Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/09/2024, 23:17
Static task
static1
Behavioral task
behavioral1
Sample
6909d334200f9dd5af701300d72f03581803db920ed378c5bd711127283ef7bd.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
6909d334200f9dd5af701300d72f03581803db920ed378c5bd711127283ef7bd.exe
Resource
win10v2004-20240802-en
General
-
Target
6909d334200f9dd5af701300d72f03581803db920ed378c5bd711127283ef7bd.exe
-
Size
1.1MB
-
MD5
0affc22adc1b63fad35ecb96278f2a7d
-
SHA1
be12b2ac059dc054bc252f4b884d4af82823683a
-
SHA256
6909d334200f9dd5af701300d72f03581803db920ed378c5bd711127283ef7bd
-
SHA512
dcd131e1e112936cbc57673d034bb5b3e8bca7bd0a27224b4723cfb94cbde0a66e4c7d9f3215f3a11f97b6dac566834c5eff318d4781bb57146c14db9e57a977
-
SSDEEP
24576:aH0dl8myX9Bg42QoXFkrzkmplSgRDYo0lG4Z8r7Qfbkiu5Qu:acallSllG4ZM7QzMV
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3056 svchcst.exe -
Executes dropped EXE 24 IoCs
pid Process 3056 svchcst.exe 1512 svchcst.exe 2792 svchcst.exe 2240 svchcst.exe 1624 svchcst.exe 1644 svchcst.exe 1564 svchcst.exe 2500 svchcst.exe 2748 svchcst.exe 2708 svchcst.exe 2792 svchcst.exe 1628 svchcst.exe 1296 svchcst.exe 1900 svchcst.exe 2444 svchcst.exe 1932 svchcst.exe 2116 svchcst.exe 2584 svchcst.exe 760 svchcst.exe 916 svchcst.exe 988 svchcst.exe 664 svchcst.exe 1084 svchcst.exe 1564 svchcst.exe -
Loads dropped DLL 38 IoCs
pid Process 2668 WScript.exe 2668 WScript.exe 2596 WScript.exe 1988 WScript.exe 1988 WScript.exe 2384 WScript.exe 2384 WScript.exe 2804 WScript.exe 2804 WScript.exe 2084 WScript.exe 2656 WScript.exe 836 WScript.exe 836 WScript.exe 836 WScript.exe 2140 WScript.exe 2140 WScript.exe 1404 WScript.exe 1404 WScript.exe 1552 WScript.exe 1552 WScript.exe 1764 WScript.exe 1764 WScript.exe 2496 WScript.exe 2496 WScript.exe 112 WScript.exe 112 WScript.exe 2900 WScript.exe 2900 WScript.exe 2596 WScript.exe 2596 WScript.exe 2320 WScript.exe 2320 WScript.exe 1792 WScript.exe 1792 WScript.exe 2024 WScript.exe 2024 WScript.exe 336 WScript.exe 336 WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 49 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6909d334200f9dd5af701300d72f03581803db920ed378c5bd711127283ef7bd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2532 6909d334200f9dd5af701300d72f03581803db920ed378c5bd711127283ef7bd.exe 3056 svchcst.exe 3056 svchcst.exe 3056 svchcst.exe 3056 svchcst.exe 3056 svchcst.exe 3056 svchcst.exe 3056 svchcst.exe 3056 svchcst.exe 3056 svchcst.exe 3056 svchcst.exe 3056 svchcst.exe 3056 svchcst.exe 3056 svchcst.exe 3056 svchcst.exe 3056 svchcst.exe 3056 svchcst.exe 3056 svchcst.exe 3056 svchcst.exe 3056 svchcst.exe 3056 svchcst.exe 3056 svchcst.exe 3056 svchcst.exe 3056 svchcst.exe 3056 svchcst.exe 3056 svchcst.exe 3056 svchcst.exe 3056 svchcst.exe 3056 svchcst.exe 3056 svchcst.exe 3056 svchcst.exe 3056 svchcst.exe 3056 svchcst.exe 3056 svchcst.exe 3056 svchcst.exe 3056 svchcst.exe 3056 svchcst.exe 3056 svchcst.exe 3056 svchcst.exe 3056 svchcst.exe 3056 svchcst.exe 3056 svchcst.exe 3056 svchcst.exe 3056 svchcst.exe 3056 svchcst.exe 3056 svchcst.exe 3056 svchcst.exe 3056 svchcst.exe 3056 svchcst.exe 3056 svchcst.exe 3056 svchcst.exe 3056 svchcst.exe 3056 svchcst.exe 3056 svchcst.exe 3056 svchcst.exe 3056 svchcst.exe 3056 svchcst.exe 3056 svchcst.exe 3056 svchcst.exe 3056 svchcst.exe 3056 svchcst.exe 3056 svchcst.exe 3056 svchcst.exe 3056 svchcst.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2532 6909d334200f9dd5af701300d72f03581803db920ed378c5bd711127283ef7bd.exe -
Suspicious use of SetWindowsHookEx 50 IoCs
pid Process 2532 6909d334200f9dd5af701300d72f03581803db920ed378c5bd711127283ef7bd.exe 2532 6909d334200f9dd5af701300d72f03581803db920ed378c5bd711127283ef7bd.exe 3056 svchcst.exe 3056 svchcst.exe 1512 svchcst.exe 1512 svchcst.exe 2792 svchcst.exe 2792 svchcst.exe 2240 svchcst.exe 2240 svchcst.exe 1624 svchcst.exe 1624 svchcst.exe 1644 svchcst.exe 1644 svchcst.exe 1564 svchcst.exe 1564 svchcst.exe 2500 svchcst.exe 2500 svchcst.exe 2748 svchcst.exe 2748 svchcst.exe 2708 svchcst.exe 2708 svchcst.exe 2792 svchcst.exe 2792 svchcst.exe 1628 svchcst.exe 1628 svchcst.exe 1296 svchcst.exe 1296 svchcst.exe 1900 svchcst.exe 1900 svchcst.exe 2444 svchcst.exe 2444 svchcst.exe 1932 svchcst.exe 1932 svchcst.exe 2116 svchcst.exe 2116 svchcst.exe 2584 svchcst.exe 2584 svchcst.exe 760 svchcst.exe 760 svchcst.exe 916 svchcst.exe 916 svchcst.exe 988 svchcst.exe 988 svchcst.exe 664 svchcst.exe 664 svchcst.exe 1084 svchcst.exe 1084 svchcst.exe 1564 svchcst.exe 1564 svchcst.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2532 wrote to memory of 2668 2532 6909d334200f9dd5af701300d72f03581803db920ed378c5bd711127283ef7bd.exe 30 PID 2532 wrote to memory of 2668 2532 6909d334200f9dd5af701300d72f03581803db920ed378c5bd711127283ef7bd.exe 30 PID 2532 wrote to memory of 2668 2532 6909d334200f9dd5af701300d72f03581803db920ed378c5bd711127283ef7bd.exe 30 PID 2532 wrote to memory of 2668 2532 6909d334200f9dd5af701300d72f03581803db920ed378c5bd711127283ef7bd.exe 30 PID 2668 wrote to memory of 3056 2668 WScript.exe 33 PID 2668 wrote to memory of 3056 2668 WScript.exe 33 PID 2668 wrote to memory of 3056 2668 WScript.exe 33 PID 2668 wrote to memory of 3056 2668 WScript.exe 33 PID 3056 wrote to memory of 2596 3056 svchcst.exe 34 PID 3056 wrote to memory of 2596 3056 svchcst.exe 34 PID 3056 wrote to memory of 2596 3056 svchcst.exe 34 PID 3056 wrote to memory of 2596 3056 svchcst.exe 34 PID 2596 wrote to memory of 1512 2596 WScript.exe 35 PID 2596 wrote to memory of 1512 2596 WScript.exe 35 PID 2596 wrote to memory of 1512 2596 WScript.exe 35 PID 2596 wrote to memory of 1512 2596 WScript.exe 35 PID 1512 wrote to memory of 1988 1512 svchcst.exe 36 PID 1512 wrote to memory of 1988 1512 svchcst.exe 36 PID 1512 wrote to memory of 1988 1512 svchcst.exe 36 PID 1512 wrote to memory of 1988 1512 svchcst.exe 36 PID 1988 wrote to memory of 2792 1988 WScript.exe 37 PID 1988 wrote to memory of 2792 1988 WScript.exe 37 PID 1988 wrote to memory of 2792 1988 WScript.exe 37 PID 1988 wrote to memory of 2792 1988 WScript.exe 37 PID 2792 wrote to memory of 1296 2792 svchcst.exe 38 PID 2792 wrote to memory of 1296 2792 svchcst.exe 38 PID 2792 wrote to memory of 1296 2792 svchcst.exe 38 PID 2792 wrote to memory of 1296 2792 svchcst.exe 38 PID 1988 wrote to memory of 2240 1988 WScript.exe 39 PID 1988 wrote to memory of 2240 1988 WScript.exe 39 PID 1988 wrote to memory of 2240 1988 WScript.exe 39 PID 1988 wrote to memory of 2240 1988 WScript.exe 39 PID 2240 wrote to memory of 2384 2240 svchcst.exe 40 PID 2240 wrote to memory of 2384 2240 svchcst.exe 40 PID 2240 wrote to memory of 2384 2240 svchcst.exe 40 PID 2240 wrote to memory of 2384 2240 svchcst.exe 40 PID 2384 wrote to memory of 1624 2384 WScript.exe 41 PID 2384 wrote to memory of 1624 2384 WScript.exe 41 PID 2384 wrote to memory of 1624 2384 WScript.exe 41 PID 2384 wrote to memory of 1624 2384 WScript.exe 41 PID 1624 wrote to memory of 1008 1624 svchcst.exe 42 PID 1624 wrote to memory of 1008 1624 svchcst.exe 42 PID 1624 wrote to memory of 1008 1624 svchcst.exe 42 PID 1624 wrote to memory of 1008 1624 svchcst.exe 42 PID 2384 wrote to memory of 1644 2384 WScript.exe 43 PID 2384 wrote to memory of 1644 2384 WScript.exe 43 PID 2384 wrote to memory of 1644 2384 WScript.exe 43 PID 2384 wrote to memory of 1644 2384 WScript.exe 43 PID 1644 wrote to memory of 2804 1644 svchcst.exe 44 PID 1644 wrote to memory of 2804 1644 svchcst.exe 44 PID 1644 wrote to memory of 2804 1644 svchcst.exe 44 PID 1644 wrote to memory of 2804 1644 svchcst.exe 44 PID 2804 wrote to memory of 1564 2804 WScript.exe 45 PID 2804 wrote to memory of 1564 2804 WScript.exe 45 PID 2804 wrote to memory of 1564 2804 WScript.exe 45 PID 2804 wrote to memory of 1564 2804 WScript.exe 45 PID 1564 wrote to memory of 2148 1564 svchcst.exe 46 PID 1564 wrote to memory of 2148 1564 svchcst.exe 46 PID 1564 wrote to memory of 2148 1564 svchcst.exe 46 PID 1564 wrote to memory of 2148 1564 svchcst.exe 46 PID 2804 wrote to memory of 2500 2804 WScript.exe 47 PID 2804 wrote to memory of 2500 2804 WScript.exe 47 PID 2804 wrote to memory of 2500 2804 WScript.exe 47 PID 2804 wrote to memory of 2500 2804 WScript.exe 47
Processes
-
C:\Users\Admin\AppData\Local\Temp\6909d334200f9dd5af701300d72f03581803db920ed378c5bd711127283ef7bd.exe"C:\Users\Admin\AppData\Local\Temp\6909d334200f9dd5af701300d72f03581803db920ed378c5bd711127283ef7bd.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"6⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"8⤵
- System Location Discovery: System Language Discovery
PID:1296
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"8⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"9⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"10⤵
- System Location Discovery: System Language Discovery
PID:1008
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"9⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"10⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"11⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"12⤵
- System Location Discovery: System Language Discovery
PID:2148
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"11⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2500 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"12⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2084 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"13⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2748 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"14⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2656 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"15⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2708 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"16⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:836 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"17⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2792 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"18⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2140 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"19⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1296 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"20⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1404 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"21⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1900 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"22⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1552 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"23⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2444 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"24⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1764 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"25⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1932 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"26⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2496 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"27⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2116 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"28⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:112 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"29⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2584 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"30⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2900 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"31⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:760 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"32⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2596 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"33⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:916 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"34⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2320 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"35⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:988 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"36⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1792 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"37⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:664 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"38⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2024 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"39⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1084 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"40⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:336 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"41⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1564 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"42⤵
- System Location Discovery: System Language Discovery
PID:2036
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"17⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1628
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92B
MD567b9b3e2ded7086f393ebbc36c5e7bca
SHA1e6299d0450b9a92a18cc23b5704a2b475652c790
SHA25644063c266686263f14cd2a83fee124fb3e61a9171a6aab69709464f49511011d
SHA512826fbc9481f46b1ae3db828a665c55c349023caf563e6e8c17321f5f3af3e4c3914955db6f0eebfc6defe561315435d47310b4d0499ab9c2c85bb61264dedc09
-
Filesize
696B
MD585fa416be0b995c6e53ce5e2df106d8a
SHA1bcffe6d0eb7594897fb6c1c1e6e409bacd04f009
SHA256f08a191ea7850c2d2e0fa0cd1f40254eecb8dcb63a9dfa94cc8a97f609c49293
SHA5125d92938d833d0555e94027148d0d9fc064274885bb4992f4e5840e7be03b629a3d2dc3703f9a7aa7614cb46ee19f9cfe26c69cc2e3a162f4be9045e5da18efbf
-
Filesize
753B
MD5f606622ebe23eb8d470e2853588e652a
SHA1309a4697f03fd9ee0ab48b7be373e7ec52e94dd5
SHA25623c5444a1e8fb062cc8dbab993fd6a0a5b5c47584929c668c17ca89a85a4bbe0
SHA51286109f6ba8f3e004bb0ff5d3310fe64fc9aa69dde0e01f7b3246a4a1548ba12d2b9e7ed47aafe320096d9372a70895a766f99d6907f67feac7d2fe9133bd1508
-
Filesize
696B
MD502bec440e11bdc76b5de3232abd91f03
SHA12118a1f2249848ea084c7d98709f7ba7906e43a3
SHA2564382e8d6fd98aeb7c574b195019c1687ac6628e8f97485614ad743ae5a0616b0
SHA512f86e900e6bd38151fad12b160c0489823bd18d15609346172ca1f815593e69f9269cb28a0eaea6a588a29d41343f3b9d4c6489cc3c50e2b24a31720de26e0411
-
Filesize
696B
MD57e30bbf5f589f6ae6e5daf322f9f4c63
SHA14078c36ab68538c4d3aa3996b3a218fa786e5813
SHA2569ed68f0cb63b2fca99956af2a550eb26ac99a883afef4ea6dc1236c14593266b
SHA51263bb07bfbef6c96b50bbcb60d7f805930aaeefd6eadaa39dcb3e591c84636c670257a7f544bb0565174578a517d06de29a6c086812ef5cfb3039aea1917fb4b8
-
Filesize
696B
MD5e74576d29f1c1a7185cdf1e12b96a260
SHA1f76ee203cb56b7dda62a2947ff1e2fc954efa777
SHA256e31ecb9dcf31c19fbd131b31e5191375f7aeb708ffa678363de99e118715eb65
SHA512934e3a9171de8fe03c9b398b4e79b3eee77845750ba2b0d16c3a38bc8299d3d72643cedfbb025df848f4c5ab302f5d4b145da13c2ac3ed96bdc1658791d4f5bb
-
Filesize
696B
MD57f92a34f71720b04d60028801eb07932
SHA11701bae49609dc0ad1ab56823ae2414fd6c286c5
SHA256b7445df62a392850e8ed07fba398dd5896625b6bcd694dfb5a02797ca2c637ee
SHA512f5173fb410530956a6fcc8a15894c4186ae7fbac8e408714143359b476a2a2b1bd528cdb2e4647d1c16b99f108e452fb4fcb0a6db5eae6750fc6f6d8edd85360
-
Filesize
696B
MD5152cdcb10a0dcbdcaeb00bd4b08b2f94
SHA1d957bd7eff64e6b13d3a088c0ae764eaeedf0ad2
SHA2565525126f60e1b6cf4d353d30db46873836712e3964020d1dbca2694b6dc3d599
SHA512c2e61516af9e5c14978792ec3b5e20aa84d5f6d9607322575d2f0448a67b6a10911ebf350f51e24e19f40840897251c891cda2c651c0881fccc9e0006d1a2f99
-
Filesize
696B
MD506a252a9516053e44ec8e64f1ebf0533
SHA129ac97e0cdade946c4feb81ad3f78d70953a2277
SHA2566b8a799c3d4b977adb7220f6790b2ac09080ca3ccde5a2c33c83b33ea905928c
SHA5120775aabeef7c910e03efc40f96143025a2ee3544dd656c78d09ef63c85d040037752aabe72fdf3b636ee31422ae8de01b73c85e27247203d5efc1635eaf15b2d
-
Filesize
696B
MD55465e98b54b47d65941e5d12deb27c9d
SHA150e5e6ced6e5e332b303de4fa146482fbdf782d5
SHA25638f339c2f4c0d7ea1ba1500460c63bc626a2465b3ca48c4d63ee2b0f3eafb82a
SHA51250c6bc8c7da8c036c909672ade71b08aea49bc58474c40e660d7dc23c3a9869cfad82b4dc96335057ecd5bd1011f3db712f667b4085555e3dc6fb90de56b1c3a
-
Filesize
696B
MD53f88ed4a802ff96db44e34ad53ac06c2
SHA1446fe4e265af02ea012b5a8d5d0e7a0c9867f1ed
SHA25604a5abb92c689fa7b9d768a067b1d9bd16c0a5d856c67c7f7881d62662ae0911
SHA512f1afaf53ee96969d58902836b841ca7feed9769c81d9b2d63b72db5d7cf04d6a659b50869f8dba0d650aa6833d892261c0c3dd918e8bfbed13237e6333c47fdf
-
Filesize
696B
MD52c6490a42a6a0c40ff0c4e23b3e1aa2f
SHA1673399038e095a86936267b5014fc7d216ee5c0a
SHA2564b5b75f23c5d2765bccf9691327947fcdd4e1e17e6da73c1b1c47dab8db99b3d
SHA5128ffd13c3e9ecd8c522703bf13f839b3925bf3dd0418c33e8b4edc5cd07ca53d76d21e3d8f2e47622d51cc73ac3eed7dd2f7308bb332cde1bd1e6f1cb8f8bb8d5
-
Filesize
696B
MD59e8dca236ce949019c46b94428612ac9
SHA10917050afcbb7b94fce6fbb9827fb57de7432b0b
SHA256bd9f06dbb8f2165c3b75da289ad7983f0c57328d236b2c68a2b5798188874fb3
SHA51223ce9deba9286cbb24c1725503542b63d7e44ea7ada302e5aba6595f84398e2162008d7431f842cccfb2b8fae126216d85c566931d5fcc8c8c5625e2c05f44d6
-
Filesize
1.1MB
MD50064b68c9d8bd587849faa9b480c3ef4
SHA11f144bb0ef1a38ae692552315bab43d972b4238b
SHA256ad107a8f5c386eaa8aa22b5818e2785b5618909611c71ccbb0afa79ba7885d35
SHA5123f5d6a69475bae31b26a7890e9aaa3d565cdca59fab47d0b59b5d32ecce5ad2f34cb6e904082eaae588557d7c3ce03267007fbb06e072cc3f585f1f2a727ecbe
-
Filesize
1.1MB
MD58a1dab65a852550f0656760a7253a7ab
SHA1929b353262b23f0af5de1a9f76cb3022aa1a3c51
SHA2569a6e79065dae6c0c9a96dc185279bd74abd7cf56bbd2428236ae6132735a19a9
SHA5124d2953ceff9487dfc654a99ad791640a72f35c18632eae826156d2cea5cc15b6e4cb419bea8824af17a12758dde73698cbc95ea1db6df4466cfc8deb457353f7