Analysis
-
max time kernel
67s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
17/05/2024, 20:44
Behavioral task
behavioral1
Sample
2f7d30492ee67298ec6a5b95a463dcc0_NeikiAnalytics.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2f7d30492ee67298ec6a5b95a463dcc0_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
General
-
Target
2f7d30492ee67298ec6a5b95a463dcc0_NeikiAnalytics.exe
-
Size
488KB
-
MD5
2f7d30492ee67298ec6a5b95a463dcc0
-
SHA1
537e606f77d472e18a9c7cc4161d408d48d3fa07
-
SHA256
ed27d8ccdbf541656dcf2b1f7cdb02798264caec3e9b3c03c5bf3c0d89da3479
-
SHA512
08c500d61ca9a3852af34c95fff1809d6425c160ff764512b8b8458e805a31435b2247d60aa552b79ee1ad288047a668d8401b246ef999368ea2f36a9340e25d
-
SSDEEP
6144:k9JIVIIIIBIIII+IIIIvIIIItIIIInIIIIbIIIIUIIII9IIIIBIIIIwIIII+IIIt:PkTSJXF16JYIaeFYxQvfe3Qc
Malware Config
Signatures
-
Detect Neshta payload 64 IoCs
resource yara_rule behavioral2/memory/4616-0-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4616-2-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x000800000002326d-6.dat family_neshta behavioral2/files/0x0008000000023271-12.dat family_neshta behavioral2/memory/556-20-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2628-31-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/440-32-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1468-36-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1544-44-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1816-51-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4908-56-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1044-66-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2884-68-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1404-72-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2636-80-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1020-90-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3032-92-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3632-96-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4616-104-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/5100-105-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/572-109-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3164-117-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1752-121-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4672-129-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/392-133-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4588-141-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4028-145-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/8-153-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3996-157-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4684-165-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4828-175-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1708-177-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/748-183-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3800-189-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1360-193-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3732-200-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1144-202-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3432-208-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2464-210-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4976-216-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4564-218-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4696-224-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1264-226-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1952-232-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2740-239-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1308-240-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4304-242-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3776-248-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4764-255-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3468-256-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4704-258-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2924-264-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/664-266-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1012-272-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1160-279-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1568-280-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3124-282-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4752-288-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3168-290-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2172-296-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3792-303-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4252-304-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/540-311-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4664-312-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 2F7D30~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 2F7D30~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 2F7D30~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 2F7D30~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 2F7D30~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 2F7D30~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 2F7D30~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 2F7D30~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 2F7D30~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 2F7D30~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 2F7D30~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 2F7D30~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 2F7D30~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 2F7D30~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 2F7D30~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 2F7D30~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 2F7D30~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 2F7D30~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 2F7D30~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 2F7D30~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 2F7D30~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 2f7d30492ee67298ec6a5b95a463dcc0_NeikiAnalytics.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 2F7D30~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 2F7D30~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 2F7D30~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 2F7D30~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 2F7D30~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 2F7D30~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 2F7D30~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 2F7D30~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 2F7D30~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 2F7D30~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 2F7D30~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 2F7D30~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 2F7D30~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 2F7D30~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 2F7D30~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 2F7D30~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 2F7D30~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 2F7D30~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 2F7D30~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 2F7D30~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 2F7D30~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 2F7D30~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 2F7D30~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 2F7D30~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 2F7D30~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 2F7D30~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 2F7D30~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 2F7D30~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 2F7D30~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 2f7d30492ee67298ec6a5b95a463dcc0_NeikiAnalytics.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 2F7D30~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 2F7D30~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 2F7D30~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 2F7D30~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 2F7D30~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 2F7D30~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 2F7D30~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 2F7D30~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 2F7D30~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 2F7D30~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 2F7D30~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 2F7D30~1.EXE -
Executes dropped EXE 64 IoCs
pid Process 4168 2f7d30492ee67298ec6a5b95a463dcc0_NeikiAnalytics.exe 556 svchost.com 2628 2F7D30~1.EXE 440 svchost.com 1468 2F7D30~1.EXE 1544 svchost.com 1816 2F7D30~1.EXE 4908 svchost.com 1044 2F7D30~1.EXE 2884 svchost.com 1404 2F7D30~1.EXE 2636 svchost.com 1020 2F7D30~1.EXE 3032 svchost.com 3632 2F7D30~1.EXE 5100 svchost.com 572 2F7D30~1.EXE 3164 svchost.com 1752 2F7D30~1.EXE 4672 svchost.com 392 2F7D30~1.EXE 4588 svchost.com 4028 2F7D30~1.EXE 8 svchost.com 3996 2F7D30~1.EXE 4684 svchost.com 4828 2F7D30~1.EXE 1708 svchost.com 748 2F7D30~1.EXE 3800 svchost.com 1360 2F7D30~1.EXE 3732 svchost.com 1144 2F7D30~1.EXE 3432 svchost.com 2464 2F7D30~1.EXE 4976 svchost.com 4564 2F7D30~1.EXE 4696 svchost.com 1264 2F7D30~1.EXE 1952 svchost.com 2740 2F7D30~1.EXE 1308 svchost.com 4304 2F7D30~1.EXE 3776 svchost.com 4764 2F7D30~1.EXE 3468 svchost.com 4704 2F7D30~1.EXE 2924 svchost.com 664 2F7D30~1.EXE 1012 svchost.com 1160 2F7D30~1.EXE 1568 svchost.com 3124 2F7D30~1.EXE 4752 svchost.com 3168 2F7D30~1.EXE 2172 svchost.com 3792 2F7D30~1.EXE 4252 svchost.com 540 2F7D30~1.EXE 4664 svchost.com 3032 2F7D30~1.EXE 3340 svchost.com 2788 2F7D30~1.EXE 3084 svchost.com -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 2f7d30492ee67298ec6a5b95a463dcc0_NeikiAnalytics.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\directx.sys 2F7D30~1.EXE File opened for modification C:\Windows\directx.sys 2F7D30~1.EXE File opened for modification C:\Windows\directx.sys 2F7D30~1.EXE File opened for modification C:\Windows\directx.sys 2F7D30~1.EXE File opened for modification C:\Windows\svchost.com 2F7D30~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 2F7D30~1.EXE File opened for modification C:\Windows\svchost.com 2F7D30~1.EXE File opened for modification C:\Windows\directx.sys 2F7D30~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 2F7D30~1.EXE File opened for modification C:\Windows\svchost.com 2F7D30~1.EXE File opened for modification C:\Windows\svchost.com 2F7D30~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 2F7D30~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 2F7D30~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 2F7D30~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 2F7D30~1.EXE File opened for modification C:\Windows\svchost.com 2F7D30~1.EXE File opened for modification C:\Windows\directx.sys 2F7D30~1.EXE File opened for modification C:\Windows\directx.sys 2F7D30~1.EXE File opened for modification C:\Windows\svchost.com 2F7D30~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 2F7D30~1.EXE File opened for modification C:\Windows\svchost.com 2F7D30~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 2F7D30~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 2F7D30~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 2F7D30~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 2F7D30~1.EXE File opened for modification C:\Windows\svchost.com 2F7D30~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 2F7D30~1.EXE File opened for modification C:\Windows\svchost.com 2F7D30~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 2F7D30~1.EXE File opened for modification C:\Windows\svchost.com 2F7D30~1.EXE File opened for modification C:\Windows\svchost.com 2F7D30~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 2F7D30~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 2F7D30~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 2F7D30~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 2F7D30~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 2F7D30~1.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings 2F7D30~1.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings 2F7D30~1.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings 2F7D30~1.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings 2F7D30~1.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings 2F7D30~1.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings 2F7D30~1.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings 2F7D30~1.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings 2F7D30~1.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings 2F7D30~1.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings 2F7D30~1.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings 2F7D30~1.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings 2F7D30~1.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings 2F7D30~1.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings 2F7D30~1.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings 2F7D30~1.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings 2F7D30~1.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings 2f7d30492ee67298ec6a5b95a463dcc0_NeikiAnalytics.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings 2F7D30~1.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings 2F7D30~1.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings 2F7D30~1.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings 2F7D30~1.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings 2F7D30~1.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings 2F7D30~1.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings 2F7D30~1.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings 2F7D30~1.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings 2F7D30~1.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings 2F7D30~1.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings 2F7D30~1.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings 2F7D30~1.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings 2F7D30~1.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings 2F7D30~1.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings 2F7D30~1.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings 2F7D30~1.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings 2F7D30~1.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings 2F7D30~1.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings 2F7D30~1.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings 2F7D30~1.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings 2F7D30~1.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings 2F7D30~1.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings 2F7D30~1.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings 2F7D30~1.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings 2F7D30~1.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings 2F7D30~1.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings 2F7D30~1.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings 2F7D30~1.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings 2F7D30~1.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings 2F7D30~1.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings 2F7D30~1.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings 2F7D30~1.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings 2F7D30~1.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings 2F7D30~1.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings 2F7D30~1.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings 2F7D30~1.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings 2F7D30~1.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings 2F7D30~1.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings 2F7D30~1.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings 2F7D30~1.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings 2F7D30~1.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings 2F7D30~1.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings 2F7D30~1.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings 2F7D30~1.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings 2F7D30~1.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings 2F7D30~1.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings 2F7D30~1.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4616 wrote to memory of 4168 4616 2f7d30492ee67298ec6a5b95a463dcc0_NeikiAnalytics.exe 91 PID 4616 wrote to memory of 4168 4616 2f7d30492ee67298ec6a5b95a463dcc0_NeikiAnalytics.exe 91 PID 4616 wrote to memory of 4168 4616 2f7d30492ee67298ec6a5b95a463dcc0_NeikiAnalytics.exe 91 PID 4168 wrote to memory of 556 4168 2f7d30492ee67298ec6a5b95a463dcc0_NeikiAnalytics.exe 92 PID 4168 wrote to memory of 556 4168 2f7d30492ee67298ec6a5b95a463dcc0_NeikiAnalytics.exe 92 PID 4168 wrote to memory of 556 4168 2f7d30492ee67298ec6a5b95a463dcc0_NeikiAnalytics.exe 92 PID 556 wrote to memory of 2628 556 svchost.com 93 PID 556 wrote to memory of 2628 556 svchost.com 93 PID 556 wrote to memory of 2628 556 svchost.com 93 PID 2628 wrote to memory of 440 2628 2F7D30~1.EXE 94 PID 2628 wrote to memory of 440 2628 2F7D30~1.EXE 94 PID 2628 wrote to memory of 440 2628 2F7D30~1.EXE 94 PID 440 wrote to memory of 1468 440 svchost.com 95 PID 440 wrote to memory of 1468 440 svchost.com 95 PID 440 wrote to memory of 1468 440 svchost.com 95 PID 1468 wrote to memory of 1544 1468 2F7D30~1.EXE 96 PID 1468 wrote to memory of 1544 1468 2F7D30~1.EXE 96 PID 1468 wrote to memory of 1544 1468 2F7D30~1.EXE 96 PID 1544 wrote to memory of 1816 1544 svchost.com 97 PID 1544 wrote to memory of 1816 1544 svchost.com 97 PID 1544 wrote to memory of 1816 1544 svchost.com 97 PID 1816 wrote to memory of 4908 1816 2F7D30~1.EXE 98 PID 1816 wrote to memory of 4908 1816 2F7D30~1.EXE 98 PID 1816 wrote to memory of 4908 1816 2F7D30~1.EXE 98 PID 4908 wrote to memory of 1044 4908 svchost.com 99 PID 4908 wrote to memory of 1044 4908 svchost.com 99 PID 4908 wrote to memory of 1044 4908 svchost.com 99 PID 1044 wrote to memory of 2884 1044 2F7D30~1.EXE 100 PID 1044 wrote to memory of 2884 1044 2F7D30~1.EXE 100 PID 1044 wrote to memory of 2884 1044 2F7D30~1.EXE 100 PID 2884 wrote to memory of 1404 2884 svchost.com 101 PID 2884 wrote to memory of 1404 2884 svchost.com 101 PID 2884 wrote to memory of 1404 2884 svchost.com 101 PID 1404 wrote to memory of 2636 1404 2F7D30~1.EXE 102 PID 1404 wrote to memory of 2636 1404 2F7D30~1.EXE 102 PID 1404 wrote to memory of 2636 1404 2F7D30~1.EXE 102 PID 2636 wrote to memory of 1020 2636 svchost.com 103 PID 2636 wrote to memory of 1020 2636 svchost.com 103 PID 2636 wrote to memory of 1020 2636 svchost.com 103 PID 1020 wrote to memory of 3032 1020 2F7D30~1.EXE 104 PID 1020 wrote to memory of 3032 1020 2F7D30~1.EXE 104 PID 1020 wrote to memory of 3032 1020 2F7D30~1.EXE 104 PID 3032 wrote to memory of 3632 3032 svchost.com 105 PID 3032 wrote to memory of 3632 3032 svchost.com 105 PID 3032 wrote to memory of 3632 3032 svchost.com 105 PID 3632 wrote to memory of 5100 3632 2F7D30~1.EXE 106 PID 3632 wrote to memory of 5100 3632 2F7D30~1.EXE 106 PID 3632 wrote to memory of 5100 3632 2F7D30~1.EXE 106 PID 5100 wrote to memory of 572 5100 svchost.com 107 PID 5100 wrote to memory of 572 5100 svchost.com 107 PID 5100 wrote to memory of 572 5100 svchost.com 107 PID 572 wrote to memory of 3164 572 2F7D30~1.EXE 108 PID 572 wrote to memory of 3164 572 2F7D30~1.EXE 108 PID 572 wrote to memory of 3164 572 2F7D30~1.EXE 108 PID 3164 wrote to memory of 1752 3164 svchost.com 160 PID 3164 wrote to memory of 1752 3164 svchost.com 160 PID 3164 wrote to memory of 1752 3164 svchost.com 160 PID 1752 wrote to memory of 4672 1752 2F7D30~1.EXE 163 PID 1752 wrote to memory of 4672 1752 2F7D30~1.EXE 163 PID 1752 wrote to memory of 4672 1752 2F7D30~1.EXE 163 PID 4672 wrote to memory of 392 4672 svchost.com 111 PID 4672 wrote to memory of 392 4672 svchost.com 111 PID 4672 wrote to memory of 392 4672 svchost.com 111 PID 392 wrote to memory of 4588 392 2F7D30~1.EXE 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\2f7d30492ee67298ec6a5b95a463dcc0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\2f7d30492ee67298ec6a5b95a463dcc0_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Modifies system executable filetype association
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2f7d30492ee67298ec6a5b95a463dcc0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\2f7d30492ee67298ec6a5b95a463dcc0_NeikiAnalytics.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4168 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:556 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE4⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:440 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE6⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE8⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE"9⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE10⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE12⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE14⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1020 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE"15⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE16⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3632 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE18⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:572 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3164 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE20⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4672 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE22⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:392 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE"23⤵
- Executes dropped EXE
PID:4588 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE24⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4028 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE"25⤵
- Executes dropped EXE
PID:8 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE26⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3996 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE"27⤵
- Executes dropped EXE
PID:4684 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE28⤵
- Executes dropped EXE
- Modifies registry class
PID:4828 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE"29⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1708 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE30⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:748 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE"31⤵
- Executes dropped EXE
PID:3800 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE32⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1360 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE"33⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3732 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE34⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1144 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE"35⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3432 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE36⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2464 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE"37⤵
- Executes dropped EXE
PID:4976 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE38⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:4564 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE"39⤵
- Executes dropped EXE
PID:4696 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE40⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:1264 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE"41⤵
- Executes dropped EXE
PID:1952 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE42⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2740 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE"43⤵
- Executes dropped EXE
PID:1308 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE44⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:4304 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE"45⤵
- Executes dropped EXE
PID:3776 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE46⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:4764 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE"47⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3468 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE48⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:4704 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE"49⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2924 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE50⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:664 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE"51⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1012 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE52⤵
- Checks computer location settings
- Executes dropped EXE
PID:1160 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE"53⤵
- Executes dropped EXE
PID:1568 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE54⤵
- Executes dropped EXE
- Modifies registry class
PID:3124 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE"55⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4752 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE56⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3168 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE"57⤵
- Executes dropped EXE
PID:2172 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE58⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3792 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE"59⤵
- Executes dropped EXE
PID:4252 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE60⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:540 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE"61⤵
- Executes dropped EXE
PID:4664 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE62⤵
- Executes dropped EXE
- Modifies registry class
PID:3032 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE"63⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3340 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE64⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:2788 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE"65⤵
- Executes dropped EXE
PID:3084 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE66⤵
- Checks computer location settings
- Drops file in Windows directory
PID:4092 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE"67⤵PID:3876
-
C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE68⤵
- Drops file in Windows directory
PID:1752 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE"69⤵
- Drops file in Windows directory
PID:1216 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE70⤵
- Checks computer location settings
- Drops file in Windows directory
- Modifies registry class
PID:2672 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE"71⤵PID:4672
-
C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE72⤵
- Checks computer location settings
- Modifies registry class
PID:3648 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE"73⤵PID:3468
-
C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE74⤵
- Checks computer location settings
- Modifies registry class
PID:3952 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE"75⤵PID:652
-
C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE76⤵
- Checks computer location settings
PID:2880 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE"77⤵
- Drops file in Windows directory
PID:3484 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE78⤵
- Drops file in Windows directory
- Modifies registry class
PID:4480 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE"79⤵PID:2304
-
C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE80⤵
- Checks computer location settings
- Modifies registry class
PID:3124 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE"81⤵PID:3872
-
C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE82⤵
- Drops file in Windows directory
- Modifies registry class
PID:3100 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE"83⤵PID:2636
-
C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE84⤵
- Checks computer location settings
- Modifies registry class
PID:4824 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE"85⤵
- Drops file in Windows directory
PID:2912 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE86⤵PID:4556
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE"87⤵
- Drops file in Windows directory
PID:2900 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE88⤵
- Checks computer location settings
- Modifies registry class
PID:1388 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE"89⤵
- Drops file in Windows directory
PID:800 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE90⤵PID:2012
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE"91⤵PID:4060
-
C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE92⤵
- Checks computer location settings
- Drops file in Windows directory
- Modifies registry class
PID:3084 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE"93⤵PID:1848
-
C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE94⤵
- Checks computer location settings
- Drops file in Windows directory
PID:4516 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE"95⤵PID:4300
-
C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE96⤵
- Checks computer location settings
- Modifies registry class
PID:1092 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE"97⤵PID:4204
-
C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE98⤵
- Checks computer location settings
- Drops file in Windows directory
- Modifies registry class
PID:912 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE"99⤵
- Drops file in Windows directory
PID:4588 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE100⤵
- Checks computer location settings
- Modifies registry class
PID:4704 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE"101⤵PID:4684
-
C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE102⤵
- Drops file in Windows directory
PID:1560 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE"103⤵PID:332
-
C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE104⤵PID:1568
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE"105⤵PID:1640
-
C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE106⤵
- Checks computer location settings
- Drops file in Windows directory
PID:2304 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE"107⤵PID:1396
-
C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE108⤵
- Checks computer location settings
PID:3872 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE"109⤵
- Drops file in Windows directory
PID:1404 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE110⤵
- Checks computer location settings
- Modifies registry class
PID:2636 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE"111⤵
- Drops file in Windows directory
PID:4824 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE112⤵
- Checks computer location settings
- Modifies registry class
PID:2912 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE"113⤵PID:1020
-
C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE114⤵
- Checks computer location settings
- Modifies registry class
PID:3264 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE"115⤵PID:3032
-
C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE116⤵
- Checks computer location settings
- Drops file in Windows directory
PID:800 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE"117⤵
- Drops file in Windows directory
PID:4012 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE118⤵
- Checks computer location settings
PID:4036 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE"119⤵PID:1484
-
C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE120⤵
- Checks computer location settings
- Modifies registry class
PID:3180 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE"121⤵PID:3712
-
C:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2F7D30~1.EXE122⤵
- Modifies registry class
PID:1496
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-