Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 22:23
Static task
static1
Behavioral task
behavioral1
Sample
4ab5d0da80f59647be4ee8717d4c195a3f136fa48d38671da1304b3918617068.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4ab5d0da80f59647be4ee8717d4c195a3f136fa48d38671da1304b3918617068.exe
Resource
win10v2004-20240802-en
General
-
Target
4ab5d0da80f59647be4ee8717d4c195a3f136fa48d38671da1304b3918617068.exe
-
Size
1.1MB
-
MD5
237cd8d412fdf74c62321918632adc01
-
SHA1
4266dafd3fca28f943a25862e1a21e6347003817
-
SHA256
4ab5d0da80f59647be4ee8717d4c195a3f136fa48d38671da1304b3918617068
-
SHA512
1be7db88db5dccc437e6846294892831306b8fd664b76334f0de579566f4e935494d24c8c68ff64ea4c914dd8a3e64235ad109e40d485d480671dd69a14b8bf5
-
SSDEEP
24576:aH0dl8myX9Bg42QoXFkrzkmplSgRDYo0lG4Z8r7Qfbkiu5QT:acallSllG4ZM7QzMk
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1484 svchcst.exe -
Executes dropped EXE 25 IoCs
pid Process 1484 svchcst.exe 2328 svchcst.exe 2672 svchcst.exe 2240 svchcst.exe 1288 svchcst.exe 1772 svchcst.exe 2292 svchcst.exe 1956 svchcst.exe 2060 svchcst.exe 2788 svchcst.exe 2136 svchcst.exe 568 svchcst.exe 1628 svchcst.exe 2144 svchcst.exe 1932 svchcst.exe 2064 svchcst.exe 2856 svchcst.exe 668 svchcst.exe 2600 svchcst.exe 1848 svchcst.exe 824 svchcst.exe 2988 svchcst.exe 1628 svchcst.exe 1772 svchcst.exe 2020 svchcst.exe -
Loads dropped DLL 38 IoCs
pid Process 2116 WScript.exe 2116 WScript.exe 2640 WScript.exe 2348 WScript.exe 544 WScript.exe 1476 WScript.exe 1476 WScript.exe 868 WScript.exe 868 WScript.exe 868 WScript.exe 1184 WScript.exe 2084 WScript.exe 2084 WScript.exe 2084 WScript.exe 2004 WScript.exe 2004 WScript.exe 2028 WScript.exe 2028 WScript.exe 2028 WScript.exe 1556 WScript.exe 1556 WScript.exe 1556 WScript.exe 2880 WScript.exe 2880 WScript.exe 1592 WScript.exe 1592 WScript.exe 2704 WScript.exe 2704 WScript.exe 532 WScript.exe 532 WScript.exe 2140 WScript.exe 2140 WScript.exe 1292 WScript.exe 1292 WScript.exe 2816 WScript.exe 2816 WScript.exe 2040 WScript.exe 2040 WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 50 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4ab5d0da80f59647be4ee8717d4c195a3f136fa48d38671da1304b3918617068.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2088 4ab5d0da80f59647be4ee8717d4c195a3f136fa48d38671da1304b3918617068.exe 1484 svchcst.exe 1484 svchcst.exe 1484 svchcst.exe 1484 svchcst.exe 1484 svchcst.exe 1484 svchcst.exe 1484 svchcst.exe 1484 svchcst.exe 1484 svchcst.exe 1484 svchcst.exe 1484 svchcst.exe 1484 svchcst.exe 1484 svchcst.exe 1484 svchcst.exe 1484 svchcst.exe 1484 svchcst.exe 1484 svchcst.exe 1484 svchcst.exe 1484 svchcst.exe 1484 svchcst.exe 1484 svchcst.exe 1484 svchcst.exe 1484 svchcst.exe 1484 svchcst.exe 1484 svchcst.exe 1484 svchcst.exe 1484 svchcst.exe 1484 svchcst.exe 1484 svchcst.exe 1484 svchcst.exe 1484 svchcst.exe 1484 svchcst.exe 1484 svchcst.exe 1484 svchcst.exe 1484 svchcst.exe 1484 svchcst.exe 1484 svchcst.exe 1484 svchcst.exe 1484 svchcst.exe 1484 svchcst.exe 1484 svchcst.exe 1484 svchcst.exe 1484 svchcst.exe 1484 svchcst.exe 1484 svchcst.exe 1484 svchcst.exe 1484 svchcst.exe 1484 svchcst.exe 1484 svchcst.exe 1484 svchcst.exe 1484 svchcst.exe 1484 svchcst.exe 1484 svchcst.exe 1484 svchcst.exe 1484 svchcst.exe 1484 svchcst.exe 1484 svchcst.exe 1484 svchcst.exe 1484 svchcst.exe 1484 svchcst.exe 1484 svchcst.exe 1484 svchcst.exe 1484 svchcst.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2088 4ab5d0da80f59647be4ee8717d4c195a3f136fa48d38671da1304b3918617068.exe -
Suspicious use of SetWindowsHookEx 52 IoCs
pid Process 2088 4ab5d0da80f59647be4ee8717d4c195a3f136fa48d38671da1304b3918617068.exe 2088 4ab5d0da80f59647be4ee8717d4c195a3f136fa48d38671da1304b3918617068.exe 1484 svchcst.exe 1484 svchcst.exe 2328 svchcst.exe 2328 svchcst.exe 2672 svchcst.exe 2672 svchcst.exe 2240 svchcst.exe 2240 svchcst.exe 1288 svchcst.exe 1288 svchcst.exe 1772 svchcst.exe 1772 svchcst.exe 2292 svchcst.exe 2292 svchcst.exe 1956 svchcst.exe 1956 svchcst.exe 2060 svchcst.exe 2060 svchcst.exe 2788 svchcst.exe 2788 svchcst.exe 2136 svchcst.exe 2136 svchcst.exe 568 svchcst.exe 568 svchcst.exe 1628 svchcst.exe 1628 svchcst.exe 2144 svchcst.exe 2144 svchcst.exe 1932 svchcst.exe 1932 svchcst.exe 2064 svchcst.exe 2064 svchcst.exe 2856 svchcst.exe 2856 svchcst.exe 668 svchcst.exe 668 svchcst.exe 2600 svchcst.exe 2600 svchcst.exe 1848 svchcst.exe 1848 svchcst.exe 824 svchcst.exe 824 svchcst.exe 2988 svchcst.exe 2988 svchcst.exe 1628 svchcst.exe 1628 svchcst.exe 1772 svchcst.exe 1772 svchcst.exe 2020 svchcst.exe 2020 svchcst.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2088 wrote to memory of 2116 2088 4ab5d0da80f59647be4ee8717d4c195a3f136fa48d38671da1304b3918617068.exe 30 PID 2088 wrote to memory of 2116 2088 4ab5d0da80f59647be4ee8717d4c195a3f136fa48d38671da1304b3918617068.exe 30 PID 2088 wrote to memory of 2116 2088 4ab5d0da80f59647be4ee8717d4c195a3f136fa48d38671da1304b3918617068.exe 30 PID 2088 wrote to memory of 2116 2088 4ab5d0da80f59647be4ee8717d4c195a3f136fa48d38671da1304b3918617068.exe 30 PID 2116 wrote to memory of 1484 2116 WScript.exe 33 PID 2116 wrote to memory of 1484 2116 WScript.exe 33 PID 2116 wrote to memory of 1484 2116 WScript.exe 33 PID 2116 wrote to memory of 1484 2116 WScript.exe 33 PID 1484 wrote to memory of 2640 1484 svchcst.exe 34 PID 1484 wrote to memory of 2640 1484 svchcst.exe 34 PID 1484 wrote to memory of 2640 1484 svchcst.exe 34 PID 1484 wrote to memory of 2640 1484 svchcst.exe 34 PID 2640 wrote to memory of 2328 2640 WScript.exe 35 PID 2640 wrote to memory of 2328 2640 WScript.exe 35 PID 2640 wrote to memory of 2328 2640 WScript.exe 35 PID 2640 wrote to memory of 2328 2640 WScript.exe 35 PID 2328 wrote to memory of 2348 2328 svchcst.exe 36 PID 2328 wrote to memory of 2348 2328 svchcst.exe 36 PID 2328 wrote to memory of 2348 2328 svchcst.exe 36 PID 2328 wrote to memory of 2348 2328 svchcst.exe 36 PID 2348 wrote to memory of 2672 2348 WScript.exe 37 PID 2348 wrote to memory of 2672 2348 WScript.exe 37 PID 2348 wrote to memory of 2672 2348 WScript.exe 37 PID 2348 wrote to memory of 2672 2348 WScript.exe 37 PID 2672 wrote to memory of 544 2672 svchcst.exe 38 PID 2672 wrote to memory of 544 2672 svchcst.exe 38 PID 2672 wrote to memory of 544 2672 svchcst.exe 38 PID 2672 wrote to memory of 544 2672 svchcst.exe 38 PID 544 wrote to memory of 2240 544 WScript.exe 39 PID 544 wrote to memory of 2240 544 WScript.exe 39 PID 544 wrote to memory of 2240 544 WScript.exe 39 PID 544 wrote to memory of 2240 544 WScript.exe 39 PID 2240 wrote to memory of 1476 2240 svchcst.exe 40 PID 2240 wrote to memory of 1476 2240 svchcst.exe 40 PID 2240 wrote to memory of 1476 2240 svchcst.exe 40 PID 2240 wrote to memory of 1476 2240 svchcst.exe 40 PID 1476 wrote to memory of 1288 1476 WScript.exe 41 PID 1476 wrote to memory of 1288 1476 WScript.exe 41 PID 1476 wrote to memory of 1288 1476 WScript.exe 41 PID 1476 wrote to memory of 1288 1476 WScript.exe 41 PID 1288 wrote to memory of 1184 1288 svchcst.exe 42 PID 1288 wrote to memory of 1184 1288 svchcst.exe 42 PID 1288 wrote to memory of 1184 1288 svchcst.exe 42 PID 1288 wrote to memory of 1184 1288 svchcst.exe 42 PID 1476 wrote to memory of 1772 1476 WScript.exe 43 PID 1476 wrote to memory of 1772 1476 WScript.exe 43 PID 1476 wrote to memory of 1772 1476 WScript.exe 43 PID 1476 wrote to memory of 1772 1476 WScript.exe 43 PID 1772 wrote to memory of 868 1772 svchcst.exe 44 PID 1772 wrote to memory of 868 1772 svchcst.exe 44 PID 1772 wrote to memory of 868 1772 svchcst.exe 44 PID 1772 wrote to memory of 868 1772 svchcst.exe 44 PID 868 wrote to memory of 2292 868 WScript.exe 45 PID 868 wrote to memory of 2292 868 WScript.exe 45 PID 868 wrote to memory of 2292 868 WScript.exe 45 PID 868 wrote to memory of 2292 868 WScript.exe 45 PID 2292 wrote to memory of 2248 2292 svchcst.exe 46 PID 2292 wrote to memory of 2248 2292 svchcst.exe 46 PID 2292 wrote to memory of 2248 2292 svchcst.exe 46 PID 2292 wrote to memory of 2248 2292 svchcst.exe 46 PID 868 wrote to memory of 1956 868 WScript.exe 47 PID 868 wrote to memory of 1956 868 WScript.exe 47 PID 868 wrote to memory of 1956 868 WScript.exe 47 PID 868 wrote to memory of 1956 868 WScript.exe 47
Processes
-
C:\Users\Admin\AppData\Local\Temp\4ab5d0da80f59647be4ee8717d4c195a3f136fa48d38671da1304b3918617068.exe"C:\Users\Admin\AppData\Local\Temp\4ab5d0da80f59647be4ee8717d4c195a3f136fa48d38671da1304b3918617068.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"6⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"8⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:544 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"9⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"10⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"11⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"12⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1184 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"13⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2060 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"14⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2084 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"15⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2788 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"16⤵
- System Location Discovery: System Language Discovery
PID:2968
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"15⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2136 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"16⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2004 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"17⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:568 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"18⤵
- System Location Discovery: System Language Discovery
PID:1712
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"17⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1628 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"18⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2028 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"19⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2144 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"20⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1556 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"21⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2064
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"21⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2856 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"22⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2880 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"23⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:668 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"24⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1592 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"25⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2600 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"26⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2704 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"27⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1848 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"28⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:532 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"29⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:824 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"30⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2140 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"31⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2988 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"32⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1292 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"33⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1628 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"34⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2816 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"35⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1772 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"36⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2040 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"37⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2020 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"38⤵
- System Location Discovery: System Language Discovery
PID:1688
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"19⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1932 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"20⤵
- System Location Discovery: System Language Discovery
PID:2272
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"11⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"12⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:868 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"13⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"14⤵
- System Location Discovery: System Language Discovery
PID:2248
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"13⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1956
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92B
MD567b9b3e2ded7086f393ebbc36c5e7bca
SHA1e6299d0450b9a92a18cc23b5704a2b475652c790
SHA25644063c266686263f14cd2a83fee124fb3e61a9171a6aab69709464f49511011d
SHA512826fbc9481f46b1ae3db828a665c55c349023caf563e6e8c17321f5f3af3e4c3914955db6f0eebfc6defe561315435d47310b4d0499ab9c2c85bb61264dedc09
-
Filesize
696B
MD5951aaea1269f2a203f3dd7cd181c5d34
SHA13623d216764b24aa0b02cbc136287252bf5b412a
SHA256228b66ed4c4a1270fe5a6655cdd849de937351e95974b96acafa59b8107b7dd4
SHA512cd84967ad43a13c3cd57cc80f6533a9e9fd93a5eddf4807825b8d19883da4acda3e7b4ff963f23209c579050fedf834382d8e718386c852ceaf350b2b0f91816
-
Filesize
753B
MD5efd9fe9f1ae2562949d0cf32d77226ed
SHA11087a4816e6656538d9cd496fc150972107ce6a8
SHA25625caf497ea9a99ab16372ea620fa5109fdcf35ff48cafc51a2784648d83917cf
SHA5126a8602004c7d1fefa4be305623b3f4ca868c2a362001f674440934d7ea42dbd5f1173ae6bd2bbf0f0d25e3459920b746fb9268efe8ac03909aa96851998e325d
-
Filesize
696B
MD5f3159db8bd483868144429c5909d280a
SHA1a3698b1ebb0e43a564357bb77c3462539a114f87
SHA256f31b8921a342ba1eecff8852bd1904a17e94e544a1975106b9b5533155ed044c
SHA512328e166bbd706c7e6848c246909d96779ee2efcdf7bdb0ff47eed24e0267dcca005bb41651b60393ffafbb7b7467d94b22454e8c4be57108ffeb6238e88db916
-
Filesize
696B
MD5ad7007ed9542468662553e405df66821
SHA1757c5ee287a113d689f2d370176fcf9c9e1223a3
SHA25612967e637928b853b708430671e1b72f6ca847a2af2680f8f15da98efb31161e
SHA512812220b05239ebb0e14f3cd738e58274deb60624eacc360d2b3be6c5010dc418f2587f5f6736a1d80a3a5f52ae9887a492e8934e64af66c89b45a9b47d3069c9
-
Filesize
696B
MD5619955d43a58558c766025119a5a66cb
SHA1cfb43d2b9cb68699667ca8d4929e71b25ed115ab
SHA256a129bff17a859b7b2d6681f519c985c661797dd508ac249d30f02a0a78858cee
SHA51220f9499cddf2fb824365830736255a1dce689da0e94fa8e999ee4e28883e65637410710ea01204b5f3d48213f697461288da2b7a535511da87f848b1e6e83bc6
-
Filesize
696B
MD524e4a44b907089d788280d647e33c77e
SHA1ac5a4e397dea243c0022c55319e7c7035d013905
SHA2567fcd076a55f0b7c8e9407217aee7e68893461d15cb8d2946ac5250af35137211
SHA512c4a8dac1c1d5dfa976cc3e8fd299e423ab620463983b8c602be8a83ecc6598eb3f1d60a7370806e1f85a52dd91e4f1337a6dff2e99459f9a1e429a1ffb65a00b
-
Filesize
696B
MD5f9d25791d9949ef33ed0c208f3d11851
SHA11cdf525209a1d7ade65168011e4de530de7bdc5a
SHA256d3592a18c2a195dba2db76e25fb1516b2a9ef5297e9d72716e232d3540bc4481
SHA512efb6f3882b9c75aa5193cf1bfeeb430b0a963681bf5367f535e3eb9c4e7c796c0aa1d0e3df9803c635ba6d863dc129a9ab30c954c6d4af27803036859d3d3113
-
Filesize
696B
MD51a94fff9bade36e4d067e0fcefb1a8f5
SHA11713c3fc499a56cd97035e44405e0b5e1a0a586b
SHA2561977a5ac15e88252efdd11b9aace6de92383e71132a94273b0e890e92ae91048
SHA51289a7dd6811f9491a14bf49f1cbce3e869107d2e0d410fa3d3c867ce68d573d6f8e6ada98ac3635fc620c96c61676b5cef2563b5fbea14f617c1fa61bce4f3ac7
-
Filesize
696B
MD56491ffe6ef75436d9e660280f5c7fa8f
SHA1aa563dfffa849153924e8a50f5b562663d1549b5
SHA25661926578340a542bb64c6abd62437790f27fe9f3c91f6e7bc3268fe318333382
SHA5127caf0a3528181a867f6a7d1e705531db6eb12a82faa881fde4693b6d1f57be05e589c9276fc6364204494cd9c65f355a35d1dafb0d02582346057b5c4b8c2193
-
Filesize
696B
MD5d9ab21af2046aedc3484d569036c3ef7
SHA1ade5e9eb5b1180a77a2164e61f74beb411cdfb56
SHA25690b8f17e573879b63c512e7c0dd6ff9454d177163e2d95d0090b2ef22ae5ec79
SHA512cb8c202cd3d66ee897982e42257320dfef0a23eb96b9a3189869e9a0ce030d4baaa8c0a6fc5e197d2d19d742b0d7b3f34adb12933192dd6e4b1388433755d1ac
-
Filesize
696B
MD55d0d203da02edb604545d3d826c88b42
SHA19be0cfd40b48d4e6041e00827047a8b0d877d4a1
SHA2565f341c2f1ff381eecedbf6fcbe549724323c30c05728132a98ea55f607bc3e81
SHA512a3e01552a9576ba8dd9aa9f65211f74a69588a316d984b8887e740c6c174e19df2056dc0138d5af26bd927e192ec2c7d355fc8b4092e30d55de910e932fbd49f
-
Filesize
696B
MD5067a3458406fce1e0caec803b21a2c58
SHA11277d2a3236100a0758d4f4f279cd02d537e626b
SHA25635c0d5d7757b50c61a708107c8e2ab5df872fdc25516f8003d9d58d3ae5ec9e3
SHA51299918a35f93140231d63a17c97bb9ef66a5744dc044c7e48034c3d2fcc49c3b97fe0d37a32ae6307a7b7e772b8016a6727672d2844b5ed7dcf20c31dd01724e4
-
Filesize
696B
MD5308b7da7ec377746fab239c88940c7ea
SHA162356f1d6078f5587c1e0fa2201b199ebfdd0372
SHA2563c6e5a89529248f6074cab8ca705d7f399c2808e185a451f2520d767e7aecd77
SHA512bfd886261d3c9ae90f40968acb30b229e8d6754768bee5430f246594b5f81952de101a572cedb84bd1ab9a39cb607ec981287e9e03ea45b829744c47ee9bc877
-
Filesize
696B
MD518daeaff7fc134fc2edabbaea7e7e9f0
SHA1a6a3002f7828141bac042e08241df957ef348bb4
SHA25656a26505482cb65715785a972070bd6b72ad56c09ec26f7a97d7b0ac5bf52303
SHA5126a91ececa4ca5ffbd12c7ca83888a63a7baf2be281610d9b0d83ee9dfcb8f6d04c1466de5ac1b53abe3daaf2998ec40b4b3a1a1d6fc271f35d25523358bd3df0
-
Filesize
1.1MB
MD52234778c5d246f695668a3bc4a2f2d7a
SHA1dd26c3c3c7d0543ba8c007a92451f3169d500430
SHA2568fa7a2c10c17fddc006338aca9426fa4a3acf094aa37cb9f5f50ac4f3d4d3090
SHA512dcc4623499aa672d4283f39cef7dc09a3f0731dd6e1dcb52b5d31cea0fd6b11aa55a76b25276be27a99cdb95e7778a71e6eb1b20b61702b30511078e1a45bd05
-
Filesize
1.1MB
MD5e8decba2ed4d61d03398f546919c61e1
SHA1f8cad05879017c5dfbfcf7d8dcc26af100d164d1
SHA256bbef364b0c9b06724ac8aa3895035ccb4e54311dd816aceaa2b9b81e0afc0bd1
SHA5126b99d58ddf6844c8eef300349059eeca9ef5ecdb484a87faff3ff43acf89ef7b54ab96ad6a3a15892873bbc6c6b1a1376d997f54d321fccfff364d8a50b72435
-
Filesize
1.1MB
MD5a6f52702202f7b388066e06991f1329e
SHA1b84f3fa905248fd4e8483afcb98ab07893db402f
SHA2566599dc9579c32f922a7a47bd8247c6845c45014b0d7641c0e680d439b53bc997
SHA512df913f0f4463856d620ab216119273a6ef4e5d5efcd23b75086fc74298305a4d8982da2d59b914df3d6e9ee99e84d96c79888a637cce9fba3c0a4849080be5bb