Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/09/2024, 15:07
Static task
static1
Behavioral task
behavioral1
Sample
c744919d5c8e7b47060cad36730f965e55feb74ff40804356185cad8ebf8880e.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c744919d5c8e7b47060cad36730f965e55feb74ff40804356185cad8ebf8880e.exe
Resource
win10v2004-20240802-en
General
-
Target
c744919d5c8e7b47060cad36730f965e55feb74ff40804356185cad8ebf8880e.exe
-
Size
1.1MB
-
MD5
e6263da0167497a840ae92b28e1cd565
-
SHA1
e3a2981bc6c0a86f8d446bf19ec10c5a2b7a1ddb
-
SHA256
c744919d5c8e7b47060cad36730f965e55feb74ff40804356185cad8ebf8880e
-
SHA512
699285b4bf6c0022b12dd06a0b6a44cfc444b9c8cd89f1083cbe7f45136ecce0f7c913aedc436e1e88e106b849af59bccc23967b6078d6fe68b85eb69cff104a
-
SSDEEP
24576:CH0dl8myX9Bg42QoXFkrzkmmlSgRDko0lG4Z8r7Qfbkiu5Q4:CcaClSFlG4ZM7QzMP
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2700 svchcst.exe -
Executes dropped EXE 23 IoCs
pid Process 2700 svchcst.exe 2200 svchcst.exe 1496 svchcst.exe 2388 svchcst.exe 1736 svchcst.exe 700 svchcst.exe 2860 svchcst.exe 1516 svchcst.exe 2476 svchcst.exe 2604 svchcst.exe 1664 svchcst.exe 2884 svchcst.exe 980 svchcst.exe 1292 svchcst.exe 2216 svchcst.exe 1364 svchcst.exe 2808 svchcst.exe 1424 svchcst.exe 2444 svchcst.exe 1484 svchcst.exe 1080 svchcst.exe 1972 svchcst.exe 1236 svchcst.exe -
Loads dropped DLL 35 IoCs
pid Process 1740 WScript.exe 1740 WScript.exe 2824 WScript.exe 1904 WScript.exe 1904 WScript.exe 1576 WScript.exe 1576 WScript.exe 1576 WScript.exe 1572 WScript.exe 1016 WScript.exe 1016 WScript.exe 2616 WScript.exe 2616 WScript.exe 2848 WScript.exe 1156 WScript.exe 1156 WScript.exe 1156 WScript.exe 1892 WScript.exe 1892 WScript.exe 1008 WScript.exe 1008 WScript.exe 2548 WScript.exe 2548 WScript.exe 1920 WScript.exe 1920 WScript.exe 1652 WScript.exe 1652 WScript.exe 2964 WScript.exe 2964 WScript.exe 820 WScript.exe 820 WScript.exe 2136 WScript.exe 2136 WScript.exe 2848 WScript.exe 2848 WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 48 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c744919d5c8e7b47060cad36730f965e55feb74ff40804356185cad8ebf8880e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1952 c744919d5c8e7b47060cad36730f965e55feb74ff40804356185cad8ebf8880e.exe 2700 svchcst.exe 2700 svchcst.exe 2700 svchcst.exe 2700 svchcst.exe 2700 svchcst.exe 2700 svchcst.exe 2700 svchcst.exe 2700 svchcst.exe 2700 svchcst.exe 2700 svchcst.exe 2700 svchcst.exe 2700 svchcst.exe 2700 svchcst.exe 2700 svchcst.exe 2700 svchcst.exe 2700 svchcst.exe 2700 svchcst.exe 2700 svchcst.exe 2700 svchcst.exe 2700 svchcst.exe 2700 svchcst.exe 2700 svchcst.exe 2700 svchcst.exe 2700 svchcst.exe 2700 svchcst.exe 2700 svchcst.exe 2700 svchcst.exe 2700 svchcst.exe 2700 svchcst.exe 2700 svchcst.exe 2700 svchcst.exe 2700 svchcst.exe 2700 svchcst.exe 2700 svchcst.exe 2700 svchcst.exe 2700 svchcst.exe 2700 svchcst.exe 2700 svchcst.exe 2700 svchcst.exe 2700 svchcst.exe 2700 svchcst.exe 2700 svchcst.exe 2700 svchcst.exe 2700 svchcst.exe 2700 svchcst.exe 2700 svchcst.exe 2700 svchcst.exe 2700 svchcst.exe 2700 svchcst.exe 2700 svchcst.exe 2700 svchcst.exe 2700 svchcst.exe 2700 svchcst.exe 2700 svchcst.exe 2700 svchcst.exe 2700 svchcst.exe 2700 svchcst.exe 2700 svchcst.exe 2700 svchcst.exe 2700 svchcst.exe 2700 svchcst.exe 2700 svchcst.exe 2700 svchcst.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1952 c744919d5c8e7b47060cad36730f965e55feb74ff40804356185cad8ebf8880e.exe -
Suspicious use of SetWindowsHookEx 48 IoCs
pid Process 1952 c744919d5c8e7b47060cad36730f965e55feb74ff40804356185cad8ebf8880e.exe 1952 c744919d5c8e7b47060cad36730f965e55feb74ff40804356185cad8ebf8880e.exe 2700 svchcst.exe 2700 svchcst.exe 2200 svchcst.exe 2200 svchcst.exe 1496 svchcst.exe 1496 svchcst.exe 2388 svchcst.exe 2388 svchcst.exe 1736 svchcst.exe 1736 svchcst.exe 700 svchcst.exe 700 svchcst.exe 2860 svchcst.exe 2860 svchcst.exe 1516 svchcst.exe 1516 svchcst.exe 2476 svchcst.exe 2476 svchcst.exe 2604 svchcst.exe 2604 svchcst.exe 1664 svchcst.exe 1664 svchcst.exe 2884 svchcst.exe 2884 svchcst.exe 980 svchcst.exe 980 svchcst.exe 1292 svchcst.exe 1292 svchcst.exe 2216 svchcst.exe 2216 svchcst.exe 1364 svchcst.exe 1364 svchcst.exe 2808 svchcst.exe 2808 svchcst.exe 1424 svchcst.exe 1424 svchcst.exe 2444 svchcst.exe 2444 svchcst.exe 1484 svchcst.exe 1484 svchcst.exe 1080 svchcst.exe 1080 svchcst.exe 1972 svchcst.exe 1972 svchcst.exe 1236 svchcst.exe 1236 svchcst.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1952 wrote to memory of 1740 1952 c744919d5c8e7b47060cad36730f965e55feb74ff40804356185cad8ebf8880e.exe 31 PID 1952 wrote to memory of 1740 1952 c744919d5c8e7b47060cad36730f965e55feb74ff40804356185cad8ebf8880e.exe 31 PID 1952 wrote to memory of 1740 1952 c744919d5c8e7b47060cad36730f965e55feb74ff40804356185cad8ebf8880e.exe 31 PID 1952 wrote to memory of 1740 1952 c744919d5c8e7b47060cad36730f965e55feb74ff40804356185cad8ebf8880e.exe 31 PID 1740 wrote to memory of 2700 1740 WScript.exe 33 PID 1740 wrote to memory of 2700 1740 WScript.exe 33 PID 1740 wrote to memory of 2700 1740 WScript.exe 33 PID 1740 wrote to memory of 2700 1740 WScript.exe 33 PID 2700 wrote to memory of 2824 2700 svchcst.exe 34 PID 2700 wrote to memory of 2824 2700 svchcst.exe 34 PID 2700 wrote to memory of 2824 2700 svchcst.exe 34 PID 2700 wrote to memory of 2824 2700 svchcst.exe 34 PID 2824 wrote to memory of 2200 2824 WScript.exe 35 PID 2824 wrote to memory of 2200 2824 WScript.exe 35 PID 2824 wrote to memory of 2200 2824 WScript.exe 35 PID 2824 wrote to memory of 2200 2824 WScript.exe 35 PID 2200 wrote to memory of 1904 2200 svchcst.exe 36 PID 2200 wrote to memory of 1904 2200 svchcst.exe 36 PID 2200 wrote to memory of 1904 2200 svchcst.exe 36 PID 2200 wrote to memory of 1904 2200 svchcst.exe 36 PID 1904 wrote to memory of 1496 1904 WScript.exe 37 PID 1904 wrote to memory of 1496 1904 WScript.exe 37 PID 1904 wrote to memory of 1496 1904 WScript.exe 37 PID 1904 wrote to memory of 1496 1904 WScript.exe 37 PID 1496 wrote to memory of 1612 1496 svchcst.exe 38 PID 1496 wrote to memory of 1612 1496 svchcst.exe 38 PID 1496 wrote to memory of 1612 1496 svchcst.exe 38 PID 1496 wrote to memory of 1612 1496 svchcst.exe 38 PID 1904 wrote to memory of 2388 1904 WScript.exe 39 PID 1904 wrote to memory of 2388 1904 WScript.exe 39 PID 1904 wrote to memory of 2388 1904 WScript.exe 39 PID 1904 wrote to memory of 2388 1904 WScript.exe 39 PID 2388 wrote to memory of 1576 2388 svchcst.exe 40 PID 2388 wrote to memory of 1576 2388 svchcst.exe 40 PID 2388 wrote to memory of 1576 2388 svchcst.exe 40 PID 2388 wrote to memory of 1576 2388 svchcst.exe 40 PID 1576 wrote to memory of 1736 1576 WScript.exe 41 PID 1576 wrote to memory of 1736 1576 WScript.exe 41 PID 1576 wrote to memory of 1736 1576 WScript.exe 41 PID 1576 wrote to memory of 1736 1576 WScript.exe 41 PID 1736 wrote to memory of 1152 1736 svchcst.exe 42 PID 1736 wrote to memory of 1152 1736 svchcst.exe 42 PID 1736 wrote to memory of 1152 1736 svchcst.exe 42 PID 1736 wrote to memory of 1152 1736 svchcst.exe 42 PID 1576 wrote to memory of 700 1576 WScript.exe 43 PID 1576 wrote to memory of 700 1576 WScript.exe 43 PID 1576 wrote to memory of 700 1576 WScript.exe 43 PID 1576 wrote to memory of 700 1576 WScript.exe 43 PID 700 wrote to memory of 1572 700 svchcst.exe 44 PID 700 wrote to memory of 1572 700 svchcst.exe 44 PID 700 wrote to memory of 1572 700 svchcst.exe 44 PID 700 wrote to memory of 1572 700 svchcst.exe 44 PID 1572 wrote to memory of 2860 1572 WScript.exe 45 PID 1572 wrote to memory of 2860 1572 WScript.exe 45 PID 1572 wrote to memory of 2860 1572 WScript.exe 45 PID 1572 wrote to memory of 2860 1572 WScript.exe 45 PID 2860 wrote to memory of 1016 2860 svchcst.exe 46 PID 2860 wrote to memory of 1016 2860 svchcst.exe 46 PID 2860 wrote to memory of 1016 2860 svchcst.exe 46 PID 2860 wrote to memory of 1016 2860 svchcst.exe 46 PID 1016 wrote to memory of 1516 1016 WScript.exe 47 PID 1016 wrote to memory of 1516 1016 WScript.exe 47 PID 1016 wrote to memory of 1516 1016 WScript.exe 47 PID 1016 wrote to memory of 1516 1016 WScript.exe 47
Processes
-
C:\Users\Admin\AppData\Local\Temp\c744919d5c8e7b47060cad36730f965e55feb74ff40804356185cad8ebf8880e.exe"C:\Users\Admin\AppData\Local\Temp\c744919d5c8e7b47060cad36730f965e55feb74ff40804356185cad8ebf8880e.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"6⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"8⤵
- System Location Discovery: System Language Discovery
PID:1612
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"8⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"9⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"10⤵
- System Location Discovery: System Language Discovery
PID:1152
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"9⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:700 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"10⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"11⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"12⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1016 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"13⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1516 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"14⤵
- System Location Discovery: System Language Discovery
PID:2264
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"13⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2476 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"14⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2616 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"15⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2604 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"16⤵
- System Location Discovery: System Language Discovery
PID:2768
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"15⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1664 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"16⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2848 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"17⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2884 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"18⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1156 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"19⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:980 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"20⤵
- System Location Discovery: System Language Discovery
PID:1044
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"19⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1292 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"20⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1892 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"21⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2216 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"22⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1008 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"23⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1364 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"24⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2548 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"25⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2808 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"26⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1920 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"27⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1424 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"28⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1652 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"29⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2444 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"30⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2964 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"31⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1484 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"32⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:820 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"33⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1080 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"34⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2136 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"35⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1972 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"36⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2848 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"37⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1236 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"38⤵
- System Location Discovery: System Language Discovery
PID:2684
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92B
MD567b9b3e2ded7086f393ebbc36c5e7bca
SHA1e6299d0450b9a92a18cc23b5704a2b475652c790
SHA25644063c266686263f14cd2a83fee124fb3e61a9171a6aab69709464f49511011d
SHA512826fbc9481f46b1ae3db828a665c55c349023caf563e6e8c17321f5f3af3e4c3914955db6f0eebfc6defe561315435d47310b4d0499ab9c2c85bb61264dedc09
-
Filesize
753B
MD5b6050a4a32e04548d07b94a739a05783
SHA1a87a22f49f21dc56f1426a1b1549cbca96b3c2d0
SHA256f9aea6ed1283cd90f7f7afed30b9872197a2016e72692df492784b307b468277
SHA512770a39bf276afe6782dc17c0425fabf7986f7b979aa32d82326e8ccf299d7f08c6d548ab460f4553b15b4da0811915fb3fb57ffd87fd90bdaf246114fc127b51
-
Filesize
696B
MD59f87870aabac31b89e8f641cc4796a67
SHA10e7c4d9fa14eb4afe07e0ded564229685c3cbe4b
SHA256c5ccc91ebc3838b354e5ae05c7b3efa01813e004b427f843ba23e78ff272e695
SHA51228c7fe3049354286831a5c2b52ea96583bef30c4a294d07bfb10c11bb9e3469b944d8029d58f73611daa616a279e280d0c14fa037d390ab34a5daa2f5a25c4f6
-
Filesize
696B
MD5dabf4e9d32908d961aaffdd1c77d4879
SHA1e41572d98b7452016fb004c843236377364ab1d3
SHA2563488c64a6d2da3c00e50e954c495ac354ee504e54f3ed6dda6a991c5b9d33e19
SHA512911d46aca8005857c86eddbb3cbbc4301ee5e173b2358a717053cf12727c06cc3b2d757ddf513f969dafe61c6b88d03b1478d8c483495f153e30bf64585195aa
-
Filesize
696B
MD5780c5b88f55c3463a252f361d53f98db
SHA1244e739c7401ce41027d7786f4a48f4806a9939b
SHA256d8b383df125f83a39c299a3134c88e981cf47755ddd6b44310f70231305c6bb0
SHA512b12e3266edea4f9dff105ed8617c81a29f9873d646b6b326c5c29c0c590049dd85458b8ff7541957f9ab995896e7bfd08b171959e592ccc6edbedf998fdf1045
-
Filesize
696B
MD50e6005a9dcb5a78d6fdd54527602f926
SHA190adc62e99f3c94c643596af0e17b5853b91fe1f
SHA256847552b1ad30bd72f24acfe4afa5c326d3e79d7c2f147c958d72e92daca716da
SHA512b4acfd81c1e926fcd305690aa3780bbec50460bcf947d17c20d6445faca4e774294b9da3a144207ccb3855e3ea2008a2d82ef691f32a4db6c7c3eb8202c6b568
-
Filesize
696B
MD53ed43de1cee96aaf1d64189d4482a672
SHA1a346f6b3eca7b8442021d9878288d91084d00d79
SHA256b2905e040a668759a3fbdc7f07ff57b3e197bbeec24099b65734e884c1e0bd98
SHA5128f8536a36603c14a567034f0119212a6b3bf9dd52afcbe213b4e26c737394fe838baf0743440f62cd5d61d8d9c694279679e155920a9af3c2cac1549d43040dc
-
Filesize
696B
MD510ffe941ac3b45a1b27eaab090d03e3b
SHA14f72abac858bc7659692930176f0cd4f18e354f1
SHA256b2a27182b84ccf59736264c5fc788f96d92a2d3a14fe7c964e0976af00956144
SHA512638a48fe06a5e0c47e50ac67e0df2d6952e5e39620a585e5fb086d40ff61cff9bee6a6cfda6582c54e216f052dc6ba4ce5d742ae5174a987701701e67dc65544
-
Filesize
696B
MD51ddf68547078713a6bd04e589e87bc2f
SHA1cdfb5481f8214590744133c77204eff54e733b90
SHA256a5954677872e02157f5c6921ef883fbc22a4f7940d17403a9a0658931d4971fc
SHA512194d12570a7d4e8e9341f56d23fda7ff49e131e818b93633b75c6ef05b6972b8428294bb95529af25cf75cbe2d86756dab000be200466a30a64922e764ebfc2d
-
Filesize
696B
MD5d9ab21af2046aedc3484d569036c3ef7
SHA1ade5e9eb5b1180a77a2164e61f74beb411cdfb56
SHA25690b8f17e573879b63c512e7c0dd6ff9454d177163e2d95d0090b2ef22ae5ec79
SHA512cb8c202cd3d66ee897982e42257320dfef0a23eb96b9a3189869e9a0ce030d4baaa8c0a6fc5e197d2d19d742b0d7b3f34adb12933192dd6e4b1388433755d1ac
-
Filesize
696B
MD5fb757130836576e5f952cb011021776c
SHA168f6351ef6dd363f67e76b91e7d8150050948698
SHA2562d8143967be00cc4d6f3a1b8671885498b80e57ec52a84e19eaf136e64980e5b
SHA5126f7311c6964be509733152377344d37f311021a6638946d275d282aa1b0212d8d790175b8c4e61fba6f5f4299c0e5da3307b69b03f619273462edd5c3cfce0d8
-
Filesize
696B
MD5d6aef0b19d7d8dc2eda464cf358007b7
SHA1c271fa23eee2c534cc862f7575df47f660c94d27
SHA25670965d19e9afccec497ac21e98bfea9be46cf5df938982b3d19e6295aab3bb1d
SHA512c547f50069f9f97dd9877bdb529f4ed49f9761d5cab1ff703e5185a6071e7591b98237834c6bd386b68b9c6504b76bdc581bf17a6fcef94e74b1483d47cf764a
-
Filesize
696B
MD55f2a40f410e1db471d583c90bb1bf208
SHA11e49ed23e02976dede24633c367ab8c92fb4fd9b
SHA25603c04fafe55862423025fe6e16bbeda1dbded8150a0c0dd363164733051fe1e4
SHA51298a4ba3960f66728d4a286c8cff2223742d701467a647b6d4a2f118a6e2c53c9a4f6c329a36c099b151d42279ba0823ff07a8df49c87d02a7470f595052f725c
-
Filesize
1.1MB
MD58798bc26862c833a44f928a0695cdb14
SHA1e7a31385059020a4e44a80394182099ea5386667
SHA256ea57850ec995b286027140e1326cc61749aeefe6b2ac2c8d588db5f3548a8d56
SHA5127972ebeb65e38cec87f0c905d2bc337461454264d59a0690662e2bb21621358ef97b3a665d9c4333acea9155ba938b902c6091398ccc65156d056f9dce80e307
-
Filesize
1.1MB
MD5a4d5b08044fc9d74d4b8d51ee6c4ab72
SHA12eb3b220cadb9bea69297f6b0edf26c43bb8c730
SHA2566ff6d7546dfd236e9b8a5f84b6c719fde0d4e1b3d8a6ce0d9c24dba270fc9c37
SHA512abba667e66ec5cc1cb2504be8cc5a744087d381be862ba9fe452c8d281f7fc9f0206b4f529c775a148ca30b165324ebc5b0bb659db197f4220495d8f60fb860e