Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
21-03-2024 08:04
Behavioral task
behavioral1
Sample
Vencord.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
Vencord.exe
Resource
win10v2004-20240226-en
General
-
Target
Vencord.exe
-
Size
469KB
-
MD5
e206c8908d5c24a3dda14322807d8e50
-
SHA1
144d9d69ba30e08dbe79ac3fae47e7c88aedb448
-
SHA256
00ce6c60c382436b7c8b9ddb94fbcf88e940c1ab94706555949393718bc1752e
-
SHA512
9c2ab2d8b6b5b72029ee2c8b34648abde2fa8166fcdd0c0532a720eeb908ad75cb99bbf4e747c314321f7872f92ba8657000c1231084c08a058f24035b752479
-
SSDEEP
12288:Wmnk7iLJbpIpiRL6I2WhSKQ9ZsfZQS5n9:uiLJbpI7I2WhQqZ759
Malware Config
Extracted
remcos
VenCord
147.185.221.18:52136
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
scvhost.exe
-
copy_folder
System64
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
true
-
install_path
%WinDir%\System32
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
yh?0J?xxu¢iw)>zqn*'^?^^_wh+ru?*&~2yzwL\"s?>yhi)?0J?xxuz,-QZL639
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
DiscordUpdate
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Adds policy Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\DiscordUpdate = "\"C:\\Windows\\SysWOW64\\System64\\scvhost.exe\"" iexplore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run Vencord.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\DiscordUpdate = "\"C:\\Windows\\SysWOW64\\System64\\scvhost.exe\"" Vencord.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run scvhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\DiscordUpdate = "\"C:\\Windows\\SysWOW64\\System64\\scvhost.exe\"" scvhost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run iexplore.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation Vencord.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation WScript.exe -
Executes dropped EXE 2 IoCs
pid Process 4772 scvhost.exe 4880 scvhost.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\DiscordUpdate = "\"C:\\Windows\\SysWOW64\\System64\\scvhost.exe\"" Vencord.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DiscordUpdate = "\"C:\\Windows\\SysWOW64\\System64\\scvhost.exe\"" Vencord.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\DiscordUpdate = "\"C:\\Windows\\SysWOW64\\System64\\scvhost.exe\"" scvhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DiscordUpdate = "\"C:\\Windows\\SysWOW64\\System64\\scvhost.exe\"" scvhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\DiscordUpdate = "\"C:\\Windows\\SysWOW64\\System64\\scvhost.exe\"" iexplore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DiscordUpdate = "\"C:\\Windows\\SysWOW64\\System64\\scvhost.exe\"" iexplore.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\System64\scvhost.exe Vencord.exe File opened for modification C:\Windows\SysWOW64\System64\scvhost.exe Vencord.exe -
Suspicious use of SetThreadContext 64 IoCs
description pid Process procid_target PID 4772 set thread context of 1564 4772 scvhost.exe 96 PID 1564 set thread context of 1348 1564 iexplore.exe 97 PID 1564 set thread context of 3144 1564 iexplore.exe 98 PID 1564 set thread context of 3948 1564 iexplore.exe 99 PID 1564 set thread context of 2444 1564 iexplore.exe 102 PID 1564 set thread context of 4476 1564 iexplore.exe 107 PID 1564 set thread context of 3684 1564 iexplore.exe 108 PID 1564 set thread context of 1536 1564 iexplore.exe 110 PID 1564 set thread context of 4560 1564 iexplore.exe 113 PID 1564 set thread context of 4324 1564 iexplore.exe 114 PID 1564 set thread context of 440 1564 iexplore.exe 115 PID 1564 set thread context of 2740 1564 iexplore.exe 116 PID 1564 set thread context of 536 1564 iexplore.exe 117 PID 1564 set thread context of 1496 1564 iexplore.exe 119 PID 1564 set thread context of 3152 1564 iexplore.exe 120 PID 1564 set thread context of 4444 1564 iexplore.exe 126 PID 1564 set thread context of 1388 1564 iexplore.exe 127 PID 1564 set thread context of 3112 1564 iexplore.exe 129 PID 1564 set thread context of 4792 1564 iexplore.exe 130 PID 1564 set thread context of 3876 1564 iexplore.exe 131 PID 1564 set thread context of 4200 1564 iexplore.exe 132 PID 1564 set thread context of 4244 1564 iexplore.exe 133 PID 1564 set thread context of 4984 1564 iexplore.exe 134 PID 1564 set thread context of 2920 1564 iexplore.exe 135 PID 1564 set thread context of 1156 1564 iexplore.exe 136 PID 1564 set thread context of 4948 1564 iexplore.exe 137 PID 1564 set thread context of 752 1564 iexplore.exe 138 PID 1564 set thread context of 1948 1564 iexplore.exe 139 PID 1564 set thread context of 3104 1564 iexplore.exe 140 PID 1564 set thread context of 2548 1564 iexplore.exe 141 PID 1564 set thread context of 4904 1564 iexplore.exe 142 PID 1564 set thread context of 3968 1564 iexplore.exe 143 PID 1564 set thread context of 4128 1564 iexplore.exe 144 PID 1564 set thread context of 3008 1564 iexplore.exe 147 PID 1564 set thread context of 4960 1564 iexplore.exe 148 PID 1564 set thread context of 2340 1564 iexplore.exe 149 PID 1564 set thread context of 4064 1564 iexplore.exe 150 PID 1564 set thread context of 4892 1564 iexplore.exe 151 PID 1564 set thread context of 2620 1564 iexplore.exe 152 PID 1564 set thread context of 3400 1564 iexplore.exe 153 PID 1564 set thread context of 3860 1564 iexplore.exe 155 PID 1564 set thread context of 2772 1564 iexplore.exe 156 PID 1564 set thread context of 2496 1564 iexplore.exe 157 PID 1564 set thread context of 3996 1564 iexplore.exe 158 PID 1564 set thread context of 4652 1564 iexplore.exe 159 PID 1564 set thread context of 3536 1564 iexplore.exe 160 PID 1564 set thread context of 4752 1564 iexplore.exe 161 PID 1564 set thread context of 3704 1564 iexplore.exe 162 PID 1564 set thread context of 740 1564 iexplore.exe 163 PID 1564 set thread context of 3456 1564 iexplore.exe 166 PID 1564 set thread context of 1704 1564 iexplore.exe 174 PID 1564 set thread context of 4020 1564 iexplore.exe 176 PID 1564 set thread context of 1336 1564 iexplore.exe 177 PID 1564 set thread context of 1600 1564 iexplore.exe 178 PID 1564 set thread context of 1812 1564 iexplore.exe 179 PID 1564 set thread context of 4988 1564 iexplore.exe 180 PID 1564 set thread context of 1060 1564 iexplore.exe 181 PID 1564 set thread context of 1980 1564 iexplore.exe 182 PID 1564 set thread context of 1252 1564 iexplore.exe 183 PID 1564 set thread context of 2452 1564 iexplore.exe 184 PID 1564 set thread context of 5016 1564 iexplore.exe 185 PID 1564 set thread context of 2892 1564 iexplore.exe 186 PID 1564 set thread context of 4992 1564 iexplore.exe 187 PID 1564 set thread context of 2588 1564 iexplore.exe 188 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000_Classes\Local Settings Vencord.exe Key created \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000_Classes\Local Settings taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4772 scvhost.exe 4772 scvhost.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe -
Suspicious behavior: MapViewOfSection 64 IoCs
pid Process 4772 scvhost.exe 1564 iexplore.exe 1564 iexplore.exe 1564 iexplore.exe 1564 iexplore.exe 1564 iexplore.exe 1564 iexplore.exe 1564 iexplore.exe 1564 iexplore.exe 1564 iexplore.exe 1564 iexplore.exe 1564 iexplore.exe 1564 iexplore.exe 1564 iexplore.exe 1564 iexplore.exe 1564 iexplore.exe 1564 iexplore.exe 1564 iexplore.exe 1564 iexplore.exe 1564 iexplore.exe 1564 iexplore.exe 1564 iexplore.exe 1564 iexplore.exe 1564 iexplore.exe 1564 iexplore.exe 1564 iexplore.exe 1564 iexplore.exe 1564 iexplore.exe 1564 iexplore.exe 1564 iexplore.exe 1564 iexplore.exe 1564 iexplore.exe 1564 iexplore.exe 1564 iexplore.exe 1564 iexplore.exe 1564 iexplore.exe 1564 iexplore.exe 1564 iexplore.exe 1564 iexplore.exe 1564 iexplore.exe 1564 iexplore.exe 1564 iexplore.exe 1564 iexplore.exe 1564 iexplore.exe 1564 iexplore.exe 1564 iexplore.exe 1564 iexplore.exe 1564 iexplore.exe 1564 iexplore.exe 1564 iexplore.exe 1564 iexplore.exe 1564 iexplore.exe 1564 iexplore.exe 1564 iexplore.exe 1564 iexplore.exe 1564 iexplore.exe 1564 iexplore.exe 1564 iexplore.exe 1564 iexplore.exe 1564 iexplore.exe 1564 iexplore.exe 1564 iexplore.exe 1564 iexplore.exe 1564 iexplore.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3944 taskmgr.exe Token: SeSystemProfilePrivilege 3944 taskmgr.exe Token: SeCreateGlobalPrivilege 3944 taskmgr.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe 3944 taskmgr.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3052 wrote to memory of 3008 3052 Vencord.exe 92 PID 3052 wrote to memory of 3008 3052 Vencord.exe 92 PID 3052 wrote to memory of 3008 3052 Vencord.exe 92 PID 3008 wrote to memory of 3608 3008 WScript.exe 93 PID 3008 wrote to memory of 3608 3008 WScript.exe 93 PID 3008 wrote to memory of 3608 3008 WScript.exe 93 PID 3608 wrote to memory of 4772 3608 cmd.exe 95 PID 3608 wrote to memory of 4772 3608 cmd.exe 95 PID 3608 wrote to memory of 4772 3608 cmd.exe 95 PID 4772 wrote to memory of 1564 4772 scvhost.exe 96 PID 4772 wrote to memory of 1564 4772 scvhost.exe 96 PID 4772 wrote to memory of 1564 4772 scvhost.exe 96 PID 4772 wrote to memory of 1564 4772 scvhost.exe 96 PID 1564 wrote to memory of 1348 1564 iexplore.exe 97 PID 1564 wrote to memory of 1348 1564 iexplore.exe 97 PID 1564 wrote to memory of 1348 1564 iexplore.exe 97 PID 1564 wrote to memory of 1348 1564 iexplore.exe 97 PID 1564 wrote to memory of 3144 1564 iexplore.exe 98 PID 1564 wrote to memory of 3144 1564 iexplore.exe 98 PID 1564 wrote to memory of 3144 1564 iexplore.exe 98 PID 1564 wrote to memory of 3144 1564 iexplore.exe 98 PID 1564 wrote to memory of 3948 1564 iexplore.exe 99 PID 1564 wrote to memory of 3948 1564 iexplore.exe 99 PID 1564 wrote to memory of 3948 1564 iexplore.exe 99 PID 1564 wrote to memory of 3948 1564 iexplore.exe 99 PID 1564 wrote to memory of 2444 1564 iexplore.exe 102 PID 1564 wrote to memory of 2444 1564 iexplore.exe 102 PID 1564 wrote to memory of 2444 1564 iexplore.exe 102 PID 1564 wrote to memory of 2444 1564 iexplore.exe 102 PID 1564 wrote to memory of 4476 1564 iexplore.exe 107 PID 1564 wrote to memory of 4476 1564 iexplore.exe 107 PID 1564 wrote to memory of 4476 1564 iexplore.exe 107 PID 1564 wrote to memory of 4476 1564 iexplore.exe 107 PID 1564 wrote to memory of 3684 1564 iexplore.exe 108 PID 1564 wrote to memory of 3684 1564 iexplore.exe 108 PID 1564 wrote to memory of 3684 1564 iexplore.exe 108 PID 1564 wrote to memory of 3684 1564 iexplore.exe 108 PID 1564 wrote to memory of 1536 1564 iexplore.exe 110 PID 1564 wrote to memory of 1536 1564 iexplore.exe 110 PID 1564 wrote to memory of 1536 1564 iexplore.exe 110 PID 1564 wrote to memory of 1536 1564 iexplore.exe 110 PID 1564 wrote to memory of 4560 1564 iexplore.exe 113 PID 1564 wrote to memory of 4560 1564 iexplore.exe 113 PID 1564 wrote to memory of 4560 1564 iexplore.exe 113 PID 1564 wrote to memory of 4560 1564 iexplore.exe 113 PID 1564 wrote to memory of 4324 1564 iexplore.exe 114 PID 1564 wrote to memory of 4324 1564 iexplore.exe 114 PID 1564 wrote to memory of 4324 1564 iexplore.exe 114 PID 1564 wrote to memory of 4324 1564 iexplore.exe 114 PID 1564 wrote to memory of 440 1564 iexplore.exe 115 PID 1564 wrote to memory of 440 1564 iexplore.exe 115 PID 1564 wrote to memory of 440 1564 iexplore.exe 115 PID 1564 wrote to memory of 440 1564 iexplore.exe 115 PID 1564 wrote to memory of 2740 1564 iexplore.exe 116 PID 1564 wrote to memory of 2740 1564 iexplore.exe 116 PID 1564 wrote to memory of 2740 1564 iexplore.exe 116 PID 1564 wrote to memory of 2740 1564 iexplore.exe 116 PID 1564 wrote to memory of 536 1564 iexplore.exe 117 PID 1564 wrote to memory of 536 1564 iexplore.exe 117 PID 1564 wrote to memory of 536 1564 iexplore.exe 117 PID 1564 wrote to memory of 536 1564 iexplore.exe 117 PID 1564 wrote to memory of 1496 1564 iexplore.exe 119 PID 1564 wrote to memory of 1496 1564 iexplore.exe 119 PID 1564 wrote to memory of 1496 1564 iexplore.exe 119
Processes
-
C:\Users\Admin\AppData\Local\Temp\Vencord.exe"C:\Users\Admin\AppData\Local\Temp\Vencord.exe"1⤵
- Adds policy Run key to start application
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\Windows\SysWOW64\System64\scvhost.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:3608 -
C:\Windows\SysWOW64\System64\scvhost.exeC:\Windows\SysWOW64\System64\scvhost.exe4⤵
- Adds policy Run key to start application
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4772 -
\??\c:\program files (x86)\internet explorer\iexplore.exe"c:\program files (x86)\internet explorer\iexplore.exe"5⤵
- Adds policy Run key to start application
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Windows\SysWOW64\svchost.exesvchost.exe6⤵PID:1348
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe6⤵PID:3144
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe6⤵PID:3948
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe6⤵PID:2444
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe6⤵PID:4476
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe6⤵PID:3684
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe6⤵PID:1536
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe6⤵PID:4560
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe6⤵PID:4324
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe6⤵PID:440
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe6⤵PID:2740
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe6⤵PID:536
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe6⤵PID:1496
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe6⤵PID:3152
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe6⤵PID:4444
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe6⤵PID:1388
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe6⤵PID:3112
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe6⤵PID:4792
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe6⤵PID:3876
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe6⤵PID:4200
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe6⤵PID:4244
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe6⤵PID:4984
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe6⤵PID:2920
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe6⤵PID:1156
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe6⤵PID:4948
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe6⤵PID:752
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe6⤵PID:1948
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe6⤵PID:3104
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe6⤵PID:2548
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe6⤵PID:4904
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe6⤵PID:3968
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe6⤵PID:4128
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe6⤵PID:3008
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe6⤵PID:4960
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe6⤵PID:2340
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe6⤵PID:4064
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe6⤵PID:4892
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe6⤵PID:2620
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe6⤵PID:3400
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe6⤵PID:3860
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe6⤵PID:2772
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe6⤵PID:2496
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe6⤵PID:3996
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe6⤵PID:4652
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe6⤵PID:3536
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe6⤵PID:4752
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe6⤵PID:3704
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe6⤵PID:740
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe6⤵PID:3456
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe6⤵PID:1704
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe6⤵PID:4020
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe6⤵PID:1336
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe6⤵PID:1600
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe6⤵PID:1812
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe6⤵PID:4988
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe6⤵PID:1060
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe6⤵PID:1980
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe6⤵PID:1252
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe6⤵PID:2452
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe6⤵PID:5016
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe6⤵PID:2892
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe6⤵PID:4992
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe6⤵PID:2588
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe6⤵PID:1160
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe6⤵PID:4104
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe6⤵PID:3068
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe6⤵PID:2300
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe6⤵PID:3240
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe6⤵PID:3040
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe6⤵PID:2600
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe6⤵PID:3092
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe6⤵PID:1228
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe6⤵PID:4828
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe6⤵PID:3232
-
-
-
-
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3944
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3100
-
C:\Windows\System32\wezuc9.exe"C:\Windows\System32\wezuc9.exe"1⤵PID:3300
-
C:\Windows\SysWOW64\System64\scvhost.exe"C:\Windows\SysWOW64\System64\scvhost.exe"1⤵
- Executes dropped EXE
PID:4880
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
402B
MD5aa3bb02fdbe0aed95d2adf0ef033c2be
SHA1002f7db7d5e7d368d27d7b1efd1a4f571fac1740
SHA256d2f9e454aa3a7e614f38219f333420f2ac7963fffafccf3105929c280274de59
SHA5123a49dfd9d827efdab3abf6220375ba921dde0772bba2b0674ed2562da27853f0df0b786f26c233ca96d8d89c1c95489330c3aea07e62c0b0a6ed716324d8c913
-
Filesize
469KB
MD5e206c8908d5c24a3dda14322807d8e50
SHA1144d9d69ba30e08dbe79ac3fae47e7c88aedb448
SHA25600ce6c60c382436b7c8b9ddb94fbcf88e940c1ab94706555949393718bc1752e
SHA5129c2ab2d8b6b5b72029ee2c8b34648abde2fa8166fcdd0c0532a720eeb908ad75cb99bbf4e747c314321f7872f92ba8657000c1231084c08a058f24035b752479