Analysis
-
max time kernel
120s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23-09-2024 05:18
Behavioral task
behavioral1
Sample
b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe
Resource
win10v2004-20240802-en
General
-
Target
b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe
-
Size
2.9MB
-
MD5
3b641a7f885496c8b0b1d7fca32476d0
-
SHA1
b2dfa97f4d79bdffd748e6c2294d8d32e3a9cecf
-
SHA256
b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9
-
SHA512
311f9091122aaf8d31b31a09380ba33f7fd86cd825437048e855b8ffc779232fb378693d441f5f071f5c77c5b6f504990fcbd3ab1f1f20d83fdf8ddf591e2682
-
SSDEEP
24576:7v97AXmZZcVKfIxTiEVc847flVC6faaQDbGV6eH81k6IbGD2JTu0GoZQDbGV6eHS:7v97AXmw4gxeOw46fUbNecCCFbNecf
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload 3 IoCs
resource yara_rule behavioral2/files/0x00090000000235f8-32.dat warzonerat behavioral2/files/0x00080000000235f6-58.dat warzonerat behavioral2/files/0x0004000000000707-73.dat warzonerat -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe -
Drops startup file 21 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe -
Executes dropped EXE 40 IoCs
pid Process 3840 explorer.exe 1724 explorer.exe 1684 explorer.exe 384 spoolsv.exe 1008 spoolsv.exe 4320 spoolsv.exe 1668 spoolsv.exe 5020 spoolsv.exe 4148 spoolsv.exe 5012 spoolsv.exe 3036 spoolsv.exe 4792 spoolsv.exe 3520 spoolsv.exe 5028 spoolsv.exe 60 spoolsv.exe 4364 spoolsv.exe 4732 spoolsv.exe 1036 spoolsv.exe 3032 spoolsv.exe 1612 spoolsv.exe 3288 spoolsv.exe 3504 spoolsv.exe 4400 spoolsv.exe 4044 spoolsv.exe 2236 spoolsv.exe 3724 spoolsv.exe 3684 spoolsv.exe 540 spoolsv.exe 1152 spoolsv.exe 1200 spoolsv.exe 4368 spoolsv.exe 3232 spoolsv.exe 2304 spoolsv.exe 4740 spoolsv.exe 1524 spoolsv.exe 4980 spoolsv.exe 2852 spoolsv.exe 2068 spoolsv.exe 2324 spoolsv.exe 720 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe -
Suspicious use of SetThreadContext 24 IoCs
description pid Process procid_target PID 4028 set thread context of 4892 4028 b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe 89 PID 4892 set thread context of 3000 4892 b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe 101 PID 4892 set thread context of 4132 4892 b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe 102 PID 3840 set thread context of 1724 3840 explorer.exe 106 PID 1724 set thread context of 1684 1724 explorer.exe 107 PID 1724 set thread context of 2732 1724 explorer.exe 108 PID 384 set thread context of 1008 384 spoolsv.exe 112 PID 4320 set thread context of 1668 4320 spoolsv.exe 116 PID 5020 set thread context of 4148 5020 spoolsv.exe 120 PID 5012 set thread context of 3036 5012 spoolsv.exe 124 PID 4792 set thread context of 3520 4792 spoolsv.exe 128 PID 5028 set thread context of 60 5028 spoolsv.exe 132 PID 4364 set thread context of 4732 4364 spoolsv.exe 136 PID 1036 set thread context of 3032 1036 spoolsv.exe 140 PID 1612 set thread context of 3288 1612 spoolsv.exe 144 PID 3504 set thread context of 4400 3504 spoolsv.exe 148 PID 4044 set thread context of 2236 4044 spoolsv.exe 152 PID 3724 set thread context of 3684 3724 spoolsv.exe 156 PID 540 set thread context of 1152 540 spoolsv.exe 160 PID 1200 set thread context of 4368 1200 spoolsv.exe 164 PID 3232 set thread context of 2304 3232 spoolsv.exe 168 PID 4740 set thread context of 1524 4740 spoolsv.exe 172 PID 4980 set thread context of 2852 4980 spoolsv.exe 176 PID 2068 set thread context of 2324 2068 spoolsv.exe 180 -
Drops file in Windows directory 23 IoCs
description ioc Process File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4028 b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe 4028 b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe 3000 b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe 3000 b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe 3840 explorer.exe 3840 explorer.exe 384 spoolsv.exe 384 spoolsv.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 4320 spoolsv.exe 4320 spoolsv.exe 1684 explorer.exe 1684 explorer.exe 5020 spoolsv.exe 5020 spoolsv.exe 1684 explorer.exe 1684 explorer.exe 5012 spoolsv.exe 5012 spoolsv.exe 1684 explorer.exe 1684 explorer.exe 4792 spoolsv.exe 4792 spoolsv.exe 1684 explorer.exe 1684 explorer.exe 5028 spoolsv.exe 5028 spoolsv.exe 1684 explorer.exe 1684 explorer.exe 4364 spoolsv.exe 4364 spoolsv.exe 1684 explorer.exe 1684 explorer.exe 1036 spoolsv.exe 1036 spoolsv.exe 1684 explorer.exe 1684 explorer.exe 1612 spoolsv.exe 1612 spoolsv.exe 1684 explorer.exe 1684 explorer.exe 3504 spoolsv.exe 3504 spoolsv.exe 1684 explorer.exe 1684 explorer.exe 4044 spoolsv.exe 4044 spoolsv.exe 1684 explorer.exe 1684 explorer.exe 3724 spoolsv.exe 3724 spoolsv.exe 1684 explorer.exe 1684 explorer.exe 540 spoolsv.exe 540 spoolsv.exe 1684 explorer.exe 1684 explorer.exe 1200 spoolsv.exe 1200 spoolsv.exe 1684 explorer.exe 1684 explorer.exe -
Suspicious use of SetWindowsHookEx 48 IoCs
pid Process 4028 b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe 4028 b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe 3000 b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe 3000 b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe 3840 explorer.exe 3840 explorer.exe 1684 explorer.exe 1684 explorer.exe 384 spoolsv.exe 384 spoolsv.exe 1684 explorer.exe 1684 explorer.exe 4320 spoolsv.exe 4320 spoolsv.exe 5020 spoolsv.exe 5020 spoolsv.exe 5012 spoolsv.exe 5012 spoolsv.exe 4792 spoolsv.exe 4792 spoolsv.exe 5028 spoolsv.exe 5028 spoolsv.exe 4364 spoolsv.exe 4364 spoolsv.exe 1036 spoolsv.exe 1036 spoolsv.exe 1612 spoolsv.exe 1612 spoolsv.exe 3504 spoolsv.exe 3504 spoolsv.exe 4044 spoolsv.exe 4044 spoolsv.exe 3724 spoolsv.exe 3724 spoolsv.exe 540 spoolsv.exe 540 spoolsv.exe 1200 spoolsv.exe 1200 spoolsv.exe 3232 spoolsv.exe 3232 spoolsv.exe 4740 spoolsv.exe 4740 spoolsv.exe 4980 spoolsv.exe 4980 spoolsv.exe 2068 spoolsv.exe 2068 spoolsv.exe 720 spoolsv.exe 720 spoolsv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4028 wrote to memory of 1556 4028 b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe 87 PID 4028 wrote to memory of 1556 4028 b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe 87 PID 4028 wrote to memory of 1556 4028 b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe 87 PID 4028 wrote to memory of 4892 4028 b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe 89 PID 4028 wrote to memory of 4892 4028 b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe 89 PID 4028 wrote to memory of 4892 4028 b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe 89 PID 4028 wrote to memory of 4892 4028 b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe 89 PID 4028 wrote to memory of 4892 4028 b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe 89 PID 4028 wrote to memory of 4892 4028 b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe 89 PID 4028 wrote to memory of 4892 4028 b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe 89 PID 4028 wrote to memory of 4892 4028 b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe 89 PID 4028 wrote to memory of 4892 4028 b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe 89 PID 4028 wrote to memory of 4892 4028 b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe 89 PID 4028 wrote to memory of 4892 4028 b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe 89 PID 4028 wrote to memory of 4892 4028 b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe 89 PID 4028 wrote to memory of 4892 4028 b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe 89 PID 4028 wrote to memory of 4892 4028 b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe 89 PID 4028 wrote to memory of 4892 4028 b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe 89 PID 4028 wrote to memory of 4892 4028 b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe 89 PID 4028 wrote to memory of 4892 4028 b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe 89 PID 4028 wrote to memory of 4892 4028 b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe 89 PID 4028 wrote to memory of 4892 4028 b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe 89 PID 4028 wrote to memory of 4892 4028 b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe 89 PID 4028 wrote to memory of 4892 4028 b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe 89 PID 4028 wrote to memory of 4892 4028 b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe 89 PID 4028 wrote to memory of 4892 4028 b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe 89 PID 4028 wrote to memory of 4892 4028 b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe 89 PID 4028 wrote to memory of 4892 4028 b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe 89 PID 4028 wrote to memory of 4892 4028 b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe 89 PID 4028 wrote to memory of 4892 4028 b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe 89 PID 4028 wrote to memory of 4892 4028 b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe 89 PID 4028 wrote to memory of 4892 4028 b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe 89 PID 4892 wrote to memory of 3000 4892 b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe 101 PID 4892 wrote to memory of 3000 4892 b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe 101 PID 4892 wrote to memory of 3000 4892 b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe 101 PID 4892 wrote to memory of 3000 4892 b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe 101 PID 4892 wrote to memory of 3000 4892 b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe 101 PID 4892 wrote to memory of 3000 4892 b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe 101 PID 4892 wrote to memory of 3000 4892 b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe 101 PID 4892 wrote to memory of 3000 4892 b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe 101 PID 4892 wrote to memory of 4132 4892 b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe 102 PID 4892 wrote to memory of 4132 4892 b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe 102 PID 4892 wrote to memory of 4132 4892 b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe 102 PID 4892 wrote to memory of 4132 4892 b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe 102 PID 4892 wrote to memory of 4132 4892 b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe 102 PID 3000 wrote to memory of 3840 3000 b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe 103 PID 3000 wrote to memory of 3840 3000 b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe 103 PID 3000 wrote to memory of 3840 3000 b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe 103 PID 3840 wrote to memory of 2376 3840 explorer.exe 104 PID 3840 wrote to memory of 2376 3840 explorer.exe 104 PID 3840 wrote to memory of 2376 3840 explorer.exe 104 PID 3840 wrote to memory of 1724 3840 explorer.exe 106 PID 3840 wrote to memory of 1724 3840 explorer.exe 106 PID 3840 wrote to memory of 1724 3840 explorer.exe 106 PID 3840 wrote to memory of 1724 3840 explorer.exe 106 PID 3840 wrote to memory of 1724 3840 explorer.exe 106 PID 3840 wrote to memory of 1724 3840 explorer.exe 106 PID 3840 wrote to memory of 1724 3840 explorer.exe 106 PID 3840 wrote to memory of 1724 3840 explorer.exe 106 PID 3840 wrote to memory of 1724 3840 explorer.exe 106 PID 3840 wrote to memory of 1724 3840 explorer.exe 106 PID 3840 wrote to memory of 1724 3840 explorer.exe 106 PID 3840 wrote to memory of 1724 3840 explorer.exe 106 PID 3840 wrote to memory of 1724 3840 explorer.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe"C:\Users\Admin\AppData\Local\Temp\b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4028 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "C:\Users\Admin\AppData\Local\Temp\b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"2⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:1556
-
-
C:\Users\Admin\AppData\Local\Temp\b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exeC:\Users\Admin\AppData\Local\Temp\b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe2⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Users\Admin\AppData\Local\Temp\b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exeC:\Users\Admin\AppData\Local\Temp\b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9N.exe3⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3000 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3840 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\explorer.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"5⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2376
-
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1724 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe6⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1684 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:384 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2236
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1008
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4320 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2668
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1668
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5020 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:436
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4148
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5012 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2752
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3036
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4792 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:3560
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3520
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5028 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:4996
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:60
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4364 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2312
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4732
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1036 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:1136
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3032
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1612 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:4960
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3288
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3504 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:4652
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4400
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4044 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:3336
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2236
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3724 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2240
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3684
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:540 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:668
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1152
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1200 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:3464
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4368
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3232 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:1456
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2304
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4740 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:4136
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1524
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4980 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:5092
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2852
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2068 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:532
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2324
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:720 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:4192
-
-
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵PID:2732
-
-
-
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"3⤵PID:4132
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4292,i,12470628711992022444,7767535593390851522,262144 --variations-seed-version --mojo-platform-channel-handle=1020 /prefetch:81⤵PID:640
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD53b641a7f885496c8b0b1d7fca32476d0
SHA1b2dfa97f4d79bdffd748e6c2294d8d32e3a9cecf
SHA256b8572015a663ca716c590a9f4713f7826bcffae45611055494f02e7614cf0fd9
SHA512311f9091122aaf8d31b31a09380ba33f7fd86cd825437048e855b8ffc779232fb378693d441f5f071f5c77c5b6f504990fcbd3ab1f1f20d83fdf8ddf591e2682
-
Filesize
92B
MD513222a4bb413aaa8b92aa5b4f81d2760
SHA1268a48f2fe84ed49bbdc1873a8009db8c7cba66a
SHA256d170ac99460f9c1fb30717345b1003f8eb9189c26857ca26d3431590e6f0e23d
SHA512eee47ead9bef041b510ee5e40ebe8a51abd41d8c1fe5de68191f2b996feaa6cc0b8c16ed26d644fbf1d7e4f40920d7a6db954e19f2236d9e4e3f3f984f21b140
-
Filesize
2.9MB
MD5dd02a8a7e93f6daa6dc393666965dec9
SHA119cba7e6c08abdcefea5f95294b5ab6ce94d6ebf
SHA256ada03c2355e3cdcedd8e299a001282a236a45564e0b7462da6472f5421b58786
SHA512dbb54c0fbfebea97c652ebc0562162241f159932066fa4e5dcf95b5d213139e7d801b7e79a4e9ea773fd63d80a4a02692e2f488492b8941f04857b81bc42cf7f
-
Filesize
2.9MB
MD55284cc0188183494637e556782bdc546
SHA1ba9d7fb3a7312f3da01f76a5ea8b49f5bf299eac
SHA256d7b43c2b7e56ed60f237c18840304618a2d18e320d321353c68ae8e94df420e2
SHA512c342ac8f97e438ebbe0a9a3c3959da349369f5c6a088c72d10aff1a9049008ff8e07dfd2e8e7fc862debc64b0b5ef1ade54c5fb56ba157d0864696f14134756f