Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
29/08/2024, 19:14
Static task
static1
Behavioral task
behavioral1
Sample
d37d6e8eee328ef3925b10fb62706a1137319f8074b259b37cab1823f30b02cb.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
d37d6e8eee328ef3925b10fb62706a1137319f8074b259b37cab1823f30b02cb.exe
Resource
win10v2004-20240802-en
General
-
Target
d37d6e8eee328ef3925b10fb62706a1137319f8074b259b37cab1823f30b02cb.exe
-
Size
1.1MB
-
MD5
b8a1a428ccfa4ebf953ad2e49702f6d8
-
SHA1
280af5ae751560e7a3076dbba4a39b27cea8ec32
-
SHA256
d37d6e8eee328ef3925b10fb62706a1137319f8074b259b37cab1823f30b02cb
-
SHA512
88239aded0cc7fb5833e4118730966345b37c451a8ec272d3e580253b1bbcad21eab8eaa2165d9b3530cb85e832f492b18ebf1f4e0f2789354d28652a65fabf1
-
SSDEEP
24576:aH0dl8myX9Bg42QoXFkrzkmplSgRDYo0lG4Z8r7Qfbkiu5Qa:acallSllG4ZM7QzMZ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2568 svchcst.exe -
Executes dropped EXE 26 IoCs
pid Process 2568 svchcst.exe 564 svchcst.exe 2584 svchcst.exe 1672 svchcst.exe 2136 svchcst.exe 836 svchcst.exe 3048 svchcst.exe 2984 svchcst.exe 2596 svchcst.exe 2648 svchcst.exe 2172 svchcst.exe 2140 svchcst.exe 2296 svchcst.exe 1544 svchcst.exe 2488 svchcst.exe 1904 svchcst.exe 2412 svchcst.exe 1296 svchcst.exe 1640 svchcst.exe 2884 svchcst.exe 2416 svchcst.exe 2052 svchcst.exe 1608 svchcst.exe 624 svchcst.exe 1228 svchcst.exe 2820 svchcst.exe -
Loads dropped DLL 46 IoCs
pid Process 2768 WScript.exe 2768 WScript.exe 2624 WScript.exe 2624 WScript.exe 1044 WScript.exe 1044 WScript.exe 2880 WScript.exe 2880 WScript.exe 1720 WScript.exe 2476 WScript.exe 1512 WScript.exe 1512 WScript.exe 1512 WScript.exe 2668 WScript.exe 2420 WScript.exe 2420 WScript.exe 2420 WScript.exe 2420 WScript.exe 316 WScript.exe 316 WScript.exe 2872 WScript.exe 2872 WScript.exe 2300 WScript.exe 1532 WScript.exe 1532 WScript.exe 580 WScript.exe 580 WScript.exe 2776 WScript.exe 2776 WScript.exe 2636 WScript.exe 2636 WScript.exe 1316 WScript.exe 1316 WScript.exe 2444 WScript.exe 2444 WScript.exe 2444 WScript.exe 2852 WScript.exe 2852 WScript.exe 236 WScript.exe 236 WScript.exe 316 WScript.exe 316 WScript.exe 2388 WScript.exe 2388 WScript.exe 2720 WScript.exe 2720 WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 55 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d37d6e8eee328ef3925b10fb62706a1137319f8074b259b37cab1823f30b02cb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2708 d37d6e8eee328ef3925b10fb62706a1137319f8074b259b37cab1823f30b02cb.exe 2568 svchcst.exe 2568 svchcst.exe 2568 svchcst.exe 2568 svchcst.exe 2568 svchcst.exe 2568 svchcst.exe 2568 svchcst.exe 2568 svchcst.exe 2568 svchcst.exe 2568 svchcst.exe 2568 svchcst.exe 2568 svchcst.exe 2568 svchcst.exe 2568 svchcst.exe 2568 svchcst.exe 2568 svchcst.exe 2568 svchcst.exe 2568 svchcst.exe 2568 svchcst.exe 2568 svchcst.exe 2568 svchcst.exe 2568 svchcst.exe 2568 svchcst.exe 2568 svchcst.exe 2568 svchcst.exe 2568 svchcst.exe 2568 svchcst.exe 2568 svchcst.exe 2568 svchcst.exe 2568 svchcst.exe 2568 svchcst.exe 2568 svchcst.exe 2568 svchcst.exe 2568 svchcst.exe 2568 svchcst.exe 2568 svchcst.exe 2568 svchcst.exe 2568 svchcst.exe 2568 svchcst.exe 2568 svchcst.exe 2568 svchcst.exe 2568 svchcst.exe 2568 svchcst.exe 2568 svchcst.exe 2568 svchcst.exe 2568 svchcst.exe 2568 svchcst.exe 2568 svchcst.exe 2568 svchcst.exe 2568 svchcst.exe 2568 svchcst.exe 2568 svchcst.exe 2568 svchcst.exe 2568 svchcst.exe 2568 svchcst.exe 2568 svchcst.exe 2568 svchcst.exe 2568 svchcst.exe 2568 svchcst.exe 2568 svchcst.exe 2568 svchcst.exe 2568 svchcst.exe 2568 svchcst.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2708 d37d6e8eee328ef3925b10fb62706a1137319f8074b259b37cab1823f30b02cb.exe -
Suspicious use of SetWindowsHookEx 54 IoCs
pid Process 2708 d37d6e8eee328ef3925b10fb62706a1137319f8074b259b37cab1823f30b02cb.exe 2708 d37d6e8eee328ef3925b10fb62706a1137319f8074b259b37cab1823f30b02cb.exe 2568 svchcst.exe 2568 svchcst.exe 564 svchcst.exe 564 svchcst.exe 2584 svchcst.exe 2584 svchcst.exe 1672 svchcst.exe 1672 svchcst.exe 2136 svchcst.exe 2136 svchcst.exe 836 svchcst.exe 836 svchcst.exe 3048 svchcst.exe 3048 svchcst.exe 2984 svchcst.exe 2984 svchcst.exe 2596 svchcst.exe 2596 svchcst.exe 2648 svchcst.exe 2648 svchcst.exe 2172 svchcst.exe 2172 svchcst.exe 2140 svchcst.exe 2140 svchcst.exe 2296 svchcst.exe 2296 svchcst.exe 1544 svchcst.exe 1544 svchcst.exe 2488 svchcst.exe 2488 svchcst.exe 1904 svchcst.exe 1904 svchcst.exe 2412 svchcst.exe 2412 svchcst.exe 1296 svchcst.exe 1296 svchcst.exe 1640 svchcst.exe 1640 svchcst.exe 2884 svchcst.exe 2884 svchcst.exe 2416 svchcst.exe 2416 svchcst.exe 2052 svchcst.exe 2052 svchcst.exe 1608 svchcst.exe 1608 svchcst.exe 624 svchcst.exe 624 svchcst.exe 1228 svchcst.exe 1228 svchcst.exe 2820 svchcst.exe 2820 svchcst.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2708 wrote to memory of 2768 2708 d37d6e8eee328ef3925b10fb62706a1137319f8074b259b37cab1823f30b02cb.exe 30 PID 2708 wrote to memory of 2768 2708 d37d6e8eee328ef3925b10fb62706a1137319f8074b259b37cab1823f30b02cb.exe 30 PID 2708 wrote to memory of 2768 2708 d37d6e8eee328ef3925b10fb62706a1137319f8074b259b37cab1823f30b02cb.exe 30 PID 2708 wrote to memory of 2768 2708 d37d6e8eee328ef3925b10fb62706a1137319f8074b259b37cab1823f30b02cb.exe 30 PID 2768 wrote to memory of 2568 2768 WScript.exe 32 PID 2768 wrote to memory of 2568 2768 WScript.exe 32 PID 2768 wrote to memory of 2568 2768 WScript.exe 32 PID 2768 wrote to memory of 2568 2768 WScript.exe 32 PID 2568 wrote to memory of 2624 2568 svchcst.exe 33 PID 2568 wrote to memory of 2624 2568 svchcst.exe 33 PID 2568 wrote to memory of 2624 2568 svchcst.exe 33 PID 2568 wrote to memory of 2624 2568 svchcst.exe 33 PID 2568 wrote to memory of 1044 2568 svchcst.exe 34 PID 2568 wrote to memory of 1044 2568 svchcst.exe 34 PID 2568 wrote to memory of 1044 2568 svchcst.exe 34 PID 2568 wrote to memory of 1044 2568 svchcst.exe 34 PID 2624 wrote to memory of 564 2624 WScript.exe 35 PID 2624 wrote to memory of 564 2624 WScript.exe 35 PID 2624 wrote to memory of 564 2624 WScript.exe 35 PID 2624 wrote to memory of 564 2624 WScript.exe 35 PID 1044 wrote to memory of 2584 1044 WScript.exe 36 PID 1044 wrote to memory of 2584 1044 WScript.exe 36 PID 1044 wrote to memory of 2584 1044 WScript.exe 36 PID 1044 wrote to memory of 2584 1044 WScript.exe 36 PID 2584 wrote to memory of 2880 2584 svchcst.exe 37 PID 2584 wrote to memory of 2880 2584 svchcst.exe 37 PID 2584 wrote to memory of 2880 2584 svchcst.exe 37 PID 2584 wrote to memory of 2880 2584 svchcst.exe 37 PID 2880 wrote to memory of 1672 2880 WScript.exe 38 PID 2880 wrote to memory of 1672 2880 WScript.exe 38 PID 2880 wrote to memory of 1672 2880 WScript.exe 38 PID 2880 wrote to memory of 1672 2880 WScript.exe 38 PID 1672 wrote to memory of 1720 1672 svchcst.exe 39 PID 1672 wrote to memory of 1720 1672 svchcst.exe 39 PID 1672 wrote to memory of 1720 1672 svchcst.exe 39 PID 1672 wrote to memory of 1720 1672 svchcst.exe 39 PID 1720 wrote to memory of 2136 1720 WScript.exe 40 PID 1720 wrote to memory of 2136 1720 WScript.exe 40 PID 1720 wrote to memory of 2136 1720 WScript.exe 40 PID 1720 wrote to memory of 2136 1720 WScript.exe 40 PID 2136 wrote to memory of 2476 2136 svchcst.exe 41 PID 2136 wrote to memory of 2476 2136 svchcst.exe 41 PID 2136 wrote to memory of 2476 2136 svchcst.exe 41 PID 2136 wrote to memory of 2476 2136 svchcst.exe 41 PID 2476 wrote to memory of 836 2476 WScript.exe 42 PID 2476 wrote to memory of 836 2476 WScript.exe 42 PID 2476 wrote to memory of 836 2476 WScript.exe 42 PID 2476 wrote to memory of 836 2476 WScript.exe 42 PID 836 wrote to memory of 1512 836 svchcst.exe 43 PID 836 wrote to memory of 1512 836 svchcst.exe 43 PID 836 wrote to memory of 1512 836 svchcst.exe 43 PID 836 wrote to memory of 1512 836 svchcst.exe 43 PID 1512 wrote to memory of 3048 1512 WScript.exe 44 PID 1512 wrote to memory of 3048 1512 WScript.exe 44 PID 1512 wrote to memory of 3048 1512 WScript.exe 44 PID 1512 wrote to memory of 3048 1512 WScript.exe 44 PID 3048 wrote to memory of 1076 3048 svchcst.exe 45 PID 3048 wrote to memory of 1076 3048 svchcst.exe 45 PID 3048 wrote to memory of 1076 3048 svchcst.exe 45 PID 3048 wrote to memory of 1076 3048 svchcst.exe 45 PID 1512 wrote to memory of 2984 1512 WScript.exe 46 PID 1512 wrote to memory of 2984 1512 WScript.exe 46 PID 1512 wrote to memory of 2984 1512 WScript.exe 46 PID 1512 wrote to memory of 2984 1512 WScript.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\d37d6e8eee328ef3925b10fb62706a1137319f8074b259b37cab1823f30b02cb.exe"C:\Users\Admin\AppData\Local\Temp\d37d6e8eee328ef3925b10fb62706a1137319f8074b259b37cab1823f30b02cb.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:564
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"6⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"8⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"9⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"10⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"11⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"12⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"13⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"14⤵
- System Location Discovery: System Language Discovery
PID:1076
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"13⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2984 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"14⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2668 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"15⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2596 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"16⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2420 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"17⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2648 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"18⤵
- System Location Discovery: System Language Discovery
PID:1776
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"17⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2172 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"18⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:316 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"19⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2140 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"20⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2300 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"21⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1544 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"22⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1532 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"23⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2488 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"24⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:580 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"25⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1904 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"26⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2776 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"27⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2412 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"28⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2636 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"29⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1296 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"30⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1316 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"31⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1640 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"32⤵
- System Location Discovery: System Language Discovery
PID:2784
-
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"30⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2444 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"31⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2884
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"31⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2416 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"32⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2852 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"33⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2052 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"34⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:236 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"35⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1608 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"36⤵
- System Location Discovery: System Language Discovery
PID:2144
-
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"34⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:316 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"35⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:624 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"36⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2388 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"37⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1228 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"38⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2720 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"39⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2820 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"40⤵
- System Location Discovery: System Language Discovery
PID:2448
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"18⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2872 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"19⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2296
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92B
MD567b9b3e2ded7086f393ebbc36c5e7bca
SHA1e6299d0450b9a92a18cc23b5704a2b475652c790
SHA25644063c266686263f14cd2a83fee124fb3e61a9171a6aab69709464f49511011d
SHA512826fbc9481f46b1ae3db828a665c55c349023caf563e6e8c17321f5f3af3e4c3914955db6f0eebfc6defe561315435d47310b4d0499ab9c2c85bb61264dedc09
-
Filesize
753B
MD58afe336f88b8ffdad15b546d75299227
SHA1b69ade70b0390e6d2cd7f37579d8947f78227c16
SHA256ebdd3021c21f032f5ea22d31618bae168babebd272a27a3a23c0c55f6887f80c
SHA5123fdde634266872d83c5db40db94f80294d56cb844317788660cea123a92147e57431435aabffee4c6b340c40fb27fda793287d0ede00af41a62975b990a063af
-
Filesize
696B
MD5d9ab21af2046aedc3484d569036c3ef7
SHA1ade5e9eb5b1180a77a2164e61f74beb411cdfb56
SHA25690b8f17e573879b63c512e7c0dd6ff9454d177163e2d95d0090b2ef22ae5ec79
SHA512cb8c202cd3d66ee897982e42257320dfef0a23eb96b9a3189869e9a0ce030d4baaa8c0a6fc5e197d2d19d742b0d7b3f34adb12933192dd6e4b1388433755d1ac
-
Filesize
696B
MD51c0ff223574a58a062d6e26c4b0bb7cd
SHA1b61341ae86f6fd2a2e76592a2fc693479b62f37c
SHA256b9baaa35fb2544dd650a875b31c12ae5393b345528009fc8c438296ac71da48b
SHA512b89b388955e99d95ea0a6be87df42a49823ca71ab65505e19689b8ecc56484246bc36abaac9b7b76874b8c287a33645932573b90786886e0289dff05a6874cc5
-
Filesize
696B
MD51a94fff9bade36e4d067e0fcefb1a8f5
SHA11713c3fc499a56cd97035e44405e0b5e1a0a586b
SHA2561977a5ac15e88252efdd11b9aace6de92383e71132a94273b0e890e92ae91048
SHA51289a7dd6811f9491a14bf49f1cbce3e869107d2e0d410fa3d3c867ce68d573d6f8e6ada98ac3635fc620c96c61676b5cef2563b5fbea14f617c1fa61bce4f3ac7
-
Filesize
696B
MD5aa6578debd9e5045ad239d59ebeb6d15
SHA12a25e6293914cd6ada6649f34506c8bcf35494aa
SHA2567acb095ca5298eb1d1e2ba7f02c1b876d7d28684762a9d180ae2ed8c9e68beb2
SHA512150796c7aad73d1732103e41bd01d3c181b4a0afd37b673d184d5c6c643622704e7692b668e231a319549c2bb378f4d83c7ede82caf81dd15c934b81936e22b2
-
Filesize
696B
MD5067a3458406fce1e0caec803b21a2c58
SHA11277d2a3236100a0758d4f4f279cd02d537e626b
SHA25635c0d5d7757b50c61a708107c8e2ab5df872fdc25516f8003d9d58d3ae5ec9e3
SHA51299918a35f93140231d63a17c97bb9ef66a5744dc044c7e48034c3d2fcc49c3b97fe0d37a32ae6307a7b7e772b8016a6727672d2844b5ed7dcf20c31dd01724e4
-
Filesize
696B
MD502bec440e11bdc76b5de3232abd91f03
SHA12118a1f2249848ea084c7d98709f7ba7906e43a3
SHA2564382e8d6fd98aeb7c574b195019c1687ac6628e8f97485614ad743ae5a0616b0
SHA512f86e900e6bd38151fad12b160c0489823bd18d15609346172ca1f815593e69f9269cb28a0eaea6a588a29d41343f3b9d4c6489cc3c50e2b24a31720de26e0411
-
Filesize
696B
MD566dec81d7f7dc4e36f9d8151fe38056a
SHA1fc169994b2239eb407778d28d35025f7c9a1658e
SHA256a09a3c722b494400011829c5645415020d39c8e6ec90f466fc3109a1ba49db2a
SHA5123e8af1d301ba9228d5afcfaa1e1d3e6f931c5f0ba5e19c74f73b88ddf7c4baa7b24f13533679096f6c94871985de9e47d0f91362ec2ee9132b1e1b772d56fbcc
-
Filesize
696B
MD5774844b08b364b32d1209ef0d962d2fd
SHA1967a30d076aa269a5cef321d36ac1f5c1eb180cb
SHA256c9beda5ae7965cd968f1e6b1e11f17b1b443b8fc6dddb9ad0fe830aafe35ae3a
SHA5122bab1d82f2cf484029722e64dd75516645e3f2dc6028153b65479757a3d33bbe883a1ac97771f1a9dfff1927cbfc58b5460f0c21a3ce01a4eae32b205772c4ec
-
Filesize
696B
MD59d9867376c8284245aea97643987cadf
SHA1fe6a7bd23577feb841e3cbeae6aebd38a742b0a5
SHA256b31c91bdbe14673b004567163ddea094dd6bd903f62c5a57c3b3f79268021fb4
SHA5122dc179cf9f71aae049072f62e06951537e38c6070d79d98aaaa94d2b1b53edd6550f6d1c61a2ffc117ed53791689b59c50826bb506cf22cb01235da522d623a1
-
Filesize
696B
MD5e94e88174ec781f873054a1341dde3c1
SHA11bfcc1fd57262661e3e17db7f582004d481e95d9
SHA25683a3606b4d4b48761b768ff2bd5668a599025f46b5d31b73bd0b014f6f95e225
SHA51210dd4c89ea250920267a33317f693093471b805e33f18b38ffd7e3b9fb12624047f6bca7c82b0a2c83a3d6cead4d289f3da723b249a7ab6a9c40b339977fe7f6
-
Filesize
696B
MD58b412aa0b6687b4da946906a06c460fa
SHA1180bb2d6f0645242e91d23e76043c0301916f7f5
SHA256923ae6b14f6c2bebf34efcf9db8485390ca298cdb952df04bc457df9c45647b3
SHA51273d949f5159a7c976e250d20b975fff6469d5c41b47488d9738a3466dfb372c7977846f6d8fbf676e07715a5fe284ca1597b74f090e0b55301314f71522ac143
-
Filesize
696B
MD51af246ca0660faf0fa7da4b4c9c61316
SHA1c050b0bd311f2e5240cd7e9df583e41b133e9521
SHA2562b84bcefb62d7564e2e7d1be8105a26f798b4c73cca142c054da02262f61ede8
SHA5123fadf6605620aea1f9c9e94d62193fc416af6d5272bc675d399ea1ea96a070b4de69cab61736cea89c744ce3b203f0790d617789d25811a6ca535fc9f6159793
-
Filesize
1.1MB
MD54262ed6da51056e9ec1298840b4df945
SHA1bd2179a458709e9e703d2665a12c70f6762d7674
SHA256beece39b2a1c83929da558b8835a17606601d785420fb29f0a538b33e0df9e7d
SHA5120bb0bfe35c929cd2ee10b50c6043bed81efc3a3114f00a4ff4f6eabe67acad34bcd8b6b8f05b18fbe17fd8e0e80fa684f6b692933f26402befdd8a3667e65853
-
Filesize
1.1MB
MD574fbb9d5c00790d9d88215bdf7cf579a
SHA12d8eaca91b167d240621094eb3562d859bfa1425
SHA25636af319951872bc197d0bb76095971fd999283da22e44e5a5b0d843f508aad85
SHA5120adbfac8dec4e48837fb5e23368dd225f92d8f29a667d3cd13b611f7b0e9140b04f019c3b352fb88bdf21420c1afad8b3d2afa3be673d1cfc500e1be5201a282
-
Filesize
1.1MB
MD5ec8b21acc40b14cb432aa7adae8d4ace
SHA1e996296e3a6904d6d93488cbfc0e5263d908bf9a
SHA25675ae8c6dd9937de02b081e8d707fd128e8d57532a44cb6116d573fa3c6d02cdd
SHA5124144187c96a1795cf70b6b8125e7a1ab5c10be5e6bda4d8434439d6560e2c367dca6cd443b48f75741753b386a2fe1b7961dab8467ee173b0caa3dacee2c6ecb
-
Filesize
1.1MB
MD5b62852ff56a1f538ec798e15835cbe4b
SHA13b10abd9f0dc43c4056bed89e385324c61f70d87
SHA256ffc66ac22416c495772a59dc16b127bc646ea40a0b7bea088d0190b94c0b8907
SHA51276109cc9a128ac3cecac0c4f35a9a995dcc305cbe4565e11ee7042700a6475f6940eabeacb76a7f8baea122ca2275249911f14962fe0a97e8de9d4cc18d6d53f
-
Filesize
1.1MB
MD502222981b02653cdb84c59212ac3f0dd
SHA17a7f750981b47e9cbca4c45afce74c9061595c19
SHA2560503a1995a2806f17ba97b505bcef5d535630570785312289a2f2feea14e466e
SHA51254146d008399d69e433420d7738ce2642efdfb2d7a6f4a482428e34e0ac4f06043a82fd09e6ca0ee67aa83d715135f4d198cdad5b56c838506b2a06ab5f4a92a
-
Filesize
1.1MB
MD5b1a7f35fe3ff7a5286d93cade38ad25e
SHA174acac14ec50fab250463d2f8f2515bb93501412
SHA25687d8ca8bdb69ffbd599f589c9b2fb9d501eebd4ba39bb658b15132dae9325501
SHA51213c4ab73234f29c01170c111e4767d992a1bd70e5c5d13b5c65a6f9cd74b1f495ef2227831d77c38b0ff84494879feb9e1a635a59bba125238f29d5c06bdbb6b
-
Filesize
1.1MB
MD51505122e699a384ce31a3aac5af352fc
SHA1e7bfe4ed2c57270cd947af5ea9ea0d4ffcce4db7
SHA256d4d0632f4967f1b33fe986d42afe7d679a38e2670bee3b6d6b9549cf0db04f2d
SHA51282b43cd2a1112191187b165d8b639d80388db8822d2b3b672ed76c0bf55122ba6a98e4866fa09209c2486a3e22fea9c534db90499bca9972cf2281bd46f85dab