Analysis
-
max time kernel
119s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23-09-2024 02:43
Behavioral task
behavioral1
Sample
e83a4d9dc17c3b84f8c0b811eb314d055a8f98b5276d120cd3c8190736526baaN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e83a4d9dc17c3b84f8c0b811eb314d055a8f98b5276d120cd3c8190736526baaN.exe
Resource
win10v2004-20240802-en
General
-
Target
e83a4d9dc17c3b84f8c0b811eb314d055a8f98b5276d120cd3c8190736526baaN.exe
-
Size
6.1MB
-
MD5
8366095353711474f30ebee85c51a090
-
SHA1
e8a0aea3dd081528cb9edd6fb454b6ac47177e1c
-
SHA256
e83a4d9dc17c3b84f8c0b811eb314d055a8f98b5276d120cd3c8190736526baa
-
SHA512
50ebb10387b8c0ed3a64142c98cc6868320e3388bc4d6ba47addb9baf17203a6c5264053787749c53aaddb7a5ec6948d954555be7197b8f30c06d15a09091ad1
-
SSDEEP
49152:ATU7AAmw4gxeOw46fUbNecCCFbNecjTU7AAmw4gxeOw46fUbNecCCFbNecq:ATU7d9xZw46G8q8yTU7d9xZw46G8q8t
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload 3 IoCs
resource yara_rule behavioral2/files/0x0009000000023467-31.dat warzonerat behavioral2/files/0x0008000000023465-58.dat warzonerat behavioral2/files/0x000d0000000216f5-72.dat warzonerat -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe -
Drops startup file 24 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe -
Executes dropped EXE 48 IoCs
pid Process 2392 explorer.exe 3524 explorer.exe 2744 explorer.exe 944 spoolsv.exe 3892 spoolsv.exe 664 spoolsv.exe 332 spoolsv.exe 1624 spoolsv.exe 4792 spoolsv.exe 1816 spoolsv.exe 3908 spoolsv.exe 3100 spoolsv.exe 4232 spoolsv.exe 2708 spoolsv.exe 3756 spoolsv.exe 1916 spoolsv.exe 4740 spoolsv.exe 4952 spoolsv.exe 4896 spoolsv.exe 224 spoolsv.exe 4652 spoolsv.exe 4260 spoolsv.exe 1428 spoolsv.exe 2732 spoolsv.exe 3040 spoolsv.exe 4868 spoolsv.exe 3296 spoolsv.exe 3576 spoolsv.exe 1468 spoolsv.exe 3584 spoolsv.exe 4160 spoolsv.exe 964 spoolsv.exe 5036 spoolsv.exe 4240 spoolsv.exe 2620 spoolsv.exe 2488 spoolsv.exe 2808 spoolsv.exe 3692 spoolsv.exe 3452 spoolsv.exe 4884 spoolsv.exe 112 spoolsv.exe 2348 spoolsv.exe 4004 spoolsv.exe 3384 spoolsv.exe 1140 spoolsv.exe 4904 spoolsv.exe 2928 spoolsv.exe 2788 spoolsv.exe -
resource yara_rule behavioral2/memory/4348-0-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral2/memory/4348-11-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral2/files/0x0009000000023467-31.dat upx behavioral2/memory/2392-46-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral2/files/0x0008000000023465-58.dat upx behavioral2/files/0x000d0000000216f5-72.dat upx behavioral2/memory/944-85-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral2/memory/664-89-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral2/memory/1624-100-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral2/memory/1816-123-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral2/memory/3100-136-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral2/memory/2708-150-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral2/memory/1916-163-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral2/memory/4952-177-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral2/memory/224-179-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral2/memory/4260-204-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral2/memory/2732-218-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral2/memory/4868-232-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral2/memory/3576-245-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral2/memory/3584-261-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral2/memory/964-263-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral2/memory/964-274-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral2/memory/4240-288-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral2/memory/2488-291-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral2/memory/3692-318-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral2/memory/4884-321-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral2/memory/2348-335-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral2/memory/3384-356-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral2/memory/4904-368-0x0000000000400000-0x0000000000446000-memory.dmp upx -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" e83a4d9dc17c3b84f8c0b811eb314d055a8f98b5276d120cd3c8190736526baaN.exe Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" explorer.exe -
Suspicious use of SetThreadContext 25 IoCs
description pid Process procid_target PID 4348 set thread context of 2328 4348 e83a4d9dc17c3b84f8c0b811eb314d055a8f98b5276d120cd3c8190736526baaN.exe 84 PID 2328 set thread context of 3560 2328 e83a4d9dc17c3b84f8c0b811eb314d055a8f98b5276d120cd3c8190736526baaN.exe 94 PID 2392 set thread context of 3524 2392 explorer.exe 99 PID 3524 set thread context of 2744 3524 explorer.exe 100 PID 944 set thread context of 3892 944 spoolsv.exe 105 PID 664 set thread context of 332 664 spoolsv.exe 109 PID 1624 set thread context of 4792 1624 spoolsv.exe 113 PID 1816 set thread context of 3908 1816 spoolsv.exe 117 PID 3100 set thread context of 4232 3100 spoolsv.exe 121 PID 2708 set thread context of 3756 2708 spoolsv.exe 125 PID 1916 set thread context of 4740 1916 spoolsv.exe 129 PID 4952 set thread context of 4896 4952 spoolsv.exe 133 PID 224 set thread context of 4652 224 spoolsv.exe 137 PID 4260 set thread context of 1428 4260 spoolsv.exe 141 PID 2732 set thread context of 3040 2732 spoolsv.exe 145 PID 4868 set thread context of 3296 4868 spoolsv.exe 149 PID 3576 set thread context of 1468 3576 spoolsv.exe 153 PID 3584 set thread context of 4160 3584 spoolsv.exe 157 PID 4240 set thread context of 2620 4240 spoolsv.exe 165 PID 2488 set thread context of 2808 2488 spoolsv.exe 169 PID 3692 set thread context of 3452 3692 spoolsv.exe 173 PID 4884 set thread context of 112 4884 spoolsv.exe 177 PID 2348 set thread context of 4004 2348 spoolsv.exe 181 PID 3384 set thread context of 1140 3384 spoolsv.exe 185 PID 4904 set thread context of 2928 4904 spoolsv.exe 189 -
Drops file in Windows directory 26 IoCs
description ioc Process File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe e83a4d9dc17c3b84f8c0b811eb314d055a8f98b5276d120cd3c8190736526baaN.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e83a4d9dc17c3b84f8c0b811eb314d055a8f98b5276d120cd3c8190736526baaN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e83a4d9dc17c3b84f8c0b811eb314d055a8f98b5276d120cd3c8190736526baaN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4348 e83a4d9dc17c3b84f8c0b811eb314d055a8f98b5276d120cd3c8190736526baaN.exe 4348 e83a4d9dc17c3b84f8c0b811eb314d055a8f98b5276d120cd3c8190736526baaN.exe 3560 e83a4d9dc17c3b84f8c0b811eb314d055a8f98b5276d120cd3c8190736526baaN.exe 3560 e83a4d9dc17c3b84f8c0b811eb314d055a8f98b5276d120cd3c8190736526baaN.exe 2392 explorer.exe 2392 explorer.exe 944 spoolsv.exe 944 spoolsv.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 664 spoolsv.exe 664 spoolsv.exe 2744 explorer.exe 2744 explorer.exe 1624 spoolsv.exe 1624 spoolsv.exe 2744 explorer.exe 2744 explorer.exe 1816 spoolsv.exe 1816 spoolsv.exe 2744 explorer.exe 2744 explorer.exe 3100 spoolsv.exe 3100 spoolsv.exe 2744 explorer.exe 2744 explorer.exe 2708 spoolsv.exe 2708 spoolsv.exe 2744 explorer.exe 2744 explorer.exe 1916 spoolsv.exe 1916 spoolsv.exe 2744 explorer.exe 2744 explorer.exe 4952 spoolsv.exe 4952 spoolsv.exe 2744 explorer.exe 2744 explorer.exe 224 spoolsv.exe 224 spoolsv.exe 2744 explorer.exe 2744 explorer.exe 4260 spoolsv.exe 4260 spoolsv.exe 2744 explorer.exe 2744 explorer.exe 2732 spoolsv.exe 2732 spoolsv.exe 2744 explorer.exe 2744 explorer.exe 4868 spoolsv.exe 4868 spoolsv.exe 2744 explorer.exe 2744 explorer.exe 3576 spoolsv.exe 3576 spoolsv.exe 2744 explorer.exe 2744 explorer.exe 3584 spoolsv.exe 3584 spoolsv.exe 2744 explorer.exe 2744 explorer.exe -
Suspicious use of SetWindowsHookEx 54 IoCs
pid Process 4348 e83a4d9dc17c3b84f8c0b811eb314d055a8f98b5276d120cd3c8190736526baaN.exe 4348 e83a4d9dc17c3b84f8c0b811eb314d055a8f98b5276d120cd3c8190736526baaN.exe 3560 e83a4d9dc17c3b84f8c0b811eb314d055a8f98b5276d120cd3c8190736526baaN.exe 3560 e83a4d9dc17c3b84f8c0b811eb314d055a8f98b5276d120cd3c8190736526baaN.exe 2392 explorer.exe 2392 explorer.exe 2744 explorer.exe 2744 explorer.exe 944 spoolsv.exe 944 spoolsv.exe 2744 explorer.exe 2744 explorer.exe 664 spoolsv.exe 664 spoolsv.exe 1624 spoolsv.exe 1624 spoolsv.exe 1816 spoolsv.exe 1816 spoolsv.exe 3100 spoolsv.exe 3100 spoolsv.exe 2708 spoolsv.exe 2708 spoolsv.exe 1916 spoolsv.exe 1916 spoolsv.exe 4952 spoolsv.exe 4952 spoolsv.exe 224 spoolsv.exe 224 spoolsv.exe 4260 spoolsv.exe 4260 spoolsv.exe 2732 spoolsv.exe 2732 spoolsv.exe 4868 spoolsv.exe 4868 spoolsv.exe 3576 spoolsv.exe 3576 spoolsv.exe 3584 spoolsv.exe 3584 spoolsv.exe 4240 spoolsv.exe 4240 spoolsv.exe 2488 spoolsv.exe 2488 spoolsv.exe 3692 spoolsv.exe 3692 spoolsv.exe 4884 spoolsv.exe 4884 spoolsv.exe 2348 spoolsv.exe 2348 spoolsv.exe 3384 spoolsv.exe 3384 spoolsv.exe 4904 spoolsv.exe 4904 spoolsv.exe 2788 spoolsv.exe 2788 spoolsv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4348 wrote to memory of 840 4348 e83a4d9dc17c3b84f8c0b811eb314d055a8f98b5276d120cd3c8190736526baaN.exe 82 PID 4348 wrote to memory of 840 4348 e83a4d9dc17c3b84f8c0b811eb314d055a8f98b5276d120cd3c8190736526baaN.exe 82 PID 4348 wrote to memory of 840 4348 e83a4d9dc17c3b84f8c0b811eb314d055a8f98b5276d120cd3c8190736526baaN.exe 82 PID 4348 wrote to memory of 2328 4348 e83a4d9dc17c3b84f8c0b811eb314d055a8f98b5276d120cd3c8190736526baaN.exe 84 PID 4348 wrote to memory of 2328 4348 e83a4d9dc17c3b84f8c0b811eb314d055a8f98b5276d120cd3c8190736526baaN.exe 84 PID 4348 wrote to memory of 2328 4348 e83a4d9dc17c3b84f8c0b811eb314d055a8f98b5276d120cd3c8190736526baaN.exe 84 PID 4348 wrote to memory of 2328 4348 e83a4d9dc17c3b84f8c0b811eb314d055a8f98b5276d120cd3c8190736526baaN.exe 84 PID 4348 wrote to memory of 2328 4348 e83a4d9dc17c3b84f8c0b811eb314d055a8f98b5276d120cd3c8190736526baaN.exe 84 PID 4348 wrote to memory of 2328 4348 e83a4d9dc17c3b84f8c0b811eb314d055a8f98b5276d120cd3c8190736526baaN.exe 84 PID 4348 wrote to memory of 2328 4348 e83a4d9dc17c3b84f8c0b811eb314d055a8f98b5276d120cd3c8190736526baaN.exe 84 PID 4348 wrote to memory of 2328 4348 e83a4d9dc17c3b84f8c0b811eb314d055a8f98b5276d120cd3c8190736526baaN.exe 84 PID 4348 wrote to memory of 2328 4348 e83a4d9dc17c3b84f8c0b811eb314d055a8f98b5276d120cd3c8190736526baaN.exe 84 PID 4348 wrote to memory of 2328 4348 e83a4d9dc17c3b84f8c0b811eb314d055a8f98b5276d120cd3c8190736526baaN.exe 84 PID 4348 wrote to memory of 2328 4348 e83a4d9dc17c3b84f8c0b811eb314d055a8f98b5276d120cd3c8190736526baaN.exe 84 PID 4348 wrote to memory of 2328 4348 e83a4d9dc17c3b84f8c0b811eb314d055a8f98b5276d120cd3c8190736526baaN.exe 84 PID 4348 wrote to memory of 2328 4348 e83a4d9dc17c3b84f8c0b811eb314d055a8f98b5276d120cd3c8190736526baaN.exe 84 PID 4348 wrote to memory of 2328 4348 e83a4d9dc17c3b84f8c0b811eb314d055a8f98b5276d120cd3c8190736526baaN.exe 84 PID 4348 wrote to memory of 2328 4348 e83a4d9dc17c3b84f8c0b811eb314d055a8f98b5276d120cd3c8190736526baaN.exe 84 PID 4348 wrote to memory of 2328 4348 e83a4d9dc17c3b84f8c0b811eb314d055a8f98b5276d120cd3c8190736526baaN.exe 84 PID 4348 wrote to memory of 2328 4348 e83a4d9dc17c3b84f8c0b811eb314d055a8f98b5276d120cd3c8190736526baaN.exe 84 PID 4348 wrote to memory of 2328 4348 e83a4d9dc17c3b84f8c0b811eb314d055a8f98b5276d120cd3c8190736526baaN.exe 84 PID 4348 wrote to memory of 2328 4348 e83a4d9dc17c3b84f8c0b811eb314d055a8f98b5276d120cd3c8190736526baaN.exe 84 PID 4348 wrote to memory of 2328 4348 e83a4d9dc17c3b84f8c0b811eb314d055a8f98b5276d120cd3c8190736526baaN.exe 84 PID 4348 wrote to memory of 2328 4348 e83a4d9dc17c3b84f8c0b811eb314d055a8f98b5276d120cd3c8190736526baaN.exe 84 PID 4348 wrote to memory of 2328 4348 e83a4d9dc17c3b84f8c0b811eb314d055a8f98b5276d120cd3c8190736526baaN.exe 84 PID 4348 wrote to memory of 2328 4348 e83a4d9dc17c3b84f8c0b811eb314d055a8f98b5276d120cd3c8190736526baaN.exe 84 PID 4348 wrote to memory of 2328 4348 e83a4d9dc17c3b84f8c0b811eb314d055a8f98b5276d120cd3c8190736526baaN.exe 84 PID 4348 wrote to memory of 2328 4348 e83a4d9dc17c3b84f8c0b811eb314d055a8f98b5276d120cd3c8190736526baaN.exe 84 PID 4348 wrote to memory of 2328 4348 e83a4d9dc17c3b84f8c0b811eb314d055a8f98b5276d120cd3c8190736526baaN.exe 84 PID 4348 wrote to memory of 2328 4348 e83a4d9dc17c3b84f8c0b811eb314d055a8f98b5276d120cd3c8190736526baaN.exe 84 PID 4348 wrote to memory of 2328 4348 e83a4d9dc17c3b84f8c0b811eb314d055a8f98b5276d120cd3c8190736526baaN.exe 84 PID 4348 wrote to memory of 2328 4348 e83a4d9dc17c3b84f8c0b811eb314d055a8f98b5276d120cd3c8190736526baaN.exe 84 PID 2328 wrote to memory of 3560 2328 e83a4d9dc17c3b84f8c0b811eb314d055a8f98b5276d120cd3c8190736526baaN.exe 94 PID 2328 wrote to memory of 3560 2328 e83a4d9dc17c3b84f8c0b811eb314d055a8f98b5276d120cd3c8190736526baaN.exe 94 PID 2328 wrote to memory of 3560 2328 e83a4d9dc17c3b84f8c0b811eb314d055a8f98b5276d120cd3c8190736526baaN.exe 94 PID 2328 wrote to memory of 3560 2328 e83a4d9dc17c3b84f8c0b811eb314d055a8f98b5276d120cd3c8190736526baaN.exe 94 PID 2328 wrote to memory of 3560 2328 e83a4d9dc17c3b84f8c0b811eb314d055a8f98b5276d120cd3c8190736526baaN.exe 94 PID 2328 wrote to memory of 3560 2328 e83a4d9dc17c3b84f8c0b811eb314d055a8f98b5276d120cd3c8190736526baaN.exe 94 PID 2328 wrote to memory of 3560 2328 e83a4d9dc17c3b84f8c0b811eb314d055a8f98b5276d120cd3c8190736526baaN.exe 94 PID 2328 wrote to memory of 3560 2328 e83a4d9dc17c3b84f8c0b811eb314d055a8f98b5276d120cd3c8190736526baaN.exe 94 PID 2328 wrote to memory of 4916 2328 e83a4d9dc17c3b84f8c0b811eb314d055a8f98b5276d120cd3c8190736526baaN.exe 95 PID 2328 wrote to memory of 4916 2328 e83a4d9dc17c3b84f8c0b811eb314d055a8f98b5276d120cd3c8190736526baaN.exe 95 PID 2328 wrote to memory of 4916 2328 e83a4d9dc17c3b84f8c0b811eb314d055a8f98b5276d120cd3c8190736526baaN.exe 95 PID 3560 wrote to memory of 2392 3560 e83a4d9dc17c3b84f8c0b811eb314d055a8f98b5276d120cd3c8190736526baaN.exe 96 PID 3560 wrote to memory of 2392 3560 e83a4d9dc17c3b84f8c0b811eb314d055a8f98b5276d120cd3c8190736526baaN.exe 96 PID 3560 wrote to memory of 2392 3560 e83a4d9dc17c3b84f8c0b811eb314d055a8f98b5276d120cd3c8190736526baaN.exe 96 PID 2392 wrote to memory of 4168 2392 explorer.exe 97 PID 2392 wrote to memory of 4168 2392 explorer.exe 97 PID 2392 wrote to memory of 4168 2392 explorer.exe 97 PID 2392 wrote to memory of 3524 2392 explorer.exe 99 PID 2392 wrote to memory of 3524 2392 explorer.exe 99 PID 2392 wrote to memory of 3524 2392 explorer.exe 99 PID 2392 wrote to memory of 3524 2392 explorer.exe 99 PID 2392 wrote to memory of 3524 2392 explorer.exe 99 PID 2392 wrote to memory of 3524 2392 explorer.exe 99 PID 2392 wrote to memory of 3524 2392 explorer.exe 99 PID 2392 wrote to memory of 3524 2392 explorer.exe 99 PID 2392 wrote to memory of 3524 2392 explorer.exe 99 PID 2392 wrote to memory of 3524 2392 explorer.exe 99 PID 2392 wrote to memory of 3524 2392 explorer.exe 99 PID 2392 wrote to memory of 3524 2392 explorer.exe 99 PID 2392 wrote to memory of 3524 2392 explorer.exe 99 PID 2392 wrote to memory of 3524 2392 explorer.exe 99 PID 2392 wrote to memory of 3524 2392 explorer.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\e83a4d9dc17c3b84f8c0b811eb314d055a8f98b5276d120cd3c8190736526baaN.exe"C:\Users\Admin\AppData\Local\Temp\e83a4d9dc17c3b84f8c0b811eb314d055a8f98b5276d120cd3c8190736526baaN.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4348 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "C:\Users\Admin\AppData\Local\Temp\e83a4d9dc17c3b84f8c0b811eb314d055a8f98b5276d120cd3c8190736526baaN.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"2⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:840
-
-
C:\Users\Admin\AppData\Local\Temp\e83a4d9dc17c3b84f8c0b811eb314d055a8f98b5276d120cd3c8190736526baaN.exeC:\Users\Admin\AppData\Local\Temp\e83a4d9dc17c3b84f8c0b811eb314d055a8f98b5276d120cd3c8190736526baaN.exe2⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Users\Admin\AppData\Local\Temp\e83a4d9dc17c3b84f8c0b811eb314d055a8f98b5276d120cd3c8190736526baaN.exeC:\Users\Admin\AppData\Local\Temp\e83a4d9dc17c3b84f8c0b811eb314d055a8f98b5276d120cd3c8190736526baaN.exe3⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3560 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\explorer.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"5⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:4168
-
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3524 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe6⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2744 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:944 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:608
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3892
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:664 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:3464
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:332
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1624 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2620
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4792
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1816 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:760
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3908
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3100 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:1300
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4232
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2708 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:3092
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
PID:3756
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1916 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:3520
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4740
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4952 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
PID:1532
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4896
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:224 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:432
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4652
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4260 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2392
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1428
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2732 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2924
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
PID:3040
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4868 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2624
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3296
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3576 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:1504
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1468
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3584 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:3212
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4160
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:964 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:608
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
PID:5036
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4240 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
PID:2588
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
PID:2620
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2488 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:3684
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2808
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3692 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
PID:3656
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3452
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4884 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:3264
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:112
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2348 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:4284
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
PID:4004
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3384 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:3228
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1140
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4904 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:3256
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2928
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2788 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:1092
-
-
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵PID:4000
-
-
-
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"3⤵PID:4916
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.1MB
MD58366095353711474f30ebee85c51a090
SHA1e8a0aea3dd081528cb9edd6fb454b6ac47177e1c
SHA256e83a4d9dc17c3b84f8c0b811eb314d055a8f98b5276d120cd3c8190736526baa
SHA51250ebb10387b8c0ed3a64142c98cc6868320e3388bc4d6ba47addb9baf17203a6c5264053787749c53aaddb7a5ec6948d954555be7197b8f30c06d15a09091ad1
-
Filesize
93B
MD58445bfa5a278e2f068300c604a78394b
SHA19fb4eef5ec2606bd151f77fdaa219853d4aa0c65
SHA2565ddf324661da70998e89da7469c0eea327faae9216b9abc15c66fe95deec379c
SHA5128ad7d18392a15cabbfd4d30b2e8a2aad899d35aba099b5be1f6852ca39f58541fb318972299c5728a30fd311db011578c3aaf881fa8b8b42067d2a1e11c50822
-
Filesize
92B
MD513222a4bb413aaa8b92aa5b4f81d2760
SHA1268a48f2fe84ed49bbdc1873a8009db8c7cba66a
SHA256d170ac99460f9c1fb30717345b1003f8eb9189c26857ca26d3431590e6f0e23d
SHA512eee47ead9bef041b510ee5e40ebe8a51abd41d8c1fe5de68191f2b996feaa6cc0b8c16ed26d644fbf1d7e4f40920d7a6db954e19f2236d9e4e3f3f984f21b140
-
Filesize
6.1MB
MD50ba54d840118cf46628776edfa92a6a3
SHA139bece6e58962224e7afcab805be30070e8f0651
SHA25635148f860ce36161a97818db01aac5d1a21c0d7a68898aa428cf4d87a1052a38
SHA5122e86f2810aca03fb6b35e939dd84a55569ba826cecb55e798ee963c5264b53111f2568d2fd242de17f4cf3104892a28992aca7dae7c54bb7d9ac71b7c331f2c9
-
Filesize
6.1MB
MD5bca58046de7b0b79517b648f0a3cb680
SHA13893fcedcf22f35072b0fa38aeee79ecf8d856be
SHA2562b51c089ce022ca26ea9e9f921b9eae23709bd54bc650f424714ef5b91fadb6f
SHA5127b7f99a42e5fcd5ef448002bd43870399736d5937a65b3f157d0a1b35ad15c865b4aada9564cced4e0a0537acf18766cffc080eb77f3bd2fcf7773095591cba3