Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
08/08/2024, 20:39
Static task
static1
Behavioral task
behavioral1
Sample
49a149e73c444f6ea743ffae3567324753555af9d12c2919d8d9742550383090.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
49a149e73c444f6ea743ffae3567324753555af9d12c2919d8d9742550383090.exe
Resource
win10v2004-20240802-en
General
-
Target
49a149e73c444f6ea743ffae3567324753555af9d12c2919d8d9742550383090.exe
-
Size
1.1MB
-
MD5
a771eb9e4ee3091ffb3770c2b9fb32f8
-
SHA1
c9c9216267b8045b6514602241cd9f81589c0699
-
SHA256
49a149e73c444f6ea743ffae3567324753555af9d12c2919d8d9742550383090
-
SHA512
fc69c7f13a21114d3f6dcc577715a83c7a970c2c0397ca8f8d5f1d57ef7bf46426555bc398c7cd50e438cc51bc7cb171e1e59e07572baa855e78ee2eb7cdaa1b
-
SSDEEP
24576:aH0dl8myX9Bg42QoXFkrzkmplSgRDYo0lG4Z8r7Qfbkiu5Qy:acallSllG4ZM7QzMx
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2672 svchcst.exe -
Executes dropped EXE 25 IoCs
pid Process 2672 svchcst.exe 2884 svchcst.exe 1016 svchcst.exe 2156 svchcst.exe 1056 svchcst.exe 2092 svchcst.exe 1264 svchcst.exe 2576 svchcst.exe 1984 svchcst.exe 2784 svchcst.exe 548 svchcst.exe 628 svchcst.exe 408 svchcst.exe 1964 svchcst.exe 2236 svchcst.exe 2728 svchcst.exe 2696 svchcst.exe 2568 svchcst.exe 1856 svchcst.exe 2168 svchcst.exe 1532 svchcst.exe 1504 svchcst.exe 2060 svchcst.exe 2092 svchcst.exe 2732 svchcst.exe -
Loads dropped DLL 44 IoCs
pid Process 2744 WScript.exe 2744 WScript.exe 3020 WScript.exe 3020 WScript.exe 548 WScript.exe 548 WScript.exe 2024 WScript.exe 2024 WScript.exe 944 WScript.exe 944 WScript.exe 1540 WScript.exe 1540 WScript.exe 572 WScript.exe 876 WScript.exe 876 WScript.exe 2768 WScript.exe 2768 WScript.exe 880 WScript.exe 2368 WScript.exe 880 WScript.exe 860 WScript.exe 860 WScript.exe 2956 WScript.exe 2956 WScript.exe 3040 WScript.exe 3040 WScript.exe 1264 WScript.exe 1264 WScript.exe 2532 WScript.exe 2532 WScript.exe 592 WScript.exe 592 WScript.exe 2312 WScript.exe 2312 WScript.exe 2304 WScript.exe 2304 WScript.exe 1364 WScript.exe 1364 WScript.exe 2368 WScript.exe 2368 WScript.exe 2540 WScript.exe 2540 WScript.exe 3028 WScript.exe 3028 WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 52 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 49a149e73c444f6ea743ffae3567324753555af9d12c2919d8d9742550383090.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2740 49a149e73c444f6ea743ffae3567324753555af9d12c2919d8d9742550383090.exe 2672 svchcst.exe 2672 svchcst.exe 2672 svchcst.exe 2672 svchcst.exe 2672 svchcst.exe 2672 svchcst.exe 2672 svchcst.exe 2672 svchcst.exe 2672 svchcst.exe 2672 svchcst.exe 2672 svchcst.exe 2672 svchcst.exe 2672 svchcst.exe 2672 svchcst.exe 2672 svchcst.exe 2672 svchcst.exe 2672 svchcst.exe 2672 svchcst.exe 2672 svchcst.exe 2672 svchcst.exe 2672 svchcst.exe 2672 svchcst.exe 2672 svchcst.exe 2672 svchcst.exe 2672 svchcst.exe 2672 svchcst.exe 2672 svchcst.exe 2672 svchcst.exe 2672 svchcst.exe 2672 svchcst.exe 2672 svchcst.exe 2672 svchcst.exe 2672 svchcst.exe 2672 svchcst.exe 2672 svchcst.exe 2672 svchcst.exe 2672 svchcst.exe 2672 svchcst.exe 2672 svchcst.exe 2672 svchcst.exe 2672 svchcst.exe 2672 svchcst.exe 2672 svchcst.exe 2672 svchcst.exe 2672 svchcst.exe 2672 svchcst.exe 2672 svchcst.exe 2672 svchcst.exe 2672 svchcst.exe 2672 svchcst.exe 2672 svchcst.exe 2672 svchcst.exe 2672 svchcst.exe 2672 svchcst.exe 2672 svchcst.exe 2672 svchcst.exe 2672 svchcst.exe 2672 svchcst.exe 2672 svchcst.exe 2672 svchcst.exe 2672 svchcst.exe 2672 svchcst.exe 2672 svchcst.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2740 49a149e73c444f6ea743ffae3567324753555af9d12c2919d8d9742550383090.exe -
Suspicious use of SetWindowsHookEx 52 IoCs
pid Process 2740 49a149e73c444f6ea743ffae3567324753555af9d12c2919d8d9742550383090.exe 2740 49a149e73c444f6ea743ffae3567324753555af9d12c2919d8d9742550383090.exe 2672 svchcst.exe 2672 svchcst.exe 2884 svchcst.exe 2884 svchcst.exe 1016 svchcst.exe 1016 svchcst.exe 2156 svchcst.exe 2156 svchcst.exe 1056 svchcst.exe 1056 svchcst.exe 2092 svchcst.exe 2092 svchcst.exe 1264 svchcst.exe 1264 svchcst.exe 2576 svchcst.exe 2576 svchcst.exe 1984 svchcst.exe 1984 svchcst.exe 2784 svchcst.exe 2784 svchcst.exe 548 svchcst.exe 548 svchcst.exe 628 svchcst.exe 628 svchcst.exe 408 svchcst.exe 408 svchcst.exe 1964 svchcst.exe 1964 svchcst.exe 2236 svchcst.exe 2236 svchcst.exe 2728 svchcst.exe 2728 svchcst.exe 2696 svchcst.exe 2696 svchcst.exe 2568 svchcst.exe 2568 svchcst.exe 1856 svchcst.exe 1856 svchcst.exe 2168 svchcst.exe 2168 svchcst.exe 1532 svchcst.exe 1532 svchcst.exe 1504 svchcst.exe 1504 svchcst.exe 2060 svchcst.exe 2060 svchcst.exe 2092 svchcst.exe 2092 svchcst.exe 2732 svchcst.exe 2732 svchcst.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2740 wrote to memory of 2744 2740 49a149e73c444f6ea743ffae3567324753555af9d12c2919d8d9742550383090.exe 30 PID 2740 wrote to memory of 2744 2740 49a149e73c444f6ea743ffae3567324753555af9d12c2919d8d9742550383090.exe 30 PID 2740 wrote to memory of 2744 2740 49a149e73c444f6ea743ffae3567324753555af9d12c2919d8d9742550383090.exe 30 PID 2740 wrote to memory of 2744 2740 49a149e73c444f6ea743ffae3567324753555af9d12c2919d8d9742550383090.exe 30 PID 2744 wrote to memory of 2672 2744 WScript.exe 32 PID 2744 wrote to memory of 2672 2744 WScript.exe 32 PID 2744 wrote to memory of 2672 2744 WScript.exe 32 PID 2744 wrote to memory of 2672 2744 WScript.exe 32 PID 2672 wrote to memory of 3020 2672 svchcst.exe 33 PID 2672 wrote to memory of 3020 2672 svchcst.exe 33 PID 2672 wrote to memory of 3020 2672 svchcst.exe 33 PID 2672 wrote to memory of 3020 2672 svchcst.exe 33 PID 3020 wrote to memory of 2884 3020 WScript.exe 34 PID 3020 wrote to memory of 2884 3020 WScript.exe 34 PID 3020 wrote to memory of 2884 3020 WScript.exe 34 PID 3020 wrote to memory of 2884 3020 WScript.exe 34 PID 2884 wrote to memory of 548 2884 svchcst.exe 35 PID 2884 wrote to memory of 548 2884 svchcst.exe 35 PID 2884 wrote to memory of 548 2884 svchcst.exe 35 PID 2884 wrote to memory of 548 2884 svchcst.exe 35 PID 548 wrote to memory of 1016 548 WScript.exe 36 PID 548 wrote to memory of 1016 548 WScript.exe 36 PID 548 wrote to memory of 1016 548 WScript.exe 36 PID 548 wrote to memory of 1016 548 WScript.exe 36 PID 1016 wrote to memory of 2024 1016 svchcst.exe 37 PID 1016 wrote to memory of 2024 1016 svchcst.exe 37 PID 1016 wrote to memory of 2024 1016 svchcst.exe 37 PID 1016 wrote to memory of 2024 1016 svchcst.exe 37 PID 2024 wrote to memory of 2156 2024 WScript.exe 38 PID 2024 wrote to memory of 2156 2024 WScript.exe 38 PID 2024 wrote to memory of 2156 2024 WScript.exe 38 PID 2024 wrote to memory of 2156 2024 WScript.exe 38 PID 2156 wrote to memory of 944 2156 svchcst.exe 39 PID 2156 wrote to memory of 944 2156 svchcst.exe 39 PID 2156 wrote to memory of 944 2156 svchcst.exe 39 PID 2156 wrote to memory of 944 2156 svchcst.exe 39 PID 944 wrote to memory of 1056 944 WScript.exe 40 PID 944 wrote to memory of 1056 944 WScript.exe 40 PID 944 wrote to memory of 1056 944 WScript.exe 40 PID 944 wrote to memory of 1056 944 WScript.exe 40 PID 1056 wrote to memory of 1540 1056 svchcst.exe 41 PID 1056 wrote to memory of 1540 1056 svchcst.exe 41 PID 1056 wrote to memory of 1540 1056 svchcst.exe 41 PID 1056 wrote to memory of 1540 1056 svchcst.exe 41 PID 1540 wrote to memory of 2092 1540 WScript.exe 42 PID 1540 wrote to memory of 2092 1540 WScript.exe 42 PID 1540 wrote to memory of 2092 1540 WScript.exe 42 PID 1540 wrote to memory of 2092 1540 WScript.exe 42 PID 2092 wrote to memory of 572 2092 svchcst.exe 43 PID 2092 wrote to memory of 572 2092 svchcst.exe 43 PID 2092 wrote to memory of 572 2092 svchcst.exe 43 PID 2092 wrote to memory of 572 2092 svchcst.exe 43 PID 572 wrote to memory of 1264 572 WScript.exe 44 PID 572 wrote to memory of 1264 572 WScript.exe 44 PID 572 wrote to memory of 1264 572 WScript.exe 44 PID 572 wrote to memory of 1264 572 WScript.exe 44 PID 1264 wrote to memory of 876 1264 svchcst.exe 45 PID 1264 wrote to memory of 876 1264 svchcst.exe 45 PID 1264 wrote to memory of 876 1264 svchcst.exe 45 PID 1264 wrote to memory of 876 1264 svchcst.exe 45 PID 1264 wrote to memory of 2768 1264 svchcst.exe 46 PID 1264 wrote to memory of 2768 1264 svchcst.exe 46 PID 1264 wrote to memory of 2768 1264 svchcst.exe 46 PID 1264 wrote to memory of 2768 1264 svchcst.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\49a149e73c444f6ea743ffae3567324753555af9d12c2919d8d9742550383090.exe"C:\Users\Admin\AppData\Local\Temp\49a149e73c444f6ea743ffae3567324753555af9d12c2919d8d9742550383090.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"6⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:548 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1016 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"8⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"9⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"10⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"11⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"12⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"13⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"14⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:572 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"15⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1264 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"16⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:876 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"17⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2576 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"18⤵
- System Location Discovery: System Language Discovery
PID:1976
-
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"16⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2768 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"17⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1984
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"17⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2784 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"18⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:880 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"19⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:548 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"20⤵
- System Location Discovery: System Language Discovery
PID:2152
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"19⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:408 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"20⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:860 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"21⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1964 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"22⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2956 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"23⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2236 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"24⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3040 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"25⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2728 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"26⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1264 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"27⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2696 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"28⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2532 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"29⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2568 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"30⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:592 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"31⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1856 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"32⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2312 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"33⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2168 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"34⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2304 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"35⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1532 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"36⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1364 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"37⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1504 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"38⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2368 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"39⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2060 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"40⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2540 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"41⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2092 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"42⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3028 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"43⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2732 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"44⤵
- System Location Discovery: System Language Discovery
PID:2756
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"18⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2368 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"19⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:628
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92B
MD567b9b3e2ded7086f393ebbc36c5e7bca
SHA1e6299d0450b9a92a18cc23b5704a2b475652c790
SHA25644063c266686263f14cd2a83fee124fb3e61a9171a6aab69709464f49511011d
SHA512826fbc9481f46b1ae3db828a665c55c349023caf563e6e8c17321f5f3af3e4c3914955db6f0eebfc6defe561315435d47310b4d0499ab9c2c85bb61264dedc09
-
Filesize
753B
MD5e1101c7fe335813268c7fc86278a49a7
SHA1837a64041f87b724b4cca54f3b9140d051eafb3b
SHA25611d032af7006efba2edc53e0b178a144a0ef38145d2e48b6c399da548e068c57
SHA5127bf83fd013b0c9064fab535db3f08c4bd81a8328debe843bdea594ff1fa1b33fbed4fe2e89d9f63820951b692dea3e93e1f9eae26c5242cc1fcd9f66143383ec
-
Filesize
696B
MD538a699d07d8879db6356427ad5568cde
SHA1a13f87e47243e126c2ea20018877fbeac913a320
SHA25633039fb8b50833ea2836de980992405e10426ad862007f2fef2a96147dccc7bb
SHA512b5373577a397c0eb493b1173f0fa5a583fe10b986eced439f39997707622fdb54dad7f39311c0148da02b9f0eda2c097d6d9e98b6a7c7d4aa5996e7cc5f4791d
-
Filesize
696B
MD568131c1f4506af5c010d5e01f031bfae
SHA151cc54917c040091c3a39dd33ec52fc5f4cb4c15
SHA256d235953ddf5884a014ce05d8a26b9b93bafd580bdeda08e369e2d6e395d34a95
SHA51269be7da57430dd6d3f1deea9c2a4f78a0ec41a74fc593f033a7944504cd9c4fe6d2f7a0be052e40238a4389b649c36a603b1725959fab050a0114714a6d65c6d
-
Filesize
696B
MD5910e8b4a682865877d5b4c6b32ac2db3
SHA17df0ffdcff6b2f1d51878af2ca989990c399c005
SHA2560eaa114fec2febec98337efcccfbb2863979005935decd44f9cd7db110b33b9f
SHA512eb3e30e57f8ae59dc62d7c7f6c20296c7105a3fead464229b7b037924a20127266c0f09a6090cdeae4bea0f728f6213b2da67b44c3cd85a662c6b0cdf34c24bb
-
Filesize
696B
MD5bd0cc8385e2c94da465451e7bd8d4303
SHA16866d3d8d4bc37bbd976b44b74d4cef9b018da66
SHA256099ad392a60ee09509cf2982deb126acb373115124e33c1c9d18931fa32af630
SHA5125212403107457416b6b8e3c033c9521f744845edbf0c9bba5c962bea5946c2a24e1081cf472e907b3e16fb593b98c119802e3162e5260b30574f2c086af3d6b2
-
Filesize
696B
MD524e4a44b907089d788280d647e33c77e
SHA1ac5a4e397dea243c0022c55319e7c7035d013905
SHA2567fcd076a55f0b7c8e9407217aee7e68893461d15cb8d2946ac5250af35137211
SHA512c4a8dac1c1d5dfa976cc3e8fd299e423ab620463983b8c602be8a83ecc6598eb3f1d60a7370806e1f85a52dd91e4f1337a6dff2e99459f9a1e429a1ffb65a00b
-
Filesize
696B
MD503088ab16e4136b8d3a3366505b767ed
SHA1e1d73c9dc7e6009659519b33b3dd80f3011adad8
SHA256b31956814f1bc7c1e47a025622160df37664a3ee8e6d2016ce8919f1fba63a59
SHA5120c841cc8236b405951c5bdf0ea7c620ef32ab930077442e5c1f2eca9fe474c113e1377829e8072afdbfd9a0f0b2797cf156b2f861395d14b851abc7b365ec11a
-
Filesize
696B
MD595cbcc068b61f14455af7f3daea5c57f
SHA17121bec25241666a150cd1a58eb7efb0b26eab96
SHA256205412cd3d890bd070295ebf41e4a831de855a2b755c1a583b4dd2df66d5bc81
SHA5125ae57031bb2ce71bf93c683f07f82b521918ef8a145a80f8e488e403d7ca97079cb305bb3f9ad93f2b3a99f44954063447a5f9a2c0f6f276a2ef84beff5674a7
-
Filesize
696B
MD5379619305716718fbeeab2f364946c39
SHA1b663cf106c4673549692fa39d25e9e8f4561cd64
SHA256c844bc25686320e65c1b5259a6d0d6d47f61709f46e2c8eb2ad3f9c3b9333d84
SHA512b2c91d0f1cbc9e253bb3bb339acbab0e31eef31188cc00132c423fee2a85c7a91132c9259b99b23a149f6ba1172b8522e2d8350f88dbb735ad8d7a32f71e2ed8
-
Filesize
696B
MD599c82369839776d3d954a85361e76565
SHA1fe01d71a20a80f468e5fa4df991eacca97e650a1
SHA256ecfe1904a389f25b460a8eec64349498fde06733fa12cd5ae8e0c49a9699154f
SHA5125deb6fd1534298cbc80f4653e60b9dcaba6cfd4af1f3b1e5369929472ab4f8cba7d50d3f63d7154170b5ea84f40f7511f1839f2e89340c6942fede255c93b69f
-
Filesize
696B
MD5f68761d0622df41d256ee6fc39583d8a
SHA12dd40e574a86ff4b4be5e6aca6fda4d7fcc33d56
SHA256b4bf1092c76497e935596e32fcb9119a44acab11e9b80b660ecea53867655245
SHA512fd70e0b445bcd24117b449853c98a4996063d49f774a55bc5aca087b44cdb5381974551c4fcd2d3d1c82cd708fcb616009519f3914267ea5c37cdda4d31ea3a1
-
Filesize
1.1MB
MD5aef499d7054acd18eaa21e914a401f8c
SHA1d175bd0a6bcc4af26bf92daaec9fb74b8b536bbc
SHA2562f210aa126ced07849b34cce55e8ac39489ceeeb18b8052031d6e606389d1854
SHA5126f9b64e664027ea6e449becde8c3818ce8db489ca3ec0c3603bfa4afc4a84a428f379257e01d7b7373bea5eb27c395846a7aafa1c729117ce39d38ac5212cd67
-
Filesize
1.1MB
MD53445a4125fb74d4eb60b316dc693b379
SHA1104bd1eb3f905230563250874a9956e6297bb0f1
SHA2564cb60188d866c7188900448ca71adc9c520631b1126d748cac045da7b62c232f
SHA51222ec70fc52563b67b26e7a59cf6daca053edd0cfff74c8cada7a0440879f1e70187d7492900b80e4df36a3386728d3e71ad9e6b8b70947cadd23fb7c2dbb033c
-
Filesize
1.1MB
MD5269e79e52f66df9a83a27463ca4b9ea9
SHA1bb742f0aab0454cb53aecad6f3850c8c7e549d7d
SHA256fb1f6c3ece9a14ff1db0b7b9bc573502827ad60db8060364856b8b7e7a950756
SHA5128eda89f4e600fa5a63baa83dcea58d838e786bf827a279cfede890cc64a1c5a953e3c365a353c822e9930bd53480263622c4b7cfef3c33ab6642c2121e718f31
-
Filesize
1.1MB
MD5e2d8a0fc5e328215bd44aeddad6d0b9c
SHA19466c87d5326ee86f479b1de4e09031900c754f7
SHA25651eb516c373b396017e3c107c71f6f6d1d1c0fee66ba37167aca3a8608e5c3c4
SHA5129d08ea8e2f8c067c635b5b77f1e6de774ce9cb3b574482dfb5eed2493efdc9a901cfc1501632725a4a989bb8a6ff1554a7f60c8822c492683e521421e7c82014
-
Filesize
1.1MB
MD527f0a7e23dff8b2c2dde28d3d727811f
SHA18d39a1ebab1d35b3090114b3d86dad6005817a6e
SHA256ad108f771e6457037eebf6ec08252a449038fca1db86ad3442f1a175bc5c5fda
SHA5129e62a38db93ccbe3c9c86d98d326a35ae7213c1237f51bf39f306ff3683b400e3d5ae6aeb9b35ceb1a30a5e90807656660a3daf4adc5fce1ea517b9ea103ba7d
-
Filesize
1.1MB
MD5c5314a920069022fabc527d082ea5461
SHA1e2f9d6f6ced422aee29a36c285e8168af9399587
SHA256fbcc4c21f8644509b43756f4ac199b4a51b65f1e9c9f17e8a9908b278317f4f3
SHA51255b4b69695f87e83dd94db8f75419873cca8f02932091197e6de99beccc9eec9bfb3aa31a128c26f5af6b5f46ac40c3fb9f13e5c2d8e2a2598fd3b0881b6e8d1
-
Filesize
1.1MB
MD5119fbd81a3afda4e4b196b4f142e1022
SHA1e4526dfbb419d7d0b850335eb955b4a5dfbf5393
SHA2564ea2c8c2ce413abe870251550f1677858af2711a8f1b6b213f7a42fae007a62f
SHA512a337e721bc4d5115ad2bcb97175aa06d8d7579f3b5a90cc761d1fcb7dee1424eb008543ec09db525864077f1a956ac8a0bd438cb9ced9127078772d7d76750ab