Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 03:59
Static task
static1
Behavioral task
behavioral1
Sample
62ddcc6ce2b9b392ba620c3424edaebf5b7f2dc9398e06ef83f90aade34ead95.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
62ddcc6ce2b9b392ba620c3424edaebf5b7f2dc9398e06ef83f90aade34ead95.exe
Resource
win10v2004-20240802-en
General
-
Target
62ddcc6ce2b9b392ba620c3424edaebf5b7f2dc9398e06ef83f90aade34ead95.exe
-
Size
1.1MB
-
MD5
a3f84b6dfb7ff8e793f858a333237c97
-
SHA1
1d0d7072996c2fcca13f83eb106bc910cafb970a
-
SHA256
62ddcc6ce2b9b392ba620c3424edaebf5b7f2dc9398e06ef83f90aade34ead95
-
SHA512
d93c3ec85b35dfce81d484094161d247c1b55128d4005beb06eb6c5390d0a4ce11157c5300f117a3411d6b474aa2d1828d11e71cd03fa6b0fedb6066dae54d60
-
SSDEEP
24576:aH0dl8myX9Bg42QoXFkrzkmplSgRDYo0lG4Z8r7Qfbkiu5Qv:acallSllG4ZM7QzMo
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1844 svchcst.exe -
Executes dropped EXE 25 IoCs
pid Process 1844 svchcst.exe 2988 svchcst.exe 2208 svchcst.exe 2444 svchcst.exe 1592 svchcst.exe 680 svchcst.exe 688 svchcst.exe 3028 svchcst.exe 2348 svchcst.exe 2828 svchcst.exe 3060 svchcst.exe 2460 svchcst.exe 1672 svchcst.exe 704 svchcst.exe 1692 svchcst.exe 2732 svchcst.exe 2608 svchcst.exe 2960 svchcst.exe 3004 svchcst.exe 2052 svchcst.exe 700 svchcst.exe 324 svchcst.exe 2992 svchcst.exe 2356 svchcst.exe 940 svchcst.exe -
Loads dropped DLL 48 IoCs
pid Process 2896 WScript.exe 2896 WScript.exe 856 WScript.exe 856 WScript.exe 2488 WScript.exe 2488 WScript.exe 876 WScript.exe 2488 WScript.exe 2488 WScript.exe 2488 WScript.exe 604 WScript.exe 604 WScript.exe 2500 WScript.exe 2500 WScript.exe 1684 WScript.exe 1684 WScript.exe 2076 WScript.exe 2076 WScript.exe 2920 WScript.exe 2920 WScript.exe 2268 WScript.exe 2268 WScript.exe 1912 WScript.exe 1912 WScript.exe 2464 WScript.exe 2464 WScript.exe 2056 WScript.exe 2056 WScript.exe 2800 WScript.exe 2800 WScript.exe 2228 WScript.exe 2228 WScript.exe 2948 WScript.exe 2948 WScript.exe 1752 WScript.exe 1752 WScript.exe 668 WScript.exe 668 WScript.exe 2040 WScript.exe 2040 WScript.exe 1356 WScript.exe 1356 WScript.exe 648 WScript.exe 648 WScript.exe 2240 WScript.exe 2240 WScript.exe 2908 WScript.exe 2908 WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 53 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 62ddcc6ce2b9b392ba620c3424edaebf5b7f2dc9398e06ef83f90aade34ead95.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2732 62ddcc6ce2b9b392ba620c3424edaebf5b7f2dc9398e06ef83f90aade34ead95.exe 2732 62ddcc6ce2b9b392ba620c3424edaebf5b7f2dc9398e06ef83f90aade34ead95.exe 1844 svchcst.exe 1844 svchcst.exe 1844 svchcst.exe 1844 svchcst.exe 1844 svchcst.exe 1844 svchcst.exe 1844 svchcst.exe 1844 svchcst.exe 1844 svchcst.exe 1844 svchcst.exe 1844 svchcst.exe 1844 svchcst.exe 1844 svchcst.exe 1844 svchcst.exe 1844 svchcst.exe 1844 svchcst.exe 1844 svchcst.exe 1844 svchcst.exe 1844 svchcst.exe 1844 svchcst.exe 1844 svchcst.exe 1844 svchcst.exe 1844 svchcst.exe 1844 svchcst.exe 1844 svchcst.exe 1844 svchcst.exe 1844 svchcst.exe 1844 svchcst.exe 1844 svchcst.exe 1844 svchcst.exe 1844 svchcst.exe 1844 svchcst.exe 1844 svchcst.exe 1844 svchcst.exe 1844 svchcst.exe 1844 svchcst.exe 1844 svchcst.exe 1844 svchcst.exe 1844 svchcst.exe 1844 svchcst.exe 1844 svchcst.exe 1844 svchcst.exe 1844 svchcst.exe 1844 svchcst.exe 1844 svchcst.exe 1844 svchcst.exe 1844 svchcst.exe 1844 svchcst.exe 1844 svchcst.exe 1844 svchcst.exe 1844 svchcst.exe 1844 svchcst.exe 1844 svchcst.exe 1844 svchcst.exe 1844 svchcst.exe 1844 svchcst.exe 1844 svchcst.exe 1844 svchcst.exe 1844 svchcst.exe 1844 svchcst.exe 1844 svchcst.exe 1844 svchcst.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2732 62ddcc6ce2b9b392ba620c3424edaebf5b7f2dc9398e06ef83f90aade34ead95.exe -
Suspicious use of SetWindowsHookEx 52 IoCs
pid Process 2732 62ddcc6ce2b9b392ba620c3424edaebf5b7f2dc9398e06ef83f90aade34ead95.exe 2732 62ddcc6ce2b9b392ba620c3424edaebf5b7f2dc9398e06ef83f90aade34ead95.exe 1844 svchcst.exe 1844 svchcst.exe 2988 svchcst.exe 2988 svchcst.exe 2208 svchcst.exe 2208 svchcst.exe 2444 svchcst.exe 2444 svchcst.exe 1592 svchcst.exe 1592 svchcst.exe 680 svchcst.exe 680 svchcst.exe 688 svchcst.exe 688 svchcst.exe 3028 svchcst.exe 3028 svchcst.exe 2348 svchcst.exe 2348 svchcst.exe 2828 svchcst.exe 2828 svchcst.exe 3060 svchcst.exe 3060 svchcst.exe 2460 svchcst.exe 2460 svchcst.exe 1672 svchcst.exe 1672 svchcst.exe 704 svchcst.exe 704 svchcst.exe 1692 svchcst.exe 1692 svchcst.exe 2732 svchcst.exe 2732 svchcst.exe 2608 svchcst.exe 2608 svchcst.exe 2960 svchcst.exe 2960 svchcst.exe 3004 svchcst.exe 3004 svchcst.exe 2052 svchcst.exe 2052 svchcst.exe 700 svchcst.exe 700 svchcst.exe 324 svchcst.exe 324 svchcst.exe 2992 svchcst.exe 2992 svchcst.exe 2356 svchcst.exe 2356 svchcst.exe 940 svchcst.exe 940 svchcst.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2732 wrote to memory of 2896 2732 62ddcc6ce2b9b392ba620c3424edaebf5b7f2dc9398e06ef83f90aade34ead95.exe 31 PID 2732 wrote to memory of 2896 2732 62ddcc6ce2b9b392ba620c3424edaebf5b7f2dc9398e06ef83f90aade34ead95.exe 31 PID 2732 wrote to memory of 2896 2732 62ddcc6ce2b9b392ba620c3424edaebf5b7f2dc9398e06ef83f90aade34ead95.exe 31 PID 2732 wrote to memory of 2896 2732 62ddcc6ce2b9b392ba620c3424edaebf5b7f2dc9398e06ef83f90aade34ead95.exe 31 PID 2732 wrote to memory of 2616 2732 62ddcc6ce2b9b392ba620c3424edaebf5b7f2dc9398e06ef83f90aade34ead95.exe 30 PID 2732 wrote to memory of 2616 2732 62ddcc6ce2b9b392ba620c3424edaebf5b7f2dc9398e06ef83f90aade34ead95.exe 30 PID 2732 wrote to memory of 2616 2732 62ddcc6ce2b9b392ba620c3424edaebf5b7f2dc9398e06ef83f90aade34ead95.exe 30 PID 2732 wrote to memory of 2616 2732 62ddcc6ce2b9b392ba620c3424edaebf5b7f2dc9398e06ef83f90aade34ead95.exe 30 PID 2896 wrote to memory of 1844 2896 WScript.exe 33 PID 2896 wrote to memory of 1844 2896 WScript.exe 33 PID 2896 wrote to memory of 1844 2896 WScript.exe 33 PID 2896 wrote to memory of 1844 2896 WScript.exe 33 PID 1844 wrote to memory of 856 1844 svchcst.exe 34 PID 1844 wrote to memory of 856 1844 svchcst.exe 34 PID 1844 wrote to memory of 856 1844 svchcst.exe 34 PID 1844 wrote to memory of 856 1844 svchcst.exe 34 PID 856 wrote to memory of 2988 856 WScript.exe 35 PID 856 wrote to memory of 2988 856 WScript.exe 35 PID 856 wrote to memory of 2988 856 WScript.exe 35 PID 856 wrote to memory of 2988 856 WScript.exe 35 PID 2988 wrote to memory of 876 2988 svchcst.exe 36 PID 2988 wrote to memory of 876 2988 svchcst.exe 36 PID 2988 wrote to memory of 876 2988 svchcst.exe 36 PID 2988 wrote to memory of 876 2988 svchcst.exe 36 PID 2988 wrote to memory of 2488 2988 svchcst.exe 37 PID 2988 wrote to memory of 2488 2988 svchcst.exe 37 PID 2988 wrote to memory of 2488 2988 svchcst.exe 37 PID 2988 wrote to memory of 2488 2988 svchcst.exe 37 PID 2488 wrote to memory of 2208 2488 WScript.exe 38 PID 2488 wrote to memory of 2208 2488 WScript.exe 38 PID 2488 wrote to memory of 2208 2488 WScript.exe 38 PID 2488 wrote to memory of 2208 2488 WScript.exe 38 PID 876 wrote to memory of 2444 876 WScript.exe 39 PID 876 wrote to memory of 2444 876 WScript.exe 39 PID 876 wrote to memory of 2444 876 WScript.exe 39 PID 876 wrote to memory of 2444 876 WScript.exe 39 PID 2488 wrote to memory of 1592 2488 WScript.exe 40 PID 2488 wrote to memory of 1592 2488 WScript.exe 40 PID 2488 wrote to memory of 1592 2488 WScript.exe 40 PID 2488 wrote to memory of 1592 2488 WScript.exe 40 PID 1592 wrote to memory of 440 1592 svchcst.exe 41 PID 1592 wrote to memory of 440 1592 svchcst.exe 41 PID 1592 wrote to memory of 440 1592 svchcst.exe 41 PID 1592 wrote to memory of 440 1592 svchcst.exe 41 PID 2488 wrote to memory of 680 2488 WScript.exe 43 PID 2488 wrote to memory of 680 2488 WScript.exe 43 PID 2488 wrote to memory of 680 2488 WScript.exe 43 PID 2488 wrote to memory of 680 2488 WScript.exe 43 PID 680 wrote to memory of 604 680 svchcst.exe 44 PID 680 wrote to memory of 604 680 svchcst.exe 44 PID 680 wrote to memory of 604 680 svchcst.exe 44 PID 680 wrote to memory of 604 680 svchcst.exe 44 PID 604 wrote to memory of 688 604 WScript.exe 45 PID 604 wrote to memory of 688 604 WScript.exe 45 PID 604 wrote to memory of 688 604 WScript.exe 45 PID 604 wrote to memory of 688 604 WScript.exe 45 PID 688 wrote to memory of 2500 688 svchcst.exe 46 PID 688 wrote to memory of 2500 688 svchcst.exe 46 PID 688 wrote to memory of 2500 688 svchcst.exe 46 PID 688 wrote to memory of 2500 688 svchcst.exe 46 PID 688 wrote to memory of 1304 688 svchcst.exe 47 PID 688 wrote to memory of 1304 688 svchcst.exe 47 PID 688 wrote to memory of 1304 688 svchcst.exe 47 PID 688 wrote to memory of 1304 688 svchcst.exe 47
Processes
-
C:\Users\Admin\AppData\Local\Temp\62ddcc6ce2b9b392ba620c3424edaebf5b7f2dc9398e06ef83f90aade34ead95.exe"C:\Users\Admin\AppData\Local\Temp\62ddcc6ce2b9b392ba620c3424edaebf5b7f2dc9398e06ef83f90aade34ead95.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- System Location Discovery: System Language Discovery
PID:2616
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"6⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:876 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2444
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"6⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2208
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"8⤵
- System Location Discovery: System Language Discovery
PID:440
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:680 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"8⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:604 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"9⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:688 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"10⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2500 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"11⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3028 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"12⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1684 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"13⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2348 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"14⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2076 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"15⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2828 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"16⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2920 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"17⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3060 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"18⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2268 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"19⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2460 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"20⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1912 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"21⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1672 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"22⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2464 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"23⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:704 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"24⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2056 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"25⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1692 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"26⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2800 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"27⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2732 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"28⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2228 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"29⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2608 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"30⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2948 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"31⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2960 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"32⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1752 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"33⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3004 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"34⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:668 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"35⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2052 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"36⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2040 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"37⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:700 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"38⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1356 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"39⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:324 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"40⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:648 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"41⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2992 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"42⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2240 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"43⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2356 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"44⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2908 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"45⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:940 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"46⤵
- System Location Discovery: System Language Discovery
PID:1604
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"10⤵
- System Location Discovery: System Language Discovery
PID:1304
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92B
MD567b9b3e2ded7086f393ebbc36c5e7bca
SHA1e6299d0450b9a92a18cc23b5704a2b475652c790
SHA25644063c266686263f14cd2a83fee124fb3e61a9171a6aab69709464f49511011d
SHA512826fbc9481f46b1ae3db828a665c55c349023caf563e6e8c17321f5f3af3e4c3914955db6f0eebfc6defe561315435d47310b4d0499ab9c2c85bb61264dedc09
-
Filesize
753B
MD5738cc499699b12498d875925694096ee
SHA1a72f5363fcf5493add7353c32bf7cb9967186e22
SHA2560ef77f6e8396df4e38ed0658eb263e6b4cb6f28bde22d5fc3adaacf082c202b4
SHA5129241e3406e67b3b2688e8bfe719141c130c3c57f0e59a9f8f6a7f0fbf04c950e0a12b838a65c597364a7e1b040c9689919115362b59fd04e93dae95454a9d28e
-
Filesize
696B
MD541bdc303960afcda8ebae4f3e29f0b52
SHA14cbf649fb04c836614138308a06ecd48dcb2882d
SHA256da674cdbd4dd762cc32ce0bd2ec36929a626e0e87f7ab7a4a1b1e1ce0123d999
SHA512800b5b01cc41e7633f203579e7f6ec0a9f6408f7af79dcfa74596be9264dbb8baade6b1439dedb5194496aa27b8b0e2680ce65ad91032138ea0ac2c8a0872cf1
-
Filesize
696B
MD55f2a40f410e1db471d583c90bb1bf208
SHA11e49ed23e02976dede24633c367ab8c92fb4fd9b
SHA25603c04fafe55862423025fe6e16bbeda1dbded8150a0c0dd363164733051fe1e4
SHA51298a4ba3960f66728d4a286c8cff2223742d701467a647b6d4a2f118a6e2c53c9a4f6c329a36c099b151d42279ba0823ff07a8df49c87d02a7470f595052f725c
-
Filesize
696B
MD5aac0fba8016aa15609aa7abb5db077ae
SHA1f8afa6ff11a91f46eb961727ec6a5fad360fa1c9
SHA25676a6ce5f2e579dc37db23bb0e1ef5ebdd8b02e6b22b6f8da1a17964db237a8a0
SHA51226a4910f08563b7c4b1e1abba82fefdefcb43b7d1149d5e6c7dda36db4aa142c4b74bc64263f23a5177804e2191696795e0de5d5368ea6903b398415d435962e
-
Filesize
696B
MD51ac4421f71447c6f92ce3ac17a3d9d38
SHA197f4ebc5875af7ee54f93ba70089361ca88da8af
SHA256615df52b00308d2a7f8aed927fd28d1e40b5ac6cf5e6da78ec69acd149618d59
SHA5123d7d6a0124324731462a5e71d797c77e9942371fbdda8b870cb9d035db293ef1765e1890737fd89fd1b9d56941bd04745f93c95c844057830605365367ea410e
-
Filesize
696B
MD5024be950e07002e527b8dd1efbb0e4b4
SHA11a56034c6366027442be28a75bce7cdea55a8a98
SHA25651f47375c2a87dc9fe8cc958432adcc166d0faf75f7d1da1322e238fb5d72893
SHA51296864be4661feeef155d1816192852146e5d2aa3266ce5b732ec203d43a6098a5fa456a7decb9ab1bd66bc959ed85b485de32c11cea6ee6d1a48d0bea2349b6f
-
Filesize
696B
MD598328aa8ad181fbf0b87edfc21155dce
SHA13ca100ca64d5f62a5dceef47f414c0953fd4f559
SHA256a6928cf27564f6f983d8f62358463a2dee471715b220de03db8b72ebf105f20c
SHA51275f298c982eeebf184fdd0612436583a863beba740bd55053539dc1b1c20103a1c6f5da46b41621eb00d601cdfc86c1705080a0da08fef7756637805dcb588ec
-
Filesize
696B
MD5c0b5050d31a3c3086d56cf03dbf39e65
SHA12f16721133b7efffc3b7c495803a409b47223c1f
SHA2564eed6a5c4f010b8604f822c91683ba0cf9c2c1f7fd803bcd9c05bfd36d84f37a
SHA512be8a9ade498e5b54e7ca07bb3f9f114962847942d282e46e2b4f3e53704b27b47853c7bc60e5fdfc777b6e1fa2f8d34aa0d3321354c8a6b81d1640ce7780d9d5
-
Filesize
696B
MD55771c014296ebb077452c34a3ea54708
SHA16e6ff6d4e62db0f7295883fcdf1b10a4f69b2b58
SHA2568abb3ec990928dfb09f067bb1f8b7e99a9487f039c9a5f80ab5306006c746859
SHA512642db2534af82e398285770d5b6564603b457e1e4e0853cb46322aa24f7a880223a839875e7022d5c21f5eb01730df4e4dffdb426ef6e6c81defeb5f5f774ac5
-
Filesize
696B
MD555765ba68da8820ee35d2d4d1dedeac0
SHA119f5f147056f3d837a11d6b08a7fc9544f9927f6
SHA2561eb237d283717ac45bdfef217d3d09fb4ef73db3838859057c94e488b329c522
SHA51261b6361b8dfef2067016c50e830db1fc768d0654a3f643cf4b4cb1193de722f74401e73f719d8cff5a443058adfa7e3cd0dfc502f25dd249cdc36a7056c81c18
-
Filesize
1.1MB
MD56bca59c07ee3c7b28369d5ce44625fb9
SHA1381d3292a185516a0415beb8f3217ea3ee7d5850
SHA256f3503f1e25c4b5a226cc96e6134b4f5b89d41e3afdd7b895af6d761edcd4ca50
SHA5128cf8d67183a6d05de3363e7e518d0804248cee1f17d64dcdc45dabb35ce4f2dafdf0daf756a3b53ac9b32db4a772604bce7361878532168a70aa312b38815250
-
Filesize
1.1MB
MD594b1e45501ae1d44e92ddc06d1f532cc
SHA1c85e5f0ab0aff4d161a6d850d30122d1104c6950
SHA256ef2d9445e4a1f305a07a2160fa3da01e7be00fad251eaaa1d438e8f6e565695a
SHA512aed96ee30d665b64e93261f1a7beba89cc5beb88238f4ddd636b103601a492dd171dd0f669efd657014702aed9f028d7f10db53c4778e3d551d4e3a840c4a718
-
Filesize
1.1MB
MD5c4c295bb5c284ac981431c66fb8a613c
SHA139bc4db05ba078cd77281c71cdb9d0068fb80190
SHA25682340002ab1c5929829d43823d141ad474802c7ff6bd66fc31b1f0516d5e0c68
SHA5126e0073392d6e5e8d239e4efe76020593c91ba7378aa8c67017e20191ae751a1ec1b26232d8b07de235e0463f9417f95c9c09955eb2983ce219e537a9264a8411
-
Filesize
1.1MB
MD56dc840b1b712e9a341e8180a6ef7a033
SHA1b4d97fb5ee75517cb911005bda8a0efea37ccc7a
SHA256df9a31bbc097982c8b135c90cc1ad8f4f331de78306f21ae532d94d7a338e493
SHA5124d1c01156c24a3474274edc3a49127781d38e99d816e0d50ee805c7b6c0cd5b6d21683915c30c7be5d21381cc809ee51d179eca7f16a410009f7223e79e5a5dd
-
Filesize
1.1MB
MD5402ddbbf4c0940fc4a88a4d56dd125b6
SHA14cb970e9c55a3cb36524366adf2303b03f91403f
SHA256d732ff3b37f84fbbe384253f66d80fcee6a5b6e0f3050442565507f66ef4c10d
SHA5125861bf884d9bdb77a42070c70755d306cb49224de136eacedeaadb4a2af7030b510a98c0c74295d56bb2023b968f11feff76a9e8eeb826a89aa90e8e6c0eda5e
-
Filesize
1.1MB
MD54be3120dfc9522fff4bb856dd3200b62
SHA137c27d2a7dd9a8bb350f5737ec3b2060805e2ef8
SHA256f37adad3c7c3f5b2dc95f8e283f9f45630cbd7acfec2b66019af0821d985eb05
SHA512109d51122dbc55d4cba8508463789e7855615fa93be40a33c83eca91d1d9f9a06bba3ba065c9e21186212a40312183effe3c25afe8e7e9c44d25dd00c5fd7aad
-
Filesize
1.1MB
MD565a95316c01975548499296abb335e12
SHA1ea1d2546a3b65c0d784608ced5e282bed77b7ec0
SHA256a9976224c59cc3090a973f9c76fa23acd74104ff9b855cc347c11796315fbabc
SHA512d4f195c6e808e45e0d3a57cb25f8e11f370ecaf4ec4a5c7f4099f341dfdb9fab312ff3dc4cee84d74253a652e8ab2f779b0355ac05b67e5e9ed07256bf1012da
-
Filesize
1.1MB
MD5b0b9077df585b1c70f81f609f46bb93d
SHA1ccca2bb7282a45b7e5aba68c729de4422e36a6ac
SHA256edcc6fe389d947c795da5a1afba7aeb5af57f3a64b072af4a19bc3e80267e8c3
SHA512835d8276666573d0efc3263957b50b4b030be8d5a6fcad31263fb9b393d082dcb55d9293edd366af87dc5ccaff76295d37401e38ebfd48271cd6e9ea0b0ae948
-
Filesize
1.1MB
MD57ba2252b86afd7673062c96dd9e06885
SHA1d1dabe2b02770daea033982a5c775aedd21bcc0f
SHA2567e173528d6004b0690b7a8e13935b557f1382e89f32b348d73f87a381aa55147
SHA5126b2b3f349317b618db8634123126ac3ddbbf2a9abedf1d4eae974c21850cf3caf69f01abfe79247dba7fa7155897c7a0dbaa9040e711c569f1319ce6b451acbd
-
Filesize
1.1MB
MD5c8ccc47a6695b2281d6d4c3b0f4df409
SHA17dec2a86085cf2ed94e7389241652d9b110f3115
SHA256fa7da218cbf11c6dbe6412eb66fe936758e30773c748a3e27512a8f5a32214e9
SHA5121e180ff5bc2d42e2836d177b2d4134aeb78743bcc15016d88ff1f002946c8bbb3d9fb343247be992af9be037274ddccd280b84a329f3deac326864dac8e3211f