Analysis
-
max time kernel
93s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-12-2024 00:53
Behavioral task
behavioral1
Sample
36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe
Resource
win10v2004-20241007-en
General
-
Target
36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe
-
Size
541KB
-
MD5
6b906d57676cc916d404cc88fef0c590
-
SHA1
e368ca486debf6f912924dfc11df3b64983e1b2b
-
SHA256
36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6
-
SHA512
4655ff302552ae86f9fb0c9c7db9f454a522fcf8c004224db7ea58da5e9ff58770c934a5399645887a78a2d068baa6c516b172c37190c5304a7beebe918fbad2
-
SSDEEP
6144:k9BmAQIPvTmaEVmP02yCUE+cw0wIceA4D55qv4t/uBmohChYgXP6RIeLWKiBlwq:9AQIXqaE0yCgqwXeAVmoEAlLViBlwq
Malware Config
Signatures
-
Detect Neshta payload 4 IoCs
resource yara_rule behavioral2/files/0x0006000000020228-15.dat family_neshta behavioral2/memory/3372-95-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3372-96-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3372-98-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe -
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE 1 IoCs
pid Process 3900 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~3.EXE 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\MSEDGE~1.EXE 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe File opened for modification C:\PROGRA~2\WINDOW~4\setup_wm.exe 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe File opened for modification C:\PROGRA~3\Adobe\Setup\{AC76B~1\setup.exe 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\32BITM~1.EXE 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GO664E~1.EXE 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~2.EXE 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exe 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\FULLTR~1.EXE 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\IDENTI~1.EXE 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~3.EXE 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MID1AD~1.EXE 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MI9C33~1.EXE 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\arh.exe 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaureg.exe 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\BHO\IE_TO_~1.EXE 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~2.EXE 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\64BITM~1.EXE 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~3.EXE 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe File opened for modification C:\PROGRA~2\WINDOW~2\wabmig.exe 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe File opened for modification C:\PROGRA~3\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaw.exe 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOF5E2~1.EXE 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\msedge.exe 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~4.EXE 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exe 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Browser\WCCHRO~1\WCCHRO~1.EXE 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe File opened for modification C:\PROGRA~2\WINDOW~2\wab.exe 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmlaunch.exe 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe File opened for modification C:\PROGRA~2\WINDOW~3\ACCESS~1\wordpad.exe 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADOBEC~1.EXE 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\ELEVAT~1.EXE 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{D87AE~1\WINDOW~1.EXE 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\PWAHEL~1.EXE 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~1.EXE 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmprph.exe 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Eula.exe 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\COOKIE~1.EXE 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\NOTIFI~1.EXE 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\msedge.exe 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\AdobeARM.exe 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaws.exe 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~1.EXE 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MIA062~1.EXE 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF5AF~1\WINDOW~1.EXE 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\svchost.com 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe -
Modifies registry class 53 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{A91E0BDD-79B0-42C5-A3A0-5BE434329577}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{A91E0BDD-79B0-42C5-A3A0-5BE434329577}\TypeLib\ = "{66DBA565-0D3D-4D8A-9391-A2A4CF16DF40}" 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{C41B1461-3F8C-4666-B512-6DF24DE566D1}\Programmable 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{A91E0BDD-79B0-42C5-A3A0-5BE434329577}\ = "ICphsSession" 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{A91E0BDD-79B0-42C5-A3A0-5BE434329577}\TypeLib 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IntelCpHeciSvc.CphsSession.1\CLSID 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IntelCpHeciSvc.CphsSession 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{C41B1461-3F8C-4666-B512-6DF24DE566D1}\AppID = "{11AC3232-E7D7-49CD-ABFE-501700100B3A}" 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{C41B1461-3F8C-4666-B512-6DF24DE566D1}\TypeLib 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{A91E0BDD-79B0-42C5-A3A0-5BE434329577}\ProxyStubClsid32 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A91E0BDD-79B0-42C5-A3A0-5BE434329577}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{A91E0BDD-79B0-42C5-A3A0-5BE434329577} 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{11AC3232-E7D7-49CD-ABFE-501700100B3A} 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{C41B1461-3F8C-4666-B512-6DF24DE566D1}\ProgID 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{66DBA565-0D3D-4D8A-9391-A2A4CF16DF40}\1.0\0\win64 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{66DBA565-0D3D-4D8A-9391-A2A4CF16DF40}\1.0\HELPDIR\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\3582-490" 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{C41B1461-3F8C-4666-B512-6DF24DE566D1}\VersionIndependentProgID 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{C41B1461-3F8C-4666-B512-6DF24DE566D1}\TypeLib\ = "{66DBA565-0D3D-4D8A-9391-A2A4CF16DF40}" 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IntelCpHeciSvc.CphsSession\CurVer\ = "IntelCpHeciSvc.CphsSession.1" 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\IntelCpHeciSvc.EXE 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{66DBA565-0D3D-4D8A-9391-A2A4CF16DF40}\1.0\FLAGS 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{66DBA565-0D3D-4D8A-9391-A2A4CF16DF40}\1.0\0\win64\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\3582-490\\36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe" 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{A91E0BDD-79B0-42C5-A3A0-5BE434329577}\TypeLib\Version = "1.0" 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{66DBA565-0D3D-4D8A-9391-A2A4CF16DF40}\1.0\0 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IntelCpHeciSvc.CphsSession.1\ = "CphsSession Class" 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{C41B1461-3F8C-4666-B512-6DF24DE566D1}\VersionIndependentProgID\ = "IntelCpHeciSvc.CphsSession" 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{66DBA565-0D3D-4D8A-9391-A2A4CF16DF40}\1.0\ = "IntelCpHeciSvcLib" 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{C41B1461-3F8C-4666-B512-6DF24DE566D1} 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{C41B1461-3F8C-4666-B512-6DF24DE566D1}\LocalServer32 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{66DBA565-0D3D-4D8A-9391-A2A4CF16DF40}\1.0 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A91E0BDD-79B0-42C5-A3A0-5BE434329577} 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IntelCpHeciSvc.CphsSession\CLSID 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{C41B1461-3F8C-4666-B512-6DF24DE566D1}\LocalServer32\ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\3582-490\\36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe\"" 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A91E0BDD-79B0-42C5-A3A0-5BE434329577}\ = "ICphsSession" 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{11AC3232-E7D7-49CD-ABFE-501700100B3A}\ = "IntelCpHeciSvc" 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\IntelCpHeciSvc.EXE\AppID = "{11AC3232-E7D7-49CD-ABFE-501700100B3A}" 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{11AC3232-E7D7-49CD-ABFE-501700100B3A}\LaunchPermission = 010014809c000000ac000000140000003000000002001c0001000000110014000400000001010000000000100010000002006c0003000000000014000b000000010100000000000100000000000018000b000000010200000000000f0200000001000000000038000b000000010a00000000000f0300000000040000ce4a9359b9cf0b7575c0f29bb2b4c298d446ddf9027a87ec14651177d6e996550102000000000005200000002002000001020000000000052000000020020000 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IntelCpHeciSvc.CphsSession.1\CLSID\ = "{C41B1461-3F8C-4666-B512-6DF24DE566D1}" 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IntelCpHeciSvc.CphsSession\CLSID\ = "{C41B1461-3F8C-4666-B512-6DF24DE566D1}" 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IntelCpHeciSvc.CphsSession\CurVer 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{C41B1461-3F8C-4666-B512-6DF24DE566D1}\ProgID\ = "IntelCpHeciSvc.CphsSession.1" 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A91E0BDD-79B0-42C5-A3A0-5BE434329577}\ProxyStubClsid32 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A91E0BDD-79B0-42C5-A3A0-5BE434329577}\TypeLib 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A91E0BDD-79B0-42C5-A3A0-5BE434329577}\TypeLib\Version = "1.0" 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{11AC3232-E7D7-49CD-ABFE-501700100B3A}\LocalService = "cphs" 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IntelCpHeciSvc.CphsSession\ = "CphsSession Class" 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{C41B1461-3F8C-4666-B512-6DF24DE566D1}\ = "CphsSession Class" 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{66DBA565-0D3D-4D8A-9391-A2A4CF16DF40}\1.0\FLAGS\ = "0" 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{66DBA565-0D3D-4D8A-9391-A2A4CF16DF40}\1.0\HELPDIR 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A91E0BDD-79B0-42C5-A3A0-5BE434329577}\TypeLib\ = "{66DBA565-0D3D-4D8A-9391-A2A4CF16DF40}" 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IntelCpHeciSvc.CphsSession.1 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{66DBA565-0D3D-4D8A-9391-A2A4CF16DF40} 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3372 wrote to memory of 3900 3372 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe 83 PID 3372 wrote to memory of 3900 3372 36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe"C:\Users\Admin\AppData\Local\Temp\36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe"1⤵
- Checks computer location settings
- Modifies system executable filetype association
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3372 -
C:\Users\Admin\AppData\Local\Temp\3582-490\36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe"2⤵
- Executes dropped EXE
- Modifies registry class
PID:3900
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Event Triggered Execution
2Change Default File Association
1Component Object Model Hijacking
1Privilege Escalation
Event Triggered Execution
2Change Default File Association
1Component Object Model Hijacking
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
86KB
MD53b73078a714bf61d1c19ebc3afc0e454
SHA19abeabd74613a2f533e2244c9ee6f967188e4e7e
SHA256ded54d1fcca07b6bff2bc3b9a1131eac29ff1f836e5d7a7c5c325ec5abe96e29
SHA51275959d4e8a7649c3268b551a2a378e6d27c0bfb03d2422ebeeb67b0a3f78c079473214057518930f2d72773ce79b106fd2d78405e8e3d8883459dcbb49c163c4
-
C:\Users\Admin\AppData\Local\Temp\3582-490\36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe
Filesize501KB
MD5fa19fa821963093b0dff3098abb90943
SHA1bed146a970a3bc9fac8b9e9c9acd1803e977035b
SHA2563a80f5d2e1d38044dcd932c4fcf677ee30972042144d2a67669c7ad34a7d005e
SHA5128a4eb412737bb0479487a8279795862dff21e56dd368746e353a4b731e767c2a812f4ea87b2d3cd3b5b55e90ead0562362fba92c4a11098dcc7cd505d0ae1007