Analysis
-
max time kernel
96s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2024 11:52
Behavioral task
behavioral1
Sample
caae2c684550b70dca257d6b5d8bd8aa5adda314979655eb46f1b453b7b51585N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
caae2c684550b70dca257d6b5d8bd8aa5adda314979655eb46f1b453b7b51585N.exe
Resource
win10v2004-20241007-en
General
-
Target
caae2c684550b70dca257d6b5d8bd8aa5adda314979655eb46f1b453b7b51585N.exe
-
Size
1.9MB
-
MD5
e9e2bd7b71ead316297deec1dfa509d0
-
SHA1
a1da22feb74aaae637d30e2952cd9fbc4f2ab077
-
SHA256
caae2c684550b70dca257d6b5d8bd8aa5adda314979655eb46f1b453b7b51585
-
SHA512
df157496aff0d938fd7131f3e974bab7b8fd5f30f7973ba1718514e30c3363acc9b330fd051418d121110b5a5eaed73cbff1834f5d270adda9ae1f42fabec07d
-
SSDEEP
49152:yF8yYzJ8dvzIY/pZ/qhFcSyIdag187i6tuMCx0wssluF:08yxdpcOShdag56cMCx02lu
Malware Config
Signatures
-
Detect Neshta payload 64 IoCs
resource yara_rule behavioral2/files/0x0007000000023cb5-4.dat family_neshta behavioral2/files/0x0007000000023cb6-10.dat family_neshta behavioral2/memory/2840-16-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3536-20-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2328-28-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3496-38-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3256-40-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4448-44-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2212-52-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4724-63-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/912-64-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3612-68-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/212-86-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1760-76-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4496-88-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/652-102-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0004000000020371-100.dat family_neshta behavioral2/memory/4856-124-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0004000000020337-123.dat family_neshta behavioral2/memory/3516-129-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1112-141-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1680-137-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4592-153-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0001000000021508-189.dat family_neshta behavioral2/files/0x0001000000021507-188.dat family_neshta behavioral2/files/0x0001000000022f8c-195.dat family_neshta behavioral2/files/0x0001000000022f4e-193.dat family_neshta behavioral2/files/0x00010000000167b9-207.dat family_neshta behavioral2/memory/5036-209-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3172-223-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x00010000000167ce-226.dat family_neshta behavioral2/files/0x000100000001680b-206.dat family_neshta behavioral2/files/0x0001000000021506-187.dat family_neshta behavioral2/memory/4536-175-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/924-169-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x000200000002033b-163.dat family_neshta behavioral2/memory/2688-249-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3336-246-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4392-260-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2324-255-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3584-149-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3340-275-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1836-280-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3536-290-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/956-292-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3308-305-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/856-298-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3620-306-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3732-308-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1720-314-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3788-321-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4436-322-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4544-329-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1084-330-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/928-337-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4836-338-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1912-345-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3160-346-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/464-353-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4856-354-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4640-361-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1160-362-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/5104-369-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3616-370-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CAAE2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CAAE2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CAAE2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CAAE2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CAAE2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CAAE2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CAAE2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CAAE2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CAAE2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CAAE2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CAAE2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CAAE2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CAAE2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CAAE2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CAAE2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CAAE2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CAAE2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CAAE2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CAAE2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CAAE2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CAAE2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CAAE2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CAAE2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CAAE2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CAAE2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CAAE2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CAAE2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CAAE2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CAAE2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CAAE2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CAAE2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CAAE2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CAAE2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CAAE2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CAAE2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CAAE2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CAAE2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CAAE2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CAAE2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CAAE2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CAAE2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CAAE2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CAAE2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CAAE2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CAAE2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CAAE2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CAAE2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CAAE2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CAAE2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CAAE2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CAAE2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CAAE2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CAAE2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CAAE2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CAAE2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CAAE2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CAAE2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CAAE2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CAAE2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CAAE2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CAAE2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CAAE2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CAAE2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CAAE2C~1.EXE -
Executes dropped EXE 64 IoCs
pid Process 4136 caae2c684550b70dca257d6b5d8bd8aa5adda314979655eb46f1b453b7b51585N.exe 2840 svchost.com 3536 CAAE2C~1.EXE 2328 svchost.com 3496 CAAE2C~1.EXE 3256 svchost.com 4448 CAAE2C~1.EXE 2212 svchost.com 4724 CAAE2C~1.EXE 912 svchost.com 3612 CAAE2C~1.EXE 1760 svchost.com 212 CAAE2C~1.EXE 4496 svchost.com 652 CAAE2C~1.EXE 4856 svchost.com 3516 CAAE2C~1.EXE 1680 svchost.com 1112 CAAE2C~1.EXE 3584 svchost.com 4592 CAAE2C~1.EXE 924 svchost.com 4536 CAAE2C~1.EXE 5036 svchost.com 3172 CAAE2C~1.EXE 3336 svchost.com 2688 CAAE2C~1.EXE 2324 svchost.com 4392 CAAE2C~1.EXE 3340 svchost.com 1836 CAAE2C~1.EXE 3536 svchost.com 956 CAAE2C~1.EXE 856 svchost.com 3308 CAAE2C~1.EXE 3620 svchost.com 3732 CAAE2C~1.EXE 1720 svchost.com 3788 CAAE2C~1.EXE 4436 svchost.com 4544 CAAE2C~1.EXE 1084 svchost.com 928 CAAE2C~1.EXE 4836 svchost.com 1912 CAAE2C~1.EXE 3160 svchost.com 464 CAAE2C~1.EXE 4856 svchost.com 4640 CAAE2C~1.EXE 1160 svchost.com 5104 CAAE2C~1.EXE 3616 svchost.com 2848 CAAE2C~1.EXE 1072 svchost.com 2168 CAAE2C~1.EXE 3188 svchost.com 4504 CAAE2C~1.EXE 384 svchost.com 2436 CAAE2C~1.EXE 3648 svchost.com 1832 CAAE2C~1.EXE 2256 svchost.com 2576 CAAE2C~1.EXE 5000 svchost.com -
Modifies system executable filetype association 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" caae2c684550b70dca257d6b5d8bd8aa5adda314979655eb46f1b453b7b51585N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" CAAE2C~1.EXE -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe caae2c684550b70dca257d6b5d8bd8aa5adda314979655eb46f1b453b7b51585N.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MI9C33~1.EXE caae2c684550b70dca257d6b5d8bd8aa5adda314979655eb46f1b453b7b51585N.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe caae2c684550b70dca257d6b5d8bd8aa5adda314979655eb46f1b453b7b51585N.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe CAAE2C~1.EXE File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\32BITM~1.EXE caae2c684550b70dca257d6b5d8bd8aa5adda314979655eb46f1b453b7b51585N.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE caae2c684550b70dca257d6b5d8bd8aa5adda314979655eb46f1b453b7b51585N.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaureg.exe caae2c684550b70dca257d6b5d8bd8aa5adda314979655eb46f1b453b7b51585N.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~1.EXE caae2c684550b70dca257d6b5d8bd8aa5adda314979655eb46f1b453b7b51585N.exe File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe caae2c684550b70dca257d6b5d8bd8aa5adda314979655eb46f1b453b7b51585N.exe File opened for modification C:\PROGRA~2\WINDOW~2\wabmig.exe CAAE2C~1.EXE File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Browser\WCCHRO~1\WCCHRO~1.EXE caae2c684550b70dca257d6b5d8bd8aa5adda314979655eb46f1b453b7b51585N.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE caae2c684550b70dca257d6b5d8bd8aa5adda314979655eb46f1b453b7b51585N.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOF5E2~1.EXE caae2c684550b70dca257d6b5d8bd8aa5adda314979655eb46f1b453b7b51585N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~2.EXE caae2c684550b70dca257d6b5d8bd8aa5adda314979655eb46f1b453b7b51585N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\PWAHEL~1.EXE caae2c684550b70dca257d6b5d8bd8aa5adda314979655eb46f1b453b7b51585N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{63880~1\WINDOW~1.EXE caae2c684550b70dca257d6b5d8bd8aa5adda314979655eb46f1b453b7b51585N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE caae2c684550b70dca257d6b5d8bd8aa5adda314979655eb46f1b453b7b51585N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe caae2c684550b70dca257d6b5d8bd8aa5adda314979655eb46f1b453b7b51585N.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaws.exe caae2c684550b70dca257d6b5d8bd8aa5adda314979655eb46f1b453b7b51585N.exe File opened for modification C:\PROGRA~2\WINDOW~4\setup_wm.exe CAAE2C~1.EXE File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe CAAE2C~1.EXE File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe CAAE2C~1.EXE File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe CAAE2C~1.EXE File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~4.EXE caae2c684550b70dca257d6b5d8bd8aa5adda314979655eb46f1b453b7b51585N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\BHO\IE_TO_~1.EXE caae2c684550b70dca257d6b5d8bd8aa5adda314979655eb46f1b453b7b51585N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~2.EXE caae2c684550b70dca257d6b5d8bd8aa5adda314979655eb46f1b453b7b51585N.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\java.exe caae2c684550b70dca257d6b5d8bd8aa5adda314979655eb46f1b453b7b51585N.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE caae2c684550b70dca257d6b5d8bd8aa5adda314979655eb46f1b453b7b51585N.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe caae2c684550b70dca257d6b5d8bd8aa5adda314979655eb46f1b453b7b51585N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE caae2c684550b70dca257d6b5d8bd8aa5adda314979655eb46f1b453b7b51585N.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaureg.exe caae2c684550b70dca257d6b5d8bd8aa5adda314979655eb46f1b453b7b51585N.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE caae2c684550b70dca257d6b5d8bd8aa5adda314979655eb46f1b453b7b51585N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE caae2c684550b70dca257d6b5d8bd8aa5adda314979655eb46f1b453b7b51585N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE caae2c684550b70dca257d6b5d8bd8aa5adda314979655eb46f1b453b7b51585N.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~3.EXE caae2c684550b70dca257d6b5d8bd8aa5adda314979655eb46f1b453b7b51585N.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe caae2c684550b70dca257d6b5d8bd8aa5adda314979655eb46f1b453b7b51585N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\NOTIFI~1.EXE caae2c684550b70dca257d6b5d8bd8aa5adda314979655eb46f1b453b7b51585N.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE caae2c684550b70dca257d6b5d8bd8aa5adda314979655eb46f1b453b7b51585N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exe caae2c684550b70dca257d6b5d8bd8aa5adda314979655eb46f1b453b7b51585N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE caae2c684550b70dca257d6b5d8bd8aa5adda314979655eb46f1b453b7b51585N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{63880~1\WINDOW~1.EXE caae2c684550b70dca257d6b5d8bd8aa5adda314979655eb46f1b453b7b51585N.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmlaunch.exe CAAE2C~1.EXE File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\ELEVAT~1.EXE caae2c684550b70dca257d6b5d8bd8aa5adda314979655eb46f1b453b7b51585N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\PWAHEL~1.EXE caae2c684550b70dca257d6b5d8bd8aa5adda314979655eb46f1b453b7b51585N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~3.EXE caae2c684550b70dca257d6b5d8bd8aa5adda314979655eb46f1b453b7b51585N.exe File opened for modification C:\PROGRA~2\WINDOW~2\wabmig.exe caae2c684550b70dca257d6b5d8bd8aa5adda314979655eb46f1b453b7b51585N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\msedge.exe caae2c684550b70dca257d6b5d8bd8aa5adda314979655eb46f1b453b7b51585N.exe File opened for modification C:\PROGRA~2\WINDOW~3\ACCESS~1\wordpad.exe caae2c684550b70dca257d6b5d8bd8aa5adda314979655eb46f1b453b7b51585N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF5AF~1\WINDOW~1.EXE caae2c684550b70dca257d6b5d8bd8aa5adda314979655eb46f1b453b7b51585N.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe caae2c684550b70dca257d6b5d8bd8aa5adda314979655eb46f1b453b7b51585N.exe File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe caae2c684550b70dca257d6b5d8bd8aa5adda314979655eb46f1b453b7b51585N.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE caae2c684550b70dca257d6b5d8bd8aa5adda314979655eb46f1b453b7b51585N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE caae2c684550b70dca257d6b5d8bd8aa5adda314979655eb46f1b453b7b51585N.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\AdobeARM.exe caae2c684550b70dca257d6b5d8bd8aa5adda314979655eb46f1b453b7b51585N.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MIA062~1.EXE caae2c684550b70dca257d6b5d8bd8aa5adda314979655eb46f1b453b7b51585N.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOBD5D~1.EXE caae2c684550b70dca257d6b5d8bd8aa5adda314979655eb46f1b453b7b51585N.exe File opened for modification C:\PROGRA~2\WINDOW~4\setup_wm.exe caae2c684550b70dca257d6b5d8bd8aa5adda314979655eb46f1b453b7b51585N.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe caae2c684550b70dca257d6b5d8bd8aa5adda314979655eb46f1b453b7b51585N.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmprph.exe CAAE2C~1.EXE File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\32BITM~1.EXE caae2c684550b70dca257d6b5d8bd8aa5adda314979655eb46f1b453b7b51585N.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\AdobeARM.exe caae2c684550b70dca257d6b5d8bd8aa5adda314979655eb46f1b453b7b51585N.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe caae2c684550b70dca257d6b5d8bd8aa5adda314979655eb46f1b453b7b51585N.exe File opened for modification C:\PROGRA~3\Adobe\Setup\{AC76B~1\setup.exe caae2c684550b70dca257d6b5d8bd8aa5adda314979655eb46f1b453b7b51585N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE caae2c684550b70dca257d6b5d8bd8aa5adda314979655eb46f1b453b7b51585N.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com CAAE2C~1.EXE File opened for modification C:\Windows\svchost.com CAAE2C~1.EXE File opened for modification C:\Windows\svchost.com CAAE2C~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com CAAE2C~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys CAAE2C~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com CAAE2C~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys CAAE2C~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com CAAE2C~1.EXE File opened for modification C:\Windows\directx.sys CAAE2C~1.EXE File opened for modification C:\Windows\svchost.com CAAE2C~1.EXE File opened for modification C:\Windows\svchost.com CAAE2C~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys CAAE2C~1.EXE File opened for modification C:\Windows\directx.sys CAAE2C~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com CAAE2C~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com CAAE2C~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys CAAE2C~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com CAAE2C~1.EXE File opened for modification C:\Windows\svchost.com CAAE2C~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys CAAE2C~1.EXE File opened for modification C:\Windows\svchost.com CAAE2C~1.EXE File opened for modification C:\Windows\svchost.com CAAE2C~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys CAAE2C~1.EXE File opened for modification C:\Windows\svchost.com CAAE2C~1.EXE File opened for modification C:\Windows\svchost.com CAAE2C~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys CAAE2C~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com CAAE2C~1.EXE File opened for modification C:\Windows\directx.sys CAAE2C~1.EXE File opened for modification C:\Windows\directx.sys CAAE2C~1.EXE File opened for modification C:\Windows\svchost.com CAAE2C~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys CAAE2C~1.EXE File opened for modification C:\Windows\directx.sys CAAE2C~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys CAAE2C~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CAAE2C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CAAE2C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CAAE2C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CAAE2C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CAAE2C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CAAE2C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CAAE2C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CAAE2C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CAAE2C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CAAE2C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CAAE2C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CAAE2C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CAAE2C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CAAE2C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CAAE2C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CAAE2C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CAAE2C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CAAE2C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CAAE2C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CAAE2C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CAAE2C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CAAE2C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CAAE2C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CAAE2C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CAAE2C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CAAE2C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language caae2c684550b70dca257d6b5d8bd8aa5adda314979655eb46f1b453b7b51585N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CAAE2C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CAAE2C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CAAE2C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CAAE2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CAAE2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CAAE2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CAAE2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CAAE2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CAAE2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CAAE2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CAAE2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CAAE2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CAAE2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CAAE2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CAAE2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CAAE2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CAAE2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CAAE2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CAAE2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CAAE2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CAAE2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CAAE2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CAAE2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CAAE2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CAAE2C~1.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" caae2c684550b70dca257d6b5d8bd8aa5adda314979655eb46f1b453b7b51585N.exe Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CAAE2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CAAE2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CAAE2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CAAE2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CAAE2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CAAE2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CAAE2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CAAE2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CAAE2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CAAE2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CAAE2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CAAE2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CAAE2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CAAE2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CAAE2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CAAE2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CAAE2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CAAE2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CAAE2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CAAE2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings caae2c684550b70dca257d6b5d8bd8aa5adda314979655eb46f1b453b7b51585N.exe Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CAAE2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CAAE2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CAAE2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CAAE2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CAAE2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CAAE2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CAAE2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CAAE2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CAAE2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CAAE2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CAAE2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CAAE2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CAAE2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CAAE2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CAAE2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CAAE2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CAAE2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CAAE2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CAAE2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CAAE2C~1.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1856 wrote to memory of 4136 1856 caae2c684550b70dca257d6b5d8bd8aa5adda314979655eb46f1b453b7b51585N.exe 82 PID 1856 wrote to memory of 4136 1856 caae2c684550b70dca257d6b5d8bd8aa5adda314979655eb46f1b453b7b51585N.exe 82 PID 1856 wrote to memory of 4136 1856 caae2c684550b70dca257d6b5d8bd8aa5adda314979655eb46f1b453b7b51585N.exe 82 PID 4136 wrote to memory of 2840 4136 caae2c684550b70dca257d6b5d8bd8aa5adda314979655eb46f1b453b7b51585N.exe 83 PID 4136 wrote to memory of 2840 4136 caae2c684550b70dca257d6b5d8bd8aa5adda314979655eb46f1b453b7b51585N.exe 83 PID 4136 wrote to memory of 2840 4136 caae2c684550b70dca257d6b5d8bd8aa5adda314979655eb46f1b453b7b51585N.exe 83 PID 2840 wrote to memory of 3536 2840 svchost.com 113 PID 2840 wrote to memory of 3536 2840 svchost.com 113 PID 2840 wrote to memory of 3536 2840 svchost.com 113 PID 3536 wrote to memory of 2328 3536 CAAE2C~1.EXE 85 PID 3536 wrote to memory of 2328 3536 CAAE2C~1.EXE 85 PID 3536 wrote to memory of 2328 3536 CAAE2C~1.EXE 85 PID 2328 wrote to memory of 3496 2328 svchost.com 86 PID 2328 wrote to memory of 3496 2328 svchost.com 86 PID 2328 wrote to memory of 3496 2328 svchost.com 86 PID 3496 wrote to memory of 3256 3496 CAAE2C~1.EXE 87 PID 3496 wrote to memory of 3256 3496 CAAE2C~1.EXE 87 PID 3496 wrote to memory of 3256 3496 CAAE2C~1.EXE 87 PID 3256 wrote to memory of 4448 3256 svchost.com 88 PID 3256 wrote to memory of 4448 3256 svchost.com 88 PID 3256 wrote to memory of 4448 3256 svchost.com 88 PID 4448 wrote to memory of 2212 4448 CAAE2C~1.EXE 89 PID 4448 wrote to memory of 2212 4448 CAAE2C~1.EXE 89 PID 4448 wrote to memory of 2212 4448 CAAE2C~1.EXE 89 PID 2212 wrote to memory of 4724 2212 svchost.com 90 PID 2212 wrote to memory of 4724 2212 svchost.com 90 PID 2212 wrote to memory of 4724 2212 svchost.com 90 PID 4724 wrote to memory of 912 4724 CAAE2C~1.EXE 91 PID 4724 wrote to memory of 912 4724 CAAE2C~1.EXE 91 PID 4724 wrote to memory of 912 4724 CAAE2C~1.EXE 91 PID 912 wrote to memory of 3612 912 svchost.com 92 PID 912 wrote to memory of 3612 912 svchost.com 92 PID 912 wrote to memory of 3612 912 svchost.com 92 PID 3612 wrote to memory of 1760 3612 CAAE2C~1.EXE 93 PID 3612 wrote to memory of 1760 3612 CAAE2C~1.EXE 93 PID 3612 wrote to memory of 1760 3612 CAAE2C~1.EXE 93 PID 1760 wrote to memory of 212 1760 svchost.com 94 PID 1760 wrote to memory of 212 1760 svchost.com 94 PID 1760 wrote to memory of 212 1760 svchost.com 94 PID 212 wrote to memory of 4496 212 CAAE2C~1.EXE 95 PID 212 wrote to memory of 4496 212 CAAE2C~1.EXE 95 PID 212 wrote to memory of 4496 212 CAAE2C~1.EXE 95 PID 4496 wrote to memory of 652 4496 svchost.com 96 PID 4496 wrote to memory of 652 4496 svchost.com 96 PID 4496 wrote to memory of 652 4496 svchost.com 96 PID 652 wrote to memory of 4856 652 CAAE2C~1.EXE 129 PID 652 wrote to memory of 4856 652 CAAE2C~1.EXE 129 PID 652 wrote to memory of 4856 652 CAAE2C~1.EXE 129 PID 4856 wrote to memory of 3516 4856 svchost.com 98 PID 4856 wrote to memory of 3516 4856 svchost.com 98 PID 4856 wrote to memory of 3516 4856 svchost.com 98 PID 3516 wrote to memory of 1680 3516 CAAE2C~1.EXE 99 PID 3516 wrote to memory of 1680 3516 CAAE2C~1.EXE 99 PID 3516 wrote to memory of 1680 3516 CAAE2C~1.EXE 99 PID 1680 wrote to memory of 1112 1680 svchost.com 100 PID 1680 wrote to memory of 1112 1680 svchost.com 100 PID 1680 wrote to memory of 1112 1680 svchost.com 100 PID 1112 wrote to memory of 3584 1112 CAAE2C~1.EXE 101 PID 1112 wrote to memory of 3584 1112 CAAE2C~1.EXE 101 PID 1112 wrote to memory of 3584 1112 CAAE2C~1.EXE 101 PID 3584 wrote to memory of 4592 3584 svchost.com 102 PID 3584 wrote to memory of 4592 3584 svchost.com 102 PID 3584 wrote to memory of 4592 3584 svchost.com 102 PID 4592 wrote to memory of 924 4592 CAAE2C~1.EXE 179
Processes
-
C:\Users\Admin\AppData\Local\Temp\caae2c684550b70dca257d6b5d8bd8aa5adda314979655eb46f1b453b7b51585N.exe"C:\Users\Admin\AppData\Local\Temp\caae2c684550b70dca257d6b5d8bd8aa5adda314979655eb46f1b453b7b51585N.exe"1⤵
- Modifies system executable filetype association
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Users\Admin\AppData\Local\Temp\3582-490\caae2c684550b70dca257d6b5d8bd8aa5adda314979655eb46f1b453b7b51585N.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\caae2c684550b70dca257d6b5d8bd8aa5adda314979655eb46f1b453b7b51585N.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4136 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3536 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3496 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3256 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4448 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE10⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4724 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:912 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3612 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE14⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE16⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:652 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3516 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3584 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE22⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4592 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE"23⤵
- Executes dropped EXE
PID:924 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE24⤵
- Executes dropped EXE
- Modifies registry class
PID:4536 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE"25⤵
- Executes dropped EXE
PID:5036 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE26⤵
- Checks computer location settings
- Executes dropped EXE
PID:3172 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE"27⤵
- Executes dropped EXE
PID:3336 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE28⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2688 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE"29⤵
- Executes dropped EXE
PID:2324 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE30⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4392 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE"31⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3340 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE32⤵
- Executes dropped EXE
- Modifies registry class
PID:1836 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE"33⤵
- Executes dropped EXE
PID:3536 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE34⤵
- Executes dropped EXE
PID:956 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE"35⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:856 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE36⤵
- Executes dropped EXE
PID:3308 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE"37⤵
- Executes dropped EXE
PID:3620 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE38⤵
- Checks computer location settings
- Executes dropped EXE
PID:3732 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE"39⤵
- Executes dropped EXE
PID:1720 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE40⤵
- Checks computer location settings
- Executes dropped EXE
PID:3788 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE"41⤵
- Executes dropped EXE
PID:4436 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE42⤵
- Executes dropped EXE
PID:4544 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE"43⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1084 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE44⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:928 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE"45⤵
- Executes dropped EXE
PID:4836 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE46⤵
- Checks computer location settings
- Executes dropped EXE
PID:1912 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE"47⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3160 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE48⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:464 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE"49⤵
- Executes dropped EXE
PID:4856 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE50⤵
- Executes dropped EXE
PID:4640 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE"51⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1160 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE52⤵
- Checks computer location settings
- Executes dropped EXE
PID:5104 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE"53⤵
- Executes dropped EXE
PID:3616 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE54⤵
- Executes dropped EXE
PID:2848 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE"55⤵
- Executes dropped EXE
PID:1072 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE56⤵
- Executes dropped EXE
- Modifies registry class
PID:2168 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE"57⤵
- Executes dropped EXE
PID:3188 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE58⤵
- Executes dropped EXE
- Modifies registry class
PID:4504 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE"59⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:384 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE60⤵
- Executes dropped EXE
PID:2436 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE"61⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3648 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE62⤵
- Checks computer location settings
- Executes dropped EXE
PID:1832 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE"63⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2256 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE64⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2576 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE"65⤵
- Executes dropped EXE
PID:5000 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE66⤵PID:440
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE"67⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1532 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE68⤵PID:2324
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE"69⤵PID:1944
-
C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE70⤵
- System Location Discovery: System Language Discovery
PID:4392 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE"71⤵
- System Location Discovery: System Language Discovery
PID:4164 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE72⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:904 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE"73⤵PID:1836
-
C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE74⤵
- Modifies registry class
PID:3576 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE"75⤵PID:3372
-
C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE76⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1408 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE"77⤵PID:4364
-
C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE78⤵
- Checks computer location settings
PID:1292 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE"79⤵
- System Location Discovery: System Language Discovery
PID:2212 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE80⤵
- Checks computer location settings
PID:1596 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE"81⤵PID:1484
-
C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE82⤵
- System Location Discovery: System Language Discovery
PID:1924 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE"83⤵PID:3960
-
C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE84⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:4416 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE"85⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:412 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE86⤵
- Checks computer location settings
- Drops file in Windows directory
- Modifies registry class
PID:684 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE"87⤵PID:4520
-
C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE88⤵PID:3672
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE"89⤵
- System Location Discovery: System Language Discovery
PID:4320 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE90⤵PID:3384
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE"91⤵
- Drops file in Windows directory
PID:1068 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE92⤵
- Checks computer location settings
- Modifies registry class
PID:4984 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE"93⤵PID:1452
-
C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE94⤵
- Modifies registry class
PID:3320 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE"95⤵PID:4412
-
C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE96⤵
- Modifies registry class
PID:740 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE"97⤵
- Drops file in Windows directory
PID:1072 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE98⤵
- Modifies registry class
PID:4456 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE"99⤵PID:924
-
C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE100⤵
- Checks computer location settings
PID:1052 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE"101⤵PID:2508
-
C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE102⤵PID:4696
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE"103⤵PID:312
-
C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE104⤵
- Checks computer location settings
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2436 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE"105⤵PID:3172
-
C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE106⤵PID:3548
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE"107⤵PID:1832
-
C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE108⤵
- Checks computer location settings
- Drops file in Windows directory
PID:2256 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE"109⤵PID:2312
-
C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE110⤵
- Checks computer location settings
- Drops file in Windows directory
PID:1772 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE"111⤵PID:1564
-
C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE112⤵
- Drops file in Windows directory
PID:440 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE"113⤵PID:4568
-
C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE114⤵
- Modifies registry class
PID:2324 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE"115⤵
- Drops file in Windows directory
PID:4516 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE116⤵PID:3508
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE"117⤵PID:2552
-
C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE118⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:3748 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE"119⤵PID:956
-
C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE120⤵
- Checks computer location settings
PID:348 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE"121⤵
- System Location Discovery: System Language Discovery
PID:4448 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CAAE2C~1.EXE122⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3496
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-