Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04-09-2024 10:49
Static task
static1
Behavioral task
behavioral1
Sample
b8022e8002a8e01a6364fdcc6d53275b6edf3d196e36f0b4c9645de2570cfd48.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b8022e8002a8e01a6364fdcc6d53275b6edf3d196e36f0b4c9645de2570cfd48.exe
Resource
win10v2004-20240802-en
General
-
Target
b8022e8002a8e01a6364fdcc6d53275b6edf3d196e36f0b4c9645de2570cfd48.exe
-
Size
1.5MB
-
MD5
bd6420aaf066a5b4533598417866bc67
-
SHA1
cf56376da61f4f34034fa4cc525e708052a5ecd3
-
SHA256
b8022e8002a8e01a6364fdcc6d53275b6edf3d196e36f0b4c9645de2570cfd48
-
SHA512
d9b394fc25949d552b64061810cd4452d24ee473c5755bada25b1db5ad35652a57b545c53c5e1dea88feac376b86e838a6b87886e9ad50e1f582eb2b985cda78
-
SSDEEP
24576:zqDEvCTbMWu7rQYlBQcBiT6rprG8auS2rwF3q65FE8wvsO5BaH3:zTvC/MTQYxsWR7auSY65G8wDKH
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\antholite.vbs antholite.exe -
Executes dropped EXE 64 IoCs
pid Process 2760 antholite.exe 2844 antholite.exe 2648 antholite.exe 2656 antholite.exe 588 antholite.exe 2968 antholite.exe 3036 antholite.exe 1224 antholite.exe 2592 antholite.exe 2824 antholite.exe 1048 antholite.exe 656 antholite.exe 2220 antholite.exe 2920 antholite.exe 1080 antholite.exe 944 antholite.exe 1868 antholite.exe 2932 antholite.exe 2136 antholite.exe 1540 antholite.exe 1736 antholite.exe 2024 antholite.exe 2484 antholite.exe 2444 antholite.exe 2236 antholite.exe 2728 antholite.exe 2692 antholite.exe 2384 antholite.exe 2672 antholite.exe 2608 antholite.exe 3048 antholite.exe 2864 antholite.exe 3024 antholite.exe 712 antholite.exe 976 antholite.exe 1700 antholite.exe 2812 antholite.exe 1756 antholite.exe 2852 antholite.exe 1928 antholite.exe 1948 antholite.exe 2128 antholite.exe 1052 antholite.exe 876 antholite.exe 2392 antholite.exe 1772 antholite.exe 1712 antholite.exe 2352 antholite.exe 1252 antholite.exe 992 antholite.exe 2440 antholite.exe 1588 antholite.exe 2748 antholite.exe 2664 antholite.exe 2556 antholite.exe 2612 antholite.exe 2040 antholite.exe 2956 antholite.exe 2092 antholite.exe 1892 antholite.exe 2420 antholite.exe 1860 antholite.exe 380 antholite.exe 2916 antholite.exe -
Loads dropped DLL 1 IoCs
pid Process 2164 b8022e8002a8e01a6364fdcc6d53275b6edf3d196e36f0b4c9645de2570cfd48.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0009000000015d5d-12.dat autoit_exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b8022e8002a8e01a6364fdcc6d53275b6edf3d196e36f0b4c9645de2570cfd48.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antholite.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2164 b8022e8002a8e01a6364fdcc6d53275b6edf3d196e36f0b4c9645de2570cfd48.exe 2164 b8022e8002a8e01a6364fdcc6d53275b6edf3d196e36f0b4c9645de2570cfd48.exe 2760 antholite.exe 2760 antholite.exe 2844 antholite.exe 2844 antholite.exe 2648 antholite.exe 2648 antholite.exe 2656 antholite.exe 2656 antholite.exe 588 antholite.exe 588 antholite.exe 2968 antholite.exe 2968 antholite.exe 3036 antholite.exe 3036 antholite.exe 1224 antholite.exe 1224 antholite.exe 2592 antholite.exe 2592 antholite.exe 2824 antholite.exe 2824 antholite.exe 1048 antholite.exe 1048 antholite.exe 656 antholite.exe 656 antholite.exe 2220 antholite.exe 2220 antholite.exe 2920 antholite.exe 2920 antholite.exe 1080 antholite.exe 1080 antholite.exe 944 antholite.exe 944 antholite.exe 1868 antholite.exe 1868 antholite.exe 2932 antholite.exe 2932 antholite.exe 2136 antholite.exe 2136 antholite.exe 1540 antholite.exe 1540 antholite.exe 1736 antholite.exe 1736 antholite.exe 2024 antholite.exe 2024 antholite.exe 2484 antholite.exe 2484 antholite.exe 2236 antholite.exe 2236 antholite.exe 2728 antholite.exe 2728 antholite.exe 2692 antholite.exe 2692 antholite.exe 2384 antholite.exe 2384 antholite.exe 2672 antholite.exe 2672 antholite.exe 2608 antholite.exe 2608 antholite.exe 3048 antholite.exe 3048 antholite.exe 2864 antholite.exe 2864 antholite.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 2164 b8022e8002a8e01a6364fdcc6d53275b6edf3d196e36f0b4c9645de2570cfd48.exe 2164 b8022e8002a8e01a6364fdcc6d53275b6edf3d196e36f0b4c9645de2570cfd48.exe 2760 antholite.exe 2760 antholite.exe 2844 antholite.exe 2844 antholite.exe 2648 antholite.exe 2648 antholite.exe 2656 antholite.exe 2656 antholite.exe 588 antholite.exe 588 antholite.exe 2968 antholite.exe 2968 antholite.exe 3036 antholite.exe 3036 antholite.exe 1224 antholite.exe 1224 antholite.exe 2592 antholite.exe 2592 antholite.exe 2824 antholite.exe 2824 antholite.exe 1048 antholite.exe 1048 antholite.exe 656 antholite.exe 656 antholite.exe 2220 antholite.exe 2220 antholite.exe 2920 antholite.exe 2920 antholite.exe 1080 antholite.exe 1080 antholite.exe 944 antholite.exe 944 antholite.exe 1868 antholite.exe 1868 antholite.exe 2932 antholite.exe 2932 antholite.exe 2136 antholite.exe 2136 antholite.exe 1540 antholite.exe 1540 antholite.exe 1736 antholite.exe 1736 antholite.exe 2024 antholite.exe 2024 antholite.exe 2484 antholite.exe 2484 antholite.exe 2236 antholite.exe 2236 antholite.exe 2728 antholite.exe 2728 antholite.exe 2692 antholite.exe 2692 antholite.exe 2384 antholite.exe 2384 antholite.exe 2672 antholite.exe 2672 antholite.exe 2608 antholite.exe 2608 antholite.exe 3048 antholite.exe 3048 antholite.exe 2864 antholite.exe 2864 antholite.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2164 wrote to memory of 2760 2164 b8022e8002a8e01a6364fdcc6d53275b6edf3d196e36f0b4c9645de2570cfd48.exe 31 PID 2164 wrote to memory of 2760 2164 b8022e8002a8e01a6364fdcc6d53275b6edf3d196e36f0b4c9645de2570cfd48.exe 31 PID 2164 wrote to memory of 2760 2164 b8022e8002a8e01a6364fdcc6d53275b6edf3d196e36f0b4c9645de2570cfd48.exe 31 PID 2164 wrote to memory of 2760 2164 b8022e8002a8e01a6364fdcc6d53275b6edf3d196e36f0b4c9645de2570cfd48.exe 31 PID 2760 wrote to memory of 2844 2760 antholite.exe 32 PID 2760 wrote to memory of 2844 2760 antholite.exe 32 PID 2760 wrote to memory of 2844 2760 antholite.exe 32 PID 2760 wrote to memory of 2844 2760 antholite.exe 32 PID 2844 wrote to memory of 2648 2844 antholite.exe 33 PID 2844 wrote to memory of 2648 2844 antholite.exe 33 PID 2844 wrote to memory of 2648 2844 antholite.exe 33 PID 2844 wrote to memory of 2648 2844 antholite.exe 33 PID 2648 wrote to memory of 2656 2648 antholite.exe 34 PID 2648 wrote to memory of 2656 2648 antholite.exe 34 PID 2648 wrote to memory of 2656 2648 antholite.exe 34 PID 2648 wrote to memory of 2656 2648 antholite.exe 34 PID 2656 wrote to memory of 588 2656 antholite.exe 35 PID 2656 wrote to memory of 588 2656 antholite.exe 35 PID 2656 wrote to memory of 588 2656 antholite.exe 35 PID 2656 wrote to memory of 588 2656 antholite.exe 35 PID 588 wrote to memory of 2968 588 antholite.exe 36 PID 588 wrote to memory of 2968 588 antholite.exe 36 PID 588 wrote to memory of 2968 588 antholite.exe 36 PID 588 wrote to memory of 2968 588 antholite.exe 36 PID 2968 wrote to memory of 3036 2968 antholite.exe 37 PID 2968 wrote to memory of 3036 2968 antholite.exe 37 PID 2968 wrote to memory of 3036 2968 antholite.exe 37 PID 2968 wrote to memory of 3036 2968 antholite.exe 37 PID 3036 wrote to memory of 1224 3036 antholite.exe 38 PID 3036 wrote to memory of 1224 3036 antholite.exe 38 PID 3036 wrote to memory of 1224 3036 antholite.exe 38 PID 3036 wrote to memory of 1224 3036 antholite.exe 38 PID 1224 wrote to memory of 2592 1224 antholite.exe 39 PID 1224 wrote to memory of 2592 1224 antholite.exe 39 PID 1224 wrote to memory of 2592 1224 antholite.exe 39 PID 1224 wrote to memory of 2592 1224 antholite.exe 39 PID 2592 wrote to memory of 2824 2592 antholite.exe 40 PID 2592 wrote to memory of 2824 2592 antholite.exe 40 PID 2592 wrote to memory of 2824 2592 antholite.exe 40 PID 2592 wrote to memory of 2824 2592 antholite.exe 40 PID 2824 wrote to memory of 1048 2824 antholite.exe 41 PID 2824 wrote to memory of 1048 2824 antholite.exe 41 PID 2824 wrote to memory of 1048 2824 antholite.exe 41 PID 2824 wrote to memory of 1048 2824 antholite.exe 41 PID 1048 wrote to memory of 656 1048 antholite.exe 42 PID 1048 wrote to memory of 656 1048 antholite.exe 42 PID 1048 wrote to memory of 656 1048 antholite.exe 42 PID 1048 wrote to memory of 656 1048 antholite.exe 42 PID 656 wrote to memory of 2220 656 antholite.exe 43 PID 656 wrote to memory of 2220 656 antholite.exe 43 PID 656 wrote to memory of 2220 656 antholite.exe 43 PID 656 wrote to memory of 2220 656 antholite.exe 43 PID 2220 wrote to memory of 2920 2220 antholite.exe 44 PID 2220 wrote to memory of 2920 2220 antholite.exe 44 PID 2220 wrote to memory of 2920 2220 antholite.exe 44 PID 2220 wrote to memory of 2920 2220 antholite.exe 44 PID 2920 wrote to memory of 1080 2920 antholite.exe 45 PID 2920 wrote to memory of 1080 2920 antholite.exe 45 PID 2920 wrote to memory of 1080 2920 antholite.exe 45 PID 2920 wrote to memory of 1080 2920 antholite.exe 45 PID 1080 wrote to memory of 944 1080 antholite.exe 46 PID 1080 wrote to memory of 944 1080 antholite.exe 46 PID 1080 wrote to memory of 944 1080 antholite.exe 46 PID 1080 wrote to memory of 944 1080 antholite.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\b8022e8002a8e01a6364fdcc6d53275b6edf3d196e36f0b4c9645de2570cfd48.exe"C:\Users\Admin\AppData\Local\Temp\b8022e8002a8e01a6364fdcc6d53275b6edf3d196e36f0b4c9645de2570cfd48.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Temp\b8022e8002a8e01a6364fdcc6d53275b6edf3d196e36f0b4c9645de2570cfd48.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"5⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"6⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:588 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"9⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"10⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"11⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"12⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"13⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:656 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"14⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"15⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"16⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"17⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:944 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"18⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1868 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"19⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2932 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"20⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2136 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"21⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1540 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"22⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1736 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"23⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2024 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"24⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2484 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"25⤵
- Executes dropped EXE
PID:2444 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"26⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2236 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"27⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2728 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"28⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2692 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"29⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2384 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"30⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2672 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"31⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2608 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"32⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3048 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"33⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2864 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"34⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3024 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"35⤵
- Executes dropped EXE
PID:712 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"36⤵
- Executes dropped EXE
PID:976 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"37⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1700 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"38⤵
- Executes dropped EXE
PID:2812 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"39⤵
- Executes dropped EXE
PID:1756 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"40⤵
- Executes dropped EXE
PID:2852 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"41⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1928 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"42⤵
- Executes dropped EXE
PID:1948 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"43⤵
- Executes dropped EXE
PID:2128 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"44⤵
- Executes dropped EXE
PID:1052 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"45⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:876 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"46⤵
- Executes dropped EXE
PID:2392 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"47⤵
- Executes dropped EXE
PID:1772 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"48⤵
- Executes dropped EXE
PID:1712 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"49⤵
- Executes dropped EXE
PID:2352 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"50⤵
- Executes dropped EXE
PID:1252 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"51⤵
- Executes dropped EXE
PID:992 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"52⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2440 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"53⤵
- Executes dropped EXE
PID:1588 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"54⤵
- Executes dropped EXE
PID:2748 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"55⤵
- Executes dropped EXE
PID:2664 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"56⤵
- Executes dropped EXE
PID:2556 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"57⤵
- Executes dropped EXE
PID:2612 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"58⤵
- Executes dropped EXE
PID:2040 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"59⤵
- Executes dropped EXE
PID:2956 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"60⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2092 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"61⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1892 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"62⤵
- Executes dropped EXE
PID:2420 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"63⤵
- Executes dropped EXE
PID:1860 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"64⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:380 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"65⤵
- Executes dropped EXE
PID:2916 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"66⤵PID:1984
-
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"67⤵
- System Location Discovery: System Language Discovery
PID:1568 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"68⤵
- System Location Discovery: System Language Discovery
PID:2480 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"69⤵
- System Location Discovery: System Language Discovery
PID:2476 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"70⤵
- System Location Discovery: System Language Discovery
PID:1816 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"71⤵PID:1716
-
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"72⤵
- System Location Discovery: System Language Discovery
PID:2944 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"73⤵PID:572
-
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"74⤵PID:1748
-
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"75⤵
- System Location Discovery: System Language Discovery
PID:2640 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"76⤵
- System Location Discovery: System Language Discovery
PID:2124 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"77⤵PID:2900
-
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"78⤵PID:2580
-
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"79⤵PID:2144
-
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"80⤵PID:2840
-
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"81⤵PID:2988
-
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"82⤵PID:2348
-
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"83⤵PID:664
-
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"84⤵PID:1572
-
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"85⤵PID:2836
-
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"86⤵PID:2404
-
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"87⤵
- System Location Discovery: System Language Discovery
PID:408 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"88⤵PID:1780
-
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"89⤵PID:1260
-
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"90⤵
- System Location Discovery: System Language Discovery
PID:2060 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"91⤵
- System Location Discovery: System Language Discovery
PID:2356 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"92⤵PID:1936
-
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"93⤵PID:2016
-
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"94⤵PID:1148
-
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"95⤵PID:2400
-
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"96⤵
- System Location Discovery: System Language Discovery
PID:2784 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"97⤵PID:2696
-
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"98⤵PID:2332
-
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"99⤵
- System Location Discovery: System Language Discovery
PID:3012 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"100⤵
- System Location Discovery: System Language Discovery
PID:1308 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"101⤵PID:2100
-
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"102⤵PID:1400
-
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"103⤵PID:1940
-
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"104⤵PID:1844
-
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"105⤵PID:444
-
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"106⤵PID:1000
-
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"107⤵PID:1696
-
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"108⤵
- System Location Discovery: System Language Discovery
PID:836 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"109⤵PID:3056
-
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"110⤵PID:2456
-
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"111⤵
- System Location Discovery: System Language Discovery
PID:2684 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"112⤵PID:2908
-
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"113⤵
- System Location Discovery: System Language Discovery
PID:2544 -
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"114⤵PID:1648
-
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"115⤵PID:1324
-
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"116⤵PID:1796
-
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"117⤵PID:1636
-
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"118⤵PID:2000
-
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"119⤵PID:580
-
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"120⤵PID:2660
-
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"121⤵PID:1672
-
C:\Users\Admin\AppData\Local\Cocles\antholite.exe"C:\Users\Admin\AppData\Local\Cocles\antholite.exe"122⤵PID:1352
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-