Analysis
-
max time kernel
130s -
max time network
54s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30-08-2022 19:16
Behavioral task
behavioral1
Sample
1305dfd63f25ef125524254fbe531b10.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1305dfd63f25ef125524254fbe531b10.exe
Resource
win10v2004-20220812-en
General
-
Target
1305dfd63f25ef125524254fbe531b10.exe
-
Size
395KB
-
MD5
1305dfd63f25ef125524254fbe531b10
-
SHA1
70350be2974a05b86a68588f08508ea9c84b84bd
-
SHA256
e78769d506cc757f115a60278c2020a3591dc7c4bcd93f0efd3bdda76c7ba371
-
SHA512
5ab994f9b8a4355dc9e55532b5617580c257520088a02815a98127bb0c3ed772235ccf8688a74446942952cdc05b13eaac87ab489050326779ccfbade7e6f5ef
-
SSDEEP
6144:k93DbBU0m11xLBdX3rlDe83RvL8vgn+NbPhwpZLvIdiKvc6rB/vc6rRUeRUqntyf:eDbBU0mhLjrl7RvL8GIapZLv4foexar
Malware Config
Signatures
-
Detect Neshta payload 42 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\3582-490\1305dfd63f25ef125524254fbe531b10.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\1305dfd63f25ef125524254fbe531b10.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\1305dfd63f25ef125524254fbe531b10.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\1305dfd63f25ef125524254fbe531b10.exe family_neshta C:\Windows\svchost.com family_neshta C:\Windows\svchost.com family_neshta C:\MSOCache\ALLUSE~1\{90140~1\dwtrig20.exe family_neshta C:\MSOCache\ALLUSE~1\{90140~1\DW20.EXE family_neshta C:\MSOCache\ALLUSE~1\{9A861~1\setup.exe family_neshta C:\MSOCache\ALLUSE~1\{9A861~1\ose.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\1305dfd63f25ef125524254fbe531b10.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\1305dfd63f25ef125524254fbe531b10.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\1305dfd63f25ef125524254fbe531b10.exe family_neshta C:\Windows\svchost.com family_neshta \Users\Admin\AppData\Local\Temp\3582-490\1305dfd63f25ef125524254fbe531b10.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\1305dfd63f25ef125524254fbe531b10.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\1305dfd63f25ef125524254fbe531b10.exe family_neshta C:\Windows\svchost.com family_neshta \Users\Admin\AppData\Local\Temp\3582-490\1305dfd63f25ef125524254fbe531b10.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\1305dfd63f25ef125524254fbe531b10.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\1305dfd63f25ef125524254fbe531b10.exe family_neshta C:\Windows\svchost.com family_neshta \Users\Admin\AppData\Local\Temp\3582-490\1305dfd63f25ef125524254fbe531b10.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\1305dfd63f25ef125524254fbe531b10.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\1305dfd63f25ef125524254fbe531b10.exe family_neshta C:\Windows\svchost.com family_neshta \Users\Admin\AppData\Local\Temp\3582-490\1305dfd63f25ef125524254fbe531b10.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\1305dfd63f25ef125524254fbe531b10.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\1305dfd63f25ef125524254fbe531b10.exe family_neshta C:\Windows\svchost.com family_neshta \Users\Admin\AppData\Local\Temp\3582-490\1305dfd63f25ef125524254fbe531b10.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\1305dfd63f25ef125524254fbe531b10.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\1305dfd63f25ef125524254fbe531b10.exe family_neshta C:\Windows\svchost.com family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\1305dfd63f25ef125524254fbe531b10.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\1305dfd63f25ef125524254fbe531b10.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\1305dfd63f25ef125524254fbe531b10.exe family_neshta C:\Windows\svchost.com family_neshta \Users\Admin\AppData\Local\Temp\3582-490\1305dfd63f25ef125524254fbe531b10.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\1305dfd63f25ef125524254fbe531b10.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\1305dfd63f25ef125524254fbe531b10.exe family_neshta C:\Windows\svchost.com family_neshta -
Modifies system executable filetype association 2 TTPs 1 IoCs
Processes:
1305dfd63f25ef125524254fbe531b10.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 1305dfd63f25ef125524254fbe531b10.exe -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Executes dropped EXE 64 IoCs
Processes:
1305dfd63f25ef125524254fbe531b10.exesvchost.exe1305dfd63f25ef125524254fbe531b10.exesvchost.com1305DF~1.EXEsvchost.com1305DF~1.EXEsvchost.com1305DF~1.EXEsvchost.exesvchost.com1305DF~1.EXEsvchost.com1305DF~1.EXEsvchost.com1305DF~1.EXEsvchost.com1305DF~1.EXEsvchost.com1305DF~1.EXEsvchost.com1305DF~1.EXEsvchost.com1305DF~1.EXEsvchost.com1305DF~1.EXEsvchost.com1305DF~1.EXEsvchost.com1305DF~1.EXEsvchost.com1305DF~1.EXEsvchost.com1305DF~1.EXEsvchost.com1305DF~1.EXEsvchost.com1305DF~1.EXEsvchost.com1305DF~1.EXEsvchost.com1305DF~1.EXEsvchost.com1305DF~1.EXEsvchost.com1305DF~1.EXEsvchost.com1305DF~1.EXEsvchost.com1305DF~1.EXEsvchost.com1305DF~1.EXEsvchost.com1305DF~1.EXEsvchost.com1305DF~1.EXEsvchost.com1305DF~1.EXEsvchost.com1305DF~1.EXEsvchost.com1305DF~1.EXEsvchost.com1305DF~1.EXEpid process 1352 1305dfd63f25ef125524254fbe531b10.exe 1960 svchost.exe 1948 1305dfd63f25ef125524254fbe531b10.exe 1572 svchost.com 936 1305DF~1.EXE 520 svchost.com 1696 1305DF~1.EXE 1164 svchost.com 1060 1305DF~1.EXE 956 svchost.exe 1964 svchost.com 1884 1305DF~1.EXE 392 svchost.com 512 1305DF~1.EXE 1480 svchost.com 1492 1305DF~1.EXE 556 svchost.com 912 1305DF~1.EXE 1404 svchost.com 1756 1305DF~1.EXE 1596 svchost.com 1716 1305DF~1.EXE 1688 svchost.com 736 1305DF~1.EXE 1764 svchost.com 616 1305DF~1.EXE 812 svchost.com 1324 1305DF~1.EXE 1016 svchost.com 808 1305DF~1.EXE 1952 svchost.com 1944 1305DF~1.EXE 1748 svchost.com 852 1305DF~1.EXE 1672 svchost.com 1904 1305DF~1.EXE 1560 svchost.com 1136 1305DF~1.EXE 316 svchost.com 1800 1305DF~1.EXE 1320 svchost.com 1360 1305DF~1.EXE 992 svchost.com 676 1305DF~1.EXE 912 svchost.com 904 1305DF~1.EXE 1352 svchost.com 2036 1305DF~1.EXE 1732 svchost.com 1712 1305DF~1.EXE 1716 svchost.com 1572 1305DF~1.EXE 732 svchost.com 1856 1305DF~1.EXE 1764 svchost.com 616 1305DF~1.EXE 520 svchost.com 1324 1305DF~1.EXE 1212 svchost.com 808 1305DF~1.EXE 1420 svchost.com 268 1305DF~1.EXE 1964 svchost.com 1748 1305DF~1.EXE -
Processes:
resource yara_rule behavioral1/memory/560-1374-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Loads dropped DLL 64 IoCs
Processes:
1305dfd63f25ef125524254fbe531b10.exesvchost.exesvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.compid process 380 1305dfd63f25ef125524254fbe531b10.exe 380 1305dfd63f25ef125524254fbe531b10.exe 1960 svchost.exe 1960 svchost.exe 1572 svchost.com 1572 svchost.com 520 svchost.com 520 svchost.com 1164 svchost.com 1164 svchost.com 1964 svchost.com 1964 svchost.com 392 svchost.com 392 svchost.com 1480 svchost.com 1480 svchost.com 556 svchost.com 556 svchost.com 1404 svchost.com 1404 svchost.com 1596 svchost.com 1596 svchost.com 1688 svchost.com 1688 svchost.com 1764 svchost.com 1764 svchost.com 812 svchost.com 812 svchost.com 1016 svchost.com 1016 svchost.com 1952 svchost.com 1952 svchost.com 1748 svchost.com 1748 svchost.com 1672 svchost.com 1672 svchost.com 1560 svchost.com 1560 svchost.com 316 svchost.com 316 svchost.com 1320 svchost.com 1320 svchost.com 992 svchost.com 992 svchost.com 912 svchost.com 912 svchost.com 1352 svchost.com 1352 svchost.com 1732 svchost.com 1732 svchost.com 1716 svchost.com 1716 svchost.com 732 svchost.com 732 svchost.com 1764 svchost.com 1764 svchost.com 520 svchost.com 520 svchost.com 1212 svchost.com 1212 svchost.com 1420 svchost.com 1420 svchost.com 1964 svchost.com 1964 svchost.com -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
Processes:
1305dfd63f25ef125524254fbe531b10.exe1305dfd63f25ef125524254fbe531b10.exedescription ioc process File opened for modification C:\PROGRA~2\MICROS~1\Office14\ACCICONS.EXE 1305dfd63f25ef125524254fbe531b10.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\CNFNOT32.EXE 1305dfd63f25ef125524254fbe531b10.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTE.EXE 1305dfd63f25ef125524254fbe531b10.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmprph.exe 1305dfd63f25ef125524254fbe531b10.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpshare.exe 1305dfd63f25ef125524254fbe531b10.exe File opened for modification C:\PROGRA~2\WINDOW~2\ACCESS~1\wordpad.exe 1305dfd63f25ef125524254fbe531b10.exe File opened for modification C:\PROGRA~2\WINDOW~4\ImagingDevices.exe 1305dfd63f25ef125524254fbe531b10.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOF5E2~1.EXE 1305dfd63f25ef125524254fbe531b10.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\POWERPNT.EXE 1305dfd63f25ef125524254fbe531b10.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\POWERPNT.EXE 1305dfd63f25ef125524254fbe531b10.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE 1305dfd63f25ef125524254fbe531b10.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE 1305dfd63f25ef125524254fbe531b10.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\SOURCE~1\OSE.EXE 1305dfd63f25ef125524254fbe531b10.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\WORDICON.EXE 1305dfd63f25ef125524254fbe531b10.exe File opened for modification C:\PROGRA~2\WINDOW~1\wab.exe 1305dfd63f25ef125524254fbe531b10.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmprph.exe 1305dfd63f25ef125524254fbe531b10.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe 1305dfd63f25ef125524254fbe531b10.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTE.EXE 1305dfd63f25ef125524254fbe531b10.exe File opened for modification C:\PROGRA~2\WI54FB~1\WMPDMC.exe 1305dfd63f25ef125524254fbe531b10.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ADOBEC~1.EXE 1305dfd63f25ef125524254fbe531b10.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe 1305dfd63f25ef125524254fbe531b10.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\IECONT~1.EXE 1305dfd63f25ef125524254fbe531b10.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\XLICONS.EXE 1305dfd63f25ef125524254fbe531b10.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpshare.exe 1305dfd63f25ef125524254fbe531b10.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\A3DUTI~1.EXE 1305dfd63f25ef125524254fbe531b10.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\LICLUA.EXE 1305dfd63f25ef125524254fbe531b10.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\INFOPATH.EXE 1305dfd63f25ef125524254fbe531b10.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORE.EXE 1305dfd63f25ef125524254fbe531b10.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE 1305dfd63f25ef125524254fbe531b10.exe File opened for modification C:\PROGRA~2\WINDOW~1\wabmig.exe 1305dfd63f25ef125524254fbe531b10.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GRAPH.EXE 1305dfd63f25ef125524254fbe531b10.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\misc.exe 1305dfd63f25ef125524254fbe531b10.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\EQUATION\EQNEDT32.EXE 1305dfd63f25ef125524254fbe531b10.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\ink\mip.exe 1305dfd63f25ef125524254fbe531b10.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\TextConv\WksConv\Wkconv.exe 1305dfd63f25ef125524254fbe531b10.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\1033\ONELEV.EXE 1305dfd63f25ef125524254fbe531b10.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTEM.EXE 1305dfd63f25ef125524254fbe531b10.exe File opened for modification C:\PROGRA~2\WI4223~1\sidebar.exe 1305dfd63f25ef125524254fbe531b10.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GROOVEMN.EXE 1305dfd63f25ef125524254fbe531b10.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE 1305dfd63f25ef125524254fbe531b10.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\ink\mip.exe 1305dfd63f25ef125524254fbe531b10.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE 1305dfd63f25ef125524254fbe531b10.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\1033\ONELEV.EXE 1305dfd63f25ef125524254fbe531b10.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\IECONT~1.EXE 1305dfd63f25ef125524254fbe531b10.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\SELFCERT.EXE 1305dfd63f25ef125524254fbe531b10.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE 1305dfd63f25ef125524254fbe531b10.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE 1305dfd63f25ef125524254fbe531b10.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\Setup.exe 1305dfd63f25ef125524254fbe531b10.exe File opened for modification C:\PROGRA~2\WINDOW~1\wabmig.exe 1305dfd63f25ef125524254fbe531b10.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~3.EXE 1305dfd63f25ef125524254fbe531b10.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\SELFCERT.EXE 1305dfd63f25ef125524254fbe531b10.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\WORDICON.EXE 1305dfd63f25ef125524254fbe531b10.exe File opened for modification C:\PROGRA~2\COMMON~1\ADOBEA~1\Versions\1.0\ADOBEA~1.EXE 1305dfd63f25ef125524254fbe531b10.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~1.EXE 1305dfd63f25ef125524254fbe531b10.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe 1305dfd63f25ef125524254fbe531b10.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\NAMECO~1.EXE 1305dfd63f25ef125524254fbe531b10.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\VPREVIEW.EXE 1305dfd63f25ef125524254fbe531b10.exe File opened for modification C:\PROGRA~2\WI54FB~1\WMPDMC.exe 1305dfd63f25ef125524254fbe531b10.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE 1305dfd63f25ef125524254fbe531b10.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\OIS.EXE 1305dfd63f25ef125524254fbe531b10.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\A3DUTI~1.EXE 1305dfd63f25ef125524254fbe531b10.exe File opened for modification C:\PROGRA~2\COMMON~1\ADOBEA~1\Versions\1.0\ADOBEA~1.EXE 1305dfd63f25ef125524254fbe531b10.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe 1305dfd63f25ef125524254fbe531b10.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORDB.EXE 1305dfd63f25ef125524254fbe531b10.exe -
Drops file in Windows directory 64 IoCs
Processes:
svchost.comsvchost.comsvchost.com1305DF~1.EXEsvchost.com1305DF~1.EXE1305DF~1.EXE1305DF~1.EXE1305DF~1.EXE1305DF~1.EXEsvchost.com1305DF~1.EXE1305DF~1.EXE1305DF~1.EXEsvchost.comsvchost.com1305DF~1.EXE1305DF~1.EXEsvchost.com1305DF~1.EXE1305DF~1.EXEsvchost.comsvchost.comsvchost.comsvchost.comsvchost.com1305DF~1.EXE1305DF~1.EXE1305DF~1.EXE1305DF~1.EXE1305DF~1.EXEsvchost.com1305DF~1.EXE1305DF~1.EXE1305DF~1.EXE1305DF~1.EXEsvchost.comsvchost.comsvchost.com1305DF~1.EXE1305DF~1.EXEsvchost.com1305DF~1.EXEsvchost.com1305DF~1.EXE1305DF~1.EXE1305DF~1.EXE1305DF~1.EXEsvchost.com1305DF~1.EXE1305DF~1.EXEsvchost.comdescription ioc process File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\directx.sys 1305DF~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 1305DF~1.EXE File opened for modification C:\Windows\svchost.com 1305DF~1.EXE File opened for modification C:\Windows\svchost.com 1305DF~1.EXE File opened for modification C:\Windows\svchost.com 1305DF~1.EXE File opened for modification C:\Windows\svchost.com 1305DF~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 1305DF~1.EXE File opened for modification C:\Windows\directx.sys 1305DF~1.EXE File opened for modification C:\Windows\directx.sys 1305DF~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\svchost.com 1305DF~1.EXE File opened for modification C:\Windows\svchost.com 1305DF~1.EXE File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 1305DF~1.EXE File opened for modification C:\Windows\svchost.com 1305DF~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 1305DF~1.EXE File opened for modification C:\Windows\svchost.com 1305DF~1.EXE File opened for modification C:\Windows\directx.sys 1305DF~1.EXE File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\directx.sys File opened for modification C:\Windows\directx.sys File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\directx.sys 1305DF~1.EXE File opened for modification C:\Windows\svchost.com 1305DF~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 1305DF~1.EXE File opened for modification C:\Windows\svchost.com 1305DF~1.EXE File opened for modification C:\Windows\directx.sys 1305DF~1.EXE File opened for modification C:\Windows\directx.sys 1305DF~1.EXE File opened for modification C:\Windows\directx.sys 1305DF~1.EXE File opened for modification C:\Windows\directx.sys File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 1305DF~1.EXE File opened for modification C:\Windows\svchost.com 1305DF~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 1305DF~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 1305DF~1.EXE File opened for modification C:\Windows\directx.sys File opened for modification C:\Windows\directx.sys 1305DF~1.EXE File opened for modification C:\Windows\svchost.com 1305DF~1.EXE File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\directx.sys 1305DF~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 1305DF~1.EXE File opened for modification C:\Windows\svchost.com 1305DF~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
Processes:
1305dfd63f25ef125524254fbe531b10.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 1305dfd63f25ef125524254fbe531b10.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
1305dfd63f25ef125524254fbe531b10.exe1305dfd63f25ef125524254fbe531b10.exesvchost.exe1305dfd63f25ef125524254fbe531b10.exesvchost.com1305DF~1.EXEsvchost.com1305DF~1.EXEsvchost.com1305DF~1.EXEsvchost.com1305DF~1.EXEsvchost.com1305DF~1.EXEsvchost.com1305DF~1.EXEdescription pid process target process PID 380 wrote to memory of 1352 380 1305dfd63f25ef125524254fbe531b10.exe 1305dfd63f25ef125524254fbe531b10.exe PID 380 wrote to memory of 1352 380 1305dfd63f25ef125524254fbe531b10.exe 1305dfd63f25ef125524254fbe531b10.exe PID 380 wrote to memory of 1352 380 1305dfd63f25ef125524254fbe531b10.exe 1305dfd63f25ef125524254fbe531b10.exe PID 380 wrote to memory of 1352 380 1305dfd63f25ef125524254fbe531b10.exe 1305dfd63f25ef125524254fbe531b10.exe PID 1352 wrote to memory of 1960 1352 1305dfd63f25ef125524254fbe531b10.exe svchost.exe PID 1352 wrote to memory of 1960 1352 1305dfd63f25ef125524254fbe531b10.exe svchost.exe PID 1352 wrote to memory of 1960 1352 1305dfd63f25ef125524254fbe531b10.exe svchost.exe PID 1352 wrote to memory of 1960 1352 1305dfd63f25ef125524254fbe531b10.exe svchost.exe PID 1960 wrote to memory of 1948 1960 svchost.exe 1305dfd63f25ef125524254fbe531b10.exe PID 1960 wrote to memory of 1948 1960 svchost.exe 1305dfd63f25ef125524254fbe531b10.exe PID 1960 wrote to memory of 1948 1960 svchost.exe 1305dfd63f25ef125524254fbe531b10.exe PID 1960 wrote to memory of 1948 1960 svchost.exe 1305dfd63f25ef125524254fbe531b10.exe PID 1948 wrote to memory of 1572 1948 1305dfd63f25ef125524254fbe531b10.exe svchost.com PID 1948 wrote to memory of 1572 1948 1305dfd63f25ef125524254fbe531b10.exe svchost.com PID 1948 wrote to memory of 1572 1948 1305dfd63f25ef125524254fbe531b10.exe svchost.com PID 1948 wrote to memory of 1572 1948 1305dfd63f25ef125524254fbe531b10.exe svchost.com PID 1572 wrote to memory of 936 1572 svchost.com 1305DF~1.EXE PID 1572 wrote to memory of 936 1572 svchost.com 1305DF~1.EXE PID 1572 wrote to memory of 936 1572 svchost.com 1305DF~1.EXE PID 1572 wrote to memory of 936 1572 svchost.com 1305DF~1.EXE PID 936 wrote to memory of 520 936 1305DF~1.EXE svchost.com PID 936 wrote to memory of 520 936 1305DF~1.EXE svchost.com PID 936 wrote to memory of 520 936 1305DF~1.EXE svchost.com PID 936 wrote to memory of 520 936 1305DF~1.EXE svchost.com PID 520 wrote to memory of 1696 520 svchost.com 1305DF~1.EXE PID 520 wrote to memory of 1696 520 svchost.com 1305DF~1.EXE PID 520 wrote to memory of 1696 520 svchost.com 1305DF~1.EXE PID 520 wrote to memory of 1696 520 svchost.com 1305DF~1.EXE PID 1696 wrote to memory of 1164 1696 1305DF~1.EXE svchost.com PID 1696 wrote to memory of 1164 1696 1305DF~1.EXE svchost.com PID 1696 wrote to memory of 1164 1696 1305DF~1.EXE svchost.com PID 1696 wrote to memory of 1164 1696 1305DF~1.EXE svchost.com PID 1164 wrote to memory of 1060 1164 svchost.com 1305DF~1.EXE PID 1164 wrote to memory of 1060 1164 svchost.com 1305DF~1.EXE PID 1164 wrote to memory of 1060 1164 svchost.com 1305DF~1.EXE PID 1164 wrote to memory of 1060 1164 svchost.com 1305DF~1.EXE PID 1060 wrote to memory of 1964 1060 1305DF~1.EXE svchost.com PID 1060 wrote to memory of 1964 1060 1305DF~1.EXE svchost.com PID 1060 wrote to memory of 1964 1060 1305DF~1.EXE svchost.com PID 1060 wrote to memory of 1964 1060 1305DF~1.EXE svchost.com PID 1964 wrote to memory of 1884 1964 svchost.com 1305DF~1.EXE PID 1964 wrote to memory of 1884 1964 svchost.com 1305DF~1.EXE PID 1964 wrote to memory of 1884 1964 svchost.com 1305DF~1.EXE PID 1964 wrote to memory of 1884 1964 svchost.com 1305DF~1.EXE PID 1884 wrote to memory of 392 1884 1305DF~1.EXE svchost.com PID 1884 wrote to memory of 392 1884 1305DF~1.EXE svchost.com PID 1884 wrote to memory of 392 1884 1305DF~1.EXE svchost.com PID 1884 wrote to memory of 392 1884 1305DF~1.EXE svchost.com PID 392 wrote to memory of 512 392 svchost.com 1305DF~1.EXE PID 392 wrote to memory of 512 392 svchost.com 1305DF~1.EXE PID 392 wrote to memory of 512 392 svchost.com 1305DF~1.EXE PID 392 wrote to memory of 512 392 svchost.com 1305DF~1.EXE PID 512 wrote to memory of 1480 512 1305DF~1.EXE svchost.com PID 512 wrote to memory of 1480 512 1305DF~1.EXE svchost.com PID 512 wrote to memory of 1480 512 1305DF~1.EXE svchost.com PID 512 wrote to memory of 1480 512 1305DF~1.EXE svchost.com PID 1480 wrote to memory of 1492 1480 svchost.com 1305DF~1.EXE PID 1480 wrote to memory of 1492 1480 svchost.com 1305DF~1.EXE PID 1480 wrote to memory of 1492 1480 svchost.com 1305DF~1.EXE PID 1480 wrote to memory of 1492 1480 svchost.com 1305DF~1.EXE PID 1492 wrote to memory of 556 1492 1305DF~1.EXE svchost.com PID 1492 wrote to memory of 556 1492 1305DF~1.EXE svchost.com PID 1492 wrote to memory of 556 1492 1305DF~1.EXE svchost.com PID 1492 wrote to memory of 556 1492 1305DF~1.EXE svchost.com
Processes
-
C:\Users\Admin\AppData\Local\Temp\1305dfd63f25ef125524254fbe531b10.exe"C:\Users\Admin\AppData\Local\Temp\1305dfd63f25ef125524254fbe531b10.exe"1⤵
- Modifies system executable filetype association
- Loads dropped DLL
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:380 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1305dfd63f25ef125524254fbe531b10.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\1305dfd63f25ef125524254fbe531b10.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe" "C:\Users\Admin\AppData\Local\Temp\3582-490\1305dfd63f25ef125524254fbe531b10.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1305dfd63f25ef125524254fbe531b10.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\1305dfd63f25ef125524254fbe531b10.exe"4⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXE"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXE6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:936 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXE"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:520 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXE8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXE"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXE10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXE"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXE12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXE"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:392 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXE14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:512 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXE"15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXE16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXE"17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:556 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXE18⤵
- Executes dropped EXE
PID:912 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXE"19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1404 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXE20⤵
- Executes dropped EXE
PID:1756 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXE"21⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1596 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXE22⤵
- Executes dropped EXE
PID:1716 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXE"23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1688 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXE24⤵
- Executes dropped EXE
PID:736 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXE"25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1764 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXE26⤵
- Executes dropped EXE
PID:616 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXE"27⤵
- Executes dropped EXE
- Loads dropped DLL
PID:812 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXE28⤵
- Executes dropped EXE
PID:1324 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXE"29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1016 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXE30⤵
- Executes dropped EXE
PID:808 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXE"31⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:1952 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXE32⤵
- Executes dropped EXE
PID:1944 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXE"33⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1748 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXE34⤵
- Executes dropped EXE
PID:852 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXE"35⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1672 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXE36⤵
- Executes dropped EXE
PID:1904 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXE"37⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1560 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXE38⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1136 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXE"39⤵
- Executes dropped EXE
- Loads dropped DLL
PID:316 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXE40⤵
- Executes dropped EXE
PID:1800 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXE"41⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1320 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXE42⤵
- Executes dropped EXE
PID:1360 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXE"43⤵
- Executes dropped EXE
- Loads dropped DLL
PID:992 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXE44⤵
- Executes dropped EXE
PID:676 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXE"45⤵
- Executes dropped EXE
- Loads dropped DLL
PID:912 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXE46⤵
- Executes dropped EXE
PID:904 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXE"47⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1352 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXE48⤵
- Executes dropped EXE
PID:2036 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXE"49⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1732 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXE50⤵
- Executes dropped EXE
PID:1712 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXE"51⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1716 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXE52⤵
- Executes dropped EXE
PID:1572 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXE"53⤵
- Executes dropped EXE
- Loads dropped DLL
PID:732 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXE54⤵
- Executes dropped EXE
PID:1856 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXE"55⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1764 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXE56⤵
- Executes dropped EXE
PID:616 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXE"57⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:520 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXE58⤵
- Executes dropped EXE
PID:1324 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXE"59⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1212 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXE60⤵
- Executes dropped EXE
PID:808 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXE"61⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1420 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXE62⤵
- Executes dropped EXE
PID:268 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXE"63⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1964 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXE64⤵
- Executes dropped EXE
PID:1748 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXE"65⤵PID:392
-
C:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXE66⤵PID:1940
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXE"67⤵PID:1560
-
C:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXE68⤵PID:1136
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXE"69⤵PID:988
-
C:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXE70⤵PID:1980
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXE"71⤵PID:2012
-
C:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXE72⤵PID:1492
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXE"73⤵PID:1248
-
C:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXE74⤵PID:556
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXE"75⤵PID:2020
-
C:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXE76⤵PID:1644
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXE"77⤵PID:824
-
C:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXE78⤵PID:904
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXE"79⤵PID:1404
-
C:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXE80⤵PID:2036
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXE"81⤵PID:932
-
C:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXE82⤵PID:668
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXE"83⤵PID:1592
-
C:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXE84⤵
- Drops file in Windows directory
PID:936 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXE"85⤵PID:1920
-
C:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXE86⤵PID:1700
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXE"87⤵PID:1520
-
C:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXE88⤵PID:1504
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXE"89⤵PID:756
-
C:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXE90⤵PID:1632
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXE"91⤵PID:1680
-
C:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXE92⤵PID:1424
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXE"93⤵PID:1308
-
C:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXE94⤵PID:452
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXE"95⤵PID:852
-
C:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXE96⤵PID:1400
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXE"97⤵PID:1672
-
C:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXE98⤵PID:1748
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXE"99⤵PID:1088
-
C:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXE100⤵PID:1904
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXE"101⤵PID:1076
-
C:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXE102⤵PID:1928
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXE"103⤵PID:1044
-
C:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXE104⤵PID:1480
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXE"105⤵
- Drops file in Windows directory
PID:680 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXE106⤵PID:1492
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXE"107⤵PID:828
-
C:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXE108⤵PID:556
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXE"109⤵PID:676
-
C:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXE110⤵PID:1644
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXE"111⤵PID:824
-
C:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXE112⤵PID:904
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXE"113⤵PID:1144
-
C:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXE114⤵PID:944
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXE"115⤵PID:1712
-
C:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXE116⤵PID:1476
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXE"117⤵PID:736
-
C:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXE118⤵PID:1696
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXE"119⤵PID:608
-
C:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXE120⤵PID:732
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXE"121⤵PID:876
-
C:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1305DF~1.EXE122⤵PID:1520
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-