Analysis
-
max time kernel
165s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
03-06-2022 01:59
Static task
static1
Behavioral task
behavioral1
Sample
1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe
Resource
win10v2004-20220414-en
General
-
Target
1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe
-
Size
465KB
-
MD5
ca6fe59945cf7d7ab411ec47fad20c80
-
SHA1
92aa2e90a9368496193b052be0cd3c6e266e0663
-
SHA256
1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb
-
SHA512
7ca4130dc0a53cfd6e3ef7670befc9d00dab64e3e1f9a20d5bd5b8178ea41f71601972711175db1169401d71611157b652bd011fed283ecad54fd98e3f53ebca
Malware Config
Signatures
-
Detect Neshta Payload 46 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\3582-490\1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe family_neshta C:\Windows\svchost.com family_neshta C:\MSOCache\ALLUSE~1\{9A861~1\ose.exe family_neshta C:\Windows\svchost.com family_neshta \Users\Admin\AppData\Local\Temp\3582-490\1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe family_neshta C:\Windows\svchost.com family_neshta \Users\Admin\AppData\Local\Temp\3582-490\1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe family_neshta C:\MSOCache\ALLUSE~1\{90140~1\DW20.EXE family_neshta C:\MSOCache\ALLUSE~1\{90140~1\dwtrig20.exe family_neshta \MSOCache\ALLUSE~1\{90140~1\dwtrig20.exe family_neshta C:\Windows\svchost.com family_neshta \Users\Admin\AppData\Local\Temp\3582-490\1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe family_neshta C:\Windows\svchost.com family_neshta \Users\Admin\AppData\Local\Temp\3582-490\1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe family_neshta C:\Windows\svchost.com family_neshta \Users\Admin\AppData\Local\Temp\3582-490\1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe family_neshta C:\Windows\svchost.com family_neshta \Users\Admin\AppData\Local\Temp\3582-490\1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe family_neshta C:\Windows\svchost.com family_neshta \Users\Admin\AppData\Local\Temp\3582-490\1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe family_neshta C:\Windows\svchost.com family_neshta \Users\Admin\AppData\Local\Temp\3582-490\1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe family_neshta C:\Windows\svchost.com family_neshta \Users\Admin\AppData\Local\Temp\3582-490\1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe family_neshta C:\Windows\svchost.com family_neshta -
Modifies system executable filetype association 2 TTPs 1 IoCs
Processes:
1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Executes dropped EXE 64 IoCs
Processes:
1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exesvchost.com1423E8~1.EXEsvchost.com1423E8~1.EXEsvchost.com1423E8~1.EXEsvchost.com1423E8~1.EXEsvchost.com1423E8~1.EXEsvchost.com1423E8~1.EXEsvchost.com1423E8~1.EXEsvchost.com1423E8~1.EXEsvchost.com1423E8~1.EXEsvchost.com1423E8~1.EXEsvchost.com1423E8~1.EXEsvchost.com1423E8~1.EXEsvchost.com1423E8~1.EXEsvchost.com1423E8~1.EXEsvchost.com1423E8~1.EXEsvchost.com1423E8~1.EXEsvchost.com1423E8~1.EXEsvchost.com1423E8~1.EXEsvchost.com1423E8~1.EXEsvchost.com1423E8~1.EXEsvchost.com1423E8~1.EXEsvchost.com1423E8~1.EXEsvchost.com1423E8~1.EXEsvchost.com1423E8~1.EXEsvchost.com1423E8~1.EXEsvchost.com1423E8~1.EXEsvchost.com1423E8~1.EXEsvchost.com1423E8~1.EXEsvchost.com1423E8~1.EXEsvchost.com1423E8~1.EXEsvchost.com1423E8~1.EXEsvchost.compid process 1164 1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe 2044 svchost.com 880 1423E8~1.EXE 1928 svchost.com 276 1423E8~1.EXE 948 svchost.com 1504 1423E8~1.EXE 604 svchost.com 1796 1423E8~1.EXE 1688 svchost.com 1136 1423E8~1.EXE 1172 svchost.com 1704 1423E8~1.EXE 1912 svchost.com 1072 1423E8~1.EXE 1860 svchost.com 1140 1423E8~1.EXE 1048 svchost.com 1824 1423E8~1.EXE 1220 svchost.com 1624 1423E8~1.EXE 928 svchost.com 556 1423E8~1.EXE 924 svchost.com 1476 1423E8~1.EXE 1884 svchost.com 2040 1423E8~1.EXE 820 svchost.com 1576 1423E8~1.EXE 1572 svchost.com 1960 1423E8~1.EXE 1732 svchost.com 1468 1423E8~1.EXE 1560 svchost.com 1804 1423E8~1.EXE 1752 svchost.com 848 1423E8~1.EXE 1408 svchost.com 1860 1423E8~1.EXE 432 svchost.com 780 1423E8~1.EXE 880 svchost.com 1248 1423E8~1.EXE 1464 svchost.com 1624 1423E8~1.EXE 1084 svchost.com 556 1423E8~1.EXE 924 svchost.com 1476 1423E8~1.EXE 916 svchost.com 1796 1423E8~1.EXE 1568 svchost.com 576 1423E8~1.EXE 2008 svchost.com 1412 1423E8~1.EXE 1988 svchost.com 1856 1423E8~1.EXE 2020 svchost.com 384 1423E8~1.EXE 940 svchost.com 1300 1423E8~1.EXE 2044 svchost.com 1860 1423E8~1.EXE 432 svchost.com -
Loads dropped DLL 64 IoCs
Processes:
1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exesvchost.comsvchost.com1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exesvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.compid process 1364 1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe 1364 1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe 2044 svchost.com 2044 svchost.com 1928 svchost.com 1928 svchost.com 1164 1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe 948 svchost.com 948 svchost.com 604 svchost.com 604 svchost.com 1688 svchost.com 1688 svchost.com 1172 svchost.com 1172 svchost.com 1912 svchost.com 1912 svchost.com 1860 svchost.com 1860 svchost.com 1048 svchost.com 1048 svchost.com 1220 svchost.com 1220 svchost.com 928 svchost.com 928 svchost.com 924 svchost.com 924 svchost.com 1884 svchost.com 1884 svchost.com 1164 1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe 820 svchost.com 820 svchost.com 1572 svchost.com 1572 svchost.com 1732 svchost.com 1732 svchost.com 1560 svchost.com 1560 svchost.com 1752 svchost.com 1752 svchost.com 1408 svchost.com 1408 svchost.com 432 svchost.com 432 svchost.com 880 svchost.com 880 svchost.com 1464 svchost.com 1464 svchost.com 1084 svchost.com 1084 svchost.com 924 svchost.com 924 svchost.com 916 svchost.com 916 svchost.com 1568 svchost.com 1568 svchost.com 2008 svchost.com 2008 svchost.com 1988 svchost.com 1988 svchost.com 2020 svchost.com 2020 svchost.com 940 svchost.com 940 svchost.com -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
Processes:
1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exedescription ioc process File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOF5E2~1.EXE 1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\VPREVIEW.EXE 1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\LICLUA.EXE 1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GROOVEMN.EXE 1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\POWERPNT.EXE 1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\WINWORD.EXE 1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GO664E~1.EXE 1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\Oarpmany.exe 1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\SOURCE~1\OSE.EXE 1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~4.EXE 1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~1.EXE 1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE 1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe File opened for modification C:\PROGRA~2\WINDOW~1\WinMail.exe 1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\Eula.exe 1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe 1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe File opened for modification C:\PROGRA~2\WI54FB~1\setup_wm.exe 1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe File opened for modification C:\PROGRA~2\WI54FB~1\WMPDMC.exe 1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe File opened for modification C:\PROGRA~2\WINDOW~4\ImagingDevices.exe 1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBEU~1.EXE 1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\LICLUA.EXE 1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~3.EXE 1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSQRY32.EXE 1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE 1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe File opened for modification C:\PROGRA~2\WI54FB~1\setup_wm.exe 1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe 1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\SETUPF~1\{AC76B~1\Setup.exe 1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ACCICONS.EXE 1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmlaunch.exe 1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE 1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\PPTICO.EXE 1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ACCICONS.EXE 1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\1033\ONELEV.EXE 1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe File opened for modification C:\PROGRA~2\WINDOW~1\wab.exe 1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe File opened for modification C:\PROGRA~2\WINDOW~1\wabmig.exe 1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE 1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOHTMED.EXE 1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORE.EXE 1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\SELFCERT.EXE 1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpconfig.exe 1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe File opened for modification C:\PROGRA~2\WINDOW~4\ImagingDevices.exe 1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE 1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOUC.EXE 1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOICONS.EXE 1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOBD5D~1.EXE 1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE 1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\EQUATION\EQNEDT32.EXE 1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\FLTLDR.EXE 1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE 1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe 1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTE.EXE 1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\SELFCERT.EXE 1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe File opened for modification C:\PROGRA~2\COMMON~1\ADOBEA~1\Versions\1.0\ADOBEA~1.EXE 1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\Setup.exe 1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GO664E~1.EXE 1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE 1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmprph.exe 1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOXMLED.EXE 1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\ODeploy.exe 1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORDB.EXE 1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORE.EXE 1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpshare.exe 1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\AcroRd32.exe 1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\Oarpmany.exe 1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\TextConv\WksConv\Wkconv.exe 1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe -
Drops file in Windows directory 64 IoCs
Processes:
1423E8~1.EXE1423E8~1.EXE1423E8~1.EXEsvchost.com1423E8~1.EXEsvchost.com1423E8~1.EXEsvchost.comsvchost.comsvchost.com1423E8~1.EXEsvchost.comsvchost.comsvchost.comsvchost.com1423E8~1.EXEsvchost.comsvchost.com1423E8~1.EXE1423E8~1.EXE1423E8~1.EXE1423E8~1.EXE1423E8~1.EXE1423E8~1.EXE1423E8~1.EXE1423E8~1.EXEsvchost.comsvchost.comsvchost.comsvchost.com1423E8~1.EXEsvchost.comsvchost.com1423E8~1.EXE1423E8~1.EXEsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.com1423E8~1.EXEsvchost.comsvchost.com1423E8~1.EXE1423E8~1.EXE1423E8~1.EXEsvchost.com1423E8~1.EXEsvchost.comsvchost.comsvchost.comsvchost.com1423E8~1.EXEsvchost.comsvchost.com1423E8~1.EXEsvchost.comdescription ioc process File opened for modification C:\Windows\svchost.com 1423E8~1.EXE File opened for modification C:\Windows\directx.sys 1423E8~1.EXE File opened for modification C:\Windows\svchost.com 1423E8~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 1423E8~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 1423E8~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 1423E8~1.EXE File opened for modification C:\Windows\directx.sys File opened for modification C:\Windows\directx.sys File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 1423E8~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 1423E8~1.EXE File opened for modification C:\Windows\svchost.com 1423E8~1.EXE File opened for modification C:\Windows\directx.sys 1423E8~1.EXE File opened for modification C:\Windows\directx.sys 1423E8~1.EXE File opened for modification C:\Windows\svchost.com 1423E8~1.EXE File opened for modification C:\Windows\svchost.com 1423E8~1.EXE File opened for modification C:\Windows\svchost.com 1423E8~1.EXE File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\directx.sys 1423E8~1.EXE File opened for modification C:\Windows\svchost.com 1423E8~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 1423E8~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 1423E8~1.EXE File opened for modification C:\Windows\directx.sys 1423E8~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 1423E8~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 1423E8~1.EXE File opened for modification C:\Windows\directx.sys 1423E8~1.EXE File opened for modification C:\Windows\svchost.com 1423E8~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 1423E8~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 1423E8~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 1423E8~1.EXE File opened for modification C:\Windows\svchost.com svchost.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
pid pid_target process target process 852 1236 -
Modifies registry class 1 IoCs
Processes:
1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exesvchost.com1423E8~1.EXEsvchost.com1423E8~1.EXEsvchost.com1423E8~1.EXEsvchost.com1423E8~1.EXEsvchost.com1423E8~1.EXEsvchost.com1423E8~1.EXEsvchost.com1423E8~1.EXEdescription pid process target process PID 1364 wrote to memory of 1164 1364 1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe 1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe PID 1364 wrote to memory of 1164 1364 1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe 1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe PID 1364 wrote to memory of 1164 1364 1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe 1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe PID 1364 wrote to memory of 1164 1364 1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe 1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe PID 1164 wrote to memory of 2044 1164 1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe svchost.com PID 1164 wrote to memory of 2044 1164 1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe svchost.com PID 1164 wrote to memory of 2044 1164 1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe svchost.com PID 1164 wrote to memory of 2044 1164 1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe svchost.com PID 2044 wrote to memory of 880 2044 svchost.com 1423E8~1.EXE PID 2044 wrote to memory of 880 2044 svchost.com 1423E8~1.EXE PID 2044 wrote to memory of 880 2044 svchost.com 1423E8~1.EXE PID 2044 wrote to memory of 880 2044 svchost.com 1423E8~1.EXE PID 880 wrote to memory of 1928 880 1423E8~1.EXE svchost.com PID 880 wrote to memory of 1928 880 1423E8~1.EXE svchost.com PID 880 wrote to memory of 1928 880 1423E8~1.EXE svchost.com PID 880 wrote to memory of 1928 880 1423E8~1.EXE svchost.com PID 1928 wrote to memory of 276 1928 svchost.com 1423E8~1.EXE PID 1928 wrote to memory of 276 1928 svchost.com 1423E8~1.EXE PID 1928 wrote to memory of 276 1928 svchost.com 1423E8~1.EXE PID 1928 wrote to memory of 276 1928 svchost.com 1423E8~1.EXE PID 276 wrote to memory of 948 276 1423E8~1.EXE svchost.com PID 276 wrote to memory of 948 276 1423E8~1.EXE svchost.com PID 276 wrote to memory of 948 276 1423E8~1.EXE svchost.com PID 276 wrote to memory of 948 276 1423E8~1.EXE svchost.com PID 948 wrote to memory of 1504 948 svchost.com 1423E8~1.EXE PID 948 wrote to memory of 1504 948 svchost.com 1423E8~1.EXE PID 948 wrote to memory of 1504 948 svchost.com 1423E8~1.EXE PID 948 wrote to memory of 1504 948 svchost.com 1423E8~1.EXE PID 1504 wrote to memory of 604 1504 1423E8~1.EXE svchost.com PID 1504 wrote to memory of 604 1504 1423E8~1.EXE svchost.com PID 1504 wrote to memory of 604 1504 1423E8~1.EXE svchost.com PID 1504 wrote to memory of 604 1504 1423E8~1.EXE svchost.com PID 604 wrote to memory of 1796 604 svchost.com 1423E8~1.EXE PID 604 wrote to memory of 1796 604 svchost.com 1423E8~1.EXE PID 604 wrote to memory of 1796 604 svchost.com 1423E8~1.EXE PID 604 wrote to memory of 1796 604 svchost.com 1423E8~1.EXE PID 1796 wrote to memory of 1688 1796 1423E8~1.EXE svchost.com PID 1796 wrote to memory of 1688 1796 1423E8~1.EXE svchost.com PID 1796 wrote to memory of 1688 1796 1423E8~1.EXE svchost.com PID 1796 wrote to memory of 1688 1796 1423E8~1.EXE svchost.com PID 1688 wrote to memory of 1136 1688 svchost.com 1423E8~1.EXE PID 1688 wrote to memory of 1136 1688 svchost.com 1423E8~1.EXE PID 1688 wrote to memory of 1136 1688 svchost.com 1423E8~1.EXE PID 1688 wrote to memory of 1136 1688 svchost.com 1423E8~1.EXE PID 1136 wrote to memory of 1172 1136 1423E8~1.EXE svchost.com PID 1136 wrote to memory of 1172 1136 1423E8~1.EXE svchost.com PID 1136 wrote to memory of 1172 1136 1423E8~1.EXE svchost.com PID 1136 wrote to memory of 1172 1136 1423E8~1.EXE svchost.com PID 1172 wrote to memory of 1704 1172 svchost.com 1423E8~1.EXE PID 1172 wrote to memory of 1704 1172 svchost.com 1423E8~1.EXE PID 1172 wrote to memory of 1704 1172 svchost.com 1423E8~1.EXE PID 1172 wrote to memory of 1704 1172 svchost.com 1423E8~1.EXE PID 1704 wrote to memory of 1912 1704 1423E8~1.EXE svchost.com PID 1704 wrote to memory of 1912 1704 1423E8~1.EXE svchost.com PID 1704 wrote to memory of 1912 1704 1423E8~1.EXE svchost.com PID 1704 wrote to memory of 1912 1704 1423E8~1.EXE svchost.com PID 1912 wrote to memory of 1072 1912 svchost.com 1423E8~1.EXE PID 1912 wrote to memory of 1072 1912 svchost.com 1423E8~1.EXE PID 1912 wrote to memory of 1072 1912 svchost.com 1423E8~1.EXE PID 1912 wrote to memory of 1072 1912 svchost.com 1423E8~1.EXE PID 1072 wrote to memory of 1860 1072 1423E8~1.EXE svchost.com PID 1072 wrote to memory of 1860 1072 1423E8~1.EXE svchost.com PID 1072 wrote to memory of 1860 1072 1423E8~1.EXE svchost.com PID 1072 wrote to memory of 1860 1072 1423E8~1.EXE svchost.com
Processes
-
C:\Users\Admin\AppData\Local\Temp\1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe"C:\Users\Admin\AppData\Local\Temp\1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe"1⤵
- Modifies system executable filetype association
- Loads dropped DLL
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE6⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:276 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:948 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:604 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1136 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE"15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE"17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1860 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE18⤵
- Executes dropped EXE
PID:1140 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE"19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1048 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE20⤵
- Executes dropped EXE
PID:1824 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE"21⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1220 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE22⤵
- Executes dropped EXE
PID:1624 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE"23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:928 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE24⤵
- Executes dropped EXE
PID:556 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE"25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:924 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE26⤵
- Executes dropped EXE
PID:1476 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE"27⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1884 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE28⤵
- Executes dropped EXE
PID:2040 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE"29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:820 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE30⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1576 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE"31⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1572 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE32⤵
- Executes dropped EXE
PID:1960 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE"33⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1732 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE34⤵
- Executes dropped EXE
PID:1468 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE"35⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1560 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE36⤵
- Executes dropped EXE
PID:1804 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE"37⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1752 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE38⤵
- Executes dropped EXE
PID:848 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE"39⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1408 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE40⤵
- Executes dropped EXE
PID:1860 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE"41⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:432 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE42⤵
- Executes dropped EXE
PID:780 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE"43⤵
- Executes dropped EXE
- Loads dropped DLL
PID:880 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE44⤵
- Executes dropped EXE
PID:1248 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE"45⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1464 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE46⤵
- Executes dropped EXE
PID:1624 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE"47⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1084 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE48⤵
- Executes dropped EXE
PID:556 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE"49⤵
- Executes dropped EXE
- Loads dropped DLL
PID:924 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE50⤵
- Executes dropped EXE
PID:1476 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE"51⤵
- Executes dropped EXE
- Loads dropped DLL
PID:916 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE52⤵
- Executes dropped EXE
PID:1796 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE"53⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:1568 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE54⤵
- Executes dropped EXE
PID:576 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE"55⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2008 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE56⤵
- Executes dropped EXE
PID:1412 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE"57⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1988 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE58⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1856 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE"59⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2020 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE60⤵
- Executes dropped EXE
PID:384 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE"61⤵
- Executes dropped EXE
- Loads dropped DLL
PID:940 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE62⤵
- Executes dropped EXE
PID:1300 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE"63⤵
- Executes dropped EXE
PID:2044 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE64⤵
- Executes dropped EXE
PID:1860 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE"65⤵
- Executes dropped EXE
PID:432 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE66⤵PID:964
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE"67⤵PID:1824
-
C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE68⤵PID:1208
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE"69⤵PID:1712
-
C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE70⤵
- Drops file in Windows directory
PID:276 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE"71⤵PID:292
-
C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE72⤵PID:1236
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE"73⤵PID:856
-
C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE74⤵PID:364
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE"75⤵PID:316
-
C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE76⤵PID:1476
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE"77⤵PID:916
-
C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE78⤵PID:2040
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE"79⤵PID:1760
-
C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE80⤵PID:1568
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE"81⤵PID:1776
-
C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE82⤵PID:1404
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE"83⤵PID:1816
-
C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE84⤵PID:1764
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE"85⤵PID:1856
-
C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE86⤵PID:616
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE"87⤵
- Drops file in Windows directory
PID:340 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE88⤵PID:1984
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE"89⤵PID:1072
-
C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE90⤵PID:848
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE"91⤵PID:568
-
C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE92⤵PID:1124
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE"93⤵PID:1700
-
C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE94⤵PID:1676
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE"95⤵PID:1148
-
C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE96⤵PID:1824
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE"97⤵
- Drops file in Windows directory
PID:1648 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE98⤵PID:1712
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE"99⤵PID:1784
-
C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE100⤵PID:2024
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE"101⤵PID:556
-
C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE102⤵PID:1872
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE"103⤵PID:1052
-
C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE104⤵PID:1744
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE"105⤵PID:1536
-
C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE106⤵PID:300
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE"107⤵PID:576
-
C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE108⤵PID:1704
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE"109⤵PID:1720
-
C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE110⤵
- Drops file in Windows directory
PID:1512 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE"111⤵PID:1724
-
C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE112⤵PID:1620
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE"113⤵PID:1508
-
C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE114⤵PID:1856
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE"115⤵
- Drops file in Windows directory
PID:268 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE116⤵PID:340
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE"117⤵PID:1544
-
C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE118⤵PID:940
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE"119⤵PID:1244
-
C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE120⤵PID:1880
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE"121⤵PID:432
-
C:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1423E8~1.EXE122⤵PID:1248
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-