Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 21:18
Behavioral task
behavioral1
Sample
3df41b50de7a0c8786f2932a702a3ec0_NeikiAnalytics.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
3df41b50de7a0c8786f2932a702a3ec0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
3df41b50de7a0c8786f2932a702a3ec0_NeikiAnalytics.exe
-
Size
2.9MB
-
MD5
3df41b50de7a0c8786f2932a702a3ec0
-
SHA1
73d0bd5df595517ad34c911904a1e8a50caa9cd9
-
SHA256
e833fd563bd3ec4f4709464f0dedec9ff797a817cbee5692da5c36bc7740735c
-
SHA512
f42d5a9a2cfad14404d4f911e78659e980fee9287bf5adfbb972bbc77b3c0e475f8542f0fd44e44d28161dfc6e85c9d240f5579754c2206624bbf52ceff0fb0c
-
SSDEEP
24576:bTO7AsmZZcVKfIxTiEVc847flVC6faaQDbGV6eH81k6IbGD2JTu0GoZQDbGV6eH3:bTO7Asmw4gxeOw46fUbNecCCFbNecC
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
explorer.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
explorer.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload 3 IoCs
Processes:
resource yara_rule \Windows\system\explorer.exe warzonerat C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe warzonerat \Windows\system\spoolsv.exe warzonerat -
Modifies Installed Components in the registry 2 TTPs 2 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe -
Drops startup file 26 IoCs
Processes:
cmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe -
Executes dropped EXE 64 IoCs
Processes:
explorer.exeexplorer.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exepid process 2840 explorer.exe 2636 explorer.exe 1508 explorer.exe 1404 spoolsv.exe 1252 spoolsv.exe 2192 spoolsv.exe 2364 spoolsv.exe 1684 spoolsv.exe 2796 spoolsv.exe 2508 spoolsv.exe 2960 spoolsv.exe 2840 spoolsv.exe 2824 spoolsv.exe 1456 spoolsv.exe 2324 spoolsv.exe 1152 spoolsv.exe 1124 spoolsv.exe 968 spoolsv.exe 2888 spoolsv.exe 2744 spoolsv.exe 2692 spoolsv.exe 1960 spoolsv.exe 2480 spoolsv.exe 2844 spoolsv.exe 2784 spoolsv.exe 1612 spoolsv.exe 2800 spoolsv.exe 1652 spoolsv.exe 1076 spoolsv.exe 2648 spoolsv.exe 1972 spoolsv.exe 2276 spoolsv.exe 2100 spoolsv.exe 2552 spoolsv.exe 1900 spoolsv.exe 1744 spoolsv.exe 1344 spoolsv.exe 2844 spoolsv.exe 1460 spoolsv.exe 536 spoolsv.exe 2136 spoolsv.exe 2036 spoolsv.exe 620 spoolsv.exe 2788 spoolsv.exe 1304 spoolsv.exe 2884 spoolsv.exe 1416 spoolsv.exe 2112 spoolsv.exe 2448 spoolsv.exe 1200 spoolsv.exe 2340 spoolsv.exe 604 spoolsv.exe 2936 spoolsv.exe 1152 spoolsv.exe 864 spoolsv.exe 1096 spoolsv.exe 2496 spoolsv.exe 2608 spoolsv.exe 2476 spoolsv.exe 1328 spoolsv.exe 2408 spoolsv.exe 2312 spoolsv.exe 2076 spoolsv.exe 2816 spoolsv.exe -
Loads dropped DLL 64 IoCs
Processes:
3df41b50de7a0c8786f2932a702a3ec0_NeikiAnalytics.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exepid process 2972 3df41b50de7a0c8786f2932a702a3ec0_NeikiAnalytics.exe 2972 3df41b50de7a0c8786f2932a702a3ec0_NeikiAnalytics.exe 1508 explorer.exe 1508 explorer.exe 1404 spoolsv.exe 1508 explorer.exe 1508 explorer.exe 2192 spoolsv.exe 1508 explorer.exe 1508 explorer.exe 1684 spoolsv.exe 1508 explorer.exe 1508 explorer.exe 2508 spoolsv.exe 1508 explorer.exe 1508 explorer.exe 2840 spoolsv.exe 1508 explorer.exe 1508 explorer.exe 1456 spoolsv.exe 1508 explorer.exe 1508 explorer.exe 1152 spoolsv.exe 1508 explorer.exe 1508 explorer.exe 968 spoolsv.exe 1508 explorer.exe 1508 explorer.exe 2744 spoolsv.exe 1508 explorer.exe 1508 explorer.exe 1960 spoolsv.exe 1508 explorer.exe 1508 explorer.exe 2844 spoolsv.exe 1508 explorer.exe 1508 explorer.exe 1612 spoolsv.exe 1508 explorer.exe 1508 explorer.exe 1652 spoolsv.exe 1508 explorer.exe 1508 explorer.exe 2648 spoolsv.exe 1508 explorer.exe 1508 explorer.exe 2276 spoolsv.exe 1508 explorer.exe 1508 explorer.exe 2552 spoolsv.exe 1508 explorer.exe 1508 explorer.exe 1744 spoolsv.exe 1508 explorer.exe 1508 explorer.exe 2844 spoolsv.exe 1508 explorer.exe 1508 explorer.exe 536 spoolsv.exe 1508 explorer.exe 1508 explorer.exe 2036 spoolsv.exe 1508 explorer.exe 1508 explorer.exe -
Adds Run key to start application 2 TTPs 15 IoCs
Processes:
spoolsv.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exe3df41b50de7a0c8786f2932a702a3ec0_NeikiAnalytics.exespoolsv.exespoolsv.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\SyncHost.exe" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\SyncHost.exe" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\SyncHost.exe" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\SyncHost.exe" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\SyncHost.exe" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\SyncHost.exe" spoolsv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\SyncHost.exe" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\SyncHost.exe" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" 3df41b50de7a0c8786f2932a702a3ec0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\SyncHost.exe" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\SyncHost.exe" spoolsv.exe -
Suspicious use of SetThreadContext 64 IoCs
Processes:
3df41b50de7a0c8786f2932a702a3ec0_NeikiAnalytics.exe3df41b50de7a0c8786f2932a702a3ec0_NeikiAnalytics.exeexplorer.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exedescription pid process target process PID 2292 set thread context of 2296 2292 3df41b50de7a0c8786f2932a702a3ec0_NeikiAnalytics.exe 3df41b50de7a0c8786f2932a702a3ec0_NeikiAnalytics.exe PID 2296 set thread context of 2972 2296 3df41b50de7a0c8786f2932a702a3ec0_NeikiAnalytics.exe 3df41b50de7a0c8786f2932a702a3ec0_NeikiAnalytics.exe PID 2296 set thread context of 1716 2296 3df41b50de7a0c8786f2932a702a3ec0_NeikiAnalytics.exe diskperf.exe PID 2840 set thread context of 2636 2840 explorer.exe explorer.exe PID 2636 set thread context of 1508 2636 explorer.exe explorer.exe PID 2636 set thread context of 112 2636 explorer.exe diskperf.exe PID 1404 set thread context of 1252 1404 spoolsv.exe spoolsv.exe PID 2192 set thread context of 2364 2192 spoolsv.exe spoolsv.exe PID 1684 set thread context of 2796 1684 spoolsv.exe spoolsv.exe PID 2508 set thread context of 2960 2508 spoolsv.exe spoolsv.exe PID 2840 set thread context of 2824 2840 spoolsv.exe spoolsv.exe PID 1456 set thread context of 2324 1456 spoolsv.exe spoolsv.exe PID 1152 set thread context of 1124 1152 spoolsv.exe spoolsv.exe PID 968 set thread context of 2888 968 spoolsv.exe spoolsv.exe PID 2744 set thread context of 2692 2744 spoolsv.exe spoolsv.exe PID 1960 set thread context of 2480 1960 spoolsv.exe spoolsv.exe PID 2844 set thread context of 2784 2844 spoolsv.exe spoolsv.exe PID 1612 set thread context of 2800 1612 spoolsv.exe spoolsv.exe PID 1652 set thread context of 1076 1652 spoolsv.exe spoolsv.exe PID 2648 set thread context of 1972 2648 spoolsv.exe spoolsv.exe PID 2276 set thread context of 2100 2276 spoolsv.exe spoolsv.exe PID 2552 set thread context of 1900 2552 spoolsv.exe spoolsv.exe PID 1744 set thread context of 1344 1744 spoolsv.exe spoolsv.exe PID 2844 set thread context of 1460 2844 spoolsv.exe spoolsv.exe PID 536 set thread context of 2136 536 spoolsv.exe spoolsv.exe PID 2036 set thread context of 620 2036 spoolsv.exe spoolsv.exe PID 2788 set thread context of 1304 2788 spoolsv.exe spoolsv.exe PID 2884 set thread context of 1416 2884 spoolsv.exe spoolsv.exe PID 2112 set thread context of 2448 2112 spoolsv.exe spoolsv.exe PID 1200 set thread context of 2340 1200 spoolsv.exe spoolsv.exe PID 604 set thread context of 2936 604 spoolsv.exe spoolsv.exe PID 1152 set thread context of 864 1152 spoolsv.exe spoolsv.exe PID 1096 set thread context of 2496 1096 spoolsv.exe spoolsv.exe PID 2608 set thread context of 2476 2608 spoolsv.exe spoolsv.exe PID 1328 set thread context of 2408 1328 spoolsv.exe spoolsv.exe PID 2312 set thread context of 2076 2312 spoolsv.exe spoolsv.exe PID 1252 set thread context of 2308 1252 spoolsv.exe spoolsv.exe PID 1252 set thread context of 2084 1252 spoolsv.exe diskperf.exe PID 2816 set thread context of 1504 2816 spoolsv.exe spoolsv.exe PID 2364 set thread context of 2036 2364 spoolsv.exe spoolsv.exe PID 1044 set thread context of 320 1044 spoolsv.exe spoolsv.exe PID 2364 set thread context of 2432 2364 spoolsv.exe diskperf.exe PID 2796 set thread context of 1144 2796 spoolsv.exe spoolsv.exe PID 2796 set thread context of 2608 2796 spoolsv.exe diskperf.exe PID 2004 set thread context of 2516 2004 spoolsv.exe spoolsv.exe PID 584 set thread context of 2568 584 explorer.exe explorer.exe PID 2960 set thread context of 2312 2960 spoolsv.exe spoolsv.exe PID 2960 set thread context of 1384 2960 spoolsv.exe diskperf.exe PID 2824 set thread context of 1656 2824 spoolsv.exe spoolsv.exe PID 2980 set thread context of 2576 2980 spoolsv.exe spoolsv.exe PID 2824 set thread context of 1816 2824 spoolsv.exe diskperf.exe PID 2324 set thread context of 2264 2324 spoolsv.exe spoolsv.exe PID 2324 set thread context of 596 2324 spoolsv.exe diskperf.exe PID 1036 set thread context of 1664 1036 explorer.exe explorer.exe PID 1124 set thread context of 2664 1124 spoolsv.exe spoolsv.exe PID 1124 set thread context of 2456 1124 spoolsv.exe diskperf.exe PID 1636 set thread context of 1896 1636 spoolsv.exe spoolsv.exe PID 2888 set thread context of 2580 2888 spoolsv.exe spoolsv.exe PID 2888 set thread context of 1616 2888 spoolsv.exe diskperf.exe PID 2956 set thread context of 1732 2956 spoolsv.exe spoolsv.exe PID 3048 set thread context of 2016 3048 explorer.exe explorer.exe PID 2692 set thread context of 2072 2692 spoolsv.exe spoolsv.exe PID 2232 set thread context of 2128 2232 spoolsv.exe spoolsv.exe PID 2480 set thread context of 896 2480 spoolsv.exe spoolsv.exe -
Drops file in Windows directory 46 IoCs
Processes:
spoolsv.exeexplorer.exeexplorer.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exe3df41b50de7a0c8786f2932a702a3ec0_NeikiAnalytics.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exedescription ioc process File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe 3df41b50de7a0c8786f2932a702a3ec0_NeikiAnalytics.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
3df41b50de7a0c8786f2932a702a3ec0_NeikiAnalytics.exe3df41b50de7a0c8786f2932a702a3ec0_NeikiAnalytics.exeexplorer.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exepid process 2292 3df41b50de7a0c8786f2932a702a3ec0_NeikiAnalytics.exe 2972 3df41b50de7a0c8786f2932a702a3ec0_NeikiAnalytics.exe 2840 explorer.exe 1404 spoolsv.exe 1508 explorer.exe 1508 explorer.exe 2192 spoolsv.exe 1508 explorer.exe 1684 spoolsv.exe 1508 explorer.exe 2508 spoolsv.exe 1508 explorer.exe 2840 spoolsv.exe 1508 explorer.exe 1456 spoolsv.exe 1508 explorer.exe 1152 spoolsv.exe 1508 explorer.exe 968 spoolsv.exe 1508 explorer.exe 2744 spoolsv.exe 1508 explorer.exe 1960 spoolsv.exe 1508 explorer.exe 2844 spoolsv.exe 1508 explorer.exe 1612 spoolsv.exe 1508 explorer.exe 1652 spoolsv.exe 1508 explorer.exe 2648 spoolsv.exe 1508 explorer.exe 2276 spoolsv.exe 1508 explorer.exe 2552 spoolsv.exe 1508 explorer.exe 1744 spoolsv.exe 1508 explorer.exe 2844 spoolsv.exe 1508 explorer.exe 536 spoolsv.exe 1508 explorer.exe 2036 spoolsv.exe 1508 explorer.exe 2788 spoolsv.exe 1508 explorer.exe 2884 spoolsv.exe 1508 explorer.exe 2112 spoolsv.exe 1508 explorer.exe 1200 spoolsv.exe 1508 explorer.exe 604 spoolsv.exe 1508 explorer.exe 1152 spoolsv.exe 1508 explorer.exe 1096 spoolsv.exe 1508 explorer.exe 2608 spoolsv.exe 1508 explorer.exe 1328 spoolsv.exe 1508 explorer.exe 2312 spoolsv.exe 1508 explorer.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
Processes:
3df41b50de7a0c8786f2932a702a3ec0_NeikiAnalytics.exe3df41b50de7a0c8786f2932a702a3ec0_NeikiAnalytics.exeexplorer.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exepid process 2292 3df41b50de7a0c8786f2932a702a3ec0_NeikiAnalytics.exe 2292 3df41b50de7a0c8786f2932a702a3ec0_NeikiAnalytics.exe 2972 3df41b50de7a0c8786f2932a702a3ec0_NeikiAnalytics.exe 2972 3df41b50de7a0c8786f2932a702a3ec0_NeikiAnalytics.exe 2840 explorer.exe 2840 explorer.exe 1508 explorer.exe 1508 explorer.exe 1404 spoolsv.exe 1404 spoolsv.exe 1508 explorer.exe 1508 explorer.exe 2192 spoolsv.exe 2192 spoolsv.exe 1684 spoolsv.exe 1684 spoolsv.exe 2508 spoolsv.exe 2508 spoolsv.exe 2840 spoolsv.exe 2840 spoolsv.exe 1456 spoolsv.exe 1456 spoolsv.exe 1152 spoolsv.exe 1152 spoolsv.exe 968 spoolsv.exe 968 spoolsv.exe 2744 spoolsv.exe 2744 spoolsv.exe 1960 spoolsv.exe 1960 spoolsv.exe 2844 spoolsv.exe 2844 spoolsv.exe 1612 spoolsv.exe 1612 spoolsv.exe 1652 spoolsv.exe 1652 spoolsv.exe 2648 spoolsv.exe 2648 spoolsv.exe 2276 spoolsv.exe 2276 spoolsv.exe 2552 spoolsv.exe 2552 spoolsv.exe 1744 spoolsv.exe 1744 spoolsv.exe 2844 spoolsv.exe 2844 spoolsv.exe 536 spoolsv.exe 536 spoolsv.exe 2036 spoolsv.exe 2036 spoolsv.exe 2788 spoolsv.exe 2788 spoolsv.exe 2884 spoolsv.exe 2884 spoolsv.exe 2112 spoolsv.exe 2112 spoolsv.exe 1200 spoolsv.exe 1200 spoolsv.exe 604 spoolsv.exe 604 spoolsv.exe 1152 spoolsv.exe 1152 spoolsv.exe 1096 spoolsv.exe 1096 spoolsv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
3df41b50de7a0c8786f2932a702a3ec0_NeikiAnalytics.exe3df41b50de7a0c8786f2932a702a3ec0_NeikiAnalytics.exe3df41b50de7a0c8786f2932a702a3ec0_NeikiAnalytics.exeexplorer.exedescription pid process target process PID 2292 wrote to memory of 2252 2292 3df41b50de7a0c8786f2932a702a3ec0_NeikiAnalytics.exe cmd.exe PID 2292 wrote to memory of 2252 2292 3df41b50de7a0c8786f2932a702a3ec0_NeikiAnalytics.exe cmd.exe PID 2292 wrote to memory of 2252 2292 3df41b50de7a0c8786f2932a702a3ec0_NeikiAnalytics.exe cmd.exe PID 2292 wrote to memory of 2252 2292 3df41b50de7a0c8786f2932a702a3ec0_NeikiAnalytics.exe cmd.exe PID 2292 wrote to memory of 2296 2292 3df41b50de7a0c8786f2932a702a3ec0_NeikiAnalytics.exe 3df41b50de7a0c8786f2932a702a3ec0_NeikiAnalytics.exe PID 2292 wrote to memory of 2296 2292 3df41b50de7a0c8786f2932a702a3ec0_NeikiAnalytics.exe 3df41b50de7a0c8786f2932a702a3ec0_NeikiAnalytics.exe PID 2292 wrote to memory of 2296 2292 3df41b50de7a0c8786f2932a702a3ec0_NeikiAnalytics.exe 3df41b50de7a0c8786f2932a702a3ec0_NeikiAnalytics.exe PID 2292 wrote to memory of 2296 2292 3df41b50de7a0c8786f2932a702a3ec0_NeikiAnalytics.exe 3df41b50de7a0c8786f2932a702a3ec0_NeikiAnalytics.exe PID 2292 wrote to memory of 2296 2292 3df41b50de7a0c8786f2932a702a3ec0_NeikiAnalytics.exe 3df41b50de7a0c8786f2932a702a3ec0_NeikiAnalytics.exe PID 2292 wrote to memory of 2296 2292 3df41b50de7a0c8786f2932a702a3ec0_NeikiAnalytics.exe 3df41b50de7a0c8786f2932a702a3ec0_NeikiAnalytics.exe PID 2292 wrote to memory of 2296 2292 3df41b50de7a0c8786f2932a702a3ec0_NeikiAnalytics.exe 3df41b50de7a0c8786f2932a702a3ec0_NeikiAnalytics.exe PID 2292 wrote to memory of 2296 2292 3df41b50de7a0c8786f2932a702a3ec0_NeikiAnalytics.exe 3df41b50de7a0c8786f2932a702a3ec0_NeikiAnalytics.exe PID 2292 wrote to memory of 2296 2292 3df41b50de7a0c8786f2932a702a3ec0_NeikiAnalytics.exe 3df41b50de7a0c8786f2932a702a3ec0_NeikiAnalytics.exe PID 2292 wrote to memory of 2296 2292 3df41b50de7a0c8786f2932a702a3ec0_NeikiAnalytics.exe 3df41b50de7a0c8786f2932a702a3ec0_NeikiAnalytics.exe PID 2292 wrote to memory of 2296 2292 3df41b50de7a0c8786f2932a702a3ec0_NeikiAnalytics.exe 3df41b50de7a0c8786f2932a702a3ec0_NeikiAnalytics.exe PID 2292 wrote to memory of 2296 2292 3df41b50de7a0c8786f2932a702a3ec0_NeikiAnalytics.exe 3df41b50de7a0c8786f2932a702a3ec0_NeikiAnalytics.exe PID 2292 wrote to memory of 2296 2292 3df41b50de7a0c8786f2932a702a3ec0_NeikiAnalytics.exe 3df41b50de7a0c8786f2932a702a3ec0_NeikiAnalytics.exe PID 2292 wrote to memory of 2296 2292 3df41b50de7a0c8786f2932a702a3ec0_NeikiAnalytics.exe 3df41b50de7a0c8786f2932a702a3ec0_NeikiAnalytics.exe PID 2292 wrote to memory of 2296 2292 3df41b50de7a0c8786f2932a702a3ec0_NeikiAnalytics.exe 3df41b50de7a0c8786f2932a702a3ec0_NeikiAnalytics.exe PID 2292 wrote to memory of 2296 2292 3df41b50de7a0c8786f2932a702a3ec0_NeikiAnalytics.exe 3df41b50de7a0c8786f2932a702a3ec0_NeikiAnalytics.exe PID 2292 wrote to memory of 2296 2292 3df41b50de7a0c8786f2932a702a3ec0_NeikiAnalytics.exe 3df41b50de7a0c8786f2932a702a3ec0_NeikiAnalytics.exe PID 2292 wrote to memory of 2296 2292 3df41b50de7a0c8786f2932a702a3ec0_NeikiAnalytics.exe 3df41b50de7a0c8786f2932a702a3ec0_NeikiAnalytics.exe PID 2292 wrote to memory of 2296 2292 3df41b50de7a0c8786f2932a702a3ec0_NeikiAnalytics.exe 3df41b50de7a0c8786f2932a702a3ec0_NeikiAnalytics.exe PID 2292 wrote to memory of 2296 2292 3df41b50de7a0c8786f2932a702a3ec0_NeikiAnalytics.exe 3df41b50de7a0c8786f2932a702a3ec0_NeikiAnalytics.exe PID 2292 wrote to memory of 2296 2292 3df41b50de7a0c8786f2932a702a3ec0_NeikiAnalytics.exe 3df41b50de7a0c8786f2932a702a3ec0_NeikiAnalytics.exe PID 2292 wrote to memory of 2296 2292 3df41b50de7a0c8786f2932a702a3ec0_NeikiAnalytics.exe 3df41b50de7a0c8786f2932a702a3ec0_NeikiAnalytics.exe PID 2292 wrote to memory of 2296 2292 3df41b50de7a0c8786f2932a702a3ec0_NeikiAnalytics.exe 3df41b50de7a0c8786f2932a702a3ec0_NeikiAnalytics.exe PID 2296 wrote to memory of 2972 2296 3df41b50de7a0c8786f2932a702a3ec0_NeikiAnalytics.exe 3df41b50de7a0c8786f2932a702a3ec0_NeikiAnalytics.exe PID 2296 wrote to memory of 2972 2296 3df41b50de7a0c8786f2932a702a3ec0_NeikiAnalytics.exe 3df41b50de7a0c8786f2932a702a3ec0_NeikiAnalytics.exe PID 2296 wrote to memory of 2972 2296 3df41b50de7a0c8786f2932a702a3ec0_NeikiAnalytics.exe 3df41b50de7a0c8786f2932a702a3ec0_NeikiAnalytics.exe PID 2296 wrote to memory of 2972 2296 3df41b50de7a0c8786f2932a702a3ec0_NeikiAnalytics.exe 3df41b50de7a0c8786f2932a702a3ec0_NeikiAnalytics.exe PID 2296 wrote to memory of 2972 2296 3df41b50de7a0c8786f2932a702a3ec0_NeikiAnalytics.exe 3df41b50de7a0c8786f2932a702a3ec0_NeikiAnalytics.exe PID 2296 wrote to memory of 2972 2296 3df41b50de7a0c8786f2932a702a3ec0_NeikiAnalytics.exe 3df41b50de7a0c8786f2932a702a3ec0_NeikiAnalytics.exe PID 2296 wrote to memory of 2972 2296 3df41b50de7a0c8786f2932a702a3ec0_NeikiAnalytics.exe 3df41b50de7a0c8786f2932a702a3ec0_NeikiAnalytics.exe PID 2296 wrote to memory of 2972 2296 3df41b50de7a0c8786f2932a702a3ec0_NeikiAnalytics.exe 3df41b50de7a0c8786f2932a702a3ec0_NeikiAnalytics.exe PID 2296 wrote to memory of 2972 2296 3df41b50de7a0c8786f2932a702a3ec0_NeikiAnalytics.exe 3df41b50de7a0c8786f2932a702a3ec0_NeikiAnalytics.exe PID 2296 wrote to memory of 1716 2296 3df41b50de7a0c8786f2932a702a3ec0_NeikiAnalytics.exe diskperf.exe PID 2296 wrote to memory of 1716 2296 3df41b50de7a0c8786f2932a702a3ec0_NeikiAnalytics.exe diskperf.exe PID 2296 wrote to memory of 1716 2296 3df41b50de7a0c8786f2932a702a3ec0_NeikiAnalytics.exe diskperf.exe PID 2296 wrote to memory of 1716 2296 3df41b50de7a0c8786f2932a702a3ec0_NeikiAnalytics.exe diskperf.exe PID 2296 wrote to memory of 1716 2296 3df41b50de7a0c8786f2932a702a3ec0_NeikiAnalytics.exe diskperf.exe PID 2296 wrote to memory of 1716 2296 3df41b50de7a0c8786f2932a702a3ec0_NeikiAnalytics.exe diskperf.exe PID 2972 wrote to memory of 2840 2972 3df41b50de7a0c8786f2932a702a3ec0_NeikiAnalytics.exe explorer.exe PID 2972 wrote to memory of 2840 2972 3df41b50de7a0c8786f2932a702a3ec0_NeikiAnalytics.exe explorer.exe PID 2972 wrote to memory of 2840 2972 3df41b50de7a0c8786f2932a702a3ec0_NeikiAnalytics.exe explorer.exe PID 2972 wrote to memory of 2840 2972 3df41b50de7a0c8786f2932a702a3ec0_NeikiAnalytics.exe explorer.exe PID 2840 wrote to memory of 348 2840 explorer.exe cmd.exe PID 2840 wrote to memory of 348 2840 explorer.exe cmd.exe PID 2840 wrote to memory of 348 2840 explorer.exe cmd.exe PID 2840 wrote to memory of 348 2840 explorer.exe cmd.exe PID 2840 wrote to memory of 2636 2840 explorer.exe explorer.exe PID 2840 wrote to memory of 2636 2840 explorer.exe explorer.exe PID 2840 wrote to memory of 2636 2840 explorer.exe explorer.exe PID 2840 wrote to memory of 2636 2840 explorer.exe explorer.exe PID 2840 wrote to memory of 2636 2840 explorer.exe explorer.exe PID 2840 wrote to memory of 2636 2840 explorer.exe explorer.exe PID 2840 wrote to memory of 2636 2840 explorer.exe explorer.exe PID 2840 wrote to memory of 2636 2840 explorer.exe explorer.exe PID 2840 wrote to memory of 2636 2840 explorer.exe explorer.exe PID 2840 wrote to memory of 2636 2840 explorer.exe explorer.exe PID 2840 wrote to memory of 2636 2840 explorer.exe explorer.exe PID 2840 wrote to memory of 2636 2840 explorer.exe explorer.exe PID 2840 wrote to memory of 2636 2840 explorer.exe explorer.exe PID 2840 wrote to memory of 2636 2840 explorer.exe explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3df41b50de7a0c8786f2932a702a3ec0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\3df41b50de7a0c8786f2932a702a3ec0_NeikiAnalytics.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "C:\Users\Admin\AppData\Local\Temp\3df41b50de7a0c8786f2932a702a3ec0_NeikiAnalytics.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"2⤵
- Drops startup file
PID:2252 -
C:\Users\Admin\AppData\Local\Temp\3df41b50de7a0c8786f2932a702a3ec0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\3df41b50de7a0c8786f2932a702a3ec0_NeikiAnalytics.exe2⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Users\Admin\AppData\Local\Temp\3df41b50de7a0c8786f2932a702a3ec0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\3df41b50de7a0c8786f2932a702a3ec0_NeikiAnalytics.exe3⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2972 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\explorer.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"5⤵
- Drops startup file
PID:348 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
PID:2636 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe6⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1508 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1404 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
PID:1044 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
PID:1252 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe9⤵PID:2308
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe10⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:584 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\explorer.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"11⤵
- Drops startup file
PID:2668 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe11⤵PID:2568
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"9⤵PID:2084
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2192 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
PID:904 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
PID:2364 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe9⤵PID:2036
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"9⤵PID:2432
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1684 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:1416
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
PID:2796 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe9⤵PID:1144
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"9⤵PID:2608
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2508 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:2580
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
PID:2960 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe9⤵PID:2312
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"9⤵PID:1384
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2840 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
PID:2968 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
PID:2824 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe9⤵PID:1656
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe10⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1036 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\explorer.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"11⤵
- Drops startup file
PID:1300 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe11⤵PID:1664
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"9⤵PID:1816
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1456 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
PID:2220 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
PID:2324 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe9⤵PID:2264
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"9⤵PID:596
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1152 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:1388
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
PID:1124 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe9⤵PID:2664
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe10⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3048 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\explorer.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"11⤵
- Drops startup file
PID:2628 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe11⤵PID:2016
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"9⤵PID:2456
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:968 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
PID:2144 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
PID:2888 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe9⤵PID:2580
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"9⤵PID:1616
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2744 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:2564
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
PID:2692 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe9⤵PID:2072
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"9⤵PID:2864
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1960 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
PID:2112 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
PID:2480 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe9⤵PID:896
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe10⤵
- Drops file in Windows directory
PID:1032 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\explorer.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"11⤵PID:2484
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe11⤵PID:2344
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"9⤵PID:816
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2844 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:1640
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2784 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe9⤵PID:2120
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"9⤵PID:2220
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1612 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
PID:2328 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
PID:2800 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe9⤵PID:2240
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe10⤵PID:1752
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\explorer.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"11⤵PID:1696
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe11⤵PID:1572
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"9⤵PID:1704
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1652 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
PID:404 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
PID:1076 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe9⤵PID:2816
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"9⤵PID:2236
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2648 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
PID:976 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
PID:1972 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2276 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:1896
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
PID:2100 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2552 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
PID:2176 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
PID:1900 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1744 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
PID:2984 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
PID:1344 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2844 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
PID:1288 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
PID:1460 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:536 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
PID:2376 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
PID:2136 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2036 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
PID:852 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
PID:620 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2788 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:2072
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
PID:1304 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2884 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:2012
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
PID:1416 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2112 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
PID:2068 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
PID:2448 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1200 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
PID:2232 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
PID:2340 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:604 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:1456
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
PID:2936 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1152 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
PID:1804 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
PID:864 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1096 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
PID:888 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
PID:2496 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:2608 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:2316
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
PID:2476 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:1328 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
PID:952 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
PID:2408 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:2312 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:3000
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
PID:2076 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2816 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:944
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵PID:1504
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1044 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:2188
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵PID:320
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2004 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:1176
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵PID:2516
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2980 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:3000
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵PID:2576
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1636 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
PID:1032 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵PID:1896
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2956 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
PID:1368 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵PID:1732
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2232 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:2968
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵PID:2128
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Drops file in Windows directory
PID:348 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:604
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵PID:2704
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵PID:1444
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:2252
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵PID:1528
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵PID:2584
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:2908
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵PID:112
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"3⤵PID:1716
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD53df41b50de7a0c8786f2932a702a3ec0
SHA173d0bd5df595517ad34c911904a1e8a50caa9cd9
SHA256e833fd563bd3ec4f4709464f0dedec9ff797a817cbee5692da5c36bc7740735c
SHA512f42d5a9a2cfad14404d4f911e78659e980fee9287bf5adfbb972bbc77b3c0e475f8542f0fd44e44d28161dfc6e85c9d240f5579754c2206624bbf52ceff0fb0c
-
Filesize
92B
MD513222a4bb413aaa8b92aa5b4f81d2760
SHA1268a48f2fe84ed49bbdc1873a8009db8c7cba66a
SHA256d170ac99460f9c1fb30717345b1003f8eb9189c26857ca26d3431590e6f0e23d
SHA512eee47ead9bef041b510ee5e40ebe8a51abd41d8c1fe5de68191f2b996feaa6cc0b8c16ed26d644fbf1d7e4f40920d7a6db954e19f2236d9e4e3f3f984f21b140
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
2.9MB
MD558a1f0c7c744c74e73f4648f7317dbe0
SHA19ec3bdcc00721b3348ef71b3ac28e42058855f67
SHA256ee019ee2c77638b6c74e4541149d6d1e1519abb90854d512e8328bbbb1e5c126
SHA5124e078ed73625443a52ca61494d501817c0b15f4f02f7be894e3f647bf4228123588a5126fe75a20c47a8879d2bb0b064e5361403d859cb95dd1aa66bed1a95fd
-
Filesize
2.9MB
MD551d50934fe3093aef934bb18274501d2
SHA1b2d550aa0889441efce0d0927ba44408cbd56901
SHA256c166f3e718599b642e57614fc110283dc13ae215042fd7797fa77772728c6269
SHA512f04eea26a7762183cc27d2868ecee9d723c84e2afc41128ab710b5393e00d922c8be93d10b976e868908bd8373b674834e63a1c8ee0b13bdbf58921052688021