Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-11-2024 05:37
Static task
static1
Behavioral task
behavioral1
Sample
f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe
Resource
win10v2004-20241007-en
General
-
Target
f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe
-
Size
1.4MB
-
MD5
da0dabd3074a2f56d1239bf8c1cb5ecc
-
SHA1
6a872ac401adc8a44326a0ef14cd215ac9eceacc
-
SHA256
f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c
-
SHA512
aa158a2196849c7a66b309c81022f2222576c00bea9716357be788d83a0ca1e815dc2c9636a2e0d830e007f14979ed4df6e94e2e5ef67f3229d07e652db3106a
-
SSDEEP
24576:epaiGhP1x+96UBz1V/7hw5CILSbvCDpmdLq9zyMfNyAGW6xRZzXeyNbgQF:BiI1k9/HYCtMpK2zyM45fzuYbgQF
Malware Config
Signatures
-
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Executes dropped EXE 64 IoCs
pid Process 3012 f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe 2188 svchost.com 1368 F4A905~1.EXE 2644 svchost.com 2816 F4A905~1.EXE 2660 svchost.com 2836 F4A905~1.EXE 2556 svchost.com 2536 F4A905~1.EXE 2596 svchost.com 2992 F4A905~1.EXE 1472 svchost.com 2752 F4A905~1.EXE 2592 svchost.com 2520 F4A905~1.EXE 636 svchost.com 2756 F4A905~1.EXE 2768 svchost.com 1776 F4A905~1.EXE 348 svchost.com 1084 F4A905~1.EXE 2096 svchost.com 1840 F4A905~1.EXE 836 svchost.com 1532 F4A905~1.EXE 236 svchost.com 2284 F4A905~1.EXE 1528 svchost.com 2484 F4A905~1.EXE 112 svchost.com 2220 F4A905~1.EXE 1580 svchost.com 1792 F4A905~1.EXE 2132 svchost.com 2800 F4A905~1.EXE 2688 svchost.com 2860 F4A905~1.EXE 2828 svchost.com 2560 F4A905~1.EXE 2588 svchost.com 2564 F4A905~1.EXE 2988 svchost.com 1540 F4A905~1.EXE 1832 svchost.com 1244 F4A905~1.EXE 1788 svchost.com 2752 F4A905~1.EXE 1700 svchost.com 1284 F4A905~1.EXE 108 svchost.com 1664 F4A905~1.EXE 1740 svchost.com 2404 F4A905~1.EXE 2572 svchost.com 2416 F4A905~1.EXE 2120 svchost.com 2960 F4A905~1.EXE 1636 svchost.com 684 F4A905~1.EXE 1356 svchost.com 1088 F4A905~1.EXE 1968 svchost.com 912 F4A905~1.EXE 2340 svchost.com -
Loads dropped DLL 64 IoCs
pid Process 1708 f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe 1708 f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe 2188 svchost.com 2188 svchost.com 2644 svchost.com 2644 svchost.com 2660 svchost.com 2660 svchost.com 2556 svchost.com 2556 svchost.com 2596 svchost.com 2596 svchost.com 1472 svchost.com 1472 svchost.com 2592 svchost.com 2592 svchost.com 636 svchost.com 636 svchost.com 2768 svchost.com 2768 svchost.com 1708 f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe 3012 f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe 348 svchost.com 348 svchost.com 1708 f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe 2096 svchost.com 2096 svchost.com 836 svchost.com 836 svchost.com 1708 f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe 1708 f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe 236 svchost.com 236 svchost.com 1528 svchost.com 1528 svchost.com 112 svchost.com 112 svchost.com 3012 f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe 1580 svchost.com 1580 svchost.com 2132 svchost.com 2132 svchost.com 2688 svchost.com 2688 svchost.com 2828 svchost.com 2828 svchost.com 2588 svchost.com 2588 svchost.com 2988 svchost.com 2988 svchost.com 1832 svchost.com 1832 svchost.com 1788 svchost.com 1788 svchost.com 1700 svchost.com 1700 svchost.com 108 svchost.com 108 svchost.com 1740 svchost.com 1740 svchost.com 2572 svchost.com 2572 svchost.com 2120 svchost.com 2120 svchost.com -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\Setup.exe f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GROOVEMN.EXE f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOHTMED.EXE f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpshare.exe f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\ink\mip.exe f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOBD5D~1.EXE f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GRAPH.EXE f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOSYNC.EXE f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~2\WINDOW~1\wabmig.exe f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBEU~1.EXE f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBE_~1.EXE f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\WORDICON.EXE f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Resource\Icons\SC_REA~1.EXE f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\1033\ONELEV.EXE f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\WORDICON.EXE f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\A3DUTI~1.EXE f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBEU~1.EXE f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOBD5D~1.EXE f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~1.EXE f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOF5E2~1.EXE f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTEM.EXE f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~2\WINDOW~1\wab.exe f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~2\WI54FB~1\setup_wm.exe f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~2\WI54FB~1\setup_wm.exe f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\CLVIEW.EXE f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\CNFNOT32.EXE f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~2\WINDOW~1\WinMail.exe f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\Setup.exe f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\POWERPNT.EXE f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\DW\DW20.EXE f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\NAMECO~1.EXE f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~4.EXE f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\misc.exe f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\SELFCERT.EXE f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~2\WI4223~1\sidebar.exe f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\AcroRd32.exe f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~2\COMMON~1\ADOBEA~1\Versions\1.0\ADOBEA~1.EXE f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\EQUATION\EQNEDT32.EXE f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\A3DUTI~1.EXE f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\Oarpmany.exe f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\ink\mip.exe f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GO664E~1.EXE f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\IECONT~1.EXE f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~2\WINDOW~1\wabmig.exe f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~2.EXE f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\XLICONS.EXE f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmplayer.exe f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\LICLUA.EXE f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSQRY32.EXE f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com F4A905~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys F4A905~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys F4A905~1.EXE File opened for modification C:\Windows\svchost.com F4A905~1.EXE File opened for modification C:\Windows\directx.sys F4A905~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com F4A905~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys F4A905~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys F4A905~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys F4A905~1.EXE File opened for modification C:\Windows\svchost.com F4A905~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys F4A905~1.EXE File opened for modification C:\Windows\directx.sys F4A905~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys F4A905~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com F4A905~1.EXE File opened for modification C:\Windows\svchost.com F4A905~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com F4A905~1.EXE File opened for modification C:\Windows\svchost.com F4A905~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys F4A905~1.EXE File opened for modification C:\Windows\directx.sys F4A905~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com F4A905~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com F4A905~1.EXE File opened for modification C:\Windows\svchost.com F4A905~1.EXE File opened for modification C:\Windows\svchost.com F4A905~1.EXE File opened for modification C:\Windows\directx.sys F4A905~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com F4A905~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com F4A905~1.EXE File opened for modification C:\Windows\directx.sys F4A905~1.EXE File opened for modification C:\Windows\directx.sys F4A905~1.EXE File opened for modification C:\Windows\directx.sys F4A905~1.EXE File opened for modification C:\Windows\svchost.com F4A905~1.EXE File opened for modification C:\Windows\directx.sys F4A905~1.EXE File opened for modification C:\Windows\directx.sys svchost.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F4A905~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F4A905~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F4A905~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F4A905~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F4A905~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F4A905~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F4A905~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F4A905~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F4A905~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F4A905~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F4A905~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F4A905~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F4A905~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F4A905~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F4A905~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F4A905~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F4A905~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F4A905~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F4A905~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F4A905~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F4A905~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F4A905~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F4A905~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F4A905~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F4A905~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F4A905~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F4A905~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F4A905~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F4A905~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F4A905~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F4A905~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F4A905~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F4A905~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F4A905~1.EXE -
Modifies registry class 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1708 wrote to memory of 3012 1708 f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe 31 PID 1708 wrote to memory of 3012 1708 f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe 31 PID 1708 wrote to memory of 3012 1708 f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe 31 PID 1708 wrote to memory of 3012 1708 f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe 31 PID 3012 wrote to memory of 2188 3012 f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe 32 PID 3012 wrote to memory of 2188 3012 f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe 32 PID 3012 wrote to memory of 2188 3012 f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe 32 PID 3012 wrote to memory of 2188 3012 f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe 32 PID 2188 wrote to memory of 1368 2188 svchost.com 33 PID 2188 wrote to memory of 1368 2188 svchost.com 33 PID 2188 wrote to memory of 1368 2188 svchost.com 33 PID 2188 wrote to memory of 1368 2188 svchost.com 33 PID 1368 wrote to memory of 2644 1368 F4A905~1.EXE 34 PID 1368 wrote to memory of 2644 1368 F4A905~1.EXE 34 PID 1368 wrote to memory of 2644 1368 F4A905~1.EXE 34 PID 1368 wrote to memory of 2644 1368 F4A905~1.EXE 34 PID 2644 wrote to memory of 2816 2644 svchost.com 35 PID 2644 wrote to memory of 2816 2644 svchost.com 35 PID 2644 wrote to memory of 2816 2644 svchost.com 35 PID 2644 wrote to memory of 2816 2644 svchost.com 35 PID 2816 wrote to memory of 2660 2816 F4A905~1.EXE 36 PID 2816 wrote to memory of 2660 2816 F4A905~1.EXE 36 PID 2816 wrote to memory of 2660 2816 F4A905~1.EXE 36 PID 2816 wrote to memory of 2660 2816 F4A905~1.EXE 36 PID 2660 wrote to memory of 2836 2660 svchost.com 37 PID 2660 wrote to memory of 2836 2660 svchost.com 37 PID 2660 wrote to memory of 2836 2660 svchost.com 37 PID 2660 wrote to memory of 2836 2660 svchost.com 37 PID 2836 wrote to memory of 2556 2836 F4A905~1.EXE 38 PID 2836 wrote to memory of 2556 2836 F4A905~1.EXE 38 PID 2836 wrote to memory of 2556 2836 F4A905~1.EXE 38 PID 2836 wrote to memory of 2556 2836 F4A905~1.EXE 38 PID 2556 wrote to memory of 2536 2556 svchost.com 39 PID 2556 wrote to memory of 2536 2556 svchost.com 39 PID 2556 wrote to memory of 2536 2556 svchost.com 39 PID 2556 wrote to memory of 2536 2556 svchost.com 39 PID 2536 wrote to memory of 2596 2536 F4A905~1.EXE 40 PID 2536 wrote to memory of 2596 2536 F4A905~1.EXE 40 PID 2536 wrote to memory of 2596 2536 F4A905~1.EXE 40 PID 2536 wrote to memory of 2596 2536 F4A905~1.EXE 40 PID 2596 wrote to memory of 2992 2596 svchost.com 41 PID 2596 wrote to memory of 2992 2596 svchost.com 41 PID 2596 wrote to memory of 2992 2596 svchost.com 41 PID 2596 wrote to memory of 2992 2596 svchost.com 41 PID 2992 wrote to memory of 1472 2992 F4A905~1.EXE 42 PID 2992 wrote to memory of 1472 2992 F4A905~1.EXE 42 PID 2992 wrote to memory of 1472 2992 F4A905~1.EXE 42 PID 2992 wrote to memory of 1472 2992 F4A905~1.EXE 42 PID 1472 wrote to memory of 2752 1472 svchost.com 77 PID 1472 wrote to memory of 2752 1472 svchost.com 77 PID 1472 wrote to memory of 2752 1472 svchost.com 77 PID 1472 wrote to memory of 2752 1472 svchost.com 77 PID 2752 wrote to memory of 2592 2752 F4A905~1.EXE 44 PID 2752 wrote to memory of 2592 2752 F4A905~1.EXE 44 PID 2752 wrote to memory of 2592 2752 F4A905~1.EXE 44 PID 2752 wrote to memory of 2592 2752 F4A905~1.EXE 44 PID 2592 wrote to memory of 2520 2592 svchost.com 45 PID 2592 wrote to memory of 2520 2592 svchost.com 45 PID 2592 wrote to memory of 2520 2592 svchost.com 45 PID 2592 wrote to memory of 2520 2592 svchost.com 45 PID 2520 wrote to memory of 636 2520 F4A905~1.EXE 46 PID 2520 wrote to memory of 636 2520 F4A905~1.EXE 46 PID 2520 wrote to memory of 636 2520 F4A905~1.EXE 46 PID 2520 wrote to memory of 636 2520 F4A905~1.EXE 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe"C:\Users\Admin\AppData\Local\Temp\f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe"1⤵
- Loads dropped DLL
- Modifies system executable filetype association
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Users\Admin\AppData\Local\Temp\3582-490\f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"9⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:636 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE18⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2756 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2768 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE20⤵
- Executes dropped EXE
PID:1776 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"21⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:348 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE22⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1084 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"23⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:2096 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE24⤵
- Executes dropped EXE
PID:1840 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"25⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:836 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE26⤵
- Executes dropped EXE
PID:1532 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"27⤵
- Executes dropped EXE
- Loads dropped DLL
PID:236 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE28⤵
- Executes dropped EXE
PID:2284 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1528 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE30⤵
- Executes dropped EXE
PID:2484 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"31⤵
- Executes dropped EXE
- Loads dropped DLL
PID:112 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE32⤵
- Executes dropped EXE
PID:2220 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"33⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1580 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE34⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1792 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"35⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2132 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE36⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2800 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"37⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2688 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE38⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2860 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"39⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2828 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE40⤵
- Executes dropped EXE
PID:2560 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"41⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2588 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE42⤵
- Executes dropped EXE
PID:2564 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"43⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2988 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE44⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1540 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"45⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1832 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE46⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1244 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"47⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1788 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE48⤵
- Executes dropped EXE
PID:2752 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"49⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1700 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE50⤵
- Executes dropped EXE
PID:1284 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"51⤵
- Executes dropped EXE
- Loads dropped DLL
PID:108 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE52⤵
- Executes dropped EXE
PID:1664 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"53⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1740 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE54⤵
- Executes dropped EXE
PID:2404 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"55⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:2572 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE56⤵
- Executes dropped EXE
PID:2416 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"57⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2120 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE58⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2960 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"59⤵
- Executes dropped EXE
PID:1636 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE60⤵
- Executes dropped EXE
PID:684 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"61⤵
- Executes dropped EXE
PID:1356 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE62⤵
- Executes dropped EXE
PID:1088 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"63⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1968 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE64⤵
- Executes dropped EXE
PID:912 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"65⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2340 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE66⤵
- System Location Discovery: System Language Discovery
PID:1800 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"67⤵
- System Location Discovery: System Language Discovery
PID:836 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE68⤵PID:2232
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"69⤵
- Drops file in Windows directory
PID:2056 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE70⤵
- Drops file in Windows directory
PID:2264 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"71⤵PID:2488
-
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE72⤵PID:536
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"73⤵PID:888
-
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE74⤵PID:556
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"75⤵PID:1588
-
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE76⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3024 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"77⤵PID:2892
-
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE78⤵PID:2712
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"79⤵PID:2208
-
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE80⤵PID:2252
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"81⤵PID:2680
-
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE82⤵PID:2692
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"83⤵PID:2816
-
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE84⤵
- System Location Discovery: System Language Discovery
PID:2900 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"85⤵PID:2872
-
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE86⤵
- System Location Discovery: System Language Discovery
PID:2828 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"87⤵PID:2560
-
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE88⤵PID:2844
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"89⤵
- System Location Discovery: System Language Discovery
PID:2580 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE90⤵PID:660
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"91⤵PID:2984
-
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE92⤵PID:1984
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"93⤵PID:2364
-
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE94⤵PID:588
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"95⤵PID:1672
-
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE96⤵PID:2752
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"97⤵PID:1440
-
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE98⤵PID:1272
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"99⤵PID:2728
-
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE100⤵PID:2756
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"101⤵PID:2404
-
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE102⤵PID:2620
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"103⤵PID:2416
-
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE104⤵PID:1128
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"105⤵
- Drops file in Windows directory
PID:956 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE106⤵PID:3004
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"107⤵PID:948
-
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE108⤵PID:372
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"109⤵PID:1396
-
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE110⤵PID:1980
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"111⤵PID:884
-
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE112⤵
- System Location Discovery: System Language Discovery
PID:2004 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"113⤵PID:2424
-
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE114⤵
- System Location Discovery: System Language Discovery
PID:380 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"115⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:836 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE116⤵PID:2312
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"117⤵
- System Location Discovery: System Language Discovery
PID:572 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE118⤵PID:988
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"119⤵PID:536
-
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE120⤵PID:888
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"121⤵PID:556
-
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE122⤵PID:1256
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-