Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
26/08/2024, 07:05
Static task
static1
Behavioral task
behavioral1
Sample
7ec4e6877e8783a769493afb9eb754f0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
7ec4e6877e8783a769493afb9eb754f0N.exe
Resource
win10v2004-20240802-en
General
-
Target
7ec4e6877e8783a769493afb9eb754f0N.exe
-
Size
1.1MB
-
MD5
7ec4e6877e8783a769493afb9eb754f0
-
SHA1
2c63dabc54daf728559e5b67eadc9a9cea0b622e
-
SHA256
7a1d14c49171c53d6f0b5679a1070227a11026a165bfa23f59b1a29ba6bf2edf
-
SHA512
cf307d06aae1f5acb9ec3b5cd864551d2897a9cdf399526c9ddd1da76ee1ead76e98a84d4f23386a87fcc92830f23760c0d21d3ec82ff28f11cb70d56b8830b6
-
SSDEEP
24576:aH0dl8myX9Bg42QoXFkrzkmplSgRDYo0lG4Z8r7Qfbkiu5QL:acallSllG4ZM7QzMs
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2848 svchcst.exe -
Executes dropped EXE 22 IoCs
pid Process 2848 svchcst.exe 2452 svchcst.exe 1620 svchcst.exe 1560 svchcst.exe 1108 svchcst.exe 688 svchcst.exe 2120 svchcst.exe 2920 svchcst.exe 2596 svchcst.exe 1960 svchcst.exe 2576 svchcst.exe 2936 svchcst.exe 560 svchcst.exe 1876 svchcst.exe 1448 svchcst.exe 1476 svchcst.exe 2192 svchcst.exe 1312 svchcst.exe 2556 svchcst.exe 2084 svchcst.exe 1860 svchcst.exe 2240 svchcst.exe -
Loads dropped DLL 29 IoCs
pid Process 2676 WScript.exe 2676 WScript.exe 2648 WScript.exe 900 WScript.exe 992 WScript.exe 1260 WScript.exe 1260 WScript.exe 2348 WScript.exe 2348 WScript.exe 2348 WScript.exe 2600 WScript.exe 1724 WScript.exe 1724 WScript.exe 2356 WScript.exe 1848 WScript.exe 2356 WScript.exe 820 WScript.exe 2332 WScript.exe 820 WScript.exe 820 WScript.exe 2332 WScript.exe 2332 WScript.exe 1828 WScript.exe 1828 WScript.exe 1828 WScript.exe 1412 WScript.exe 1412 WScript.exe 788 WScript.exe 788 WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 42 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7ec4e6877e8783a769493afb9eb754f0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2392 7ec4e6877e8783a769493afb9eb754f0N.exe 2848 svchcst.exe 2848 svchcst.exe 2848 svchcst.exe 2848 svchcst.exe 2848 svchcst.exe 2848 svchcst.exe 2848 svchcst.exe 2848 svchcst.exe 2848 svchcst.exe 2848 svchcst.exe 2848 svchcst.exe 2848 svchcst.exe 2848 svchcst.exe 2848 svchcst.exe 2848 svchcst.exe 2848 svchcst.exe 2848 svchcst.exe 2848 svchcst.exe 2848 svchcst.exe 2848 svchcst.exe 2848 svchcst.exe 2848 svchcst.exe 2848 svchcst.exe 2848 svchcst.exe 2848 svchcst.exe 2848 svchcst.exe 2848 svchcst.exe 2848 svchcst.exe 2848 svchcst.exe 2848 svchcst.exe 2848 svchcst.exe 2848 svchcst.exe 2848 svchcst.exe 2848 svchcst.exe 2848 svchcst.exe 2848 svchcst.exe 2848 svchcst.exe 2848 svchcst.exe 2848 svchcst.exe 2848 svchcst.exe 2848 svchcst.exe 2848 svchcst.exe 2848 svchcst.exe 2848 svchcst.exe 2848 svchcst.exe 2848 svchcst.exe 2848 svchcst.exe 2848 svchcst.exe 2848 svchcst.exe 2848 svchcst.exe 2848 svchcst.exe 2848 svchcst.exe 2848 svchcst.exe 2848 svchcst.exe 2848 svchcst.exe 2848 svchcst.exe 2848 svchcst.exe 2848 svchcst.exe 2848 svchcst.exe 2848 svchcst.exe 2848 svchcst.exe 2848 svchcst.exe 2848 svchcst.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2392 7ec4e6877e8783a769493afb9eb754f0N.exe -
Suspicious use of SetWindowsHookEx 46 IoCs
pid Process 2392 7ec4e6877e8783a769493afb9eb754f0N.exe 2392 7ec4e6877e8783a769493afb9eb754f0N.exe 2848 svchcst.exe 2848 svchcst.exe 2452 svchcst.exe 2452 svchcst.exe 1620 svchcst.exe 1620 svchcst.exe 1560 svchcst.exe 1560 svchcst.exe 1108 svchcst.exe 1108 svchcst.exe 688 svchcst.exe 688 svchcst.exe 2120 svchcst.exe 2120 svchcst.exe 2920 svchcst.exe 2920 svchcst.exe 2596 svchcst.exe 2596 svchcst.exe 1960 svchcst.exe 1960 svchcst.exe 2576 svchcst.exe 2576 svchcst.exe 2936 svchcst.exe 2936 svchcst.exe 560 svchcst.exe 560 svchcst.exe 1876 svchcst.exe 1876 svchcst.exe 1476 svchcst.exe 1476 svchcst.exe 1448 svchcst.exe 1448 svchcst.exe 2192 svchcst.exe 2192 svchcst.exe 1312 svchcst.exe 1312 svchcst.exe 2556 svchcst.exe 2556 svchcst.exe 2084 svchcst.exe 2084 svchcst.exe 1860 svchcst.exe 1860 svchcst.exe 2240 svchcst.exe 2240 svchcst.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2392 wrote to memory of 2676 2392 7ec4e6877e8783a769493afb9eb754f0N.exe 30 PID 2392 wrote to memory of 2676 2392 7ec4e6877e8783a769493afb9eb754f0N.exe 30 PID 2392 wrote to memory of 2676 2392 7ec4e6877e8783a769493afb9eb754f0N.exe 30 PID 2392 wrote to memory of 2676 2392 7ec4e6877e8783a769493afb9eb754f0N.exe 30 PID 2676 wrote to memory of 2848 2676 WScript.exe 33 PID 2676 wrote to memory of 2848 2676 WScript.exe 33 PID 2676 wrote to memory of 2848 2676 WScript.exe 33 PID 2676 wrote to memory of 2848 2676 WScript.exe 33 PID 2848 wrote to memory of 2648 2848 svchcst.exe 34 PID 2848 wrote to memory of 2648 2848 svchcst.exe 34 PID 2848 wrote to memory of 2648 2848 svchcst.exe 34 PID 2848 wrote to memory of 2648 2848 svchcst.exe 34 PID 2648 wrote to memory of 2452 2648 WScript.exe 35 PID 2648 wrote to memory of 2452 2648 WScript.exe 35 PID 2648 wrote to memory of 2452 2648 WScript.exe 35 PID 2648 wrote to memory of 2452 2648 WScript.exe 35 PID 2452 wrote to memory of 900 2452 svchcst.exe 36 PID 2452 wrote to memory of 900 2452 svchcst.exe 36 PID 2452 wrote to memory of 900 2452 svchcst.exe 36 PID 2452 wrote to memory of 900 2452 svchcst.exe 36 PID 900 wrote to memory of 1620 900 WScript.exe 37 PID 900 wrote to memory of 1620 900 WScript.exe 37 PID 900 wrote to memory of 1620 900 WScript.exe 37 PID 900 wrote to memory of 1620 900 WScript.exe 37 PID 1620 wrote to memory of 992 1620 svchcst.exe 38 PID 1620 wrote to memory of 992 1620 svchcst.exe 38 PID 1620 wrote to memory of 992 1620 svchcst.exe 38 PID 1620 wrote to memory of 992 1620 svchcst.exe 38 PID 992 wrote to memory of 1560 992 WScript.exe 39 PID 992 wrote to memory of 1560 992 WScript.exe 39 PID 992 wrote to memory of 1560 992 WScript.exe 39 PID 992 wrote to memory of 1560 992 WScript.exe 39 PID 1560 wrote to memory of 1260 1560 svchcst.exe 40 PID 1560 wrote to memory of 1260 1560 svchcst.exe 40 PID 1560 wrote to memory of 1260 1560 svchcst.exe 40 PID 1560 wrote to memory of 1260 1560 svchcst.exe 40 PID 1260 wrote to memory of 1108 1260 WScript.exe 41 PID 1260 wrote to memory of 1108 1260 WScript.exe 41 PID 1260 wrote to memory of 1108 1260 WScript.exe 41 PID 1260 wrote to memory of 1108 1260 WScript.exe 41 PID 1108 wrote to memory of 2836 1108 svchcst.exe 42 PID 1108 wrote to memory of 2836 1108 svchcst.exe 42 PID 1108 wrote to memory of 2836 1108 svchcst.exe 42 PID 1108 wrote to memory of 2836 1108 svchcst.exe 42 PID 1260 wrote to memory of 688 1260 WScript.exe 43 PID 1260 wrote to memory of 688 1260 WScript.exe 43 PID 1260 wrote to memory of 688 1260 WScript.exe 43 PID 1260 wrote to memory of 688 1260 WScript.exe 43 PID 688 wrote to memory of 2348 688 svchcst.exe 44 PID 688 wrote to memory of 2348 688 svchcst.exe 44 PID 688 wrote to memory of 2348 688 svchcst.exe 44 PID 688 wrote to memory of 2348 688 svchcst.exe 44 PID 2348 wrote to memory of 2120 2348 WScript.exe 45 PID 2348 wrote to memory of 2120 2348 WScript.exe 45 PID 2348 wrote to memory of 2120 2348 WScript.exe 45 PID 2348 wrote to memory of 2120 2348 WScript.exe 45 PID 2120 wrote to memory of 3012 2120 svchcst.exe 46 PID 2120 wrote to memory of 3012 2120 svchcst.exe 46 PID 2120 wrote to memory of 3012 2120 svchcst.exe 46 PID 2120 wrote to memory of 3012 2120 svchcst.exe 46 PID 2348 wrote to memory of 2920 2348 WScript.exe 47 PID 2348 wrote to memory of 2920 2348 WScript.exe 47 PID 2348 wrote to memory of 2920 2348 WScript.exe 47 PID 2348 wrote to memory of 2920 2348 WScript.exe 47
Processes
-
C:\Users\Admin\AppData\Local\Temp\7ec4e6877e8783a769493afb9eb754f0N.exe"C:\Users\Admin\AppData\Local\Temp\7ec4e6877e8783a769493afb9eb754f0N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"6⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:900 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"8⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:992 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"9⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"10⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"11⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1108 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"12⤵
- System Location Discovery: System Language Discovery
PID:2836
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"11⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:688 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"12⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"13⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"14⤵
- System Location Discovery: System Language Discovery
PID:3012
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"13⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2920 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"14⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2600 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"15⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2596 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"16⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1724 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"17⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1960 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"18⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1848 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"19⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:560 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"20⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:820 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"21⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1476
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"21⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2192
-
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"17⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2576 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"18⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2356 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"19⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2936 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"20⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2332 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"21⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1448
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"21⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1312
-
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"19⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1876 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"20⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1828 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"21⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2556 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"22⤵
- System Location Discovery: System Language Discovery
PID:2620
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"21⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2084 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"22⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1412 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"23⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1860 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"24⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:788 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"25⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2240 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"26⤵
- System Location Discovery: System Language Discovery
PID:2652 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"27⤵PID:928
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"28⤵PID:2576
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92B
MD567b9b3e2ded7086f393ebbc36c5e7bca
SHA1e6299d0450b9a92a18cc23b5704a2b475652c790
SHA25644063c266686263f14cd2a83fee124fb3e61a9171a6aab69709464f49511011d
SHA512826fbc9481f46b1ae3db828a665c55c349023caf563e6e8c17321f5f3af3e4c3914955db6f0eebfc6defe561315435d47310b4d0499ab9c2c85bb61264dedc09
-
Filesize
696B
MD55d0d203da02edb604545d3d826c88b42
SHA19be0cfd40b48d4e6041e00827047a8b0d877d4a1
SHA2565f341c2f1ff381eecedbf6fcbe549724323c30c05728132a98ea55f607bc3e81
SHA512a3e01552a9576ba8dd9aa9f65211f74a69588a316d984b8887e740c6c174e19df2056dc0138d5af26bd927e192ec2c7d355fc8b4092e30d55de910e932fbd49f
-
Filesize
722B
MD50f2b26654e6ba47e963fcbad9b1b378e
SHA12bdf4110199e91fe75366cf52d4b7ea7d603081b
SHA256f25954ab5c4b9675dee4e6f45d96d1395b44a21e4b59d2c2a632f6a43e5aa142
SHA512e9fe16ecaab9c53ef2214c67c00bd1a2ba15e30c364430ea11f1062fe8018407e0b24648c58c2d22aabd63bbe993d4acfee1f552a335929b035ed90a48c8c701
-
Filesize
696B
MD5ebf405e49dade13da94f737cdc03dba1
SHA18a0c39e59beed0deb4e726566b235c42c70942bb
SHA256d15af3885670c4fea9dd97da21025faa5fd2b42bddc310bad2893e23a3ed2bef
SHA512bbdef781757a387898665650d8f951e7fc495770d34595d9badbe5a39d46ec49a06ec00cbe28ed5e2677e5eeea518241fb638580668baca8d7728c44f2069ea2
-
Filesize
696B
MD5251a70f0c55d02e74e34c409c5795274
SHA1b0eb587b5e8d597ef801848722b790692d804be2
SHA256f5397f02a6c8c59bc9869c0e5c726c096a69c84ad7f0934608fdbd8bc7e5b9f3
SHA512023cca65a97265961790183f43605fb3dd47426049f2152e5ed90d2daed98607d1e215cb8cabf54d7d2068f7a86d3b01b1d101823e8ed1acfb09076e69b67c71
-
Filesize
696B
MD581da78e4c29b5abf222c1425d1b8da16
SHA1c68fae858982c6217d14f0a94f1e424dc47e5abb
SHA256e1c0bac8ec1a6de7acf76dbaae7862a630d01697c06843f75330f8be29261f38
SHA512859ff4f8d8119e4a12c83c8aa7a7c392b9bde66358d189f67f0d44ae6777f75dd7f994536d812cb00f0612a9c4444a3775ff729512d50c1a6173f23b5866fdb0
-
Filesize
696B
MD599c82369839776d3d954a85361e76565
SHA1fe01d71a20a80f468e5fa4df991eacca97e650a1
SHA256ecfe1904a389f25b460a8eec64349498fde06733fa12cd5ae8e0c49a9699154f
SHA5125deb6fd1534298cbc80f4653e60b9dcaba6cfd4af1f3b1e5369929472ab4f8cba7d50d3f63d7154170b5ea84f40f7511f1839f2e89340c6942fede255c93b69f
-
Filesize
696B
MD503088ab16e4136b8d3a3366505b767ed
SHA1e1d73c9dc7e6009659519b33b3dd80f3011adad8
SHA256b31956814f1bc7c1e47a025622160df37664a3ee8e6d2016ce8919f1fba63a59
SHA5120c841cc8236b405951c5bdf0ea7c620ef32ab930077442e5c1f2eca9fe474c113e1377829e8072afdbfd9a0f0b2797cf156b2f861395d14b851abc7b365ec11a
-
Filesize
696B
MD599c6d3daae7cb362152020047cb956dc
SHA14d70b60a43d37fbfea1be333aad269606ae3d3a7
SHA256b35a71753d085b170fca9949910d93671a298e1fcc05cf0cdff308dba4d12324
SHA51237098e0594a21439720df6adc851063d275020c7a337326cf0f83c8fce79ac210bd42c5458e49e560c4641b569be88b34ee5ee99dccba5c2655fee127c21e110
-
Filesize
696B
MD516b9011648a577741b7fb4a55f1eeaac
SHA1b0d86d1cf62b882bf28f0897ddb610e41cc6814c
SHA2567bf3fbb9962c054e651caf4e49fa468d5892cb0bf88f4bbf3fd85b372a7d173c
SHA5121d8631904aa2df5a90aef858d4369ed53d0075f97b42361a8e05c9a64f8e6a786897b625b1230d20415f3923db8aa5d8f5f619b7b9084202fecf4e7cead4366d
-
Filesize
696B
MD510ffe941ac3b45a1b27eaab090d03e3b
SHA14f72abac858bc7659692930176f0cd4f18e354f1
SHA256b2a27182b84ccf59736264c5fc788f96d92a2d3a14fe7c964e0976af00956144
SHA512638a48fe06a5e0c47e50ac67e0df2d6952e5e39620a585e5fb086d40ff61cff9bee6a6cfda6582c54e216f052dc6ba4ce5d742ae5174a987701701e67dc65544
-
Filesize
696B
MD55ba8c208c5700f7f25c2e24e00d50ac8
SHA19838a0ab093ed94bc85a80b1feee14b68e4df8d1
SHA256213371c33e19f6f9e28f089e3206fe50c39b190548b0500f7ba8aff869a68cd6
SHA512065e45ebe4197cdf7e13b799928dfb29e17d4a1741e3e103000b147288b34f16300b72874ec85aefa2c04cc939df115a9fb383d5c95982c1371e75605d1a9b17
-
Filesize
696B
MD5c91530bbaec9815f2db19bd6645b8729
SHA1ea901a28f06bfbfc1dc9c3391910a87bfaf07020
SHA2567924a95b4fb309a069dcb92b65632f01f9db2560b224d4812ebb84130994ab8d
SHA5127ebce2d0627561189c27073f3e43e84e6164c3c4a63fe4172d2c1214fe799795393573038fb3dd75359327e7cca4eec17889749411e289480580f568b02e6588
-
Filesize
696B
MD5e5bba46683440caa1508061b6e638120
SHA1538ff5b7cb3ca90cee3e60bae0b487f4b78912de
SHA2569b324dbd185a14c0ebfd2cd2731f6bb32c501dfefa7aef4f65b137357502c65d
SHA512466f00fee10e323273e5d1151062e9fcc36f5657a404c6dd3c0c9ecb56e5205930087e612b13a9c6d1a56df7e05a2bd9c14e95debd5e5aed96ad2ef867e8de4d
-
Filesize
696B
MD5780c5b88f55c3463a252f361d53f98db
SHA1244e739c7401ce41027d7786f4a48f4806a9939b
SHA256d8b383df125f83a39c299a3134c88e981cf47755ddd6b44310f70231305c6bb0
SHA512b12e3266edea4f9dff105ed8617c81a29f9873d646b6b326c5c29c0c590049dd85458b8ff7541957f9ab995896e7bfd08b171959e592ccc6edbedf998fdf1045
-
Filesize
1.1MB
MD5d14e904b7c8416b4aa674f21eb5efde9
SHA14b5b28a13f4820d8ea7f35875ae3183e5fe9df06
SHA2566a203556c331761d3e59336d3964a5daecad5e5ae047d7c92129c488c3790317
SHA5125c16e9585016bb83f06c55753055f0f3acdaf2fb6ff588e18d03b9c4f249582030e703db46f3b20eebb9d5a8802a6aa5b262638972ffcae7221195583b23aca5
-
Filesize
1.1MB
MD52f96f8a94242c8e2de8b43bcca1104a8
SHA1e967061bc8d3548930a953ca37c094d4a45c634e
SHA2564cbdab05d7f7086d7825b92e1b331a5a58d4195d62dbc511f2f5b87298174858
SHA51221713fd50fa2bc6183c540ab932b102731e615dd1288d0ad19815ceb30cae5550b83dd4278d162fcd8439409d9a950a8bdf1993c28a7d6dfe455315877ae5795