Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2024 22:57
Static task
static1
Behavioral task
behavioral1
Sample
58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe
Resource
win7-20240903-en
General
-
Target
58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe
-
Size
197KB
-
MD5
e905cee0e3d0062d54c79e5a6d273790
-
SHA1
f3f503694471c653a7ef1509fa9dced980d6f7e3
-
SHA256
58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd
-
SHA512
1b370b50f41c79cb118e709d8280bd4a1fba99506ba66aa97fbfd26585d1b09f8ddfcda53a05f587fdeaf0d73f742ed287f882b6e0ce92cfddc68e4e82fcdd88
-
SSDEEP
3072:zr8WDrCaxEufVU0TbTyDDalRC+utxSGKVqoCl/Ygi:PubufVUNDaatVKsLqL
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation 58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe -
Executes dropped EXE 7 IoCs
pid Process 3152 58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe 2720 58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe 3748 icsys.icn.exe 3240 explorer.exe 2016 spoolsv.exe 4600 svchost.exe 4116 spoolsv.exe -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\MSEDGE~1.EXE 58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE 58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~4.EXE 58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~2.EXE 58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\INSTAL~1\setup.exe 58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaws.exe 58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe File opened for modification C:\PROGRA~2\WINDOW~2\wabmig.exe 58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe 58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe File opened for modification C:\PROGRA~3\Adobe\Setup\{AC76B~1\setup.exe 58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~1.EXE 58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~2.EXE 58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe 58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe 58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe 58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\arh.exe 58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\32BITM~1.EXE 58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\IDENTI~1.EXE 58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\msedge.exe 58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe File opened for modification C:\PROGRA~2\WINDOW~3\ACCESS~1\wordpad.exe 58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~4.EXE 58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe File opened for modification C:\PROGRA~3\PACKAG~1\{D87AE~1\WINDOW~1.EXE 58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe File opened for modification C:\PROGRA~3\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE 58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE 58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF5AF~1\WINDOW~1.EXE 58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE 58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE 58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\BHO\IE_TO_~1.EXE 58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe 58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\PWAHEL~1.EXE 58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe File opened for modification C:\PROGRA~2\WINDOW~2\wab.exe 58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Eula.exe 58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE 58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe 58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe 58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaureg.exe 58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmprph.exe 58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE 58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exe 58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE 58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exe 58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Browser\WCCHRO~1\WCCHRO~1.EXE 58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmlaunch.exe 58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~1.EXE 58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\NOTIFI~1.EXE 58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\PWAHEL~1.EXE 58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MI9C33~1.EXE 58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOF5E2~1.EXE 58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~3.EXE 58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MID1AD~1.EXE 58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe File opened for modification C:\PROGRA~3\PACKAG~1\{63880~1\WINDOW~1.EXE 58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE 58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\AdobeARM.exe 58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GO664E~1.EXE 58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOBD5D~1.EXE 58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE 58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MIA062~1.EXE 58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE 58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE 58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~3.EXE 58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~2.EXE 58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~1.EXE 58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE 58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe File opened for modification C:\PROGRA~2\WINDOW~4\setup_wm.exe 58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADOBEC~1.EXE 58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification C:\Windows\svchost.com 58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe File opened for modification C:\Windows\Resources\Themes\icsys.icn.exe 58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe File opened for modification \??\c:\windows\resources\themes\explorer.exe icsys.icn.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icsys.icn.exe -
Modifies registry class 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3152 58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe 3152 58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe 3152 58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe 3152 58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe 3152 58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe 3152 58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe 3152 58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe 3152 58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe 3152 58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe 3152 58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe 3152 58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe 3152 58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe 3152 58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe 3152 58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe 3152 58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe 3152 58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe 3152 58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe 3152 58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe 3152 58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe 3152 58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe 3152 58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe 3152 58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe 3152 58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe 3152 58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe 3152 58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe 3152 58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe 3152 58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe 3152 58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe 3152 58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe 3152 58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe 3152 58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe 3152 58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe 3748 icsys.icn.exe 3748 icsys.icn.exe 3748 icsys.icn.exe 3748 icsys.icn.exe 3748 icsys.icn.exe 3748 icsys.icn.exe 3748 icsys.icn.exe 3748 icsys.icn.exe 3748 icsys.icn.exe 3748 icsys.icn.exe 3748 icsys.icn.exe 3748 icsys.icn.exe 3748 icsys.icn.exe 3748 icsys.icn.exe 3748 icsys.icn.exe 3748 icsys.icn.exe 3748 icsys.icn.exe 3748 icsys.icn.exe 3748 icsys.icn.exe 3748 icsys.icn.exe 3748 icsys.icn.exe 3748 icsys.icn.exe 3748 icsys.icn.exe 3748 icsys.icn.exe 3748 icsys.icn.exe 3748 icsys.icn.exe 3748 icsys.icn.exe 3748 icsys.icn.exe 3748 icsys.icn.exe 3748 icsys.icn.exe 3748 icsys.icn.exe 3748 icsys.icn.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 4600 svchost.exe 3240 explorer.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3152 58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe 3152 58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe 3748 icsys.icn.exe 3748 icsys.icn.exe 3240 explorer.exe 3240 explorer.exe 2016 spoolsv.exe 2016 spoolsv.exe 4600 svchost.exe 4600 svchost.exe 4116 spoolsv.exe 4116 spoolsv.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 3020 wrote to memory of 3152 3020 58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe 83 PID 3020 wrote to memory of 3152 3020 58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe 83 PID 3020 wrote to memory of 3152 3020 58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe 83 PID 3152 wrote to memory of 2720 3152 58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe 84 PID 3152 wrote to memory of 2720 3152 58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe 84 PID 3152 wrote to memory of 2720 3152 58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe 84 PID 3152 wrote to memory of 3748 3152 58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe 85 PID 3152 wrote to memory of 3748 3152 58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe 85 PID 3152 wrote to memory of 3748 3152 58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe 85 PID 3748 wrote to memory of 3240 3748 icsys.icn.exe 86 PID 3748 wrote to memory of 3240 3748 icsys.icn.exe 86 PID 3748 wrote to memory of 3240 3748 icsys.icn.exe 86 PID 3240 wrote to memory of 2016 3240 explorer.exe 87 PID 3240 wrote to memory of 2016 3240 explorer.exe 87 PID 3240 wrote to memory of 2016 3240 explorer.exe 87 PID 2016 wrote to memory of 4600 2016 spoolsv.exe 88 PID 2016 wrote to memory of 4600 2016 spoolsv.exe 88 PID 2016 wrote to memory of 4600 2016 spoolsv.exe 88 PID 4600 wrote to memory of 4116 4600 svchost.exe 89 PID 4600 wrote to memory of 4116 4600 svchost.exe 89 PID 4600 wrote to memory of 4116 4600 svchost.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe"C:\Users\Admin\AppData\Local\Temp\58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe"1⤵
- Checks computer location settings
- Modifies system executable filetype association
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Users\Admin\AppData\Local\Temp\3582-490\58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe"2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3152 -
\??\c:\users\admin\appdata\local\temp\3582-490\58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exec:\users\admin\appdata\local\temp\3582-490\58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2720
-
-
C:\Windows\Resources\Themes\icsys.icn.exeC:\Windows\Resources\Themes\icsys.icn.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3748 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3240 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2016 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe6⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4600 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4116
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Change Default File Association
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
3Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.4MB
MD5d9e8a1fa55faebd36ed2342fedefbedd
SHA1c25cc7f0035488de9c5df0121a09b5100e1c28e9
SHA256bd7696911d75a9a35dfd125b24cb95003f1e9598592df47fa23a2568986a4a9a
SHA512134644c68bd04536e9ea0a5da6e334d36b1ce8012a061fa6dabd31f85c16a1ac9eee8c40fee3d55f25c4d4edf0672de8ce204e344c800361cbcff092c09d7a33
-
C:\Users\Admin\AppData\Local\Temp\3582-490\58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe
Filesize156KB
MD5e9c9fd878f6e3b3f2a956e899df1beaa
SHA1411ccaa277225690b152f7bc71469f31afb16070
SHA2561f6c5e338a5ae2b84bb6d144d36e0c0448555cc8ef731b1edb0b4faea0c54480
SHA5129e0eb72b3ceae422e3ea6557d2b98bf12f9ed81d2262c39bc254f377cef22f6972a1b0eea43d470657d6d773790fde722e0d4d882ece2b4ec837ded3c2c1f864
-
C:\Users\Admin\AppData\Local\Temp\3582-490\58c407a6a53b2d1ee2e9212eea536a49ecd87d43b664e460a593a82d92b6d3bd.exe
Filesize21KB
MD5d8c024f3381d37370b4f1aa27b5d05dc
SHA185c0e04905b969fdbd65f734452a946873727b69
SHA2566fa3b17bebdb38a8526761eb788665cafec2501d793b87b87e9f7c96d583a6da
SHA5121de235180924a6230ec1a49c646968d7540f13ca9525c52aeca8a2ce7cfd6b876514bf8ac55ecefea1ecdd236120cfd2ff4ef7f59e9b75e5758add401ed44281
-
Filesize
135KB
MD5d0be3c1709817758b35c1b4adfcf35e2
SHA1c37634da51c6cba8adf25aaff44419df61e81014
SHA25632fd12176f5e0a3e62967750df78f3353bff31231b63dadd17ff914aa6070de3
SHA512147688ff497af6a4b474268d89015bf7fc5723b9841e9226eb2dc8739ce4f68a05dd745888fd61a62473c478dc0fee5967240b2c9b2bdd279c38db1db4c1eb34
-
Filesize
135KB
MD54a89b22166fc3861c1300ec19b828b33
SHA1a1cb43195174491de45f16a65656d17d72958321
SHA256372ca7561545989e126dda3491bfde4c4de4975b5105fea118eac6ab1b77e3d8
SHA51299884751a3c6bade71081ec0cd6f228c8df1474e58a2b72ed322f268fea6ef94a2795ac07e7ac38d293acb97e43dd4b56537a49c6334a4830d1a8080af99df01
-
Filesize
135KB
MD544b24e3fefc438a4bc9564c45f785e01
SHA1dddbcfd3cac92a26227faae60cf5f4dc9428e0be
SHA256f8494169732105ad93d3022eb41bb3780697ae4a677eb54e740199458a6e1ab7
SHA5124172a1398f956a859a2bb39c14e51e1f397ec0af2cf9f715a1b9d58c07786a7efabdaab59cc6d7d3daf88fbc2565599e69525ae72082c4e00d74a09b2271e464
-
Filesize
135KB
MD5469a7ced6b13390bc8cbebecdac0221d
SHA1774f7a9d341bfff1908bfaaa26ec951b22cd263a
SHA25665f1014ec3d62dabfe98cca64961c7515439d53792ff531aa91edb18e6068811
SHA512b836ef4ed1517ec142cdea9cd6d75fb9a36efe1c94fcb818db15b73c5075c0bfd24732ac09b798f5a0db4cf00a39dad7a3b5a4b488fee4a11727f0ccd10a6d9d