Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-11-2024 00:33
Behavioral task
behavioral1
Sample
7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe
Resource
win10v2004-20241007-en
General
-
Target
7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe
-
Size
301KB
-
MD5
408826cfe2454311f032f323a3f62e99
-
SHA1
547d37b16f499c68e9affe4de72b644bf5321cda
-
SHA256
7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd
-
SHA512
3056ef3263c0be2b528fb92f5ddef481136d182c71f192da4b88a392d0acad616226ce31e3b2c41bc7de21e79a6dd7b984deedd5b3217d55b65c73f00e52ef58
-
SSDEEP
3072:zr8WDrCxjoByFgAsaCRSkrmfAPXSPBIFXMN3uCo//9urTWuFsxihGrJW/UmTXItd:PuqchCReAPC0XMRqGWUlxTXb0bYu
Malware Config
Signatures
-
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Executes dropped EXE 64 IoCs
pid Process 1280 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe 1924 svchost.com 2172 7CFCC6~1.EXE 2728 svchost.com 2752 7CFCC6~1.EXE 2864 svchost.com 2892 7CFCC6~1.EXE 1624 svchost.com 2592 7CFCC6~1.EXE 2720 svchost.com 2272 7CFCC6~1.EXE 684 svchost.com 1848 7CFCC6~1.EXE 1844 svchost.com 1896 7CFCC6~1.EXE 2504 svchost.com 2956 7CFCC6~1.EXE 2192 svchost.com 2140 7CFCC6~1.EXE 2988 svchost.com 1336 7CFCC6~1.EXE 1868 svchost.com 1768 7CFCC6~1.EXE 1744 svchost.com 1636 7CFCC6~1.EXE 1552 svchost.com 2968 7CFCC6~1.EXE 1864 svchost.com 1728 7CFCC6~1.EXE 1040 svchost.com 2308 7CFCC6~1.EXE 2380 svchost.com 2208 7CFCC6~1.EXE 1924 svchost.com 2812 7CFCC6~1.EXE 2976 svchost.com 2620 7CFCC6~1.EXE 2776 svchost.com 2640 7CFCC6~1.EXE 2676 svchost.com 3056 7CFCC6~1.EXE 3060 svchost.com 564 7CFCC6~1.EXE 1912 svchost.com 984 7CFCC6~1.EXE 600 svchost.com 576 7CFCC6~1.EXE 1060 svchost.com 1852 7CFCC6~1.EXE 1472 svchost.com 588 7CFCC6~1.EXE 1408 svchost.com 1440 7CFCC6~1.EXE 1052 svchost.com 2056 7CFCC6~1.EXE 1448 svchost.com 1780 7CFCC6~1.EXE 924 svchost.com 1964 7CFCC6~1.EXE 2992 svchost.com 2136 7CFCC6~1.EXE 1372 svchost.com 2352 7CFCC6~1.EXE 1868 svchost.com -
Loads dropped DLL 64 IoCs
pid Process 2436 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe 2436 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe 1924 svchost.com 1924 svchost.com 2728 svchost.com 2728 svchost.com 2864 svchost.com 2864 svchost.com 1624 svchost.com 1624 svchost.com 2720 svchost.com 2720 svchost.com 684 svchost.com 684 svchost.com 1844 svchost.com 1844 svchost.com 2504 svchost.com 2504 svchost.com 1280 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe 2436 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe 2436 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe 2192 svchost.com 2192 svchost.com 2436 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe 2988 svchost.com 2988 svchost.com 1868 svchost.com 1868 svchost.com 1744 svchost.com 1744 svchost.com 1552 svchost.com 1552 svchost.com 1864 svchost.com 1864 svchost.com 1040 svchost.com 1040 svchost.com 2380 svchost.com 2380 svchost.com 1280 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe 1924 svchost.com 1924 svchost.com 2976 svchost.com 2976 svchost.com 2776 svchost.com 2776 svchost.com 2676 svchost.com 2676 svchost.com 3060 svchost.com 3060 svchost.com 1912 svchost.com 1912 svchost.com 600 svchost.com 600 svchost.com 1060 svchost.com 1060 svchost.com 1472 svchost.com 1472 svchost.com 1408 svchost.com 1408 svchost.com 1052 svchost.com 1052 svchost.com 1448 svchost.com 1448 svchost.com 924 svchost.com -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\DW\DWTRIG20.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOSYNC.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\NAMECO~1.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmplayer.exe 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\SETUPF~1\{AC76B~1\Setup.exe 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ADOBEC~1.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\1033\ONELEV.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\WINDOW~1\wabmig.exe 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ACCICONS.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\WINWORD.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpconfig.exe 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\WINDOW~4\ImagingDevices.exe 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GRAPH.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\WORDICON.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\WINDOW~1\wab.exe 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Resource\Icons\SC_REA~1.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORDB.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ACCICONS.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\FLTLDR.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\SOURCE~1\OSE.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~4.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~1.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\BCSSync.exe 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\WI54FB~1\setup_wm.exe 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\A3DUTI~1.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\WI54FB~1\WMPDMC.exe 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmprph.exe 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\DW\DW20.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\Setup.exe 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOF5E2~1.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOHTMED.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTEM.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ACROBR~1.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\COMMON~1\ADOBEA~1\Versions\1.0\ADOBEA~1.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\EQUATION\EQNEDT32.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~3.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOBD5D~1.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GROOVEMN.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\misc.exe 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\AcroRd32.exe 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\Eula.exe 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmlaunch.exe 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GO664E~1.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\OIS.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBEU~1.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\FLTLDR.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\WI4223~1\sidebar.exe 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\OIS.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\WI54FB~1\WMPDMC.exe 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~3.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GO664E~1.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\WINDOW~4\ImagingDevices.exe 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\AcroRd32.exe 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\ink\mip.exe 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\directx.sys 7CFCC6~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 7CFCC6~1.EXE File opened for modification C:\Windows\directx.sys 7CFCC6~1.EXE File opened for modification C:\Windows\directx.sys 7CFCC6~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 7CFCC6~1.EXE File opened for modification C:\Windows\directx.sys 7CFCC6~1.EXE File opened for modification C:\Windows\directx.sys 7CFCC6~1.EXE File opened for modification C:\Windows\svchost.com 7CFCC6~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 7CFCC6~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 7CFCC6~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 7CFCC6~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 7CFCC6~1.EXE File opened for modification C:\Windows\directx.sys 7CFCC6~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 7CFCC6~1.EXE File opened for modification C:\Windows\directx.sys 7CFCC6~1.EXE File opened for modification C:\Windows\svchost.com 7CFCC6~1.EXE File opened for modification C:\Windows\directx.sys 7CFCC6~1.EXE File opened for modification C:\Windows\svchost.com 7CFCC6~1.EXE File opened for modification C:\Windows\svchost.com 7CFCC6~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 7CFCC6~1.EXE File opened for modification C:\Windows\svchost.com 7CFCC6~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 7CFCC6~1.EXE File opened for modification C:\Windows\svchost.com 7CFCC6~1.EXE File opened for modification C:\Windows\directx.sys 7CFCC6~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 7CFCC6~1.EXE File opened for modification C:\Windows\svchost.com 7CFCC6~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 7CFCC6~1.EXE File opened for modification C:\Windows\directx.sys 7CFCC6~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 7CFCC6~1.EXE File opened for modification C:\Windows\svchost.com 7CFCC6~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 7CFCC6~1.EXE -
Detects Pyinstaller 1 IoCs
resource yara_rule behavioral1/files/0x000800000001739b-2.dat pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7CFCC6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7CFCC6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7CFCC6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7CFCC6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7CFCC6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7CFCC6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7CFCC6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7CFCC6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7CFCC6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7CFCC6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7CFCC6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7CFCC6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7CFCC6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7CFCC6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7CFCC6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7CFCC6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7CFCC6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7CFCC6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7CFCC6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7CFCC6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7CFCC6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7CFCC6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7CFCC6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7CFCC6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7CFCC6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7CFCC6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7CFCC6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7CFCC6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7CFCC6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7CFCC6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com -
Modifies registry class 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2436 wrote to memory of 1280 2436 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe 30 PID 2436 wrote to memory of 1280 2436 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe 30 PID 2436 wrote to memory of 1280 2436 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe 30 PID 2436 wrote to memory of 1280 2436 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe 30 PID 1280 wrote to memory of 1924 1280 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe 31 PID 1280 wrote to memory of 1924 1280 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe 31 PID 1280 wrote to memory of 1924 1280 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe 31 PID 1280 wrote to memory of 1924 1280 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe 31 PID 1924 wrote to memory of 2172 1924 svchost.com 32 PID 1924 wrote to memory of 2172 1924 svchost.com 32 PID 1924 wrote to memory of 2172 1924 svchost.com 32 PID 1924 wrote to memory of 2172 1924 svchost.com 32 PID 2172 wrote to memory of 2728 2172 7CFCC6~1.EXE 33 PID 2172 wrote to memory of 2728 2172 7CFCC6~1.EXE 33 PID 2172 wrote to memory of 2728 2172 7CFCC6~1.EXE 33 PID 2172 wrote to memory of 2728 2172 7CFCC6~1.EXE 33 PID 2728 wrote to memory of 2752 2728 svchost.com 34 PID 2728 wrote to memory of 2752 2728 svchost.com 34 PID 2728 wrote to memory of 2752 2728 svchost.com 34 PID 2728 wrote to memory of 2752 2728 svchost.com 34 PID 2752 wrote to memory of 2864 2752 7CFCC6~1.EXE 35 PID 2752 wrote to memory of 2864 2752 7CFCC6~1.EXE 35 PID 2752 wrote to memory of 2864 2752 7CFCC6~1.EXE 35 PID 2752 wrote to memory of 2864 2752 7CFCC6~1.EXE 35 PID 2864 wrote to memory of 2892 2864 svchost.com 36 PID 2864 wrote to memory of 2892 2864 svchost.com 36 PID 2864 wrote to memory of 2892 2864 svchost.com 36 PID 2864 wrote to memory of 2892 2864 svchost.com 36 PID 2892 wrote to memory of 1624 2892 7CFCC6~1.EXE 37 PID 2892 wrote to memory of 1624 2892 7CFCC6~1.EXE 37 PID 2892 wrote to memory of 1624 2892 7CFCC6~1.EXE 37 PID 2892 wrote to memory of 1624 2892 7CFCC6~1.EXE 37 PID 1624 wrote to memory of 2592 1624 svchost.com 38 PID 1624 wrote to memory of 2592 1624 svchost.com 38 PID 1624 wrote to memory of 2592 1624 svchost.com 38 PID 1624 wrote to memory of 2592 1624 svchost.com 38 PID 2592 wrote to memory of 2720 2592 7CFCC6~1.EXE 39 PID 2592 wrote to memory of 2720 2592 7CFCC6~1.EXE 39 PID 2592 wrote to memory of 2720 2592 7CFCC6~1.EXE 39 PID 2592 wrote to memory of 2720 2592 7CFCC6~1.EXE 39 PID 2720 wrote to memory of 2272 2720 svchost.com 40 PID 2720 wrote to memory of 2272 2720 svchost.com 40 PID 2720 wrote to memory of 2272 2720 svchost.com 40 PID 2720 wrote to memory of 2272 2720 svchost.com 40 PID 2272 wrote to memory of 684 2272 7CFCC6~1.EXE 41 PID 2272 wrote to memory of 684 2272 7CFCC6~1.EXE 41 PID 2272 wrote to memory of 684 2272 7CFCC6~1.EXE 41 PID 2272 wrote to memory of 684 2272 7CFCC6~1.EXE 41 PID 684 wrote to memory of 1848 684 svchost.com 42 PID 684 wrote to memory of 1848 684 svchost.com 42 PID 684 wrote to memory of 1848 684 svchost.com 42 PID 684 wrote to memory of 1848 684 svchost.com 42 PID 1848 wrote to memory of 1844 1848 7CFCC6~1.EXE 43 PID 1848 wrote to memory of 1844 1848 7CFCC6~1.EXE 43 PID 1848 wrote to memory of 1844 1848 7CFCC6~1.EXE 43 PID 1848 wrote to memory of 1844 1848 7CFCC6~1.EXE 43 PID 1844 wrote to memory of 1896 1844 svchost.com 44 PID 1844 wrote to memory of 1896 1844 svchost.com 44 PID 1844 wrote to memory of 1896 1844 svchost.com 44 PID 1844 wrote to memory of 1896 1844 svchost.com 44 PID 1896 wrote to memory of 2504 1896 7CFCC6~1.EXE 45 PID 1896 wrote to memory of 2504 1896 7CFCC6~1.EXE 45 PID 1896 wrote to memory of 2504 1896 7CFCC6~1.EXE 45 PID 1896 wrote to memory of 2504 1896 7CFCC6~1.EXE 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe"C:\Users\Admin\AppData\Local\Temp\7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe"1⤵
- Loads dropped DLL
- Modifies system executable filetype association
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"7⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:684 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE14⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"15⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE16⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2504 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE18⤵
- Executes dropped EXE
PID:2956 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2192 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE20⤵
- Executes dropped EXE
PID:2140 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"21⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:2988 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE22⤵
- Executes dropped EXE
PID:1336 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"23⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1868 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE24⤵
- Executes dropped EXE
PID:1768 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1744 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE26⤵
- Executes dropped EXE
PID:1636 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"27⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1552 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE28⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2968 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1864 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE30⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1728 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"31⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1040 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE32⤵
- Executes dropped EXE
PID:2308 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"33⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2380 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE34⤵
- Executes dropped EXE
PID:2208 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"35⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1924 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE36⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2812 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"37⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2976 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE38⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2620 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"39⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2776 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE40⤵
- Executes dropped EXE
PID:2640 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"41⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2676 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE42⤵
- Executes dropped EXE
PID:3056 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"43⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3060 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE44⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:564 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"45⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1912 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE46⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:984 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"47⤵
- Executes dropped EXE
- Loads dropped DLL
PID:600 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE48⤵
- Executes dropped EXE
PID:576 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"49⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1060 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE50⤵
- Executes dropped EXE
PID:1852 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"51⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:1472 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE52⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:588 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"53⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1408 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE54⤵
- Executes dropped EXE
PID:1440 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"55⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1052 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE56⤵
- Executes dropped EXE
PID:2056 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"57⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1448 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE58⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1780 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"59⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:924 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE60⤵
- Executes dropped EXE
PID:1964 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"61⤵
- Executes dropped EXE
PID:2992 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE62⤵
- Executes dropped EXE
PID:2136 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"63⤵
- Executes dropped EXE
PID:1372 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE64⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2352 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"65⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1868 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE66⤵PID:1092
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"67⤵PID:1920
-
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE68⤵
- Drops file in Windows directory
PID:568 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"69⤵
- System Location Discovery: System Language Discovery
PID:3016 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE70⤵PID:2452
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"71⤵PID:2268
-
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE72⤵
- System Location Discovery: System Language Discovery
PID:1028 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"73⤵PID:1788
-
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE74⤵PID:2388
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"75⤵PID:1600
-
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE76⤵PID:1576
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"77⤵PID:1916
-
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE78⤵
- Drops file in Windows directory
PID:2340 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"79⤵
- Drops file in Windows directory
PID:2200 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE80⤵PID:2564
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"81⤵PID:2748
-
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE82⤵PID:2804
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"83⤵
- System Location Discovery: System Language Discovery
PID:2724 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE84⤵PID:2760
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"85⤵PID:2236
-
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE86⤵PID:2152
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"87⤵
- System Location Discovery: System Language Discovery
PID:2792 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE88⤵PID:2608
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"89⤵PID:2196
-
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE90⤵PID:1264
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"91⤵PID:2272
-
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE92⤵
- System Location Discovery: System Language Discovery
PID:1496 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"93⤵
- Drops file in Windows directory
PID:2944 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE94⤵PID:1508
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"95⤵PID:752
-
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE96⤵PID:1892
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"97⤵PID:1836
-
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE98⤵PID:520
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"99⤵
- System Location Discovery: System Language Discovery
PID:2416 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE100⤵
- System Location Discovery: System Language Discovery
PID:1648 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"101⤵PID:3032
-
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE102⤵PID:2636
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"103⤵
- Drops file in Windows directory
PID:1524 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE104⤵PID:2056
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"105⤵
- Drops file in Windows directory
PID:1096 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE106⤵PID:2576
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"107⤵PID:1656
-
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE108⤵PID:1336
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"109⤵PID:2992
-
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE110⤵PID:1460
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"111⤵PID:1312
-
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE112⤵PID:892
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"113⤵
- Drops file in Windows directory
PID:2264 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE114⤵PID:1936
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"115⤵PID:2516
-
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE116⤵PID:3036
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"117⤵
- System Location Discovery: System Language Discovery
PID:2968 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE118⤵PID:900
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"119⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1728 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE120⤵PID:2548
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"121⤵
- System Location Discovery: System Language Discovery
PID:2248 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE122⤵PID:1860
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-