Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-09-2024 09:58
Static task
static1
Behavioral task
behavioral1
Sample
a7e3093229b3f23643d5a089f26130bd73ae2a0fed9b770870a9930b2dc43e81.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a7e3093229b3f23643d5a089f26130bd73ae2a0fed9b770870a9930b2dc43e81.exe
Resource
win10v2004-20240802-en
General
-
Target
a7e3093229b3f23643d5a089f26130bd73ae2a0fed9b770870a9930b2dc43e81.exe
-
Size
1.1MB
-
MD5
87b6af31283308e9435d8de4020f735a
-
SHA1
d95e4c0a3e9d9c72eee68fa7dfd2b475ad8aa988
-
SHA256
a7e3093229b3f23643d5a089f26130bd73ae2a0fed9b770870a9930b2dc43e81
-
SHA512
b2de0ae35370d6e4fb3a84a52e16aaf2536d82664b2cd1474ee5ce5f1a8281ec23f45a64163ce601abb199e30a29037dd26943305704dbcfddfbd771c0763986
-
SSDEEP
24576:aH0dl8myX9Bg42QoXFkrzkmplSgRDYo0lG4Z8r7Qfbkiu5Q8:acallSllG4ZM7QzMr
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3044 svchcst.exe -
Executes dropped EXE 25 IoCs
pid Process 3044 svchcst.exe 2324 svchcst.exe 1328 svchcst.exe 572 svchcst.exe 1084 svchcst.exe 2404 svchcst.exe 744 svchcst.exe 488 svchcst.exe 2772 svchcst.exe 2640 svchcst.exe 2724 svchcst.exe 2864 svchcst.exe 2016 svchcst.exe 3016 svchcst.exe 2256 svchcst.exe 772 svchcst.exe 2636 svchcst.exe 2672 svchcst.exe 1800 svchcst.exe 2508 svchcst.exe 1608 svchcst.exe 1088 svchcst.exe 2588 svchcst.exe 988 svchcst.exe 796 svchcst.exe -
Loads dropped DLL 41 IoCs
pid Process 1812 WScript.exe 1812 WScript.exe 2900 WScript.exe 3000 WScript.exe 3000 WScript.exe 3000 WScript.exe 3016 WScript.exe 2188 WScript.exe 680 WScript.exe 788 WScript.exe 788 WScript.exe 1148 WScript.exe 2624 WScript.exe 2624 WScript.exe 2624 WScript.exe 2604 WScript.exe 444 WScript.exe 444 WScript.exe 2092 WScript.exe 2092 WScript.exe 1940 WScript.exe 1924 WScript.exe 1924 WScript.exe 2188 WScript.exe 2188 WScript.exe 1568 WScript.exe 1568 WScript.exe 2848 WScript.exe 2848 WScript.exe 2228 WScript.exe 2228 WScript.exe 2444 WScript.exe 2444 WScript.exe 1360 WScript.exe 1360 WScript.exe 620 WScript.exe 620 WScript.exe 564 WScript.exe 564 WScript.exe 788 WScript.exe 788 WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 52 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a7e3093229b3f23643d5a089f26130bd73ae2a0fed9b770870a9930b2dc43e81.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1144 a7e3093229b3f23643d5a089f26130bd73ae2a0fed9b770870a9930b2dc43e81.exe 3044 svchcst.exe 3044 svchcst.exe 3044 svchcst.exe 3044 svchcst.exe 3044 svchcst.exe 3044 svchcst.exe 3044 svchcst.exe 3044 svchcst.exe 3044 svchcst.exe 3044 svchcst.exe 3044 svchcst.exe 3044 svchcst.exe 3044 svchcst.exe 3044 svchcst.exe 3044 svchcst.exe 3044 svchcst.exe 3044 svchcst.exe 3044 svchcst.exe 3044 svchcst.exe 3044 svchcst.exe 3044 svchcst.exe 3044 svchcst.exe 3044 svchcst.exe 3044 svchcst.exe 3044 svchcst.exe 3044 svchcst.exe 3044 svchcst.exe 3044 svchcst.exe 3044 svchcst.exe 3044 svchcst.exe 3044 svchcst.exe 3044 svchcst.exe 3044 svchcst.exe 3044 svchcst.exe 3044 svchcst.exe 3044 svchcst.exe 3044 svchcst.exe 3044 svchcst.exe 3044 svchcst.exe 3044 svchcst.exe 3044 svchcst.exe 3044 svchcst.exe 3044 svchcst.exe 3044 svchcst.exe 3044 svchcst.exe 3044 svchcst.exe 3044 svchcst.exe 3044 svchcst.exe 3044 svchcst.exe 3044 svchcst.exe 3044 svchcst.exe 3044 svchcst.exe 3044 svchcst.exe 3044 svchcst.exe 3044 svchcst.exe 3044 svchcst.exe 3044 svchcst.exe 3044 svchcst.exe 3044 svchcst.exe 3044 svchcst.exe 3044 svchcst.exe 3044 svchcst.exe 3044 svchcst.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1144 a7e3093229b3f23643d5a089f26130bd73ae2a0fed9b770870a9930b2dc43e81.exe -
Suspicious use of SetWindowsHookEx 52 IoCs
pid Process 1144 a7e3093229b3f23643d5a089f26130bd73ae2a0fed9b770870a9930b2dc43e81.exe 1144 a7e3093229b3f23643d5a089f26130bd73ae2a0fed9b770870a9930b2dc43e81.exe 3044 svchcst.exe 3044 svchcst.exe 2324 svchcst.exe 2324 svchcst.exe 1328 svchcst.exe 1328 svchcst.exe 572 svchcst.exe 572 svchcst.exe 1084 svchcst.exe 1084 svchcst.exe 2404 svchcst.exe 2404 svchcst.exe 744 svchcst.exe 744 svchcst.exe 488 svchcst.exe 488 svchcst.exe 2772 svchcst.exe 2772 svchcst.exe 2640 svchcst.exe 2640 svchcst.exe 2724 svchcst.exe 2724 svchcst.exe 2864 svchcst.exe 2864 svchcst.exe 2016 svchcst.exe 2016 svchcst.exe 3016 svchcst.exe 3016 svchcst.exe 2256 svchcst.exe 2256 svchcst.exe 772 svchcst.exe 772 svchcst.exe 2636 svchcst.exe 2636 svchcst.exe 2672 svchcst.exe 2672 svchcst.exe 1800 svchcst.exe 1800 svchcst.exe 2508 svchcst.exe 2508 svchcst.exe 1608 svchcst.exe 1608 svchcst.exe 1088 svchcst.exe 1088 svchcst.exe 2588 svchcst.exe 2588 svchcst.exe 988 svchcst.exe 988 svchcst.exe 796 svchcst.exe 796 svchcst.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1144 wrote to memory of 1812 1144 a7e3093229b3f23643d5a089f26130bd73ae2a0fed9b770870a9930b2dc43e81.exe 30 PID 1144 wrote to memory of 1812 1144 a7e3093229b3f23643d5a089f26130bd73ae2a0fed9b770870a9930b2dc43e81.exe 30 PID 1144 wrote to memory of 1812 1144 a7e3093229b3f23643d5a089f26130bd73ae2a0fed9b770870a9930b2dc43e81.exe 30 PID 1144 wrote to memory of 1812 1144 a7e3093229b3f23643d5a089f26130bd73ae2a0fed9b770870a9930b2dc43e81.exe 30 PID 1812 wrote to memory of 3044 1812 WScript.exe 33 PID 1812 wrote to memory of 3044 1812 WScript.exe 33 PID 1812 wrote to memory of 3044 1812 WScript.exe 33 PID 1812 wrote to memory of 3044 1812 WScript.exe 33 PID 3044 wrote to memory of 2900 3044 svchcst.exe 34 PID 3044 wrote to memory of 2900 3044 svchcst.exe 34 PID 3044 wrote to memory of 2900 3044 svchcst.exe 34 PID 3044 wrote to memory of 2900 3044 svchcst.exe 34 PID 2900 wrote to memory of 2324 2900 WScript.exe 35 PID 2900 wrote to memory of 2324 2900 WScript.exe 35 PID 2900 wrote to memory of 2324 2900 WScript.exe 35 PID 2900 wrote to memory of 2324 2900 WScript.exe 35 PID 2324 wrote to memory of 3000 2324 svchcst.exe 36 PID 2324 wrote to memory of 3000 2324 svchcst.exe 36 PID 2324 wrote to memory of 3000 2324 svchcst.exe 36 PID 2324 wrote to memory of 3000 2324 svchcst.exe 36 PID 3000 wrote to memory of 1328 3000 WScript.exe 37 PID 3000 wrote to memory of 1328 3000 WScript.exe 37 PID 3000 wrote to memory of 1328 3000 WScript.exe 37 PID 3000 wrote to memory of 1328 3000 WScript.exe 37 PID 1328 wrote to memory of 3016 1328 svchcst.exe 38 PID 1328 wrote to memory of 3016 1328 svchcst.exe 38 PID 1328 wrote to memory of 3016 1328 svchcst.exe 38 PID 1328 wrote to memory of 3016 1328 svchcst.exe 38 PID 3000 wrote to memory of 572 3000 WScript.exe 39 PID 3000 wrote to memory of 572 3000 WScript.exe 39 PID 3000 wrote to memory of 572 3000 WScript.exe 39 PID 3000 wrote to memory of 572 3000 WScript.exe 39 PID 572 wrote to memory of 2188 572 svchcst.exe 40 PID 572 wrote to memory of 2188 572 svchcst.exe 40 PID 572 wrote to memory of 2188 572 svchcst.exe 40 PID 572 wrote to memory of 2188 572 svchcst.exe 40 PID 3016 wrote to memory of 1084 3016 WScript.exe 41 PID 3016 wrote to memory of 1084 3016 WScript.exe 41 PID 3016 wrote to memory of 1084 3016 WScript.exe 41 PID 3016 wrote to memory of 1084 3016 WScript.exe 41 PID 2188 wrote to memory of 2404 2188 WScript.exe 42 PID 2188 wrote to memory of 2404 2188 WScript.exe 42 PID 2188 wrote to memory of 2404 2188 WScript.exe 42 PID 2188 wrote to memory of 2404 2188 WScript.exe 42 PID 1084 wrote to memory of 680 1084 svchcst.exe 43 PID 1084 wrote to memory of 680 1084 svchcst.exe 43 PID 1084 wrote to memory of 680 1084 svchcst.exe 43 PID 1084 wrote to memory of 680 1084 svchcst.exe 43 PID 680 wrote to memory of 744 680 WScript.exe 44 PID 680 wrote to memory of 744 680 WScript.exe 44 PID 680 wrote to memory of 744 680 WScript.exe 44 PID 680 wrote to memory of 744 680 WScript.exe 44 PID 744 wrote to memory of 788 744 svchcst.exe 45 PID 744 wrote to memory of 788 744 svchcst.exe 45 PID 744 wrote to memory of 788 744 svchcst.exe 45 PID 744 wrote to memory of 788 744 svchcst.exe 45 PID 788 wrote to memory of 488 788 WScript.exe 46 PID 788 wrote to memory of 488 788 WScript.exe 46 PID 788 wrote to memory of 488 788 WScript.exe 46 PID 788 wrote to memory of 488 788 WScript.exe 46 PID 488 wrote to memory of 1148 488 svchcst.exe 47 PID 488 wrote to memory of 1148 488 svchcst.exe 47 PID 488 wrote to memory of 1148 488 svchcst.exe 47 PID 488 wrote to memory of 1148 488 svchcst.exe 47
Processes
-
C:\Users\Admin\AppData\Local\Temp\a7e3093229b3f23643d5a089f26130bd73ae2a0fed9b770870a9930b2dc43e81.exe"C:\Users\Admin\AppData\Local\Temp\a7e3093229b3f23643d5a089f26130bd73ae2a0fed9b770870a9930b2dc43e81.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"6⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"8⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"9⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"10⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:680 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"11⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:744 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"12⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:788 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"13⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:488 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"14⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1148 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"15⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2772 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"16⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2624 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"17⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2640 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"18⤵
- System Location Discovery: System Language Discovery
PID:2512
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"17⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2724 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"18⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2604 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"19⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2864 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"20⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:444 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"21⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2016 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"22⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1940 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"23⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2256 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"24⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1924 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"25⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:772 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"26⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2188 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"27⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2636 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"28⤵
- System Location Discovery: System Language Discovery
PID:2720
-
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"26⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1568 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"27⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2672 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"28⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2848 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"29⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1800 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"30⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2228 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"31⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2508 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"32⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2444 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"33⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1608 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"34⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1360 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"35⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1088 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"36⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:620 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"37⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2588 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"38⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:564 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"39⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:988 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"40⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:788 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"41⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:796 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"42⤵
- System Location Discovery: System Language Discovery
PID:2736
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"20⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2092 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"21⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3016
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:572 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"8⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"9⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2404
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92B
MD567b9b3e2ded7086f393ebbc36c5e7bca
SHA1e6299d0450b9a92a18cc23b5704a2b475652c790
SHA25644063c266686263f14cd2a83fee124fb3e61a9171a6aab69709464f49511011d
SHA512826fbc9481f46b1ae3db828a665c55c349023caf563e6e8c17321f5f3af3e4c3914955db6f0eebfc6defe561315435d47310b4d0499ab9c2c85bb61264dedc09
-
Filesize
696B
MD580ebf5d44551af5680e6faa0b57e8c8b
SHA12e17219fbf9ac0ffaf25efb6a11dfe6e9e404798
SHA256ca82157de4bf3edea1ce728fea480f64259153ea391b2be7b5f59864c0ae7a53
SHA512a96c9d64087a4b9eccb235e9e1b19da6adfa1adc40ea11eca5cca69cc7b57eb4c3a299eb2103768398d99aee534c3eced7e76099917c52d1499ea9af07ba2ca8
-
Filesize
753B
MD5dde3a4f96bb3b3b29e38f9d0652d9db8
SHA11e2bf3bda6cb9aa405c82508a8b43c552ae8cd7a
SHA256d6bf3ea2a8b78ac20940d06fe8f6ad763bfe4204e960a9060e78e10ffe1a6cb8
SHA512eeb3ee41c887a91e808038c8fe0882ff6a7f8a186a0c548636a1da47cd6c38f384400c454eb66a223a397a203f999e06564db7d7321499aacef585ea1498570f
-
Filesize
696B
MD53436c1c6420b4dd3e950884257e8b45d
SHA14889f8460c4c1b1fc3f357a03df6ca7fac272fbf
SHA25688d11bc6a0ed417ee8dbbc8ec0894c9b616480afec00a30256ca41150aab17b8
SHA5127960190b3738a018b0c04804e673662b6227bc397fa6a6ca2b1b1041ed7403f4dbe80f7aa6d63484f1f49c98361f27dd425b95b4c6fafedafb5f1e864b3adeb1
-
Filesize
696B
MD5f3159db8bd483868144429c5909d280a
SHA1a3698b1ebb0e43a564357bb77c3462539a114f87
SHA256f31b8921a342ba1eecff8852bd1904a17e94e544a1975106b9b5533155ed044c
SHA512328e166bbd706c7e6848c246909d96779ee2efcdf7bdb0ff47eed24e0267dcca005bb41651b60393ffafbb7b7467d94b22454e8c4be57108ffeb6238e88db916
-
Filesize
696B
MD508e59d2d672728796d1d263f61b8e693
SHA1e2cf49b43ffba5735bf7d9aa4e1da8c5a1a4a243
SHA256f0504a6142a9709ba8612a4e55816d410dc92778bedea66d34316e77edd2f923
SHA512328bc5a9404388f3ef192bb0e4da20cc34b9eacd974299461b5cc2f37ce7d7f9bb494e933fe7e8bca0baa037b40778b06965e76ce258b596b60e88bd6b2f4253
-
Filesize
696B
MD556b642f742552f48c6b8b9c099412a21
SHA1c3cf968546d550feddcded0747d331305147e1e3
SHA256a91e4afb0d2f495e9c4fd5031514174673505464922192f9d87832fc21ef119b
SHA51243edab26c4c27b9458d393f139895b68ce6b230685fd112658b4046094beac5479329f63c9c836dace1e76984fc22b96aecdf0c0252cf656e6d1fe639abf403a
-
Filesize
696B
MD5b42266100fb9f5e0b7be593aac3c37cf
SHA17cd55f31fd2871d09de73a6f62e3a7e1a53327b2
SHA2561a6710caaf3886be368f3205ee8c9905e10f8ed754d80598c80f1455a700d846
SHA512d3e5a4f7395d6196403e60214239043b2da6e546cbe080f74c3a680a6f4a7fe1374988df0a1aa84dbc0e41199efd8fb11050d1d1295f3b45811935d740a5108b
-
Filesize
696B
MD5608aea68519434d685c413b31a12c6ce
SHA17a62e13cab985d0588a0faea63751fd0355da7fc
SHA2565ed3aa382febd7a4e6c3a921a5add055f6e2bbea7558b21da46752f037d52b1a
SHA5126ddca4b85fc1b6ecb6c1081b32067eb438ed5167b48565ea449e6babb1f27a01c75599c6b0f10b29ac9278e619891588d654466ce882d8080f4d2435f450d198
-
Filesize
696B
MD5b5e11596fa3b5ec67af0232750a3cadb
SHA180cb25f5250390b6b2130c8b4eefc9872cc4939d
SHA256d6429bbb3e3d5c86f30efdb3aa599d47eb8f130c1d0f2a6345e3e9387f7670b3
SHA51206c71dd481c8936cb5c8a259111986a31b94e7bf73267a081e2162e16b3bffc633a257b5dcf2fd64c7bcc95a20ee841d5d07ca2ea5a16b7f862aec9cde5f17f2
-
Filesize
696B
MD5e4e96c55460da5fa5643648177198d56
SHA1da09b8271cfd09349b8e79bd8856671e6124d6a0
SHA2566ca56d2034da62f3a82f84935631e9d90430875cfd9b95382fdf1210758ba761
SHA51223da2c3c87c8e52aab70931c7ca6f0d04f453cff01bda2fe078a060468d9d7b9e544635eb11976541246eaed2e4cac06e0ed7ed86bce775f95ff5d5f40c5d1bb
-
Filesize
696B
MD51af246ca0660faf0fa7da4b4c9c61316
SHA1c050b0bd311f2e5240cd7e9df583e41b133e9521
SHA2562b84bcefb62d7564e2e7d1be8105a26f798b4c73cca142c054da02262f61ede8
SHA5123fadf6605620aea1f9c9e94d62193fc416af6d5272bc675d399ea1ea96a070b4de69cab61736cea89c744ce3b203f0790d617789d25811a6ca535fc9f6159793
-
Filesize
696B
MD5d6aef0b19d7d8dc2eda464cf358007b7
SHA1c271fa23eee2c534cc862f7575df47f660c94d27
SHA25670965d19e9afccec497ac21e98bfea9be46cf5df938982b3d19e6295aab3bb1d
SHA512c547f50069f9f97dd9877bdb529f4ed49f9761d5cab1ff703e5185a6071e7591b98237834c6bd386b68b9c6504b76bdc581bf17a6fcef94e74b1483d47cf764a
-
Filesize
696B
MD5ee35194fa07bea6145178b37a18edb25
SHA17cbe9989cbc0090cc0ab534c7aa77d64d959e489
SHA256e323603a594cf3a7e03aea20d2ab69a17040a02f256ac1e3fe02f8a36889a483
SHA512d292e22575da17d694a33d6132cea65ca1c58a16bd2532dd24db161d2a77cf233039ed1b66b48868210f4d0ffff16678db3be341eca044432b8087b520e59f71
-
Filesize
1.1MB
MD59481f5c4b4cdb7605cf56e3018e57b0a
SHA1a582d286cb426e94e0a3b9ab615546fd8e0e60d9
SHA256a3a5dac8271747950f8bfd7fc5c4c8c7d96ced80ee0de7d9b601c3265adf4a79
SHA5129a6dd4fbd2ebeb3f7e8c75b3842925bf926aa4d0bba3c51c2f314c5d31b38c32f4a549a2487fbfeae938880008f7576366f93a13f7b3826f1a24227983794185
-
Filesize
1.1MB
MD5ebb8a699f0ddf90941f5e07b6c2ba507
SHA12c714622475dec8f3da950bac1663ba55d787889
SHA256f063d78c49b28fb13e49b769abe33a121ca9f8bca70ecc00c984f8eef6de64b3
SHA5126c15cd1857f174f3961e3bd6c2b5d1142e61164d5d2a54e03ac7dc1a0580f8edc583b7a3d86e3fe4caac6f27b3a43cac5454eaa699da94b174b587ed6c0bbdbb
-
Filesize
1.1MB
MD55f064204ef713b8720b31458e088d010
SHA1203b898d70643d782236b54b5bf4ef24b919bad5
SHA25617b14c58d09faa8c2257bc9d0650d55eb8cbcfc50ae062920dcbeb0cb2869e91
SHA51224e0e891b93ba732a87d590a5305fb28d33e501a229576f6f596e4ddbffcd648f60130ba6100382c704bfed9b53bd102d27c8dad2312888d8edf36755270b699
-
Filesize
1.1MB
MD516d2cce7cd521a9b1f4ee86d2d6ca6f0
SHA132469d1fba506c91a03df334810423e826c7d48f
SHA2566a9a82462a0c6eaa2b87ee2db9aafc397c9ac456567de6da50a98a42cc3ada84
SHA5124f5e0b2e34ff7de8b62f29e320b52cce2f6ee973ce89c1bac176b21a9477966647ef394bdcacca89d766546bc39d6383e89b642879ebdd201174a3ab8ea461d4
-
Filesize
1.1MB
MD55441b75a7e00f763771bef7e38018462
SHA154a67d9a5064ac84856c182f68ecbe54f093affd
SHA256394a9282eeed4da97d793b19c5492f0dc2d6060ac2e29e8f7eee46a84d729260
SHA512f58b9e1f314c3a7909cbb7cba3288bb7a15885da660c2f3379e5848a25bb6f56f0b239f8bc69d1bc9ead29ac13c5c382d692fc4aa04a6a6060155a7323426c90