Analysis
-
max time kernel
153s -
max time network
119s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
24-01-2022 01:18
Static task
static1
Behavioral task
behavioral1
Sample
af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe
Resource
win10-en-20211208
General
-
Target
af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe
-
Size
247KB
-
MD5
d19dd26e8431e2bf91a977e6cbda25ae
-
SHA1
5632744a3749814de3964a505091ab368ad1b20b
-
SHA256
af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8
-
SHA512
1d9b09edb34c1c68024279ab3487b17cf67e2e395cd8a109ff3c1e2d23dadf96c163431019542e58755f294a2dae593b6fb3c7f1b88eca2007629e40dff8d358
Malware Config
Signatures
-
Detect Neshta Payload 47 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\3582-490\af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe family_neshta C:\Windows\svchost.com family_neshta C:\Windows\svchost.com family_neshta \Users\Admin\AppData\Local\Temp\3582-490\af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe family_neshta C:\Windows\svchost.com family_neshta \Users\Admin\AppData\Local\Temp\3582-490\af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe family_neshta C:\Windows\svchost.com family_neshta \Users\Admin\AppData\Local\Temp\3582-490\af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe family_neshta C:\Windows\svchost.com family_neshta \Users\Admin\AppData\Local\Temp\3582-490\af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe family_neshta C:\Windows\svchost.com family_neshta \Users\Admin\AppData\Local\Temp\3582-490\af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe family_neshta C:\Windows\svchost.com family_neshta \Users\Admin\AppData\Local\Temp\3582-490\af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe family_neshta C:\Windows\svchost.com family_neshta C:\MSOCache\ALLUSE~1\{90140~1\DW20.EXE family_neshta \Users\Admin\AppData\Local\Temp\3582-490\af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe family_neshta C:\MSOCache\ALLUSE~1\{90140~1\dwtrig20.exe family_neshta \MSOCache\ALLUSE~1\{90140~1\DW20.EXE family_neshta C:\Windows\svchost.com family_neshta \Users\Admin\AppData\Local\Temp\3582-490\af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe family_neshta C:\Windows\svchost.com family_neshta \Users\Admin\AppData\Local\Temp\3582-490\af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe family_neshta C:\Windows\svchost.com family_neshta \Users\Admin\AppData\Local\Temp\3582-490\af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe family_neshta -
Modifies system executable filetype association 2 TTPs 1 IoCs
Processes:
af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Sodin,Sodinokibi,REvil
Ransomware with advanced anti-analysis and privilege escalation functionality.
-
Executes dropped EXE 64 IoCs
Processes:
af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exesvchost.comAF47F8~1.EXEsvchost.comAF47F8~1.EXEsvchost.comAF47F8~1.EXEsvchost.comAF47F8~1.EXEsvchost.comAF47F8~1.EXEsvchost.comAF47F8~1.EXEsvchost.comAF47F8~1.EXEsvchost.comAF47F8~1.EXEsvchost.comAF47F8~1.EXEsvchost.comAF47F8~1.EXEsvchost.comAF47F8~1.EXEsvchost.comAF47F8~1.EXEsvchost.comAF47F8~1.EXEsvchost.comAF47F8~1.EXEsvchost.comAF47F8~1.EXEsvchost.comAF47F8~1.EXEsvchost.comAF47F8~1.EXEsvchost.comAF47F8~1.EXEsvchost.comAF47F8~1.EXEsvchost.comAF47F8~1.EXEsvchost.comAF47F8~1.EXEsvchost.comAF47F8~1.EXEsvchost.comAF47F8~1.EXEsvchost.comAF47F8~1.EXEsvchost.comAF47F8~1.EXEsvchost.comAF47F8~1.EXEsvchost.comAF47F8~1.EXEsvchost.comAF47F8~1.EXEsvchost.comAF47F8~1.EXEsvchost.comAF47F8~1.EXEsvchost.comAF47F8~1.EXEsvchost.compid process 652 af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe 1164 svchost.com 1720 AF47F8~1.EXE 1812 svchost.com 1644 AF47F8~1.EXE 968 svchost.com 1964 AF47F8~1.EXE 1592 svchost.com 1524 AF47F8~1.EXE 1564 svchost.com 764 AF47F8~1.EXE 1932 svchost.com 1840 AF47F8~1.EXE 316 svchost.com 1936 AF47F8~1.EXE 1476 svchost.com 1156 AF47F8~1.EXE 1572 svchost.com 760 AF47F8~1.EXE 288 svchost.com 544 AF47F8~1.EXE 1012 svchost.com 812 AF47F8~1.EXE 1928 svchost.com 1960 AF47F8~1.EXE 1600 svchost.com 1508 AF47F8~1.EXE 1904 svchost.com 1640 AF47F8~1.EXE 1308 svchost.com 1584 AF47F8~1.EXE 1316 svchost.com 1892 AF47F8~1.EXE 1712 svchost.com 1688 AF47F8~1.EXE 972 svchost.com 1984 AF47F8~1.EXE 912 svchost.com 888 AF47F8~1.EXE 316 svchost.com 1936 AF47F8~1.EXE 1092 svchost.com 1576 AF47F8~1.EXE 1500 svchost.com 588 AF47F8~1.EXE 568 svchost.com 1112 AF47F8~1.EXE 1164 svchost.com 620 AF47F8~1.EXE 1720 svchost.com 1812 AF47F8~1.EXE 1952 svchost.com 1236 AF47F8~1.EXE 968 svchost.com 1940 AF47F8~1.EXE 1596 svchost.com 1580 AF47F8~1.EXE 1632 svchost.com 988 AF47F8~1.EXE 1704 svchost.com 1824 AF47F8~1.EXE 1728 svchost.com 1712 AF47F8~1.EXE 2028 svchost.com -
Loads dropped DLL 64 IoCs
Processes:
af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exesvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comaf47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exesvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.compid process 480 af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe 480 af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe 1164 svchost.com 1164 svchost.com 1812 svchost.com 1812 svchost.com 968 svchost.com 968 svchost.com 1592 svchost.com 1592 svchost.com 1564 svchost.com 1564 svchost.com 1932 svchost.com 1932 svchost.com 316 svchost.com 316 svchost.com 652 af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe 1476 svchost.com 1476 svchost.com 1572 svchost.com 1572 svchost.com 288 svchost.com 288 svchost.com 1012 svchost.com 1012 svchost.com 1928 svchost.com 1928 svchost.com 1600 svchost.com 1600 svchost.com 1904 svchost.com 1904 svchost.com 1308 svchost.com 1308 svchost.com 1316 svchost.com 1316 svchost.com 1712 svchost.com 1712 svchost.com 972 svchost.com 972 svchost.com 912 svchost.com 912 svchost.com 316 svchost.com 316 svchost.com 1092 svchost.com 1092 svchost.com 1500 svchost.com 1500 svchost.com 568 svchost.com 568 svchost.com 1164 svchost.com 1164 svchost.com 1720 svchost.com 1720 svchost.com 1952 svchost.com 1952 svchost.com 968 svchost.com 968 svchost.com 1596 svchost.com 1596 svchost.com 1632 svchost.com 1632 svchost.com 1704 svchost.com 1704 svchost.com 1728 svchost.com -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
Processes:
af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exeaf47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exedescription ioc process File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ADOBEC~1.EXE af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\SETUPF~1\{AC76B~1\Setup.exe af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOICONS.EXE af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOUC.EXE af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\SOURCE~1\OSE.EXE af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~2\WI54FB~1\WMPDMC.exe af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\ink\mip.exe af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~3.EXE af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~3\PACKAG~1\{F4220~1\VC_RED~1.EXE af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\EQUATION\EQNEDT32.EXE af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\A3DUTI~1.EXE af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOSYNC.EXE af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORDB.EXE af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\OIS.EXE af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Resource\Icons\SC_REA~1.EXE af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\DW\DWTRIG20.EXE af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GRAPH.EXE af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GROOVEMN.EXE af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\INFOPATH.EXE af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\FLTLDR.EXE af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\TextConv\WksConv\Wkconv.exe af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\IECONT~1.EXE af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORDB.EXE af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmplayer.exe af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmprph.exe af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\AcroRd32.exe af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOXMLED.EXE af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\LICLUA.EXE af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~4.EXE af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ACCICONS.EXE af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~2\WI54FB~1\WMPDMC.exe af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~2.EXE af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOF5E2~1.EXE af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\misc.exe af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\EQUATION\EQNEDT32.EXE af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~2.EXE af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GROOVEMN.EXE af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSQRY32.EXE af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~2\WINDOW~2\ACCESS~1\wordpad.exe af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOXMLED.EXE af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GO664E~1.EXE af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\INFOPATH.EXE af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~2\WINDOW~1\wabmig.exe af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\A3DUTI~1.EXE af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\misc.exe af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpshare.exe af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\Setup.exe af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~1.EXE af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTEM.EXE af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~2\WI54FB~1\setup_wm.exe af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~2\WI4223~1\sidebar.exe af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\WORDICON.EXE af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~2\WINDOW~1\wabmig.exe af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\ODeploy.exe af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe -
Drops file in Windows directory 64 IoCs
Processes:
svchost.comAF47F8~1.EXEAF47F8~1.EXEAF47F8~1.EXEAF47F8~1.EXEsvchost.comAF47F8~1.EXEAF47F8~1.EXEAF47F8~1.EXEAF47F8~1.EXEsvchost.comsvchost.comAF47F8~1.EXEAF47F8~1.EXEAF47F8~1.EXEsvchost.comAF47F8~1.EXEsvchost.comsvchost.comsvchost.comAF47F8~1.EXEsvchost.comsvchost.comAF47F8~1.EXEsvchost.comAF47F8~1.EXEAF47F8~1.EXEsvchost.comsvchost.comAF47F8~1.EXEAF47F8~1.EXEAF47F8~1.EXEsvchost.comsvchost.comsvchost.comAF47F8~1.EXEsvchost.comAF47F8~1.EXEdescription ioc process File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com AF47F8~1.EXE File opened for modification C:\Windows\directx.sys AF47F8~1.EXE File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\directx.sys File opened for modification C:\Windows\directx.sys AF47F8~1.EXE File opened for modification C:\Windows\svchost.com AF47F8~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys AF47F8~1.EXE File opened for modification C:\Windows\directx.sys AF47F8~1.EXE File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\svchost.com AF47F8~1.EXE File opened for modification C:\Windows\directx.sys AF47F8~1.EXE File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\directx.sys File opened for modification C:\Windows\directx.sys File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\directx.sys AF47F8~1.EXE File opened for modification C:\Windows\svchost.com AF47F8~1.EXE File opened for modification C:\Windows\directx.sys File opened for modification C:\Windows\directx.sys AF47F8~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com AF47F8~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys AF47F8~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys AF47F8~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com AF47F8~1.EXE File opened for modification C:\Windows\directx.sys File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\directx.sys AF47F8~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com AF47F8~1.EXE File opened for modification C:\Windows\svchost.com AF47F8~1.EXE File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\directx.sys AF47F8~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\directx.sys AF47F8~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com AF47F8~1.EXE File opened for modification C:\Windows\directx.sys -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
Processes:
af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exeaf47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exesvchost.comAF47F8~1.EXEsvchost.comAF47F8~1.EXEsvchost.comAF47F8~1.EXEsvchost.comAF47F8~1.EXEsvchost.comAF47F8~1.EXEsvchost.comAF47F8~1.EXEsvchost.comAF47F8~1.EXEdescription pid process target process PID 480 wrote to memory of 652 480 af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe PID 480 wrote to memory of 652 480 af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe PID 480 wrote to memory of 652 480 af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe PID 480 wrote to memory of 652 480 af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe PID 652 wrote to memory of 1164 652 af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe svchost.com PID 652 wrote to memory of 1164 652 af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe svchost.com PID 652 wrote to memory of 1164 652 af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe svchost.com PID 652 wrote to memory of 1164 652 af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe svchost.com PID 1164 wrote to memory of 1720 1164 svchost.com AF47F8~1.EXE PID 1164 wrote to memory of 1720 1164 svchost.com AF47F8~1.EXE PID 1164 wrote to memory of 1720 1164 svchost.com AF47F8~1.EXE PID 1164 wrote to memory of 1720 1164 svchost.com AF47F8~1.EXE PID 1720 wrote to memory of 1812 1720 AF47F8~1.EXE svchost.com PID 1720 wrote to memory of 1812 1720 AF47F8~1.EXE svchost.com PID 1720 wrote to memory of 1812 1720 AF47F8~1.EXE svchost.com PID 1720 wrote to memory of 1812 1720 AF47F8~1.EXE svchost.com PID 1812 wrote to memory of 1644 1812 svchost.com AF47F8~1.EXE PID 1812 wrote to memory of 1644 1812 svchost.com AF47F8~1.EXE PID 1812 wrote to memory of 1644 1812 svchost.com AF47F8~1.EXE PID 1812 wrote to memory of 1644 1812 svchost.com AF47F8~1.EXE PID 1644 wrote to memory of 968 1644 AF47F8~1.EXE svchost.com PID 1644 wrote to memory of 968 1644 AF47F8~1.EXE svchost.com PID 1644 wrote to memory of 968 1644 AF47F8~1.EXE svchost.com PID 1644 wrote to memory of 968 1644 AF47F8~1.EXE svchost.com PID 968 wrote to memory of 1964 968 svchost.com AF47F8~1.EXE PID 968 wrote to memory of 1964 968 svchost.com AF47F8~1.EXE PID 968 wrote to memory of 1964 968 svchost.com AF47F8~1.EXE PID 968 wrote to memory of 1964 968 svchost.com AF47F8~1.EXE PID 1964 wrote to memory of 1592 1964 AF47F8~1.EXE svchost.com PID 1964 wrote to memory of 1592 1964 AF47F8~1.EXE svchost.com PID 1964 wrote to memory of 1592 1964 AF47F8~1.EXE svchost.com PID 1964 wrote to memory of 1592 1964 AF47F8~1.EXE svchost.com PID 1592 wrote to memory of 1524 1592 svchost.com AF47F8~1.EXE PID 1592 wrote to memory of 1524 1592 svchost.com AF47F8~1.EXE PID 1592 wrote to memory of 1524 1592 svchost.com AF47F8~1.EXE PID 1592 wrote to memory of 1524 1592 svchost.com AF47F8~1.EXE PID 1524 wrote to memory of 1564 1524 AF47F8~1.EXE svchost.com PID 1524 wrote to memory of 1564 1524 AF47F8~1.EXE svchost.com PID 1524 wrote to memory of 1564 1524 AF47F8~1.EXE svchost.com PID 1524 wrote to memory of 1564 1524 AF47F8~1.EXE svchost.com PID 1564 wrote to memory of 764 1564 svchost.com AF47F8~1.EXE PID 1564 wrote to memory of 764 1564 svchost.com AF47F8~1.EXE PID 1564 wrote to memory of 764 1564 svchost.com AF47F8~1.EXE PID 1564 wrote to memory of 764 1564 svchost.com AF47F8~1.EXE PID 764 wrote to memory of 1932 764 AF47F8~1.EXE svchost.com PID 764 wrote to memory of 1932 764 AF47F8~1.EXE svchost.com PID 764 wrote to memory of 1932 764 AF47F8~1.EXE svchost.com PID 764 wrote to memory of 1932 764 AF47F8~1.EXE svchost.com PID 1932 wrote to memory of 1840 1932 svchost.com AF47F8~1.EXE PID 1932 wrote to memory of 1840 1932 svchost.com AF47F8~1.EXE PID 1932 wrote to memory of 1840 1932 svchost.com AF47F8~1.EXE PID 1932 wrote to memory of 1840 1932 svchost.com AF47F8~1.EXE PID 1840 wrote to memory of 316 1840 AF47F8~1.EXE svchost.com PID 1840 wrote to memory of 316 1840 AF47F8~1.EXE svchost.com PID 1840 wrote to memory of 316 1840 AF47F8~1.EXE svchost.com PID 1840 wrote to memory of 316 1840 AF47F8~1.EXE svchost.com PID 316 wrote to memory of 1936 316 svchost.com AF47F8~1.EXE PID 316 wrote to memory of 1936 316 svchost.com AF47F8~1.EXE PID 316 wrote to memory of 1936 316 svchost.com AF47F8~1.EXE PID 316 wrote to memory of 1936 316 svchost.com AF47F8~1.EXE PID 1936 wrote to memory of 1476 1936 AF47F8~1.EXE svchost.com PID 1936 wrote to memory of 1476 1936 AF47F8~1.EXE svchost.com PID 1936 wrote to memory of 1476 1936 AF47F8~1.EXE svchost.com PID 1936 wrote to memory of 1476 1936 AF47F8~1.EXE svchost.com
Processes
-
C:\Users\Admin\AppData\Local\Temp\af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe"C:\Users\Admin\AppData\Local\Temp\af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe"1⤵
- Modifies system executable filetype association
- Loads dropped DLL
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:480 -
C:\Users\Admin\AppData\Local\Temp\3582-490\af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\af47f867ba8d67380321101fe6fb6a4bb087e8bd22ad3bf8989c5dee667740a8.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:652 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE4⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:968 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE12⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1476 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE18⤵
- Executes dropped EXE
PID:1156 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1572 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE20⤵
- Executes dropped EXE
PID:760 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"21⤵
- Executes dropped EXE
- Loads dropped DLL
PID:288 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE22⤵
- Executes dropped EXE
PID:544 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1012 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE24⤵
- Executes dropped EXE
PID:812 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1928 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE26⤵
- Executes dropped EXE
PID:1960 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"27⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1600 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE28⤵
- Executes dropped EXE
PID:1508 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1904 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE30⤵
- Executes dropped EXE
PID:1640 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"31⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1308 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE32⤵
- Executes dropped EXE
PID:1584 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"33⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1316 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE34⤵
- Executes dropped EXE
PID:1892 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"35⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1712 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE36⤵
- Executes dropped EXE
PID:1688 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"37⤵
- Executes dropped EXE
- Loads dropped DLL
PID:972 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE38⤵
- Executes dropped EXE
PID:1984 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"39⤵
- Executes dropped EXE
- Loads dropped DLL
PID:912 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE40⤵
- Executes dropped EXE
PID:888 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"41⤵
- Executes dropped EXE
- Loads dropped DLL
PID:316 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE42⤵
- Executes dropped EXE
PID:1936 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"43⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1092 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE44⤵
- Executes dropped EXE
PID:1576 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"45⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1500 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE46⤵
- Executes dropped EXE
PID:588 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"47⤵
- Executes dropped EXE
- Loads dropped DLL
PID:568 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE48⤵
- Executes dropped EXE
PID:1112 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"49⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1164 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE50⤵
- Executes dropped EXE
PID:620 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"51⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1720 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE52⤵
- Executes dropped EXE
PID:1812 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"53⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1952 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE54⤵
- Executes dropped EXE
PID:1236 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"55⤵
- Executes dropped EXE
- Loads dropped DLL
PID:968 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE56⤵
- Executes dropped EXE
PID:1940 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"57⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1596 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE58⤵
- Executes dropped EXE
PID:1580 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"59⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1632 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE60⤵
- Executes dropped EXE
PID:988 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"61⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE62⤵
- Executes dropped EXE
PID:1824 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"63⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:1728 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE64⤵
- Executes dropped EXE
PID:1712 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"65⤵
- Executes dropped EXE
PID:2028 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE66⤵PID:1764
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"67⤵PID:740
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE68⤵PID:912
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"69⤵PID:1152
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE70⤵PID:1756
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"71⤵PID:1260
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE72⤵PID:1476
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"73⤵PID:272
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE74⤵PID:112
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"75⤵PID:1652
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE76⤵PID:1160
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"77⤵PID:1060
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE78⤵PID:1148
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"79⤵PID:784
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE80⤵PID:812
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"81⤵PID:1928
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE82⤵PID:1960
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"83⤵PID:1588
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE84⤵
- Drops file in Windows directory
PID:1508 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"85⤵PID:1592
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE86⤵PID:992
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"87⤵PID:1308
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE88⤵PID:1032
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"89⤵PID:1880
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE90⤵PID:1892
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"91⤵PID:1784
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE92⤵PID:996
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"93⤵PID:820
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE94⤵PID:1900
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"95⤵PID:1764
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE96⤵PID:888
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"97⤵
- Drops file in Windows directory
PID:1936 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE98⤵PID:1548
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"99⤵PID:1576
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE100⤵PID:528
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"101⤵PID:588
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE102⤵PID:1572
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"103⤵PID:1760
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE104⤵PID:568
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"105⤵PID:1644
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE106⤵PID:668
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"107⤵PID:1956
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE108⤵PID:544
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"109⤵PID:1392
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE110⤵PID:1136
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"111⤵PID:1940
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE112⤵PID:656
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"113⤵PID:1580
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE114⤵PID:1636
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"115⤵PID:992
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE116⤵PID:2020
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"117⤵PID:1308
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE118⤵PID:1708
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"119⤵PID:1892
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE120⤵PID:1360
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE"121⤵PID:1712
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AF47F8~1.EXE122⤵PID:688
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-