Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 08:23
Behavioral task
behavioral1
Sample
d16d91b65e8deb566fd4eaa59ce26a9563cf1a040e941bcff151422cde314729N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d16d91b65e8deb566fd4eaa59ce26a9563cf1a040e941bcff151422cde314729N.exe
Resource
win10v2004-20241007-en
General
-
Target
d16d91b65e8deb566fd4eaa59ce26a9563cf1a040e941bcff151422cde314729N.exe
-
Size
1.2MB
-
MD5
c47ae13ef8d135cf17720c996967ed00
-
SHA1
e2989ec67e75c21e311a766fd35f4674d56b4eff
-
SHA256
d16d91b65e8deb566fd4eaa59ce26a9563cf1a040e941bcff151422cde314729
-
SHA512
1399fd559c6a0cefbd39db63b1ca45f8ef9ceef5b98d17f478b845e26e3213753088b92ad3f9c5af8934416bd8395e89df25b1cdfb4d425587c8de7052e3b564
-
SSDEEP
12288:OIbsBDU0I6+Tu0TJ0N1oYgNOFDA7W2FeDSIGVH/KIDgDgUeHbY11k8:OIbGD2JTu0GoZQDbGV6eH81k8
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzonerat family
-
Warzone RAT payload 3 IoCs
resource yara_rule behavioral2/files/0x0008000000023cb9-25.dat warzonerat behavioral2/files/0x0008000000023cb7-43.dat warzonerat behavioral2/files/0x0008000000023cbc-61.dat warzonerat -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe -
resource yara_rule behavioral2/files/0x0008000000023cb9-25.dat aspack_v212_v242 behavioral2/files/0x0008000000023cb7-43.dat aspack_v212_v242 behavioral2/files/0x0008000000023cbc-61.dat aspack_v212_v242 -
Executes dropped EXE 62 IoCs
pid Process 4900 explorer.exe 2816 explorer.exe 5112 spoolsv.exe 5104 spoolsv.exe 1496 spoolsv.exe 5036 spoolsv.exe 3924 spoolsv.exe 4604 spoolsv.exe 4348 spoolsv.exe 1896 spoolsv.exe 4200 spoolsv.exe 2000 spoolsv.exe 3160 spoolsv.exe 4092 spoolsv.exe 2160 spoolsv.exe 3100 spoolsv.exe 2892 spoolsv.exe 3396 spoolsv.exe 3120 spoolsv.exe 3124 spoolsv.exe 4704 spoolsv.exe 2804 spoolsv.exe 4292 spoolsv.exe 4384 spoolsv.exe 4936 spoolsv.exe 3764 spoolsv.exe 2320 spoolsv.exe 404 spoolsv.exe 1020 spoolsv.exe 2340 spoolsv.exe 3748 spoolsv.exe 1976 spoolsv.exe 788 spoolsv.exe 3360 spoolsv.exe 4456 spoolsv.exe 1116 spoolsv.exe 2472 spoolsv.exe 4772 spoolsv.exe 5072 spoolsv.exe 4844 spoolsv.exe 1108 spoolsv.exe 4116 spoolsv.exe 3628 spoolsv.exe 4376 spoolsv.exe 2372 spoolsv.exe 3816 spoolsv.exe 1040 spoolsv.exe 4836 spoolsv.exe 2192 spoolsv.exe 4356 spoolsv.exe 2404 spoolsv.exe 3892 spoolsv.exe 3080 spoolsv.exe 4184 spoolsv.exe 3832 spoolsv.exe 2324 spoolsv.exe 4544 spoolsv.exe 2628 spoolsv.exe 888 spoolsv.exe 4496 spoolsv.exe 4752 spoolsv.exe 2104 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" d16d91b65e8deb566fd4eaa59ce26a9563cf1a040e941bcff151422cde314729N.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4000 set thread context of 3548 4000 d16d91b65e8deb566fd4eaa59ce26a9563cf1a040e941bcff151422cde314729N.exe 104 PID 4000 set thread context of 2492 4000 d16d91b65e8deb566fd4eaa59ce26a9563cf1a040e941bcff151422cde314729N.exe 105 PID 4900 set thread context of 2816 4900 explorer.exe 108 PID 4900 set thread context of 4312 4900 explorer.exe 109 -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe d16d91b65e8deb566fd4eaa59ce26a9563cf1a040e941bcff151422cde314729N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d16d91b65e8deb566fd4eaa59ce26a9563cf1a040e941bcff151422cde314729N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d16d91b65e8deb566fd4eaa59ce26a9563cf1a040e941bcff151422cde314729N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3548 d16d91b65e8deb566fd4eaa59ce26a9563cf1a040e941bcff151422cde314729N.exe 3548 d16d91b65e8deb566fd4eaa59ce26a9563cf1a040e941bcff151422cde314729N.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3548 d16d91b65e8deb566fd4eaa59ce26a9563cf1a040e941bcff151422cde314729N.exe 3548 d16d91b65e8deb566fd4eaa59ce26a9563cf1a040e941bcff151422cde314729N.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe 2816 explorer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4000 wrote to memory of 3548 4000 d16d91b65e8deb566fd4eaa59ce26a9563cf1a040e941bcff151422cde314729N.exe 104 PID 4000 wrote to memory of 3548 4000 d16d91b65e8deb566fd4eaa59ce26a9563cf1a040e941bcff151422cde314729N.exe 104 PID 4000 wrote to memory of 3548 4000 d16d91b65e8deb566fd4eaa59ce26a9563cf1a040e941bcff151422cde314729N.exe 104 PID 4000 wrote to memory of 3548 4000 d16d91b65e8deb566fd4eaa59ce26a9563cf1a040e941bcff151422cde314729N.exe 104 PID 4000 wrote to memory of 3548 4000 d16d91b65e8deb566fd4eaa59ce26a9563cf1a040e941bcff151422cde314729N.exe 104 PID 4000 wrote to memory of 3548 4000 d16d91b65e8deb566fd4eaa59ce26a9563cf1a040e941bcff151422cde314729N.exe 104 PID 4000 wrote to memory of 3548 4000 d16d91b65e8deb566fd4eaa59ce26a9563cf1a040e941bcff151422cde314729N.exe 104 PID 4000 wrote to memory of 3548 4000 d16d91b65e8deb566fd4eaa59ce26a9563cf1a040e941bcff151422cde314729N.exe 104 PID 4000 wrote to memory of 2492 4000 d16d91b65e8deb566fd4eaa59ce26a9563cf1a040e941bcff151422cde314729N.exe 105 PID 4000 wrote to memory of 2492 4000 d16d91b65e8deb566fd4eaa59ce26a9563cf1a040e941bcff151422cde314729N.exe 105 PID 4000 wrote to memory of 2492 4000 d16d91b65e8deb566fd4eaa59ce26a9563cf1a040e941bcff151422cde314729N.exe 105 PID 4000 wrote to memory of 2492 4000 d16d91b65e8deb566fd4eaa59ce26a9563cf1a040e941bcff151422cde314729N.exe 105 PID 4000 wrote to memory of 2492 4000 d16d91b65e8deb566fd4eaa59ce26a9563cf1a040e941bcff151422cde314729N.exe 105 PID 3548 wrote to memory of 4900 3548 d16d91b65e8deb566fd4eaa59ce26a9563cf1a040e941bcff151422cde314729N.exe 106 PID 3548 wrote to memory of 4900 3548 d16d91b65e8deb566fd4eaa59ce26a9563cf1a040e941bcff151422cde314729N.exe 106 PID 3548 wrote to memory of 4900 3548 d16d91b65e8deb566fd4eaa59ce26a9563cf1a040e941bcff151422cde314729N.exe 106 PID 4900 wrote to memory of 2816 4900 explorer.exe 108 PID 4900 wrote to memory of 2816 4900 explorer.exe 108 PID 4900 wrote to memory of 2816 4900 explorer.exe 108 PID 4900 wrote to memory of 2816 4900 explorer.exe 108 PID 4900 wrote to memory of 2816 4900 explorer.exe 108 PID 4900 wrote to memory of 2816 4900 explorer.exe 108 PID 4900 wrote to memory of 2816 4900 explorer.exe 108 PID 4900 wrote to memory of 2816 4900 explorer.exe 108 PID 4900 wrote to memory of 4312 4900 explorer.exe 109 PID 4900 wrote to memory of 4312 4900 explorer.exe 109 PID 4900 wrote to memory of 4312 4900 explorer.exe 109 PID 4900 wrote to memory of 4312 4900 explorer.exe 109 PID 4900 wrote to memory of 4312 4900 explorer.exe 109 PID 2816 wrote to memory of 5112 2816 explorer.exe 110 PID 2816 wrote to memory of 5112 2816 explorer.exe 110 PID 2816 wrote to memory of 5112 2816 explorer.exe 110 PID 2816 wrote to memory of 5104 2816 explorer.exe 111 PID 2816 wrote to memory of 5104 2816 explorer.exe 111 PID 2816 wrote to memory of 5104 2816 explorer.exe 111 PID 2816 wrote to memory of 1496 2816 explorer.exe 112 PID 2816 wrote to memory of 1496 2816 explorer.exe 112 PID 2816 wrote to memory of 1496 2816 explorer.exe 112 PID 2816 wrote to memory of 5036 2816 explorer.exe 113 PID 2816 wrote to memory of 5036 2816 explorer.exe 113 PID 2816 wrote to memory of 5036 2816 explorer.exe 113 PID 2816 wrote to memory of 3924 2816 explorer.exe 114 PID 2816 wrote to memory of 3924 2816 explorer.exe 114 PID 2816 wrote to memory of 3924 2816 explorer.exe 114 PID 2816 wrote to memory of 4604 2816 explorer.exe 115 PID 2816 wrote to memory of 4604 2816 explorer.exe 115 PID 2816 wrote to memory of 4604 2816 explorer.exe 115 PID 2816 wrote to memory of 4348 2816 explorer.exe 116 PID 2816 wrote to memory of 4348 2816 explorer.exe 116 PID 2816 wrote to memory of 4348 2816 explorer.exe 116 PID 2816 wrote to memory of 1896 2816 explorer.exe 117 PID 2816 wrote to memory of 1896 2816 explorer.exe 117 PID 2816 wrote to memory of 1896 2816 explorer.exe 117 PID 2816 wrote to memory of 4200 2816 explorer.exe 118 PID 2816 wrote to memory of 4200 2816 explorer.exe 118 PID 2816 wrote to memory of 4200 2816 explorer.exe 118 PID 2816 wrote to memory of 2000 2816 explorer.exe 119 PID 2816 wrote to memory of 2000 2816 explorer.exe 119 PID 2816 wrote to memory of 2000 2816 explorer.exe 119 PID 2816 wrote to memory of 3160 2816 explorer.exe 120 PID 2816 wrote to memory of 3160 2816 explorer.exe 120 PID 2816 wrote to memory of 3160 2816 explorer.exe 120 PID 2816 wrote to memory of 4092 2816 explorer.exe 121 PID 2816 wrote to memory of 4092 2816 explorer.exe 121
Processes
-
C:\Users\Admin\AppData\Local\Temp\d16d91b65e8deb566fd4eaa59ce26a9563cf1a040e941bcff151422cde314729N.exe"C:\Users\Admin\AppData\Local\Temp\d16d91b65e8deb566fd4eaa59ce26a9563cf1a040e941bcff151422cde314729N.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4000 -
C:\Users\Admin\AppData\Local\Temp\d16d91b65e8deb566fd4eaa59ce26a9563cf1a040e941bcff151422cde314729N.exe"C:\Users\Admin\AppData\Local\Temp\d16d91b65e8deb566fd4eaa59ce26a9563cf1a040e941bcff151422cde314729N.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3548 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4900 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2816 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5112
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5104
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1496
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5036
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3924
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4604
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4348
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1896
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4200
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2000
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3160
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4092
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2160
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3100
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2892
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3396
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3120
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3124
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4704
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2804
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4292
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4384
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4936
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3764
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2320
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:404
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1020
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2340
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3748
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1976
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:788
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3360
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4456
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1116
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2472
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4772
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5072
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4844
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1108
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4116
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3628
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4376
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2372
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3816
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1040
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4836
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2192
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4356
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2404
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3892
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3080
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4184
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3832
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2324
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4544
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2628
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:888
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4496
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4752
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2104
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:764
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:1968
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:3788
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:1352
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:3880
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4612
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:316
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5032
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:3136
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4444
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:544
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:3492
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:3684
-
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"4⤵PID:4312
-
-
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"2⤵PID:2492
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5c47ae13ef8d135cf17720c996967ed00
SHA1e2989ec67e75c21e311a766fd35f4674d56b4eff
SHA256d16d91b65e8deb566fd4eaa59ce26a9563cf1a040e941bcff151422cde314729
SHA5121399fd559c6a0cefbd39db63b1ca45f8ef9ceef5b98d17f478b845e26e3213753088b92ad3f9c5af8934416bd8395e89df25b1cdfb4d425587c8de7052e3b564
-
Filesize
1.2MB
MD539266b8b1a4a9da9b5bb3ec98ba29209
SHA11c7d43b833c49c3a583bece0c308948fea82adff
SHA256a7d60137ddc5290e6f7882bda5e7709d7cffcd9d63ab3d4b9d8babad10c7eff1
SHA512f637a8ea2c9687474dff8f43d7b6201a42cdfee49191f5aee636bc427ba72a6f5b29428be1d1531ebbf984b4ceb11e438ff8f66ca286124c27f99a531760eb7d
-
Filesize
1.2MB
MD5bca2f200965a7f96d13e6dd949344f36
SHA1f7441adcc675c4c611b61d932ffd544d689c57d0
SHA2566caef013cf29207ded178083d50cb28048e8652cfb85bcb5966e1b04535eff04
SHA5129ffca5f212cd4ed6e2c9f5fe50982ff6d005649f16916a6471c4e2715ed0c380e7da01dbaef6438922059b26f1bef1badc0d6bd1740b7f6f954019c99f438e93