Analysis
-
max time kernel
159s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
04/11/2023, 08:37
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
NEAS.042b3431fec24d8479630a4697f0cfb0.exe
Resource
win7-20231020-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
NEAS.042b3431fec24d8479630a4697f0cfb0.exe
Resource
win10v2004-20231023-en
8 signatures
150 seconds
General
-
Target
NEAS.042b3431fec24d8479630a4697f0cfb0.exe
-
Size
46KB
-
MD5
042b3431fec24d8479630a4697f0cfb0
-
SHA1
4cf08f82dac2eaa4bdd363998cd1195fb37efb8b
-
SHA256
5c0ec2e1d2ed1fcc1cba0e1636865d4e9d72445d0eb681f1bbeb14e1bf92c43d
-
SHA512
f8d2697274c2ef109986c0d4cf4efa75efe2038192ea61a59ca0522c10863f31e37faa3260bc6a7a026d443550e8d721cb88b963ed6395fe9c751a92b230064f
-
SSDEEP
768:qJzJB5Somq814YTljJpaC5LUHdRlLPsjJdL2BPVUWU5F08J1LC3:qJFBjmqy4YpuhHLl7oUeZ5eOLC
Score
10/10
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List Process not Found Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile Process not Found Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications Process not Found Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\NEAS.042b3431fec24d8479630a4697f0cfb0.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\NEAS.042b3431fec24d8479630a4697f0cfb0.exe:*:enabled:@shell32.dll,-1" Process not Found -
Modifies data under HKEY_USERS 15 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "100" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2360 NEAS.042b3431fec24d8479630a4697f0cfb0.exe 2360 NEAS.042b3431fec24d8479630a4697f0cfb0.exe -
Suspicious behavior: LoadsDriver 64 IoCs
pid Process 4996 Process not Found 4356 Process not Found 4988 Process not Found 2060 Process not Found 3840 Process not Found 1888 Process not Found 1572 Process not Found 848 Process not Found 4576 Process not Found 3424 Process not Found 1324 Process not Found 3084 Process not Found 3192 Process not Found 3396 Process not Found 4388 Process not Found 3060 Process not Found 3608 Process not Found 4108 Process not Found 1980 Process not Found 1488 Process not Found 5060 Process not Found 1116 Process not Found 2696 Process not Found 1920 Process not Found 1248 Process not Found 4500 Process not Found 2216 Process not Found 4956 Process not Found 2288 Process not Found 3540 Process not Found 2272 Process not Found 4488 Process not Found 1668 Process not Found 3172 Process not Found 4716 Process not Found 968 Process not Found 3080 Process not Found 1348 Process not Found 3692 Process not Found 888 Process not Found 980 Process not Found 3584 Process not Found 3544 Process not Found 1772 Process not Found 4308 Process not Found 1496 Process not Found 2892 Process not Found 1656 Process not Found 1632 Process not Found 700 Process not Found 1800 Process not Found 3536 Process not Found 4964 Process not Found 2220 Process not Found 1476 Process not Found 4460 Process not Found 4896 Process not Found 4328 Process not Found 3936 Process not Found 4032 Process not Found 2388 Process not Found 3776 Process not Found 2384 Process not Found 4156 Process not Found -
Suspicious behavior: MapViewOfSection 64 IoCs
pid Process 2360 NEAS.042b3431fec24d8479630a4697f0cfb0.exe 2360 NEAS.042b3431fec24d8479630a4697f0cfb0.exe 2360 NEAS.042b3431fec24d8479630a4697f0cfb0.exe 2360 NEAS.042b3431fec24d8479630a4697f0cfb0.exe 2360 NEAS.042b3431fec24d8479630a4697f0cfb0.exe 2360 NEAS.042b3431fec24d8479630a4697f0cfb0.exe 2360 NEAS.042b3431fec24d8479630a4697f0cfb0.exe 2360 NEAS.042b3431fec24d8479630a4697f0cfb0.exe 2360 NEAS.042b3431fec24d8479630a4697f0cfb0.exe 2360 NEAS.042b3431fec24d8479630a4697f0cfb0.exe 2360 NEAS.042b3431fec24d8479630a4697f0cfb0.exe 2360 NEAS.042b3431fec24d8479630a4697f0cfb0.exe 2360 NEAS.042b3431fec24d8479630a4697f0cfb0.exe 2360 NEAS.042b3431fec24d8479630a4697f0cfb0.exe 2360 NEAS.042b3431fec24d8479630a4697f0cfb0.exe 2360 NEAS.042b3431fec24d8479630a4697f0cfb0.exe 2360 NEAS.042b3431fec24d8479630a4697f0cfb0.exe 2360 NEAS.042b3431fec24d8479630a4697f0cfb0.exe 2360 NEAS.042b3431fec24d8479630a4697f0cfb0.exe 2360 NEAS.042b3431fec24d8479630a4697f0cfb0.exe 2360 Process not Found 2360 Process not Found 2360 Process not Found 2360 Process not Found 2360 Process not Found 2360 Process not Found 2360 Process not Found 2360 Process not Found 2360 Process not Found 2360 Process not Found 2360 Process not Found 2360 Process not Found 2360 Process not Found 2360 Process not Found 2360 Process not Found 2360 Process not Found 2360 Process not Found 2360 Process not Found 2360 Process not Found 2360 Process not Found 2360 Process not Found 2360 Process not Found 2360 Process not Found 2360 Process not Found 2360 Process not Found 2360 Process not Found 2360 Process not Found 2360 Process not Found 2360 Process not Found 2360 Process not Found 2360 Process not Found 2360 Process not Found 2360 Process not Found 2360 Process not Found 2360 Process not Found 2360 Process not Found 2360 Process not Found 2360 Process not Found 2360 Process not Found 2360 Process not Found 2360 Process not Found 2360 Process not Found 2360 Process not Found 2360 Process not Found -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2360 NEAS.042b3431fec24d8479630a4697f0cfb0.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4456 LogonUI.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2360 wrote to memory of 628 2360 NEAS.042b3431fec24d8479630a4697f0cfb0.exe 5 PID 2360 wrote to memory of 628 2360 NEAS.042b3431fec24d8479630a4697f0cfb0.exe 5 PID 2360 wrote to memory of 628 2360 NEAS.042b3431fec24d8479630a4697f0cfb0.exe 5 PID 2360 wrote to memory of 628 2360 NEAS.042b3431fec24d8479630a4697f0cfb0.exe 5 PID 2360 wrote to memory of 628 2360 NEAS.042b3431fec24d8479630a4697f0cfb0.exe 5 PID 2360 wrote to memory of 628 2360 NEAS.042b3431fec24d8479630a4697f0cfb0.exe 5 PID 2360 wrote to memory of 680 2360 NEAS.042b3431fec24d8479630a4697f0cfb0.exe 3 PID 2360 wrote to memory of 680 2360 NEAS.042b3431fec24d8479630a4697f0cfb0.exe 3 PID 2360 wrote to memory of 680 2360 NEAS.042b3431fec24d8479630a4697f0cfb0.exe 3 PID 2360 wrote to memory of 680 2360 NEAS.042b3431fec24d8479630a4697f0cfb0.exe 3 PID 2360 wrote to memory of 680 2360 NEAS.042b3431fec24d8479630a4697f0cfb0.exe 3 PID 2360 wrote to memory of 680 2360 NEAS.042b3431fec24d8479630a4697f0cfb0.exe 3 PID 2360 wrote to memory of 788 2360 NEAS.042b3431fec24d8479630a4697f0cfb0.exe 8 PID 2360 wrote to memory of 788 2360 NEAS.042b3431fec24d8479630a4697f0cfb0.exe 8 PID 2360 wrote to memory of 788 2360 NEAS.042b3431fec24d8479630a4697f0cfb0.exe 8 PID 2360 wrote to memory of 788 2360 NEAS.042b3431fec24d8479630a4697f0cfb0.exe 8 PID 2360 wrote to memory of 788 2360 NEAS.042b3431fec24d8479630a4697f0cfb0.exe 8 PID 2360 wrote to memory of 788 2360 NEAS.042b3431fec24d8479630a4697f0cfb0.exe 8 PID 2360 wrote to memory of 796 2360 NEAS.042b3431fec24d8479630a4697f0cfb0.exe 9 PID 2360 wrote to memory of 796 2360 NEAS.042b3431fec24d8479630a4697f0cfb0.exe 9 PID 2360 wrote to memory of 796 2360 NEAS.042b3431fec24d8479630a4697f0cfb0.exe 9 PID 2360 wrote to memory of 796 2360 NEAS.042b3431fec24d8479630a4697f0cfb0.exe 9 PID 2360 wrote to memory of 796 2360 NEAS.042b3431fec24d8479630a4697f0cfb0.exe 9 PID 2360 wrote to memory of 796 2360 NEAS.042b3431fec24d8479630a4697f0cfb0.exe 9 PID 2360 wrote to memory of 804 2360 NEAS.042b3431fec24d8479630a4697f0cfb0.exe 84 PID 2360 wrote to memory of 804 2360 NEAS.042b3431fec24d8479630a4697f0cfb0.exe 84 PID 2360 wrote to memory of 804 2360 NEAS.042b3431fec24d8479630a4697f0cfb0.exe 84 PID 2360 wrote to memory of 804 2360 NEAS.042b3431fec24d8479630a4697f0cfb0.exe 84 PID 2360 wrote to memory of 804 2360 NEAS.042b3431fec24d8479630a4697f0cfb0.exe 84 PID 2360 wrote to memory of 804 2360 NEAS.042b3431fec24d8479630a4697f0cfb0.exe 84 PID 2360 wrote to memory of 908 2360 NEAS.042b3431fec24d8479630a4697f0cfb0.exe 83 PID 2360 wrote to memory of 908 2360 NEAS.042b3431fec24d8479630a4697f0cfb0.exe 83 PID 2360 wrote to memory of 908 2360 NEAS.042b3431fec24d8479630a4697f0cfb0.exe 83 PID 2360 wrote to memory of 908 2360 NEAS.042b3431fec24d8479630a4697f0cfb0.exe 83 PID 2360 wrote to memory of 908 2360 NEAS.042b3431fec24d8479630a4697f0cfb0.exe 83 PID 2360 wrote to memory of 908 2360 NEAS.042b3431fec24d8479630a4697f0cfb0.exe 83 PID 2360 wrote to memory of 960 2360 NEAS.042b3431fec24d8479630a4697f0cfb0.exe 82 PID 2360 wrote to memory of 960 2360 NEAS.042b3431fec24d8479630a4697f0cfb0.exe 82 PID 2360 wrote to memory of 960 2360 NEAS.042b3431fec24d8479630a4697f0cfb0.exe 82 PID 2360 wrote to memory of 960 2360 NEAS.042b3431fec24d8479630a4697f0cfb0.exe 82 PID 2360 wrote to memory of 960 2360 NEAS.042b3431fec24d8479630a4697f0cfb0.exe 82 PID 2360 wrote to memory of 960 2360 NEAS.042b3431fec24d8479630a4697f0cfb0.exe 82 PID 2360 wrote to memory of 316 2360 NEAS.042b3431fec24d8479630a4697f0cfb0.exe 10 PID 2360 wrote to memory of 316 2360 NEAS.042b3431fec24d8479630a4697f0cfb0.exe 10 PID 2360 wrote to memory of 316 2360 NEAS.042b3431fec24d8479630a4697f0cfb0.exe 10 PID 2360 wrote to memory of 316 2360 NEAS.042b3431fec24d8479630a4697f0cfb0.exe 10 PID 2360 wrote to memory of 316 2360 NEAS.042b3431fec24d8479630a4697f0cfb0.exe 10 PID 2360 wrote to memory of 316 2360 NEAS.042b3431fec24d8479630a4697f0cfb0.exe 10 PID 2360 wrote to memory of 544 2360 NEAS.042b3431fec24d8479630a4697f0cfb0.exe 11 PID 2360 wrote to memory of 544 2360 NEAS.042b3431fec24d8479630a4697f0cfb0.exe 11 PID 2360 wrote to memory of 544 2360 NEAS.042b3431fec24d8479630a4697f0cfb0.exe 11 PID 2360 wrote to memory of 544 2360 NEAS.042b3431fec24d8479630a4697f0cfb0.exe 11 PID 2360 wrote to memory of 544 2360 NEAS.042b3431fec24d8479630a4697f0cfb0.exe 11 PID 2360 wrote to memory of 544 2360 NEAS.042b3431fec24d8479630a4697f0cfb0.exe 11 PID 2360 wrote to memory of 724 2360 NEAS.042b3431fec24d8479630a4697f0cfb0.exe 81 PID 2360 wrote to memory of 724 2360 NEAS.042b3431fec24d8479630a4697f0cfb0.exe 81 PID 2360 wrote to memory of 724 2360 NEAS.042b3431fec24d8479630a4697f0cfb0.exe 81 PID 2360 wrote to memory of 724 2360 NEAS.042b3431fec24d8479630a4697f0cfb0.exe 81 PID 2360 wrote to memory of 724 2360 NEAS.042b3431fec24d8479630a4697f0cfb0.exe 81 PID 2360 wrote to memory of 724 2360 NEAS.042b3431fec24d8479630a4697f0cfb0.exe 81 PID 2360 wrote to memory of 904 2360 NEAS.042b3431fec24d8479630a4697f0cfb0.exe 80 PID 2360 wrote to memory of 904 2360 NEAS.042b3431fec24d8479630a4697f0cfb0.exe 80 PID 2360 wrote to memory of 904 2360 NEAS.042b3431fec24d8479630a4697f0cfb0.exe 80 PID 2360 wrote to memory of 904 2360 NEAS.042b3431fec24d8479630a4697f0cfb0.exe 80
Processes
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:680
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:628
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"2⤵PID:796
-
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵PID:316
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x0 /state0:0xa39a2055 /state1:0x41c64e6d2⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:4456
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p1⤵PID:788
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:3796
-
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca2⤵PID:2820
-
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:CortanaUI.AppX3bn25b6f886wmg6twh46972vprk9tnbf.mca2⤵PID:1996
-
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppX53ypgrj20bgndg05hj3tc7z654myszwp.mca2⤵PID:3788
-
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca2⤵PID:4364
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}2⤵PID:1084
-
-
C:\Windows\system32\SppExtComObj.exeC:\Windows\system32\SppExtComObj.exe -Embedding2⤵PID:4464
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:4204
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:3764
-
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca2⤵PID:3920
-
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca2⤵PID:3732
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}2⤵PID:3640
-
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding2⤵PID:2852
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:2132
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:4424
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc1⤵PID:544
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵PID:1040
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵PID:1128
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}2⤵PID:2460
-
-
C:\Windows\system32\MusNotification.exeC:\Windows\system32\MusNotification.exe2⤵PID:3500
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵PID:1188
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵PID:1428
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc1⤵PID:1684
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetworkFirewall -p1⤵PID:1696
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵PID:2760
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3428
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵PID:3836
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s camsvc1⤵PID:372
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p1⤵PID:4548
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Appinfo1⤵PID:2316
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager1⤵PID:1624
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc1⤵PID:3656
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc1⤵PID:4432
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc1⤵PID:548
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3260
-
C:\Users\Admin\AppData\Local\Temp\NEAS.042b3431fec24d8479630a4697f0cfb0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.042b3431fec24d8479630a4697f0cfb0.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2360
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc1⤵PID:8
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService1⤵PID:2772
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks1⤵PID:2748
-
C:\Windows\sysmon.exeC:\Windows\sysmon.exe1⤵PID:2724
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer1⤵PID:2700
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc1⤵PID:2656
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker1⤵PID:2512
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT1⤵PID:2444
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent1⤵PID:2436
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2348
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2340
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc1⤵PID:2116
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation1⤵PID:1932
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:1008
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection1⤵PID:1984
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository1⤵PID:1940
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1880
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache1⤵PID:1848
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s netprofm1⤵PID:1808
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1760
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder1⤵PID:1648
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s SENS1⤵PID:1564
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp1⤵PID:1540
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵PID:1440
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵PID:1404
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵PID:1296
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵PID:1268
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵PID:1252
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵PID:1028
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork -p1⤵PID:904
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵PID:724
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵PID:960
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS -p1⤵PID:908
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:804
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe 000000f8 000000841⤵PID:3888