Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-11-2024 06:04
Static task
static1
Behavioral task
behavioral1
Sample
ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe
Resource
win10v2004-20241007-en
General
-
Target
ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe
-
Size
334KB
-
MD5
cbd55ec0a11cf6344414b28037fed7ab
-
SHA1
a2b66415e19f7a5c055c656fe3b717602fcb89e5
-
SHA256
ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5
-
SHA512
5a1ff9f7a8b4fffa10d827da20a4ef7101e6a55f023ed0574a63527d91cb516eac4884190abc505c100254922b6e750c76734438406d06196d4fca5596363c21
-
SSDEEP
3072:zr8WDrCoMeyoRJLc15QIvoKHcfAn8L2eoH0vuHimNdEMXH5yO4LP6gg/uYKr8WD2:PuRGLWoKHIAn8wuYNj5yO+6luYyu
Malware Config
Signatures
-
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Executes dropped EXE 64 IoCs
pid Process 996 ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe 2404 svchost.com 2864 FFE8EB~1.EXE 576 svchost.com 2840 FFE8EB~1.EXE 2472 svchost.com 2828 FFE8EB~1.EXE 2272 svchost.com 2816 FFE8EB~1.EXE 2596 svchost.com 2000 FFE8EB~1.EXE 940 svchost.com 3032 FFE8EB~1.EXE 2060 svchost.com 2920 FFE8EB~1.EXE 1820 svchost.com 1308 FFE8EB~1.EXE 2220 svchost.com 1872 FFE8EB~1.EXE 1536 svchost.com 1104 FFE8EB~1.EXE 2080 svchost.com 548 FFE8EB~1.EXE 924 svchost.com 1124 FFE8EB~1.EXE 1048 svchost.com 2564 FFE8EB~1.EXE 884 svchost.com 2368 FFE8EB~1.EXE 2104 svchost.com 2912 FFE8EB~1.EXE 2380 svchost.com 3016 FFE8EB~1.EXE 2840 svchost.com 2332 FFE8EB~1.EXE 2756 svchost.com 2012 FFE8EB~1.EXE 2900 svchost.com 2272 FFE8EB~1.EXE 2668 svchost.com 2596 FFE8EB~1.EXE 644 svchost.com 1712 FFE8EB~1.EXE 2996 svchost.com 3032 FFE8EB~1.EXE 1312 svchost.com 1700 FFE8EB~1.EXE 2776 svchost.com 896 FFE8EB~1.EXE 540 svchost.com 1936 FFE8EB~1.EXE 2036 svchost.com 2168 FFE8EB~1.EXE 1308 svchost.com 2252 FFE8EB~1.EXE 2220 svchost.com 1016 FFE8EB~1.EXE 1264 svchost.com 1496 FFE8EB~1.EXE 1104 svchost.com 912 FFE8EB~1.EXE 956 svchost.com 1772 FFE8EB~1.EXE 968 svchost.com -
Loads dropped DLL 64 IoCs
pid Process 2148 ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe 2148 ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe 2404 svchost.com 2404 svchost.com 576 svchost.com 576 svchost.com 2472 svchost.com 2472 svchost.com 2272 svchost.com 2272 svchost.com 2596 svchost.com 2596 svchost.com 940 svchost.com 940 svchost.com 2060 svchost.com 2060 svchost.com 2148 ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe 996 ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe 2148 ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe 2148 ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe 1820 svchost.com 1820 svchost.com 2220 svchost.com 2220 svchost.com 1536 svchost.com 1536 svchost.com 2148 ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe 2080 svchost.com 2080 svchost.com 924 svchost.com 924 svchost.com 1048 svchost.com 1048 svchost.com 2148 ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe 884 svchost.com 884 svchost.com 996 ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe 2104 svchost.com 2104 svchost.com 2380 svchost.com 2380 svchost.com 2840 svchost.com 2840 svchost.com 2756 svchost.com 2756 svchost.com 2900 svchost.com 2900 svchost.com 2668 svchost.com 2668 svchost.com 644 svchost.com 644 svchost.com 2996 svchost.com 2996 svchost.com 1312 svchost.com 1312 svchost.com 2776 svchost.com 2776 svchost.com 540 svchost.com 540 svchost.com 2036 svchost.com 2036 svchost.com 1308 svchost.com 1308 svchost.com 2220 svchost.com -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ACROBR~1.EXE ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\OIS.EXE ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBE_~1.EXE ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GO664E~1.EXE ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSQRY32.EXE ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\SELFCERT.EXE ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\SOURCE~1\OSE.EXE ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~2.EXE ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\INFOPATH.EXE ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSQRY32.EXE ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\POWERPNT.EXE ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOXMLED.EXE ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOSYNC.EXE ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~2\WI54FB~1\WMPDMC.exe ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\DW\DWTRIG20.EXE ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\Setup.exe ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\SELFCERT.EXE ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\WORDICON.EXE ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\XLICONS.EXE ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\AcroRd32.exe ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOSYNC.EXE ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOICONS.EXE ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~3.EXE ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTEM.EXE ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpconfig.exe ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\TextConv\WksConv\Wkconv.exe ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\CLVIEW.EXE ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~3.EXE ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOF5E2~1.EXE ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORDB.EXE ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORE.EXE ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmplayer.exe ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Resource\Icons\SC_REA~1.EXE ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Resource\Icons\SC_REA~1.EXE ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\ODeploy.exe ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\CLVIEW.EXE ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\POWERPNT.EXE ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\WINWORD.EXE ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~2\WINDOW~4\ImagingDevices.exe ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\EQUATION\EQNEDT32.EXE ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~4.EXE ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\BCSSync.exe ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTEM.EXE ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~2\WINDOW~1\WinMail.exe ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\DW\DWTRIG20.EXE ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ACCICONS.EXE ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~2\WINDOW~1\wabmig.exe ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\LICLUA.EXE ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\misc.exe ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\OIS.EXE ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\XLICONS.EXE ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpshare.exe ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~2\WINDOW~2\ACCESS~1\wordpad.exe ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBEU~1.EXE ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\INFOPATH.EXE ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com FFE8EB~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys FFE8EB~1.EXE File opened for modification C:\Windows\svchost.com FFE8EB~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys FFE8EB~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys FFE8EB~1.EXE File opened for modification C:\Windows\directx.sys FFE8EB~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com FFE8EB~1.EXE File opened for modification C:\Windows\svchost.com FFE8EB~1.EXE File opened for modification C:\Windows\svchost.com FFE8EB~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com FFE8EB~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com FFE8EB~1.EXE File opened for modification C:\Windows\directx.sys FFE8EB~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys FFE8EB~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com FFE8EB~1.EXE File opened for modification C:\Windows\svchost.com FFE8EB~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys FFE8EB~1.EXE File opened for modification C:\Windows\svchost.com FFE8EB~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys FFE8EB~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys FFE8EB~1.EXE File opened for modification C:\Windows\directx.sys FFE8EB~1.EXE File opened for modification C:\Windows\directx.sys FFE8EB~1.EXE File opened for modification C:\Windows\directx.sys FFE8EB~1.EXE File opened for modification C:\Windows\directx.sys FFE8EB~1.EXE File opened for modification C:\Windows\svchost.com FFE8EB~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com FFE8EB~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys FFE8EB~1.EXE File opened for modification C:\Windows\svchost.com FFE8EB~1.EXE File opened for modification C:\Windows\svchost.com FFE8EB~1.EXE File opened for modification C:\Windows\directx.sys FFE8EB~1.EXE File opened for modification C:\Windows\svchost.com FFE8EB~1.EXE File opened for modification C:\Windows\directx.sys FFE8EB~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com FFE8EB~1.EXE File opened for modification C:\Windows\svchost.com FFE8EB~1.EXE File opened for modification C:\Windows\directx.sys FFE8EB~1.EXE File opened for modification C:\Windows\directx.sys FFE8EB~1.EXE File opened for modification C:\Windows\directx.sys FFE8EB~1.EXE File opened for modification C:\Windows\svchost.com FFE8EB~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys FFE8EB~1.EXE File opened for modification C:\Windows\svchost.com svchost.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FFE8EB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FFE8EB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FFE8EB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FFE8EB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FFE8EB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FFE8EB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FFE8EB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FFE8EB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FFE8EB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FFE8EB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FFE8EB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FFE8EB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FFE8EB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FFE8EB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FFE8EB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FFE8EB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FFE8EB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FFE8EB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FFE8EB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FFE8EB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FFE8EB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FFE8EB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FFE8EB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FFE8EB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FFE8EB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FFE8EB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FFE8EB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FFE8EB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FFE8EB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FFE8EB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com -
Modifies registry class 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2148 wrote to memory of 996 2148 ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe 30 PID 2148 wrote to memory of 996 2148 ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe 30 PID 2148 wrote to memory of 996 2148 ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe 30 PID 2148 wrote to memory of 996 2148 ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe 30 PID 996 wrote to memory of 2404 996 ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe 31 PID 996 wrote to memory of 2404 996 ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe 31 PID 996 wrote to memory of 2404 996 ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe 31 PID 996 wrote to memory of 2404 996 ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe 31 PID 2404 wrote to memory of 2864 2404 svchost.com 32 PID 2404 wrote to memory of 2864 2404 svchost.com 32 PID 2404 wrote to memory of 2864 2404 svchost.com 32 PID 2404 wrote to memory of 2864 2404 svchost.com 32 PID 2864 wrote to memory of 576 2864 FFE8EB~1.EXE 33 PID 2864 wrote to memory of 576 2864 FFE8EB~1.EXE 33 PID 2864 wrote to memory of 576 2864 FFE8EB~1.EXE 33 PID 2864 wrote to memory of 576 2864 FFE8EB~1.EXE 33 PID 576 wrote to memory of 2840 576 svchost.com 64 PID 576 wrote to memory of 2840 576 svchost.com 64 PID 576 wrote to memory of 2840 576 svchost.com 64 PID 576 wrote to memory of 2840 576 svchost.com 64 PID 2840 wrote to memory of 2472 2840 FFE8EB~1.EXE 35 PID 2840 wrote to memory of 2472 2840 FFE8EB~1.EXE 35 PID 2840 wrote to memory of 2472 2840 FFE8EB~1.EXE 35 PID 2840 wrote to memory of 2472 2840 FFE8EB~1.EXE 35 PID 2472 wrote to memory of 2828 2472 svchost.com 36 PID 2472 wrote to memory of 2828 2472 svchost.com 36 PID 2472 wrote to memory of 2828 2472 svchost.com 36 PID 2472 wrote to memory of 2828 2472 svchost.com 36 PID 2828 wrote to memory of 2272 2828 FFE8EB~1.EXE 113 PID 2828 wrote to memory of 2272 2828 FFE8EB~1.EXE 113 PID 2828 wrote to memory of 2272 2828 FFE8EB~1.EXE 113 PID 2828 wrote to memory of 2272 2828 FFE8EB~1.EXE 113 PID 2272 wrote to memory of 2816 2272 svchost.com 38 PID 2272 wrote to memory of 2816 2272 svchost.com 38 PID 2272 wrote to memory of 2816 2272 svchost.com 38 PID 2272 wrote to memory of 2816 2272 svchost.com 38 PID 2816 wrote to memory of 2596 2816 FFE8EB~1.EXE 71 PID 2816 wrote to memory of 2596 2816 FFE8EB~1.EXE 71 PID 2816 wrote to memory of 2596 2816 FFE8EB~1.EXE 71 PID 2816 wrote to memory of 2596 2816 FFE8EB~1.EXE 71 PID 2596 wrote to memory of 2000 2596 svchost.com 40 PID 2596 wrote to memory of 2000 2596 svchost.com 40 PID 2596 wrote to memory of 2000 2596 svchost.com 40 PID 2596 wrote to memory of 2000 2596 svchost.com 40 PID 2000 wrote to memory of 940 2000 FFE8EB~1.EXE 41 PID 2000 wrote to memory of 940 2000 FFE8EB~1.EXE 41 PID 2000 wrote to memory of 940 2000 FFE8EB~1.EXE 41 PID 2000 wrote to memory of 940 2000 FFE8EB~1.EXE 41 PID 940 wrote to memory of 3032 940 svchost.com 75 PID 940 wrote to memory of 3032 940 svchost.com 75 PID 940 wrote to memory of 3032 940 svchost.com 75 PID 940 wrote to memory of 3032 940 svchost.com 75 PID 3032 wrote to memory of 2060 3032 FFE8EB~1.EXE 43 PID 3032 wrote to memory of 2060 3032 FFE8EB~1.EXE 43 PID 3032 wrote to memory of 2060 3032 FFE8EB~1.EXE 43 PID 3032 wrote to memory of 2060 3032 FFE8EB~1.EXE 43 PID 2060 wrote to memory of 2920 2060 svchost.com 44 PID 2060 wrote to memory of 2920 2060 svchost.com 44 PID 2060 wrote to memory of 2920 2060 svchost.com 44 PID 2060 wrote to memory of 2920 2060 svchost.com 44 PID 2920 wrote to memory of 1820 2920 FFE8EB~1.EXE 45 PID 2920 wrote to memory of 1820 2920 FFE8EB~1.EXE 45 PID 2920 wrote to memory of 1820 2920 FFE8EB~1.EXE 45 PID 2920 wrote to memory of 1820 2920 FFE8EB~1.EXE 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe"C:\Users\Admin\AppData\Local\Temp\ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe"1⤵
- Loads dropped DLL
- Modifies system executable filetype association
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Users\Admin\AppData\Local\Temp\3582-490\ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:996 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:576 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"9⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE10⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:940 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"17⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:1820 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE18⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1308 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2220 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE20⤵
- Executes dropped EXE
PID:1872 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"21⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:1536 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE22⤵
- Executes dropped EXE
PID:1104 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2080 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE24⤵
- Executes dropped EXE
PID:548 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:924 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE26⤵
- Executes dropped EXE
PID:1124 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"27⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1048 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE28⤵
- Executes dropped EXE
PID:2564 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:884 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE30⤵
- Executes dropped EXE
PID:2368 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"31⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2104 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE32⤵
- Executes dropped EXE
PID:2912 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"33⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2380 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE34⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3016 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"35⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2840 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE36⤵
- Executes dropped EXE
PID:2332 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"37⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:2756 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE38⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2012 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"39⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2900 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE40⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2272 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"41⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2668 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE42⤵
- Executes dropped EXE
PID:2596 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"43⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:644 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE44⤵
- Executes dropped EXE
PID:1712 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"45⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2996 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE46⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3032 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"47⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1312 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE48⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1700 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"49⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2776 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE50⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:896 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"51⤵
- Executes dropped EXE
- Loads dropped DLL
PID:540 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE52⤵
- Executes dropped EXE
PID:1936 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"53⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2036 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE54⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2168 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"55⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1308 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE56⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2252 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"57⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2220 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE58⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1016 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"59⤵
- Executes dropped EXE
PID:1264 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE60⤵
- Executes dropped EXE
PID:1496 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"61⤵
- Executes dropped EXE
PID:1104 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE62⤵
- Executes dropped EXE
PID:912 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"63⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:956 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE64⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1772 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"65⤵
- Executes dropped EXE
PID:968 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE66⤵PID:2540
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"67⤵PID:1776
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE68⤵
- System Location Discovery: System Language Discovery
PID:1484 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"69⤵PID:1752
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE70⤵
- Drops file in Windows directory
PID:2328 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"71⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1364 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE72⤵
- System Location Discovery: System Language Discovery
PID:2264 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"73⤵PID:2496
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE74⤵PID:1648
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"75⤵
- Drops file in Windows directory
PID:2912 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE76⤵PID:2736
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"77⤵
- System Location Discovery: System Language Discovery
PID:2800 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE78⤵
- System Location Discovery: System Language Discovery
PID:2724 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"79⤵PID:1632
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE80⤵
- Drops file in Windows directory
PID:2944 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"81⤵PID:2812
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE82⤵
- Drops file in Windows directory
PID:2620 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"83⤵PID:2856
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE84⤵
- System Location Discovery: System Language Discovery
PID:2272 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"85⤵PID:2640
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE86⤵PID:3040
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"87⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE88⤵PID:1712
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"89⤵
- System Location Discovery: System Language Discovery
PID:3024 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE90⤵PID:1920
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"91⤵PID:2584
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE92⤵PID:1312
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"93⤵PID:1608
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE94⤵
- System Location Discovery: System Language Discovery
PID:820 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"95⤵PID:3056
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE96⤵PID:2208
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"97⤵PID:3028
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE98⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2120 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"99⤵PID:2400
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE100⤵PID:2192
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"101⤵
- System Location Discovery: System Language Discovery
PID:1660 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE102⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2124 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"103⤵
- Drops file in Windows directory
PID:1480 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE104⤵PID:1748
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"105⤵PID:1616
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE106⤵PID:1532
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"107⤵PID:888
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE108⤵
- Drops file in Windows directory
PID:2520 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"109⤵PID:2324
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE110⤵PID:1292
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"111⤵PID:1800
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE112⤵
- Drops file in Windows directory
PID:2576 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"113⤵PID:1716
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE114⤵
- System Location Discovery: System Language Discovery
PID:596 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"115⤵PID:1992
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE116⤵PID:2548
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"117⤵PID:2268
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE118⤵
- Drops file in Windows directory
PID:2292 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"119⤵PID:2804
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE120⤵PID:2720
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"121⤵PID:2360
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE122⤵
- System Location Discovery: System Language Discovery
PID:2940
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-