Analysis
-
max time kernel
117s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
11-11-2024 03:26
Behavioral task
behavioral1
Sample
96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exe
Resource
win10v2004-20241007-en
General
-
Target
96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exe
-
Size
2.9MB
-
MD5
fad1f55e473ce8bb0992f7aac9541280
-
SHA1
c2dba04ca0b8ac04f673d45f8c3244d0af5eb2a4
-
SHA256
96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39
-
SHA512
d5c1e30c5b9a555e9bb16a1d742c6b343778ed934ccbf5181ddc537935104e6d7dd4ec29564f79179d1a84f3b668cf9e610f97865c02d96185c3757e41cc7f91
-
SSDEEP
24576:7v97AXmZZcVKfIxTiEVc847flVC6faaQDbGV6eH81k6IbGD2JTu0GoZQDbGV6eHN:7v97AXmw4gxeOw46fUbNecCCFbNecO
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
explorer.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
explorer.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzonerat family
-
Warzone RAT payload 4 IoCs
Processes:
resource yara_rule C:\Windows\system\explorer.exe warzonerat C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe warzonerat \Windows\system\spoolsv.exe warzonerat C:\Windows\system\spoolsv.exe warzonerat -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
Processes:
explorer.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe -
Drops startup file 3 IoCs
Processes:
cmd.execmd.execmd.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe -
Executes dropped EXE 16 IoCs
Processes:
explorer.exeexplorer.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exepid process 1548 explorer.exe 2080 explorer.exe 2544 explorer.exe 888 spoolsv.exe 2240 spoolsv.exe 1300 spoolsv.exe 2356 spoolsv.exe 2424 spoolsv.exe 2928 spoolsv.exe 2772 spoolsv.exe 1700 spoolsv.exe 2012 spoolsv.exe 1948 spoolsv.exe 1708 spoolsv.exe 1864 spoolsv.exe 1364 spoolsv.exe -
Loads dropped DLL 23 IoCs
Processes:
96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exepid process 2672 96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exe 2672 96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exe 2544 explorer.exe 2544 explorer.exe 888 spoolsv.exe 2544 explorer.exe 2544 explorer.exe 1300 spoolsv.exe 2544 explorer.exe 2544 explorer.exe 2424 spoolsv.exe 2544 explorer.exe 2544 explorer.exe 2772 spoolsv.exe 2544 explorer.exe 2544 explorer.exe 2012 spoolsv.exe 2544 explorer.exe 2544 explorer.exe 1708 spoolsv.exe 2544 explorer.exe 2544 explorer.exe 1364 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exeexplorer.exeexplorer.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" 96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe -
Suspicious use of SetThreadContext 12 IoCs
Processes:
96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exe96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exeexplorer.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exedescription pid process target process PID 2604 set thread context of 2348 2604 96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exe 96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exe PID 2348 set thread context of 2672 2348 96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exe 96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exe PID 2348 set thread context of 2412 2348 96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exe diskperf.exe PID 1548 set thread context of 2080 1548 explorer.exe explorer.exe PID 2080 set thread context of 2544 2080 explorer.exe explorer.exe PID 2080 set thread context of 1872 2080 explorer.exe diskperf.exe PID 888 set thread context of 2240 888 spoolsv.exe spoolsv.exe PID 1300 set thread context of 2356 1300 spoolsv.exe spoolsv.exe PID 2424 set thread context of 2928 2424 spoolsv.exe spoolsv.exe PID 2772 set thread context of 1700 2772 spoolsv.exe spoolsv.exe PID 2012 set thread context of 1948 2012 spoolsv.exe spoolsv.exe PID 1708 set thread context of 1864 1708 spoolsv.exe spoolsv.exe -
Drops file in Windows directory 11 IoCs
Processes:
explorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exe96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exedescription ioc process File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe 96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 22 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
spoolsv.execmd.exespoolsv.exespoolsv.exe96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exeexplorer.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.execmd.exe96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exespoolsv.exespoolsv.execmd.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exe96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exeexplorer.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe -
Suspicious behavior: EnumeratesProcesses 17 IoCs
Processes:
96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exe96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exeexplorer.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exepid process 2604 96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exe 2672 96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exe 1548 explorer.exe 888 spoolsv.exe 2544 explorer.exe 2544 explorer.exe 1300 spoolsv.exe 2544 explorer.exe 2424 spoolsv.exe 2544 explorer.exe 2772 spoolsv.exe 2544 explorer.exe 2012 spoolsv.exe 2544 explorer.exe 1708 spoolsv.exe 2544 explorer.exe 1364 spoolsv.exe -
Suspicious use of SetWindowsHookEx 24 IoCs
Processes:
96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exe96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exeexplorer.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exepid process 2604 96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exe 2604 96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exe 2672 96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exe 2672 96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exe 1548 explorer.exe 1548 explorer.exe 2544 explorer.exe 2544 explorer.exe 888 spoolsv.exe 888 spoolsv.exe 2544 explorer.exe 2544 explorer.exe 1300 spoolsv.exe 1300 spoolsv.exe 2424 spoolsv.exe 2424 spoolsv.exe 2772 spoolsv.exe 2772 spoolsv.exe 2012 spoolsv.exe 2012 spoolsv.exe 1708 spoolsv.exe 1708 spoolsv.exe 1364 spoolsv.exe 1364 spoolsv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exe96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exe96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exeexplorer.exedescription pid process target process PID 2604 wrote to memory of 2368 2604 96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exe cmd.exe PID 2604 wrote to memory of 2368 2604 96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exe cmd.exe PID 2604 wrote to memory of 2368 2604 96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exe cmd.exe PID 2604 wrote to memory of 2368 2604 96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exe cmd.exe PID 2604 wrote to memory of 2348 2604 96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exe 96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exe PID 2604 wrote to memory of 2348 2604 96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exe 96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exe PID 2604 wrote to memory of 2348 2604 96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exe 96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exe PID 2604 wrote to memory of 2348 2604 96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exe 96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exe PID 2604 wrote to memory of 2348 2604 96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exe 96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exe PID 2604 wrote to memory of 2348 2604 96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exe 96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exe PID 2604 wrote to memory of 2348 2604 96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exe 96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exe PID 2604 wrote to memory of 2348 2604 96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exe 96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exe PID 2604 wrote to memory of 2348 2604 96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exe 96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exe PID 2604 wrote to memory of 2348 2604 96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exe 96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exe PID 2604 wrote to memory of 2348 2604 96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exe 96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exe PID 2604 wrote to memory of 2348 2604 96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exe 96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exe PID 2604 wrote to memory of 2348 2604 96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exe 96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exe PID 2604 wrote to memory of 2348 2604 96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exe 96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exe PID 2604 wrote to memory of 2348 2604 96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exe 96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exe PID 2604 wrote to memory of 2348 2604 96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exe 96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exe PID 2604 wrote to memory of 2348 2604 96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exe 96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exe PID 2604 wrote to memory of 2348 2604 96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exe 96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exe PID 2604 wrote to memory of 2348 2604 96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exe 96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exe PID 2604 wrote to memory of 2348 2604 96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exe 96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exe PID 2604 wrote to memory of 2348 2604 96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exe 96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exe PID 2604 wrote to memory of 2348 2604 96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exe 96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exe PID 2604 wrote to memory of 2348 2604 96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exe 96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exe PID 2348 wrote to memory of 2672 2348 96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exe 96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exe PID 2348 wrote to memory of 2672 2348 96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exe 96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exe PID 2348 wrote to memory of 2672 2348 96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exe 96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exe PID 2348 wrote to memory of 2672 2348 96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exe 96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exe PID 2348 wrote to memory of 2672 2348 96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exe 96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exe PID 2348 wrote to memory of 2672 2348 96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exe 96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exe PID 2348 wrote to memory of 2672 2348 96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exe 96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exe PID 2348 wrote to memory of 2672 2348 96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exe 96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exe PID 2348 wrote to memory of 2672 2348 96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exe 96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exe PID 2348 wrote to memory of 2412 2348 96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exe diskperf.exe PID 2348 wrote to memory of 2412 2348 96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exe diskperf.exe PID 2348 wrote to memory of 2412 2348 96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exe diskperf.exe PID 2348 wrote to memory of 2412 2348 96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exe diskperf.exe PID 2348 wrote to memory of 2412 2348 96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exe diskperf.exe PID 2348 wrote to memory of 2412 2348 96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exe diskperf.exe PID 2672 wrote to memory of 1548 2672 96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exe explorer.exe PID 2672 wrote to memory of 1548 2672 96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exe explorer.exe PID 2672 wrote to memory of 1548 2672 96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exe explorer.exe PID 2672 wrote to memory of 1548 2672 96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exe explorer.exe PID 1548 wrote to memory of 564 1548 explorer.exe cmd.exe PID 1548 wrote to memory of 564 1548 explorer.exe cmd.exe PID 1548 wrote to memory of 564 1548 explorer.exe cmd.exe PID 1548 wrote to memory of 564 1548 explorer.exe cmd.exe PID 1548 wrote to memory of 2080 1548 explorer.exe explorer.exe PID 1548 wrote to memory of 2080 1548 explorer.exe explorer.exe PID 1548 wrote to memory of 2080 1548 explorer.exe explorer.exe PID 1548 wrote to memory of 2080 1548 explorer.exe explorer.exe PID 1548 wrote to memory of 2080 1548 explorer.exe explorer.exe PID 1548 wrote to memory of 2080 1548 explorer.exe explorer.exe PID 1548 wrote to memory of 2080 1548 explorer.exe explorer.exe PID 1548 wrote to memory of 2080 1548 explorer.exe explorer.exe PID 1548 wrote to memory of 2080 1548 explorer.exe explorer.exe PID 1548 wrote to memory of 2080 1548 explorer.exe explorer.exe PID 1548 wrote to memory of 2080 1548 explorer.exe explorer.exe PID 1548 wrote to memory of 2080 1548 explorer.exe explorer.exe PID 1548 wrote to memory of 2080 1548 explorer.exe explorer.exe PID 1548 wrote to memory of 2080 1548 explorer.exe explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exe"C:\Users\Admin\AppData\Local\Temp\96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "C:\Users\Admin\AppData\Local\Temp\96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"2⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2368
-
-
C:\Users\Admin\AppData\Local\Temp\96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exeC:\Users\Admin\AppData\Local\Temp\96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exe2⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Users\Admin\AppData\Local\Temp\96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exeC:\Users\Admin\AppData\Local\Temp\96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N.exe3⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2672 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\explorer.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"5⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:564
-
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2080 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe6⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2544 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:888 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:1144
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2240
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1300 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:1796
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2356
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2424 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:2792
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2928
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2772 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:1960
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1700
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2012 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:2864
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1948
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1708 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:912
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1864
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1364 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:1556
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵PID:760
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵PID:1760
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:2628
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵PID:1796
-
-
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵PID:1872
-
-
-
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"3⤵PID:2412
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD5fad1f55e473ce8bb0992f7aac9541280
SHA1c2dba04ca0b8ac04f673d45f8c3244d0af5eb2a4
SHA25696a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39
SHA512d5c1e30c5b9a555e9bb16a1d742c6b343778ed934ccbf5181ddc537935104e6d7dd4ec29564f79179d1a84f3b668cf9e610f97865c02d96185c3757e41cc7f91
-
Filesize
92B
MD513222a4bb413aaa8b92aa5b4f81d2760
SHA1268a48f2fe84ed49bbdc1873a8009db8c7cba66a
SHA256d170ac99460f9c1fb30717345b1003f8eb9189c26857ca26d3431590e6f0e23d
SHA512eee47ead9bef041b510ee5e40ebe8a51abd41d8c1fe5de68191f2b996feaa6cc0b8c16ed26d644fbf1d7e4f40920d7a6db954e19f2236d9e4e3f3f984f21b140
-
Filesize
93B
MD58445bfa5a278e2f068300c604a78394b
SHA19fb4eef5ec2606bd151f77fdaa219853d4aa0c65
SHA2565ddf324661da70998e89da7469c0eea327faae9216b9abc15c66fe95deec379c
SHA5128ad7d18392a15cabbfd4d30b2e8a2aad899d35aba099b5be1f6852ca39f58541fb318972299c5728a30fd311db011578c3aaf881fa8b8b42067d2a1e11c50822
-
Filesize
2.9MB
MD501ae08c9e52c70b35a18b8b763756604
SHA13014ce0962ce7f59a98c8208ecc041881f9d5cbd
SHA2569d19594b6ed23563784aaef642373f58aa7cf884bad5f6eb200f1b8cb8861b57
SHA512ad9cbef48e8a4a184ce71e5ba912419d8c5bd39b219661785860d26c98f8c0477b4ac64b39ddbfc359ee5328174bee1b90bdc637e733ef1da5e044135c8ee106
-
Filesize
1.7MB
MD560006b4212da312cc07f21221ce6ec3d
SHA16663f53ec0d985bd85a24c13ef39c2156cdbc0cb
SHA256e9a3ffd6a91e4a0677b9d726ef5fb98d15627a01ddfef911b747773ef1a0b96e
SHA512bdba9701dcd52c068ca2d3fb82b8e6eb48fd694a46eeef63c5ab122dd71017718670b95fa6fae5b51be7e0776213c687b3a9e55b4aa86ce0366a75c79356b03e
-
Filesize
2.9MB
MD5dc59477ff6bfbadfe07d5e0d240b73bd
SHA10f15ee29d2d6de38bd8544cb3fca3aa68e7af6f0
SHA256bb91239f5a84e21c9eea2f366b630918f8c505c59fdccd0fa0ed6f72aafd79ec
SHA512d35afb938c3a79464c69296842f96472065f0584740ab098b535d2f93084a445bd981f004ca1b12dc23e4595dfcea113be3f2ae6e0a1238f9a3c8a7ce66eab58
-
Filesize
1.1MB
MD5b3a33a64fa19ed784f6c034ed1a3a3bf
SHA1d89891c9e054f308dd23bd51c42d43da11013dd7
SHA256f25adc00c0f04e1a6c7fe9ad212587f61707a0944f1107931f01073f2ce52725
SHA5120590707e484029831e42223b0d64311d0a2b5a95f7ce480e89022b1d21f3be905b3e70e5b691dd509039cf1822340e0a295ef306737bfce401084b365b676b0f