Analysis
-
max time kernel
146s -
max time network
29s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
18-11-2024 23:12
Behavioral task
behavioral1
Sample
cee2e9f02fdbbd2391c29569a4a6a156863e402b53f676b5a8a9eb39d3a0e80e.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
cee2e9f02fdbbd2391c29569a4a6a156863e402b53f676b5a8a9eb39d3a0e80e.exe
Resource
win10v2004-20241007-en
General
-
Target
cee2e9f02fdbbd2391c29569a4a6a156863e402b53f676b5a8a9eb39d3a0e80e.exe
-
Size
2.9MB
-
MD5
b14bd6a6e16c6605b3f8b5d1d26d7a1f
-
SHA1
cfec498713bf8b73131c6210011881361934a635
-
SHA256
cee2e9f02fdbbd2391c29569a4a6a156863e402b53f676b5a8a9eb39d3a0e80e
-
SHA512
a9ca1a02699c4c55018ed80cc4e4840e23948a16874679cbbb6a21b119c75af05762e670f1ed4cc7eeea909f49606c773431b6b0f1a6f3895a3e0228f15b5578
-
SSDEEP
24576:ATU7AfmZZcVKfIxTiEVc847flVC6faaQDbGV6eH81k6IbGD2JTu0GoZQDbGV6eHu:ATU7Afmw4gxeOw46fUbNecCCFbNecZ
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzonerat family
-
Warzone RAT payload 3 IoCs
resource yara_rule behavioral1/files/0x0008000000016c23-95.dat warzonerat behavioral1/files/0x0007000000016c10-174.dat warzonerat behavioral1/files/0x000a000000016fc9-189.dat warzonerat -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe -
Drops startup file 6 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe -
Executes dropped EXE 35 IoCs
pid Process 1720 explorer.exe 1280 explorer.exe 792 explorer.exe 2024 spoolsv.exe 1184 spoolsv.exe 2072 spoolsv.exe 2948 spoolsv.exe 2820 spoolsv.exe 1260 spoolsv.exe 1416 spoolsv.exe 2252 spoolsv.exe 3000 spoolsv.exe 2476 spoolsv.exe 1840 spoolsv.exe 1572 spoolsv.exe 892 spoolsv.exe 1332 spoolsv.exe 2896 spoolsv.exe 2820 spoolsv.exe 2732 spoolsv.exe 2912 spoolsv.exe 968 spoolsv.exe 1400 spoolsv.exe 2080 spoolsv.exe 2268 spoolsv.exe 2480 spoolsv.exe 1692 spoolsv.exe 1724 spoolsv.exe 2824 spoolsv.exe 2308 spoolsv.exe 2988 explorer.exe 2184 spoolsv.exe 2204 explorer.exe 2552 spoolsv.exe 2976 explorer.exe -
Loads dropped DLL 48 IoCs
pid Process 1372 cee2e9f02fdbbd2391c29569a4a6a156863e402b53f676b5a8a9eb39d3a0e80e.exe 1372 cee2e9f02fdbbd2391c29569a4a6a156863e402b53f676b5a8a9eb39d3a0e80e.exe 792 explorer.exe 792 explorer.exe 2024 spoolsv.exe 792 explorer.exe 792 explorer.exe 2072 spoolsv.exe 792 explorer.exe 792 explorer.exe 2820 spoolsv.exe 792 explorer.exe 792 explorer.exe 1416 spoolsv.exe 792 explorer.exe 792 explorer.exe 2252 spoolsv.exe 792 explorer.exe 792 explorer.exe 1840 spoolsv.exe 792 explorer.exe 792 explorer.exe 892 spoolsv.exe 792 explorer.exe 792 explorer.exe 2896 spoolsv.exe 792 explorer.exe 792 explorer.exe 2732 spoolsv.exe 792 explorer.exe 792 explorer.exe 968 spoolsv.exe 792 explorer.exe 792 explorer.exe 2080 spoolsv.exe 792 explorer.exe 792 explorer.exe 2268 spoolsv.exe 792 explorer.exe 792 explorer.exe 1724 spoolsv.exe 1184 spoolsv.exe 2308 spoolsv.exe 792 explorer.exe 792 explorer.exe 2184 spoolsv.exe 2948 spoolsv.exe 2552 spoolsv.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\SyncHost.exe" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" cee2e9f02fdbbd2391c29569a4a6a156863e402b53f676b5a8a9eb39d3a0e80e.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe -
Suspicious use of SetThreadContext 24 IoCs
description pid Process procid_target PID 2344 set thread context of 2176 2344 cee2e9f02fdbbd2391c29569a4a6a156863e402b53f676b5a8a9eb39d3a0e80e.exe 31 PID 2176 set thread context of 1372 2176 cee2e9f02fdbbd2391c29569a4a6a156863e402b53f676b5a8a9eb39d3a0e80e.exe 32 PID 2176 set thread context of 1980 2176 cee2e9f02fdbbd2391c29569a4a6a156863e402b53f676b5a8a9eb39d3a0e80e.exe 33 PID 1720 set thread context of 1280 1720 explorer.exe 37 PID 1280 set thread context of 792 1280 explorer.exe 38 PID 1280 set thread context of 1816 1280 explorer.exe 39 PID 2024 set thread context of 1184 2024 spoolsv.exe 43 PID 2072 set thread context of 2948 2072 spoolsv.exe 46 PID 2820 set thread context of 1260 2820 spoolsv.exe 50 PID 1416 set thread context of 3000 1416 spoolsv.exe 53 PID 2252 set thread context of 2476 2252 spoolsv.exe 57 PID 1840 set thread context of 1572 1840 spoolsv.exe 60 PID 892 set thread context of 1332 892 spoolsv.exe 64 PID 2896 set thread context of 2820 2896 spoolsv.exe 68 PID 2732 set thread context of 2912 2732 spoolsv.exe 72 PID 968 set thread context of 1400 968 spoolsv.exe 75 PID 2080 set thread context of 2480 2080 spoolsv.exe 79 PID 2268 set thread context of 1692 2268 spoolsv.exe 82 PID 1724 set thread context of 2824 1724 spoolsv.exe 86 PID 1184 set thread context of 2308 1184 spoolsv.exe 87 PID 1184 set thread context of 2332 1184 spoolsv.exe 88 PID 2988 set thread context of 2204 2988 explorer.exe 95 PID 2948 set thread context of 2552 2948 spoolsv.exe 97 PID 2948 set thread context of 788 2948 spoolsv.exe 98 -
resource yara_rule behavioral1/memory/2344-0-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral1/memory/2344-43-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral1/files/0x0008000000016c23-95.dat upx behavioral1/memory/1720-101-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral1/memory/1720-148-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral1/files/0x0007000000016c10-174.dat upx behavioral1/files/0x000a000000016fc9-189.dat upx behavioral1/memory/2024-198-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral1/memory/2072-267-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral1/memory/2820-307-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral1/memory/1416-361-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral1/memory/2252-417-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral1/memory/1840-505-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral1/memory/892-529-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral1/memory/2896-585-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral1/memory/792-584-0x0000000001F30000-0x0000000001F76000-memory.dmp upx behavioral1/memory/2896-631-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral1/memory/2732-644-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral1/memory/968-701-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral1/memory/2080-789-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral1/memory/2268-835-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral1/memory/792-1043-0x0000000001F30000-0x0000000001F76000-memory.dmp upx -
Drops file in Windows directory 19 IoCs
description ioc Process File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe cee2e9f02fdbbd2391c29569a4a6a156863e402b53f676b5a8a9eb39d3a0e80e.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 44 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cee2e9f02fdbbd2391c29569a4a6a156863e402b53f676b5a8a9eb39d3a0e80e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cee2e9f02fdbbd2391c29569a4a6a156863e402b53f676b5a8a9eb39d3a0e80e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cee2e9f02fdbbd2391c29569a4a6a156863e402b53f676b5a8a9eb39d3a0e80e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 2344 cee2e9f02fdbbd2391c29569a4a6a156863e402b53f676b5a8a9eb39d3a0e80e.exe 1372 cee2e9f02fdbbd2391c29569a4a6a156863e402b53f676b5a8a9eb39d3a0e80e.exe 1720 explorer.exe 2024 spoolsv.exe 792 explorer.exe 792 explorer.exe 2072 spoolsv.exe 792 explorer.exe 2820 spoolsv.exe 792 explorer.exe 1416 spoolsv.exe 792 explorer.exe 2252 spoolsv.exe 792 explorer.exe 1840 spoolsv.exe 792 explorer.exe 892 spoolsv.exe 792 explorer.exe 2896 spoolsv.exe 792 explorer.exe 2732 spoolsv.exe 792 explorer.exe 968 spoolsv.exe 792 explorer.exe 2080 spoolsv.exe 792 explorer.exe 2268 spoolsv.exe 792 explorer.exe 1724 spoolsv.exe 792 explorer.exe 2988 explorer.exe 2184 spoolsv.exe -
Suspicious use of SetWindowsHookEx 46 IoCs
pid Process 2344 cee2e9f02fdbbd2391c29569a4a6a156863e402b53f676b5a8a9eb39d3a0e80e.exe 2344 cee2e9f02fdbbd2391c29569a4a6a156863e402b53f676b5a8a9eb39d3a0e80e.exe 1372 cee2e9f02fdbbd2391c29569a4a6a156863e402b53f676b5a8a9eb39d3a0e80e.exe 1372 cee2e9f02fdbbd2391c29569a4a6a156863e402b53f676b5a8a9eb39d3a0e80e.exe 1720 explorer.exe 1720 explorer.exe 792 explorer.exe 792 explorer.exe 2024 spoolsv.exe 2024 spoolsv.exe 792 explorer.exe 792 explorer.exe 2072 spoolsv.exe 2072 spoolsv.exe 2820 spoolsv.exe 2820 spoolsv.exe 1416 spoolsv.exe 1416 spoolsv.exe 2252 spoolsv.exe 2252 spoolsv.exe 1840 spoolsv.exe 1840 spoolsv.exe 892 spoolsv.exe 892 spoolsv.exe 2896 spoolsv.exe 2896 spoolsv.exe 2732 spoolsv.exe 2732 spoolsv.exe 968 spoolsv.exe 968 spoolsv.exe 2080 spoolsv.exe 2080 spoolsv.exe 2268 spoolsv.exe 2268 spoolsv.exe 1724 spoolsv.exe 1724 spoolsv.exe 2308 spoolsv.exe 2308 spoolsv.exe 2988 explorer.exe 2988 explorer.exe 2184 spoolsv.exe 2184 spoolsv.exe 2552 spoolsv.exe 2552 spoolsv.exe 2976 explorer.exe 2976 explorer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2344 wrote to memory of 2612 2344 cee2e9f02fdbbd2391c29569a4a6a156863e402b53f676b5a8a9eb39d3a0e80e.exe 29 PID 2344 wrote to memory of 2612 2344 cee2e9f02fdbbd2391c29569a4a6a156863e402b53f676b5a8a9eb39d3a0e80e.exe 29 PID 2344 wrote to memory of 2612 2344 cee2e9f02fdbbd2391c29569a4a6a156863e402b53f676b5a8a9eb39d3a0e80e.exe 29 PID 2344 wrote to memory of 2612 2344 cee2e9f02fdbbd2391c29569a4a6a156863e402b53f676b5a8a9eb39d3a0e80e.exe 29 PID 2344 wrote to memory of 2176 2344 cee2e9f02fdbbd2391c29569a4a6a156863e402b53f676b5a8a9eb39d3a0e80e.exe 31 PID 2344 wrote to memory of 2176 2344 cee2e9f02fdbbd2391c29569a4a6a156863e402b53f676b5a8a9eb39d3a0e80e.exe 31 PID 2344 wrote to memory of 2176 2344 cee2e9f02fdbbd2391c29569a4a6a156863e402b53f676b5a8a9eb39d3a0e80e.exe 31 PID 2344 wrote to memory of 2176 2344 cee2e9f02fdbbd2391c29569a4a6a156863e402b53f676b5a8a9eb39d3a0e80e.exe 31 PID 2344 wrote to memory of 2176 2344 cee2e9f02fdbbd2391c29569a4a6a156863e402b53f676b5a8a9eb39d3a0e80e.exe 31 PID 2344 wrote to memory of 2176 2344 cee2e9f02fdbbd2391c29569a4a6a156863e402b53f676b5a8a9eb39d3a0e80e.exe 31 PID 2344 wrote to memory of 2176 2344 cee2e9f02fdbbd2391c29569a4a6a156863e402b53f676b5a8a9eb39d3a0e80e.exe 31 PID 2344 wrote to memory of 2176 2344 cee2e9f02fdbbd2391c29569a4a6a156863e402b53f676b5a8a9eb39d3a0e80e.exe 31 PID 2344 wrote to memory of 2176 2344 cee2e9f02fdbbd2391c29569a4a6a156863e402b53f676b5a8a9eb39d3a0e80e.exe 31 PID 2344 wrote to memory of 2176 2344 cee2e9f02fdbbd2391c29569a4a6a156863e402b53f676b5a8a9eb39d3a0e80e.exe 31 PID 2344 wrote to memory of 2176 2344 cee2e9f02fdbbd2391c29569a4a6a156863e402b53f676b5a8a9eb39d3a0e80e.exe 31 PID 2344 wrote to memory of 2176 2344 cee2e9f02fdbbd2391c29569a4a6a156863e402b53f676b5a8a9eb39d3a0e80e.exe 31 PID 2344 wrote to memory of 2176 2344 cee2e9f02fdbbd2391c29569a4a6a156863e402b53f676b5a8a9eb39d3a0e80e.exe 31 PID 2344 wrote to memory of 2176 2344 cee2e9f02fdbbd2391c29569a4a6a156863e402b53f676b5a8a9eb39d3a0e80e.exe 31 PID 2344 wrote to memory of 2176 2344 cee2e9f02fdbbd2391c29569a4a6a156863e402b53f676b5a8a9eb39d3a0e80e.exe 31 PID 2344 wrote to memory of 2176 2344 cee2e9f02fdbbd2391c29569a4a6a156863e402b53f676b5a8a9eb39d3a0e80e.exe 31 PID 2344 wrote to memory of 2176 2344 cee2e9f02fdbbd2391c29569a4a6a156863e402b53f676b5a8a9eb39d3a0e80e.exe 31 PID 2344 wrote to memory of 2176 2344 cee2e9f02fdbbd2391c29569a4a6a156863e402b53f676b5a8a9eb39d3a0e80e.exe 31 PID 2344 wrote to memory of 2176 2344 cee2e9f02fdbbd2391c29569a4a6a156863e402b53f676b5a8a9eb39d3a0e80e.exe 31 PID 2344 wrote to memory of 2176 2344 cee2e9f02fdbbd2391c29569a4a6a156863e402b53f676b5a8a9eb39d3a0e80e.exe 31 PID 2344 wrote to memory of 2176 2344 cee2e9f02fdbbd2391c29569a4a6a156863e402b53f676b5a8a9eb39d3a0e80e.exe 31 PID 2344 wrote to memory of 2176 2344 cee2e9f02fdbbd2391c29569a4a6a156863e402b53f676b5a8a9eb39d3a0e80e.exe 31 PID 2344 wrote to memory of 2176 2344 cee2e9f02fdbbd2391c29569a4a6a156863e402b53f676b5a8a9eb39d3a0e80e.exe 31 PID 2176 wrote to memory of 1372 2176 cee2e9f02fdbbd2391c29569a4a6a156863e402b53f676b5a8a9eb39d3a0e80e.exe 32 PID 2176 wrote to memory of 1372 2176 cee2e9f02fdbbd2391c29569a4a6a156863e402b53f676b5a8a9eb39d3a0e80e.exe 32 PID 2176 wrote to memory of 1372 2176 cee2e9f02fdbbd2391c29569a4a6a156863e402b53f676b5a8a9eb39d3a0e80e.exe 32 PID 2176 wrote to memory of 1372 2176 cee2e9f02fdbbd2391c29569a4a6a156863e402b53f676b5a8a9eb39d3a0e80e.exe 32 PID 2176 wrote to memory of 1372 2176 cee2e9f02fdbbd2391c29569a4a6a156863e402b53f676b5a8a9eb39d3a0e80e.exe 32 PID 2176 wrote to memory of 1372 2176 cee2e9f02fdbbd2391c29569a4a6a156863e402b53f676b5a8a9eb39d3a0e80e.exe 32 PID 2176 wrote to memory of 1372 2176 cee2e9f02fdbbd2391c29569a4a6a156863e402b53f676b5a8a9eb39d3a0e80e.exe 32 PID 2176 wrote to memory of 1372 2176 cee2e9f02fdbbd2391c29569a4a6a156863e402b53f676b5a8a9eb39d3a0e80e.exe 32 PID 2176 wrote to memory of 1372 2176 cee2e9f02fdbbd2391c29569a4a6a156863e402b53f676b5a8a9eb39d3a0e80e.exe 32 PID 2176 wrote to memory of 1980 2176 cee2e9f02fdbbd2391c29569a4a6a156863e402b53f676b5a8a9eb39d3a0e80e.exe 33 PID 2176 wrote to memory of 1980 2176 cee2e9f02fdbbd2391c29569a4a6a156863e402b53f676b5a8a9eb39d3a0e80e.exe 33 PID 2176 wrote to memory of 1980 2176 cee2e9f02fdbbd2391c29569a4a6a156863e402b53f676b5a8a9eb39d3a0e80e.exe 33 PID 2176 wrote to memory of 1980 2176 cee2e9f02fdbbd2391c29569a4a6a156863e402b53f676b5a8a9eb39d3a0e80e.exe 33 PID 2176 wrote to memory of 1980 2176 cee2e9f02fdbbd2391c29569a4a6a156863e402b53f676b5a8a9eb39d3a0e80e.exe 33 PID 2176 wrote to memory of 1980 2176 cee2e9f02fdbbd2391c29569a4a6a156863e402b53f676b5a8a9eb39d3a0e80e.exe 33 PID 1372 wrote to memory of 1720 1372 cee2e9f02fdbbd2391c29569a4a6a156863e402b53f676b5a8a9eb39d3a0e80e.exe 34 PID 1372 wrote to memory of 1720 1372 cee2e9f02fdbbd2391c29569a4a6a156863e402b53f676b5a8a9eb39d3a0e80e.exe 34 PID 1372 wrote to memory of 1720 1372 cee2e9f02fdbbd2391c29569a4a6a156863e402b53f676b5a8a9eb39d3a0e80e.exe 34 PID 1372 wrote to memory of 1720 1372 cee2e9f02fdbbd2391c29569a4a6a156863e402b53f676b5a8a9eb39d3a0e80e.exe 34 PID 1720 wrote to memory of 3012 1720 explorer.exe 35 PID 1720 wrote to memory of 3012 1720 explorer.exe 35 PID 1720 wrote to memory of 3012 1720 explorer.exe 35 PID 1720 wrote to memory of 3012 1720 explorer.exe 35 PID 1720 wrote to memory of 1280 1720 explorer.exe 37 PID 1720 wrote to memory of 1280 1720 explorer.exe 37 PID 1720 wrote to memory of 1280 1720 explorer.exe 37 PID 1720 wrote to memory of 1280 1720 explorer.exe 37 PID 1720 wrote to memory of 1280 1720 explorer.exe 37 PID 1720 wrote to memory of 1280 1720 explorer.exe 37 PID 1720 wrote to memory of 1280 1720 explorer.exe 37 PID 1720 wrote to memory of 1280 1720 explorer.exe 37 PID 1720 wrote to memory of 1280 1720 explorer.exe 37 PID 1720 wrote to memory of 1280 1720 explorer.exe 37 PID 1720 wrote to memory of 1280 1720 explorer.exe 37 PID 1720 wrote to memory of 1280 1720 explorer.exe 37 PID 1720 wrote to memory of 1280 1720 explorer.exe 37 PID 1720 wrote to memory of 1280 1720 explorer.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\cee2e9f02fdbbd2391c29569a4a6a156863e402b53f676b5a8a9eb39d3a0e80e.exe"C:\Users\Admin\AppData\Local\Temp\cee2e9f02fdbbd2391c29569a4a6a156863e402b53f676b5a8a9eb39d3a0e80e.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "C:\Users\Admin\AppData\Local\Temp\cee2e9f02fdbbd2391c29569a4a6a156863e402b53f676b5a8a9eb39d3a0e80e.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"2⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2612
-
-
C:\Users\Admin\AppData\Local\Temp\cee2e9f02fdbbd2391c29569a4a6a156863e402b53f676b5a8a9eb39d3a0e80e.exeC:\Users\Admin\AppData\Local\Temp\cee2e9f02fdbbd2391c29569a4a6a156863e402b53f676b5a8a9eb39d3a0e80e.exe2⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Users\Admin\AppData\Local\Temp\cee2e9f02fdbbd2391c29569a4a6a156863e402b53f676b5a8a9eb39d3a0e80e.exeC:\Users\Admin\AppData\Local\Temp\cee2e9f02fdbbd2391c29569a4a6a156863e402b53f676b5a8a9eb39d3a0e80e.exe3⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1372 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\explorer.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"5⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:3012
-
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1280 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe6⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:792 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2024 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2268
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1184 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2308 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe10⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2988 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\explorer.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"11⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:912
-
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe11⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2204
-
-
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"9⤵PID:2332
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2072 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:2864
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2948 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2552 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe10⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2976 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\explorer.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"11⤵PID:2136
-
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe11⤵PID:3028
-
-
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"9⤵PID:788
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2820 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:3032
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1260 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe9⤵PID:2260
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"9⤵PID:2032
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1416 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:1760
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3000
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2252 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:2584
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2476
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1840 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:1828
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1572
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:892 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:1548
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1332
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2896 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:1952
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2820
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2732 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:1532
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2912
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:968 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:1776
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1400
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2080 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:1444
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2480
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2268 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:1476
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1692
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1724 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2148
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2824
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2184 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2868
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵PID:1832
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵PID:1440
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:2140
-
-
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵PID:1816
-
-
-
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"3⤵PID:1980
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD5b14bd6a6e16c6605b3f8b5d1d26d7a1f
SHA1cfec498713bf8b73131c6210011881361934a635
SHA256cee2e9f02fdbbd2391c29569a4a6a156863e402b53f676b5a8a9eb39d3a0e80e
SHA512a9ca1a02699c4c55018ed80cc4e4840e23948a16874679cbbb6a21b119c75af05762e670f1ed4cc7eeea909f49606c773431b6b0f1a6f3895a3e0228f15b5578
-
Filesize
93B
MD58445bfa5a278e2f068300c604a78394b
SHA19fb4eef5ec2606bd151f77fdaa219853d4aa0c65
SHA2565ddf324661da70998e89da7469c0eea327faae9216b9abc15c66fe95deec379c
SHA5128ad7d18392a15cabbfd4d30b2e8a2aad899d35aba099b5be1f6852ca39f58541fb318972299c5728a30fd311db011578c3aaf881fa8b8b42067d2a1e11c50822
-
Filesize
92B
MD513222a4bb413aaa8b92aa5b4f81d2760
SHA1268a48f2fe84ed49bbdc1873a8009db8c7cba66a
SHA256d170ac99460f9c1fb30717345b1003f8eb9189c26857ca26d3431590e6f0e23d
SHA512eee47ead9bef041b510ee5e40ebe8a51abd41d8c1fe5de68191f2b996feaa6cc0b8c16ed26d644fbf1d7e4f40920d7a6db954e19f2236d9e4e3f3f984f21b140
-
Filesize
2.9MB
MD5a2a39fbc56e31d046d57cfb986e31faa
SHA1b0ab6dd8e93f722538f2d8cd40ccec36cc8989c6
SHA25686e36ba4a7d0a9a187798f675f33cdbefd1ccc1d56447b43e795b917c3fac396
SHA512daf87e941efee2ffe4f665f94a51b743c8cd53adc21e588569f8a625b3c1cc8b45ffa4482b0473e76073a41da8592373c819cc09a18740c915484c14debe3207
-
Filesize
2.9MB
MD5cdc05ca0ad3d599d1663d6124fc1b8a5
SHA15a7d4136a815d4796527b440e031a6d0c98b059e
SHA256c7819afe9abfdad818be19bb521923f1883a4b4b640ad0f450b5d4c620b5289b
SHA512b0cb119d37be5acc3fec80d6197de36cbd13cc9d8eeffe35259e10d944960a369766f69433973c79c9b542393076b4f841c2ca43bf916ccea21cb21f7c38f208