Analysis
-
max time kernel
149s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 14:52
Static task
static1
Behavioral task
behavioral1
Sample
52ad8fe95583c3855101e8bb7608aebadab4f83b03638740c58508b9828c2efc.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
52ad8fe95583c3855101e8bb7608aebadab4f83b03638740c58508b9828c2efc.exe
Resource
win10v2004-20240802-en
General
-
Target
52ad8fe95583c3855101e8bb7608aebadab4f83b03638740c58508b9828c2efc.exe
-
Size
1.1MB
-
MD5
b4425a7fd37c5ab2a96a1acadef7b7d6
-
SHA1
cd63560d5f0c8f6d9457cadb46f90d89fad8ba39
-
SHA256
52ad8fe95583c3855101e8bb7608aebadab4f83b03638740c58508b9828c2efc
-
SHA512
ed649240d77960a3b16dda2709f0f00213aaa4040dcb6f16a4c17861908c830af7db07ac586a695dbb499941e8d7e39d93600e1196527ec9bfdb0120fb39748d
-
SSDEEP
24576:aH0dl8myX9Bg42QoXFkrzkmplSgRDYo0lG4Z8r7Qfbkiu5QA:acallSllG4ZM7QzMn
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2660 svchcst.exe -
Executes dropped EXE 25 IoCs
pid Process 2660 svchcst.exe 1604 svchcst.exe 2108 svchcst.exe 2200 svchcst.exe 1980 svchcst.exe 2252 svchcst.exe 1156 svchcst.exe 2160 svchcst.exe 2680 svchcst.exe 2864 svchcst.exe 3000 svchcst.exe 996 svchcst.exe 2052 svchcst.exe 560 svchcst.exe 2480 svchcst.exe 2312 svchcst.exe 1796 svchcst.exe 2900 svchcst.exe 2864 svchcst.exe 2976 svchcst.exe 540 svchcst.exe 276 svchcst.exe 2512 svchcst.exe 2496 svchcst.exe 1324 svchcst.exe -
Loads dropped DLL 40 IoCs
pid Process 1588 WScript.exe 1588 WScript.exe 2644 WScript.exe 2644 WScript.exe 1816 WScript.exe 1816 WScript.exe 540 WScript.exe 540 WScript.exe 2604 WScript.exe 2948 WScript.exe 1752 WScript.exe 1992 WScript.exe 2924 WScript.exe 2924 WScript.exe 1992 WScript.exe 2424 WScript.exe 2424 WScript.exe 2424 WScript.exe 1804 WScript.exe 1804 WScript.exe 1012 WScript.exe 1012 WScript.exe 2424 WScript.exe 2424 WScript.exe 1912 WScript.exe 1912 WScript.exe 1912 WScript.exe 2676 WScript.exe 2676 WScript.exe 2944 WScript.exe 2944 WScript.exe 2944 WScript.exe 3032 WScript.exe 3032 WScript.exe 3032 WScript.exe 3032 WScript.exe 1780 WScript.exe 1780 WScript.exe 2808 WScript.exe 2808 WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 50 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 52ad8fe95583c3855101e8bb7608aebadab4f83b03638740c58508b9828c2efc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2148 52ad8fe95583c3855101e8bb7608aebadab4f83b03638740c58508b9828c2efc.exe 2660 svchcst.exe 2660 svchcst.exe 2660 svchcst.exe 2660 svchcst.exe 2660 svchcst.exe 2660 svchcst.exe 2660 svchcst.exe 2660 svchcst.exe 2660 svchcst.exe 2660 svchcst.exe 2660 svchcst.exe 2660 svchcst.exe 2660 svchcst.exe 2660 svchcst.exe 2660 svchcst.exe 2660 svchcst.exe 2660 svchcst.exe 2660 svchcst.exe 2660 svchcst.exe 2660 svchcst.exe 2660 svchcst.exe 2660 svchcst.exe 2660 svchcst.exe 2660 svchcst.exe 2660 svchcst.exe 2660 svchcst.exe 2660 svchcst.exe 2660 svchcst.exe 2660 svchcst.exe 2660 svchcst.exe 2660 svchcst.exe 2660 svchcst.exe 2660 svchcst.exe 2660 svchcst.exe 2660 svchcst.exe 2660 svchcst.exe 2660 svchcst.exe 2660 svchcst.exe 2660 svchcst.exe 2660 svchcst.exe 2660 svchcst.exe 2660 svchcst.exe 2660 svchcst.exe 2660 svchcst.exe 2660 svchcst.exe 2660 svchcst.exe 2660 svchcst.exe 2660 svchcst.exe 2660 svchcst.exe 2660 svchcst.exe 2660 svchcst.exe 2660 svchcst.exe 2660 svchcst.exe 2660 svchcst.exe 2660 svchcst.exe 2660 svchcst.exe 2660 svchcst.exe 2660 svchcst.exe 2660 svchcst.exe 2660 svchcst.exe 2660 svchcst.exe 2660 svchcst.exe 2660 svchcst.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2148 52ad8fe95583c3855101e8bb7608aebadab4f83b03638740c58508b9828c2efc.exe -
Suspicious use of SetWindowsHookEx 52 IoCs
pid Process 2148 52ad8fe95583c3855101e8bb7608aebadab4f83b03638740c58508b9828c2efc.exe 2148 52ad8fe95583c3855101e8bb7608aebadab4f83b03638740c58508b9828c2efc.exe 2660 svchcst.exe 2660 svchcst.exe 1604 svchcst.exe 1604 svchcst.exe 2108 svchcst.exe 2108 svchcst.exe 2200 svchcst.exe 2200 svchcst.exe 1980 svchcst.exe 1980 svchcst.exe 2252 svchcst.exe 2252 svchcst.exe 1156 svchcst.exe 1156 svchcst.exe 2160 svchcst.exe 2160 svchcst.exe 2680 svchcst.exe 2680 svchcst.exe 2864 svchcst.exe 2864 svchcst.exe 3000 svchcst.exe 3000 svchcst.exe 996 svchcst.exe 996 svchcst.exe 2052 svchcst.exe 2052 svchcst.exe 560 svchcst.exe 560 svchcst.exe 2480 svchcst.exe 2480 svchcst.exe 2312 svchcst.exe 2312 svchcst.exe 1796 svchcst.exe 1796 svchcst.exe 2900 svchcst.exe 2900 svchcst.exe 2864 svchcst.exe 2864 svchcst.exe 2976 svchcst.exe 2976 svchcst.exe 540 svchcst.exe 540 svchcst.exe 276 svchcst.exe 276 svchcst.exe 2512 svchcst.exe 2512 svchcst.exe 2496 svchcst.exe 2496 svchcst.exe 1324 svchcst.exe 1324 svchcst.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2148 wrote to memory of 1588 2148 52ad8fe95583c3855101e8bb7608aebadab4f83b03638740c58508b9828c2efc.exe 30 PID 2148 wrote to memory of 1588 2148 52ad8fe95583c3855101e8bb7608aebadab4f83b03638740c58508b9828c2efc.exe 30 PID 2148 wrote to memory of 1588 2148 52ad8fe95583c3855101e8bb7608aebadab4f83b03638740c58508b9828c2efc.exe 30 PID 2148 wrote to memory of 1588 2148 52ad8fe95583c3855101e8bb7608aebadab4f83b03638740c58508b9828c2efc.exe 30 PID 1588 wrote to memory of 2660 1588 WScript.exe 33 PID 1588 wrote to memory of 2660 1588 WScript.exe 33 PID 1588 wrote to memory of 2660 1588 WScript.exe 33 PID 1588 wrote to memory of 2660 1588 WScript.exe 33 PID 2660 wrote to memory of 2644 2660 svchcst.exe 34 PID 2660 wrote to memory of 2644 2660 svchcst.exe 34 PID 2660 wrote to memory of 2644 2660 svchcst.exe 34 PID 2660 wrote to memory of 2644 2660 svchcst.exe 34 PID 2644 wrote to memory of 1604 2644 WScript.exe 35 PID 2644 wrote to memory of 1604 2644 WScript.exe 35 PID 2644 wrote to memory of 1604 2644 WScript.exe 35 PID 2644 wrote to memory of 1604 2644 WScript.exe 35 PID 1604 wrote to memory of 1816 1604 svchcst.exe 36 PID 1604 wrote to memory of 1816 1604 svchcst.exe 36 PID 1604 wrote to memory of 1816 1604 svchcst.exe 36 PID 1604 wrote to memory of 1816 1604 svchcst.exe 36 PID 1816 wrote to memory of 2108 1816 WScript.exe 37 PID 1816 wrote to memory of 2108 1816 WScript.exe 37 PID 1816 wrote to memory of 2108 1816 WScript.exe 37 PID 1816 wrote to memory of 2108 1816 WScript.exe 37 PID 2108 wrote to memory of 540 2108 svchcst.exe 38 PID 2108 wrote to memory of 540 2108 svchcst.exe 38 PID 2108 wrote to memory of 540 2108 svchcst.exe 38 PID 2108 wrote to memory of 540 2108 svchcst.exe 38 PID 540 wrote to memory of 2200 540 WScript.exe 39 PID 540 wrote to memory of 2200 540 WScript.exe 39 PID 540 wrote to memory of 2200 540 WScript.exe 39 PID 540 wrote to memory of 2200 540 WScript.exe 39 PID 2200 wrote to memory of 2604 2200 svchcst.exe 40 PID 2200 wrote to memory of 2604 2200 svchcst.exe 40 PID 2200 wrote to memory of 2604 2200 svchcst.exe 40 PID 2200 wrote to memory of 2604 2200 svchcst.exe 40 PID 2604 wrote to memory of 1980 2604 WScript.exe 41 PID 2604 wrote to memory of 1980 2604 WScript.exe 41 PID 2604 wrote to memory of 1980 2604 WScript.exe 41 PID 2604 wrote to memory of 1980 2604 WScript.exe 41 PID 1980 wrote to memory of 2948 1980 svchcst.exe 42 PID 1980 wrote to memory of 2948 1980 svchcst.exe 42 PID 1980 wrote to memory of 2948 1980 svchcst.exe 42 PID 1980 wrote to memory of 2948 1980 svchcst.exe 42 PID 2948 wrote to memory of 2252 2948 WScript.exe 43 PID 2948 wrote to memory of 2252 2948 WScript.exe 43 PID 2948 wrote to memory of 2252 2948 WScript.exe 43 PID 2948 wrote to memory of 2252 2948 WScript.exe 43 PID 2252 wrote to memory of 1752 2252 svchcst.exe 44 PID 2252 wrote to memory of 1752 2252 svchcst.exe 44 PID 2252 wrote to memory of 1752 2252 svchcst.exe 44 PID 2252 wrote to memory of 1752 2252 svchcst.exe 44 PID 1752 wrote to memory of 1156 1752 WScript.exe 45 PID 1752 wrote to memory of 1156 1752 WScript.exe 45 PID 1752 wrote to memory of 1156 1752 WScript.exe 45 PID 1752 wrote to memory of 1156 1752 WScript.exe 45 PID 1156 wrote to memory of 1992 1156 svchcst.exe 46 PID 1156 wrote to memory of 1992 1156 svchcst.exe 46 PID 1156 wrote to memory of 1992 1156 svchcst.exe 46 PID 1156 wrote to memory of 1992 1156 svchcst.exe 46 PID 1992 wrote to memory of 2160 1992 WScript.exe 47 PID 1992 wrote to memory of 2160 1992 WScript.exe 47 PID 1992 wrote to memory of 2160 1992 WScript.exe 47 PID 1992 wrote to memory of 2160 1992 WScript.exe 47
Processes
-
C:\Users\Admin\AppData\Local\Temp\52ad8fe95583c3855101e8bb7608aebadab4f83b03638740c58508b9828c2efc.exe"C:\Users\Admin\AppData\Local\Temp\52ad8fe95583c3855101e8bb7608aebadab4f83b03638740c58508b9828c2efc.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1588 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"3⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"6⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"8⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"9⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"10⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"11⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"12⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"13⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"14⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"15⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"16⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"17⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2160 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"18⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2924 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"19⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2680 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"20⤵
- System Location Discovery: System Language Discovery
PID:1520
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"19⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2864 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"20⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1804 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"21⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:560 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"22⤵
- System Location Discovery: System Language Discovery
PID:2584
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"17⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3000 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"18⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2424 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"19⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:996 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"20⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1012 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"21⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2480 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"22⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1912 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"23⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1796 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"24⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2676 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"25⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2864
-
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"23⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2900 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"24⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2944 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"25⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2976 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"26⤵
- System Location Discovery: System Language Discovery
PID:2436
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"25⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:540 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"26⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3032 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"27⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:276 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"28⤵
- System Location Discovery: System Language Discovery
PID:1704
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"27⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2512 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"28⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1780 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"29⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2496 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"30⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2808 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"31⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1324 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"32⤵
- System Location Discovery: System Language Discovery
PID:2544
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"19⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2052 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"20⤵
- System Location Discovery: System Language Discovery
PID:1328
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe"19⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2312
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92B
MD567b9b3e2ded7086f393ebbc36c5e7bca
SHA1e6299d0450b9a92a18cc23b5704a2b475652c790
SHA25644063c266686263f14cd2a83fee124fb3e61a9171a6aab69709464f49511011d
SHA512826fbc9481f46b1ae3db828a665c55c349023caf563e6e8c17321f5f3af3e4c3914955db6f0eebfc6defe561315435d47310b4d0499ab9c2c85bb61264dedc09
-
Filesize
753B
MD5205fe125a2ac11dfa5a45a001ef5f7ce
SHA127f686e5c07d744c9576bf983db8093efb5e3bdf
SHA2563b368e0cb89a82b26cb891d0ccfa41ffa729010af0606c818642455ab6478487
SHA512673b9a45d64b36bc0ebcf62a0eaa71757cfe4817579f52a41762ba939793d9cd2c0e9dca60fcd611d2da774db0290bc259e08f05284c1ce3bde5d661244c939e
-
Filesize
696B
MD5c5ae655707a21f6473c5f382a787e100
SHA11d2078ebfae286212eb90e60c9dbce5e70ac24f1
SHA256baf83e476c96ab1af7a7482de26dae9909744fad6d12c6ae818f51b834cecb50
SHA512af80731f380d75a643ab885ba152cb7118297ab4e70ff44dd96b7bae8542881f0d06cdbe0ac524cdc30ddca970c2b27adf6398f8efc6e510cea6cc0b2a59b34f
-
Filesize
696B
MD50746413c017663c2889cbadf684741eb
SHA16a61f92238e17b83adba719b52d2f3d9cd205b8a
SHA2565e9eb3cc7e536ea1249b6bdb65b934565018fa760198e2b2c8f5537de84b86bd
SHA512e222a18584aadd15f5c4706601acc6fa30d6a08325f2679724eba4b2952e56d4d7e1a97c42ae88aefacfa59b87723118d2dd28c1541204715dc1e11b4867b05c
-
Filesize
696B
MD5f080eefd41c0fca1c404d5133fb5c957
SHA1bef3f9c014eca7cf4dc001f3d85befd3681d4bcc
SHA256758f74e1aa31de598fbf37f70ffd76f936c0b5dd2227b17c0d8e9ac4506f3aaf
SHA512e2066e4082f51d4064bfd68eff48c97c481bbb524bb0fa2da0b5ae25bda730811d2933480a72d91a8e5c10ac794f0e793fb8323892332eb9b7c43890ee25c4d7
-
Filesize
696B
MD555765ba68da8820ee35d2d4d1dedeac0
SHA119f5f147056f3d837a11d6b08a7fc9544f9927f6
SHA2561eb237d283717ac45bdfef217d3d09fb4ef73db3838859057c94e488b329c522
SHA51261b6361b8dfef2067016c50e830db1fc768d0654a3f643cf4b4cb1193de722f74401e73f719d8cff5a443058adfa7e3cd0dfc502f25dd249cdc36a7056c81c18
-
Filesize
696B
MD5024be950e07002e527b8dd1efbb0e4b4
SHA11a56034c6366027442be28a75bce7cdea55a8a98
SHA25651f47375c2a87dc9fe8cc958432adcc166d0faf75f7d1da1322e238fb5d72893
SHA51296864be4661feeef155d1816192852146e5d2aa3266ce5b732ec203d43a6098a5fa456a7decb9ab1bd66bc959ed85b485de32c11cea6ee6d1a48d0bea2349b6f
-
Filesize
696B
MD503f68343f5906993640e0b9e3f9c7964
SHA1699e9c3fda1aa89e7a47ac8b77b41178c99cc8e2
SHA256dd2d5bf380874e81adc5e05b667047dcf1b6c8a8953068fb177053e20c35f727
SHA51276de9e035c0ad6ee3237006749fd28ee93a6fcd09700e265aaea432f7d2292aac87f0799221559caacd6dd58ff72af17d67627aace77bd2a36a802bbdc88b99c
-
Filesize
696B
MD5dabf4e9d32908d961aaffdd1c77d4879
SHA1e41572d98b7452016fb004c843236377364ab1d3
SHA2563488c64a6d2da3c00e50e954c495ac354ee504e54f3ed6dda6a991c5b9d33e19
SHA512911d46aca8005857c86eddbb3cbbc4301ee5e173b2358a717053cf12727c06cc3b2d757ddf513f969dafe61c6b88d03b1478d8c483495f153e30bf64585195aa
-
Filesize
696B
MD55f2a40f410e1db471d583c90bb1bf208
SHA11e49ed23e02976dede24633c367ab8c92fb4fd9b
SHA25603c04fafe55862423025fe6e16bbeda1dbded8150a0c0dd363164733051fe1e4
SHA51298a4ba3960f66728d4a286c8cff2223742d701467a647b6d4a2f118a6e2c53c9a4f6c329a36c099b151d42279ba0823ff07a8df49c87d02a7470f595052f725c
-
Filesize
696B
MD55771c014296ebb077452c34a3ea54708
SHA16e6ff6d4e62db0f7295883fcdf1b10a4f69b2b58
SHA2568abb3ec990928dfb09f067bb1f8b7e99a9487f039c9a5f80ab5306006c746859
SHA512642db2534af82e398285770d5b6564603b457e1e4e0853cb46322aa24f7a880223a839875e7022d5c21f5eb01730df4e4dffdb426ef6e6c81defeb5f5f774ac5
-
Filesize
696B
MD5ab52ce62f84a24d48d9cebec5331b1c6
SHA16fcb810a46e83020e55af419752f5583f9dcb9ba
SHA256908bec6021a78b90a02c6123db4ac62b590ea738e97fa35aac7c4dce624f3244
SHA5128823f3f60863692a8fd2be8610670b06077ea7c948b7c46f9a1ab712276b27e48c19d0a394e7f51c0fbdf753f989af4cac5dab078e4f04ee5ee6a50427368cd2
-
Filesize
696B
MD568131c1f4506af5c010d5e01f031bfae
SHA151cc54917c040091c3a39dd33ec52fc5f4cb4c15
SHA256d235953ddf5884a014ce05d8a26b9b93bafd580bdeda08e369e2d6e395d34a95
SHA51269be7da57430dd6d3f1deea9c2a4f78a0ec41a74fc593f033a7944504cd9c4fe6d2f7a0be052e40238a4389b649c36a603b1725959fab050a0114714a6d65c6d
-
Filesize
1.1MB
MD5fae7e8996fe467eb1c586e2b607dcfb7
SHA1ff98953ec4756635f6874ba339eb3cbbf0798d20
SHA25695b568dfb7b3041fce9a7ad2125e3d764d1c2d421cbf0e9e88c77ce7b406c4d6
SHA5126cbc09e4c9f3bb81b4657dbed8a0d2867949e0bfde4637bcb75d238be6c7b363453d95dc230eb8750af8ed4e232852c66fec887a9dee0507b4f254ef1b0d48f8
-
Filesize
1.1MB
MD5d4ff1e1ff7128333314772fe324849db
SHA1affd8d4f93e11b6da3dd4c2c4246ba561d0c1f31
SHA2564d75de309fb60e8d68f1d530ebcccef6b31b353769e21e7b7dba45e9b92cec7b
SHA51214e57779456e05de52cdf434c2cb1b05c014119548b4416de5baf45728fce96a1dadf981bb5c2520ab3fdf5cf59dcc9efd7edae48c26d6a610733e8f7d86a863
-
Filesize
1.1MB
MD5900a1ba9e343bd02ef655b447c1458e7
SHA183b3e7f9a357d0fd9a2bb632685ce47ad062acc0
SHA25609d83266f27a3e400f0afcaf462b016c146478abbc368bdff11a9e8ef32de820
SHA51263645eca1bfa57f97e2dcdfb7b0b6e94f95266ba02783ea3af1644da26f70537ef640a7a54205735a08b5397da3f41b6185d98a6c036650082b4dc246b2eb5ee
-
Filesize
1.1MB
MD545c896a5949b764e7a8a023fa41439e0
SHA184a7a4818136a10dea7602df15a68573c43a5561
SHA256146b6706e16cc48d671e8412ec1c9d70ea8cf2b33628f2fa0f2c1c36299f632a
SHA512861d741370e3f80f00e3c542142c6620c21d43426111bc13b841109030b2ad187a43045596f5476ac66753996cac592b44e485f5f5181e0eed7955ec31e0be88