Analysis
-
max time kernel
149s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 23:26
Static task
static1
Behavioral task
behavioral1
Sample
f100f396c69bc0c4b64a832cf4f7e9cd2c650e5260a49bee78cf303c617cb33e.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f100f396c69bc0c4b64a832cf4f7e9cd2c650e5260a49bee78cf303c617cb33e.exe
Resource
win10v2004-20240802-en
General
-
Target
f100f396c69bc0c4b64a832cf4f7e9cd2c650e5260a49bee78cf303c617cb33e.exe
-
Size
1.1MB
-
MD5
532e696efa8d17632bfa56853293099c
-
SHA1
0524b6c300e34ba74bbf1dfb4721ccb5d06b2586
-
SHA256
f100f396c69bc0c4b64a832cf4f7e9cd2c650e5260a49bee78cf303c617cb33e
-
SHA512
a67d418c2cb69f8cc55c25a0c14c29f064f8e891e0ceeb0d65a453ca2e02f27b35297e11baa754b2821d515b19e91fef5383214fee0e515d29a3db5b8f3a18d7
-
SSDEEP
24576:aH0dl8myX9Bg42QoXFkrzkmplSgRDYo0lG4Z8r7Qfbkiu5Q8:acallSllG4ZM7QzML
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2656 svchcst.exe -
Executes dropped EXE 23 IoCs
pid Process 2656 svchcst.exe 568 svchcst.exe 2680 svchcst.exe 2840 svchcst.exe 1940 svchcst.exe 1516 svchcst.exe 1176 svchcst.exe 2992 svchcst.exe 2684 svchcst.exe 1476 svchcst.exe 652 svchcst.exe 2816 svchcst.exe 2064 svchcst.exe 2540 svchcst.exe 2420 svchcst.exe 2300 svchcst.exe 2036 svchcst.exe 1100 svchcst.exe 2484 svchcst.exe 1440 svchcst.exe 2840 svchcst.exe 1680 svchcst.exe 768 svchcst.exe -
Loads dropped DLL 37 IoCs
pid Process 2040 WScript.exe 2040 WScript.exe 1884 WScript.exe 2856 WScript.exe 2856 WScript.exe 2856 WScript.exe 2100 WScript.exe 988 WScript.exe 988 WScript.exe 592 WScript.exe 2296 WScript.exe 548 WScript.exe 1996 WScript.exe 1512 WScript.exe 1512 WScript.exe 2184 WScript.exe 2184 WScript.exe 612 WScript.exe 612 WScript.exe 2316 WScript.exe 2316 WScript.exe 1432 WScript.exe 1432 WScript.exe 2532 WScript.exe 2532 WScript.exe 2864 WScript.exe 2864 WScript.exe 1732 WScript.exe 1732 WScript.exe 2320 WScript.exe 2320 WScript.exe 1000 WScript.exe 1000 WScript.exe 2240 WScript.exe 2240 WScript.exe 1544 WScript.exe 1544 WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 48 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f100f396c69bc0c4b64a832cf4f7e9cd2c650e5260a49bee78cf303c617cb33e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2112 f100f396c69bc0c4b64a832cf4f7e9cd2c650e5260a49bee78cf303c617cb33e.exe 2656 svchcst.exe 2656 svchcst.exe 2656 svchcst.exe 2656 svchcst.exe 2656 svchcst.exe 2656 svchcst.exe 2656 svchcst.exe 2656 svchcst.exe 2656 svchcst.exe 2656 svchcst.exe 2656 svchcst.exe 2656 svchcst.exe 2656 svchcst.exe 2656 svchcst.exe 2656 svchcst.exe 2656 svchcst.exe 2656 svchcst.exe 2656 svchcst.exe 2656 svchcst.exe 2656 svchcst.exe 2656 svchcst.exe 2656 svchcst.exe 2656 svchcst.exe 2656 svchcst.exe 2656 svchcst.exe 2656 svchcst.exe 2656 svchcst.exe 2656 svchcst.exe 2656 svchcst.exe 2656 svchcst.exe 2656 svchcst.exe 2656 svchcst.exe 2656 svchcst.exe 2656 svchcst.exe 2656 svchcst.exe 2656 svchcst.exe 2656 svchcst.exe 2656 svchcst.exe 2656 svchcst.exe 2656 svchcst.exe 2656 svchcst.exe 2656 svchcst.exe 2656 svchcst.exe 2656 svchcst.exe 2656 svchcst.exe 2656 svchcst.exe 2656 svchcst.exe 2656 svchcst.exe 2656 svchcst.exe 2656 svchcst.exe 2656 svchcst.exe 2656 svchcst.exe 2656 svchcst.exe 2656 svchcst.exe 2656 svchcst.exe 2656 svchcst.exe 2656 svchcst.exe 2656 svchcst.exe 2656 svchcst.exe 2656 svchcst.exe 2656 svchcst.exe 2656 svchcst.exe 2656 svchcst.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2112 f100f396c69bc0c4b64a832cf4f7e9cd2c650e5260a49bee78cf303c617cb33e.exe -
Suspicious use of SetWindowsHookEx 48 IoCs
pid Process 2112 f100f396c69bc0c4b64a832cf4f7e9cd2c650e5260a49bee78cf303c617cb33e.exe 2112 f100f396c69bc0c4b64a832cf4f7e9cd2c650e5260a49bee78cf303c617cb33e.exe 2656 svchcst.exe 2656 svchcst.exe 568 svchcst.exe 568 svchcst.exe 2680 svchcst.exe 2680 svchcst.exe 2840 svchcst.exe 2840 svchcst.exe 1940 svchcst.exe 1940 svchcst.exe 1516 svchcst.exe 1516 svchcst.exe 1176 svchcst.exe 1176 svchcst.exe 2992 svchcst.exe 2992 svchcst.exe 2684 svchcst.exe 2684 svchcst.exe 1476 svchcst.exe 1476 svchcst.exe 652 svchcst.exe 652 svchcst.exe 2816 svchcst.exe 2816 svchcst.exe 2064 svchcst.exe 2064 svchcst.exe 2540 svchcst.exe 2540 svchcst.exe 2420 svchcst.exe 2420 svchcst.exe 2300 svchcst.exe 2300 svchcst.exe 2036 svchcst.exe 2036 svchcst.exe 1100 svchcst.exe 1100 svchcst.exe 2484 svchcst.exe 2484 svchcst.exe 1440 svchcst.exe 1440 svchcst.exe 2840 svchcst.exe 2840 svchcst.exe 1680 svchcst.exe 1680 svchcst.exe 768 svchcst.exe 768 svchcst.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2112 wrote to memory of 2040 2112 f100f396c69bc0c4b64a832cf4f7e9cd2c650e5260a49bee78cf303c617cb33e.exe 30 PID 2112 wrote to memory of 2040 2112 f100f396c69bc0c4b64a832cf4f7e9cd2c650e5260a49bee78cf303c617cb33e.exe 30 PID 2112 wrote to memory of 2040 2112 f100f396c69bc0c4b64a832cf4f7e9cd2c650e5260a49bee78cf303c617cb33e.exe 30 PID 2112 wrote to memory of 2040 2112 f100f396c69bc0c4b64a832cf4f7e9cd2c650e5260a49bee78cf303c617cb33e.exe 30 PID 2040 wrote to memory of 2656 2040 WScript.exe 33 PID 2040 wrote to memory of 2656 2040 WScript.exe 33 PID 2040 wrote to memory of 2656 2040 WScript.exe 33 PID 2040 wrote to memory of 2656 2040 WScript.exe 33 PID 2656 wrote to memory of 1884 2656 svchcst.exe 34 PID 2656 wrote to memory of 1884 2656 svchcst.exe 34 PID 2656 wrote to memory of 1884 2656 svchcst.exe 34 PID 2656 wrote to memory of 1884 2656 svchcst.exe 34 PID 1884 wrote to memory of 568 1884 WScript.exe 35 PID 1884 wrote to memory of 568 1884 WScript.exe 35 PID 1884 wrote to memory of 568 1884 WScript.exe 35 PID 1884 wrote to memory of 568 1884 WScript.exe 35 PID 568 wrote to memory of 2856 568 svchcst.exe 36 PID 568 wrote to memory of 2856 568 svchcst.exe 36 PID 568 wrote to memory of 2856 568 svchcst.exe 36 PID 568 wrote to memory of 2856 568 svchcst.exe 36 PID 2856 wrote to memory of 2680 2856 WScript.exe 37 PID 2856 wrote to memory of 2680 2856 WScript.exe 37 PID 2856 wrote to memory of 2680 2856 WScript.exe 37 PID 2856 wrote to memory of 2680 2856 WScript.exe 37 PID 2680 wrote to memory of 2032 2680 svchcst.exe 38 PID 2680 wrote to memory of 2032 2680 svchcst.exe 38 PID 2680 wrote to memory of 2032 2680 svchcst.exe 38 PID 2680 wrote to memory of 2032 2680 svchcst.exe 38 PID 2856 wrote to memory of 2840 2856 WScript.exe 39 PID 2856 wrote to memory of 2840 2856 WScript.exe 39 PID 2856 wrote to memory of 2840 2856 WScript.exe 39 PID 2856 wrote to memory of 2840 2856 WScript.exe 39 PID 2840 wrote to memory of 2100 2840 svchcst.exe 40 PID 2840 wrote to memory of 2100 2840 svchcst.exe 40 PID 2840 wrote to memory of 2100 2840 svchcst.exe 40 PID 2840 wrote to memory of 2100 2840 svchcst.exe 40 PID 2100 wrote to memory of 1940 2100 WScript.exe 41 PID 2100 wrote to memory of 1940 2100 WScript.exe 41 PID 2100 wrote to memory of 1940 2100 WScript.exe 41 PID 2100 wrote to memory of 1940 2100 WScript.exe 41 PID 1940 wrote to memory of 988 1940 svchcst.exe 42 PID 1940 wrote to memory of 988 1940 svchcst.exe 42 PID 1940 wrote to memory of 988 1940 svchcst.exe 42 PID 1940 wrote to memory of 988 1940 svchcst.exe 42 PID 988 wrote to memory of 1516 988 WScript.exe 43 PID 988 wrote to memory of 1516 988 WScript.exe 43 PID 988 wrote to memory of 1516 988 WScript.exe 43 PID 988 wrote to memory of 1516 988 WScript.exe 43 PID 1516 wrote to memory of 2296 1516 svchcst.exe 44 PID 1516 wrote to memory of 2296 1516 svchcst.exe 44 PID 1516 wrote to memory of 2296 1516 svchcst.exe 44 PID 1516 wrote to memory of 2296 1516 svchcst.exe 44 PID 988 wrote to memory of 1176 988 WScript.exe 45 PID 988 wrote to memory of 1176 988 WScript.exe 45 PID 988 wrote to memory of 1176 988 WScript.exe 45 PID 988 wrote to memory of 1176 988 WScript.exe 45 PID 1176 wrote to memory of 592 1176 svchcst.exe 46 PID 1176 wrote to memory of 592 1176 svchcst.exe 46 PID 1176 wrote to memory of 592 1176 svchcst.exe 46 PID 1176 wrote to memory of 592 1176 svchcst.exe 46 PID 592 wrote to memory of 2992 592 WScript.exe 47 PID 592 wrote to memory of 2992 592 WScript.exe 47 PID 592 wrote to memory of 2992 592 WScript.exe 47 PID 592 wrote to memory of 2992 592 WScript.exe 47
Processes
-
C:\Users\Admin\AppData\Local\Temp\f100f396c69bc0c4b64a832cf4f7e9cd2c650e5260a49bee78cf303c617cb33e.exe"C:\Users\Admin\AppData\Local\Temp\f100f396c69bc0c4b64a832cf4f7e9cd2c650e5260a49bee78cf303c617cb33e.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:568 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"6⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"8⤵
- System Location Discovery: System Language Discovery
PID:2032
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"8⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"9⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"10⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:988 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"11⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"12⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2296 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"13⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2684 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"14⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:548 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"15⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1476 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"16⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1996 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"17⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:652 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"18⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1512 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"19⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2816 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"20⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2184 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"21⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2064 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"22⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:612 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"23⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2540 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"24⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2316 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"25⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2420 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"26⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1432 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"27⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2300 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"28⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2532 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"29⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2036 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"30⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2864 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"31⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1100 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"32⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1732 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"33⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2484 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"34⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2320 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"35⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1440 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"36⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1000 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"37⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2840 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"38⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2240 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"39⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1680 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"40⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1544 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"41⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:768 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"42⤵
- System Location Discovery: System Language Discovery
PID:2168
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"11⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"12⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:592 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"13⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2992 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"14⤵
- System Location Discovery: System Language Discovery
PID:2944
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92B
MD567b9b3e2ded7086f393ebbc36c5e7bca
SHA1e6299d0450b9a92a18cc23b5704a2b475652c790
SHA25644063c266686263f14cd2a83fee124fb3e61a9171a6aab69709464f49511011d
SHA512826fbc9481f46b1ae3db828a665c55c349023caf563e6e8c17321f5f3af3e4c3914955db6f0eebfc6defe561315435d47310b4d0499ab9c2c85bb61264dedc09
-
Filesize
696B
MD55f2a40f410e1db471d583c90bb1bf208
SHA11e49ed23e02976dede24633c367ab8c92fb4fd9b
SHA25603c04fafe55862423025fe6e16bbeda1dbded8150a0c0dd363164733051fe1e4
SHA51298a4ba3960f66728d4a286c8cff2223742d701467a647b6d4a2f118a6e2c53c9a4f6c329a36c099b151d42279ba0823ff07a8df49c87d02a7470f595052f725c
-
Filesize
753B
MD5686b33bd7f4884098ccc7669415fb726
SHA1fbf52c868d2c534b3406b80bb4c8ba947f08f618
SHA256a0c0dcc540f77b5032d104ae4c1f92596ff238e9804d12cb99990936637b53d3
SHA5128fe9fecc02cc8434fea93586dc48699e5b66e412c34732b5a1299b966a2bf8d3a498ca815658ff652e28ba00f175f7c02a712e5db77a80e8c854c32e857099b9
-
Filesize
696B
MD5f988db0382571319f9b0af53097c2376
SHA1fd83936b61f5d4256a899610d5c13c5a9b24e625
SHA2568557443470cff4b30c533603a8e73dd9b9c55af2bae1ed0a7ce86d860fe4953c
SHA5128f0df896cf7432ac5248f1149a79cc721e40e80dc1ced770f830725c00e64bb96944bbdd375aa25587e0574dba32375934cbf99bf99f33267296c1e605ac8703
-
Filesize
696B
MD5f76c7cf504b872903a1325a57e8baaf9
SHA1896ac9d8338b41c7673781f07915612c538c385f
SHA25646436b128cbdb907e9666c1aa6257164f7e5a2ebe1c79b9198b36e50115a8163
SHA51259c0e9f508682af572185dd2578ad1e62abb99297a99018af7638bc8d2f6693fe00900bd739e00a912088f77624f08034dba041ce1677e2924cb8ab3196b6054
-
Filesize
696B
MD5780c5b88f55c3463a252f361d53f98db
SHA1244e739c7401ce41027d7786f4a48f4806a9939b
SHA256d8b383df125f83a39c299a3134c88e981cf47755ddd6b44310f70231305c6bb0
SHA512b12e3266edea4f9dff105ed8617c81a29f9873d646b6b326c5c29c0c590049dd85458b8ff7541957f9ab995896e7bfd08b171959e592ccc6edbedf998fdf1045
-
Filesize
696B
MD530eafc82ac9962314c98d54ef2588957
SHA13bf1e1f24264448ba2688366b10b083c808e1e7a
SHA256fc93c94af2daa9c8b70b9f6104f613a1cf0ac39bf1856542a3dbb6f828d2bee6
SHA5125cd90109e61e06fda91874fd3cd28d83b42b6e586446ce99cf69a611f0015f56010937fadca4accef57ab47b5bca54b4171479a9a989ab5b1a015d491f985fb5
-
Filesize
696B
MD57d2c3f227d42fae4a5b7fbcb491b74e3
SHA1c1271bbd86747cc709b694ba9579a68b5e75a17c
SHA2569353a2f27a61e571c5bc92ccc1046c1059c5fad8e1e2cafe63a9cc73e1169c33
SHA51250330ad733975966b32fbedffb99a25cd13004d685e5788ef11f1f0fedfc62658e3e8f5ed0030fe60ecb02ba95ffa7d440c067a1e164cc3bc02ac5008b6a27d3
-
Filesize
696B
MD5072a46f071251f08c67b3aba4c983435
SHA1371837f885eac20c802901026d2e7aa1d4f6cd5c
SHA2560d0a8daeceed64600e817a5a0437a39048c52e857868a35d9130d42fdfa896ed
SHA512e3d35d428a29eec047b0cc43c87aa701eed81e9efe921b4ef13fa2e8e24ef11ce602bd67868b7ad1bdbd9f39eb681a8c95c715479238a2f17c17105ea4653c83
-
Filesize
696B
MD5c1f667683c1809dc2fa81d863ea10a4e
SHA1dc9fdbeca32f2afbcfdc5363769ebb594fc93e44
SHA256a0afd04975f7f5cf26533640020a9533d4dcf1b152143e69196f93bd5b49fa1e
SHA512e4c894530934444cb97392b0180e5b6040b84ab5c639412c6b9e5355a13152412da8d881403832c2f3c601624465b16242ebd8710f6e6a4666a27e15ce759b2f
-
Filesize
696B
MD5951aaea1269f2a203f3dd7cd181c5d34
SHA13623d216764b24aa0b02cbc136287252bf5b412a
SHA256228b66ed4c4a1270fe5a6655cdd849de937351e95974b96acafa59b8107b7dd4
SHA512cd84967ad43a13c3cd57cc80f6533a9e9fd93a5eddf4807825b8d19883da4acda3e7b4ff963f23209c579050fedf834382d8e718386c852ceaf350b2b0f91816
-
Filesize
696B
MD5df56efc5aa49720056952b653a76a0d1
SHA182823a83837e69b031a973238d78e0360d113ac7
SHA256bd6fdd2db5dd3828baa84352f1c382304ce0481755f000a7445e3977c24d0a35
SHA512ffd2ffc465dcd33cca7fdf4cce8711ce7a5cb6af0933fbf2885b7b4164ea2c19ec1a776f2422996599e28b05a3ff927dd76221b9b4dec49b942941b48962034c
-
Filesize
696B
MD57e30bbf5f589f6ae6e5daf322f9f4c63
SHA14078c36ab68538c4d3aa3996b3a218fa786e5813
SHA2569ed68f0cb63b2fca99956af2a550eb26ac99a883afef4ea6dc1236c14593266b
SHA51263bb07bfbef6c96b50bbcb60d7f805930aaeefd6eadaa39dcb3e591c84636c670257a7f544bb0565174578a517d06de29a6c086812ef5cfb3039aea1917fb4b8
-
Filesize
1.1MB
MD5ae3b4288aff70779bb86098cb9d4ed12
SHA10ff8c59c1320ce3ced530dfdfa63273bbe63ee74
SHA2563d8cf714c270fcc0c34a56ca8086a4c1349ecb2e541b62d06bc1961d16c6c8a6
SHA5122c6b616bb3249c115806bb12beb6d3bfacaa4840c842c0ee490c6f85c8b6a660bf14fca7d219934b7db157511fbf6ce2aa56499e3d56c78e01aa912a134c6ba9
-
Filesize
1.1MB
MD5c865d813acab13198f1a09c00ad57682
SHA15394a8a22cb0eda214ff1473a2341a7c84377fbe
SHA2563f3af48cbc8657581f3d9b29e5fc7cd816dcca237b8880d1ee14de8fabfd9177
SHA512670eef392378533e914b1a43ba3a61b355bb4675019966a0391870be36b2e8310ffc1fe40ca3a0d5e0b5a4638ea4b5c6859b6d254e9f21a04e7e71406a30d25d
-
Filesize
1.1MB
MD5742f9c1e4ebdf360ea1934f64fa06d25
SHA1aca24330d793eb0a44306f40900f4e6db56b3c69
SHA256455ffe7c687758109597978f9acd7b5601828520e788bfe93e03949abdc85b67
SHA51274f153fed0f8fa5dae1c1b21ad313cddac191555981676ec110eb337b57b16a4a7c9a282dfba3ce10239bbfc4df3116acddcc44a4f55c9f9e92acb15c348fbe3