Analysis
-
max time kernel
150s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
14/02/2024, 16:10
Static task
static1
Behavioral task
behavioral1
Sample
9c1b470d80b84b8c57b65313a73bc663.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
9c1b470d80b84b8c57b65313a73bc663.exe
Resource
win10v2004-20231215-en
General
-
Target
9c1b470d80b84b8c57b65313a73bc663.exe
-
Size
13KB
-
MD5
9c1b470d80b84b8c57b65313a73bc663
-
SHA1
fd570ac98f8762a0debb24618c3ad499e464a8c1
-
SHA256
6cf45b88f8b3c28eb12b9f16cda62fe1f352bb3ce386768380268879837414bd
-
SHA512
e04d419e414534b7ad3807232362d0b4095d41eafd1ccccad9b4bc7126ff283c5a12eea7688633d0241ef0ccfbfe25e7902d9b99edc6e473216891ec200e0c67
-
SSDEEP
384:di2vDHqsnUTtzT4fZEUOAousYf6Q3ONpF:g2D/otzEfWUOAouh6iq
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation 9c1b470d80b84b8c57b65313a73bc663.exe Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation svchost.exe -
Executes dropped EXE 64 IoCs
pid Process 516 svchost.exe 4800 svchost.exe 4920 svchost.exe 892 svchost.exe 4440 svchost.exe 5112 svchost.exe 224 svchost.exe 1880 svchost.exe 5020 svchost.exe 3616 svchost.exe 2604 svchost.exe 2688 svchost.exe 3856 svchost.exe 2732 svchost.exe 3808 svchost.exe 4604 svchost.exe 4504 svchost.exe 1764 svchost.exe 1656 svchost.exe 3004 svchost.exe 5072 svchost.exe 3156 svchost.exe 4800 svchost.exe 4164 svchost.exe 4512 svchost.exe 3012 svchost.exe 2448 svchost.exe 232 svchost.exe 4620 svchost.exe 2212 svchost.exe 1072 svchost.exe 3404 svchost.exe 4228 svchost.exe 5044 svchost.exe 2204 svchost.exe 4324 svchost.exe 1212 svchost.exe 1092 svchost.exe 3516 svchost.exe 3672 svchost.exe 1512 svchost.exe 2308 svchost.exe 4424 svchost.exe 2712 svchost.exe 1776 svchost.exe 1360 svchost.exe 2100 svchost.exe 2952 svchost.exe 4920 svchost.exe 1868 svchost.exe 2236 svchost.exe 2540 svchost.exe 1824 svchost.exe 3096 svchost.exe 2460 svchost.exe 840 svchost.exe 1160 svchost.exe 1032 svchost.exe 644 svchost.exe 2472 svchost.exe 4548 svchost.exe 4324 svchost.exe 1212 svchost.exe 5024 svchost.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\svchost.exe svchost.exe File created C:\Windows\SysWOW64\config\svchost.exe svchost.exe File created C:\Windows\SysWOW64\config\svchost.exe svchost.exe File created C:\Windows\SysWOW64\config\svchost.exe svchost.exe File created C:\Windows\SysWOW64\config\svchost.exe svchost.exe File created C:\Windows\SysWOW64\config\svchost.exe svchost.exe File created C:\Windows\SysWOW64\config\svchost.exe svchost.exe File created C:\Windows\SysWOW64\config\svchost.exe svchost.exe File created C:\Windows\SysWOW64\config\svchost.exe svchost.exe File created C:\Windows\SysWOW64\config\svchost.exe svchost.exe File created C:\Windows\SysWOW64\config\svchost.exe svchost.exe File created C:\Windows\SysWOW64\config\svchost.exe svchost.exe File created C:\Windows\SysWOW64\config\svchost.exe svchost.exe File created C:\Windows\SysWOW64\config\svchost.exe svchost.exe File created C:\Windows\SysWOW64\config\svchost.exe svchost.exe File created C:\Windows\SysWOW64\config\svchost.exe svchost.exe File created C:\Windows\SysWOW64\config\svchost.exe svchost.exe File created C:\Windows\SysWOW64\config\svchost.exe svchost.exe File created C:\Windows\SysWOW64\config\svchost.exe svchost.exe File created C:\Windows\SysWOW64\config\svchost.exe svchost.exe File created C:\Windows\SysWOW64\config\svchost.exe svchost.exe File created C:\Windows\SysWOW64\config\svchost.exe svchost.exe File created C:\Windows\SysWOW64\config\svchost.exe svchost.exe File created C:\Windows\SysWOW64\config\svchost.exe svchost.exe File created C:\Windows\SysWOW64\config\svchost.exe svchost.exe File created C:\Windows\SysWOW64\config\svchost.exe svchost.exe File created C:\Windows\SysWOW64\config\svchost.exe svchost.exe File created C:\Windows\SysWOW64\config\svchost.exe svchost.exe File created C:\Windows\SysWOW64\config\svchost.exe svchost.exe File created C:\Windows\SysWOW64\config\svchost.exe 9c1b470d80b84b8c57b65313a73bc663.exe File created C:\Windows\SysWOW64\config\svchost.exe svchost.exe File created C:\Windows\SysWOW64\config\svchost.exe svchost.exe File created C:\Windows\SysWOW64\config\svchost.exe svchost.exe File created C:\Windows\SysWOW64\config\svchost.exe svchost.exe File created C:\Windows\SysWOW64\config\svchost.exe svchost.exe File created C:\Windows\SysWOW64\config\svchost.exe svchost.exe File created C:\Windows\SysWOW64\config\svchost.exe svchost.exe File created C:\Windows\SysWOW64\config\svchost.exe svchost.exe File created C:\Windows\SysWOW64\config\svchost.exe svchost.exe File created C:\Windows\SysWOW64\config\svchost.exe svchost.exe File opened for modification C:\Windows\SysWOW64\config\svchost.exe 9c1b470d80b84b8c57b65313a73bc663.exe File created C:\Windows\SysWOW64\config\svchost.exe svchost.exe File created C:\Windows\SysWOW64\config\svchost.exe svchost.exe File created C:\Windows\SysWOW64\config\svchost.exe svchost.exe File created C:\Windows\SysWOW64\config\svchost.exe svchost.exe File created C:\Windows\SysWOW64\config\svchost.exe svchost.exe File created C:\Windows\SysWOW64\config\svchost.exe svchost.exe File created C:\Windows\SysWOW64\config\svchost.exe svchost.exe File created C:\Windows\SysWOW64\config\svchost.exe svchost.exe File created C:\Windows\SysWOW64\config\svchost.exe svchost.exe File created C:\Windows\SysWOW64\config\svchost.exe svchost.exe File created C:\Windows\SysWOW64\config\svchost.exe svchost.exe File created C:\Windows\SysWOW64\config\svchost.exe svchost.exe File created C:\Windows\SysWOW64\config\svchost.exe svchost.exe File created C:\Windows\SysWOW64\config\svchost.exe svchost.exe File created C:\Windows\SysWOW64\config\svchost.exe svchost.exe File created C:\Windows\SysWOW64\config\svchost.exe svchost.exe File created C:\Windows\SysWOW64\config\svchost.exe svchost.exe File created C:\Windows\SysWOW64\config\svchost.exe svchost.exe File created C:\Windows\SysWOW64\config\svchost.exe svchost.exe File created C:\Windows\SysWOW64\config\svchost.exe svchost.exe File created C:\Windows\SysWOW64\config\svchost.exe svchost.exe File created C:\Windows\SysWOW64\config\svchost.exe svchost.exe File created C:\Windows\SysWOW64\config\svchost.exe svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1188 wrote to memory of 516 1188 9c1b470d80b84b8c57b65313a73bc663.exe 85 PID 1188 wrote to memory of 516 1188 9c1b470d80b84b8c57b65313a73bc663.exe 85 PID 1188 wrote to memory of 516 1188 9c1b470d80b84b8c57b65313a73bc663.exe 85 PID 516 wrote to memory of 4800 516 svchost.exe 86 PID 516 wrote to memory of 4800 516 svchost.exe 86 PID 516 wrote to memory of 4800 516 svchost.exe 86 PID 4800 wrote to memory of 4920 4800 svchost.exe 87 PID 4800 wrote to memory of 4920 4800 svchost.exe 87 PID 4800 wrote to memory of 4920 4800 svchost.exe 87 PID 4920 wrote to memory of 892 4920 svchost.exe 92 PID 4920 wrote to memory of 892 4920 svchost.exe 92 PID 4920 wrote to memory of 892 4920 svchost.exe 92 PID 892 wrote to memory of 4440 892 svchost.exe 93 PID 892 wrote to memory of 4440 892 svchost.exe 93 PID 892 wrote to memory of 4440 892 svchost.exe 93 PID 4440 wrote to memory of 5112 4440 svchost.exe 95 PID 4440 wrote to memory of 5112 4440 svchost.exe 95 PID 4440 wrote to memory of 5112 4440 svchost.exe 95 PID 5112 wrote to memory of 224 5112 svchost.exe 96 PID 5112 wrote to memory of 224 5112 svchost.exe 96 PID 5112 wrote to memory of 224 5112 svchost.exe 96 PID 224 wrote to memory of 1880 224 svchost.exe 99 PID 224 wrote to memory of 1880 224 svchost.exe 99 PID 224 wrote to memory of 1880 224 svchost.exe 99 PID 1880 wrote to memory of 5020 1880 svchost.exe 100 PID 1880 wrote to memory of 5020 1880 svchost.exe 100 PID 1880 wrote to memory of 5020 1880 svchost.exe 100 PID 5020 wrote to memory of 3616 5020 svchost.exe 101 PID 5020 wrote to memory of 3616 5020 svchost.exe 101 PID 5020 wrote to memory of 3616 5020 svchost.exe 101 PID 3616 wrote to memory of 2604 3616 svchost.exe 102 PID 3616 wrote to memory of 2604 3616 svchost.exe 102 PID 3616 wrote to memory of 2604 3616 svchost.exe 102 PID 2604 wrote to memory of 2688 2604 svchost.exe 103 PID 2604 wrote to memory of 2688 2604 svchost.exe 103 PID 2604 wrote to memory of 2688 2604 svchost.exe 103 PID 2688 wrote to memory of 3856 2688 svchost.exe 104 PID 2688 wrote to memory of 3856 2688 svchost.exe 104 PID 2688 wrote to memory of 3856 2688 svchost.exe 104 PID 3856 wrote to memory of 2732 3856 svchost.exe 105 PID 3856 wrote to memory of 2732 3856 svchost.exe 105 PID 3856 wrote to memory of 2732 3856 svchost.exe 105 PID 2732 wrote to memory of 3808 2732 svchost.exe 106 PID 2732 wrote to memory of 3808 2732 svchost.exe 106 PID 2732 wrote to memory of 3808 2732 svchost.exe 106 PID 3808 wrote to memory of 4604 3808 svchost.exe 107 PID 3808 wrote to memory of 4604 3808 svchost.exe 107 PID 3808 wrote to memory of 4604 3808 svchost.exe 107 PID 4604 wrote to memory of 4504 4604 svchost.exe 108 PID 4604 wrote to memory of 4504 4604 svchost.exe 108 PID 4604 wrote to memory of 4504 4604 svchost.exe 108 PID 4504 wrote to memory of 1764 4504 svchost.exe 110 PID 4504 wrote to memory of 1764 4504 svchost.exe 110 PID 4504 wrote to memory of 1764 4504 svchost.exe 110 PID 1764 wrote to memory of 1656 1764 svchost.exe 111 PID 1764 wrote to memory of 1656 1764 svchost.exe 111 PID 1764 wrote to memory of 1656 1764 svchost.exe 111 PID 1656 wrote to memory of 3004 1656 svchost.exe 112 PID 1656 wrote to memory of 3004 1656 svchost.exe 112 PID 1656 wrote to memory of 3004 1656 svchost.exe 112 PID 3004 wrote to memory of 5072 3004 svchost.exe 113 PID 3004 wrote to memory of 5072 3004 svchost.exe 113 PID 3004 wrote to memory of 5072 3004 svchost.exe 113 PID 5072 wrote to memory of 3156 5072 svchost.exe 114
Processes
-
C:\Users\Admin\AppData\Local\Temp\9c1b470d80b84b8c57b65313a73bc663.exe"C:\Users\Admin\AppData\Local\Temp\9c1b470d80b84b8c57b65313a73bc663.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Windows\SysWOW64\config\svchost.exe"C:\Windows\system32\config\svchost.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:516 -
C:\Windows\SysWOW64\config\svchost.exe"C:\Windows\system32\config\svchost.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Windows\SysWOW64\config\svchost.exe"C:\Windows\system32\config\svchost.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Windows\SysWOW64\config\svchost.exe"C:\Windows\system32\config\svchost.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:892 -
C:\Windows\SysWOW64\config\svchost.exe"C:\Windows\system32\config\svchost.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Windows\SysWOW64\config\svchost.exe"C:\Windows\system32\config\svchost.exe"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Windows\SysWOW64\config\svchost.exe"C:\Windows\system32\config\svchost.exe"8⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Windows\SysWOW64\config\svchost.exe"C:\Windows\system32\config\svchost.exe"9⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Windows\SysWOW64\config\svchost.exe"C:\Windows\system32\config\svchost.exe"10⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Windows\SysWOW64\config\svchost.exe"C:\Windows\system32\config\svchost.exe"11⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3616 -
C:\Windows\SysWOW64\config\svchost.exe"C:\Windows\system32\config\svchost.exe"12⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\SysWOW64\config\svchost.exe"C:\Windows\system32\config\svchost.exe"13⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\SysWOW64\config\svchost.exe"C:\Windows\system32\config\svchost.exe"14⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3856 -
C:\Windows\SysWOW64\config\svchost.exe"C:\Windows\system32\config\svchost.exe"15⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\SysWOW64\config\svchost.exe"C:\Windows\system32\config\svchost.exe"16⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3808 -
C:\Windows\SysWOW64\config\svchost.exe"C:\Windows\system32\config\svchost.exe"17⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Windows\SysWOW64\config\svchost.exe"C:\Windows\system32\config\svchost.exe"18⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4504 -
C:\Windows\SysWOW64\config\svchost.exe"C:\Windows\system32\config\svchost.exe"19⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Windows\SysWOW64\config\svchost.exe"C:\Windows\system32\config\svchost.exe"20⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Windows\SysWOW64\config\svchost.exe"C:\Windows\system32\config\svchost.exe"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Windows\SysWOW64\config\svchost.exe"C:\Windows\system32\config\svchost.exe"22⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Windows\SysWOW64\config\svchost.exe"C:\Windows\system32\config\svchost.exe"23⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:3156 -
C:\Windows\SysWOW64\config\svchost.exe"C:\Windows\system32\config\svchost.exe"24⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:4800 -
C:\Windows\SysWOW64\config\svchost.exe"C:\Windows\system32\config\svchost.exe"25⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:4164 -
C:\Windows\SysWOW64\config\svchost.exe"C:\Windows\system32\config\svchost.exe"26⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:4512 -
C:\Windows\SysWOW64\config\svchost.exe"C:\Windows\system32\config\svchost.exe"27⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3012 -
C:\Windows\SysWOW64\config\svchost.exe"C:\Windows\system32\config\svchost.exe"28⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:2448 -
C:\Windows\SysWOW64\config\svchost.exe"C:\Windows\system32\config\svchost.exe"29⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:232 -
C:\Windows\SysWOW64\config\svchost.exe"C:\Windows\system32\config\svchost.exe"30⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:4620 -
C:\Windows\SysWOW64\config\svchost.exe"C:\Windows\system32\config\svchost.exe"31⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:2212 -
C:\Windows\SysWOW64\config\svchost.exe"C:\Windows\system32\config\svchost.exe"32⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:1072 -
C:\Windows\SysWOW64\config\svchost.exe"C:\Windows\system32\config\svchost.exe"33⤵
- Executes dropped EXE
PID:3404 -
C:\Windows\SysWOW64\config\svchost.exe"C:\Windows\system32\config\svchost.exe"34⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:4228 -
C:\Windows\SysWOW64\config\svchost.exe"C:\Windows\system32\config\svchost.exe"35⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:5044 -
C:\Windows\SysWOW64\config\svchost.exe"C:\Windows\system32\config\svchost.exe"36⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:2204 -
C:\Windows\SysWOW64\config\svchost.exe"C:\Windows\system32\config\svchost.exe"37⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:4324 -
C:\Windows\SysWOW64\config\svchost.exe"C:\Windows\system32\config\svchost.exe"38⤵
- Checks computer location settings
- Executes dropped EXE
PID:1212 -
C:\Windows\SysWOW64\config\svchost.exe"C:\Windows\system32\config\svchost.exe"39⤵
- Checks computer location settings
- Executes dropped EXE
PID:1092 -
C:\Windows\SysWOW64\config\svchost.exe"C:\Windows\system32\config\svchost.exe"40⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3516 -
C:\Windows\SysWOW64\config\svchost.exe"C:\Windows\system32\config\svchost.exe"41⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3672 -
C:\Windows\SysWOW64\config\svchost.exe"C:\Windows\system32\config\svchost.exe"42⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:1512 -
C:\Windows\SysWOW64\config\svchost.exe"C:\Windows\system32\config\svchost.exe"43⤵
- Checks computer location settings
- Executes dropped EXE
PID:2308 -
C:\Windows\SysWOW64\config\svchost.exe"C:\Windows\system32\config\svchost.exe"44⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:4424 -
C:\Windows\SysWOW64\config\svchost.exe"C:\Windows\system32\config\svchost.exe"45⤵
- Executes dropped EXE
PID:2712 -
C:\Windows\SysWOW64\config\svchost.exe"C:\Windows\system32\config\svchost.exe"46⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1776 -
C:\Windows\SysWOW64\config\svchost.exe"C:\Windows\system32\config\svchost.exe"47⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1360 -
C:\Windows\SysWOW64\config\svchost.exe"C:\Windows\system32\config\svchost.exe"48⤵
- Executes dropped EXE
PID:2100 -
C:\Windows\SysWOW64\config\svchost.exe"C:\Windows\system32\config\svchost.exe"49⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2952 -
C:\Windows\SysWOW64\config\svchost.exe"C:\Windows\system32\config\svchost.exe"50⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:4920 -
C:\Windows\SysWOW64\config\svchost.exe"C:\Windows\system32\config\svchost.exe"51⤵
- Executes dropped EXE
PID:1868 -
C:\Windows\SysWOW64\config\svchost.exe"C:\Windows\system32\config\svchost.exe"52⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:2236 -
C:\Windows\SysWOW64\config\svchost.exe"C:\Windows\system32\config\svchost.exe"53⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2540 -
C:\Windows\SysWOW64\config\svchost.exe"C:\Windows\system32\config\svchost.exe"54⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1824 -
C:\Windows\SysWOW64\config\svchost.exe"C:\Windows\system32\config\svchost.exe"55⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:3096 -
C:\Windows\SysWOW64\config\svchost.exe"C:\Windows\system32\config\svchost.exe"56⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2460 -
C:\Windows\SysWOW64\config\svchost.exe"C:\Windows\system32\config\svchost.exe"57⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:840 -
C:\Windows\SysWOW64\config\svchost.exe"C:\Windows\system32\config\svchost.exe"58⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1160 -
C:\Windows\SysWOW64\config\svchost.exe"C:\Windows\system32\config\svchost.exe"59⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:1032 -
C:\Windows\SysWOW64\config\svchost.exe"C:\Windows\system32\config\svchost.exe"60⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:644 -
C:\Windows\SysWOW64\config\svchost.exe"C:\Windows\system32\config\svchost.exe"61⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:2472 -
C:\Windows\SysWOW64\config\svchost.exe"C:\Windows\system32\config\svchost.exe"62⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:4548 -
C:\Windows\SysWOW64\config\svchost.exe"C:\Windows\system32\config\svchost.exe"63⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:4324 -
C:\Windows\SysWOW64\config\svchost.exe"C:\Windows\system32\config\svchost.exe"64⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1212 -
C:\Windows\SysWOW64\config\svchost.exe"C:\Windows\system32\config\svchost.exe"65⤵
- Checks computer location settings
- Executes dropped EXE
PID:5024 -
C:\Windows\SysWOW64\config\svchost.exe"C:\Windows\system32\config\svchost.exe"66⤵PID:1876
-
C:\Windows\SysWOW64\config\svchost.exe"C:\Windows\system32\config\svchost.exe"67⤵
- Checks computer location settings
- Drops file in System32 directory
PID:1680 -
C:\Windows\SysWOW64\config\svchost.exe"C:\Windows\system32\config\svchost.exe"68⤵
- Checks computer location settings
- Drops file in System32 directory
PID:1496 -
C:\Windows\SysWOW64\config\svchost.exe"C:\Windows\system32\config\svchost.exe"69⤵
- Checks computer location settings
- Drops file in System32 directory
PID:2060 -
C:\Windows\SysWOW64\config\svchost.exe"C:\Windows\system32\config\svchost.exe"70⤵
- Checks computer location settings
- Drops file in System32 directory
PID:4804 -
C:\Windows\SysWOW64\config\svchost.exe"C:\Windows\system32\config\svchost.exe"71⤵
- Checks computer location settings
PID:3832 -
C:\Windows\SysWOW64\config\svchost.exe"C:\Windows\system32\config\svchost.exe"72⤵PID:4292
-
C:\Windows\SysWOW64\config\svchost.exe"C:\Windows\system32\config\svchost.exe"73⤵
- Checks computer location settings
- Drops file in System32 directory
PID:2544 -
C:\Windows\SysWOW64\config\svchost.exe"C:\Windows\system32\config\svchost.exe"74⤵
- Checks computer location settings
- Drops file in System32 directory
PID:516 -
C:\Windows\SysWOW64\config\svchost.exe"C:\Windows\system32\config\svchost.exe"75⤵
- Checks computer location settings
PID:3048 -
C:\Windows\SysWOW64\config\svchost.exe"C:\Windows\system32\config\svchost.exe"76⤵
- Checks computer location settings
- Drops file in System32 directory
PID:4420 -
C:\Windows\SysWOW64\config\svchost.exe"C:\Windows\system32\config\svchost.exe"77⤵
- Checks computer location settings
- Drops file in System32 directory
PID:1372 -
C:\Windows\SysWOW64\config\svchost.exe"C:\Windows\system32\config\svchost.exe"78⤵
- Checks computer location settings
PID:1208 -
C:\Windows\SysWOW64\config\svchost.exe"C:\Windows\system32\config\svchost.exe"79⤵
- Checks computer location settings
PID:4432 -
C:\Windows\SysWOW64\config\svchost.exe"C:\Windows\system32\config\svchost.exe"80⤵
- Checks computer location settings
PID:2276 -
C:\Windows\SysWOW64\config\svchost.exe"C:\Windows\system32\config\svchost.exe"81⤵
- Drops file in System32 directory
PID:972 -
C:\Windows\SysWOW64\config\svchost.exe"C:\Windows\system32\config\svchost.exe"82⤵
- Checks computer location settings
PID:3532 -
C:\Windows\SysWOW64\config\svchost.exe"C:\Windows\system32\config\svchost.exe"83⤵
- Checks computer location settings
PID:4760 -
C:\Windows\SysWOW64\config\svchost.exe"C:\Windows\system32\config\svchost.exe"84⤵
- Checks computer location settings
- Drops file in System32 directory
PID:2696 -
C:\Windows\SysWOW64\config\svchost.exe"C:\Windows\system32\config\svchost.exe"85⤵
- Drops file in System32 directory
PID:388 -
C:\Windows\SysWOW64\config\svchost.exe"C:\Windows\system32\config\svchost.exe"86⤵
- Checks computer location settings
- Drops file in System32 directory
PID:3592 -
C:\Windows\SysWOW64\config\svchost.exe"C:\Windows\system32\config\svchost.exe"87⤵
- Checks computer location settings
- Drops file in System32 directory
PID:1824 -
C:\Windows\SysWOW64\config\svchost.exe"C:\Windows\system32\config\svchost.exe"88⤵
- Checks computer location settings
- Drops file in System32 directory
PID:1368 -
C:\Windows\SysWOW64\config\svchost.exe"C:\Windows\system32\config\svchost.exe"89⤵PID:2812
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13KB
MD59c1b470d80b84b8c57b65313a73bc663
SHA1fd570ac98f8762a0debb24618c3ad499e464a8c1
SHA2566cf45b88f8b3c28eb12b9f16cda62fe1f352bb3ce386768380268879837414bd
SHA512e04d419e414534b7ad3807232362d0b4095d41eafd1ccccad9b4bc7126ff283c5a12eea7688633d0241ef0ccfbfe25e7902d9b99edc6e473216891ec200e0c67