e9bdd36332aa37292af22892a74ac02b9fa75fa50d8adb825b66db8795ee93382138c0cda9

  • \Users\Admin\caoopi.exe

    Filesize

    232KB

    MD5

    2de209e38249fa1d0bbe212bc9c1900f

    SHA1

    018c5ee924b7bc62e3903ca09ae2b4de7fe75b7d

    SHA256

    c7f1135a7e4fc92397d026ad5aa2a825a3e5ea3209b0701f53f298e170e9636e

    SHA512

    7b2cfc1e3a7ea3878bb31004ab5af65710e2b59aa424f7b6350c7df5cc3f88893071700e12a5284a677683ceef821efd35529991b567eb09f4cc71385ec296e6

  • \Users\Admin\ciuuxo.exe

    Filesize

    232KB

    MD5

    ed30699158b5e34ce5ff1e035808544f

    SHA1

    1f19415a4e46c7182962d3498b46e5f13d9812a3

    SHA256

    450122e544a9e26202b87ef4f6e9f4d16ffd79b54bd55e1749603eb2ba9bd868

    SHA512

    c614d829ff08f78eac036a96b30aba6f1777d66eec3a3ef6601cec6e1a9bb4ded502e13353cb96149b310f36707be9339e7825b93d7dfc83396a7439ee596a6f

  • \Users\Admin\daiije.exe

    Filesize

    232KB

    MD5

    36f5140798dd4a4078fa451f377de12d

    SHA1

    f49582a08122b7adfacc86c51b0144df3ad70afa

    SHA256

    922d26b2d9d8511156ec000c7bbae15b0e272f4e08bdba43c3b5cecb9b539652

    SHA512

    5c0026fbdbd80f7aed7c0aa61a8a2a239a8926454f5f431d7e2460e5a50207173f9319353883cb76dc7ed9a481335289b4c8f4aa47eab790f8eb3254b6e7281e

  • \Users\Admin\jgvex.exe

    Filesize

    232KB

    MD5

    bd21dcc1a53b0d31e1031cc03ad361f8

    SHA1

    e624b9139495e8c3db7049d1921a0e70e2ef6612

    SHA256

    51482a884ad5e58638d4c69228916cfdb85f3ce68702d67adac39845836897f3

    SHA512

    9309689819363be73a574fd26631be5a4011b774733564099ce3198578cdcea0d4b53ae44419212461c5ba33461f699641703cf4548663d4b99dfa601177f292

  • \Users\Admin\qoemaar.exe

    Filesize

    232KB

    MD5

    b7093214d7505044160c2aa8bf547609

    SHA1

    40c5d699ada6322709521dd515d27a830dbe2b64

    SHA256

    5e5598f380030daed412e822cb61302cef16d4d21174ff84194ee6ca18b4832b

    SHA512

    5f35b6c527732897c3702ed7726d856c09b134ab62673582074613493ae2c96af4b9082a40e5902987751bb108c0665899080d7dc4e4ae80259ac897db7d298d

  • \Users\Admin\qoizaaw.exe

    Filesize

    232KB

    MD5

    3515a2f0e073a13b5785977ea35a8821

    SHA1

    0cfec14ecd0c3949d076d6b04e0b23a266955b50

    SHA256

    a9b002f319ae774a69429faed04c172e0686313391e31e490a3ad124a0238656

    SHA512

    3f4f29ba99f0d447bd17606289cbad773899665c4c17513b78c345bb058c224649cde5ddf4688c1299784440408063e0bb61be2d46552c3c25a10290ba144d44

  • \Users\Admin\quric.exe

    Filesize

    232KB

    MD5

    febed0a38721fc7d98422e4a940240ed

    SHA1

    3e3429a12a4a749d92fdf5858e54ef99eb1c1832

    SHA256

    8603f2965e660493efffd6f1f522d3671a4fe46dce27496a9163d505d9eebbc9

    SHA512

    0f72ca060a55f3fb317ab5549de2cc3f1fda116362223e47d4af78b8eb4728737891fec693bc683381ecbe41c192a1b9af97c4efb58ad052a423d2fb0b1a6df3

  • \Users\Admin\svpor.exe

    Filesize

    232KB

    MD5

    a6c3a1fe11020187c2943c51cf6be0ad

    SHA1

    c89c3883c54a6017190d6b0d9e9ba8ea82f6f962

    SHA256

    712f0b66cdafcec4880343524b5b5ecf24ac542969b03ff2a2812b0f198c5132

    SHA512

    e815688b97304053bb83460a59e8773409b6ff446a569877509b10053380b8e18a1db0dfcc2a1c2bf23333b63e020f546e087506ad9b6bf2d0a9b2837b05cbc2

  • \Users\Admin\weaasoq.exe

    Filesize

    232KB

    MD5

    fbe2d8476d2df78d8283d3d92dbaee7d

    SHA1

    0ad2f77b119907fb52681218610a41ff0a6de764

    SHA256

    d3e59147e31436a8810e354adac14094e6ee49e9a4161340485596988d49767c

    SHA512

    a0961b54430ba85617ceaf38f744f76ca5da6b2d9877c26d191b0b769a8d732183396989b706e6c7aaa90b35f21e14167a684dc7a11c5817b3639e2f0fa0635a

  • \Users\Admin\wuqim.exe

    Filesize

    232KB

    MD5

    fa36fb086b897dbd26a1094e91646b44

    SHA1

    9511b4fc20fd55601acb4e0951f4714829189653

    SHA256

    2bcc50635d2740156b05bfccbea5e05347a75d10ad7d2f0aace9a616f1a27590

    SHA512

    cd749796c30dd6c205fb3094550d8c7a0e30084b41e178ccb99445e020aa819a9d719115250f5da2e62f2cf7e1e38df99ade8d624c9e1993606e3c22a89c5d61

  • \Users\Admin\xaobe.exe

    Filesize

    232KB

    MD5

    5e0eadf6988785bf17e5305d610c6e31

    SHA1

    25a3f27337f9f32082b8031cb8778fc38dffde79

    SHA256

    d42804496100075e1eaca9d6f6d8d36276196cb3152f87000f62a6049e52a2e1

    SHA512

    688d589a577df345cce3db3f075190a4690aaa4c4505f3b32f79c5db69259d5005096819b7aeef9c2a406470c57f4e5c6c7b291d57911e63af97a8447460106d

  • \Users\Admin\yoiiw.exe

    Filesize

    232KB

    MD5

    a3639425960e04933cc2d1c552f569fb

    SHA1

    bf4cbbf24bc871d7e210db4d3de9f73eeeb8f73d

    SHA256

    8c20d95dab27f780b1a686b37bc945bbb1b2ccf58f03b390a8631a65f3ed0568

    SHA512

    803f092e01571c54b08d7b274abdd3bc48a950ecca240ad276aafcaae0ed49df5c1d1b92f419ea1b83e528cd136ab8d05e13e8b88b5410498a9bcbeec97e813a

  • \Users\Admin\zeuur.exe

    Filesize

    232KB

    MD5

    eab9e7481d9489ed93ac36581f0e2161

    SHA1

    3bc00940183ccb123ad2a3ddb6483c136323ae7e

    SHA256

    1faa190a144a07433167d6720fb825f62321876d423d88a0db7cfe27f96293cb

    SHA512

    7cb4d84a67deb3dcecc55f302a9a3b44fce72f27635f94e32ed94eac7cb8524a7e07321381e2c60b912b943ba0ea3fe475194321ecf72cb0136aebc1dc528a94

  • memory/280-380-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/280-391-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/696-211-0x00000000038C0000-0x00000000038FA000-memory.dmp

    Filesize

    232KB

  • memory/696-204-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/696-219-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/984-392-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/984-400-0x00000000037A0000-0x00000000037DA000-memory.dmp

    Filesize

    232KB

  • memory/984-404-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/1056-492-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/1112-152-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/1112-159-0x00000000036C0000-0x00000000036FA000-memory.dmp

    Filesize

    232KB

  • memory/1112-165-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/1448-340-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/1448-339-0x0000000003860000-0x000000000389A000-memory.dmp

    Filesize

    232KB

  • memory/1448-327-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/1644-17-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/1644-30-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/1756-175-0x00000000038C0000-0x00000000038FA000-memory.dmp

    Filesize

    232KB

  • memory/1756-166-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/1756-182-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/1808-301-0x0000000003540000-0x000000000357A000-memory.dmp

    Filesize

    232KB

  • memory/1808-305-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/1808-297-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/1844-328-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/1844-315-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/1844-323-0x00000000038B0000-0x00000000038EA000-memory.dmp

    Filesize

    232KB

  • memory/1904-148-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/1904-132-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/1904-141-0x00000000038A0000-0x00000000038DA000-memory.dmp

    Filesize

    232KB

  • memory/1928-97-0x0000000003780000-0x00000000037BA000-memory.dmp

    Filesize

    232KB

  • memory/1928-99-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/1940-375-0x00000000038C0000-0x00000000038FA000-memory.dmp

    Filesize

    232KB

  • memory/1940-379-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/1940-369-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/1988-115-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/1988-130-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/1992-186-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/1992-200-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/1992-198-0x0000000003580000-0x00000000035BA000-memory.dmp

    Filesize

    232KB

  • memory/1992-197-0x0000000003580000-0x00000000035BA000-memory.dmp

    Filesize

    232KB

  • memory/2016-478-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/2016-474-0x0000000003790000-0x00000000037CA000-memory.dmp

    Filesize

    232KB

  • memory/2016-466-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/2024-118-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/2024-114-0x00000000038D0000-0x000000000390A000-memory.dmp

    Filesize

    232KB

  • memory/2024-98-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/2064-429-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/2064-417-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/2068-245-0x00000000038B0000-0x00000000038EA000-memory.dmp

    Filesize

    232KB

  • memory/2068-251-0x00000000038B0000-0x00000000038EA000-memory.dmp

    Filesize

    232KB

  • memory/2068-253-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/2068-234-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/2080-437-0x0000000003670000-0x00000000036AA000-memory.dmp

    Filesize

    232KB

  • memory/2080-441-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/2080-431-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/2396-302-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/2396-314-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/2492-296-0x0000000002A60000-0x0000000002A9A000-memory.dmp

    Filesize

    232KB

  • memory/2492-298-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/2492-284-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/2632-453-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/2632-465-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/2636-82-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/2636-75-0x00000000038B0000-0x00000000038EA000-memory.dmp

    Filesize

    232KB

  • memory/2636-66-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/2644-352-0x00000000038F0000-0x000000000392A000-memory.dmp

    Filesize

    232KB

  • memory/2644-341-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/2644-356-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/2668-406-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/2668-416-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/2724-65-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/2724-58-0x0000000003AE0000-0x0000000003B1A000-memory.dmp

    Filesize

    232KB

  • memory/2724-52-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/2752-49-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/2752-31-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/2752-41-0x0000000002DE0000-0x0000000002E1A000-memory.dmp

    Filesize

    232KB

  • memory/2752-50-0x0000000002DE0000-0x0000000002E1A000-memory.dmp

    Filesize

    232KB

  • memory/2760-283-0x00000000031B0000-0x00000000031EA000-memory.dmp

    Filesize

    232KB

  • memory/2760-490-0x0000000003AE0000-0x0000000003B1A000-memory.dmp

    Filesize

    232KB

  • memory/2760-479-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/2760-286-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/2760-271-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/2872-270-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/2872-252-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/2872-268-0x0000000003640000-0x000000000367A000-memory.dmp

    Filesize

    232KB

  • memory/2872-267-0x0000000003640000-0x000000000367A000-memory.dmp

    Filesize

    232KB

  • memory/2952-365-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/2952-353-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/2952-368-0x00000000037A0000-0x00000000037DA000-memory.dmp

    Filesize

    232KB

  • memory/3004-232-0x0000000003950000-0x000000000398A000-memory.dmp

    Filesize

    232KB

  • memory/3004-235-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/3004-233-0x0000000003950000-0x000000000398A000-memory.dmp

    Filesize

    232KB

  • memory/3028-442-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/3028-456-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/3048-0-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/3048-14-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB