Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
17-04-2024 02:26
Static task
static1
Behavioral task
behavioral1
Sample
fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a.exe
Resource
win10v2004-20240412-en
General
-
Target
fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a.exe
-
Size
728KB
-
MD5
9762ce69c2bf80bf5ffd1029ac0b11ec
-
SHA1
49694133876acbe35f5493d99a967089ea1cc17a
-
SHA256
fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a
-
SHA512
6ca9dd8b6774f47d5f72727bc5e5ff9764ee145522747342d13854f571d61314c2f1bd83125dd181ad0d8f7c4a1a77974668d10f14876de293f2e30ba33e0e44
-
SSDEEP
12288:LxyXRz/I7vByWqTBAdLh9pyEpF/6AJdrWZE1uSRHC6ZDV0xhB01/6NIMt4vv+Kyb:L0Q7vByOTzJRWZeRiMV0DBLNIMaGKy3L
Malware Config
Signatures
-
Detect Neshta payload 6 IoCs
Processes:
resource yara_rule behavioral2/memory/4056-48-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4056-49-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4056-47-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4056-52-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4056-196-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4056-198-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Detects executables packed with SmartAssembly 1 IoCs
Processes:
resource yara_rule behavioral2/memory/1872-9-0x00000000065D0000-0x00000000065DC000-memory.dmp INDICATOR_EXE_Packed_SmartAssembly -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a.exefc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\International\Geo\Nation fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a.exe Key value queried \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\International\Geo\Nation fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a.exe -
Modifies system executable filetype association 2 TTPs 1 IoCs
Processes:
fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a.exedescription pid process target process PID 1872 set thread context of 4056 1872 fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a.exe fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a.exe -
Drops file in Program Files directory 64 IoCs
Processes:
fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a.exedescription ioc process File opened for modification C:\PROGRA~2\WINDOW~2\wabmig.exe fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADOBEC~1.EXE fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\ELEVAT~1.EXE fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13185~1.29\MICROS~2.EXE fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13185~1.29\MIA062~1.EXE fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\64BITM~1.EXE fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jucheck.exe fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~3.EXE fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\BHO\IE_TO_~1.EXE fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\PWAHEL~1.EXE fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a.exe File opened for modification C:\PROGRA~3\PACKAG~1\{63880~1\WINDOW~1.EXE fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF5AF~1\WINDOW~1.EXE fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~1.EXE fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a.exe File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaureg.exe fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaw.exe fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a.exe File opened for modification C:\PROGRA~2\WINDOW~4\setup_wm.exe fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exe fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\FULLTR~1.EXE fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\msedge.exe fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13185~1.29\MICROS~1.EXE fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a.exe File opened for modification C:\PROGRA~3\Adobe\Setup\{AC76B~1\setup.exe fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a.exe File opened for modification C:\PROGRA~3\PACKAG~1\{D87AE~1\WINDOW~1.EXE fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\java.exe fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\COOKIE~1.EXE fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13185~1.29\MI391D~1.EXE fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a.exe File opened for modification C:\PROGRA~3\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaws.exe fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\IDENTI~1.EXE fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a.exe File opened for modification C:\PROGRA~2\WINDOW~2\wab.exe fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~2.EXE fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\NOTIFI~1.EXE fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\msedge.exe fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~4.EXE fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\INSTAL~1\setup.exe fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmprph.exe fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\32BITM~1.EXE fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13185~1.29\MICROS~3.EXE fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GO664E~1.EXE fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\MSEDGE~1.EXE fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOBD5D~1.EXE fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~2.EXE fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\PWAHEL~1.EXE fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13185~1.29\MI9C33~1.EXE fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a.exe File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a.exe -
Drops file in Windows directory 1 IoCs
Processes:
fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a.exedescription ioc process File opened for modification C:\Windows\svchost.com fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Modifies registry class 1 IoCs
Processes:
fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
powershell.exepowershell.exepid process 1924 powershell.exe 5084 powershell.exe 1924 powershell.exe 5084 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
powershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 1924 powershell.exe Token: SeDebugPrivilege 5084 powershell.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a.exedescription pid process target process PID 1872 wrote to memory of 5084 1872 fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a.exe powershell.exe PID 1872 wrote to memory of 5084 1872 fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a.exe powershell.exe PID 1872 wrote to memory of 5084 1872 fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a.exe powershell.exe PID 1872 wrote to memory of 1924 1872 fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a.exe powershell.exe PID 1872 wrote to memory of 1924 1872 fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a.exe powershell.exe PID 1872 wrote to memory of 1924 1872 fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a.exe powershell.exe PID 1872 wrote to memory of 2960 1872 fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a.exe schtasks.exe PID 1872 wrote to memory of 2960 1872 fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a.exe schtasks.exe PID 1872 wrote to memory of 2960 1872 fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a.exe schtasks.exe PID 1872 wrote to memory of 4056 1872 fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a.exe fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a.exe PID 1872 wrote to memory of 4056 1872 fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a.exe fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a.exe PID 1872 wrote to memory of 4056 1872 fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a.exe fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a.exe PID 1872 wrote to memory of 4056 1872 fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a.exe fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a.exe PID 1872 wrote to memory of 4056 1872 fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a.exe fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a.exe PID 1872 wrote to memory of 4056 1872 fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a.exe fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a.exe PID 1872 wrote to memory of 4056 1872 fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a.exe fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a.exe PID 1872 wrote to memory of 4056 1872 fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a.exe fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a.exe PID 1872 wrote to memory of 4056 1872 fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a.exe fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a.exe PID 1872 wrote to memory of 4056 1872 fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a.exe fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a.exe PID 1872 wrote to memory of 4056 1872 fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a.exe fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a.exe"C:\Users\Admin\AppData\Local\Temp\fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\rdYXPAGu.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\rdYXPAGu" /XML "C:\Users\Admin\AppData\Local\Temp\tmp5A26.tmp"2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a.exe"C:\Users\Admin\AppData\Local\Temp\fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a.exe"2⤵
- Checks computer location settings
- Modifies system executable filetype association
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXEFilesize
328KB
MD5b0fe552b3245b5caa4ecd56cdff66f5b
SHA175dfa00d4cc7c51133b13dd9bbf29c6f008396d9
SHA256ff63ca141bcc1c4bbb076e11cbc4638be2419e1739b2fae5ed52faa16770d251
SHA51254411d29c03167c8d16e9431a8eb8f2222559ab7bfff9e475f422c5921852205fa3a8713e3192996c4f9a77457c5fe6561aa21f0065b56d5fe96df8344fa898d
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.logFilesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
18KB
MD5ae58bc5562d8df9e68ab33dd0d1f91cc
SHA1995d7b074b5ff54289dcddc71bb569a1024029a8
SHA2566299ef0e16992f40f34a19cb19dad29587cbbd1298cd48725ea1dc43456e3ba3
SHA51290854349017046a08194d73f8c7360f92bf5e32dabad84074bf1fdb4238345abdc56dff39a5010251440fb427b20f86f4af5ca27ebd7f787ca81fb8d0acc0aa0
-
C:\Users\Admin\AppData\Local\Temp\3582-490\fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a.exeFilesize
688KB
MD53a05caeefe010b399639330bc987d370
SHA11befbdf8577edb5b08f344c0fb4b31d9ad315def
SHA256f4f3f6cd3ffa802c7da9eb21420e95d7e02ea9d047e27ccfce857ad766bc6f12
SHA51287dcf5d69ac8bbe7f16c103e2e7d52c81e57763e2d04963cd21a3c41096328d3c8160d79cea81839afb8ddc6570e42fc98321b51a64b445ce6ef526ba86ec4e5
-
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_vgk0swew.unj.ps1Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Users\Admin\AppData\Local\Temp\tmp5A26.tmpFilesize
1KB
MD54b44edb328d7776de87a7b2f0f58996b
SHA1a3eccd87c4df5494f389807c51ea94c9af15914d
SHA2566d704fb2b47184d5b8b09e296a0b7eb44d39b249cb85e65f66bfbe2643d2e0c4
SHA512971f6c803b9c820fb4863131fbf3e294cc3a48498088dfd431a10bb6215eb0dce001ef9e1cbcaf1bb7571477534b49f5e861539392c7a2c0fb8ca34d5aae9f04
-
C:\Users\Admin\AppData\Roaming\rdYXPAGu.exeFilesize
728KB
MD59762ce69c2bf80bf5ffd1029ac0b11ec
SHA149694133876acbe35f5493d99a967089ea1cc17a
SHA256fc7c9c64d0801f66f22ea258673b12b73f392b958cf38dbf14432dcdb3037e5a
SHA5126ca9dd8b6774f47d5f72727bc5e5ff9764ee145522747342d13854f571d61314c2f1bd83125dd181ad0d8f7c4a1a77974668d10f14876de293f2e30ba33e0e44
-
memory/1872-11-0x0000000008ED0000-0x0000000008F6C000-memory.dmpFilesize
624KB
-
memory/1872-5-0x0000000005400000-0x000000000540A000-memory.dmpFilesize
40KB
-
memory/1872-9-0x00000000065D0000-0x00000000065DC000-memory.dmpFilesize
48KB
-
memory/1872-10-0x0000000006630000-0x00000000066BC000-memory.dmpFilesize
560KB
-
memory/1872-1-0x0000000074E60000-0x0000000075610000-memory.dmpFilesize
7.7MB
-
memory/1872-8-0x0000000005910000-0x0000000005918000-memory.dmpFilesize
32KB
-
memory/1872-2-0x0000000005920000-0x0000000005EC4000-memory.dmpFilesize
5.6MB
-
memory/1872-7-0x0000000005760000-0x0000000005772000-memory.dmpFilesize
72KB
-
memory/1872-0-0x0000000000930000-0x00000000009EC000-memory.dmpFilesize
752KB
-
memory/1872-6-0x0000000006A40000-0x0000000006AE8000-memory.dmpFilesize
672KB
-
memory/1872-3-0x0000000005410000-0x00000000054A2000-memory.dmpFilesize
584KB
-
memory/1872-53-0x0000000074E60000-0x0000000075610000-memory.dmpFilesize
7.7MB
-
memory/1872-4-0x0000000005600000-0x0000000005610000-memory.dmpFilesize
64KB
-
memory/1924-176-0x0000000007BE0000-0x0000000007BE8000-memory.dmpFilesize
32KB
-
memory/1924-114-0x0000000007B40000-0x0000000007BD6000-memory.dmpFilesize
600KB
-
memory/1924-24-0x0000000005DE0000-0x0000000005E46000-memory.dmpFilesize
408KB
-
memory/1924-36-0x0000000006130000-0x0000000006484000-memory.dmpFilesize
3.3MB
-
memory/1924-26-0x0000000074E60000-0x0000000075610000-memory.dmpFilesize
7.7MB
-
memory/1924-23-0x00000000054C0000-0x00000000054E2000-memory.dmpFilesize
136KB
-
memory/1924-106-0x0000000007F00000-0x000000000857A000-memory.dmpFilesize
6.5MB
-
memory/1924-131-0x0000000007AC0000-0x0000000007AD1000-memory.dmpFilesize
68KB
-
memory/1924-96-0x0000000005170000-0x0000000005180000-memory.dmpFilesize
64KB
-
memory/1924-95-0x0000000005170000-0x0000000005180000-memory.dmpFilesize
64KB
-
memory/1924-22-0x0000000005170000-0x0000000005180000-memory.dmpFilesize
64KB
-
memory/1924-54-0x0000000006590000-0x00000000065AE000-memory.dmpFilesize
120KB
-
memory/1924-55-0x0000000006640000-0x000000000668C000-memory.dmpFilesize
304KB
-
memory/1924-21-0x0000000005170000-0x0000000005180000-memory.dmpFilesize
64KB
-
memory/1924-94-0x0000000075710000-0x000000007575C000-memory.dmpFilesize
304KB
-
memory/1924-89-0x000000007EEB0000-0x000000007EEC0000-memory.dmpFilesize
64KB
-
memory/1924-175-0x0000000007C00000-0x0000000007C1A000-memory.dmpFilesize
104KB
-
memory/1924-172-0x0000000007B00000-0x0000000007B14000-memory.dmpFilesize
80KB
-
memory/1924-169-0x0000000007AF0000-0x0000000007AFE000-memory.dmpFilesize
56KB
-
memory/1924-191-0x0000000074E60000-0x0000000075610000-memory.dmpFilesize
7.7MB
-
memory/4056-198-0x0000000000400000-0x000000000041B000-memory.dmpFilesize
108KB
-
memory/4056-196-0x0000000000400000-0x000000000041B000-memory.dmpFilesize
108KB
-
memory/4056-52-0x0000000000400000-0x000000000041B000-memory.dmpFilesize
108KB
-
memory/4056-47-0x0000000000400000-0x000000000041B000-memory.dmpFilesize
108KB
-
memory/4056-49-0x0000000000400000-0x000000000041B000-memory.dmpFilesize
108KB
-
memory/4056-48-0x0000000000400000-0x000000000041B000-memory.dmpFilesize
108KB
-
memory/5084-20-0x0000000005300000-0x0000000005928000-memory.dmpFilesize
6.2MB
-
memory/5084-108-0x0000000007520000-0x000000000752A000-memory.dmpFilesize
40KB
-
memory/5084-107-0x00000000074B0000-0x00000000074CA000-memory.dmpFilesize
104KB
-
memory/5084-78-0x0000000007160000-0x0000000007203000-memory.dmpFilesize
652KB
-
memory/5084-77-0x0000000007140000-0x000000000715E000-memory.dmpFilesize
120KB
-
memory/5084-67-0x0000000075710000-0x000000007575C000-memory.dmpFilesize
304KB
-
memory/5084-65-0x000000007EE90000-0x000000007EEA0000-memory.dmpFilesize
64KB
-
memory/5084-66-0x0000000006750000-0x0000000006782000-memory.dmpFilesize
200KB
-
memory/5084-25-0x0000000005B00000-0x0000000005B66000-memory.dmpFilesize
408KB
-
memory/5084-19-0x0000000004CC0000-0x0000000004CD0000-memory.dmpFilesize
64KB
-
memory/5084-18-0x0000000004CC0000-0x0000000004CD0000-memory.dmpFilesize
64KB
-
memory/5084-195-0x0000000074E60000-0x0000000075610000-memory.dmpFilesize
7.7MB
-
memory/5084-17-0x0000000074E60000-0x0000000075610000-memory.dmpFilesize
7.7MB
-
memory/5084-16-0x0000000002880000-0x00000000028B6000-memory.dmpFilesize
216KB