Analysis
-
max time kernel
119s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05/09/2024, 03:35
Behavioral task
behavioral1
Sample
d6ec3fabd45307dae7c308d992b2dd20N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d6ec3fabd45307dae7c308d992b2dd20N.exe
Resource
win10v2004-20240802-en
General
-
Target
d6ec3fabd45307dae7c308d992b2dd20N.exe
-
Size
2.9MB
-
MD5
d6ec3fabd45307dae7c308d992b2dd20
-
SHA1
72b86e54b784f9fde943f83278677dfe2221399c
-
SHA256
684f1249ded24468d83ecd163e94fce5d14ec10c478211894d4e5f5c54b047a3
-
SHA512
b67894ab3cf9f878f2e7769b75eb0b27e2a4d0fa7108482bff934b9c596317832259141b08fa642608a5a86653817e834f37f51623839660e4c78710e77b1484
-
SSDEEP
24576:7v97AXmZZcVKfIxTiEVc847flVC6faaQDbGV6eH81k6IbGD2JTu0GoZQDbGV6eHo:7v97AXmw4gxeOw46fUbNecCCFbNecx
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload 3 IoCs
resource yara_rule behavioral1/files/0x00080000000190e0-86.dat warzonerat behavioral1/files/0x000700000001903b-163.dat warzonerat behavioral1/files/0x000800000001937b-185.dat warzonerat -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe -
Drops startup file 17 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe -
Executes dropped EXE 42 IoCs
pid Process 1352 explorer.exe 1708 explorer.exe 1336 explorer.exe 1780 spoolsv.exe 2524 spoolsv.exe 1584 spoolsv.exe 1616 spoolsv.exe 2872 spoolsv.exe 2704 spoolsv.exe 2156 spoolsv.exe 1108 spoolsv.exe 1612 spoolsv.exe 1936 spoolsv.exe 2488 spoolsv.exe 1064 spoolsv.exe 1816 spoolsv.exe 1632 spoolsv.exe 832 spoolsv.exe 2164 spoolsv.exe 2152 spoolsv.exe 2720 spoolsv.exe 2356 spoolsv.exe 352 spoolsv.exe 1352 spoolsv.exe 1828 spoolsv.exe 2700 spoolsv.exe 1492 spoolsv.exe 1808 spoolsv.exe 2148 spoolsv.exe 2916 spoolsv.exe 2548 spoolsv.exe 2776 spoolsv.exe 2532 spoolsv.exe 2808 spoolsv.exe 1576 spoolsv.exe 1748 spoolsv.exe 1948 spoolsv.exe 1096 spoolsv.exe 2828 spoolsv.exe 2456 spoolsv.exe 1808 spoolsv.exe 2060 spoolsv.exe -
Loads dropped DLL 61 IoCs
pid Process 1600 d6ec3fabd45307dae7c308d992b2dd20N.exe 1600 d6ec3fabd45307dae7c308d992b2dd20N.exe 1336 explorer.exe 1336 explorer.exe 1780 spoolsv.exe 1336 explorer.exe 1336 explorer.exe 1584 spoolsv.exe 1336 explorer.exe 1336 explorer.exe 2872 spoolsv.exe 1336 explorer.exe 1336 explorer.exe 2156 spoolsv.exe 1336 explorer.exe 1336 explorer.exe 1612 spoolsv.exe 1336 explorer.exe 1336 explorer.exe 2488 spoolsv.exe 1336 explorer.exe 1336 explorer.exe 1816 spoolsv.exe 1336 explorer.exe 1336 explorer.exe 832 spoolsv.exe 1336 explorer.exe 1336 explorer.exe 2152 spoolsv.exe 1336 explorer.exe 1336 explorer.exe 2356 spoolsv.exe 1336 explorer.exe 1336 explorer.exe 1352 spoolsv.exe 1336 explorer.exe 1336 explorer.exe 2700 spoolsv.exe 1336 explorer.exe 1336 explorer.exe 1808 spoolsv.exe 1336 explorer.exe 1336 explorer.exe 2916 spoolsv.exe 1336 explorer.exe 1336 explorer.exe 2776 spoolsv.exe 1336 explorer.exe 1336 explorer.exe 2808 spoolsv.exe 1336 explorer.exe 1336 explorer.exe 1748 spoolsv.exe 1336 explorer.exe 1336 explorer.exe 1096 spoolsv.exe 1336 explorer.exe 1336 explorer.exe 2456 spoolsv.exe 1336 explorer.exe 1336 explorer.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" d6ec3fabd45307dae7c308d992b2dd20N.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe -
Suspicious use of SetThreadContext 25 IoCs
description pid Process procid_target PID 2584 set thread context of 2240 2584 d6ec3fabd45307dae7c308d992b2dd20N.exe 33 PID 2240 set thread context of 1600 2240 d6ec3fabd45307dae7c308d992b2dd20N.exe 34 PID 2240 set thread context of 1512 2240 d6ec3fabd45307dae7c308d992b2dd20N.exe 35 PID 1352 set thread context of 1708 1352 explorer.exe 39 PID 1708 set thread context of 1336 1708 explorer.exe 40 PID 1708 set thread context of 1776 1708 explorer.exe 41 PID 1780 set thread context of 2524 1780 spoolsv.exe 45 PID 1584 set thread context of 1616 1584 spoolsv.exe 48 PID 2872 set thread context of 2704 2872 spoolsv.exe 51 PID 2156 set thread context of 1108 2156 spoolsv.exe 55 PID 1612 set thread context of 1936 1612 spoolsv.exe 59 PID 2488 set thread context of 1064 2488 spoolsv.exe 63 PID 1816 set thread context of 1632 1816 spoolsv.exe 66 PID 832 set thread context of 2164 832 spoolsv.exe 70 PID 2152 set thread context of 2720 2152 spoolsv.exe 74 PID 2356 set thread context of 352 2356 spoolsv.exe 78 PID 1352 set thread context of 1828 1352 spoolsv.exe 82 PID 2700 set thread context of 1492 2700 spoolsv.exe 86 PID 1808 set thread context of 2148 1808 spoolsv.exe 90 PID 2916 set thread context of 2548 2916 spoolsv.exe 94 PID 2776 set thread context of 2532 2776 spoolsv.exe 98 PID 2808 set thread context of 1576 2808 spoolsv.exe 102 PID 1748 set thread context of 1948 1748 spoolsv.exe 106 PID 1096 set thread context of 2828 1096 spoolsv.exe 110 PID 2456 set thread context of 1808 2456 spoolsv.exe 114 -
Drops file in Windows directory 24 IoCs
description ioc Process File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe d6ec3fabd45307dae7c308d992b2dd20N.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 62 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d6ec3fabd45307dae7c308d992b2dd20N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d6ec3fabd45307dae7c308d992b2dd20N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d6ec3fabd45307dae7c308d992b2dd20N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe -
Suspicious behavior: EnumeratesProcesses 42 IoCs
pid Process 2584 d6ec3fabd45307dae7c308d992b2dd20N.exe 1600 d6ec3fabd45307dae7c308d992b2dd20N.exe 1352 explorer.exe 1780 spoolsv.exe 1336 explorer.exe 1336 explorer.exe 1584 spoolsv.exe 1336 explorer.exe 2872 spoolsv.exe 1336 explorer.exe 2156 spoolsv.exe 1336 explorer.exe 1612 spoolsv.exe 1336 explorer.exe 2488 spoolsv.exe 1336 explorer.exe 1816 spoolsv.exe 1336 explorer.exe 832 spoolsv.exe 1336 explorer.exe 2152 spoolsv.exe 1336 explorer.exe 2356 spoolsv.exe 1336 explorer.exe 1352 spoolsv.exe 1336 explorer.exe 2700 spoolsv.exe 1336 explorer.exe 1808 spoolsv.exe 1336 explorer.exe 2916 spoolsv.exe 1336 explorer.exe 2776 spoolsv.exe 1336 explorer.exe 2808 spoolsv.exe 1336 explorer.exe 1748 spoolsv.exe 1336 explorer.exe 1096 spoolsv.exe 1336 explorer.exe 2456 spoolsv.exe 1336 explorer.exe -
Suspicious use of SetWindowsHookEx 50 IoCs
pid Process 2584 d6ec3fabd45307dae7c308d992b2dd20N.exe 2584 d6ec3fabd45307dae7c308d992b2dd20N.exe 1600 d6ec3fabd45307dae7c308d992b2dd20N.exe 1600 d6ec3fabd45307dae7c308d992b2dd20N.exe 1352 explorer.exe 1352 explorer.exe 1336 explorer.exe 1336 explorer.exe 1780 spoolsv.exe 1780 spoolsv.exe 1336 explorer.exe 1336 explorer.exe 1584 spoolsv.exe 1584 spoolsv.exe 2872 spoolsv.exe 2872 spoolsv.exe 2156 spoolsv.exe 2156 spoolsv.exe 1612 spoolsv.exe 1612 spoolsv.exe 2488 spoolsv.exe 2488 spoolsv.exe 1816 spoolsv.exe 1816 spoolsv.exe 832 spoolsv.exe 832 spoolsv.exe 2152 spoolsv.exe 2152 spoolsv.exe 2356 spoolsv.exe 2356 spoolsv.exe 1352 spoolsv.exe 1352 spoolsv.exe 2700 spoolsv.exe 2700 spoolsv.exe 1808 spoolsv.exe 1808 spoolsv.exe 2916 spoolsv.exe 2916 spoolsv.exe 2776 spoolsv.exe 2776 spoolsv.exe 2808 spoolsv.exe 2808 spoolsv.exe 1748 spoolsv.exe 1748 spoolsv.exe 1096 spoolsv.exe 1096 spoolsv.exe 2456 spoolsv.exe 2456 spoolsv.exe 2060 spoolsv.exe 2060 spoolsv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2584 wrote to memory of 2152 2584 d6ec3fabd45307dae7c308d992b2dd20N.exe 30 PID 2584 wrote to memory of 2152 2584 d6ec3fabd45307dae7c308d992b2dd20N.exe 30 PID 2584 wrote to memory of 2152 2584 d6ec3fabd45307dae7c308d992b2dd20N.exe 30 PID 2584 wrote to memory of 2152 2584 d6ec3fabd45307dae7c308d992b2dd20N.exe 30 PID 2584 wrote to memory of 2240 2584 d6ec3fabd45307dae7c308d992b2dd20N.exe 33 PID 2584 wrote to memory of 2240 2584 d6ec3fabd45307dae7c308d992b2dd20N.exe 33 PID 2584 wrote to memory of 2240 2584 d6ec3fabd45307dae7c308d992b2dd20N.exe 33 PID 2584 wrote to memory of 2240 2584 d6ec3fabd45307dae7c308d992b2dd20N.exe 33 PID 2584 wrote to memory of 2240 2584 d6ec3fabd45307dae7c308d992b2dd20N.exe 33 PID 2584 wrote to memory of 2240 2584 d6ec3fabd45307dae7c308d992b2dd20N.exe 33 PID 2584 wrote to memory of 2240 2584 d6ec3fabd45307dae7c308d992b2dd20N.exe 33 PID 2584 wrote to memory of 2240 2584 d6ec3fabd45307dae7c308d992b2dd20N.exe 33 PID 2584 wrote to memory of 2240 2584 d6ec3fabd45307dae7c308d992b2dd20N.exe 33 PID 2584 wrote to memory of 2240 2584 d6ec3fabd45307dae7c308d992b2dd20N.exe 33 PID 2584 wrote to memory of 2240 2584 d6ec3fabd45307dae7c308d992b2dd20N.exe 33 PID 2584 wrote to memory of 2240 2584 d6ec3fabd45307dae7c308d992b2dd20N.exe 33 PID 2584 wrote to memory of 2240 2584 d6ec3fabd45307dae7c308d992b2dd20N.exe 33 PID 2584 wrote to memory of 2240 2584 d6ec3fabd45307dae7c308d992b2dd20N.exe 33 PID 2584 wrote to memory of 2240 2584 d6ec3fabd45307dae7c308d992b2dd20N.exe 33 PID 2584 wrote to memory of 2240 2584 d6ec3fabd45307dae7c308d992b2dd20N.exe 33 PID 2584 wrote to memory of 2240 2584 d6ec3fabd45307dae7c308d992b2dd20N.exe 33 PID 2584 wrote to memory of 2240 2584 d6ec3fabd45307dae7c308d992b2dd20N.exe 33 PID 2584 wrote to memory of 2240 2584 d6ec3fabd45307dae7c308d992b2dd20N.exe 33 PID 2584 wrote to memory of 2240 2584 d6ec3fabd45307dae7c308d992b2dd20N.exe 33 PID 2584 wrote to memory of 2240 2584 d6ec3fabd45307dae7c308d992b2dd20N.exe 33 PID 2584 wrote to memory of 2240 2584 d6ec3fabd45307dae7c308d992b2dd20N.exe 33 PID 2584 wrote to memory of 2240 2584 d6ec3fabd45307dae7c308d992b2dd20N.exe 33 PID 2240 wrote to memory of 1600 2240 d6ec3fabd45307dae7c308d992b2dd20N.exe 34 PID 2240 wrote to memory of 1600 2240 d6ec3fabd45307dae7c308d992b2dd20N.exe 34 PID 2240 wrote to memory of 1600 2240 d6ec3fabd45307dae7c308d992b2dd20N.exe 34 PID 2240 wrote to memory of 1600 2240 d6ec3fabd45307dae7c308d992b2dd20N.exe 34 PID 2240 wrote to memory of 1600 2240 d6ec3fabd45307dae7c308d992b2dd20N.exe 34 PID 2240 wrote to memory of 1600 2240 d6ec3fabd45307dae7c308d992b2dd20N.exe 34 PID 2240 wrote to memory of 1600 2240 d6ec3fabd45307dae7c308d992b2dd20N.exe 34 PID 2240 wrote to memory of 1600 2240 d6ec3fabd45307dae7c308d992b2dd20N.exe 34 PID 2240 wrote to memory of 1600 2240 d6ec3fabd45307dae7c308d992b2dd20N.exe 34 PID 2240 wrote to memory of 1512 2240 d6ec3fabd45307dae7c308d992b2dd20N.exe 35 PID 2240 wrote to memory of 1512 2240 d6ec3fabd45307dae7c308d992b2dd20N.exe 35 PID 2240 wrote to memory of 1512 2240 d6ec3fabd45307dae7c308d992b2dd20N.exe 35 PID 2240 wrote to memory of 1512 2240 d6ec3fabd45307dae7c308d992b2dd20N.exe 35 PID 2240 wrote to memory of 1512 2240 d6ec3fabd45307dae7c308d992b2dd20N.exe 35 PID 2240 wrote to memory of 1512 2240 d6ec3fabd45307dae7c308d992b2dd20N.exe 35 PID 1600 wrote to memory of 1352 1600 d6ec3fabd45307dae7c308d992b2dd20N.exe 36 PID 1600 wrote to memory of 1352 1600 d6ec3fabd45307dae7c308d992b2dd20N.exe 36 PID 1600 wrote to memory of 1352 1600 d6ec3fabd45307dae7c308d992b2dd20N.exe 36 PID 1600 wrote to memory of 1352 1600 d6ec3fabd45307dae7c308d992b2dd20N.exe 36 PID 1352 wrote to memory of 2032 1352 explorer.exe 37 PID 1352 wrote to memory of 2032 1352 explorer.exe 37 PID 1352 wrote to memory of 2032 1352 explorer.exe 37 PID 1352 wrote to memory of 2032 1352 explorer.exe 37 PID 1352 wrote to memory of 1708 1352 explorer.exe 39 PID 1352 wrote to memory of 1708 1352 explorer.exe 39 PID 1352 wrote to memory of 1708 1352 explorer.exe 39 PID 1352 wrote to memory of 1708 1352 explorer.exe 39 PID 1352 wrote to memory of 1708 1352 explorer.exe 39 PID 1352 wrote to memory of 1708 1352 explorer.exe 39 PID 1352 wrote to memory of 1708 1352 explorer.exe 39 PID 1352 wrote to memory of 1708 1352 explorer.exe 39 PID 1352 wrote to memory of 1708 1352 explorer.exe 39 PID 1352 wrote to memory of 1708 1352 explorer.exe 39 PID 1352 wrote to memory of 1708 1352 explorer.exe 39 PID 1352 wrote to memory of 1708 1352 explorer.exe 39 PID 1352 wrote to memory of 1708 1352 explorer.exe 39 PID 1352 wrote to memory of 1708 1352 explorer.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\d6ec3fabd45307dae7c308d992b2dd20N.exe"C:\Users\Admin\AppData\Local\Temp\d6ec3fabd45307dae7c308d992b2dd20N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "C:\Users\Admin\AppData\Local\Temp\d6ec3fabd45307dae7c308d992b2dd20N.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"2⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2152
-
-
C:\Users\Admin\AppData\Local\Temp\d6ec3fabd45307dae7c308d992b2dd20N.exeC:\Users\Admin\AppData\Local\Temp\d6ec3fabd45307dae7c308d992b2dd20N.exe2⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Users\Admin\AppData\Local\Temp\d6ec3fabd45307dae7c308d992b2dd20N.exeC:\Users\Admin\AppData\Local\Temp\d6ec3fabd45307dae7c308d992b2dd20N.exe3⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1600 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\explorer.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"5⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2032
-
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1708 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe6⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1336 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1780 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:236
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2524
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1584 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:2092
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1616
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2872 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:2936
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2704
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2156 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:3040
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1108
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1612 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:2792
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1936
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2488 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:916
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1064
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1816 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:948
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1632
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:832 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:1584
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2164
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2152 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2868
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2720
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2356 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:1968
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:352
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1352 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:1736
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1828
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2700 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2492
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1492
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1808 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2852
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2148
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2916 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:108
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2548
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2776 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:1160
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2532
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2808 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2636
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1576
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1748 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:1420
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1948
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1096 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:1920
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2828
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2456 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2572
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1808
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2060 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:908
-
-
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵PID:1776
-
-
-
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"3⤵PID:1512
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD5d6ec3fabd45307dae7c308d992b2dd20
SHA172b86e54b784f9fde943f83278677dfe2221399c
SHA256684f1249ded24468d83ecd163e94fce5d14ec10c478211894d4e5f5c54b047a3
SHA512b67894ab3cf9f878f2e7769b75eb0b27e2a4d0fa7108482bff934b9c596317832259141b08fa642608a5a86653817e834f37f51623839660e4c78710e77b1484
-
Filesize
92B
MD513222a4bb413aaa8b92aa5b4f81d2760
SHA1268a48f2fe84ed49bbdc1873a8009db8c7cba66a
SHA256d170ac99460f9c1fb30717345b1003f8eb9189c26857ca26d3431590e6f0e23d
SHA512eee47ead9bef041b510ee5e40ebe8a51abd41d8c1fe5de68191f2b996feaa6cc0b8c16ed26d644fbf1d7e4f40920d7a6db954e19f2236d9e4e3f3f984f21b140
-
Filesize
2.9MB
MD5842ba0b98bcd56cada166846a9835dce
SHA11b944578e5d5cd47db01bfed9f88e5aa1aa9aa08
SHA25656f613e4302b0c100a1247413a1648c92f3bbc1c61da121484c8b5ba6258c855
SHA5127a98f8707b56c38126fc7acea5411aa8a278d7032a1980a5a06cdcecfdbda366107395e10a5572135c9da707680797012054dc461f6b048cd6b910c66d58a686
-
Filesize
2.9MB
MD5747dfea65d7ec9870a1639ef35ec178a
SHA1a200c1d16591b57e48613dfc4a502b96f557346e
SHA256713171856f686f518452d41a378936b8a6ce3971724e25da5fd1284fee326d06
SHA512b996bd3823953b044b9a2b80756d953e92598297e1400147f2728fd581e1b0ee1def0c8deefa8df04d47915683becfe5b80f4dae8c6614cd338c49f1daf80639