Analysis
-
max time kernel
30s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
22-11-2023 13:19
Static task
static1
Behavioral task
behavioral1
Sample
c9d970c7e8858febe61f6725138896a225ce08ce01bb3b25574120c2560d1b39.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
c9d970c7e8858febe61f6725138896a225ce08ce01bb3b25574120c2560d1b39.exe
Resource
win10v2004-20231023-en
General
-
Target
c9d970c7e8858febe61f6725138896a225ce08ce01bb3b25574120c2560d1b39.exe
-
Size
1.1MB
-
MD5
4849d246ef99a44667b5adf7d3dc1ea6
-
SHA1
cf2b0214891bc00a062377e2045e59be8c347da1
-
SHA256
c9d970c7e8858febe61f6725138896a225ce08ce01bb3b25574120c2560d1b39
-
SHA512
cc658e6e243caef01e2b2462d3085b72d052f56e781f016b44a798d456b00cbd65d96f368348ae82a01a8d058c06a50d66c2f1173c9a739fbfab2754991f2a86
-
SSDEEP
24576:CH0dl8myX9Bg42QoXFkrzkmmlSgRDko0lG4Z8r7Qfbkiu5Q2:CcaClSFlG4ZM7QzMN
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 12 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation svchcst.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation WScript.exe -
Deletes itself 1 IoCs
pid Process 4464 svchcst.exe -
Executes dropped EXE 7 IoCs
pid Process 5008 svchcst.exe 4464 svchcst.exe 3992 svchcst.exe 3300 svchcst.exe 4476 svchcst.exe 2224 svchcst.exe 4416 svchcst.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 12 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe Key created \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000_Classes\Local Settings svchcst.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2224 c9d970c7e8858febe61f6725138896a225ce08ce01bb3b25574120c2560d1b39.exe 2224 c9d970c7e8858febe61f6725138896a225ce08ce01bb3b25574120c2560d1b39.exe 2224 c9d970c7e8858febe61f6725138896a225ce08ce01bb3b25574120c2560d1b39.exe 2224 c9d970c7e8858febe61f6725138896a225ce08ce01bb3b25574120c2560d1b39.exe 2224 c9d970c7e8858febe61f6725138896a225ce08ce01bb3b25574120c2560d1b39.exe 2224 c9d970c7e8858febe61f6725138896a225ce08ce01bb3b25574120c2560d1b39.exe 2224 c9d970c7e8858febe61f6725138896a225ce08ce01bb3b25574120c2560d1b39.exe 2224 c9d970c7e8858febe61f6725138896a225ce08ce01bb3b25574120c2560d1b39.exe 2224 c9d970c7e8858febe61f6725138896a225ce08ce01bb3b25574120c2560d1b39.exe 2224 c9d970c7e8858febe61f6725138896a225ce08ce01bb3b25574120c2560d1b39.exe 2224 c9d970c7e8858febe61f6725138896a225ce08ce01bb3b25574120c2560d1b39.exe 2224 c9d970c7e8858febe61f6725138896a225ce08ce01bb3b25574120c2560d1b39.exe 2224 c9d970c7e8858febe61f6725138896a225ce08ce01bb3b25574120c2560d1b39.exe 2224 c9d970c7e8858febe61f6725138896a225ce08ce01bb3b25574120c2560d1b39.exe 2224 c9d970c7e8858febe61f6725138896a225ce08ce01bb3b25574120c2560d1b39.exe 2224 c9d970c7e8858febe61f6725138896a225ce08ce01bb3b25574120c2560d1b39.exe 2224 c9d970c7e8858febe61f6725138896a225ce08ce01bb3b25574120c2560d1b39.exe 2224 c9d970c7e8858febe61f6725138896a225ce08ce01bb3b25574120c2560d1b39.exe 2224 c9d970c7e8858febe61f6725138896a225ce08ce01bb3b25574120c2560d1b39.exe 2224 c9d970c7e8858febe61f6725138896a225ce08ce01bb3b25574120c2560d1b39.exe 2224 c9d970c7e8858febe61f6725138896a225ce08ce01bb3b25574120c2560d1b39.exe 2224 c9d970c7e8858febe61f6725138896a225ce08ce01bb3b25574120c2560d1b39.exe 2224 c9d970c7e8858febe61f6725138896a225ce08ce01bb3b25574120c2560d1b39.exe 2224 c9d970c7e8858febe61f6725138896a225ce08ce01bb3b25574120c2560d1b39.exe 2224 c9d970c7e8858febe61f6725138896a225ce08ce01bb3b25574120c2560d1b39.exe 2224 c9d970c7e8858febe61f6725138896a225ce08ce01bb3b25574120c2560d1b39.exe 2224 c9d970c7e8858febe61f6725138896a225ce08ce01bb3b25574120c2560d1b39.exe 2224 c9d970c7e8858febe61f6725138896a225ce08ce01bb3b25574120c2560d1b39.exe 2224 c9d970c7e8858febe61f6725138896a225ce08ce01bb3b25574120c2560d1b39.exe 2224 c9d970c7e8858febe61f6725138896a225ce08ce01bb3b25574120c2560d1b39.exe 2224 c9d970c7e8858febe61f6725138896a225ce08ce01bb3b25574120c2560d1b39.exe 2224 c9d970c7e8858febe61f6725138896a225ce08ce01bb3b25574120c2560d1b39.exe 2224 svchcst.exe 2224 svchcst.exe 2224 svchcst.exe 2224 svchcst.exe 2224 svchcst.exe 2224 svchcst.exe 2224 svchcst.exe 2224 svchcst.exe 2224 svchcst.exe 2224 svchcst.exe 4464 svchcst.exe 4464 svchcst.exe 4464 svchcst.exe 4464 svchcst.exe 4464 svchcst.exe 4464 svchcst.exe 4464 svchcst.exe 4464 svchcst.exe 4464 svchcst.exe 4464 svchcst.exe 4464 svchcst.exe 4464 svchcst.exe 4464 svchcst.exe 4464 svchcst.exe 4464 svchcst.exe 4464 svchcst.exe 4464 svchcst.exe 4464 svchcst.exe 4464 svchcst.exe 4464 svchcst.exe 4464 svchcst.exe 4464 svchcst.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2224 c9d970c7e8858febe61f6725138896a225ce08ce01bb3b25574120c2560d1b39.exe -
Suspicious use of SetWindowsHookEx 16 IoCs
pid Process 2224 c9d970c7e8858febe61f6725138896a225ce08ce01bb3b25574120c2560d1b39.exe 2224 c9d970c7e8858febe61f6725138896a225ce08ce01bb3b25574120c2560d1b39.exe 4464 svchcst.exe 3992 svchcst.exe 4464 svchcst.exe 3992 svchcst.exe 5008 svchcst.exe 5008 svchcst.exe 3300 svchcst.exe 3300 svchcst.exe 4476 svchcst.exe 4476 svchcst.exe 2224 svchcst.exe 2224 svchcst.exe 4416 svchcst.exe 4416 svchcst.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2224 wrote to memory of 4992 2224 svchcst.exe 95 PID 2224 wrote to memory of 4992 2224 svchcst.exe 95 PID 2224 wrote to memory of 4992 2224 svchcst.exe 95 PID 2224 wrote to memory of 212 2224 svchcst.exe 98 PID 2224 wrote to memory of 212 2224 svchcst.exe 98 PID 2224 wrote to memory of 212 2224 svchcst.exe 98 PID 2224 wrote to memory of 4440 2224 svchcst.exe 94 PID 2224 wrote to memory of 4440 2224 svchcst.exe 94 PID 2224 wrote to memory of 4440 2224 svchcst.exe 94 PID 2224 wrote to memory of 1176 2224 svchcst.exe 88 PID 2224 wrote to memory of 1176 2224 svchcst.exe 88 PID 2224 wrote to memory of 1176 2224 svchcst.exe 88 PID 2224 wrote to memory of 4560 2224 svchcst.exe 93 PID 2224 wrote to memory of 4560 2224 svchcst.exe 93 PID 2224 wrote to memory of 4560 2224 svchcst.exe 93 PID 2224 wrote to memory of 3896 2224 svchcst.exe 97 PID 2224 wrote to memory of 3896 2224 svchcst.exe 97 PID 2224 wrote to memory of 3896 2224 svchcst.exe 97 PID 2224 wrote to memory of 1104 2224 svchcst.exe 100 PID 2224 wrote to memory of 1104 2224 svchcst.exe 100 PID 2224 wrote to memory of 1104 2224 svchcst.exe 100 PID 2224 wrote to memory of 4508 2224 svchcst.exe 106 PID 2224 wrote to memory of 4508 2224 svchcst.exe 106 PID 2224 wrote to memory of 4508 2224 svchcst.exe 106 PID 2224 wrote to memory of 3828 2224 svchcst.exe 91 PID 2224 wrote to memory of 3828 2224 svchcst.exe 91 PID 2224 wrote to memory of 3828 2224 svchcst.exe 91 PID 2224 wrote to memory of 756 2224 svchcst.exe 90 PID 2224 wrote to memory of 756 2224 svchcst.exe 90 PID 2224 wrote to memory of 756 2224 svchcst.exe 90 PID 2224 wrote to memory of 2112 2224 svchcst.exe 96 PID 2224 wrote to memory of 2112 2224 svchcst.exe 96 PID 2224 wrote to memory of 2112 2224 svchcst.exe 96 PID 2224 wrote to memory of 4224 2224 svchcst.exe 89 PID 2224 wrote to memory of 4224 2224 svchcst.exe 89 PID 2224 wrote to memory of 4224 2224 svchcst.exe 89 PID 2224 wrote to memory of 3988 2224 svchcst.exe 104 PID 2224 wrote to memory of 3988 2224 svchcst.exe 104 PID 2224 wrote to memory of 3988 2224 svchcst.exe 104 PID 2224 wrote to memory of 3972 2224 svchcst.exe 103 PID 2224 wrote to memory of 3972 2224 svchcst.exe 103 PID 2224 wrote to memory of 3972 2224 svchcst.exe 103 PID 2224 wrote to memory of 4196 2224 svchcst.exe 102 PID 2224 wrote to memory of 4196 2224 svchcst.exe 102 PID 2224 wrote to memory of 4196 2224 svchcst.exe 102 PID 2224 wrote to memory of 1392 2224 svchcst.exe 101 PID 2224 wrote to memory of 1392 2224 svchcst.exe 101 PID 2224 wrote to memory of 1392 2224 svchcst.exe 101 PID 2224 wrote to memory of 3496 2224 svchcst.exe 99 PID 2224 wrote to memory of 3496 2224 svchcst.exe 99 PID 2224 wrote to memory of 3036 2224 svchcst.exe 107 PID 2224 wrote to memory of 3496 2224 svchcst.exe 99 PID 2224 wrote to memory of 3036 2224 svchcst.exe 107 PID 2224 wrote to memory of 3036 2224 svchcst.exe 107 PID 2224 wrote to memory of 1524 2224 svchcst.exe 108 PID 2224 wrote to memory of 1524 2224 svchcst.exe 108 PID 2224 wrote to memory of 1524 2224 svchcst.exe 108 PID 2224 wrote to memory of 2116 2224 svchcst.exe 92 PID 2224 wrote to memory of 2116 2224 svchcst.exe 92 PID 2224 wrote to memory of 2116 2224 svchcst.exe 92 PID 2224 wrote to memory of 2068 2224 svchcst.exe 105 PID 2224 wrote to memory of 2068 2224 svchcst.exe 105 PID 2224 wrote to memory of 2068 2224 svchcst.exe 105 PID 1392 wrote to memory of 5008 1392 WScript.exe 120
Processes
-
C:\Users\Admin\AppData\Local\Temp\c9d970c7e8858febe61f6725138896a225ce08ce01bb3b25574120c2560d1b39.exe"C:\Users\Admin\AppData\Local\Temp\c9d970c7e8858febe61f6725138896a225ce08ce01bb3b25574120c2560d1b39.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
PID:2224 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Checks computer location settings
- Modifies registry class
PID:1176 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2224
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Checks computer location settings
- Modifies registry class
PID:4224 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵PID:5084
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵PID:756
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵PID:408
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵PID:3364
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵PID:3828
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵PID:1144
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵PID:3808
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵PID:2116
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵PID:764
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵PID:4272
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵PID:4560
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵PID:4504
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Checks computer location settings
- Modifies registry class
PID:4440 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵
- Deletes itself
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4464
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵PID:4992
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵PID:2464
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵PID:2112
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵PID:2848
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵PID:3896
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵PID:1656
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Checks computer location settings
- Modifies registry class
PID:212 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3992
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Checks computer location settings
- Modifies registry class
PID:3496 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵PID:2200
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"4⤵PID:4892
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"5⤵PID:4836
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"6⤵PID:1316
-
-
-
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Checks computer location settings
- Modifies registry class
PID:1104 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3300
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵PID:5008
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Checks computer location settings
- Modifies registry class
PID:4196
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Checks computer location settings
- Modifies registry class
PID:3972 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4416
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵PID:3988
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Checks computer location settings
- Modifies registry class
PID:2068 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5008
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵PID:4504
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"4⤵PID:3488
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"4⤵PID:3844
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"5⤵PID:4568
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"4⤵PID:3364
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"5⤵PID:1276
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"4⤵PID:4544
-
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵PID:4508
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵PID:3036
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Checks computer location settings
- Modifies registry class
PID:1524 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4476
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92B
MD567b9b3e2ded7086f393ebbc36c5e7bca
SHA1e6299d0450b9a92a18cc23b5704a2b475652c790
SHA25644063c266686263f14cd2a83fee124fb3e61a9171a6aab69709464f49511011d
SHA512826fbc9481f46b1ae3db828a665c55c349023caf563e6e8c17321f5f3af3e4c3914955db6f0eebfc6defe561315435d47310b4d0499ab9c2c85bb61264dedc09
-
Filesize
753B
MD50aec4754b5215a84a7d86faea3b13782
SHA110dd166d89fad72849444c6f6d27e464c23d5bd3
SHA256f66a0495ce619eaa4bb25a78ba66a73ddc38dc0ac1de81c178d688c826eb6202
SHA512339ea9c17e9fcb7483163a50ca365be9a5222a607daeead8be84f85b9b1e33b6e672bdca154b67c5fcfaae277e836c39b71aa3a621e600e55334e2fa18d77699
-
Filesize
753B
MD50aec4754b5215a84a7d86faea3b13782
SHA110dd166d89fad72849444c6f6d27e464c23d5bd3
SHA256f66a0495ce619eaa4bb25a78ba66a73ddc38dc0ac1de81c178d688c826eb6202
SHA512339ea9c17e9fcb7483163a50ca365be9a5222a607daeead8be84f85b9b1e33b6e672bdca154b67c5fcfaae277e836c39b71aa3a621e600e55334e2fa18d77699
-
Filesize
696B
MD56d7f7c489889b75561316023d3e8b801
SHA1222906d8a273e49d99b9107d388856ba8e6a5400
SHA2563c01dd72d85883db4a345c0092b799f8deb31d43fde226e7df011c64d95202a7
SHA5127238e65f9b93ee3be8828f01b54fbb6acaeaaf31e2b62af398356b02fa80d615acc3f41139fb001b9c1e8855e5cfa467f2883acda663a08194955cadb409a24a
-
Filesize
696B
MD5d7e57302723e6adcd36bc753c7cb3d1b
SHA124f5af99f2988b5fa7383dae1f53347b597956a3
SHA256abf7ef48d31eaabd0227b0a91a44e8b53e9fbadff16ef2d9c2b131776898977e
SHA5120aee51cab495d2df1e1957f85cbfa1a8ca95fad5fa669d2f0918a0e4be4d090c868582935136684d872695bdd075523ad1386639690e9d7016201b6985a9c8a6
-
Filesize
696B
MD598328aa8ad181fbf0b87edfc21155dce
SHA13ca100ca64d5f62a5dceef47f414c0953fd4f559
SHA256a6928cf27564f6f983d8f62358463a2dee471715b220de03db8b72ebf105f20c
SHA51275f298c982eeebf184fdd0612436583a863beba740bd55053539dc1b1c20103a1c6f5da46b41621eb00d601cdfc86c1705080a0da08fef7756637805dcb588ec
-
Filesize
696B
MD598328aa8ad181fbf0b87edfc21155dce
SHA13ca100ca64d5f62a5dceef47f414c0953fd4f559
SHA256a6928cf27564f6f983d8f62358463a2dee471715b220de03db8b72ebf105f20c
SHA51275f298c982eeebf184fdd0612436583a863beba740bd55053539dc1b1c20103a1c6f5da46b41621eb00d601cdfc86c1705080a0da08fef7756637805dcb588ec
-
Filesize
1.1MB
MD56371f27b222ea92bdd20df9451704af1
SHA1c2e2c91030b5a8f9b2cb3dcc0d20cfe60c8c4d8d
SHA2561f50c0b53a85a9fba2e9a83efe715e220d2a391d0e6768697be80270af3f76a1
SHA512459a779c466b52e250ac37530472e9dc3a76dd2eb2905ed9583701fc340e878850e6bb7842df2a1b4e2b2a70b036df821666e007152979012eed2be7fe5a1bd7
-
Filesize
1.1MB
MD56371f27b222ea92bdd20df9451704af1
SHA1c2e2c91030b5a8f9b2cb3dcc0d20cfe60c8c4d8d
SHA2561f50c0b53a85a9fba2e9a83efe715e220d2a391d0e6768697be80270af3f76a1
SHA512459a779c466b52e250ac37530472e9dc3a76dd2eb2905ed9583701fc340e878850e6bb7842df2a1b4e2b2a70b036df821666e007152979012eed2be7fe5a1bd7
-
Filesize
1.1MB
MD56371f27b222ea92bdd20df9451704af1
SHA1c2e2c91030b5a8f9b2cb3dcc0d20cfe60c8c4d8d
SHA2561f50c0b53a85a9fba2e9a83efe715e220d2a391d0e6768697be80270af3f76a1
SHA512459a779c466b52e250ac37530472e9dc3a76dd2eb2905ed9583701fc340e878850e6bb7842df2a1b4e2b2a70b036df821666e007152979012eed2be7fe5a1bd7
-
Filesize
1.1MB
MD56371f27b222ea92bdd20df9451704af1
SHA1c2e2c91030b5a8f9b2cb3dcc0d20cfe60c8c4d8d
SHA2561f50c0b53a85a9fba2e9a83efe715e220d2a391d0e6768697be80270af3f76a1
SHA512459a779c466b52e250ac37530472e9dc3a76dd2eb2905ed9583701fc340e878850e6bb7842df2a1b4e2b2a70b036df821666e007152979012eed2be7fe5a1bd7
-
Filesize
1.1MB
MD56371f27b222ea92bdd20df9451704af1
SHA1c2e2c91030b5a8f9b2cb3dcc0d20cfe60c8c4d8d
SHA2561f50c0b53a85a9fba2e9a83efe715e220d2a391d0e6768697be80270af3f76a1
SHA512459a779c466b52e250ac37530472e9dc3a76dd2eb2905ed9583701fc340e878850e6bb7842df2a1b4e2b2a70b036df821666e007152979012eed2be7fe5a1bd7
-
Filesize
1.1MB
MD56371f27b222ea92bdd20df9451704af1
SHA1c2e2c91030b5a8f9b2cb3dcc0d20cfe60c8c4d8d
SHA2561f50c0b53a85a9fba2e9a83efe715e220d2a391d0e6768697be80270af3f76a1
SHA512459a779c466b52e250ac37530472e9dc3a76dd2eb2905ed9583701fc340e878850e6bb7842df2a1b4e2b2a70b036df821666e007152979012eed2be7fe5a1bd7
-
Filesize
1.1MB
MD56371f27b222ea92bdd20df9451704af1
SHA1c2e2c91030b5a8f9b2cb3dcc0d20cfe60c8c4d8d
SHA2561f50c0b53a85a9fba2e9a83efe715e220d2a391d0e6768697be80270af3f76a1
SHA512459a779c466b52e250ac37530472e9dc3a76dd2eb2905ed9583701fc340e878850e6bb7842df2a1b4e2b2a70b036df821666e007152979012eed2be7fe5a1bd7
-
Filesize
1.1MB
MD56371f27b222ea92bdd20df9451704af1
SHA1c2e2c91030b5a8f9b2cb3dcc0d20cfe60c8c4d8d
SHA2561f50c0b53a85a9fba2e9a83efe715e220d2a391d0e6768697be80270af3f76a1
SHA512459a779c466b52e250ac37530472e9dc3a76dd2eb2905ed9583701fc340e878850e6bb7842df2a1b4e2b2a70b036df821666e007152979012eed2be7fe5a1bd7
-
Filesize
1.1MB
MD56371f27b222ea92bdd20df9451704af1
SHA1c2e2c91030b5a8f9b2cb3dcc0d20cfe60c8c4d8d
SHA2561f50c0b53a85a9fba2e9a83efe715e220d2a391d0e6768697be80270af3f76a1
SHA512459a779c466b52e250ac37530472e9dc3a76dd2eb2905ed9583701fc340e878850e6bb7842df2a1b4e2b2a70b036df821666e007152979012eed2be7fe5a1bd7
-
Filesize
1.1MB
MD56371f27b222ea92bdd20df9451704af1
SHA1c2e2c91030b5a8f9b2cb3dcc0d20cfe60c8c4d8d
SHA2561f50c0b53a85a9fba2e9a83efe715e220d2a391d0e6768697be80270af3f76a1
SHA512459a779c466b52e250ac37530472e9dc3a76dd2eb2905ed9583701fc340e878850e6bb7842df2a1b4e2b2a70b036df821666e007152979012eed2be7fe5a1bd7
-
Filesize
1.1MB
MD56371f27b222ea92bdd20df9451704af1
SHA1c2e2c91030b5a8f9b2cb3dcc0d20cfe60c8c4d8d
SHA2561f50c0b53a85a9fba2e9a83efe715e220d2a391d0e6768697be80270af3f76a1
SHA512459a779c466b52e250ac37530472e9dc3a76dd2eb2905ed9583701fc340e878850e6bb7842df2a1b4e2b2a70b036df821666e007152979012eed2be7fe5a1bd7
-
Filesize
1.1MB
MD5ebdc0ffb7a0fa95df571f6934773e545
SHA1ee3e3bfe03301b5bb173264c235cbcf210d170ce
SHA2562dd2156b8f1a4558f41e6ea06dab2fb2376c18ecbd9a220acf50358eb8e53b3d
SHA51249500ce2d499ab5376cbfd933c9122ae865fe622898d40337c060b4581a2b9578197cbc51ae1999c610cc6b9c1e5a383b0b5ae44bcbaf76edc8c8d4079085331
-
Filesize
1.1MB
MD5ebdc0ffb7a0fa95df571f6934773e545
SHA1ee3e3bfe03301b5bb173264c235cbcf210d170ce
SHA2562dd2156b8f1a4558f41e6ea06dab2fb2376c18ecbd9a220acf50358eb8e53b3d
SHA51249500ce2d499ab5376cbfd933c9122ae865fe622898d40337c060b4581a2b9578197cbc51ae1999c610cc6b9c1e5a383b0b5ae44bcbaf76edc8c8d4079085331
-
Filesize
1.1MB
MD5ebdc0ffb7a0fa95df571f6934773e545
SHA1ee3e3bfe03301b5bb173264c235cbcf210d170ce
SHA2562dd2156b8f1a4558f41e6ea06dab2fb2376c18ecbd9a220acf50358eb8e53b3d
SHA51249500ce2d499ab5376cbfd933c9122ae865fe622898d40337c060b4581a2b9578197cbc51ae1999c610cc6b9c1e5a383b0b5ae44bcbaf76edc8c8d4079085331
-
Filesize
1.1MB
MD5ebdc0ffb7a0fa95df571f6934773e545
SHA1ee3e3bfe03301b5bb173264c235cbcf210d170ce
SHA2562dd2156b8f1a4558f41e6ea06dab2fb2376c18ecbd9a220acf50358eb8e53b3d
SHA51249500ce2d499ab5376cbfd933c9122ae865fe622898d40337c060b4581a2b9578197cbc51ae1999c610cc6b9c1e5a383b0b5ae44bcbaf76edc8c8d4079085331
-
Filesize
1.1MB
MD5d841d46ae0f274aa0fbb6d4f765f3209
SHA163ce5b78c679a325055012209e26acda44d0cf0f
SHA2562a041d7be6958d7acf99365aa2b363f6fd3d1e1aa3c1649dc046bf931ef8793b
SHA512047a8924566e1ed04def4a5a3807d4773186d891a612215d3b79092ecf0396f6074c19b6296c36ac3eddd3b206f97d01fd3cb490ca90c174c2f12eca46dfdbe6
-
Filesize
1.1MB
MD5d841d46ae0f274aa0fbb6d4f765f3209
SHA163ce5b78c679a325055012209e26acda44d0cf0f
SHA2562a041d7be6958d7acf99365aa2b363f6fd3d1e1aa3c1649dc046bf931ef8793b
SHA512047a8924566e1ed04def4a5a3807d4773186d891a612215d3b79092ecf0396f6074c19b6296c36ac3eddd3b206f97d01fd3cb490ca90c174c2f12eca46dfdbe6
-
Filesize
1.1MB
MD5d841d46ae0f274aa0fbb6d4f765f3209
SHA163ce5b78c679a325055012209e26acda44d0cf0f
SHA2562a041d7be6958d7acf99365aa2b363f6fd3d1e1aa3c1649dc046bf931ef8793b
SHA512047a8924566e1ed04def4a5a3807d4773186d891a612215d3b79092ecf0396f6074c19b6296c36ac3eddd3b206f97d01fd3cb490ca90c174c2f12eca46dfdbe6
-
Filesize
1.1MB
MD5d841d46ae0f274aa0fbb6d4f765f3209
SHA163ce5b78c679a325055012209e26acda44d0cf0f
SHA2562a041d7be6958d7acf99365aa2b363f6fd3d1e1aa3c1649dc046bf931ef8793b
SHA512047a8924566e1ed04def4a5a3807d4773186d891a612215d3b79092ecf0396f6074c19b6296c36ac3eddd3b206f97d01fd3cb490ca90c174c2f12eca46dfdbe6
-
Filesize
1.1MB
MD5d841d46ae0f274aa0fbb6d4f765f3209
SHA163ce5b78c679a325055012209e26acda44d0cf0f
SHA2562a041d7be6958d7acf99365aa2b363f6fd3d1e1aa3c1649dc046bf931ef8793b
SHA512047a8924566e1ed04def4a5a3807d4773186d891a612215d3b79092ecf0396f6074c19b6296c36ac3eddd3b206f97d01fd3cb490ca90c174c2f12eca46dfdbe6
-
Filesize
1.1MB
MD5d841d46ae0f274aa0fbb6d4f765f3209
SHA163ce5b78c679a325055012209e26acda44d0cf0f
SHA2562a041d7be6958d7acf99365aa2b363f6fd3d1e1aa3c1649dc046bf931ef8793b
SHA512047a8924566e1ed04def4a5a3807d4773186d891a612215d3b79092ecf0396f6074c19b6296c36ac3eddd3b206f97d01fd3cb490ca90c174c2f12eca46dfdbe6
-
Filesize
1.1MB
MD5d841d46ae0f274aa0fbb6d4f765f3209
SHA163ce5b78c679a325055012209e26acda44d0cf0f
SHA2562a041d7be6958d7acf99365aa2b363f6fd3d1e1aa3c1649dc046bf931ef8793b
SHA512047a8924566e1ed04def4a5a3807d4773186d891a612215d3b79092ecf0396f6074c19b6296c36ac3eddd3b206f97d01fd3cb490ca90c174c2f12eca46dfdbe6
-
Filesize
1.1MB
MD5d841d46ae0f274aa0fbb6d4f765f3209
SHA163ce5b78c679a325055012209e26acda44d0cf0f
SHA2562a041d7be6958d7acf99365aa2b363f6fd3d1e1aa3c1649dc046bf931ef8793b
SHA512047a8924566e1ed04def4a5a3807d4773186d891a612215d3b79092ecf0396f6074c19b6296c36ac3eddd3b206f97d01fd3cb490ca90c174c2f12eca46dfdbe6
-
Filesize
1.1MB
MD5d841d46ae0f274aa0fbb6d4f765f3209
SHA163ce5b78c679a325055012209e26acda44d0cf0f
SHA2562a041d7be6958d7acf99365aa2b363f6fd3d1e1aa3c1649dc046bf931ef8793b
SHA512047a8924566e1ed04def4a5a3807d4773186d891a612215d3b79092ecf0396f6074c19b6296c36ac3eddd3b206f97d01fd3cb490ca90c174c2f12eca46dfdbe6
-
Filesize
1.1MB
MD5d841d46ae0f274aa0fbb6d4f765f3209
SHA163ce5b78c679a325055012209e26acda44d0cf0f
SHA2562a041d7be6958d7acf99365aa2b363f6fd3d1e1aa3c1649dc046bf931ef8793b
SHA512047a8924566e1ed04def4a5a3807d4773186d891a612215d3b79092ecf0396f6074c19b6296c36ac3eddd3b206f97d01fd3cb490ca90c174c2f12eca46dfdbe6
-
Filesize
1.1MB
MD5d841d46ae0f274aa0fbb6d4f765f3209
SHA163ce5b78c679a325055012209e26acda44d0cf0f
SHA2562a041d7be6958d7acf99365aa2b363f6fd3d1e1aa3c1649dc046bf931ef8793b
SHA512047a8924566e1ed04def4a5a3807d4773186d891a612215d3b79092ecf0396f6074c19b6296c36ac3eddd3b206f97d01fd3cb490ca90c174c2f12eca46dfdbe6
-
Filesize
1.1MB
MD50c46e2c327145b424de700e90ed02864
SHA1159f98d85a66defd5c2e0bae28cf734473ea5951
SHA25600e5cd47b46f8ce8d0119c3c79d6e70e1c048fa8bf958a1e8faf78dcdbbb6953
SHA5122c29dd1bf90cc0463359e1aab6f25362b5df5c72c67f4510c8fe48e7c1109e39d02a4f1d0a4e81e9e88a1c2f7753933856bfb6216d0bf4d5d0f44457a2ae1a59
-
Filesize
1.1MB
MD50c46e2c327145b424de700e90ed02864
SHA1159f98d85a66defd5c2e0bae28cf734473ea5951
SHA25600e5cd47b46f8ce8d0119c3c79d6e70e1c048fa8bf958a1e8faf78dcdbbb6953
SHA5122c29dd1bf90cc0463359e1aab6f25362b5df5c72c67f4510c8fe48e7c1109e39d02a4f1d0a4e81e9e88a1c2f7753933856bfb6216d0bf4d5d0f44457a2ae1a59
-
Filesize
1.1MB
MD50c46e2c327145b424de700e90ed02864
SHA1159f98d85a66defd5c2e0bae28cf734473ea5951
SHA25600e5cd47b46f8ce8d0119c3c79d6e70e1c048fa8bf958a1e8faf78dcdbbb6953
SHA5122c29dd1bf90cc0463359e1aab6f25362b5df5c72c67f4510c8fe48e7c1109e39d02a4f1d0a4e81e9e88a1c2f7753933856bfb6216d0bf4d5d0f44457a2ae1a59