Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
06-09-2024 09:39
Static task
static1
Behavioral task
behavioral1
Sample
1a407d7c11c58235d559b6f378363840N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
1a407d7c11c58235d559b6f378363840N.exe
Resource
win10v2004-20240802-en
General
-
Target
1a407d7c11c58235d559b6f378363840N.exe
-
Size
1.9MB
-
MD5
1a407d7c11c58235d559b6f378363840
-
SHA1
0b3dc1ec4d896473aae4670310d03c62da9aebd2
-
SHA256
fb67541dcd9e7b88464ad7484f62fae23db0021a07bd0aa0c18aec110af4a5dd
-
SHA512
65b0183a03d88f53d0b9151503ca59e7f841b9504cf586efe84591e3e750374b5ad1ac7d590e620841e134e7717da24ec263df904f5ac3d48bca4039ff663fe7
-
SSDEEP
49152:Hh+ZkldoPK1XalKCc9nueh+ZkldoPK1XalKCc9nui:w2cPK1ab32cPK1abi
Malware Config
Extracted
remcos
1.7 Pro
Host
213.208.129.213:137
-
audio_folder
audio
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
5
-
copy_file
srvs.exe
-
copy_folder
WindowsApp
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
true
-
install_path
%AppData%
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
WindowsApp
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
remcos_jpetmoenqu
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screens
-
screenshot_path
%AppData%
-
screenshot_time
1
-
startup_value
srvs
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\RmClient.url 1a407d7c11c58235d559b6f378363840N.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\RmClient.url srvs.exe -
Executes dropped EXE 47 IoCs
pid Process 2892 srvs.exe 2616 srvs.exe 2556 srvs.exe 2576 srvs.exe 2624 srvs.exe 2636 srvs.exe 3052 srvs.exe 2620 srvs.exe 2876 srvs.exe 2896 srvs.exe 2648 srvs.exe 2932 srvs.exe 3040 srvs.exe 316 srvs.exe 1880 srvs.exe 1408 srvs.exe 1432 srvs.exe 1928 srvs.exe 1956 srvs.exe 264 srvs.exe 572 srvs.exe 2268 srvs.exe 1636 srvs.exe 2520 srvs.exe 2504 srvs.exe 2408 srvs.exe 604 srvs.exe 440 srvs.exe 1168 srvs.exe 1900 srvs.exe 1536 srvs.exe 1772 srvs.exe 1700 srvs.exe 2976 srvs.exe 1084 srvs.exe 1748 srvs.exe 904 srvs.exe 1680 srvs.exe 2404 srvs.exe 1388 srvs.exe 600 srvs.exe 2080 srvs.exe 2372 srvs.exe 2248 srvs.exe 3064 srvs.exe 2492 srvs.exe 2388 srvs.exe -
Loads dropped DLL 1 IoCs
pid Process 2568 cmd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\srvs = "\"C:\\Users\\Admin\\AppData\\Roaming\\WindowsApp\\srvs.exe\"" 1a407d7c11c58235d559b6f378363840N.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\srvs = "\"C:\\Users\\Admin\\AppData\\Roaming\\WindowsApp\\srvs.exe\"" srvs.exe -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000a000000018617-25.dat autoit_exe behavioral1/files/0x0008000000017429-27.dat autoit_exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2960 set thread context of 2284 2960 1a407d7c11c58235d559b6f378363840N.exe 41 PID 2892 set thread context of 2388 2892 srvs.exe 134 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1a407d7c11c58235d559b6f378363840N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1a407d7c11c58235d559b6f378363840N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language srvs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language srvs.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2776 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2776 PING.EXE -
Suspicious behavior: EnumeratesProcesses 21 IoCs
pid Process 2960 1a407d7c11c58235d559b6f378363840N.exe 2960 1a407d7c11c58235d559b6f378363840N.exe 2892 srvs.exe 2960 1a407d7c11c58235d559b6f378363840N.exe 2892 srvs.exe 2960 1a407d7c11c58235d559b6f378363840N.exe 2892 srvs.exe 2960 1a407d7c11c58235d559b6f378363840N.exe 2892 srvs.exe 2960 1a407d7c11c58235d559b6f378363840N.exe 2892 srvs.exe 2960 1a407d7c11c58235d559b6f378363840N.exe 2892 srvs.exe 2960 1a407d7c11c58235d559b6f378363840N.exe 2892 srvs.exe 2960 1a407d7c11c58235d559b6f378363840N.exe 2892 srvs.exe 2960 1a407d7c11c58235d559b6f378363840N.exe 2892 srvs.exe 2960 1a407d7c11c58235d559b6f378363840N.exe 2892 srvs.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 2960 1a407d7c11c58235d559b6f378363840N.exe 2960 1a407d7c11c58235d559b6f378363840N.exe 2960 1a407d7c11c58235d559b6f378363840N.exe 2892 srvs.exe 2892 srvs.exe 2892 srvs.exe -
Suspicious use of SendNotifyMessage 6 IoCs
pid Process 2960 1a407d7c11c58235d559b6f378363840N.exe 2960 1a407d7c11c58235d559b6f378363840N.exe 2960 1a407d7c11c58235d559b6f378363840N.exe 2892 srvs.exe 2892 srvs.exe 2892 srvs.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2388 srvs.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2960 wrote to memory of 2100 2960 1a407d7c11c58235d559b6f378363840N.exe 30 PID 2960 wrote to memory of 2100 2960 1a407d7c11c58235d559b6f378363840N.exe 30 PID 2960 wrote to memory of 2100 2960 1a407d7c11c58235d559b6f378363840N.exe 30 PID 2960 wrote to memory of 2100 2960 1a407d7c11c58235d559b6f378363840N.exe 30 PID 2960 wrote to memory of 2360 2960 1a407d7c11c58235d559b6f378363840N.exe 31 PID 2960 wrote to memory of 2360 2960 1a407d7c11c58235d559b6f378363840N.exe 31 PID 2960 wrote to memory of 2360 2960 1a407d7c11c58235d559b6f378363840N.exe 31 PID 2960 wrote to memory of 2360 2960 1a407d7c11c58235d559b6f378363840N.exe 31 PID 2960 wrote to memory of 2824 2960 1a407d7c11c58235d559b6f378363840N.exe 32 PID 2960 wrote to memory of 2824 2960 1a407d7c11c58235d559b6f378363840N.exe 32 PID 2960 wrote to memory of 2824 2960 1a407d7c11c58235d559b6f378363840N.exe 32 PID 2960 wrote to memory of 2824 2960 1a407d7c11c58235d559b6f378363840N.exe 32 PID 2960 wrote to memory of 1988 2960 1a407d7c11c58235d559b6f378363840N.exe 33 PID 2960 wrote to memory of 1988 2960 1a407d7c11c58235d559b6f378363840N.exe 33 PID 2960 wrote to memory of 1988 2960 1a407d7c11c58235d559b6f378363840N.exe 33 PID 2960 wrote to memory of 1988 2960 1a407d7c11c58235d559b6f378363840N.exe 33 PID 2960 wrote to memory of 1688 2960 1a407d7c11c58235d559b6f378363840N.exe 34 PID 2960 wrote to memory of 1688 2960 1a407d7c11c58235d559b6f378363840N.exe 34 PID 2960 wrote to memory of 1688 2960 1a407d7c11c58235d559b6f378363840N.exe 34 PID 2960 wrote to memory of 1688 2960 1a407d7c11c58235d559b6f378363840N.exe 34 PID 2960 wrote to memory of 1668 2960 1a407d7c11c58235d559b6f378363840N.exe 35 PID 2960 wrote to memory of 1668 2960 1a407d7c11c58235d559b6f378363840N.exe 35 PID 2960 wrote to memory of 1668 2960 1a407d7c11c58235d559b6f378363840N.exe 35 PID 2960 wrote to memory of 1668 2960 1a407d7c11c58235d559b6f378363840N.exe 35 PID 2960 wrote to memory of 2956 2960 1a407d7c11c58235d559b6f378363840N.exe 36 PID 2960 wrote to memory of 2956 2960 1a407d7c11c58235d559b6f378363840N.exe 36 PID 2960 wrote to memory of 2956 2960 1a407d7c11c58235d559b6f378363840N.exe 36 PID 2960 wrote to memory of 2956 2960 1a407d7c11c58235d559b6f378363840N.exe 36 PID 2960 wrote to memory of 1080 2960 1a407d7c11c58235d559b6f378363840N.exe 37 PID 2960 wrote to memory of 1080 2960 1a407d7c11c58235d559b6f378363840N.exe 37 PID 2960 wrote to memory of 1080 2960 1a407d7c11c58235d559b6f378363840N.exe 37 PID 2960 wrote to memory of 1080 2960 1a407d7c11c58235d559b6f378363840N.exe 37 PID 2960 wrote to memory of 2652 2960 1a407d7c11c58235d559b6f378363840N.exe 38 PID 2960 wrote to memory of 2652 2960 1a407d7c11c58235d559b6f378363840N.exe 38 PID 2960 wrote to memory of 2652 2960 1a407d7c11c58235d559b6f378363840N.exe 38 PID 2960 wrote to memory of 2652 2960 1a407d7c11c58235d559b6f378363840N.exe 38 PID 2960 wrote to memory of 1872 2960 1a407d7c11c58235d559b6f378363840N.exe 39 PID 2960 wrote to memory of 1872 2960 1a407d7c11c58235d559b6f378363840N.exe 39 PID 2960 wrote to memory of 1872 2960 1a407d7c11c58235d559b6f378363840N.exe 39 PID 2960 wrote to memory of 1872 2960 1a407d7c11c58235d559b6f378363840N.exe 39 PID 2960 wrote to memory of 2300 2960 1a407d7c11c58235d559b6f378363840N.exe 40 PID 2960 wrote to memory of 2300 2960 1a407d7c11c58235d559b6f378363840N.exe 40 PID 2960 wrote to memory of 2300 2960 1a407d7c11c58235d559b6f378363840N.exe 40 PID 2960 wrote to memory of 2300 2960 1a407d7c11c58235d559b6f378363840N.exe 40 PID 2960 wrote to memory of 2284 2960 1a407d7c11c58235d559b6f378363840N.exe 41 PID 2960 wrote to memory of 2284 2960 1a407d7c11c58235d559b6f378363840N.exe 41 PID 2960 wrote to memory of 2284 2960 1a407d7c11c58235d559b6f378363840N.exe 41 PID 2960 wrote to memory of 2284 2960 1a407d7c11c58235d559b6f378363840N.exe 41 PID 2960 wrote to memory of 2284 2960 1a407d7c11c58235d559b6f378363840N.exe 41 PID 2960 wrote to memory of 2284 2960 1a407d7c11c58235d559b6f378363840N.exe 41 PID 2284 wrote to memory of 2568 2284 1a407d7c11c58235d559b6f378363840N.exe 42 PID 2284 wrote to memory of 2568 2284 1a407d7c11c58235d559b6f378363840N.exe 42 PID 2284 wrote to memory of 2568 2284 1a407d7c11c58235d559b6f378363840N.exe 42 PID 2284 wrote to memory of 2568 2284 1a407d7c11c58235d559b6f378363840N.exe 42 PID 2284 wrote to memory of 2568 2284 1a407d7c11c58235d559b6f378363840N.exe 42 PID 2284 wrote to memory of 2568 2284 1a407d7c11c58235d559b6f378363840N.exe 42 PID 2284 wrote to memory of 2568 2284 1a407d7c11c58235d559b6f378363840N.exe 42 PID 2568 wrote to memory of 2776 2568 cmd.exe 44 PID 2568 wrote to memory of 2776 2568 cmd.exe 44 PID 2568 wrote to memory of 2776 2568 cmd.exe 44 PID 2568 wrote to memory of 2776 2568 cmd.exe 44 PID 2568 wrote to memory of 2892 2568 cmd.exe 45 PID 2568 wrote to memory of 2892 2568 cmd.exe 45 PID 2568 wrote to memory of 2892 2568 cmd.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"2⤵PID:2100
-
-
C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"2⤵PID:2360
-
-
C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"2⤵PID:2824
-
-
C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"2⤵PID:1988
-
-
C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"2⤵PID:1688
-
-
C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"2⤵PID:1668
-
-
C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"2⤵PID:2956
-
-
C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"2⤵PID:1080
-
-
C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"2⤵PID:2652
-
-
C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"2⤵PID:1872
-
-
C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"2⤵PID:2300
-
-
C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\install.bat" "3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Windows\SysWOW64\PING.EXEPING 127.0.0.1 -n 24⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2776
-
-
C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"4⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2892 -
C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"5⤵
- Executes dropped EXE
PID:2616
-
-
C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"5⤵
- Executes dropped EXE
PID:2556
-
-
C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"5⤵
- Executes dropped EXE
PID:2576
-
-
C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"5⤵
- Executes dropped EXE
PID:2624
-
-
C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"5⤵
- Executes dropped EXE
PID:2636
-
-
C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"5⤵
- Executes dropped EXE
PID:3052
-
-
C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"5⤵
- Executes dropped EXE
PID:2620
-
-
C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"5⤵
- Executes dropped EXE
PID:2876
-
-
C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"5⤵
- Executes dropped EXE
PID:2896
-
-
C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"5⤵
- Executes dropped EXE
PID:2648
-
-
C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"5⤵
- Executes dropped EXE
PID:2932
-
-
C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"5⤵
- Executes dropped EXE
PID:3040
-
-
C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"5⤵
- Executes dropped EXE
PID:316
-
-
C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"5⤵
- Executes dropped EXE
PID:1880
-
-
C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"5⤵
- Executes dropped EXE
PID:1432
-
-
C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"5⤵
- Executes dropped EXE
PID:1408
-
-
C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"5⤵
- Executes dropped EXE
PID:1956
-
-
C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"5⤵
- Executes dropped EXE
PID:1928
-
-
C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"5⤵
- Executes dropped EXE
PID:264
-
-
C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"5⤵
- Executes dropped EXE
PID:572
-
-
C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"5⤵
- Executes dropped EXE
PID:2268
-
-
C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"5⤵
- Executes dropped EXE
PID:1636
-
-
C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"5⤵
- Executes dropped EXE
PID:2504
-
-
C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"5⤵
- Executes dropped EXE
PID:2520
-
-
C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"5⤵
- Executes dropped EXE
PID:2408
-
-
C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"5⤵
- Executes dropped EXE
PID:604
-
-
C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"5⤵
- Executes dropped EXE
PID:440
-
-
C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"5⤵
- Executes dropped EXE
PID:1168
-
-
C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"5⤵
- Executes dropped EXE
PID:1900
-
-
C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"5⤵
- Executes dropped EXE
PID:1536
-
-
C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"5⤵
- Executes dropped EXE
PID:1772
-
-
C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"5⤵
- Executes dropped EXE
PID:1700
-
-
C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"5⤵
- Executes dropped EXE
PID:2976
-
-
C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"5⤵
- Executes dropped EXE
PID:1084
-
-
C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"5⤵
- Executes dropped EXE
PID:1748
-
-
C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"5⤵
- Executes dropped EXE
PID:904
-
-
C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"5⤵
- Executes dropped EXE
PID:1680
-
-
C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"5⤵
- Executes dropped EXE
PID:2404
-
-
C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"5⤵
- Executes dropped EXE
PID:1388
-
-
C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"5⤵
- Executes dropped EXE
PID:600
-
-
C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"5⤵
- Executes dropped EXE
PID:2080
-
-
C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"5⤵
- Executes dropped EXE
PID:2372
-
-
C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"5⤵
- Executes dropped EXE
PID:2248
-
-
C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"5⤵
- Executes dropped EXE
PID:3064
-
-
C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"5⤵
- Executes dropped EXE
PID:2492
-
-
C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2388
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"2⤵PID:2452
-
-
C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"2⤵PID:2860
-
-
C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"2⤵PID:2940
-
-
C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"2⤵PID:1264
-
-
C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"2⤵PID:2516
-
-
C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"2⤵PID:2928
-
-
C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"2⤵PID:2836
-
-
C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"2⤵PID:2600
-
-
C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"2⤵PID:2000
-
-
C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"2⤵PID:1052
-
-
C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"2⤵PID:696
-
-
C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"2⤵PID:1992
-
-
C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"2⤵PID:1648
-
-
C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"2⤵PID:2072
-
-
C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"2⤵PID:1784
-
-
C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"2⤵PID:2376
-
-
C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"2⤵PID:352
-
-
C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"2⤵PID:624
-
-
C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"2⤵PID:268
-
-
C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"2⤵PID:308
-
-
C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"2⤵PID:1232
-
-
C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"2⤵PID:948
-
-
C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"2⤵PID:2216
-
-
C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"2⤵PID:2304
-
-
C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"2⤵PID:1328
-
-
C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"2⤵PID:2512
-
-
C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"2⤵PID:940
-
-
C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"2⤵PID:664
-
-
C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"2⤵PID:1972
-
-
C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"2⤵PID:1056
-
-
C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"2⤵PID:2056
-
-
C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"2⤵PID:984
-
-
C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"2⤵PID:344
-
-
C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"2⤵PID:3020
-
-
C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"2⤵PID:2252
-
-
C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"2⤵PID:3068
-
-
C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"2⤵PID:2500
-
-
C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"2⤵PID:880
-
-
C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"2⤵PID:2016
-
-
C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"2⤵PID:2320
-
-
C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"2⤵PID:2140
-
-
C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"2⤵PID:3008
-
-
C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"2⤵PID:2424
-
-
C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"2⤵PID:2788
-
-
C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"2⤵PID:892
-
-
C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"2⤵PID:2596
-
-
C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"2⤵PID:2720
-
-
C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"2⤵PID:2676
-
-
C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"2⤵PID:2136
-
-
C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"2⤵PID:2724
-
-
C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"2⤵PID:2592
-
-
C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"2⤵PID:2632
-
-
C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"2⤵PID:2604
-
-
C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"2⤵PID:2820
-
-
C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"2⤵PID:2888
-
-
C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"2⤵PID:2900
-
-
C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"2⤵PID:1236
-
-
C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"2⤵PID:1740
-
-
C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"2⤵PID:1612
-
-
C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"2⤵PID:628
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
101B
MD516561b6804bab596f1cee44c3b88aea7
SHA1e8b3d827a38f17ad04309b1760259558e3722061
SHA256e6f65c9e9b69042c7ac81b8249ca98ba081f71e9025d4e3d700e6f3cea820077
SHA51224eaf7ec5964ce2afa96357ec8d03b655359cf2e4136f2009fee638d32d3e9763d0089dae4a4a9a6826cee8ad587719706e6a75bf1b8f63d3665b9be675a68a4
-
Filesize
64B
MD58c2657c9b64e308e633a005cd276b6cf
SHA14c79763fe05c29f5ad3cfba820386b814fac2581
SHA256749d7d16186b3d8b4d53abdc87a9cf2d6334ec9b5ee5e73e24e9db64937bb0b8
SHA5121c36d996a65316aa979b73d4e9d93edba87ac5f12abf1441d33c2288a3df63f22ad53db81553e613b3447229da5f25e794843c52120c01d59c0d528a63748305
-
Filesize
1.9MB
MD51a407d7c11c58235d559b6f378363840
SHA10b3dc1ec4d896473aae4670310d03c62da9aebd2
SHA256fb67541dcd9e7b88464ad7484f62fae23db0021a07bd0aa0c18aec110af4a5dd
SHA51265b0183a03d88f53d0b9151503ca59e7f841b9504cf586efe84591e3e750374b5ad1ac7d590e620841e134e7717da24ec263df904f5ac3d48bca4039ff663fe7
-
Filesize
103B
MD57a10f112e597d6bc2317f41b888427bd
SHA15ced86ad8f9c50080a59f2425ddb39615622caf7
SHA2562f48612a9514cda737b94c5786373ac3821a4ea94be793397db387eea3296b5e
SHA5126dcb41ba5ebb101e7c891efae20ef8d5dd1d4828a567fa1d2fc26e13dbec00c7f817ec981cc077cfe247c4b5e8a75690809549e36bde48477450150d9eb6e2ed
-
Filesize
1.9MB
MD51ff9b7f08e645b6fd7979789c777443d
SHA1ea436e512bb564992a8fa067a6cfb38ff7252bd4
SHA25657c0bfa0eda5afa7c94aa004d90597ec87560cba8ad1edb10517eb64e44fdf90
SHA512dc78b4af8366a3df2e5c17c927c7b3b65537339ae60e1df49306cc0b26f2d33f836aeb954c8019f17cf6335cc479c5a834366b8139108204621c90b4a26a4ff7