Overview
overview
10Static
static
10Instagram ....1.exe
windows7-x64
10Instagram ....1.exe
windows10-2004-x64
10Instagram ...gn.dll
windows7-x64
1Instagram ...gn.dll
windows10-2004-x64
1Instagram ...ts.dll
windows7-x64
1Instagram ...ts.dll
windows10-2004-x64
1Instagram ...rk.dll
windows7-x64
1Instagram ...rk.dll
windows10-2004-x64
1Instagram ...ip.dll
windows7-x64
1Instagram ...ip.dll
windows10-2004-x64
1Instagram ...er.exe
windows7-x64
8Instagram ...er.exe
windows10-2004-x64
8Instagram ...gn.dll
windows7-x64
1Instagram ...gn.dll
windows10-2004-x64
1Instagram ...ts.dll
windows7-x64
1Instagram ...ts.dll
windows10-2004-x64
1Instagram ...rk.dll
windows7-x64
1Instagram ...rk.dll
windows10-2004-x64
1Instagram ...et.dll
windows7-x64
1Instagram ...et.dll
windows10-2004-x64
1Instagram ...ml.exe
windows7-x64
10Instagram ...ml.exe
windows10-2004-x64
10Instagram ...et.dll
windows7-x64
1Instagram ...et.dll
windows10-2004-x64
1Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-01-2025 17:16
Behavioral task
behavioral1
Sample
Instagram Account Checker By Amir v0.1/Instagram Account Checker By Amir v0.1.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Instagram Account Checker By Amir v0.1/Instagram Account Checker By Amir v0.1.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Instagram Account Checker By Amir v0.1/MetroFramework.Design.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Instagram Account Checker By Amir v0.1/MetroFramework.Design.dll
Resource
win10v2004-20250129-en
Behavioral task
behavioral5
Sample
Instagram Account Checker By Amir v0.1/MetroFramework.Fonts.dll
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
Instagram Account Checker By Amir v0.1/MetroFramework.Fonts.dll
Resource
win10v2004-20250129-en
Behavioral task
behavioral7
Sample
Instagram Account Checker By Amir v0.1/MetroFramework.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Instagram Account Checker By Amir v0.1/MetroFramework.dll
Resource
win10v2004-20250129-en
Behavioral task
behavioral9
Sample
Instagram Account Checker By Amir v0.1/SHELL/Ionic.Zip.dll
Resource
win7-20241023-en
Behavioral task
behavioral10
Sample
Instagram Account Checker By Amir v0.1/SHELL/Ionic.Zip.dll
Resource
win10v2004-20250129-en
Behavioral task
behavioral11
Sample
Instagram Account Checker By Amir v0.1/SHELL/Launcher.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
Instagram Account Checker By Amir v0.1/SHELL/Launcher.exe
Resource
win10v2004-20250129-en
Behavioral task
behavioral13
Sample
Instagram Account Checker By Amir v0.1/SHELL/MetroFramework.Design.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
Instagram Account Checker By Amir v0.1/SHELL/MetroFramework.Design.dll
Resource
win10v2004-20250129-en
Behavioral task
behavioral15
Sample
Instagram Account Checker By Amir v0.1/SHELL/MetroFramework.Fonts.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
Instagram Account Checker By Amir v0.1/SHELL/MetroFramework.Fonts.dll
Resource
win10v2004-20250129-en
Behavioral task
behavioral17
Sample
Instagram Account Checker By Amir v0.1/SHELL/MetroFramework.dll
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
Instagram Account Checker By Amir v0.1/SHELL/MetroFramework.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
Instagram Account Checker By Amir v0.1/SHELL/xNet.dll
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
Instagram Account Checker By Amir v0.1/SHELL/xNet.dll
Resource
win10v2004-20250129-en
Behavioral task
behavioral21
Sample
Instagram Account Checker By Amir v0.1/SHELL/xml.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
Instagram Account Checker By Amir v0.1/SHELL/xml.exe
Resource
win10v2004-20250129-en
Behavioral task
behavioral23
Sample
Instagram Account Checker By Amir v0.1/xNet.dll
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
Instagram Account Checker By Amir v0.1/xNet.dll
Resource
win10v2004-20250129-en
General
-
Target
Instagram Account Checker By Amir v0.1/Instagram Account Checker By Amir v0.1.exe
-
Size
214KB
-
MD5
061683b79c9c654a8eb5e81c3b1f4de0
-
SHA1
02cebcbebe06905fc80f1a459a673b8317ebeb80
-
SHA256
19a099135d5248a219e7b13b74b6a608de4db082638dc566d012153406f86c3d
-
SHA512
080d5a29e722dc3e020a7582c592d36f4ccb64b97008df24d5c89b93a2ab4afb3295cf5ec0826ec78c7ef85e5a3d6927038f99a5fcb328b487d216573a42193d
-
SSDEEP
3072:74l6udi2LxmIx72Q78LaN09doHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHT:766uDtZxj71edik0vNdxNtCcCz
Malware Config
Signatures
-
Detect Neshta payload 64 IoCs
resource yara_rule behavioral2/files/0x0006000000020228-49.dat family_neshta behavioral2/files/0x000a000000023b8d-164.dat family_neshta behavioral2/files/0x0006000000020237-204.dat family_neshta behavioral2/files/0x0004000000020313-203.dat family_neshta behavioral2/files/0x0001000000020299-202.dat family_neshta behavioral2/files/0x0001000000022e70-244.dat family_neshta behavioral2/files/0x000300000001e866-248.dat family_neshta behavioral2/files/0x000500000001e0b6-247.dat family_neshta behavioral2/files/0x00020000000215d4-246.dat family_neshta behavioral2/files/0x0002000000000727-245.dat family_neshta behavioral2/files/0x0001000000022e6c-243.dat family_neshta behavioral2/files/0x0001000000016970-242.dat family_neshta behavioral2/files/0x0001000000016914-241.dat family_neshta behavioral2/memory/1276-255-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0001000000016922-240.dat family_neshta behavioral2/files/0x0001000000016919-239.dat family_neshta behavioral2/files/0x0001000000016913-238.dat family_neshta behavioral2/files/0x0001000000016917-237.dat family_neshta behavioral2/files/0x0001000000016915-236.dat family_neshta behavioral2/files/0x000100000001dbe7-235.dat family_neshta behavioral2/files/0x000100000001dbe5-234.dat family_neshta behavioral2/files/0x000100000001dbdb-233.dat family_neshta behavioral2/files/0x00010000000167e9-231.dat family_neshta behavioral2/files/0x00010000000167ea-230.dat family_neshta behavioral2/files/0x0001000000016805-228.dat family_neshta behavioral2/files/0x0001000000016855-226.dat family_neshta behavioral2/files/0x00010000000167c9-225.dat family_neshta behavioral2/files/0x00010000000167cb-224.dat family_neshta behavioral2/files/0x00010000000167b0-223.dat family_neshta behavioral2/files/0x0001000000016802-222.dat family_neshta behavioral2/files/0x0001000000022f70-221.dat family_neshta behavioral2/files/0x0001000000022f72-220.dat family_neshta behavioral2/files/0x0001000000022f31-219.dat family_neshta behavioral2/files/0x0001000000022f34-218.dat family_neshta behavioral2/files/0x0001000000022f71-217.dat family_neshta behavioral2/files/0x0001000000022f33-215.dat family_neshta behavioral2/files/0x0001000000022f32-214.dat family_neshta behavioral2/files/0x00010000000214e4-213.dat family_neshta behavioral2/files/0x00010000000214e3-212.dat family_neshta behavioral2/files/0x00010000000214e2-211.dat family_neshta behavioral2/files/0x00010000000225e2-210.dat family_neshta behavioral2/files/0x0001000000021539-209.dat family_neshta behavioral2/files/0x0002000000020317-207.dat family_neshta behavioral2/files/0x0008000000020241-206.dat family_neshta behavioral2/files/0x000600000002023f-205.dat family_neshta behavioral2/files/0x0004000000020352-201.dat family_neshta behavioral2/files/0x00010000000202b1-200.dat family_neshta behavioral2/files/0x0004000000020340-199.dat family_neshta behavioral2/files/0x000100000002029e-198.dat family_neshta behavioral2/files/0x000100000002022f-197.dat family_neshta behavioral2/files/0x000400000002033f-196.dat family_neshta behavioral2/files/0x000600000002021c-195.dat family_neshta behavioral2/files/0x0006000000020220-193.dat family_neshta behavioral2/files/0x0007000000020288-192.dat family_neshta behavioral2/files/0x000400000002034d-191.dat family_neshta behavioral2/memory/2192-265-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4808-273-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4440-279-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4496-285-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1036-286-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1380-292-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1160-293-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/412-299-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1264-305-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1584 powershell.exe -
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation SECURE~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation WINDOW~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation SECURE~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation WINDOW~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation WINDOW~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation WINDOW~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation WINDOW~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation WINDOW~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation WINDOW~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation SECURE~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation SECURE~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation SECURE~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation WINDOW~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation SECURE~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation WINDOW~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation SECURE~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation SECURE~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation SECURE~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation SECURE~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation SECURE~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation WINDOW~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation WINDOW~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation SECURE~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation SECURE~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation WINDOW~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation WINDOW~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation WINDOW~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation SECURE~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation SECURE~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation WINDOW~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation WINDOW~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation SECURE~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation WINDOW~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation WINDOW~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation SECURE~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation WINDOW~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation WINDOW~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation WINDOW~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation WINDOW~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation WINDOW~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation WINDOW~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation SECURE~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation SECURE~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation SECURE~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation SECURE~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation WINDOW~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation SECURE~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation WINDOW~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation SECURE~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation SECURE~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation SECURE~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation WINDOW~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation SECURE~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation SECURE~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation WINDOW~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation WINDOW~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation WINDOW~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation WINDOW~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation WINDOW~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation WINDOW~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation SECURE~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation SECURE~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation WINDOW~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation SECURE~1.EXE -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Startup.lnk Launcher.exe -
Executes dropped EXE 64 IoCs
pid Process 2212 xml.exe 1160 svchost.com 2444 WINDOW~1.EXE 1276 svchost.com 4112 SECURE~1.EXE 2192 svchost.com 516 WINDOW~1.EXE 4808 svchost.com 2736 SECURE~1.EXE 4440 svchost.com 3440 WINDOW~1.EXE 4496 svchost.com 1664 SECURE~1.EXE 1380 svchost.com 4552 WINDOW~1.EXE 412 svchost.com 4812 SECURE~1.EXE 1264 svchost.com 1680 WINDOW~1.EXE 1168 svchost.com 5080 SECURE~1.EXE 1612 svchost.com 2680 WINDOW~1.EXE 1864 svchost.com 3460 SECURE~1.EXE 3604 svchost.com 432 WINDOW~1.EXE 3336 svchost.com 3416 SECURE~1.EXE 5068 svchost.com 1000 WINDOW~1.EXE 3412 svchost.com 2096 SECURE~1.EXE 388 svchost.com 2988 WINDOW~1.EXE 400 svchost.com 3164 SECURE~1.EXE 3984 svchost.com 4092 WINDOW~1.EXE 3296 svchost.com 2184 SECURE~1.EXE 4560 svchost.com 2900 WINDOW~1.EXE 4516 svchost.com 4988 SECURE~1.EXE 4472 svchost.com 3916 WINDOW~1.EXE 2196 svchost.com 636 SECURE~1.EXE 1504 svchost.com 4992 WINDOW~1.EXE 1428 svchost.com 1712 SECURE~1.EXE 3960 svchost.com 3384 WINDOW~1.EXE 5128 svchost.com 5160 SECURE~1.EXE 5224 svchost.com 5256 WINDOW~1.EXE 5324 svchost.com 5356 SECURE~1.EXE 5420 svchost.com 5452 WINDOW~1.EXE 5516 svchost.com -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" xml.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Runtime Explorer = "C:\\Windows\\IMF\\\\Windows Services.exe" Launcher.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe svchost.com File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exe xml.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~3.EXE xml.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOF5E2~1.EXE xml.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\msedge.exe xml.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~3.EXE xml.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MIA062~1.EXE xml.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exe xml.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~2.EXE xml.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~1.EXE xml.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe xml.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmprph.exe svchost.com File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaureg.exe xml.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~4.EXE xml.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe xml.exe File opened for modification C:\PROGRA~3\Adobe\Setup\{AC76B~1\setup.exe xml.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Eula.exe xml.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\32BITM~1.EXE xml.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaws.exe xml.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE xml.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF5AF~1\WINDOW~1.EXE xml.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe svchost.com File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~3.EXE xml.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\PWAHEL~1.EXE xml.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADOBEC~1.EXE xml.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Browser\WCCHRO~1\WCCHRO~1.EXE xml.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\FULLTR~1.EXE xml.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\64BITM~1.EXE xml.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE xml.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\BHO\IE_TO_~1.EXE xml.exe File opened for modification C:\PROGRA~2\WINDOW~4\setup_wm.exe svchost.com File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe svchost.com File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe xml.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\IDENTI~1.EXE xml.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MI9C33~1.EXE xml.exe File opened for modification C:\PROGRA~2\WINDOW~2\wab.exe xml.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe svchost.com File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe svchost.com File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE xml.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~1.EXE xml.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\COOKIE~1.EXE xml.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~4.EXE xml.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE xml.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE xml.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE xml.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE xml.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\java.exe xml.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE xml.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MID1AD~1.EXE xml.exe File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe svchost.com File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~2.EXE xml.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\PWAHEL~1.EXE xml.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\AdobeARM.exe xml.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaw.exe xml.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GO664E~1.EXE xml.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOBD5D~1.EXE xml.exe File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe xml.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe xml.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE xml.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe xml.exe File opened for modification C:\PROGRA~3\PACKAG~1\{D87AE~1\WINDOW~1.EXE xml.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe svchost.com File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE xml.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe xml.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\IMF\LICENCE.zip Launcher.exe File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File created C:\Windows\IMF\Windows Services.exe.tmp Launcher.exe File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File created C:\Windows\IMF\LICENCE.dat Launcher.exe File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
pid pid_target Process procid_target 2740 2212 WerFault.exe 86 11080 9260 WerFault.exe 410 6620 9392 WerFault.exe 412 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINDOW~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xml.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SECURE~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINDOW~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SECURE~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINDOW~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SECURE~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINDOW~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINDOW~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SECURE~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINDOW~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SECURE~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SECURE~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINDOW~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SECURE~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINDOW~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINDOW~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SECURE~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SECURE~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SECURE~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SECURE~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SECURE~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINDOW~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINDOW~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINDOW~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SECURE~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINDOW~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINDOW~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINDOW~1.EXE -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings WINDOW~1.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" xml.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings SECURE~1.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2680 Launcher.exe 1584 powershell.exe 1584 powershell.exe 2444 WINDOW~1.EXE 2444 WINDOW~1.EXE 4112 SECURE~1.EXE 4112 SECURE~1.EXE 516 WINDOW~1.EXE 516 WINDOW~1.EXE 2736 SECURE~1.EXE 2736 SECURE~1.EXE 3440 WINDOW~1.EXE 3440 WINDOW~1.EXE 1664 SECURE~1.EXE 1664 SECURE~1.EXE 4552 WINDOW~1.EXE 4552 WINDOW~1.EXE 4812 SECURE~1.EXE 4812 SECURE~1.EXE 1680 WINDOW~1.EXE 1680 WINDOW~1.EXE 1680 WINDOW~1.EXE 5080 SECURE~1.EXE 5080 SECURE~1.EXE 5080 SECURE~1.EXE 2680 WINDOW~1.EXE 2680 WINDOW~1.EXE 2680 WINDOW~1.EXE 3460 SECURE~1.EXE 3460 SECURE~1.EXE 3460 SECURE~1.EXE 432 WINDOW~1.EXE 432 WINDOW~1.EXE 432 WINDOW~1.EXE 3416 SECURE~1.EXE 3416 SECURE~1.EXE 3416 SECURE~1.EXE 1000 WINDOW~1.EXE 1000 WINDOW~1.EXE 1000 WINDOW~1.EXE 2096 SECURE~1.EXE 2096 SECURE~1.EXE 2096 SECURE~1.EXE 2988 WINDOW~1.EXE 2988 WINDOW~1.EXE 2988 WINDOW~1.EXE 3164 SECURE~1.EXE 3164 SECURE~1.EXE 3164 SECURE~1.EXE 4092 WINDOW~1.EXE 4092 WINDOW~1.EXE 4092 WINDOW~1.EXE 2184 SECURE~1.EXE 2184 SECURE~1.EXE 2184 SECURE~1.EXE 2900 WINDOW~1.EXE 2900 WINDOW~1.EXE 2900 WINDOW~1.EXE 4988 SECURE~1.EXE 4988 SECURE~1.EXE 4988 SECURE~1.EXE 3916 WINDOW~1.EXE 3916 WINDOW~1.EXE 3916 WINDOW~1.EXE -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2680 Launcher.exe Token: SeDebugPrivilege 1584 powershell.exe Token: SeDebugPrivilege 2444 WINDOW~1.EXE Token: SeDebugPrivilege 4112 SECURE~1.EXE Token: SeDebugPrivilege 516 WINDOW~1.EXE Token: SeDebugPrivilege 2736 SECURE~1.EXE Token: SeDebugPrivilege 3440 WINDOW~1.EXE Token: SeDebugPrivilege 1664 SECURE~1.EXE Token: SeDebugPrivilege 4552 WINDOW~1.EXE Token: SeDebugPrivilege 4812 SECURE~1.EXE Token: SeDebugPrivilege 1680 WINDOW~1.EXE Token: SeDebugPrivilege 5080 SECURE~1.EXE Token: SeDebugPrivilege 2680 WINDOW~1.EXE Token: SeDebugPrivilege 3460 SECURE~1.EXE Token: SeDebugPrivilege 432 WINDOW~1.EXE Token: SeDebugPrivilege 3416 SECURE~1.EXE Token: SeDebugPrivilege 1000 WINDOW~1.EXE Token: SeDebugPrivilege 2096 SECURE~1.EXE Token: SeDebugPrivilege 2988 WINDOW~1.EXE Token: SeDebugPrivilege 3164 SECURE~1.EXE Token: SeDebugPrivilege 4092 WINDOW~1.EXE Token: SeDebugPrivilege 2184 SECURE~1.EXE Token: SeDebugPrivilege 2900 WINDOW~1.EXE Token: SeDebugPrivilege 4988 SECURE~1.EXE Token: SeDebugPrivilege 3916 WINDOW~1.EXE Token: SeDebugPrivilege 636 SECURE~1.EXE Token: SeDebugPrivilege 4992 WINDOW~1.EXE Token: SeDebugPrivilege 1712 SECURE~1.EXE Token: SeDebugPrivilege 3384 WINDOW~1.EXE Token: SeDebugPrivilege 5160 SECURE~1.EXE Token: SeDebugPrivilege 5256 WINDOW~1.EXE Token: SeDebugPrivilege 5356 SECURE~1.EXE Token: SeDebugPrivilege 5452 WINDOW~1.EXE Token: SeDebugPrivilege 5548 SECURE~1.EXE Token: SeDebugPrivilege 5648 WINDOW~1.EXE Token: SeDebugPrivilege 5744 SECURE~1.EXE Token: SeDebugPrivilege 5844 WINDOW~1.EXE Token: SeDebugPrivilege 5940 SECURE~1.EXE Token: SeDebugPrivilege 6036 WINDOW~1.EXE Token: SeDebugPrivilege 6136 SECURE~1.EXE Token: SeDebugPrivilege 5336 WINDOW~1.EXE Token: SeDebugPrivilege 5556 SECURE~1.EXE Token: SeDebugPrivilege 5720 WINDOW~1.EXE Token: SeDebugPrivilege 764 SECURE~1.EXE Token: SeDebugPrivilege 5288 WINDOW~1.EXE Token: SeDebugPrivilege 1292 WINDOW~1.EXE Token: SeDebugPrivilege 6112 SECURE~1.EXE Token: SeDebugPrivilege 6228 WINDOW~1.EXE Token: SeDebugPrivilege 6324 SECURE~1.EXE Token: SeDebugPrivilege 6420 WINDOW~1.EXE Token: SeDebugPrivilege 6516 SECURE~1.EXE Token: SeDebugPrivilege 6612 WINDOW~1.EXE Token: SeDebugPrivilege 6712 SECURE~1.EXE Token: SeDebugPrivilege 6804 WINDOW~1.EXE Token: SeDebugPrivilege 6900 SECURE~1.EXE Token: SeDebugPrivilege 6996 WINDOW~1.EXE Token: SeDebugPrivilege 7092 SECURE~1.EXE Token: SeDebugPrivilege 6044 WINDOW~1.EXE Token: SeDebugPrivilege 6296 SECURE~1.EXE Token: SeDebugPrivilege 6592 WINDOW~1.EXE Token: SeDebugPrivilege 6796 SECURE~1.EXE Token: SeDebugPrivilege 7004 WINDOW~1.EXE Token: SeDebugPrivilege 6308 SECURE~1.EXE Token: SeDebugPrivilege 6884 WINDOW~1.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5116 wrote to memory of 2680 5116 Instagram Account Checker By Amir v0.1.exe 82 PID 5116 wrote to memory of 2680 5116 Instagram Account Checker By Amir v0.1.exe 82 PID 5116 wrote to memory of 2680 5116 Instagram Account Checker By Amir v0.1.exe 82 PID 2680 wrote to memory of 1584 2680 Launcher.exe 83 PID 2680 wrote to memory of 1584 2680 Launcher.exe 83 PID 2680 wrote to memory of 1584 2680 Launcher.exe 83 PID 5116 wrote to memory of 1036 5116 Instagram Account Checker By Amir v0.1.exe 85 PID 5116 wrote to memory of 1036 5116 Instagram Account Checker By Amir v0.1.exe 85 PID 5116 wrote to memory of 1036 5116 Instagram Account Checker By Amir v0.1.exe 85 PID 1036 wrote to memory of 2212 1036 xml.exe 86 PID 1036 wrote to memory of 2212 1036 xml.exe 86 PID 1036 wrote to memory of 2212 1036 xml.exe 86 PID 2680 wrote to memory of 1160 2680 Launcher.exe 90 PID 2680 wrote to memory of 1160 2680 Launcher.exe 90 PID 2680 wrote to memory of 1160 2680 Launcher.exe 90 PID 1160 wrote to memory of 2444 1160 svchost.com 91 PID 1160 wrote to memory of 2444 1160 svchost.com 91 PID 1160 wrote to memory of 2444 1160 svchost.com 91 PID 2444 wrote to memory of 1276 2444 WINDOW~1.EXE 92 PID 2444 wrote to memory of 1276 2444 WINDOW~1.EXE 92 PID 2444 wrote to memory of 1276 2444 WINDOW~1.EXE 92 PID 1276 wrote to memory of 4112 1276 svchost.com 93 PID 1276 wrote to memory of 4112 1276 svchost.com 93 PID 1276 wrote to memory of 4112 1276 svchost.com 93 PID 4112 wrote to memory of 2192 4112 SECURE~1.EXE 94 PID 4112 wrote to memory of 2192 4112 SECURE~1.EXE 94 PID 4112 wrote to memory of 2192 4112 SECURE~1.EXE 94 PID 2192 wrote to memory of 516 2192 svchost.com 95 PID 2192 wrote to memory of 516 2192 svchost.com 95 PID 2192 wrote to memory of 516 2192 svchost.com 95 PID 516 wrote to memory of 4808 516 WINDOW~1.EXE 96 PID 516 wrote to memory of 4808 516 WINDOW~1.EXE 96 PID 516 wrote to memory of 4808 516 WINDOW~1.EXE 96 PID 4808 wrote to memory of 2736 4808 svchost.com 97 PID 4808 wrote to memory of 2736 4808 svchost.com 97 PID 4808 wrote to memory of 2736 4808 svchost.com 97 PID 2736 wrote to memory of 4440 2736 SECURE~1.EXE 98 PID 2736 wrote to memory of 4440 2736 SECURE~1.EXE 98 PID 2736 wrote to memory of 4440 2736 SECURE~1.EXE 98 PID 4440 wrote to memory of 3440 4440 svchost.com 99 PID 4440 wrote to memory of 3440 4440 svchost.com 99 PID 4440 wrote to memory of 3440 4440 svchost.com 99 PID 3440 wrote to memory of 4496 3440 WINDOW~1.EXE 102 PID 3440 wrote to memory of 4496 3440 WINDOW~1.EXE 102 PID 3440 wrote to memory of 4496 3440 WINDOW~1.EXE 102 PID 4496 wrote to memory of 1664 4496 svchost.com 103 PID 4496 wrote to memory of 1664 4496 svchost.com 103 PID 4496 wrote to memory of 1664 4496 svchost.com 103 PID 1664 wrote to memory of 1380 1664 SECURE~1.EXE 106 PID 1664 wrote to memory of 1380 1664 SECURE~1.EXE 106 PID 1664 wrote to memory of 1380 1664 SECURE~1.EXE 106 PID 1380 wrote to memory of 4552 1380 svchost.com 107 PID 1380 wrote to memory of 4552 1380 svchost.com 107 PID 1380 wrote to memory of 4552 1380 svchost.com 107 PID 4552 wrote to memory of 412 4552 WINDOW~1.EXE 109 PID 4552 wrote to memory of 412 4552 WINDOW~1.EXE 109 PID 4552 wrote to memory of 412 4552 WINDOW~1.EXE 109 PID 412 wrote to memory of 4812 412 svchost.com 110 PID 412 wrote to memory of 4812 412 svchost.com 110 PID 412 wrote to memory of 4812 412 svchost.com 110 PID 4812 wrote to memory of 1264 4812 SECURE~1.EXE 111 PID 4812 wrote to memory of 1264 4812 SECURE~1.EXE 111 PID 4812 wrote to memory of 1264 4812 SECURE~1.EXE 111 PID 1264 wrote to memory of 1680 1264 svchost.com 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\Instagram Account Checker By Amir v0.1\Instagram Account Checker By Amir v0.1.exe"C:\Users\Admin\AppData\Local\Temp\Instagram Account Checker By Amir v0.1\Instagram Account Checker By Amir v0.1.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:5116 -
C:\Users\Admin\AppData\Local\Temp\Instagram Account Checker By Amir v0.1\SHELL\Launcher.exe"C:\Users\Admin\AppData\Local\Temp\Instagram Account Checker By Amir v0.1\SHELL\Launcher.exe"2⤵
- Drops startup file
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" add-mppreference -exclusionpath C:\Windows\IMF\3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1584
-
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE" {Arguments If Needed}3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE {Arguments If Needed}4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4112 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE"7⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE8⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:516 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"9⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE10⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE12⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3440 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE14⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE"15⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE16⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4552 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:412 -
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE18⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1264 -
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE20⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1680 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"21⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1168 -
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE22⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5080 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE"23⤵
- Executes dropped EXE
PID:1612 -
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE24⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2680 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"25⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1864 -
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE26⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3460 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE"27⤵
- Executes dropped EXE
PID:3604 -
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE28⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:432 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"29⤵
- Executes dropped EXE
PID:3336 -
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE30⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3416 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE"31⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:5068 -
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE32⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1000 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"33⤵
- Executes dropped EXE
PID:3412 -
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE34⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2096 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE"35⤵
- Executes dropped EXE
PID:388 -
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE36⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2988 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"37⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:400 -
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE38⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3164 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE"39⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3984 -
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE40⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4092 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"41⤵
- Executes dropped EXE
PID:3296 -
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE42⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2184 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE"43⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4560 -
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE44⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2900 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"45⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4516 -
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE46⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4988 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE"47⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4472 -
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE48⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3916 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"49⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2196 -
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE50⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:636 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE"51⤵
- Executes dropped EXE
PID:1504 -
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE52⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4992 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"53⤵
- Executes dropped EXE
PID:1428 -
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE54⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1712 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE"55⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3960 -
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE56⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3384 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"57⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:5128 -
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE58⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5160 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE"59⤵
- Executes dropped EXE
PID:5224 -
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE60⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:5256 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"61⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:5324 -
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE62⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:5356 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE"63⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:5420 -
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE64⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5452 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"65⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5516 -
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE66⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:5548 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE"67⤵PID:5616
-
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE68⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5648 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"69⤵PID:5712
-
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE70⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
PID:5744 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE"71⤵PID:5812
-
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE72⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
PID:5844 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"73⤵PID:5908
-
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE74⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
PID:5940 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE"75⤵PID:6004
-
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE76⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:6036 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"77⤵PID:6104
-
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE78⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
PID:6136 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE"79⤵PID:5248
-
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE80⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
PID:5336 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"81⤵
- Drops file in Windows directory
PID:3268 -
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE82⤵
- Suspicious use of AdjustPrivilegeToken
PID:5556 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE"83⤵PID:5724
-
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE84⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
PID:5720 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"85⤵
- Drops file in Windows directory
PID:5928 -
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE86⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:764 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE"87⤵PID:6124
-
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE88⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:5288 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"89⤵
- Drops file in Windows directory
PID:5532 -
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE90⤵
- Modifies registry class
PID:4728 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE"91⤵
- Drops file in Windows directory
PID:6044 -
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE92⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1292 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"93⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1176 -
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE94⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:6112 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE"95⤵PID:6196
-
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE96⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:6228 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"97⤵PID:6292
-
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE98⤵
- Suspicious use of AdjustPrivilegeToken
PID:6324 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE"99⤵
- Drops file in Windows directory
PID:6388 -
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE100⤵
- Suspicious use of AdjustPrivilegeToken
PID:6420 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"101⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:6484 -
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE102⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
PID:6516 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE"103⤵
- System Location Discovery: System Language Discovery
PID:6580 -
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE104⤵
- Suspicious use of AdjustPrivilegeToken
PID:6612 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"105⤵
- System Location Discovery: System Language Discovery
PID:6680 -
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE106⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
PID:6712 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE"107⤵
- Drops file in Windows directory
PID:6772 -
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE108⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:6804 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"109⤵PID:6868
-
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE110⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:6900 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE"111⤵PID:6964
-
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE112⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:6996 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"113⤵
- System Location Discovery: System Language Discovery
PID:7060 -
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE114⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
PID:7092 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE"115⤵PID:7156
-
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE116⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:6044 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"117⤵PID:6204
-
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE118⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:6296 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE"119⤵
- System Location Discovery: System Language Discovery
PID:6504 -
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE120⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:6592 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"121⤵PID:2608
-
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE122⤵
- Suspicious use of AdjustPrivilegeToken
PID:6796
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-