Analysis
-
max time kernel
80s -
max time network
177s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
13/03/2024, 19:57
Static task
static1
Behavioral task
behavioral1
Sample
b4115fbe698ec78f6ed7814c72251d8af569422d930f172012f928355daaa138.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b4115fbe698ec78f6ed7814c72251d8af569422d930f172012f928355daaa138.exe
Resource
win10v2004-20240226-en
General
-
Target
b4115fbe698ec78f6ed7814c72251d8af569422d930f172012f928355daaa138.exe
-
Size
1.1MB
-
MD5
c55e95bcdabeb808055b5b31d1c93fc2
-
SHA1
4fa3890c48719486b311feb2eb329b0cdda8c30c
-
SHA256
b4115fbe698ec78f6ed7814c72251d8af569422d930f172012f928355daaa138
-
SHA512
d3b68332d2b393226f97dabac6373ea46536b737a9a77a24802571e678d47ad263acc9c786d8598fa26859a969e659c6f53abb23460909ff14f7d23c989496ae
-
SSDEEP
24576:CH0dl8myX9Bg42QoXFkrzkmmlSgRDko0lG4Z8r7Qfbkiu5Q/:CcaClSFlG4ZM7QzMY
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4896 b4115fbe698ec78f6ed7814c72251d8af569422d930f172012f928355daaa138.exe 4896 b4115fbe698ec78f6ed7814c72251d8af569422d930f172012f928355daaa138.exe 4896 b4115fbe698ec78f6ed7814c72251d8af569422d930f172012f928355daaa138.exe 4896 b4115fbe698ec78f6ed7814c72251d8af569422d930f172012f928355daaa138.exe 4896 b4115fbe698ec78f6ed7814c72251d8af569422d930f172012f928355daaa138.exe 4896 b4115fbe698ec78f6ed7814c72251d8af569422d930f172012f928355daaa138.exe 4896 b4115fbe698ec78f6ed7814c72251d8af569422d930f172012f928355daaa138.exe 4896 b4115fbe698ec78f6ed7814c72251d8af569422d930f172012f928355daaa138.exe 4896 b4115fbe698ec78f6ed7814c72251d8af569422d930f172012f928355daaa138.exe 4896 b4115fbe698ec78f6ed7814c72251d8af569422d930f172012f928355daaa138.exe 4896 b4115fbe698ec78f6ed7814c72251d8af569422d930f172012f928355daaa138.exe 4896 b4115fbe698ec78f6ed7814c72251d8af569422d930f172012f928355daaa138.exe 4896 b4115fbe698ec78f6ed7814c72251d8af569422d930f172012f928355daaa138.exe 4896 b4115fbe698ec78f6ed7814c72251d8af569422d930f172012f928355daaa138.exe 4896 b4115fbe698ec78f6ed7814c72251d8af569422d930f172012f928355daaa138.exe 4896 b4115fbe698ec78f6ed7814c72251d8af569422d930f172012f928355daaa138.exe 4896 b4115fbe698ec78f6ed7814c72251d8af569422d930f172012f928355daaa138.exe 4896 b4115fbe698ec78f6ed7814c72251d8af569422d930f172012f928355daaa138.exe 4896 b4115fbe698ec78f6ed7814c72251d8af569422d930f172012f928355daaa138.exe 4896 b4115fbe698ec78f6ed7814c72251d8af569422d930f172012f928355daaa138.exe 4896 b4115fbe698ec78f6ed7814c72251d8af569422d930f172012f928355daaa138.exe 4896 b4115fbe698ec78f6ed7814c72251d8af569422d930f172012f928355daaa138.exe 4896 b4115fbe698ec78f6ed7814c72251d8af569422d930f172012f928355daaa138.exe 4896 b4115fbe698ec78f6ed7814c72251d8af569422d930f172012f928355daaa138.exe 4896 b4115fbe698ec78f6ed7814c72251d8af569422d930f172012f928355daaa138.exe 4896 b4115fbe698ec78f6ed7814c72251d8af569422d930f172012f928355daaa138.exe 4896 b4115fbe698ec78f6ed7814c72251d8af569422d930f172012f928355daaa138.exe 4896 b4115fbe698ec78f6ed7814c72251d8af569422d930f172012f928355daaa138.exe 4896 b4115fbe698ec78f6ed7814c72251d8af569422d930f172012f928355daaa138.exe 4896 b4115fbe698ec78f6ed7814c72251d8af569422d930f172012f928355daaa138.exe 4896 b4115fbe698ec78f6ed7814c72251d8af569422d930f172012f928355daaa138.exe 4896 b4115fbe698ec78f6ed7814c72251d8af569422d930f172012f928355daaa138.exe 4896 b4115fbe698ec78f6ed7814c72251d8af569422d930f172012f928355daaa138.exe 4896 b4115fbe698ec78f6ed7814c72251d8af569422d930f172012f928355daaa138.exe 4896 b4115fbe698ec78f6ed7814c72251d8af569422d930f172012f928355daaa138.exe 4896 b4115fbe698ec78f6ed7814c72251d8af569422d930f172012f928355daaa138.exe 4896 b4115fbe698ec78f6ed7814c72251d8af569422d930f172012f928355daaa138.exe 4896 b4115fbe698ec78f6ed7814c72251d8af569422d930f172012f928355daaa138.exe 4896 b4115fbe698ec78f6ed7814c72251d8af569422d930f172012f928355daaa138.exe 4896 b4115fbe698ec78f6ed7814c72251d8af569422d930f172012f928355daaa138.exe 4896 b4115fbe698ec78f6ed7814c72251d8af569422d930f172012f928355daaa138.exe 4896 b4115fbe698ec78f6ed7814c72251d8af569422d930f172012f928355daaa138.exe 4896 b4115fbe698ec78f6ed7814c72251d8af569422d930f172012f928355daaa138.exe 4896 b4115fbe698ec78f6ed7814c72251d8af569422d930f172012f928355daaa138.exe 4896 b4115fbe698ec78f6ed7814c72251d8af569422d930f172012f928355daaa138.exe 4896 b4115fbe698ec78f6ed7814c72251d8af569422d930f172012f928355daaa138.exe 4896 b4115fbe698ec78f6ed7814c72251d8af569422d930f172012f928355daaa138.exe 4896 b4115fbe698ec78f6ed7814c72251d8af569422d930f172012f928355daaa138.exe 4896 b4115fbe698ec78f6ed7814c72251d8af569422d930f172012f928355daaa138.exe 4896 b4115fbe698ec78f6ed7814c72251d8af569422d930f172012f928355daaa138.exe 4896 b4115fbe698ec78f6ed7814c72251d8af569422d930f172012f928355daaa138.exe 4896 b4115fbe698ec78f6ed7814c72251d8af569422d930f172012f928355daaa138.exe 4896 b4115fbe698ec78f6ed7814c72251d8af569422d930f172012f928355daaa138.exe 4896 b4115fbe698ec78f6ed7814c72251d8af569422d930f172012f928355daaa138.exe 4896 b4115fbe698ec78f6ed7814c72251d8af569422d930f172012f928355daaa138.exe 4896 b4115fbe698ec78f6ed7814c72251d8af569422d930f172012f928355daaa138.exe 4896 b4115fbe698ec78f6ed7814c72251d8af569422d930f172012f928355daaa138.exe 4896 b4115fbe698ec78f6ed7814c72251d8af569422d930f172012f928355daaa138.exe 4896 b4115fbe698ec78f6ed7814c72251d8af569422d930f172012f928355daaa138.exe 4896 b4115fbe698ec78f6ed7814c72251d8af569422d930f172012f928355daaa138.exe 4896 b4115fbe698ec78f6ed7814c72251d8af569422d930f172012f928355daaa138.exe 4896 b4115fbe698ec78f6ed7814c72251d8af569422d930f172012f928355daaa138.exe 4896 b4115fbe698ec78f6ed7814c72251d8af569422d930f172012f928355daaa138.exe 4896 b4115fbe698ec78f6ed7814c72251d8af569422d930f172012f928355daaa138.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4896 b4115fbe698ec78f6ed7814c72251d8af569422d930f172012f928355daaa138.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4896 b4115fbe698ec78f6ed7814c72251d8af569422d930f172012f928355daaa138.exe 4896 b4115fbe698ec78f6ed7814c72251d8af569422d930f172012f928355daaa138.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b4115fbe698ec78f6ed7814c72251d8af569422d930f172012f928355daaa138.exe"C:\Users\Admin\AppData\Local\Temp\b4115fbe698ec78f6ed7814c72251d8af569422d930f172012f928355daaa138.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
PID:4896 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵PID:5868
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵PID:5876
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵PID:8476
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵PID:5884
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵PID:5892
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵PID:5900
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵PID:8532
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵PID:5908
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵PID:8480
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵PID:5916
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵PID:8368
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵PID:5980
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵PID:6560
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵PID:5940
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵PID:8652
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵PID:5988
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵PID:8372
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵PID:5948
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵PID:10204
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵PID:5968
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵PID:10184
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵PID:5956
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵PID:6484
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵PID:5964
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵PID:6100
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵PID:9412
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵PID:6132
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵PID:9272
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵PID:1568
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵PID:8240
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵PID:212
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵PID:8628
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵PID:1252
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵PID:10056
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵PID:4324
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵PID:8364
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵PID:4020
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵PID:8432
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵PID:5392
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵PID:4648
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵PID:5356
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵PID:9352
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵PID:5348
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵PID:6712
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵PID:4172
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵PID:9876
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵PID:3484
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵PID:9596
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵PID:644
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵PID:6276
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵PID:1004
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵PID:8424
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵PID:4048
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵PID:8600
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵PID:4492
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵PID:8452
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵PID:2576
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵PID:6520
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵PID:3716
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵PID:8588
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵PID:4764
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵PID:9228
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵PID:920
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵PID:8432
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵PID:4716
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵PID:368
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵PID:1088
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵PID:9224
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵PID:5128
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵PID:8828
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵PID:3516
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵PID:9676
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵PID:3160
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵PID:8456
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵PID:3128
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵PID:8508
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵PID:316
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵PID:1176
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵PID:3100
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵PID:8588
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵PID:2228
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵PID:9512
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵PID:760
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵PID:8660
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵PID:3384
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵PID:7432
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵PID:628
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵PID:9224
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵PID:3984
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵PID:9232
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵PID:4520
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵PID:3720
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵PID:1336
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵PID:6532
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵PID:3256
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵PID:8704
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵PID:2164
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵PID:6512
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵PID:2096
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵PID:9892
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵PID:2200
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵PID:9268
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵PID:6140
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵PID:6500
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵PID:6124
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵PID:5272
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵PID:6116
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵PID:9248
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵PID:6108
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵PID:8592
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵PID:6084
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵PID:8664
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵PID:6088
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵PID:8544
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵PID:8628
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"4⤵PID:9432
-
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵PID:6060
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵PID:9964
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵PID:6068
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵PID:9684
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵PID:6052
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵PID:8596
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵PID:6036
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵PID:6456
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵PID:6044
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵PID:9864
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵PID:6028
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵PID:10016
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵PID:6012
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵PID:1316
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵PID:6020
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵PID:6688
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵PID:6004
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵PID:9240
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵PID:5996
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵PID:8640
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵PID:5924
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵PID:6428
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵PID:5932
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵PID:8636
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵PID:5144
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵PID:8656
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵PID:5152
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵PID:6596
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵PID:2356
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵PID:8572
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵PID:4932
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵PID:3564
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵PID:4344
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵PID:9572
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵PID:2100
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵PID:9984
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵PID:3908
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵PID:8708
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵PID:6076
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵PID:448
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵PID:5240
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵PID:8568
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3096 --field-trial-handle=2284,i,15722001240173834669,15048020084704567542,262144 --variations-seed-version /prefetch:81⤵PID:4484
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
753B
MD5283b84a803318ca8aa2cc117a799278e
SHA181f9dca3e430603cb3f431c2ebb3126b82adc25b
SHA256a7fb916b3c493a310529cc0d437d2154066d5f588221050b51974c4b6c949a11
SHA512886c73cb933047bf1d558dc22e8b0c0886345307140286b7cbcfa54c550503c46b82168c093f622fef92c4892a4d2e9aee085e33655d2504b4cbc3981dfc5945
-
Filesize
640KB
MD5b859e049a1e2627957aa71bceac3e3bf
SHA130bae80b097886a4d39abd123f77d1885a9a13c9
SHA256bacc692c7e6e5bf3cd3360ee981c7abe1d9911eb35650211a6a2060e97fdf7eb
SHA512fa68e2341683a7c2611da6a9cab8cc4abae9f586b2e76c9b6e67425fce873615d5238763bb3c99dd666c136d4f6ad9f2104ca401d405539a25a9bec2d7789e5a
-
Filesize
448KB
MD592aaa7d282a78337aec37d84aa76bcd6
SHA1a872ef045e2292f06ae11bab57560ba1d1d8594f
SHA25677bf6152ba686e52b80b7d495915c58127c672ba34d85aa01dd11938bc134f8d
SHA5128af8cfc0aefef60c35c5803a7a94bab16160c50c651951c735136834a384de975faf6209333c3af4a0cce6d1dc8883411bbbd9017fee7be6ed0e04e358f6596b
-
Filesize
192KB
MD53749b71ce34b9c314ec6507075e37254
SHA15f74f982741c16b05b9a43d6de3050d705b112c0
SHA2567a2f89c790f9613ed849a16af6417cabba7a800481c9ebe221086d9dc9c45ffb
SHA512abf0997d1ea2068c91b3ba088853abf9390425abf06d6230a3329c2dcf67f3ddf8a1cd012764ad229cd59dc6c06889d249eaa57d43dc94b9a52742c29ab0e112
-
Filesize
384KB
MD5aacfab22ae920bd8640e6a9eaf6372cc
SHA1e465143054a1a82fda375068ee75efc8cc915671
SHA2567096569c01c32a4231f556435b0604195fcbfcda7dea046ab3b584e73cc2c746
SHA512bb6b3450eb837bcea3f7e64ee967742719cb6b3503f1e0194c992027c6d11591e55ce7a2d0158690b3c117a353207adc2218ed0c6db1bf77fc1520d7cf683498
-
Filesize
320KB
MD56ea1b316d03c44519a34bc8c266a3d15
SHA142fc178558e3979fd432c87e52be58ef721872d5
SHA2568d5abb93ee10590924437d3e249982dd502c8533f0c73f8eb8af0275a3b803bc
SHA5123c2941536f35ccc12b4f4f51a59a7fdbd6ec054c9604fa4c8bb27dee009ae1abcfa179a70f9ac1ff6b5dabf5a6ffbc8842aed16fb9a0af17b19e3c6879c236f6
-
Filesize
485KB
MD5b1b0065ed35f324fe03ae6ae1a6674c0
SHA161114718be475016814ef8024405141114501272
SHA25627045a9352a4b22472733ec9a0e1c32447cb469decfeb8d1c5058c163f475849
SHA512eb53dfad84707f691f492606800b596dac410ec3aefeb99c80fcd030bb266d284e5edb00afa44365264fa756a259ea4ddd414e61fb7a4e2b5d6a7a8b79820c71
-
Filesize
397KB
MD594e4b5bf3e12083b76571a6222fcb5e2
SHA1f96539c88e8abf57a7103ff9b69e6577695c88b3
SHA256d75774187a2c98932304ca50c3bba45672860a3f47bb5c5f7171adc44078d8d8
SHA512cb8c4683d7f513af78ec030361f23c76d8ccb43867ec0e64d1cc24e9dad0c76c0168b2db1c44c73becda2c4b20bc465d9bc937cd71ee49ff96a33e68bd2bb2fb
-
Filesize
912KB
MD5b384db26dfb9d2d305c639036f9aef73
SHA1345db26cd48b285b2620d0e8e9b27c324569211f
SHA25668f2301467fa04a622be87e14745844dfd26f25164b20954bc02a92e3aeba966
SHA512170d66f2fbae8633192ab53a8300239381e55a1ab3eab1c2f8f1a9dbebb85737e315b6f42b63e76f507c8da08918cff4c948d388d38a93d5e0793033e27a76f3
-
Filesize
704KB
MD5dbbd3fad2367ece4bb9928bba49188ad
SHA11ef2dd9662a8d837519f90dca0faf3835b16cc02
SHA25610cfb0ebe27a346c050d534c9ef05d136510d97c412303adb127b7078371e933
SHA5121e555333dd6d48d1e64db60b8e1ce8776ea2f109119fe6194e00bb7e64b30e903614b34e865f6742d322716eec7c9c86f2b89f066b060d1810c8195e7a77b55c
-
Filesize
256KB
MD5dd4d1ac7482d168c572bf55166de1967
SHA1436af56677faa4439eaef26c1197d6958ff22186
SHA256db8ead3eeaa02bc3ae12f60f11a5618221cb57d12c1a606611709cbe09a83dc8
SHA5124822f5ff93c077814656df98171c05b9e6af16ae2e394ab7f9b830abbec0c4a5d32f7fd4005e2f9a2565e815c316cedc063c34bd21299fc114519667d51df5e9
-
Filesize
992KB
MD593a3950656249f5209727a1935e20fa4
SHA118c918d53c3bb6398ee336978e71bbf3fc7d0291
SHA25640e76a6af809d87cbe84a3d156a3f11dce0a7044c844567e71c7c5a87537a698
SHA5129f39cee97036fed2912fa8bfc8a747ec016789981090fbc0037fae8572f23ccd6ca81dddd9cb1fc4fee6a46d75dbdd576a59f3204679b6b0b9380577eaf981f4
-
Filesize
1.1MB
MD5b3239501d07a6ab725219d7883ef3cba
SHA14cb85e56d07223f3cb11514c6aae31f0208f06ba
SHA2566a9e2962ffe15642f0f62ab398935e2f0c0c287b6b2534b9f201cb55c5788ffd
SHA512a5b29c24a102b1c96ae00819a258faaf7e9f950c2a9fb2fd034cfb47499e72a79d03414d7dbde58e19716ff28d037192b015c3d99069c99ab9712936c7162fc6
-
Filesize
64KB
MD54e44829972e62789502881f89b99934c
SHA12887e953c07f53f527ddb765abe81ed3b3c6f1a1
SHA256b37896dae26853413b83025f12e06ae80d1ed17e8e4602d690ca1de3ba2defd8
SHA5122e7f2f6f4ec88241b7f99aa9819d771aae366cd6277df16a7ca3ad6c6ac6ffc342c55889fba0192e928fe05a3bb4cb1722a2cd81f620cf2f11c267db42694387