Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04-09-2024 02:10
Static task
static1
Behavioral task
behavioral1
Sample
b8022e8002a8e01a6364fdcc6d53275b6edf3d196e36f0b4c9645de2570cfd48.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b8022e8002a8e01a6364fdcc6d53275b6edf3d196e36f0b4c9645de2570cfd48.exe
Resource
win10v2004-20240802-en
General
-
Target
b8022e8002a8e01a6364fdcc6d53275b6edf3d196e36f0b4c9645de2570cfd48.exe
-
Size
1.5MB
-
MD5
bd6420aaf066a5b4533598417866bc67
-
SHA1
cf56376da61f4f34034fa4cc525e708052a5ecd3
-
SHA256
b8022e8002a8e01a6364fdcc6d53275b6edf3d196e36f0b4c9645de2570cfd48
-
SHA512
d9b394fc25949d552b64061810cd4452d24ee473c5755bada25b1db5ad35652a57b545c53c5e1dea88feac376b86e838a6b87886e9ad50e1f582eb2b985cda78
-
SSDEEP
24576:zqDEvCTbMWu7rQYlBQcBiT6rprG8auS2rwF3q65FE8wvsO5BaH3:zTvC/MTQYxsWR7auSY65G8wDKH
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\antholite.vbs antholite.exe -
Executes dropped EXE 64 IoCs
pid Process 2824 antholite.exe 2780 antholite.exe 2552 antholite.exe 3060 antholite.exe 1112 antholite.exe 2916 antholite.exe 1900 antholite.exe 532 antholite.exe 2036 antholite.exe 2648 antholite.exe 604 antholite.exe 2996 antholite.exe 2192 antholite.exe 1844 antholite.exe 2364 antholite.exe 1616 antholite.exe 2808 antholite.exe 1372 antholite.exe 1736 antholite.exe 3040 antholite.exe 2148 antholite.exe 1520 antholite.exe 816 antholite.exe 1704 antholite.exe 2788 antholite.exe 2836 antholite.exe 2828 antholite.exe 2624 antholite.exe 2248 antholite.exe 864 antholite.exe 2948 antholite.exe 2056 antholite.exe 2440 antholite.exe 684 antholite.exe 2032 antholite.exe 1196 antholite.exe 280 antholite.exe 1632 antholite.exe 2492 antholite.exe 1252 antholite.exe 1780 antholite.exe 1784 antholite.exe 2424 antholite.exe 2180 antholite.exe 640 antholite.exe 2380 antholite.exe 3024 antholite.exe 2324 antholite.exe 1000 antholite.exe 1576 antholite.exe 2768 antholite.exe 2852 antholite.exe 2732 antholite.exe 2680 antholite.exe 236 antholite.exe 2940 antholite.exe 2952 antholite.exe 1800 antholite.exe 1236 antholite.exe 1100 antholite.exe 1996 antholite.exe 2376 antholite.exe 3008 antholite.exe 2228 antholite.exe -
Loads dropped DLL 1 IoCs
pid Process 2664 b8022e8002a8e01a6364fdcc6d53275b6edf3d196e36f0b4c9645de2570cfd48.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0007000000016cc8-12.dat autoit_exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2664 b8022e8002a8e01a6364fdcc6d53275b6edf3d196e36f0b4c9645de2570cfd48.exe 2664 b8022e8002a8e01a6364fdcc6d53275b6edf3d196e36f0b4c9645de2570cfd48.exe 2824 antholite.exe 2824 antholite.exe 2780 antholite.exe 2780 antholite.exe 2552 antholite.exe 2552 antholite.exe 3060 antholite.exe 3060 antholite.exe 1112 antholite.exe 1112 antholite.exe 2916 antholite.exe 2916 antholite.exe 1900 antholite.exe 1900 antholite.exe 532 antholite.exe 532 antholite.exe 2036 antholite.exe 2036 antholite.exe 2648 antholite.exe 2648 antholite.exe 604 antholite.exe 604 antholite.exe 2996 antholite.exe 2996 antholite.exe 2192 antholite.exe 2192 antholite.exe 1844 antholite.exe 1844 antholite.exe 2364 antholite.exe 2364 antholite.exe 1616 antholite.exe 1616 antholite.exe 2808 antholite.exe 2808 antholite.exe 1372 antholite.exe 1372 antholite.exe 1736 antholite.exe 1736 antholite.exe 3040 antholite.exe 3040 antholite.exe 2148 antholite.exe 2148 antholite.exe 1520 antholite.exe 1520 antholite.exe 816 antholite.exe 816 antholite.exe 1704 antholite.exe 1704 antholite.exe 2788 antholite.exe 2788 antholite.exe 2836 antholite.exe 2836 antholite.exe 2828 antholite.exe 2828 antholite.exe 2624 antholite.exe 2624 antholite.exe 2248 antholite.exe 2248 antholite.exe 864 antholite.exe 864 antholite.exe 2948 antholite.exe 2948 antholite.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 2664 b8022e8002a8e01a6364fdcc6d53275b6edf3d196e36f0b4c9645de2570cfd48.exe 2664 b8022e8002a8e01a6364fdcc6d53275b6edf3d196e36f0b4c9645de2570cfd48.exe 2824 antholite.exe 2824 antholite.exe 2780 antholite.exe 2780 antholite.exe 2552 antholite.exe 2552 antholite.exe 3060 antholite.exe 3060 antholite.exe 1112 antholite.exe 1112 antholite.exe 2916 antholite.exe 2916 antholite.exe 1900 antholite.exe 1900 antholite.exe 532 antholite.exe 532 antholite.exe 2036 antholite.exe 2036 antholite.exe 2648 antholite.exe 2648 antholite.exe 604 antholite.exe 604 antholite.exe 2996 antholite.exe 2996 antholite.exe 2192 antholite.exe 2192 antholite.exe 1844 antholite.exe 1844 antholite.exe 2364 antholite.exe 2364 antholite.exe 1616 antholite.exe 1616 antholite.exe 2808 antholite.exe 2808 antholite.exe 1372 antholite.exe 1372 antholite.exe 1736 antholite.exe 1736 antholite.exe 3040 antholite.exe 3040 antholite.exe 2148 antholite.exe 2148 antholite.exe 1520 antholite.exe 1520 antholite.exe 816 antholite.exe 816 antholite.exe 1704 antholite.exe 1704 antholite.exe 2788 antholite.exe 2788 antholite.exe 2836 antholite.exe 2836 antholite.exe 2828 antholite.exe 2828 antholite.exe 2624 antholite.exe 2624 antholite.exe 2248 antholite.exe 2248 antholite.exe 864 antholite.exe 864 antholite.exe 2948 antholite.exe 2948 antholite.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2664 wrote to memory of 2824 2664 b8022e8002a8e01a6364fdcc6d53275b6edf3d196e36f0b4c9645de2570cfd48.exe 31 PID 2664 wrote to memory of 2824 2664 b8022e8002a8e01a6364fdcc6d53275b6edf3d196e36f0b4c9645de2570cfd48.exe 31 PID 2664 wrote to memory of 2824 2664 b8022e8002a8e01a6364fdcc6d53275b6edf3d196e36f0b4c9645de2570cfd48.exe 31 PID 2664 wrote to memory of 2824 2664 b8022e8002a8e01a6364fdcc6d53275b6edf3d196e36f0b4c9645de2570cfd48.exe 31 PID 2824 wrote to memory of 2780 2824 antholite.exe 32 PID 2824 wrote to memory of 2780 2824 antholite.exe 32 PID 2824 wrote to memory of 2780 2824 antholite.exe 32 PID 2824 wrote to memory of 2780 2824 antholite.exe 32 PID 2780 wrote to memory of 2552 2780 antholite.exe 33 PID 2780 wrote to memory of 2552 2780 antholite.exe 33 PID 2780 wrote to memory of 2552 2780 antholite.exe 33 PID 2780 wrote to memory of 2552 2780 antholite.exe 33 PID 2552 wrote to memory of 3060 2552 antholite.exe 34 PID 2552 wrote to memory of 3060 2552 antholite.exe 34 PID 2552 wrote to memory of 3060 2552 antholite.exe 34 PID 2552 wrote to memory of 3060 2552 antholite.exe 34 PID 3060 wrote to memory of 1112 3060 antholite.exe 35 PID 3060 wrote to memory of 1112 3060 antholite.exe 35 PID 3060 wrote to memory of 1112 3060 antholite.exe 35 PID 3060 wrote to memory of 1112 3060 antholite.exe 35 PID 1112 wrote to memory of 2916 1112 antholite.exe 36 PID 1112 wrote to memory of 2916 1112 antholite.exe 36 PID 1112 wrote to memory of 2916 1112 antholite.exe 36 PID 1112 wrote to memory of 2916 1112 antholite.exe 36 PID 2916 wrote to memory of 1900 2916 antholite.exe 37 PID 2916 wrote to memory of 1900 2916 antholite.exe 37 PID 2916 wrote to memory of 1900 2916 antholite.exe 37 PID 2916 wrote to memory of 1900 2916 antholite.exe 37 PID 1900 wrote to memory of 532 1900 antholite.exe 38 PID 1900 wrote to memory of 532 1900 antholite.exe 38 PID 1900 wrote to memory of 532 1900 antholite.exe 38 PID 1900 wrote to memory of 532 1900 antholite.exe 38 PID 532 wrote to memory of 2036 532 antholite.exe 39 PID 532 wrote to memory of 2036 532 antholite.exe 39 PID 532 wrote to memory of 2036 532 antholite.exe 39 PID 532 wrote to memory of 2036 532 antholite.exe 39 PID 2036 wrote to memory of 2648 2036 antholite.exe 40 PID 2036 wrote to memory of 2648 2036 antholite.exe 40 PID 2036 wrote to memory of 2648 2036 antholite.exe 40 PID 2036 wrote to memory of 2648 2036 antholite.exe 40 PID 2648 wrote to memory of 604 2648 antholite.exe 41 PID 2648 wrote to memory of 604 2648 antholite.exe 41 PID 2648 wrote to memory of 604 2648 antholite.exe 41 PID 2648 wrote to memory of 604 2648 antholite.exe 41 PID 604 wrote to memory of 2996 604 antholite.exe 42 PID 604 wrote to memory of 2996 604 antholite.exe 42 PID 604 wrote to memory of 2996 604 antholite.exe 42 PID 604 wrote to memory of 2996 604 antholite.exe 42 PID 2996 wrote to memory of 2192 2996 antholite.exe 43 PID 2996 wrote to memory of 2192 2996 antholite.exe 43 PID 2996 wrote to memory of 2192 2996 antholite.exe 43 PID 2996 wrote to memory of 2192 2996 antholite.exe 43 PID 2192 wrote to memory of 1844 2192 antholite.exe 44 PID 2192 wrote to memory of 1844 2192 antholite.exe 44 PID 2192 wrote to memory of 1844 2192 antholite.exe 44 PID 2192 wrote to memory of 1844 2192 antholite.exe 44 PID 1844 wrote to memory of 2364 1844 antholite.exe 45 PID 1844 wrote to memory of 2364 1844 antholite.exe 45 PID 1844 wrote to memory of 2364 1844 antholite.exe 45 PID 1844 wrote to memory of 2364 1844 antholite.exe 45 PID 2364 wrote to memory of 1616 2364 antholite.exe 46 PID 2364 wrote to memory of 1616 2364 antholite.exe 46 PID 2364 wrote to memory of 1616 2364 antholite.exe 46 PID 2364 wrote to memory of 1616 2364 antholite.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\b8022e8002a8e01a6364fdcc6d53275b6edf3d196e36f0b4c9645de2570cfd48.exe"C:\Users\Admin\AppData\Local\Temp\b8022e8002a8e01a6364fdcc6d53275b6edf3d196e36f0b4c9645de2570cfd48.exe"1⤵
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Temp\b8022e8002a8e01a6364fdcc6d53275b6edf3d196e36f0b4c9645de2570cfd48.exe"2⤵
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"3⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"4⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"5⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"6⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"7⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"8⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"9⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:532 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"10⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"11⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"12⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:604 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"13⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"14⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"15⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"16⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"17⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1616 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"18⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2808 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"19⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1372 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"20⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1736 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"21⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3040 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"22⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2148 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"23⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1520 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"24⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:816 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"25⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1704 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"26⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2788 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"27⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2836 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"28⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2828 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"29⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2624 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"30⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2248 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"31⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:864 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"32⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2948 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"33⤵
- Executes dropped EXE
PID:2056 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"34⤵
- Executes dropped EXE
PID:2440 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"35⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:684 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"36⤵
- Executes dropped EXE
PID:2032 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"37⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1196 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"38⤵
- Executes dropped EXE
PID:280 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"39⤵
- Executes dropped EXE
PID:1632 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"40⤵
- Executes dropped EXE
PID:2492 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"41⤵
- Executes dropped EXE
PID:1252 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"42⤵
- Executes dropped EXE
PID:1780 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"43⤵
- Executes dropped EXE
PID:1784 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"44⤵
- Executes dropped EXE
PID:2424 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"45⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2180 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"46⤵
- Executes dropped EXE
PID:640 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"47⤵
- Executes dropped EXE
PID:2380 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"48⤵
- Executes dropped EXE
PID:3024 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"49⤵
- Executes dropped EXE
PID:2324 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"50⤵
- Executes dropped EXE
PID:1000 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"51⤵
- Executes dropped EXE
PID:1576 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"52⤵
- Executes dropped EXE
PID:2768 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"53⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2852 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"54⤵
- Executes dropped EXE
PID:2732 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"55⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2680 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"56⤵
- Executes dropped EXE
PID:236 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"57⤵
- Executes dropped EXE
PID:2940 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"58⤵
- Executes dropped EXE
PID:2952 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"59⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1800 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"60⤵
- Executes dropped EXE
PID:1236 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"61⤵
- Executes dropped EXE
PID:1100 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"62⤵
- Executes dropped EXE
PID:1996 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"63⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2376 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"64⤵
- Executes dropped EXE
PID:3008 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"65⤵
- Executes dropped EXE
PID:2228 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"66⤵PID:2500
-
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"67⤵
- System Location Discovery: System Language Discovery
PID:1820 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"68⤵
- System Location Discovery: System Language Discovery
PID:2988 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"69⤵PID:1744
-
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"70⤵
- System Location Discovery: System Language Discovery
PID:2088 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"71⤵PID:2100
-
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"72⤵PID:2452
-
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"73⤵PID:2856
-
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"74⤵PID:2764
-
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"75⤵PID:2260
-
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"76⤵PID:2724
-
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"77⤵PID:1812
-
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"78⤵PID:1068
-
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"79⤵PID:2144
-
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"80⤵PID:2124
-
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"81⤵PID:2020
-
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"82⤵PID:1064
-
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"83⤵
- System Location Discovery: System Language Discovery
PID:2372 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"84⤵PID:2212
-
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"85⤵PID:1760
-
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"86⤵
- System Location Discovery: System Language Discovery
PID:836 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"87⤵PID:2160
-
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"88⤵PID:1560
-
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"89⤵PID:2656
-
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"90⤵
- System Location Discovery: System Language Discovery
PID:1768 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"91⤵PID:712
-
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"92⤵PID:2704
-
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"93⤵PID:2564
-
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"94⤵PID:1220
-
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"95⤵PID:2576
-
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"96⤵PID:1292
-
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"97⤵PID:1924
-
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"98⤵
- System Location Discovery: System Language Discovery
PID:1648 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"99⤵
- System Location Discovery: System Language Discovery
PID:2868 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"100⤵PID:596
-
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"101⤵
- System Location Discovery: System Language Discovery
PID:2416 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"102⤵PID:1628
-
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"103⤵
- System Location Discovery: System Language Discovery
PID:956 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"104⤵PID:2740
-
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"105⤵PID:1920
-
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"106⤵PID:2096
-
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"107⤵PID:2340
-
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"108⤵PID:2092
-
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"109⤵
- System Location Discovery: System Language Discovery
PID:1596 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"110⤵PID:2848
-
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"111⤵
- System Location Discovery: System Language Discovery
PID:1080 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"112⤵PID:2892
-
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"113⤵PID:2736
-
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"114⤵PID:1612
-
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"115⤵
- System Location Discovery: System Language Discovery
PID:1052 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"116⤵PID:1676
-
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"117⤵
- System Location Discovery: System Language Discovery
PID:2384 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"118⤵PID:1160
-
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"119⤵
- System Location Discovery: System Language Discovery
PID:1020 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"120⤵PID:2060
-
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"121⤵
- System Location Discovery: System Language Discovery
PID:2524 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"122⤵PID:1888
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-