Analysis
-
max time kernel
118s -
max time network
115s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-12-2024 16:17
Static task
static1
Behavioral task
behavioral1
Sample
7c22f4061c00377c6e54ab94e1f5b7876df986f6e7cdcb1d1ed5bed17f06e91f.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
7c22f4061c00377c6e54ab94e1f5b7876df986f6e7cdcb1d1ed5bed17f06e91f.exe
Resource
win10v2004-20241007-en
General
-
Target
7c22f4061c00377c6e54ab94e1f5b7876df986f6e7cdcb1d1ed5bed17f06e91f.exe
-
Size
124KB
-
MD5
ef65a75d19fa8016413c0515c66e12d9
-
SHA1
fab426294b85631970932ab3ed8cf1d9793c6958
-
SHA256
7c22f4061c00377c6e54ab94e1f5b7876df986f6e7cdcb1d1ed5bed17f06e91f
-
SHA512
7e1eeebd32edfb8f7b318626e0df9d4efaabc17a36bf20e819574bc9bb757bde7a55c04cecc24b24eace5a744b52cc619a7e1e149deaaff5ffa14dc96505e8d8
-
SSDEEP
1536:Nlszi5YjhRO/N69BH3OoGa+FLHjKceRgrkOSoINeGUmc:3GQYjhkFoN3Oo1+FvfSS
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 33 IoCs
Processes:
moyoj.exeleumow.exegiaeqad.exekoeifuz.exemoati.exefosuq.exebeiepod.exekqyaiy.exegeiovaj.exevzrok.exefiapae.exetuuzi.exeraoede.exesubej.exeruiqoa.exeheiboir.exe7c22f4061c00377c6e54ab94e1f5b7876df986f6e7cdcb1d1ed5bed17f06e91f.exezuira.exetccean.exehuiukom.exepiedaiw.exepanip.exebaita.exekoaye.exexeqax.exevuuze.exeguiov.exekeuyaa.exehtkat.exefootuag.exeygzuem.exeqiaum.exexorif.exedescription ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" moyoj.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" leumow.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" giaeqad.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" koeifuz.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" moati.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" fosuq.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" beiepod.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" kqyaiy.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" geiovaj.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" vzrok.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" fiapae.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" tuuzi.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" raoede.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" subej.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ruiqoa.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" heiboir.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 7c22f4061c00377c6e54ab94e1f5b7876df986f6e7cdcb1d1ed5bed17f06e91f.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" zuira.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" tccean.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" huiukom.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" piedaiw.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" panip.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" baita.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" koaye.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" xeqax.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" vuuze.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" guiov.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" keuyaa.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" htkat.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" footuag.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ygzuem.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" qiaum.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" xorif.exe -
Checks computer location settings 2 TTPs 33 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
piedaiw.exekoaye.exemoyoj.exetccean.exebaita.exetuuzi.exevuuze.exe7c22f4061c00377c6e54ab94e1f5b7876df986f6e7cdcb1d1ed5bed17f06e91f.exezuira.exeruiqoa.exefosuq.exeguiov.exefiapae.exekoeifuz.exehtkat.exekeuyaa.exeleumow.exevzrok.exegiaeqad.exeraoede.exexeqax.exeheiboir.exehuiukom.exebeiepod.exeygzuem.exexorif.exekqyaiy.exemoati.exegeiovaj.exefootuag.exesubej.exepanip.exeqiaum.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation piedaiw.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation koaye.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation moyoj.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation tccean.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation baita.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation tuuzi.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation vuuze.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 7c22f4061c00377c6e54ab94e1f5b7876df986f6e7cdcb1d1ed5bed17f06e91f.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation zuira.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation ruiqoa.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation fosuq.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation guiov.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation fiapae.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation koeifuz.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation htkat.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation keuyaa.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation leumow.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation vzrok.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation giaeqad.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation raoede.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation xeqax.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation heiboir.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation huiukom.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation beiepod.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation ygzuem.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation xorif.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation kqyaiy.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation moati.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation geiovaj.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation footuag.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation subej.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation panip.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation qiaum.exe -
Executes dropped EXE 33 IoCs
Processes:
zuira.exetccean.exebeiepod.exevzrok.exegiaeqad.exeygzuem.exepanip.exebaita.exekoaye.exekoeifuz.exeqiaum.exexorif.exekqyaiy.exetuuzi.exevuuze.exehtkat.exemoati.exegeiovaj.exeguiov.exefiapae.exefootuag.exekeuyaa.exemoyoj.exeraoede.exeleumow.exexeqax.exepiedaiw.exesubej.exeruiqoa.exeheiboir.exefosuq.exehuiukom.exeruoip.exepid Process 368 zuira.exe 944 tccean.exe 2720 beiepod.exe 392 vzrok.exe 4844 giaeqad.exe 640 ygzuem.exe 2572 panip.exe 3488 baita.exe 4928 koaye.exe 3824 koeifuz.exe 2736 qiaum.exe 1944 xorif.exe 4532 kqyaiy.exe 2288 tuuzi.exe 1564 vuuze.exe 4424 htkat.exe 4804 moati.exe 948 geiovaj.exe 2020 guiov.exe 812 fiapae.exe 3156 footuag.exe 3636 keuyaa.exe 1792 moyoj.exe 1716 raoede.exe 1696 leumow.exe 2640 xeqax.exe 4076 piedaiw.exe 2768 subej.exe 2600 ruiqoa.exe 388 heiboir.exe 780 fosuq.exe 4544 huiukom.exe 1888 ruoip.exe -
Adds Run key to start application 2 TTPs 33 IoCs
Processes:
tccean.exeygzuem.exexorif.exekqyaiy.exehuiukom.exevzrok.exegiaeqad.exepanip.exekoaye.exehtkat.exesubej.exeruiqoa.exezuira.exekoeifuz.exevuuze.exe7c22f4061c00377c6e54ab94e1f5b7876df986f6e7cdcb1d1ed5bed17f06e91f.exefootuag.exeheiboir.exefosuq.exebeiepod.exekeuyaa.exemoyoj.exepiedaiw.exeleumow.exemoati.exegeiovaj.exeguiov.exefiapae.exeraoede.exebaita.exeqiaum.exetuuzi.exexeqax.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beiepod = "C:\\Users\\Admin\\beiepod.exe /A" tccean.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\panip = "C:\\Users\\Admin\\panip.exe /m" ygzuem.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kqyaiy = "C:\\Users\\Admin\\kqyaiy.exe /k" xorif.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tuuzi = "C:\\Users\\Admin\\tuuzi.exe /J" kqyaiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ruoip = "C:\\Users\\Admin\\ruoip.exe /r" huiukom.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\giaeqad = "C:\\Users\\Admin\\giaeqad.exe /S" vzrok.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ygzuem = "C:\\Users\\Admin\\ygzuem.exe /V" giaeqad.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\baita = "C:\\Users\\Admin\\baita.exe /i" panip.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\koeifuz = "C:\\Users\\Admin\\koeifuz.exe /F" koaye.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\moati = "C:\\Users\\Admin\\moati.exe /x" htkat.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ruiqoa = "C:\\Users\\Admin\\ruiqoa.exe /c" subej.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heiboir = "C:\\Users\\Admin\\heiboir.exe /X" ruiqoa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tccean = "C:\\Users\\Admin\\tccean.exe /S" zuira.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qiaum = "C:\\Users\\Admin\\qiaum.exe /A" koeifuz.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\htkat = "C:\\Users\\Admin\\htkat.exe /A" vuuze.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zuira = "C:\\Users\\Admin\\zuira.exe /d" 7c22f4061c00377c6e54ab94e1f5b7876df986f6e7cdcb1d1ed5bed17f06e91f.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\keuyaa = "C:\\Users\\Admin\\keuyaa.exe /D" footuag.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fosuq = "C:\\Users\\Admin\\fosuq.exe /f" heiboir.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\huiukom = "C:\\Users\\Admin\\huiukom.exe /u" fosuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vzrok = "C:\\Users\\Admin\\vzrok.exe /K" beiepod.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\moyoj = "C:\\Users\\Admin\\moyoj.exe /K" keuyaa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\raoede = "C:\\Users\\Admin\\raoede.exe /x" moyoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\subej = "C:\\Users\\Admin\\subej.exe /e" piedaiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xeqax = "C:\\Users\\Admin\\xeqax.exe /B" leumow.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\geiovaj = "C:\\Users\\Admin\\geiovaj.exe /y" moati.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\guiov = "C:\\Users\\Admin\\guiov.exe /i" geiovaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fiapae = "C:\\Users\\Admin\\fiapae.exe /V" guiov.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\footuag = "C:\\Users\\Admin\\footuag.exe /f" fiapae.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\leumow = "C:\\Users\\Admin\\leumow.exe /m" raoede.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\koaye = "C:\\Users\\Admin\\koaye.exe /Y" baita.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xorif = "C:\\Users\\Admin\\xorif.exe /g" qiaum.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuuze = "C:\\Users\\Admin\\vuuze.exe /w" tuuzi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\piedaiw = "C:\\Users\\Admin\\piedaiw.exe /t" xeqax.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 34 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
beiepod.exefosuq.exepanip.exekoeifuz.exetuuzi.exemoati.exegeiovaj.exekeuyaa.exeleumow.exexorif.exekqyaiy.exevuuze.exeruiqoa.exeraoede.exezuira.exetccean.exevzrok.exegiaeqad.exeguiov.exefootuag.exemoyoj.exefiapae.exexeqax.exepiedaiw.exeygzuem.exeqiaum.exesubej.exeheiboir.exeruoip.exekoaye.exehtkat.exe7c22f4061c00377c6e54ab94e1f5b7876df986f6e7cdcb1d1ed5bed17f06e91f.exebaita.exehuiukom.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language beiepod.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fosuq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language panip.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language koeifuz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tuuzi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language moati.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language geiovaj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language keuyaa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language leumow.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xorif.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kqyaiy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vuuze.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ruiqoa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language raoede.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zuira.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tccean.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vzrok.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language giaeqad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language guiov.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language footuag.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language moyoj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fiapae.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xeqax.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language piedaiw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ygzuem.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qiaum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language subej.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language heiboir.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ruoip.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language koaye.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language htkat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7c22f4061c00377c6e54ab94e1f5b7876df986f6e7cdcb1d1ed5bed17f06e91f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language baita.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language huiukom.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
7c22f4061c00377c6e54ab94e1f5b7876df986f6e7cdcb1d1ed5bed17f06e91f.exezuira.exetccean.exebeiepod.exevzrok.exegiaeqad.exeygzuem.exepanip.exebaita.exekoaye.exekoeifuz.exeqiaum.exexorif.exekqyaiy.exetuuzi.exevuuze.exehtkat.exemoati.exegeiovaj.exeguiov.exefiapae.exefootuag.exekeuyaa.exemoyoj.exeraoede.exeleumow.exexeqax.exepiedaiw.exesubej.exeruiqoa.exeheiboir.exefosuq.exepid Process 4432 7c22f4061c00377c6e54ab94e1f5b7876df986f6e7cdcb1d1ed5bed17f06e91f.exe 4432 7c22f4061c00377c6e54ab94e1f5b7876df986f6e7cdcb1d1ed5bed17f06e91f.exe 368 zuira.exe 368 zuira.exe 944 tccean.exe 944 tccean.exe 2720 beiepod.exe 2720 beiepod.exe 392 vzrok.exe 392 vzrok.exe 4844 giaeqad.exe 4844 giaeqad.exe 640 ygzuem.exe 640 ygzuem.exe 2572 panip.exe 2572 panip.exe 3488 baita.exe 3488 baita.exe 4928 koaye.exe 4928 koaye.exe 3824 koeifuz.exe 3824 koeifuz.exe 2736 qiaum.exe 2736 qiaum.exe 1944 xorif.exe 1944 xorif.exe 4532 kqyaiy.exe 4532 kqyaiy.exe 2288 tuuzi.exe 2288 tuuzi.exe 1564 vuuze.exe 1564 vuuze.exe 4424 htkat.exe 4424 htkat.exe 4804 moati.exe 4804 moati.exe 948 geiovaj.exe 948 geiovaj.exe 2020 guiov.exe 2020 guiov.exe 812 fiapae.exe 812 fiapae.exe 3156 footuag.exe 3156 footuag.exe 3636 keuyaa.exe 3636 keuyaa.exe 1792 moyoj.exe 1792 moyoj.exe 1716 raoede.exe 1716 raoede.exe 1696 leumow.exe 1696 leumow.exe 2640 xeqax.exe 2640 xeqax.exe 4076 piedaiw.exe 4076 piedaiw.exe 2768 subej.exe 2768 subej.exe 2600 ruiqoa.exe 2600 ruiqoa.exe 388 heiboir.exe 388 heiboir.exe 780 fosuq.exe 780 fosuq.exe -
Suspicious use of SetWindowsHookEx 34 IoCs
Processes:
7c22f4061c00377c6e54ab94e1f5b7876df986f6e7cdcb1d1ed5bed17f06e91f.exezuira.exetccean.exebeiepod.exevzrok.exegiaeqad.exeygzuem.exepanip.exebaita.exekoaye.exekoeifuz.exeqiaum.exexorif.exekqyaiy.exetuuzi.exevuuze.exehtkat.exemoati.exegeiovaj.exeguiov.exefiapae.exefootuag.exekeuyaa.exemoyoj.exeraoede.exeleumow.exexeqax.exepiedaiw.exesubej.exeruiqoa.exeheiboir.exefosuq.exehuiukom.exeruoip.exepid Process 4432 7c22f4061c00377c6e54ab94e1f5b7876df986f6e7cdcb1d1ed5bed17f06e91f.exe 368 zuira.exe 944 tccean.exe 2720 beiepod.exe 392 vzrok.exe 4844 giaeqad.exe 640 ygzuem.exe 2572 panip.exe 3488 baita.exe 4928 koaye.exe 3824 koeifuz.exe 2736 qiaum.exe 1944 xorif.exe 4532 kqyaiy.exe 2288 tuuzi.exe 1564 vuuze.exe 4424 htkat.exe 4804 moati.exe 948 geiovaj.exe 2020 guiov.exe 812 fiapae.exe 3156 footuag.exe 3636 keuyaa.exe 1792 moyoj.exe 1716 raoede.exe 1696 leumow.exe 2640 xeqax.exe 4076 piedaiw.exe 2768 subej.exe 2600 ruiqoa.exe 388 heiboir.exe 780 fosuq.exe 4544 huiukom.exe 1888 ruoip.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
7c22f4061c00377c6e54ab94e1f5b7876df986f6e7cdcb1d1ed5bed17f06e91f.exezuira.exetccean.exebeiepod.exevzrok.exegiaeqad.exeygzuem.exepanip.exebaita.exekoaye.exekoeifuz.exeqiaum.exexorif.exekqyaiy.exetuuzi.exevuuze.exehtkat.exemoati.exegeiovaj.exeguiov.exefiapae.exefootuag.exedescription pid Process procid_target PID 4432 wrote to memory of 368 4432 7c22f4061c00377c6e54ab94e1f5b7876df986f6e7cdcb1d1ed5bed17f06e91f.exe 84 PID 4432 wrote to memory of 368 4432 7c22f4061c00377c6e54ab94e1f5b7876df986f6e7cdcb1d1ed5bed17f06e91f.exe 84 PID 4432 wrote to memory of 368 4432 7c22f4061c00377c6e54ab94e1f5b7876df986f6e7cdcb1d1ed5bed17f06e91f.exe 84 PID 368 wrote to memory of 944 368 zuira.exe 88 PID 368 wrote to memory of 944 368 zuira.exe 88 PID 368 wrote to memory of 944 368 zuira.exe 88 PID 944 wrote to memory of 2720 944 tccean.exe 95 PID 944 wrote to memory of 2720 944 tccean.exe 95 PID 944 wrote to memory of 2720 944 tccean.exe 95 PID 2720 wrote to memory of 392 2720 beiepod.exe 101 PID 2720 wrote to memory of 392 2720 beiepod.exe 101 PID 2720 wrote to memory of 392 2720 beiepod.exe 101 PID 392 wrote to memory of 4844 392 vzrok.exe 103 PID 392 wrote to memory of 4844 392 vzrok.exe 103 PID 392 wrote to memory of 4844 392 vzrok.exe 103 PID 4844 wrote to memory of 640 4844 giaeqad.exe 105 PID 4844 wrote to memory of 640 4844 giaeqad.exe 105 PID 4844 wrote to memory of 640 4844 giaeqad.exe 105 PID 640 wrote to memory of 2572 640 ygzuem.exe 107 PID 640 wrote to memory of 2572 640 ygzuem.exe 107 PID 640 wrote to memory of 2572 640 ygzuem.exe 107 PID 2572 wrote to memory of 3488 2572 panip.exe 109 PID 2572 wrote to memory of 3488 2572 panip.exe 109 PID 2572 wrote to memory of 3488 2572 panip.exe 109 PID 3488 wrote to memory of 4928 3488 baita.exe 113 PID 3488 wrote to memory of 4928 3488 baita.exe 113 PID 3488 wrote to memory of 4928 3488 baita.exe 113 PID 4928 wrote to memory of 3824 4928 koaye.exe 116 PID 4928 wrote to memory of 3824 4928 koaye.exe 116 PID 4928 wrote to memory of 3824 4928 koaye.exe 116 PID 3824 wrote to memory of 2736 3824 koeifuz.exe 118 PID 3824 wrote to memory of 2736 3824 koeifuz.exe 118 PID 3824 wrote to memory of 2736 3824 koeifuz.exe 118 PID 2736 wrote to memory of 1944 2736 qiaum.exe 120 PID 2736 wrote to memory of 1944 2736 qiaum.exe 120 PID 2736 wrote to memory of 1944 2736 qiaum.exe 120 PID 1944 wrote to memory of 4532 1944 xorif.exe 122 PID 1944 wrote to memory of 4532 1944 xorif.exe 122 PID 1944 wrote to memory of 4532 1944 xorif.exe 122 PID 4532 wrote to memory of 2288 4532 kqyaiy.exe 124 PID 4532 wrote to memory of 2288 4532 kqyaiy.exe 124 PID 4532 wrote to memory of 2288 4532 kqyaiy.exe 124 PID 2288 wrote to memory of 1564 2288 tuuzi.exe 126 PID 2288 wrote to memory of 1564 2288 tuuzi.exe 126 PID 2288 wrote to memory of 1564 2288 tuuzi.exe 126 PID 1564 wrote to memory of 4424 1564 vuuze.exe 128 PID 1564 wrote to memory of 4424 1564 vuuze.exe 128 PID 1564 wrote to memory of 4424 1564 vuuze.exe 128 PID 4424 wrote to memory of 4804 4424 htkat.exe 130 PID 4424 wrote to memory of 4804 4424 htkat.exe 130 PID 4424 wrote to memory of 4804 4424 htkat.exe 130 PID 4804 wrote to memory of 948 4804 moati.exe 132 PID 4804 wrote to memory of 948 4804 moati.exe 132 PID 4804 wrote to memory of 948 4804 moati.exe 132 PID 948 wrote to memory of 2020 948 geiovaj.exe 134 PID 948 wrote to memory of 2020 948 geiovaj.exe 134 PID 948 wrote to memory of 2020 948 geiovaj.exe 134 PID 2020 wrote to memory of 812 2020 guiov.exe 136 PID 2020 wrote to memory of 812 2020 guiov.exe 136 PID 2020 wrote to memory of 812 2020 guiov.exe 136 PID 812 wrote to memory of 3156 812 fiapae.exe 138 PID 812 wrote to memory of 3156 812 fiapae.exe 138 PID 812 wrote to memory of 3156 812 fiapae.exe 138 PID 3156 wrote to memory of 3636 3156 footuag.exe 140
Processes
-
C:\Users\Admin\AppData\Local\Temp\7c22f4061c00377c6e54ab94e1f5b7876df986f6e7cdcb1d1ed5bed17f06e91f.exe"C:\Users\Admin\AppData\Local\Temp\7c22f4061c00377c6e54ab94e1f5b7876df986f6e7cdcb1d1ed5bed17f06e91f.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4432 -
C:\Users\Admin\zuira.exe"C:\Users\Admin\zuira.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:368 -
C:\Users\Admin\tccean.exe"C:\Users\Admin\tccean.exe"3⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Users\Admin\beiepod.exe"C:\Users\Admin\beiepod.exe"4⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Users\Admin\vzrok.exe"C:\Users\Admin\vzrok.exe"5⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:392 -
C:\Users\Admin\giaeqad.exe"C:\Users\Admin\giaeqad.exe"6⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Users\Admin\ygzuem.exe"C:\Users\Admin\ygzuem.exe"7⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Users\Admin\panip.exe"C:\Users\Admin\panip.exe"8⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Users\Admin\baita.exe"C:\Users\Admin\baita.exe"9⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3488 -
C:\Users\Admin\koaye.exe"C:\Users\Admin\koaye.exe"10⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4928 -
C:\Users\Admin\koeifuz.exe"C:\Users\Admin\koeifuz.exe"11⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3824 -
C:\Users\Admin\qiaum.exe"C:\Users\Admin\qiaum.exe"12⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Users\Admin\xorif.exe"C:\Users\Admin\xorif.exe"13⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Users\Admin\kqyaiy.exe"C:\Users\Admin\kqyaiy.exe"14⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4532 -
C:\Users\Admin\tuuzi.exe"C:\Users\Admin\tuuzi.exe"15⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Users\Admin\vuuze.exe"C:\Users\Admin\vuuze.exe"16⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Users\Admin\htkat.exe"C:\Users\Admin\htkat.exe"17⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Users\Admin\moati.exe"C:\Users\Admin\moati.exe"18⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\Users\Admin\geiovaj.exe"C:\Users\Admin\geiovaj.exe"19⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:948 -
C:\Users\Admin\guiov.exe"C:\Users\Admin\guiov.exe"20⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Users\Admin\fiapae.exe"C:\Users\Admin\fiapae.exe"21⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:812 -
C:\Users\Admin\footuag.exe"C:\Users\Admin\footuag.exe"22⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3156 -
C:\Users\Admin\keuyaa.exe"C:\Users\Admin\keuyaa.exe"23⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3636 -
C:\Users\Admin\moyoj.exe"C:\Users\Admin\moyoj.exe"24⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1792 -
C:\Users\Admin\raoede.exe"C:\Users\Admin\raoede.exe"25⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1716 -
C:\Users\Admin\leumow.exe"C:\Users\Admin\leumow.exe"26⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1696 -
C:\Users\Admin\xeqax.exe"C:\Users\Admin\xeqax.exe"27⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2640 -
C:\Users\Admin\piedaiw.exe"C:\Users\Admin\piedaiw.exe"28⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4076 -
C:\Users\Admin\subej.exe"C:\Users\Admin\subej.exe"29⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2768 -
C:\Users\Admin\ruiqoa.exe"C:\Users\Admin\ruiqoa.exe"30⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2600 -
C:\Users\Admin\heiboir.exe"C:\Users\Admin\heiboir.exe"31⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:388 -
C:\Users\Admin\fosuq.exe"C:\Users\Admin\fosuq.exe"32⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:780 -
C:\Users\Admin\huiukom.exe"C:\Users\Admin\huiukom.exe"33⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4544 -
C:\Users\Admin\ruoip.exe"C:\Users\Admin\ruoip.exe"34⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1888
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
124KB
MD55d2791250f873af7c0ecea1cef14f199
SHA1d85cb128860ced5c287c71da7719b5c98c1c74cc
SHA256a28c1b126814ba25df2a3aa2bce59d4cd788ab073afe8157c0d8d959050419eb
SHA5129177612a64323c1e7109436f83b8b8459e05e685cb3223f4e00d9eae24d5d428a3cc99bec85358aa66335e513dc186525f5ba875435978d3a5f8dd68d3d58fd9
-
Filesize
124KB
MD51750eabb584276d3ab781c6e48c7c6d8
SHA1209b13badd07f0367a6d717f262cca62cd43a61b
SHA2569093d802017b6a044aa6db63791938e2c8adba025a8fb71a7f617e67ae657eb2
SHA512e2ed1c188a73a7bb7cdd80865056fef2a8ca41f387b4fa17e8492c6a021cf00bed63d479caca5392c999df0ec0f6122e69cce7512fb45491cfac0a25ad2b4c3c
-
Filesize
124KB
MD570d245e8fcf5dc7d39fc0612ddd02a35
SHA19d03d59fdd49a4467654b76b9710462dc2d9e99f
SHA25614d4326a2319f2e245b5591a3de51c84d7502c9fee3d2ad400acb8f209c29495
SHA5126d9d19d56b33be0431a7ef8c9c52794aa17d7cd4ab5f606139fac13350004417fa4acba6c6363f14f9ca146f06ca6e48c6ddf5ebcdee5680fb3460baf79c9ac8
-
Filesize
124KB
MD555be4ba6eed9f959a82c67aedeba251e
SHA12b49b96d8685a23a54b6ea30163af285730c5f44
SHA2569a4c53f11cda3c85cf8da7faed3f63923eca70185ff83f3d57c3a187a1db8cd0
SHA512db39f8c6fe6715ce9737545b14599d6a8d85040e1e0cad429d5e26b84fe803bb21473bd96a5af4c4937233e719355b004a858114a628feb1148e17e6c0cda810
-
Filesize
124KB
MD5256f9ee34367953035c8f5e002d3ab52
SHA12472f9e497f59e5cd8032d9bdf1b762babba77ee
SHA256ba8ad74995ccf037d0e0469a987bd84dd25979fb3271c41ee2f54978657a4115
SHA5123b36545007b7d66d06fdb9b8ffab75dde306d29d63bc5a4041cfd31907b5717869361927825a4451ff40d48eeb869fdb19ebcfa43d73d5c91d8f16af654b7cbc
-
Filesize
124KB
MD5ef8b51bdc4c234116e3644f7125042cc
SHA17cbc4108a1b71801e9a7bc61fae85c243de1a642
SHA2562a6a23c4685fac14885c662ebf9420a533f6bc3594fcb767c60d4918f2cbc38d
SHA512b9615aa56885fb44757c4c2dbc79d446eaf2acdd8254ff99a6bcb41781166e8f52ecca92cacd3393d2ad82f86ac625b6ead361688f8a4c130f15e8d4f9f1b18f
-
Filesize
124KB
MD5b5ca426016fa25bbc45565c622062874
SHA1f77e16ad56120b9fc96a50ce0cb9bf652965324b
SHA25654ba216087a594fb299067e673ad588ed8ab647ac77cc3f9a31b345edfe24a43
SHA512f89d7dd25b4c884fd7f20f25aa392dbf43ac470e4b058a16cf460a4114efb6fc40395d8d46b5ad1771f50b425ecdec41ce9ee5c237e25f780f28ad6611906277
-
Filesize
124KB
MD5de3dba9024a9a031f4a44e88d5f1de6e
SHA1bb8b3ef236a53df30260a222794f775d7d5536ff
SHA256111867a1bed3ea5cac8f63711940f8a4db6c3554b818d4c2267cb0bfb63a787b
SHA512f2912896c4558697d358155aee3e7ab83a7ddc31af54dbe9cee979b44256058bcc017b7b4270b1977fc39aa167b4e201eb2ab7a5fd9378d7b13cf8997da10df2
-
Filesize
124KB
MD5c9908674f6c5dfaa99e090b023961461
SHA1244eb789063400ea8ae1f519ee6e1b97502f49fe
SHA256b5b978ffa56e45a588bceb089fdfb6cf9ed7d9e3dac02f7d797f888a25b64ea9
SHA512ba42186ccac10e9a26e3e63c531e4c9fd640ae582a34e19f77e2e7d7031c67db1873bb792a35889d612963bfd6451b9df4d538510d06b613e0f85fa75c50458e
-
Filesize
124KB
MD55f6376fc7c6ddfbe13ca1b50e36f2ad9
SHA1d7ee91edc8f08a153b11a2fb3f05a4fd37ea1bca
SHA256e0c38fa30d3c9ca7c45da7c08ddbde6a374c2aa0ae9dbe0aa0c404d1362c944c
SHA5124bcf37193a21e20b6175e7a998d0ebee273b6422795c36584d20755870d8ce7d7b5cb82334a7c54d1b4ea0f74b53b13d3eea141ee98a8eb41cff18d9cdbabb8f
-
Filesize
124KB
MD5fc104b457abb524539aa3449d2c46e74
SHA11e3fd5e51e3ea8f83f40677bfad374b49914d9df
SHA25660c89c58966e0c39a6f2954b6a901319def4906f3501e9a8ded1cb96c156a08a
SHA5126da8424f298c86119c74cf555cfd27c40e7562bad9bb9c781298bd2c33230761e60bae56c2153d03a9f436984e3bdc315395a7f2d48f33e2ba42aff89830fcbb
-
Filesize
124KB
MD50b2e59c216f95e08df6fdab6c8b5ee9d
SHA117dc012d4d727f6b4060783be131a225afa4b4e2
SHA2564ef9a5a57ce76e3602b33ee1cfe5727015aeed94cb8b3d0cf530e21a4fcc1550
SHA512a04cf4cdd719dc3d3679de99e9af678f135408b5b2b9f667ac3d44bde0aab76053efaeddedc4ec4e6f90e70a4a74828239b05831dcac5edb010cc3fb28879592
-
Filesize
124KB
MD5ed3c70ab0e9a292819bcd982042dccb7
SHA1eedfa5b22bd9206802c497d19d31b4280eaaddd3
SHA2561da16e913756a0b440675a1265b3a3e26cc3bfed74b729dd31e4d56f90f20433
SHA5122fbc6c8edf6c0feb78c4181902992e74c71f75fa0a7ebbe70a177b61a3fcc3f829d8a4f91fd1fcef6e31d85133c5da61435da8dd51ec52ac3ad3ceaa5ddad04d
-
Filesize
124KB
MD50ab2b520fd18552bfb5bda56758d0ef1
SHA1b2e46d9ef8a56aa38124f09cdcfe7e01f89a3935
SHA256ec2581cdee7299f782f9c2d113de13a75499d363263748b82640fed86556b5e0
SHA51252acc28070dfe1d2db9d8ab19335a266661ec37728807bfd5e6f6bad91a7dc78a2a9a7f0ae75e27a5e28bb31b02b22049c80f3194b2eac7b3bcd4d1463d55076
-
Filesize
124KB
MD5ca057cc9e753b865e0e2e958419bb79b
SHA1a42a609b0b1451326254d301ad7a6e1e643476d6
SHA2560a6bb7d94016005a90d06dd7b2196b0382d3365c408f4c6f5da636a6ad73317e
SHA512761cf76ea82847a244fcef1a8d9a19a6bfdef9fdaa4c8c513dce49bef855272e337acbca6b658d1b96004baf0dabaadeb6d40da994a4e89dbde642bccf658cbd
-
Filesize
124KB
MD556027bd6ef9b9229412b81286c681373
SHA1f6c3cccbc2097a55044ac627380d051d47c5278e
SHA25696772f8f133133034f623e9d4c84948a9fc3457fdbcbef038d5d8fbdfc444a53
SHA5128df03fb5eaf65877fe4b79059585380ee331d8bd41834c3a740357c78bd195917e59288e6610b3af6d694a497699d5f0e079d8c606155db4940547f57af778cf
-
Filesize
124KB
MD56984ca48384a2833268839f404262cc1
SHA1c3dc6228cc4e7ed0a57c8dd1fe6a1110e28046ba
SHA256beef549938e4324d19c1082637b398488a57508a22af96e04a14e6bb93654a70
SHA512bfad60e82ed19b26e6df9e17ce3198b64bf3e483b53109579e7c994f1937db5b4fb9efe56146ae4dda764a001bb8b30ac985f7ff655ed88a6268ac7e2004df9e
-
Filesize
124KB
MD52bbe1f3828d10e7bd6c3f4ea075abdc6
SHA14845d7ce416cbd111ad08ed315224c6be3e1bb5a
SHA256b76a818f2736f6ec74ec291a1a2dde9589781bad7d04d2bd24dcca9fa01ea13a
SHA512bb4c8182ca10550973c1978bcd9cc5e2a97037fdcd8c27013c1dcc98d4b3e777a28d109bd167ec365f8deea6ade2643d4440d69df4db10ba8870da85ab32488e
-
Filesize
124KB
MD5f699194783c246d2eb81c11158b74f20
SHA1db95628edf7b9bc50eeb71fb216a8cf3a8a59534
SHA256264c61a043a843da24890e5e4d6b51bc80b358dc9d4aab849c733ac2411e1957
SHA512e5e34f7bc8a4ffc5783f4d33f6799850ab094a74b25de0a94fe19d497988686a2b4089616faf6512c4c82e92e34bc04aebef844bc45927d771be992d0cfa7156
-
Filesize
124KB
MD58be8fbf9db47b76cfb5f7cbe0c044147
SHA161acf473d34a8b2ff76568ab65128404d84fe0b1
SHA2568cfef739a71a4bce230985442b0b4727f1e53683b0a76a994f208f2d8fc2d5d8
SHA512fc8c90c26e807eef0d05ae0944735ad97f252caac81211d818abad1eb67931408a16b81e255854512162aa7718e74b7bfa45323c0b7236a2c770550ca518db7e
-
Filesize
124KB
MD5f8719ec9f7add1d739a4413ed64144a1
SHA174a2d2cf95f346fe92cec0bcd76066804fe7e2c2
SHA256186862a9c0276a0c8e41ee4560a9237a4db76b9c7add74704cbd320014e64317
SHA512fabecb6138f91fffdc5225f5d5c9a80ae7f5b1496b67647e4a0def1e992a8e47320ff1d14dcdbc7f93054767bc1c561880e7ed5e678a6b4463ed31dd88fcddaf
-
Filesize
124KB
MD51dac45c37c396efbc2e0a2a37f237bce
SHA19d40996a2efd74758a9c87e02e12d1ed7ff5016f
SHA2564fd37554e4dbe972f0a6f4b08a7d83c9457217d61c86ed81ae3b5dae270f618c
SHA5120a3e7b40449b9a9255646f2fbeca1c89aa80e7f2333a202454cd1183dcfe5d0f513b0c4af5c86889e7846a33af1675460f4900a8190ee86c3810d575e78b955d
-
Filesize
124KB
MD56e9f974db5711d1b13c6fd53dab5db63
SHA1781da45178f4eb1e4c8a4433b3eb72e64ae1f1cb
SHA2566883ebaf035758036e50ba0b9ac919a95cd4128e73453887721e4d797c7b0b26
SHA5126c0252644a1084cc176405d784396f0544d8ccb70468e96836c4fb58589601898e0e4ec1a580895d8014ae7e8fc15508a58cc57de2db88beb4a144170a977f75
-
Filesize
124KB
MD57af59f68025e65c1450135d46cc96053
SHA1aaaf9c57419028210d6efc8d0a0d18cbd55516b3
SHA25628a416ebafbcc4da197059102f1ea93e4df30a75803c464e765c0f8d57a7f171
SHA512f2a3b49c0c585bdc7f04d1e016fbb60d5fd4511f2e835a3897738d5b3e9afceaf2a93af1cde94b8ee0dff38766d2c3226592db2cf78a10d3094a38af6ca81c94
-
Filesize
124KB
MD55340d160f8dce09372ada8668bda2db5
SHA180cd58d8e899b0b4a532bcfd43dc93fd87fbdffd
SHA2569743e657166c4ec86fe379ab64f634bae466c3be5d8080c7d3e82979c8f809e0
SHA512f763df81a230bbaba223de3404ef427a2552090ebd20a5356c8a741adac8614fe4233a5d7afb307c65a451b660e6ee32872e068f5eb3e2fcb1257f296ade44c8
-
Filesize
124KB
MD57fb9fdf747d0f95238abd8d8e21b49c1
SHA1a81d8dedd5c93589a36aeb915ddabe9a66b9d544
SHA2565578aa0a2d9a6a42c56c15d43219e4fff071e150afbd112caa0c22b9d0d829db
SHA512a3ff60579ce14a0a0ff499e89faecfe906f3cec402a5ed9d16d1151066af9c9faeb343ee736d277e1f4f6fcdd82c44aa7dcc99908946bb874031ef67cf1b88fb
-
Filesize
124KB
MD597ecd0f6f94a5d1f23541a891927a15c
SHA1587e0c927557df1a7d82a273a9eb3c143a86cf19
SHA2566ee9a16fe448a3f2e3a0a3c270886b227754591d32def7e9fcd00a604a7b9d3e
SHA5127a28331c8b1e317b1a3a2e4739276ed53149a959d78b8a93bf429ad70dcf762fc6ff89d1dcf50ce8c47e9be7943b3b2c8aad45f782e1affc485d52e25efa1bf8
-
Filesize
124KB
MD5b6e6c99b1b839525a61c641b6719a016
SHA149dfd3da9c0989bfd502143fc13a04d709a93e85
SHA2562ef66b1092b8364169a0d4250f5ac52cde62044f4797e31da85f293f986f9f29
SHA51281ebe325f7dbe5c9197317c8456429d4c22059dfc54d9ff864f7044f4b29d9cdf3a7811389d6ea679e1da6e2fa54700390cc0281cc3c60e41ba0048cbbb2e8d3
-
Filesize
124KB
MD5e52c5b8ce06d950af4b90a189348b102
SHA17c2806343fd06be276257d226df10e65c3dffc41
SHA2567e359444c8267ad7e297fa953957c34f37c054b018e3437a29dfb2bdef715c82
SHA51214bf7041c11463673978e482c741185ce735d389f6fdedf84ca0b830351fd7cb6cb35caaf5aad0f413a1fbe97558d0e29f58921b0486f6b4bc2b837be1fccd9f
-
Filesize
124KB
MD5ad46487fe453466b08bfba7360a18210
SHA115b11d819085f1506c4370324fb4040bbbe3c98a
SHA2560d0025aaefef770c80bc2f50f97a6e3d395ec0e40026269a84394dbba656c3b9
SHA51215dae6a88c28170cfa5068c30175e306bcb0687066328f2b05e6c0f7b9f626240dc969123b6cc6b26da6ec7a9d2d3b72400be6074a384cdd117585b6c24a5b71
-
Filesize
124KB
MD52f0ec2aca8a673450cfb9830b0b8f494
SHA13456e486f6a0b9a1e0e23bcb92ea4824bf0e506c
SHA25637bd867b400193c96db0d9fd675297b64ceadc42191f1bd1062ac5854ddb54fe
SHA5129a2b4a7bf768abb3908c8231fe4be0168625b90beeaa5650b7bfaeb59c3bfe6ac0f3ee2cb91093d6581d12e4409bc5254b058e43078384e10cb4dd1ed8befbd9
-
Filesize
124KB
MD51f2032de7f2058e467590f1cfcf65d47
SHA1e2a0cab73e6830013b1cfb882e3ba85f3d7d4de2
SHA2566f212c56164af0dc6845436223214a54a567d03c97de54be2df2516031933841
SHA512255771d7f68439b375c0abd2dfbed7051d8928f27a897ead4a34f22ea142739a94893bbca5601ba464271b32c481b0ca578b5930cf2f369ae1f86cd2b05bdfdb