Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
02/08/2024, 21:10
Static task
static1
Behavioral task
behavioral1
Sample
472d813dba35e575aa09cb43cb10bdc7df6119b07ca20f4860d52455c12f2473.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
472d813dba35e575aa09cb43cb10bdc7df6119b07ca20f4860d52455c12f2473.exe
Resource
win10v2004-20240802-en
General
-
Target
472d813dba35e575aa09cb43cb10bdc7df6119b07ca20f4860d52455c12f2473.exe
-
Size
232KB
-
MD5
d98fa51ed404b69bfc0d499856de17e2
-
SHA1
ec2441b30b8b418d7e78db21bc8dbc4d6726ed00
-
SHA256
472d813dba35e575aa09cb43cb10bdc7df6119b07ca20f4860d52455c12f2473
-
SHA512
8183d661c78eb1ffb16a41e7af02ccbb9752366421952195b2acbb015a5ca1664421ecb3e47e6af2c36277bd0576ec359db73f704737964af2201d0174da450c
-
SSDEEP
3072:GxGKVe6wFR92hCjG8G3GbGVGBGfGuGxGWYcrf6Kadk:GxHVde92AYcD6Kad
Malware Config
Signatures
-
Executes dropped EXE 61 IoCs
pid Process 1644 quric.exe 2752 xaobe.exe 2724 svpor.exe 2636 caoopi.exe 1928 qoemaar.exe 2024 jgvex.exe 1988 daiije.exe 1904 moelaa.exe 1112 yoiiw.exe 1756 qoizaaw.exe 1992 ciuuxo.exe 696 fltew.exe 3004 wuqim.exe 2068 weaasoq.exe 2872 zeuur.exe 2760 ruidaaw.exe 2492 yiuloo.exe 1808 pusik.exe 2396 qoemaar.exe 1844 hnjeow.exe 1448 taeex.exe 2644 wfpex.exe 2952 leapot.exe 1940 beodi.exe 280 lbwoah.exe 984 mauuye.exe 2668 geabin.exe 2064 kiuug.exe 2080 gofek.exe 3028 niasux.exe 2632 tbgum.exe 2016 wdyuis.exe 2760 kiejaav.exe 1056 daoocu.exe 1984 wdyuis.exe 1668 nauuv.exe 2996 svpor.exe 2936 roexad.exe 1792 leapit.exe 1640 pauuj.exe 952 tzgem.exe 1872 cbvois.exe 556 jiaguu.exe 1596 coasee.exe 2264 biofut.exe 2148 zpqeg.exe 2896 dkqov.exe 2628 gofuk.exe 2600 wdyuis.exe 2724 xcnij.exe 2384 ydmiew.exe 2544 puiyees.exe 2244 biafot.exe 2288 zpfer.exe 2996 cbvois.exe 2984 koefaav.exe 1568 niasux.exe 1420 kiehov.exe 356 diejaah.exe 888 feodi.exe 1468 yfnor.exe -
Loads dropped DLL 64 IoCs
pid Process 3048 472d813dba35e575aa09cb43cb10bdc7df6119b07ca20f4860d52455c12f2473.exe 3048 472d813dba35e575aa09cb43cb10bdc7df6119b07ca20f4860d52455c12f2473.exe 1644 quric.exe 1644 quric.exe 2752 xaobe.exe 2752 xaobe.exe 2724 svpor.exe 2724 svpor.exe 2636 caoopi.exe 2636 caoopi.exe 1928 qoemaar.exe 1928 qoemaar.exe 2024 jgvex.exe 2024 jgvex.exe 1988 daiije.exe 1988 daiije.exe 1904 moelaa.exe 1904 moelaa.exe 1112 yoiiw.exe 1112 yoiiw.exe 1756 qoizaaw.exe 1756 qoizaaw.exe 1992 ciuuxo.exe 1992 ciuuxo.exe 696 fltew.exe 696 fltew.exe 3004 wuqim.exe 3004 wuqim.exe 2068 weaasoq.exe 2068 weaasoq.exe 2872 zeuur.exe 2872 zeuur.exe 2760 ruidaaw.exe 2760 ruidaaw.exe 2492 yiuloo.exe 2492 yiuloo.exe 1808 pusik.exe 2396 qoemaar.exe 2396 qoemaar.exe 1844 hnjeow.exe 1844 hnjeow.exe 1448 taeex.exe 1448 taeex.exe 2644 wfpex.exe 2644 wfpex.exe 2952 leapot.exe 2952 leapot.exe 1940 beodi.exe 1940 beodi.exe 280 lbwoah.exe 280 lbwoah.exe 984 mauuye.exe 984 mauuye.exe 2668 geabin.exe 2668 geabin.exe 2064 kiuug.exe 2064 kiuug.exe 2080 gofek.exe 2080 gofek.exe 3028 niasux.exe 3028 niasux.exe 2632 tbgum.exe 2632 tbgum.exe 2016 wdyuis.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 62 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lbwoah.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language daoocu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language biafot.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xaobe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wuqim.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language niasux.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ciuuxo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qoemaar.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xcnij.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tbgum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dkqov.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gofuk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wdyuis.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language diejaah.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yfnor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language caoopi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wfpex.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language koefaav.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fltew.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language beodi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language quric.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language moelaa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language geabin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kiuug.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language biofut.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language feodi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yiuloo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hnjeow.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qoizaaw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language weaasoq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ruidaaw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wdyuis.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language roexad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cbvois.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 472d813dba35e575aa09cb43cb10bdc7df6119b07ca20f4860d52455c12f2473.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qoemaar.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svpor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yoiiw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nauuv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language puiyees.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language coasee.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ydmiew.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kiehov.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kiejaav.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jiaguu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language leapit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jgvex.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zeuur.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gofek.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wdyuis.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mauuye.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pauuj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pusik.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taeex.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zpqeg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language daiije.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tzgem.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language niasux.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cbvois.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zpfer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svpor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language leapot.exe -
Suspicious behavior: EnumeratesProcesses 61 IoCs
pid Process 3048 472d813dba35e575aa09cb43cb10bdc7df6119b07ca20f4860d52455c12f2473.exe 1644 quric.exe 2752 xaobe.exe 2724 svpor.exe 2636 caoopi.exe 1928 qoemaar.exe 2024 jgvex.exe 1988 daiije.exe 1904 moelaa.exe 1112 yoiiw.exe 1756 qoizaaw.exe 1992 ciuuxo.exe 696 fltew.exe 3004 wuqim.exe 2068 weaasoq.exe 2872 zeuur.exe 2760 ruidaaw.exe 2492 yiuloo.exe 1808 pusik.exe 2396 qoemaar.exe 1844 hnjeow.exe 1448 taeex.exe 2644 wfpex.exe 2952 leapot.exe 1940 beodi.exe 280 lbwoah.exe 984 mauuye.exe 2668 geabin.exe 2064 kiuug.exe 2080 gofek.exe 3028 niasux.exe 2632 tbgum.exe 2016 wdyuis.exe 2760 kiejaav.exe 1056 daoocu.exe 1984 wdyuis.exe 1668 nauuv.exe 2996 svpor.exe 2936 roexad.exe 1792 leapit.exe 1640 pauuj.exe 952 tzgem.exe 1872 cbvois.exe 556 jiaguu.exe 1596 coasee.exe 2264 biofut.exe 2148 zpqeg.exe 2896 dkqov.exe 2628 gofuk.exe 2600 wdyuis.exe 2724 xcnij.exe 2384 ydmiew.exe 2544 puiyees.exe 2244 biafot.exe 2288 zpfer.exe 2996 cbvois.exe 2984 koefaav.exe 1568 niasux.exe 1420 kiehov.exe 356 diejaah.exe 888 feodi.exe -
Suspicious use of SetWindowsHookEx 62 IoCs
pid Process 3048 472d813dba35e575aa09cb43cb10bdc7df6119b07ca20f4860d52455c12f2473.exe 1644 quric.exe 2752 xaobe.exe 2724 svpor.exe 2636 caoopi.exe 1928 qoemaar.exe 2024 jgvex.exe 1988 daiije.exe 1904 moelaa.exe 1112 yoiiw.exe 1756 qoizaaw.exe 1992 ciuuxo.exe 696 fltew.exe 3004 wuqim.exe 2068 weaasoq.exe 2872 zeuur.exe 2760 ruidaaw.exe 2492 yiuloo.exe 1808 pusik.exe 2396 qoemaar.exe 1844 hnjeow.exe 1448 taeex.exe 2644 wfpex.exe 2952 leapot.exe 1940 beodi.exe 280 lbwoah.exe 984 mauuye.exe 2668 geabin.exe 2064 kiuug.exe 2080 gofek.exe 3028 niasux.exe 2632 tbgum.exe 2016 wdyuis.exe 2760 kiejaav.exe 1056 daoocu.exe 1984 wdyuis.exe 1668 nauuv.exe 2996 svpor.exe 2936 roexad.exe 1792 leapit.exe 1640 pauuj.exe 952 tzgem.exe 1872 cbvois.exe 556 jiaguu.exe 1596 coasee.exe 2264 biofut.exe 2148 zpqeg.exe 2896 dkqov.exe 2628 gofuk.exe 2600 wdyuis.exe 2724 xcnij.exe 2384 ydmiew.exe 2544 puiyees.exe 2244 biafot.exe 2288 zpfer.exe 2996 cbvois.exe 2984 koefaav.exe 1568 niasux.exe 1420 kiehov.exe 356 diejaah.exe 888 feodi.exe 1468 yfnor.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3048 wrote to memory of 1644 3048 472d813dba35e575aa09cb43cb10bdc7df6119b07ca20f4860d52455c12f2473.exe 31 PID 3048 wrote to memory of 1644 3048 472d813dba35e575aa09cb43cb10bdc7df6119b07ca20f4860d52455c12f2473.exe 31 PID 3048 wrote to memory of 1644 3048 472d813dba35e575aa09cb43cb10bdc7df6119b07ca20f4860d52455c12f2473.exe 31 PID 3048 wrote to memory of 1644 3048 472d813dba35e575aa09cb43cb10bdc7df6119b07ca20f4860d52455c12f2473.exe 31 PID 1644 wrote to memory of 2752 1644 quric.exe 32 PID 1644 wrote to memory of 2752 1644 quric.exe 32 PID 1644 wrote to memory of 2752 1644 quric.exe 32 PID 1644 wrote to memory of 2752 1644 quric.exe 32 PID 2752 wrote to memory of 2724 2752 xaobe.exe 33 PID 2752 wrote to memory of 2724 2752 xaobe.exe 33 PID 2752 wrote to memory of 2724 2752 xaobe.exe 33 PID 2752 wrote to memory of 2724 2752 xaobe.exe 33 PID 2724 wrote to memory of 2636 2724 svpor.exe 34 PID 2724 wrote to memory of 2636 2724 svpor.exe 34 PID 2724 wrote to memory of 2636 2724 svpor.exe 34 PID 2724 wrote to memory of 2636 2724 svpor.exe 34 PID 2636 wrote to memory of 1928 2636 caoopi.exe 35 PID 2636 wrote to memory of 1928 2636 caoopi.exe 35 PID 2636 wrote to memory of 1928 2636 caoopi.exe 35 PID 2636 wrote to memory of 1928 2636 caoopi.exe 35 PID 1928 wrote to memory of 2024 1928 qoemaar.exe 36 PID 1928 wrote to memory of 2024 1928 qoemaar.exe 36 PID 1928 wrote to memory of 2024 1928 qoemaar.exe 36 PID 1928 wrote to memory of 2024 1928 qoemaar.exe 36 PID 2024 wrote to memory of 1988 2024 jgvex.exe 37 PID 2024 wrote to memory of 1988 2024 jgvex.exe 37 PID 2024 wrote to memory of 1988 2024 jgvex.exe 37 PID 2024 wrote to memory of 1988 2024 jgvex.exe 37 PID 1988 wrote to memory of 1904 1988 daiije.exe 38 PID 1988 wrote to memory of 1904 1988 daiije.exe 38 PID 1988 wrote to memory of 1904 1988 daiije.exe 38 PID 1988 wrote to memory of 1904 1988 daiije.exe 38 PID 1904 wrote to memory of 1112 1904 moelaa.exe 39 PID 1904 wrote to memory of 1112 1904 moelaa.exe 39 PID 1904 wrote to memory of 1112 1904 moelaa.exe 39 PID 1904 wrote to memory of 1112 1904 moelaa.exe 39 PID 1112 wrote to memory of 1756 1112 yoiiw.exe 40 PID 1112 wrote to memory of 1756 1112 yoiiw.exe 40 PID 1112 wrote to memory of 1756 1112 yoiiw.exe 40 PID 1112 wrote to memory of 1756 1112 yoiiw.exe 40 PID 1756 wrote to memory of 1992 1756 qoizaaw.exe 41 PID 1756 wrote to memory of 1992 1756 qoizaaw.exe 41 PID 1756 wrote to memory of 1992 1756 qoizaaw.exe 41 PID 1756 wrote to memory of 1992 1756 qoizaaw.exe 41 PID 1992 wrote to memory of 696 1992 ciuuxo.exe 42 PID 1992 wrote to memory of 696 1992 ciuuxo.exe 42 PID 1992 wrote to memory of 696 1992 ciuuxo.exe 42 PID 1992 wrote to memory of 696 1992 ciuuxo.exe 42 PID 696 wrote to memory of 3004 696 fltew.exe 43 PID 696 wrote to memory of 3004 696 fltew.exe 43 PID 696 wrote to memory of 3004 696 fltew.exe 43 PID 696 wrote to memory of 3004 696 fltew.exe 43 PID 3004 wrote to memory of 2068 3004 wuqim.exe 44 PID 3004 wrote to memory of 2068 3004 wuqim.exe 44 PID 3004 wrote to memory of 2068 3004 wuqim.exe 44 PID 3004 wrote to memory of 2068 3004 wuqim.exe 44 PID 2068 wrote to memory of 2872 2068 weaasoq.exe 45 PID 2068 wrote to memory of 2872 2068 weaasoq.exe 45 PID 2068 wrote to memory of 2872 2068 weaasoq.exe 45 PID 2068 wrote to memory of 2872 2068 weaasoq.exe 45 PID 2872 wrote to memory of 2760 2872 zeuur.exe 46 PID 2872 wrote to memory of 2760 2872 zeuur.exe 46 PID 2872 wrote to memory of 2760 2872 zeuur.exe 46 PID 2872 wrote to memory of 2760 2872 zeuur.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\472d813dba35e575aa09cb43cb10bdc7df6119b07ca20f4860d52455c12f2473.exe"C:\Users\Admin\AppData\Local\Temp\472d813dba35e575aa09cb43cb10bdc7df6119b07ca20f4860d52455c12f2473.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Users\Admin\quric.exe"C:\Users\Admin\quric.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Users\Admin\xaobe.exe"C:\Users\Admin\xaobe.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Users\Admin\svpor.exe"C:\Users\Admin\svpor.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Users\Admin\caoopi.exe"C:\Users\Admin\caoopi.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Users\Admin\qoemaar.exe"C:\Users\Admin\qoemaar.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Users\Admin\jgvex.exe"C:\Users\Admin\jgvex.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Users\Admin\daiije.exe"C:\Users\Admin\daiije.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Users\Admin\moelaa.exe"C:\Users\Admin\moelaa.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Users\Admin\yoiiw.exe"C:\Users\Admin\yoiiw.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Users\Admin\qoizaaw.exe"C:\Users\Admin\qoizaaw.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Users\Admin\ciuuxo.exe"C:\Users\Admin\ciuuxo.exe"12⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Users\Admin\fltew.exe"C:\Users\Admin\fltew.exe"13⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:696 -
C:\Users\Admin\wuqim.exe"C:\Users\Admin\wuqim.exe"14⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Users\Admin\weaasoq.exe"C:\Users\Admin\weaasoq.exe"15⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Users\Admin\zeuur.exe"C:\Users\Admin\zeuur.exe"16⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Users\Admin\ruidaaw.exe"C:\Users\Admin\ruidaaw.exe"17⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2760 -
C:\Users\Admin\yiuloo.exe"C:\Users\Admin\yiuloo.exe"18⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2492 -
C:\Users\Admin\pusik.exe"C:\Users\Admin\pusik.exe"19⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1808 -
C:\Users\Admin\qoemaar.exe"C:\Users\Admin\qoemaar.exe"20⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2396 -
C:\Users\Admin\hnjeow.exe"C:\Users\Admin\hnjeow.exe"21⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1844 -
C:\Users\Admin\taeex.exe"C:\Users\Admin\taeex.exe"22⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1448 -
C:\Users\Admin\wfpex.exe"C:\Users\Admin\wfpex.exe"23⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2644 -
C:\Users\Admin\leapot.exe"C:\Users\Admin\leapot.exe"24⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2952 -
C:\Users\Admin\beodi.exe"C:\Users\Admin\beodi.exe"25⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1940 -
C:\Users\Admin\lbwoah.exe"C:\Users\Admin\lbwoah.exe"26⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:280 -
C:\Users\Admin\mauuye.exe"C:\Users\Admin\mauuye.exe"27⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:984 -
C:\Users\Admin\geabin.exe"C:\Users\Admin\geabin.exe"28⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2668 -
C:\Users\Admin\kiuug.exe"C:\Users\Admin\kiuug.exe"29⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2064 -
C:\Users\Admin\gofek.exe"C:\Users\Admin\gofek.exe"30⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2080 -
C:\Users\Admin\niasux.exe"C:\Users\Admin\niasux.exe"31⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3028 -
C:\Users\Admin\tbgum.exe"C:\Users\Admin\tbgum.exe"32⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2632 -
C:\Users\Admin\wdyuis.exe"C:\Users\Admin\wdyuis.exe"33⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2016 -
C:\Users\Admin\kiejaav.exe"C:\Users\Admin\kiejaav.exe"34⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2760 -
C:\Users\Admin\daoocu.exe"C:\Users\Admin\daoocu.exe"35⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1056 -
C:\Users\Admin\wdyuis.exe"C:\Users\Admin\wdyuis.exe"36⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1984 -
C:\Users\Admin\nauuv.exe"C:\Users\Admin\nauuv.exe"37⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1668 -
C:\Users\Admin\svpor.exe"C:\Users\Admin\svpor.exe"38⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2996 -
C:\Users\Admin\roexad.exe"C:\Users\Admin\roexad.exe"39⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2936 -
C:\Users\Admin\leapit.exe"C:\Users\Admin\leapit.exe"40⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1792 -
C:\Users\Admin\pauuj.exe"C:\Users\Admin\pauuj.exe"41⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1640 -
C:\Users\Admin\tzgem.exe"C:\Users\Admin\tzgem.exe"42⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:952 -
C:\Users\Admin\cbvois.exe"C:\Users\Admin\cbvois.exe"43⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1872 -
C:\Users\Admin\jiaguu.exe"C:\Users\Admin\jiaguu.exe"44⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:556 -
C:\Users\Admin\coasee.exe"C:\Users\Admin\coasee.exe"45⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1596 -
C:\Users\Admin\biofut.exe"C:\Users\Admin\biofut.exe"46⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2264 -
C:\Users\Admin\zpqeg.exe"C:\Users\Admin\zpqeg.exe"47⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2148 -
C:\Users\Admin\dkqov.exe"C:\Users\Admin\dkqov.exe"48⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2896 -
C:\Users\Admin\gofuk.exe"C:\Users\Admin\gofuk.exe"49⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2628 -
C:\Users\Admin\wdyuis.exe"C:\Users\Admin\wdyuis.exe"50⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2600 -
C:\Users\Admin\xcnij.exe"C:\Users\Admin\xcnij.exe"51⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2724 -
C:\Users\Admin\ydmiew.exe"C:\Users\Admin\ydmiew.exe"52⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2384 -
C:\Users\Admin\puiyees.exe"C:\Users\Admin\puiyees.exe"53⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2544 -
C:\Users\Admin\biafot.exe"C:\Users\Admin\biafot.exe"54⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2244 -
C:\Users\Admin\zpfer.exe"C:\Users\Admin\zpfer.exe"55⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2288 -
C:\Users\Admin\cbvois.exe"C:\Users\Admin\cbvois.exe"56⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2996 -
C:\Users\Admin\koefaav.exe"C:\Users\Admin\koefaav.exe"57⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2984 -
C:\Users\Admin\niasux.exe"C:\Users\Admin\niasux.exe"58⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1568 -
C:\Users\Admin\kiehov.exe"C:\Users\Admin\kiehov.exe"59⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1420 -
C:\Users\Admin\diejaah.exe"C:\Users\Admin\diejaah.exe"60⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:356 -
C:\Users\Admin\feodi.exe"C:\Users\Admin\feodi.exe"61⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:888 -
C:\Users\Admin\yfnor.exe"C:\Users\Admin\yfnor.exe"62⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1468
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
232KB
MD5d58fec6cd34c0b4259581d54ae06b0df
SHA133e9e703084d03ddee06ed40ef8a012ca602d89f
SHA25682578bbc26b6277bf2d05a5558798911739bbcda98d67d2da4b15655ba492147
SHA512671953d3de6a0ceabc43807d880e714589aa42b7cb36a17c983ceebd9147c94ea99b58eb5b751f8728ee73fdaddb973fe1b63dea91508f0a6473baf983349f7b
-
Filesize
232KB
MD55f92ef6e40163507d1a81e3b7bcb91ea
SHA1bc6694d924f54d7004b99fa0c70b3b2470a5b4ca
SHA25699e22c75bce7f368eeb0351c773debe39dec244832e0238fce54f34bf5f6a97d
SHA512995a12e409beeb5a170c2853fab98abdf5d45349516a6092b65a58f6781316b4a01e4dacaf8cc610f18940909a21307b05b5b4d00c9bc0e13d40d4e7c912eb51
-
Filesize
232KB
MD503d1860217712e9a5830bb5828660171
SHA1e7723fcd382b7d464e543ea67c1e28379210da93
SHA256950fc433c159dd70ebf205c4bbdc40f79434907dfcc05cfe3265d7c36580a273
SHA512a2cbc6bed6bd21e68b2d873802bef34f96a958b39a6cf1e471c963e9bdd36332aa37292af22892a74ac02b9fa75fa50d8adb825b66db8795ee93382138c0cda9
-
Filesize
232KB
MD52de209e38249fa1d0bbe212bc9c1900f
SHA1018c5ee924b7bc62e3903ca09ae2b4de7fe75b7d
SHA256c7f1135a7e4fc92397d026ad5aa2a825a3e5ea3209b0701f53f298e170e9636e
SHA5127b2cfc1e3a7ea3878bb31004ab5af65710e2b59aa424f7b6350c7df5cc3f88893071700e12a5284a677683ceef821efd35529991b567eb09f4cc71385ec296e6
-
Filesize
232KB
MD5ed30699158b5e34ce5ff1e035808544f
SHA11f19415a4e46c7182962d3498b46e5f13d9812a3
SHA256450122e544a9e26202b87ef4f6e9f4d16ffd79b54bd55e1749603eb2ba9bd868
SHA512c614d829ff08f78eac036a96b30aba6f1777d66eec3a3ef6601cec6e1a9bb4ded502e13353cb96149b310f36707be9339e7825b93d7dfc83396a7439ee596a6f
-
Filesize
232KB
MD536f5140798dd4a4078fa451f377de12d
SHA1f49582a08122b7adfacc86c51b0144df3ad70afa
SHA256922d26b2d9d8511156ec000c7bbae15b0e272f4e08bdba43c3b5cecb9b539652
SHA5125c0026fbdbd80f7aed7c0aa61a8a2a239a8926454f5f431d7e2460e5a50207173f9319353883cb76dc7ed9a481335289b4c8f4aa47eab790f8eb3254b6e7281e
-
Filesize
232KB
MD5bd21dcc1a53b0d31e1031cc03ad361f8
SHA1e624b9139495e8c3db7049d1921a0e70e2ef6612
SHA25651482a884ad5e58638d4c69228916cfdb85f3ce68702d67adac39845836897f3
SHA5129309689819363be73a574fd26631be5a4011b774733564099ce3198578cdcea0d4b53ae44419212461c5ba33461f699641703cf4548663d4b99dfa601177f292
-
Filesize
232KB
MD5b7093214d7505044160c2aa8bf547609
SHA140c5d699ada6322709521dd515d27a830dbe2b64
SHA2565e5598f380030daed412e822cb61302cef16d4d21174ff84194ee6ca18b4832b
SHA5125f35b6c527732897c3702ed7726d856c09b134ab62673582074613493ae2c96af4b9082a40e5902987751bb108c0665899080d7dc4e4ae80259ac897db7d298d
-
Filesize
232KB
MD53515a2f0e073a13b5785977ea35a8821
SHA10cfec14ecd0c3949d076d6b04e0b23a266955b50
SHA256a9b002f319ae774a69429faed04c172e0686313391e31e490a3ad124a0238656
SHA5123f4f29ba99f0d447bd17606289cbad773899665c4c17513b78c345bb058c224649cde5ddf4688c1299784440408063e0bb61be2d46552c3c25a10290ba144d44
-
Filesize
232KB
MD5febed0a38721fc7d98422e4a940240ed
SHA13e3429a12a4a749d92fdf5858e54ef99eb1c1832
SHA2568603f2965e660493efffd6f1f522d3671a4fe46dce27496a9163d505d9eebbc9
SHA5120f72ca060a55f3fb317ab5549de2cc3f1fda116362223e47d4af78b8eb4728737891fec693bc683381ecbe41c192a1b9af97c4efb58ad052a423d2fb0b1a6df3
-
Filesize
232KB
MD5a6c3a1fe11020187c2943c51cf6be0ad
SHA1c89c3883c54a6017190d6b0d9e9ba8ea82f6f962
SHA256712f0b66cdafcec4880343524b5b5ecf24ac542969b03ff2a2812b0f198c5132
SHA512e815688b97304053bb83460a59e8773409b6ff446a569877509b10053380b8e18a1db0dfcc2a1c2bf23333b63e020f546e087506ad9b6bf2d0a9b2837b05cbc2
-
Filesize
232KB
MD5fbe2d8476d2df78d8283d3d92dbaee7d
SHA10ad2f77b119907fb52681218610a41ff0a6de764
SHA256d3e59147e31436a8810e354adac14094e6ee49e9a4161340485596988d49767c
SHA512a0961b54430ba85617ceaf38f744f76ca5da6b2d9877c26d191b0b769a8d732183396989b706e6c7aaa90b35f21e14167a684dc7a11c5817b3639e2f0fa0635a
-
Filesize
232KB
MD5fa36fb086b897dbd26a1094e91646b44
SHA19511b4fc20fd55601acb4e0951f4714829189653
SHA2562bcc50635d2740156b05bfccbea5e05347a75d10ad7d2f0aace9a616f1a27590
SHA512cd749796c30dd6c205fb3094550d8c7a0e30084b41e178ccb99445e020aa819a9d719115250f5da2e62f2cf7e1e38df99ade8d624c9e1993606e3c22a89c5d61
-
Filesize
232KB
MD55e0eadf6988785bf17e5305d610c6e31
SHA125a3f27337f9f32082b8031cb8778fc38dffde79
SHA256d42804496100075e1eaca9d6f6d8d36276196cb3152f87000f62a6049e52a2e1
SHA512688d589a577df345cce3db3f075190a4690aaa4c4505f3b32f79c5db69259d5005096819b7aeef9c2a406470c57f4e5c6c7b291d57911e63af97a8447460106d
-
Filesize
232KB
MD5a3639425960e04933cc2d1c552f569fb
SHA1bf4cbbf24bc871d7e210db4d3de9f73eeeb8f73d
SHA2568c20d95dab27f780b1a686b37bc945bbb1b2ccf58f03b390a8631a65f3ed0568
SHA512803f092e01571c54b08d7b274abdd3bc48a950ecca240ad276aafcaae0ed49df5c1d1b92f419ea1b83e528cd136ab8d05e13e8b88b5410498a9bcbeec97e813a
-
Filesize
232KB
MD5eab9e7481d9489ed93ac36581f0e2161
SHA13bc00940183ccb123ad2a3ddb6483c136323ae7e
SHA2561faa190a144a07433167d6720fb825f62321876d423d88a0db7cfe27f96293cb
SHA5127cb4d84a67deb3dcecc55f302a9a3b44fce72f27635f94e32ed94eac7cb8524a7e07321381e2c60b912b943ba0ea3fe475194321ecf72cb0136aebc1dc528a94