Analysis
-
max time kernel
85s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
25-11-2022 18:11
Behavioral task
behavioral1
Sample
95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe
Resource
win10v2004-20220812-en
General
-
Target
95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe
-
Size
229KB
-
MD5
cd9fcba13ff275e595128ac7d01dd3c2
-
SHA1
f841a0b9f8578e9d901555de9049b1609a307e4f
-
SHA256
95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d
-
SHA512
2aa1ef6d116da763fbc3c148808450f415b1189f005255d7db235c5fae6f4e1c3ad10286fb0a2b4e27955714b8560815a231d5a8ebe9cf1fd798555a88a94f8b
-
SSDEEP
6144:k9TDEgno7nzQr8Etlt4WypQtNq2vdUZ9vExlCNxbiVc7We5OdoIgnJbXeae/W5Bd:KDEgnoh7DOdoImxX7apIMGvb
Malware Config
Signatures
-
Detect Neshta payload 48 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\3582-490\95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe family_neshta C:\Windows\svchost.com family_neshta C:\Windows\svchost.com family_neshta C:\MSOCache\ALLUSE~1\{9A861~1\ose.exe family_neshta C:\MSOCache\ALLUSE~1\{90140~1\dwtrig20.exe family_neshta C:\MSOCache\ALLUSE~1\{90140~1\DW20.EXE family_neshta C:\MSOCache\ALLUSE~1\{9A861~1\setup.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe family_neshta C:\Windows\svchost.com family_neshta \Users\Admin\AppData\Local\Temp\3582-490\95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe family_neshta C:\Windows\svchost.com family_neshta \Users\Admin\AppData\Local\Temp\3582-490\95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe family_neshta C:\Windows\svchost.com family_neshta \Users\Admin\AppData\Local\Temp\3582-490\95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe family_neshta C:\Windows\svchost.com family_neshta \Users\Admin\AppData\Local\Temp\3582-490\95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe family_neshta C:\Windows\svchost.com family_neshta \Users\Admin\AppData\Local\Temp\3582-490\95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe family_neshta C:\Windows\svchost.com family_neshta \Users\Admin\AppData\Local\Temp\3582-490\95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe family_neshta C:\PROGRA~2\Adobe\READER~1.0\Reader\AcroRd32.exe family_neshta C:\PROGRA~2\Adobe\READER~1.0\Reader\Eula.exe family_neshta \PROGRA~2\Adobe\READER~1.0\Reader\Eula.exe family_neshta C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBEU~1.EXE family_neshta C:\Windows\svchost.com family_neshta C:\PROGRA~2\COMMON~1\MICROS~1\DW\DW20.EXE family_neshta C:\PROGRA~2\COMMON~1\ADOBEA~1\Versions\1.0\ADOBEA~1.EXE family_neshta C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBE_~1.EXE family_neshta \PROGRA~2\COMMON~1\Adobe\Updater6\ADOBEU~1.EXE family_neshta \Users\Admin\AppData\Local\Temp\3582-490\95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe family_neshta -
Modifies system executable filetype association 2 TTPs 1 IoCs
Processes:
95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Executes dropped EXE 64 IoCs
Processes:
95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exesvchost.com95D8EC~1.EXEsvchost.com95D8EC~1.EXEsvchost.com95D8EC~1.EXEsvchost.com95D8EC~1.EXEsvchost.com95D8EC~1.EXEsvchost.com95D8EC~1.EXEsvchost.com95D8EC~1.EXEsvchost.com95D8EC~1.EXEsvchost.com95D8EC~1.EXEsvchost.com95D8EC~1.EXEsvchost.com95D8EC~1.EXEsvchost.com95D8EC~1.EXEsvchost.com95D8EC~1.EXEsvchost.com95D8EC~1.EXEsvchost.com95D8EC~1.EXEsvchost.com95D8EC~1.EXEsvchost.com95D8EC~1.EXEsvchost.com95D8EC~1.EXEsvchost.com95D8EC~1.EXEsvchost.com95D8EC~1.EXEsvchost.comsvchost.comsvchost.com95D8EC~1.EXEsvchost.com95D8EC~1.EXEsvchost.com95D8EC~1.EXEsvchost.com95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXEsvchost.comsvchost.comsvchost.com95D8EC~1.EXEsvchost.com95D8EC~1.EXEsvchost.com95D8EC~1.EXEsvchost.com95D8EC~1.EXEsvchost.compid process 1540 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe 628 svchost.com 1500 95D8EC~1.EXE 1816 svchost.com 1360 95D8EC~1.EXE 1876 svchost.com 692 95D8EC~1.EXE 1660 svchost.com 1964 95D8EC~1.EXE 1948 svchost.com 1532 95D8EC~1.EXE 1544 svchost.com 1304 95D8EC~1.EXE 1348 svchost.com 1020 95D8EC~1.EXE 684 svchost.com 1620 95D8EC~1.EXE 1108 svchost.com 1776 95D8EC~1.EXE 1140 svchost.com 968 95D8EC~1.EXE 1344 svchost.com 452 95D8EC~1.EXE 1636 svchost.com 2028 95D8EC~1.EXE 836 svchost.com 852 95D8EC~1.EXE 1092 svchost.com 776 95D8EC~1.EXE 1600 svchost.com 2040 95D8EC~1.EXE 1948 svchost.com 2032 95D8EC~1.EXE 1056 svchost.com 1544 95D8EC~1.EXE 956 svchost.com 972 95D8EC~1.EXE 268 svchost.com 1348 95D8EC~1.EXE 1928 svchost.com 1692 95D8EC~1.EXE 108 svchost.com 1100 svchost.com 864 svchost.com 856 95D8EC~1.EXE 748 svchost.com 1816 95D8EC~1.EXE 604 svchost.com 1316 95D8EC~1.EXE 1036 svchost.com 1612 95D8EC~1.EXE 1280 95D8EC~1.EXE 1400 95D8EC~1.EXE 852 svchost.com 2016 svchost.com 1680 svchost.com 1960 95D8EC~1.EXE 1380 svchost.com 1384 95D8EC~1.EXE 1304 svchost.com 392 95D8EC~1.EXE 1968 svchost.com 1804 95D8EC~1.EXE 1252 svchost.com -
Loads dropped DLL 64 IoCs
Processes:
95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exesvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.com95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exesvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.com95D8EC~1.EXEpid process 1672 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe 1672 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe 628 svchost.com 628 svchost.com 1816 svchost.com 1816 svchost.com 1876 svchost.com 1876 svchost.com 1660 svchost.com 1660 svchost.com 1948 svchost.com 1948 svchost.com 1544 svchost.com 1544 svchost.com 1348 svchost.com 1348 svchost.com 1672 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe 1540 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe 1540 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe 1540 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe 684 svchost.com 684 svchost.com 1540 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe 1108 svchost.com 1108 svchost.com 1140 svchost.com 1140 svchost.com 1344 svchost.com 1344 svchost.com 1636 svchost.com 1636 svchost.com 1540 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe 1540 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe 836 svchost.com 836 svchost.com 1092 svchost.com 1092 svchost.com 1600 svchost.com 1600 svchost.com 1540 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe 1948 svchost.com 1948 svchost.com 1672 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe 1056 svchost.com 1056 svchost.com 1540 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe 956 svchost.com 956 svchost.com 268 svchost.com 268 svchost.com 1928 svchost.com 1928 svchost.com 108 svchost.com 108 svchost.com 864 svchost.com 864 svchost.com 748 svchost.com 748 svchost.com 604 svchost.com 604 svchost.com 1036 svchost.com 1036 svchost.com 1280 95D8EC~1.EXE 1280 95D8EC~1.EXE -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
Processes:
95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exedescription ioc process File opened for modification C:\PROGRA~2\COMMON~1\ADOBEA~1\Versions\1.0\ADOBEA~1.EXE 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\ODeploy.exe 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOF5E2~1.EXE 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GRAPH.EXE 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOUC.EXE 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORDB.EXE 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\PPTICO.EXE 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\PPTICO.EXE 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmprph.exe 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ACROBR~1.EXE 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBEU~1.EXE 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOXMLED.EXE 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\1033\ONELEV.EXE 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\SETUPF~1\{AC76B~1\Setup.exe 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmprph.exe 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GO664E~1.EXE 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~2\WI54FB~1\setup_wm.exe 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\FLTLDR.EXE 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\IECONT~1.EXE 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\IECONT~1.EXE 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORDB.EXE 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\AcroRd32.exe 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~4.EXE 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\XLICONS.EXE 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ACROBR~1.EXE 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOF5E2~1.EXE 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\INFOPATH.EXE 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\misc.exe 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORE.EXE 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\POWERPNT.EXE 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmplayer.exe 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\Oarpmany.exe 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\SELFCERT.EXE 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\BCSSync.exe 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOHTMED.EXE 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOUC.EXE 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\A3DUTI~1.EXE 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\BCSSync.exe 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSQRY32.EXE 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\SOURCE~1\OSE.EXE 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOSYNC.EXE 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\NAMECO~1.EXE 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\ink\mip.exe 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\ODeploy.exe 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\TextConv\WksConv\Wkconv.exe 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~2\WI54FB~1\WMPDMC.exe 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ADOBEC~1.EXE 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\OIS.EXE 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~2\WINDOW~1\wabmig.exe 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOBD5D~1.EXE 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~2\WINDOW~4\ImagingDevices.exe 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\1033\ONELEV.EXE 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\CNFNOT32.EXE 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\VPREVIEW.EXE 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe -
Drops file in Windows directory 64 IoCs
Processes:
svchost.comsvchost.com95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXEsvchost.com95D8EC~1.EXE95D8EC~1.EXEsvchost.comsvchost.com95D8EC~1.EXEsvchost.com95D8EC~1.EXEsvchost.comsvchost.comsvchost.com95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXEsvchost.comsvchost.comsvchost.com95D8EC~1.EXE95D8EC~1.EXEsvchost.com95D8EC~1.EXEsvchost.com95D8EC~1.EXEsvchost.com95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXEsvchost.comsvchost.comsvchost.comsvchost.comsvchost.com95D8EC~1.EXE95D8EC~1.EXEsvchost.comsvchost.comsvchost.com95D8EC~1.EXE95D8EC~1.EXEsvchost.com95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXEsvchost.comsvchost.comsvchost.comsvchost.comsvchost.com95D8EC~1.EXEsvchost.com95D8EC~1.EXE95D8EC~1.EXEdescription ioc process File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 95D8EC~1.EXE File opened for modification C:\Windows\svchost.com 95D8EC~1.EXE File opened for modification C:\Windows\svchost.com 95D8EC~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 95D8EC~1.EXE File opened for modification C:\Windows\directx.sys 95D8EC~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 95D8EC~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 95D8EC~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 95D8EC~1.EXE File opened for modification C:\Windows\directx.sys 95D8EC~1.EXE File opened for modification C:\Windows\svchost.com 95D8EC~1.EXE File opened for modification C:\Windows\svchost.com 95D8EC~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 95D8EC~1.EXE File opened for modification C:\Windows\directx.sys 95D8EC~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 95D8EC~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 95D8EC~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 95D8EC~1.EXE File opened for modification C:\Windows\directx.sys 95D8EC~1.EXE File opened for modification C:\Windows\directx.sys 95D8EC~1.EXE File opened for modification C:\Windows\directx.sys 95D8EC~1.EXE File opened for modification C:\Windows\directx.sys 95D8EC~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 95D8EC~1.EXE File opened for modification C:\Windows\directx.sys 95D8EC~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 95D8EC~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 95D8EC~1.EXE File opened for modification C:\Windows\svchost.com 95D8EC~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 95D8EC~1.EXE File opened for modification C:\Windows\svchost.com 95D8EC~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 95D8EC~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 95D8EC~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 95D8EC~1.EXE File opened for modification C:\Windows\directx.sys 95D8EC~1.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
Processes:
95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exesvchost.com95D8EC~1.EXEsvchost.com95D8EC~1.EXEsvchost.com95D8EC~1.EXEsvchost.com95D8EC~1.EXEsvchost.com95D8EC~1.EXEsvchost.com95D8EC~1.EXEsvchost.com95D8EC~1.EXEdescription pid process target process PID 1672 wrote to memory of 1540 1672 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe PID 1672 wrote to memory of 1540 1672 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe PID 1672 wrote to memory of 1540 1672 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe PID 1672 wrote to memory of 1540 1672 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe PID 1540 wrote to memory of 628 1540 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe svchost.com PID 1540 wrote to memory of 628 1540 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe svchost.com PID 1540 wrote to memory of 628 1540 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe svchost.com PID 1540 wrote to memory of 628 1540 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe svchost.com PID 628 wrote to memory of 1500 628 svchost.com 95D8EC~1.EXE PID 628 wrote to memory of 1500 628 svchost.com 95D8EC~1.EXE PID 628 wrote to memory of 1500 628 svchost.com 95D8EC~1.EXE PID 628 wrote to memory of 1500 628 svchost.com 95D8EC~1.EXE PID 1500 wrote to memory of 1816 1500 95D8EC~1.EXE svchost.com PID 1500 wrote to memory of 1816 1500 95D8EC~1.EXE svchost.com PID 1500 wrote to memory of 1816 1500 95D8EC~1.EXE svchost.com PID 1500 wrote to memory of 1816 1500 95D8EC~1.EXE svchost.com PID 1816 wrote to memory of 1360 1816 svchost.com 95D8EC~1.EXE PID 1816 wrote to memory of 1360 1816 svchost.com 95D8EC~1.EXE PID 1816 wrote to memory of 1360 1816 svchost.com 95D8EC~1.EXE PID 1816 wrote to memory of 1360 1816 svchost.com 95D8EC~1.EXE PID 1360 wrote to memory of 1876 1360 95D8EC~1.EXE svchost.com PID 1360 wrote to memory of 1876 1360 95D8EC~1.EXE svchost.com PID 1360 wrote to memory of 1876 1360 95D8EC~1.EXE svchost.com PID 1360 wrote to memory of 1876 1360 95D8EC~1.EXE svchost.com PID 1876 wrote to memory of 692 1876 svchost.com 95D8EC~1.EXE PID 1876 wrote to memory of 692 1876 svchost.com 95D8EC~1.EXE PID 1876 wrote to memory of 692 1876 svchost.com 95D8EC~1.EXE PID 1876 wrote to memory of 692 1876 svchost.com 95D8EC~1.EXE PID 692 wrote to memory of 1660 692 95D8EC~1.EXE svchost.com PID 692 wrote to memory of 1660 692 95D8EC~1.EXE svchost.com PID 692 wrote to memory of 1660 692 95D8EC~1.EXE svchost.com PID 692 wrote to memory of 1660 692 95D8EC~1.EXE svchost.com PID 1660 wrote to memory of 1964 1660 svchost.com 95D8EC~1.EXE PID 1660 wrote to memory of 1964 1660 svchost.com 95D8EC~1.EXE PID 1660 wrote to memory of 1964 1660 svchost.com 95D8EC~1.EXE PID 1660 wrote to memory of 1964 1660 svchost.com 95D8EC~1.EXE PID 1964 wrote to memory of 1948 1964 95D8EC~1.EXE svchost.com PID 1964 wrote to memory of 1948 1964 95D8EC~1.EXE svchost.com PID 1964 wrote to memory of 1948 1964 95D8EC~1.EXE svchost.com PID 1964 wrote to memory of 1948 1964 95D8EC~1.EXE svchost.com PID 1948 wrote to memory of 1532 1948 svchost.com 95D8EC~1.EXE PID 1948 wrote to memory of 1532 1948 svchost.com 95D8EC~1.EXE PID 1948 wrote to memory of 1532 1948 svchost.com 95D8EC~1.EXE PID 1948 wrote to memory of 1532 1948 svchost.com 95D8EC~1.EXE PID 1532 wrote to memory of 1544 1532 95D8EC~1.EXE svchost.com PID 1532 wrote to memory of 1544 1532 95D8EC~1.EXE svchost.com PID 1532 wrote to memory of 1544 1532 95D8EC~1.EXE svchost.com PID 1532 wrote to memory of 1544 1532 95D8EC~1.EXE svchost.com PID 1544 wrote to memory of 1304 1544 svchost.com 95D8EC~1.EXE PID 1544 wrote to memory of 1304 1544 svchost.com 95D8EC~1.EXE PID 1544 wrote to memory of 1304 1544 svchost.com 95D8EC~1.EXE PID 1544 wrote to memory of 1304 1544 svchost.com 95D8EC~1.EXE PID 1304 wrote to memory of 1348 1304 95D8EC~1.EXE svchost.com PID 1304 wrote to memory of 1348 1304 95D8EC~1.EXE svchost.com PID 1304 wrote to memory of 1348 1304 95D8EC~1.EXE svchost.com PID 1304 wrote to memory of 1348 1304 95D8EC~1.EXE svchost.com PID 1348 wrote to memory of 1020 1348 svchost.com 95D8EC~1.EXE PID 1348 wrote to memory of 1020 1348 svchost.com 95D8EC~1.EXE PID 1348 wrote to memory of 1020 1348 svchost.com 95D8EC~1.EXE PID 1348 wrote to memory of 1020 1348 svchost.com 95D8EC~1.EXE PID 1020 wrote to memory of 684 1020 95D8EC~1.EXE svchost.com PID 1020 wrote to memory of 684 1020 95D8EC~1.EXE svchost.com PID 1020 wrote to memory of 684 1020 95D8EC~1.EXE svchost.com PID 1020 wrote to memory of 684 1020 95D8EC~1.EXE svchost.com
Processes
-
C:\Users\Admin\AppData\Local\Temp\95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe"C:\Users\Admin\AppData\Local\Temp\95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe"1⤵
- Modifies system executable filetype association
- Loads dropped DLL
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Users\Admin\AppData\Local\Temp\3582-490\95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:692 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE12⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1020 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"17⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:684 -
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE18⤵
- Executes dropped EXE
PID:1620 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1108 -
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE20⤵
- Executes dropped EXE
PID:1776 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"21⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:1140 -
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE22⤵
- Executes dropped EXE
PID:968 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"23⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:1344 -
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE24⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:452 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"25⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:1636 -
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE26⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2028 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"27⤵
- Executes dropped EXE
- Loads dropped DLL
PID:836 -
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE28⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:852 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1092 -
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE30⤵
- Executes dropped EXE
PID:776 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"31⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1600 -
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE32⤵
- Executes dropped EXE
PID:2040 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"33⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1948 -
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE34⤵
- Executes dropped EXE
PID:2032 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"35⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1056 -
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE36⤵
- Executes dropped EXE
PID:1544 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"37⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:956 -
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE38⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:972 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"39⤵
- Executes dropped EXE
- Loads dropped DLL
PID:268 -
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE40⤵
- Executes dropped EXE
PID:1348 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"41⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1928 -
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE42⤵
- Executes dropped EXE
PID:1692 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"43⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:108 -
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE44⤵PID:1100
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"45⤵
- Executes dropped EXE
- Loads dropped DLL
PID:864 -
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE46⤵
- Executes dropped EXE
PID:856 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"47⤵
- Executes dropped EXE
- Loads dropped DLL
PID:748 -
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE48⤵
- Executes dropped EXE
PID:1816 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"49⤵
- Executes dropped EXE
- Loads dropped DLL
PID:604 -
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE50⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1316 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"51⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1036 -
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE52⤵
- Executes dropped EXE
PID:1612 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"53⤵PID:1280
-
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE54⤵
- Executes dropped EXE
PID:1400 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"55⤵
- Executes dropped EXE
PID:852 -
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE56⤵PID:2016
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"57⤵
- Executes dropped EXE
PID:1680 -
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE58⤵PID:1960
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"59⤵PID:1380
-
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE60⤵
- Executes dropped EXE
PID:1384 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"61⤵
- Executes dropped EXE
PID:1304 -
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE62⤵
- Executes dropped EXE
PID:392 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"63⤵
- Executes dropped EXE
PID:1968 -
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE64⤵
- Executes dropped EXE
PID:1804 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"65⤵
- Executes dropped EXE
PID:1252 -
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE66⤵PID:1696
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"67⤵
- Drops file in Windows directory
PID:1772 -
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE68⤵PID:1784
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"69⤵PID:684
-
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE70⤵PID:1500
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"71⤵
- Executes dropped EXE
PID:1100 -
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE72⤵PID:1776
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"73⤵PID:992
-
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE74⤵PID:1492
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"75⤵PID:824
-
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE76⤵PID:548
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"77⤵PID:1876
-
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE78⤵PID:1344
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"79⤵
- Drops file in Windows directory
PID:1160 -
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE80⤵PID:2028
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"81⤵PID:2020
-
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE82⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:1280 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"83⤵PID:1604
-
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE84⤵PID:776
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"85⤵
- Executes dropped EXE
PID:2016 -
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE86⤵PID:1596
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"87⤵PID:316
-
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE88⤵
- Executes dropped EXE
PID:1960 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"89⤵
- Executes dropped EXE
PID:1380 -
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE90⤵PID:1880
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"91⤵PID:952
-
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE92⤵PID:1544
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"93⤵PID:956
-
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE94⤵PID:972
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"95⤵
- Drops file in Windows directory
PID:552 -
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE96⤵
- Drops file in Windows directory
PID:1704 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"97⤵PID:1696
-
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE98⤵PID:1692
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"99⤵PID:1928
-
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE100⤵PID:108
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"101⤵PID:1232
-
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE102⤵
- Drops file in Windows directory
PID:1480 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"103⤵
- Drops file in Windows directory
PID:1776 -
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE104⤵PID:748
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"105⤵PID:1492
-
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE106⤵PID:1868
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"107⤵PID:604
-
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE108⤵PID:1864
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"109⤵PID:1036
-
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE110⤵PID:1536
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"111⤵PID:2008
-
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE112⤵PID:1460
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"113⤵PID:852
-
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE114⤵PID:1572
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"115⤵PID:2040
-
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE116⤵PID:1992
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"117⤵PID:1364
-
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE118⤵PID:1948
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"119⤵PID:1056
-
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE120⤵PID:876
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"121⤵PID:1304
-
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE122⤵PID:948
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-