Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
31/10/2024, 04:16
Behavioral task
behavioral1
Sample
cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe
Resource
win10v2004-20241007-en
General
-
Target
cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe
-
Size
928KB
-
MD5
acd469e6645b7462b61ed435e9984a00
-
SHA1
4b5a58734f229a432daa918709204f8c49722087
-
SHA256
cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594b
-
SHA512
28941bbcabc556d235185084e199408b7f38ba7dc2b568837177987f8af7229be7b10cbd4b4e8207e3851d42cbff089ae24761026d601dbbd2e0ef603cb51b72
-
SSDEEP
12288:YpJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9M0G9fDUMS9:kJ39LyjbJkQFMhmC+6GD9Kgn9
Malware Config
Signatures
-
Detect Neshta payload 4 IoCs
resource yara_rule behavioral1/files/0x0001000000010319-13.dat family_neshta behavioral1/files/0x000100000000f7d5-55.dat family_neshta behavioral1/memory/2412-208-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2412-211-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Executes dropped EXE 4 IoCs
pid Process 2052 cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe 2480 ._cache_cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe 2852 Synaptics.exe 2220 ._cache_Synaptics.exe -
Loads dropped DLL 13 IoCs
pid Process 2412 cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe 2412 cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe 2052 cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe 2052 cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe 2052 cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe 2052 cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe 2852 Synaptics.exe 2852 Synaptics.exe 2412 cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe 2480 ._cache_cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe 2220 ._cache_Synaptics.exe 2412 cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe 2412 cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\MICROS~1\Office14\1033\ONELEV.EXE cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSQRY32.EXE cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmlaunch.exe cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBEU~1.EXE cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\ODeploy.exe cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~2.EXE cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTE.EXE cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\ink\mip.exe cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Resource\Icons\SC_REA~1.EXE cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBE_~1.EXE cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOICONS.EXE cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOBD5D~1.EXE cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\BCSSync.exe cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOUC.EXE cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\OIS.EXE cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ADOBEC~1.EXE cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe File opened for modification C:\PROGRA~2\WI54FB~1\WMPDMC.exe cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe File opened for modification C:\PROGRA~2\WI54FB~1\setup_wm.exe cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\CNFNOT32.EXE cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOSYNC.EXE cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORE.EXE cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\PPTICO.EXE cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe File opened for modification C:\PROGRA~2\WI4223~1\sidebar.exe cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOHTMED.EXE cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GO664E~1.EXE cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\IECONT~1.EXE cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORDB.EXE cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpconfig.exe cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\FLTLDR.EXE cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~1.EXE cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmprph.exe cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOXMLED.EXE cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\Setup.exe cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GRAPH.EXE cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmplayer.exe cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\LICLUA.EXE cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\EQUATION\EQNEDT32.EXE cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOF5E2~1.EXE cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\CLVIEW.EXE cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\VPREVIEW.EXE cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe File opened for modification C:\PROGRA~2\WINDOW~1\WinMail.exe cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe File opened for modification C:\PROGRA~2\COMMON~1\ADOBEA~1\Versions\1.0\ADOBEA~1.EXE cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ACCICONS.EXE cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\SELFCERT.EXE cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe File opened for modification C:\PROGRA~2\WINDOW~1\wabmig.exe cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe File opened for modification C:\PROGRA~2\WINDOW~2\ACCESS~1\wordpad.exe cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\DW\DW20.EXE cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~4.EXE cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\POWERPNT.EXE cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\WORDICON.EXE cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~3.EXE cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\SOURCE~1\OSE.EXE cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GROOVEMN.EXE cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\NAMECO~1.EXE cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\svchost.com cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SetupCache\v4.7.03062\DisplayIcon.ico ._cache_cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SetupCache\v4.7.03062\DisplayIcon.ico ._cache_Synaptics.exe File opened for modification C:\Windows\Installer\{AC76BA86-7AD7-1033-7B44-A90000000001}\SC_Reader.exe ._cache_cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe File opened for modification C:\Windows\Installer\{AC76BA86-7AD7-1033-7B44-A90000000001}\SC_Reader.exe ._cache_Synaptics.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Modifies registry class 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2724 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2724 EXCEL.EXE -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2412 wrote to memory of 2052 2412 cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe 30 PID 2412 wrote to memory of 2052 2412 cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe 30 PID 2412 wrote to memory of 2052 2412 cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe 30 PID 2412 wrote to memory of 2052 2412 cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe 30 PID 2052 wrote to memory of 2480 2052 cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe 31 PID 2052 wrote to memory of 2480 2052 cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe 31 PID 2052 wrote to memory of 2480 2052 cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe 31 PID 2052 wrote to memory of 2480 2052 cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe 31 PID 2052 wrote to memory of 2480 2052 cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe 31 PID 2052 wrote to memory of 2480 2052 cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe 31 PID 2052 wrote to memory of 2480 2052 cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe 31 PID 2052 wrote to memory of 2852 2052 cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe 32 PID 2052 wrote to memory of 2852 2052 cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe 32 PID 2052 wrote to memory of 2852 2052 cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe 32 PID 2052 wrote to memory of 2852 2052 cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe 32 PID 2852 wrote to memory of 2220 2852 Synaptics.exe 33 PID 2852 wrote to memory of 2220 2852 Synaptics.exe 33 PID 2852 wrote to memory of 2220 2852 Synaptics.exe 33 PID 2852 wrote to memory of 2220 2852 Synaptics.exe 33 PID 2852 wrote to memory of 2220 2852 Synaptics.exe 33 PID 2852 wrote to memory of 2220 2852 Synaptics.exe 33 PID 2852 wrote to memory of 2220 2852 Synaptics.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe"C:\Users\Admin\AppData\Local\Temp\cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe"1⤵
- Loads dropped DLL
- Modifies system executable filetype association
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Users\Admin\AppData\Local\Temp\3582-490\cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Users\Admin\AppData\Local\Temp\._cache_cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe"C:\Users\Admin\AppData\Local\Temp\._cache_cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2480
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2220
-
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2724
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Change Default File Association
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
547KB
MD5cf6c595d3e5e9667667af096762fd9c4
SHA19bb44da8d7f6457099cb56e4f7d1026963dce7ce
SHA256593e60cc30ae0789448547195af77f550387f6648d45847ea244dd0dd7abf03d
SHA512ff4f789df9e6a6d0fbe12b3250f951fcf11e857906c65e96a30bb46266e7e1180d6103a03db2f3764e0d1346b2de7afba8259ba080057e4a268e45e8654dfa80
-
Filesize
285KB
MD5831270ac3db358cdbef5535b0b3a44e6
SHA1c0423685c09bbe465f6bb7f8672c936e768f05a3
SHA256a8f78ac26c738b13564252f1048ca784bf152ef048b829d3d22650b7f62078f0
SHA512f64a00977d4b6f8c43f53cee7bb450f3c8cbef08525975055fde5d8c515db32d2bfad92e99313b3a10a72a50dd09b4ffe28e9af4c148c6480622ba486776e450
-
Filesize
23KB
MD55313e0f1992090e46da1c02c20391ec3
SHA148b2aeab65ecb9a5f4496cec542815587ad1e848
SHA2567da144bc92fe6434d9aed4d66258249928ec3cf50c6b8f3ef39aa5f1d4d92230
SHA5122cd35252bcdd32c8e8cd52eb8776ebe458c521e1544d367621331717750162171428658cf2efd702a055a173ff9a4963b91f96eb774315f993da9d255ab0cdc6
-
Filesize
30KB
MD5db3df0f959ebd486ac773254b14fca64
SHA11baad20850923b480c464922259c71e45bd809b8
SHA2561a33009098c07da72d47541591a8e6206c13a883ced05f45b555cd6e364535fa
SHA5123f554618c1fa21770bfdaf4a858fdf5c8af6535c44c0704f13783214c4ab08b1595bd20b9ea936f627e53fa9f682d0be8b20018effd2d6942717cffaf7709e15
-
Filesize
29KB
MD5c634d8126f180783c29dcf89168723e5
SHA1f31dd78cfc20de2f7f5b205a62814610ef1e812b
SHA25648d9db17e6e780939eb678668ed6e26b0cff1b855781ea895ac2aa9615594fff
SHA512e85de70f89e23a5c533f731c1a4972b32859960c2b94d214c0ddca4ac4dcbab6990f983f7b9476fbe81d9560aa1f1012861ff77d802457eb1784e71bef213dea
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
27KB
MD5418a59fb18cce7974f12145800b2876e
SHA19663ca62c99b2fb9ce2a0f07230934ee729b42c2
SHA2567fa39ad8339b4042d325201ceeb448beb7a7746b8cfc53bca7788255502bfd71
SHA512de2ec953326af4cbfeb5c93c182acdffc603763a421b0f0a1ebb978ae8f5467c800e563e661ce20d890976ba4d9fc60e3cfde768a422f50a13724cfee03911b7
-
Filesize
165B
MD5ff09371174f7c701e75f357a187c06e8
SHA157f9a638fd652922d7eb23236c80055a91724503
SHA256e4ba04959837c27019a2349015543802439e152ddc4baf4e8c7b9d2b483362a8
SHA512e4d01e5908e9f80b7732473ec6807bb7faa5425e3154d5642350f44d7220af3cffd277e0b67bcf03f1433ac26a26edb3ddd3707715b61d054b979fbb4b453882
-
Filesize
252KB
MD59e2b9928c89a9d0da1d3e8f4bd96afa7
SHA1ec66cda99f44b62470c6930e5afda061579cde35
SHA2568899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043
SHA5122ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156
-
\Users\Admin\AppData\Local\Temp\._cache_cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe
Filesize134KB
MD5e2f12b2ff3cc00b0556f5a18477edbf5
SHA1fe634e8c1be775cf9fec247b13c0c757f6d15b7c
SHA256bb3af210417a1ceeb0c405005be92194af7a53cdc08513f115a389235619c74f
SHA5124ecb5387e3e08a9e95949df90e8a6a27201d85cd4c709fe66b47a404c10aa3d97a1e39b2a7b5a1e312518489653bcc6dd276b5042c0d22b701dfacf578254579
-
\Users\Admin\AppData\Local\Temp\3582-490\cec9f8c2c0c5ed3a8a97aaf90b23fb7617757ef261f6187ec91f76f34fc4594bN.exe
Filesize887KB
MD562f6ce01a74335620bc34054f9846128
SHA173fe5a05740b2a62424027129a6d4418a3d711c2
SHA2560c93152b210cf85f70b5138cfc03214c03fa8f474e447cc7f1e9a38a298736ce
SHA51255b021a046cf3bb735c814c61528a22dfd72b01d87fa67c5fc280ba03f9bd245c39b3ccec446859b8253eeec09f2273f6e540cb97f26f907e0453d4266a20f47