Malware Analysis Report

2024-11-16 12:20

Sample ID 240416-cpm6ssgg8y
Target 15ffe916fe070aa0ad38f68b63b0ce06e274eaa9a2048a7e6fc194e65be666c5
SHA256 15ffe916fe070aa0ad38f68b63b0ce06e274eaa9a2048a7e6fc194e65be666c5
Tags
neshta persistence spyware stealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

15ffe916fe070aa0ad38f68b63b0ce06e274eaa9a2048a7e6fc194e65be666c5

Threat Level: Known bad

The file 15ffe916fe070aa0ad38f68b63b0ce06e274eaa9a2048a7e6fc194e65be666c5 was found to be: Known bad.

Malicious Activity Summary

neshta persistence spyware stealer

Neshta

Detect Neshta payload

Checks computer location settings

Reads user/profile data of web browsers

Modifies system executable filetype association

Loads dropped DLL

Suspicious use of SetThreadContext

Drops file in Program Files directory

Drops file in Windows directory

Enumerates physical storage devices

Unsigned PE

Suspicious use of WriteProcessMemory

Suspicious use of AdjustPrivilegeToken

Creates scheduled task(s)

Suspicious behavior: EnumeratesProcesses

Modifies registry class

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-04-16 02:15

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-04-16 02:15

Reported

2024-04-16 02:17

Platform

win7-20240215-en

Max time kernel

119s

Max time network

121s

Command Line

"C:\Users\Admin\AppData\Local\Temp\Due invoice.exe"

Signatures

Detect Neshta payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Neshta

persistence spyware neshta

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A

Modifies system executable filetype association

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A

Reads user/profile data of web browsers

spyware stealer

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 1540 set thread context of 2380 N/A C:\Users\Admin\AppData\Local\Temp\Due invoice.exe C:\Users\Admin\AppData\Local\Temp\Due invoice.exe

Drops file in Program Files directory

Description Indicator Process Target
File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBE_~1.EXE C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~2\WINDOW~2\ACCESS~1\wordpad.exe C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\Eula.exe C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOXMLED.EXE C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Office14\GROOVEMN.EXE C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOUC.EXE C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~2\WI54FB~1\wmlaunch.exe C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GO664E~1.EXE C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~2.EXE C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Office14\NAMECO~1.EXE C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~2\WI54FB~1\setup_wm.exe C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~2\WI54FB~1\wmprph.exe C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORDB.EXE C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~2\WI4223~1\sidebar.exe C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBEU~1.EXE C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\LICLUA.EXE C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Office14\1033\ONELEV.EXE C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Office14\GRAPH.EXE C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTEM.EXE C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~2\WI54FB~1\wmpconfig.exe C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~2\WI54FB~1\wmpshare.exe C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\AcroRd32.exe C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\Oarpmany.exe C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\TextConv\WksConv\Wkconv.exe C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Office14\ACCICONS.EXE C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Office14\misc.exe C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Office14\OIS.EXE C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTE.EXE C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ACROBR~1.EXE C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\FLTLDR.EXE C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\ODeploy.exe C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~2\WINDOW~1\wab.exe C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~1.EXE C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Office14\CLVIEW.EXE C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ADOBEC~1.EXE C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~3.EXE C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOHTMED.EXE C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Office14\VPREVIEW.EXE C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~2\WI54FB~1\wmplayer.exe C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Resource\Icons\SC_REA~1.EXE C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\ADOBEA~1\Versions\1.0\ADOBEA~1.EXE C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\EQUATION\EQNEDT32.EXE C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Office14\BCSSync.exe C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~2\WINDOW~1\WinMail.exe C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\ink\mip.exe C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOICONS.EXE C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Office14\CNFNOT32.EXE C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Office14\INFOPATH.EXE C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~2\WI54FB~1\WMPDMC.exe C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~2\WINDOW~4\ImagingDevices.exe C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\A3DUTI~1.EXE C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\svchost.com C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A

Enumerates physical storage devices

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A

Modifies registry class

Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1540 wrote to memory of 2492 N/A C:\Users\Admin\AppData\Local\Temp\Due invoice.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1540 wrote to memory of 2492 N/A C:\Users\Admin\AppData\Local\Temp\Due invoice.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1540 wrote to memory of 2492 N/A C:\Users\Admin\AppData\Local\Temp\Due invoice.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1540 wrote to memory of 2492 N/A C:\Users\Admin\AppData\Local\Temp\Due invoice.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1540 wrote to memory of 2608 N/A C:\Users\Admin\AppData\Local\Temp\Due invoice.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1540 wrote to memory of 2608 N/A C:\Users\Admin\AppData\Local\Temp\Due invoice.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1540 wrote to memory of 2608 N/A C:\Users\Admin\AppData\Local\Temp\Due invoice.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1540 wrote to memory of 2608 N/A C:\Users\Admin\AppData\Local\Temp\Due invoice.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1540 wrote to memory of 2504 N/A C:\Users\Admin\AppData\Local\Temp\Due invoice.exe C:\Windows\SysWOW64\schtasks.exe
PID 1540 wrote to memory of 2504 N/A C:\Users\Admin\AppData\Local\Temp\Due invoice.exe C:\Windows\SysWOW64\schtasks.exe
PID 1540 wrote to memory of 2504 N/A C:\Users\Admin\AppData\Local\Temp\Due invoice.exe C:\Windows\SysWOW64\schtasks.exe
PID 1540 wrote to memory of 2504 N/A C:\Users\Admin\AppData\Local\Temp\Due invoice.exe C:\Windows\SysWOW64\schtasks.exe
PID 1540 wrote to memory of 2380 N/A C:\Users\Admin\AppData\Local\Temp\Due invoice.exe C:\Users\Admin\AppData\Local\Temp\Due invoice.exe
PID 1540 wrote to memory of 2380 N/A C:\Users\Admin\AppData\Local\Temp\Due invoice.exe C:\Users\Admin\AppData\Local\Temp\Due invoice.exe
PID 1540 wrote to memory of 2380 N/A C:\Users\Admin\AppData\Local\Temp\Due invoice.exe C:\Users\Admin\AppData\Local\Temp\Due invoice.exe
PID 1540 wrote to memory of 2380 N/A C:\Users\Admin\AppData\Local\Temp\Due invoice.exe C:\Users\Admin\AppData\Local\Temp\Due invoice.exe
PID 1540 wrote to memory of 2380 N/A C:\Users\Admin\AppData\Local\Temp\Due invoice.exe C:\Users\Admin\AppData\Local\Temp\Due invoice.exe
PID 1540 wrote to memory of 2380 N/A C:\Users\Admin\AppData\Local\Temp\Due invoice.exe C:\Users\Admin\AppData\Local\Temp\Due invoice.exe
PID 1540 wrote to memory of 2380 N/A C:\Users\Admin\AppData\Local\Temp\Due invoice.exe C:\Users\Admin\AppData\Local\Temp\Due invoice.exe
PID 1540 wrote to memory of 2380 N/A C:\Users\Admin\AppData\Local\Temp\Due invoice.exe C:\Users\Admin\AppData\Local\Temp\Due invoice.exe
PID 1540 wrote to memory of 2380 N/A C:\Users\Admin\AppData\Local\Temp\Due invoice.exe C:\Users\Admin\AppData\Local\Temp\Due invoice.exe
PID 1540 wrote to memory of 2380 N/A C:\Users\Admin\AppData\Local\Temp\Due invoice.exe C:\Users\Admin\AppData\Local\Temp\Due invoice.exe
PID 1540 wrote to memory of 2380 N/A C:\Users\Admin\AppData\Local\Temp\Due invoice.exe C:\Users\Admin\AppData\Local\Temp\Due invoice.exe
PID 1540 wrote to memory of 2380 N/A C:\Users\Admin\AppData\Local\Temp\Due invoice.exe C:\Users\Admin\AppData\Local\Temp\Due invoice.exe

Processes

C:\Users\Admin\AppData\Local\Temp\Due invoice.exe

"C:\Users\Admin\AppData\Local\Temp\Due invoice.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\Due invoice.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\iZwbTl.exe"

C:\Windows\SysWOW64\schtasks.exe

"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\iZwbTl" /XML "C:\Users\Admin\AppData\Local\Temp\tmp46B1.tmp"

C:\Users\Admin\AppData\Local\Temp\Due invoice.exe

"C:\Users\Admin\AppData\Local\Temp\Due invoice.exe"

Network

N/A

Files

memory/1540-0-0x0000000000B70000-0x0000000000C3C000-memory.dmp

memory/1540-1-0x0000000074810000-0x0000000074EFE000-memory.dmp

memory/1540-2-0x0000000004EE0000-0x0000000004F20000-memory.dmp

memory/1540-3-0x0000000000650000-0x0000000000662000-memory.dmp

memory/1540-4-0x0000000000B60000-0x0000000000B68000-memory.dmp

memory/1540-5-0x0000000004140000-0x000000000414C000-memory.dmp

memory/1540-6-0x0000000005EC0000-0x0000000005F4C000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\tmp46B1.tmp

MD5 d0406ee6dd0965870dd61b2ba03cecd7
SHA1 f3f6f6338de5e43dc533029257aac7582e7e3d8a
SHA256 87f62588b06445ccbde310167d395b02c7057938ae3e0844d4e2781944debc76
SHA512 12c161f991ee3c5e79208ee127b3d4634e7233fc6974d3c2ec8450a4a096a66daa38f4747bf13932197c9037635a6863fb0f8446f1dd08030a6211559ab7093b

C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

MD5 24a5ffe244246d28856d55d5ecaff192
SHA1 c7e9f9cf17064465169f2e29a43575d82c3c66ec
SHA256 4affb94cdae82d8b91b89868e9e6aa3b126c342ae567beb65be02c67cbdde7bf
SHA512 8e3d90089e98b56d27a3ee29fddabced18cdd139167cf6b47f9e2961577d2cd8f80245254840637adb3d34e26d3615c44a2e377bb93735b4216f2a78b0ab66e5

memory/2380-19-0x0000000000400000-0x000000000041B000-memory.dmp

memory/2380-20-0x0000000000400000-0x000000000041B000-memory.dmp

memory/2380-22-0x0000000000400000-0x000000000041B000-memory.dmp

memory/2380-21-0x0000000000400000-0x000000000041B000-memory.dmp

memory/2380-24-0x0000000000400000-0x000000000041B000-memory.dmp

memory/2380-26-0x0000000000400000-0x000000000041B000-memory.dmp

memory/2380-28-0x0000000000400000-0x000000000041B000-memory.dmp

memory/2380-30-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

memory/2380-32-0x0000000000400000-0x000000000041B000-memory.dmp

memory/2380-33-0x0000000000400000-0x000000000041B000-memory.dmp

memory/2380-34-0x0000000000400000-0x000000000041B000-memory.dmp

memory/1540-35-0x0000000074810000-0x0000000074EFE000-memory.dmp

C:\MSOCache\ALLUSE~1\{9A861~1\ose.exe

MD5 85bffd716be6e64702dc8e2693af927a
SHA1 d58f548346ab9fa505123436417ca1641afd35e0
SHA256 2059609260ddce07580c17c044132f2c5c575b1db6afb39be627ace39c4f0623
SHA512 d0f4cdf19dbcad6b6259994eeac6dcb2a56360cd807fcad61e73aa1eb3724ade0fe3b10e63724387fe816c8751ba2ca66e69deef64eaecfd9d3594214e0a8761

memory/2608-44-0x000000006F340000-0x000000006F8EB000-memory.dmp

memory/2492-45-0x000000006F340000-0x000000006F8EB000-memory.dmp

memory/2492-46-0x0000000002A50000-0x0000000002A90000-memory.dmp

memory/2608-47-0x0000000002FE0000-0x0000000003020000-memory.dmp

memory/2492-48-0x000000006F340000-0x000000006F8EB000-memory.dmp

memory/2608-50-0x0000000002FE0000-0x0000000003020000-memory.dmp

memory/2608-49-0x000000006F340000-0x000000006F8EB000-memory.dmp

memory/2492-52-0x0000000002A50000-0x0000000002A90000-memory.dmp

memory/2492-51-0x000000006F340000-0x000000006F8EB000-memory.dmp

memory/2608-54-0x0000000002FE0000-0x0000000003020000-memory.dmp

memory/2608-53-0x000000006F340000-0x000000006F8EB000-memory.dmp

\PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE

MD5 9e2b9928c89a9d0da1d3e8f4bd96afa7
SHA1 ec66cda99f44b62470c6930e5afda061579cde35
SHA256 8899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043
SHA512 2ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156

C:\Users\Admin\AppData\Roaming\iZwbTl.exe

MD5 5d84f160cec1c7b8e83d6d9f90a612f0
SHA1 58f2e9216d4b29073376f6f607c16d03ba1c200f
SHA256 aec8415d0972e902d53d348ebc7beaf6c575f9ec6e12791173ab1d84e90a1109
SHA512 fd2c641a4d4a244b77ad0ce8870958fa05bf766bba65c08e0cabfd652d12e43367dfeb9ee2969e74fd95658a10d015738a6449f3da1f4148d953163c5ff4ccb7

memory/2492-129-0x0000000002A50000-0x0000000002A90000-memory.dmp

memory/2608-130-0x0000000002FE0000-0x0000000003020000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-04-16 02:15

Reported

2024-04-16 02:17

Platform

win10v2004-20240412-en

Max time kernel

147s

Max time network

152s

Command Line

"C:\Users\Admin\AppData\Local\Temp\Due invoice.exe"

Signatures

Detect Neshta payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Neshta

persistence spyware neshta

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A

Modifies system executable filetype association

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A

Reads user/profile data of web browsers

spyware stealer

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 4700 set thread context of 4172 N/A C:\Users\Admin\AppData\Local\Temp\Due invoice.exe C:\Users\Admin\AppData\Local\Temp\Due invoice.exe

Drops file in Program Files directory

Description Indicator Process Target
File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jusched.exe C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Browser\WCCHRO~1\WCCHRO~1.EXE C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\COOKIE~1.EXE C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~4.EXE C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\MSEDGE~1.EXE C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\PWAHEL~1.EXE C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\Download\{F3C4F~1\13185~1.29\MICROS~1.EXE C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaws.exe C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaw.exe C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~3.EXE C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13185~1.29\MICROS~2.EXE C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\32BITM~1.EXE C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Eula.exe C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\msedge.exe C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~3\PACKAG~1\{63880~1\WINDOW~1.EXE C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exe C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\IDENTI~1.EXE C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13185~1.29\MI391D~1.EXE C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\java.exe C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13185~1.29\MICROS~3.EXE C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~2\WINDOW~4\wmlaunch.exe C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~2\WINDOW~4\wmprph.exe C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jucheck.exe C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~3.EXE C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13185~1.29\MICROS~1.EXE C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13185~1.29\MI9C33~1.EXE C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~3\Adobe\Setup\{AC76B~1\setup.exe C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~3\PACKAG~1\{EF5AF~1\WINDOW~1.EXE C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~1.EXE C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~3\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~3\PACKAG~1\{D87AE~1\WINDOW~1.EXE C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GO664E~1.EXE C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADOBEC~1.EXE C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\arh.exe C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOBD5D~1.EXE C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\INSTAL~1\setup.exe C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\PWAHEL~1.EXE C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\msedge.exe C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exe C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\AdobeARM.exe C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~1.EXE C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\BHO\IE_TO_~1.EXE C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\ELEVAT~1.EXE C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~2.EXE C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\NOTIFI~1.EXE C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\svchost.com C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A

Enumerates physical storage devices

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A

Modifies registry class

Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" C:\Users\Admin\AppData\Local\Temp\Due invoice.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 4700 wrote to memory of 3408 N/A C:\Users\Admin\AppData\Local\Temp\Due invoice.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4700 wrote to memory of 3408 N/A C:\Users\Admin\AppData\Local\Temp\Due invoice.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4700 wrote to memory of 3408 N/A C:\Users\Admin\AppData\Local\Temp\Due invoice.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4700 wrote to memory of 4316 N/A C:\Users\Admin\AppData\Local\Temp\Due invoice.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4700 wrote to memory of 4316 N/A C:\Users\Admin\AppData\Local\Temp\Due invoice.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4700 wrote to memory of 4316 N/A C:\Users\Admin\AppData\Local\Temp\Due invoice.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4700 wrote to memory of 2172 N/A C:\Users\Admin\AppData\Local\Temp\Due invoice.exe C:\Windows\SysWOW64\schtasks.exe
PID 4700 wrote to memory of 2172 N/A C:\Users\Admin\AppData\Local\Temp\Due invoice.exe C:\Windows\SysWOW64\schtasks.exe
PID 4700 wrote to memory of 2172 N/A C:\Users\Admin\AppData\Local\Temp\Due invoice.exe C:\Windows\SysWOW64\schtasks.exe
PID 4700 wrote to memory of 4172 N/A C:\Users\Admin\AppData\Local\Temp\Due invoice.exe C:\Users\Admin\AppData\Local\Temp\Due invoice.exe
PID 4700 wrote to memory of 4172 N/A C:\Users\Admin\AppData\Local\Temp\Due invoice.exe C:\Users\Admin\AppData\Local\Temp\Due invoice.exe
PID 4700 wrote to memory of 4172 N/A C:\Users\Admin\AppData\Local\Temp\Due invoice.exe C:\Users\Admin\AppData\Local\Temp\Due invoice.exe
PID 4700 wrote to memory of 4172 N/A C:\Users\Admin\AppData\Local\Temp\Due invoice.exe C:\Users\Admin\AppData\Local\Temp\Due invoice.exe
PID 4700 wrote to memory of 4172 N/A C:\Users\Admin\AppData\Local\Temp\Due invoice.exe C:\Users\Admin\AppData\Local\Temp\Due invoice.exe
PID 4700 wrote to memory of 4172 N/A C:\Users\Admin\AppData\Local\Temp\Due invoice.exe C:\Users\Admin\AppData\Local\Temp\Due invoice.exe
PID 4700 wrote to memory of 4172 N/A C:\Users\Admin\AppData\Local\Temp\Due invoice.exe C:\Users\Admin\AppData\Local\Temp\Due invoice.exe
PID 4700 wrote to memory of 4172 N/A C:\Users\Admin\AppData\Local\Temp\Due invoice.exe C:\Users\Admin\AppData\Local\Temp\Due invoice.exe
PID 4700 wrote to memory of 4172 N/A C:\Users\Admin\AppData\Local\Temp\Due invoice.exe C:\Users\Admin\AppData\Local\Temp\Due invoice.exe
PID 4700 wrote to memory of 4172 N/A C:\Users\Admin\AppData\Local\Temp\Due invoice.exe C:\Users\Admin\AppData\Local\Temp\Due invoice.exe
PID 4700 wrote to memory of 4172 N/A C:\Users\Admin\AppData\Local\Temp\Due invoice.exe C:\Users\Admin\AppData\Local\Temp\Due invoice.exe

Processes

C:\Users\Admin\AppData\Local\Temp\Due invoice.exe

"C:\Users\Admin\AppData\Local\Temp\Due invoice.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\Due invoice.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\iZwbTl.exe"

C:\Windows\SysWOW64\schtasks.exe

"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\iZwbTl" /XML "C:\Users\Admin\AppData\Local\Temp\tmp8FCC.tmp"

C:\Users\Admin\AppData\Local\Temp\Due invoice.exe

"C:\Users\Admin\AppData\Local\Temp\Due invoice.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 69.31.126.40.in-addr.arpa udp
US 8.8.8.8:53 9.228.82.20.in-addr.arpa udp
US 8.8.8.8:53 249.197.17.2.in-addr.arpa udp
US 8.8.8.8:53 21.114.53.23.in-addr.arpa udp
US 8.8.8.8:53 86.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 18.31.95.13.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 29.243.111.52.in-addr.arpa udp
US 8.8.8.8:53 66.112.168.52.in-addr.arpa udp

Files

memory/4700-0-0x0000000000960000-0x0000000000A2C000-memory.dmp

memory/4700-1-0x0000000074F40000-0x00000000756F0000-memory.dmp

memory/4700-2-0x0000000005AC0000-0x0000000006064000-memory.dmp

memory/4700-3-0x0000000005430000-0x00000000054C2000-memory.dmp

memory/4700-4-0x0000000005620000-0x0000000005630000-memory.dmp

memory/4700-5-0x0000000005410000-0x000000000541A000-memory.dmp

memory/4700-6-0x00000000058B0000-0x00000000058C2000-memory.dmp

memory/4700-7-0x00000000068F0000-0x00000000068F8000-memory.dmp

memory/4700-8-0x0000000006900000-0x000000000690C000-memory.dmp

memory/4700-9-0x0000000006930000-0x00000000069BC000-memory.dmp

memory/4700-10-0x000000000A410000-0x000000000A4AC000-memory.dmp

memory/3408-15-0x0000000002250000-0x0000000002286000-memory.dmp

memory/3408-16-0x0000000074F40000-0x00000000756F0000-memory.dmp

memory/3408-18-0x0000000005130000-0x0000000005758000-memory.dmp

memory/3408-17-0x0000000004AF0000-0x0000000004B00000-memory.dmp

memory/4316-19-0x0000000002220000-0x0000000002230000-memory.dmp

memory/3408-20-0x0000000004AF0000-0x0000000004B00000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\tmp8FCC.tmp

MD5 7fdea8a691f745da765dd22a02708552
SHA1 61ba4e5b5adb8ee16d705acea1f5b3006095e4ad
SHA256 c3c2c9cee2bea1061b2f5f94d553c3225509f60880187fa67a07f0f403ea3319
SHA512 6e9fae791d56009b77a90b1dc05fccc77a1f85884a7c9168e1e25a0f6847d7151d3f7837e5e8bc73efdde03a9d6fdd1ecc3bf6b3f2566011d9179f9c4ae65878

memory/4316-22-0x0000000074F40000-0x00000000756F0000-memory.dmp

memory/4316-23-0x0000000004AC0000-0x0000000004AE2000-memory.dmp

memory/3408-24-0x0000000004D70000-0x0000000004DD6000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_13otdet4.rwt.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

memory/4172-26-0x0000000000400000-0x000000000041B000-memory.dmp

memory/4172-44-0x0000000000400000-0x000000000041B000-memory.dmp

memory/4316-43-0x00000000056E0000-0x0000000005A34000-memory.dmp

memory/4172-37-0x0000000000400000-0x000000000041B000-memory.dmp

memory/3408-25-0x0000000004DE0000-0x0000000004E46000-memory.dmp

memory/4700-46-0x0000000074F40000-0x00000000756F0000-memory.dmp

memory/4172-48-0x0000000000400000-0x000000000041B000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\3582-490\Due invoice.exe

MD5 4b545f6eee3efe6ae2d162bfc67088fa
SHA1 2bba052522b3d8570df7f8875f2f3b9d496841f3
SHA256 de1a598505c47afc57ccd600c4c14ba710d1ab38ee12d696dfe8e30de7f3a1cf
SHA512 5c2d61fafe743f50227e04d67b66506cc0059511dec8896ef8cab1f746f8e699c06a5d56bf830fc09a9a4cce9cca084ebabec187d05c5f27e4004000a59e29ec

memory/3408-59-0x0000000005BA0000-0x0000000005BBE000-memory.dmp

memory/3408-62-0x0000000005C30000-0x0000000005C7C000-memory.dmp

memory/3408-63-0x0000000004AF0000-0x0000000004B00000-memory.dmp

memory/4316-64-0x0000000002220000-0x0000000002230000-memory.dmp

memory/3408-65-0x0000000006170000-0x00000000061A2000-memory.dmp

memory/3408-66-0x0000000071390000-0x00000000713DC000-memory.dmp

memory/3408-76-0x0000000006150000-0x000000000616E000-memory.dmp

memory/3408-77-0x0000000006D80000-0x0000000006E23000-memory.dmp

C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE

MD5 d0576024112e5882d907f2ef2ede2982
SHA1 61117ee60c3c0028eedec1edbf9275611b2ec404
SHA256 c27a5efcc3a73e6b80d177e358f746b0d05f9e8bc917686e84c8ddd8c6133fe5
SHA512 fd84b035cec0a880099febdddddf05763407a59905a8913055184f71ca5d557157bc51930a277ab8c411f5be56077df38c8f3580c4bdd6a4560792115336ea32

memory/4316-90-0x0000000071390000-0x00000000713DC000-memory.dmp

memory/4316-83-0x000000007F570000-0x000000007F580000-memory.dmp

memory/3408-103-0x00000000074F0000-0x0000000007B6A000-memory.dmp

memory/4316-104-0x0000000006DA0000-0x0000000006DBA000-memory.dmp

memory/3408-105-0x0000000006F10000-0x0000000006F1A000-memory.dmp

memory/4316-106-0x0000000007040000-0x00000000070D6000-memory.dmp

memory/4316-108-0x0000000006FC0000-0x0000000006FD1000-memory.dmp

memory/4316-155-0x0000000006FF0000-0x0000000006FFE000-memory.dmp

memory/4316-156-0x0000000007000000-0x0000000007014000-memory.dmp

memory/3408-159-0x0000000007200000-0x000000000721A000-memory.dmp

memory/4316-160-0x00000000070E0000-0x00000000070E8000-memory.dmp

memory/4316-179-0x0000000074F40000-0x00000000756F0000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

MD5 a2d7b22de5a0ea8a5619215e76c0306f
SHA1 6d9dad643c2456e5188dcbc251e6a82d7f6e36bc
SHA256 ade98ef9882edcab2b5529162fc3637fc6962788394f32256d9c8c927fc5afb4
SHA512 1e7098f419eaa0bed27112370a02b36c0a37038b6f94b750218035ea4421a18da5319bc9f322cd0cd5e5654e075b50601967ff193a1e99cb1b032d652380beae

C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

MD5 968cb9309758126772781b83adb8a28f
SHA1 8da30e71accf186b2ba11da1797cf67f8f78b47c
SHA256 92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA512 4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

memory/3408-180-0x0000000074F40000-0x00000000756F0000-memory.dmp

C:\Users\Admin\AppData\Roaming\iZwbTl.exe

MD5 5d84f160cec1c7b8e83d6d9f90a612f0
SHA1 58f2e9216d4b29073376f6f607c16d03ba1c200f
SHA256 aec8415d0972e902d53d348ebc7beaf6c575f9ec6e12791173ab1d84e90a1109
SHA512 fd2c641a4d4a244b77ad0ce8870958fa05bf766bba65c08e0cabfd652d12e43367dfeb9ee2969e74fd95658a10d015738a6449f3da1f4148d953163c5ff4ccb7

memory/4172-193-0x0000000000400000-0x000000000041B000-memory.dmp

memory/4172-195-0x0000000000400000-0x000000000041B000-memory.dmp