Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07/08/2024, 06:38
Static task
static1
Behavioral task
behavioral1
Sample
7d51b4f38755e9410863da07f09238b0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
7d51b4f38755e9410863da07f09238b0N.exe
Resource
win10v2004-20240802-en
General
-
Target
7d51b4f38755e9410863da07f09238b0N.exe
-
Size
124KB
-
MD5
7d51b4f38755e9410863da07f09238b0
-
SHA1
356954263923a4eda8d6946727e8d71b3fb034a7
-
SHA256
ca0845ccae1315ae2e32d78cd34541aced3f7fb17524e5122d27117cc6cf28ec
-
SHA512
cfda8f92ccc6c61e6c63d72c3398afba8dd4b4f87874ff92edc55f342eaf4d6e5df1cce5e548f7afec587d4f222d2f2ac86fb26ca27de36c1947185c5aa620bb
-
SSDEEP
1536:3xszP5YYzmhRO/N69BH3OoGa+FL9jKceRgrkjSo:BGxYYKhkFoN3Oo1+F92S
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 34 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" qhfuec.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" luaif.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" bievoi.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" xmyiag.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" leoro.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" puaedo.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" pieuyab.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" djcaem.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" lieqig.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" dqzuz.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" raotiz.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" puepaq.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" yoakiz.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" lpraoq.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" kiuoyaq.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" hooje.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" sausaem.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" jikuv.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" cstaz.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" guaeb.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" reuleug.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" qaeeni.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ziutud.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" dhcuez.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" lbqeij.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" boijuk.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" jwtex.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" cueotal.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" kuiul.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" veaezuq.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 7d51b4f38755e9410863da07f09238b0N.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" bpbub.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ziekooj.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" bploj.exe -
Checks computer location settings 2 TTPs 34 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation puaedo.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation pieuyab.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation jwtex.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation sausaem.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation bievoi.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation raotiz.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation hooje.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation qhfuec.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation guaeb.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation ziekooj.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation cstaz.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation kuiul.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation lbqeij.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation bploj.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation yoakiz.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation cueotal.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation ziutud.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation jikuv.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation dhcuez.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation puepaq.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation qaeeni.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation boijuk.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation kiuoyaq.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation 7d51b4f38755e9410863da07f09238b0N.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation lieqig.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation djcaem.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation bpbub.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation lpraoq.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation luaif.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation xmyiag.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation leoro.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation veaezuq.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation dqzuz.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation reuleug.exe -
Executes dropped EXE 34 IoCs
pid Process 4732 djcaem.exe 3240 jikuv.exe 4464 qhfuec.exe 4520 puaedo.exe 3336 ziutud.exe 4684 dhcuez.exe 2916 cstaz.exe 3740 lieqig.exe 1848 guaeb.exe 4092 puepaq.exe 4676 reuleug.exe 4316 pieuyab.exe 2268 bpbub.exe 3120 qaeeni.exe 4140 boijuk.exe 3432 yoakiz.exe 2768 lpraoq.exe 4392 kiuoyaq.exe 4560 jwtex.exe 4452 luaif.exe 4568 sausaem.exe 2980 bievoi.exe 4596 xmyiag.exe 4512 cueotal.exe 3668 leoro.exe 872 kuiul.exe 948 ziekooj.exe 4860 veaezuq.exe 1452 lbqeij.exe 2316 bploj.exe 4172 dqzuz.exe 4400 raotiz.exe 2140 hooje.exe 64 pjfeex.exe -
Adds Run key to start application 2 TTPs 34 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bploj = "C:\\Users\\Admin\\bploj.exe /A" lbqeij.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dqzuz = "C:\\Users\\Admin\\dqzuz.exe /V" bploj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kiuoyaq = "C:\\Users\\Admin\\kiuoyaq.exe /Y" lpraoq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lbqeij = "C:\\Users\\Admin\\lbqeij.exe /q" veaezuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jwtex = "C:\\Users\\Admin\\jwtex.exe /m" kiuoyaq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\luaif = "C:\\Users\\Admin\\luaif.exe /T" jwtex.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\veaezuq = "C:\\Users\\Admin\\veaezuq.exe /p" ziekooj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\raotiz = "C:\\Users\\Admin\\raotiz.exe /Z" dqzuz.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bpbub = "C:\\Users\\Admin\\bpbub.exe /H" pieuyab.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yoakiz = "C:\\Users\\Admin\\yoakiz.exe /j" boijuk.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puepaq = "C:\\Users\\Admin\\puepaq.exe /r" guaeb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dhcuez = "C:\\Users\\Admin\\dhcuez.exe /c" ziutud.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lieqig = "C:\\Users\\Admin\\lieqig.exe /L" cstaz.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ziutud = "C:\\Users\\Admin\\ziutud.exe /N" puaedo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\boijuk = "C:\\Users\\Admin\\boijuk.exe /e" qaeeni.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sausaem = "C:\\Users\\Admin\\sausaem.exe /m" luaif.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bievoi = "C:\\Users\\Admin\\bievoi.exe /L" sausaem.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jikuv = "C:\\Users\\Admin\\jikuv.exe /P" djcaem.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puaedo = "C:\\Users\\Admin\\puaedo.exe /W" qhfuec.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cueotal = "C:\\Users\\Admin\\cueotal.exe /K" xmyiag.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hooje = "C:\\Users\\Admin\\hooje.exe /W" raotiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lpraoq = "C:\\Users\\Admin\\lpraoq.exe /H" yoakiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xmyiag = "C:\\Users\\Admin\\xmyiag.exe /l" bievoi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pieuyab = "C:\\Users\\Admin\\pieuyab.exe /U" reuleug.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kuiul = "C:\\Users\\Admin\\kuiul.exe /R" leoro.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qhfuec = "C:\\Users\\Admin\\qhfuec.exe /x" jikuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\reuleug = "C:\\Users\\Admin\\reuleug.exe /c" puepaq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\leoro = "C:\\Users\\Admin\\leoro.exe /G" cueotal.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pjfeex = "C:\\Users\\Admin\\pjfeex.exe /e" hooje.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\djcaem = "C:\\Users\\Admin\\djcaem.exe /F" 7d51b4f38755e9410863da07f09238b0N.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\guaeb = "C:\\Users\\Admin\\guaeb.exe /j" lieqig.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ziekooj = "C:\\Users\\Admin\\ziekooj.exe /a" kuiul.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cstaz = "C:\\Users\\Admin\\cstaz.exe /V" dhcuez.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qaeeni = "C:\\Users\\Admin\\qaeeni.exe /d" bpbub.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 35 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language guaeb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jwtex.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziekooj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language raotiz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dhcuez.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language boijuk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kiuoyaq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xmyiag.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjfeex.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jikuv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language puaedo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lieqig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qaeeni.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yoakiz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lpraoq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language veaezuq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bploj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7d51b4f38755e9410863da07f09238b0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language djcaem.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language puepaq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language luaif.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kuiul.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lbqeij.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hooje.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziutud.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dqzuz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bievoi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qhfuec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cstaz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reuleug.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pieuyab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bpbub.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sausaem.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cueotal.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language leoro.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2468 7d51b4f38755e9410863da07f09238b0N.exe 2468 7d51b4f38755e9410863da07f09238b0N.exe 4732 djcaem.exe 4732 djcaem.exe 3240 jikuv.exe 3240 jikuv.exe 4464 qhfuec.exe 4464 qhfuec.exe 4520 puaedo.exe 4520 puaedo.exe 3336 ziutud.exe 3336 ziutud.exe 4684 dhcuez.exe 4684 dhcuez.exe 2916 cstaz.exe 2916 cstaz.exe 3740 lieqig.exe 3740 lieqig.exe 1848 guaeb.exe 1848 guaeb.exe 4092 puepaq.exe 4092 puepaq.exe 4676 reuleug.exe 4676 reuleug.exe 4316 pieuyab.exe 4316 pieuyab.exe 2268 bpbub.exe 2268 bpbub.exe 3120 qaeeni.exe 3120 qaeeni.exe 4140 boijuk.exe 4140 boijuk.exe 3432 yoakiz.exe 3432 yoakiz.exe 2768 lpraoq.exe 2768 lpraoq.exe 4392 kiuoyaq.exe 4392 kiuoyaq.exe 4560 jwtex.exe 4560 jwtex.exe 4452 luaif.exe 4452 luaif.exe 4568 sausaem.exe 4568 sausaem.exe 2980 bievoi.exe 2980 bievoi.exe 4596 xmyiag.exe 4596 xmyiag.exe 4512 cueotal.exe 4512 cueotal.exe 3668 leoro.exe 3668 leoro.exe 872 kuiul.exe 872 kuiul.exe 948 ziekooj.exe 948 ziekooj.exe 4860 veaezuq.exe 4860 veaezuq.exe 1452 lbqeij.exe 1452 lbqeij.exe 2316 bploj.exe 2316 bploj.exe 4172 dqzuz.exe 4172 dqzuz.exe -
Suspicious use of SetWindowsHookEx 35 IoCs
pid Process 2468 7d51b4f38755e9410863da07f09238b0N.exe 4732 djcaem.exe 3240 jikuv.exe 4464 qhfuec.exe 4520 puaedo.exe 3336 ziutud.exe 4684 dhcuez.exe 2916 cstaz.exe 3740 lieqig.exe 1848 guaeb.exe 4092 puepaq.exe 4676 reuleug.exe 4316 pieuyab.exe 2268 bpbub.exe 3120 qaeeni.exe 4140 boijuk.exe 3432 yoakiz.exe 2768 lpraoq.exe 4392 kiuoyaq.exe 4560 jwtex.exe 4452 luaif.exe 4568 sausaem.exe 2980 bievoi.exe 4596 xmyiag.exe 4512 cueotal.exe 3668 leoro.exe 872 kuiul.exe 948 ziekooj.exe 4860 veaezuq.exe 1452 lbqeij.exe 2316 bploj.exe 4172 dqzuz.exe 4400 raotiz.exe 2140 hooje.exe 64 pjfeex.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2468 wrote to memory of 4732 2468 7d51b4f38755e9410863da07f09238b0N.exe 87 PID 2468 wrote to memory of 4732 2468 7d51b4f38755e9410863da07f09238b0N.exe 87 PID 2468 wrote to memory of 4732 2468 7d51b4f38755e9410863da07f09238b0N.exe 87 PID 4732 wrote to memory of 3240 4732 djcaem.exe 88 PID 4732 wrote to memory of 3240 4732 djcaem.exe 88 PID 4732 wrote to memory of 3240 4732 djcaem.exe 88 PID 3240 wrote to memory of 4464 3240 jikuv.exe 89 PID 3240 wrote to memory of 4464 3240 jikuv.exe 89 PID 3240 wrote to memory of 4464 3240 jikuv.exe 89 PID 4464 wrote to memory of 4520 4464 qhfuec.exe 90 PID 4464 wrote to memory of 4520 4464 qhfuec.exe 90 PID 4464 wrote to memory of 4520 4464 qhfuec.exe 90 PID 4520 wrote to memory of 3336 4520 puaedo.exe 91 PID 4520 wrote to memory of 3336 4520 puaedo.exe 91 PID 4520 wrote to memory of 3336 4520 puaedo.exe 91 PID 3336 wrote to memory of 4684 3336 ziutud.exe 92 PID 3336 wrote to memory of 4684 3336 ziutud.exe 92 PID 3336 wrote to memory of 4684 3336 ziutud.exe 92 PID 4684 wrote to memory of 2916 4684 dhcuez.exe 93 PID 4684 wrote to memory of 2916 4684 dhcuez.exe 93 PID 4684 wrote to memory of 2916 4684 dhcuez.exe 93 PID 2916 wrote to memory of 3740 2916 cstaz.exe 94 PID 2916 wrote to memory of 3740 2916 cstaz.exe 94 PID 2916 wrote to memory of 3740 2916 cstaz.exe 94 PID 3740 wrote to memory of 1848 3740 lieqig.exe 98 PID 3740 wrote to memory of 1848 3740 lieqig.exe 98 PID 3740 wrote to memory of 1848 3740 lieqig.exe 98 PID 1848 wrote to memory of 4092 1848 guaeb.exe 99 PID 1848 wrote to memory of 4092 1848 guaeb.exe 99 PID 1848 wrote to memory of 4092 1848 guaeb.exe 99 PID 4092 wrote to memory of 4676 4092 puepaq.exe 100 PID 4092 wrote to memory of 4676 4092 puepaq.exe 100 PID 4092 wrote to memory of 4676 4092 puepaq.exe 100 PID 4676 wrote to memory of 4316 4676 reuleug.exe 101 PID 4676 wrote to memory of 4316 4676 reuleug.exe 101 PID 4676 wrote to memory of 4316 4676 reuleug.exe 101 PID 4316 wrote to memory of 2268 4316 pieuyab.exe 102 PID 4316 wrote to memory of 2268 4316 pieuyab.exe 102 PID 4316 wrote to memory of 2268 4316 pieuyab.exe 102 PID 2268 wrote to memory of 3120 2268 bpbub.exe 103 PID 2268 wrote to memory of 3120 2268 bpbub.exe 103 PID 2268 wrote to memory of 3120 2268 bpbub.exe 103 PID 3120 wrote to memory of 4140 3120 qaeeni.exe 104 PID 3120 wrote to memory of 4140 3120 qaeeni.exe 104 PID 3120 wrote to memory of 4140 3120 qaeeni.exe 104 PID 4140 wrote to memory of 3432 4140 boijuk.exe 105 PID 4140 wrote to memory of 3432 4140 boijuk.exe 105 PID 4140 wrote to memory of 3432 4140 boijuk.exe 105 PID 3432 wrote to memory of 2768 3432 yoakiz.exe 106 PID 3432 wrote to memory of 2768 3432 yoakiz.exe 106 PID 3432 wrote to memory of 2768 3432 yoakiz.exe 106 PID 2768 wrote to memory of 4392 2768 lpraoq.exe 107 PID 2768 wrote to memory of 4392 2768 lpraoq.exe 107 PID 2768 wrote to memory of 4392 2768 lpraoq.exe 107 PID 4392 wrote to memory of 4560 4392 kiuoyaq.exe 108 PID 4392 wrote to memory of 4560 4392 kiuoyaq.exe 108 PID 4392 wrote to memory of 4560 4392 kiuoyaq.exe 108 PID 4560 wrote to memory of 4452 4560 jwtex.exe 109 PID 4560 wrote to memory of 4452 4560 jwtex.exe 109 PID 4560 wrote to memory of 4452 4560 jwtex.exe 109 PID 4452 wrote to memory of 4568 4452 luaif.exe 110 PID 4452 wrote to memory of 4568 4452 luaif.exe 110 PID 4452 wrote to memory of 4568 4452 luaif.exe 110 PID 4568 wrote to memory of 2980 4568 sausaem.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\7d51b4f38755e9410863da07f09238b0N.exe"C:\Users\Admin\AppData\Local\Temp\7d51b4f38755e9410863da07f09238b0N.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Users\Admin\djcaem.exe"C:\Users\Admin\djcaem.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4732 -
C:\Users\Admin\jikuv.exe"C:\Users\Admin\jikuv.exe"3⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3240 -
C:\Users\Admin\qhfuec.exe"C:\Users\Admin\qhfuec.exe"4⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Users\Admin\puaedo.exe"C:\Users\Admin\puaedo.exe"5⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4520 -
C:\Users\Admin\ziutud.exe"C:\Users\Admin\ziutud.exe"6⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3336 -
C:\Users\Admin\dhcuez.exe"C:\Users\Admin\dhcuez.exe"7⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4684 -
C:\Users\Admin\cstaz.exe"C:\Users\Admin\cstaz.exe"8⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Users\Admin\lieqig.exe"C:\Users\Admin\lieqig.exe"9⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3740 -
C:\Users\Admin\guaeb.exe"C:\Users\Admin\guaeb.exe"10⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Users\Admin\puepaq.exe"C:\Users\Admin\puepaq.exe"11⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4092 -
C:\Users\Admin\reuleug.exe"C:\Users\Admin\reuleug.exe"12⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4676 -
C:\Users\Admin\pieuyab.exe"C:\Users\Admin\pieuyab.exe"13⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4316 -
C:\Users\Admin\bpbub.exe"C:\Users\Admin\bpbub.exe"14⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Users\Admin\qaeeni.exe"C:\Users\Admin\qaeeni.exe"15⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3120 -
C:\Users\Admin\boijuk.exe"C:\Users\Admin\boijuk.exe"16⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4140 -
C:\Users\Admin\yoakiz.exe"C:\Users\Admin\yoakiz.exe"17⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3432 -
C:\Users\Admin\lpraoq.exe"C:\Users\Admin\lpraoq.exe"18⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Users\Admin\kiuoyaq.exe"C:\Users\Admin\kiuoyaq.exe"19⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4392 -
C:\Users\Admin\jwtex.exe"C:\Users\Admin\jwtex.exe"20⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4560 -
C:\Users\Admin\luaif.exe"C:\Users\Admin\luaif.exe"21⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4452 -
C:\Users\Admin\sausaem.exe"C:\Users\Admin\sausaem.exe"22⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4568 -
C:\Users\Admin\bievoi.exe"C:\Users\Admin\bievoi.exe"23⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2980 -
C:\Users\Admin\xmyiag.exe"C:\Users\Admin\xmyiag.exe"24⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4596 -
C:\Users\Admin\cueotal.exe"C:\Users\Admin\cueotal.exe"25⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4512 -
C:\Users\Admin\leoro.exe"C:\Users\Admin\leoro.exe"26⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3668 -
C:\Users\Admin\kuiul.exe"C:\Users\Admin\kuiul.exe"27⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:872 -
C:\Users\Admin\ziekooj.exe"C:\Users\Admin\ziekooj.exe"28⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:948 -
C:\Users\Admin\veaezuq.exe"C:\Users\Admin\veaezuq.exe"29⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4860 -
C:\Users\Admin\lbqeij.exe"C:\Users\Admin\lbqeij.exe"30⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1452 -
C:\Users\Admin\bploj.exe"C:\Users\Admin\bploj.exe"31⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2316 -
C:\Users\Admin\dqzuz.exe"C:\Users\Admin\dqzuz.exe"32⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4172 -
C:\Users\Admin\raotiz.exe"C:\Users\Admin\raotiz.exe"33⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4400 -
C:\Users\Admin\hooje.exe"C:\Users\Admin\hooje.exe"34⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2140 -
C:\Users\Admin\pjfeex.exe"C:\Users\Admin\pjfeex.exe"35⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:64
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
124KB
MD5a125b40a4224c3e64ab2cdae188cb599
SHA14d8fcb7d89f1800032cb8051679b8cbdcb099eba
SHA256ed4cc61c66c7bd1113730a17696585b40fc33824fee85b81ec5b4bfe8a132384
SHA5120f498324d3ebaf5bbd42262a39a978ba6c2c303737647d93ef4fd9f5fa0005f29c04ada5f46a12e2736359cf4b50f9efadc830cd2d6ac2a0737c6ab2d6edccc7
-
Filesize
124KB
MD589ee4186fb13180cfe4a721e3eb43abe
SHA1a6fad6da08c437508db4f0d2d7ea3c3b27c2544d
SHA256949af2f48f0af1f530a3155bb6b0ffd1b881361a8cb1658a926eace06513d4f3
SHA512884dc5395225a1026cbb001ca4aaf10a51fade5908caa02372238a82ab83b93bd24ae5f849b50939fbae12a0fd31524387ab5f1bf4eced81adab56af2246085a
-
Filesize
124KB
MD5337b314950e11abbf60f46253bf9aa4d
SHA1b49dcd9263972adeba4e0b985d9ecb2cba84337f
SHA256b2aa518c54610123b65e6c5dcb858a000820cc5a0e51a0184162ac624338e3f4
SHA51296f2fac949c131443a546028c01a3b9ec03a43bb9b03e62b52611ba44eb7f18c9f3683fbbbc66fddc8bf10ec82a9e830a2f060d3bed7a6859d535b9b7b76467c
-
Filesize
124KB
MD54fb653e0e991c4f03a3c41ccab862649
SHA15ba5aae4adff2b30ba707d77194e10a8e6c69905
SHA256c7180d50fbe90cb67e07c6440548ee33776ed5d07a193b0955c1a51752797c80
SHA5125645d5bcbc55aaebde70ea27e5f53d72b73df4e4361b5bd2efe8d3b08e263821a9800f47d368908cd37251e847e85daf0edfb9a484c700c328db8e7ff30c44fc
-
Filesize
124KB
MD5b27e466717b454b39000a6ff227ffbc0
SHA1b4e0cd0a697038d86ca67a8bdb99e1ef55742ded
SHA256f540e5bc0da8bd05dc245d82160975998643818a64ce0b9d79fbb69212588414
SHA5122ee3e0b43a766b0d514d04d51ef774929302fee551685a08191177af3781f2ec25049039054d5f3e1afb14c11a054b46d757bfe2b870b361ea5d35b169259ad6
-
Filesize
124KB
MD5aa97d58a390b061f7ea570d8723cdf7c
SHA1ba7acdfa172a81e91e83ce9e5bf194c0ff95fdfd
SHA256933cbcd364e876e610e60d453fef50b0974230cea415b97d262fdb2a311113c7
SHA5120713369dcdec6af4aa407c622538400f8321ee10720476bba6eb5f9a835a26a2a8c66ec3098d0755bf88d39070833a3af43baf7bcbb2f6fd3a7a3551ab54e5a6
-
Filesize
124KB
MD50d654be2c0f992874b0b271e7b9d98eb
SHA1dd0f1545bfc718e6ef346fd098b51e6126a55131
SHA2567b1ccb824df5855c16f11ae8099ee7345a6d64f695a8de4e3c1a0dc4e8c995fe
SHA5122835654d6818f3eee86c42abea379b2cd50aaec36d35ae55110aab56d412ae37a5c1db8b47c63942e6b893b3172daa39b0e35b26a1fd287ee15baa57e2ef69fa
-
Filesize
124KB
MD5ef0004f4876b499cde3ed8ff10320088
SHA1c8e0af3797d1d33149732d26e2c20330c588234e
SHA256ad2ed8aace23a1bba995d3e5a07cfc6a8a9b19e15fc7f3f20207d4129fd0a9a3
SHA512215e772b13c0ce26945a5db45fc7aacb0cb8d5b3db9715b837421c226da0cd59619ded783de64358961c9aa3f32737b9bc0eac025a5271222f8861a6cceed67e
-
Filesize
124KB
MD5c6b815b5d64358dbd213cdf3c1805aae
SHA1a80a79e482a2ce28653dc9d93923a45c52803234
SHA2564c627b9dd57a699dd44ce583a3d82760590cf02579dbc2f9639dbf96045e572e
SHA51288a3a1188843cb219240a28004f05da87cc6331b36fc046958fe3a46f239ffcbbf0caf23b25cd279ec453acf27948a70f38c8ea8353709291032d8dc6e5ba838
-
Filesize
124KB
MD59cb3d84e674f9128b1c9f62567f8391d
SHA15165b5d059a3f6cada30bde0485adbe4f31b67a3
SHA25612756488d94ddd6fc536137a2c6ac6fe22f3fd9b29e1dde94c88ec47b63377a5
SHA512964e1bd42eaabccae5a085adea0e97a5ee79dd07e6c36d9c97bbff7751cc8583ab09bad02edf17bd27ac8ad0151e93687c63151e2ba9f446ef0661684ffc8441
-
Filesize
124KB
MD5ca31fb88dbd128c56daf80a1c2e0b72d
SHA12be3c2dc092d1ca913ae40a562ddaa489e4a67ae
SHA256fde89e6549b3f8d13424e9395a346e4f3b9492d6d23f5bce6106f616c8191f1a
SHA512a6a171e36cfa2cac3c5e469674487e1cd2ca23ee1a2b52f04e2426ea3d6d265c5f48ac42506656553b3a05044f49f6c10eef1e9ab7a00ed125f4f65e3a7abaa6
-
Filesize
124KB
MD5941b4a1ff66979ef9f7bfe7213bbc228
SHA1143a64ede64fa1b20311f3bc50345a0857dc39cd
SHA2565a059af6f52aa0c37612b3c22886f3f9a3a6366f0ae7a5adfbe8a36d00925765
SHA512455851de691f5f7f7f717c87ca78b191cf71c25dbbae08a8ba2b3cd9745a56a29fcd092ca8bc84e48e5897407f3d6769f27eab82aa99a12df3b0d1a613f6f0ab
-
Filesize
124KB
MD5d8b85c2a166159dded5e664c38bfe7fa
SHA188e196bb41b3bbae4b84bdbcc66565c3646426e8
SHA25619c93833d404a205940b21d0f12bcfbf2560f9a50d05ea84e599b45933b0fa0d
SHA512bb6a4b764a2e86a44dae5ba14f655d3d703f3d2ae4ec2364e9553a797dd6e30e5aa1159946261a2db7a0ad255070285a7c1201c3744d8f42f0bb09a8878697e3
-
Filesize
124KB
MD57da5b35150c60040c1ae232cf339aeb1
SHA17f2658c0f54f303358bbd15dcb1197bafa703d80
SHA2561530759620024548ac5dafee42dcb677adffd71153554b4a1cf8a5e03d0100a7
SHA512fb4bc476c52102adae7e4523800bbc020aca0957f6be10baebae6c7bd1a1d79f4799b958ff97bdfb5cb329021518ffad6d8755ccd7ce2b06dd3f339564d25f61
-
Filesize
124KB
MD50a8c56a71391146455765b3fe29ef33f
SHA155fb629fac641b45c1ff0b42b3d51a990e48df38
SHA256b25d7631207c20b12221377ef9386c740a5505bb288e4b1ee8f4a277fa946fa5
SHA512df08c23555627c4d8e0a142f65f5132d898056d9e5b7a49024967cfb0ada87c007e20ac1cc7df253146b324eb7c401be5f4836b54166f9e19d2e362b0ab25a77
-
Filesize
124KB
MD53ee62694c14ea1e43e7cb713dc93b19b
SHA1c61cc1ad1c4fdfac56db7d5dfc974132de81e734
SHA2565ca82a55db4885341d6bd2c51fa09c2ffc77806a8dfabd7148bc155208d6dbfe
SHA51292b9f9963419366756d379592e44b200d5f0d5971ad5e863e6e7925aa77171475378d70ab09954c2f65627eb530eb76af88e5c849a5c5d452bad3a6ec73f177b
-
Filesize
124KB
MD5b4135e2804a516e774e01a7fa06f5ec5
SHA17466fdfb5dd335443f6d0e0ee4bec590dd68bb61
SHA256d4b1708f8e8047f0abe82e88d9c317e418dde583d221249d9e9d67a2faa193db
SHA5126d02abcb0da325dc0d7e54b1c9d44310c1c55d28a9eb526d3360faabd54a75c422d480bef8192fe34fc52d85e1e2fed58ec20fa395bb4df638295afa3f1744e6
-
Filesize
124KB
MD5ac2068bea149e0fbb59ff71dfc8c9eb0
SHA1005e5309af78bf014d91f3e0be4945f62fde56dc
SHA2566d08e6f416aa706481eca3580178b0a928b8eab5c0b37214d51c6cbfa11c1f04
SHA51254bc4e2e361f0c139fc3ab4022a59ca6da340481041bc34f8a01e7743b432392f37183d8643f5d1c247ae4cf76b07708cb8fd55c93914486837f142502942177
-
Filesize
124KB
MD58ab3dd8fda30dec246f503bc45c253f8
SHA1d260fa77d6dd8975492da0f6fcf3ad64a623c4d4
SHA256ec28fd3fae7b407e3092cbabf4bc3965397a1a0e157d565f7c5e21bfb98d8dcf
SHA5127b1ff893536ebe68386186ebafd3562afffed959648844af5f3818b3b33afee9452069b0644415267ef715a91eab022a44b5accaadd38ec705d077f3c5f4f117
-
Filesize
124KB
MD534bfb8f09dc9714dcc6d4c169061331c
SHA1c654f1cc803204414ab4087082ae8f7c27d7bed8
SHA2566cc4d6ccc96c809d381f87e75faac7ff6c7c316b3a491b97e0862c92c96c50f3
SHA512ea24508c033b0319f40852e633800574b97d8f6ca4b0735f245d4d5b0c471232cae9ba09a7cd2920326a1eb5f7adbfe567531d0b5be796e40de7066ac8e101ef
-
Filesize
124KB
MD5b9566e205ce6ce7d2007f344bf27c565
SHA187d473ee00fa08019a583987e750711bfcf65c96
SHA2562f96b64a9c30dc26006cf3bf9d87605752cdd83510fe25ac4669778bc2828553
SHA51269162b561d0913d788c716e20985f351db994be12b2a48395b02a829f6965b26f95a197dad8f741ea2a056e63d80c24afefb8d8479054d0831bc3dc6a59ad742
-
Filesize
124KB
MD54f0036b038088e955943e7fa6f45b344
SHA111d67dd2fdb98f58144227aaaa3b013a270c2767
SHA25654c00e313196f9960091a4059aaf22ec4eb89c5b300120c7418ab9b2f0c1bb92
SHA512448c1024e9f85caeecd4ad1cd2c6ce67faaacf16c3f48c03741519bba8fd4099eed79b2304a5c635b8f7aafc4ef873af13625d3ce36d694b6defd34e6dbad8e8
-
Filesize
124KB
MD503291bcaffc548fb69a2d465419d690f
SHA13d8ec7246879495e3f02d0bf26f0ef54fd98d953
SHA256100ff0210a3d630419d703ce7aa4c74d560c81cf0ba5b2452c815975687391aa
SHA512750ad007a9f02879f1d8a7b83e403fe5580c1ff992b4164df3c7d3f31cfef63ac227f5130e8ecafddae85d861cba24d2f6556ade4f2c3a5c37ab12e7cfa555ff
-
Filesize
124KB
MD5ef6cb660c23231b20f5f14604d603ab2
SHA1a9eed775b207342b023cdd2af2bf253f25284f36
SHA256312ac8cd225d35cad0acffde4381ee539656c5291b49faf5147f9c5c309aa390
SHA51226fb0da99fda5ff72e9cbe9d62381be11b6119682ba2b9760b8a7139452c7caf900602b04ede7ab649f9b8837d7565cfa9cf8059e5c96d109960c762ec200a68
-
Filesize
124KB
MD5068a1f48d6900a11d5076a69eb8f4e1b
SHA18749fd8dd78fae5217a616d0baec0e3830a3168d
SHA256c36a5005c6f4f10e42d7e6a93dc7f34bf6cb6f113e6e290589e18ca7a1848759
SHA51247810330e83660a95bd244ccdeba12f24b116e8f9940baf50d38ab13ad2ebf7d0f15a26f786510d546b768cb096f14c4d7348e60e5486dc6a728b0b51bd9471c
-
Filesize
124KB
MD558bab7af7f86e1bab8a6aadc0510d561
SHA190794637003177c81da2994605a8665d2dccc651
SHA256ab6459964921d37866b4a4a1ad3d0d950c1e82d17cde99fd041908c2dd87f14b
SHA5120a5a6c99aceb20817a2db86ccd445c1e4bd91d5f94bddfe6d0e7da4b6e363b260f9b04d9c3f1e01462c3e41803090c4ac52472069b1c07281e727d127486f5cb
-
Filesize
124KB
MD503132421e652ba3cb2f855b3b8365d2f
SHA14cb23cdda5311d5445253274a6398073bd2a75cd
SHA2566653dd5989e41e96e00808c3f3835d128cb9d11bef87d6646168532f6a34d0ed
SHA512e2190064b8044a1680c68b496977dc7f53ed31854aa1092a4b55534b4939f73c3dfc70d8ddc9b769a2cf4013d7150bd5a3591c98779e96e8c1429ab318cb083e
-
Filesize
124KB
MD580d91a74ee14ac70950fb66ea6150ca6
SHA1bdf38057e037cd7ab915063aa2e44af462ebaf1d
SHA256ec6080e4a892aee2e4a429bb5db9d47521677c889985a3a098cf16fc78111921
SHA512fe3da40b68bf67af829fb3683122d3aa517c1e465ddf79088a3b95b89d63f6255ed1474150686f703ab0c975e0767930c865d230d8fede38ffce35bb8b4e80ca
-
Filesize
124KB
MD59fbee77aaa1049611024902d61b45e12
SHA1b055c8e9abb84c3258e91cd7ad514c4c4946f54f
SHA2569a051e8e286f3df3c24f59b8818e970443d546d491617be9a61bce03e3d187e6
SHA5128b0a5284f92ccdce71a4adda77ac327766caafd896039b5694fd4a81b5fdb91a395b42cadab0bb5c4ca6b0b137823898b837dc6653490589c9950cd729ff682d
-
Filesize
124KB
MD5056e72a87b6f397741735615e8b897bf
SHA172d0ef50fb36cb899810542e47600892be68d837
SHA2568a39bf31f2c2a7d8877d141d1a959f1b1dec7f4496f10380b9b05714e3b01723
SHA512a2cc96559f6863388d7df4e7dd195d1cba83eeb6d3cd300d1a5c75cc1c44c643a0874c34cd78482ee67e41e25c1f3e62b2265f213f76e88963b77509b215e5d9
-
Filesize
124KB
MD559fdf94e0d5a113bc3ca006d08de8e2c
SHA1e2de4d5b5ad7bcc45e6872834583ce705d28ca2c
SHA25644add56fedc608f28fbf9e1087fbf0b5cf0c12e72b424b7839a1f27944d4bc84
SHA512660f283fcd784de7a17451c63acef41e817ff4d08134bda67b25400b514ba33e5470b793dd2cfd57d972efe8583760039fcc6c864963685b78b88a0cc8b0bd38
-
Filesize
124KB
MD5f72190cdea387c29c3a23cb13088df6d
SHA1f16aed96bc973b6a0d4299e5ef0ec23f990655a9
SHA25611ba456039b3f6e919de3ccd362401177dd3ec9deb8dc8d861ac34d0ca02787e
SHA512cc84c0d2193c2372060481c35aaf93b67b266bd19a6a4b08cbb5925e0189a1c1384069699777ec771888422a743715ff76a961ed12e08157af537f1ec8169dfa