Analysis
-
max time kernel
149s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
19/08/2024, 19:34
Static task
static1
Behavioral task
behavioral1
Sample
2b186c4506981ff88356fade8614965805c3714a3467b6ae8715ac2d17537bf5.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2b186c4506981ff88356fade8614965805c3714a3467b6ae8715ac2d17537bf5.exe
Resource
win10v2004-20240802-en
General
-
Target
2b186c4506981ff88356fade8614965805c3714a3467b6ae8715ac2d17537bf5.exe
-
Size
1.1MB
-
MD5
8e0e0d4d728fab29b9bcfb6641a7eeb8
-
SHA1
8d91fe969aec8ca54cd660d14899fc8d4d3131ce
-
SHA256
2b186c4506981ff88356fade8614965805c3714a3467b6ae8715ac2d17537bf5
-
SHA512
c0635192adef80e44ce0393b8433a707a1b07d4de67c76ce72243b9f9b502758f7a66dffbe301fef58d685da478fe66f13e4c735166b943a4132c45a67907e1e
-
SSDEEP
24576:aH0dl8myX9Bg42QoXFkrzkmplSgRDYo0lG4Z8r7Qfbkiu5Qj:acallSllG4ZM7QzMU
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2824 svchcst.exe -
Executes dropped EXE 24 IoCs
pid Process 2824 svchcst.exe 1476 svchcst.exe 752 svchcst.exe 2512 svchcst.exe 1868 svchcst.exe 684 svchcst.exe 1748 svchcst.exe 1204 svchcst.exe 1484 svchcst.exe 2632 svchcst.exe 1568 svchcst.exe 332 svchcst.exe 2036 svchcst.exe 2236 svchcst.exe 2204 svchcst.exe 2568 svchcst.exe 1984 svchcst.exe 2428 svchcst.exe 2660 svchcst.exe 2848 svchcst.exe 3016 svchcst.exe 1740 svchcst.exe 1260 svchcst.exe 356 svchcst.exe -
Loads dropped DLL 37 IoCs
pid Process 2428 WScript.exe 2428 WScript.exe 2660 WScript.exe 2804 WScript.exe 2804 WScript.exe 2804 WScript.exe 2460 WScript.exe 1320 WScript.exe 2460 WScript.exe 2460 WScript.exe 2412 WScript.exe 2412 WScript.exe 2748 WScript.exe 2748 WScript.exe 2168 WScript.exe 2168 WScript.exe 1920 WScript.exe 2528 WScript.exe 2528 WScript.exe 2472 WScript.exe 2472 WScript.exe 2460 WScript.exe 2460 WScript.exe 1636 WScript.exe 1636 WScript.exe 2980 WScript.exe 2980 WScript.exe 2116 WScript.exe 2116 WScript.exe 340 WScript.exe 340 WScript.exe 752 WScript.exe 752 WScript.exe 1872 WScript.exe 1872 WScript.exe 2236 WScript.exe 2236 WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 49 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2b186c4506981ff88356fade8614965805c3714a3467b6ae8715ac2d17537bf5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2564 2b186c4506981ff88356fade8614965805c3714a3467b6ae8715ac2d17537bf5.exe 2824 svchcst.exe 2824 svchcst.exe 2824 svchcst.exe 2824 svchcst.exe 2824 svchcst.exe 2824 svchcst.exe 2824 svchcst.exe 2824 svchcst.exe 2824 svchcst.exe 2824 svchcst.exe 2824 svchcst.exe 2824 svchcst.exe 2824 svchcst.exe 2824 svchcst.exe 2824 svchcst.exe 2824 svchcst.exe 2824 svchcst.exe 2824 svchcst.exe 2824 svchcst.exe 2824 svchcst.exe 2824 svchcst.exe 2824 svchcst.exe 2824 svchcst.exe 2824 svchcst.exe 2824 svchcst.exe 2824 svchcst.exe 2824 svchcst.exe 2824 svchcst.exe 2824 svchcst.exe 2824 svchcst.exe 2824 svchcst.exe 2824 svchcst.exe 2824 svchcst.exe 2824 svchcst.exe 2824 svchcst.exe 2824 svchcst.exe 2824 svchcst.exe 2824 svchcst.exe 2824 svchcst.exe 2824 svchcst.exe 2824 svchcst.exe 2824 svchcst.exe 2824 svchcst.exe 2824 svchcst.exe 2824 svchcst.exe 2824 svchcst.exe 2824 svchcst.exe 2824 svchcst.exe 2824 svchcst.exe 2824 svchcst.exe 2824 svchcst.exe 2824 svchcst.exe 2824 svchcst.exe 2824 svchcst.exe 2824 svchcst.exe 2824 svchcst.exe 2824 svchcst.exe 2824 svchcst.exe 2824 svchcst.exe 2824 svchcst.exe 2824 svchcst.exe 2824 svchcst.exe 2824 svchcst.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2564 2b186c4506981ff88356fade8614965805c3714a3467b6ae8715ac2d17537bf5.exe -
Suspicious use of SetWindowsHookEx 50 IoCs
pid Process 2564 2b186c4506981ff88356fade8614965805c3714a3467b6ae8715ac2d17537bf5.exe 2564 2b186c4506981ff88356fade8614965805c3714a3467b6ae8715ac2d17537bf5.exe 2824 svchcst.exe 2824 svchcst.exe 1476 svchcst.exe 1476 svchcst.exe 752 svchcst.exe 752 svchcst.exe 2512 svchcst.exe 2512 svchcst.exe 1868 svchcst.exe 1868 svchcst.exe 684 svchcst.exe 684 svchcst.exe 1748 svchcst.exe 1748 svchcst.exe 1204 svchcst.exe 1204 svchcst.exe 1484 svchcst.exe 1484 svchcst.exe 2632 svchcst.exe 2632 svchcst.exe 1568 svchcst.exe 1568 svchcst.exe 332 svchcst.exe 332 svchcst.exe 2036 svchcst.exe 2036 svchcst.exe 2236 svchcst.exe 2236 svchcst.exe 2204 svchcst.exe 2204 svchcst.exe 2568 svchcst.exe 2568 svchcst.exe 1984 svchcst.exe 1984 svchcst.exe 2428 svchcst.exe 2428 svchcst.exe 2660 svchcst.exe 2660 svchcst.exe 2848 svchcst.exe 2848 svchcst.exe 3016 svchcst.exe 3016 svchcst.exe 1740 svchcst.exe 1740 svchcst.exe 1260 svchcst.exe 1260 svchcst.exe 356 svchcst.exe 356 svchcst.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2564 wrote to memory of 2428 2564 2b186c4506981ff88356fade8614965805c3714a3467b6ae8715ac2d17537bf5.exe 31 PID 2564 wrote to memory of 2428 2564 2b186c4506981ff88356fade8614965805c3714a3467b6ae8715ac2d17537bf5.exe 31 PID 2564 wrote to memory of 2428 2564 2b186c4506981ff88356fade8614965805c3714a3467b6ae8715ac2d17537bf5.exe 31 PID 2564 wrote to memory of 2428 2564 2b186c4506981ff88356fade8614965805c3714a3467b6ae8715ac2d17537bf5.exe 31 PID 2428 wrote to memory of 2824 2428 WScript.exe 33 PID 2428 wrote to memory of 2824 2428 WScript.exe 33 PID 2428 wrote to memory of 2824 2428 WScript.exe 33 PID 2428 wrote to memory of 2824 2428 WScript.exe 33 PID 2824 wrote to memory of 2660 2824 svchcst.exe 34 PID 2824 wrote to memory of 2660 2824 svchcst.exe 34 PID 2824 wrote to memory of 2660 2824 svchcst.exe 34 PID 2824 wrote to memory of 2660 2824 svchcst.exe 34 PID 2660 wrote to memory of 1476 2660 WScript.exe 35 PID 2660 wrote to memory of 1476 2660 WScript.exe 35 PID 2660 wrote to memory of 1476 2660 WScript.exe 35 PID 2660 wrote to memory of 1476 2660 WScript.exe 35 PID 1476 wrote to memory of 2804 1476 svchcst.exe 36 PID 1476 wrote to memory of 2804 1476 svchcst.exe 36 PID 1476 wrote to memory of 2804 1476 svchcst.exe 36 PID 1476 wrote to memory of 2804 1476 svchcst.exe 36 PID 2804 wrote to memory of 752 2804 WScript.exe 37 PID 2804 wrote to memory of 752 2804 WScript.exe 37 PID 2804 wrote to memory of 752 2804 WScript.exe 37 PID 2804 wrote to memory of 752 2804 WScript.exe 37 PID 752 wrote to memory of 2852 752 svchcst.exe 38 PID 752 wrote to memory of 2852 752 svchcst.exe 38 PID 752 wrote to memory of 2852 752 svchcst.exe 38 PID 752 wrote to memory of 2852 752 svchcst.exe 38 PID 2804 wrote to memory of 2512 2804 WScript.exe 39 PID 2804 wrote to memory of 2512 2804 WScript.exe 39 PID 2804 wrote to memory of 2512 2804 WScript.exe 39 PID 2804 wrote to memory of 2512 2804 WScript.exe 39 PID 2512 wrote to memory of 2460 2512 svchcst.exe 40 PID 2512 wrote to memory of 2460 2512 svchcst.exe 40 PID 2512 wrote to memory of 2460 2512 svchcst.exe 40 PID 2512 wrote to memory of 2460 2512 svchcst.exe 40 PID 2460 wrote to memory of 1868 2460 WScript.exe 41 PID 2460 wrote to memory of 1868 2460 WScript.exe 41 PID 2460 wrote to memory of 1868 2460 WScript.exe 41 PID 2460 wrote to memory of 1868 2460 WScript.exe 41 PID 1868 wrote to memory of 1320 1868 svchcst.exe 42 PID 1868 wrote to memory of 1320 1868 svchcst.exe 42 PID 1868 wrote to memory of 1320 1868 svchcst.exe 42 PID 1868 wrote to memory of 1320 1868 svchcst.exe 42 PID 1320 wrote to memory of 684 1320 WScript.exe 43 PID 1320 wrote to memory of 684 1320 WScript.exe 43 PID 1320 wrote to memory of 684 1320 WScript.exe 43 PID 1320 wrote to memory of 684 1320 WScript.exe 43 PID 2460 wrote to memory of 1748 2460 WScript.exe 44 PID 2460 wrote to memory of 1748 2460 WScript.exe 44 PID 2460 wrote to memory of 1748 2460 WScript.exe 44 PID 2460 wrote to memory of 1748 2460 WScript.exe 44 PID 684 wrote to memory of 1488 684 svchcst.exe 45 PID 684 wrote to memory of 1488 684 svchcst.exe 45 PID 684 wrote to memory of 1488 684 svchcst.exe 45 PID 684 wrote to memory of 1488 684 svchcst.exe 45 PID 2460 wrote to memory of 1204 2460 WScript.exe 46 PID 2460 wrote to memory of 1204 2460 WScript.exe 46 PID 2460 wrote to memory of 1204 2460 WScript.exe 46 PID 2460 wrote to memory of 1204 2460 WScript.exe 46 PID 1204 wrote to memory of 2412 1204 svchcst.exe 47 PID 1204 wrote to memory of 2412 1204 svchcst.exe 47 PID 1204 wrote to memory of 2412 1204 svchcst.exe 47 PID 1204 wrote to memory of 2412 1204 svchcst.exe 47
Processes
-
C:\Users\Admin\AppData\Local\Temp\2b186c4506981ff88356fade8614965805c3714a3467b6ae8715ac2d17537bf5.exe"C:\Users\Admin\AppData\Local\Temp\2b186c4506981ff88356fade8614965805c3714a3467b6ae8715ac2d17537bf5.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"6⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"8⤵
- System Location Discovery: System Language Discovery
PID:2852
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"8⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"9⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"10⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"11⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:684 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"12⤵
- System Location Discovery: System Language Discovery
PID:1488
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"9⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1748
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"9⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"10⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2412 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"11⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1484 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"12⤵
- System Location Discovery: System Language Discovery
PID:2792
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"11⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2632 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"12⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2748 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"13⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1568 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"14⤵
- System Location Discovery: System Language Discovery
PID:1948
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"13⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:332 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"14⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2168 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"15⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2036 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"16⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1920 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"17⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2236 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"18⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2528 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"19⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2204 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"20⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2472 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"21⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2568 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"22⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2460 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"23⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1984 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"24⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1636 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"25⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2428 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"26⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2980 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"27⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2660 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"28⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2116 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"29⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2848 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"30⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:340 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"31⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3016 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"32⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:752 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"33⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1740 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"34⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1872 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"35⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1260 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"36⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2236 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"37⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:356 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"38⤵
- System Location Discovery: System Language Discovery
PID:840
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92B
MD567b9b3e2ded7086f393ebbc36c5e7bca
SHA1e6299d0450b9a92a18cc23b5704a2b475652c790
SHA25644063c266686263f14cd2a83fee124fb3e61a9171a6aab69709464f49511011d
SHA512826fbc9481f46b1ae3db828a665c55c349023caf563e6e8c17321f5f3af3e4c3914955db6f0eebfc6defe561315435d47310b4d0499ab9c2c85bb61264dedc09
-
Filesize
696B
MD5ee35194fa07bea6145178b37a18edb25
SHA17cbe9989cbc0090cc0ab534c7aa77d64d959e489
SHA256e323603a594cf3a7e03aea20d2ab69a17040a02f256ac1e3fe02f8a36889a483
SHA512d292e22575da17d694a33d6132cea65ca1c58a16bd2532dd24db161d2a77cf233039ed1b66b48868210f4d0ffff16678db3be341eca044432b8087b520e59f71
-
Filesize
753B
MD599ac427b950328d38d9d1495d4e4373c
SHA1afa6d804df64c43a756aeecd791337b0143ae220
SHA256917fa32e97ade0528f7caed7912210d5e44a26d154fcd480ae89ca7e6c4222a1
SHA512600ff6df83394c128a44b871645c5673d7017fc77c2ecb9c2d57c52bc989d107cb307d980cce6af23e13255eb6726fb5db749d887db171918efe3bbd2565fd3a
-
Filesize
696B
MD566dec81d7f7dc4e36f9d8151fe38056a
SHA1fc169994b2239eb407778d28d35025f7c9a1658e
SHA256a09a3c722b494400011829c5645415020d39c8e6ec90f466fc3109a1ba49db2a
SHA5123e8af1d301ba9228d5afcfaa1e1d3e6f931c5f0ba5e19c74f73b88ddf7c4baa7b24f13533679096f6c94871985de9e47d0f91362ec2ee9132b1e1b772d56fbcc
-
Filesize
696B
MD53f88ed4a802ff96db44e34ad53ac06c2
SHA1446fe4e265af02ea012b5a8d5d0e7a0c9867f1ed
SHA25604a5abb92c689fa7b9d768a067b1d9bd16c0a5d856c67c7f7881d62662ae0911
SHA512f1afaf53ee96969d58902836b841ca7feed9769c81d9b2d63b72db5d7cf04d6a659b50869f8dba0d650aa6833d892261c0c3dd918e8bfbed13237e6333c47fdf
-
Filesize
696B
MD5c94fda6716d92036e02a0e70b433735f
SHA1eb4e57b1461e03a201dbfd20dd308ca88694e55d
SHA256ca8d32856a5ad76e2bf41249ee83a498c238f51d9d3addbd5ca456ee6a6108ba
SHA512bf4b3613a4d6d2854f7750a73f84579a3022c2aaae770c392c3d4b273cbb2b493028f8109856ba66ee4636bcfac53b61b7f9b689002858a040b62b47d097d24f
-
Filesize
696B
MD566073a2944d79129b28645fed6bc1286
SHA12cbba938ab66f7f5c9b0cb2a5c58940e2e14599b
SHA25687d79920ed0fb49971153bdcb8a8ca003a247e5937d8cc3dc3b871e91ef79042
SHA51295b8dffed82c126394ce16db0af1874ade41cca2b096d9ffe388e9c6a462c86e21723f811c0fb8c8445047906b0dfe035f5a421b5d406b8e8d3e6a1ad5d4351b
-
Filesize
696B
MD57d2c3f227d42fae4a5b7fbcb491b74e3
SHA1c1271bbd86747cc709b694ba9579a68b5e75a17c
SHA2569353a2f27a61e571c5bc92ccc1046c1059c5fad8e1e2cafe63a9cc73e1169c33
SHA51250330ad733975966b32fbedffb99a25cd13004d685e5788ef11f1f0fedfc62658e3e8f5ed0030fe60ecb02ba95ffa7d440c067a1e164cc3bc02ac5008b6a27d3
-
Filesize
696B
MD5fb757130836576e5f952cb011021776c
SHA168f6351ef6dd363f67e76b91e7d8150050948698
SHA2562d8143967be00cc4d6f3a1b8671885498b80e57ec52a84e19eaf136e64980e5b
SHA5126f7311c6964be509733152377344d37f311021a6638946d275d282aa1b0212d8d790175b8c4e61fba6f5f4299c0e5da3307b69b03f619273462edd5c3cfce0d8
-
Filesize
696B
MD51931659cf1a0b565c26fde26192e60ea
SHA1290204916cf2bd320dd6af5de4fea33f4b987a23
SHA2568d4ff60de30d55f81dda162ccf8ad556e3a1c9a9e20260d8a767def90595191a
SHA5129a90635a350ecaf5d4f9c5787f4079e90d6e2983b87e8dc6db38a2d0121e68422d2fc8c7e322c0b6556cd92870713380edf55950260e9369350e96d4603f390e
-
Filesize
696B
MD5f68761d0622df41d256ee6fc39583d8a
SHA12dd40e574a86ff4b4be5e6aca6fda4d7fcc33d56
SHA256b4bf1092c76497e935596e32fcb9119a44acab11e9b80b660ecea53867655245
SHA512fd70e0b445bcd24117b449853c98a4996063d49f774a55bc5aca087b44cdb5381974551c4fcd2d3d1c82cd708fcb616009519f3914267ea5c37cdda4d31ea3a1
-
Filesize
696B
MD5b9f42b67196579be4b48ef3493e40a6d
SHA1f0a798a4aa9401ce637b3016829d6bc178b46b36
SHA2565af7cfef4fc0b02f32178caf67f947bc09a9631a5ec201ffa67b2f4f470bbed2
SHA512875207383356da783c8f932da091d7c1316a0859406a388a6a4b0e641cc15326ac5134a5dc3e5299cccd6c245456483db86f5f9652fec2fa049996259d166284
-
Filesize
696B
MD585fa416be0b995c6e53ce5e2df106d8a
SHA1bcffe6d0eb7594897fb6c1c1e6e409bacd04f009
SHA256f08a191ea7850c2d2e0fa0cd1f40254eecb8dcb63a9dfa94cc8a97f609c49293
SHA5125d92938d833d0555e94027148d0d9fc064274885bb4992f4e5840e7be03b629a3d2dc3703f9a7aa7614cb46ee19f9cfe26c69cc2e3a162f4be9045e5da18efbf
-
Filesize
696B
MD5f02b234115a56496bcd6642d1de04e5d
SHA1d383b9d3c82fe145f25a9a6e7e4333151fd4ecc6
SHA2569eca0120263ab4947d38369d9a4986744e61189382c1d313eb464ad449ea2651
SHA512c446eccd822729a81d49321c88ecc0fba4e4f7b6f6277d2660c7f3a18a67614915ae24a96353bf93b039eb441f0c260c1961a1363f16524dbeaf2554626c1b4e
-
Filesize
1.1MB
MD5e151732697e9eadf9b6cb4c3a5eff7b1
SHA1c4d83676899a1eacf7243d31c091cbcbc0d6830a
SHA256301aa84fc05c54be24caac6269df0eb9ddf4dd320cc513df1a2707f58fa5d246
SHA512fb5a8c86978ae46646f0bfcb1d04475487ed1fbd439e84983ee1f11d407570dfa0706465b701390a39807c942334abee2dc8733cdc5be8f56d34e92b1822db34
-
Filesize
1.1MB
MD5eb7dc0d3f44c0bcf88c91263d5ef8722
SHA18787d167583bc89213d9610c9ae75d9cca0e1a41
SHA256ce927720e4577657d867b368027a0417c6ac34cdd07c8b4f596cc119c561d332
SHA512b83d3fe64b8d7368ff444e9747ed29d6d85dcfc0d51f78254ccfa40d257a78bd521142689d69483bdd73ab5af4ec909b15c359f2c0b0beeab951b729f6c060b6
-
Filesize
1.1MB
MD55e0442e6355df5b5445d6b640f23157c
SHA18950f11cad39cf3e8aba020d6c0d484448022e4b
SHA2560d375e13c2346761ba2f413dc0e6ff1bed60c12672139eacb8b108ff6ff4b7a7
SHA5127c785b848064d5478027e4f7b94f55aa9b2a0e735ddc7318f19613620ff84b7e3e95f44a99181d743f036ba05ffae0bf1539a4b25a68acc33125f0f3b1de5476