Analysis
-
max time kernel
93s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-12-2024 18:22
Behavioral task
behavioral1
Sample
2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe
-
Size
1.0MB
-
MD5
0aa3e15460b1a3f22eca1420b9928f0a
-
SHA1
cbe35d8fbcaaa9a20c1be6bcf95088823a42b592
-
SHA256
a13c72b97622964c9aa04e414a281a831ee7a66c6c16bf7d022fa5d13b881771
-
SHA512
3f53c77d9a9a1d33260d139ada7d02149251bfccfc59f8c222089db9ccbbd1eb4865a45e5004d9aa399530e5c5c4b462c1f2026f1385b27e2fd8e277af8680b5
-
SSDEEP
24576:JcQi2yQSu77BeUMjBMiIZ0Bl3XZ/h8mebhO6ds:JcQij2BeUMVMiIZ0j3n8me9O6ds
Malware Config
Signatures
-
Detect Neshta payload 64 IoCs
resource yara_rule behavioral2/files/0x0008000000023c7b-4.dat family_neshta behavioral2/files/0x0007000000023c80-11.dat family_neshta behavioral2/memory/1608-32-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1440-40-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3832-44-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2736-63-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2096-74-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4056-87-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3172-99-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/5004-100-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0004000000020336-123.dat family_neshta behavioral2/files/0x0006000000020216-115.dat family_neshta behavioral2/memory/4516-145-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3256-147-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1476-151-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4712-163-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x00010000000214da-186.dat family_neshta behavioral2/files/0x00010000000167b6-204.dat family_neshta behavioral2/files/0x0001000000016808-203.dat family_neshta behavioral2/files/0x00010000000167cf-207.dat family_neshta behavioral2/files/0x0001000000022f2a-189.dat family_neshta behavioral2/files/0x00010000000167f0-215.dat family_neshta behavioral2/memory/1396-210-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1252-257-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2148-249-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4092-239-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4132-274-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1188-291-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4348-284-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/64-292-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3824-294-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3280-303-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4068-316-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/716-317-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4160-319-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3468-325-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2904-332-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3740-333-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1124-340-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/876-341-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2072-343-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1140-351-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4564-357-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4520-359-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2920-367-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3880-365-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3652-373-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4604-375-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4664-381-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3204-383-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/916-391-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/60-389-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3200-399-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4072-405-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4220-407-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3032-415-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2004-421-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2068-423-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2148-413-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2232-397-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2292-349-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/708-309-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3636-301-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3224-271-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 2024-1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 2024-1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 2024-1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 2024-1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 2024-1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 2024-1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 2024-1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 2024-1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 2024-1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 2024-1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 2024-1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 2024-1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 2024-1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 2024-1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 2024-1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 2024-1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 2024-1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 2024-1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 2024-1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 2024-1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 2024-1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 2024-1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 2024-1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 2024-1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 2024-1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 2024-1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 2024-1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 2024-1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 2024-1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 2024-1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 2024-1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 2024-1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 2024-1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 2024-1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 2024-1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 2024-1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 2024-1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 2024-1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 2024-1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 2024-1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 2024-1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 2024-1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 2024-1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 2024-1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 2024-1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 2024-1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 2024-1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 2024-1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 2024-1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 2024-1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 2024-1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 2024-1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 2024-1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 2024-1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 2024-1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 2024-1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 2024-1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 2024-1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 2024-1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 2024-1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 2024-1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 2024-1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 2024-1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 2024-1~1.EXE -
Executes dropped EXE 64 IoCs
pid Process 1156 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe 4528 svchost.com 3612 2024-1~1.EXE 1200 svchost.com 1608 2024-1~1.EXE 1440 svchost.com 3832 2024-1~1.EXE 512 svchost.com 2736 2024-1~1.EXE 2900 svchost.com 2096 2024-1~1.EXE 4256 svchost.com 4056 2024-1~1.EXE 2516 svchost.com 3172 2024-1~1.EXE 5004 svchost.com 2616 2024-1~1.EXE 3940 svchost.com 4516 2024-1~1.EXE 3256 svchost.com 1476 2024-1~1.EXE 5100 svchost.com 4712 2024-1~1.EXE 1396 svchost.com 4092 2024-1~1.EXE 2148 svchost.com 1252 2024-1~1.EXE 3224 svchost.com 4132 2024-1~1.EXE 4348 svchost.com 1188 2024-1~1.EXE 64 svchost.com 3824 2024-1~1.EXE 3636 svchost.com 3280 2024-1~1.EXE 708 svchost.com 4068 2024-1~1.EXE 716 svchost.com 4160 2024-1~1.EXE 3468 svchost.com 2904 2024-1~1.EXE 3740 svchost.com 1124 2024-1~1.EXE 876 svchost.com 2072 2024-1~1.EXE 2292 svchost.com 1140 2024-1~1.EXE 4564 svchost.com 4520 2024-1~1.EXE 3880 svchost.com 2920 2024-1~1.EXE 3652 svchost.com 4604 2024-1~1.EXE 4664 svchost.com 3204 2024-1~1.EXE 60 svchost.com 916 2024-1~1.EXE 2232 svchost.com 3200 2024-1~1.EXE 4072 svchost.com 4220 2024-1~1.EXE 2148 svchost.com 3032 2024-1~1.EXE 2004 svchost.com -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~2.EXE 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Eula.exe 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\64BITM~1.EXE 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~1.EXE 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\arh.exe 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaws.exe 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~3.EXE 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~2\WINDOW~4\setup_wm.exe 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\COOKIE~1.EXE 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~2.EXE 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\ELEVAT~1.EXE 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~2\WINDOW~3\ACCESS~1\wordpad.exe 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~3\PACKAG~1\{63880~1\WINDOW~1.EXE 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Browser\WCCHRO~1\WCCHRO~1.EXE 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaws.exe 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\AdobeARM.exe 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~4.EXE 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exe 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MID1AD~1.EXE 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmprph.exe 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~3.EXE 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOBD5D~1.EXE 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOF5E2~1.EXE 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\msedge.exe 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmlaunch.exe 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exe 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\msedge.exe 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\MSEDGE~1.EXE 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~3.EXE 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~2\WINDOW~2\wabmig.exe 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exe 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\IDENTI~1.EXE 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmlaunch.exe 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Browser\WCCHRO~1\WCCHRO~1.EXE 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GO664E~1.EXE 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~2\WINDOW~3\ACCESS~1\wordpad.exe 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF5AF~1\WINDOW~1.EXE 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\64BITM~1.EXE 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaw.exe 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\msedge.exe 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~2\WINDOW~2\wab.exe 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\NOTIFI~1.EXE 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~2\WINDOW~4\setup_wm.exe 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~2\WINDOW~2\wab.exe 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~3\PACKAG~1\{D87AE~1\WINDOW~1.EXE 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\directx.sys 2024-1~1.EXE File opened for modification C:\Windows\svchost.com 2024-1~1.EXE File opened for modification C:\Windows\directx.sys 2024-1~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 2024-1~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 2024-1~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 2024-1~1.EXE File opened for modification C:\Windows\directx.sys 2024-1~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 2024-1~1.EXE File opened for modification C:\Windows\directx.sys 2024-1~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 2024-1~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 2024-1~1.EXE File opened for modification C:\Windows\directx.sys 2024-1~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 2024-1~1.EXE File opened for modification C:\Windows\svchost.com 2024-1~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 2024-1~1.EXE File opened for modification C:\Windows\svchost.com 2024-1~1.EXE File opened for modification C:\Windows\directx.sys 2024-1~1.EXE File opened for modification C:\Windows\directx.sys 2024-1~1.EXE File opened for modification C:\Windows\svchost.com 2024-1~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 2024-1~1.EXE File opened for modification C:\Windows\svchost.com 2024-1~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 2024-1~1.EXE File opened for modification C:\Windows\svchost.com 2024-1~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 2024-1~1.EXE File opened for modification C:\Windows\svchost.com 2024-1~1.EXE File opened for modification C:\Windows\svchost.com 2024-1~1.EXE File opened for modification C:\Windows\svchost.com 2024-1~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 2024-1~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 2024-1~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 2024-1~1.EXE File opened for modification C:\Windows\svchost.com 2024-1~1.EXE File opened for modification C:\Windows\directx.sys 2024-1~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 2024-1~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 2024-1~1.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-1~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-1~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-1~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-1~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-1~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-1~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-1~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-1~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-1~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-1~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-1~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-1~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-1~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-1~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-1~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-1~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-1~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-1~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-1~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-1~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-1~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-1~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-1~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-1~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-1~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-1~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-1~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 2024-1~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 2024-1~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 2024-1~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 2024-1~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 2024-1~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 2024-1~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 2024-1~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 2024-1~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 2024-1~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 2024-1~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 2024-1~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 2024-1~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 2024-1~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 2024-1~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 2024-1~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 2024-1~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 2024-1~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 2024-1~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 2024-1~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 2024-1~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 2024-1~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 2024-1~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 2024-1~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 2024-1~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 2024-1~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 2024-1~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 2024-1~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 2024-1~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 2024-1~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 2024-1~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 2024-1~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 2024-1~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 2024-1~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 2024-1~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 2024-1~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 2024-1~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 2024-1~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 2024-1~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 2024-1~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 2024-1~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 2024-1~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 2024-1~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 2024-1~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 2024-1~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 2024-1~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 2024-1~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 2024-1~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 2024-1~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 2024-1~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 2024-1~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 2024-1~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 2024-1~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 2024-1~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 2024-1~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 2024-1~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 2024-1~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 2024-1~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 2024-1~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 2024-1~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 2024-1~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 2024-1~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 2024-1~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 2024-1~1.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1576 wrote to memory of 1156 1576 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe 84 PID 1576 wrote to memory of 1156 1576 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe 84 PID 1576 wrote to memory of 1156 1576 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe 84 PID 1156 wrote to memory of 4528 1156 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe 85 PID 1156 wrote to memory of 4528 1156 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe 85 PID 1156 wrote to memory of 4528 1156 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe 85 PID 4528 wrote to memory of 3612 4528 svchost.com 86 PID 4528 wrote to memory of 3612 4528 svchost.com 86 PID 4528 wrote to memory of 3612 4528 svchost.com 86 PID 3612 wrote to memory of 1200 3612 2024-1~1.EXE 87 PID 3612 wrote to memory of 1200 3612 2024-1~1.EXE 87 PID 3612 wrote to memory of 1200 3612 2024-1~1.EXE 87 PID 1200 wrote to memory of 1608 1200 svchost.com 88 PID 1200 wrote to memory of 1608 1200 svchost.com 88 PID 1200 wrote to memory of 1608 1200 svchost.com 88 PID 1608 wrote to memory of 1440 1608 2024-1~1.EXE 89 PID 1608 wrote to memory of 1440 1608 2024-1~1.EXE 89 PID 1608 wrote to memory of 1440 1608 2024-1~1.EXE 89 PID 1440 wrote to memory of 3832 1440 svchost.com 90 PID 1440 wrote to memory of 3832 1440 svchost.com 90 PID 1440 wrote to memory of 3832 1440 svchost.com 90 PID 3832 wrote to memory of 512 3832 2024-1~1.EXE 91 PID 3832 wrote to memory of 512 3832 2024-1~1.EXE 91 PID 3832 wrote to memory of 512 3832 2024-1~1.EXE 91 PID 512 wrote to memory of 2736 512 svchost.com 92 PID 512 wrote to memory of 2736 512 svchost.com 92 PID 512 wrote to memory of 2736 512 svchost.com 92 PID 2736 wrote to memory of 2900 2736 2024-1~1.EXE 93 PID 2736 wrote to memory of 2900 2736 2024-1~1.EXE 93 PID 2736 wrote to memory of 2900 2736 2024-1~1.EXE 93 PID 2900 wrote to memory of 2096 2900 svchost.com 94 PID 2900 wrote to memory of 2096 2900 svchost.com 94 PID 2900 wrote to memory of 2096 2900 svchost.com 94 PID 2096 wrote to memory of 4256 2096 2024-1~1.EXE 95 PID 2096 wrote to memory of 4256 2096 2024-1~1.EXE 95 PID 2096 wrote to memory of 4256 2096 2024-1~1.EXE 95 PID 4256 wrote to memory of 4056 4256 svchost.com 96 PID 4256 wrote to memory of 4056 4256 svchost.com 96 PID 4256 wrote to memory of 4056 4256 svchost.com 96 PID 4056 wrote to memory of 2516 4056 2024-1~1.EXE 97 PID 4056 wrote to memory of 2516 4056 2024-1~1.EXE 97 PID 4056 wrote to memory of 2516 4056 2024-1~1.EXE 97 PID 2516 wrote to memory of 3172 2516 svchost.com 98 PID 2516 wrote to memory of 3172 2516 svchost.com 98 PID 2516 wrote to memory of 3172 2516 svchost.com 98 PID 3172 wrote to memory of 5004 3172 2024-1~1.EXE 99 PID 3172 wrote to memory of 5004 3172 2024-1~1.EXE 99 PID 3172 wrote to memory of 5004 3172 2024-1~1.EXE 99 PID 5004 wrote to memory of 2616 5004 svchost.com 100 PID 5004 wrote to memory of 2616 5004 svchost.com 100 PID 5004 wrote to memory of 2616 5004 svchost.com 100 PID 2616 wrote to memory of 3940 2616 2024-1~1.EXE 170 PID 2616 wrote to memory of 3940 2616 2024-1~1.EXE 170 PID 2616 wrote to memory of 3940 2616 2024-1~1.EXE 170 PID 3940 wrote to memory of 4516 3940 svchost.com 102 PID 3940 wrote to memory of 4516 3940 svchost.com 102 PID 3940 wrote to memory of 4516 3940 svchost.com 102 PID 4516 wrote to memory of 3256 4516 2024-1~1.EXE 103 PID 4516 wrote to memory of 3256 4516 2024-1~1.EXE 103 PID 4516 wrote to memory of 3256 4516 2024-1~1.EXE 103 PID 3256 wrote to memory of 1476 3256 svchost.com 104 PID 3256 wrote to memory of 1476 3256 svchost.com 104 PID 3256 wrote to memory of 1476 3256 svchost.com 104 PID 1476 wrote to memory of 5100 1476 2024-1~1.EXE 211
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe"C:\Users\Admin\AppData\Local\Temp\2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe"1⤵
- Modifies system executable filetype association
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE4⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3612 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"5⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE8⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3832 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:512 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE10⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"11⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"13⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4256 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE14⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4056 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE16⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3172 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE18⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3940 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE20⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4516 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"21⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3256 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE22⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"23⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5100 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE24⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:4712 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"25⤵
- Executes dropped EXE
PID:1396 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE26⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4092 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"27⤵
- Executes dropped EXE
PID:2148 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE28⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:1252 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"29⤵
- Executes dropped EXE
PID:3224 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE30⤵
- Checks computer location settings
- Executes dropped EXE
PID:4132 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"31⤵
- Executes dropped EXE
PID:4348 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE32⤵
- Executes dropped EXE
PID:1188 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"33⤵
- Executes dropped EXE
PID:64 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE34⤵
- Checks computer location settings
- Executes dropped EXE
PID:3824 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"35⤵
- Executes dropped EXE
PID:3636 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE36⤵
- Checks computer location settings
- Executes dropped EXE
PID:3280 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"37⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:708 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE38⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4068 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"39⤵
- Executes dropped EXE
PID:716 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE40⤵
- Executes dropped EXE
PID:4160 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"41⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3468 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE42⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:2904 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"43⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3740 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE44⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1124 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"45⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:876 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE46⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:2072 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"47⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2292 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE48⤵
- Executes dropped EXE
PID:1140 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"49⤵
- Executes dropped EXE
PID:4564 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE50⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4520 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"51⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3880 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE52⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2920 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"53⤵
- Executes dropped EXE
PID:3652 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE54⤵
- Executes dropped EXE
- Modifies registry class
PID:4604 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"55⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4664 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE56⤵
- Executes dropped EXE
PID:3204 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"57⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:60 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE58⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:916 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"59⤵
- Executes dropped EXE
PID:2232 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE60⤵
- Executes dropped EXE
- Modifies registry class
PID:3200 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"61⤵
- Executes dropped EXE
PID:4072 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE62⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:4220 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"63⤵
- Executes dropped EXE
PID:2148 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE64⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3032 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"65⤵
- Executes dropped EXE
PID:2004 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE66⤵
- Drops file in Windows directory
PID:2068 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"67⤵
- System Location Discovery: System Language Discovery
PID:3224 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE68⤵
- Checks computer location settings
- Modifies registry class
PID:2424 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"69⤵
- Drops file in Windows directory
PID:1192 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE70⤵
- Modifies registry class
PID:932 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"71⤵
- Drops file in Windows directory
PID:2512 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE72⤵
- Checks computer location settings
- Modifies registry class
PID:5076 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"73⤵
- System Location Discovery: System Language Discovery
PID:3824 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE74⤵
- System Location Discovery: System Language Discovery
PID:2696 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"75⤵
- System Location Discovery: System Language Discovery
PID:3596 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE76⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:1932 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"77⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4936 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE78⤵
- Modifies registry class
PID:1652 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"79⤵PID:1532
-
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE80⤵
- Checks computer location settings
- Modifies registry class
PID:2508 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"81⤵PID:4636
-
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE82⤵PID:3740
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"83⤵PID:740
-
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE84⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:876 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"85⤵PID:2916
-
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE86⤵PID:2592
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"87⤵PID:2064
-
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE88⤵
- Checks computer location settings
- Drops file in Windows directory
PID:3940 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"89⤵PID:4964
-
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE90⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:5040 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"91⤵
- System Location Discovery: System Language Discovery
PID:4772 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE92⤵
- Modifies registry class
PID:888 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"93⤵PID:2060
-
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE94⤵
- Checks computer location settings
- Modifies registry class
PID:3268 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"95⤵
- Drops file in Windows directory
PID:3936 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE96⤵
- System Location Discovery: System Language Discovery
PID:3204 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"97⤵PID:1396
-
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE98⤵
- Modifies registry class
PID:4336 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"99⤵PID:4508
-
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE100⤵
- Checks computer location settings
- Modifies registry class
PID:2472 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"101⤵PID:1916
-
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE102⤵PID:4660
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"103⤵PID:3248
-
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE104⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1764 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"105⤵PID:3628
-
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE106⤵
- Checks computer location settings
- Drops file in Windows directory
PID:4132 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"107⤵PID:1160
-
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE108⤵
- Checks computer location settings
PID:2716 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"109⤵PID:4268
-
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE110⤵
- Checks computer location settings
PID:1556 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"111⤵
- System Location Discovery: System Language Discovery
PID:3384 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE112⤵
- Drops file in Windows directory
PID:5076 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"113⤵PID:4240
-
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE114⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:708 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"115⤵PID:1908
-
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE116⤵
- Modifies registry class
PID:2480 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"117⤵PID:4936
-
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE118⤵
- Modifies registry class
PID:4736 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"119⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1836 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE120⤵
- Checks computer location settings
- Drops file in Windows directory
PID:2552 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"121⤵PID:2344
-
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE122⤵
- Checks computer location settings
PID:456
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-