Analysis
-
max time kernel
149s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08-09-2024 10:42
Static task
static1
Behavioral task
behavioral1
Sample
d7b727fc7184a9e106c26aa8b8371271f3962db1ad67b159212bb4428ae8ffc6.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d7b727fc7184a9e106c26aa8b8371271f3962db1ad67b159212bb4428ae8ffc6.exe
Resource
win10v2004-20240802-en
General
-
Target
d7b727fc7184a9e106c26aa8b8371271f3962db1ad67b159212bb4428ae8ffc6.exe
-
Size
1.1MB
-
MD5
d21db1ac63f9e34d3d8b25c76021ff76
-
SHA1
8d178e175e439dff8bf17348cf9ecba4975460b8
-
SHA256
d7b727fc7184a9e106c26aa8b8371271f3962db1ad67b159212bb4428ae8ffc6
-
SHA512
7454e75753bcfe9f28bb1a3bf96def7fc643675f1cc2a40e3cf8b22443c33d56be70794a0d6e2088490faccb315db5bc95f4bb7769f71133fcac1e7219f886d0
-
SSDEEP
24576:aH0dl8myX9Bg42QoXFkrzkmplSgRDYo0lG4Z8r7Qfbkiu5Qd:acallSllG4ZM7QzMW
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2852 svchcst.exe -
Executes dropped EXE 24 IoCs
pid Process 2852 svchcst.exe 532 svchcst.exe 2524 svchcst.exe 2492 svchcst.exe 2784 svchcst.exe 844 svchcst.exe 1376 svchcst.exe 592 svchcst.exe 2648 svchcst.exe 1904 svchcst.exe 340 svchcst.exe 1676 svchcst.exe 2580 svchcst.exe 1088 svchcst.exe 1572 svchcst.exe 2312 svchcst.exe 2448 svchcst.exe 1704 svchcst.exe 920 svchcst.exe 908 svchcst.exe 996 svchcst.exe 1144 svchcst.exe 552 svchcst.exe 1040 svchcst.exe -
Loads dropped DLL 38 IoCs
pid Process 2988 WScript.exe 2988 WScript.exe 2764 WScript.exe 1936 WScript.exe 1936 WScript.exe 1936 WScript.exe 2664 WScript.exe 1932 WScript.exe 2484 WScript.exe 2484 WScript.exe 2448 WScript.exe 2884 WScript.exe 2620 WScript.exe 532 WScript.exe 532 WScript.exe 532 WScript.exe 2912 WScript.exe 2912 WScript.exe 1664 WScript.exe 1664 WScript.exe 2572 WScript.exe 2572 WScript.exe 2068 WScript.exe 2068 WScript.exe 2988 WScript.exe 2988 WScript.exe 1772 WScript.exe 1772 WScript.exe 1732 WScript.exe 1732 WScript.exe 2140 WScript.exe 2140 WScript.exe 1680 WScript.exe 1680 WScript.exe 928 WScript.exe 928 WScript.exe 2960 WScript.exe 2960 WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 50 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d7b727fc7184a9e106c26aa8b8371271f3962db1ad67b159212bb4428ae8ffc6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2404 d7b727fc7184a9e106c26aa8b8371271f3962db1ad67b159212bb4428ae8ffc6.exe 2852 svchcst.exe 2852 svchcst.exe 2852 svchcst.exe 2852 svchcst.exe 2852 svchcst.exe 2852 svchcst.exe 2852 svchcst.exe 2852 svchcst.exe 2852 svchcst.exe 2852 svchcst.exe 2852 svchcst.exe 2852 svchcst.exe 2852 svchcst.exe 2852 svchcst.exe 2852 svchcst.exe 2852 svchcst.exe 2852 svchcst.exe 2852 svchcst.exe 2852 svchcst.exe 2852 svchcst.exe 2852 svchcst.exe 2852 svchcst.exe 2852 svchcst.exe 2852 svchcst.exe 2852 svchcst.exe 2852 svchcst.exe 2852 svchcst.exe 2852 svchcst.exe 2852 svchcst.exe 2852 svchcst.exe 2852 svchcst.exe 2852 svchcst.exe 2852 svchcst.exe 2852 svchcst.exe 2852 svchcst.exe 2852 svchcst.exe 2852 svchcst.exe 2852 svchcst.exe 2852 svchcst.exe 2852 svchcst.exe 2852 svchcst.exe 2852 svchcst.exe 2852 svchcst.exe 2852 svchcst.exe 2852 svchcst.exe 2852 svchcst.exe 2852 svchcst.exe 2852 svchcst.exe 2852 svchcst.exe 2852 svchcst.exe 2852 svchcst.exe 2852 svchcst.exe 2852 svchcst.exe 2852 svchcst.exe 2852 svchcst.exe 2852 svchcst.exe 2852 svchcst.exe 2852 svchcst.exe 2852 svchcst.exe 2852 svchcst.exe 2852 svchcst.exe 2852 svchcst.exe 2852 svchcst.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2404 d7b727fc7184a9e106c26aa8b8371271f3962db1ad67b159212bb4428ae8ffc6.exe -
Suspicious use of SetWindowsHookEx 50 IoCs
pid Process 2404 d7b727fc7184a9e106c26aa8b8371271f3962db1ad67b159212bb4428ae8ffc6.exe 2404 d7b727fc7184a9e106c26aa8b8371271f3962db1ad67b159212bb4428ae8ffc6.exe 2852 svchcst.exe 2852 svchcst.exe 532 svchcst.exe 532 svchcst.exe 2524 svchcst.exe 2524 svchcst.exe 2492 svchcst.exe 2492 svchcst.exe 2784 svchcst.exe 2784 svchcst.exe 844 svchcst.exe 844 svchcst.exe 1376 svchcst.exe 1376 svchcst.exe 592 svchcst.exe 592 svchcst.exe 2648 svchcst.exe 2648 svchcst.exe 1904 svchcst.exe 1904 svchcst.exe 340 svchcst.exe 340 svchcst.exe 1676 svchcst.exe 1676 svchcst.exe 2580 svchcst.exe 2580 svchcst.exe 1088 svchcst.exe 1088 svchcst.exe 1572 svchcst.exe 1572 svchcst.exe 2312 svchcst.exe 2312 svchcst.exe 2448 svchcst.exe 2448 svchcst.exe 1704 svchcst.exe 1704 svchcst.exe 920 svchcst.exe 920 svchcst.exe 908 svchcst.exe 908 svchcst.exe 996 svchcst.exe 996 svchcst.exe 1144 svchcst.exe 1144 svchcst.exe 552 svchcst.exe 552 svchcst.exe 1040 svchcst.exe 1040 svchcst.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2404 wrote to memory of 2988 2404 d7b727fc7184a9e106c26aa8b8371271f3962db1ad67b159212bb4428ae8ffc6.exe 30 PID 2404 wrote to memory of 2988 2404 d7b727fc7184a9e106c26aa8b8371271f3962db1ad67b159212bb4428ae8ffc6.exe 30 PID 2404 wrote to memory of 2988 2404 d7b727fc7184a9e106c26aa8b8371271f3962db1ad67b159212bb4428ae8ffc6.exe 30 PID 2404 wrote to memory of 2988 2404 d7b727fc7184a9e106c26aa8b8371271f3962db1ad67b159212bb4428ae8ffc6.exe 30 PID 2988 wrote to memory of 2852 2988 WScript.exe 33 PID 2988 wrote to memory of 2852 2988 WScript.exe 33 PID 2988 wrote to memory of 2852 2988 WScript.exe 33 PID 2988 wrote to memory of 2852 2988 WScript.exe 33 PID 2852 wrote to memory of 2764 2852 svchcst.exe 34 PID 2852 wrote to memory of 2764 2852 svchcst.exe 34 PID 2852 wrote to memory of 2764 2852 svchcst.exe 34 PID 2852 wrote to memory of 2764 2852 svchcst.exe 34 PID 2764 wrote to memory of 532 2764 WScript.exe 35 PID 2764 wrote to memory of 532 2764 WScript.exe 35 PID 2764 wrote to memory of 532 2764 WScript.exe 35 PID 2764 wrote to memory of 532 2764 WScript.exe 35 PID 532 wrote to memory of 1936 532 svchcst.exe 36 PID 532 wrote to memory of 1936 532 svchcst.exe 36 PID 532 wrote to memory of 1936 532 svchcst.exe 36 PID 532 wrote to memory of 1936 532 svchcst.exe 36 PID 1936 wrote to memory of 2524 1936 WScript.exe 37 PID 1936 wrote to memory of 2524 1936 WScript.exe 37 PID 1936 wrote to memory of 2524 1936 WScript.exe 37 PID 1936 wrote to memory of 2524 1936 WScript.exe 37 PID 2524 wrote to memory of 1944 2524 svchcst.exe 38 PID 2524 wrote to memory of 1944 2524 svchcst.exe 38 PID 2524 wrote to memory of 1944 2524 svchcst.exe 38 PID 2524 wrote to memory of 1944 2524 svchcst.exe 38 PID 1936 wrote to memory of 2492 1936 WScript.exe 39 PID 1936 wrote to memory of 2492 1936 WScript.exe 39 PID 1936 wrote to memory of 2492 1936 WScript.exe 39 PID 1936 wrote to memory of 2492 1936 WScript.exe 39 PID 2492 wrote to memory of 2664 2492 svchcst.exe 40 PID 2492 wrote to memory of 2664 2492 svchcst.exe 40 PID 2492 wrote to memory of 2664 2492 svchcst.exe 40 PID 2492 wrote to memory of 2664 2492 svchcst.exe 40 PID 2664 wrote to memory of 2784 2664 WScript.exe 41 PID 2664 wrote to memory of 2784 2664 WScript.exe 41 PID 2664 wrote to memory of 2784 2664 WScript.exe 41 PID 2664 wrote to memory of 2784 2664 WScript.exe 41 PID 2784 wrote to memory of 1932 2784 svchcst.exe 42 PID 2784 wrote to memory of 1932 2784 svchcst.exe 42 PID 2784 wrote to memory of 1932 2784 svchcst.exe 42 PID 2784 wrote to memory of 1932 2784 svchcst.exe 42 PID 1932 wrote to memory of 844 1932 WScript.exe 43 PID 1932 wrote to memory of 844 1932 WScript.exe 43 PID 1932 wrote to memory of 844 1932 WScript.exe 43 PID 1932 wrote to memory of 844 1932 WScript.exe 43 PID 844 wrote to memory of 2484 844 svchcst.exe 44 PID 844 wrote to memory of 2484 844 svchcst.exe 44 PID 844 wrote to memory of 2484 844 svchcst.exe 44 PID 844 wrote to memory of 2484 844 svchcst.exe 44 PID 2484 wrote to memory of 1376 2484 WScript.exe 45 PID 2484 wrote to memory of 1376 2484 WScript.exe 45 PID 2484 wrote to memory of 1376 2484 WScript.exe 45 PID 2484 wrote to memory of 1376 2484 WScript.exe 45 PID 1376 wrote to memory of 2448 1376 svchcst.exe 46 PID 1376 wrote to memory of 2448 1376 svchcst.exe 46 PID 1376 wrote to memory of 2448 1376 svchcst.exe 46 PID 1376 wrote to memory of 2448 1376 svchcst.exe 46 PID 2448 wrote to memory of 592 2448 WScript.exe 47 PID 2448 wrote to memory of 592 2448 WScript.exe 47 PID 2448 wrote to memory of 592 2448 WScript.exe 47 PID 2448 wrote to memory of 592 2448 WScript.exe 47
Processes
-
C:\Users\Admin\AppData\Local\Temp\d7b727fc7184a9e106c26aa8b8371271f3962db1ad67b159212bb4428ae8ffc6.exe"C:\Users\Admin\AppData\Local\Temp\d7b727fc7184a9e106c26aa8b8371271f3962db1ad67b159212bb4428ae8ffc6.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:532 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"6⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"8⤵
- System Location Discovery: System Language Discovery
PID:1944
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"8⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"9⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"10⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"11⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:844 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"12⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"13⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"14⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"15⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:592 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"16⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2884 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"17⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2648 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"18⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2620 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"19⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1904 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"20⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:532 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"21⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:340 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"22⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2912 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"23⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2580
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"23⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1088 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"24⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1664 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"25⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1572 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"26⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2572 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"27⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2312 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"28⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2068 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"29⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2448 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"30⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2988 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"31⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1704 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"32⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1772 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"33⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:920 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"34⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1732 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"35⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:908 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"36⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2140 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"37⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:996 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"38⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1680 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"39⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1144 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"40⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:928 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"41⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:552 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"42⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2960 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"43⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1040 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"44⤵
- System Location Discovery: System Language Discovery
PID:3032
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"44⤵
- System Location Discovery: System Language Discovery
PID:2876
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"21⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1676 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"22⤵
- System Location Discovery: System Language Discovery
PID:1716
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92B
MD567b9b3e2ded7086f393ebbc36c5e7bca
SHA1e6299d0450b9a92a18cc23b5704a2b475652c790
SHA25644063c266686263f14cd2a83fee124fb3e61a9171a6aab69709464f49511011d
SHA512826fbc9481f46b1ae3db828a665c55c349023caf563e6e8c17321f5f3af3e4c3914955db6f0eebfc6defe561315435d47310b4d0499ab9c2c85bb61264dedc09
-
Filesize
696B
MD516b9011648a577741b7fb4a55f1eeaac
SHA1b0d86d1cf62b882bf28f0897ddb610e41cc6814c
SHA2567bf3fbb9962c054e651caf4e49fa468d5892cb0bf88f4bbf3fd85b372a7d173c
SHA5121d8631904aa2df5a90aef858d4369ed53d0075f97b42361a8e05c9a64f8e6a786897b625b1230d20415f3923db8aa5d8f5f619b7b9084202fecf4e7cead4366d
-
Filesize
753B
MD539b8335fd9082596611654a06bd795fa
SHA1434117cef5048942f719852974d3dbad5c694927
SHA2563c3c5176e577971a7e6bfabe7090aa1e73795a5108900bae8319d725725a1f0a
SHA51214e4ac6c71b55d49151086db3664e0d7afb3df2744b29d75fdc1b33557f1287c82698d6dec89bcf9bce983179f514ac90143667b68fea7a43fc2e7d660c66ff4
-
Filesize
696B
MD5aac0fba8016aa15609aa7abb5db077ae
SHA1f8afa6ff11a91f46eb961727ec6a5fad360fa1c9
SHA25676a6ce5f2e579dc37db23bb0e1ef5ebdd8b02e6b22b6f8da1a17964db237a8a0
SHA51226a4910f08563b7c4b1e1abba82fefdefcb43b7d1149d5e6c7dda36db4aa142c4b74bc64263f23a5177804e2191696795e0de5d5368ea6903b398415d435962e
-
Filesize
696B
MD51cd04c63c025f0297f2ae60e978d92a1
SHA1047246564f4b2ab71494a82cef25f5bcdeb63469
SHA256c5d481502d8e9429512066a0eb058459e0d7d60fbfc4aed5169b3ea47966c9ed
SHA512dede45f2ae3b7da526e64e82f5e550d9f29d7ad0409fe97a0067bcd8ad70859a8f05441dcad0f2364710f8d9bf58997ffea6874b4797948b61486570394325a6
-
Filesize
696B
MD553586000e76ee6942df430b8716b4616
SHA197afd48071b6043c0a04b823875956b98a8d33bd
SHA256486e66f5aafdb179f41e1d1f39c8fb5662bfad43d5d53dfa89405a04b0d42d69
SHA5123a9a94289a667899d5ba7db41486854b9234929ecaa9d9aaff3188740cc084c0a633702be218f4b1a8afbfbd8a4e1a892eebbdfde1a7d3fb9c27c3482aa03bd7
-
Filesize
696B
MD541bdc303960afcda8ebae4f3e29f0b52
SHA14cbf649fb04c836614138308a06ecd48dcb2882d
SHA256da674cdbd4dd762cc32ce0bd2ec36929a626e0e87f7ab7a4a1b1e1ce0123d999
SHA512800b5b01cc41e7633f203579e7f6ec0a9f6408f7af79dcfa74596be9264dbb8baade6b1439dedb5194496aa27b8b0e2680ce65ad91032138ea0ac2c8a0872cf1
-
Filesize
696B
MD5251a70f0c55d02e74e34c409c5795274
SHA1b0eb587b5e8d597ef801848722b790692d804be2
SHA256f5397f02a6c8c59bc9869c0e5c726c096a69c84ad7f0934608fdbd8bc7e5b9f3
SHA512023cca65a97265961790183f43605fb3dd47426049f2152e5ed90d2daed98607d1e215cb8cabf54d7d2068f7a86d3b01b1d101823e8ed1acfb09076e69b67c71
-
Filesize
696B
MD581da78e4c29b5abf222c1425d1b8da16
SHA1c68fae858982c6217d14f0a94f1e424dc47e5abb
SHA256e1c0bac8ec1a6de7acf76dbaae7862a630d01697c06843f75330f8be29261f38
SHA512859ff4f8d8119e4a12c83c8aa7a7c392b9bde66358d189f67f0d44ae6777f75dd7f994536d812cb00f0612a9c4444a3775ff729512d50c1a6173f23b5866fdb0
-
Filesize
696B
MD50e6005a9dcb5a78d6fdd54527602f926
SHA190adc62e99f3c94c643596af0e17b5853b91fe1f
SHA256847552b1ad30bd72f24acfe4afa5c326d3e79d7c2f147c958d72e92daca716da
SHA512b4acfd81c1e926fcd305690aa3780bbec50460bcf947d17c20d6445faca4e774294b9da3a144207ccb3855e3ea2008a2d82ef691f32a4db6c7c3eb8202c6b568
-
Filesize
696B
MD5608aea68519434d685c413b31a12c6ce
SHA17a62e13cab985d0588a0faea63751fd0355da7fc
SHA2565ed3aa382febd7a4e6c3a921a5add055f6e2bbea7558b21da46752f037d52b1a
SHA5126ddca4b85fc1b6ecb6c1081b32067eb438ed5167b48565ea449e6babb1f27a01c75599c6b0f10b29ac9278e619891588d654466ce882d8080f4d2435f450d198
-
Filesize
696B
MD53353d1633bca569636039038a518d927
SHA1780e7b0504ce0c3eb7a2d5ab9cc18b9d0596bd34
SHA2566f9daffcca457b49869f9b22fe00e63b4c232c9e13998ab908b91909aa446b8d
SHA51266a8b0877d6c6f196b85b4e8bf7d67da20fd3749543d65b54599233fc68f476445e70f9ad8e54cb3a71676c6b8a51957f11df2442883f1283c6d526884ec0c18
-
Filesize
696B
MD5c0b5050d31a3c3086d56cf03dbf39e65
SHA12f16721133b7efffc3b7c495803a409b47223c1f
SHA2564eed6a5c4f010b8604f822c91683ba0cf9c2c1f7fd803bcd9c05bfd36d84f37a
SHA512be8a9ade498e5b54e7ca07bb3f9f114962847942d282e46e2b4f3e53704b27b47853c7bc60e5fdfc777b6e1fa2f8d34aa0d3321354c8a6b81d1640ce7780d9d5
-
Filesize
1.1MB
MD53e8f3295e6837cc64b3ef09e0e9c51f2
SHA1bd76ca50ad1f76413e1dc5a26ec69db535f2ca1f
SHA25699531a6b8899f451860ecbe2ef9cbae961569f33fc0e82431665546055f74d40
SHA512097b06acf5d80306691f0f848c39ec9c504020e82a5691ecb798e4662e556d134db4d05f851c4c8b37bf678fd154a200605a1c3d2b41fbb88c08cd2f589848cf
-
Filesize
1.1MB
MD5f53961b9e2e85ff0e45386d6bd21b6d3
SHA134919f7073a8ed19d433d73430b344603e6844dd
SHA256568b3c893be95fc874b1f47eb3a2f7c8397765d7f122e30ea020c46f1db1afaf
SHA512a633658a9356280b66b799ad54d4cb0256b638f0258368ed4ad2917b10a0776d512364ac29120b57e84471575a7d2144f61d475b61604749f87373ba7fb20bbc
-
Filesize
1.1MB
MD594c6be8c774e00483bea7d9bcb8a5af0
SHA122c4ac61870ecf40510ad6e3664c0f561e67265c
SHA256367164b263748bc8fcd559417857b5f0ff5bd50de9e9cc20596990cbcb10f983
SHA512ed62b06fd43cdcb685a4ba5a13116cea78746e91a11efb9c0ee286ec5fbf529c34687ae694f1701c2bdf02c889bb5ae99b470cf4a6ca752350364ca0428c2c00
-
Filesize
1.1MB
MD54be00906a9ff3ce202ec3a4d20daf7ca
SHA1126ad3bd0f0ee213531a447a6851c2ef9f643040
SHA2564756d0659a14bdd449d04dbe98a737534fc322a19de4a3ef21fafa3abdb89d42
SHA5121fa9ab0d15c4fa89bdd4661af63f4e9f781fe31cc5eda6196816d218cda8c07216b868cac4cad0f6df0d6e1969bce458f7f89378dc7a69e56a83412eae0c2814