Analysis
-
max time kernel
118s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-11-2024 05:03
Behavioral task
behavioral1
Sample
9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exe
Resource
win10v2004-20241007-en
General
-
Target
9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exe
-
Size
2.9MB
-
MD5
e4632ceb0f9ccba10bf5f0999edfdf20
-
SHA1
3606611240f3ca829273440356cfba32df555a02
-
SHA256
9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cf
-
SHA512
99890e77a15fc3d8702306606a3a4819e1af542979743caf830314435bb53a3851c1b261496b318884d3e15e3a3c15faeae1bdadc357f7e441d03c0d03e5172d
-
SSDEEP
24576:7v97AXmZZcVKfIxTiEVc847flVC6faaQDbGV6eH81k6IbGD2JTu0GoZQDbGV6eH7:7v97AXmw4gxeOw46fUbNecCCFbNecY
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
explorer.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
explorer.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzonerat family
-
Warzone RAT payload 3 IoCs
Processes:
resource yara_rule C:\Windows\system\explorer.exe warzonerat C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe warzonerat \Windows\system\spoolsv.exe warzonerat -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
Processes:
explorer.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe -
Drops startup file 5 IoCs
Processes:
cmd.execmd.execmd.execmd.execmd.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe -
Executes dropped EXE 30 IoCs
Processes:
explorer.exeexplorer.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exepid process 1256 explorer.exe 1304 explorer.exe 876 explorer.exe 632 spoolsv.exe 2324 spoolsv.exe 1580 spoolsv.exe 1560 spoolsv.exe 2688 spoolsv.exe 2648 spoolsv.exe 2572 spoolsv.exe 2156 spoolsv.exe 1060 spoolsv.exe 2812 spoolsv.exe 1940 spoolsv.exe 2196 spoolsv.exe 1536 spoolsv.exe 1620 spoolsv.exe 1736 spoolsv.exe 3056 spoolsv.exe 1656 spoolsv.exe 2532 spoolsv.exe 1996 spoolsv.exe 1324 spoolsv.exe 2860 spoolsv.exe 800 spoolsv.exe 1964 spoolsv.exe 932 spoolsv.exe 1980 spoolsv.exe 836 spoolsv.exe 2440 spoolsv.exe -
Loads dropped DLL 43 IoCs
Processes:
9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exepid process 348 9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exe 348 9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exe 876 explorer.exe 876 explorer.exe 632 spoolsv.exe 876 explorer.exe 876 explorer.exe 1580 spoolsv.exe 876 explorer.exe 876 explorer.exe 2688 spoolsv.exe 876 explorer.exe 876 explorer.exe 2572 spoolsv.exe 876 explorer.exe 876 explorer.exe 1060 spoolsv.exe 876 explorer.exe 876 explorer.exe 1940 spoolsv.exe 876 explorer.exe 876 explorer.exe 1536 spoolsv.exe 876 explorer.exe 876 explorer.exe 1736 spoolsv.exe 876 explorer.exe 876 explorer.exe 1656 spoolsv.exe 876 explorer.exe 876 explorer.exe 1996 spoolsv.exe 876 explorer.exe 876 explorer.exe 2860 spoolsv.exe 876 explorer.exe 876 explorer.exe 1964 spoolsv.exe 876 explorer.exe 876 explorer.exe 1980 spoolsv.exe 876 explorer.exe 876 explorer.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
explorer.exeexplorer.exe9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" 9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exe -
Suspicious use of SetThreadContext 19 IoCs
Processes:
9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exe9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exeexplorer.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exedescription pid process target process PID 2808 set thread context of 2644 2808 9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exe 9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exe PID 2644 set thread context of 348 2644 9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exe 9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exe PID 2644 set thread context of 3040 2644 9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exe diskperf.exe PID 1256 set thread context of 1304 1256 explorer.exe explorer.exe PID 1304 set thread context of 876 1304 explorer.exe explorer.exe PID 1304 set thread context of 1020 1304 explorer.exe diskperf.exe PID 632 set thread context of 2324 632 spoolsv.exe spoolsv.exe PID 1580 set thread context of 1560 1580 spoolsv.exe spoolsv.exe PID 2688 set thread context of 2648 2688 spoolsv.exe spoolsv.exe PID 2572 set thread context of 2156 2572 spoolsv.exe spoolsv.exe PID 1060 set thread context of 2812 1060 spoolsv.exe spoolsv.exe PID 1940 set thread context of 2196 1940 spoolsv.exe spoolsv.exe PID 1536 set thread context of 1620 1536 spoolsv.exe spoolsv.exe PID 1736 set thread context of 3056 1736 spoolsv.exe spoolsv.exe PID 1656 set thread context of 2532 1656 spoolsv.exe spoolsv.exe PID 1996 set thread context of 1324 1996 spoolsv.exe spoolsv.exe PID 2860 set thread context of 800 2860 spoolsv.exe spoolsv.exe PID 1964 set thread context of 932 1964 spoolsv.exe spoolsv.exe PID 1980 set thread context of 836 1980 spoolsv.exe spoolsv.exe -
Drops file in Windows directory 18 IoCs
Processes:
explorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exe9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exespoolsv.exespoolsv.exedescription ioc process File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe 9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 39 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exespoolsv.execmd.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.execmd.exespoolsv.exespoolsv.execmd.execmd.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exe9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exe9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exespoolsv.exespoolsv.exespoolsv.execmd.execmd.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe -
Suspicious behavior: EnumeratesProcesses 30 IoCs
Processes:
9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exe9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exeexplorer.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exepid process 2808 9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exe 348 9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exe 1256 explorer.exe 632 spoolsv.exe 876 explorer.exe 876 explorer.exe 1580 spoolsv.exe 876 explorer.exe 2688 spoolsv.exe 876 explorer.exe 2572 spoolsv.exe 876 explorer.exe 1060 spoolsv.exe 876 explorer.exe 1940 spoolsv.exe 876 explorer.exe 1536 spoolsv.exe 876 explorer.exe 1736 spoolsv.exe 876 explorer.exe 1656 spoolsv.exe 876 explorer.exe 1996 spoolsv.exe 876 explorer.exe 2860 spoolsv.exe 876 explorer.exe 1964 spoolsv.exe 876 explorer.exe 1980 spoolsv.exe 876 explorer.exe -
Suspicious use of SetWindowsHookEx 38 IoCs
Processes:
9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exe9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exeexplorer.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exepid process 2808 9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exe 2808 9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exe 348 9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exe 348 9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exe 1256 explorer.exe 1256 explorer.exe 876 explorer.exe 876 explorer.exe 632 spoolsv.exe 632 spoolsv.exe 876 explorer.exe 876 explorer.exe 1580 spoolsv.exe 1580 spoolsv.exe 2688 spoolsv.exe 2688 spoolsv.exe 2572 spoolsv.exe 2572 spoolsv.exe 1060 spoolsv.exe 1060 spoolsv.exe 1940 spoolsv.exe 1940 spoolsv.exe 1536 spoolsv.exe 1536 spoolsv.exe 1736 spoolsv.exe 1736 spoolsv.exe 1656 spoolsv.exe 1656 spoolsv.exe 1996 spoolsv.exe 1996 spoolsv.exe 2860 spoolsv.exe 2860 spoolsv.exe 1964 spoolsv.exe 1964 spoolsv.exe 1980 spoolsv.exe 1980 spoolsv.exe 2440 spoolsv.exe 2440 spoolsv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exe9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exe9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exeexplorer.exedescription pid process target process PID 2808 wrote to memory of 2628 2808 9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exe cmd.exe PID 2808 wrote to memory of 2628 2808 9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exe cmd.exe PID 2808 wrote to memory of 2628 2808 9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exe cmd.exe PID 2808 wrote to memory of 2628 2808 9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exe cmd.exe PID 2808 wrote to memory of 2644 2808 9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exe 9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exe PID 2808 wrote to memory of 2644 2808 9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exe 9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exe PID 2808 wrote to memory of 2644 2808 9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exe 9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exe PID 2808 wrote to memory of 2644 2808 9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exe 9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exe PID 2808 wrote to memory of 2644 2808 9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exe 9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exe PID 2808 wrote to memory of 2644 2808 9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exe 9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exe PID 2808 wrote to memory of 2644 2808 9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exe 9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exe PID 2808 wrote to memory of 2644 2808 9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exe 9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exe PID 2808 wrote to memory of 2644 2808 9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exe 9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exe PID 2808 wrote to memory of 2644 2808 9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exe 9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exe PID 2808 wrote to memory of 2644 2808 9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exe 9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exe PID 2808 wrote to memory of 2644 2808 9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exe 9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exe PID 2808 wrote to memory of 2644 2808 9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exe 9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exe PID 2808 wrote to memory of 2644 2808 9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exe 9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exe PID 2808 wrote to memory of 2644 2808 9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exe 9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exe PID 2808 wrote to memory of 2644 2808 9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exe 9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exe PID 2808 wrote to memory of 2644 2808 9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exe 9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exe PID 2808 wrote to memory of 2644 2808 9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exe 9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exe PID 2808 wrote to memory of 2644 2808 9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exe 9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exe PID 2808 wrote to memory of 2644 2808 9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exe 9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exe PID 2808 wrote to memory of 2644 2808 9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exe 9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exe PID 2808 wrote to memory of 2644 2808 9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exe 9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exe PID 2808 wrote to memory of 2644 2808 9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exe 9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exe PID 2644 wrote to memory of 348 2644 9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exe 9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exe PID 2644 wrote to memory of 348 2644 9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exe 9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exe PID 2644 wrote to memory of 348 2644 9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exe 9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exe PID 2644 wrote to memory of 348 2644 9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exe 9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exe PID 2644 wrote to memory of 348 2644 9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exe 9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exe PID 2644 wrote to memory of 348 2644 9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exe 9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exe PID 2644 wrote to memory of 348 2644 9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exe 9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exe PID 2644 wrote to memory of 348 2644 9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exe 9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exe PID 2644 wrote to memory of 348 2644 9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exe 9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exe PID 2644 wrote to memory of 3040 2644 9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exe diskperf.exe PID 2644 wrote to memory of 3040 2644 9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exe diskperf.exe PID 2644 wrote to memory of 3040 2644 9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exe diskperf.exe PID 2644 wrote to memory of 3040 2644 9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exe diskperf.exe PID 2644 wrote to memory of 3040 2644 9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exe diskperf.exe PID 2644 wrote to memory of 3040 2644 9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exe diskperf.exe PID 348 wrote to memory of 1256 348 9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exe explorer.exe PID 348 wrote to memory of 1256 348 9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exe explorer.exe PID 348 wrote to memory of 1256 348 9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exe explorer.exe PID 348 wrote to memory of 1256 348 9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exe explorer.exe PID 1256 wrote to memory of 864 1256 explorer.exe cmd.exe PID 1256 wrote to memory of 864 1256 explorer.exe cmd.exe PID 1256 wrote to memory of 864 1256 explorer.exe cmd.exe PID 1256 wrote to memory of 864 1256 explorer.exe cmd.exe PID 1256 wrote to memory of 1304 1256 explorer.exe explorer.exe PID 1256 wrote to memory of 1304 1256 explorer.exe explorer.exe PID 1256 wrote to memory of 1304 1256 explorer.exe explorer.exe PID 1256 wrote to memory of 1304 1256 explorer.exe explorer.exe PID 1256 wrote to memory of 1304 1256 explorer.exe explorer.exe PID 1256 wrote to memory of 1304 1256 explorer.exe explorer.exe PID 1256 wrote to memory of 1304 1256 explorer.exe explorer.exe PID 1256 wrote to memory of 1304 1256 explorer.exe explorer.exe PID 1256 wrote to memory of 1304 1256 explorer.exe explorer.exe PID 1256 wrote to memory of 1304 1256 explorer.exe explorer.exe PID 1256 wrote to memory of 1304 1256 explorer.exe explorer.exe PID 1256 wrote to memory of 1304 1256 explorer.exe explorer.exe PID 1256 wrote to memory of 1304 1256 explorer.exe explorer.exe PID 1256 wrote to memory of 1304 1256 explorer.exe explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exe"C:\Users\Admin\AppData\Local\Temp\9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "C:\Users\Admin\AppData\Local\Temp\9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"2⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2628
-
-
C:\Users\Admin\AppData\Local\Temp\9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exeC:\Users\Admin\AppData\Local\Temp\9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exe2⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Users\Admin\AppData\Local\Temp\9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exeC:\Users\Admin\AppData\Local\Temp\9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN.exe3⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:348 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\explorer.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"5⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:864
-
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1304 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe6⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:876 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:632 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2960
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2324
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1580 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:1788
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1560
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2688 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:2712
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2648
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2572 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:2984
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2156
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1060 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:1016
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2812
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1940 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:1292
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2196
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1536 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:1260
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1620
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1736 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:552
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3056
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1656 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:2664
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2532
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1996 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:2236
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1324
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2860 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:2852
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:800
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1964 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:1392
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:932
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1980 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- System Location Discovery: System Language Discovery
PID:1056
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:836
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2440 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:608
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵PID:1588
-
-
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵PID:1020
-
-
-
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"3⤵PID:3040
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD5e4632ceb0f9ccba10bf5f0999edfdf20
SHA13606611240f3ca829273440356cfba32df555a02
SHA2569fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cf
SHA51299890e77a15fc3d8702306606a3a4819e1af542979743caf830314435bb53a3851c1b261496b318884d3e15e3a3c15faeae1bdadc357f7e441d03c0d03e5172d
-
Filesize
92B
MD513222a4bb413aaa8b92aa5b4f81d2760
SHA1268a48f2fe84ed49bbdc1873a8009db8c7cba66a
SHA256d170ac99460f9c1fb30717345b1003f8eb9189c26857ca26d3431590e6f0e23d
SHA512eee47ead9bef041b510ee5e40ebe8a51abd41d8c1fe5de68191f2b996feaa6cc0b8c16ed26d644fbf1d7e4f40920d7a6db954e19f2236d9e4e3f3f984f21b140
-
Filesize
93B
MD58445bfa5a278e2f068300c604a78394b
SHA19fb4eef5ec2606bd151f77fdaa219853d4aa0c65
SHA2565ddf324661da70998e89da7469c0eea327faae9216b9abc15c66fe95deec379c
SHA5128ad7d18392a15cabbfd4d30b2e8a2aad899d35aba099b5be1f6852ca39f58541fb318972299c5728a30fd311db011578c3aaf881fa8b8b42067d2a1e11c50822
-
Filesize
2.9MB
MD515d2661f42016bcd8a39178298038514
SHA1bd7af190402640d6d535daca6a9da4ecdf3c7698
SHA25646f541de7851e5f83c45a9aac7ec611ff7127a77aeea7a34a608b0dcb3580a31
SHA512048d25a5c866e93b2bb69ecdbac6cf4e5c766c4591edbbe68bc694f15251c1936eab6b657745735e4d7315c93904a8c354c633cfa9456122cd92f2257b06c789
-
Filesize
2.9MB
MD5b9b99283a50218157de51ad7f2045b68
SHA1b8f734bb85887bbd8ad153217d7ea994cb94c11f
SHA256cc6c1116ad9d619b782b10b60396036222e1cf1fa4ce6ea90d52bf2b4659ac20
SHA512c5a0ea0b4b3b8a303bc8cfe18d4ab9f7d98d0cb82e13e87932a008a0a6846be6423f4e1360071eaa40acd0b64fcdee9db33ab07e63a15c0d61cced4ac73fe85c