Analysis
-
max time kernel
92s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
01-01-2025 03:07
Behavioral task
behavioral1
Sample
ca57e99ade26b3160109b802c747f640bf5da1345b031ed5d45e4447e9eb03da.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ca57e99ade26b3160109b802c747f640bf5da1345b031ed5d45e4447e9eb03da.exe
Resource
win10v2004-20241007-en
General
-
Target
ca57e99ade26b3160109b802c747f640bf5da1345b031ed5d45e4447e9eb03da.exe
-
Size
1.4MB
-
MD5
548c6df1a5d12caf303c5dc03d014ccf
-
SHA1
37d51126cd8d7c4ddc2a152cc58bd66d9be8d5fc
-
SHA256
ca57e99ade26b3160109b802c747f640bf5da1345b031ed5d45e4447e9eb03da
-
SHA512
558cdb5379525fb1e03a9b66cdf733ffa5478981415b58225374a93e815cd3fdcb34cb88310e16fb8065c7d1fcb12444f28196ac6c33b18be38fe3448489f403
-
SSDEEP
24576:ZKzcVkyEq9DRho1jFP8ltPP01Ws7+wFPEl9ix4fpUzoQDt+egElxdqFWVCGCdJ:ZKzcCyEq9DRho/ctH01Ws74rA4RUBDHo
Malware Config
Signatures
-
Detect Neshta payload 64 IoCs
resource yara_rule behavioral2/files/0x0008000000023cb9-4.dat family_neshta behavioral2/files/0x0007000000023cbe-10.dat family_neshta behavioral2/memory/3928-16-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2708-20-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1412-28-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4256-38-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1616-40-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3288-51-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1052-56-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4952-52-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3096-64-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4580-68-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1364-76-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1860-97-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0004000000020340-100.dat family_neshta behavioral2/files/0x0001000000020299-106.dat family_neshta behavioral2/memory/3256-109-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3416-119-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2440-121-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2236-131-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0002000000020317-137.dat family_neshta behavioral2/files/0x0008000000020241-136.dat family_neshta behavioral2/files/0x00010000000225e2-142.dat family_neshta behavioral2/files/0x00010000000214e3-151.dat family_neshta behavioral2/memory/3492-153-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x00010000000214e4-152.dat family_neshta behavioral2/files/0x00010000000214e2-150.dat family_neshta behavioral2/files/0x00010000000167c9-184.dat family_neshta behavioral2/memory/4592-201-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x00010000000167e9-198.dat family_neshta behavioral2/files/0x00010000000167ea-197.dat family_neshta behavioral2/files/0x00010000000167c5-196.dat family_neshta behavioral2/files/0x0001000000016805-195.dat family_neshta behavioral2/memory/2784-217-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3060-224-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x00010000000167cb-183.dat family_neshta behavioral2/files/0x00010000000167b0-182.dat family_neshta behavioral2/files/0x0001000000016802-181.dat family_neshta behavioral2/files/0x0001000000022f70-169.dat family_neshta behavioral2/files/0x0001000000022f72-168.dat family_neshta behavioral2/files/0x0001000000022f31-167.dat family_neshta behavioral2/files/0x0001000000022f34-166.dat family_neshta behavioral2/files/0x0001000000022f71-165.dat family_neshta behavioral2/files/0x0001000000022f33-163.dat family_neshta behavioral2/files/0x0001000000022f32-162.dat family_neshta behavioral2/memory/5032-239-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2972-242-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1120-249-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4404-257-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/5048-259-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3768-261-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4656-267-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1436-274-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3940-275-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/228-277-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1984-283-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2580-290-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4000-291-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/5080-293-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1008-299-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2008-301-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1476-307-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2540-314-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/768-315-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\GoogleUpdate.exe GoogleUpdate.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\GoogleUpdate.exe\DisableExceptionChainValidation = "0" GoogleUpdate.exe -
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation CA57E9~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation CA57E9~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation ca57e99ade26b3160109b802c747f640bf5da1345b031ed5d45e4447e9eb03da.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation CA57E9~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation CA57E9~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation CA57E9~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation CA57E9~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation CA57E9~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation CA57E9~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation CA57E9~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation CA57E9~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation CA57E9~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation CA57E9~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation CA57E9~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation CA57E9~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation CA57E9~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation CA57E9~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation CA57E9~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation CA57E9~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation CA57E9~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation CA57E9~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation CA57E9~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation CA57E9~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation CA57E9~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation CA57E9~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation CA57E9~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation CA57E9~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation CA57E9~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation CA57E9~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation CA57E9~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation CA57E9~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation CA57E9~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation CA57E9~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation CA57E9~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation CA57E9~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation CA57E9~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation CA57E9~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation CA57E9~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation CA57E9~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation CA57E9~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation CA57E9~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation CA57E9~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation CA57E9~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation CA57E9~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation CA57E9~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation CA57E9~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation CA57E9~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation CA57E9~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation CA57E9~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation CA57E9~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation CA57E9~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation CA57E9~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation CA57E9~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation CA57E9~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation CA57E9~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation CA57E9~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation CA57E9~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation CA57E9~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation CA57E9~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation CA57E9~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation CA57E9~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation CA57E9~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation CA57E9~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation CA57E9~1.EXE -
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE 64 IoCs
pid Process 1144 ca57e99ade26b3160109b802c747f640bf5da1345b031ed5d45e4447e9eb03da.exe 3928 svchost.com 2708 CA57E9~1.EXE 1412 svchost.com 4256 CA57E9~1.EXE 1616 svchost.com 3288 CA57E9~1.EXE 4952 svchost.com 1052 CA57E9~1.EXE 3096 svchost.com 4580 CA57E9~1.EXE 1364 svchost.com 1860 CA57E9~1.EXE 3256 svchost.com 3416 CA57E9~1.EXE 2440 svchost.com 2236 CA57E9~1.EXE 3492 svchost.com 4592 CA57E9~1.EXE 2784 svchost.com 3060 CA57E9~1.EXE 5032 svchost.com 2972 CA57E9~1.EXE 1120 svchost.com 4404 CA57E9~1.EXE 5048 svchost.com 3768 CA57E9~1.EXE 4656 svchost.com 1436 CA57E9~1.EXE 3940 svchost.com 228 CA57E9~1.EXE 1984 svchost.com 2580 CA57E9~1.EXE 4000 svchost.com 5080 CA57E9~1.EXE 1008 svchost.com 2008 CA57E9~1.EXE 1476 svchost.com 2540 CA57E9~1.EXE 768 svchost.com 4216 CA57E9~1.EXE 1208 svchost.com 4540 CA57E9~1.EXE 3956 svchost.com 3188 CA57E9~1.EXE 3320 svchost.com 4628 CA57E9~1.EXE 3464 svchost.com 4680 CA57E9~1.EXE 760 svchost.com 3472 CA57E9~1.EXE 4956 svchost.com 3308 CA57E9~1.EXE 684 svchost.com 3220 CA57E9~1.EXE 2928 svchost.com 4484 CA57E9~1.EXE 3936 svchost.com 3420 CA57E9~1.EXE 2272 svchost.com 4920 CA57E9~1.EXE 1704 svchost.com 4416 CA57E9~1.EXE 2604 svchost.com -
Loads dropped DLL 10 IoCs
pid Process 3932 GoogleUpdate.exe 3684 GoogleUpdate.exe 2128 GoogleUpdate.exe 3820 GoogleUpdateComRegisterShell64.exe 2128 GoogleUpdate.exe 2544 GoogleUpdateComRegisterShell64.exe 2128 GoogleUpdate.exe 4580 GoogleUpdateComRegisterShell64.exe 2128 GoogleUpdate.exe 3660 GoogleUpdate.exe -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" ca57e99ade26b3160109b802c747f640bf5da1345b031ed5d45e4447e9eb03da.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE ca57e99ade26b3160109b802c747f640bf5da1345b031ed5d45e4447e9eb03da.exe File created C:\Program Files (x86)\Google\Temp\GUMFED3.tmp\GoogleCrashHandler.exe CA57E9~1.EXE File created C:\Program Files (x86)\Google\Update\1.3.36.372\goopdateres_am.dll GoogleUpdate.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\INSTAL~1\setup.exe ca57e99ade26b3160109b802c747f640bf5da1345b031ed5d45e4447e9eb03da.exe File created C:\Program Files (x86)\Google\Temp\GUMFED3.tmp\goopdateres_sl.dll CA57E9~1.EXE File opened for modification C:\PROGRA~2\WINDOW~4\setup_wm.exe ca57e99ade26b3160109b802c747f640bf5da1345b031ed5d45e4447e9eb03da.exe File created C:\Program Files (x86)\Google\Temp\GUMFED3.tmp\goopdateres_gu.dll CA57E9~1.EXE File created C:\Program Files (x86)\Google\Update\1.3.36.372\goopdateres_hi.dll GoogleUpdate.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmlaunch.exe ca57e99ade26b3160109b802c747f640bf5da1345b031ed5d45e4447e9eb03da.exe File opened for modification C:\PROGRA~3\Adobe\Setup\{AC76B~1\setup.exe ca57e99ade26b3160109b802c747f640bf5da1345b031ed5d45e4447e9eb03da.exe File created C:\Program Files (x86)\Google\Temp\GUMFED3.tmp\goopdateres_sr.dll CA57E9~1.EXE File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Browser\WCCHRO~1\WCCHRO~1.EXE ca57e99ade26b3160109b802c747f640bf5da1345b031ed5d45e4447e9eb03da.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\FULLTR~1.EXE ca57e99ade26b3160109b802c747f640bf5da1345b031ed5d45e4447e9eb03da.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE ca57e99ade26b3160109b802c747f640bf5da1345b031ed5d45e4447e9eb03da.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\msedge.exe ca57e99ade26b3160109b802c747f640bf5da1345b031ed5d45e4447e9eb03da.exe File created C:\Program Files (x86)\Google\Temp\GUMFED3.tmp\GoogleUpdateBroker.exe CA57E9~1.EXE File created C:\Program Files (x86)\Google\Temp\GUMFED3.tmp\goopdateres_es-419.dll CA57E9~1.EXE File created C:\Program Files (x86)\Google\Temp\GUMFED3.tmp\goopdateres_is.dll CA57E9~1.EXE File created C:\Program Files (x86)\Google\Temp\GUMFED3.tmp\goopdateres_ru.dll CA57E9~1.EXE File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe ca57e99ade26b3160109b802c747f640bf5da1345b031ed5d45e4447e9eb03da.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\MSEDGE~1.EXE ca57e99ade26b3160109b802c747f640bf5da1345b031ed5d45e4447e9eb03da.exe File opened for modification C:\PROGRA~2\WINDOW~2\wab.exe ca57e99ade26b3160109b802c747f640bf5da1345b031ed5d45e4447e9eb03da.exe File created C:\Program Files (x86)\Google\Temp\GUMFED3.tmp\goopdateres_tr.dll CA57E9~1.EXE File created C:\Program Files (x86)\Google\Update\1.3.36.372\goopdateres_en-GB.dll GoogleUpdate.exe File created C:\Program Files (x86)\Google\Update\1.3.36.372\goopdateres_iw.dll GoogleUpdate.exe File created C:\Program Files (x86)\Google\Update\1.3.36.372\psuser.dll GoogleUpdate.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\32BITM~1.EXE ca57e99ade26b3160109b802c747f640bf5da1345b031ed5d45e4447e9eb03da.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe ca57e99ade26b3160109b802c747f640bf5da1345b031ed5d45e4447e9eb03da.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe ca57e99ade26b3160109b802c747f640bf5da1345b031ed5d45e4447e9eb03da.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE ca57e99ade26b3160109b802c747f640bf5da1345b031ed5d45e4447e9eb03da.exe File created C:\Program Files (x86)\Google\Temp\GUMFED3.tmp\goopdateres_am.dll CA57E9~1.EXE File created C:\Program Files (x86)\Google\Temp\GUMFED3.tmp\goopdateres_pt-PT.dll CA57E9~1.EXE File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exe ca57e99ade26b3160109b802c747f640bf5da1345b031ed5d45e4447e9eb03da.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exe ca57e99ade26b3160109b802c747f640bf5da1345b031ed5d45e4447e9eb03da.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE ca57e99ade26b3160109b802c747f640bf5da1345b031ed5d45e4447e9eb03da.exe File created C:\Program Files (x86)\Google\Temp\GUMFED3.tmp\goopdateres_cs.dll CA57E9~1.EXE File created C:\Program Files (x86)\Google\Temp\GUMFED3.tmp\goopdateres_kn.dll CA57E9~1.EXE File created C:\Program Files (x86)\Google\Update\1.3.36.372\goopdateres_hr.dll GoogleUpdate.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE ca57e99ade26b3160109b802c747f640bf5da1345b031ed5d45e4447e9eb03da.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Eula.exe ca57e99ade26b3160109b802c747f640bf5da1345b031ed5d45e4447e9eb03da.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE ca57e99ade26b3160109b802c747f640bf5da1345b031ed5d45e4447e9eb03da.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~4.EXE ca57e99ade26b3160109b802c747f640bf5da1345b031ed5d45e4447e9eb03da.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~2.EXE ca57e99ade26b3160109b802c747f640bf5da1345b031ed5d45e4447e9eb03da.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\PWAHEL~1.EXE ca57e99ade26b3160109b802c747f640bf5da1345b031ed5d45e4447e9eb03da.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MID1AD~1.EXE ca57e99ade26b3160109b802c747f640bf5da1345b031ed5d45e4447e9eb03da.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmlaunch.exe ca57e99ade26b3160109b802c747f640bf5da1345b031ed5d45e4447e9eb03da.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe ca57e99ade26b3160109b802c747f640bf5da1345b031ed5d45e4447e9eb03da.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe ca57e99ade26b3160109b802c747f640bf5da1345b031ed5d45e4447e9eb03da.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~1.EXE ca57e99ade26b3160109b802c747f640bf5da1345b031ed5d45e4447e9eb03da.exe File created C:\Program Files (x86)\Google\Temp\GUMFED3.tmp\goopdateres_mr.dll CA57E9~1.EXE File created C:\Program Files (x86)\Google\Temp\GUMFED3.tmp\goopdateres_nl.dll CA57E9~1.EXE File created C:\Program Files (x86)\Google\Update\1.3.36.372\goopdateres_bg.dll GoogleUpdate.exe File created C:\Program Files (x86)\Google\Update\1.3.36.372\goopdateres_da.dll GoogleUpdate.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe ca57e99ade26b3160109b802c747f640bf5da1345b031ed5d45e4447e9eb03da.exe File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe ca57e99ade26b3160109b802c747f640bf5da1345b031ed5d45e4447e9eb03da.exe File created C:\Program Files (x86)\Google\Temp\GUMFED3.tmp\goopdateres_ko.dll CA57E9~1.EXE File created C:\Program Files (x86)\Google\Update\1.3.36.372\goopdateres_zh-TW.dll GoogleUpdate.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MI9C33~1.EXE ca57e99ade26b3160109b802c747f640bf5da1345b031ed5d45e4447e9eb03da.exe File created C:\Program Files (x86)\Google\Temp\GUMFED3.tmp\goopdateres_id.dll CA57E9~1.EXE File created C:\Program Files (x86)\Google\Update\1.3.36.372\goopdate.dll GoogleUpdate.exe File opened for modification C:\PROGRA~3\PACKAG~1\{63880~1\WINDOW~1.EXE ca57e99ade26b3160109b802c747f640bf5da1345b031ed5d45e4447e9eb03da.exe File created C:\Program Files (x86)\Google\Temp\GUMFED3.tmp\goopdateres_fil.dll CA57E9~1.EXE File created C:\Program Files (x86)\Google\Temp\GUMFED3.tmp\goopdateres_th.dll CA57E9~1.EXE File created C:\Program Files (x86)\Google\Temp\GUMFED3.tmp\goopdateres_zh-TW.dll CA57E9~1.EXE -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\directx.sys CA57E9~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com CA57E9~1.EXE File opened for modification C:\Windows\directx.sys CA57E9~1.EXE File opened for modification C:\Windows\directx.sys CA57E9~1.EXE File opened for modification C:\Windows\svchost.com CA57E9~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys CA57E9~1.EXE File opened for modification C:\Windows\directx.sys CA57E9~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys CA57E9~1.EXE File opened for modification C:\Windows\svchost.com CA57E9~1.EXE File opened for modification C:\Windows\svchost.com CA57E9~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com CA57E9~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com ca57e99ade26b3160109b802c747f640bf5da1345b031ed5d45e4447e9eb03da.exe File opened for modification C:\Windows\svchost.com CA57E9~1.EXE File opened for modification C:\Windows\directx.sys CA57E9~1.EXE File opened for modification C:\Windows\directx.sys CA57E9~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com CA57E9~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com CA57E9~1.EXE File opened for modification C:\Windows\svchost.com CA57E9~1.EXE File opened for modification C:\Windows\svchost.com CA57E9~1.EXE File opened for modification C:\Windows\svchost.com CA57E9~1.EXE File opened for modification C:\Windows\svchost.com CA57E9~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com CA57E9~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com CA57E9~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys CA57E9~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com CA57E9~1.EXE File opened for modification C:\Windows\svchost.com CA57E9~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys CA57E9~1.EXE File opened for modification C:\Windows\svchost.com CA57E9~1.EXE File opened for modification C:\Windows\svchost.com CA57E9~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys CA57E9~1.EXE File opened for modification C:\Windows\svchost.com CA57E9~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com CA57E9~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys CA57E9~1.EXE File opened for modification C:\Windows\svchost.com CA57E9~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com CA57E9~1.EXE File opened for modification C:\Windows\svchost.com CA57E9~1.EXE File opened for modification C:\Windows\svchost.com CA57E9~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys CA57E9~1.EXE File opened for modification C:\Windows\svchost.com svchost.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GOOGLE~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CA57E9~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CA57E9~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CA57E9~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CA57E9~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GoogleUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CA57E9~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CA57E9~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CA57E9~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CA57E9~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CA57E9~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CA57E9~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CA57E9~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CA57E9~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CA57E9~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CA57E9~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CA57E9~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CA57E9~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CA57E9~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CA57E9~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CA57E9~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CA57E9~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CA57E9~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CA57E9~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CA57E9~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CA57E9~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CA57E9~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ca57e99ade26b3160109b802c747f640bf5da1345b031ed5d45e4447e9eb03da.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CA57E9~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CA57E9~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CA57E9~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CA57E9~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CA57E9~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CA57E9~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CA57E9~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 3660 GoogleUpdate.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{49D7563B-2DDB-4831-88C8-768A53833837}\NumMethods GoogleUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9B2340A0-4068-43D6-B404-32E27217859D}\VersionIndependentProgID\ = "GoogleUpdate.CoreMachineClass" GoogleUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{521FDB42-7130-4806-822A-FC5163FAD983} GoogleUpdate.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{7DE94008-8AFD-4C70-9728-C6FBFFF6A73E}\LOCALSERVER32 GoogleUpdate.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings CA57E9~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings CA57E9~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings CA57E9~1.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{084D78A8-B084-4E14-A629-A2C419B0E3D9}\ProxyStubClsid32 GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B3A47570-0A85-4AEA-8270-529D47899603}\ = "ICredentialDialog" GoogleUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5B25A8DC-1780-4178-A629-6BE8B8DEFAA2}\ProxyStubClsid32 GoogleUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2D363682-561D-4C3A-81C6-F2F82107562A}\NumMethods GoogleUpdateComRegisterShell64.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9B2340A0-4068-43D6-B404-32E27217859D}\Elevation\Enabled = "1" GoogleUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\GoogleUpdate.CredentialDialogMachine\CLSID\ = "{25461599-633D-42B1-84FB-7CD68D026E53}" GoogleUpdate.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings CA57E9~1.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1C4CDEFF-756A-4804-9E77-3E8EB9361016}\VersionIndependentProgID\ = "GoogleUpdate.PolicyStatusSvc" GoogleUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6DB17455-4E85-46E7-9D23-E555E4B005AF}\ = "IGoogleUpdate3" GoogleUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DAB1D343-1B2A-47F9-B445-93DC50704BFE} GoogleUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5B25A8DC-1780-4178-A629-6BE8B8DEFAA2} GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{494B20CF-282E-4BDD-9F5D-B70CB09D351E}\NumMethods\ = "8" GoogleUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{25461599-633D-42B1-84FB-7CD68D026E53}\LOCALSERVER32 GoogleUpdate.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings CA57E9~1.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1C4CDEFF-756A-4804-9E77-3E8EB9361016} GoogleUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6F8BD55B-E83D-4A47-85BE-81FFA8057A69}\ = "Google Update Broker Class Factory" GoogleUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{19692F10-ADD2-4EFF-BE54-E61C62E40D13}\NumMethods GoogleUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B50B3FA2-B519-4C16-A932-46E9FFD1D910}\InProcServer32 GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{084D78A8-B084-4E14-A629-A2C419B0E3D9}\ = "IApp2" GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4C0B6D8C-1ECE-47E8-8C92-4CD88C0274DA}\InprocHandler32\ThreadingModel = "Both" GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DAB1D343-1B2A-47F9-B445-93DC50704BFE}\NumMethods\ = "4" GoogleUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9D6AA569-9F30-41AD-885A-346685C74928} GoogleUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8A1D4361-2C08-4700-A351-3EAA9CBFF5E4}\Elevation GoogleUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1C642CED-CA3B-4013-A9DF-CA6CE5FF6503}\NumMethods GoogleUpdateComRegisterShell64.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings CA57E9~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings CA57E9~1.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\APPID\GOOGLEUPDATE.EXE GoogleUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{49D7563B-2DDB-4831-88C8-768A53833837} GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{49D7563B-2DDB-4831-88C8-768A53833837}\ = "IJobObserver" GoogleUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\GoogleUpdate.Update3WebMachine\ = "Google Update Broker Class Factory" GoogleUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\GoogleUpdate.PolicyStatusSvc.1.0\ = "Google Update Policy Status Class" GoogleUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{7DE94008-8AFD-4C70-9728-C6FBFFF6A73E}\VersionIndependentProgID GoogleUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{084D78A8-B084-4E14-A629-A2C419B0E3D9}\NumMethods GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B50B3FA2-B519-4C16-A932-46E9FFD1D910}\ = "PSFactoryBuffer" GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{2E629606-312A-482F-9B12-2C4ABF6F0B6D}\ProxyStubClsid32\ = "{B50B3FA2-B519-4C16-A932-46E9FFD1D910}" GoogleUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D106AB5F-A70E-400E-A21B-96208C1D8DBB}\NumMethods GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{4DE778FE-F195-4EE3-9DAB-FE446C239221}\NumMethods\ = "11" GoogleUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{34527502-D3DB-4205-A69B-789B27EE0414}\NumMethods GoogleUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{27634814-8E41-4C35-8577-980134A96544}\ProxyStubClsid32 GoogleUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{4E223325-C16B-4EEB-AEDC-19AA99A237FA} GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{76F7B787-A67C-4C73-82C7-31F5E3AABC5C}\NumMethods\ = "41" GoogleUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{DAB1D343-1B2A-47F9-B445-93DC50704BFE}\ProxyStubClsid32 GoogleUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{34527502-D3DB-4205-A69B-789B27EE0414}\NumMethods\ = "23" GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DAB1D343-1B2A-47F9-B445-93DC50704BFE}\ProxyStubClsid32\ = "{B50B3FA2-B519-4C16-A932-46E9FFD1D910}" GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4C0B6D8C-1ECE-47E8-8C92-4CD88C0274DA}\InprocHandler32\ThreadingModel = "Both" GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\GoogleUpdate.Update3COMClassService\CLSID\ = "{4EB61BAC-A3B6-4760-9581-655041EF4D69}" GoogleUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31AC3F11-E5EA-4A85-8A3D-8E095A39C27B}\NumMethods\ = "5" GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B50B3FA2-B519-4C16-A932-46E9FFD1D910}\InProcServer32\ = "C:\\Program Files (x86)\\Google\\Update\\1.3.36.372\\psmachine_64.dll" GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{4E223325-C16B-4EEB-AEDC-19AA99A237FA}\ProxyStubClsid32\ = "{B50B3FA2-B519-4C16-A932-46E9FFD1D910}" GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F63F6F8B-ACD5-413C-A44B-0409136D26CB}\ = "IPolicyStatus" GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1C642CED-CA3B-4013-A9DF-CA6CE5FF6503}\ProxyStubClsid32\ = "{B50B3FA2-B519-4C16-A932-46E9FFD1D910}" GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{DAB1D343-1B2A-47F9-B445-93DC50704BFE}\ProxyStubClsid32\ = "{B50B3FA2-B519-4C16-A932-46E9FFD1D910}" GoogleUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DD42475D-6D46-496A-924E-BD5630B4CBBA}\ProxyStubClsid32\ = "{B50B3FA2-B519-4C16-A932-46E9FFD1D910}" GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B50B3FA2-B519-4C16-A932-46E9FFD1D910}\InProcServer32\ThreadingModel = "Both" GoogleUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{4E223325-C16B-4EEB-AEDC-19AA99A237FA}\NumMethods GoogleUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{4DE778FE-F195-4EE3-9DAB-FE446C239221}\NumMethods GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DAB1D343-1B2A-47F9-B445-93DC50704BFE}\NumMethods\ = "4" GoogleUpdateComRegisterShell64.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3932 GoogleUpdate.exe 3932 GoogleUpdate.exe 3932 GoogleUpdate.exe 3932 GoogleUpdate.exe 3932 GoogleUpdate.exe 3932 GoogleUpdate.exe 3932 GoogleUpdate.exe 3932 GoogleUpdate.exe 3932 GoogleUpdate.exe 3932 GoogleUpdate.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 3932 GoogleUpdate.exe Token: SeDebugPrivilege 3932 GoogleUpdate.exe Token: SeDebugPrivilege 3932 GoogleUpdate.exe Token: SeDebugPrivilege 3932 GoogleUpdate.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2364 wrote to memory of 1144 2364 ca57e99ade26b3160109b802c747f640bf5da1345b031ed5d45e4447e9eb03da.exe 84 PID 2364 wrote to memory of 1144 2364 ca57e99ade26b3160109b802c747f640bf5da1345b031ed5d45e4447e9eb03da.exe 84 PID 2364 wrote to memory of 1144 2364 ca57e99ade26b3160109b802c747f640bf5da1345b031ed5d45e4447e9eb03da.exe 84 PID 1144 wrote to memory of 3928 1144 ca57e99ade26b3160109b802c747f640bf5da1345b031ed5d45e4447e9eb03da.exe 85 PID 1144 wrote to memory of 3928 1144 ca57e99ade26b3160109b802c747f640bf5da1345b031ed5d45e4447e9eb03da.exe 85 PID 1144 wrote to memory of 3928 1144 ca57e99ade26b3160109b802c747f640bf5da1345b031ed5d45e4447e9eb03da.exe 85 PID 3928 wrote to memory of 2708 3928 svchost.com 86 PID 3928 wrote to memory of 2708 3928 svchost.com 86 PID 3928 wrote to memory of 2708 3928 svchost.com 86 PID 2708 wrote to memory of 1412 2708 CA57E9~1.EXE 87 PID 2708 wrote to memory of 1412 2708 CA57E9~1.EXE 87 PID 2708 wrote to memory of 1412 2708 CA57E9~1.EXE 87 PID 1412 wrote to memory of 4256 1412 svchost.com 88 PID 1412 wrote to memory of 4256 1412 svchost.com 88 PID 1412 wrote to memory of 4256 1412 svchost.com 88 PID 4256 wrote to memory of 1616 4256 CA57E9~1.EXE 89 PID 4256 wrote to memory of 1616 4256 CA57E9~1.EXE 89 PID 4256 wrote to memory of 1616 4256 CA57E9~1.EXE 89 PID 1616 wrote to memory of 3288 1616 svchost.com 90 PID 1616 wrote to memory of 3288 1616 svchost.com 90 PID 1616 wrote to memory of 3288 1616 svchost.com 90 PID 3288 wrote to memory of 4952 3288 CA57E9~1.EXE 91 PID 3288 wrote to memory of 4952 3288 CA57E9~1.EXE 91 PID 3288 wrote to memory of 4952 3288 CA57E9~1.EXE 91 PID 4952 wrote to memory of 1052 4952 svchost.com 92 PID 4952 wrote to memory of 1052 4952 svchost.com 92 PID 4952 wrote to memory of 1052 4952 svchost.com 92 PID 1052 wrote to memory of 3096 1052 CA57E9~1.EXE 93 PID 1052 wrote to memory of 3096 1052 CA57E9~1.EXE 93 PID 1052 wrote to memory of 3096 1052 CA57E9~1.EXE 93 PID 3096 wrote to memory of 4580 3096 svchost.com 94 PID 3096 wrote to memory of 4580 3096 svchost.com 94 PID 3096 wrote to memory of 4580 3096 svchost.com 94 PID 4580 wrote to memory of 1364 4580 CA57E9~1.EXE 95 PID 4580 wrote to memory of 1364 4580 CA57E9~1.EXE 95 PID 4580 wrote to memory of 1364 4580 CA57E9~1.EXE 95 PID 1364 wrote to memory of 1860 1364 svchost.com 96 PID 1364 wrote to memory of 1860 1364 svchost.com 96 PID 1364 wrote to memory of 1860 1364 svchost.com 96 PID 1860 wrote to memory of 3256 1860 CA57E9~1.EXE 97 PID 1860 wrote to memory of 3256 1860 CA57E9~1.EXE 97 PID 1860 wrote to memory of 3256 1860 CA57E9~1.EXE 97 PID 3256 wrote to memory of 3416 3256 svchost.com 98 PID 3256 wrote to memory of 3416 3256 svchost.com 98 PID 3256 wrote to memory of 3416 3256 svchost.com 98 PID 3416 wrote to memory of 2440 3416 CA57E9~1.EXE 99 PID 3416 wrote to memory of 2440 3416 CA57E9~1.EXE 99 PID 3416 wrote to memory of 2440 3416 CA57E9~1.EXE 99 PID 2440 wrote to memory of 2236 2440 svchost.com 100 PID 2440 wrote to memory of 2236 2440 svchost.com 100 PID 2440 wrote to memory of 2236 2440 svchost.com 100 PID 2236 wrote to memory of 3492 2236 CA57E9~1.EXE 101 PID 2236 wrote to memory of 3492 2236 CA57E9~1.EXE 101 PID 2236 wrote to memory of 3492 2236 CA57E9~1.EXE 101 PID 3492 wrote to memory of 4592 3492 svchost.com 175 PID 3492 wrote to memory of 4592 3492 svchost.com 175 PID 3492 wrote to memory of 4592 3492 svchost.com 175 PID 4592 wrote to memory of 2784 4592 CA57E9~1.EXE 103 PID 4592 wrote to memory of 2784 4592 CA57E9~1.EXE 103 PID 4592 wrote to memory of 2784 4592 CA57E9~1.EXE 103 PID 2784 wrote to memory of 3060 2784 svchost.com 104 PID 2784 wrote to memory of 3060 2784 svchost.com 104 PID 2784 wrote to memory of 3060 2784 svchost.com 104 PID 3060 wrote to memory of 5032 3060 CA57E9~1.EXE 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\ca57e99ade26b3160109b802c747f640bf5da1345b031ed5d45e4447e9eb03da.exe"C:\Users\Admin\AppData\Local\Temp\ca57e99ade26b3160109b802c747f640bf5da1345b031ed5d45e4447e9eb03da.exe"1⤵
- Checks computer location settings
- Modifies system executable filetype association
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Users\Admin\AppData\Local\Temp\3582-490\ca57e99ade26b3160109b802c747f640bf5da1345b031ed5d45e4447e9eb03da.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\ca57e99ade26b3160109b802c747f640bf5da1345b031ed5d45e4447e9eb03da.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3928 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1412 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE6⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4256 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3288 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE"9⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE10⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3096 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE12⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4580 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE"13⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE14⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE"15⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3256 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3416 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE"17⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE18⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3492 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE20⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4592 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE22⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE"23⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:5032 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE24⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2972 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE"25⤵
- Executes dropped EXE
PID:1120 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE26⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4404 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE"27⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:5048 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE28⤵
- Checks computer location settings
- Executes dropped EXE
PID:3768 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE"29⤵
- Executes dropped EXE
PID:4656 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE30⤵
- Executes dropped EXE
PID:1436 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE"31⤵
- Executes dropped EXE
PID:3940 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE32⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:228 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE"33⤵
- Executes dropped EXE
PID:1984 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE34⤵
- Checks computer location settings
- Executes dropped EXE
PID:2580 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE"35⤵
- Executes dropped EXE
PID:4000 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE36⤵
- Checks computer location settings
- Executes dropped EXE
PID:5080 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE"37⤵
- Executes dropped EXE
PID:1008 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE38⤵
- Executes dropped EXE
PID:2008 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE"39⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1476 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE40⤵
- Checks computer location settings
- Executes dropped EXE
PID:2540 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE"41⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:768 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE42⤵
- Checks computer location settings
- Executes dropped EXE
PID:4216 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE"43⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1208 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE44⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4540 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE"45⤵
- Executes dropped EXE
PID:3956 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE46⤵
- Executes dropped EXE
PID:3188 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE"47⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3320 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE48⤵
- Executes dropped EXE
PID:4628 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE"49⤵
- Executes dropped EXE
PID:3464 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE50⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4680 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE"51⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:760 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE52⤵
- Executes dropped EXE
PID:3472 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE"53⤵
- Executes dropped EXE
PID:4956 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE54⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3308 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE"55⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:684 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE56⤵
- Checks computer location settings
- Executes dropped EXE
PID:3220 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE"57⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2928 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE58⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4484 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE"59⤵
- Executes dropped EXE
PID:3936 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE60⤵
- Executes dropped EXE
PID:3420 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE"61⤵
- Executes dropped EXE
PID:2272 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE62⤵
- Executes dropped EXE
PID:4920 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE"63⤵
- Executes dropped EXE
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE64⤵
- Executes dropped EXE
- Modifies registry class
PID:4416 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE"65⤵
- Executes dropped EXE
PID:2604 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE66⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5068 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE"67⤵PID:3960
-
C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE68⤵
- Checks computer location settings
PID:5092 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE"69⤵PID:1172
-
C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE70⤵
- Drops file in Windows directory
PID:2340 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE"71⤵PID:4336
-
C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE72⤵PID:3680
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE"73⤵
- Drops file in Windows directory
PID:1392 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE74⤵
- Checks computer location settings
PID:2664 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE"75⤵PID:5028
-
C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE76⤵
- Drops file in Windows directory
PID:4660 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE"77⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2628 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE78⤵PID:4860
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE"79⤵
- System Location Discovery: System Language Discovery
PID:3772 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE80⤵
- System Location Discovery: System Language Discovery
PID:3088 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE"81⤵PID:3688
-
C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE82⤵
- Checks computer location settings
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:944 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE"83⤵
- System Location Discovery: System Language Discovery
PID:3568 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE84⤵
- Checks computer location settings
PID:4944 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE"85⤵
- Drops file in Windows directory
PID:2224 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE86⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:2844 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE"87⤵PID:4980
-
C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE88⤵
- Drops file in Windows directory
PID:888 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE"89⤵
- System Location Discovery: System Language Discovery
PID:4248 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE90⤵
- Checks computer location settings
PID:4780 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE"91⤵PID:1312
-
C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE92⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:3868 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE"93⤵
- Drops file in Windows directory
PID:4592 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE94⤵PID:440
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE"95⤵
- Drops file in Windows directory
PID:3656 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE96⤵PID:2928
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE"97⤵PID:4460
-
C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE98⤵
- Drops file in Windows directory
PID:3324 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE"99⤵PID:1268
-
C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE100⤵
- Checks computer location settings
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2272 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE"101⤵PID:3244
-
C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE102⤵
- Checks computer location settings
PID:672 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE"103⤵PID:3056
-
C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE104⤵
- Modifies registry class
PID:3768 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE"105⤵PID:4776
-
C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE106⤵
- Checks computer location settings
PID:2736 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE"107⤵
- Drops file in Windows directory
PID:2948 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE108⤵
- Drops file in Windows directory
- Modifies registry class
PID:3372 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE"109⤵
- System Location Discovery: System Language Discovery
PID:4444 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE110⤵
- Checks computer location settings
PID:3480 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE"111⤵PID:4372
-
C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE112⤵PID:1052
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE"113⤵PID:4164
-
C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE114⤵PID:4580
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE"115⤵PID:3512
-
C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE116⤵PID:4556
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE"117⤵PID:4860
-
C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE118⤵PID:8
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE"119⤵
- System Location Discovery: System Language Discovery
PID:5116 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE120⤵
- Checks computer location settings
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4588 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE"121⤵PID:4540
-
C:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CA57E9~1.EXE122⤵
- Checks computer location settings
- Drops file in Windows directory
PID:2516
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-