Analysis
-
max time kernel
111s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
02/11/2024, 13:15
Behavioral task
behavioral1
Sample
e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe
Resource
win7-20241023-en
General
-
Target
e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe
-
Size
858KB
-
MD5
c14f74ca3fd57ebb6048b02e61e49930
-
SHA1
3bd40bd93385c0c74ab472499e752415cd0e0ebc
-
SHA256
e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6
-
SHA512
b8222ded355d9041f6ce03b59c8388841e005d02d5f24e1e7f9746d9a365423fa4381555e9502911a496fa3c506bd176de4961059ef338f0da5f53ec3750bdd5
-
SSDEEP
12288:8pJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9F9xkL29vn7/MS9:YJ39LyjbJkQFMhmC+6GD9NkqhTn9
Malware Config
Signatures
-
Detect Neshta payload 5 IoCs
resource yara_rule behavioral1/files/0x0001000000010319-16.dat family_neshta behavioral1/memory/2672-172-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2672-177-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2672-181-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2672-186-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Detected Nirsoft tools 2 IoCs
Free utilities often used by attackers which can steal passwords, product keys, etc.
resource yara_rule behavioral1/memory/2860-171-0x0000000000400000-0x000000000041F000-memory.dmp Nirsoft behavioral1/memory/2720-176-0x0000000000400000-0x000000000041F000-memory.dmp Nirsoft -
Executes dropped EXE 4 IoCs
pid Process 372 e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe 2860 ._cache_e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe 2984 Synaptics.exe 2720 ._cache_Synaptics.exe -
Loads dropped DLL 11 IoCs
pid Process 2672 e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe 2672 e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe 372 e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe 372 e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe 372 e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe 372 e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe 2984 Synaptics.exe 2984 Synaptics.exe 2672 e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe 2672 e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe 2672 e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ ._cache_e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\Windows\SysWOW64\ ._cache_Synaptics.exe -
resource yara_rule behavioral1/files/0x0007000000016b47-20.dat upx behavioral1/memory/2860-34-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/2860-171-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/2720-176-0x0000000000400000-0x000000000041F000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\MICROS~1\Office14\misc.exe e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTEM.EXE e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\PPTICO.EXE e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\XLICONS.EXE e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\Oarpmany.exe e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\Setup.exe e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\SOURCE~1\OSE.EXE e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GRAPH.EXE e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpshare.exe e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\AcroRd32.exe e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\Eula.exe e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\BCSSync.exe e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GROOVEMN.EXE e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~2\WINDOW~2\ACCESS~1\wordpad.exe e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~3.EXE e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~1.EXE e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOHTMED.EXE e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~2\WINDOW~1\WinMail.exe e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\CNFNOT32.EXE e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmprph.exe e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\A3DUTI~1.EXE e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\FLTLDR.EXE e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOXMLED.EXE e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\1033\ONELEV.EXE e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\IECONT~1.EXE e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\LICLUA.EXE e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~4.EXE e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GO664E~1.EXE e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\WINWORD.EXE e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~3\SYNAPT~1\SYNAPT~1.EXE e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\DW\DW20.EXE e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\TextConv\WksConv\Wkconv.exe e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\INFOPATH.EXE e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~2\WI54FB~1\setup_wm.exe e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOF5E2~1.EXE e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\CLVIEW.EXE e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOSYNC.EXE e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ACROBR~1.EXE e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\SETUPF~1\{AC76B~1\Setup.exe e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ACCICONS.EXE e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORDB.EXE e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\WORDICON.EXE e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~2\WINDOW~4\ImagingDevices.exe e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~2\COMMON~1\ADOBEA~1\Versions\1.0\ADOBEA~1.EXE e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\DW\DWTRIG20.EXE e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORE.EXE e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTE.EXE e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOUC.EXE e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\OIS.EXE e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\VPREVIEW.EXE e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Resource\Icons\SC_REA~1.EXE e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\POWERPNT.EXE e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmlaunch.exe e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\SELFCERT.EXE e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe File opened for modification C:\PROGRA~2\WINDOW~1\wabmig.exe e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\svchost.com e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Modifies registry class 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2780 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2780 EXCEL.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2672 wrote to memory of 372 2672 e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe 31 PID 2672 wrote to memory of 372 2672 e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe 31 PID 2672 wrote to memory of 372 2672 e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe 31 PID 2672 wrote to memory of 372 2672 e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe 31 PID 372 wrote to memory of 2860 372 e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe 32 PID 372 wrote to memory of 2860 372 e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe 32 PID 372 wrote to memory of 2860 372 e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe 32 PID 372 wrote to memory of 2860 372 e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe 32 PID 372 wrote to memory of 2984 372 e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe 33 PID 372 wrote to memory of 2984 372 e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe 33 PID 372 wrote to memory of 2984 372 e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe 33 PID 372 wrote to memory of 2984 372 e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe 33 PID 2984 wrote to memory of 2720 2984 Synaptics.exe 34 PID 2984 wrote to memory of 2720 2984 Synaptics.exe 34 PID 2984 wrote to memory of 2720 2984 Synaptics.exe 34 PID 2984 wrote to memory of 2720 2984 Synaptics.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe"C:\Users\Admin\AppData\Local\Temp\e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe"1⤵
- Loads dropped DLL
- Modifies system executable filetype association
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Users\Admin\AppData\Local\Temp\3582-490\e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:372 -
C:\Users\Admin\AppData\Local\Temp\._cache_e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe"C:\Users\Admin\AppData\Local\Temp\._cache_e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe"3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2860
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2720
-
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2780
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Change Default File Association
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
547KB
MD5cf6c595d3e5e9667667af096762fd9c4
SHA19bb44da8d7f6457099cb56e4f7d1026963dce7ce
SHA256593e60cc30ae0789448547195af77f550387f6648d45847ea244dd0dd7abf03d
SHA512ff4f789df9e6a6d0fbe12b3250f951fcf11e857906c65e96a30bb46266e7e1180d6103a03db2f3764e0d1346b2de7afba8259ba080057e4a268e45e8654dfa80
-
Filesize
24KB
MD58614b56dcfa95fdea4cb25dbfe8a8794
SHA1beb2798a0d203550f20d9019f5a9a2ebf0044947
SHA256081f4e9975abbdbc78af00ead52a1ee7960f7d4ad9a4a11051d8508a9d192dd7
SHA5128dcdddb62ec223a1431f9f0fdf64d41e7dbcd0c7f0298c48c4a5a4e80b2daa286589815597ef99dd3125d348e94e94fdfaca798da2daf83f2ecdb26cb4768a0a
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
252KB
MD59e2b9928c89a9d0da1d3e8f4bd96afa7
SHA1ec66cda99f44b62470c6930e5afda061579cde35
SHA2568899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043
SHA5122ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156
-
\Users\Admin\AppData\Local\Temp\._cache_e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe
Filesize64KB
MD58cc6cff43c3c641bdcc89a950f357383
SHA1a254bf05ef1de00706f6bfa9083e18a2a68e6f79
SHA2565a9a0dad900f5d3c90bc78d3ee4bb3f3e6be253732c9199770418048ca7bb0a1
SHA512f121c3cae6209d13874583b4ba05d780d267d4e80e3a738f39e2f671ea40ff57a802d0be3ee88c393f41d1ea34c3a8943d0030884ccd4d186c1efe75a22ab981
-
\Users\Admin\AppData\Local\Temp\3582-490\e933f495ac2269b611884a6f6bc94d0c783bb8c0358c32446d8f2b0b4d034af6N.exe
Filesize818KB
MD5993577f07019db5c36e37e2cd2fc1f7f
SHA183d8a86b03db23619664f53b160979cf87c7319d
SHA2560a3752e2e63b47910a585b464941d847e2fc7159a78780e830d058b1e4e42e98
SHA51203e3a9deffc9e27c16c869649ed348dda7b2917bef7effabeffe35081a0fd328a22932cff318dadf73df7ee679faf3e65440fec1cfd266df747872c0bcd5dd03