Analysis
-
max time kernel
95s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-12-2024 05:24
Behavioral task
behavioral1
Sample
bf138d875d511ee480e026ff5b7875182fde703bc1df6f84c316f0a7775e45b0N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
bf138d875d511ee480e026ff5b7875182fde703bc1df6f84c316f0a7775e45b0N.exe
Resource
win10v2004-20241007-en
General
-
Target
bf138d875d511ee480e026ff5b7875182fde703bc1df6f84c316f0a7775e45b0N.exe
-
Size
186KB
-
MD5
e14a06b2ad96a52868902869a5f13e90
-
SHA1
20c3915c279a8703f1cdab644a9185e65987df7f
-
SHA256
bf138d875d511ee480e026ff5b7875182fde703bc1df6f84c316f0a7775e45b0
-
SHA512
a5990276f674bb39942bfe87357d5b40edeb85502e6d388ffcb1c094f55dabdd1cfc402369bfea9bc4bfa72fee139c24f40d28c95fcd253e43d7afa53b546f30
-
SSDEEP
3072:sr85CkkbAYn2GgYlBYN2fHYTo+JZr85Czr85C:k9xbAMpgY3gTD9P9
Malware Config
Signatures
-
Detect Neshta payload 64 IoCs
resource yara_rule behavioral2/files/0x0008000000023cb6-4.dat family_neshta behavioral2/files/0x0007000000023cbb-10.dat family_neshta behavioral2/memory/3108-16-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2392-27-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1316-28-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1304-31-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/412-40-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2156-44-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3776-52-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2772-56-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/776-64-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2024-68-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2368-76-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2136-80-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4436-88-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0004000000020368-90.dat family_neshta behavioral2/files/0x00070000000202a3-95.dat family_neshta behavioral2/memory/3820-110-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0006000000020237-109.dat family_neshta behavioral2/files/0x0006000000020241-108.dat family_neshta behavioral2/files/0x00010000000202b4-122.dat family_neshta behavioral2/files/0x00010000000202cc-119.dat family_neshta behavioral2/files/0x000400000002035b-118.dat family_neshta behavioral2/files/0x00010000000202b9-117.dat family_neshta behavioral2/memory/2300-126-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/740-130-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3244-138-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/512-148-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x000800000002025a-152.dat family_neshta behavioral2/files/0x0001000000021500-165.dat family_neshta behavioral2/memory/4924-169-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0001000000022f57-188.dat family_neshta behavioral2/files/0x0001000000022f94-185.dat family_neshta behavioral2/files/0x0001000000022f52-184.dat family_neshta behavioral2/files/0x0001000000021501-168.dat family_neshta behavioral2/files/0x00010000000214ff-164.dat family_neshta behavioral2/memory/2020-193-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0001000000022f95-191.dat family_neshta behavioral2/files/0x00010000000167b8-200.dat family_neshta behavioral2/files/0x000100000001680a-199.dat family_neshta behavioral2/memory/3140-215-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2052-237-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/5068-242-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4656-244-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4844-268-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3012-270-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2872-282-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4340-284-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3848-296-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4508-298-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4920-304-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1316-306-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2280-312-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3524-314-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3604-320-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2412-322-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/5000-328-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3180-335-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4064-336-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4432-338-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/5048-344-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2368-351-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1448-352-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2736-354-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation BF138D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation BF138D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation BF138D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation BF138D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation BF138D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation BF138D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation BF138D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation BF138D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation BF138D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation BF138D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation BF138D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation BF138D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation BF138D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation BF138D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation BF138D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation BF138D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation BF138D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation BF138D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation BF138D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation BF138D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation BF138D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation BF138D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation BF138D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation BF138D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation BF138D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation BF138D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation BF138D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation BF138D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation BF138D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation BF138D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation BF138D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation BF138D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation BF138D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation BF138D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation BF138D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation BF138D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation BF138D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation BF138D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation BF138D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation BF138D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation BF138D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation BF138D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation BF138D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation BF138D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation BF138D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation BF138D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation BF138D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation BF138D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation BF138D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation BF138D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation BF138D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation BF138D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation BF138D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation BF138D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation BF138D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation BF138D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation BF138D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation BF138D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation BF138D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation BF138D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation BF138D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation BF138D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation BF138D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation BF138D~1.EXE -
Executes dropped EXE 64 IoCs
pid Process 720 bf138d875d511ee480e026ff5b7875182fde703bc1df6f84c316f0a7775e45b0N.exe 3108 svchost.com 2392 BF138D~1.EXE 1316 svchost.com 1304 BF138D~1.EXE 412 svchost.com 2156 BF138D~1.EXE 3776 svchost.com 2772 BF138D~1.EXE 776 svchost.com 2024 BF138D~1.EXE 2368 svchost.com 2136 BF138D~1.EXE 4436 svchost.com 3820 BF138D~1.EXE 2300 svchost.com 740 BF138D~1.EXE 3244 svchost.com 512 BF138D~1.EXE 4924 svchost.com 2020 BF138D~1.EXE 3140 svchost.com 2052 BF138D~1.EXE 5068 svchost.com 4656 BF138D~1.EXE 4844 svchost.com 3012 BF138D~1.EXE 2872 svchost.com 4340 BF138D~1.EXE 3848 svchost.com 4508 BF138D~1.EXE 4920 svchost.com 1316 BF138D~1.EXE 2280 svchost.com 3524 BF138D~1.EXE 3604 svchost.com 2412 BF138D~1.EXE 5000 svchost.com 3180 BF138D~1.EXE 4064 svchost.com 4432 BF138D~1.EXE 5048 svchost.com 2368 BF138D~1.EXE 1448 svchost.com 2736 BF138D~1.EXE 4468 svchost.com 572 BF138D~1.EXE 2688 svchost.com 1932 BF138D~1.EXE 1736 svchost.com 2940 BF138D~1.EXE 3744 svchost.com 724 BF138D~1.EXE 1908 svchost.com 4544 BF138D~1.EXE 3752 svchost.com 2324 BF138D~1.EXE 1904 svchost.com 3664 BF138D~1.EXE 1108 svchost.com 4480 BF138D~1.EXE 4908 svchost.com 2624 BF138D~1.EXE 224 svchost.com -
Modifies system executable filetype association 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" bf138d875d511ee480e026ff5b7875182fde703bc1df6f84c316f0a7775e45b0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" BF138D~1.EXE -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE bf138d875d511ee480e026ff5b7875182fde703bc1df6f84c316f0a7775e45b0N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE bf138d875d511ee480e026ff5b7875182fde703bc1df6f84c316f0a7775e45b0N.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOF5E2~1.EXE bf138d875d511ee480e026ff5b7875182fde703bc1df6f84c316f0a7775e45b0N.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe bf138d875d511ee480e026ff5b7875182fde703bc1df6f84c316f0a7775e45b0N.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MID1AD~1.EXE bf138d875d511ee480e026ff5b7875182fde703bc1df6f84c316f0a7775e45b0N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE bf138d875d511ee480e026ff5b7875182fde703bc1df6f84c316f0a7775e45b0N.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe BF138D~1.EXE File opened for modification C:\PROGRA~2\WINDOW~2\wab.exe BF138D~1.EXE File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe bf138d875d511ee480e026ff5b7875182fde703bc1df6f84c316f0a7775e45b0N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~3.EXE bf138d875d511ee480e026ff5b7875182fde703bc1df6f84c316f0a7775e45b0N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{63880~1\WINDOW~1.EXE bf138d875d511ee480e026ff5b7875182fde703bc1df6f84c316f0a7775e45b0N.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe BF138D~1.EXE File opened for modification C:\PROGRA~2\WINDOW~4\wmlaunch.exe BF138D~1.EXE File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaws.exe bf138d875d511ee480e026ff5b7875182fde703bc1df6f84c316f0a7775e45b0N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~2.EXE bf138d875d511ee480e026ff5b7875182fde703bc1df6f84c316f0a7775e45b0N.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE bf138d875d511ee480e026ff5b7875182fde703bc1df6f84c316f0a7775e45b0N.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe bf138d875d511ee480e026ff5b7875182fde703bc1df6f84c316f0a7775e45b0N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\PWAHEL~1.EXE bf138d875d511ee480e026ff5b7875182fde703bc1df6f84c316f0a7775e45b0N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Eula.exe bf138d875d511ee480e026ff5b7875182fde703bc1df6f84c316f0a7775e45b0N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE bf138d875d511ee480e026ff5b7875182fde703bc1df6f84c316f0a7775e45b0N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\64BITM~1.EXE bf138d875d511ee480e026ff5b7875182fde703bc1df6f84c316f0a7775e45b0N.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MI9C33~1.EXE bf138d875d511ee480e026ff5b7875182fde703bc1df6f84c316f0a7775e45b0N.exe File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe bf138d875d511ee480e026ff5b7875182fde703bc1df6f84c316f0a7775e45b0N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\IDENTI~1.EXE bf138d875d511ee480e026ff5b7875182fde703bc1df6f84c316f0a7775e45b0N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\NOTIFI~1.EXE bf138d875d511ee480e026ff5b7875182fde703bc1df6f84c316f0a7775e45b0N.exe File opened for modification C:\PROGRA~2\WINDOW~2\wab.exe bf138d875d511ee480e026ff5b7875182fde703bc1df6f84c316f0a7775e45b0N.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe bf138d875d511ee480e026ff5b7875182fde703bc1df6f84c316f0a7775e45b0N.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe BF138D~1.EXE File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe bf138d875d511ee480e026ff5b7875182fde703bc1df6f84c316f0a7775e45b0N.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~3.EXE bf138d875d511ee480e026ff5b7875182fde703bc1df6f84c316f0a7775e45b0N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\MSEDGE~1.EXE bf138d875d511ee480e026ff5b7875182fde703bc1df6f84c316f0a7775e45b0N.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe bf138d875d511ee480e026ff5b7875182fde703bc1df6f84c316f0a7775e45b0N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE bf138d875d511ee480e026ff5b7875182fde703bc1df6f84c316f0a7775e45b0N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\64BITM~1.EXE bf138d875d511ee480e026ff5b7875182fde703bc1df6f84c316f0a7775e45b0N.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOBD5D~1.EXE bf138d875d511ee480e026ff5b7875182fde703bc1df6f84c316f0a7775e45b0N.exe File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe BF138D~1.EXE File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\arh.exe bf138d875d511ee480e026ff5b7875182fde703bc1df6f84c316f0a7775e45b0N.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE bf138d875d511ee480e026ff5b7875182fde703bc1df6f84c316f0a7775e45b0N.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~1.EXE bf138d875d511ee480e026ff5b7875182fde703bc1df6f84c316f0a7775e45b0N.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe bf138d875d511ee480e026ff5b7875182fde703bc1df6f84c316f0a7775e45b0N.exe File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe BF138D~1.EXE File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaw.exe bf138d875d511ee480e026ff5b7875182fde703bc1df6f84c316f0a7775e45b0N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~1.EXE bf138d875d511ee480e026ff5b7875182fde703bc1df6f84c316f0a7775e45b0N.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~1.EXE bf138d875d511ee480e026ff5b7875182fde703bc1df6f84c316f0a7775e45b0N.exe File opened for modification C:\PROGRA~3\Adobe\Setup\{AC76B~1\setup.exe bf138d875d511ee480e026ff5b7875182fde703bc1df6f84c316f0a7775e45b0N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{D87AE~1\WINDOW~1.EXE bf138d875d511ee480e026ff5b7875182fde703bc1df6f84c316f0a7775e45b0N.exe File opened for modification C:\PROGRA~2\WINDOW~3\ACCESS~1\wordpad.exe BF138D~1.EXE File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE bf138d875d511ee480e026ff5b7875182fde703bc1df6f84c316f0a7775e45b0N.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaws.exe bf138d875d511ee480e026ff5b7875182fde703bc1df6f84c316f0a7775e45b0N.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~2.EXE bf138d875d511ee480e026ff5b7875182fde703bc1df6f84c316f0a7775e45b0N.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmprph.exe bf138d875d511ee480e026ff5b7875182fde703bc1df6f84c316f0a7775e45b0N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE bf138d875d511ee480e026ff5b7875182fde703bc1df6f84c316f0a7775e45b0N.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe BF138D~1.EXE File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE bf138d875d511ee480e026ff5b7875182fde703bc1df6f84c316f0a7775e45b0N.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MID1AD~1.EXE bf138d875d511ee480e026ff5b7875182fde703bc1df6f84c316f0a7775e45b0N.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MI9C33~1.EXE bf138d875d511ee480e026ff5b7875182fde703bc1df6f84c316f0a7775e45b0N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exe bf138d875d511ee480e026ff5b7875182fde703bc1df6f84c316f0a7775e45b0N.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~4.EXE bf138d875d511ee480e026ff5b7875182fde703bc1df6f84c316f0a7775e45b0N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF5AF~1\WINDOW~1.EXE bf138d875d511ee480e026ff5b7875182fde703bc1df6f84c316f0a7775e45b0N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exe bf138d875d511ee480e026ff5b7875182fde703bc1df6f84c316f0a7775e45b0N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\ELEVAT~1.EXE bf138d875d511ee480e026ff5b7875182fde703bc1df6f84c316f0a7775e45b0N.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~3.EXE bf138d875d511ee480e026ff5b7875182fde703bc1df6f84c316f0a7775e45b0N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF5AF~1\WINDOW~1.EXE bf138d875d511ee480e026ff5b7875182fde703bc1df6f84c316f0a7775e45b0N.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaw.exe bf138d875d511ee480e026ff5b7875182fde703bc1df6f84c316f0a7775e45b0N.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com BF138D~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys BF138D~1.EXE File opened for modification C:\Windows\directx.sys BF138D~1.EXE File opened for modification C:\Windows\directx.sys BF138D~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys BF138D~1.EXE File opened for modification C:\Windows\svchost.com BF138D~1.EXE File opened for modification C:\Windows\directx.sys BF138D~1.EXE File opened for modification C:\Windows\directx.sys BF138D~1.EXE File opened for modification C:\Windows\svchost.com BF138D~1.EXE File opened for modification C:\Windows\directx.sys BF138D~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com BF138D~1.EXE File opened for modification C:\Windows\svchost.com BF138D~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com BF138D~1.EXE File opened for modification C:\Windows\svchost.com BF138D~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com BF138D~1.EXE File opened for modification C:\Windows\svchost.com BF138D~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com BF138D~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com BF138D~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com BF138D~1.EXE File opened for modification C:\Windows\directx.sys BF138D~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com BF138D~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com BF138D~1.EXE File opened for modification C:\Windows\directx.sys BF138D~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com BF138D~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys BF138D~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys BF138D~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys BF138D~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com BF138D~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BF138D~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BF138D~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BF138D~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BF138D~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BF138D~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BF138D~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BF138D~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BF138D~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BF138D~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BF138D~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BF138D~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BF138D~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BF138D~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BF138D~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BF138D~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BF138D~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BF138D~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BF138D~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BF138D~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BF138D~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BF138D~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BF138D~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BF138D~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BF138D~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BF138D~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BF138D~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BF138D~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BF138D~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BF138D~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BF138D~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BF138D~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BF138D~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BF138D~1.EXE -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings BF138D~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings BF138D~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings BF138D~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings BF138D~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings BF138D~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings BF138D~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings BF138D~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings BF138D~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings BF138D~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings BF138D~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings BF138D~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings BF138D~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings BF138D~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings BF138D~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings BF138D~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings BF138D~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings BF138D~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings BF138D~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings BF138D~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings BF138D~1.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" BF138D~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings BF138D~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings BF138D~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings BF138D~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings BF138D~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings BF138D~1.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" bf138d875d511ee480e026ff5b7875182fde703bc1df6f84c316f0a7775e45b0N.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings BF138D~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings BF138D~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings BF138D~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings BF138D~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings BF138D~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings BF138D~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings BF138D~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings BF138D~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings BF138D~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings BF138D~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings BF138D~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings BF138D~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings BF138D~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings BF138D~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings BF138D~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings BF138D~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings BF138D~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings BF138D~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings BF138D~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings BF138D~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings BF138D~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings BF138D~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings BF138D~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings bf138d875d511ee480e026ff5b7875182fde703bc1df6f84c316f0a7775e45b0N.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings BF138D~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings BF138D~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings BF138D~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings BF138D~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings BF138D~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings BF138D~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings BF138D~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings BF138D~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings BF138D~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings BF138D~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings BF138D~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings BF138D~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings BF138D~1.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1048 wrote to memory of 720 1048 bf138d875d511ee480e026ff5b7875182fde703bc1df6f84c316f0a7775e45b0N.exe 82 PID 1048 wrote to memory of 720 1048 bf138d875d511ee480e026ff5b7875182fde703bc1df6f84c316f0a7775e45b0N.exe 82 PID 1048 wrote to memory of 720 1048 bf138d875d511ee480e026ff5b7875182fde703bc1df6f84c316f0a7775e45b0N.exe 82 PID 720 wrote to memory of 3108 720 bf138d875d511ee480e026ff5b7875182fde703bc1df6f84c316f0a7775e45b0N.exe 83 PID 720 wrote to memory of 3108 720 bf138d875d511ee480e026ff5b7875182fde703bc1df6f84c316f0a7775e45b0N.exe 83 PID 720 wrote to memory of 3108 720 bf138d875d511ee480e026ff5b7875182fde703bc1df6f84c316f0a7775e45b0N.exe 83 PID 3108 wrote to memory of 2392 3108 svchost.com 84 PID 3108 wrote to memory of 2392 3108 svchost.com 84 PID 3108 wrote to memory of 2392 3108 svchost.com 84 PID 2392 wrote to memory of 1316 2392 BF138D~1.EXE 114 PID 2392 wrote to memory of 1316 2392 BF138D~1.EXE 114 PID 2392 wrote to memory of 1316 2392 BF138D~1.EXE 114 PID 1316 wrote to memory of 1304 1316 svchost.com 86 PID 1316 wrote to memory of 1304 1316 svchost.com 86 PID 1316 wrote to memory of 1304 1316 svchost.com 86 PID 1304 wrote to memory of 412 1304 BF138D~1.EXE 87 PID 1304 wrote to memory of 412 1304 BF138D~1.EXE 87 PID 1304 wrote to memory of 412 1304 BF138D~1.EXE 87 PID 412 wrote to memory of 2156 412 svchost.com 88 PID 412 wrote to memory of 2156 412 svchost.com 88 PID 412 wrote to memory of 2156 412 svchost.com 88 PID 2156 wrote to memory of 3776 2156 BF138D~1.EXE 89 PID 2156 wrote to memory of 3776 2156 BF138D~1.EXE 89 PID 2156 wrote to memory of 3776 2156 BF138D~1.EXE 89 PID 3776 wrote to memory of 2772 3776 svchost.com 90 PID 3776 wrote to memory of 2772 3776 svchost.com 90 PID 3776 wrote to memory of 2772 3776 svchost.com 90 PID 2772 wrote to memory of 776 2772 BF138D~1.EXE 91 PID 2772 wrote to memory of 776 2772 BF138D~1.EXE 91 PID 2772 wrote to memory of 776 2772 BF138D~1.EXE 91 PID 776 wrote to memory of 2024 776 svchost.com 92 PID 776 wrote to memory of 2024 776 svchost.com 92 PID 776 wrote to memory of 2024 776 svchost.com 92 PID 2024 wrote to memory of 2368 2024 BF138D~1.EXE 124 PID 2024 wrote to memory of 2368 2024 BF138D~1.EXE 124 PID 2024 wrote to memory of 2368 2024 BF138D~1.EXE 124 PID 2368 wrote to memory of 2136 2368 svchost.com 94 PID 2368 wrote to memory of 2136 2368 svchost.com 94 PID 2368 wrote to memory of 2136 2368 svchost.com 94 PID 2136 wrote to memory of 4436 2136 BF138D~1.EXE 95 PID 2136 wrote to memory of 4436 2136 BF138D~1.EXE 95 PID 2136 wrote to memory of 4436 2136 BF138D~1.EXE 95 PID 4436 wrote to memory of 3820 4436 svchost.com 96 PID 4436 wrote to memory of 3820 4436 svchost.com 96 PID 4436 wrote to memory of 3820 4436 svchost.com 96 PID 3820 wrote to memory of 2300 3820 BF138D~1.EXE 97 PID 3820 wrote to memory of 2300 3820 BF138D~1.EXE 97 PID 3820 wrote to memory of 2300 3820 BF138D~1.EXE 97 PID 2300 wrote to memory of 740 2300 svchost.com 98 PID 2300 wrote to memory of 740 2300 svchost.com 98 PID 2300 wrote to memory of 740 2300 svchost.com 98 PID 740 wrote to memory of 3244 740 BF138D~1.EXE 99 PID 740 wrote to memory of 3244 740 BF138D~1.EXE 99 PID 740 wrote to memory of 3244 740 BF138D~1.EXE 99 PID 3244 wrote to memory of 512 3244 svchost.com 100 PID 3244 wrote to memory of 512 3244 svchost.com 100 PID 3244 wrote to memory of 512 3244 svchost.com 100 PID 512 wrote to memory of 4924 512 BF138D~1.EXE 101 PID 512 wrote to memory of 4924 512 BF138D~1.EXE 101 PID 512 wrote to memory of 4924 512 BF138D~1.EXE 101 PID 4924 wrote to memory of 2020 4924 svchost.com 102 PID 4924 wrote to memory of 2020 4924 svchost.com 102 PID 4924 wrote to memory of 2020 4924 svchost.com 102 PID 2020 wrote to memory of 3140 2020 BF138D~1.EXE 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\bf138d875d511ee480e026ff5b7875182fde703bc1df6f84c316f0a7775e45b0N.exe"C:\Users\Admin\AppData\Local\Temp\bf138d875d511ee480e026ff5b7875182fde703bc1df6f84c316f0a7775e45b0N.exe"1⤵
- Modifies system executable filetype association
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Users\Admin\AppData\Local\Temp\3582-490\bf138d875d511ee480e026ff5b7875182fde703bc1df6f84c316f0a7775e45b0N.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\bf138d875d511ee480e026ff5b7875182fde703bc1df6f84c316f0a7775e45b0N.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:720 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE"3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3108 -
C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE6⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:412 -
C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE8⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE"9⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3776 -
C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE10⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE"11⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:776 -
C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE12⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE"13⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE"15⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4436 -
C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE16⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3820 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE"17⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE18⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:740 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3244 -
C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE20⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:512 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE22⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE"23⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3140 -
C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE24⤵
- Executes dropped EXE
PID:2052 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE"25⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:5068 -
C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE26⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4656 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE"27⤵
- Executes dropped EXE
PID:4844 -
C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE28⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3012 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE"29⤵
- Executes dropped EXE
PID:2872 -
C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE30⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4340 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE"31⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3848 -
C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE32⤵
- Checks computer location settings
- Executes dropped EXE
PID:4508 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE"33⤵
- Executes dropped EXE
PID:4920 -
C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE34⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:1316 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE"35⤵
- Executes dropped EXE
PID:2280 -
C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE36⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3524 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE"37⤵
- Executes dropped EXE
PID:3604 -
C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE38⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:2412 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE"39⤵
- Executes dropped EXE
PID:5000 -
C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE40⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3180 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE"41⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4064 -
C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE42⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4432 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE"43⤵
- Executes dropped EXE
PID:5048 -
C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE44⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2368 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE"45⤵
- Executes dropped EXE
PID:1448 -
C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE46⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2736 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE"47⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4468 -
C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE48⤵
- Executes dropped EXE
- Modifies registry class
PID:572 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE"49⤵
- Executes dropped EXE
PID:2688 -
C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE50⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1932 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE"51⤵
- Executes dropped EXE
PID:1736 -
C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE52⤵
- Executes dropped EXE
PID:2940 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE"53⤵
- Executes dropped EXE
PID:3744 -
C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE54⤵
- Executes dropped EXE
PID:724 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE"55⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1908 -
C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE56⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4544 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE"57⤵
- Executes dropped EXE
PID:3752 -
C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE58⤵
- Executes dropped EXE
- Modifies registry class
PID:2324 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE"59⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1904 -
C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE60⤵
- Executes dropped EXE
PID:3664 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE"61⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1108 -
C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE62⤵
- Executes dropped EXE
PID:4480 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE"63⤵
- Executes dropped EXE
PID:4908 -
C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE64⤵
- Checks computer location settings
- Executes dropped EXE
PID:2624 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE"65⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:224 -
C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE66⤵PID:3116
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE"67⤵PID:4656
-
C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE68⤵
- Modifies registry class
PID:3000 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE"69⤵
- Drops file in Windows directory
PID:4880 -
C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE70⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:656 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE"71⤵
- Drops file in Windows directory
PID:4288 -
C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE72⤵PID:3992
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE"73⤵
- System Location Discovery: System Language Discovery
PID:3936 -
C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE74⤵
- Checks computer location settings
- Drops file in Windows directory
- Modifies registry class
PID:2388 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE"75⤵PID:4616
-
C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE76⤵
- Checks computer location settings
- Drops file in Windows directory
PID:1840 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE"77⤵PID:1316
-
C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE78⤵
- Drops file in Windows directory
PID:548 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE"79⤵
- Drops file in Windows directory
PID:4900 -
C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE80⤵
- Modifies registry class
PID:1648 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE"81⤵PID:3392
-
C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE82⤵PID:752
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE"83⤵
- System Location Discovery: System Language Discovery
PID:3180 -
C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE84⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1856 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE"85⤵PID:3956
-
C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE86⤵
- Modifies system executable filetype association
- Drops file in Program Files directory
- Modifies registry class
PID:4612 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE"87⤵
- Drops file in Windows directory
PID:780 -
C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE88⤵
- Modifies registry class
PID:3156 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE"89⤵PID:1184
-
C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE90⤵PID:4932
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE"91⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3224 -
C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE92⤵PID:3448
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE"93⤵
- System Location Discovery: System Language Discovery
PID:2688 -
C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE94⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:2236 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE"95⤵PID:2484
-
C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE96⤵
- Checks computer location settings
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2728 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE"97⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3668 -
C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE98⤵PID:2940
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE"99⤵
- Drops file in Windows directory
PID:3580 -
C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE100⤵
- Drops file in Windows directory
- Modifies registry class
PID:3544 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE"101⤵PID:1908
-
C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE102⤵
- Checks computer location settings
PID:1612 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE"103⤵PID:228
-
C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE104⤵PID:3044
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE"105⤵PID:2516
-
C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE106⤵
- Checks computer location settings
- Modifies registry class
PID:1112 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE"107⤵
- Drops file in Windows directory
PID:3696 -
C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE108⤵
- System Location Discovery: System Language Discovery
PID:1244 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE"109⤵PID:3788
-
C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE110⤵
- Modifies registry class
PID:4620 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE"111⤵PID:2344
-
C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE112⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:112 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE"113⤵PID:672
-
C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE114⤵PID:3080
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE"115⤵
- System Location Discovery: System Language Discovery
PID:4528 -
C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE116⤵
- Drops file in Windows directory
PID:1528 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE"117⤵PID:4532
-
C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE118⤵
- Modifies registry class
PID:656 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE"119⤵
- Drops file in Windows directory
PID:4452 -
C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE120⤵
- Checks computer location settings
PID:3848 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE"121⤵
- Drops file in Windows directory
PID:2152 -
C:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BF138D~1.EXE122⤵PID:2388
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-