Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05/08/2024, 18:22
Static task
static1
Behavioral task
behavioral1
Sample
bec64165dc35dda50d80845270f7d3b0N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
bec64165dc35dda50d80845270f7d3b0N.exe
Resource
win10v2004-20240802-en
General
-
Target
bec64165dc35dda50d80845270f7d3b0N.exe
-
Size
124KB
-
MD5
bec64165dc35dda50d80845270f7d3b0
-
SHA1
32480416f34d574b94134d91f9ce1d271ec33092
-
SHA256
bfe706715ff9115db60a4ea5d01a3812223d8497c554cea0a1c56d283f2620ec
-
SHA512
52326f12babafd59f7780cb623bdb8a7fecb5c60c1590b0cfa7029dd7d3ac0b450fbe7afb173720702ca22460e6c027a6860592e1ad435fe1f04661696ff9b8f
-
SSDEEP
1536:g2szt5YOckhhRO/N69BH3OoGa+FL9jKceRgrkjSo:1G7YOckhhkFoN3Oo1+F92S
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 34 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" puinix.exe Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" jiairip.exe Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" seoenib.exe Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" joicua.exe Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" caicu.exe Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" waeye.exe Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" cozek.exe Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" laiaze.exe Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" zeaqeoj.exe Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" moeafa.exe Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" qiayif.exe Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" jkqod.exe Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" jioiz.exe Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" wiais.exe Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" gounioz.exe Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" bec64165dc35dda50d80845270f7d3b0N.exe Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" supus.exe Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" woaba.exe Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" puuuri.exe Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" redof.exe Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" feoxip.exe Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" soxal.exe Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" laqep.exe Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" boipoug.exe Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" cupew.exe Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" xchob.exe Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" koailo.exe Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" duufe.exe Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" zoeahul.exe Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" diuido.exe Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" qiuil.exe Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" muuqait.exe Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" biaaz.exe Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" jwteeg.exe -
Checks computer location settings 2 TTPs 34 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation boipoug.exe Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation cupew.exe Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation puuuri.exe Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation redof.exe Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation qiayif.exe Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation supus.exe Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation soxal.exe Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation joicua.exe Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation feoxip.exe Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation moeafa.exe Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation zeaqeoj.exe Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation wiais.exe Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation xchob.exe Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation koailo.exe Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation bec64165dc35dda50d80845270f7d3b0N.exe Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation seoenib.exe Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation puinix.exe Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation qiuil.exe Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation duufe.exe Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation diuido.exe Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation woaba.exe Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation muuqait.exe Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation zoeahul.exe Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation jioiz.exe Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation laqep.exe Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation laiaze.exe Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation jkqod.exe Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation caicu.exe Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation jwteeg.exe Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation gounioz.exe Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation cozek.exe Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation biaaz.exe Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation jiairip.exe Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation waeye.exe -
Executes dropped EXE 34 IoCs
pid Process 3972 duufe.exe 880 cozek.exe 1500 muuqait.exe 2476 qiayif.exe 2176 zoeahul.exe 3684 feoxip.exe 3872 supus.exe 3256 seoenib.exe 2580 diuido.exe 2756 jkqod.exe 4400 jioiz.exe 3168 soxal.exe 1988 moeafa.exe 548 joicua.exe 3468 biaaz.exe 1440 laqep.exe 5080 boipoug.exe 1092 cupew.exe 1156 caicu.exe 2692 puinix.exe 2264 woaba.exe 212 jwteeg.exe 520 gounioz.exe 2408 jiairip.exe 3208 laiaze.exe 3860 qiuil.exe 3516 zeaqeoj.exe 2416 puuuri.exe 4372 wiais.exe 452 xchob.exe 844 koailo.exe 2360 waeye.exe 2312 redof.exe 2588 lmtix.exe -
Adds Run key to start application 2 TTPs 34 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qiayif = "C:\\Users\\Admin\\qiayif.exe /F" muuqait.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jiairip = "C:\\Users\\Admin\\jiairip.exe /n" gounioz.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\koailo = "C:\\Users\\Admin\\koailo.exe /K" xchob.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\redof = "C:\\Users\\Admin\\redof.exe /G" waeye.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lmtix = "C:\\Users\\Admin\\lmtix.exe /s" redof.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\duufe = "C:\\Users\\Admin\\duufe.exe /C" bec64165dc35dda50d80845270f7d3b0N.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\feoxip = "C:\\Users\\Admin\\feoxip.exe /y" zoeahul.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\joicua = "C:\\Users\\Admin\\joicua.exe /D" moeafa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puinix = "C:\\Users\\Admin\\puinix.exe /d" caicu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\muuqait = "C:\\Users\\Admin\\muuqait.exe /L" cozek.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jioiz = "C:\\Users\\Admin\\jioiz.exe /N" jkqod.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woaba = "C:\\Users\\Admin\\woaba.exe /I" puinix.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jwteeg = "C:\\Users\\Admin\\jwteeg.exe /S" woaba.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puuuri = "C:\\Users\\Admin\\puuuri.exe /j" zeaqeoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\waeye = "C:\\Users\\Admin\\waeye.exe /a" koailo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zeaqeoj = "C:\\Users\\Admin\\zeaqeoj.exe /n" qiuil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jkqod = "C:\\Users\\Admin\\jkqod.exe /q" diuido.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\soxal = "C:\\Users\\Admin\\soxal.exe /X" jioiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\boipoug = "C:\\Users\\Admin\\boipoug.exe /T" laqep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zoeahul = "C:\\Users\\Admin\\zoeahul.exe /b" qiayif.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\supus = "C:\\Users\\Admin\\supus.exe /e" feoxip.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seoenib = "C:\\Users\\Admin\\seoenib.exe /L" supus.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\diuido = "C:\\Users\\Admin\\diuido.exe /p" seoenib.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\moeafa = "C:\\Users\\Admin\\moeafa.exe /o" soxal.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\caicu = "C:\\Users\\Admin\\caicu.exe /C" cupew.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\biaaz = "C:\\Users\\Admin\\biaaz.exe /M" joicua.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gounioz = "C:\\Users\\Admin\\gounioz.exe /G" jwteeg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\laiaze = "C:\\Users\\Admin\\laiaze.exe /F" jiairip.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qiuil = "C:\\Users\\Admin\\qiuil.exe /V" laiaze.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cozek = "C:\\Users\\Admin\\cozek.exe /I" duufe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\laqep = "C:\\Users\\Admin\\laqep.exe /C" biaaz.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cupew = "C:\\Users\\Admin\\cupew.exe /w" boipoug.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wiais = "C:\\Users\\Admin\\wiais.exe /W" puuuri.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xchob = "C:\\Users\\Admin\\xchob.exe /e" wiais.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 35 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zeaqeoj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xchob.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language waeye.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language redof.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qiuil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lmtix.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language duufe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language seoenib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language soxal.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language woaba.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language muuqait.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language biaaz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language laiaze.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bec64165dc35dda50d80845270f7d3b0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jioiz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cupew.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jiairip.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language diuido.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jkqod.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language boipoug.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gounioz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cozek.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qiayif.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zoeahul.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language feoxip.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language moeafa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language puuuri.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wiais.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language koailo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language supus.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language laqep.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jwteeg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language joicua.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language caicu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language puinix.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5024 bec64165dc35dda50d80845270f7d3b0N.exe 5024 bec64165dc35dda50d80845270f7d3b0N.exe 3972 duufe.exe 3972 duufe.exe 880 cozek.exe 880 cozek.exe 1500 muuqait.exe 1500 muuqait.exe 2476 qiayif.exe 2476 qiayif.exe 2176 zoeahul.exe 2176 zoeahul.exe 3684 feoxip.exe 3684 feoxip.exe 3872 supus.exe 3872 supus.exe 3256 seoenib.exe 3256 seoenib.exe 2580 diuido.exe 2580 diuido.exe 2756 jkqod.exe 2756 jkqod.exe 4400 jioiz.exe 4400 jioiz.exe 3168 soxal.exe 3168 soxal.exe 1988 moeafa.exe 1988 moeafa.exe 548 joicua.exe 548 joicua.exe 3468 biaaz.exe 3468 biaaz.exe 1440 laqep.exe 1440 laqep.exe 5080 boipoug.exe 5080 boipoug.exe 1092 cupew.exe 1092 cupew.exe 1156 caicu.exe 1156 caicu.exe 2692 puinix.exe 2692 puinix.exe 2264 woaba.exe 2264 woaba.exe 212 jwteeg.exe 212 jwteeg.exe 520 gounioz.exe 520 gounioz.exe 2408 jiairip.exe 2408 jiairip.exe 3208 laiaze.exe 3208 laiaze.exe 3860 qiuil.exe 3860 qiuil.exe 3516 zeaqeoj.exe 3516 zeaqeoj.exe 2416 puuuri.exe 2416 puuuri.exe 4372 wiais.exe 4372 wiais.exe 452 xchob.exe 452 xchob.exe 844 koailo.exe 844 koailo.exe -
Suspicious use of SetWindowsHookEx 35 IoCs
pid Process 5024 bec64165dc35dda50d80845270f7d3b0N.exe 3972 duufe.exe 880 cozek.exe 1500 muuqait.exe 2476 qiayif.exe 2176 zoeahul.exe 3684 feoxip.exe 3872 supus.exe 3256 seoenib.exe 2580 diuido.exe 2756 jkqod.exe 4400 jioiz.exe 3168 soxal.exe 1988 moeafa.exe 548 joicua.exe 3468 biaaz.exe 1440 laqep.exe 5080 boipoug.exe 1092 cupew.exe 1156 caicu.exe 2692 puinix.exe 2264 woaba.exe 212 jwteeg.exe 520 gounioz.exe 2408 jiairip.exe 3208 laiaze.exe 3860 qiuil.exe 3516 zeaqeoj.exe 2416 puuuri.exe 4372 wiais.exe 452 xchob.exe 844 koailo.exe 2360 waeye.exe 2312 redof.exe 2588 lmtix.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5024 wrote to memory of 3972 5024 bec64165dc35dda50d80845270f7d3b0N.exe 88 PID 5024 wrote to memory of 3972 5024 bec64165dc35dda50d80845270f7d3b0N.exe 88 PID 5024 wrote to memory of 3972 5024 bec64165dc35dda50d80845270f7d3b0N.exe 88 PID 3972 wrote to memory of 880 3972 duufe.exe 89 PID 3972 wrote to memory of 880 3972 duufe.exe 89 PID 3972 wrote to memory of 880 3972 duufe.exe 89 PID 880 wrote to memory of 1500 880 cozek.exe 90 PID 880 wrote to memory of 1500 880 cozek.exe 90 PID 880 wrote to memory of 1500 880 cozek.exe 90 PID 1500 wrote to memory of 2476 1500 muuqait.exe 91 PID 1500 wrote to memory of 2476 1500 muuqait.exe 91 PID 1500 wrote to memory of 2476 1500 muuqait.exe 91 PID 2476 wrote to memory of 2176 2476 qiayif.exe 92 PID 2476 wrote to memory of 2176 2476 qiayif.exe 92 PID 2476 wrote to memory of 2176 2476 qiayif.exe 92 PID 2176 wrote to memory of 3684 2176 zoeahul.exe 93 PID 2176 wrote to memory of 3684 2176 zoeahul.exe 93 PID 2176 wrote to memory of 3684 2176 zoeahul.exe 93 PID 3684 wrote to memory of 3872 3684 feoxip.exe 94 PID 3684 wrote to memory of 3872 3684 feoxip.exe 94 PID 3684 wrote to memory of 3872 3684 feoxip.exe 94 PID 3872 wrote to memory of 3256 3872 supus.exe 95 PID 3872 wrote to memory of 3256 3872 supus.exe 95 PID 3872 wrote to memory of 3256 3872 supus.exe 95 PID 3256 wrote to memory of 2580 3256 seoenib.exe 100 PID 3256 wrote to memory of 2580 3256 seoenib.exe 100 PID 3256 wrote to memory of 2580 3256 seoenib.exe 100 PID 2580 wrote to memory of 2756 2580 diuido.exe 101 PID 2580 wrote to memory of 2756 2580 diuido.exe 101 PID 2580 wrote to memory of 2756 2580 diuido.exe 101 PID 2756 wrote to memory of 4400 2756 jkqod.exe 102 PID 2756 wrote to memory of 4400 2756 jkqod.exe 102 PID 2756 wrote to memory of 4400 2756 jkqod.exe 102 PID 4400 wrote to memory of 3168 4400 jioiz.exe 103 PID 4400 wrote to memory of 3168 4400 jioiz.exe 103 PID 4400 wrote to memory of 3168 4400 jioiz.exe 103 PID 3168 wrote to memory of 1988 3168 soxal.exe 104 PID 3168 wrote to memory of 1988 3168 soxal.exe 104 PID 3168 wrote to memory of 1988 3168 soxal.exe 104 PID 1988 wrote to memory of 548 1988 moeafa.exe 105 PID 1988 wrote to memory of 548 1988 moeafa.exe 105 PID 1988 wrote to memory of 548 1988 moeafa.exe 105 PID 548 wrote to memory of 3468 548 joicua.exe 106 PID 548 wrote to memory of 3468 548 joicua.exe 106 PID 548 wrote to memory of 3468 548 joicua.exe 106 PID 3468 wrote to memory of 1440 3468 biaaz.exe 107 PID 3468 wrote to memory of 1440 3468 biaaz.exe 107 PID 3468 wrote to memory of 1440 3468 biaaz.exe 107 PID 1440 wrote to memory of 5080 1440 laqep.exe 108 PID 1440 wrote to memory of 5080 1440 laqep.exe 108 PID 1440 wrote to memory of 5080 1440 laqep.exe 108 PID 5080 wrote to memory of 1092 5080 boipoug.exe 109 PID 5080 wrote to memory of 1092 5080 boipoug.exe 109 PID 5080 wrote to memory of 1092 5080 boipoug.exe 109 PID 1092 wrote to memory of 1156 1092 cupew.exe 110 PID 1092 wrote to memory of 1156 1092 cupew.exe 110 PID 1092 wrote to memory of 1156 1092 cupew.exe 110 PID 1156 wrote to memory of 2692 1156 caicu.exe 111 PID 1156 wrote to memory of 2692 1156 caicu.exe 111 PID 1156 wrote to memory of 2692 1156 caicu.exe 111 PID 2692 wrote to memory of 2264 2692 puinix.exe 112 PID 2692 wrote to memory of 2264 2692 puinix.exe 112 PID 2692 wrote to memory of 2264 2692 puinix.exe 112 PID 2264 wrote to memory of 212 2264 woaba.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\bec64165dc35dda50d80845270f7d3b0N.exe"C:\Users\Admin\AppData\Local\Temp\bec64165dc35dda50d80845270f7d3b0N.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5024 -
C:\Users\Admin\duufe.exe"C:\Users\Admin\duufe.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3972 -
C:\Users\Admin\cozek.exe"C:\Users\Admin\cozek.exe"3⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Users\Admin\muuqait.exe"C:\Users\Admin\muuqait.exe"4⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Users\Admin\qiayif.exe"C:\Users\Admin\qiayif.exe"5⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Users\Admin\zoeahul.exe"C:\Users\Admin\zoeahul.exe"6⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Users\Admin\feoxip.exe"C:\Users\Admin\feoxip.exe"7⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3684 -
C:\Users\Admin\supus.exe"C:\Users\Admin\supus.exe"8⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3872 -
C:\Users\Admin\seoenib.exe"C:\Users\Admin\seoenib.exe"9⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3256 -
C:\Users\Admin\diuido.exe"C:\Users\Admin\diuido.exe"10⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Users\Admin\jkqod.exe"C:\Users\Admin\jkqod.exe"11⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Users\Admin\jioiz.exe"C:\Users\Admin\jioiz.exe"12⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4400 -
C:\Users\Admin\soxal.exe"C:\Users\Admin\soxal.exe"13⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3168 -
C:\Users\Admin\moeafa.exe"C:\Users\Admin\moeafa.exe"14⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Users\Admin\joicua.exe"C:\Users\Admin\joicua.exe"15⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:548 -
C:\Users\Admin\biaaz.exe"C:\Users\Admin\biaaz.exe"16⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3468 -
C:\Users\Admin\laqep.exe"C:\Users\Admin\laqep.exe"17⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Users\Admin\boipoug.exe"C:\Users\Admin\boipoug.exe"18⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\Users\Admin\cupew.exe"C:\Users\Admin\cupew.exe"19⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Users\Admin\caicu.exe"C:\Users\Admin\caicu.exe"20⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Users\Admin\puinix.exe"C:\Users\Admin\puinix.exe"21⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Users\Admin\woaba.exe"C:\Users\Admin\woaba.exe"22⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Users\Admin\jwteeg.exe"C:\Users\Admin\jwteeg.exe"23⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:212 -
C:\Users\Admin\gounioz.exe"C:\Users\Admin\gounioz.exe"24⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:520 -
C:\Users\Admin\jiairip.exe"C:\Users\Admin\jiairip.exe"25⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2408 -
C:\Users\Admin\laiaze.exe"C:\Users\Admin\laiaze.exe"26⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3208 -
C:\Users\Admin\qiuil.exe"C:\Users\Admin\qiuil.exe"27⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3860 -
C:\Users\Admin\zeaqeoj.exe"C:\Users\Admin\zeaqeoj.exe"28⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3516 -
C:\Users\Admin\puuuri.exe"C:\Users\Admin\puuuri.exe"29⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2416 -
C:\Users\Admin\wiais.exe"C:\Users\Admin\wiais.exe"30⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4372 -
C:\Users\Admin\xchob.exe"C:\Users\Admin\xchob.exe"31⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:452 -
C:\Users\Admin\koailo.exe"C:\Users\Admin\koailo.exe"32⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:844 -
C:\Users\Admin\waeye.exe"C:\Users\Admin\waeye.exe"33⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2360 -
C:\Users\Admin\redof.exe"C:\Users\Admin\redof.exe"34⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2312 -
C:\Users\Admin\lmtix.exe"C:\Users\Admin\lmtix.exe"35⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2588
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
124KB
MD554a9189278c705a10604b4a554130929
SHA184b65c1d1b9c638db8f3eb25500fdbc339e39862
SHA256eeb327c6e4d86f72ac5f9236a5b8f981c80e86cae67951d1a1a9139d5b6f4d79
SHA512206b5a61702613b7a7ad4711743528cf9e810ace82754a4de9a5f7ea1e10617817762dca6225bd5d6ccc7142cb21bffb190e936a89ff05e9e172ed5af7fb3d06
-
Filesize
124KB
MD5c443f861ef7ecd6aa4b3b8f14cb9eb7f
SHA181eb13fa25419d713b631d6373a8bfeb85f6a99e
SHA256a67c8cf0d857f68d240464444465f928549a3abf03855b8555da990fd6e39afe
SHA512d9b99c61f5bfdba32ce91fd0b5dc5ef14b5afc8696ad25ed95e3ebdfe639b54af6eaed60eab83bac3dd3a188dd205b7bc993bb9ae1b08ee45348919cb75452fb
-
Filesize
124KB
MD5998fbbb2598b494d2d38370e8f1b9c92
SHA118ef7aa8fd6f11924a9731980c88408fb4bdbb47
SHA256d012e0f31050c0a50126670292cd0a560535bd943f0b4b2434f4ea3d9f2331b2
SHA5121a4f485286b8f5ad97ff51ecfde3fcdd289086153ebc7cfc02aa748f12333306861c456f134f31958a8833fa95f9e3adef02d2a7dcf9e8c5f43394a7d8253331
-
Filesize
124KB
MD5a28dc8247bb1e704605b2ea346f379dc
SHA13e1bb35063bae2671b3801ced9a52199f0f9d232
SHA256ee7fcaa12c94d60169304eacf03adf8c747cdc5322a17aa30f997d9712109126
SHA5123fa0fbb7401180a6b1fa95d43608aeebfa28e43ce7b0b9747362e0bf135c20851bf067ec5618d0304a209401a97e2d231e19aa3874d43023807f70b49399b2c4
-
Filesize
124KB
MD557ea5c3004dccd36d018b5a37d463d9f
SHA1b0ec860be9dc4eb3c11b64118ef3f5026fd92438
SHA2569856e45b78ce9da22114bbf917f35d29fa0f066662d47767a510173bd5628fb5
SHA5123eb3b47def38a131f096a7be6ee5c3de0afa7d05b76c00bdc19c357043e0932e1c509ac959d9434f9a7b95938d044d3488c834cd0cc43d52fdaa396a93799f3d
-
Filesize
124KB
MD5c54d8f566877e07e641d9c7742bdbaf2
SHA157d57cddfe2aa3c934e5b11cb90ca9a3f9994894
SHA256b2623c458b74a7f07536dad384f5b5316fa43dac5c726a5fdb4cd5418b257ab4
SHA5120575f38eb19503efa8bf2c9b690c93dbabe150d62fdbc08b156b9e3b86fb7ba512a64818a71cbefb099d0817f56307edf16e4dd0a312f66fd758b2b48f2a27db
-
Filesize
124KB
MD55b14b5e22d4ac43f7af95a27745a83bf
SHA148fd0720e86796bd5d654ae78f55a325d984f22d
SHA256b739a10186c30ba42c4350a271c181154fb3ae0c658dd684f1e92a7ccf435c50
SHA51295fe1606e4e68facd0dc2285c53274ad698eac72b27692cae2543f13724b0e79c879869ef8612148cdd4ca69dee255440d23d11144217a2f5596cc4f8f1187b6
-
Filesize
124KB
MD58e87ed0b2dbdf589d7db22cb7691397f
SHA10e31b3dde041768540988db23118033fcdc49b59
SHA256e351452dd498fbb3e7195bed0973e34ec23efb1830d4d911dfaf6c22f85bd3a2
SHA512be54c5c9e055a8c54734ee0b80c6310d2afdcf27a7b67ad6ce5f8c1329b42bbe5b9af2cd068e1546b9d835f16fc4d7aa04188a73c404507de8134ae9bf9f2c39
-
Filesize
124KB
MD59681e1e496b0fd41e7fbe9e289cc7791
SHA124042e16da182cbebe21afbdb5c1d846c2cd5dbd
SHA2562ad8ed49368c2a3b21d54e3f773290df98ca587346e023cf927c010379d61890
SHA51222e4a42ef43d353e6570fa728b9e3c3d4d6a281ecff240d88d10e6ba8987228e52abad966f1680940bed5d25a69de002a26c8e3af639de620974675ce688a4a5
-
Filesize
124KB
MD50621f759ed3eb443a1421dc9eba8fec2
SHA1197a0155769ba67b25c6a442cf94b5be6fd3a3d4
SHA2563aae89501a65fffa6ce6c04b0133a5ffffd1fb46b0fdfe2606854c906a57175c
SHA512b73ede8faff3e5a5240cba7fe890797eaaf5dce9f14ce5cf9f8fc77cc90dff341e4c90d98125fb35ff15c4310ff1cd952e55f3c9394d0fc372e796f628fa3833
-
Filesize
124KB
MD563569b315f76e3d305f8632cbf41d8e5
SHA1cfeb36a4cb5fb9d9d8135200e2180c60c8e2aed2
SHA256ebe5a11fde8ebbc3886b8dd3533d8fd516dc8ebc6678b02d717f2fbc19aeef89
SHA512de9a0fcd8824b629e296e7a9b11cbb31c9583818f57e14bb7d4ebab79ff30a73563357aa7a7c50b3ebf21fba975521e37cd44f8e27a857633de1e80346f6b1e2
-
Filesize
124KB
MD585cce282010663e84ef07f895e39dee1
SHA15f2d0a11b3f8717f573e057542000718b8ecdeb6
SHA256d84bfd7195e7c6db7843e308cdbe1b749364d3fc7e2cac957a131ca7e9bd3add
SHA512b06408db668c83cd89e7dd7ba6a2b8e494d04483895fb8e13ffb0c669d1a677303255fd6f6ee243cca01ddbf7450716ce202b31beb71fbbdc71cd7dcc63d3dbf
-
Filesize
124KB
MD50e2f58f10b26224217bc6d2e710ad84b
SHA1667ccab8ebf8f0f921d237b6f95d3e14410a9ba0
SHA25639ab30cdbb54d16f500093f6176da1224a76dcee898383760ee7d05b064d9361
SHA512b9d95b986bb45ec6b9605f667e28bd5bc1e560eb4adbbaaf349139a19805afe8bff7ad257c31cc2be813334ab0351429cfa8da973b688fcd5492c78223748ac9
-
Filesize
124KB
MD517a34cf35732576479ad8a37505220fe
SHA16e1f417dcea6a9431021d17f173ce5f681d73b52
SHA256a60781288b467b4da99339d2dfd0cc2f2f94c7a97180bacdc9fa999958b646f3
SHA51239c580813ef9a36dab0e2ac4311c0307225d72ed5a5ce5eee0b6d67f9f2b8c464ffc22683afc36a42e15689455b81eb01afa277f0e26ca1bcfa484fd2df351a8
-
Filesize
124KB
MD54806cd462e7507cf876a5ffc4acaa1c7
SHA1c99d3d1779b44308f22a537d9c8a1a3e0193d158
SHA256f147d447079f1e9e91717e162cd2b5f1c73bb9c74a152de96b720c894924f56a
SHA512b1f263e535eec94deab4917f7e69bd2fb862b90d662ca352f73ab5b826d9e9c6b6ca71a18a4c205f588ff57abb91e66c681f29973b33efe7887e5e9dd8c523a9
-
Filesize
124KB
MD5368f3a2c14043683dd27bc1032292cc5
SHA13993bd9a44dd6f4d3597b16f20128bdd5d7cb7dd
SHA256e58342248e154e72692895cfc9ebc5760648ef3f54a4029c1380710a2699c6d0
SHA5121bb227b7356f9854f86f65038e873a9a9450d3dcda5d3ca466e5d85c54bba807cb571b61a662420f7ea34be100c5cd977451e96d9ecafc41b74f5de1f0795ee8
-
Filesize
124KB
MD599e36a985cd562c2744e18e6464ee436
SHA1268c7377b86b97ad5c9aa324eb620a5fce97d2a7
SHA256b30cf2bf3b408f4b9dbff8fc82a7161bbd89a2d91d22d854bb0e5b41501088a2
SHA512519c90fcc4e608eb4b286da42ae81ba1178176c2065ac70444b96ff99f309ef3038777a0d551d23e4649f4bb476fc86d1ecc9119fd86395a4a9a3ef87e05c0b1
-
Filesize
124KB
MD5b21808eaa9d1490502d9ea6df5d5e678
SHA1e956f7d980012f91183fc33c181f3bbf7e0cef61
SHA256729131aa7845d4132c555b3a0a87b810fd4aa9e75f4de69ab756174e4f5ef9ea
SHA512b951d25d271b32f8ea3809264da4fec51295d6eef705e4b8a9b7a88d8f5cd98f2d2fd5b59942ed792862b19e8c930cdd1d557b39a9188d88c18b92bc3c93230b
-
Filesize
124KB
MD52cd9c972dc63f256981831f8b77a74d9
SHA13f9e0cd9031349077e3a769c79c82b569c484c8c
SHA256aa1d44fd0cf9c6fa105b10e3951cb9ee00d5523f4b0d926e24bef72b2ae644a2
SHA5129c62baa7b7c795c1a977a4bb9b66f4f07f02bed555cab105571efabde8efa2798876ae076170ea658aa1ad4a127cf375061bec1ff77ba31a83e71c1e7a56656c
-
Filesize
124KB
MD5f3a0538a53c0f4a3bf48c6c178a5393e
SHA193953157eeb98c389899e9f4c12a901c6363d2cc
SHA25689459c7ad73469d9552f7caaf473f2bfff1786df94c0c06c27e037fdb9409b8b
SHA5121497a1b14b6389408c353e02608e142e44470006ab4ddb9a492bf3440b71f0a4d0c4faaaa6338b20c2de22abc7377b8c8ac625cb607c6bae69df7ee40fce0adc
-
Filesize
124KB
MD5c25ddb285297384caf1e93f81bc4b236
SHA101bf5493bcbf2c636214f9de5691a4ac8fc4870e
SHA256a03543ce238f24a4a6f42c3f6c22630b7d7f5b6a65ea3f91aecd76733ea3d158
SHA512473f13bac757a73b6eb9d3143be894e49610ec79a4c43ce3a007d41b2f7c98ab09fb42d6d1ecb4ccfb825ffb6cd72bb12fff284d029fe67d9731ba9eac5f1200
-
Filesize
124KB
MD56e61c7245985f79485fa919fe8a37fee
SHA197bb28e561ac879d197fa5678f658b104fe561d0
SHA256926e290557f7a24f61af1b1384d0b793274606c8f73169830c6186496de00f66
SHA51260eda3182f043fbcf4aed2130864d7ee326c1ae573fa89b4b8c61fc57a6fd5060370ee9125af8c0d7eb5e591500162366f9ec4071beafa8a105eca385daa8f17
-
Filesize
124KB
MD5cf6d72d111fdd971246dcf31d13aae49
SHA1bca53704cc7e66bec926b32cc7fc8c0d1abcf790
SHA256c1c2e49e543651e42c7b3daa5de48727996cd20bd84e6706334c516a081541f8
SHA512ac53c7b7cf1d013ed86b891656b2bb898fe8f9df04e9afb896e1d1e2a6782876111e50cf01a28a67ee39412f10190d1393ddbeecf69abe33ce94670b78dc505e
-
Filesize
124KB
MD59cb6f7833d5ea2d834d0326b850bfd97
SHA1fd13e4d71f00f9a99585e3213aea797329e61097
SHA256d76a7613abc28c9a9af48e5b13d1833bbba1d6daf2272169041180190dfed973
SHA512cdee84e6ed8830dd95b947b93430080c006a83afd4abc207dc658419d33930399a68dacdfa254d0eb554446ea0c44b7bd458f98076015e65fdd3648be0cb60db
-
Filesize
124KB
MD54844b742b752306a5bf04fcdf316079b
SHA1fffc5122cb16ef66028db50c830e752f0df3497b
SHA256fe0dc947d162bd8c43b64b9584ec688a47c11045ebf8e1142b85c98c73733e9f
SHA512337a5692131db7c57145a1ef503a811c8ec9e13739a80f9f37570bd940c40c5bdcd1b2150ffc1fd3ecb2986457fc7107e0e0bcf9e04b8a7999d195236aceb638
-
Filesize
124KB
MD583f14fb72438d70644abecdb5c224d02
SHA1b4f07b547b80ef94eababf53a7e5ee20818e3080
SHA256fb99089dd5d03c6e82e91ad512620110fbfab0c870ff0eff1bce136d574bd453
SHA5128d28bf3f2fc7fb88e01456fa3d044a6a9384812b08eae75ebbb63b4353263ce6805797a3c55d6acf9af331d18f953bc22e0e764726efab9f6cb2cd67228299b6
-
Filesize
124KB
MD599515443ed3a196104b73afd75fc100f
SHA135308aee149404306fe9709c4ef3388a45df1256
SHA2567728e7f1e78daed1ab087206b6bdb4dde984c22024d4d720e4570c3e4ed67f0a
SHA5128d7f03bc66f3fd1f32082823041c0f7203013602b30c67a24a2fd5ab0fb18ec49626ad51f6506caa2cdb9496848feb541da7c994c320a3dc0c2012d49760e160
-
Filesize
124KB
MD5befbcb3ab0646482ef1ac728b301a130
SHA14666cc674acbd5ec7d4dd6e7a24d7a743e95b06b
SHA256e781b6f85d69888c6c3fa56f8ca4a9a0b7f87cd86ff2417cec25b00ef7168021
SHA512fa01ae3253e87570b51fd21607029d65ad28c49dfdbde5dc0a45d16fd456f04f2f3fdac95e99b48f96d95312d809ea8edd73b25f296ac5db2c061f63408f53a7
-
Filesize
124KB
MD56a97a447bb5194366f921554fa595c92
SHA1289593d4f84a5b6b9d78c20c3d24fabb6d89e912
SHA256b5a4a8e65f31e1df8d6733ac36f7a24f00dcb38982499280a3f84dd5a4ce6346
SHA5124368bd933c64446eba02ebcec57eded5720e5f537199ea7986a9f0056c1fffde2d12249a8638ad44d5ce24d278e704124787c5c58ccef094373c38ad2e8455d5
-
Filesize
124KB
MD520b5afc9932d5b17bfc3963ee39714a0
SHA13581a0f999f76aa764a4fe9e9e54d8b450abaf01
SHA256c158a6c4a477a10cdf5cf8fbc5e6d77f9950365cd581a1d6b8a83167b8e658a6
SHA512724ff250a48a52a2d221575ec2a0652ba7e7c642645751f59e302eb97b7a835f3f311e2bbed59a9a803964cf7250d8f2f734b27cf59af06ad4ad15709285e0bf
-
Filesize
124KB
MD5fea21c92959bec10dca68bfb3c1a097d
SHA199d6ef79b8142f45d492a0dfc32f1d74de84690b
SHA256a9276aac58c296be42861a316bb45257dc2382eda64446eb66613c7152936aa9
SHA5121c66195b4c20da71c165fffa5018c456beaf2461c3fab8f6d5127146370d08cfd3ff0206a82832f7bb3f5a125811b12e7376f725001c5cd4e1c98a27221101e4
-
Filesize
124KB
MD50a8be3170d247d313909cf0c67717ecb
SHA133e9f2d81ee5ae2adf8abb5094b8ff5485823aa8
SHA256698a80e0218c8fe5459f0d47db01f53ad8799cf6f4f3a40584458d57c1ea0b71
SHA512a6111d98d0603f347aaf9bd2d575716a3ad84c34a84fc274068af88befc183074f39a4b467a07fc21f864efb5de754f0a6de5ddc83c1358350218bc9e5058b58