Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
03/12/2024, 16:26
Static task
static1
Behavioral task
behavioral1
Sample
7c22f4061c00377c6e54ab94e1f5b7876df986f6e7cdcb1d1ed5bed17f06e91f.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
7c22f4061c00377c6e54ab94e1f5b7876df986f6e7cdcb1d1ed5bed17f06e91f.exe
Resource
win10v2004-20241007-en
General
-
Target
7c22f4061c00377c6e54ab94e1f5b7876df986f6e7cdcb1d1ed5bed17f06e91f.exe
-
Size
124KB
-
MD5
ef65a75d19fa8016413c0515c66e12d9
-
SHA1
fab426294b85631970932ab3ed8cf1d9793c6958
-
SHA256
7c22f4061c00377c6e54ab94e1f5b7876df986f6e7cdcb1d1ed5bed17f06e91f
-
SHA512
7e1eeebd32edfb8f7b318626e0df9d4efaabc17a36bf20e819574bc9bb757bde7a55c04cecc24b24eace5a744b52cc619a7e1e149deaaff5ffa14dc96505e8d8
-
SSDEEP
1536:Nlszi5YjhRO/N69BH3OoGa+FLHjKceRgrkOSoINeGUmc:3GQYjhkFoN3Oo1+FvfSS
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 46 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" muiqeo.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" vzmaw.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" qeeaxu.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" woaibo.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" mnxor.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" buuive.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" faepie.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" gemik.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" teuxoz.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" wouami.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" gookue.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" naemai.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" wysiy.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" zeuew.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" puiam.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" koibal.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ttvuov.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" paivon.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" xalud.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" siiguy.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" nialud.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" riasa.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" vumuq.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" juhes.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" bfkus.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" zbtuiw.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" xaiomul.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 7c22f4061c00377c6e54ab94e1f5b7876df986f6e7cdcb1d1ed5bed17f06e91f.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" caiqia.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" waetid.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" jeucie.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" xuaira.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" dauud.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" jiuaf.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" zrnoev.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" hooaqe.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" noegas.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" nouto.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" naara.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" jaiah.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" xooadu.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" taiefi.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" touqoah.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" reeiwoq.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" qvpuz.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" wzbuc.exe -
Executes dropped EXE 46 IoCs
pid Process 1936 qvpuz.exe 2844 faepie.exe 2920 zrnoev.exe 2040 hooaqe.exe 1700 gemik.exe 1252 riasa.exe 2820 vumuq.exe 2956 koibal.exe 2300 xooadu.exe 3012 caiqia.exe 1344 muiqeo.exe 1972 wzbuc.exe 760 ttvuov.exe 1872 jeucie.exe 2276 taiefi.exe 2016 juhes.exe 2988 paivon.exe 2680 vzmaw.exe 1652 qeeaxu.exe 1744 woaibo.exe 328 xuaira.exe 2144 gookue.exe 3016 mnxor.exe 1532 noegas.exe 112 naemai.exe 2548 wysiy.exe 1612 zeuew.exe 2440 nouto.exe 2100 bfkus.exe 1940 xalud.exe 1748 buuive.exe 1780 naara.exe 408 zbtuiw.exe 1992 xaiomul.exe 1584 siiguy.exe 3052 teuxoz.exe 2332 waetid.exe 2224 jaiah.exe 2996 wouami.exe 2776 dauud.exe 1788 touqoah.exe 2084 nialud.exe 2672 reeiwoq.exe 2740 jiuaf.exe 2648 puiam.exe 1656 mxsaiz.exe -
Loads dropped DLL 64 IoCs
pid Process 1128 7c22f4061c00377c6e54ab94e1f5b7876df986f6e7cdcb1d1ed5bed17f06e91f.exe 1128 7c22f4061c00377c6e54ab94e1f5b7876df986f6e7cdcb1d1ed5bed17f06e91f.exe 1936 qvpuz.exe 1936 qvpuz.exe 2844 faepie.exe 2844 faepie.exe 2920 zrnoev.exe 2920 zrnoev.exe 2040 hooaqe.exe 2040 hooaqe.exe 1700 gemik.exe 1700 gemik.exe 1252 riasa.exe 1252 riasa.exe 2820 vumuq.exe 2820 vumuq.exe 2956 koibal.exe 2956 koibal.exe 2300 xooadu.exe 2300 xooadu.exe 3012 caiqia.exe 3012 caiqia.exe 1344 muiqeo.exe 1344 muiqeo.exe 1972 wzbuc.exe 1972 wzbuc.exe 760 ttvuov.exe 760 ttvuov.exe 1872 jeucie.exe 1872 jeucie.exe 2276 taiefi.exe 2276 taiefi.exe 2016 juhes.exe 2016 juhes.exe 2988 paivon.exe 2988 paivon.exe 2680 vzmaw.exe 2680 vzmaw.exe 1652 qeeaxu.exe 1652 qeeaxu.exe 1744 woaibo.exe 1744 woaibo.exe 328 xuaira.exe 328 xuaira.exe 2144 gookue.exe 2144 gookue.exe 3016 mnxor.exe 3016 mnxor.exe 1532 noegas.exe 1532 noegas.exe 112 naemai.exe 112 naemai.exe 2548 wysiy.exe 2548 wysiy.exe 1612 zeuew.exe 1612 zeuew.exe 2440 nouto.exe 2440 nouto.exe 2100 bfkus.exe 2100 bfkus.exe 1940 xalud.exe 1940 xalud.exe 1748 buuive.exe 1748 buuive.exe -
Adds Run key to start application 2 TTPs 46 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\muiqeo = "C:\\Users\\Admin\\muiqeo.exe /a" caiqia.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuaira = "C:\\Users\\Admin\\xuaira.exe /B" woaibo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\naemai = "C:\\Users\\Admin\\naemai.exe /t" noegas.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\nouto = "C:\\Users\\Admin\\nouto.exe /a" zeuew.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\siiguy = "C:\\Users\\Admin\\siiguy.exe /Q" xaiomul.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\wouami = "C:\\Users\\Admin\\wouami.exe /D" jaiah.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\zrnoev = "C:\\Users\\Admin\\zrnoev.exe /m" faepie.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\gemik = "C:\\Users\\Admin\\gemik.exe /k" hooaqe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\nialud = "C:\\Users\\Admin\\nialud.exe /v" touqoah.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\dauud = "C:\\Users\\Admin\\dauud.exe /y" wouami.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\xooadu = "C:\\Users\\Admin\\xooadu.exe /B" koibal.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\caiqia = "C:\\Users\\Admin\\caiqia.exe /O" xooadu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\paivon = "C:\\Users\\Admin\\paivon.exe /v" juhes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\qeeaxu = "C:\\Users\\Admin\\qeeaxu.exe /O" vzmaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\buuive = "C:\\Users\\Admin\\buuive.exe /J" xalud.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\naara = "C:\\Users\\Admin\\naara.exe /M" buuive.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaiomul = "C:\\Users\\Admin\\xaiomul.exe /Y" zbtuiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\teuxoz = "C:\\Users\\Admin\\teuxoz.exe /L" siiguy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\wzbuc = "C:\\Users\\Admin\\wzbuc.exe /c" muiqeo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\jeucie = "C:\\Users\\Admin\\jeucie.exe /U" ttvuov.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\jiuaf = "C:\\Users\\Admin\\jiuaf.exe /M" reeiwoq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\mnxor = "C:\\Users\\Admin\\mnxor.exe /K" gookue.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\noegas = "C:\\Users\\Admin\\noegas.exe /Q" mnxor.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\hooaqe = "C:\\Users\\Admin\\hooaqe.exe /m" zrnoev.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\woaibo = "C:\\Users\\Admin\\woaibo.exe /n" qeeaxu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\taiefi = "C:\\Users\\Admin\\taiefi.exe /b" jeucie.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\juhes = "C:\\Users\\Admin\\juhes.exe /G" taiefi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\wysiy = "C:\\Users\\Admin\\wysiy.exe /t" naemai.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeuew = "C:\\Users\\Admin\\zeuew.exe /m" wysiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\waetid = "C:\\Users\\Admin\\waetid.exe /V" teuxoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\reeiwoq = "C:\\Users\\Admin\\reeiwoq.exe /E" nialud.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\koibal = "C:\\Users\\Admin\\koibal.exe /J" vumuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\ttvuov = "C:\\Users\\Admin\\ttvuov.exe /T" wzbuc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\riasa = "C:\\Users\\Admin\\riasa.exe /A" gemik.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\vumuq = "C:\\Users\\Admin\\vumuq.exe /c" riasa.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\bfkus = "C:\\Users\\Admin\\bfkus.exe /M" nouto.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\xalud = "C:\\Users\\Admin\\xalud.exe /o" bfkus.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\zbtuiw = "C:\\Users\\Admin\\zbtuiw.exe /j" naara.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\mxsaiz = "C:\\Users\\Admin\\mxsaiz.exe /x" puiam.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\qvpuz = "C:\\Users\\Admin\\qvpuz.exe /Q" 7c22f4061c00377c6e54ab94e1f5b7876df986f6e7cdcb1d1ed5bed17f06e91f.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\faepie = "C:\\Users\\Admin\\faepie.exe /p" qvpuz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\puiam = "C:\\Users\\Admin\\puiam.exe /v" jiuaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaiah = "C:\\Users\\Admin\\jaiah.exe /t" waetid.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\touqoah = "C:\\Users\\Admin\\touqoah.exe /a" dauud.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\vzmaw = "C:\\Users\\Admin\\vzmaw.exe /K" paivon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\gookue = "C:\\Users\\Admin\\gookue.exe /s" xuaira.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 47 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reeiwoq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7c22f4061c00377c6e54ab94e1f5b7876df986f6e7cdcb1d1ed5bed17f06e91f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vumuq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zbtuiw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language teuxoz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xuaira.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language naara.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jaiah.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jiuaf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ttvuov.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vzmaw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language naemai.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nialud.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qvpuz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gemik.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language riasa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language caiqia.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language faepie.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language muiqeo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language waetid.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language siiguy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xooadu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qeeaxu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language noegas.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xaiomul.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bfkus.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language puiam.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mxsaiz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zrnoev.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language paivon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gookue.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zeuew.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language buuive.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wouami.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dauud.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language touqoah.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hooaqe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language koibal.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wzbuc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xalud.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mnxor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wysiy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nouto.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jeucie.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taiefi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language juhes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language woaibo.exe -
Suspicious behavior: EnumeratesProcesses 46 IoCs
pid Process 1128 7c22f4061c00377c6e54ab94e1f5b7876df986f6e7cdcb1d1ed5bed17f06e91f.exe 1936 qvpuz.exe 2844 faepie.exe 2920 zrnoev.exe 2040 hooaqe.exe 1700 gemik.exe 1252 riasa.exe 2820 vumuq.exe 2956 koibal.exe 2300 xooadu.exe 3012 caiqia.exe 1344 muiqeo.exe 1972 wzbuc.exe 760 ttvuov.exe 1872 jeucie.exe 2276 taiefi.exe 2016 juhes.exe 2988 paivon.exe 2680 vzmaw.exe 1652 qeeaxu.exe 1744 woaibo.exe 328 xuaira.exe 2144 gookue.exe 3016 mnxor.exe 1532 noegas.exe 112 naemai.exe 2548 wysiy.exe 1612 zeuew.exe 2440 nouto.exe 2100 bfkus.exe 1940 xalud.exe 1748 buuive.exe 1780 naara.exe 408 zbtuiw.exe 1992 xaiomul.exe 1584 siiguy.exe 3052 teuxoz.exe 2332 waetid.exe 2224 jaiah.exe 2996 wouami.exe 2776 dauud.exe 1788 touqoah.exe 2084 nialud.exe 2672 reeiwoq.exe 2740 jiuaf.exe 2648 puiam.exe -
Suspicious use of SetWindowsHookEx 47 IoCs
pid Process 1128 7c22f4061c00377c6e54ab94e1f5b7876df986f6e7cdcb1d1ed5bed17f06e91f.exe 1936 qvpuz.exe 2844 faepie.exe 2920 zrnoev.exe 2040 hooaqe.exe 1700 gemik.exe 1252 riasa.exe 2820 vumuq.exe 2956 koibal.exe 2300 xooadu.exe 3012 caiqia.exe 1344 muiqeo.exe 1972 wzbuc.exe 760 ttvuov.exe 1872 jeucie.exe 2276 taiefi.exe 2016 juhes.exe 2988 paivon.exe 2680 vzmaw.exe 1652 qeeaxu.exe 1744 woaibo.exe 328 xuaira.exe 2144 gookue.exe 3016 mnxor.exe 1532 noegas.exe 112 naemai.exe 2548 wysiy.exe 1612 zeuew.exe 2440 nouto.exe 2100 bfkus.exe 1940 xalud.exe 1748 buuive.exe 1780 naara.exe 408 zbtuiw.exe 1992 xaiomul.exe 1584 siiguy.exe 3052 teuxoz.exe 2332 waetid.exe 2224 jaiah.exe 2996 wouami.exe 2776 dauud.exe 1788 touqoah.exe 2084 nialud.exe 2672 reeiwoq.exe 2740 jiuaf.exe 2648 puiam.exe 1656 mxsaiz.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1128 wrote to memory of 1936 1128 7c22f4061c00377c6e54ab94e1f5b7876df986f6e7cdcb1d1ed5bed17f06e91f.exe 30 PID 1128 wrote to memory of 1936 1128 7c22f4061c00377c6e54ab94e1f5b7876df986f6e7cdcb1d1ed5bed17f06e91f.exe 30 PID 1128 wrote to memory of 1936 1128 7c22f4061c00377c6e54ab94e1f5b7876df986f6e7cdcb1d1ed5bed17f06e91f.exe 30 PID 1128 wrote to memory of 1936 1128 7c22f4061c00377c6e54ab94e1f5b7876df986f6e7cdcb1d1ed5bed17f06e91f.exe 30 PID 1936 wrote to memory of 2844 1936 qvpuz.exe 31 PID 1936 wrote to memory of 2844 1936 qvpuz.exe 31 PID 1936 wrote to memory of 2844 1936 qvpuz.exe 31 PID 1936 wrote to memory of 2844 1936 qvpuz.exe 31 PID 2844 wrote to memory of 2920 2844 faepie.exe 33 PID 2844 wrote to memory of 2920 2844 faepie.exe 33 PID 2844 wrote to memory of 2920 2844 faepie.exe 33 PID 2844 wrote to memory of 2920 2844 faepie.exe 33 PID 2920 wrote to memory of 2040 2920 zrnoev.exe 34 PID 2920 wrote to memory of 2040 2920 zrnoev.exe 34 PID 2920 wrote to memory of 2040 2920 zrnoev.exe 34 PID 2920 wrote to memory of 2040 2920 zrnoev.exe 34 PID 2040 wrote to memory of 1700 2040 hooaqe.exe 35 PID 2040 wrote to memory of 1700 2040 hooaqe.exe 35 PID 2040 wrote to memory of 1700 2040 hooaqe.exe 35 PID 2040 wrote to memory of 1700 2040 hooaqe.exe 35 PID 1700 wrote to memory of 1252 1700 gemik.exe 36 PID 1700 wrote to memory of 1252 1700 gemik.exe 36 PID 1700 wrote to memory of 1252 1700 gemik.exe 36 PID 1700 wrote to memory of 1252 1700 gemik.exe 36 PID 1252 wrote to memory of 2820 1252 riasa.exe 37 PID 1252 wrote to memory of 2820 1252 riasa.exe 37 PID 1252 wrote to memory of 2820 1252 riasa.exe 37 PID 1252 wrote to memory of 2820 1252 riasa.exe 37 PID 2820 wrote to memory of 2956 2820 vumuq.exe 38 PID 2820 wrote to memory of 2956 2820 vumuq.exe 38 PID 2820 wrote to memory of 2956 2820 vumuq.exe 38 PID 2820 wrote to memory of 2956 2820 vumuq.exe 38 PID 2956 wrote to memory of 2300 2956 koibal.exe 39 PID 2956 wrote to memory of 2300 2956 koibal.exe 39 PID 2956 wrote to memory of 2300 2956 koibal.exe 39 PID 2956 wrote to memory of 2300 2956 koibal.exe 39 PID 2300 wrote to memory of 3012 2300 xooadu.exe 40 PID 2300 wrote to memory of 3012 2300 xooadu.exe 40 PID 2300 wrote to memory of 3012 2300 xooadu.exe 40 PID 2300 wrote to memory of 3012 2300 xooadu.exe 40 PID 3012 wrote to memory of 1344 3012 caiqia.exe 41 PID 3012 wrote to memory of 1344 3012 caiqia.exe 41 PID 3012 wrote to memory of 1344 3012 caiqia.exe 41 PID 3012 wrote to memory of 1344 3012 caiqia.exe 41 PID 1344 wrote to memory of 1972 1344 muiqeo.exe 42 PID 1344 wrote to memory of 1972 1344 muiqeo.exe 42 PID 1344 wrote to memory of 1972 1344 muiqeo.exe 42 PID 1344 wrote to memory of 1972 1344 muiqeo.exe 42 PID 1972 wrote to memory of 760 1972 wzbuc.exe 43 PID 1972 wrote to memory of 760 1972 wzbuc.exe 43 PID 1972 wrote to memory of 760 1972 wzbuc.exe 43 PID 1972 wrote to memory of 760 1972 wzbuc.exe 43 PID 760 wrote to memory of 1872 760 ttvuov.exe 44 PID 760 wrote to memory of 1872 760 ttvuov.exe 44 PID 760 wrote to memory of 1872 760 ttvuov.exe 44 PID 760 wrote to memory of 1872 760 ttvuov.exe 44 PID 1872 wrote to memory of 2276 1872 jeucie.exe 45 PID 1872 wrote to memory of 2276 1872 jeucie.exe 45 PID 1872 wrote to memory of 2276 1872 jeucie.exe 45 PID 1872 wrote to memory of 2276 1872 jeucie.exe 45 PID 2276 wrote to memory of 2016 2276 taiefi.exe 46 PID 2276 wrote to memory of 2016 2276 taiefi.exe 46 PID 2276 wrote to memory of 2016 2276 taiefi.exe 46 PID 2276 wrote to memory of 2016 2276 taiefi.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\7c22f4061c00377c6e54ab94e1f5b7876df986f6e7cdcb1d1ed5bed17f06e91f.exe"C:\Users\Admin\AppData\Local\Temp\7c22f4061c00377c6e54ab94e1f5b7876df986f6e7cdcb1d1ed5bed17f06e91f.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\Users\Admin\qvpuz.exe"C:\Users\Admin\qvpuz.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Users\Admin\faepie.exe"C:\Users\Admin\faepie.exe"3⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Users\Admin\zrnoev.exe"C:\Users\Admin\zrnoev.exe"4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Users\Admin\hooaqe.exe"C:\Users\Admin\hooaqe.exe"5⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Users\Admin\gemik.exe"C:\Users\Admin\gemik.exe"6⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Users\Admin\riasa.exe"C:\Users\Admin\riasa.exe"7⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Users\Admin\vumuq.exe"C:\Users\Admin\vumuq.exe"8⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Users\Admin\koibal.exe"C:\Users\Admin\koibal.exe"9⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Users\Admin\xooadu.exe"C:\Users\Admin\xooadu.exe"10⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Users\Admin\caiqia.exe"C:\Users\Admin\caiqia.exe"11⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Users\Admin\muiqeo.exe"C:\Users\Admin\muiqeo.exe"12⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Users\Admin\wzbuc.exe"C:\Users\Admin\wzbuc.exe"13⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Users\Admin\ttvuov.exe"C:\Users\Admin\ttvuov.exe"14⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:760 -
C:\Users\Admin\jeucie.exe"C:\Users\Admin\jeucie.exe"15⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Users\Admin\taiefi.exe"C:\Users\Admin\taiefi.exe"16⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Users\Admin\juhes.exe"C:\Users\Admin\juhes.exe"17⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2016 -
C:\Users\Admin\paivon.exe"C:\Users\Admin\paivon.exe"18⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2988 -
C:\Users\Admin\vzmaw.exe"C:\Users\Admin\vzmaw.exe"19⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2680 -
C:\Users\Admin\qeeaxu.exe"C:\Users\Admin\qeeaxu.exe"20⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1652 -
C:\Users\Admin\woaibo.exe"C:\Users\Admin\woaibo.exe"21⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1744 -
C:\Users\Admin\xuaira.exe"C:\Users\Admin\xuaira.exe"22⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:328 -
C:\Users\Admin\gookue.exe"C:\Users\Admin\gookue.exe"23⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2144 -
C:\Users\Admin\mnxor.exe"C:\Users\Admin\mnxor.exe"24⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3016 -
C:\Users\Admin\noegas.exe"C:\Users\Admin\noegas.exe"25⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1532 -
C:\Users\Admin\naemai.exe"C:\Users\Admin\naemai.exe"26⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:112 -
C:\Users\Admin\wysiy.exe"C:\Users\Admin\wysiy.exe"27⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2548 -
C:\Users\Admin\zeuew.exe"C:\Users\Admin\zeuew.exe"28⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1612 -
C:\Users\Admin\nouto.exe"C:\Users\Admin\nouto.exe"29⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2440 -
C:\Users\Admin\bfkus.exe"C:\Users\Admin\bfkus.exe"30⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2100 -
C:\Users\Admin\xalud.exe"C:\Users\Admin\xalud.exe"31⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1940 -
C:\Users\Admin\buuive.exe"C:\Users\Admin\buuive.exe"32⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1748 -
C:\Users\Admin\naara.exe"C:\Users\Admin\naara.exe"33⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1780 -
C:\Users\Admin\zbtuiw.exe"C:\Users\Admin\zbtuiw.exe"34⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:408 -
C:\Users\Admin\xaiomul.exe"C:\Users\Admin\xaiomul.exe"35⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1992 -
C:\Users\Admin\siiguy.exe"C:\Users\Admin\siiguy.exe"36⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1584 -
C:\Users\Admin\teuxoz.exe"C:\Users\Admin\teuxoz.exe"37⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3052 -
C:\Users\Admin\waetid.exe"C:\Users\Admin\waetid.exe"38⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2332 -
C:\Users\Admin\jaiah.exe"C:\Users\Admin\jaiah.exe"39⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2224 -
C:\Users\Admin\wouami.exe"C:\Users\Admin\wouami.exe"40⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2996 -
C:\Users\Admin\dauud.exe"C:\Users\Admin\dauud.exe"41⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2776 -
C:\Users\Admin\touqoah.exe"C:\Users\Admin\touqoah.exe"42⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1788 -
C:\Users\Admin\nialud.exe"C:\Users\Admin\nialud.exe"43⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2084 -
C:\Users\Admin\reeiwoq.exe"C:\Users\Admin\reeiwoq.exe"44⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2672 -
C:\Users\Admin\jiuaf.exe"C:\Users\Admin\jiuaf.exe"45⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2740 -
C:\Users\Admin\puiam.exe"C:\Users\Admin\puiam.exe"46⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2648 -
C:\Users\Admin\mxsaiz.exe"C:\Users\Admin\mxsaiz.exe"47⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1656
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
124KB
MD50fc9f913e92f8a8ae6e8bf2f6d877796
SHA1f7cf01476e23b5a6322e4f4846a2b234169e39cd
SHA2563367645f049ddc72d6bca060c0b81d849e010fa0a441c99fae353cea7e027f14
SHA512a10afca267c3cedfa623e2f5c3a9c2f88f1de26d40f4a85a299c1e49ec6f8ffd9547cb076248ee36fc87f5c6a86f7b9cf77e1bc178211c677ae81e1b921c5655
-
Filesize
124KB
MD5f7d3c6be8ed5e46b269577abeac69e23
SHA1d223cdfd5a2b4d95b0bac8c0e859a84551109896
SHA256b47d81c27f2014d5d91c17afb2ebf7533900a6b6b2e6553b273e72cd35690ef1
SHA512e77ca2e85f0e602e90c53207fa620a4041605e4b96504d83890731f7a872cdb7f772de37f3ed15c388db5336390c8a5d8a0b3e202697d7d3d5639546e272b9ea
-
Filesize
124KB
MD559e0386dcc033373c00fd676e804280c
SHA1c8c58e00ee192a36366fac8f714937982a8ba282
SHA2567a3c66abf352cf5608c040178f6838716330ec6e343f6a0fcd6e6e9aeb188c9a
SHA5121c3c2d5a1a34138703b22cf67df1963b39fe8a11b8495c4ab624fc755f6d4b71e0514ca267c6084e00306335dc3714ebac649ef6ada3aacca4ef6b8ecae7e859
-
Filesize
124KB
MD59bc5df69e8c2e70e51b92c2fca6904c7
SHA11ae85d51b8c5b5a8e77ce48d5bbc228535aa6893
SHA25650b782a66931af2fdcdbb26b4ff16f85da1a297a39d2e7db217858cc18ddd4f4
SHA512fb32fc1d449f483d5daf9fc0fc15f410f0ac970816f576b6155d53e377e4de0bff1bc58effe4297a3d50de6c34d23931cd85c33f531f3fa4b346e310471254e7
-
Filesize
124KB
MD56b4238d0c833e670476338a980cb74f9
SHA10baa7ef8021bcb867b99dea7f57ddb23e39aa293
SHA2568e8a95eb2d09a30ebfdded04b960c2718aed89b2357e9eb98006c6e8ed45cb65
SHA512c5bd163b1a30c6c41b2579c91257022db498a53f18b50981608c18261cb3735c4d19137e044d8035cefab0b6c7ff3ed358126cafb837237c52fb5a76a4326385
-
Filesize
124KB
MD5bf417f1e3063a1894ca678b042a2e8ae
SHA11f3342eb2d521a58b377036f4da5475aa363eb53
SHA256e5009a7d526ae1a9e6eb204b709652720c4c13ed8e5eb906093139a77024ed8d
SHA5129d0b0c4b5b483979222f242a6746bee0129a7f0c44c113889bd052d955c02d472189e9462db0d647324c9b0a2cb2036cc365bba140a498029b99f9162297a551
-
Filesize
124KB
MD555013be6df37b51a760656938e992585
SHA162cfe961b05e18f46514f1cb00e315db48a1ec3a
SHA25673d4ab0fd302284d117f185b69e1f17b5b139824009b8e2b3e729efe3fbbe4e8
SHA512dbc9d6406f4907f3c92a49014df125a7a0cf3679b6d40e0ec694f6e8e4fe8370d6e185fcc976699ca2a7e5fff73e1d89724f0e81b721d854aa8a789a0734fb92
-
Filesize
124KB
MD50e19cfe0932ecfeb416119e2b49997bb
SHA1d09d96f1f6407f7460f54690d583665aecef07a2
SHA25601df27b6b9906f30ae9cd65fa134d087e1abca7a14eee3a619a706e1b876fbf4
SHA5120d3d533c2961f55f8f4aec2b6bba7619d06648c06dcadf6a515d98301931af6b2811107c685b2129631a262a10944fa996f0f9962490c9eacebde3a039c1d5e1
-
Filesize
124KB
MD54f1f52f54c03425cb60a78ca759a75c1
SHA1d0bb316337590133c60a9c2b132085baccf29712
SHA2567f1ef963e20194529743f669ec3f00118443ba33fef54a58bc065bf454500431
SHA51233d03193011b7171273f1095392e0ba70d0934d9f41fb8f3537c5f805822197c2c36ebc7e80e202bbbd7c73c2718cf6fb9b2cde197deff6ecf95731df8bca432
-
Filesize
124KB
MD5fc8dd46caf83045b50fdcab68c7be398
SHA1b26f382324934a5cb609168287cb4c1938140ae3
SHA25636ae581509321a44fd9d5b8a0ca338c2bd8daf9125298ce5fc6613cad2f468c7
SHA512e446e6c314926e5d105548cc8d66550bfd9ea6a868a823185d7a5472d2a56173e2824d810906ea215d66e6a6c14506dc806623815a3921894f045f4ad84300b6
-
Filesize
124KB
MD50108dfec0dd253e4bdcb66b44ce8cbca
SHA1cfbdb3fb161b11c519a4fe9b3faf2037b00af2bc
SHA2568c7cb3f9ea2867cbb25d4370063d4b5d041543811d4ddb9df252e5e44f0a7017
SHA512753563551160dd1976ca85551abfb01a54b52cafc6a1f306038e1fcca72dedc67ea9dcb9ce08db5257db7b81c4c4972bed25d572520a0e8cd126692559c30d47
-
Filesize
124KB
MD587dcf07e46b1e298c604a77a9db73370
SHA18342791d4018ae89e03c73ae2154d538bf6c898d
SHA2567144ce8555dc5950041c24da50e7c9d584c76d4080578b09aefb25e740429b76
SHA51223dc1a6db151c89651b9fb4022e6ea77f6dd5a0ba66d3f7a1c12ec90f2982ecfb4e23641852cd1b300a4adfd7be49fc95fbbd70412cd64dcaf36135c9f226cb0
-
Filesize
124KB
MD5cad68217366c692356d97e664ef984c8
SHA16360a3dd2eb3408849fc831ec7d74445f03cb586
SHA256d0306911b6096f1e2399b2917e2355b3eeed4ffb17dc9121fd24c9be456a0451
SHA5124b9751b2e8247ea711a14f7a613bef676163262dcfc2d6dbafddd5625183f9ebdae0101d0e0f581806b6772d0de5f1c4e0a7a3e889558120398e5790eccbca21
-
Filesize
124KB
MD54cbb47ac4bb2c57ba333fd93fc5bc7b1
SHA1dad3a8724c5491bc148a55dfd16c63840be4baf4
SHA256aaf1e3c4cea682d25795a955ef04f8642f98c79bc7771744c39a45bd5ac08a27
SHA5126284d5d21cab89acd959c6d3541a4642a15bee7cd1f94276693e66bfd03f070db0e03acde20e860d8eec1779de94995de5d7cff53152834333bca8331db87798
-
Filesize
124KB
MD564b88ff457edf3d274ceab4425ba5475
SHA12ff9615757a6b391438b23eac506216519286e0e
SHA256c5f370ae903573ed7115ccd8e35ed53c9a2a2663f1f7187540b5478f8eccab69
SHA512bdc06fca1a05af14f7545753c4d089bc90885045d1ef275fc31b44343398e6414645b8c97f17d1890c16b645dc09f44b29dd8c294e3934b70cfc67419ab9ceb2
-
Filesize
124KB
MD5a8dbe68ec67c51278b22678a2630d643
SHA16095235e89484458a598798865637c0008150372
SHA2560410963d580683a04580bbc7d8cc5a7e9513eca20d6114396a6e7a120facca3e
SHA5128744c92da4f47af759b45439651f77c8b4ce47e64831d9347403a5bea731a40d131b0faf94c762b4801ad03bcafdb4cc502114af4e3390a77dc39fc3e8fa6f27