Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
20-06-2024 00:41
Behavioral task
behavioral1
Sample
9493660c3d8cd4ddb6df8fee3c8f1470c876cf9076311e5f26c3fd4218a74b79.exe
Resource
win7-20240419-en
General
-
Target
9493660c3d8cd4ddb6df8fee3c8f1470c876cf9076311e5f26c3fd4218a74b79.exe
-
Size
158KB
-
MD5
629205c3fafec1ec163409031790146d
-
SHA1
1bd9432378e21774324a4f0e34f4f6933ccb94b0
-
SHA256
9493660c3d8cd4ddb6df8fee3c8f1470c876cf9076311e5f26c3fd4218a74b79
-
SHA512
40305f90a85572da5269c0f5c9589f5ddb5c603e8cad6faebc2f9de53cdee99781970447f194822ed912c77f3abe0956996d4ee4e1f7edd4c7b06b497ada6e45
-
SSDEEP
1536:JxqjQ+P04wsmJCu8SBKygMc5FWF96RDW3Mz8c+nowfs6Zfe7MI8ACc+aprlOxqjh:sr85CpSfg5Fo6xdwc+08anp9r85C
Malware Config
Signatures
-
Detect Neshta payload 64 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\3582-490\9493660c3d8cd4ddb6df8fee3c8f1470c876cf9076311e5f26c3fd4218a74b79.exe family_neshta C:\Windows\svchost.com family_neshta C:\MSOCache\ALLUSE~1\{90140~1\dwtrig20.exe family_neshta C:\MSOCache\ALLUSE~1\{90140~1\DW20.EXE family_neshta C:\MSOCache\ALLUSE~1\{9A861~1\setup.exe family_neshta C:\MSOCache\ALLUSE~1\{9A861~1\ose.exe family_neshta behavioral1/memory/2412-30-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2712-29-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2716-44-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2780-43-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2688-58-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2700-57-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2752-72-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2496-71-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1544-85-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2400-86-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2816-100-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2972-99-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta C:\PROGRA~2\Adobe\READER~1.0\Reader\ACROBR~1.EXE family_neshta behavioral1/memory/1796-117-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1968-118-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta C:\PROGRA~2\Adobe\READER~1.0\Reader\Eula.exe family_neshta C:\PROGRA~2\COMMON~1\ADOBEA~1\Versions\1.0\ADOBEA~1.EXE family_neshta C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBE_~1.EXE family_neshta C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBEU~1.EXE family_neshta C:\PROGRA~2\Adobe\READER~1.0\SETUPF~1\{AC76B~1\Setup.exe family_neshta behavioral1/memory/1692-148-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1608-147-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1684-165-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2276-164-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2288-177-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2904-178-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1092-192-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/672-193-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/536-201-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1736-200-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1988-214-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2916-215-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/768-238-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2264-237-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1784-253-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2936-254-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2864-270-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/3008-271-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2136-279-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2176-280-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2684-288-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2728-287-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2632-302-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2796-303-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2788-310-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2688-311-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2572-318-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2960-319-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2968-326-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1136-327-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/3056-335-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1420-334-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2840-342-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2332-343-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1728-350-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2020-351-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1964-358-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1888-359-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Modifies security service 2 TTPs 3 IoCs
Processes:
winblrsnrcs.exe713815124.exesysmablsvr.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" winblrsnrcs.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" 713815124.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" sysmablsvr.exe -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Phorphiex payload 4 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\3582-490\9493660c3d8cd4ddb6df8fee3c8f1470c876cf9076311e5f26c3fd4218a74b79.exe family_phorphiex C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE family_phorphiex C:\Users\Admin\AppData\Local\Temp\713815124.exe family_phorphiex C:\Users\Admin\AppData\Local\Temp\3031422245.exe family_phorphiex -
Suspicious use of NtCreateUserProcessOtherParentProcess 4 IoCs
Processes:
2888713801.exewupgrdsv.exedescription pid process target process PID 2720 created 1196 2720 2888713801.exe Explorer.EXE PID 2720 created 1196 2720 2888713801.exe Explorer.EXE PID 2796 created 1196 2796 wupgrdsv.exe Explorer.EXE PID 2796 created 1196 2796 wupgrdsv.exe Explorer.EXE -
Processes:
713815124.exesysmablsvr.exemwupsrcvc.exewinblrsnrcs.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 713815124.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" mwupsrcvc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesOverride = "1" mwupsrcvc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" mwupsrcvc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 713815124.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 713815124.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesOverride = "1" 713815124.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" winblrsnrcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" winblrsnrcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" mwupsrcvc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" mwupsrcvc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesOverride = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" winblrsnrcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" mwupsrcvc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" winblrsnrcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesOverride = "1" winblrsnrcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 713815124.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 713815124.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" winblrsnrcs.exe -
Downloads MZ/PE file
-
Executes dropped EXE 64 IoCs
Processes:
9493660c3d8cd4ddb6df8fee3c8f1470c876cf9076311e5f26c3fd4218a74b79.exesvchost.com949366~1.EXEsvchost.com949366~1.EXEsvchost.com949366~1.EXEsvchost.com949366~1.EXEsvchost.com949366~1.EXEsvchost.com949366~1.EXEsvchost.com949366~1.EXEsvchost.com949366~1.EXEsvchost.com949366~1.EXEsvchost.com949366~1.EXEsvchost.com949366~1.EXEsvchost.com949366~1.EXEsvchost.com949366~1.EXEsvchost.com949366~1.EXEsvchost.com949366~1.EXEsvchost.com949366~1.EXEsvchost.com949366~1.EXEsvchost.com949366~1.EXEsvchost.com949366~1.EXEsvchost.com949366~1.EXEsvchost.com949366~1.EXEsvchost.com949366~1.EXEsvchost.com949366~1.EXEsvchost.com949366~1.EXEsvchost.com949366~1.EXEsvchost.com949366~1.EXEsvchost.com949366~1.EXEsvchost.com949366~1.EXEsvchost.com949366~1.EXEsvchost.com949366~1.EXEsvchost.com949366~1.EXEsvchost.compid process 2084 9493660c3d8cd4ddb6df8fee3c8f1470c876cf9076311e5f26c3fd4218a74b79.exe 2412 svchost.com 2712 949366~1.EXE 2716 svchost.com 2780 949366~1.EXE 2688 svchost.com 2700 949366~1.EXE 2752 svchost.com 2496 949366~1.EXE 2400 svchost.com 1544 949366~1.EXE 2816 svchost.com 2972 949366~1.EXE 1968 svchost.com 1796 949366~1.EXE 1692 svchost.com 1608 949366~1.EXE 2276 svchost.com 1684 949366~1.EXE 2904 svchost.com 2288 949366~1.EXE 672 svchost.com 1092 949366~1.EXE 536 svchost.com 1736 949366~1.EXE 1988 svchost.com 2916 949366~1.EXE 2264 svchost.com 768 949366~1.EXE 2936 svchost.com 1784 949366~1.EXE 3008 svchost.com 2864 949366~1.EXE 2176 svchost.com 2136 949366~1.EXE 2728 svchost.com 2684 949366~1.EXE 2632 svchost.com 2796 949366~1.EXE 2788 svchost.com 2688 949366~1.EXE 2572 svchost.com 2960 949366~1.EXE 2968 svchost.com 1136 949366~1.EXE 3056 svchost.com 1420 949366~1.EXE 2840 svchost.com 2332 949366~1.EXE 2020 svchost.com 1728 949366~1.EXE 1888 svchost.com 1964 949366~1.EXE 1796 svchost.com 1620 949366~1.EXE 1940 svchost.com 1488 949366~1.EXE 1132 svchost.com 2120 949366~1.EXE 1192 svchost.com 2300 949366~1.EXE 2276 svchost.com 1056 949366~1.EXE 2512 svchost.com -
Loads dropped DLL 64 IoCs
Processes:
9493660c3d8cd4ddb6df8fee3c8f1470c876cf9076311e5f26c3fd4218a74b79.exesvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.com9493660c3d8cd4ddb6df8fee3c8f1470c876cf9076311e5f26c3fd4218a74b79.exesvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.compid process 1764 9493660c3d8cd4ddb6df8fee3c8f1470c876cf9076311e5f26c3fd4218a74b79.exe 1764 9493660c3d8cd4ddb6df8fee3c8f1470c876cf9076311e5f26c3fd4218a74b79.exe 2412 svchost.com 2412 svchost.com 2716 svchost.com 2716 svchost.com 2688 svchost.com 2688 svchost.com 2752 svchost.com 2752 svchost.com 2400 svchost.com 2400 svchost.com 2816 svchost.com 2816 svchost.com 1968 svchost.com 1968 svchost.com 1692 svchost.com 1764 9493660c3d8cd4ddb6df8fee3c8f1470c876cf9076311e5f26c3fd4218a74b79.exe 2084 9493660c3d8cd4ddb6df8fee3c8f1470c876cf9076311e5f26c3fd4218a74b79.exe 1692 svchost.com 2276 svchost.com 2276 svchost.com 1764 9493660c3d8cd4ddb6df8fee3c8f1470c876cf9076311e5f26c3fd4218a74b79.exe 2904 svchost.com 2904 svchost.com 672 svchost.com 672 svchost.com 536 svchost.com 536 svchost.com 1988 svchost.com 1988 svchost.com 1764 9493660c3d8cd4ddb6df8fee3c8f1470c876cf9076311e5f26c3fd4218a74b79.exe 2264 svchost.com 2264 svchost.com 2936 svchost.com 2936 svchost.com 3008 svchost.com 3008 svchost.com 2084 9493660c3d8cd4ddb6df8fee3c8f1470c876cf9076311e5f26c3fd4218a74b79.exe 2176 svchost.com 2176 svchost.com 2728 svchost.com 2728 svchost.com 2632 svchost.com 2632 svchost.com 2788 svchost.com 2788 svchost.com 2572 svchost.com 2572 svchost.com 2968 svchost.com 2968 svchost.com 3056 svchost.com 3056 svchost.com 2840 svchost.com 2840 svchost.com 2020 svchost.com 2020 svchost.com 1888 svchost.com 1888 svchost.com 1796 svchost.com 1796 svchost.com 1940 svchost.com 1940 svchost.com 1132 svchost.com -
Modifies system executable filetype association 2 TTPs 1 IoCs
Processes:
9493660c3d8cd4ddb6df8fee3c8f1470c876cf9076311e5f26c3fd4218a74b79.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 9493660c3d8cd4ddb6df8fee3c8f1470c876cf9076311e5f26c3fd4218a74b79.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
sysmablsvr.exewinblrsnrcs.exemwupsrcvc.exe713815124.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiSpywareOverride = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" winblrsnrcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" winblrsnrcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" mwupsrcvc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" mwupsrcvc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 713815124.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 713815124.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesOverride = "1" 713815124.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesOverride = "1" winblrsnrcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" winblrsnrcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiSpywareOverride = "1" mwupsrcvc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 713815124.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" mwupsrcvc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiSpywareOverride = "1" 713815124.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" mwupsrcvc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiSpywareOverride = "1" winblrsnrcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 713815124.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesOverride = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" winblrsnrcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 713815124.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" winblrsnrcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" mwupsrcvc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesOverride = "1" mwupsrcvc.exe -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
949366~1.EXE713815124.exe3031422245.exe301172749.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Settings = "C:\\Windows\\mwupsrcvc.exe" 949366~1.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Settings = "C:\\Windows\\sysvratrel.exe" 713815124.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Settings = "C:\\Users\\Admin\\sysvratrel.exe" 713815124.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Settings = "C:\\Windows\\sysmablsvr.exe" 3031422245.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Service = "C:\\Windows\\winblrsnrcs.exe" 301172749.exe -
Drops file in System32 directory 2 IoCs
Processes:
powershell.exepowershell.exedescription ioc process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
wupgrdsv.exedescription pid process target process PID 2796 set thread context of 2164 2796 wupgrdsv.exe notepad.exe -
Drops file in Program Files directory 64 IoCs
Processes:
9493660c3d8cd4ddb6df8fee3c8f1470c876cf9076311e5f26c3fd4218a74b79.exe9493660c3d8cd4ddb6df8fee3c8f1470c876cf9076311e5f26c3fd4218a74b79.exedescription ioc process File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ADOBEC~1.EXE 9493660c3d8cd4ddb6df8fee3c8f1470c876cf9076311e5f26c3fd4218a74b79.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBE_~1.EXE 9493660c3d8cd4ddb6df8fee3c8f1470c876cf9076311e5f26c3fd4218a74b79.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~4.EXE 9493660c3d8cd4ddb6df8fee3c8f1470c876cf9076311e5f26c3fd4218a74b79.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOF5E2~1.EXE 9493660c3d8cd4ddb6df8fee3c8f1470c876cf9076311e5f26c3fd4218a74b79.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GROOVEMN.EXE 9493660c3d8cd4ddb6df8fee3c8f1470c876cf9076311e5f26c3fd4218a74b79.exe File opened for modification C:\PROGRA~2\WINDOW~1\wabmig.exe 9493660c3d8cd4ddb6df8fee3c8f1470c876cf9076311e5f26c3fd4218a74b79.exe File opened for modification C:\PROGRA~2\WINDOW~4\ImagingDevices.exe 9493660c3d8cd4ddb6df8fee3c8f1470c876cf9076311e5f26c3fd4218a74b79.exe File opened for modification C:\PROGRA~2\WI4223~1\sidebar.exe 9493660c3d8cd4ddb6df8fee3c8f1470c876cf9076311e5f26c3fd4218a74b79.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\DW\DWTRIG20.EXE 9493660c3d8cd4ddb6df8fee3c8f1470c876cf9076311e5f26c3fd4218a74b79.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOUC.EXE 9493660c3d8cd4ddb6df8fee3c8f1470c876cf9076311e5f26c3fd4218a74b79.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpshare.exe 9493660c3d8cd4ddb6df8fee3c8f1470c876cf9076311e5f26c3fd4218a74b79.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\DW\DW20.EXE 9493660c3d8cd4ddb6df8fee3c8f1470c876cf9076311e5f26c3fd4218a74b79.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\Setup.exe 9493660c3d8cd4ddb6df8fee3c8f1470c876cf9076311e5f26c3fd4218a74b79.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe 9493660c3d8cd4ddb6df8fee3c8f1470c876cf9076311e5f26c3fd4218a74b79.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ACCICONS.EXE 9493660c3d8cd4ddb6df8fee3c8f1470c876cf9076311e5f26c3fd4218a74b79.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOHTMED.EXE 9493660c3d8cd4ddb6df8fee3c8f1470c876cf9076311e5f26c3fd4218a74b79.exe File opened for modification C:\PROGRA~2\WI4223~1\sidebar.exe 9493660c3d8cd4ddb6df8fee3c8f1470c876cf9076311e5f26c3fd4218a74b79.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GO664E~1.EXE 9493660c3d8cd4ddb6df8fee3c8f1470c876cf9076311e5f26c3fd4218a74b79.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GROOVEMN.EXE 9493660c3d8cd4ddb6df8fee3c8f1470c876cf9076311e5f26c3fd4218a74b79.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\IECONT~1.EXE 9493660c3d8cd4ddb6df8fee3c8f1470c876cf9076311e5f26c3fd4218a74b79.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\misc.exe 9493660c3d8cd4ddb6df8fee3c8f1470c876cf9076311e5f26c3fd4218a74b79.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\INFOPATH.EXE 9493660c3d8cd4ddb6df8fee3c8f1470c876cf9076311e5f26c3fd4218a74b79.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTEM.EXE 9493660c3d8cd4ddb6df8fee3c8f1470c876cf9076311e5f26c3fd4218a74b79.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE 9493660c3d8cd4ddb6df8fee3c8f1470c876cf9076311e5f26c3fd4218a74b79.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE 9493660c3d8cd4ddb6df8fee3c8f1470c876cf9076311e5f26c3fd4218a74b79.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE 9493660c3d8cd4ddb6df8fee3c8f1470c876cf9076311e5f26c3fd4218a74b79.exe File opened for modification C:\PROGRA~2\COMMON~1\ADOBEA~1\Versions\1.0\ADOBEA~1.EXE 9493660c3d8cd4ddb6df8fee3c8f1470c876cf9076311e5f26c3fd4218a74b79.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\EQUATION\EQNEDT32.EXE 9493660c3d8cd4ddb6df8fee3c8f1470c876cf9076311e5f26c3fd4218a74b79.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOXMLED.EXE 9493660c3d8cd4ddb6df8fee3c8f1470c876cf9076311e5f26c3fd4218a74b79.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\A3DUTI~1.EXE 9493660c3d8cd4ddb6df8fee3c8f1470c876cf9076311e5f26c3fd4218a74b79.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\AcroRd32.exe 9493660c3d8cd4ddb6df8fee3c8f1470c876cf9076311e5f26c3fd4218a74b79.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~2.EXE 9493660c3d8cd4ddb6df8fee3c8f1470c876cf9076311e5f26c3fd4218a74b79.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmplayer.exe 9493660c3d8cd4ddb6df8fee3c8f1470c876cf9076311e5f26c3fd4218a74b79.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\LICLUA.EXE 9493660c3d8cd4ddb6df8fee3c8f1470c876cf9076311e5f26c3fd4218a74b79.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\Oarpmany.exe 9493660c3d8cd4ddb6df8fee3c8f1470c876cf9076311e5f26c3fd4218a74b79.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe 9493660c3d8cd4ddb6df8fee3c8f1470c876cf9076311e5f26c3fd4218a74b79.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\BCSSync.exe 9493660c3d8cd4ddb6df8fee3c8f1470c876cf9076311e5f26c3fd4218a74b79.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTE.EXE 9493660c3d8cd4ddb6df8fee3c8f1470c876cf9076311e5f26c3fd4218a74b79.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmprph.exe 9493660c3d8cd4ddb6df8fee3c8f1470c876cf9076311e5f26c3fd4218a74b79.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\1033\ONELEV.EXE 9493660c3d8cd4ddb6df8fee3c8f1470c876cf9076311e5f26c3fd4218a74b79.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ACCICONS.EXE 9493660c3d8cd4ddb6df8fee3c8f1470c876cf9076311e5f26c3fd4218a74b79.exe File opened for modification C:\PROGRA~2\WI54FB~1\setup_wm.exe 9493660c3d8cd4ddb6df8fee3c8f1470c876cf9076311e5f26c3fd4218a74b79.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmlaunch.exe 9493660c3d8cd4ddb6df8fee3c8f1470c876cf9076311e5f26c3fd4218a74b79.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\EQUATION\EQNEDT32.EXE 9493660c3d8cd4ddb6df8fee3c8f1470c876cf9076311e5f26c3fd4218a74b79.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\BCSSync.exe 9493660c3d8cd4ddb6df8fee3c8f1470c876cf9076311e5f26c3fd4218a74b79.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\VPREVIEW.EXE 9493660c3d8cd4ddb6df8fee3c8f1470c876cf9076311e5f26c3fd4218a74b79.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOBD5D~1.EXE 9493660c3d8cd4ddb6df8fee3c8f1470c876cf9076311e5f26c3fd4218a74b79.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTE.EXE 9493660c3d8cd4ddb6df8fee3c8f1470c876cf9076311e5f26c3fd4218a74b79.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\CLVIEW.EXE 9493660c3d8cd4ddb6df8fee3c8f1470c876cf9076311e5f26c3fd4218a74b79.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\CNFNOT32.EXE 9493660c3d8cd4ddb6df8fee3c8f1470c876cf9076311e5f26c3fd4218a74b79.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\Eula.exe 9493660c3d8cd4ddb6df8fee3c8f1470c876cf9076311e5f26c3fd4218a74b79.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE 9493660c3d8cd4ddb6df8fee3c8f1470c876cf9076311e5f26c3fd4218a74b79.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe 9493660c3d8cd4ddb6df8fee3c8f1470c876cf9076311e5f26c3fd4218a74b79.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe 9493660c3d8cd4ddb6df8fee3c8f1470c876cf9076311e5f26c3fd4218a74b79.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORE.EXE 9493660c3d8cd4ddb6df8fee3c8f1470c876cf9076311e5f26c3fd4218a74b79.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpshare.exe 9493660c3d8cd4ddb6df8fee3c8f1470c876cf9076311e5f26c3fd4218a74b79.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE 9493660c3d8cd4ddb6df8fee3c8f1470c876cf9076311e5f26c3fd4218a74b79.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~3.EXE 9493660c3d8cd4ddb6df8fee3c8f1470c876cf9076311e5f26c3fd4218a74b79.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOBD5D~1.EXE 9493660c3d8cd4ddb6df8fee3c8f1470c876cf9076311e5f26c3fd4218a74b79.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe 9493660c3d8cd4ddb6df8fee3c8f1470c876cf9076311e5f26c3fd4218a74b79.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\CNFNOT32.EXE 9493660c3d8cd4ddb6df8fee3c8f1470c876cf9076311e5f26c3fd4218a74b79.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\WINWORD.EXE 9493660c3d8cd4ddb6df8fee3c8f1470c876cf9076311e5f26c3fd4218a74b79.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\A3DUTI~1.EXE 9493660c3d8cd4ddb6df8fee3c8f1470c876cf9076311e5f26c3fd4218a74b79.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOICONS.EXE 9493660c3d8cd4ddb6df8fee3c8f1470c876cf9076311e5f26c3fd4218a74b79.exe -
Drops file in Windows directory 64 IoCs
Processes:
949366~1.EXE949366~1.EXE949366~1.EXE949366~1.EXEsvchost.comsvchost.comsvchost.com949366~1.EXE949366~1.EXEsvchost.com949366~1.EXEsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.com949366~1.EXEsvchost.comsvchost.comsvchost.com949366~1.EXE949366~1.EXEsvchost.comsvchost.com949366~1.EXE949366~1.EXEsvchost.comsvchost.com949366~1.EXE949366~1.EXEsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.com949366~1.EXE949366~1.EXEsvchost.comsvchost.com949366~1.EXE949366~1.EXEsvchost.com949366~1.EXEsvchost.com949366~1.EXE949366~1.EXEsvchost.comsvchost.comsvchost.com949366~1.EXEsvchost.com949366~1.EXEsvchost.com949366~1.EXEsvchost.comsvchost.com949366~1.EXE949366~1.EXE949366~1.EXEdescription ioc process File opened for modification C:\Windows\svchost.com 949366~1.EXE File opened for modification C:\Windows\directx.sys 949366~1.EXE File opened for modification C:\Windows\directx.sys 949366~1.EXE File opened for modification C:\Windows\directx.sys 949366~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 949366~1.EXE File opened for modification C:\Windows\svchost.com 949366~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 949366~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 949366~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 949366~1.EXE File opened for modification C:\Windows\svchost.com 949366~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 949366~1.EXE File opened for modification C:\Windows\svchost.com 949366~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 949366~1.EXE File opened for modification C:\Windows\svchost.com 949366~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 949366~1.EXE File opened for modification C:\Windows\svchost.com 949366~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 949366~1.EXE File opened for modification C:\Windows\directx.sys 949366~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 949366~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 949366~1.EXE File opened for modification C:\Windows\directx.sys 949366~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 949366~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 949366~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 949366~1.EXE File opened for modification C:\Windows\directx.sys 949366~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 949366~1.EXE File opened for modification C:\Windows\directx.sys 949366~1.EXE File opened for modification C:\Windows\directx.sys 949366~1.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
Processes:
9493660c3d8cd4ddb6df8fee3c8f1470c876cf9076311e5f26c3fd4218a74b79.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 9493660c3d8cd4ddb6df8fee3c8f1470c876cf9076311e5f26c3fd4218a74b79.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 2996 schtasks.exe 2028 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
2888713801.exepowershell.exewupgrdsv.exepowershell.exepid process 2720 2888713801.exe 2720 2888713801.exe 2668 powershell.exe 2720 2888713801.exe 2720 2888713801.exe 2796 wupgrdsv.exe 2796 wupgrdsv.exe 2700 powershell.exe 2796 wupgrdsv.exe 2796 wupgrdsv.exe -
Suspicious behavior: SetClipboardViewer 2 IoCs
Processes:
713815124.exesysmablsvr.exepid process 1780 713815124.exe 1760 sysmablsvr.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
powershell.exepowershell.exenotepad.exedescription pid process Token: SeDebugPrivilege 2668 powershell.exe Token: SeDebugPrivilege 2700 powershell.exe Token: SeLockMemoryPrivilege 2164 notepad.exe Token: SeLockMemoryPrivilege 2164 notepad.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
notepad.exepid process 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
notepad.exepid process 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe 2164 notepad.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
9493660c3d8cd4ddb6df8fee3c8f1470c876cf9076311e5f26c3fd4218a74b79.exe9493660c3d8cd4ddb6df8fee3c8f1470c876cf9076311e5f26c3fd4218a74b79.exesvchost.com949366~1.EXEsvchost.com949366~1.EXEsvchost.com949366~1.EXEsvchost.com949366~1.EXEsvchost.com949366~1.EXEsvchost.com949366~1.EXEsvchost.com949366~1.EXEdescription pid process target process PID 1764 wrote to memory of 2084 1764 9493660c3d8cd4ddb6df8fee3c8f1470c876cf9076311e5f26c3fd4218a74b79.exe 9493660c3d8cd4ddb6df8fee3c8f1470c876cf9076311e5f26c3fd4218a74b79.exe PID 1764 wrote to memory of 2084 1764 9493660c3d8cd4ddb6df8fee3c8f1470c876cf9076311e5f26c3fd4218a74b79.exe 9493660c3d8cd4ddb6df8fee3c8f1470c876cf9076311e5f26c3fd4218a74b79.exe PID 1764 wrote to memory of 2084 1764 9493660c3d8cd4ddb6df8fee3c8f1470c876cf9076311e5f26c3fd4218a74b79.exe 9493660c3d8cd4ddb6df8fee3c8f1470c876cf9076311e5f26c3fd4218a74b79.exe PID 1764 wrote to memory of 2084 1764 9493660c3d8cd4ddb6df8fee3c8f1470c876cf9076311e5f26c3fd4218a74b79.exe 9493660c3d8cd4ddb6df8fee3c8f1470c876cf9076311e5f26c3fd4218a74b79.exe PID 2084 wrote to memory of 2412 2084 9493660c3d8cd4ddb6df8fee3c8f1470c876cf9076311e5f26c3fd4218a74b79.exe svchost.com PID 2084 wrote to memory of 2412 2084 9493660c3d8cd4ddb6df8fee3c8f1470c876cf9076311e5f26c3fd4218a74b79.exe svchost.com PID 2084 wrote to memory of 2412 2084 9493660c3d8cd4ddb6df8fee3c8f1470c876cf9076311e5f26c3fd4218a74b79.exe svchost.com PID 2084 wrote to memory of 2412 2084 9493660c3d8cd4ddb6df8fee3c8f1470c876cf9076311e5f26c3fd4218a74b79.exe svchost.com PID 2412 wrote to memory of 2712 2412 svchost.com 949366~1.EXE PID 2412 wrote to memory of 2712 2412 svchost.com 949366~1.EXE PID 2412 wrote to memory of 2712 2412 svchost.com 949366~1.EXE PID 2412 wrote to memory of 2712 2412 svchost.com 949366~1.EXE PID 2712 wrote to memory of 2716 2712 949366~1.EXE svchost.com PID 2712 wrote to memory of 2716 2712 949366~1.EXE svchost.com PID 2712 wrote to memory of 2716 2712 949366~1.EXE svchost.com PID 2712 wrote to memory of 2716 2712 949366~1.EXE svchost.com PID 2716 wrote to memory of 2780 2716 svchost.com 949366~1.EXE PID 2716 wrote to memory of 2780 2716 svchost.com 949366~1.EXE PID 2716 wrote to memory of 2780 2716 svchost.com 949366~1.EXE PID 2716 wrote to memory of 2780 2716 svchost.com 949366~1.EXE PID 2780 wrote to memory of 2688 2780 949366~1.EXE 949366~1.EXE PID 2780 wrote to memory of 2688 2780 949366~1.EXE 949366~1.EXE PID 2780 wrote to memory of 2688 2780 949366~1.EXE 949366~1.EXE PID 2780 wrote to memory of 2688 2780 949366~1.EXE 949366~1.EXE PID 2688 wrote to memory of 2700 2688 svchost.com 949366~1.EXE PID 2688 wrote to memory of 2700 2688 svchost.com 949366~1.EXE PID 2688 wrote to memory of 2700 2688 svchost.com 949366~1.EXE PID 2688 wrote to memory of 2700 2688 svchost.com 949366~1.EXE PID 2700 wrote to memory of 2752 2700 949366~1.EXE svchost.com PID 2700 wrote to memory of 2752 2700 949366~1.EXE svchost.com PID 2700 wrote to memory of 2752 2700 949366~1.EXE svchost.com PID 2700 wrote to memory of 2752 2700 949366~1.EXE svchost.com PID 2752 wrote to memory of 2496 2752 svchost.com 949366~1.EXE PID 2752 wrote to memory of 2496 2752 svchost.com 949366~1.EXE PID 2752 wrote to memory of 2496 2752 svchost.com 949366~1.EXE PID 2752 wrote to memory of 2496 2752 svchost.com 949366~1.EXE PID 2496 wrote to memory of 2400 2496 949366~1.EXE svchost.com PID 2496 wrote to memory of 2400 2496 949366~1.EXE svchost.com PID 2496 wrote to memory of 2400 2496 949366~1.EXE svchost.com PID 2496 wrote to memory of 2400 2496 949366~1.EXE svchost.com PID 2400 wrote to memory of 1544 2400 svchost.com 949366~1.EXE PID 2400 wrote to memory of 1544 2400 svchost.com 949366~1.EXE PID 2400 wrote to memory of 1544 2400 svchost.com 949366~1.EXE PID 2400 wrote to memory of 1544 2400 svchost.com 949366~1.EXE PID 1544 wrote to memory of 2816 1544 949366~1.EXE svchost.com PID 1544 wrote to memory of 2816 1544 949366~1.EXE svchost.com PID 1544 wrote to memory of 2816 1544 949366~1.EXE svchost.com PID 1544 wrote to memory of 2816 1544 949366~1.EXE svchost.com PID 2816 wrote to memory of 2972 2816 svchost.com 949366~1.EXE PID 2816 wrote to memory of 2972 2816 svchost.com 949366~1.EXE PID 2816 wrote to memory of 2972 2816 svchost.com 949366~1.EXE PID 2816 wrote to memory of 2972 2816 svchost.com 949366~1.EXE PID 2972 wrote to memory of 1968 2972 949366~1.EXE svchost.com PID 2972 wrote to memory of 1968 2972 949366~1.EXE svchost.com PID 2972 wrote to memory of 1968 2972 949366~1.EXE svchost.com PID 2972 wrote to memory of 1968 2972 949366~1.EXE svchost.com PID 1968 wrote to memory of 1796 1968 svchost.com svchost.com PID 1968 wrote to memory of 1796 1968 svchost.com svchost.com PID 1968 wrote to memory of 1796 1968 svchost.com svchost.com PID 1968 wrote to memory of 1796 1968 svchost.com svchost.com PID 1796 wrote to memory of 1692 1796 949366~1.EXE svchost.com PID 1796 wrote to memory of 1692 1796 949366~1.EXE svchost.com PID 1796 wrote to memory of 1692 1796 949366~1.EXE svchost.com PID 1796 wrote to memory of 1692 1796 949366~1.EXE svchost.com -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1196
-
C:\Users\Admin\AppData\Local\Temp\9493660c3d8cd4ddb6df8fee3c8f1470c876cf9076311e5f26c3fd4218a74b79.exe"C:\Users\Admin\AppData\Local\Temp\9493660c3d8cd4ddb6df8fee3c8f1470c876cf9076311e5f26c3fd4218a74b79.exe"2⤵
- Loads dropped DLL
- Modifies system executable filetype association
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9493660c3d8cd4ddb6df8fee3c8f1470c876cf9076311e5f26c3fd4218a74b79.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\9493660c3d8cd4ddb6df8fee3c8f1470c876cf9076311e5f26c3fd4218a74b79.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE7⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE"12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE"14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE"16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE"18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1692 -
C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE19⤵
- Executes dropped EXE
PID:1608 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE"20⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2276 -
C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE21⤵
- Executes dropped EXE
PID:1684 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE"22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2904 -
C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE23⤵
- Executes dropped EXE
PID:2288 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE"24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:672 -
C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE25⤵
- Executes dropped EXE
PID:1092 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE"26⤵
- Executes dropped EXE
- Loads dropped DLL
PID:536 -
C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE27⤵
- Executes dropped EXE
PID:1736 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE"28⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1988 -
C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE29⤵
- Executes dropped EXE
PID:2916 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE"30⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2264 -
C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE31⤵
- Executes dropped EXE
PID:768 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE"32⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:2936 -
C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE33⤵
- Executes dropped EXE
PID:1784 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE"34⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:3008 -
C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE35⤵
- Executes dropped EXE
PID:2864 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE"36⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2176 -
C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE37⤵
- Executes dropped EXE
PID:2136 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE"38⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2728 -
C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE39⤵
- Executes dropped EXE
PID:2684 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE"40⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2632 -
C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE41⤵
- Executes dropped EXE
PID:2796 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE"42⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2788 -
C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE43⤵
- Executes dropped EXE
PID:2688 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE"44⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2572 -
C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE45⤵
- Executes dropped EXE
PID:2960 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE"46⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2968 -
C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE47⤵
- Executes dropped EXE
PID:1136 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE"48⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3056 -
C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE49⤵
- Executes dropped EXE
PID:1420 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE"50⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:2840 -
C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE51⤵
- Executes dropped EXE
PID:2332 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE"52⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2020 -
C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE53⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1728 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE"54⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1888 -
C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE55⤵
- Executes dropped EXE
PID:1964 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE"56⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1796 -
C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE57⤵
- Executes dropped EXE
PID:1620 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE"58⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1940 -
C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE59⤵
- Executes dropped EXE
PID:1488 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE"60⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1132 -
C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE61⤵
- Executes dropped EXE
PID:2120 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE"62⤵
- Executes dropped EXE
PID:1192 -
C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE63⤵
- Executes dropped EXE
PID:2300 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE"64⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2276 -
C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE65⤵
- Executes dropped EXE
PID:1056 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE"66⤵
- Executes dropped EXE
PID:2512 -
C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE67⤵
- Drops file in Windows directory
PID:2288 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE"68⤵PID:992
-
C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE69⤵PID:1880
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE"70⤵
- Drops file in Windows directory
PID:1748 -
C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE71⤵PID:1372
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE"72⤵PID:1744
-
C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE73⤵PID:944
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE"74⤵PID:1340
-
C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE75⤵PID:748
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE"76⤵PID:868
-
C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE77⤵
- Drops file in Windows directory
PID:2184 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE"78⤵PID:2868
-
C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE79⤵PID:3016
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE"80⤵PID:2160
-
C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE81⤵PID:3012
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE"82⤵PID:1364
-
C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE83⤵PID:2064
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE"84⤵PID:1704
-
C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE85⤵PID:2860
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE"86⤵
- Drops file in Windows directory
PID:2656 -
C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE87⤵PID:2136
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE"88⤵PID:2712
-
C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE89⤵PID:2716
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE"90⤵PID:2748
-
C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE91⤵PID:2780
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE"92⤵PID:2616
-
C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE93⤵PID:2844
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE"94⤵PID:2532
-
C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE95⤵PID:2688
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE"96⤵PID:3004
-
C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE97⤵PID:2752
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE"98⤵PID:548
-
C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE99⤵PID:2744
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE"100⤵PID:2940
-
C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE101⤵PID:2956
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE"102⤵PID:1580
-
C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE103⤵PID:1624
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE"104⤵
- Drops file in Windows directory
PID:308 -
C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE105⤵PID:1944
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE"106⤵PID:1964
-
C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE107⤵PID:1844
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE"108⤵
- Drops file in Windows directory
PID:1620 -
C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE109⤵
- Drops file in Windows directory
PID:1680 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE"110⤵PID:1500
-
C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE111⤵
- Drops file in Windows directory
PID:2236 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE"112⤵PID:1224
-
C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE113⤵PID:2232
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE"114⤵PID:2292
-
C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE115⤵PID:2900
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE"116⤵PID:2276
-
C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE117⤵PID:776
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE"118⤵PID:2508
-
C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE119⤵PID:1476
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE"120⤵PID:652
-
C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE121⤵PID:332
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\949366~1.EXE"122⤵PID:1372
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-