Analysis
-
max time kernel
68s -
max time network
51s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
20-09-2022 17:03
Behavioral task
behavioral1
Sample
3b10978c0266d0ce9de63361b427117a.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
3b10978c0266d0ce9de63361b427117a.exe
Resource
win10v2004-20220901-en
General
-
Target
3b10978c0266d0ce9de63361b427117a.exe
-
Size
586KB
-
MD5
3b10978c0266d0ce9de63361b427117a
-
SHA1
47f2e9ca3c71ad001d176e43ead92e7473f088c7
-
SHA256
95d139480818083ccfbacde06e5788218452f007f7befc76f975b013e7217fde
-
SHA512
eb71e4c9002160e3a7ca458e8f6c1449e1253141b826ba05f8e2f7baf8c60978851f745f21121d37d0d6bacf2cfca2dc4bdd5c8e98aee89c6aa23ad98651a553
-
SSDEEP
12288:h7d4Mcp7IJfKECTsFzQt+JrPGr7zMgF9YTaSenaUepaUepaS7W:gMcOJpCTGzQt+YQE9oaSYaUmaUmaz
Malware Config
Signatures
-
Detect Neshta payload 46 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\3582-490\3b10978c0266d0ce9de63361b427117a.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\3b10978c0266d0ce9de63361b427117a.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\3b10978c0266d0ce9de63361b427117a.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\3b10978c0266d0ce9de63361b427117a.exe family_neshta C:\Windows\svchost.com family_neshta C:\MSOCache\ALLUSE~1\{90140~1\dwtrig20.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\3b10978c0266d0ce9de63361b427117a.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\3b10978c0266d0ce9de63361b427117a.exe family_neshta C:\MSOCache\ALLUSE~1\{90140~1\DW20.EXE family_neshta \Users\Admin\AppData\Local\Temp\3582-490\3b10978c0266d0ce9de63361b427117a.exe family_neshta C:\Windows\svchost.com family_neshta C:\MSOCache\ALLUSE~1\{9A861~1\setup.exe family_neshta C:\MSOCache\ALLUSE~1\{9A861~1\ose.exe family_neshta C:\PROGRA~2\Adobe\READER~1.0\Reader\AcroRd32.exe family_neshta C:\Windows\svchost.com family_neshta \Users\Admin\AppData\Local\Temp\3582-490\3b10978c0266d0ce9de63361b427117a.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\3b10978c0266d0ce9de63361b427117a.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\3b10978c0266d0ce9de63361b427117a.exe family_neshta C:\PROGRA~2\Adobe\READER~1.0\SETUPF~1\{AC76B~1\Setup.exe family_neshta C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBE_~1.EXE family_neshta C:\PROGRA~2\COMMON~1\MICROS~1\DW\DWTRIG20.EXE family_neshta C:\PROGRA~2\COMMON~1\MICROS~1\DW\DW20.EXE family_neshta C:\PROGRA~2\COMMON~1\ADOBEA~1\Versions\1.0\ADOBEA~1.EXE family_neshta \PROGRA~2\COMMON~1\Adobe\Updater6\ADOBE_~1.EXE family_neshta \Users\Admin\AppData\Local\Temp\3582-490\3b10978c0266d0ce9de63361b427117a.exe family_neshta C:\Windows\svchost.com family_neshta C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\FLTLDR.EXE family_neshta C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\LICLUA.EXE family_neshta C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOICONS.EXE family_neshta C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOXMLED.EXE family_neshta C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\Oarpmany.exe family_neshta C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\ODeploy.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\3b10978c0266d0ce9de63361b427117a.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\3b10978c0266d0ce9de63361b427117a.exe family_neshta C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\Setup.exe family_neshta C:\PROGRA~2\COMMON~1\MICROS~1\SOURCE~1\OSE.EXE family_neshta C:\Windows\svchost.com family_neshta \Users\Admin\AppData\Local\Temp\3582-490\3b10978c0266d0ce9de63361b427117a.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\3b10978c0266d0ce9de63361b427117a.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\3b10978c0266d0ce9de63361b427117a.exe family_neshta C:\Windows\svchost.com family_neshta \Users\Admin\AppData\Local\Temp\3582-490\3b10978c0266d0ce9de63361b427117a.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\3b10978c0266d0ce9de63361b427117a.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\3b10978c0266d0ce9de63361b427117a.exe family_neshta C:\Windows\svchost.com family_neshta C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE family_neshta -
Modifies system executable filetype association 2 TTPs 1 IoCs
Processes:
3b10978c0266d0ce9de63361b427117a.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 3b10978c0266d0ce9de63361b427117a.exe -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Executes dropped EXE 64 IoCs
Processes:
3b10978c0266d0ce9de63361b427117a.exesvchost.exe3b10978c0266d0ce9de63361b427117a.exesvchost.exesvchost.com3B1097~1.EXEsvchost.com3B1097~1.EXEsvchost.com3B1097~1.EXEsvchost.com3B1097~1.EXEsvchost.com3B1097~1.EXEsvchost.com3B1097~1.EXEsvchost.com3B1097~1.EXEsvchost.com3B1097~1.EXEsvchost.com3B1097~1.EXEsvchost.com3B1097~1.EXEsvchost.com3B1097~1.EXE3B1097~1.EXE3B1097~1.EXEsvchost.com3B1097~1.EXEsvchost.com3B1097~1.EXEsvchost.com3B1097~1.EXEsvchost.com3B1097~1.EXEsvchost.com3B1097~1.EXEsvchost.com3B1097~1.EXEsvchost.com3B1097~1.EXEsvchost.com3B1097~1.EXEsvchost.com3B1097~1.EXEsvchost.com3B1097~1.EXEsvchost.comsvchost.com3B1097~1.EXE3B1097~1.EXEsvchost.com3B1097~1.EXEsvchost.com3B1097~1.EXE3B1097~1.EXEsvchost.com3B1097~1.EXEsvchost.comsvchost.comsvchost.com3B1097~1.EXEpid process 840 3b10978c0266d0ce9de63361b427117a.exe 1736 svchost.exe 1040 3b10978c0266d0ce9de63361b427117a.exe 572 svchost.exe 1516 svchost.com 1224 3B1097~1.EXE 1300 svchost.com 564 3B1097~1.EXE 1944 svchost.com 1960 3B1097~1.EXE 1100 svchost.com 1852 3B1097~1.EXE 1664 svchost.com 1772 3B1097~1.EXE 960 svchost.com 2044 3B1097~1.EXE 1988 svchost.com 552 3B1097~1.EXE 1612 svchost.com 1724 3B1097~1.EXE 1964 svchost.com 1780 3B1097~1.EXE 1096 svchost.com 1580 3B1097~1.EXE 1672 svchost.com 1012 3B1097~1.EXE 1592 3B1097~1.EXE 1832 3B1097~1.EXE 1300 svchost.com 564 3B1097~1.EXE 1996 svchost.com 2036 3B1097~1.EXE 1804 svchost.com 1908 3B1097~1.EXE 640 svchost.com 1960 3B1097~1.EXE 1692 svchost.com 1212 3B1097~1.EXE 1428 svchost.com 1172 3B1097~1.EXE 1000 svchost.com 1772 3B1097~1.EXE 1744 svchost.com 840 3B1097~1.EXE 1384 svchost.com 332 3B1097~1.EXE 1632 svchost.com 1636 3B1097~1.EXE 836 svchost.com 700 svchost.com 460 3B1097~1.EXE 1524 3B1097~1.EXE 980 svchost.com 988 3B1097~1.EXE 1192 svchost.com 1592 3B1097~1.EXE 2008 3B1097~1.EXE 1492 3B1097~1.EXE 1660 svchost.com 1084 3B1097~1.EXE 1572 svchost.com 344 svchost.com 436 svchost.com 1844 3B1097~1.EXE -
Loads dropped DLL 64 IoCs
Processes:
3b10978c0266d0ce9de63361b427117a.exesvchost.exesvchost.comsvchost.com3b10978c0266d0ce9de63361b427117a.exesvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.com3B1097~1.EXEsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.com3B1097~1.EXEsvchost.comsvchost.com3B1097~1.EXEsvchost.compid process 1204 3b10978c0266d0ce9de63361b427117a.exe 1204 3b10978c0266d0ce9de63361b427117a.exe 1736 svchost.exe 1736 svchost.exe 1516 svchost.com 1516 svchost.com 1204 3b10978c0266d0ce9de63361b427117a.exe 1300 svchost.com 1040 3b10978c0266d0ce9de63361b427117a.exe 1300 svchost.com 1204 3b10978c0266d0ce9de63361b427117a.exe 1944 svchost.com 1944 svchost.com 1100 svchost.com 1100 svchost.com 1664 svchost.com 1664 svchost.com 960 svchost.com 960 svchost.com 1988 svchost.com 1988 svchost.com 1612 svchost.com 1612 svchost.com 1964 svchost.com 1964 svchost.com 1204 3b10978c0266d0ce9de63361b427117a.exe 1096 svchost.com 1096 svchost.com 1672 svchost.com 1672 svchost.com 1592 3B1097~1.EXE 1592 3B1097~1.EXE 1300 svchost.com 1300 svchost.com 1040 3b10978c0266d0ce9de63361b427117a.exe 1996 svchost.com 1996 svchost.com 1804 svchost.com 1804 svchost.com 640 svchost.com 640 svchost.com 1692 svchost.com 1692 svchost.com 1428 svchost.com 1428 svchost.com 1000 svchost.com 1000 svchost.com 1744 svchost.com 1744 svchost.com 1384 svchost.com 1384 svchost.com 1632 svchost.com 1632 svchost.com 836 svchost.com 836 svchost.com 460 3B1097~1.EXE 460 3B1097~1.EXE 980 svchost.com 980 svchost.com 1192 svchost.com 1192 svchost.com 2008 3B1097~1.EXE 2008 3B1097~1.EXE 1660 svchost.com -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
Processes:
3b10978c0266d0ce9de63361b427117a.exe3b10978c0266d0ce9de63361b427117a.exedescription ioc process File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSQRY32.EXE 3b10978c0266d0ce9de63361b427117a.exe File opened for modification C:\PROGRA~2\WI54FB~1\WMPDMC.exe 3b10978c0266d0ce9de63361b427117a.exe File opened for modification C:\PROGRA~2\WI54FB~1\WMPDMC.exe 3b10978c0266d0ce9de63361b427117a.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE 3b10978c0266d0ce9de63361b427117a.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe 3b10978c0266d0ce9de63361b427117a.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GROOVEMN.EXE 3b10978c0266d0ce9de63361b427117a.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\OIS.EXE 3b10978c0266d0ce9de63361b427117a.exe File opened for modification C:\PROGRA~2\WINDOW~2\ACCESS~1\wordpad.exe 3b10978c0266d0ce9de63361b427117a.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE 3b10978c0266d0ce9de63361b427117a.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBEU~1.EXE 3b10978c0266d0ce9de63361b427117a.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GO664E~1.EXE 3b10978c0266d0ce9de63361b427117a.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\IECONT~1.EXE 3b10978c0266d0ce9de63361b427117a.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpshare.exe 3b10978c0266d0ce9de63361b427117a.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\AcroRd32.exe 3b10978c0266d0ce9de63361b427117a.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~2.EXE 3b10978c0266d0ce9de63361b427117a.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORDB.EXE 3b10978c0266d0ce9de63361b427117a.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\WINWORD.EXE 3b10978c0266d0ce9de63361b427117a.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\A3DUTI~1.EXE 3b10978c0266d0ce9de63361b427117a.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOBD5D~1.EXE 3b10978c0266d0ce9de63361b427117a.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe 3b10978c0266d0ce9de63361b427117a.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe 3b10978c0266d0ce9de63361b427117a.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\misc.exe 3b10978c0266d0ce9de63361b427117a.exe File opened for modification C:\PROGRA~2\WINDOW~1\wab.exe 3b10978c0266d0ce9de63361b427117a.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmplayer.exe 3b10978c0266d0ce9de63361b427117a.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\Eula.exe 3b10978c0266d0ce9de63361b427117a.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~2.EXE 3b10978c0266d0ce9de63361b427117a.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpshare.exe 3b10978c0266d0ce9de63361b427117a.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE 3b10978c0266d0ce9de63361b427117a.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\TextConv\WksConv\Wkconv.exe 3b10978c0266d0ce9de63361b427117a.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GO664E~1.EXE 3b10978c0266d0ce9de63361b427117a.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTEM.EXE 3b10978c0266d0ce9de63361b427117a.exe File opened for modification C:\PROGRA~2\COMMON~1\ADOBEA~1\Versions\1.0\ADOBEA~1.EXE 3b10978c0266d0ce9de63361b427117a.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\INFOPATH.EXE 3b10978c0266d0ce9de63361b427117a.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\SELFCERT.EXE 3b10978c0266d0ce9de63361b427117a.exe File opened for modification C:\PROGRA~2\WINDOW~1\wabmig.exe 3b10978c0266d0ce9de63361b427117a.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpconfig.exe 3b10978c0266d0ce9de63361b427117a.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\LICLUA.EXE 3b10978c0266d0ce9de63361b427117a.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSQRY32.EXE 3b10978c0266d0ce9de63361b427117a.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE 3b10978c0266d0ce9de63361b427117a.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\FLTLDR.EXE 3b10978c0266d0ce9de63361b427117a.exe File opened for modification C:\PROGRA~2\WINDOW~1\wabmig.exe 3b10978c0266d0ce9de63361b427117a.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe 3b10978c0266d0ce9de63361b427117a.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\NAMECO~1.EXE 3b10978c0266d0ce9de63361b427117a.exe File opened for modification C:\PROGRA~2\WI4223~1\sidebar.exe 3b10978c0266d0ce9de63361b427117a.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBE_~1.EXE 3b10978c0266d0ce9de63361b427117a.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\ink\mip.exe 3b10978c0266d0ce9de63361b427117a.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORE.EXE 3b10978c0266d0ce9de63361b427117a.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE 3b10978c0266d0ce9de63361b427117a.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ADOBEC~1.EXE 3b10978c0266d0ce9de63361b427117a.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\CLVIEW.EXE 3b10978c0266d0ce9de63361b427117a.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\SOURCE~1\OSE.EXE 3b10978c0266d0ce9de63361b427117a.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\IECONT~1.EXE 3b10978c0266d0ce9de63361b427117a.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\SELFCERT.EXE 3b10978c0266d0ce9de63361b427117a.exe File opened for modification C:\PROGRA~2\WINDOW~1\WinMail.exe 3b10978c0266d0ce9de63361b427117a.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmprph.exe 3b10978c0266d0ce9de63361b427117a.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\INFOPATH.EXE 3b10978c0266d0ce9de63361b427117a.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORDB.EXE 3b10978c0266d0ce9de63361b427117a.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOICONS.EXE 3b10978c0266d0ce9de63361b427117a.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GROOVEMN.EXE 3b10978c0266d0ce9de63361b427117a.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\NAMECO~1.EXE 3b10978c0266d0ce9de63361b427117a.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpconfig.exe 3b10978c0266d0ce9de63361b427117a.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\DW\DW20.EXE 3b10978c0266d0ce9de63361b427117a.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\ink\mip.exe 3b10978c0266d0ce9de63361b427117a.exe File opened for modification C:\PROGRA~2\WI54FB~1\setup_wm.exe 3b10978c0266d0ce9de63361b427117a.exe -
Drops file in Windows directory 64 IoCs
Processes:
3B1097~1.EXE3B1097~1.EXE3B1097~1.EXE3B1097~1.EXEsvchost.comsvchost.com3B1097~1.EXEsvchost.comsvchost.com3B1097~1.EXE3B1097~1.EXEsvchost.comsvchost.comsvchost.com3B1097~1.EXEsvchost.comsvchost.com3B1097~1.EXE3B1097~1.EXE3B1097~1.EXE3B1097~1.EXE3B1097~1.EXEsvchost.comsvchost.comsvchost.com3B1097~1.EXE3B1097~1.EXEsvchost.com3B1097~1.EXE3B1097~1.EXEsvchost.comsvchost.comsvchost.com3B1097~1.EXEsvchost.com3B1097~1.EXE3B1097~1.EXEsvchost.com3B1097~1.EXEsvchost.comsvchost.comsvchost.comsvchost.com3B1097~1.EXE3B1097~1.EXE3B1097~1.EXEsvchost.comsvchost.com3B1097~1.EXEsvchost.com3B1097~1.EXE3B1097~1.EXE3B1097~1.EXEsvchost.comsvchost.com3B1097~1.EXEsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comdescription ioc process File opened for modification C:\Windows\svchost.com 3B1097~1.EXE File opened for modification C:\Windows\svchost.com 3B1097~1.EXE File opened for modification C:\Windows\directx.sys 3B1097~1.EXE File opened for modification C:\Windows\directx.sys 3B1097~1.EXE File opened for modification C:\Windows\directx.sys 3B1097~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 3B1097~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 3B1097~1.EXE File opened for modification C:\Windows\svchost.com 3B1097~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 3B1097~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 3B1097~1.EXE File opened for modification C:\Windows\directx.sys 3B1097~1.EXE File opened for modification C:\Windows\directx.sys 3B1097~1.EXE File opened for modification C:\Windows\directx.sys 3B1097~1.EXE File opened for modification C:\Windows\directx.sys 3B1097~1.EXE File opened for modification C:\Windows\svchost.com 3B1097~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 3B1097~1.EXE File opened for modification C:\Windows\directx.sys 3B1097~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 3B1097~1.EXE File opened for modification C:\Windows\svchost.com 3B1097~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 3B1097~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 3B1097~1.EXE File opened for modification C:\Windows\svchost.com 3B1097~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 3B1097~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 3B1097~1.EXE File opened for modification C:\Windows\svchost.com 3B1097~1.EXE File opened for modification C:\Windows\svchost.com 3B1097~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 3B1097~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 3B1097~1.EXE File opened for modification C:\Windows\directx.sys 3B1097~1.EXE File opened for modification C:\Windows\directx.sys 3B1097~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 3B1097~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
Processes:
3b10978c0266d0ce9de63361b427117a.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 3b10978c0266d0ce9de63361b427117a.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
3b10978c0266d0ce9de63361b427117a.exe3b10978c0266d0ce9de63361b427117a.exesvchost.exe3b10978c0266d0ce9de63361b427117a.exesvchost.com3B1097~1.EXEsvchost.com3B1097~1.EXEsvchost.com3B1097~1.EXEsvchost.com3B1097~1.EXEsvchost.com3B1097~1.EXEsvchost.com3B1097~1.EXEdescription pid process target process PID 1204 wrote to memory of 840 1204 3b10978c0266d0ce9de63361b427117a.exe 3b10978c0266d0ce9de63361b427117a.exe PID 1204 wrote to memory of 840 1204 3b10978c0266d0ce9de63361b427117a.exe 3b10978c0266d0ce9de63361b427117a.exe PID 1204 wrote to memory of 840 1204 3b10978c0266d0ce9de63361b427117a.exe 3b10978c0266d0ce9de63361b427117a.exe PID 1204 wrote to memory of 840 1204 3b10978c0266d0ce9de63361b427117a.exe 3b10978c0266d0ce9de63361b427117a.exe PID 840 wrote to memory of 1736 840 3b10978c0266d0ce9de63361b427117a.exe svchost.exe PID 840 wrote to memory of 1736 840 3b10978c0266d0ce9de63361b427117a.exe svchost.exe PID 840 wrote to memory of 1736 840 3b10978c0266d0ce9de63361b427117a.exe svchost.exe PID 840 wrote to memory of 1736 840 3b10978c0266d0ce9de63361b427117a.exe svchost.exe PID 1736 wrote to memory of 1040 1736 svchost.exe 3b10978c0266d0ce9de63361b427117a.exe PID 1736 wrote to memory of 1040 1736 svchost.exe 3b10978c0266d0ce9de63361b427117a.exe PID 1736 wrote to memory of 1040 1736 svchost.exe 3b10978c0266d0ce9de63361b427117a.exe PID 1736 wrote to memory of 1040 1736 svchost.exe 3b10978c0266d0ce9de63361b427117a.exe PID 1040 wrote to memory of 1516 1040 3b10978c0266d0ce9de63361b427117a.exe svchost.com PID 1040 wrote to memory of 1516 1040 3b10978c0266d0ce9de63361b427117a.exe svchost.com PID 1040 wrote to memory of 1516 1040 3b10978c0266d0ce9de63361b427117a.exe svchost.com PID 1040 wrote to memory of 1516 1040 3b10978c0266d0ce9de63361b427117a.exe svchost.com PID 1516 wrote to memory of 1224 1516 svchost.com 3B1097~1.EXE PID 1516 wrote to memory of 1224 1516 svchost.com 3B1097~1.EXE PID 1516 wrote to memory of 1224 1516 svchost.com 3B1097~1.EXE PID 1516 wrote to memory of 1224 1516 svchost.com 3B1097~1.EXE PID 1224 wrote to memory of 1300 1224 3B1097~1.EXE svchost.com PID 1224 wrote to memory of 1300 1224 3B1097~1.EXE svchost.com PID 1224 wrote to memory of 1300 1224 3B1097~1.EXE svchost.com PID 1224 wrote to memory of 1300 1224 3B1097~1.EXE svchost.com PID 1300 wrote to memory of 564 1300 svchost.com 3B1097~1.EXE PID 1300 wrote to memory of 564 1300 svchost.com 3B1097~1.EXE PID 1300 wrote to memory of 564 1300 svchost.com 3B1097~1.EXE PID 1300 wrote to memory of 564 1300 svchost.com 3B1097~1.EXE PID 564 wrote to memory of 1944 564 3B1097~1.EXE svchost.com PID 564 wrote to memory of 1944 564 3B1097~1.EXE svchost.com PID 564 wrote to memory of 1944 564 3B1097~1.EXE svchost.com PID 564 wrote to memory of 1944 564 3B1097~1.EXE svchost.com PID 1944 wrote to memory of 1960 1944 svchost.com 3B1097~1.EXE PID 1944 wrote to memory of 1960 1944 svchost.com 3B1097~1.EXE PID 1944 wrote to memory of 1960 1944 svchost.com 3B1097~1.EXE PID 1944 wrote to memory of 1960 1944 svchost.com 3B1097~1.EXE PID 1960 wrote to memory of 1100 1960 3B1097~1.EXE svchost.com PID 1960 wrote to memory of 1100 1960 3B1097~1.EXE svchost.com PID 1960 wrote to memory of 1100 1960 3B1097~1.EXE svchost.com PID 1960 wrote to memory of 1100 1960 3B1097~1.EXE svchost.com PID 1100 wrote to memory of 1852 1100 svchost.com 3B1097~1.EXE PID 1100 wrote to memory of 1852 1100 svchost.com 3B1097~1.EXE PID 1100 wrote to memory of 1852 1100 svchost.com 3B1097~1.EXE PID 1100 wrote to memory of 1852 1100 svchost.com 3B1097~1.EXE PID 1852 wrote to memory of 1664 1852 3B1097~1.EXE svchost.com PID 1852 wrote to memory of 1664 1852 3B1097~1.EXE svchost.com PID 1852 wrote to memory of 1664 1852 3B1097~1.EXE svchost.com PID 1852 wrote to memory of 1664 1852 3B1097~1.EXE svchost.com PID 1664 wrote to memory of 1772 1664 svchost.com 3B1097~1.EXE PID 1664 wrote to memory of 1772 1664 svchost.com 3B1097~1.EXE PID 1664 wrote to memory of 1772 1664 svchost.com 3B1097~1.EXE PID 1664 wrote to memory of 1772 1664 svchost.com 3B1097~1.EXE PID 1772 wrote to memory of 960 1772 3B1097~1.EXE svchost.com PID 1772 wrote to memory of 960 1772 3B1097~1.EXE svchost.com PID 1772 wrote to memory of 960 1772 3B1097~1.EXE svchost.com PID 1772 wrote to memory of 960 1772 3B1097~1.EXE svchost.com PID 960 wrote to memory of 2044 960 svchost.com 3B1097~1.EXE PID 960 wrote to memory of 2044 960 svchost.com 3B1097~1.EXE PID 960 wrote to memory of 2044 960 svchost.com 3B1097~1.EXE PID 960 wrote to memory of 2044 960 svchost.com 3B1097~1.EXE PID 2044 wrote to memory of 1988 2044 3B1097~1.EXE svchost.com PID 2044 wrote to memory of 1988 2044 3B1097~1.EXE svchost.com PID 2044 wrote to memory of 1988 2044 3B1097~1.EXE svchost.com PID 2044 wrote to memory of 1988 2044 3B1097~1.EXE svchost.com
Processes
-
C:\Users\Admin\AppData\Local\Temp\3b10978c0266d0ce9de63361b427117a.exe"C:\Users\Admin\AppData\Local\Temp\3b10978c0266d0ce9de63361b427117a.exe"1⤵
- Modifies system executable filetype association
- Loads dropped DLL
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3b10978c0266d0ce9de63361b427117a.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\3b10978c0266d0ce9de63361b427117a.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe" "C:\Users\Admin\AppData\Local\Temp\3582-490\3b10978c0266d0ce9de63361b427117a.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3b10978c0266d0ce9de63361b427117a.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\3b10978c0266d0ce9de63361b427117a.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:564 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1988 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE18⤵
- Executes dropped EXE
PID:552 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1612 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE20⤵
- Executes dropped EXE
PID:1724 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"21⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1964 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE22⤵
- Executes dropped EXE
PID:1780 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1096 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE24⤵
- Executes dropped EXE
PID:1580 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1672 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE26⤵
- Executes dropped EXE
PID:1012 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"27⤵PID:1592
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE28⤵
- Executes dropped EXE
PID:1832 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"29⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:1300 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE30⤵
- Executes dropped EXE
PID:564 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"31⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1996 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE32⤵
- Executes dropped EXE
PID:2036 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"33⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1804 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE34⤵
- Executes dropped EXE
PID:1908 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"35⤵
- Executes dropped EXE
- Loads dropped DLL
PID:640 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE36⤵
- Executes dropped EXE
PID:1960 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"37⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1692 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE38⤵
- Executes dropped EXE
PID:1212 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"39⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1428 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE40⤵
- Executes dropped EXE
PID:1172 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"41⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:1000 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE42⤵
- Executes dropped EXE
PID:1772 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"43⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:1744 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE44⤵PID:840
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"45⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:1384 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE46⤵PID:332
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"47⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1632 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE48⤵
- Executes dropped EXE
PID:1636 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"49⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:836 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE50⤵PID:700
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"51⤵PID:460
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE52⤵PID:1524
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"53⤵PID:980
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE54⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:988 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"55⤵PID:1192
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE56⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:1592 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"57⤵PID:2008
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE58⤵
- Executes dropped EXE
PID:1492 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"59⤵PID:1660
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE60⤵
- Executes dropped EXE
PID:1084 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"61⤵
- Executes dropped EXE
PID:1572 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE62⤵PID:344
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"63⤵PID:436
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE64⤵
- Executes dropped EXE
PID:1844 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"65⤵PID:1420
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE66⤵
- Drops file in Windows directory
PID:1668 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"67⤵PID:1324
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE68⤵PID:992
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"69⤵PID:1664
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE70⤵PID:1252
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"71⤵PID:2004
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE72⤵PID:2028
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"73⤵PID:268
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE74⤵
- Executes dropped EXE
PID:840 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"75⤵PID:688
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE76⤵
- Executes dropped EXE
PID:332 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"77⤵PID:1724
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE78⤵PID:1344
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"79⤵PID:1964
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE80⤵PID:1596
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"81⤵
- Executes dropped EXE
PID:700 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE82⤵PID:1580
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"83⤵PID:1940
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE84⤵
- Executes dropped EXE
PID:1524 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"85⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:980 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE86⤵PID:556
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"87⤵PID:1676
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE88⤵PID:1192
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"89⤵PID:1896
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE90⤵PID:1900
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"91⤵PID:1912
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE92⤵PID:2036
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"93⤵PID:1660
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE94⤵PID:1972
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"95⤵
- Executes dropped EXE
PID:344 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE96⤵
- Drops file in Windows directory
PID:936 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"97⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:436 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE98⤵PID:1124
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"99⤵PID:1420
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE100⤵PID:1356
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"101⤵PID:1172
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE102⤵PID:1036
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"103⤵PID:1252
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE104⤵PID:1700
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"105⤵PID:1744
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE106⤵PID:1528
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"107⤵PID:268
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE108⤵PID:1988
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"109⤵
- Drops file in Windows directory
PID:532 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE110⤵PID:596
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"111⤵PID:1724
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE112⤵PID:1780
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"113⤵PID:1376
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE114⤵
- Drops file in Windows directory
PID:1964 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"115⤵PID:1416
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE116⤵
- Executes dropped EXE
- Loads dropped DLL
PID:460 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"117⤵PID:1256
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE118⤵PID:1672
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"119⤵PID:1832
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE120⤵PID:540
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE"121⤵PID:2016
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3B1097~1.EXE122⤵PID:1980
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-