Analysis
-
max time kernel
119s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23-09-2024 05:18
Behavioral task
behavioral1
Sample
b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe
Resource
win10v2004-20240802-en
General
-
Target
b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe
-
Size
2.9MB
-
MD5
3b641a7f885496c8b0b1d7fca32476d0
-
SHA1
b2dfa97f4d79bdffd748e6c2294d8d32e3a9cecf
-
SHA256
b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9
-
SHA512
311f9091122aaf8d31b31a09380ba33f7fd86cd825437048e855b8ffc779232fb378693d441f5f071f5c77c5b6f504990fcbd3ab1f1f20d83fdf8ddf591e2682
-
SSDEEP
24576:7v97AXmZZcVKfIxTiEVc847flVC6faaQDbGV6eH81k6IbGD2JTu0GoZQDbGV6eHS:7v97AXmw4gxeOw46fUbNecCCFbNecf
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload 3 IoCs
resource yara_rule behavioral1/files/0x0008000000015d5c-89.dat warzonerat behavioral1/files/0x0008000000015cf1-166.dat warzonerat behavioral1/files/0x0008000000015d64-182.dat warzonerat -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe -
Drops startup file 17 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe -
Executes dropped EXE 44 IoCs
pid Process 1652 explorer.exe 1480 explorer.exe 844 explorer.exe 1212 spoolsv.exe 592 spoolsv.exe 2332 spoolsv.exe 1640 spoolsv.exe 1684 spoolsv.exe 2308 spoolsv.exe 2656 spoolsv.exe 2876 spoolsv.exe 1112 spoolsv.exe 2248 spoolsv.exe 1604 spoolsv.exe 2992 spoolsv.exe 1540 spoolsv.exe 1220 spoolsv.exe 2960 spoolsv.exe 1524 spoolsv.exe 2320 spoolsv.exe 2316 spoolsv.exe 2192 spoolsv.exe 2516 spoolsv.exe 1440 spoolsv.exe 1772 spoolsv.exe 2276 spoolsv.exe 2836 spoolsv.exe 952 spoolsv.exe 2612 spoolsv.exe 1876 spoolsv.exe 1464 spoolsv.exe 2116 spoolsv.exe 1916 spoolsv.exe 2776 spoolsv.exe 2832 spoolsv.exe 2484 spoolsv.exe 1040 spoolsv.exe 2024 spoolsv.exe 1920 spoolsv.exe 1188 spoolsv.exe 2764 spoolsv.exe 2948 spoolsv.exe 904 spoolsv.exe 1672 spoolsv.exe -
Loads dropped DLL 64 IoCs
pid Process 2492 b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe 2492 b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe 844 explorer.exe 844 explorer.exe 1212 spoolsv.exe 844 explorer.exe 844 explorer.exe 2332 spoolsv.exe 844 explorer.exe 844 explorer.exe 1684 spoolsv.exe 844 explorer.exe 844 explorer.exe 2656 spoolsv.exe 844 explorer.exe 844 explorer.exe 1112 spoolsv.exe 844 explorer.exe 844 explorer.exe 1604 spoolsv.exe 844 explorer.exe 844 explorer.exe 1540 spoolsv.exe 844 explorer.exe 844 explorer.exe 2960 spoolsv.exe 844 explorer.exe 844 explorer.exe 2320 spoolsv.exe 844 explorer.exe 844 explorer.exe 2192 spoolsv.exe 844 explorer.exe 844 explorer.exe 1440 spoolsv.exe 844 explorer.exe 844 explorer.exe 2276 spoolsv.exe 844 explorer.exe 844 explorer.exe 952 spoolsv.exe 844 explorer.exe 844 explorer.exe 1876 spoolsv.exe 844 explorer.exe 844 explorer.exe 2116 spoolsv.exe 844 explorer.exe 844 explorer.exe 2776 spoolsv.exe 844 explorer.exe 844 explorer.exe 2484 spoolsv.exe 844 explorer.exe 844 explorer.exe 2024 spoolsv.exe 844 explorer.exe 844 explorer.exe 1188 spoolsv.exe 844 explorer.exe 844 explorer.exe 2948 spoolsv.exe 844 explorer.exe 844 explorer.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe -
Suspicious use of SetThreadContext 26 IoCs
description pid Process procid_target PID 2844 set thread context of 2260 2844 b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe 30 PID 2260 set thread context of 2492 2260 b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe 33 PID 2260 set thread context of 2556 2260 b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe 34 PID 1652 set thread context of 1480 1652 explorer.exe 38 PID 1480 set thread context of 844 1480 explorer.exe 39 PID 1480 set thread context of 1288 1480 explorer.exe 40 PID 1212 set thread context of 592 1212 spoolsv.exe 44 PID 2332 set thread context of 1640 2332 spoolsv.exe 48 PID 1684 set thread context of 2308 1684 spoolsv.exe 51 PID 2656 set thread context of 2876 2656 spoolsv.exe 55 PID 1112 set thread context of 2248 1112 spoolsv.exe 59 PID 1604 set thread context of 2992 1604 spoolsv.exe 63 PID 1540 set thread context of 1220 1540 spoolsv.exe 67 PID 2960 set thread context of 1524 2960 spoolsv.exe 71 PID 2320 set thread context of 2316 2320 spoolsv.exe 75 PID 2192 set thread context of 2516 2192 spoolsv.exe 79 PID 1440 set thread context of 1772 1440 spoolsv.exe 83 PID 2276 set thread context of 2836 2276 spoolsv.exe 87 PID 952 set thread context of 2612 952 spoolsv.exe 91 PID 1876 set thread context of 1464 1876 spoolsv.exe 95 PID 2116 set thread context of 1916 2116 spoolsv.exe 99 PID 2776 set thread context of 2832 2776 spoolsv.exe 103 PID 2484 set thread context of 1040 2484 spoolsv.exe 107 PID 2024 set thread context of 1920 2024 spoolsv.exe 111 PID 1188 set thread context of 2764 1188 spoolsv.exe 115 PID 2948 set thread context of 904 2948 spoolsv.exe 119 -
Drops file in Windows directory 25 IoCs
description ioc Process File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe -
Suspicious behavior: EnumeratesProcesses 44 IoCs
pid Process 2844 b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe 2492 b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe 1652 explorer.exe 1212 spoolsv.exe 844 explorer.exe 844 explorer.exe 2332 spoolsv.exe 844 explorer.exe 1684 spoolsv.exe 844 explorer.exe 2656 spoolsv.exe 844 explorer.exe 1112 spoolsv.exe 844 explorer.exe 1604 spoolsv.exe 844 explorer.exe 1540 spoolsv.exe 844 explorer.exe 2960 spoolsv.exe 844 explorer.exe 2320 spoolsv.exe 844 explorer.exe 2192 spoolsv.exe 844 explorer.exe 1440 spoolsv.exe 844 explorer.exe 2276 spoolsv.exe 844 explorer.exe 952 spoolsv.exe 844 explorer.exe 1876 spoolsv.exe 844 explorer.exe 2116 spoolsv.exe 844 explorer.exe 2776 spoolsv.exe 844 explorer.exe 2484 spoolsv.exe 844 explorer.exe 2024 spoolsv.exe 844 explorer.exe 1188 spoolsv.exe 844 explorer.exe 2948 spoolsv.exe 844 explorer.exe -
Suspicious use of SetWindowsHookEx 52 IoCs
pid Process 2844 b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe 2844 b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe 2492 b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe 2492 b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe 1652 explorer.exe 1652 explorer.exe 844 explorer.exe 844 explorer.exe 1212 spoolsv.exe 1212 spoolsv.exe 844 explorer.exe 844 explorer.exe 2332 spoolsv.exe 2332 spoolsv.exe 1684 spoolsv.exe 1684 spoolsv.exe 2656 spoolsv.exe 2656 spoolsv.exe 1112 spoolsv.exe 1112 spoolsv.exe 1604 spoolsv.exe 1604 spoolsv.exe 1540 spoolsv.exe 1540 spoolsv.exe 2960 spoolsv.exe 2960 spoolsv.exe 2320 spoolsv.exe 2320 spoolsv.exe 2192 spoolsv.exe 2192 spoolsv.exe 1440 spoolsv.exe 1440 spoolsv.exe 2276 spoolsv.exe 2276 spoolsv.exe 952 spoolsv.exe 952 spoolsv.exe 1876 spoolsv.exe 1876 spoolsv.exe 2116 spoolsv.exe 2116 spoolsv.exe 2776 spoolsv.exe 2776 spoolsv.exe 2484 spoolsv.exe 2484 spoolsv.exe 2024 spoolsv.exe 2024 spoolsv.exe 1188 spoolsv.exe 1188 spoolsv.exe 2948 spoolsv.exe 2948 spoolsv.exe 1672 spoolsv.exe 1672 spoolsv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2844 wrote to memory of 2860 2844 b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe 28 PID 2844 wrote to memory of 2860 2844 b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe 28 PID 2844 wrote to memory of 2860 2844 b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe 28 PID 2844 wrote to memory of 2860 2844 b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe 28 PID 2844 wrote to memory of 2260 2844 b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe 30 PID 2844 wrote to memory of 2260 2844 b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe 30 PID 2844 wrote to memory of 2260 2844 b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe 30 PID 2844 wrote to memory of 2260 2844 b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe 30 PID 2844 wrote to memory of 2260 2844 b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe 30 PID 2844 wrote to memory of 2260 2844 b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe 30 PID 2844 wrote to memory of 2260 2844 b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe 30 PID 2844 wrote to memory of 2260 2844 b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe 30 PID 2844 wrote to memory of 2260 2844 b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe 30 PID 2844 wrote to memory of 2260 2844 b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe 30 PID 2844 wrote to memory of 2260 2844 b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe 30 PID 2844 wrote to memory of 2260 2844 b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe 30 PID 2844 wrote to memory of 2260 2844 b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe 30 PID 2844 wrote to memory of 2260 2844 b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe 30 PID 2844 wrote to memory of 2260 2844 b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe 30 PID 2844 wrote to memory of 2260 2844 b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe 30 PID 2844 wrote to memory of 2260 2844 b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe 30 PID 2844 wrote to memory of 2260 2844 b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe 30 PID 2844 wrote to memory of 2260 2844 b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe 30 PID 2844 wrote to memory of 2260 2844 b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe 30 PID 2844 wrote to memory of 2260 2844 b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe 30 PID 2844 wrote to memory of 2260 2844 b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe 30 PID 2844 wrote to memory of 2260 2844 b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe 30 PID 2260 wrote to memory of 2492 2260 b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe 33 PID 2260 wrote to memory of 2492 2260 b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe 33 PID 2260 wrote to memory of 2492 2260 b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe 33 PID 2260 wrote to memory of 2492 2260 b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe 33 PID 2260 wrote to memory of 2492 2260 b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe 33 PID 2260 wrote to memory of 2492 2260 b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe 33 PID 2260 wrote to memory of 2492 2260 b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe 33 PID 2260 wrote to memory of 2492 2260 b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe 33 PID 2260 wrote to memory of 2492 2260 b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe 33 PID 2260 wrote to memory of 2556 2260 b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe 34 PID 2260 wrote to memory of 2556 2260 b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe 34 PID 2260 wrote to memory of 2556 2260 b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe 34 PID 2260 wrote to memory of 2556 2260 b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe 34 PID 2260 wrote to memory of 2556 2260 b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe 34 PID 2260 wrote to memory of 2556 2260 b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe 34 PID 2492 wrote to memory of 1652 2492 b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe 35 PID 2492 wrote to memory of 1652 2492 b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe 35 PID 2492 wrote to memory of 1652 2492 b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe 35 PID 2492 wrote to memory of 1652 2492 b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe 35 PID 1652 wrote to memory of 2228 1652 explorer.exe 36 PID 1652 wrote to memory of 2228 1652 explorer.exe 36 PID 1652 wrote to memory of 2228 1652 explorer.exe 36 PID 1652 wrote to memory of 2228 1652 explorer.exe 36 PID 1652 wrote to memory of 1480 1652 explorer.exe 38 PID 1652 wrote to memory of 1480 1652 explorer.exe 38 PID 1652 wrote to memory of 1480 1652 explorer.exe 38 PID 1652 wrote to memory of 1480 1652 explorer.exe 38 PID 1652 wrote to memory of 1480 1652 explorer.exe 38 PID 1652 wrote to memory of 1480 1652 explorer.exe 38 PID 1652 wrote to memory of 1480 1652 explorer.exe 38 PID 1652 wrote to memory of 1480 1652 explorer.exe 38 PID 1652 wrote to memory of 1480 1652 explorer.exe 38 PID 1652 wrote to memory of 1480 1652 explorer.exe 38 PID 1652 wrote to memory of 1480 1652 explorer.exe 38 PID 1652 wrote to memory of 1480 1652 explorer.exe 38 PID 1652 wrote to memory of 1480 1652 explorer.exe 38 PID 1652 wrote to memory of 1480 1652 explorer.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe"C:\Users\Admin\AppData\Local\Temp\b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "C:\Users\Admin\AppData\Local\Temp\b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"2⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2860
-
-
C:\Users\Admin\AppData\Local\Temp\b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exeC:\Users\Admin\AppData\Local\Temp\b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe2⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Users\Admin\AppData\Local\Temp\b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exeC:\Users\Admin\AppData\Local\Temp\b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe3⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2492 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\explorer.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"5⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2228
-
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1480 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe6⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:844 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1212 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:912
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:592
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2332 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:1836
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1640
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1684 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:1676
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2308
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2656 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2432
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2876
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1112 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:316
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2248
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1604 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:848
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2992
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1540 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:1004
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1220
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2960 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:3016
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1524
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2320 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:2844
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2316
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2192 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:2668
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2516
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1440 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:112
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1772
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2276 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2004
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2836
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:952 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:1000
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2612
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1876 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:1228
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1464
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2116 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:1928
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1916
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2776 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2472
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2832
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2484 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2512
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1040
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2024 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2772
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1920
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1188 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2092
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2764
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2948 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2084
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:904
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1672 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2912
-
-
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵PID:1288
-
-
-
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"3⤵PID:2556
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD53b641a7f885496c8b0b1d7fca32476d0
SHA1b2dfa97f4d79bdffd748e6c2294d8d32e3a9cecf
SHA256b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9
SHA512311f9091122aaf8d31b31a09380ba33f7fd86cd825437048e855b8ffc779232fb378693d441f5f071f5c77c5b6f504990fcbd3ab1f1f20d83fdf8ddf591e2682
-
Filesize
92B
MD513222a4bb413aaa8b92aa5b4f81d2760
SHA1268a48f2fe84ed49bbdc1873a8009db8c7cba66a
SHA256d170ac99460f9c1fb30717345b1003f8eb9189c26857ca26d3431590e6f0e23d
SHA512eee47ead9bef041b510ee5e40ebe8a51abd41d8c1fe5de68191f2b996feaa6cc0b8c16ed26d644fbf1d7e4f40920d7a6db954e19f2236d9e4e3f3f984f21b140
-
Filesize
2.9MB
MD5a49c0c23367654e62ce34af8261ee69c
SHA1ac68de2bb2ca84698731d7e33de81ef3409b0a4a
SHA256faa67b26c595c7b3caf430fb1dcfe41abd88b12689b1b823cf3b1fd004105970
SHA5126859ee474a7825084a3d01dad03d4881bd14d3f424db688e88f6eeea1070fcccbb2cb7a1da9703ce54a9e4d85aebd5acfabf8051ead18439bd687499981fdd4c
-
Filesize
2.9MB
MD53d87f70968a058834481bae689afe965
SHA15be5f1f12e9fc8aa7bccff78f5d35b803080e7d3
SHA25618c7c14a11b46b14428cc55124a386227e26d520d50c1d413f36e2a044674c5b
SHA512498da69be6f886affbe27f9fd4e5bf8288c13ba4ac881ff69ff79fa4c3cff9c7c8025606f4448642559bac976ffcbc4ddb9ecce3d7fe3f891783139c4e6f2a91