Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
79s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 19:36
Static task
static1
Behavioral task
behavioral1
Sample
01c6b3248d17b5ef9d712cbeaea233624a728592839b572140144a40e71cde6a.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
01c6b3248d17b5ef9d712cbeaea233624a728592839b572140144a40e71cde6a.exe
Resource
win10v2004-20240802-en
General
-
Target
01c6b3248d17b5ef9d712cbeaea233624a728592839b572140144a40e71cde6a.exe
-
Size
1.1MB
-
MD5
2e788badf8885c5f3a3644c05ca3a2b6
-
SHA1
f7b531e1ae2312ded4c85feef533042701932b94
-
SHA256
01c6b3248d17b5ef9d712cbeaea233624a728592839b572140144a40e71cde6a
-
SHA512
7ae109c68ba8e385b7bb3b0106f6d211ffd709b837c8efedcb96dfe67a9392480b923f971f9880e5805cf3daf70ed3400867a2bd96b9b79b64e87f6b307e6414
-
SSDEEP
24576:aH0dl8myX9Bg42QoXFkrzkmplSgRDYo0lG4Z8r7Qfbkiu5Qy:acallSllG4ZM7QzMh
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2788 svchcst.exe -
Executes dropped EXE 17 IoCs
pid Process 2788 svchcst.exe 1096 svchcst.exe 2056 svchcst.exe 1152 svchcst.exe 1800 svchcst.exe 2100 svchcst.exe 1552 svchcst.exe 2668 svchcst.exe 2568 svchcst.exe 2492 svchcst.exe 1912 svchcst.exe 664 svchcst.exe 428 svchcst.exe 112 svchcst.exe 1332 svchcst.exe 1716 svchcst.exe 2824 svchcst.exe -
Loads dropped DLL 25 IoCs
pid Process 2484 WScript.exe 2484 WScript.exe 2592 WScript.exe 2592 WScript.exe 2324 WScript.exe 2324 WScript.exe 2728 WScript.exe 1784 WScript.exe 1048 WScript.exe 1048 WScript.exe 1784 WScript.exe 2468 WScript.exe 2548 WScript.exe 2120 WScript.exe 2120 WScript.exe 2120 WScript.exe 1736 WScript.exe 2324 WScript.exe 2324 WScript.exe 1560 WScript.exe 1560 WScript.exe 1560 WScript.exe 1560 WScript.exe 2928 WScript.exe 2928 WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 36 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 01c6b3248d17b5ef9d712cbeaea233624a728592839b572140144a40e71cde6a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1856 01c6b3248d17b5ef9d712cbeaea233624a728592839b572140144a40e71cde6a.exe 2788 svchcst.exe 2788 svchcst.exe 2788 svchcst.exe 2788 svchcst.exe 2788 svchcst.exe 2788 svchcst.exe 2788 svchcst.exe 2788 svchcst.exe 2788 svchcst.exe 2788 svchcst.exe 2788 svchcst.exe 2788 svchcst.exe 2788 svchcst.exe 2788 svchcst.exe 2788 svchcst.exe 2788 svchcst.exe 2788 svchcst.exe 2788 svchcst.exe 2788 svchcst.exe 2788 svchcst.exe 2788 svchcst.exe 2788 svchcst.exe 2788 svchcst.exe 2788 svchcst.exe 2788 svchcst.exe 2788 svchcst.exe 2788 svchcst.exe 2788 svchcst.exe 2788 svchcst.exe 2788 svchcst.exe 2788 svchcst.exe 2788 svchcst.exe 2788 svchcst.exe 2788 svchcst.exe 2788 svchcst.exe 2788 svchcst.exe 2788 svchcst.exe 2788 svchcst.exe 2788 svchcst.exe 2788 svchcst.exe 2788 svchcst.exe 2788 svchcst.exe 2788 svchcst.exe 2788 svchcst.exe 2788 svchcst.exe 2788 svchcst.exe 2788 svchcst.exe 2788 svchcst.exe 2788 svchcst.exe 2788 svchcst.exe 2788 svchcst.exe 2788 svchcst.exe 2788 svchcst.exe 2788 svchcst.exe 2788 svchcst.exe 2788 svchcst.exe 2788 svchcst.exe 2788 svchcst.exe 2788 svchcst.exe 2788 svchcst.exe 2788 svchcst.exe 2788 svchcst.exe 2788 svchcst.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1856 01c6b3248d17b5ef9d712cbeaea233624a728592839b572140144a40e71cde6a.exe -
Suspicious use of SetWindowsHookEx 36 IoCs
pid Process 1856 01c6b3248d17b5ef9d712cbeaea233624a728592839b572140144a40e71cde6a.exe 1856 01c6b3248d17b5ef9d712cbeaea233624a728592839b572140144a40e71cde6a.exe 2788 svchcst.exe 2788 svchcst.exe 1096 svchcst.exe 1096 svchcst.exe 2056 svchcst.exe 2056 svchcst.exe 1152 svchcst.exe 1152 svchcst.exe 1800 svchcst.exe 1800 svchcst.exe 2100 svchcst.exe 2100 svchcst.exe 1552 svchcst.exe 1552 svchcst.exe 2668 svchcst.exe 2668 svchcst.exe 2568 svchcst.exe 2568 svchcst.exe 2492 svchcst.exe 2492 svchcst.exe 1912 svchcst.exe 1912 svchcst.exe 664 svchcst.exe 664 svchcst.exe 428 svchcst.exe 428 svchcst.exe 112 svchcst.exe 112 svchcst.exe 1332 svchcst.exe 1332 svchcst.exe 1716 svchcst.exe 1716 svchcst.exe 2824 svchcst.exe 2824 svchcst.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1856 wrote to memory of 2484 1856 01c6b3248d17b5ef9d712cbeaea233624a728592839b572140144a40e71cde6a.exe 30 PID 1856 wrote to memory of 2484 1856 01c6b3248d17b5ef9d712cbeaea233624a728592839b572140144a40e71cde6a.exe 30 PID 1856 wrote to memory of 2484 1856 01c6b3248d17b5ef9d712cbeaea233624a728592839b572140144a40e71cde6a.exe 30 PID 1856 wrote to memory of 2484 1856 01c6b3248d17b5ef9d712cbeaea233624a728592839b572140144a40e71cde6a.exe 30 PID 2484 wrote to memory of 2788 2484 WScript.exe 33 PID 2484 wrote to memory of 2788 2484 WScript.exe 33 PID 2484 wrote to memory of 2788 2484 WScript.exe 33 PID 2484 wrote to memory of 2788 2484 WScript.exe 33 PID 2788 wrote to memory of 2592 2788 svchcst.exe 34 PID 2788 wrote to memory of 2592 2788 svchcst.exe 34 PID 2788 wrote to memory of 2592 2788 svchcst.exe 34 PID 2788 wrote to memory of 2592 2788 svchcst.exe 34 PID 2592 wrote to memory of 1096 2592 WScript.exe 35 PID 2592 wrote to memory of 1096 2592 WScript.exe 35 PID 2592 wrote to memory of 1096 2592 WScript.exe 35 PID 2592 wrote to memory of 1096 2592 WScript.exe 35 PID 1096 wrote to memory of 2324 1096 svchcst.exe 36 PID 1096 wrote to memory of 2324 1096 svchcst.exe 36 PID 1096 wrote to memory of 2324 1096 svchcst.exe 36 PID 1096 wrote to memory of 2324 1096 svchcst.exe 36 PID 2324 wrote to memory of 2056 2324 WScript.exe 37 PID 2324 wrote to memory of 2056 2324 WScript.exe 37 PID 2324 wrote to memory of 2056 2324 WScript.exe 37 PID 2324 wrote to memory of 2056 2324 WScript.exe 37 PID 2056 wrote to memory of 2940 2056 svchcst.exe 38 PID 2056 wrote to memory of 2940 2056 svchcst.exe 38 PID 2056 wrote to memory of 2940 2056 svchcst.exe 38 PID 2056 wrote to memory of 2940 2056 svchcst.exe 38 PID 2056 wrote to memory of 2728 2056 svchcst.exe 39 PID 2056 wrote to memory of 2728 2056 svchcst.exe 39 PID 2056 wrote to memory of 2728 2056 svchcst.exe 39 PID 2056 wrote to memory of 2728 2056 svchcst.exe 39 PID 2728 wrote to memory of 1152 2728 WScript.exe 40 PID 2728 wrote to memory of 1152 2728 WScript.exe 40 PID 2728 wrote to memory of 1152 2728 WScript.exe 40 PID 2728 wrote to memory of 1152 2728 WScript.exe 40 PID 1152 wrote to memory of 1784 1152 svchcst.exe 41 PID 1152 wrote to memory of 1784 1152 svchcst.exe 41 PID 1152 wrote to memory of 1784 1152 svchcst.exe 41 PID 1152 wrote to memory of 1784 1152 svchcst.exe 41 PID 1152 wrote to memory of 1048 1152 svchcst.exe 42 PID 1152 wrote to memory of 1048 1152 svchcst.exe 42 PID 1152 wrote to memory of 1048 1152 svchcst.exe 42 PID 1152 wrote to memory of 1048 1152 svchcst.exe 42 PID 1784 wrote to memory of 1800 1784 WScript.exe 43 PID 1784 wrote to memory of 1800 1784 WScript.exe 43 PID 1784 wrote to memory of 1800 1784 WScript.exe 43 PID 1784 wrote to memory of 1800 1784 WScript.exe 43 PID 1048 wrote to memory of 2100 1048 WScript.exe 44 PID 1048 wrote to memory of 2100 1048 WScript.exe 44 PID 1048 wrote to memory of 2100 1048 WScript.exe 44 PID 1048 wrote to memory of 2100 1048 WScript.exe 44 PID 1800 wrote to memory of 2988 1800 svchcst.exe 45 PID 1800 wrote to memory of 2988 1800 svchcst.exe 45 PID 1800 wrote to memory of 2988 1800 svchcst.exe 45 PID 1800 wrote to memory of 2988 1800 svchcst.exe 45 PID 1784 wrote to memory of 1552 1784 WScript.exe 46 PID 1784 wrote to memory of 1552 1784 WScript.exe 46 PID 1784 wrote to memory of 1552 1784 WScript.exe 46 PID 1784 wrote to memory of 1552 1784 WScript.exe 46 PID 1552 wrote to memory of 2468 1552 svchcst.exe 47 PID 1552 wrote to memory of 2468 1552 svchcst.exe 47 PID 1552 wrote to memory of 2468 1552 svchcst.exe 47 PID 1552 wrote to memory of 2468 1552 svchcst.exe 47
Processes
-
C:\Users\Admin\AppData\Local\Temp\01c6b3248d17b5ef9d712cbeaea233624a728592839b572140144a40e71cde6a.exe"C:\Users\Admin\AppData\Local\Temp\01c6b3248d17b5ef9d712cbeaea233624a728592839b572140144a40e71cde6a.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"6⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"8⤵
- System Location Discovery: System Language Discovery
PID:2940
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"8⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"9⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"10⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"11⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"12⤵
- System Location Discovery: System Language Discovery
PID:2988
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"11⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"12⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2468 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"13⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2668 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"14⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2548 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"15⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2568 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"16⤵
- System Location Discovery: System Language Discovery
PID:1936
-
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"14⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2120 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"15⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2492
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"15⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1912 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"16⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1736 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"17⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:664
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"16⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2324 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"17⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:428
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"17⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:112 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"18⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1560 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"19⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1332 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"20⤵
- System Location Discovery: System Language Discovery
PID:1500
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"19⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1716 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"20⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2928 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"21⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2824 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"22⤵PID:2836
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"23⤵PID:2328
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"24⤵PID:1444
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"25⤵PID:1908
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"26⤵PID:2880
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"27⤵PID:284
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"28⤵PID:1988
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"29⤵PID:112
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"30⤵PID:3016
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"31⤵PID:2256
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"32⤵PID:2524
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"33⤵PID:2232
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"34⤵PID:3008
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"35⤵PID:1560
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"36⤵PID:2240
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"37⤵PID:800
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"38⤵PID:2008
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"39⤵PID:2560
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"40⤵PID:2448
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"41⤵PID:2184
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"42⤵PID:2208
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"43⤵PID:1616
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"44⤵PID:924
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"22⤵PID:2668
-
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"20⤵
- System Location Discovery: System Language Discovery
PID:2464
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"10⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"11⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2100
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92B
MD567b9b3e2ded7086f393ebbc36c5e7bca
SHA1e6299d0450b9a92a18cc23b5704a2b475652c790
SHA25644063c266686263f14cd2a83fee124fb3e61a9171a6aab69709464f49511011d
SHA512826fbc9481f46b1ae3db828a665c55c349023caf563e6e8c17321f5f3af3e4c3914955db6f0eebfc6defe561315435d47310b4d0499ab9c2c85bb61264dedc09
-
Filesize
753B
MD5c0d36ac57cfb4697aeab06acf3791b84
SHA1df65f48001735ec766af26b42e0eed9c634a6123
SHA25687c0e066d7702372cd967aff6b1b9e6f1ce5e95bcf2435c58ad37cbca3759937
SHA512f3c210a0e320442ce77c33c2c3b3f15f6140b20d17c59f0028304c4ef0e7b68e97d6d067e04c9eea4f9c008ff6e9562ffab1afd6434abeec773e43d4afe8a1c6
-
Filesize
696B
MD59627e3850f4f7495f6d36ebae56aa594
SHA1001694633bc632a7ae2812ed74828335bec77531
SHA2560aeaf02fb74a0799c8eccaa37e1586435318608e7945b8084fe87f956822cb25
SHA51203986ee3b4faf96fdb2bdeb1c41e216c81e1c0f7d4403b69c7e7e39baa45e2806d57fad32904bdf04728eb9db7570d94341e73bf8a1f6ba1964072a65de4e894
-
Filesize
696B
MD530eafc82ac9962314c98d54ef2588957
SHA13bf1e1f24264448ba2688366b10b083c808e1e7a
SHA256fc93c94af2daa9c8b70b9f6104f613a1cf0ac39bf1856542a3dbb6f828d2bee6
SHA5125cd90109e61e06fda91874fd3cd28d83b42b6e586446ce99cf69a611f0015f56010937fadca4accef57ab47b5bca54b4171479a9a989ab5b1a015d491f985fb5
-
Filesize
696B
MD5251a70f0c55d02e74e34c409c5795274
SHA1b0eb587b5e8d597ef801848722b790692d804be2
SHA256f5397f02a6c8c59bc9869c0e5c726c096a69c84ad7f0934608fdbd8bc7e5b9f3
SHA512023cca65a97265961790183f43605fb3dd47426049f2152e5ed90d2daed98607d1e215cb8cabf54d7d2068f7a86d3b01b1d101823e8ed1acfb09076e69b67c71
-
Filesize
696B
MD5d7e57302723e6adcd36bc753c7cb3d1b
SHA124f5af99f2988b5fa7383dae1f53347b597956a3
SHA256abf7ef48d31eaabd0227b0a91a44e8b53e9fbadff16ef2d9c2b131776898977e
SHA5120aee51cab495d2df1e1957f85cbfa1a8ca95fad5fa669d2f0918a0e4be4d090c868582935136684d872695bdd075523ad1386639690e9d7016201b6985a9c8a6
-
Filesize
696B
MD51931659cf1a0b565c26fde26192e60ea
SHA1290204916cf2bd320dd6af5de4fea33f4b987a23
SHA2568d4ff60de30d55f81dda162ccf8ad556e3a1c9a9e20260d8a767def90595191a
SHA5129a90635a350ecaf5d4f9c5787f4079e90d6e2983b87e8dc6db38a2d0121e68422d2fc8c7e322c0b6556cd92870713380edf55950260e9369350e96d4603f390e
-
Filesize
696B
MD573dd42e0ba8cff47f0542d7d8aa40f90
SHA1ffbb1b56415be5abcf4613aed3136768f2edbc38
SHA256c73b4e554a4ae515ae3aa320a19d752e3d848d00ed0cd8f084081ed530b8fc3d
SHA512efd0075f9e70dd557271bdbcd782a083ae2cde8cd5674bf7f8cf63064847951adfcbaa9c9cff91c57d19c7308d0b7bf4754bfbe8fce6ec0e41d920bde7f5a67e
-
Filesize
696B
MD5e74576d29f1c1a7185cdf1e12b96a260
SHA1f76ee203cb56b7dda62a2947ff1e2fc954efa777
SHA256e31ecb9dcf31c19fbd131b31e5191375f7aeb708ffa678363de99e118715eb65
SHA512934e3a9171de8fe03c9b398b4e79b3eee77845750ba2b0d16c3a38bc8299d3d72643cedfbb025df848f4c5ab302f5d4b145da13c2ac3ed96bdc1658791d4f5bb
-
Filesize
696B
MD533923002ff087d4e9d20dc9167bf4b6f
SHA1cd218dc8073081f7329889f96e1159c6d11fb8a1
SHA256f24781ed9f535b0d29cbef666b2e299ee84ab75c48fd47bfdf0e9c2beaa0796e
SHA512628c465e3ebed9b3ad689a6fa1fe38d3194c69a7446320408c28667acd49a157b853f734325e828a1577810393d0f9e69b6719bd7c201816ef0f06219a26534c
-
Filesize
696B
MD55ef4272f4d6f345fc8cc1b2f059c81b4
SHA178bcb559f775d70e10396e1d6d7b95c28d2645d1
SHA25619f8d5209b4a5789cdfd5b67cb0b9f6c3546c62912bcb1ef1c69a15602beb652
SHA512002693255c600456d965b5a7e36f780deec4d80cd9fe56f7f974b8762e2b140002a1dabf4b059d6163c9cc00a0e1e9da71899e13347fb4bb2985bbc7058469cb
-
Filesize
696B
MD51af246ca0660faf0fa7da4b4c9c61316
SHA1c050b0bd311f2e5240cd7e9df583e41b133e9521
SHA2562b84bcefb62d7564e2e7d1be8105a26f798b4c73cca142c054da02262f61ede8
SHA5123fadf6605620aea1f9c9e94d62193fc416af6d5272bc675d399ea1ea96a070b4de69cab61736cea89c744ce3b203f0790d617789d25811a6ca535fc9f6159793
-
Filesize
696B
MD5efa4b9f79f0e80cc4480b4196f965c98
SHA156401c277c2e9c8111a865c9225b943fc4a7433b
SHA2565db1107f337e47becfbcacfdc107678db82fb69fc4a9a1341c0decacff5146c3
SHA512c3b3f2cd4b0a7257fcb391a7defee9a0db1650febb3dab466732bf81cdec9a8bbfb9e28afd2ffff03d57f2cd2be8adc8da67abeb39e295c94b3dd536fb092180
-
Filesize
1.1MB
MD5a60b5e4992b3a0c72668f764bc5b0c2a
SHA1e5b4372225a3272d8199430aad2773dd647a8b45
SHA2566fde9eae2017ebe59de7f28b7cfcdb1038ad92231eb9fdf2c01643ebd96e193a
SHA512beb08f213c86d209c5afe621001d350f4f959b754ab20952952e56edadca22bbe66f67f9bed94c91fd3dc718989da19f6a94ef836a36f2b5710af2fd07c4408a
-
Filesize
1.1MB
MD53eeee7ed1abf2d71a5c552ec8a4eb39a
SHA113eaf984b180bb69fab8d5fe18532c534be3a749
SHA2563c40b0c4d24492cb59042fc242cbdfabebf0590626150e0583fb513a3790f4ae
SHA512ff23864952ed8804b72c201abab9f24f23c1662e8a84a4bb310b046a1de4f441c797a67b5f117e89a552047d3911043fd09ebd1397edc68859589828fd690330
-
Filesize
1.1MB
MD52fb90bf6daca0cdab23bf41370150ab8
SHA16a5378bae83a6763e4389dc9947d1324b3d303f2
SHA256dc8e2a6ae9aad59ccc79de9db54842891bcefb44a243c674389fcb4076f0eb3e
SHA51249f3492b440f76e55a62e469ff8d076aa05679e7f675fcecd2442a83960da547c08c24ddfee66dc3cecb7c75cd411fb01fedb364c4e0ac17d5a9862478261f85
-
Filesize
1.1MB
MD536d603d2e7b6832d103607ccaeab3854
SHA146d576b9b98d2c4b94ce39050af65dd813f3e4b2
SHA256e78424e876694082f9393416bf13b2ae936b0e11f23b4176aa81b0343acf1e3b
SHA5120705ceb994483c2187f8b8c0add0bc66d5ccb3f82b8922ff9c19704a3c95bfa93f1f253dec755359e35c08a2a95674fd41d3b318e9d3e24bcc6e84883c9e2a74
-
Filesize
1.1MB
MD5a82147ab9c6c3068ee3f7a73378f64e4
SHA10c3c7b240aea1df58565f1abad387d59940d098a
SHA25687d4a9ed341088edd0df53dd4dd45a1daf919b2615ae95629b604d95ff198da3
SHA512a0c9719f8128abb361415a7a353fe7fba95b289bf8ca4c75fc7b85aa15a0d39f7796e9893625f9d4338d7b9c36614db441e68a8733c1e8608de4d5188a2eb385