Analysis
-
max time kernel
74s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
01/10/2022, 17:58
Behavioral task
behavioral1
Sample
5ab7518bc969560c04d11c76de7a65a885245a2c1174792aa2f4cc03e331ce46.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
5ab7518bc969560c04d11c76de7a65a885245a2c1174792aa2f4cc03e331ce46.exe
Resource
win10v2004-20220812-en
General
-
Target
5ab7518bc969560c04d11c76de7a65a885245a2c1174792aa2f4cc03e331ce46.exe
-
Size
390KB
-
MD5
4ae46f7c43720a73ab25768fd5791c30
-
SHA1
da5940fe9b55eca394ceac9cfbcbb797caceb68a
-
SHA256
5ab7518bc969560c04d11c76de7a65a885245a2c1174792aa2f4cc03e331ce46
-
SHA512
470c706aa30927f3bb751ee1bdd1159053349e4c82433a8d9557e23e38aecdd8b486c68509bc376f8d192a018576cca73f5bad24bf4ab751e1e0a1fc38c2cdc5
-
SSDEEP
6144:k9rWRBxdkrPEebsGIUAuuAg3TXDZO8MT5i+W3QzDoStiFpwyoStiFpwf9rW:CWRzAEmrIpjTZO7T5i+W3QzEJpkJpKW
Malware Config
Signatures
-
Detect Neshta payload 53 IoCs
resource yara_rule behavioral1/files/0x000b00000001230b-55.dat family_neshta behavioral1/files/0x000b00000001230b-56.dat family_neshta behavioral1/files/0x000b00000001230b-58.dat family_neshta behavioral1/files/0x000b00000001230b-60.dat family_neshta behavioral1/files/0x0009000000012330-61.dat family_neshta behavioral1/files/0x0001000000010322-67.dat family_neshta behavioral1/files/0x0001000000010320-66.dat family_neshta behavioral1/files/0x0008000000010370-65.dat family_neshta behavioral1/files/0x0006000000010372-64.dat family_neshta behavioral1/files/0x0009000000012330-63.dat family_neshta behavioral1/files/0x000b00000001230b-69.dat family_neshta behavioral1/files/0x000b00000001230b-72.dat family_neshta behavioral1/files/0x000b00000001230b-70.dat family_neshta behavioral1/files/0x0009000000012330-75.dat family_neshta behavioral1/files/0x000b00000001230b-82.dat family_neshta behavioral1/files/0x000b00000001230b-80.dat family_neshta behavioral1/files/0x000b00000001230b-79.dat family_neshta behavioral1/files/0x0009000000012330-85.dat family_neshta behavioral1/files/0x000b00000001230b-89.dat family_neshta behavioral1/files/0x000b00000001230b-92.dat family_neshta behavioral1/files/0x000b00000001230b-90.dat family_neshta behavioral1/files/0x0009000000012330-96.dat family_neshta behavioral1/files/0x000100000000f7f8-103.dat family_neshta behavioral1/files/0x000100000000f7dc-101.dat family_neshta behavioral1/files/0x000100000000f788-100.dat family_neshta behavioral1/files/0x000100000000f7ea-99.dat family_neshta behavioral1/files/0x000100000000f7e5-98.dat family_neshta behavioral1/files/0x000b00000001230b-106.dat family_neshta behavioral1/files/0x000b00000001230b-107.dat family_neshta behavioral1/files/0x000b00000001230b-109.dat family_neshta behavioral1/files/0x000100000000f83f-111.dat family_neshta behavioral1/files/0x0009000000012330-113.dat family_neshta behavioral1/files/0x000100000000f884-117.dat family_neshta behavioral1/files/0x000100000000f840-116.dat family_neshta behavioral1/files/0x000100000000f83f-115.dat family_neshta behavioral1/files/0x000b00000001230b-126.dat family_neshta behavioral1/files/0x00010000000103b2-121.dat family_neshta behavioral1/files/0x0001000000010ba1-120.dat family_neshta behavioral1/files/0x00010000000114d3-119.dat family_neshta behavioral1/files/0x000b00000001230b-124.dat family_neshta behavioral1/files/0x000b00000001230b-123.dat family_neshta behavioral1/files/0x0001000000010c1e-128.dat family_neshta behavioral1/files/0x00010000000118f1-132.dat family_neshta behavioral1/files/0x0001000000011884-131.dat family_neshta behavioral1/files/0x0001000000010f3c-130.dat family_neshta behavioral1/files/0x000100000001180a-129.dat family_neshta behavioral1/files/0x00010000000118f8-133.dat family_neshta behavioral1/files/0x00010000000118f8-134.dat family_neshta behavioral1/files/0x0001000000011a26-135.dat family_neshta behavioral1/files/0x000100000001042c-136.dat family_neshta behavioral1/files/0x000100000001042c-137.dat family_neshta behavioral1/files/0x0001000000011b65-138.dat family_neshta behavioral1/files/0x0009000000012330-140.dat family_neshta -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 5ab7518bc969560c04d11c76de7a65a885245a2c1174792aa2f4cc03e331ce46.exe -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Executes dropped EXE 64 IoCs
pid Process 1724 5ab7518bc969560c04d11c76de7a65a885245a2c1174792aa2f4cc03e331ce46.exe 588 svchost.com 1472 5AB751~1.EXE 652 svchost.com 536 5AB751~1.EXE 1576 svchost.com 608 5AB751~1.EXE 1504 svchost.com 1784 5AB751~1.EXE 268 svchost.com 1756 5AB751~1.EXE 2044 svchost.com 2000 5AB751~1.EXE 1288 svchost.com 548 5AB751~1.EXE 432 svchost.com 320 5AB751~1.EXE 1480 svchost.com 868 5AB751~1.EXE 1324 svchost.com 1620 5AB751~1.EXE 1832 svchost.com 1892 5AB751~1.EXE 1692 svchost.com 840 5AB751~1.EXE 1108 svchost.com 1768 5AB751~1.EXE 1908 svchost.com 1800 5AB751~1.EXE 1784 svchost.com 1904 5AB751~1.EXE 892 svchost.com 1720 5AB751~1.EXE 1348 svchost.com 1244 5AB751~1.EXE 1124 svchost.com 2036 5AB751~1.EXE 2044 svchost.com 276 5AB751~1.EXE 676 svchost.com 780 5AB751~1.EXE 432 svchost.com 1472 5AB751~1.EXE 1480 svchost.com 284 5AB751~1.EXE 1808 svchost.com 1036 5AB751~1.EXE 1832 svchost.com 1344 5AB751~1.EXE 1876 5AB751~1.EXE 1980 5AB751~1.EXE 1768 svchost.com 1948 5AB751~1.EXE 1800 svchost.com 1212 5AB751~1.EXE 1960 svchost.com 988 5AB751~1.EXE 892 svchost.com 832 5AB751~1.EXE 1348 svchost.com 2032 5AB751~1.EXE 1368 svchost.com 2036 5AB751~1.EXE 1360 svchost.com -
Loads dropped DLL 64 IoCs
pid Process 1396 5ab7518bc969560c04d11c76de7a65a885245a2c1174792aa2f4cc03e331ce46.exe 1396 5ab7518bc969560c04d11c76de7a65a885245a2c1174792aa2f4cc03e331ce46.exe 588 svchost.com 588 svchost.com 652 svchost.com 652 svchost.com 1576 svchost.com 1576 svchost.com 1724 5ab7518bc969560c04d11c76de7a65a885245a2c1174792aa2f4cc03e331ce46.exe 1396 5ab7518bc969560c04d11c76de7a65a885245a2c1174792aa2f4cc03e331ce46.exe 1504 svchost.com 1504 svchost.com 1724 5ab7518bc969560c04d11c76de7a65a885245a2c1174792aa2f4cc03e331ce46.exe 268 svchost.com 268 svchost.com 1724 5ab7518bc969560c04d11c76de7a65a885245a2c1174792aa2f4cc03e331ce46.exe 1724 5ab7518bc969560c04d11c76de7a65a885245a2c1174792aa2f4cc03e331ce46.exe 2044 svchost.com 2044 svchost.com 1288 svchost.com 1288 svchost.com 432 svchost.com 432 svchost.com 1396 5ab7518bc969560c04d11c76de7a65a885245a2c1174792aa2f4cc03e331ce46.exe 1480 svchost.com 1480 svchost.com 1324 svchost.com 1324 svchost.com 1832 svchost.com 1832 svchost.com 1724 5ab7518bc969560c04d11c76de7a65a885245a2c1174792aa2f4cc03e331ce46.exe 1692 svchost.com 1692 svchost.com 1108 svchost.com 1108 svchost.com 1908 svchost.com 1908 svchost.com 1784 svchost.com 1784 svchost.com 892 svchost.com 892 svchost.com 1348 svchost.com 1348 svchost.com 1124 svchost.com 1124 svchost.com 2044 svchost.com 2044 svchost.com 676 svchost.com 676 svchost.com 432 svchost.com 432 svchost.com 1480 svchost.com 1480 svchost.com 1808 svchost.com 1808 svchost.com 1832 svchost.com 1832 svchost.com 1876 5AB751~1.EXE 1876 5AB751~1.EXE 1768 svchost.com 1768 svchost.com 1800 svchost.com 1800 svchost.com 1960 svchost.com -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\COMMON~1\ADOBEA~1\Versions\1.0\ADOBEA~1.EXE 5ab7518bc969560c04d11c76de7a65a885245a2c1174792aa2f4cc03e331ce46.exe File opened for modification C:\PROGRA~2\WINDOW~1\wab.exe 5ab7518bc969560c04d11c76de7a65a885245a2c1174792aa2f4cc03e331ce46.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\A3DUTI~1.EXE 5ab7518bc969560c04d11c76de7a65a885245a2c1174792aa2f4cc03e331ce46.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE 5ab7518bc969560c04d11c76de7a65a885245a2c1174792aa2f4cc03e331ce46.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBE_~1.EXE 5ab7518bc969560c04d11c76de7a65a885245a2c1174792aa2f4cc03e331ce46.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\DW\DWTRIG20.EXE 5ab7518bc969560c04d11c76de7a65a885245a2c1174792aa2f4cc03e331ce46.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\CLVIEW.EXE 5ab7518bc969560c04d11c76de7a65a885245a2c1174792aa2f4cc03e331ce46.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSQRY32.EXE 5ab7518bc969560c04d11c76de7a65a885245a2c1174792aa2f4cc03e331ce46.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\NAMECO~1.EXE 5ab7518bc969560c04d11c76de7a65a885245a2c1174792aa2f4cc03e331ce46.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\Oarpmany.exe 5ab7518bc969560c04d11c76de7a65a885245a2c1174792aa2f4cc03e331ce46.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~2.EXE 5ab7518bc969560c04d11c76de7a65a885245a2c1174792aa2f4cc03e331ce46.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOUC.EXE 5ab7518bc969560c04d11c76de7a65a885245a2c1174792aa2f4cc03e331ce46.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\SELFCERT.EXE 5ab7518bc969560c04d11c76de7a65a885245a2c1174792aa2f4cc03e331ce46.exe File opened for modification C:\PROGRA~2\WINDOW~1\wabmig.exe 5ab7518bc969560c04d11c76de7a65a885245a2c1174792aa2f4cc03e331ce46.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmplayer.exe 5ab7518bc969560c04d11c76de7a65a885245a2c1174792aa2f4cc03e331ce46.exe File opened for modification C:\PROGRA~2\WINDOW~4\ImagingDevices.exe 5ab7518bc969560c04d11c76de7a65a885245a2c1174792aa2f4cc03e331ce46.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBEU~1.EXE 5ab7518bc969560c04d11c76de7a65a885245a2c1174792aa2f4cc03e331ce46.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe 5ab7518bc969560c04d11c76de7a65a885245a2c1174792aa2f4cc03e331ce46.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\misc.exe 5ab7518bc969560c04d11c76de7a65a885245a2c1174792aa2f4cc03e331ce46.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\XLICONS.EXE 5ab7518bc969560c04d11c76de7a65a885245a2c1174792aa2f4cc03e331ce46.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE 5ab7518bc969560c04d11c76de7a65a885245a2c1174792aa2f4cc03e331ce46.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBEU~1.EXE 5ab7518bc969560c04d11c76de7a65a885245a2c1174792aa2f4cc03e331ce46.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\IECONT~1.EXE 5ab7518bc969560c04d11c76de7a65a885245a2c1174792aa2f4cc03e331ce46.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\PPTICO.EXE 5ab7518bc969560c04d11c76de7a65a885245a2c1174792aa2f4cc03e331ce46.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\EQUATION\EQNEDT32.EXE 5ab7518bc969560c04d11c76de7a65a885245a2c1174792aa2f4cc03e331ce46.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOBD5D~1.EXE 5ab7518bc969560c04d11c76de7a65a885245a2c1174792aa2f4cc03e331ce46.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GRAPH.EXE 5ab7518bc969560c04d11c76de7a65a885245a2c1174792aa2f4cc03e331ce46.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOSYNC.EXE 5ab7518bc969560c04d11c76de7a65a885245a2c1174792aa2f4cc03e331ce46.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpshare.exe 5ab7518bc969560c04d11c76de7a65a885245a2c1174792aa2f4cc03e331ce46.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\ink\mip.exe 5ab7518bc969560c04d11c76de7a65a885245a2c1174792aa2f4cc03e331ce46.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\Setup.exe 5ab7518bc969560c04d11c76de7a65a885245a2c1174792aa2f4cc03e331ce46.exe File opened for modification C:\PROGRA~2\WI54FB~1\setup_wm.exe 5ab7518bc969560c04d11c76de7a65a885245a2c1174792aa2f4cc03e331ce46.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Resource\Icons\SC_REA~1.EXE 5ab7518bc969560c04d11c76de7a65a885245a2c1174792aa2f4cc03e331ce46.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\CNFNOT32.EXE 5ab7518bc969560c04d11c76de7a65a885245a2c1174792aa2f4cc03e331ce46.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\WINWORD.EXE 5ab7518bc969560c04d11c76de7a65a885245a2c1174792aa2f4cc03e331ce46.exe File opened for modification C:\PROGRA~2\WINDOW~2\ACCESS~1\wordpad.exe 5ab7518bc969560c04d11c76de7a65a885245a2c1174792aa2f4cc03e331ce46.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe 5ab7518bc969560c04d11c76de7a65a885245a2c1174792aa2f4cc03e331ce46.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOUC.EXE 5ab7518bc969560c04d11c76de7a65a885245a2c1174792aa2f4cc03e331ce46.exe File opened for modification C:\PROGRA~2\WI54FB~1\setup_wm.exe 5ab7518bc969560c04d11c76de7a65a885245a2c1174792aa2f4cc03e331ce46.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmlaunch.exe 5ab7518bc969560c04d11c76de7a65a885245a2c1174792aa2f4cc03e331ce46.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe 5ab7518bc969560c04d11c76de7a65a885245a2c1174792aa2f4cc03e331ce46.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\SELFCERT.EXE 5ab7518bc969560c04d11c76de7a65a885245a2c1174792aa2f4cc03e331ce46.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\WORDICON.EXE 5ab7518bc969560c04d11c76de7a65a885245a2c1174792aa2f4cc03e331ce46.exe File opened for modification C:\PROGRA~2\WINDOW~1\WinMail.exe 5ab7518bc969560c04d11c76de7a65a885245a2c1174792aa2f4cc03e331ce46.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpshare.exe 5ab7518bc969560c04d11c76de7a65a885245a2c1174792aa2f4cc03e331ce46.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ACCICONS.EXE 5ab7518bc969560c04d11c76de7a65a885245a2c1174792aa2f4cc03e331ce46.exe File opened for modification C:\PROGRA~2\WINDOW~1\wabmig.exe 5ab7518bc969560c04d11c76de7a65a885245a2c1174792aa2f4cc03e331ce46.exe File opened for modification C:\PROGRA~2\WINDOW~1\WinMail.exe 5ab7518bc969560c04d11c76de7a65a885245a2c1174792aa2f4cc03e331ce46.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE 5ab7518bc969560c04d11c76de7a65a885245a2c1174792aa2f4cc03e331ce46.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Resource\Icons\SC_REA~1.EXE 5ab7518bc969560c04d11c76de7a65a885245a2c1174792aa2f4cc03e331ce46.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\LICLUA.EXE 5ab7518bc969560c04d11c76de7a65a885245a2c1174792aa2f4cc03e331ce46.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~2.EXE 5ab7518bc969560c04d11c76de7a65a885245a2c1174792aa2f4cc03e331ce46.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\VPREVIEW.EXE 5ab7518bc969560c04d11c76de7a65a885245a2c1174792aa2f4cc03e331ce46.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpconfig.exe 5ab7518bc969560c04d11c76de7a65a885245a2c1174792aa2f4cc03e331ce46.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE 5ab7518bc969560c04d11c76de7a65a885245a2c1174792aa2f4cc03e331ce46.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOF5E2~1.EXE 5ab7518bc969560c04d11c76de7a65a885245a2c1174792aa2f4cc03e331ce46.exe File opened for modification C:\PROGRA~2\WINDOW~1\wab.exe 5ab7518bc969560c04d11c76de7a65a885245a2c1174792aa2f4cc03e331ce46.exe File opened for modification C:\PROGRA~2\WINDOW~4\ImagingDevices.exe 5ab7518bc969560c04d11c76de7a65a885245a2c1174792aa2f4cc03e331ce46.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ACROBR~1.EXE 5ab7518bc969560c04d11c76de7a65a885245a2c1174792aa2f4cc03e331ce46.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\AcroRd32.exe 5ab7518bc969560c04d11c76de7a65a885245a2c1174792aa2f4cc03e331ce46.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\SETUPF~1\{AC76B~1\Setup.exe 5ab7518bc969560c04d11c76de7a65a885245a2c1174792aa2f4cc03e331ce46.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe 5ab7518bc969560c04d11c76de7a65a885245a2c1174792aa2f4cc03e331ce46.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTEM.EXE 5ab7518bc969560c04d11c76de7a65a885245a2c1174792aa2f4cc03e331ce46.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTEM.EXE 5ab7518bc969560c04d11c76de7a65a885245a2c1174792aa2f4cc03e331ce46.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 5AB751~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 5AB751~1.EXE File opened for modification C:\Windows\directx.sys 5AB751~1.EXE File opened for modification C:\Windows\svchost.com 5AB751~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 5AB751~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 5AB751~1.EXE File opened for modification C:\Windows\directx.sys 5AB751~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 5AB751~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 5AB751~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 5AB751~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 5AB751~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 5AB751~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 5AB751~1.EXE File opened for modification C:\Windows\directx.sys 5AB751~1.EXE File opened for modification C:\Windows\svchost.com 5AB751~1.EXE File opened for modification C:\Windows\svchost.com 5AB751~1.EXE File opened for modification C:\Windows\directx.sys 5AB751~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 5AB751~1.EXE File opened for modification C:\Windows\svchost.com 5AB751~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 5AB751~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 5AB751~1.EXE File opened for modification C:\Windows\directx.sys 5AB751~1.EXE File opened for modification C:\Windows\svchost.com 5AB751~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 5AB751~1.EXE File opened for modification C:\Windows\directx.sys svchost.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 5ab7518bc969560c04d11c76de7a65a885245a2c1174792aa2f4cc03e331ce46.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1396 wrote to memory of 1724 1396 5ab7518bc969560c04d11c76de7a65a885245a2c1174792aa2f4cc03e331ce46.exe 27 PID 1396 wrote to memory of 1724 1396 5ab7518bc969560c04d11c76de7a65a885245a2c1174792aa2f4cc03e331ce46.exe 27 PID 1396 wrote to memory of 1724 1396 5ab7518bc969560c04d11c76de7a65a885245a2c1174792aa2f4cc03e331ce46.exe 27 PID 1396 wrote to memory of 1724 1396 5ab7518bc969560c04d11c76de7a65a885245a2c1174792aa2f4cc03e331ce46.exe 27 PID 1724 wrote to memory of 588 1724 5ab7518bc969560c04d11c76de7a65a885245a2c1174792aa2f4cc03e331ce46.exe 28 PID 1724 wrote to memory of 588 1724 5ab7518bc969560c04d11c76de7a65a885245a2c1174792aa2f4cc03e331ce46.exe 28 PID 1724 wrote to memory of 588 1724 5ab7518bc969560c04d11c76de7a65a885245a2c1174792aa2f4cc03e331ce46.exe 28 PID 1724 wrote to memory of 588 1724 5ab7518bc969560c04d11c76de7a65a885245a2c1174792aa2f4cc03e331ce46.exe 28 PID 588 wrote to memory of 1472 588 svchost.com 29 PID 588 wrote to memory of 1472 588 svchost.com 29 PID 588 wrote to memory of 1472 588 svchost.com 29 PID 588 wrote to memory of 1472 588 svchost.com 29 PID 1472 wrote to memory of 652 1472 5AB751~1.EXE 30 PID 1472 wrote to memory of 652 1472 5AB751~1.EXE 30 PID 1472 wrote to memory of 652 1472 5AB751~1.EXE 30 PID 1472 wrote to memory of 652 1472 5AB751~1.EXE 30 PID 652 wrote to memory of 536 652 svchost.com 31 PID 652 wrote to memory of 536 652 svchost.com 31 PID 652 wrote to memory of 536 652 svchost.com 31 PID 652 wrote to memory of 536 652 svchost.com 31 PID 536 wrote to memory of 1576 536 5AB751~1.EXE 32 PID 536 wrote to memory of 1576 536 5AB751~1.EXE 32 PID 536 wrote to memory of 1576 536 5AB751~1.EXE 32 PID 536 wrote to memory of 1576 536 5AB751~1.EXE 32 PID 1576 wrote to memory of 608 1576 svchost.com 33 PID 1576 wrote to memory of 608 1576 svchost.com 33 PID 1576 wrote to memory of 608 1576 svchost.com 33 PID 1576 wrote to memory of 608 1576 svchost.com 33 PID 608 wrote to memory of 1504 608 5AB751~1.EXE 34 PID 608 wrote to memory of 1504 608 5AB751~1.EXE 34 PID 608 wrote to memory of 1504 608 5AB751~1.EXE 34 PID 608 wrote to memory of 1504 608 5AB751~1.EXE 34 PID 1504 wrote to memory of 1784 1504 svchost.com 35 PID 1504 wrote to memory of 1784 1504 svchost.com 35 PID 1504 wrote to memory of 1784 1504 svchost.com 35 PID 1504 wrote to memory of 1784 1504 svchost.com 35 PID 1784 wrote to memory of 268 1784 5AB751~1.EXE 36 PID 1784 wrote to memory of 268 1784 5AB751~1.EXE 36 PID 1784 wrote to memory of 268 1784 5AB751~1.EXE 36 PID 1784 wrote to memory of 268 1784 5AB751~1.EXE 36 PID 268 wrote to memory of 1756 268 svchost.com 37 PID 268 wrote to memory of 1756 268 svchost.com 37 PID 268 wrote to memory of 1756 268 svchost.com 37 PID 268 wrote to memory of 1756 268 svchost.com 37 PID 1756 wrote to memory of 2044 1756 5AB751~1.EXE 38 PID 1756 wrote to memory of 2044 1756 5AB751~1.EXE 38 PID 1756 wrote to memory of 2044 1756 5AB751~1.EXE 38 PID 1756 wrote to memory of 2044 1756 5AB751~1.EXE 38 PID 2044 wrote to memory of 2000 2044 svchost.com 39 PID 2044 wrote to memory of 2000 2044 svchost.com 39 PID 2044 wrote to memory of 2000 2044 svchost.com 39 PID 2044 wrote to memory of 2000 2044 svchost.com 39 PID 2000 wrote to memory of 1288 2000 5AB751~1.EXE 40 PID 2000 wrote to memory of 1288 2000 5AB751~1.EXE 40 PID 2000 wrote to memory of 1288 2000 5AB751~1.EXE 40 PID 2000 wrote to memory of 1288 2000 5AB751~1.EXE 40 PID 1288 wrote to memory of 548 1288 svchost.com 41 PID 1288 wrote to memory of 548 1288 svchost.com 41 PID 1288 wrote to memory of 548 1288 svchost.com 41 PID 1288 wrote to memory of 548 1288 svchost.com 41 PID 548 wrote to memory of 432 548 5AB751~1.EXE 42 PID 548 wrote to memory of 432 548 5AB751~1.EXE 42 PID 548 wrote to memory of 432 548 5AB751~1.EXE 42 PID 548 wrote to memory of 432 548 5AB751~1.EXE 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\5ab7518bc969560c04d11c76de7a65a885245a2c1174792aa2f4cc03e331ce46.exe"C:\Users\Admin\AppData\Local\Temp\5ab7518bc969560c04d11c76de7a65a885245a2c1174792aa2f4cc03e331ce46.exe"1⤵
- Modifies system executable filetype association
- Loads dropped DLL
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5ab7518bc969560c04d11c76de7a65a885245a2c1174792aa2f4cc03e331ce46.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\5ab7518bc969560c04d11c76de7a65a885245a2c1174792aa2f4cc03e331ce46.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:588 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:652 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE6⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:608 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:268 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE14⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE"15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:548 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE"17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:432 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE18⤵
- Executes dropped EXE
PID:320 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE"19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1480 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE20⤵
- Executes dropped EXE
PID:868 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE"21⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1324 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE22⤵
- Executes dropped EXE
PID:1620 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE"23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1832 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE24⤵
- Executes dropped EXE
PID:1892 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE"25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1692 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE26⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:840 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE"27⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1108 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE28⤵
- Executes dropped EXE
PID:1768 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE"29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1908 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE30⤵
- Executes dropped EXE
PID:1800 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE"31⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1784 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE32⤵
- Executes dropped EXE
PID:1904 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE"33⤵
- Executes dropped EXE
- Loads dropped DLL
PID:892 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE34⤵
- Executes dropped EXE
PID:1720 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE"35⤵
- Executes dropped EXE
PID:1348 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE36⤵
- Executes dropped EXE
PID:1244 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE"37⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1124 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE38⤵PID:2036
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE"39⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2044 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE40⤵PID:276
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE"41⤵
- Executes dropped EXE
- Loads dropped DLL
PID:676 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE42⤵
- Executes dropped EXE
PID:780 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE"43⤵
- Executes dropped EXE
- Loads dropped DLL
PID:432 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE44⤵
- Executes dropped EXE
PID:1472 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE"45⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1480 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE46⤵
- Executes dropped EXE
PID:284 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE"47⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1808 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE48⤵
- Executes dropped EXE
PID:1036 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE"49⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1832 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE50⤵
- Executes dropped EXE
PID:1344 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE"51⤵PID:1876
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE52⤵
- Executes dropped EXE
PID:1980 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE"53⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1768 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE54⤵
- Executes dropped EXE
PID:1948 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE"55⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1800 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE56⤵
- Executes dropped EXE
PID:1212 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE"57⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1960 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE58⤵
- Executes dropped EXE
PID:988 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE"59⤵
- Executes dropped EXE
PID:892 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE60⤵
- Executes dropped EXE
PID:832 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE"61⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1348 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE62⤵
- Executes dropped EXE
PID:2032 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE"63⤵
- Executes dropped EXE
PID:1368 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE64⤵
- Executes dropped EXE
PID:2036 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE"65⤵
- Executes dropped EXE
PID:1360 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE66⤵
- Executes dropped EXE
PID:276 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE"67⤵PID:2008
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE68⤵PID:1216
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE"69⤵PID:1680
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE70⤵PID:1536
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE"71⤵PID:1624
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE72⤵PID:1528
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE"73⤵PID:536
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE74⤵PID:1620
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE"75⤵PID:652
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE76⤵PID:1772
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE"77⤵
- Drops file in Windows directory
PID:872 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE78⤵PID:1220
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE"79⤵PID:1984
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE80⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:1876 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE"81⤵PID:1916
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE82⤵PID:1908
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE"83⤵PID:1544
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE84⤵PID:1364
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE"85⤵PID:1212
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE86⤵PID:796
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE"87⤵PID:1960
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE88⤵PID:1720
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE"89⤵PID:1012
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE90⤵
- Drops file in Windows directory
PID:892 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE"91⤵PID:848
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE92⤵PID:1348
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE"93⤵PID:2000
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE94⤵PID:1124
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE"95⤵PID:2036
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE96⤵PID:1360
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE"97⤵PID:780
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE98⤵PID:1708
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE"99⤵PID:984
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE100⤵PID:1128
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE"101⤵PID:1512
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE102⤵PID:1616
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE"103⤵
- Drops file in Windows directory
PID:1808 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE104⤵PID:284
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE"105⤵PID:2024
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE106⤵PID:608
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE"107⤵
- Drops file in Windows directory
PID:1104 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE108⤵PID:1832
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE"109⤵PID:840
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE110⤵PID:472
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE"111⤵
- Drops file in Windows directory
PID:1956 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE112⤵PID:1948
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE"113⤵PID:1908
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE114⤵PID:1784
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE"115⤵PID:1904
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE116⤵PID:1556
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE"117⤵PID:1900
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE118⤵PID:932
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE"119⤵
- Drops file in Windows directory
PID:1244 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE120⤵PID:1172
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE"121⤵PID:1460
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5AB751~1.EXE122⤵PID:848
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-