Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
13/08/2024, 20:44
Static task
static1
Behavioral task
behavioral1
Sample
62e345a7b43d619a4b75b4418755ac8363dc569a8c38754cd5b2384dd178fa08.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
62e345a7b43d619a4b75b4418755ac8363dc569a8c38754cd5b2384dd178fa08.exe
Resource
win10v2004-20240802-en
General
-
Target
62e345a7b43d619a4b75b4418755ac8363dc569a8c38754cd5b2384dd178fa08.exe
-
Size
1.1MB
-
MD5
1c93ca84724f0aacbd2c2e28c8cf14c9
-
SHA1
39826a51c349a4e38a9c6393acc3db9d6ce36df1
-
SHA256
62e345a7b43d619a4b75b4418755ac8363dc569a8c38754cd5b2384dd178fa08
-
SHA512
257a2b5747425b91c195b704e7278e410876e42e56fb13f9cdaa18c7c21c40efb062cfa2f2ddf3559190f49c1a1c8b5dc2a5865b7710cd82d416fc9ed9cf0eab
-
SSDEEP
24576:aH0dl8myX9Bg42QoXFkrzkmplSgRDYo0lG4Z8r7Qfbkiu5Q3:acallSllG4ZM7QzMQ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2604 svchcst.exe -
Executes dropped EXE 26 IoCs
pid Process 2604 svchcst.exe 608 svchcst.exe 2632 svchcst.exe 2096 svchcst.exe 1072 svchcst.exe 1864 svchcst.exe 2332 svchcst.exe 1292 svchcst.exe 2236 svchcst.exe 2660 svchcst.exe 1732 svchcst.exe 2864 svchcst.exe 1740 svchcst.exe 2396 svchcst.exe 1016 svchcst.exe 1824 svchcst.exe 2124 svchcst.exe 2264 svchcst.exe 484 svchcst.exe 1276 svchcst.exe 1636 svchcst.exe 2932 svchcst.exe 2888 svchcst.exe 1620 svchcst.exe 2196 svchcst.exe 1768 svchcst.exe -
Loads dropped DLL 41 IoCs
pid Process 2728 WScript.exe 2728 WScript.exe 2864 WScript.exe 688 WScript.exe 688 WScript.exe 1796 WScript.exe 1796 WScript.exe 1764 WScript.exe 1764 WScript.exe 1764 WScript.exe 1764 WScript.exe 2724 WScript.exe 2932 WScript.exe 3044 WScript.exe 596 WScript.exe 2972 WScript.exe 2972 WScript.exe 1572 WScript.exe 1572 WScript.exe 720 WScript.exe 720 WScript.exe 944 WScript.exe 944 WScript.exe 1608 WScript.exe 1608 WScript.exe 2120 WScript.exe 2120 WScript.exe 1596 WScript.exe 1596 WScript.exe 772 WScript.exe 772 WScript.exe 840 WScript.exe 840 WScript.exe 2632 WScript.exe 2632 WScript.exe 928 WScript.exe 928 WScript.exe 1948 WScript.exe 1948 WScript.exe 720 WScript.exe 720 WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 52 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 62e345a7b43d619a4b75b4418755ac8363dc569a8c38754cd5b2384dd178fa08.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2084 62e345a7b43d619a4b75b4418755ac8363dc569a8c38754cd5b2384dd178fa08.exe 2604 svchcst.exe 2604 svchcst.exe 2604 svchcst.exe 2604 svchcst.exe 2604 svchcst.exe 2604 svchcst.exe 2604 svchcst.exe 2604 svchcst.exe 2604 svchcst.exe 2604 svchcst.exe 2604 svchcst.exe 2604 svchcst.exe 2604 svchcst.exe 2604 svchcst.exe 2604 svchcst.exe 2604 svchcst.exe 2604 svchcst.exe 2604 svchcst.exe 2604 svchcst.exe 2604 svchcst.exe 2604 svchcst.exe 2604 svchcst.exe 2604 svchcst.exe 2604 svchcst.exe 2604 svchcst.exe 2604 svchcst.exe 2604 svchcst.exe 2604 svchcst.exe 2604 svchcst.exe 2604 svchcst.exe 2604 svchcst.exe 2604 svchcst.exe 2604 svchcst.exe 2604 svchcst.exe 2604 svchcst.exe 2604 svchcst.exe 2604 svchcst.exe 2604 svchcst.exe 2604 svchcst.exe 2604 svchcst.exe 2604 svchcst.exe 2604 svchcst.exe 2604 svchcst.exe 2604 svchcst.exe 2604 svchcst.exe 2604 svchcst.exe 2604 svchcst.exe 2604 svchcst.exe 2604 svchcst.exe 2604 svchcst.exe 2604 svchcst.exe 2604 svchcst.exe 2604 svchcst.exe 2604 svchcst.exe 2604 svchcst.exe 2604 svchcst.exe 2604 svchcst.exe 2604 svchcst.exe 2604 svchcst.exe 2604 svchcst.exe 2604 svchcst.exe 2604 svchcst.exe 2604 svchcst.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2084 62e345a7b43d619a4b75b4418755ac8363dc569a8c38754cd5b2384dd178fa08.exe -
Suspicious use of SetWindowsHookEx 54 IoCs
pid Process 2084 62e345a7b43d619a4b75b4418755ac8363dc569a8c38754cd5b2384dd178fa08.exe 2084 62e345a7b43d619a4b75b4418755ac8363dc569a8c38754cd5b2384dd178fa08.exe 2604 svchcst.exe 2604 svchcst.exe 608 svchcst.exe 608 svchcst.exe 2632 svchcst.exe 2632 svchcst.exe 2096 svchcst.exe 2096 svchcst.exe 1072 svchcst.exe 1072 svchcst.exe 1864 svchcst.exe 1864 svchcst.exe 2332 svchcst.exe 2332 svchcst.exe 1292 svchcst.exe 1292 svchcst.exe 2236 svchcst.exe 2236 svchcst.exe 2660 svchcst.exe 2660 svchcst.exe 1732 svchcst.exe 1732 svchcst.exe 2864 svchcst.exe 2864 svchcst.exe 1740 svchcst.exe 1740 svchcst.exe 2396 svchcst.exe 2396 svchcst.exe 1016 svchcst.exe 1016 svchcst.exe 1824 svchcst.exe 1824 svchcst.exe 2124 svchcst.exe 2124 svchcst.exe 2264 svchcst.exe 2264 svchcst.exe 484 svchcst.exe 484 svchcst.exe 1276 svchcst.exe 1276 svchcst.exe 1636 svchcst.exe 1636 svchcst.exe 2932 svchcst.exe 2932 svchcst.exe 2888 svchcst.exe 2888 svchcst.exe 1620 svchcst.exe 1620 svchcst.exe 2196 svchcst.exe 2196 svchcst.exe 1768 svchcst.exe 1768 svchcst.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2084 wrote to memory of 2728 2084 62e345a7b43d619a4b75b4418755ac8363dc569a8c38754cd5b2384dd178fa08.exe 30 PID 2084 wrote to memory of 2728 2084 62e345a7b43d619a4b75b4418755ac8363dc569a8c38754cd5b2384dd178fa08.exe 30 PID 2084 wrote to memory of 2728 2084 62e345a7b43d619a4b75b4418755ac8363dc569a8c38754cd5b2384dd178fa08.exe 30 PID 2084 wrote to memory of 2728 2084 62e345a7b43d619a4b75b4418755ac8363dc569a8c38754cd5b2384dd178fa08.exe 30 PID 2728 wrote to memory of 2604 2728 WScript.exe 32 PID 2728 wrote to memory of 2604 2728 WScript.exe 32 PID 2728 wrote to memory of 2604 2728 WScript.exe 32 PID 2728 wrote to memory of 2604 2728 WScript.exe 32 PID 2604 wrote to memory of 2864 2604 svchcst.exe 33 PID 2604 wrote to memory of 2864 2604 svchcst.exe 33 PID 2604 wrote to memory of 2864 2604 svchcst.exe 33 PID 2604 wrote to memory of 2864 2604 svchcst.exe 33 PID 2864 wrote to memory of 608 2864 WScript.exe 34 PID 2864 wrote to memory of 608 2864 WScript.exe 34 PID 2864 wrote to memory of 608 2864 WScript.exe 34 PID 2864 wrote to memory of 608 2864 WScript.exe 34 PID 608 wrote to memory of 688 608 svchcst.exe 35 PID 608 wrote to memory of 688 608 svchcst.exe 35 PID 608 wrote to memory of 688 608 svchcst.exe 35 PID 608 wrote to memory of 688 608 svchcst.exe 35 PID 688 wrote to memory of 2632 688 WScript.exe 36 PID 688 wrote to memory of 2632 688 WScript.exe 36 PID 688 wrote to memory of 2632 688 WScript.exe 36 PID 688 wrote to memory of 2632 688 WScript.exe 36 PID 2632 wrote to memory of 1924 2632 svchcst.exe 37 PID 2632 wrote to memory of 1924 2632 svchcst.exe 37 PID 2632 wrote to memory of 1924 2632 svchcst.exe 37 PID 2632 wrote to memory of 1924 2632 svchcst.exe 37 PID 688 wrote to memory of 2096 688 WScript.exe 38 PID 688 wrote to memory of 2096 688 WScript.exe 38 PID 688 wrote to memory of 2096 688 WScript.exe 38 PID 688 wrote to memory of 2096 688 WScript.exe 38 PID 2096 wrote to memory of 1796 2096 svchcst.exe 39 PID 2096 wrote to memory of 1796 2096 svchcst.exe 39 PID 2096 wrote to memory of 1796 2096 svchcst.exe 39 PID 2096 wrote to memory of 1796 2096 svchcst.exe 39 PID 1796 wrote to memory of 1072 1796 WScript.exe 40 PID 1796 wrote to memory of 1072 1796 WScript.exe 40 PID 1796 wrote to memory of 1072 1796 WScript.exe 40 PID 1796 wrote to memory of 1072 1796 WScript.exe 40 PID 1072 wrote to memory of 1764 1072 svchcst.exe 41 PID 1072 wrote to memory of 1764 1072 svchcst.exe 41 PID 1072 wrote to memory of 1764 1072 svchcst.exe 41 PID 1072 wrote to memory of 1764 1072 svchcst.exe 41 PID 1796 wrote to memory of 2332 1796 WScript.exe 42 PID 1796 wrote to memory of 2332 1796 WScript.exe 42 PID 1796 wrote to memory of 2332 1796 WScript.exe 42 PID 1796 wrote to memory of 2332 1796 WScript.exe 42 PID 1764 wrote to memory of 1864 1764 WScript.exe 43 PID 1764 wrote to memory of 1864 1764 WScript.exe 43 PID 1764 wrote to memory of 1864 1764 WScript.exe 43 PID 1764 wrote to memory of 1864 1764 WScript.exe 43 PID 1764 wrote to memory of 1292 1764 WScript.exe 44 PID 1764 wrote to memory of 1292 1764 WScript.exe 44 PID 1764 wrote to memory of 1292 1764 WScript.exe 44 PID 1764 wrote to memory of 1292 1764 WScript.exe 44 PID 1292 wrote to memory of 1660 1292 svchcst.exe 45 PID 1292 wrote to memory of 1660 1292 svchcst.exe 45 PID 1292 wrote to memory of 1660 1292 svchcst.exe 45 PID 1292 wrote to memory of 1660 1292 svchcst.exe 45 PID 1764 wrote to memory of 2236 1764 WScript.exe 46 PID 1764 wrote to memory of 2236 1764 WScript.exe 46 PID 1764 wrote to memory of 2236 1764 WScript.exe 46 PID 1764 wrote to memory of 2236 1764 WScript.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\62e345a7b43d619a4b75b4418755ac8363dc569a8c38754cd5b2384dd178fa08.exe"C:\Users\Admin\AppData\Local\Temp\62e345a7b43d619a4b75b4418755ac8363dc569a8c38754cd5b2384dd178fa08.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:608 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"6⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:688 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"8⤵
- System Location Discovery: System Language Discovery
PID:1924
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"8⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"9⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"10⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"11⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1864
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"11⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"12⤵
- System Location Discovery: System Language Discovery
PID:1660
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"11⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2236 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"12⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2724 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"13⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2660 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"14⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3044 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"15⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2864
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"14⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2932 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"15⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1732 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"16⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:596 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"17⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1740 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"18⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2972 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"19⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2396 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"20⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1572 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"21⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1016 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"22⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:720 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"23⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1824 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"24⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:944 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"25⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2124 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"26⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1608 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"27⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2264 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"28⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2120 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"29⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:484 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"30⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1596 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"31⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1276 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"32⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:772 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"33⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1636 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"34⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:840 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"35⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2932 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"36⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2632 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"37⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2888 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"38⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:928 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"39⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1620 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"40⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1948 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"41⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2196 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"42⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:720 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"43⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1768 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"44⤵
- System Location Discovery: System Language Discovery
PID:2780 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"45⤵PID:2584
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"46⤵PID:2692
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"9⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2332
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92B
MD567b9b3e2ded7086f393ebbc36c5e7bca
SHA1e6299d0450b9a92a18cc23b5704a2b475652c790
SHA25644063c266686263f14cd2a83fee124fb3e61a9171a6aab69709464f49511011d
SHA512826fbc9481f46b1ae3db828a665c55c349023caf563e6e8c17321f5f3af3e4c3914955db6f0eebfc6defe561315435d47310b4d0499ab9c2c85bb61264dedc09
-
Filesize
753B
MD51bbf1408eac55b23564ede24425641b8
SHA1ae35a6ab862b7e84f05ee702e7ed91fa9542a541
SHA256eeb280c5429413327ad7c1ecfa70860f5dc5074b9f4a3cc7338f8f22e7819d8e
SHA51283862e49e9c9c6ba9158185e9accff659a4072f2cab030bebff779669bf2624452ae6664f5dfd0895946334d4195867f992b38c1cbdc46a84052904d4851b63a
-
Filesize
696B
MD5cd34ba54e0dd84bc94990092afc183a9
SHA1938feedabe63e3e7c6cbb6a405512e21a7ebe449
SHA25644358f1aedf540acf9e56069e4cc6d4e6a2445ccba362dad9ec4e2f59e0178ab
SHA5121c261ac13591d4d1cd3692dae12de7fb393134b014dbc766b2946b6ea983e74cef7984bb7003241d5221dea9df78e5f5fe31a839ad7d8453a79db887c8d09958
-
Filesize
696B
MD5379619305716718fbeeab2f364946c39
SHA1b663cf106c4673549692fa39d25e9e8f4561cd64
SHA256c844bc25686320e65c1b5259a6d0d6d47f61709f46e2c8eb2ad3f9c3b9333d84
SHA512b2c91d0f1cbc9e253bb3bb339acbab0e31eef31188cc00132c423fee2a85c7a91132c9259b99b23a149f6ba1172b8522e2d8350f88dbb735ad8d7a32f71e2ed8
-
Filesize
696B
MD52c3b5340da071ac89dded61dffd49fb5
SHA177a880658d0b70e5455379099427bfdae8cc0ae8
SHA256d7433fbea40ea3f87e991ce54c73436c110cfbb83748d554aea8d94051a5224e
SHA5127e69f14c55afec39149491531c2a499b6253aa71ad448e722912f239fde055826b34383bd8d14773af08ef475b5fe53451a0a93e0bcc46fbeba3872198200f3c
-
Filesize
696B
MD5e94e88174ec781f873054a1341dde3c1
SHA11bfcc1fd57262661e3e17db7f582004d481e95d9
SHA25683a3606b4d4b48761b768ff2bd5668a599025f46b5d31b73bd0b014f6f95e225
SHA51210dd4c89ea250920267a33317f693093471b805e33f18b38ffd7e3b9fb12624047f6bca7c82b0a2c83a3d6cead4d289f3da723b249a7ab6a9c40b339977fe7f6
-
Filesize
696B
MD575b8f60cfe6895a93f2d8f1b5568af94
SHA1b80485bc82864b4e1bf0bcc44579eaa01776b1fb
SHA2566ff47f7681e8f497470bd11b2cfd8156c5d8f1b01f48bfd89037cc4bfe0f34cc
SHA512089e237c5309d36058e036f69d78deb4144749e91b3a8a8383f817af051a3452acfdf42227cc721517e93428cfd5d48b42e9750e9548762609e81917a4de29c2
-
Filesize
696B
MD5ee35194fa07bea6145178b37a18edb25
SHA17cbe9989cbc0090cc0ab534c7aa77d64d959e489
SHA256e323603a594cf3a7e03aea20d2ab69a17040a02f256ac1e3fe02f8a36889a483
SHA512d292e22575da17d694a33d6132cea65ca1c58a16bd2532dd24db161d2a77cf233039ed1b66b48868210f4d0ffff16678db3be341eca044432b8087b520e59f71
-
Filesize
696B
MD5619955d43a58558c766025119a5a66cb
SHA1cfb43d2b9cb68699667ca8d4929e71b25ed115ab
SHA256a129bff17a859b7b2d6681f519c985c661797dd508ac249d30f02a0a78858cee
SHA51220f9499cddf2fb824365830736255a1dce689da0e94fa8e999ee4e28883e65637410710ea01204b5f3d48213f697461288da2b7a535511da87f848b1e6e83bc6
-
Filesize
696B
MD5297aff64991480fd92a4ce9fb4d40807
SHA1c586f7003f854f442db26448516e59826dfe41e9
SHA2565137a62e031c71093a7d6c2684519614bb5eed80fd8daa92912f085a6ab82b8a
SHA512f7a2fae80f26e6fb846ec9675c5a03932c8bd842d75f68cdb05c2f18e9397ed32774ce0a1f495e5618a5ce1b37e088c8991a69fb999559d1e2b0dd360cc96b4f
-
Filesize
696B
MD5e74576d29f1c1a7185cdf1e12b96a260
SHA1f76ee203cb56b7dda62a2947ff1e2fc954efa777
SHA256e31ecb9dcf31c19fbd131b31e5191375f7aeb708ffa678363de99e118715eb65
SHA512934e3a9171de8fe03c9b398b4e79b3eee77845750ba2b0d16c3a38bc8299d3d72643cedfbb025df848f4c5ab302f5d4b145da13c2ac3ed96bdc1658791d4f5bb
-
Filesize
696B
MD5d5a26bd3b4366107ffbb4663050f6576
SHA109a5b81e452620340fcc2343a146ac5469576d44
SHA2566e6abc76efb5447d4e9b20d07396db93d0368e6f81f558217f81a4dedc437eef
SHA512527fe34594e983df77843639208f832c63f24a23e6e72fabc3e27eb1cce2e08e4306f3a5ebd288142f9684c6730431fe09f2c60f699a0825dc8270e961abbb10
-
Filesize
696B
MD5308b7da7ec377746fab239c88940c7ea
SHA162356f1d6078f5587c1e0fa2201b199ebfdd0372
SHA2563c6e5a89529248f6074cab8ca705d7f399c2808e185a451f2520d767e7aecd77
SHA512bfd886261d3c9ae90f40968acb30b229e8d6754768bee5430f246594b5f81952de101a572cedb84bd1ab9a39cb607ec981287e9e03ea45b829744c47ee9bc877
-
Filesize
1.1MB
MD50eecc93ed573013ce373e8c03d5525ad
SHA18e82ac110dac54eb26a1ab26587242c6dec1c345
SHA2569a1fc69937d93e49975ac0a1f958df580e379a38a881626eedf211342535717b
SHA512fc84878da06130a5305d9ebcffb335615c06496f5a2377a142bc5547cbb4e0582ec9ddb36d1125948c67525db3c04561c4364eccb94965935f966fc8ba42ba40
-
Filesize
1.1MB
MD5c022d88a54e45f1598ae529f341e5209
SHA12cfaaf145cd11b99a66d2374e10584514676a140
SHA2568c20c2e5842e2c63f65f065a0324df0a7064a809b49d4dadc90bdb0142edcd6a
SHA512c2a75ccd2e096f8e9f55d750fc6732aba786f758e3122041ef751f2df4b2e00a92ca420a831d770369b85b648fd604427a367fe7d400edccb494e79933a6026a
-
Filesize
1.1MB
MD5c68975dd06729889a04ea697a49c9e5f
SHA11d3282a92fda5e75a5685f492f05ef197d2ef3d0
SHA25617d2d0f75535fb719a66575a01de52763299ce47c3b878c5bf8aa39d51a9acd5
SHA512e6cf8e1fa1203fdcd0cb75698337e0d2478993856e8149a5b8068a55b5139e61a28424f718a234a1880293a0c43171644d7bf843cbfdd948d9c7a03ebc393cf8