Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
137s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
03/11/2023, 10:31
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
NEAS.109fa502460e4de811c37349c38e4530.exe
Resource
win7-20231023-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
NEAS.109fa502460e4de811c37349c38e4530.exe
Resource
win10v2004-20231023-en
7 signatures
150 seconds
General
-
Target
NEAS.109fa502460e4de811c37349c38e4530.exe
-
Size
125KB
-
MD5
109fa502460e4de811c37349c38e4530
-
SHA1
94ab37f3608246628f4f0c58d68d9edfb88e09ec
-
SHA256
87d163134eec22ff34870d4883be78ccadf0cbbfabd64aefcc8d5722406359cd
-
SHA512
4296259739d6942313d50a1f68176e74e34e9b00784c7fe45beb1c93735ff7f5f8bb67db3595cc7f839abc5417aceccb13a12284c8a8f08d9af159e20b715ac2
-
SSDEEP
3072:qghTvS/U82Uo74wUeE+DhgrMje7gPszWhBlDeKUiiVeyWeIhhBOt:rS8jrU6DRMWhBcK1ZE
Score
10/10
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe C:\\Windows\\system32\\ftps.exe" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe C:\\Windows\\system32\\ftps.exe" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe C:\\Windows\\system32\\ftps.exe" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe C:\\Windows\\system32\\ftps.exe" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe C:\\Windows\\system32\\ftps.exe" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe C:\\Windows\\system32\\ftps.exe" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe C:\\Windows\\system32\\ftps.exe" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe C:\\Windows\\system32\\ftps.exe" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe C:\\Windows\\system32\\ftps.exe" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe C:\\Windows\\system32\\ftps.exe" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe C:\\Windows\\system32\\ftps.exe" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe C:\\Windows\\system32\\ftps.exe" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe C:\\Windows\\system32\\ftps.exe" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe C:\\Windows\\system32\\ftps.exe" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe C:\\Windows\\system32\\ftps.exe" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe C:\\Windows\\system32\\ftps.exe" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe C:\\Windows\\system32\\ftps.exe" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe C:\\Windows\\system32\\ftps.exe" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe C:\\Windows\\system32\\ftps.exe" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe C:\\Windows\\system32\\ftps.exe" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe C:\\Windows\\system32\\ftps.exe" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe C:\\Windows\\system32\\ftps.exe" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe C:\\Windows\\system32\\ftps.exe" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe C:\\Windows\\system32\\ftps.exe" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe C:\\Windows\\system32\\ftps.exe" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe C:\\Windows\\system32\\ftps.exe" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe C:\\Windows\\system32\\ftps.exe" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe C:\\Windows\\system32\\ftps.exe" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe C:\\Windows\\system32\\ftps.exe" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe C:\\Windows\\system32\\ftps.exe" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe C:\\Windows\\system32\\ftps.exe" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe C:\\Windows\\system32\\ftps.exe" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe C:\\Windows\\system32\\ftps.exe" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe C:\\Windows\\system32\\ftps.exe" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe C:\\Windows\\system32\\ftps.exe" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe C:\\Windows\\system32\\ftps.exe" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe C:\\Windows\\system32\\ftps.exe" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe C:\\Windows\\system32\\ftps.exe" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe C:\\Windows\\system32\\ftps.exe" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe C:\\Windows\\system32\\ftps.exe" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe C:\\Windows\\system32\\ftps.exe" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe C:\\Windows\\system32\\ftps.exe" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe C:\\Windows\\system32\\ftps.exe" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe C:\\Windows\\system32\\ftps.exe" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe C:\\Windows\\system32\\ftps.exe" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe C:\\Windows\\system32\\ftps.exe" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe C:\\Windows\\system32\\ftps.exe" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe C:\\Windows\\system32\\ftps.exe" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe C:\\Windows\\system32\\ftps.exe" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe C:\\Windows\\system32\\ftps.exe" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe C:\\Windows\\system32\\ftps.exe" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe C:\\Windows\\system32\\ftps.exe" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe C:\\Windows\\system32\\ftps.exe" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe C:\\Windows\\system32\\ftps.exe" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe C:\\Windows\\system32\\ftps.exe" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe C:\\Windows\\system32\\ftps.exe" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe C:\\Windows\\system32\\ftps.exe" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe C:\\Windows\\system32\\ftps.exe" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe C:\\Windows\\system32\\ftps.exe" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe C:\\Windows\\system32\\ftps.exe" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe C:\\Windows\\system32\\ftps.exe" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe C:\\Windows\\system32\\ftps.exe" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe C:\\Windows\\system32\\ftps.exe" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe C:\\Windows\\system32\\ftps.exe" Process not Found -
Executes dropped EXE 64 IoCs
pid Process 5060 sychost.exe 1332 sychost.exe 3968 sychost.exe 4724 sychost.exe 4808 sychost.exe 4744 sychost.exe 5048 sychost.exe 3960 sychost.exe 4288 sychost.exe 4784 sychost.exe 3924 sychost.exe 2084 sychost.exe 1208 sychost.exe 4168 sychost.exe 812 sychost.exe 4068 sychost.exe 892 sychost.exe 4224 sychost.exe 1580 sychost.exe 2616 sychost.exe 3532 sychost.exe 2016 sychost.exe 3940 sychost.exe 4656 sychost.exe 4092 sychost.exe 4392 sychost.exe 3520 sychost.exe 5032 sychost.exe 1504 sychost.exe 5052 sychost.exe 436 sychost.exe 4560 sychost.exe 2952 sychost.exe 228 sychost.exe 3032 sychost.exe 880 sychost.exe 4236 sychost.exe 1968 sychost.exe 4368 sychost.exe 2216 sychost.exe 4812 sychost.exe 4492 sychost.exe 4396 sychost.exe 4800 sychost.exe 4836 sychost.exe 4696 sychost.exe 4340 sychost.exe 3824 sychost.exe 2080 sychost.exe 5084 sychost.exe 432 sychost.exe 4924 sychost.exe 2132 sychost.exe 2224 sychost.exe 1276 sychost.exe 4336 sychost.exe 1904 sychost.exe 3856 sychost.exe 3460 sychost.exe 4864 sychost.exe 3372 sychost.exe 1760 sychost.exe 3928 sychost.exe 4208 sychost.exe -
Adds Run key to start application 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\windows update = "C:\\Windows\\system32\\sychost.exe" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\windows update = "C:\\Windows\\system32\\sychost.exe" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\windows update = "C:\\Windows\\system32\\sychost.exe" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\windows update = "C:\\Windows\\system32\\sychost.exe" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\windows update = "C:\\Windows\\system32\\sychost.exe" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\windows update = "C:\\Windows\\system32\\sychost.exe" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\windows update = "C:\\Windows\\system32\\sychost.exe" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\windows update = "C:\\Windows\\system32\\sychost.exe" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\windows update = "C:\\Windows\\system32\\sychost.exe" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\windows update = "C:\\Windows\\system32\\sychost.exe" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\windows update = "C:\\Windows\\system32\\sychost.exe" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\windows update = "C:\\Windows\\system32\\sychost.exe" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\windows update = "C:\\Windows\\system32\\sychost.exe" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\windows update = "C:\\Windows\\system32\\sychost.exe" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\windows update = "C:\\Windows\\system32\\sychost.exe" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\windows update = "C:\\Windows\\system32\\sychost.exe" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\windows update = "C:\\Windows\\system32\\sychost.exe" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\windows update = "C:\\Windows\\system32\\sychost.exe" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\windows update = "C:\\Windows\\system32\\sychost.exe" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\windows update = "C:\\Windows\\system32\\sychost.exe" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\windows update = "C:\\Windows\\system32\\sychost.exe" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\windows update = "C:\\Windows\\system32\\sychost.exe" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\windows update = "C:\\Windows\\system32\\sychost.exe" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\windows update = "C:\\Windows\\system32\\sychost.exe" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\windows update = "C:\\Windows\\system32\\sychost.exe" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\windows update = "C:\\Windows\\system32\\sychost.exe" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\windows update = "C:\\Windows\\system32\\sychost.exe" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\windows update = "C:\\Windows\\system32\\sychost.exe" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\windows update = "C:\\Windows\\system32\\sychost.exe" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\windows update = "C:\\Windows\\system32\\sychost.exe" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\windows update = "C:\\Windows\\system32\\sychost.exe" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\windows update = "C:\\Windows\\system32\\sychost.exe" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\windows update = "C:\\Windows\\system32\\sychost.exe" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\windows update = "C:\\Windows\\system32\\sychost.exe" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\windows update = "C:\\Windows\\system32\\sychost.exe" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\windows update = "C:\\Windows\\system32\\sychost.exe" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\windows update = "C:\\Windows\\system32\\sychost.exe" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\windows update = "C:\\Windows\\system32\\sychost.exe" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\windows update = "C:\\Windows\\system32\\sychost.exe" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\windows update = "C:\\Windows\\system32\\sychost.exe" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\windows update = "C:\\Windows\\system32\\sychost.exe" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\windows update = "C:\\Windows\\system32\\sychost.exe" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\windows update = "C:\\Windows\\system32\\sychost.exe" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\windows update = "C:\\Windows\\system32\\sychost.exe" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\windows update = "C:\\Windows\\system32\\sychost.exe" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\windows update = "C:\\Windows\\system32\\sychost.exe" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\windows update = "C:\\Windows\\system32\\sychost.exe" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\windows update = "C:\\Windows\\system32\\sychost.exe" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\windows update = "C:\\Windows\\system32\\sychost.exe" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\windows update = "C:\\Windows\\system32\\sychost.exe" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\windows update = "C:\\Windows\\system32\\sychost.exe" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\windows update = "C:\\Windows\\system32\\sychost.exe" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\windows update = "C:\\Windows\\system32\\sychost.exe" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\windows update = "C:\\Windows\\system32\\sychost.exe" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\windows update = "C:\\Windows\\system32\\sychost.exe" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\windows update = "C:\\Windows\\system32\\sychost.exe" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\windows update = "C:\\Windows\\system32\\sychost.exe" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\windows update = "C:\\Windows\\system32\\sychost.exe" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\windows update = "C:\\Windows\\system32\\sychost.exe" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\windows update = "C:\\Windows\\system32\\sychost.exe" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\windows update = "C:\\Windows\\system32\\sychost.exe" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\windows update = "C:\\Windows\\system32\\sychost.exe" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\windows update = "C:\\Windows\\system32\\sychost.exe" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\windows update = "C:\\Windows\\system32\\sychost.exe" sychost.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\telnets.exe sychost.exe File opened for modification C:\Windows\SysWOW64\telnets.exe sychost.exe File opened for modification C:\Windows\SysWOW64\ftps.exe sychost.exe File opened for modification C:\Windows\SysWOW64\ftps.exe sychost.exe File created C:\Windows\SysWOW64\sychost.exe sychost.exe File created C:\Windows\SysWOW64\sychost.exe sychost.exe File opened for modification C:\Windows\SysWOW64\ftps.exe sychost.exe File created C:\Windows\SysWOW64\sychost.exe sychost.exe File created C:\Windows\SysWOW64\sychost.exe sychost.exe File opened for modification C:\Windows\SysWOW64\ftps.exe sychost.exe File created C:\Windows\SysWOW64\sychost.exe sychost.exe File created C:\Windows\SysWOW64\sychost.exe sychost.exe File opened for modification C:\Windows\SysWOW64\ftps.exe sychost.exe File opened for modification C:\Windows\SysWOW64\telnets.exe sychost.exe File created C:\Windows\SysWOW64\sychost.exe Process not Found File opened for modification C:\Windows\SysWOW64\ftps.exe sychost.exe File opened for modification C:\Windows\SysWOW64\telnets.exe sychost.exe File created C:\Windows\SysWOW64\sychost.exe sychost.exe File created C:\Windows\SysWOW64\sychost.exe sychost.exe File opened for modification C:\Windows\SysWOW64\telnets.exe sychost.exe File created C:\Windows\SysWOW64\sychost.exe sychost.exe File created C:\Windows\SysWOW64\sychost.exe sychost.exe File opened for modification C:\Windows\SysWOW64\telnets.exe sychost.exe File opened for modification C:\Windows\SysWOW64\ftps.exe Process not Found File created C:\Windows\SysWOW64\sychost.exe sychost.exe File opened for modification C:\Windows\SysWOW64\telnets.exe sychost.exe File opened for modification C:\Windows\SysWOW64\telnets.exe sychost.exe File opened for modification C:\Windows\SysWOW64\telnets.exe sychost.exe File opened for modification C:\Windows\SysWOW64\telnets.exe sychost.exe File opened for modification C:\Windows\SysWOW64\ftps.exe Process not Found File opened for modification C:\Windows\SysWOW64\ftps.exe sychost.exe File opened for modification C:\Windows\SysWOW64\telnets.exe sychost.exe File created C:\Windows\SysWOW64\sychost.exe sychost.exe File opened for modification C:\Windows\SysWOW64\ftps.exe sychost.exe File created C:\Windows\SysWOW64\sychost.exe sychost.exe File opened for modification C:\Windows\SysWOW64\ftps.exe sychost.exe File opened for modification C:\Windows\SysWOW64\telnets.exe sychost.exe File opened for modification C:\Windows\SysWOW64\ftps.exe sychost.exe File opened for modification C:\Windows\SysWOW64\ftps.exe sychost.exe File created C:\Windows\SysWOW64\sychost.exe sychost.exe File created C:\Windows\SysWOW64\sychost.exe sychost.exe File opened for modification C:\Windows\SysWOW64\ftps.exe sychost.exe File opened for modification C:\Windows\SysWOW64\ftps.exe Process not Found File created C:\Windows\SysWOW64\sychost.exe sychost.exe File opened for modification C:\Windows\SysWOW64\telnets.exe sychost.exe File opened for modification C:\Windows\SysWOW64\telnets.exe sychost.exe File opened for modification C:\Windows\SysWOW64\ftps.exe Process not Found File created C:\Windows\SysWOW64\sychost.exe sychost.exe File created C:\Windows\SysWOW64\sychost.exe sychost.exe File created C:\Windows\SysWOW64\sychost.exe sychost.exe File opened for modification C:\Windows\SysWOW64\telnets.exe sychost.exe File created C:\Windows\SysWOW64\sychost.exe sychost.exe File opened for modification C:\Windows\SysWOW64\ftps.exe sychost.exe File opened for modification C:\Windows\SysWOW64\telnets.exe sychost.exe File opened for modification C:\Windows\SysWOW64\ftps.exe sychost.exe File opened for modification C:\Windows\SysWOW64\telnets.exe sychost.exe File opened for modification C:\Windows\SysWOW64\telnets.exe sychost.exe File opened for modification C:\Windows\SysWOW64\ftps.exe sychost.exe File opened for modification C:\Windows\SysWOW64\telnets.exe sychost.exe File created C:\Windows\SysWOW64\sychost.exe sychost.exe File created C:\Windows\SysWOW64\sychost.exe sychost.exe File opened for modification C:\Windows\SysWOW64\telnets.exe sychost.exe File opened for modification C:\Windows\SysWOW64\ftps.exe sychost.exe File opened for modification C:\Windows\SysWOW64\ftps.exe sychost.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 5376 14212 Process not Found 1271 -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "C:\\Windows\\SysWow64\\telnets.exe %1" sychost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "C:\\Windows\\SysWow64\\telnets.exe %1" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "C:\\Windows\\SysWow64\\telnets.exe %1" sychost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command sychost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "C:\\Windows\\SysWow64\\telnets.exe %1" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "C:\\Windows\\SysWow64\\telnets.exe %1" sychost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "C:\\Windows\\SysWow64\\telnets.exe %1" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "C:\\Windows\\SysWow64\\telnets.exe %1" sychost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command sychost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command sychost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command sychost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command sychost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command sychost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "C:\\Windows\\SysWow64\\telnets.exe %1" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "C:\\Windows\\SysWow64\\telnets.exe %1" sychost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "C:\\Windows\\SysWow64\\telnets.exe %1" sychost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "C:\\Windows\\SysWow64\\telnets.exe %1" sychost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command sychost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "C:\\Windows\\SysWow64\\telnets.exe %1" sychost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "C:\\Windows\\SysWow64\\telnets.exe %1" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "C:\\Windows\\SysWow64\\telnets.exe %1" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "C:\\Windows\\SysWow64\\telnets.exe %1" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "C:\\Windows\\SysWow64\\telnets.exe %1" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "C:\\Windows\\SysWow64\\telnets.exe %1" sychost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command sychost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command sychost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command sychost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "C:\\Windows\\SysWow64\\telnets.exe %1" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "C:\\Windows\\SysWow64\\telnets.exe %1" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "C:\\Windows\\SysWow64\\telnets.exe %1" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "C:\\Windows\\SysWow64\\telnets.exe %1" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command sychost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "C:\\Windows\\SysWow64\\telnets.exe %1" sychost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "C:\\Windows\\SysWow64\\telnets.exe %1" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "C:\\Windows\\SysWow64\\telnets.exe %1" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "C:\\Windows\\SysWow64\\telnets.exe %1" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "C:\\Windows\\SysWow64\\telnets.exe %1" sychost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command sychost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command sychost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "C:\\Windows\\SysWow64\\telnets.exe %1" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "C:\\Windows\\SysWow64\\telnets.exe %1" sychost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command sychost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command sychost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "C:\\Windows\\SysWow64\\telnets.exe %1" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "C:\\Windows\\SysWow64\\telnets.exe %1" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "C:\\Windows\\SysWow64\\telnets.exe %1" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "C:\\Windows\\SysWow64\\telnets.exe %1" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "C:\\Windows\\SysWow64\\telnets.exe %1" sychost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "C:\\Windows\\SysWow64\\telnets.exe %1" sychost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1284 wrote to memory of 5060 1284 NEAS.109fa502460e4de811c37349c38e4530.exe 89 PID 1284 wrote to memory of 5060 1284 NEAS.109fa502460e4de811c37349c38e4530.exe 89 PID 1284 wrote to memory of 5060 1284 NEAS.109fa502460e4de811c37349c38e4530.exe 89 PID 5060 wrote to memory of 1332 5060 sychost.exe 90 PID 5060 wrote to memory of 1332 5060 sychost.exe 90 PID 5060 wrote to memory of 1332 5060 sychost.exe 90 PID 1332 wrote to memory of 3968 1332 sychost.exe 91 PID 1332 wrote to memory of 3968 1332 sychost.exe 91 PID 1332 wrote to memory of 3968 1332 sychost.exe 91 PID 3968 wrote to memory of 4724 3968 sychost.exe 92 PID 3968 wrote to memory of 4724 3968 sychost.exe 92 PID 3968 wrote to memory of 4724 3968 sychost.exe 92 PID 4724 wrote to memory of 4808 4724 sychost.exe 93 PID 4724 wrote to memory of 4808 4724 sychost.exe 93 PID 4724 wrote to memory of 4808 4724 sychost.exe 93 PID 4808 wrote to memory of 4744 4808 sychost.exe 94 PID 4808 wrote to memory of 4744 4808 sychost.exe 94 PID 4808 wrote to memory of 4744 4808 sychost.exe 94 PID 4744 wrote to memory of 5048 4744 sychost.exe 95 PID 4744 wrote to memory of 5048 4744 sychost.exe 95 PID 4744 wrote to memory of 5048 4744 sychost.exe 95 PID 5048 wrote to memory of 3960 5048 sychost.exe 96 PID 5048 wrote to memory of 3960 5048 sychost.exe 96 PID 5048 wrote to memory of 3960 5048 sychost.exe 96 PID 3960 wrote to memory of 4288 3960 sychost.exe 98 PID 3960 wrote to memory of 4288 3960 sychost.exe 98 PID 3960 wrote to memory of 4288 3960 sychost.exe 98 PID 4288 wrote to memory of 4784 4288 sychost.exe 99 PID 4288 wrote to memory of 4784 4288 sychost.exe 99 PID 4288 wrote to memory of 4784 4288 sychost.exe 99 PID 4784 wrote to memory of 3924 4784 sychost.exe 100 PID 4784 wrote to memory of 3924 4784 sychost.exe 100 PID 4784 wrote to memory of 3924 4784 sychost.exe 100 PID 3924 wrote to memory of 2084 3924 sychost.exe 101 PID 3924 wrote to memory of 2084 3924 sychost.exe 101 PID 3924 wrote to memory of 2084 3924 sychost.exe 101 PID 2084 wrote to memory of 1208 2084 sychost.exe 102 PID 2084 wrote to memory of 1208 2084 sychost.exe 102 PID 2084 wrote to memory of 1208 2084 sychost.exe 102 PID 1208 wrote to memory of 4168 1208 sychost.exe 103 PID 1208 wrote to memory of 4168 1208 sychost.exe 103 PID 1208 wrote to memory of 4168 1208 sychost.exe 103 PID 4168 wrote to memory of 812 4168 sychost.exe 104 PID 4168 wrote to memory of 812 4168 sychost.exe 104 PID 4168 wrote to memory of 812 4168 sychost.exe 104 PID 812 wrote to memory of 4068 812 sychost.exe 105 PID 812 wrote to memory of 4068 812 sychost.exe 105 PID 812 wrote to memory of 4068 812 sychost.exe 105 PID 4068 wrote to memory of 892 4068 sychost.exe 106 PID 4068 wrote to memory of 892 4068 sychost.exe 106 PID 4068 wrote to memory of 892 4068 sychost.exe 106 PID 892 wrote to memory of 4224 892 sychost.exe 107 PID 892 wrote to memory of 4224 892 sychost.exe 107 PID 892 wrote to memory of 4224 892 sychost.exe 107 PID 4224 wrote to memory of 1580 4224 sychost.exe 108 PID 4224 wrote to memory of 1580 4224 sychost.exe 108 PID 4224 wrote to memory of 1580 4224 sychost.exe 108 PID 1580 wrote to memory of 2616 1580 sychost.exe 109 PID 1580 wrote to memory of 2616 1580 sychost.exe 109 PID 1580 wrote to memory of 2616 1580 sychost.exe 109 PID 2616 wrote to memory of 3532 2616 sychost.exe 110 PID 2616 wrote to memory of 3532 2616 sychost.exe 110 PID 2616 wrote to memory of 3532 2616 sychost.exe 110 PID 3532 wrote to memory of 2016 3532 sychost.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.109fa502460e4de811c37349c38e4530.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.109fa502460e4de811c37349c38e4530.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3968 -
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4724 -
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3960 -
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4288 -
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4784 -
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3924 -
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4168 -
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:812 -
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4068 -
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:892 -
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4224 -
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3532 -
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe23⤵
- Executes dropped EXE
PID:2016 -
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe24⤵
- Executes dropped EXE
PID:3940 -
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe25⤵
- Executes dropped EXE
PID:4656 -
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe26⤵
- Executes dropped EXE
PID:4092 -
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe27⤵
- Executes dropped EXE
- Modifies registry class
PID:4392 -
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe28⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
PID:3520 -
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe29⤵
- Executes dropped EXE
PID:5032 -
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe30⤵
- Executes dropped EXE
PID:1504 -
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe31⤵
- Executes dropped EXE
PID:5052 -
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe32⤵
- Executes dropped EXE
PID:436 -
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe33⤵
- Executes dropped EXE
PID:4560 -
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe34⤵
- Executes dropped EXE
PID:2952 -
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe35⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
PID:228 -
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe36⤵
- Executes dropped EXE
- Modifies registry class
PID:3032 -
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe37⤵
- Executes dropped EXE
PID:880 -
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe38⤵
- Executes dropped EXE
PID:4236 -
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe39⤵
- Executes dropped EXE
PID:1968 -
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe40⤵
- Executes dropped EXE
PID:4368 -
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe41⤵
- Executes dropped EXE
PID:2216 -
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe42⤵
- Executes dropped EXE
PID:4812 -
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe43⤵
- Executes dropped EXE
PID:4492 -
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe44⤵
- Executes dropped EXE
PID:4396 -
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe45⤵
- Executes dropped EXE
PID:4800 -
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe46⤵
- Executes dropped EXE
PID:4836 -
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe47⤵
- Executes dropped EXE
PID:4696 -
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe48⤵
- Executes dropped EXE
PID:4340 -
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe49⤵
- Executes dropped EXE
PID:3824 -
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe50⤵
- Executes dropped EXE
PID:2080 -
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe51⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Drops file in System32 directory
PID:5084 -
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe52⤵
- Executes dropped EXE
PID:432 -
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe53⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4924 -
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe54⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2132 -
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe55⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2224 -
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe56⤵
- Executes dropped EXE
PID:1276 -
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe57⤵
- Executes dropped EXE
PID:4336 -
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe58⤵
- Executes dropped EXE
PID:1904 -
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe59⤵
- Executes dropped EXE
PID:3856 -
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe60⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3460 -
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe61⤵
- Executes dropped EXE
PID:4864 -
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe62⤵
- Executes dropped EXE
PID:3372 -
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe63⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
PID:1760 -
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe64⤵
- Executes dropped EXE
PID:3928 -
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe65⤵
- Executes dropped EXE
PID:4208 -
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe66⤵PID:3888
-
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe67⤵PID:4672
-
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe68⤵
- Modifies registry class
PID:5064 -
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe69⤵PID:640
-
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe70⤵PID:2736
-
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe71⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
PID:3732 -
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe72⤵PID:4640
-
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe73⤵PID:1748
-
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe74⤵PID:4804
-
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe75⤵
- Drops file in System32 directory
PID:3052 -
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe76⤵PID:392
-
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe77⤵PID:4700
-
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe78⤵PID:3952
-
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe79⤵
- Modifies WinLogon for persistence
PID:5104 -
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe80⤵PID:3360
-
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe81⤵PID:2100
-
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe82⤵PID:5128
-
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe83⤵
- Modifies WinLogon for persistence
PID:5152 -
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe84⤵PID:5176
-
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe85⤵PID:5196
-
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe86⤵PID:5224
-
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe87⤵PID:5248
-
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe88⤵
- Drops file in System32 directory
PID:5272 -
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe89⤵PID:5296
-
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe90⤵
- Adds Run key to start application
PID:5324 -
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe91⤵PID:5348
-
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe92⤵PID:5372
-
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe93⤵PID:5400
-
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe94⤵PID:5428
-
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe95⤵PID:5452
-
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe96⤵PID:5476
-
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe97⤵PID:5500
-
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe98⤵PID:5524
-
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe99⤵PID:5548
-
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe100⤵PID:5572
-
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe101⤵PID:5596
-
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe102⤵PID:5620
-
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe103⤵PID:5648
-
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe104⤵PID:5672
-
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe105⤵PID:5692
-
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe106⤵
- Modifies WinLogon for persistence
- Drops file in System32 directory
PID:5720 -
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe107⤵
- Adds Run key to start application
PID:5744 -
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe108⤵PID:5768
-
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe109⤵PID:5792
-
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe110⤵
- Drops file in System32 directory
PID:5816 -
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe111⤵PID:5844
-
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe112⤵PID:5872
-
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe113⤵PID:5896
-
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe114⤵PID:5920
-
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe115⤵PID:5944
-
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe116⤵PID:5968
-
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe117⤵PID:5992
-
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe118⤵PID:6016
-
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe119⤵PID:6048
-
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe120⤵
- Modifies registry class
PID:6100 -
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe121⤵
- Adds Run key to start application
PID:6132 -
C:\Windows\SysWOW64\sychost.exeC:\Windows\system32\sychost.exe122⤵PID:5144
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-