Analysis
-
max time kernel
142s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10/06/2024, 13:04
Behavioral task
behavioral1
Sample
6763ec95c65a395178b18c9ad2be0d03abe3014e1800044c718977c27852fe4d.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6763ec95c65a395178b18c9ad2be0d03abe3014e1800044c718977c27852fe4d.exe
Resource
win10v2004-20240426-en
General
-
Target
6763ec95c65a395178b18c9ad2be0d03abe3014e1800044c718977c27852fe4d.exe
-
Size
2.9MB
-
MD5
19edaea823ed4d04f7cf1f90df737b3d
-
SHA1
244829d004dfbb6b8b5842c2be2cb9d982bf6a9e
-
SHA256
6763ec95c65a395178b18c9ad2be0d03abe3014e1800044c718977c27852fe4d
-
SHA512
4f650cc40df792547b126a0ecfeb4af273e14f94b651ea3e52a5fc9f94382b638fc63aaa163c52f5ed976b55937e7188e02af697abe36ef9b92be55ad0e11da9
-
SSDEEP
24576:ATU7AAmZZcVKfIxTiEVc847flVC6faaQDbGV6eH81k6IbGD2JTu0GoZQDbGV6eHM:ATU7AAmw4gxeOw46fUbNecCCFbNecp
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Detects executables packed with ASPack 44 IoCs
resource yara_rule behavioral1/memory/2828-7-0x0000000000400000-0x0000000001400000-memory.dmp INDICATOR_EXE_Packed_ASPack behavioral1/memory/2828-12-0x0000000000400000-0x0000000001400000-memory.dmp INDICATOR_EXE_Packed_ASPack behavioral1/memory/2828-14-0x0000000000400000-0x0000000001400000-memory.dmp INDICATOR_EXE_Packed_ASPack behavioral1/memory/2828-18-0x0000000000400000-0x0000000001400000-memory.dmp INDICATOR_EXE_Packed_ASPack behavioral1/memory/2828-31-0x0000000000400000-0x0000000001400000-memory.dmp INDICATOR_EXE_Packed_ASPack behavioral1/memory/2828-38-0x0000000000400000-0x0000000001400000-memory.dmp INDICATOR_EXE_Packed_ASPack behavioral1/memory/2828-43-0x0000000000400000-0x0000000000628000-memory.dmp INDICATOR_EXE_Packed_ASPack behavioral1/memory/2828-47-0x0000000000400000-0x0000000000628000-memory.dmp INDICATOR_EXE_Packed_ASPack behavioral1/memory/2828-48-0x0000000000400000-0x0000000001400000-memory.dmp INDICATOR_EXE_Packed_ASPack behavioral1/memory/2828-49-0x0000000000400000-0x0000000001400000-memory.dmp INDICATOR_EXE_Packed_ASPack behavioral1/memory/2828-51-0x0000000000400000-0x0000000001400000-memory.dmp INDICATOR_EXE_Packed_ASPack behavioral1/memory/2828-53-0x0000000000400000-0x0000000001400000-memory.dmp INDICATOR_EXE_Packed_ASPack behavioral1/memory/2828-50-0x0000000000400000-0x0000000001400000-memory.dmp INDICATOR_EXE_Packed_ASPack behavioral1/memory/2828-46-0x0000000000400000-0x0000000001400000-memory.dmp INDICATOR_EXE_Packed_ASPack behavioral1/memory/2828-52-0x0000000000400000-0x0000000000628000-memory.dmp INDICATOR_EXE_Packed_ASPack behavioral1/memory/2828-44-0x0000000000400000-0x0000000000628000-memory.dmp INDICATOR_EXE_Packed_ASPack behavioral1/memory/2828-42-0x0000000000400000-0x0000000000628000-memory.dmp INDICATOR_EXE_Packed_ASPack behavioral1/memory/2828-40-0x0000000000400000-0x0000000001400000-memory.dmp INDICATOR_EXE_Packed_ASPack behavioral1/memory/2828-32-0x0000000000400000-0x0000000001400000-memory.dmp INDICATOR_EXE_Packed_ASPack behavioral1/memory/2828-54-0x0000000000400000-0x0000000000628000-memory.dmp INDICATOR_EXE_Packed_ASPack behavioral1/memory/2828-29-0x0000000000400000-0x0000000001400000-memory.dmp INDICATOR_EXE_Packed_ASPack behavioral1/memory/2828-26-0x0000000000400000-0x0000000001400000-memory.dmp INDICATOR_EXE_Packed_ASPack behavioral1/memory/2828-22-0x0000000000400000-0x0000000001400000-memory.dmp INDICATOR_EXE_Packed_ASPack behavioral1/memory/2828-25-0x0000000000400000-0x0000000001400000-memory.dmp INDICATOR_EXE_Packed_ASPack behavioral1/memory/2828-20-0x0000000000400000-0x0000000001400000-memory.dmp INDICATOR_EXE_Packed_ASPack behavioral1/memory/2828-16-0x0000000000400000-0x0000000001400000-memory.dmp INDICATOR_EXE_Packed_ASPack behavioral1/memory/2828-10-0x0000000000400000-0x0000000001400000-memory.dmp INDICATOR_EXE_Packed_ASPack behavioral1/memory/2828-9-0x0000000000400000-0x0000000001400000-memory.dmp INDICATOR_EXE_Packed_ASPack behavioral1/memory/2828-55-0x0000000000400000-0x0000000000628000-memory.dmp INDICATOR_EXE_Packed_ASPack behavioral1/memory/2828-92-0x0000000000400000-0x0000000000628000-memory.dmp INDICATOR_EXE_Packed_ASPack behavioral1/memory/1724-151-0x0000000000400000-0x0000000000628000-memory.dmp INDICATOR_EXE_Packed_ASPack behavioral1/memory/1724-185-0x0000000000400000-0x0000000000628000-memory.dmp INDICATOR_EXE_Packed_ASPack behavioral1/memory/1544-253-0x0000000000400000-0x0000000000628000-memory.dmp INDICATOR_EXE_Packed_ASPack behavioral1/memory/1396-303-0x0000000000400000-0x0000000001990000-memory.dmp INDICATOR_EXE_Packed_ASPack behavioral1/memory/556-357-0x0000000000400000-0x0000000000628000-memory.dmp INDICATOR_EXE_Packed_ASPack behavioral1/memory/1848-421-0x0000000002C60000-0x0000000002CA6000-memory.dmp INDICATOR_EXE_Packed_ASPack behavioral1/memory/1700-414-0x0000000000400000-0x0000000000628000-memory.dmp INDICATOR_EXE_Packed_ASPack behavioral1/memory/1540-467-0x0000000000400000-0x0000000001990000-memory.dmp INDICATOR_EXE_Packed_ASPack behavioral1/memory/2140-558-0x0000000000400000-0x0000000001990000-memory.dmp INDICATOR_EXE_Packed_ASPack behavioral1/memory/2264-584-0x0000000000400000-0x0000000000628000-memory.dmp INDICATOR_EXE_Packed_ASPack behavioral1/memory/2748-633-0x0000000000400000-0x0000000000628000-memory.dmp INDICATOR_EXE_Packed_ASPack behavioral1/memory/2560-685-0x0000000000400000-0x0000000000628000-memory.dmp INDICATOR_EXE_Packed_ASPack behavioral1/memory/1544-935-0x0000000000400000-0x0000000000628000-memory.dmp INDICATOR_EXE_Packed_ASPack behavioral1/memory/1396-1144-0x0000000000400000-0x0000000001990000-memory.dmp INDICATOR_EXE_Packed_ASPack -
UPX dump on OEP (original entry point) 23 IoCs
resource yara_rule behavioral1/memory/1500-0-0x0000000000400000-0x0000000000446000-memory.dmp UPX behavioral1/memory/1500-41-0x0000000000400000-0x0000000000446000-memory.dmp UPX behavioral1/files/0x0008000000015c87-95.dat UPX behavioral1/memory/1976-104-0x0000000000400000-0x0000000000446000-memory.dmp UPX behavioral1/memory/2224-97-0x00000000026C0000-0x0000000002706000-memory.dmp UPX behavioral1/files/0x0007000000015c69-175.dat UPX behavioral1/files/0x000a000000015d88-191.dat UPX behavioral1/memory/1664-246-0x0000000000400000-0x0000000000446000-memory.dmp UPX behavioral1/memory/2888-254-0x0000000000400000-0x0000000000446000-memory.dmp UPX behavioral1/memory/2560-308-0x0000000000400000-0x0000000000446000-memory.dmp UPX behavioral1/memory/2560-353-0x0000000000400000-0x0000000000446000-memory.dmp UPX behavioral1/memory/1272-365-0x0000000000400000-0x0000000000446000-memory.dmp UPX behavioral1/memory/1848-418-0x0000000002C60000-0x0000000002CA6000-memory.dmp UPX behavioral1/memory/1848-417-0x0000000002C60000-0x0000000002CA6000-memory.dmp UPX behavioral1/memory/2312-422-0x0000000000400000-0x0000000000446000-memory.dmp UPX behavioral1/memory/1848-420-0x0000000002C60000-0x0000000002CA6000-memory.dmp UPX behavioral1/memory/2072-470-0x0000000000400000-0x0000000000446000-memory.dmp UPX behavioral1/memory/2972-572-0x0000000000400000-0x0000000000446000-memory.dmp UPX behavioral1/memory/836-585-0x0000000000400000-0x0000000000446000-memory.dmp UPX behavioral1/memory/1848-637-0x0000000002C60000-0x0000000002CA6000-memory.dmp UPX behavioral1/memory/2452-640-0x0000000000400000-0x0000000000446000-memory.dmp UPX behavioral1/memory/1780-698-0x0000000000400000-0x0000000000446000-memory.dmp UPX behavioral1/memory/1964-750-0x0000000000400000-0x0000000000446000-memory.dmp UPX -
Warzone RAT payload 3 IoCs
resource yara_rule behavioral1/files/0x0008000000015c87-95.dat warzonerat behavioral1/files/0x0007000000015c69-175.dat warzonerat behavioral1/files/0x000a000000015d88-191.dat warzonerat -
Modifies Installed Components in the registry 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe -
Drops startup file 7 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe -
Executes dropped EXE 32 IoCs
pid Process 1976 explorer.exe 1724 explorer.exe 1848 explorer.exe 1664 spoolsv.exe 1544 spoolsv.exe 2888 spoolsv.exe 1396 spoolsv.exe 2560 spoolsv.exe 556 spoolsv.exe 1272 spoolsv.exe 1700 spoolsv.exe 2312 spoolsv.exe 1540 spoolsv.exe 2072 spoolsv.exe 2140 spoolsv.exe 2972 spoolsv.exe 2264 spoolsv.exe 836 spoolsv.exe 2748 spoolsv.exe 2452 spoolsv.exe 2560 spoolsv.exe 1780 spoolsv.exe 1092 spoolsv.exe 1964 spoolsv.exe 2432 spoolsv.exe 2864 spoolsv.exe 792 spoolsv.exe 340 spoolsv.exe 2096 spoolsv.exe 2856 spoolsv.exe 1768 spoolsv.exe 2424 explorer.exe -
Loads dropped DLL 46 IoCs
pid Process 2224 6763ec95c65a395178b18c9ad2be0d03abe3014e1800044c718977c27852fe4d.exe 2224 6763ec95c65a395178b18c9ad2be0d03abe3014e1800044c718977c27852fe4d.exe 1848 explorer.exe 1848 explorer.exe 1664 spoolsv.exe 1848 explorer.exe 1848 explorer.exe 2888 spoolsv.exe 1848 explorer.exe 1848 explorer.exe 2560 spoolsv.exe 1848 explorer.exe 1848 explorer.exe 1272 spoolsv.exe 1848 explorer.exe 1848 explorer.exe 2312 spoolsv.exe 1848 explorer.exe 1848 explorer.exe 2072 spoolsv.exe 1848 explorer.exe 1848 explorer.exe 2972 spoolsv.exe 1848 explorer.exe 1848 explorer.exe 836 spoolsv.exe 1848 explorer.exe 1848 explorer.exe 2452 spoolsv.exe 1848 explorer.exe 1848 explorer.exe 1780 spoolsv.exe 1848 explorer.exe 1848 explorer.exe 1964 spoolsv.exe 1848 explorer.exe 1848 explorer.exe 2864 spoolsv.exe 1848 explorer.exe 1848 explorer.exe 340 spoolsv.exe 1848 explorer.exe 1848 explorer.exe 2856 spoolsv.exe 1544 spoolsv.exe 1768 spoolsv.exe -
resource yara_rule behavioral1/memory/1500-0-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral1/memory/1500-41-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral1/memory/2828-60-0x0000000008B60000-0x0000000008BA6000-memory.dmp upx behavioral1/files/0x0008000000015c87-95.dat upx behavioral1/memory/1976-104-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral1/memory/2224-97-0x00000000026C0000-0x0000000002706000-memory.dmp upx behavioral1/files/0x0007000000015c69-175.dat upx behavioral1/files/0x000a000000015d88-191.dat upx behavioral1/memory/1664-246-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral1/memory/2888-254-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral1/memory/2560-308-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral1/memory/2560-353-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral1/memory/1272-365-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral1/memory/1848-418-0x0000000002C60000-0x0000000002CA6000-memory.dmp upx behavioral1/memory/1848-417-0x0000000002C60000-0x0000000002CA6000-memory.dmp upx behavioral1/memory/2312-422-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral1/memory/1848-420-0x0000000002C60000-0x0000000002CA6000-memory.dmp upx behavioral1/memory/2072-470-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral1/memory/2972-572-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral1/memory/836-585-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral1/memory/1848-637-0x0000000002C60000-0x0000000002CA6000-memory.dmp upx behavioral1/memory/2452-640-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral1/memory/1780-698-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral1/memory/1964-750-0x0000000000400000-0x0000000000446000-memory.dmp upx -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" 6763ec95c65a395178b18c9ad2be0d03abe3014e1800044c718977c27852fe4d.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" explorer.exe -
Suspicious use of SetThreadContext 20 IoCs
description pid Process procid_target PID 1500 set thread context of 2828 1500 6763ec95c65a395178b18c9ad2be0d03abe3014e1800044c718977c27852fe4d.exe 30 PID 2828 set thread context of 2224 2828 6763ec95c65a395178b18c9ad2be0d03abe3014e1800044c718977c27852fe4d.exe 33 PID 2828 set thread context of 2464 2828 6763ec95c65a395178b18c9ad2be0d03abe3014e1800044c718977c27852fe4d.exe 34 PID 1976 set thread context of 1724 1976 explorer.exe 38 PID 1724 set thread context of 1848 1724 explorer.exe 39 PID 1724 set thread context of 1792 1724 explorer.exe 40 PID 1664 set thread context of 1544 1664 spoolsv.exe 44 PID 2888 set thread context of 1396 2888 spoolsv.exe 47 PID 2560 set thread context of 556 2560 spoolsv.exe 51 PID 1272 set thread context of 1700 1272 spoolsv.exe 55 PID 2312 set thread context of 1540 2312 spoolsv.exe 58 PID 2072 set thread context of 2140 2072 spoolsv.exe 62 PID 2972 set thread context of 2264 2972 spoolsv.exe 65 PID 836 set thread context of 2748 836 spoolsv.exe 69 PID 2452 set thread context of 2560 2452 spoolsv.exe 73 PID 1780 set thread context of 1092 1780 spoolsv.exe 77 PID 1964 set thread context of 2432 1964 spoolsv.exe 80 PID 2864 set thread context of 792 2864 spoolsv.exe 84 PID 340 set thread context of 2096 340 spoolsv.exe 87 PID 1544 set thread context of 1768 1544 spoolsv.exe 92 -
Drops file in Windows directory 18 IoCs
description ioc Process File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe 6763ec95c65a395178b18c9ad2be0d03abe3014e1800044c718977c27852fe4d.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 1500 6763ec95c65a395178b18c9ad2be0d03abe3014e1800044c718977c27852fe4d.exe 2224 6763ec95c65a395178b18c9ad2be0d03abe3014e1800044c718977c27852fe4d.exe 1976 explorer.exe 1664 spoolsv.exe 1848 explorer.exe 1848 explorer.exe 2888 spoolsv.exe 1848 explorer.exe 2560 spoolsv.exe 1848 explorer.exe 1272 spoolsv.exe 1848 explorer.exe 2312 spoolsv.exe 1848 explorer.exe 2072 spoolsv.exe 1848 explorer.exe 2972 spoolsv.exe 1848 explorer.exe 836 spoolsv.exe 1848 explorer.exe 2452 spoolsv.exe 1848 explorer.exe 1780 spoolsv.exe 1848 explorer.exe 1964 spoolsv.exe 1848 explorer.exe 2864 spoolsv.exe 1848 explorer.exe 340 spoolsv.exe 1848 explorer.exe 2856 spoolsv.exe -
Suspicious use of SetWindowsHookEx 40 IoCs
pid Process 1500 6763ec95c65a395178b18c9ad2be0d03abe3014e1800044c718977c27852fe4d.exe 1500 6763ec95c65a395178b18c9ad2be0d03abe3014e1800044c718977c27852fe4d.exe 2224 6763ec95c65a395178b18c9ad2be0d03abe3014e1800044c718977c27852fe4d.exe 2224 6763ec95c65a395178b18c9ad2be0d03abe3014e1800044c718977c27852fe4d.exe 1976 explorer.exe 1976 explorer.exe 1848 explorer.exe 1848 explorer.exe 1664 spoolsv.exe 1664 spoolsv.exe 1848 explorer.exe 1848 explorer.exe 2888 spoolsv.exe 2888 spoolsv.exe 2560 spoolsv.exe 2560 spoolsv.exe 1272 spoolsv.exe 1272 spoolsv.exe 2312 spoolsv.exe 2312 spoolsv.exe 2072 spoolsv.exe 2072 spoolsv.exe 2972 spoolsv.exe 2972 spoolsv.exe 836 spoolsv.exe 836 spoolsv.exe 2452 spoolsv.exe 2452 spoolsv.exe 1780 spoolsv.exe 1780 spoolsv.exe 1964 spoolsv.exe 1964 spoolsv.exe 2864 spoolsv.exe 2864 spoolsv.exe 340 spoolsv.exe 340 spoolsv.exe 2856 spoolsv.exe 2856 spoolsv.exe 1768 spoolsv.exe 1768 spoolsv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1500 wrote to memory of 2476 1500 6763ec95c65a395178b18c9ad2be0d03abe3014e1800044c718977c27852fe4d.exe 28 PID 1500 wrote to memory of 2476 1500 6763ec95c65a395178b18c9ad2be0d03abe3014e1800044c718977c27852fe4d.exe 28 PID 1500 wrote to memory of 2476 1500 6763ec95c65a395178b18c9ad2be0d03abe3014e1800044c718977c27852fe4d.exe 28 PID 1500 wrote to memory of 2476 1500 6763ec95c65a395178b18c9ad2be0d03abe3014e1800044c718977c27852fe4d.exe 28 PID 1500 wrote to memory of 2828 1500 6763ec95c65a395178b18c9ad2be0d03abe3014e1800044c718977c27852fe4d.exe 30 PID 1500 wrote to memory of 2828 1500 6763ec95c65a395178b18c9ad2be0d03abe3014e1800044c718977c27852fe4d.exe 30 PID 1500 wrote to memory of 2828 1500 6763ec95c65a395178b18c9ad2be0d03abe3014e1800044c718977c27852fe4d.exe 30 PID 1500 wrote to memory of 2828 1500 6763ec95c65a395178b18c9ad2be0d03abe3014e1800044c718977c27852fe4d.exe 30 PID 1500 wrote to memory of 2828 1500 6763ec95c65a395178b18c9ad2be0d03abe3014e1800044c718977c27852fe4d.exe 30 PID 1500 wrote to memory of 2828 1500 6763ec95c65a395178b18c9ad2be0d03abe3014e1800044c718977c27852fe4d.exe 30 PID 1500 wrote to memory of 2828 1500 6763ec95c65a395178b18c9ad2be0d03abe3014e1800044c718977c27852fe4d.exe 30 PID 1500 wrote to memory of 2828 1500 6763ec95c65a395178b18c9ad2be0d03abe3014e1800044c718977c27852fe4d.exe 30 PID 1500 wrote to memory of 2828 1500 6763ec95c65a395178b18c9ad2be0d03abe3014e1800044c718977c27852fe4d.exe 30 PID 1500 wrote to memory of 2828 1500 6763ec95c65a395178b18c9ad2be0d03abe3014e1800044c718977c27852fe4d.exe 30 PID 1500 wrote to memory of 2828 1500 6763ec95c65a395178b18c9ad2be0d03abe3014e1800044c718977c27852fe4d.exe 30 PID 1500 wrote to memory of 2828 1500 6763ec95c65a395178b18c9ad2be0d03abe3014e1800044c718977c27852fe4d.exe 30 PID 1500 wrote to memory of 2828 1500 6763ec95c65a395178b18c9ad2be0d03abe3014e1800044c718977c27852fe4d.exe 30 PID 1500 wrote to memory of 2828 1500 6763ec95c65a395178b18c9ad2be0d03abe3014e1800044c718977c27852fe4d.exe 30 PID 1500 wrote to memory of 2828 1500 6763ec95c65a395178b18c9ad2be0d03abe3014e1800044c718977c27852fe4d.exe 30 PID 1500 wrote to memory of 2828 1500 6763ec95c65a395178b18c9ad2be0d03abe3014e1800044c718977c27852fe4d.exe 30 PID 1500 wrote to memory of 2828 1500 6763ec95c65a395178b18c9ad2be0d03abe3014e1800044c718977c27852fe4d.exe 30 PID 1500 wrote to memory of 2828 1500 6763ec95c65a395178b18c9ad2be0d03abe3014e1800044c718977c27852fe4d.exe 30 PID 1500 wrote to memory of 2828 1500 6763ec95c65a395178b18c9ad2be0d03abe3014e1800044c718977c27852fe4d.exe 30 PID 1500 wrote to memory of 2828 1500 6763ec95c65a395178b18c9ad2be0d03abe3014e1800044c718977c27852fe4d.exe 30 PID 1500 wrote to memory of 2828 1500 6763ec95c65a395178b18c9ad2be0d03abe3014e1800044c718977c27852fe4d.exe 30 PID 1500 wrote to memory of 2828 1500 6763ec95c65a395178b18c9ad2be0d03abe3014e1800044c718977c27852fe4d.exe 30 PID 1500 wrote to memory of 2828 1500 6763ec95c65a395178b18c9ad2be0d03abe3014e1800044c718977c27852fe4d.exe 30 PID 2828 wrote to memory of 2224 2828 6763ec95c65a395178b18c9ad2be0d03abe3014e1800044c718977c27852fe4d.exe 33 PID 2828 wrote to memory of 2224 2828 6763ec95c65a395178b18c9ad2be0d03abe3014e1800044c718977c27852fe4d.exe 33 PID 2828 wrote to memory of 2224 2828 6763ec95c65a395178b18c9ad2be0d03abe3014e1800044c718977c27852fe4d.exe 33 PID 2828 wrote to memory of 2224 2828 6763ec95c65a395178b18c9ad2be0d03abe3014e1800044c718977c27852fe4d.exe 33 PID 2828 wrote to memory of 2224 2828 6763ec95c65a395178b18c9ad2be0d03abe3014e1800044c718977c27852fe4d.exe 33 PID 2828 wrote to memory of 2224 2828 6763ec95c65a395178b18c9ad2be0d03abe3014e1800044c718977c27852fe4d.exe 33 PID 2828 wrote to memory of 2224 2828 6763ec95c65a395178b18c9ad2be0d03abe3014e1800044c718977c27852fe4d.exe 33 PID 2828 wrote to memory of 2224 2828 6763ec95c65a395178b18c9ad2be0d03abe3014e1800044c718977c27852fe4d.exe 33 PID 2828 wrote to memory of 2224 2828 6763ec95c65a395178b18c9ad2be0d03abe3014e1800044c718977c27852fe4d.exe 33 PID 2828 wrote to memory of 2464 2828 6763ec95c65a395178b18c9ad2be0d03abe3014e1800044c718977c27852fe4d.exe 34 PID 2828 wrote to memory of 2464 2828 6763ec95c65a395178b18c9ad2be0d03abe3014e1800044c718977c27852fe4d.exe 34 PID 2828 wrote to memory of 2464 2828 6763ec95c65a395178b18c9ad2be0d03abe3014e1800044c718977c27852fe4d.exe 34 PID 2828 wrote to memory of 2464 2828 6763ec95c65a395178b18c9ad2be0d03abe3014e1800044c718977c27852fe4d.exe 34 PID 2828 wrote to memory of 2464 2828 6763ec95c65a395178b18c9ad2be0d03abe3014e1800044c718977c27852fe4d.exe 34 PID 2828 wrote to memory of 2464 2828 6763ec95c65a395178b18c9ad2be0d03abe3014e1800044c718977c27852fe4d.exe 34 PID 2224 wrote to memory of 1976 2224 6763ec95c65a395178b18c9ad2be0d03abe3014e1800044c718977c27852fe4d.exe 35 PID 2224 wrote to memory of 1976 2224 6763ec95c65a395178b18c9ad2be0d03abe3014e1800044c718977c27852fe4d.exe 35 PID 2224 wrote to memory of 1976 2224 6763ec95c65a395178b18c9ad2be0d03abe3014e1800044c718977c27852fe4d.exe 35 PID 2224 wrote to memory of 1976 2224 6763ec95c65a395178b18c9ad2be0d03abe3014e1800044c718977c27852fe4d.exe 35 PID 1976 wrote to memory of 2716 1976 explorer.exe 36 PID 1976 wrote to memory of 2716 1976 explorer.exe 36 PID 1976 wrote to memory of 2716 1976 explorer.exe 36 PID 1976 wrote to memory of 2716 1976 explorer.exe 36 PID 1976 wrote to memory of 1724 1976 explorer.exe 38 PID 1976 wrote to memory of 1724 1976 explorer.exe 38 PID 1976 wrote to memory of 1724 1976 explorer.exe 38 PID 1976 wrote to memory of 1724 1976 explorer.exe 38 PID 1976 wrote to memory of 1724 1976 explorer.exe 38 PID 1976 wrote to memory of 1724 1976 explorer.exe 38 PID 1976 wrote to memory of 1724 1976 explorer.exe 38 PID 1976 wrote to memory of 1724 1976 explorer.exe 38 PID 1976 wrote to memory of 1724 1976 explorer.exe 38 PID 1976 wrote to memory of 1724 1976 explorer.exe 38 PID 1976 wrote to memory of 1724 1976 explorer.exe 38 PID 1976 wrote to memory of 1724 1976 explorer.exe 38 PID 1976 wrote to memory of 1724 1976 explorer.exe 38 PID 1976 wrote to memory of 1724 1976 explorer.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\6763ec95c65a395178b18c9ad2be0d03abe3014e1800044c718977c27852fe4d.exe"C:\Users\Admin\AppData\Local\Temp\6763ec95c65a395178b18c9ad2be0d03abe3014e1800044c718977c27852fe4d.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "C:\Users\Admin\AppData\Local\Temp\6763ec95c65a395178b18c9ad2be0d03abe3014e1800044c718977c27852fe4d.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"2⤵
- Drops startup file
PID:2476
-
-
C:\Users\Admin\AppData\Local\Temp\6763ec95c65a395178b18c9ad2be0d03abe3014e1800044c718977c27852fe4d.exeC:\Users\Admin\AppData\Local\Temp\6763ec95c65a395178b18c9ad2be0d03abe3014e1800044c718977c27852fe4d.exe2⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Users\Admin\AppData\Local\Temp\6763ec95c65a395178b18c9ad2be0d03abe3014e1800044c718977c27852fe4d.exeC:\Users\Admin\AppData\Local\Temp\6763ec95c65a395178b18c9ad2be0d03abe3014e1800044c718977c27852fe4d.exe3⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2224 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\explorer.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"5⤵
- Drops startup file
PID:2716
-
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
PID:1724 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe6⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1848 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1664 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
PID:1344
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
PID:1544 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1768 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe10⤵
- Executes dropped EXE
PID:2424 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\explorer.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"11⤵PID:752
-
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe11⤵PID:2108
-
-
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"9⤵PID:2420
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2888 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:3004
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
PID:1396 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe9⤵PID:2336
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe10⤵PID:1744
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\explorer.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"11⤵PID:2704
-
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe11⤵PID:380
-
-
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"9⤵PID:940
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2560 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
PID:2392
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
PID:556 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe9⤵PID:956
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe10⤵PID:1448
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\explorer.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"11⤵PID:2868
-
-
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"9⤵PID:436
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1272 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:1916
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
PID:1700
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2312 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:2256
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
PID:1540
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2072 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
PID:2248
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
PID:2140
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2972 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:1676
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
PID:2264
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:836 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:2624
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
PID:2748
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2452 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:752
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
PID:2560
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1780 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:1476
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
PID:1092
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1964 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:2008
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
PID:2432
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2864 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
PID:2968
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
PID:792
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:340 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:1560
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
PID:2096
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2856 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
PID:2884
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵PID:1968
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵PID:1672
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:1080
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵PID:2280
-
-
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵PID:1792
-
-
-
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"3⤵PID:2464
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD519edaea823ed4d04f7cf1f90df737b3d
SHA1244829d004dfbb6b8b5842c2be2cb9d982bf6a9e
SHA2566763ec95c65a395178b18c9ad2be0d03abe3014e1800044c718977c27852fe4d
SHA5124f650cc40df792547b126a0ecfeb4af273e14f94b651ea3e52a5fc9f94382b638fc63aaa163c52f5ed976b55937e7188e02af697abe36ef9b92be55ad0e11da9
-
Filesize
93B
MD58445bfa5a278e2f068300c604a78394b
SHA19fb4eef5ec2606bd151f77fdaa219853d4aa0c65
SHA2565ddf324661da70998e89da7469c0eea327faae9216b9abc15c66fe95deec379c
SHA5128ad7d18392a15cabbfd4d30b2e8a2aad899d35aba099b5be1f6852ca39f58541fb318972299c5728a30fd311db011578c3aaf881fa8b8b42067d2a1e11c50822
-
Filesize
92B
MD513222a4bb413aaa8b92aa5b4f81d2760
SHA1268a48f2fe84ed49bbdc1873a8009db8c7cba66a
SHA256d170ac99460f9c1fb30717345b1003f8eb9189c26857ca26d3431590e6f0e23d
SHA512eee47ead9bef041b510ee5e40ebe8a51abd41d8c1fe5de68191f2b996feaa6cc0b8c16ed26d644fbf1d7e4f40920d7a6db954e19f2236d9e4e3f3f984f21b140
-
Filesize
2.9MB
MD532b661f2ce4ffc8ba57a6f653c69e698
SHA1ca321a8b3099d38db5fca36f3150c1d96ae7fdcf
SHA2560a68824e4b9c772f58ec4d9b0d23af3a13cff60b16753bfe4754461c3d7efad5
SHA512db8490a3c6b8d636290be4cf5bacab8ac865a271311e6c8a4fabe116eebc70854e921cd95415ab15f6f7c6e157cf55b3584069f1333b03f63101ca438b7163ca
-
Filesize
2.9MB
MD55f03541cdfa3057b35491ffc1bc5c24b
SHA170f6e09c5ef082a4f0e7c3ac9cbd6f9aa189660b
SHA25642625868dffc2dfc463770a8b7b200d269a7b5fce1f96f6178f5119c0cdcf6bd
SHA51233b53376aba1f94b347b6d3d33c58c16c153763a0e4db5a8619bfd6158f14f66d72618d65d137fcc40106b27cd908b88489fdfc43e403aca765612aba65e6bde